From c140feaccbf6c20dab9ea192d88bb70b1e150ddc Mon Sep 17 00:00:00 2001 From: martyav Date: Tue, 4 Jun 2019 16:21:15 -0400 Subject: [PATCH 001/285] linting and retitled #heading --- ...indows-defender-antivirus-in-windows-10.md | 20 ++++++++++--------- 1 file changed, 11 insertions(+), 9 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md index 3aae4bb7f2..b011a736bc 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md +++ b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md @@ -16,7 +16,7 @@ ms.reviewer: manager: dansimp --- -# Windows Defender Antivirus in Windows 10 and Windows Server 2016 +# Nextgen Protection in Windows 10 and Windows Server 2016 **Applies to:** @@ -25,12 +25,14 @@ manager: dansimp Windows Defender Antivirus is a built-in antimalware solution that provides next generation protection for desktops, portable computers, and servers. Windows Defender Antivirus includes: -- [Cloud-delivered protection](utilize-microsoft-cloud-protection-windows-defender-antivirus.md) for near-instant detection and blocking of new and emerging threats. Along with machine learning and the Intelligent Security Graph, cloud-delivered protection is part of the next-gen technologies that power Windows Defender Antivirus. + +- [Cloud-delivered protection](utilize-microsoft-cloud-protection-windows-defender-antivirus.md) for near-instant detection and blocking of new and emerging threats. Along with machine learning and the Intelligent Security Graph, cloud-delivered protection is part of the next-gen technologies that power Windows Defender Antivirus. - [Always-on scanning](configure-real-time-protection-windows-defender-antivirus.md), using advanced file and process behavior monitoring and other heuristics (also known as "real-time protection") - [Dedicated protection updates](manage-updates-baselines-windows-defender-antivirus.md) based on machine-learning, human and automated big-data analysis, and in-depth threat resistance research You can configure and manage Windows Defender Antivirus with: -- System Center Configuration Manager (as System Center Endpoint Protection, or SCEP) + +- System Center Configuration Manager (as System Center Endpoint Protection, or SCEP) - Microsoft Intune - PowerShell - Windows Management Instrumentation (WMI) @@ -38,6 +40,7 @@ You can configure and manage Windows Defender Antivirus with: >[!TIP] >You can visit the Windows Defender Testground website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm the following features are working and see how they work: +> >- Cloud-delivered protection >- Fast learning (including Block at first sight) >- Potentially unwanted application blocking @@ -47,25 +50,25 @@ You can configure and manage Windows Defender Antivirus with: - The [block at first sight feature](configure-block-at-first-sight-windows-defender-antivirus.md) can now block non-portable executable files (such as JS, VBS, or macros) as well as executable files. - The [Virus & threat protection area in the Windows Security app](windows-defender-security-center-antivirus.md) now includes a section for ransomware protection. It includes controlled folder access settings and ransomware recovery settings. - ## What's new in Windows 10, version 1703 New features for Windows Defender Antivirus in Windows 10, version 1703 include: + - [Updates to how the block at first sight feature can be configured](configure-block-at-first-sight-windows-defender-antivirus.md) - [The ability to specify the level of cloud-protection](specify-cloud-protection-level-windows-defender-antivirus.md) - [Windows Defender Antivirus protection in the Windows Security app](windows-defender-security-center-antivirus.md) We've expanded this documentation library to cover end-to-end deployment, management, and configuration for Windows Defender Antivirus, and we've added some new guides that can help with evaluating and deploying Windows Defender AV in certain scenarios: + - [Evaluation guide for Windows Defender Antivirus](evaluate-windows-defender-antivirus.md) - [Deployment guide for Windows Defender Antivirus in a virtual desktop infrastructure environment](deployment-vdi-windows-defender-antivirus.md) - - ## Minimum system requirements Windows Defender AV has the same hardware requirements as Windows 10. For more information, see: -- [Minimum hardware requirements](https://msdn.microsoft.com/library/windows/hardware/dn915086.aspx) -- [Hardware component guidelines](https://msdn.microsoft.com/library/windows/hardware/dn915049.aspx) + +- [Minimum hardware requirements](https://msdn.microsoft.com/library/windows/hardware/dn915086.aspx) +- [Hardware component guidelines](https://msdn.microsoft.com/library/windows/hardware/dn915049.aspx) Functionality, configuration, and management is largely the same when using Windows Defender AV on Windows Server 2016; however, [there are some differences](windows-defender-antivirus-on-windows-server-2016.md). @@ -80,4 +83,3 @@ Functionality, configuration, and management is largely the same when using Wind - [Customize, initiate, and review the results of scans and remediation](customize-run-review-remediate-scans-windows-defender-antivirus.md) - [Review event logs and error codes to troubleshoot issues](troubleshoot-windows-defender-antivirus.md) - [Reference topics for management and configuration tools](configuration-management-reference-windows-defender-antivirus.md) - From d7ae2790817f54f6f6be44e788d35ec09da4921f Mon Sep 17 00:00:00 2001 From: martyav Date: Tue, 4 Jun 2019 17:03:09 -0400 Subject: [PATCH 002/285] quick & easy changes per request removed what's new sections added link w placeholder to mdatp what's new microsoft defender av -> microsoft defender antivirus --- ...indows-defender-antivirus-in-windows-10.md | 37 +++++-------------- 1 file changed, 10 insertions(+), 27 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md index b011a736bc..b6b2828ea9 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md +++ b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md @@ -16,7 +16,7 @@ ms.reviewer: manager: dansimp --- -# Nextgen Protection in Windows 10 and Windows Server 2016 +# Next Gen Protection in Windows 10 and Windows Server 2016 **Applies to:** @@ -45,41 +45,24 @@ You can configure and manage Windows Defender Antivirus with: >- Fast learning (including Block at first sight) >- Potentially unwanted application blocking -## What's new in Windows 10, version 1803 - -- The [block at first sight feature](configure-block-at-first-sight-windows-defender-antivirus.md) can now block non-portable executable files (such as JS, VBS, or macros) as well as executable files. -- The [Virus & threat protection area in the Windows Security app](windows-defender-security-center-antivirus.md) now includes a section for ransomware protection. It includes controlled folder access settings and ransomware recovery settings. - -## What's new in Windows 10, version 1703 - -New features for Windows Defender Antivirus in Windows 10, version 1703 include: - -- [Updates to how the block at first sight feature can be configured](configure-block-at-first-sight-windows-defender-antivirus.md) -- [The ability to specify the level of cloud-protection](specify-cloud-protection-level-windows-defender-antivirus.md) -- [Windows Defender Antivirus protection in the Windows Security app](windows-defender-security-center-antivirus.md) - -We've expanded this documentation library to cover end-to-end deployment, management, and configuration for Windows Defender Antivirus, and we've added some new guides that can help with evaluating and deploying Windows Defender AV in certain scenarios: - -- [Evaluation guide for Windows Defender Antivirus](evaluate-windows-defender-antivirus.md) -- [Deployment guide for Windows Defender Antivirus in a virtual desktop infrastructure environment](deployment-vdi-windows-defender-antivirus.md) - ## Minimum system requirements -Windows Defender AV has the same hardware requirements as Windows 10. For more information, see: +Windows Defender Antivirus has the same hardware requirements as Windows 10. For more information, see: - [Minimum hardware requirements](https://msdn.microsoft.com/library/windows/hardware/dn915086.aspx) - [Hardware component guidelines](https://msdn.microsoft.com/library/windows/hardware/dn915049.aspx) -Functionality, configuration, and management is largely the same when using Windows Defender AV on Windows Server 2016; however, [there are some differences](windows-defender-antivirus-on-windows-server-2016.md). +Functionality, configuration, and management is largely the same when using Windows Defender Antivirus on Windows Server 2016; however, [there are some differences](windows-defender-antivirus-on-windows-server-2016.md). ## Related topics -- [Windows Defender AV in the Windows Security app](windows-defender-security-center-antivirus.md) -- [Windows Defender AV on Windows Server 2016](windows-defender-antivirus-on-windows-server-2016.md) -- [Windows Defender AV compatibility](windows-defender-antivirus-compatibility.md) -- [Evaluate Windows Defender AV protection](evaluate-windows-defender-antivirus.md) -- [Deploy, manage updates, and report on Windows Defender AV](deploy-manage-report-windows-defender-antivirus.md) -- [Configure Windows Defender AV features](configure-windows-defender-antivirus-features.md) +- [What's new in Microsoft Defender Advanced Threat Protection](./) +- [Windows Defender Antivirus in the Windows Security app](windows-defender-security-center-antivirus.md) +- [Windows Defender Antivirus on Windows Server 2016](windows-defender-antivirus-on-windows-server-2016.md) +- [Windows Defender Antivirus compatibility](windows-defender-antivirus-compatibility.md) +- [Evaluate Windows Defender Antivirus protection](evaluate-windows-defender-antivirus.md) +- [Deploy, manage updates, and report on Windows Defender Antivirus](deploy-manage-report-windows-defender-antivirus.md) +- [Configure Windows Defender Antivirus features](configure-windows-defender-antivirus-features.md) - [Customize, initiate, and review the results of scans and remediation](customize-run-review-remediate-scans-windows-defender-antivirus.md) - [Review event logs and error codes to troubleshoot issues](troubleshoot-windows-defender-antivirus.md) - [Reference topics for management and configuration tools](configuration-management-reference-windows-defender-antivirus.md) From b3a92989c9ef95062882a0c12cc30b664932e1d8 Mon Sep 17 00:00:00 2001 From: martyav Date: Wed, 5 Jun 2019 15:32:20 -0400 Subject: [PATCH 003/285] first pass at de-emphasizing wdav --- ...indows-defender-antivirus-in-windows-10.md | 36 ++++++++++--------- 1 file changed, 20 insertions(+), 16 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md index b6b2828ea9..4390e20052 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md +++ b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md @@ -16,27 +16,19 @@ ms.reviewer: manager: dansimp --- -# Next Gen Protection in Windows 10 and Windows Server 2016 +# Next Generation Protection in Windows 10 and Windows Server 2016 **Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) -Windows Defender Antivirus is a built-in antimalware solution that provides next generation protection for desktops, portable computers, and servers. +Besides traditional security measures, we also provide next-gen protection, which harnesses the power of the cloud and of machine learning to keep your servers and personal devices safe. -Windows Defender Antivirus includes: +Next-gen protection includes: -- [Cloud-delivered protection](utilize-microsoft-cloud-protection-windows-defender-antivirus.md) for near-instant detection and blocking of new and emerging threats. Along with machine learning and the Intelligent Security Graph, cloud-delivered protection is part of the next-gen technologies that power Windows Defender Antivirus. -- [Always-on scanning](configure-real-time-protection-windows-defender-antivirus.md), using advanced file and process behavior monitoring and other heuristics (also known as "real-time protection") -- [Dedicated protection updates](manage-updates-baselines-windows-defender-antivirus.md) based on machine-learning, human and automated big-data analysis, and in-depth threat resistance research - -You can configure and manage Windows Defender Antivirus with: - -- System Center Configuration Manager (as System Center Endpoint Protection, or SCEP) -- Microsoft Intune -- PowerShell -- Windows Management Instrumentation (WMI) -- Group Policy +- [Cloud-based delivery](utilize-microsoft-cloud-protection-windows-defender-antivirus.md) for near-instant detection and blocking of new and emerging threats. +- [Always-on scanning](configure-real-time-protection-windows-defender-antivirus.md), also known as "real-time protection", for advanced file and process behavior monitoring, and other heuristics +- [Dedicated protection updates](manage-updates-baselines-windows-defender-antivirus.md) powered by machine-learning, human and automated big-data analysis, and in-depth threat resistance research >[!TIP] >You can visit the Windows Defender Testground website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm the following features are working and see how they work: @@ -47,11 +39,23 @@ You can configure and manage Windows Defender Antivirus with: ## Minimum system requirements -Windows Defender Antivirus has the same hardware requirements as Windows 10. For more information, see: +Windows Defender Antivirus is our main vehicle for next-gen protection. + +It has the same hardware requirements as Windows 10. For more information, see: - [Minimum hardware requirements](https://msdn.microsoft.com/library/windows/hardware/dn915086.aspx) - [Hardware component guidelines](https://msdn.microsoft.com/library/windows/hardware/dn915049.aspx) +## Configuring next-gen services + +You can use the following to configure and manage next-gen services in Win 10 Windows Defender Antivirus: + +- System Center Configuration Manager (as System Center Endpoint Protection, or SCEP) +- Microsoft Intune +- PowerShell +- Windows Management Instrumentation (WMI) +- Group Policy + Functionality, configuration, and management is largely the same when using Windows Defender Antivirus on Windows Server 2016; however, [there are some differences](windows-defender-antivirus-on-windows-server-2016.md). ## Related topics From 3c46ef3aadf89841f844e1afbbcf2b789e92ef47 Mon Sep 17 00:00:00 2001 From: martyav Date: Wed, 5 Jun 2019 15:36:06 -0400 Subject: [PATCH 004/285] rapid second pass --- .../windows-defender-antivirus-in-windows-10.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md index 4390e20052..0d10260da8 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md +++ b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md @@ -22,7 +22,7 @@ manager: dansimp - [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) -Besides traditional security measures, we also provide next-gen protection, which harnesses the power of the cloud and of machine learning to keep your servers and personal devices safe. +Besides traditional security measures, we also provide next-gen protection to keep your servers and personal devices safe. Next-gen protection includes: @@ -48,7 +48,7 @@ It has the same hardware requirements as Windows 10. For more information, see: ## Configuring next-gen services -You can use the following to configure and manage next-gen services in Win 10 Windows Defender Antivirus: +You can use the following to configure and manage next-gen services in Windows 10, while running Windows Defender Antivirus: - System Center Configuration Manager (as System Center Endpoint Protection, or SCEP) - Microsoft Intune @@ -56,7 +56,7 @@ You can use the following to configure and manage next-gen services in Win 10 Wi - Windows Management Instrumentation (WMI) - Group Policy -Functionality, configuration, and management is largely the same when using Windows Defender Antivirus on Windows Server 2016; however, [there are some differences](windows-defender-antivirus-on-windows-server-2016.md). +Configuration and management is largely the same in Windows Server 2016, while running Windows Defender Antivirus; however, [there are some differences](windows-defender-antivirus-on-windows-server-2016.md). ## Related topics From e171c7723058378688d4f0e481157a1a60d2b20c Mon Sep 17 00:00:00 2001 From: martyav Date: Wed, 5 Jun 2019 16:30:56 -0400 Subject: [PATCH 005/285] first pass at promoting ml & cloud --- .../windows-defender-antivirus-in-windows-10.md | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md index 0d10260da8..426cd3b382 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md +++ b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md @@ -22,14 +22,16 @@ manager: dansimp - [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) -Besides traditional security measures, we also provide next-gen protection to keep your servers and personal devices safe. +Alongside traditional security measures, we also provide next-gen protection. Next-gen protection uses machine learning and the cloud to keep your servers and personal devices safe. -Next-gen protection includes: +Next-gen security services include: -- [Cloud-based delivery](utilize-microsoft-cloud-protection-windows-defender-antivirus.md) for near-instant detection and blocking of new and emerging threats. - [Always-on scanning](configure-real-time-protection-windows-defender-antivirus.md), also known as "real-time protection", for advanced file and process behavior monitoring, and other heuristics +- [Cloud-based delivery](utilize-microsoft-cloud-protection-windows-defender-antivirus.md) for near-instant detection and blocking of new and emerging threats - [Dedicated protection updates](manage-updates-baselines-windows-defender-antivirus.md) powered by machine-learning, human and automated big-data analysis, and in-depth threat resistance research +We've also pumped up our endpoint security for Windows 10. + >[!TIP] >You can visit the Windows Defender Testground website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm the following features are working and see how they work: > @@ -60,7 +62,7 @@ Configuration and management is largely the same in Windows Server 2016, while r ## Related topics -- [What's new in Microsoft Defender Advanced Threat Protection](./) +- [What's new in Microsoft Defender Advanced Threat Protection](../microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md) - [Windows Defender Antivirus in the Windows Security app](windows-defender-security-center-antivirus.md) - [Windows Defender Antivirus on Windows Server 2016](windows-defender-antivirus-on-windows-server-2016.md) - [Windows Defender Antivirus compatibility](windows-defender-antivirus-compatibility.md) From 7ef1a19a21c82de2ef72312cd849fad98e4a9c7e Mon Sep 17 00:00:00 2001 From: martyav Date: Wed, 5 Jun 2019 17:34:49 -0400 Subject: [PATCH 006/285] pruning links, second pass --- ...indows-defender-antivirus-in-windows-10.md | 22 ++++++++----------- 1 file changed, 9 insertions(+), 13 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md index 426cd3b382..6dc0d05af3 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md +++ b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md @@ -22,13 +22,13 @@ manager: dansimp - [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) -Alongside traditional security measures, we also provide next-gen protection. Next-gen protection uses machine learning and the cloud to keep your servers and personal devices safe. +We provide next-gen protection alongside more traditional security measures. Our next-gen protection uses machine learning and the cloud to keep your servers and personal devices safe. -Next-gen security services include: +Next-gen protection services include: -- [Always-on scanning](configure-real-time-protection-windows-defender-antivirus.md), also known as "real-time protection", for advanced file and process behavior monitoring, and other heuristics +- [Always-on scanning](configure-real-time-protection-windows-defender-antivirus.md), also known as "real-time protection", for advanced file and process behavior monitoring - [Cloud-based delivery](utilize-microsoft-cloud-protection-windows-defender-antivirus.md) for near-instant detection and blocking of new and emerging threats -- [Dedicated protection updates](manage-updates-baselines-windows-defender-antivirus.md) powered by machine-learning, human and automated big-data analysis, and in-depth threat resistance research +- [Dedicated protection updates](manage-updates-baselines-windows-defender-antivirus.md) powered by machine-learning, big-data analysis, and in-depth threat resistance research We've also pumped up our endpoint security for Windows 10. @@ -60,15 +60,11 @@ You can use the following to configure and manage next-gen services in Windows 1 Configuration and management is largely the same in Windows Server 2016, while running Windows Defender Antivirus; however, [there are some differences](windows-defender-antivirus-on-windows-server-2016.md). +## What's new + +TKTK + ## Related topics -- [What's new in Microsoft Defender Advanced Threat Protection](../microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md) -- [Windows Defender Antivirus in the Windows Security app](windows-defender-security-center-antivirus.md) -- [Windows Defender Antivirus on Windows Server 2016](windows-defender-antivirus-on-windows-server-2016.md) -- [Windows Defender Antivirus compatibility](windows-defender-antivirus-compatibility.md) -- [Evaluate Windows Defender Antivirus protection](evaluate-windows-defender-antivirus.md) -- [Deploy, manage updates, and report on Windows Defender Antivirus](deploy-manage-report-windows-defender-antivirus.md) -- [Configure Windows Defender Antivirus features](configure-windows-defender-antivirus-features.md) -- [Customize, initiate, and review the results of scans and remediation](customize-run-review-remediate-scans-windows-defender-antivirus.md) -- [Review event logs and error codes to troubleshoot issues](troubleshoot-windows-defender-antivirus.md) +- [Version history for Microsoft Defender Advanced Threat Protection](../microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md) - [Reference topics for management and configuration tools](configuration-management-reference-windows-defender-antivirus.md) From 3f803c6beb646aa16483211fc70fc90eb04eb215 Mon Sep 17 00:00:00 2001 From: martyav Date: Thu, 6 Jun 2019 15:55:39 -0400 Subject: [PATCH 007/285] updated links, removed what's new for now --- .../windows-defender-antivirus-in-windows-10.md | 16 +++++++++------- 1 file changed, 9 insertions(+), 7 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md index 6dc0d05af3..92c53f62b5 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md +++ b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md @@ -30,7 +30,7 @@ Next-gen protection services include: - [Cloud-based delivery](utilize-microsoft-cloud-protection-windows-defender-antivirus.md) for near-instant detection and blocking of new and emerging threats - [Dedicated protection updates](manage-updates-baselines-windows-defender-antivirus.md) powered by machine-learning, big-data analysis, and in-depth threat resistance research -We've also pumped up our endpoint security for Windows 10. +We've also enhanced our endpoint security for Windows 10. Our cloud service uses distributed resources and machine learning to rapidly protect you with the latest updates. >[!TIP] >You can visit the Windows Defender Testground website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm the following features are working and see how they work: @@ -60,11 +60,13 @@ You can use the following to configure and manage next-gen services in Windows 1 Configuration and management is largely the same in Windows Server 2016, while running Windows Defender Antivirus; however, [there are some differences](windows-defender-antivirus-on-windows-server-2016.md). -## What's new - -TKTK - ## Related topics -- [Version history for Microsoft Defender Advanced Threat Protection](../microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md) -- [Reference topics for management and configuration tools](configuration-management-reference-windows-defender-antivirus.md) +- [Full version history for Microsoft Defender Advanced Threat Protection](../microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md) +- [Windows Defender Antivirus management and configuration](configuration-management-reference-windows-defender-antivirus.md) +- [Enable cloud protection](enable-cloud-protection-windows-defender-antivirus.md) +- [Configure real-time protection](configure-real-time-protection-windows-defender-antivirus.md) +- [Create and deploy cloud-protected antimalware policies](https://docs.microsoft.com/sccm/protect/deploy-use/endpoint-antimalware-policies#cloud-protection-service) +- [Allow connections to Windows Defender Antivirus cloud service](configure-network-connections-windows-defender-antivirus) +- [Configure cloud block at first sight](configure-block-at-first-sight-windows-defender-antivirus.md) +- [Modify the cloud block timeout period](configure-cloud-block-timeout-period-windows-defender-antivirus.md) From ed3717f9e2e2c1038a7ddbc514387792a94c07c0 Mon Sep 17 00:00:00 2001 From: martyav Date: Thu, 6 Jun 2019 16:03:10 -0400 Subject: [PATCH 008/285] editing links --- .../windows-defender-antivirus-in-windows-10.md | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md index 92c53f62b5..0dedf3ecc8 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md +++ b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md @@ -64,9 +64,8 @@ Configuration and management is largely the same in Windows Server 2016, while r - [Full version history for Microsoft Defender Advanced Threat Protection](../microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md) - [Windows Defender Antivirus management and configuration](configuration-management-reference-windows-defender-antivirus.md) +- [Evaluate Windows Defender Antivirus protection](evaluate-windows-defender-antivirus.md) - [Enable cloud protection](enable-cloud-protection-windows-defender-antivirus.md) - [Configure real-time protection](configure-real-time-protection-windows-defender-antivirus.md) -- [Create and deploy cloud-protected antimalware policies](https://docs.microsoft.com/sccm/protect/deploy-use/endpoint-antimalware-policies#cloud-protection-service) -- [Allow connections to Windows Defender Antivirus cloud service](configure-network-connections-windows-defender-antivirus) - [Configure cloud block at first sight](configure-block-at-first-sight-windows-defender-antivirus.md) -- [Modify the cloud block timeout period](configure-cloud-block-timeout-period-windows-defender-antivirus.md) +- [Create and deploy cloud-protected antimalware policies](https://docs.microsoft.com/sccm/protect/deploy-use/endpoint-antimalware-policies#cloud-protection-service) From 560941a30275fa70db79606a63fa4319b0b58010 Mon Sep 17 00:00:00 2001 From: martyav Date: Thu, 6 Jun 2019 16:24:58 -0400 Subject: [PATCH 009/285] fixed link --- .../windows-defender-antivirus-in-windows-10.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md index 0dedf3ecc8..8c32691f6e 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md +++ b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md @@ -68,4 +68,4 @@ Configuration and management is largely the same in Windows Server 2016, while r - [Enable cloud protection](enable-cloud-protection-windows-defender-antivirus.md) - [Configure real-time protection](configure-real-time-protection-windows-defender-antivirus.md) - [Configure cloud block at first sight](configure-block-at-first-sight-windows-defender-antivirus.md) -- [Create and deploy cloud-protected antimalware policies](https://docs.microsoft.com/sccm/protect/deploy-use/endpoint-antimalware-policies#cloud-protection-service) +- [Create and deploy cloud-protected antimalware policies](https://docs.microsoft.com/sccm/protect/deploy-use/endpoint-antimalware-policies#cloud-protection-service.md) From 57d2ecb11102b3a3a01f057513047084d88259f9 Mon Sep 17 00:00:00 2001 From: martyav Date: Tue, 11 Jun 2019 11:55:46 -0400 Subject: [PATCH 010/285] some rewording --- .../windows-defender-antivirus-in-windows-10.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md index 8c32691f6e..898ee10ff1 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md +++ b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md @@ -11,7 +11,7 @@ ms.pagetype: security ms.localizationpriority: medium author: dansimp ms.author: dansimp -ms.date: 09/03/2018 +ms.date: 06/11/2019 ms.reviewer: manager: dansimp --- @@ -22,7 +22,7 @@ manager: dansimp - [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) -We provide next-gen protection alongside more traditional security measures. Our next-gen protection uses machine learning and the cloud to keep your servers and personal devices safe. +Next-gen protection provides enhanced safety, alongside more traditional security measures. Next-gen services use machine learning and the cloud to keep all devices on your enterprise network safe. Next-gen protection services include: @@ -30,7 +30,7 @@ Next-gen protection services include: - [Cloud-based delivery](utilize-microsoft-cloud-protection-windows-defender-antivirus.md) for near-instant detection and blocking of new and emerging threats - [Dedicated protection updates](manage-updates-baselines-windows-defender-antivirus.md) powered by machine-learning, big-data analysis, and in-depth threat resistance research -We've also enhanced our endpoint security for Windows 10. Our cloud service uses distributed resources and machine learning to rapidly protect you with the latest updates. +We've also increased our endpoint security for Windows 10. Our cloud service uses distributed resources and machine learning to rapidly protect you with the latest updates. >[!TIP] >You can visit the Windows Defender Testground website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm the following features are working and see how they work: @@ -58,7 +58,7 @@ You can use the following to configure and manage next-gen services in Windows 1 - Windows Management Instrumentation (WMI) - Group Policy -Configuration and management is largely the same in Windows Server 2016, while running Windows Defender Antivirus; however, [there are some differences](windows-defender-antivirus-on-windows-server-2016.md). +Configuration and management is largely the same in Windows Server 2016, while running Windows Defender Antivirus; however, [there are some differences](windows-defender-antivirus-on-windows-server-2016.md). ## Related topics From e47e82dbcae9a0624b0cacb467a48a12a9a23aff Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Fri, 26 Jul 2019 18:56:53 -0700 Subject: [PATCH 011/285] partner and api --- windows/security/threat-protection/TOC.md | 8 +++++- .../microsoft-defender-atp/api-explorer.md | 22 +++++++++++++++ .../connected-applications.md | 28 +++++++++++++++++++ 3 files changed, 57 insertions(+), 1 deletion(-) create mode 100644 windows/security/threat-protection/microsoft-defender-atp/api-explorer.md create mode 100644 windows/security/threat-protection/microsoft-defender-atp/connected-applications.md diff --git a/windows/security/threat-protection/TOC.md b/windows/security/threat-protection/TOC.md index c3243e4a9c..2882b9ae0f 100644 --- a/windows/security/threat-protection/TOC.md +++ b/windows/security/threat-protection/TOC.md @@ -438,8 +438,14 @@ ##### [Threat protection reports](microsoft-defender-atp/threat-protection-reports.md) ##### [Machine health and compliance reports](microsoft-defender-atp/machine-reports.md) -#### [Interoperability]() +#### [Partners & APIs]() ##### [Partner applications](microsoft-defender-atp/partner-applications.md) +##### [Connected applications](microsoft-defender-atp/connected-applications.md) +##### [API explorer](microsoft-defender-atp/api-explorer.md) +##### [API usage overview](microsoft-defender-atp/) + + + #### [Manage machine configuration]() ##### [Ensure your machines are configured properly](microsoft-defender-atp/configure-machines.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md b/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md new file mode 100644 index 0000000000..674e2659d6 --- /dev/null +++ b/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md @@ -0,0 +1,22 @@ +--- +title: API explorer in Microsoft Defender ATP +ms.reviewer: +description: +keywords: +search.product: eADQiWindows 10XVcnh +search.appverid: met150 +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +ms.author: mjcaparas +author: mjcaparas +ms.localizationpriority: medium +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual +--- + +# API explorer +With the API explorer you can quickly get started with trying out \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/connected-applications.md b/windows/security/threat-protection/microsoft-defender-atp/connected-applications.md new file mode 100644 index 0000000000..036bdfafa7 --- /dev/null +++ b/windows/security/threat-protection/microsoft-defender-atp/connected-applications.md @@ -0,0 +1,28 @@ +--- +title: Connected applications in Microsoft Defender ATP +ms.reviewer: +description: View connected partner applications to Microsoft Defender ATP +keywords: partners, applications, third-party, connections, sentinelone, lookout, bitdefender, corrata, morphisec, paloalto, ziften, better mobile +search.product: eADQiWindows 10XVcnh +search.appverid: met150 +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +ms.author: mjcaparas +author: mjcaparas +ms.localizationpriority: medium +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual +--- + +# Connected applications in Microsoft Defender ATP +View the list of applications that are connected to your instance of Microsoft Defender ATP. + +From this page you'll be able to see details about connected applications such as last seen activity, the number of requests from the application, and 30-day request trends. + +It also allows you to jump to the application settings page where.... + + From 814549eeac9ea2e9139b65abed210a66714d046f Mon Sep 17 00:00:00 2001 From: Bryan Dam Date: Mon, 29 Jul 2019 09:21:51 -0400 Subject: [PATCH 012/285] Update waas-servicing-differences.md Added two clarifications regarding Windows 10 preview updates. I have consistently fielded questions about why they are 'missing' in people's enterprise environments. It almost always boils down to one of these two notes: they either weren't published to WSUS or they are looking for the word 'Preview' in the title. --- windows/deployment/update/waas-servicing-differences.md | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/windows/deployment/update/waas-servicing-differences.md b/windows/deployment/update/waas-servicing-differences.md index 9e0f207f1f..59a90ea16e 100644 --- a/windows/deployment/update/waas-servicing-differences.md +++ b/windows/deployment/update/waas-servicing-differences.md @@ -85,6 +85,12 @@ Moving to the cumulative model for legacy OS versions continues to improve predi ## Public preview releases Lastly, the cumulative update model directly impacts the public Preview releases offered in the 3rd and/or 4th weeks of the month. Update Tuesday, also referred to as the "B" week release occurs on the second Tuesday of the month. It is always a required security update across all operating systems. In addition to this monthly release, Windows also releases non-security update "previews" targeting the 3rd (C) and the 4th (D) weeks of the month. These preview releases include that month’s B-release plus a set of non-security updates for testing and validation as a cumulative package. We recommend IT Administrators uses the C/D previews to test the update in their environments. Any issues identified with the updates in the C/D releases are identified and then fixed or removed, prior to being rolled up in to the next month’s B release package together with new security updates. Security-only Packages are not part of the C/D preview program. +>[!NOTE] +>Only the preview updates for most recent release of Windows 10 are published to Windows Server Update Services (WSUS). For customers using the WSUS channel and products such as System Center Configuration Manager that rely on it will not see preview updates for older version of Windows 10. + +>[!NOTE] +>Preview updates for Windows 10 are not named differently than their LCU counterparts and do not contain the word 'Preview'. They can be identified by their release date (C or D week) and their classification as non-security updates. + ### Examples Windows 10 version 1709: - (9B) September 11, 2018 Update Tuesday / B release - includes security, non-security and IE update. This update is categorized as "Required, Security" it requires a system reboot. From 7edf0037d741a4de89ced2883d972b6fa097dc47 Mon Sep 17 00:00:00 2001 From: Bryan Dam Date: Tue, 30 Jul 2019 11:23:18 -0400 Subject: [PATCH 013/285] Update windows/deployment/update/waas-servicing-differences.md Looks great, thanks Johan! Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- windows/deployment/update/waas-servicing-differences.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/update/waas-servicing-differences.md b/windows/deployment/update/waas-servicing-differences.md index 59a90ea16e..0efe0f9245 100644 --- a/windows/deployment/update/waas-servicing-differences.md +++ b/windows/deployment/update/waas-servicing-differences.md @@ -86,7 +86,7 @@ Moving to the cumulative model for legacy OS versions continues to improve predi Lastly, the cumulative update model directly impacts the public Preview releases offered in the 3rd and/or 4th weeks of the month. Update Tuesday, also referred to as the "B" week release occurs on the second Tuesday of the month. It is always a required security update across all operating systems. In addition to this monthly release, Windows also releases non-security update "previews" targeting the 3rd (C) and the 4th (D) weeks of the month. These preview releases include that month’s B-release plus a set of non-security updates for testing and validation as a cumulative package. We recommend IT Administrators uses the C/D previews to test the update in their environments. Any issues identified with the updates in the C/D releases are identified and then fixed or removed, prior to being rolled up in to the next month’s B release package together with new security updates. Security-only Packages are not part of the C/D preview program. >[!NOTE] ->Only the preview updates for most recent release of Windows 10 are published to Windows Server Update Services (WSUS). For customers using the WSUS channel and products such as System Center Configuration Manager that rely on it will not see preview updates for older version of Windows 10. +>Only preview updates for the most recent release of Windows 10 are published to Windows Server Update Services (WSUS). For customers using the WSUS channel and products such as System Center Configuration Manager that rely on it will not see preview updates for older versions of Windows 10. >[!NOTE] >Preview updates for Windows 10 are not named differently than their LCU counterparts and do not contain the word 'Preview'. They can be identified by their release date (C or D week) and their classification as non-security updates. From 60061076ec3e43b224e728a08a0fe762459bd675 Mon Sep 17 00:00:00 2001 From: Bryan Dam Date: Tue, 30 Jul 2019 21:32:25 -0400 Subject: [PATCH 014/285] Update waas-servicing-differences.md Implement the MarkDown standard of using 1 space between the indent marker > and the [!Note] markers --- .../deployment/update/waas-servicing-differences.md | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/windows/deployment/update/waas-servicing-differences.md b/windows/deployment/update/waas-servicing-differences.md index 0efe0f9245..9c6665e349 100644 --- a/windows/deployment/update/waas-servicing-differences.md +++ b/windows/deployment/update/waas-servicing-differences.md @@ -23,8 +23,8 @@ Today, many enterprise customers have a mix of modern and legacy client and serv The following provides an initial overview of how updating client and server differs between the Windows 10-era Operating Systems (such as, Windows 10 version 1709, Windows Server 2016) and legacy operating systems (such as Windows 7, Windows 8.1, Windows Server 2008 R2, Windows Server 2012 R2). ->[!NOTE] ->A note on naming convention in this article: For brevity, "Windows 10" refers to all operating systems across client, server and IoT released since July 2015, while "legacy" refers to all operating systems prior to that period for client and server, including Windows 7, Window 8.1, Windows Server 2008 R2, Windows Server 2012 R2, etc. +> [!NOTE] +> A note on naming convention in this article: For brevity, "Windows 10" refers to all operating systems across client, server and IoT released since July 2015, while "legacy" refers to all operating systems prior to that period for client and server, including Windows 7, Window 8.1, Windows Server 2008 R2, Windows Server 2012 R2, etc. ## Infinite fragmentation Prior to Windows 10, all updates to operating system (OS) components were published individually. On "Update Tuesday," customers would pick and choose individual updates they wanted to apply. Most chose to update security fixes, while far fewer selected non-security fixes, updated drivers, or installed .NET Framework updates. @@ -85,11 +85,11 @@ Moving to the cumulative model for legacy OS versions continues to improve predi ## Public preview releases Lastly, the cumulative update model directly impacts the public Preview releases offered in the 3rd and/or 4th weeks of the month. Update Tuesday, also referred to as the "B" week release occurs on the second Tuesday of the month. It is always a required security update across all operating systems. In addition to this monthly release, Windows also releases non-security update "previews" targeting the 3rd (C) and the 4th (D) weeks of the month. These preview releases include that month’s B-release plus a set of non-security updates for testing and validation as a cumulative package. We recommend IT Administrators uses the C/D previews to test the update in their environments. Any issues identified with the updates in the C/D releases are identified and then fixed or removed, prior to being rolled up in to the next month’s B release package together with new security updates. Security-only Packages are not part of the C/D preview program. ->[!NOTE] ->Only preview updates for the most recent release of Windows 10 are published to Windows Server Update Services (WSUS). For customers using the WSUS channel and products such as System Center Configuration Manager that rely on it will not see preview updates for older versions of Windows 10. +> [!NOTE] +> Only preview updates for the most recent release of Windows 10 are published to Windows Server Update Services (WSUS). For customers using the WSUS channel and products such as System Center Configuration Manager that rely on it will not see preview updates for older versions of Windows 10. ->[!NOTE] ->Preview updates for Windows 10 are not named differently than their LCU counterparts and do not contain the word 'Preview'. They can be identified by their release date (C or D week) and their classification as non-security updates. +> [!NOTE] +> Preview updates for Windows 10 are not named differently than their LCU counterparts and do not contain the word 'Preview'. They can be identified by their release date (C or D week) and their classification as non-security updates. ### Examples Windows 10 version 1709: From 22b13d36b5c31132f3491b43a7183aec512bc27e Mon Sep 17 00:00:00 2001 From: Bryan Dam Date: Mon, 5 Aug 2019 12:39:08 -0400 Subject: [PATCH 015/285] Update windows/deployment/update/waas-servicing-differences.md Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com> --- windows/deployment/update/waas-servicing-differences.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/update/waas-servicing-differences.md b/windows/deployment/update/waas-servicing-differences.md index 9c6665e349..aea9cae248 100644 --- a/windows/deployment/update/waas-servicing-differences.md +++ b/windows/deployment/update/waas-servicing-differences.md @@ -89,7 +89,7 @@ Lastly, the cumulative update model directly impacts the public Preview releases > Only preview updates for the most recent release of Windows 10 are published to Windows Server Update Services (WSUS). For customers using the WSUS channel and products such as System Center Configuration Manager that rely on it will not see preview updates for older versions of Windows 10. > [!NOTE] -> Preview updates for Windows 10 are not named differently than their LCU counterparts and do not contain the word 'Preview'. They can be identified by their release date (C or D week) and their classification as non-security updates. +> Preview updates for Windows 10 are not named differently than their LCU counterparts and do not contain the word 'Preview'. They can be identified by their release date (C or D week) and their classification as non-security updates. ### Examples Windows 10 version 1709: From 14d2cc316a46da124b636f7ad1eeaf6ad19671db Mon Sep 17 00:00:00 2001 From: Bryan Dam Date: Mon, 5 Aug 2019 12:39:36 -0400 Subject: [PATCH 016/285] Update windows/deployment/update/waas-servicing-differences.md Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com> --- windows/deployment/update/waas-servicing-differences.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/update/waas-servicing-differences.md b/windows/deployment/update/waas-servicing-differences.md index aea9cae248..b27d02f262 100644 --- a/windows/deployment/update/waas-servicing-differences.md +++ b/windows/deployment/update/waas-servicing-differences.md @@ -86,7 +86,7 @@ Moving to the cumulative model for legacy OS versions continues to improve predi Lastly, the cumulative update model directly impacts the public Preview releases offered in the 3rd and/or 4th weeks of the month. Update Tuesday, also referred to as the "B" week release occurs on the second Tuesday of the month. It is always a required security update across all operating systems. In addition to this monthly release, Windows also releases non-security update "previews" targeting the 3rd (C) and the 4th (D) weeks of the month. These preview releases include that month’s B-release plus a set of non-security updates for testing and validation as a cumulative package. We recommend IT Administrators uses the C/D previews to test the update in their environments. Any issues identified with the updates in the C/D releases are identified and then fixed or removed, prior to being rolled up in to the next month’s B release package together with new security updates. Security-only Packages are not part of the C/D preview program. > [!NOTE] -> Only preview updates for the most recent release of Windows 10 are published to Windows Server Update Services (WSUS). For customers using the WSUS channel and products such as System Center Configuration Manager that rely on it will not see preview updates for older versions of Windows 10. +> Only preview updates for the most recent release of Windows 10 are published to Windows Server Update Services (WSUS). For customers using the WSUS channel, and products such as System Center Configuration Manager that rely on it, will not see preview updates for older versions of Windows 10. > [!NOTE] > Preview updates for Windows 10 are not named differently than their LCU counterparts and do not contain the word 'Preview'. They can be identified by their release date (C or D week) and their classification as non-security updates. From c019ac76b3d9d57c4ce3e2fc9abebb2e3ec6fb59 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Tue, 6 Aug 2019 16:27:56 -0700 Subject: [PATCH 017/285] add connected applications --- .../connected-applications.md | 19 +++++++++++++++--- .../images/connected-apps.png | Bin 0 -> 38131 bytes 2 files changed, 16 insertions(+), 3 deletions(-) create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/connected-apps.png diff --git a/windows/security/threat-protection/microsoft-defender-atp/connected-applications.md b/windows/security/threat-protection/microsoft-defender-atp/connected-applications.md index 036bdfafa7..a1d8a2c5b6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/connected-applications.md +++ b/windows/security/threat-protection/microsoft-defender-atp/connected-applications.md @@ -19,10 +19,23 @@ ms.topic: conceptual --- # Connected applications in Microsoft Defender ATP -View the list of applications that are connected to your instance of Microsoft Defender ATP. -From this page you'll be able to see details about connected applications such as last seen activity, the number of requests from the application, and 30-day request trends. +Connected applications integrates with the Microsoft Defender ATP platform using APIs. -It also allows you to jump to the application settings page where.... +Applications use standard OAuth 2.0 protocol to authenticate and provide tokens for use with Microsoft Defender ATP APIs. In addition, Azure Active Directory (Azure AD) applications allow tenant admins to set explicit control over which APIs can be accessed using the corresponding app. + +You'll need to follow [these steps](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/apis-intro) to use the APIs with the connected application. + +## Access the connected application page +From the left navigation menu, select **Partners & APIs** > **Connected AAD applications**. + + +## View connected application details +The Connected applications page provides information about the Azure AD appplications connected to Microsoft Defender ATP in your organization. You can review the usage of the connected applications: last seen, number of requests in the past 24 hours, and request trends in the last 30 days. + +![Image of connected apps](images/connected-apps.png) + +## Edit, reconfigure, or delete a connected application +The **Open application settings** link opens the corresponding Azure AD application management page in the Azure portal. From the Azure portal, you can manage permissions, reconfigure, or delete the connected applications. diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/connected-apps.png b/windows/security/threat-protection/microsoft-defender-atp/images/connected-apps.png new file mode 100644 index 0000000000000000000000000000000000000000..d590547bb57de20082efb5caa9c2916aba4960de GIT binary patch literal 38131 zcmeFX1yfwx7A*{cKnNCsdlCo)ch>|0!4urAp|M6AXc{L33m&x5Bv^2FcWY?e-Q613 zk8{sC_ucO&ysEdVx_9ld=iaqy$((DBIYK@w%i=z#c#eXCf-Cn)S``HaqXPv6_1QCw zM`TMmTJ7?}}PC^v#0G0eZ;cX0xkqnthX@BV8hWp8V1Zs&}04v%ks#4!FcQ@3&k znWOwU7-2*~d4(b;{a)QIWp5s;tucPzeJrqos*dsW{Zl?%M#V2+nive6(IWT$I&1T+ zc@XEWh5w8j3uVQ~ji=($^#2V08lbcPGY%+Sgx?yyCH$n^hdo*x4xnCW zjA2^BYN~WxIb__soRNp`bcm{t@%7WgP0x$wSfYO6G~K^?nWGh1%6Imho};q}B=pB- zdJkVnzIqcMAi(k?$93G+dO4k@>tJ84W6YNOjcR^a%H{pjE)p-K=xMVUy+LUKJ?F*v zC;i264Y4;aMayx6zJE`7Pn?C>W*cT=WiIx^J;KS(L8Nc9SOU?!=wNnM-tJglV`A$#*8j}!W>WN}`0y^|79odtfSnqVb&HLZaf5#3rU&5m^sIMz)t@m}#*`a1+pijaRIe{0SB3qmx z{W}&X_Dpe0)haxErF*IgT^I}(&a1u2dP7|f=1!X6jllstmCZm!@|mxjLA779$+}WZ zKRF2FSPxVU$1j$s2H|;k5F!pUk;s17VQqlc{UO0dHP-4`G+!<4MpH=3a4G8k9Ij%0 zSE>&#xI5od2*LU)10(mIoa%B1;=b2!;gDrMQ)S<&A! zNjy zZ&ap29VNGk?G%#^x-x~8?@xGsoZry6N>ds8C_3?-U;Om4_i@MDQXmzu(LLC6s1P{m zN+V*ZD%#ubTS^w2rccrV>-4n}N6ToNu?wZKdqTCQg@3!d1c~9}f>&t=*GcN*jE+d- ziTj%jZUl)O6M0}&hYLNM6z;CON)HRRmSzKZMarJSnOtnXnH{Wc%0T3D1ig4z?{Z7K z?e?jbT?4y#^$*Ch%`eA2`5>k0+i*0a=p0xBS16_Zc26eD(TX@>(>HSw!alaSez|6> z2L5cyCTD=^XU^gR@6<_emJ1Mse4xPbzUr;^t&+NS7k=gjp|@}XIVFM{V8P9DKb;oh zoz?czjtwS~^A?=%XjhrdaM6?4vLp30%+lOgYVGM8+4|wivi;r5WG*`kjD9^bvgp|M zzSLTD9PpoIf?d+59e=y7HG9_3wHl(b^1JtS$-BH){OLRWTK0G`x;0q@jCIcn-j_4EV6!`|{|&4E%Dz^z z2SSx9`h2pT({{B}&r@*<`lPGR?N*TuBfNCB)Tg3yaIgtiIC<@Ar^0v)B2g}E;LJ>8 zm=^TaSp_MU%n1ymqnrqqU+~6E7@Cdr5!Q$;_k4H-QFUQuR&cgon|0frKu+0Pw`{U~$ z;VI0-N7v>DRHA9_DI)c$7W=aK!6(TrVCuXWUqVzgict<`|D!3z>>IwK!j#b4+RXc& zoKO{~)!oGtC*!zZzVh@0=X16VN4=3@P=MLn_E?hVJ0s76=E)mw)i8GL`6u;qeN%5Z zoJyYg_{|y4{PFe6F-B=GQ?LFLJpAwHI!~Y z>kB;uevS^X&o$Epa3J(i8uHSkB`BqMgastfLZ0e3j6kpIk*V-mmf54uN}grdi?rrn zdpo~)K9C8c1>b*@dw9N@U9B~IjWiV1upze$hNQcKN<<G1#BF@en{fIQ4K6lbHNjK2wrj)}f`*fwK63frpbI$k}w%vPPV~ z-ZH~k7%q(SncL{&v9~we+Bqr52fkE}WN^a4eYUqTcv8y744*X-b%}>A=9Dfe(u7=n zL~7$$_r^%+%TqY9uIG#hv4O-UZQP3FSUK!^mtxAFX3owI_tz8Hht+*gp5gys@A3wgq2aTZdTpaH*v&O-o4^#cDPU3oe@G_Z}Fcp zPtv`4`@4k7Xr{^&hSrkUyO2J}oiiqO>TK7O+BgqA-q`4Dw;>)BP&5h7 z?b4CQP3@CZimev1Gyh}Jp2fv6>{#?(l^eTZKG^3EAKUkY^!4RUwaeVw^YK_RpC`fw z8X3l9zO9GM!j4}rzvWf)`JjkU`SJqZ_j2bScrX~T3J<2{Dg`HwNBr>HfBx*@6jBt) zeRKt&uFWv-J)xC|c*EJWcb?F<%xHnVYm=@S(cqYhPgn>Q(70yrSyE&k>MA{Xy~YgQ z)@htf&Oc8vF;%AtImp`i3=ozm3fbKLM0W#L6cpw+Gt<%{iLliGDp#%4T?_-MSSlM8 z0BA8c@m}%lxyp?xb94z0*aJ&3>V!Np9+IDWQ@*JAlPdhXLa z3DqGyQQkLZ98HDJ*b;Vm85OvVVo=*|IR@(59`AQMeA-TT@*4~l&Pv70sqX{yv^DHd zk!L4ayD54=Lk{r8AJrVhu^|qeYBRtO1Lx54m7^X7rCQ^&vMl$)qXBK|j}qv|uCIGY zacone#s;SA?bsGMC+!fdh8MPGkZdftH=X*O7y8oaP- z@*k?_di}-Z>G%2Oz4bpah+Yu>=j0IW&bVv&F8%(HWujA<%Mw1XcyHmOOMwz5?S0LC znDTsWppwHu%8{}Ob<%Z`dt(~0HN8)MaHm4?V0imHV@6W~-_ggcoLa;Xw5?lX+$~px zH((-ZVIjV6|I^WqT>%2*JnL7R5`nBNI2E!FH+ORP=QAazAz5+EQk6~Hd%A8(qT5Ed z--3sDt#n)`lFDTxdEQm|Zlfg~a|Au{mPqLW+{Dxj8!xp?{lFktjaCc0llG^ zvzM34U*hNH{g_hwo?dfvoTxjnV;LCe3}>Oj3f|$j zep|5foNPcf10q|!>15g4IQ2Nxa8s}BNbuQ()UD+Jfnvw6dC>9*V;zCc_Kc!Z>`ByV z%ua}pANHwrB!*zjy50(<*;GW_T?}0J`T$KaFyDUYtRc2w*}*%nD)L{og!Y)c*@bBI zsY;tyXjc05g4v2!yayu6h~hE_%gJx}vVud2qUSUXJrfPs*#4Y zW@H{;Ns_Q2{iZ7hKw zFE9iEdEm_8<(-lNO@;n~Ok4ENK>WDwp3F`%Iy?xWDIA;^IZB<^g^-zLhd+jwyFyYOG%S;|_d9gLjp7lRq~|L&`Cw#t3x)O4bKDFeIRH4Hf4F zs|DET_FOyZwM0i{Tpn_+e9ki*Y>4XpI;P(O^N`VWip+aaE)nxtmN9KtCoxT>S_a)# zZnfQr8|!&RQ;t@Eeb){rLy7Q+^iUKqV0~dIMNjzcv9&aFeRrJ}RT-~PS~n?U`Kx-= zj9Y`Lp}f~o-3$IgDa`lOA$*6O3X_77MX4!Qp2o|N#WDj@tXs}N1npiAbs=_j{z-C2 zVv9m3A#`BSPaudtBUH*n7rYAYMfvwUAl=6!A^5WX(sCitZ7Q7)jJF23>=p_5(VGh_)8cwO^PFiSb zY`l;v4re{mG4#^a=o*9rL*wmOJDb?P4+Rh=Qt zF&?dm=nOybLrdxL5=mq1=MBy*+q-dYn@E)3* z#(<yvvZT!&5LGQ-+Oyg%@}OXq}FgPg7o6j%vp|+AV}xcFJ&ktU1U;1bN0Ra`5MmO(q9R)an4LP9NFl_J_wS zaZR{K$MymE$KQ&YwM`-@XjyjfkSFr)ibOV+*%k&&{BhgAyN;=a_QEk2f3qIm(}h;> z7e)x~ z)gacF$-F>KNfWd>rHjT4LjUT_a(0Forlya$M>p&zi=voaZkuJo`~g`NtgMJ2?km>r z2%k!hJW;h(s1R%Np7O!1w|)K!H>Kc`sO_Ridxg>9k@4Y#ImIs)FH-vWQ%UreX}_gX z+nRdMr5+#@WWOUfhihk^)}KiGGSPi7t@FZltyR?u2O0LOzmE57=x&?BRecX5bwfy9 z{n`~CRZ{pvP&Zj4U5NcPKg*ty*1Y>wSco32ooxCF_J$(j*I)@9;W>;M-VJ&4CZ_TV zS4Z^Pnn9mgM#@ChRmmMoBb$ImT+5q3w`$-y8i!`CgHmbk9K}WIS{JoU1M^rvXZDs4 zOTBEIf{B3{O3_Uz28Y+h4%W_|?gc6aMQ8J@L(1PMY=Hnh*k1JuHbHw7Oz;boGdzE`y*0u+e zXdRoM$iZn_p8XFm@&;FegXYeJZ7KN^XAd@ULcYTAe^|JCY1OOan9h`EN&R^bjcofEm7cmRQ2PCT&6Fc^$i z;kZ6|BY!9CB{|ED`UXV`pYf~jJdojT8xjYuWO#qLd1zP_6x-@=qBZ?q88tV-8}6|s ziX>bvGA!)lJ@q4O7ZLuTyv$LZpGr%Ks03GMn}5|q3A8hWTcL&Ilnbi1@3SPxZ~fAD zYB10?EGo@m6}T6gsE5DMU;5UpV$#0QtH%FUmvw&NQ@2#3upa9swNm9-ag>E#%Hlt7#E zT=YsMUnH7HtC7?l*2Ik1jGC&#;;6LwG+4@dPRbT3lqOY?LFo5!zWw=OoS4d)twt4` zBFWJ!DDXwHlvyp6`Zc?Q%gX3)r!wGY0F8A#V%3Pc{cx41W7<2bucpx!>4Y#JcCkKe z`{slyaB&}AOHC+|CdURLl1-~Ex<&4H{8q|*ITx3Kb8Yu8P- zKR_Hihy2ZIj(rEyrww*8mMF=k$84l-9VE-IT{%0zU*V#iYuq+l+h34G#o2msB&{s> zqU>2Zx`5p;V;`F5o@PEoOZT+m;L&fE^5^=76?le*fAgBlpR@sfMgocBp}eIzf|je; znd^kO(m{8vC!EM`AAPUMvPm%ugux)a&*C)BwVB_} zyD0TTNNNH1a*Epn%nexpESaKsi*bhMg022-HB-b_?*W#lJV78}aVyFvl!ksDk` zHxHHFFD)3Kf7A-xI%R zVbd_v&QmMaaN5>#1)$EBhCXi5+jh+-HI=7JGZA=MgS`_s2ZIia=$CAvUNX-(=?Twe z#UZ$s5zQ9tsSvaBvlpkk@x2REqEyAMEO;9v3;CXD`p`s1HZuVRj3)(Nq=NDLeu5Zo zP(2)j34^7OaHXpincbi$mi*WAjeQ9@ZM)Jl&^chLK=bSsYu~Bl8Rt;1{(1j+>UdFt z7?q{{z&4R1^;T=yAGd>PXnb}v!-=H501frQN7)1kS=#u&Xdc}&AiqdLJU(w`79S!O zW@GJDtHj9Ai@u<&ueKW}gDR3y{>d5CQMewsXFJ@C1qn#E7+yBZzJZZ1jOW?QP^Kya zby&l&j^1h6yKzh+0~COIi!fjCu|p z`DLGMqU-5N(rP*?v_Cy9=5LTp=!UFj?ecPcnJ~bgPK&_5f+;{YQdNVSWxYM~5Oq5nP-%|*MIa0{+&eu*DgDIq&}7$61{jo5rK zpN-`;|MR1Vtmp;tVB|W4Kd4ghh0}m}9e=m?a*&a#9Dr|@4mh&2a^vYyKrEnC1_b_+ z7n~7(4A-}_A}h5Vp@o>Qer|u9$QC;Kla5vaf;Urfl%2aV^N3iK@sV_4)+J!Sqi|aX zl3ph@7T{VMv0Iw#*7tgSB4jA)2e!g^n|{`za#>p1dtYf#8(fxT1oXiR=kyx0Ehmhh z*99{6-(2X^6TP|>bY0%4>aiFe#F3fTzlN2xPk+br)odh97CatyiGO187Wqf>PHCm1 zs-d ziAJcaI!$*~RWD2Z0BE92ukuSV{iJN5f|=GSyJ==%fvB z_?3D2h9U9_RCjLsVd#K&VHPIcM=P}ER?nSPUHG2Rrtkf_D8;OlE<2`*zfXXn>C+V9 zbo_|$nrwsZb=>2F(ZE`-rK{B(sId<7g_lo~iAqH$DVliE3orf{!M=wbT27#&;8W3h zq46(=B|Evwu!G4`f;0jlkXWqzsKg1`=s@EU&FN!^d<`oI?d_0wi#a2ZH9}y&3)gIN zKUQmc8sR2tqQ>!RR%5k^)F1~D!N}9g6}oSmbmXFd!tu3^{@4^GyopD4^-@;6t}1g7 z;tE1pTiqJ|-ohfxq31#*Ue1W5;5N2o*?qFaB%@5;TCJb&K9j3o1?Uc?2|%sySLGnJ z@l}wur`dgmpQ^A{7>5PdrIr0`Wb}l6cBqPYe~#vZ>kt?xe_WKvfu24jhkc3*U>RzS zk8kN!%eSlUT?qM$UA3tDFbpxKp;R_IF=kZovwrlAN>qDGzp+#vG|_d{B=nAzR@PQK zJ3B;|8Iv3v~DHF@j^~BxoQ4f+&= zplo6a6VQB<(*XJG0FCJ=)GH|KJvWbFwCR)0=ZF4g|7rmO^)=j2=>Xh|A9d2U#M-_a z!*(mfYZn(fZufIo7DCtD79xAvOO@yX)pxtspk@g|S%DR_3*Tn_=tx-x*EQLwyO7E~ zPr4wSW(r`6Dw+A(Zkc@-c; zU*-7QJ{Mz`#31$An{&9IqCDp_6>h*LyU{Z48y}0|W zM%#+QrWvEiggF7P8JV=#U^&8D2YL7!z~CWeTH_c*z##!iqg20p6@9i|#U*ehw2~Op z$@6+M_nL@#fey+2OehwuNcmRe53!%r!0r6hH@R~LO)9zHK#AnsBu5oy`|MVONw;J~ z{}8|8wi!NY*_4}=A&-w%n)P!VNc!73Q=P}-?o|IImWq>`mx9LR)OY(IdktmnaU!)` z+4*!)Dsuty_;!3}{}Rd9-9tZUPyt&eKn-Mz5Uc3TGyI1eS`aO@ba~-xUKjNpOAh&ON6aNWsJ)+>@VxV_;_RgvO8@3?7RpK1ZKvDjb%>eZNaIR=M2t@wGhAvS~YAv#Lo&lwhtrybD?l-SVJjevH_kls4l~W&qpr3qo9^laJmo+zsmX< z(UFH4g+l3OoLwdFYtz)g$J2VSEcb87B~-@!GI{ zB7e9t6E!NL!pXW2kTAplZB9Razpf`Q3-->$#s<-U$*T5jzQkbdc|_1@IERgTjKaDy-T87QmM3=&126yo2gVU=#Bwi&*Oe}}Q#0p7NUH2ll5O<~QZa$k)>!mGvk z`TjwU;RcS;?D^g#m)Z zYqCTOW85zavXOm04 zD|szH-(q=-JP`wmw;AJqnm!k|-uXP|bl0vS6!Y=}a^ zq1@}``x+6Kp#GJnGuWDOP!3os8@cUCgz?^{y|CLzIoldBjULBr3kx6I@I7Ug^V!1T^AvPKDN=J*V1x4O3uCfwo7@c zYhEqg*!n$vy%Xw>Pl$?>R~Aj{A;%o0_FG`l;ryL}Le=maL$b?0AoOZ?Z6a20CdC2@ zlG<=(qn)#s%o)}qTqo&&*za434xe5_VGrLYpUUP!xKwkArp6De<7wi*Hlf#_Dd^7CF5&!q4n{_i-zB~~I)K(_W_I9JZos||ghQcFCgpjc$IVH8FL8|2R*MaAHBw(h^aK^(bS3WuKSFNpz`Axkd% z`ZY*ZXvt2a_725iuj$IQ;`c)jSyGzXQv%}w0l82aMY|N;9hgmv3-x?(!!%~IZl2U0 zzwM0KlV{JK{jt{jTN4)TzTWcCh4dTkHoN9m%jR@l#qC%t^?fa4w>c z1zLhZYZvscbqTpo6}IlybXy{~kx#CUdjq6V9})#<(^7h?eHQ_d!&b{5nx0;Ed!8#* zZuZX)khv@1>l(HSrDr<*k4EBr1M@C4*pS~3%fzohSE%+9^Lad)sR)$C7=tu@z6+V) zjT?JP_yFUK+4olAIXn|N*5YIHdB428?CT!8I^g9E?;hgP0}( zF!d(7xx$k@yNiGnla%}9*C-K5BVVBFpkc+kvrv~q-(2{}Vd=U`*H9TI;ND;?VM|>L zL$JV{)b@C93a@$NMcf8rys)tcgqd=bsg<*9CE?7qc#k7hcjH$rP#szO!{U`HZg?Gd zam6^1KS0((^(7GtpZ=TA%w+tt*RKgb-go@B#@@`f=#6^Wh$KkAb*4ises;esp>J!t z`q7b`W@oMKf=^%_)X9+$WT{z&Yu3qH$G2o?JZgZe`N|)bYu{O z-MZ4LIT=_j1ARI8k&(QZx^BE*#Z7ROQ7=f`-}e}Gz#PO=DP>_g{9>43#AC#k${nntZDDx2DRsB8#bciPa*wEM3} z*9U-6w?GI_8f1aq6i!0dd~(`&aJpG2)~2eXM6U$5Q>V zhP}mHRpp*T$eXjM`D~?RMHEz2iVmHBiWL93>_i?NIiOJJFMIwSwf^}ZWBPB^@;_#o zhHC$ESAV~~!}ouyLFV8$WKAlyEAXBMzj*{oSnFx}H7L;wZ!Zv?5MYN1cp||;)m>?* zJT*PNJmZc&+8jcE<79EG@;150KAY!vC5x-8t02^%za~H;#<*eR>g7KoQ-Uj-&wq{4 zz4XYGa1MSuu)xH}6c1(F(WK!5VMBgZI(;;~_yOKcS9_j*NI;T+C#k&RJpm_^Nf*+S zt8at;EjfAo*cD67SJYC_;KMz3K8bky8iB#qNGo=ZQzNFn9^{uo0)e78@O6Hb%!}lr z^tMoKIyPtdfX&>~^vQCO-2EJ;69b>n?dj=hE+=z+z6k5ugw#%n$qDD}kpP02bd%-0 zLg^I22Z2MKQ&KQ{EM%iINhezBa+GDtYntcOq9mDEB`5{}RN8BRJQIUV^U(jR89zw? zU!j?Hp`RC}3_28N*WBP5uY?I`laMGmE1Cv$HJ#R2{?2IEKJUU|Fr193dfyMnFMj(b zE3@>hJPSyP;E+pcPO`0}AP{M}{)ovk|Hj#IYaQx6x*8l2!2p`3geSUDi_O-Lj@bx~ z`U`;dqe~^4!<=8T6)H5eboRp%B*H`WOFX}PLe!){{~hqh5w8nF<)Xv#@P}<7Q+s+#cVmSb~rZ5HQM!RvaN+|xe@1+(`u^J4aeSH6H-*@!ypjKnX_sw5nvshj&XVzwOp(JUoF0>h zP}DgRPie8v`&fPQ^Bu!;R+u6OqU}XgsLHGI4;k7%#fQX$dbs01?U0QSu`j>MpPf3Q zwhWh(#w6^S9Okz>6#5r@|JRX>3E=Ju`z1!oI_*~+$#3#JaX3BA>W(5ncXnbjjQ6Hb zNq3bcpw9W66s+-P^7!EVd#L}{ug`GVNZJ^!c`Y54P(oYoKzi9bH?bR*aKW_~;%71&&cYqZ z?L^9#qg-yo7Jc2f!t1LnsWB1+j5CX(3Aj0%k80t6`x|`wcHCBybpw#CNr40IfV3r} zH@k88i_{sHl*Dm~#rK5wL$^h8>UwiNi4oLtCHfP`pRZ0h&QB3h=q~H%H}S?oGY)=U z(-mcv-t7_t(~iZ%C?~%S4IMf4XF$ONcEIaN&m|FmJvH4bkWSf8bA=gH^azu_Indyq zZtLo5PMPq;2!Sc=q9;gkMu5;qAujU2JqsSgb`dl)eZJVt8}6Vm%qeS>9dP@8tZy5q zn4S#7*uhFFvb6kaV^!|96BGV2R|-?R`H!g}4kB7##G7n&V884f%%7hB{)d&`6(|=L ziPS6j6jdCIq&wnsn2mGz zMA?m_f8avLXYvaB(fqoVt5c7h5U(6~Ab1TqYTF*+FDl%Yu;XXBU{Dv=`l84w1*cjZ zw0rhej!aIlA+UD!dbG7a*Nt*=;*MOv6K&(=}}}R+?DEy@BqkZb~+xA$1+6 z=}A7iebqTdoP@Km&u!WF0Q>|A*WTls$YiCXz;^vUSH+{KAGX4Zo$xqx*s z(hp=^fot*dz}ELrF7yJovl{5E}E*dN@>T5xt^XOPCM5ib1a>mD*Cc&aZi0Ko~BCasGV zzxZu4=QG#Ns!!Mo+mj#6j^C*|>K-tPVcu<7K?+HA1R5KrihgBZFAlM>sXL|ZZpYR- z4y`;}Huth8mwQ+x)nxNbbiAvN71Hdz^Gww87kEKn`0%RA+M|zA^n3Y`JVR8sr zbHmCMgR~SmuY@(@<1>08y20DASux^u9lTR}-u_Afa#Z|j6Ayi{M_a)yS|LUzBm_&k&;wal# zbEQVLZIa2nD{*lzliE~%MxL8&+#Q&lv!BSl;6z|`-Q9jY?K#gt-C+62s=7}0zZ-Y$ za8H%0Ai_O(pK-5U8hiJvo2`8F%sx3VZ2czac8g3f=n%k)(AIo^&2ETYm!u5wY>l?Q z%M?wgYo)7o9bslx;SWme%&0YAMxFJkP4oG-6g|mprJ?v1T#72h#Y*Fajg7A!|26s> zZF*ZV;8pRyd^Ph`N}`71{%nw(5mm0}A(IG9qyWt;$GgpB7ta6^hIM-xOG}Mr)Lu6V ze+?X0zdna`kj4?CuM&Kfb*4Y6G*EY$O1a~B>F`jWxLu+l5ayv{aR39S^x%3uPp=}8 zvZL#nYx)(6Rav&GMDCcZLv9VcT5`lWV!A~b`r#W_#Z29fgX+WP1?ObN+E~Hls6Epk z)}oWBAI2gNOWzI$)&)_$Z1xDV@eo&bljnP>h`pKXjrN$1$GweC)QG8ZHFMzGso`x) z-|24Y=2tgZ0BCY;&qSkZ6~8H@uGGMMOS4qY7nCo$$vuLPJlKi|dsg&2tpOfZx`>Q2 zl6|u2Y1Ao_S8!@jOyKOocB*ueU zpyTiGOY>`yRRM_-14M1+mdDeS!C)}i-LpiH6?^Htw3g3UPg011+yt0*PSTFO!G91tKWz8xc5+aAC9jxi;dBt2dDJm-(U)3bD4IWcH$);HwX z(lBdPV;jfI{vDAUPWONT`>q+NJvoHuqANFk^EL6m$G*}p^XMHBw6Esc@><((9SS=$ zO~sqSe?BdZ11$&V*jotSxSQq*QN8kNC(8B)>9sE&RN62pPj?0lrg}N#I!AscnH?jx z5U`nyPe~3{c{Eo~``Wo6&a}uwXNkH|6q|8~PEs`eacp|^w#pnAoAENKRudC?^2;3f zHPF%1(dR|n!q+zVXl?oW&C=Yqa+>$`c3U&%6Zkpv6O|`4Zgpn$Iq4hQt%mE$;J|>B zrQpMF0R_{mxoTkA#^4j^6Y1WAX^KRIjB6zMc~v07-{+vItC!%o$8r?F#g) z)DdEBS~C%odR~XG|I&&t0k&iC>tE}Yf78i;i)lrbd-Ah@>Mn;ti-yeCI;S8FjZ+YA zkF5QovK%w}rE}G9Pg>6(7NF4U$*(iH{&2_B)3--yIXWd}V~ukqesS0bCce`Oj!_ni zYIJAqJoqUd`9o1k9PcarRo-&g@b&v<&#GnU@ZTn4wCI16EPK^aBivY-Y zvdG}$#p>%WL-5-j!+)poN+CB?s3XFM$k@?4Qa4qE$)$1II~4i5f-BspY?MgLog#LQ zcQks4QK^x2f7Pwo%FFsnniXMzmgqokqO0v5QCI-Twm+~3KyT_lC=$n%@RBMFd$QA! z#KRVucc%ohZ)UX@?u(*Mn6%SI3kU8tHu(GbKEikHfF3HNq0O<)PcO8%s}(5KmhyjP z|A{>T51YYMf43C)4~h^Sy)=9dUKfGnoP+FuAlpworfIq5 zwX4oXmdrk6q2?WXNKM0i_-jqKKjb8bK?B{)7X8T?ipAbYz3J=hudJiR#W0T|PM0*& zFOEp&ou@Nl0&LUdTGn_S`f4-LeY=6*H+4SV0kdfaltfga)Q|GFoVpaLf{ERq8U0F; zkMWeqo4)X*ws6o3P}jd#zs9Z>z+AKTLA}_HXPQ4qJ8LrYLoHK7&M%eovYN=%yIqbO z51am&jm@>)+nHjL1BD`{{ZD_aCNlc@g8m`2gM(wgI>6-%ZNBdcoE8|(f~nQUDf8}fr!XBh_0t=HMYJM2 zP0$W?JCZYI)KjVlmk0dT@AwIn<8^Thk^P9GGW)luG3Bn)!6=b{EXOw!R z;u#9_3^qR`l+De3KL(KLH;Dizm*?iE=ejU;D(-!2iGllu$n5E>Vc|uwl%nFA5)tUE(>>pv&i=G!(E!`fGWkKDf0Y67ykyP;bjbLR z76`P(2V8;iGUZ}57H~!x$H&JacTz`7?g|NhVL+UE$!wb z&xpM~n;?f!D(5^k7Q`%2&J1LSP@5?-a&Wq+{@BZhe8Gi2nB?!DGMN;p6*P@NKZ!|(%9R@S`+=8c>U+Rv97I_2T=TGm@+n@q zMeo;LYSxqtYS+nRF@=|-9I56MvaX5vghI*w3X7n~|nv1~Kgkdt=%SIM>ym z%rL0eebiDaqEmh~T3>d&+kRxT7)3-VYO8;1ut;Epk+n|c(wbD2|Kf`D%valn&$stq zw6hFIPNK#$2R$n&{5o)U&JrU(iAsXjRH=o~DpKBk1^7F|Lns2J6WA+UE87QKiHkK0 zEfc?b3$=IIhU5qM+Td~J zXLFYnvd|RDa*Da35m=NJ!vE2s1P9-yj>}2HC##D)T}1GxinEMdjMlyeuoLe$=&IL3 z>RrX)#Z%NuDRDxayan}!Z$C19rj+aWs5gGt4a`xNNi^beBlF$>aJjsTs1q8HUWtSm zjcz7Y#o^^*C|S-l;FYP%D{h&>yW0=UYO=b28oj_zjto9tJapAO_N17ua&MYmP)x(e z97ePmvIQ<$0iP-RKIWK~`-EDA@o33Ik%Jl?Sb3(3Qwm2Nc)VxZy#s3L=EF(z(%tk) zv{i#tlsnW%8A`+&DOYKcD79;PasnUCwE;WQ6LJRDZ_x*g{{q7$- zvw!UTc4ucZ!;DWnNuKkR`@XL0zRo#oSri>h2bAS^SLWoi&r!u~1EDG{J&<2gIa%)p ztBRKJc6_bJ&le6&Zkhxe+kk%uu4ejxdQ+b^ru-G$;LfH}eO!`+(kc&}OY)x1YsHs; z&cC;^?y!iI{R@7=clN}uE$MW&HWv*$$w4!@?mqSX? zHSyy#mD`y%9$QNBC%pr$q_4XNzP)a`fDoY(vv#K7Kpgq5PNeq25LD-RDj+keO3>Is z%SH@ki;ZUPUShVu-o)8Jl>0tk)L+D2LLde3wD~q z7n)AOV|V)nJF{YuxqIi3f0$DRyhCGZbE{_jc#p8-x4qtGFNMXYbQd*JonZv$Q)>lE z&g@W?lhUZC>sJle@o`2gqC+^x3@q8^&e( zB%^?RxU(r>b&dY;$V`_&a6k9=0Bm6f`QCqP6kNHHo)ou$qU)&q*bcp2uNV0uVes{^ z9t|C{j+vCVzRxptLOorOoA(O*XGkh}m*kQ(OVP;a?r+6AgO{-ru8#GygWMI%8Pr2E z6HKf{r_k;vid7U0BG9v|tnT?GmnJ(TeatE`hdJ??^4x$sbGJ5E-=WxfCsbcncM1O7 zZm?rrUFoV#+{^Vh{d`Kwj(C|nxVAv|6aKS!rj_*eBX0Z9eV@Z5p|0ZqqluEt zqz8{Bb#^}B_kNY7S`rZCe-9gEbBIrhr9($}n(z%?qi+yh*e*;lTE?BgKht&#m4(JI zJ6L$71;MMPidClHiYI^F?%_f9H^3~hc|5|_eOX>uTbUXiBS}@R?6f?%UTy-VaQdHe zr|92|7S5qNZw==xloJi}CHi7)|B#bMciUX$`|Aq;_R{cr*v@`Bn#hG|! z4IREDu9EXt4&ETCFcLA-pYE=xU0F-L`RNUzVP>4Q%0Fw=;Nl~1+~^w}lW!SmhHoQ< z1%3*}HRLT{)tRw0v&w)AyK!d~uhoPmX-?}0PjzVtYKDhQ$?<#c(YnlPm{-dmWIe_5 zkwq%oxGS(sTVjG>e~v~DviKx&&w6qQ$-i)g{W)Sy(8Hb;OtF!-jMYR(_k?@S3+eG) z-0}U?m6Z0c6F^z_=DRW zhprdRE_lMX&yX)2@@QElyZbmeBLn2Lifsr&%b#`$jCCxrXrZL7L%#au{+H|34efCC z{!z-&o%)TD)lAD6@jOg?X>7WzLH(5mo6WZ_HIWmCBR6Y8=MyY&k;PWooyPu=?D7bC zU+3NN70LBhlA|8c^_Ruf(}BvjGgsO0V*Me@Hb=ZFMt%j+MHd<>j(3^}s0-(*g`)&^l~Vn|*r)rdlKRW>58U=L=R*W>!H4mEkiyhEBqj;ZCPd*&b_a z*gGPBq%k)U4|Vt>5%Dy)W1g~N_C0A76lxj137L`{RFeFWXRAa}t4;ZMvZy}Vl@=a$ zmg3-UJLJr?fU}w6W6m`ct6{j@orV?{H1@Zrb!jrq{)IE)>faK};=m-pKa563v!A|x z&){)i%Qc_cMd3TQS;O$%*&*oDG_Rpv zOZ3}1!P^|LBYN8S`J*(~roAVL82$9s%sIII0)^mK-4|FrV(n(w=;eQQ*>Y`6;yLC= zMi?RNkb{FW)w5ysnlm#ygMsD-Dnn8ZkxaC<?fnbORbJAp$r*)eLPccExg`k^)I8% z{h_gO>FNs68K=;rQ54;A-saF^e3{4Bm}+^;Jb7GiJ7KT4JtCR+m5!TTu|@z|TqDV* z!>hf;O~uX;1HuU7ALY=`4oNdtX@cAFj5M?-u{62c1gsn#m9h}}z0 zs@UkhnMZ*PxYeyHGR<{XP^q`56dvX%W9o5>fnue>*)8q~# z8}8iE0biS!-n5PU8ie1Q=(OK=+SHwz7@HOmcNqC~I>4fn-cV>%q{Kay$y-_0(A9Td zIKAmEBVArY$nVU}kSfeMw1~Wu8o`j;eyGit4CbQ8c(yHb>9jPQW3(SOKRL1g#&}fR zH-0uEsh%187VbTnZn9QmQII9>QCuX7GSn9;>WjY@EQ=u1wol6P5zlT%TRIp{Y?m}} z7NSp#eB}qWvXn1q)#wc#;f4gxlGePfW$91%yEX%l6CdTai&;}p8u@)Whl0LMqUkPs z=~vX%|2cpKHk6o%>#mK1d*fuh)l|mTM#ham%)rdP$=oyM9Ia}N6%g2CZtu-W;i%24 z$04w9B_G5Naj5OGeiS@*&&*Z!Jqt~WKMhUV;b(v9R?!-Qk{xx!YzxXk_t6FnG~ zL^^86SJsY=I9O#AiMQb{{k^uHO^%km|CUk2%WX3`8NDXy<>{BIJ9xQjAlyvNK8{fM5bf94MjPd z?6?M#@hi16VMbT`$Hm3UK0Z77c{>Lsfwv|{Fk0^Q&NAdyCtp3Ts&^fn4hZSU;<84( z9G{u>JTx_Ks8TFC77}#&rZ#g9b*v_tSuNlEI2gIQkUd;g8aSr6t&DEn6{aD0WzDF*<90BZC?D);MH`<5$In=D>`q$p>i-mU@i?k&^;^ma< zx2%sW|C0+-jkTJR>{rQ;t@UtcNB6Zd2ToLH><9bo?B=U$MNW5>*H;RLJLIqw>E`W~ zz?XXS%W^7GgUgJomkN%9p|}xUbG5lvW_FjShZ~12D~lh$IWx@uC(dJGKOa!pc@1NV z%#R9Q=g$BBVmn+nFC}Qbt6V68X(UjeDppP-$~MP^Zzt2B*q2)H@lHu=Y$6s(631J2 z{YS-~T4)^P8J}DuC#zbmEQo8WPj!66yyV;v?=XEZsxRO6qb1S|{s0?>2J(}cR!9$PQ8NBygBt0EwN}yg+f)-dycB>u4EbGFL$y;kX ze@0g(Hm$ui>!kTfY3XKEiz#eId%Dw7JPJD{YDw&8`gozodhcUG(MC#Qis>ZN3~NXH zEXMw!o?6NAO9Cf%cdw1|XQ|*!yIPdS5exUmG8Xfv9%Cfcg@s)!P$~M<%kU2Z)`PI4 z*XWEe;WcUDMC}uX>iTx)Ylkuv1Ag|?I-MMMkA?;Vzn$S|c`YN|VwYEI9_Zwz%U*MM z)3+|EySqDLJusZK5{1d%`smt`AX)vhx9Y5$AGsJ@b&GLg?_!_u)909-C75HASbrC% z@e1~!Pa7M(5D5F~u#zET;C@2Aw*ums>6e~0;kvt{m03IF^yx@xV=KZ?LV_dbo<`qh z>{_Ha6}i^@P>!B^xI0oEmn?N_VplIFrY9-w zhBqSLy%(kA>cdBZ)81@g5-^tuGU_~3M6gq=O8PQt_BuM!yH5SO)FGysnuaZAGw-;J z!%hvB-snST!|@CmPUW%em~w)s`c6E{)EGfWs6t)GUqyb{w*!wUFUX7+xBm(!1(tz* z5bf)S-J7X1>tfP-_Zig=NqyB^E|_f}?xQq%y-SQ^(y(yO%%yr)FIaC~v0tn8{=j4J zN=c1voe_;e9~BIfLby=om%$X&W@cf5y*)I#_7hBf%~!MGjNhCyvCzp6&hbmv(h$Vy zsoG*0#oWU$SV{FF%F~;My_Q`%Q|U>XMu+z1+=;n2y#4kR!cW)65nr>oy0ya>nZ)Ub z`I7Sqo0+Rh!ktH9VQPb7G6vaVEHz5adplW%9SB%y!UI{t-pbU4c%ScvM;M8!z%f8D zk)DCye0$@2$G$|3M(vI>Xx%#s6M8E0QpZ#1%5h8FGavVTbtQVuWB#*FOH+5x7zRrG z8!2xcf61iGovCrCsO#4z%Sn)Q$Z2EK$dj=;p3}~#^1D-Ws85nb1v^t6Mxt7NHpZ+c zh&+6Xll=Hr+&*z-i6M}Im>kxk=Z44Pg<<y~8dGdG+o<|Gk&TKtH+ zLYRpWP5R=&Uza>ZHPte(#hF$epBt3%29ukL-6A4s5u+@tts8~Mp{-ASb&c(OmDu=O ztyLYCF;&UDIZF;7qed(0b6y1O+_w7T%865;_-7?K%0e_KW&&;B216nevS z{@Vq|4MOdooFEEq>&>ui7grr)|4VL~Go4(vSetXtg707dTbhJG-WiAMNSr?3tz;M& zjbYC=M`K)5Ev6@w@CKuqw`@otoBlEW0PpoD21xfxpUf2wP>u8|D2#GUG4EmW zw!>+}3Xjn>0eeTGjLdS$8^>}@gAE$32c5Tk*qnpUJwYP_pRI4hKDeA|)l<(q^fCL; zKa>l|Q_iU#$QwnE=U+08ofswPC`wLw>!oPiZHd+{JhVtYty}1H*8WfWhFEouoMmg@ zVOd2n_#BxHF<-srIEBIZrg5nqWct9{U0&VBSjTZFuWo1|qIpl>R!u^F9HtB}U+<)Y z=P%6+$v!wG@!oH`QIG5`sM?QnJ!rl%^}8_tX3>?mHB_t6o zJ=b_C=*wk%UTa}{B+Eot;3qAJRs7H`4(hu%Hr~dyN2NDg4+`*z%7YHm-l5L~t*GQ= z-%wcK(KkgA@D6h%TU$Ej{4)i;YRC5*w6|gCsyZI`qQ|!tU^>?z?{-_;j(r9Q#hc{; zCTQ%q8k_s2oJfa-_>WSxhpU^V;zLM{?juC#_aQ$Resv` z4g>taL|T^8wuSaQWcJsaj{Y^R{CgYvuF)}39Wyh=3vF%rvd<{J8+M(|Ei7_MN}hGb z6sx{^^-H9Hca5EkYb38i0Q`rCiy_2Ht~??#Ixa4?x|$btw3d%_URKV`F4mHhD~;jO zpPm@L07>ZHdaLtJ)ZGet_8EpcW;6FlxjD_3KY!4B)a7MB znYlUoiF7pzGJ7&;^B#b_{ecEE$r|#e9+~BRJ5zaq*xOtNDbcyPT(NqE+PA2w9~G!D zf+YGZftQ6#nVGreDjAvP>(?n=7Ui9|c~(Wo0}&y&Z}yjKpA$P84faRDt$Hy21B0U- zuX!FldGZo`hCz=80*wH3+0{kH{7?}&V7ET=^2Z z`Rto`=a(~KQ4B5Xc+Uu zCwpJYan#AN5orSv>c>tbBqTOlUmwJa;+(R}l(Oz|8dZ!OV<$n3~ z*-`rC%O_;176`lMU*XU)k5aJemNGLQiNaHMc6X8RVfI_MZ~wAEjvO-#MWamp%gV~` ztsUz&nkoCX={>&9`Au@>^soXe6+v)Tbx&wbx;8tS0(M(!YN~QEU5Lyj(tsTBx@B_- zgxEP>XG-gFR>>TTc^*aru4f}?WxSusyv^S*W0ON=b-0l+(}r!1v%Cnqkv;iA6p`Tt zv9h+a|MD{pLCV%VQ<@#syGE{zA;#jSUR<~INc@0y);KyWgnp@v_t&jRHd&R2EEB#x z6Lr!mJ&NkjpTDoau^6)FVmDc-1h&Y&%o81Q57$n(`6^$b5wc@ib@-bM8tj+MLdA07 zf#z05 z3>W5Gtz^_AnyyDxk`zzi$^~hK_Pr*T6xkj>c6<_hA&tapee9S%)OjZ(aGzvwdwcup z%8eB1;M?p10z;|18=!NA`c*xtCa|F#HClQaOXKVfrxSd-#@=3XkIaJHf4u;f?Y2U- zwtE-eRrZ*cu0*Oxj6}2q-=Y)inv2(AoHXE7Q|qS{wy%3=-5JwOoWxEXW871@_wV1+ z3c@QseE3jdzIz+QwCIQ3ujJL=yvg|BC$;|5z^-2{jtTM#3UmedNd8DoP0crqEIYf2$sFR|g>U@mgh(jUrAR)VtHkY+UFBlo*+g#5>CwI@0R zx`C(gEFrDBTG!X(FST>$-pjxG#x6HeJY&;= zdUCRyNu7Bg{Sp!OU9)GyOdUy$wny(U)XT@ZZR1vaASuihHuv2InbA&gyInl#p4PIw z+yIj1P|V*+Qb@c)eSVdLcepr9Lks$dr{89e!T1Cho_~-nzw7-tuCV)j79UVva zy$|Kaq+(Z7!?L&(zqh_V9uz{Kb#R61UQ)GDbWE0|Wp7M-lo@5y`3n~WP3D_rhPj1D zGa4Ju2avG4gWa9j6R7EIBrhL?6yZ?Fz10xzt3?rSGqS^d>R9u`1x;2zm zP~Lf2q8M~F;COQ6cf64a(`KzoM1@lm35f3j4C>odEWb=k1$6NsEQ#Y!435PcE0g#3 zkRX1#!+Fxv(gq$psug6Bks_fSAO_7zD2O-EioV=Y4cm2|Y|>W~@nESiGj~^zrdE;~ zgLEj`by#lEjZwzP3vSkMdR)DB4d#-v7Bp__=J7)&qO44)-3DoM^yTh8-onMeAblDp zW$9<6hw7RW$KL3Z0@)QQC_LK0I9WP=+FDuzJ8*0XV_eqUsCn`?dh^K)PlX@d)DNG6?rR91UVmZGaMYJLAS?gARg-ZT@NZ}G4ZTLO+L=y zgJrpln|cJBN=~Bd+R2G&V6sAw7f3gdCi#a-8tg4Z~3W07a03 zBO)v&jJY2@Qgw1F?XP?RQP zK7YO}Cm8afs7L?#^K&M5-tCSMvyKF-1(>5a03Qc`rTi44`C@1PZ9-;RcwkYesId}! zCLn;$J|r+4fH@ExC@_V_Xl39V+lPQ>kEm+r15@(vZ$^Fm5fR@evWU1gWh(Fb2p0>$; ziDK?T`CLDLK2WA?8T+(#vejfqQ7pVvADYbblWn$cHLD@wA*>KT;b!Z~$OrN_7ozTa zurnY}K86&!D%Jsq)zh4nYsg-oA#_85=5&(Tg!jQ4m<~DTpS|8;_!DpRV_6kB3H6*( zzoeRU*m^C5hE(SEqFNUv)g`1%agP+8Y zakIm*7-L?7i;A036J4UE4W*hD%%FfUR9$$3n}{Uxy3u_3V!9teiKtbCAZtI{VcBVz;LS$&(< zj)uy3Qw6}e_RD(L!0h24UA~fg_q2b+tRVI9l5I$6CjDw}Upj};A9PFI1{Yf~cZ zq!*_LhCJjdvn@!b)1Jq6*y(zGb90MWyhM6`4){jCxVP)0TPG)8aorZjU;QKYwyK@j zA3yG+3JlzzvvUXuw07~Hex)+HF;%Mt0%A~*e6~?P5_j2=5H>LJ+-UrL`~ziMlg`73 zJUk_881N-v{kqq5-M$$UEx5@zWQaNts}~aGQr54u9RVrCuBT&Q_JNeZn_qn-h{#F6 zY$i(00=z#<>oipod*Jvz#EGj1l!vzLWmPm`*dC^%t=iPrbNt=geQLf9^|hx*n{RWW(C_ZL zItIU=`vx^+n7flfy88er&>d_$+Sw4pc^&x5sh3NY0uGd?f8h&?DWx_I<*s3W_*_M^ zTu;>9?cPS|exIBxtB=Dg>>=96T$@+6>( zarNU^rxBkIJ^*-N+up!bU4%8$YLCX@$#QvBYU)Rs{b~{Qq_Ik7JxXAQA{L762osxa zW4uKH!eyuxK~>?e7vAma0gRBAPKsKW!^mrF2v(LTob z{nki!*hA}IUmq~s9r=oQ-l>bStx?RnM@0UGib}&M;b~Q{tVjYLR*(nSCYWjFd5&dn zlypZ7AidOcmy6~e|Yl$m=Wc@&`c=JFl+ed<5*$DYC*+x!+ zt1?Ghdf3`-LMvCPmR%4t^>)f-+@E%G`L7UiOyfP(<=l*d3()f2HvY|e0fZ{0zZ=F; zdEXn4B*7kUf7JGZzl;#@)`;UmSJ$_G6bZXZ0>(E=(LuKoAJIn~7p>Lz5-i$*2(1N)cvT z+p|XngpYOksqwVx!p*R2>>M1fe}09R+uSLj4;B1lOI!SOeAcz{ClloRrl`Bn*m7_| z{>DjY#9mlz?5~-b8Ec<5nx!6Bs4yR&I@oIym39e$^tHd~a1t@j(i}wms_X%n4nWElYfjcnAeyr9rUmo~>GBLhSaCwN@Tb6cJ}6@u>hP2Zh_0Q$Og=@QpW_Wb<341Ot3 z#bxgqVAw-V3$1L2x!Dy~{f+PoypvDeE0caBF>4(?&?c!7xAhg??9rZm1IYAaz(@T3 zd&GI{oCSn4X;>g035}b+1M&2?z!1w~MNH|=muep@GPz=gjC5SFDKiEh?@>l$%5BQp zn1EzuOrJ_NZt*>|zAZ0PWuK5i{5xxZG&nVSggKotDkwEE>{;cVTkoE6d&T|dUeq6^ zLrqNJsiCXB>asI5fKAw4D-Kt|hc1dcTKb7RHedg(Ty+UqFC+u8iWX_M9r3AE3BS9E z8JX8*&rzwZkTQQ~0$B7#%(?kG`=`FJWWno1q~5 z+&kg+-rm^usKK1_S@FLpiz;vDot0rzaNCQ`%o> z#i4){!I{LTtjFU8ixna^?zv?xg^t-#A$vMKR-Jqm?NQyK5cerD%au#pmdew&3?AmKPvp|_QptX zmLK|~$*|zrs;@LF;m|F8MBFj1jKv@|c9VR_*$=T2)<3nkJQ))2uJcYiWP@$+tXBTo zC(@PoGe#NqiLj7d9nN~3R_2DUcQL$cJo9b>#gN$EU(lHoyMU;Jp1AO^ynI2Sf?$Tr z=xVLCol&tbSJ4&enw*KEhJ_{^_?7yIEXf>72xs9i{PVb%``$N(iGAzzQ3orZ5}yPK zD~ph)FhJbd0bBx-4#}q1E4Mu38mfx zxxR1Z4xLy*zxa?1<&Bt=A&qzm@N@#JE)aj0#Uw|+WMs%hUxFnoFrNZstJkgF zMz`jO#|{i=v;Xy1V{Sk{V1LxtuLA{*$5qH>1pJ&1nEpx6#C6;gs)45>{OvyI@iKGg za)f@s$B&Ny%L1os1L!V=IU=~!Y;$zvcOj7tVt?0Yn3$M=YP*;_J3oJu^@b`~X^S12 z(Xp}lGn|Adyh&20NZlF{zfaVd1=!bQqCb4_t1xS$C`2rTkoZmh_@Tfor*NBl1oVFm zz;#c?C6NKWKrqMK_z^d^PIgbCrca7N zT-;q+M#jzXq%?@5#6e!2Jjb=rN4P=8HzM#O#RJz*Vbl|aek1|30#BM#AZM+D+pasf zeoh^i0pcIk1unH7VOeC&uRP8cSu7?>Uu9K#@OizJXwKL)Nk~|oZo0$k%XO8_ykwC? ze!!Ssi?m6!pj<0zn_<^jO{Eg`DPy5VAbu~>Qom5)h1kjFlbTNVSP9tde;1MWSz`kd z=cL~Qon56@A&g}uZYw*#{>Vkxym+V&(MkqqmCYJOPU6RqEL5m=Y#)R^!RZm^0$&2) z9(#-w6awTZz>y1p^%pN*2>5u_c{9X-E3UcW)rWdH0~gnw_0p9V~x92CUBHN+k2)5%Fd z`Vd5q#o2*gDJREIR~PUlG+1N&Js%O65ozzx_|)~UA%aY7a*3kuWwCZVch;9(e$77b zX0PSsp$&mnc$AJ5cp4^@m#r^L{Pouh08FuakT3mKLqNh?VdUmkgC9YO!mXxeg+*`N zf?I>K&e7g#dSQ(|7JmdHbO?xeW^L2Pn{E#tJb=6H+XCHZFirXzcC!uOYLR+I@b=Mh z9W_xKG8&zojmNsLkIn6Q+OO3>d^m0K{$LKkXkQ{B5n7udgDlq)Zn5HuxeMXDomcDi z4YC75!iH*^F46jgpurMyk$Pubju+m_>!J0~vh1$IRS4106OoEr41KYlt|7mQ9%yi( z58lZb%}C>oHjCfuBu+j!oLvcvBi%#SkivX&Vo3a5MnHfZLidaGHT4E^(GY-^M{67G|C+FQ?qv49?-+1woZk0a?V|Kb!vL? zzTAS3A9IOO186@0%Xm|SOsGIdlF}c8i2zx#iaYqre(lRn@{x#0ndZH46Qt)Z^Fn5PAe! zN^1R&92Iui0x*}R68}okctw$YJj;`6i#wTFQ5wetz49ejJD_TAA}x9DP%|*3KKCOX zr>j~M>xDpi-Q%e66j}a1KPq)RNMgK5#rw9w!wMLBYmId75${~ee}M> z4$Sxc$;9EW;`%VrL!Ww)!tgNRZRG$VdUvl(_F_zov#HXjVr)&X!oG)Kb(8^RMtk<2C1y5ky>qS@H z>$x;v_Ff|blPR$(9d{{&V5Uu*idKHvT1A1DWd529GEX`2P;{5zq$4J&a)8`bqdePR zGs!vJ`AF%;s5LKUK4Buk)h?S?G&0-Q6F*4OSTfO3n7#M1^&FPHxJ<=C7(}hMV|OiE z2j4L4a$o5n=z7HBinW$z;=XPTq({=-aBvIB3`_+#-;arqH$xSq<|Yn5-@gLs(*@`c z=q&06zwdl1kj|&2qRB4fQe4V+M%q$*+p`1DZ?YU!*^`SdYtxVJ3nVBCCcDa6a`4P|T5 zNk}oAjzA5UBgF|FuRmf|O(kx`s(xEqtn&CPo^T zIO05hJFY<_Ya*J#(VR8psF(}IG?oIZJsze@*^uyh!5nZ8y?;-{nleJA_W0KMt^9Ha ziyXMycA-1H{{7akfe^@#{6f85)I;k(fET<~+Jfx^W&@(+-Saoz>D1s+Tx-WKvqy?Z zX0^Ds!pZ2lzM_qlN=7~^TXLHIxJ9$(|3KX3QY2l7{D(1T85m7PYgL38QChU&{DnZGuJX0P8;}KtQIL{FKm!)6fj8=3U<=7_sWCA zx@HL@7lu(X}I1Vt;US z%PYqKr3J*tmX;8c&!XR{K#fw>S}qqv@AYCJu2%KBkKS~yJpT+r-OKe zDbsrmXHXsPZvU}nESZTWU|G`)x7)EMpSnG=aKR7TB zUfgv4{O>UR=)Cbi8u|aL8c4j$dx?Bu57e*QT7q|fZN=~b_{)01wrdog_w@Aq1{_(6sm9~FUp)7|P#LMQ6<9P~>x;{Y9W*U}R z0o5~NZqOk5EWn2J3}yJo#g(F!VJns)Y0l7>o170j&%?MH(SvnCs9MsWu3EYZR}99a zrHgv3M`hR$X>XQ8sLi(c`!#n@5OE~H5BD(r$7wP9UDOE$H8Y;c4l&joGv3_}ze#G4 zM(TqIZ$kOraSU9t6VDixI97|$JRmrct4yYM9dHcc`Ic@2H_5XFP{7c3*}U(6K=-E{ zE>(|trM{A&zg{fvqx2O>8Esf0Tr}z5vjpu;Vq$eY14fdqTC+0OYr&|p$SmAu9*6JX z&qW~>vg(&}v2H^OS$?9bp3s2Mq!B|7w8qi_hYM3G(ey(*SC=GJ0DK(4RFT*K_MSUW z+*@EmC<1bFg`3s{u^g$CB+!r9zXUmOJ$N&t5~O#8C7N!%1RhnFFHPN=6(TFI!L9W` zUEEW+>T{OHje>C%pNc2a8#lwM91Fq1pC#|XJfK1!m8#?4EF;|n|Nhcr{68>86|k|S zSBe$rBxBVvS}ie4gG9fh#|G8UI5aev<$(SSMcH}=k5B@~EeMc(Ktzt~7NksgDJ>2A zL$4DLa@?Ws|8bTsYLH=jXum{{!xK+uAjm4lx@ zorpbg@qqgROT+%LDv*r;3Lgf%5lTGOgx~^{m|a+CV$PK&_??N>GntD*Y-HtEzYj>nk-z&Z(;bdB=K@gk-JsJjKovJ(P#g-qdn+?d~0Q#Sc3B)nY&f?nQO=+4~$}5~lq38GU9jwTe0=9D}QA=o=>dwh9$>&wm^S4H2KCQfO<<_b@kY^YCPVg z`%vf(Ss4^IollQEUpny~+yU~U+3AHJo?JYA+wGWl@8Xj=ZwEIC`Yeai^WCA9BvW4t zx!K_^1 zCJ@OokRyT(A^Wk{l*hDUr134L{XvVJKuCG}4TdfKcroBvzmVl(T@*F&|4fAO1Jddj zK-NE$8zvTQ$G2#;oz}7+AfJ|&hU;sh6rNWcF`fYp7JR`YU*82JGJPtULh}rr!C{m{T7|P?@K;XBW40w2q(Er;Z0SN`iQ`6F}?VR|$ zuinUo9+_Fh5uFla(@Km%z<&mrE>yZ`>VS1V+w<^UV78CFr31wchecBq6DAEdO5w;` z|AeTez7-mJaaGDNy5+q+AC3C(q#{mzp-DOj5Enp2QDCPboFYUNaN(Ig(9(E=Gx4KZ`3v@|An322HV{o)4*s_D$py&txi?{#Od1Q$b z{?;Pm>eZ_TLNA83YE!lHtaS?}bFM)gdreDoz_Mn02>1B?1biT#A5kfOndqFI zGp%XDC{QGzKs$(iXg6M_2Xr5|np2{y225?bOqjN+>eou!=`>I-jLrS!V{ z6oGF779S|a^t1xhL~}v)+2;#pq>$)70DThqJ}NvgDCoYidzFGh?M0&|?(#}%9px_Y zX;=#CvbuwS0YZ*E@FKvyCMskcbkx*xS#M^ufpY+i6D#&==`wN=m3EU^Ab_$B$*vB(v=9jJ>ssn%_UPLU9b&5a9kz8LN|dS zWs1ZQ7$h9_BtIF_!?2!!;*%$UB?FWQ1_t4tIo#K;*MYNT0AxCw^>4;Y*MfuT26GOZ zY@J)afTG}v2tTL;f>=^>&#lzHw;233k>CP32Ye{vVaWe*DwJ5m?3Id3!tqnAaud}i ze&82?x2md`O48&5@H_gsQl6e+r@S4h@NuMD#qU3U=d_aJcszys);fZc%MNeddBazy zJ6my1_EYUO?hhwUE!=-tgn!m`8+_$=6C+o4T%H(v9d5zJR@u%twsWmUuJG#H3qRc& ze=j~vOoR<2eGyaAc&MN>G3$Tx1NK;Iy(~Z4cKn@xH=cjtE>oeKZ|%*PJ%ms1?zf9| zE+xu6Um`;n+^VdPtk0LuM)0XtX63vZ9OR%4XaG$XJMYb&fG` z*hU%~%&p9(k8tFI??07a;7RBf9@gNZzM6{cE<9Ra zz@6Sqdo*7|I9|lmx6Hj-JsdP&)vVuy+@Jg!62E4%huiOH3-7@`vnyOfR`@iLL`B<= zuDi1oUAobqxW2aXq>}zj{F6lORmd+R0Y*urgYmnyfSKWis$@fH@O;u6H;PjW z2$UYn$qk;9p`g6~@?|+C;&bX@xp6v3g628xpAk@+~+Mv)Z z!I;+8rnm2Yy}8*pu>_u)`pjF(&tSS^(MGedKscd$XH)$;CXwIr&m`Dx?6Ww@_qtae z=4J#&jk9<*bg*r<*>k_g|6w~gIp^tG^(ZJOw@6tu^%i*0u}r*GbgSx2Uy6v%Uw_GS z(T2>g(%-s#@x-I1;d%M>rsdtaHdohQot=Jzdd#Hczc++Vs*CIg2nzMDGp2du>4cfN z^1nZ-Z3Wr#_SXV7_7BS0kqXE1qGDpNk1d!dDw{a=i!sZk{N z#_mV}p_RpvDY{HE=9R=MuJO&ynkiy=t3}tUaNmeCB~bhO#$D5>ZvqcUn$OD&WCTqaeTZ4QO-4aN z74t#9MXp%q)EluHGVoDo(#G>96}Zo8`yQ`}H3oe1RS9_Y&*`%gXF8egihg z60m|P;ET)pi^m^+rm)w-K(TqJSxe8e=69zQwRGLtsW0>ToM~0;udoEGTh(Q&l~YE4 zC99m&+`JL4tS|gTN^M6$HE|4UIPDD*g88_$l?(c4i?B-hZYH*Xv;PBhc9J zA`iv=3*3eJSA(}3?uzXD9U->;+V*lh#m;}ZP>eofeSEwop5yt&yWsCz0^K#`@328O zE>l|hL@0fGMP>TzF`ayz7K>6P8*5+I3lZx(l5;U}(QIc$--jaObrrlM7|*{S%TO~( zC5Nc0s@}IWyma2jYp*|GXTM{;RCT3QzW!xoO2?JrH{u3S&np61_M)hi2lBiFcMJkQ zzbc%B+f7>&8|(KIudMi%T_s%hC(eB`vs_L}eM zm1iXH$exUP(T6Se*lLBcHe@#Ohj9gxpZh^M9Xk8%te0Pugm`yT6o2>HyD=$ay^p@! z(4s>&gCm>^rJZ(M$H#=7&Sl>^LghVO4U*an#S+y=8SxhdIV#oSJ09i?xUgK+`z!qO zBS8ig;k7l2#?^ud#9O5|X_sh0osmjHhyw%*);DQ{hNE(w6082dTwL7dp4oA-bGWA# z)IFV>Ir#A5{5Qq()84|`%Ej5swv9jTUhfo$IL`q-?y)dddZmpM7kE@PY9!l~DwR|4 z+rOj3P_F!kdS-2sUE-r_Poo=jSJMVp!EnTGHCPE;MbA+BJx{Q^O~%rjlW-MmSBjyL zG-Nlq-_Ix3#e%sRJ3WcfR?fAH%iMYv)9=!rW(+JU#0pj^;i1>n6irfjE>kyow_M1efYe#{-KFmTrcCdk%s8Suz7?N8>`zq+LoQaASyDp z<8>_GldN^dtggpAv}aIc^1+pcU>XO-q@|@L<+nn)!JAA}cSC=dc~jl!W-h)blEyxo z@MRBw@=_;usUa&}_FT>k%}u?Ux0yBwIRRQ}1?PFAI6Xbl;l|Ha0`V19Z=9TX;RrY2*PjFUW?vQcNt8_!zG z9=PyB^ue{>r*L0ro96CRrpKPcnLLAr+-}>}$*1SM#PO}wgCagJ)_dAOC-0r&Jnx;l z&flbUZqI9c;ptl5HW>2#`@Mphl5_BShM%vm8*Or%lvdW>O4i>p@H4R0GtJGd>}?v4Zi<0u zc;Rz2Y7L8h-~RAdCROD4ykkmw`UNf>rca+fm3XzhB?}1XA0H1d@s0lZ`s2)|tdc9z zW)f_5Fj)fsTVdxN)I=7?@dXs|s2)gBh=>wFLBW8m90+p?D<0XYp#f&as@!jVTuU2E;EaNam7iuJ+ zfX_YVIHL}>)HVT$S9Vpye&Hmuc<)ggYnuz=K#LBqhIP-Fs>#H$975XA#|eX9WHv}V zz9b0=2?36RTn$YPvk9=GBksYDcQU&hC%sLAgQZm{B6mv9r3Ei!p))n_S@_HZimj}< zy-dE{qB{vxexK6ZT*e*Sj5r2J&A4%n*6-r|@Y)FDngaRl{7{nd^Yq9FH&v6oXC#AR z03oc@D+R#3du}a=Qhwb=b)Y7SnT;(HbAh`|B4Tw=&CRh(Z$#y}u3{}vecg&vZCU8$ z>V)kO%&9`$_K#n@--1gelXD+)!@_-d$BUu^NVqegs*vaviuN&1MIuE6e|vMdr&nnk zRCS)5xn#5|F3uVV^O!se$j>D}D-qaVrC+Zn1ZUwgkKI3eAbheZ-B!i=td$i6>Jy)B zke1uj4e6svO1meeOm`u$bR?X|VsmokBrIk&Z?(3zjjxilVR>K&eKnWTKg+Y`n5Rv2 z?9C$)TT#*7ViYA(%bbuy1Q?Yp0Ma$l}n5od($iFkfi_BO1hedUp24XoAI) zKHh?Rf1snH#I*z_%wBy|GN0q!p46 zuREGXmVGOG*Skcq$k`oXCZe`tP^z`-hZ8JQ$Tsz;P3T<|)$7Hy`!A)1Z&4uD0 z0%(;C>5`8CVwc=0GRCMqN^-`;U`4=!UaJCH5 zC6V5I@Wn2C+$(JvyTVZGzoZ1bqNsksW_Cv6fZbg!p>G=|Cz6B8yA3tSZ;v`N>*qzj z>RsJlg(!49GR={WIDt4Z6xNm&%x%*)IYw4dabkY5KkeTi#b+Zm#sU>t+7mq0t^kQ8 z4u6RO#oS$a_P_@gt7!pnrE3F=IzQg2Sl&Bs3@f^p-As-MG-mn@N1k&gZ*C&RmK)v3y{d0PxyDkdio$k1o0* z)$nZ-t>FYqj-C(luTDTc)jcUW#%jy03Rpy^rjZNhYltCYv7+{6fa0g#wn5FWC=`Lz zG=bcS=hJ=g=~vB^D_G(7>+xE9Wd(1LC?3kP?w}T?@`ze#dzW-CMS$-VnHk;%g%4S5 zkiCuLeXT*EI(}qwLSPifAjp!jSUeyeas!q^W-6-OAUg{{( z<}Yv2RowVzC_Bsn)e!ZS(5l^*<>xeDqi_Teyn?6_p!9u}bLxx-NBBViZI~f11@7e0 z$=9DGA4iDjnDzMKH{*X+V*qESbpEeH tMJg*Fo1Pyb#UI}M-RPpI|6G_C&6UkizUV^B1+_QG+!SL{^7F;GKLF=7|F!@C literal 0 HcmV?d00001 From f45824a047a1f314333fbf1e41d68b341ba9bc39 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Tue, 6 Aug 2019 17:08:32 -0700 Subject: [PATCH 018/285] API explorer content --- .../microsoft-defender-atp/api-explorer.md | 40 +++++++++++++++++-- 1 file changed, 37 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md b/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md index 674e2659d6..71742bdb8d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md @@ -1,8 +1,8 @@ --- title: API explorer in Microsoft Defender ATP ms.reviewer: -description: -keywords: +description: Use the API explorer to construct and perform API queries, test and send requests for any available API +keywords: api, explorer, send, request, get, post, search.product: eADQiWindows 10XVcnh search.appverid: met150 ms.prod: w10 @@ -19,4 +19,38 @@ ms.topic: conceptual --- # API explorer -With the API explorer you can quickly get started with trying out \ No newline at end of file +The Microsoft Defender ATP API explorer is a tool that helps you explore various Microsoft Defender ATP APIs interactively. + +The API explorer makes it easy to construct and perform API queries, test and send requests for any available API. + +The tool is useful during app development because it allows you to perform API queries that respect your user access settings, reducing the need to generate access tokens. + +You can also use the tool to explore the gallery of sample queries, copy result code samples, and generate debug information. + +With the API explorer, you can: + +- Run requests for any method and see responses in real-time +- Quickly browse through the API samples and learn what parameters they support +- Make API calls with ease; no need to authenticate beyond the management portal sign-in + +## Access API explorer +From the left navigation menu, select **Partners & APIs** > **API explorer**. + +## Supported APIs +API explorer supports all the APIs offered by Microsoft Defender ATP. + +The list of supported APIs is available in the [APIs documentation](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/apis-intro). + +## Get started with the API explorer +1. In the left pane, there is a list of sample requests that you can use. +2. Follow the links and click **Run query**. + +Some of the samples may require specifying a parameter in the URL, for example, {machine- id}. + +## FAQ +**Do I need to have an API token to use the API explorer?**
+Credentials to access an API are not needed since the API explorer uses the Microsoft Defender ATP management portal token whenever it makes a request. + +The logged-in user authentication credential is used to verify that the API explorer is authorized to access data on your behalf. + +Specific API requests are limited based on your RBAC privileges; for example, a request to "Submit indicator" is limited to the security admin role. From bf38b7a3be1e2e1bd7b15810b22cd051b70aa3cf Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Tue, 6 Aug 2019 17:10:58 -0700 Subject: [PATCH 019/285] author --- .../threat-protection/microsoft-defender-atp/api-explorer.md | 2 +- .../microsoft-defender-atp/connected-applications.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md b/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md index 71742bdb8d..8bf1ac2796 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -ms.author: mjcaparas +ms.author: macapara author: mjcaparas ms.localizationpriority: medium manager: dansimp diff --git a/windows/security/threat-protection/microsoft-defender-atp/connected-applications.md b/windows/security/threat-protection/microsoft-defender-atp/connected-applications.md index a1d8a2c5b6..17f6134519 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/connected-applications.md +++ b/windows/security/threat-protection/microsoft-defender-atp/connected-applications.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -ms.author: mjcaparas +ms.author: macapara author: mjcaparas ms.localizationpriority: medium manager: dansimp From 5d899238a0f16df6f844571722d746a3eecac606 Mon Sep 17 00:00:00 2001 From: jcaparas Date: Wed, 7 Aug 2019 13:49:08 -0700 Subject: [PATCH 020/285] Update api-explorer.md --- .../threat-protection/microsoft-defender-atp/api-explorer.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md b/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md index 8bf1ac2796..dfbb4e2bd2 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md @@ -21,7 +21,7 @@ ms.topic: conceptual # API explorer The Microsoft Defender ATP API explorer is a tool that helps you explore various Microsoft Defender ATP APIs interactively. -The API explorer makes it easy to construct and perform API queries, test and send requests for any available API. +The API explorer makes it easy to construct and perform API queries, test and send requests for any available API. You can also use the API explorer to perform actions or find data that might not yet be available through the user interface. The tool is useful during app development because it allows you to perform API queries that respect your user access settings, reducing the need to generate access tokens. From e701fd54a3f4011e3824b01e37f09445ddc73e80 Mon Sep 17 00:00:00 2001 From: jcaparas Date: Wed, 7 Aug 2019 13:50:36 -0700 Subject: [PATCH 021/285] Update api-explorer.md --- .../threat-protection/microsoft-defender-atp/api-explorer.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md b/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md index dfbb4e2bd2..7dffcc8430 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md @@ -21,7 +21,7 @@ ms.topic: conceptual # API explorer The Microsoft Defender ATP API explorer is a tool that helps you explore various Microsoft Defender ATP APIs interactively. -The API explorer makes it easy to construct and perform API queries, test and send requests for any available API. You can also use the API explorer to perform actions or find data that might not yet be available through the user interface. +The API explorer makes it easy to construct and perform API queries, test and send requests for any available Microsoft Defender ATP API endpoint. You can also use the API explorer to perform actions or find data that might not yet be available through the user interface. The tool is useful during app development because it allows you to perform API queries that respect your user access settings, reducing the need to generate access tokens. From 590cb203cee8e6444e9de1592be7859ac6baaeaf Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Thu, 8 Aug 2019 16:21:42 -0700 Subject: [PATCH 022/285] add preview --- .../microsoft-defender-atp/api-explorer.md | 5 +++++ .../microsoft-defender-atp/connected-applications.md | 6 +++++- .../threat-protection/microsoft-defender-atp/preview.md | 4 ++++ 3 files changed, 14 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md b/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md index 7dffcc8430..9163909719 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md @@ -19,6 +19,11 @@ ms.topic: conceptual --- # API explorer +**Applies to:** +- [Microsoft Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) + +[!include[Prerelease information](prerelease.md)] + The Microsoft Defender ATP API explorer is a tool that helps you explore various Microsoft Defender ATP APIs interactively. The API explorer makes it easy to construct and perform API queries, test and send requests for any available Microsoft Defender ATP API endpoint. You can also use the API explorer to perform actions or find data that might not yet be available through the user interface. diff --git a/windows/security/threat-protection/microsoft-defender-atp/connected-applications.md b/windows/security/threat-protection/microsoft-defender-atp/connected-applications.md index 17f6134519..97adf97d65 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/connected-applications.md +++ b/windows/security/threat-protection/microsoft-defender-atp/connected-applications.md @@ -19,6 +19,10 @@ ms.topic: conceptual --- # Connected applications in Microsoft Defender ATP +**Applies to:** +- [Microsoft Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) + +[!include[Prerelease information](prerelease.md)] Connected applications integrates with the Microsoft Defender ATP platform using APIs. @@ -31,7 +35,7 @@ From the left navigation menu, select **Partners & APIs** > **Connected AAD appl ## View connected application details -The Connected applications page provides information about the Azure AD appplications connected to Microsoft Defender ATP in your organization. You can review the usage of the connected applications: last seen, number of requests in the past 24 hours, and request trends in the last 30 days. +The Connected applications page provides information about the Azure AD applications connected to Microsoft Defender ATP in your organization. You can review the usage of the connected applications: last seen, number of requests in the past 24 hours, and request trends in the last 30 days. ![Image of connected apps](images/connected-apps.png) diff --git a/windows/security/threat-protection/microsoft-defender-atp/preview.md b/windows/security/threat-protection/microsoft-defender-atp/preview.md index a18bcddf2c..4cac5d98c1 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/preview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/preview.md @@ -42,6 +42,10 @@ Turn on the preview experience setting to be among the first to try upcoming fea ## Preview features The following features are included in the preview release: +- [Connected Azure AD applications](connected-applications.md)
The Connected applications page provides information about the Azure AD applications connected to Microsoft Defender ATP in your organization. + +- [API explorer](api-explorer.md)
The API explorer makes it easy to construct and perform API queries, test and send requests for any available Microsoft Defender ATP API endpoint. + - [Evaluation lab](evaluation-lab.md)
The Microsoft Defender ATP evaluation lab is designed to eliminate the complexities of machine and environment configuration so that you can focus on evaluating the capabilities of the platform, running simulations, and seeing the prevention, detection, and remediation features in action. From b494098d24553cc68d407d9919b05e7bfc25fbe3 Mon Sep 17 00:00:00 2001 From: Bryan Dam Date: Tue, 13 Aug 2019 07:47:44 -0400 Subject: [PATCH 023/285] Update windows/deployment/update/waas-servicing-differences.md Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- windows/deployment/update/waas-servicing-differences.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/update/waas-servicing-differences.md b/windows/deployment/update/waas-servicing-differences.md index b27d02f262..b6e7746653 100644 --- a/windows/deployment/update/waas-servicing-differences.md +++ b/windows/deployment/update/waas-servicing-differences.md @@ -86,7 +86,7 @@ Moving to the cumulative model for legacy OS versions continues to improve predi Lastly, the cumulative update model directly impacts the public Preview releases offered in the 3rd and/or 4th weeks of the month. Update Tuesday, also referred to as the "B" week release occurs on the second Tuesday of the month. It is always a required security update across all operating systems. In addition to this monthly release, Windows also releases non-security update "previews" targeting the 3rd (C) and the 4th (D) weeks of the month. These preview releases include that month’s B-release plus a set of non-security updates for testing and validation as a cumulative package. We recommend IT Administrators uses the C/D previews to test the update in their environments. Any issues identified with the updates in the C/D releases are identified and then fixed or removed, prior to being rolled up in to the next month’s B release package together with new security updates. Security-only Packages are not part of the C/D preview program. > [!NOTE] -> Only preview updates for the most recent release of Windows 10 are published to Windows Server Update Services (WSUS). For customers using the WSUS channel, and products such as System Center Configuration Manager that rely on it, will not see preview updates for older versions of Windows 10. +> Only preview updates for the most recent release of Windows 10 are published to Windows Server Update Services (WSUS). For customers using the WSUS channel, and products such as System Center Configuration Manager that rely on it, will not see preview updates for older versions of Windows 10. > [!NOTE] > Preview updates for Windows 10 are not named differently than their LCU counterparts and do not contain the word 'Preview'. They can be identified by their release date (C or D week) and their classification as non-security updates. From 7b92d8e4e70972bd096f3a8808e1ee44ea12a1bc Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Wed, 14 Aug 2019 10:30:34 +0500 Subject: [PATCH 024/285] Updated the document Updated the steps in the document related to Windows Analytics Solutions. Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/4392 --- .../windows-analytics-FAQ-troubleshooting.md | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/windows/deployment/update/windows-analytics-FAQ-troubleshooting.md b/windows/deployment/update/windows-analytics-FAQ-troubleshooting.md index 423c82f71c..55b621454e 100644 --- a/windows/deployment/update/windows-analytics-FAQ-troubleshooting.md +++ b/windows/deployment/update/windows-analytics-FAQ-troubleshooting.md @@ -8,8 +8,10 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: deploy -audience: itpro author: greg-lindsay -ms.audience: itpro author: greg-lindsay +audience: itpro +author: greg-lindsay +ms.audience: itpro +author: greg-lindsay ms.localizationpriority: medium ms.collection: M365-analytics ms.topic: article @@ -53,12 +55,12 @@ If you've followed the steps in the [Enrolling devices in Windows Analytics](win ### Devices not appearing in Upgrade Readiness -In Log Analytics, go to **Settings > Connected sources > Windows telemetry** and verify that you are subscribed to the Windows Analytics solutions you intend to use. +In Log Analytics, go to **Solutions** and verify that you are subscribed to the Windows Analytics solutions you intend to use. Even though devices can take 2-3 days after enrollment to show up due to latency in the system, you can now verify the status of your devices within a few hours of running the deployment script as described in [You can now check on the status of your computers within hours of running the deployment script](https://techcommunity.microsoft.com/t5/Windows-Analytics-Blog/You-can-now-check-on-the-status-of-your-computers-within-hours/ba-p/187213) on the Tech Community Blog. >[!NOTE] -> If you generate the status report and get an error message saying "Sorry! We’re not recognizing your Commercial Id," go to **Settings > Connected sources > Windows telemetry** remove the Upgrade Readiness solution, and then re-add it. +> If you generate the status report and get an error message saying "Sorry! We’re not recognizing your Commercial Id, See [Enrolling devices in Windows Analytics.](https://docs.microsoft.com/windows/deployment/update/windows-analytics-get-started) If devices are not showing up as expected, find a representative device and follow these steps to run the latest pilot version of the Upgrade Readiness deployment script on it to troubleshoot issues: @@ -230,9 +232,7 @@ We have identified an incompatibility between AbnormalShutdownCount and the Limi If you want to stop using Upgrade Readiness and stop sending diagnostic data to Microsoft, follow these steps: -1. Unsubscribe from the Upgrade Readiness solution in Azure Portal. In Azure Portal, go to **Settings** > **Connected Sources** > **Windows Telemetry** and choose the **Unsubscribe** option. - - ![Upgrade Readiness unsubscribe](images/upgrade-analytics-unsubscribe.png) +1. Delete the Upgrade Readiness Solution in Log Analytics Workspace. In Log Analytics Workspace go to, **Solutions > Compatibility Assessment > Delete** 2. Disable the Commercial Data Opt-in Key on computers running Windows 7 SP1 or 8.1. On computers running Windows 10, set the diagnostic data level to **Security**: From 65b2a960682eb4d89a09560a768e7c743ae1b94a Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Thu, 15 Aug 2019 09:42:13 +0500 Subject: [PATCH 025/285] Update windows/deployment/update/windows-analytics-FAQ-troubleshooting.md Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- .../deployment/update/windows-analytics-FAQ-troubleshooting.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/update/windows-analytics-FAQ-troubleshooting.md b/windows/deployment/update/windows-analytics-FAQ-troubleshooting.md index 55b621454e..2eefdcaaa8 100644 --- a/windows/deployment/update/windows-analytics-FAQ-troubleshooting.md +++ b/windows/deployment/update/windows-analytics-FAQ-troubleshooting.md @@ -60,7 +60,7 @@ In Log Analytics, go to **Solutions** and verify that you are subscribed to the Even though devices can take 2-3 days after enrollment to show up due to latency in the system, you can now verify the status of your devices within a few hours of running the deployment script as described in [You can now check on the status of your computers within hours of running the deployment script](https://techcommunity.microsoft.com/t5/Windows-Analytics-Blog/You-can-now-check-on-the-status-of-your-computers-within-hours/ba-p/187213) on the Tech Community Blog. >[!NOTE] -> If you generate the status report and get an error message saying "Sorry! We’re not recognizing your Commercial Id, See [Enrolling devices in Windows Analytics.](https://docs.microsoft.com/windows/deployment/update/windows-analytics-get-started) +> If you generate the status report and get an error message saying "Sorry! We’re not recognizing your Commercial Id, See [Enrolling devices in Windows Analytics](https://docs.microsoft.com/windows/deployment/update/windows-analytics-get-started). If devices are not showing up as expected, find a representative device and follow these steps to run the latest pilot version of the Upgrade Readiness deployment script on it to troubleshoot issues: From 8725c0be012209e1840e2ea454815267411d0941 Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Fri, 16 Aug 2019 09:21:41 +0500 Subject: [PATCH 026/285] Update windows/deployment/update/windows-analytics-FAQ-troubleshooting.md Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com> --- .../deployment/update/windows-analytics-FAQ-troubleshooting.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/update/windows-analytics-FAQ-troubleshooting.md b/windows/deployment/update/windows-analytics-FAQ-troubleshooting.md index 2eefdcaaa8..32a276b7f1 100644 --- a/windows/deployment/update/windows-analytics-FAQ-troubleshooting.md +++ b/windows/deployment/update/windows-analytics-FAQ-troubleshooting.md @@ -232,7 +232,7 @@ We have identified an incompatibility between AbnormalShutdownCount and the Limi If you want to stop using Upgrade Readiness and stop sending diagnostic data to Microsoft, follow these steps: -1. Delete the Upgrade Readiness Solution in Log Analytics Workspace. In Log Analytics Workspace go to, **Solutions > Compatibility Assessment > Delete** +1. Delete the Upgrade Readiness solution in Log Analytics workspace. In Log Analytics workspace. select **Solutions** > **Compatibility Assessment** > **Delete**. 2. Disable the Commercial Data Opt-in Key on computers running Windows 7 SP1 or 8.1. On computers running Windows 10, set the diagnostic data level to **Security**: From 3db6bf270ca90563db0fbd7418bf978c2c26a861 Mon Sep 17 00:00:00 2001 From: Brent Kendall Date: Fri, 16 Aug 2019 14:15:36 -0700 Subject: [PATCH 027/285] Update autopilot-support.md Remove redundant line (PFE was the old term for an Ecosystem PM). And added new alias for Ecosystem PMs (after discussing all this with the Ecosystem PM managers). --- windows/deployment/windows-autopilot/autopilot-support.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/deployment/windows-autopilot/autopilot-support.md b/windows/deployment/windows-autopilot/autopilot-support.md index b3e02db65f..b93ac48408 100644 --- a/windows/deployment/windows-autopilot/autopilot-support.md +++ b/windows/deployment/windows-autopilot/autopilot-support.md @@ -7,7 +7,8 @@ ms.mktglfcycl: deploy ms.localizationpriority: low ms.sitesec: library ms.pagetype: deploy -audience: itpro author: greg-lindsay +audience: itpro +author: greg-lindsay ms.author: greglin ms.date: 10/31/2018 ms.reviewer: @@ -29,9 +30,8 @@ Before contacting the resources listed below for Windows Autopilot-related issue |---------------------------------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | OEM or Channel Partner registering devices as a CSP (via MPC) | Use the help resources available in MPC. Whether you are a named partner or a channel partner (distributor, reseller, SI, etc.), if you’re a CSP registering Autopilot devices through MPC (either manually or through the MPC API), your first-line of support should be the help resources within MPC. | | OEM registering devices using OEM Direct API | Contact MSOEMOPS@microsoft.com. Response time depends on priority:
Low – 120 hours
Normal – 72 hours
High – 24 hours
Immediate – 4 hours | -| OEM with a PFE | Reach out to your PFE for support. | | Partners with a Partner Technology Strategist (PTS) | If you have a PTS (whether you’re a CSP or not), you may first try working through your account’s specific Partner Technology Strategist (PTS). | -| Partners with an Ecosystem PM | If you have an Ecosystem PM (whether you’re a CSP or not), you may first try working through your account’s specific Ecosystem PM, especially for technical issues. | +| Partners with an Ecosystem PM | If you have an Ecosystem PM (whether you’re a CSP or not), you may first try working through your account’s specific Ecosystem PM, especially for technical issues. To learn more about Ecosystem PMs and the services they offer, contact epsoinfo@microsoft.com. | | Enterprise customers | Contact your Technical Account Manager (TAM), or Account Technology Strategist (ATS), or Customer Service Support (CSS) representative. | | End-user | Contact your IT administrator. | | Microsoft Partner Center (MPC) users | Use the [help resources](https://partner.microsoft.com/support) available in MPC. | From 6f3b63649781d7be170f97d169479ddfc570bdec Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Sat, 17 Aug 2019 10:35:03 +0500 Subject: [PATCH 028/285] Terminology Correction Terminology Correction --- .../deployment/update/windows-analytics-FAQ-troubleshooting.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/update/windows-analytics-FAQ-troubleshooting.md b/windows/deployment/update/windows-analytics-FAQ-troubleshooting.md index 32a276b7f1..8ba5c114c5 100644 --- a/windows/deployment/update/windows-analytics-FAQ-troubleshooting.md +++ b/windows/deployment/update/windows-analytics-FAQ-troubleshooting.md @@ -55,7 +55,7 @@ If you've followed the steps in the [Enrolling devices in Windows Analytics](win ### Devices not appearing in Upgrade Readiness -In Log Analytics, go to **Solutions** and verify that you are subscribed to the Windows Analytics solutions you intend to use. +In Log Analytics workspace, go to **Solutions** and verify that you are subscribed to the Windows Analytics solutions you intend to use. Even though devices can take 2-3 days after enrollment to show up due to latency in the system, you can now verify the status of your devices within a few hours of running the deployment script as described in [You can now check on the status of your computers within hours of running the deployment script](https://techcommunity.microsoft.com/t5/Windows-Analytics-Blog/You-can-now-check-on-the-status-of-your-computers-within-hours/ba-p/187213) on the Tech Community Blog. From 51b22e4cfce1e7609c112be2235c595c999e8a1f Mon Sep 17 00:00:00 2001 From: Adam Gross Date: Sat, 17 Aug 2019 14:56:14 -0500 Subject: [PATCH 029/285] Incorrect Command Line Arguments According to this doc https://docs.microsoft.com/en-us/windows-hardware/manufacture/desktop/windows-setup-command-line-options the correct command line argument for ignoring dismissable warnings is /Compat IgnoreWarning not /compat /ignore warning as specified here in the docs. Also, the same incorrect message is included in the setupdiag.exe, so when the report is generated, it is providing incorrect guidance. --- windows/deployment/upgrade/setupdiag.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/upgrade/setupdiag.md b/windows/deployment/upgrade/setupdiag.md index 355c0da246..edc918ffb2 100644 --- a/windows/deployment/upgrade/setupdiag.md +++ b/windows/deployment/upgrade/setupdiag.md @@ -211,7 +211,7 @@ Each rule name and its associated unique rule identifier are listed with a descr 8. CompatBlockedApplicationAutoUninstall – BEBA5BC6-6150-413E-8ACE-5E1EC8D34DD5 - This rule indicates there is an application that needs to be uninstalled before setup can continue. 9. CompatBlockedApplicationDismissable - EA52620B-E6A0-4BBC-882E-0686605736D9 - - When running setup in /quiet mode, there are dismissible application messages that turn into blocks unless the command line also specifies “/compat /ignore warning”. This rule indicates setup was executed in /quiet mode but there is an application dismissible block message that have prevented setup from continuing. + - When running setup in /quiet mode, there are dismissible application messages that turn into blocks unless the command line also specifies “/compat ignorewarning”. This rule indicates setup was executed in /quiet mode but there is an application dismissible block message that have prevented setup from continuing. 10. CompatBlockedApplicationManualUninstall - 9E912E5F-25A5-4FC0-BEC1-CA0EA5432FF4 - This rule indicates that an application without an Add/Remove Programs entry, is present on the system and blocking setup from continuing. This typically requires manual removal of the files associated with this application to continue. 11. HardblockDeviceOrDriver - ED3AEFA1-F3E2-4F33-8A21-184ADF215B1B From 88f69339a1a2ed2653c68c9b1fd743b907727f59 Mon Sep 17 00:00:00 2001 From: DocsPreview <49669258+DocsPreview@users.noreply.github.com> Date: Mon, 19 Aug 2019 14:45:06 -0700 Subject: [PATCH 030/285] Merge changes from master to live (#950) * v 1.6 * removed a known issue * removed references to CB, CBB * Latest changes for publish today (#949) --- .../manage-windows-updates-for-surface-hub.md | 3 +- devices/surface/ltsb-for-surface.md | 13 +- windows/deployment/deploy-whats-new.md | 369 +++++++++--------- windows/deployment/upgrade/setupdiag.md | 95 +++-- .../resolved-issues-windows-10-1607.yml | 8 +- .../resolved-issues-windows-10-1703.yml | 6 - .../resolved-issues-windows-10-1709.yml | 8 +- .../resolved-issues-windows-10-1803.yml | 18 +- ...indows-10-1809-and-windows-server-2019.yml | 2 + ...ndows-7-and-windows-server-2008-r2-sp1.yml | 19 +- ...windows-8.1-and-windows-server-2012-r2.yml | 16 +- ...esolved-issues-windows-server-2008-sp2.yml | 14 +- .../resolved-issues-windows-server-2012.yml | 16 +- ...indows-10-1607-and-windows-server-2016.yml | 4 +- .../status-windows-10-1709.yml | 4 +- .../status-windows-10-1803.yml | 8 +- ...indows-10-1809-and-windows-server-2019.yml | 4 +- .../status-windows-10-1903.yml | 4 +- ...ndows-7-and-windows-server-2008-r2-sp1.yml | 4 +- ...windows-8.1-and-windows-server-2012-r2.yml | 4 +- .../status-windows-server-2008-sp2.yml | 4 +- .../status-windows-server-2012.yml | 4 +- 22 files changed, 317 insertions(+), 310 deletions(-) diff --git a/devices/surface-hub/manage-windows-updates-for-surface-hub.md b/devices/surface-hub/manage-windows-updates-for-surface-hub.md index 01c378c14a..4535bd1f1b 100644 --- a/devices/surface-hub/manage-windows-updates-for-surface-hub.md +++ b/devices/surface-hub/manage-windows-updates-for-surface-hub.md @@ -10,7 +10,6 @@ ms.sitesec: library author: dansimp ms.author: dansimp ms.topic: article -ms.date: 06/20/2019 ms.localizationpriority: medium --- @@ -69,7 +68,7 @@ This table gives examples of deployment rings. | Deployment ring | Ring size | Servicing branch | Deferral for feature updates | Deferral for quality updates (security fixes, drivers, and other updates) | Validation step | | --------- | --------- | --------- | --------- | --------- | --------- | -| Preview (e.g. non-critical or test devices) | Small | Semi-annual channel (Targeted) | None. | None. | Manually test and evaluate new functionality. Pause updates if there are issues. | +| Preview (e.g. non-critical or test devices) | Small | Windows Insider Preview | None. | None. | Manually test and evaluate new functionality. Pause updates if there are issues. | | Release (e.g. devices used by select teams) | Medium | Semi-annual channel | None. | None. | Monitor device usage and user feedback. Pause updates if there are issues. | | Broad deployment (e.g. most of the devices in your organization) | Large | Semi-annual channel | 120 days after release. | 7-14 days after release. | Monitor device usage and user feedback. Pause updates if there are issues. | | Mission critical (e.g. devices in executive boardrooms) | Small | Semi-annual channel | 180 days after release (maximum deferral for feature updates). | 30 days after release (maximum deferral for quality updates). | Monitor device usage and user feedback. | diff --git a/devices/surface/ltsb-for-surface.md b/devices/surface/ltsb-for-surface.md index d7e5bdc7d7..225135d993 100644 --- a/devices/surface/ltsb-for-surface.md +++ b/devices/surface/ltsb-for-surface.md @@ -1,5 +1,5 @@ --- -title: Long-Term Servicing Branch for Surface devices (Surface) +title: Long-Term Servicing Channel for Surface devices (Surface) description: LTSB is not supported for general-purpose Surface devices and should be used for specialized devices only. ms.prod: w10 ms.mktglfcycl: manage @@ -8,26 +8,25 @@ ms.sitesec: library author: dansimp ms.author: dansimp ms.topic: article -ms.date: 04/25/2017 ms.reviewer: manager: dansimp --- -# Long-Term Servicing Branch (LTSB) for Surface devices +# Long-Term Servicing Channel (LTSC) for Surface devices >[!WARNING] >For updated information on this topic, see [Surface device compatibility with Windows 10 Long-Term Servicing Channel](surface-device-compatibility-with-windows-10-ltsc.md). For additional information on this update, see the [Documentation Updates for Surface and Windows 10 LTSB Compatibility](https://blogs.technet.microsoft.com/surface/2017/04/11/documentation-updates-for-surface-and-windows-10-ltsb-compatibility) post on the Surface Blog for IT Pros. -General-purpose Surface devices running Long-Term Servicing Branch (LTSB) are not supported. As a general guideline, if a Surface device runs productivity software, such as Microsoft Office, it is a general-purpose device that does not qualify for LTSB and should instead run Current Branch (CB) or Current Branch for Business (CBB). +General-purpose Surface devices in the Long-Term Servicing Channel (LTSC) are not supported. As a general guideline, if a Surface device runs productivity software, such as Microsoft Office, it is a general-purpose device that does not qualify for LTSC and should instead be on the Semi-Annual Channel. >[!NOTE] >For more information about the servicing branches, see [Overview of Windows as a service](https://technet.microsoft.com/itpro/windows/manage/waas-overview). -LTSB prevents Surface devices from receiving critical Windows 10 feature updates and certain non-security servicing updates. Customers with poor experiences using Surface devices in the LTSB configuration will be instructed to upgrade to CB or CBB. Furthermore, the Windows 10 Enterprise LTSB edition removes core features of Surface devices, including seamless inking and touch-friendly applications. It does not contain key in-box applications including Microsoft Edge, OneNote, Calendar or Camera. Therefore, productivity is impacted and functionality is limited. LTSB is not supported as a suitable servicing solution for general-purpose Surface devices. +LTSC prevents Surface devices from receiving critical Windows 10 feature updates and certain non-security servicing updates. Customers with poor experiences using Surface devices in the LTSC configuration will be instructed to switch to the Semi-Annual Channel. Furthermore, the Windows 10 Enterprise LTSB edition removes core features of Surface devices, including seamless inking and touch-friendly applications. It does not contain key in-box applications including Microsoft Edge, OneNote, Calendar or Camera. Therefore, productivity is impacted and functionality is limited. LTSC is not supported as a suitable servicing solution for general-purpose Surface devices. -General-purpose Surface devices are intended to run CB or CBB to receive full servicing and firmware updates and forward compatibility with the introduction of new Surface features. With CB, feature updates are available as soon as Microsoft releases them. Customers in the CBB servicing model receive the same build of Windows 10 as those in CB, at a later date. +General-purpose Surface devices are intended to run on the Semi-Annual Channel to receive full servicing and firmware updates and forward compatibility with the introduction of new Surface features. In the Semi-Annual Channel, feature updates are available as soon as Microsoft releases them. -Surface devices in specialized scenarios–such as PCs that control medical equipment, point-of-sale systems, and ATMs–may consider the use of LTSB. These special-purpose systems typically perform a single task and do not require feature updates as frequently as other devices in the organization. +Surface devices in specialized scenarios–such as PCs that control medical equipment, point-of-sale systems, and ATMs–might consider the use of LTSC. These special-purpose systems typically perform a single task and do not require feature updates as frequently as other devices in the organization. diff --git a/windows/deployment/deploy-whats-new.md b/windows/deployment/deploy-whats-new.md index 85ffed51b0..e32aae1631 100644 --- a/windows/deployment/deploy-whats-new.md +++ b/windows/deployment/deploy-whats-new.md @@ -1,184 +1,185 @@ ---- -title: What's new in Windows 10 deployment -ms.reviewer: -manager: laurawi -ms.author: greglin -description: Changes and new features related to Windows 10 deployment -keywords: deployment, automate, tools, configure, news -ms.mktglfcycl: deploy -ms.localizationpriority: medium -ms.prod: w10 -ms.sitesec: library -ms.pagetype: deploy -audience: itpro author: greg-lindsay -ms.topic: article ---- - -# What's new in Windows 10 deployment - -**Applies to** -- Windows 10 - -## In this topic - -This topic provides an overview of new solutions and online content related to deploying Windows 10 in your organization. - -- For an all-up overview of new features in Windows 10, see [What's new in Windows 10](https://docs.microsoft.com/windows/whats-new/index). -- For a detailed list of changes to Windows 10 ITPro TechNet library content, see [Online content change history](#online-content-change-history). - -## Recent additions to this page - -[SetupDiag](#setupdiag) 1.4.1 is released.
-The [Windows ADK for Windows 10, version 1903](https://docs.microsoft.com/windows-hardware/get-started/adk-install) is available.
-New [Windows Autopilot](#windows-autopilot) content is available.
-[Windows 10 Subscription Activation](#windows-10-subscription-activation) now supports Windows 10 Education. - -## The Modern Desktop Deployment Center - -The [Modern Desktop Deployment Center](https://docs.microsoft.com/microsoft-365/enterprise/desktop-deployment-center-home) has launched with tons of content to help you with large-scale deployment of Windows 10 and Office 365 ProPlus. - -## Microsoft 365 - -Microsoft 365 is a new offering from Microsoft that combines -- Windows 10 -- Office 365 -- Enterprise Mobility and Security (EMS). - -See [Deploy Windows 10 with Microsoft 365](deploy-m365.md) for an overview, which now includes a link to download a nifty [M365 Enterprise poster](deploy-m365.md#m365-enterprise-poster). - -## Windows 10 servicing and support - -- [**Delivery Optimization**](https://docs.microsoft.com/windows/deployment/update/waas-delivery-optimization): Improved Peer Efficiency for enterprises and educational institutions with complex networks is enabled with of [new policies](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-deliveryoptimization). This now supports Office 365 ProPlus updates, and Intune content, with System Center Configuration Manager content coming soon! -- [**Automatic Restart Sign-on (ARSO)**](https://docs.microsoft.com/windows-insider/at-work-pro/wip-4-biz-whats-new#automatic-restart-and-sign-on-arso-for-enterprises-build-18305): Windows will automatically logon as the user and lock their device in order to complete the update, ensuring that when the user returns and unlocks the device, the update will be completed. -- [**Windows Update for Business**](https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-Update-for-Business-and-the-retirement-of-SAC-T/ba-p/339523): There will now be a single, common start date for phased deployments (no more SAC-T designation). In addition, there will a new notification and reboot scheduling experience for end users, the ability to enforce update installation and reboot deadlines, and the ability to provide end user control over reboots for a specific time period. -- **Update rollback improvements**: You can now automatically recover from startup failures by removing updates if the startup failure was introduced after the installation of recent driver or quality updates. When a device is unable to start up properly after the recent installation of Quality of driver updates, Windows will now automatically uninstall the updates to get the device back up and running normally. -- **Pause updates**: We have extended the ability to pause updates for both feature and monthly updates. This extension ability is for all editions of Windows 10, including Home. You can pause both feature and monthly updates for up to 35 days (seven days at a time, up to five times). Once the 35-day pause period is reached, you will need to update your device before pausing again. -- **Improved update notifications**: When there’s an update requiring you to restart your device, you’ll see a colored dot on the Power button in the Start menu and on the Windows icon in your taskbar. -- **Intelligent active hours**: To further enhance active hours, users will now have the option to let Windows Update intelligently adjust active hours based on their device-specific usage patterns. You must enable the intelligent active hours feature for the system to predict device-specific usage patterns. -- **Improved update orchestration to improve system responsiveness**: This feature will improve system performance by intelligently coordinating Windows updates and Microsoft Store updates, so they occur when users are away from their devices to minimize disruptions. - -Microsoft previously announced that we are [extending support](https://www.microsoft.com/microsoft-365/blog/2018/09/06/helping-customers-shift-to-a-modern-desktop) for Windows 10 Enterprise and Windows 10 Education editions to 30 months from the version release date. This includes all past versions and future versions that are targeted for release in September (versions ending in 09, ex: 1809). Future releases that are targeted for release in March (versions ending in 03, ex: 1903) will continue to be supported for 18 months from their release date. All releases of Windows 10 Home, Windows 10 Pro, and Office 365 ProPlus will continue to be supported for 18 months (there is no change for these editions). These support policies are summarized in the table below. - -![Support lifecycle](images/support-cycle.png) - -## Windows 10 Enterprise upgrade - -Windows 10 version 1703 includes a Windows 10 Enterprise E3 and E5 benefit to Microsoft customers with Enterprise Agreements (EA) or Microsoft Products & Services Agreements (MPSA). These customers can now subscribe users to Windows 10 Enterprise E3 or E5 and activate their subscriptions on up to five devices. Virtual machines can also be activated. For more information, see [Windows 10 Enterprise Subscription Activation](windows-10-subscription-activation.md). - -Windows 10 Enterprise E3 launched in the Cloud Solution Provider (CSP) channel on September 1, 2016. Previously, only organizations with a Microsoft Volume Licensing Agreement could deploy Windows 10 Enterprise to their users. With Windows 10 Enterprise E3 in CSP, small and medium-sized organizations can more easily take advantage of Windows 10 Enterprise features. - -For more information, see [Windows 10 Enterprise E3 in CSP](windows-10-enterprise-e3-overview.md) - - -## Deployment solutions and tools - -### Windows Autopilot - -[Windows Autopilot](https://docs.microsoft.com/windows/deployment/windows-autopilot/windows-autopilot) streamlines and automates the process of setting up and configuring new devices, with minimal interaction required from the end user. You can also use Windows Autopilot to reset, repurpose and recover devices. - -The following Windows Autopilot features are available in Windows 10, version 1903 and later: - -- [Windows Autopilot for white glove deployment](https://docs.microsoft.com/windows/deployment/windows-autopilot/white-glove) is new in Windows 10, version 1903. "White glove" deployment enables partners or IT staff to pre-provision devices so they are fully configured and business ready for your users. -- The Intune [enrollment status page](https://docs.microsoft.com/intune/windows-enrollment-status) (ESP) now tracks Intune Management Extensions​. -- [Cortana voiceover](https://docs.microsoft.com/windows-hardware/customize/desktop/cortana-voice-support) and speech recognition during OOBE is disabled by default for all Windows 10 Pro Education, and Enterprise SKUs. -- Windows Autopilot is self-updating during OOBE. Starting with the Windows 10, version 1903 Autopilot functional and critical updates will begin downloading automatically during OOBE. -- Windows Autopilot will set the [diagnostics data](https://docs.microsoft.com/windows/privacy/windows-diagnostic-data) level to Full on Windows 10 version 1903 and later during OOBE. - -### Windows 10 Subscription Activation - -Windows 10 Education support has been added to Windows 10 Subscription Activation. - -With Windows 10, version 1903, you can step-up from Windows 10 Pro Education to the enterprise-grade edition for educational institutions – Windows 10 Education. For more information, see [Windows 10 Subscription Activation](https://docs.microsoft.com/windows/deployment/windows-10-subscription-activation). - -### SetupDiag - -[SetupDiag](upgrade/setupdiag.md) is a standalone diagnostic tool that can be used to obtain details about why a Windows 10 upgrade was unsuccessful. - -SetupDiag version 1.4.1 was released on 5/17/2019. - -### Upgrade Readiness - -The Upgrade Readiness tool moved from public preview to general availability on March 2, 2017. - -Upgrade Readiness helps you ensure that applications and drivers are ready for a Windows 10 upgrade. The solution provides up-to-date application and driver inventory, information about known issues, troubleshooting guidance, and per-device readiness and tracking details. - -The development of Upgrade Readiness has been heavily influenced by input from the community the development of new features is ongoing. To begin using Upgrade Readiness, add it to an existing Operation Management Suite (OMS) workspace or sign up for a new OMS workspace with the Upgrade Readiness solution enabled. - -For more information about Upgrade Readiness, see the following topics: - -- [Windows Analytics blog](https://aka.ms/blog/WindowsAnalytics/) -- [Manage Windows upgrades with Upgrade Readiness](upgrade/manage-windows-upgrades-with-upgrade-readiness.md) - - -### Update Compliance - -Update Compliance helps you to keep Windows 10 devices in your organization secure and up-to-date. - -Update Compliance is a solution built using OMS Logs and Analytics that provides information about installation status of monthly quality and feature updates. Details are provided about the deployment progress of existing updates and the status of future updates. Information is also provided about devices that might need attention to resolve issues. - -For more information about Update Compliance, see [Monitor Windows Updates with Update Compliance](update/update-compliance-monitor.md). - -### Device Health - -Device Health is the newest Windows Analytics solution that complements the existing Upgrade Readiness and Update Compliance solutions by helping to identify devices crashes and the cause. Device drivers that are causing crashes are identified along with alternative drivers that might reduce the number of crashes. Windows Information Protection misconfigurations are also identified. For more information, see [Monitor the health of devices with Device Health](update/device-health-monitor.md) - -### MBR2GPT - -MBR2GPT.EXE converts a disk from Master Boot Record (MBR) to GUID Partition Table (GPT) partition style without modifying or deleting data on the disk. Previously, it was necessary to image, then wipe and reload a disk to change from MBR format to GPT. - -There are many benefits to converting the partition style of a disk to GPT, including the use of larger disk partitions, added data reliability, and faster boot and shutdown speeds. The GPT format also enables you to use the Unified Extensible Firmware Interface (UEFI) which replaces the Basic Input/Output System (BIOS) firmware interface. Security features of Windows 10 that require UEFI mode include: Secure Boot, Early Launch Anti-malware (ELAM) driver, Windows Trusted Boot, Measured Boot, Device Guard, Credential Guard, and BitLocker Network Unlock. - -For more information, see [MBR2GPT.EXE](mbr-to-gpt.md). - - -### Microsoft Deployment Toolkit (MDT) - -MDT build 8456 (12/19/2018) is available, including support for Windows 10, version 1809, and Windows Server 2019. - -For more information about MDT, see the [MDT resource page](https://docs.microsoft.com/sccm/mdt/). - - -### Windows Assessment and Deployment Kit (ADK) - -The Windows Assessment and Deployment Kit (Windows ADK) contains tools that can be used by IT Pros to deploy Windows. See the following topics: - -- [What's new in ADK kits and tools](https://docs.microsoft.com/windows-hardware/get-started/what-s-new-in-kits-and-tools) -- [Windows ADK for Windows 10 scenarios for IT Pros](windows-adk-scenarios-for-it-pros.md) - - -## Testing and validation guidance - -### Windows 10 deployment proof of concept (PoC) - -The Windows 10 PoC guide enables you to test Windows 10 deployment in a virtual environment and become familiar with deployment tools such as MDT and Configuration Manager. The PoC guide provides step-by-step instructions for installing and using Hyper-V to create a virtual lab environment. The guide makes extensive use of Windows PowerShell to streamline each phase of the installation and setup. - -For more information, see the following guides: - -- [Step by step guide: Configure a test lab to deploy Windows 10](windows-10-poc.md) -- [Deploy Windows 10 in a test lab using Microsoft Deployment Toolkit](windows-10-poc-mdt.md) -- [Deploy Windows 10 in a test lab using System Center Configuration Manager](windows-10-poc-sc-config-mgr.md) - - -## Troubleshooting guidance - -[Resolve Windows 10 upgrade errors](upgrade/resolve-windows-10-upgrade-errors.md) was published in October of 2016 and will continue to be updated with new fixes. The topic provides a detailed explanation of the Windows 10 upgrade process and instructions on how to locate, interpret, and resolve specific errors that can be encountered during the upgrade process. - - -## Online content change history - -The following topics provide a change history for Windows 10 ITPro TechNet library content related to deploying and using Windows 10. - -[Change history for Deploy Windows 10](change-history-for-deploy-windows-10.md) -
[Change history for Access Protection](/windows/access-protection/change-history-for-access-protection) -
[Change history for Device Security](/windows/device-security/change-history-for-device-security) -
[Change history for Threat Protection](/windows/threat-protection/change-history-for-threat-protection) - - -## Related topics - -[Overview of Windows as a service](update/waas-overview.md) -
[Windows 10 deployment considerations](planning/windows-10-deployment-considerations.md) -
[Windows 10 release information](https://docs.microsoft.com/windows/windows-10/release-information) -
[Windows 10 Specifications & Systems Requirements](https://www.microsoft.com/en-us/windows/windows-10-specifications) -
[Windows 10 upgrade paths](upgrade/windows-10-upgrade-paths.md) -
[Windows 10 deployment tools](windows-deployment-scenarios-and-tools.md) +--- +title: What's new in Windows 10 deployment +ms.reviewer: +manager: laurawi +ms.author: greglin +description: Changes and new features related to Windows 10 deployment +keywords: deployment, automate, tools, configure, news +ms.mktglfcycl: deploy +ms.localizationpriority: medium +ms.prod: w10 +ms.sitesec: library +ms.pagetype: deploy +audience: itpro +author: greg-lindsay +ms.topic: article +--- + +# What's new in Windows 10 deployment + +**Applies to** +- Windows 10 + +## In this topic + +This topic provides an overview of new solutions and online content related to deploying Windows 10 in your organization. + +- For an all-up overview of new features in Windows 10, see [What's new in Windows 10](https://docs.microsoft.com/windows/whats-new/index). +- For a detailed list of changes to Windows 10 ITPro TechNet library content, see [Online content change history](#online-content-change-history). + +## Recent additions to this page + +[SetupDiag](#setupdiag) 1.6.0 is released.
+The [Windows ADK for Windows 10, version 1903](https://docs.microsoft.com/windows-hardware/get-started/adk-install) is available.
+New [Windows Autopilot](#windows-autopilot) content is available.
+[Windows 10 Subscription Activation](#windows-10-subscription-activation) now supports Windows 10 Education. + +## The Modern Desktop Deployment Center + +The [Modern Desktop Deployment Center](https://docs.microsoft.com/microsoft-365/enterprise/desktop-deployment-center-home) has launched with tons of content to help you with large-scale deployment of Windows 10 and Office 365 ProPlus. + +## Microsoft 365 + +Microsoft 365 is a new offering from Microsoft that combines +- Windows 10 +- Office 365 +- Enterprise Mobility and Security (EMS). + +See [Deploy Windows 10 with Microsoft 365](deploy-m365.md) for an overview, which now includes a link to download a nifty [M365 Enterprise poster](deploy-m365.md#m365-enterprise-poster). + +## Windows 10 servicing and support + +- [**Delivery Optimization**](https://docs.microsoft.com/windows/deployment/update/waas-delivery-optimization): Improved Peer Efficiency for enterprises and educational institutions with complex networks is enabled with of [new policies](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-deliveryoptimization). This now supports Office 365 ProPlus updates, and Intune content, with System Center Configuration Manager content coming soon! +- [**Automatic Restart Sign-on (ARSO)**](https://docs.microsoft.com/windows-insider/at-work-pro/wip-4-biz-whats-new#automatic-restart-and-sign-on-arso-for-enterprises-build-18305): Windows will automatically logon as the user and lock their device in order to complete the update, ensuring that when the user returns and unlocks the device, the update will be completed. +- [**Windows Update for Business**](https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-Update-for-Business-and-the-retirement-of-SAC-T/ba-p/339523): There will now be a single, common start date for phased deployments (no more SAC-T designation). In addition, there will a new notification and reboot scheduling experience for end users, the ability to enforce update installation and reboot deadlines, and the ability to provide end user control over reboots for a specific time period. +- **Update rollback improvements**: You can now automatically recover from startup failures by removing updates if the startup failure was introduced after the installation of recent driver or quality updates. When a device is unable to start up properly after the recent installation of Quality of driver updates, Windows will now automatically uninstall the updates to get the device back up and running normally. +- **Pause updates**: We have extended the ability to pause updates for both feature and monthly updates. This extension ability is for all editions of Windows 10, including Home. You can pause both feature and monthly updates for up to 35 days (seven days at a time, up to five times). Once the 35-day pause period is reached, you will need to update your device before pausing again. +- **Improved update notifications**: When there’s an update requiring you to restart your device, you’ll see a colored dot on the Power button in the Start menu and on the Windows icon in your taskbar. +- **Intelligent active hours**: To further enhance active hours, users will now have the option to let Windows Update intelligently adjust active hours based on their device-specific usage patterns. You must enable the intelligent active hours feature for the system to predict device-specific usage patterns. +- **Improved update orchestration to improve system responsiveness**: This feature will improve system performance by intelligently coordinating Windows updates and Microsoft Store updates, so they occur when users are away from their devices to minimize disruptions. + +Microsoft previously announced that we are [extending support](https://www.microsoft.com/microsoft-365/blog/2018/09/06/helping-customers-shift-to-a-modern-desktop) for Windows 10 Enterprise and Windows 10 Education editions to 30 months from the version release date. This includes all past versions and future versions that are targeted for release in September (versions ending in 09, ex: 1809). Future releases that are targeted for release in March (versions ending in 03, ex: 1903) will continue to be supported for 18 months from their release date. All releases of Windows 10 Home, Windows 10 Pro, and Office 365 ProPlus will continue to be supported for 18 months (there is no change for these editions). These support policies are summarized in the table below. + +![Support lifecycle](images/support-cycle.png) + +## Windows 10 Enterprise upgrade + +Windows 10 version 1703 includes a Windows 10 Enterprise E3 and E5 benefit to Microsoft customers with Enterprise Agreements (EA) or Microsoft Products & Services Agreements (MPSA). These customers can now subscribe users to Windows 10 Enterprise E3 or E5 and activate their subscriptions on up to five devices. Virtual machines can also be activated. For more information, see [Windows 10 Enterprise Subscription Activation](windows-10-subscription-activation.md). + +Windows 10 Enterprise E3 launched in the Cloud Solution Provider (CSP) channel on September 1, 2016. Previously, only organizations with a Microsoft Volume Licensing Agreement could deploy Windows 10 Enterprise to their users. With Windows 10 Enterprise E3 in CSP, small and medium-sized organizations can more easily take advantage of Windows 10 Enterprise features. + +For more information, see [Windows 10 Enterprise E3 in CSP](windows-10-enterprise-e3-overview.md) + + +## Deployment solutions and tools + +### Windows Autopilot + +[Windows Autopilot](https://docs.microsoft.com/windows/deployment/windows-autopilot/windows-autopilot) streamlines and automates the process of setting up and configuring new devices, with minimal interaction required from the end user. You can also use Windows Autopilot to reset, repurpose and recover devices. + +The following Windows Autopilot features are available in Windows 10, version 1903 and later: + +- [Windows Autopilot for white glove deployment](https://docs.microsoft.com/windows/deployment/windows-autopilot/white-glove) is new in Windows 10, version 1903. "White glove" deployment enables partners or IT staff to pre-provision devices so they are fully configured and business ready for your users. +- The Intune [enrollment status page](https://docs.microsoft.com/intune/windows-enrollment-status) (ESP) now tracks Intune Management Extensions​. +- [Cortana voiceover](https://docs.microsoft.com/windows-hardware/customize/desktop/cortana-voice-support) and speech recognition during OOBE is disabled by default for all Windows 10 Pro Education, and Enterprise SKUs. +- Windows Autopilot is self-updating during OOBE. Starting with the Windows 10, version 1903 Autopilot functional and critical updates will begin downloading automatically during OOBE. +- Windows Autopilot will set the [diagnostics data](https://docs.microsoft.com/windows/privacy/windows-diagnostic-data) level to Full on Windows 10 version 1903 and later during OOBE. + +### Windows 10 Subscription Activation + +Windows 10 Education support has been added to Windows 10 Subscription Activation. + +With Windows 10, version 1903, you can step-up from Windows 10 Pro Education to the enterprise-grade edition for educational institutions – Windows 10 Education. For more information, see [Windows 10 Subscription Activation](https://docs.microsoft.com/windows/deployment/windows-10-subscription-activation). + +### SetupDiag + +[SetupDiag](upgrade/setupdiag.md) is a standalone diagnostic tool that can be used to obtain details about why a Windows 10 upgrade was unsuccessful. + +SetupDiag version 1.4.1 was released on 5/17/2019. + +### Upgrade Readiness + +The Upgrade Readiness tool moved from public preview to general availability on March 2, 2017. + +Upgrade Readiness helps you ensure that applications and drivers are ready for a Windows 10 upgrade. The solution provides up-to-date application and driver inventory, information about known issues, troubleshooting guidance, and per-device readiness and tracking details. + +The development of Upgrade Readiness has been heavily influenced by input from the community the development of new features is ongoing. To begin using Upgrade Readiness, add it to an existing Operation Management Suite (OMS) workspace or sign up for a new OMS workspace with the Upgrade Readiness solution enabled. + +For more information about Upgrade Readiness, see the following topics: + +- [Windows Analytics blog](https://aka.ms/blog/WindowsAnalytics/) +- [Manage Windows upgrades with Upgrade Readiness](upgrade/manage-windows-upgrades-with-upgrade-readiness.md) + + +### Update Compliance + +Update Compliance helps you to keep Windows 10 devices in your organization secure and up-to-date. + +Update Compliance is a solution built using OMS Logs and Analytics that provides information about installation status of monthly quality and feature updates. Details are provided about the deployment progress of existing updates and the status of future updates. Information is also provided about devices that might need attention to resolve issues. + +For more information about Update Compliance, see [Monitor Windows Updates with Update Compliance](update/update-compliance-monitor.md). + +### Device Health + +Device Health is the newest Windows Analytics solution that complements the existing Upgrade Readiness and Update Compliance solutions by helping to identify devices crashes and the cause. Device drivers that are causing crashes are identified along with alternative drivers that might reduce the number of crashes. Windows Information Protection misconfigurations are also identified. For more information, see [Monitor the health of devices with Device Health](update/device-health-monitor.md) + +### MBR2GPT + +MBR2GPT.EXE converts a disk from Master Boot Record (MBR) to GUID Partition Table (GPT) partition style without modifying or deleting data on the disk. Previously, it was necessary to image, then wipe and reload a disk to change from MBR format to GPT. + +There are many benefits to converting the partition style of a disk to GPT, including the use of larger disk partitions, added data reliability, and faster boot and shutdown speeds. The GPT format also enables you to use the Unified Extensible Firmware Interface (UEFI) which replaces the Basic Input/Output System (BIOS) firmware interface. Security features of Windows 10 that require UEFI mode include: Secure Boot, Early Launch Anti-malware (ELAM) driver, Windows Trusted Boot, Measured Boot, Device Guard, Credential Guard, and BitLocker Network Unlock. + +For more information, see [MBR2GPT.EXE](mbr-to-gpt.md). + + +### Microsoft Deployment Toolkit (MDT) + +MDT build 8456 (12/19/2018) is available, including support for Windows 10, version 1809, and Windows Server 2019. + +For more information about MDT, see the [MDT resource page](https://docs.microsoft.com/sccm/mdt/). + + +### Windows Assessment and Deployment Kit (ADK) + +The Windows Assessment and Deployment Kit (Windows ADK) contains tools that can be used by IT Pros to deploy Windows. See the following topics: + +- [What's new in ADK kits and tools](https://docs.microsoft.com/windows-hardware/get-started/what-s-new-in-kits-and-tools) +- [Windows ADK for Windows 10 scenarios for IT Pros](windows-adk-scenarios-for-it-pros.md) + + +## Testing and validation guidance + +### Windows 10 deployment proof of concept (PoC) + +The Windows 10 PoC guide enables you to test Windows 10 deployment in a virtual environment and become familiar with deployment tools such as MDT and Configuration Manager. The PoC guide provides step-by-step instructions for installing and using Hyper-V to create a virtual lab environment. The guide makes extensive use of Windows PowerShell to streamline each phase of the installation and setup. + +For more information, see the following guides: + +- [Step by step guide: Configure a test lab to deploy Windows 10](windows-10-poc.md) +- [Deploy Windows 10 in a test lab using Microsoft Deployment Toolkit](windows-10-poc-mdt.md) +- [Deploy Windows 10 in a test lab using System Center Configuration Manager](windows-10-poc-sc-config-mgr.md) + + +## Troubleshooting guidance + +[Resolve Windows 10 upgrade errors](upgrade/resolve-windows-10-upgrade-errors.md) was published in October of 2016 and will continue to be updated with new fixes. The topic provides a detailed explanation of the Windows 10 upgrade process and instructions on how to locate, interpret, and resolve specific errors that can be encountered during the upgrade process. + + +## Online content change history + +The following topics provide a change history for Windows 10 ITPro TechNet library content related to deploying and using Windows 10. + +[Change history for Deploy Windows 10](change-history-for-deploy-windows-10.md) +
[Change history for Access Protection](/windows/access-protection/change-history-for-access-protection) +
[Change history for Device Security](/windows/device-security/change-history-for-device-security) +
[Change history for Threat Protection](/windows/threat-protection/change-history-for-threat-protection) + + +## Related topics + +[Overview of Windows as a service](update/waas-overview.md) +
[Windows 10 deployment considerations](planning/windows-10-deployment-considerations.md) +
[Windows 10 release information](https://docs.microsoft.com/windows/windows-10/release-information) +
[Windows 10 Specifications & Systems Requirements](https://www.microsoft.com/en-us/windows/windows-10-specifications) +
[Windows 10 upgrade paths](upgrade/windows-10-upgrade-paths.md) +
[Windows 10 deployment tools](windows-deployment-scenarios-and-tools.md) diff --git a/windows/deployment/upgrade/setupdiag.md b/windows/deployment/upgrade/setupdiag.md index 355c0da246..b413218f3d 100644 --- a/windows/deployment/upgrade/setupdiag.md +++ b/windows/deployment/upgrade/setupdiag.md @@ -28,7 +28,8 @@ ms.topic: article ## About SetupDiag -Current version of SetupDiag: 1.5.0.0 +Current version of SetupDiag: 1.6.0.0 +>Always be sure to run the most recent version of SetupDiag, so that can access new functionality and fixes to known issues. SetupDiag is a standalone diagnostic tool that can be used to obtain details about why a Windows 10 upgrade was unsuccessful. @@ -147,7 +148,6 @@ SetupDiag.exe /Output:C:\SetupDiag\Dumpdebug.log /LogsPath:D:\Dump ## Known issues 1. Some rules can take a long time to process if the log files involved are large. -2. If the failing computer is opted into the Insider program and getting regular pre-release updates, or an update is already pending on the computer when SetupDiag is run, it can encounter problems trying to open these log files. This will likely cause a failure to determine a root cause. In this case, try gathering the log files and running SetupDiag in offline mode. ## Sample output @@ -157,7 +157,7 @@ The following is an example where SetupDiag is run in offline mode. ``` D:\SetupDiag>SetupDiag.exe /output:c:\setupdiag\result.xml /logspath:D:\Tests\Logs\f55be736-beed-4b9b-aedf-c133536c946e /format:xml -SetupDiag v1.5.0.0 +SetupDiag v1.6.0.0 Copyright (c) Microsoft Corporation. All rights reserved. Searching for setup logs... @@ -318,55 +318,68 @@ Each rule name and its associated unique rule identifier are listed with a descr ## Release notes +08/08/2019 - SetupDiag v1.6.0.0 is released with 60 rules, as a standalone tool available from the Download Center. + - Log detection performance is improved. What used to take up to a minute should take around 10 seconds or less. + - Added Setup Operation and Setup Phase information to both the results log and the registry information. + - This is the last Operation and Phase that Setup was in when the failure occurred. + - Added detailed Setup Operation and Setup Phase information (and timing) to output log when /verbose is specified. + - Note, if the issue found is a compat block, no Setup Operation or Phase info exists yet and therefore won’t be available. + - Added more info to the Registry output. + - Detailed ‘FailureData’ info where available. Example: “AppName = MyBlockedApplication” or “DiskSpace = 6603” (in MB) + - “Key = Value” data specific to the failure found. + - Added ‘UpgradeStartTime’, ‘UpgradeEndTime’ and ‘UpgradeElapsedTime’ + - Added ‘SetupDiagVersion’, ‘DateTime’ (to indicate when SetupDiag was executed on the system), ‘TargetOSVersion’, ‘HostOSVersion’ and more… + + 06/19/2019 - SetupDiag v1.5.0.0 is released with 60 rules, as a standalone tool available from the Download Center. -- All date and time outputs are updated to localized format per user request. -- Added setup Operation and Phase information to /verbose log. -- Added last Setup Operation and last Setup Phase information to most rules where it make sense (see new output below). -- Performance improvement in searching setupact.logs to determine correct log to parse. -- Added SetupDiag version number to text report (xml and json always had it). -- Added "no match" reports for xml and json per user request. -- Formatted Json output for easy readability. -- Performance improvements when searching for setup logs; this should be much faster now. -- Added 7 new rules: PlugInComplianceBlock, PreReleaseWimMountDriverFound, WinSetupBootFilterFailure, WimMountDriverIssue, DISMImageSessionFailure, FindEarlyDownlevelError, and FindSPFatalError. See the [Rules](#rules) section above for more information. -- Diagnostic information is now output to the registry at **HKLM\SYSTEM\Setup\MoSetup\Volatile\SetupDiag** - - The **/AddReg** command was added to toggle registry output. This setting is off by default for offline mode, and on by default for online mode. The command has no effect for online mode and enables registry output for offline mode. - - This registry key is deleted as soon as SetupDiag is run a second time, and replaced with current data, so it’s always up to date. - - This registry key also gets deleted when a new update instance is invoked. - - For an example, see [Sample registry key](#sample-registry-key). + - All date and time outputs are updated to localized format per user request. + - Added setup Operation and Phase information to /verbose log. + - Added last Setup Operation and last Setup Phase information to most rules where it make sense (see new output below). + - Performance improvement in searching setupact.logs to determine correct log to parse. + - Added SetupDiag version number to text report (xml and json always had it). + - Added "no match" reports for xml and json per user request. + - Formatted Json output for easy readability. + - Performance improvements when searching for setup logs; this should be much faster now. + - Added 7 new rules: PlugInComplianceBlock, PreReleaseWimMountDriverFound, WinSetupBootFilterFailure, WimMountDriverIssue, DISMImageSessionFailure, FindEarlyDownlevelError, and FindSPFatalError. See the [Rules](#rules) section above for more information. + - Diagnostic information is now output to the registry at **HKLM\SYSTEM\Setup\MoSetup\Volatile\SetupDiag** + - The **/AddReg** command was added to toggle registry output. This setting is off by default for offline mode, and on by default for online mode. The command has no effect for online mode and enables registry output for offline mode. + - This registry key is deleted as soon as SetupDiag is run a second time, and replaced with current data, so it’s always up to date. + - This registry key also gets deleted when a new update instance is invoked. + - For an example, see [Sample registry key](#sample-registry-key). 05/17/2019 - SetupDiag v1.4.1.0 is released with 53 rules, as a standalone tool available from the Download Center. -- This release adds the ability to find and diagnose reset and recovery failures (Push Button Reset). + - This release dds the ability to find and diagnose reset and recovery failures (Push Button Reset). 12/18/2018 - SetupDiag v1.4.0.0 is released with 53 rules, as a standalone tool available from the Download Center. -- This release includes major improvements in rule processing performance: ~3x faster rule processing performance! - - The FindDownlevelFailure rule is up to 10x faster. -- New rules have been added to analyze failures upgrading to Windows 10 version 1809. -- A new help link is available for resolving servicing stack failures on the down-level OS when the rule match indicates this type of failure. -- Removed the need to specify /Mode parameter. Now if you specify /LogsPath, it automatically assumes offline mode. -- Some functional and output improvements were made for several rules. + - This release includes major improvements in rule processing performance: ~3x faster rule processing performance! + - The FindDownlevelFailure rule is up to 10x faster. + - New rules have been added to analyze failures upgrading to Windows 10 version 1809. + - A new help link is available for resolving servicing stack failures on the down-level OS when the rule match indicates this type of failure. + - Removed the need to specify /Mode parameter. Now if you specify /LogsPath, it automatically assumes offline mode. + - Some functional and output improvements were made for several rules. 07/16/2018 - SetupDiag v1.3.1 is released with 44 rules, as a standalone tool available from the Download Center. -- This release fixes a problem that can occur when running SetupDiag in online mode on a computer that produces a setupmem.dmp file, but does not have debugger binaries installed. + - This release fixes a problem that can occur when running SetupDiag in online mode on a computer that produces a setupmem.dmp file, but does not have debugger binaries installed. 07/10/2018 - SetupDiag v1.30 is released with 44 rules, as a standalone tool available from the Download Center. -- Bug fix for an over-matched plug-in rule. The rule will now correctly match only critical (setup failure) plug-in issues. -- New feature: Ability to output logs in JSON and XML format. - - Use "/Format:xml" or "/Format:json" command line parameters to specify the new output format. See [sample logs](#sample-logs) at the bottom of this topic. - - If the “/Format:xml” or “/Format:json” parameter is omitted, the log output format will default to text. -- New Feature: Where possible, specific instructions are now provided in rule output to repair the identified error. For example, instructions are provided to remediate known blocking issues such as uninstalling an incompatible app or freeing up space on the system drive. -- 3 new rules added: AdvancedInstallerFailed, MigrationAbortedDueToPluginFailure, DISMAddPackageFailed. + - Bug fix for an over-matched plug-in rule. The rule will now correctly match only critical (setup failure) plug-in issues. + - New feature: Ability to output logs in JSON and XML format. + - Use "/Format:xml" or "/Format:json" command line parameters to specify the new output format. See [sample logs](#sample-logs) at the bottom of this topic. + - If the “/Format:xml” or “/Format:json” parameter is omitted, the log output format will default to text. + - New Feature: Where possible, specific instructions are now provided in rule output to repair the identified error. For example, instructions are provided to remediate known blocking issues such as uninstalling an incompatible app or freeing up space on the system drive. + - 3 new rules added: AdvancedInstallerFailed, MigrationAbortedDueToPluginFailure, DISMAddPackageFailed. 05/30/2018 - SetupDiag v1.20 is released with 41 rules, as a standalone tool available from the Download Center. -- Fixed a bug in device install failure detection in online mode. -- Changed SetupDiag to work without an instance of setupact.log. Previously, SetupDiag required at least one setupact.log to operate. This change enables the tool to analyze update failures that occur prior to calling SetupHost. -- Telemetry is refactored to only send the rule name and GUID (or “NoRuleMatched” if no rule is matched) and the Setup360 ReportId. This change assures data privacy during rule processing. + - Fixed a bug in device install failure detection in online mode. + - Changed SetupDiag to work without an instance of setupact.log. Previously, SetupDiag required at least one setupact.log to operate. This change enables the tool to analyze update failures that occur prior to calling SetupHost. + - Telemetry is refactored to only send the rule name and GUID (or “NoRuleMatched” if no rule is matched) and the Setup360 ReportId. This change assures data privacy during rule processing. 05/02/2018 - SetupDiag v1.10 is released with 34 rules, as a standalone tool available from the Download Center. -- A performance enhancment has been added to result in faster rule processing. -- Rules output now includes links to support articles, if applicable. -- SetupDiag now provides the path and name of files that it is processing. -- You can now run SetupDiag by simply clicking on it and then examining the output log file. -- An output log file is now always created, whether or not a rule was matched. + - A performance enhancment has been added to result in faster rule processing. + - Rules output now includes links to support articles, if applicable. + - SetupDiag now provides the path and name of files that it is processing. + - You can now run SetupDiag by simply clicking on it and then examining the output log file. + - An output log file is now always created, whether or not a rule was matched. 03/30/2018 - SetupDiag v1.00 is released with 26 rules, as a standalone tool available from the Download Center. @@ -408,7 +421,7 @@ Refer to https://docs.microsoft.com/windows/deployment/upgrade/upgrade-error-cod ```xml - 1.5.0.0 + 1.6.0.0 FindSPFatalError A4028172-1B09-48F8-AD3B-86CDD7D55852 @@ -459,7 +472,7 @@ Refer to "https://docs.microsoft.com/windows/desktop/Debug/system-error-codes" f ``` { - "Version":"1.5.0.0", + "Version":"1.6.0.0", "ProfileName":"FindSPFatalError", "ProfileGuid":"A4028172-1B09-48F8-AD3B-86CDD7D55852", "SystemInfo":{ diff --git a/windows/release-information/resolved-issues-windows-10-1607.yml b/windows/release-information/resolved-issues-windows-10-1607.yml index bf1e899bff..08b49123c4 100644 --- a/windows/release-information/resolved-issues-windows-10-1607.yml +++ b/windows/release-information/resolved-issues-windows-10-1607.yml @@ -32,6 +32,7 @@ sections: - type: markdown text: " + @@ -52,10 +53,7 @@ sections: - - -
SummaryOriginating updateStatusDate resolved
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
OS Build 14393.3025

June 11, 2019
KB4503267
Resolved
KB4512495
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 14393.3144

August 13, 2019
KB4512517
Resolved
KB4512495
August 17, 2019
02:00 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 14393.3115

July 16, 2019
KB4507459
Resolved
KB4512517
August 13, 2019
10:00 AM PT
Internet Explorer 11 and apps using the WebBrowser control may fail to render
JavaScript may fail to render as expected in Internet Explorer 11 and in apps using JavaScript or the WebBrowser control.

See details >
OS Build 14393.3085

July 09, 2019
KB4507460
Resolved
KB4512517
August 13, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup.

See details >
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4489882
March 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
February 19, 2019
02:00 PM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 14393.2759

January 17, 2019
KB4480977
Resolved
KB4487006
February 19, 2019
02:00 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 14393.2848

March 12, 2019
KB4489882
Resolved
KB4493473
April 25, 2019
02:00 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
February 19, 2019
02:00 PM PT
Issue hosting multiple terminal server sessions and a user logs off on Windows Server
In some cases, Windows Server will stop working and restart when hosting multiple terminal server sessions and a user logs off.

See details >
OS Build 14393.2828

February 19, 2019
KB4487006
Resolved
KB4489882
March 12, 2019
10:00 AM PT
" @@ -82,6 +80,7 @@ sections: - type: markdown text: " + @@ -139,8 +138,6 @@ sections:
DetailsOriginating updateStatusHistory
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503267 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512495.

Back to top
OS Build 14393.3025

June 11, 2019
KB4503267
Resolved
KB4512495
Resolved:
August 17, 2019
02:00 PM PT

Opened:
July 10, 2019
02:51 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4507459. Devices that are domain controllers or domain members are both affected.

To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
 

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4512517. To safeguard your upgrade experience, the compatibility hold on devices from being offered Windows 10, version 1903 or Windows Server, version 1903 is still in place. Once the issue is addressed on Windows 10, version 1903, this safeguard hold will be removed for all affected platforms. Check the Windows 10, version 1903 section of the release information dashboard for the most up to date information on this and other safeguard holds.

Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

Back to top
OS Build 14393.3115

July 16, 2019
KB4507459
Resolved
KB4512517
Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
Internet Explorer 11 and apps using the WebBrowser control may fail to render
Internet Explorer 11 may fail to render some JavaScript after installing KB4507460. You may also have issues with apps using JavaScript or the WebBrowser control, such as the present PowerPoint feature of Skype Meeting Broadcast.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server 2016
Resolution: This issue was resolved in KB4512517.

Back to top
OS Build 14393.3085

July 09, 2019
KB4507460
Resolved
KB4512517
Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 26, 2019
04:58 PM PT
- -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493470

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487026, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487026, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Issue hosting multiple terminal server sessions and a user logs off on Windows Server
In some cases, Windows Server will stop working and restart when hosting multiple terminal server sessions and a user logs off. The faulting driver is win32kbase.sys.

Affected platforms:
  • Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2828

February 19, 2019
KB4487006
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
" @@ -152,7 +149,6 @@ sections: -
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480961, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480961, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493470.

Back to top
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480977, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487006.

Back to top
OS Build 14393.2759

January 17, 2019
KB4480977
Resolved
KB4487006
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 17, 2019
02:00 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1703.yml b/windows/release-information/resolved-issues-windows-10-1703.yml index 89d2b4a9f4..22ddb295df 100644 --- a/windows/release-information/resolved-issues-windows-10-1703.yml +++ b/windows/release-information/resolved-issues-windows-10-1703.yml @@ -45,10 +45,7 @@ sections:
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >OS Build 15063.1716

March 19, 2019
KB4489888Resolved
KB4493474April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >OS Build 15063.1563

January 08, 2019
KB4480973Resolved
KB4493474April 09, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >OS Build 15063.1659

February 19, 2019
KB4487011Resolved
KB4489871March 12, 2019
10:00 AM PT -
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >OS Build 15063.1631

February 12, 2019
KB4487020Resolved
KB4487011February 19, 2019
02:00 PM PT -
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >OS Build 15063.1596

January 15, 2019
KB4480959Resolved
KB4487011February 19, 2019
02:00 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >OS Build 15063.1689

March 12, 2019
KB4489871Resolved
KB4493436April 25, 2019
02:00 PM PT -
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >OS Build 15063.1631

February 12, 2019
KB4487020Resolved
KB4487011February 19, 2019
02:00 PM PT " @@ -118,8 +115,6 @@ sections: - -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493474

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487011, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489871.

Back to top
OS Build 15063.1659

February 19, 2019
KB4487011
Resolved
KB4489871
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
After installing KB4487020, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -129,6 +124,5 @@ sections: text: " -
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480973, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493474.

Back to top
OS Build 15063.1563

January 08, 2019
KB4480973
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480959, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487011.

Back to top
OS Build 15063.1596

January 15, 2019
KB4480959
Resolved
KB4487011
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1709.yml b/windows/release-information/resolved-issues-windows-10-1709.yml index 876d623cf2..9bf77f7d45 100644 --- a/windows/release-information/resolved-issues-windows-10-1709.yml +++ b/windows/release-information/resolved-issues-windows-10-1709.yml @@ -32,6 +32,7 @@ sections: - type: markdown text: " + @@ -46,9 +47,6 @@ sections: - - -
SummaryOriginating updateStatusDate resolved
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
OS Build 16299.1217

June 11, 2019
KB4503284
Resolved
KB4512494
August 16, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 16299.1331

August 13, 2019
KB4512516
Resolved
KB4512494
August 16, 2019
02:00 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 16299.1296

July 16, 2019
KB4507465
Resolved
KB4512516
August 13, 2019
10:00 AM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >
OS Build 16299.1217

June 11, 2019
KB4503284
Resolved External
August 09, 2019
07:03 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 16299.1059

March 19, 2019
KB4489890
Resolved
KB4493441
April 09, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
April 09, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4489886
March 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
February 19, 2019
02:00 PM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 16299.936

January 15, 2019
KB4480967
Resolved
KB4487021
February 19, 2019
02:00 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
February 19, 2019
02:00 PM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start Secure Shell from Windows Subsystem for Linux with agent forwarding using a command line switch (ssh –A) or a configuration setting.

See details >
OS Build 16299.1029

March 12, 2019
KB4489886
Resolved
KB4493441
April 09, 2019
10:00 AM PT
" @@ -75,6 +73,7 @@ sections: - type: markdown text: " +
DetailsOriginating updateStatusHistory
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503284 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512494.

Back to top
OS Build 16299.1217

June 11, 2019
KB4503284
Resolved
KB4512494
Resolved:
August 16, 2019
02:00 PM PT

Opened:
July 10, 2019
02:51 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4507465. Devices that are domain controllers or domain members are both affected.

To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
 

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4512516. To safeguard your upgrade experience, the compatibility hold on devices from being offered Windows 10, version 1903 or Windows Server, version 1903 is still in place. Once the issue is addressed on Windows 10, version 1903, this safeguard hold will be removed for all affected platforms. Check the Windows 10, version 1903 section of the release information dashboard for the most up to date information on this and other safeguard holds.

Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

Back to top
OS Build 16299.1296

July 16, 2019
KB4507465
Resolved
KB4512516
Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
@@ -128,8 +127,6 @@ sections: - -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493441

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4486996, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489886.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4489886
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4486996, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -139,6 +136,5 @@ sections: text: " -
DetailsOriginating updateStatusHistory
MSXML6 causes applications to stop responding if an exception was thrown
After installing KB4480978, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493441.

Back to top
OS Build 16299.904

January 08, 2019
KB4480978
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480967, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487021.

Back to top
OS Build 16299.936

January 15, 2019
KB4480967
Resolved
KB4487021
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1803.yml b/windows/release-information/resolved-issues-windows-10-1803.yml index c94998225d..b3059b9fe8 100644 --- a/windows/release-information/resolved-issues-windows-10-1803.yml +++ b/windows/release-information/resolved-issues-windows-10-1803.yml @@ -32,6 +32,8 @@ sections: - type: markdown text: " + + @@ -44,10 +46,7 @@ sections: - - -
SummaryOriginating updateStatusDate resolved
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
OS Build 17134.829

June 11, 2019
KB4503286
Resolved
KB4512509
August 19, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 17134.950

August 13, 2019
KB4512501
Resolved
KB4512509
August 19, 2019
02:00 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 17134.915

July 16, 2019
KB4507466
Resolved
KB4512501
August 13, 2019
10:00 AM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >
OS Build 17134.829

June 11, 2019
KB4503286
Resolved External
August 09, 2019
07:03 PM PT
Difficulty connecting to some iSCSI-based SANs
Devices may have difficulty connecting to some Storage Area Network (SAN) devices that leverage iSCSI.

See details >
OS Build 17134.799

May 21, 2019
KB4499183
Resolved
KB4509478
June 26, 2019
04:00 PM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >
OS Build 17134.677

March 19, 2019
KB4489894
Resolved
KB4493464
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
April 09, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4489868
March 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4487029
February 19, 2019
02:00 PM PT
First character of the Japanese era name not recognized
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
February 19, 2019
02:00 PM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493437
April 25, 2019
02:00 PM PT
Cannot pin a web link on the Start menu or the taskbar
Some users cannot pin a web link on the Start menu or the taskbar.

See details >
OS Build 17134.471

December 11, 2018
KB4471324
Resolved
KB4487029
February 19, 2019
02:00 PM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start Secure Shell from Windows Subsystem for Linux with agent forwarding using a command line switch (ssh –A) or a configuration setting.

See details >
OS Build 17134.648

March 12, 2019
KB4489868
Resolved
KB4493464
April 09, 2019
10:00 AM PT
" @@ -64,6 +63,7 @@ sections: - type: markdown text: " +
DetailsOriginating updateStatusHistory
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512501, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4512509. The ‘optional’ update will be available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive KB4512509 and install. For instructions, see Update Windows 10.

Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS).

Back to top
OS Build 17134.950

August 13, 2019
KB4512501
Resolved
KB4512509
Resolved:
August 19, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on your Apple MacOS device when trying to access network shares via CIFS or SMBv1 on a Windows devices that has installed updates on June 11, 2019 (KB4503286) or later. When you encounter this issue, in MacOS you may receive the error, “There was a problem connecting to the server “{Server Host Name}”. Check the server name or IP address, and then try again. If you continue to have problems, contact your system administrator.”

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: For guidance on this issue, see the Apple support article If your Mac can't use NTLM to connect to a Windows server. There is no update for Windows needed for this issue.

Back to top
OS Build 17134.829

June 11, 2019
KB4503286
Resolved External
Last updated:
August 09, 2019
07:03 PM PT

Opened:
August 09, 2019
04:25 PM PT
" @@ -73,6 +73,7 @@ sections: - type: markdown text: " +
DetailsOriginating updateStatusHistory
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503286 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512509.

Back to top
OS Build 17134.829

June 11, 2019
KB4503286
Resolved
KB4512509
Resolved:
August 19, 2019
02:00 PM PT

Opened:
July 10, 2019
02:51 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4507466. Devices that are domain controllers or domain members are both affected.

To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
 

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4512501. To safeguard your upgrade experience, the compatibility hold on devices from being offered Windows 10, version 1903 or Windows Server, version 1903 is still in place. Once the issue is addressed on Windows 10, version 1903, this safeguard hold will be removed for all affected platforms. Check the Windows 10, version 1903 section of the release information dashboard for the most up to date information on this and other safeguard holds.

Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

Back to top
OS Build 17134.915

July 16, 2019
KB4507466
Resolved
KB4512501
Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
@@ -126,7 +127,6 @@ sections: -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493464

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487017, users may received \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489868.

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4489868
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487017, Internet Explorer may fail to load images with a backslash (\\) in their relative source path. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -136,15 +136,5 @@ sections: text: " - -
DetailsOriginating updateStatusHistory
MSXML6 may cause applications to stop responding
After installing KB4480966, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493464

Back to top
OS Build 17134.523

January 08, 2019
KB4480966
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
First character of the Japanese era name not recognized
After installing KB4480976, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.556

January 15, 2019
KB4480976
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
- " - -- title: December 2018 -- items: - - type: markdown - text: " - -
DetailsOriginating updateStatusHistory
Cannot pin a web link on the Start menu or the taskbar
After installing KB4471324, some users cannot pin a web link on the Start menu or the taskbar. 

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
Resolution: This issue is resolved in KB4487029

Back to top
OS Build 17134.471

December 11, 2018
KB4471324
Resolved
KB4487029
Resolved:
February 19, 2019
02:00 PM PT

Opened:
December 11, 2018
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml index dc24852730..c70c55ae78 100644 --- a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml @@ -32,6 +32,7 @@ sections: - type: markdown text: " + @@ -87,6 +88,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusDate resolved
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
OS Build 17763.557

June 11, 2019
KB4503327
Resolved
KB4512534
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 17763.678

August 13, 2019
KB4511553
Resolved
KB4512534
August 17, 2019
02:00 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 17763.652

July 22, 2019
KB4505658
Resolved
KB4511553
August 13, 2019
10:00 AM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >
OS Build 17763.557

June 11, 2019
KB4503327
Resolved External
August 09, 2019
07:03 PM PT
+
DetailsOriginating updateStatusHistory
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503327 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512534.

Back to top
OS Build 17763.557

June 11, 2019
KB4503327
Resolved
KB4512534
Resolved:
August 17, 2019
02:00 PM PT

Opened:
July 10, 2019
02:51 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4505658. Devices that are domain controllers or domain members are both affected.

To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
 

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4511553. To safeguard your upgrade experience, the compatibility hold on devices from being offered Windows 10, version 1903 or Windows Server, version 1903 is still in place. Once the issue is addressed on Windows 10, version 1903, this safeguard hold will be removed for all affected platforms. Check the Windows 10, version 1903 section of the release information dashboard for the most up to date information on this and other safeguard holds.

Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

Back to top
OS Build 17763.652

July 22, 2019
KB4505658
Resolved
KB4511553
Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
diff --git a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml index 7135d3adff..b30db83a7d 100644 --- a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml @@ -32,6 +32,7 @@ sections: - type: markdown text: " + @@ -40,17 +41,14 @@ sections: + - - - -
SummaryOriginating updateStatusDate resolved
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
June 11, 2019
KB4503292
Resolved
KB4512514
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
August 13, 2019
KB4512506
Resolved
KB4517297
August 16, 2019
02:00 PM PT
System may be unresponsive after restart with certain McAfee antivirus products
Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

See details >
April 09, 2019
KB4493472
Resolved External
August 13, 2019
06:59 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >
June 11, 2019
KB4503292
Resolved External
August 09, 2019
07:03 PM PT
Unable to access some gov.uk websites
gov.uk websites that don’t support “HSTS” may not be accessible

See details >
May 14, 2019
KB4499164
Resolved
KB4505050
May 18, 2019
02:00 PM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Resolved
May 14, 2019
01:23 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Resolved
May 14, 2019
01:22 PM PT
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493472
Resolved
May 14, 2019
01:21 PM PT
Authentication may fail for services after the Kerberos ticket expires
Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

See details >
March 12, 2019
KB4489878
Resolved
KB4499164
May 14, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4486563
Resolved
KB4493472
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493472
Resolved
April 25, 2019
02:00 PM PT
NETDOM.EXE fails to run
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >
March 12, 2019
KB4489878
Resolved
KB4493472
April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
March 12, 2019
KB4489878
Resolved
KB4493472
April 09, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
February 12, 2019
KB4486563
Resolved
KB4486565
February 19, 2019
02:00 PM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
February 12, 2019
KB4486563
Resolved
KB4486565
February 19, 2019
02:00 PM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 17, 2019
KB4480955
Resolved
KB4486565
February 19, 2019
02:00 PM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480970
Resolved
KB4493472
April 09, 2019
10:00 AM PT
Event Viewer may not show some event descriptions for network interface cards
The Event Viewer may not show some event descriptions for network interface cards (NIC).

See details >
October 18, 2018
KB4462927
Resolved
KB4489878
March 12, 2019
10:00 AM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480970
Resolved
KB4490511
February 19, 2019
02:00 PM PT
" @@ -71,6 +69,15 @@ sections: " +- title: July 2019 +- items: + - type: markdown + text: " + + +
DetailsOriginating updateStatusHistory
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503292 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512514.

Back to top
June 11, 2019
KB4503292
Resolved
KB4512514
Resolved:
August 17, 2019
02:00 PM PT

Opened:
July 10, 2019
02:51 PM PT
+ " + - title: June 2019 - items: - type: markdown @@ -120,8 +127,6 @@ sections: text: " - -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493472

Back to top
February 12, 2019
KB4486563
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4486563, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4486565.

Back to top
February 12, 2019
KB4486563
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -130,9 +135,7 @@ sections: - type: markdown text: " - -
DetailsOriginating updateStatusHistory
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480955, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4486565.

Back to top
January 17, 2019
KB4480955
Resolved
KB4486565
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 17, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493472.

Back to top
January 08, 2019
KB4480970
Resolved
KB4493472
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480970, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490511.

Back to top
January 08, 2019
KB4480970
Resolved
KB4490511
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml index 3c832e536c..cee285c22f 100644 --- a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml @@ -32,6 +32,7 @@ sections: - type: markdown text: " + @@ -43,8 +44,6 @@ sections: - - @@ -52,7 +51,6 @@ sections: -
SummaryOriginating updateStatusDate resolved
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
June 11, 2019
KB4503276
Resolved
KB4512478
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
August 13, 2019
KB4512488
Resolved
KB4517298
August 16, 2019
02:00 PM PT
System may be unresponsive after restart with certain McAfee antivirus products
Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

See details >
April 09, 2019
KB4493446
Resolved External
August 13, 2019
06:59 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >
June 11, 2019
KB4503276
Resolved External
August 09, 2019
07:03 PM PT
System may be unresponsive after restart if ArcaBit antivirus software installed
Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Resolved
May 14, 2019
01:22 PM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Resolved
May 14, 2019
01:22 PM PT
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493446
Resolved
May 14, 2019
01:21 PM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
February 12, 2019
KB4487000
Resolved
KB4487016
February 19, 2019
02:00 PM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 15, 2019
KB4480969
Resolved
KB4487016
February 19, 2019
02:00 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487000
Resolved
KB4493446
April 09, 2019
10:00 AM PT
Devices may not respond at login or Welcome screen if running certain Avast software
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >
April 09, 2019
KB4493446
Resolved
April 25, 2019
02:00 PM PT
Devices with winsock kernel client may receive error
Devices with a winsock kernel client may receive D1, FC, and other errors.

See details >
March 12, 2019
KB4489881
Resolved
KB4489893
March 19, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
February 19, 2019
KB4487016
Resolved
KB4489881
March 12, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
January 08, 2019
KB4480963
Resolved
KB4493446
April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480963
Resolved
KB4493446
April 09, 2019
10:00 AM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480963
Resolved
KB4490512
February 19, 2019
02:00 PM PT
" @@ -73,6 +71,15 @@ sections: " +- title: July 2019 +- items: + - type: markdown + text: " + + +
DetailsOriginating updateStatusHistory
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503276 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512478.

Back to top
June 11, 2019
KB4503276
Resolved
KB4512478
Resolved:
August 17, 2019
02:00 PM PT

Opened:
July 10, 2019
02:51 PM PT
+ " + - title: June 2019 - items: - type: markdown @@ -122,7 +129,6 @@ sections: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Internet Explorer may fail to load images
After installing KB4487000, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1 
Resolution: This issue is resolved in KB4487016.

Back to top
February 12, 2019
KB4487000
Resolved
KB4487016
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487016, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012 
Resolution: This issue is resolved in KB4489881.

Back to top
February 19, 2019
KB4487016
Resolved
KB4489881
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
@@ -133,9 +139,7 @@ sections: - type: markdown text: " - -
DetailsOriginating updateStatusHistory
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480969, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4487016.

Back to top
January 15, 2019
KB4480969
Resolved
KB4487016
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
After installing KB4480963, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480963, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493446.

Back to top
January 08, 2019
KB4480963
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480963, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490512.

Back to top
January 08, 2019
KB4480963
Resolved
KB4490512
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml index 8ca80054e9..df7f82cfb2 100644 --- a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml +++ b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml @@ -32,6 +32,7 @@ sections: - type: markdown text: " + @@ -39,10 +40,8 @@ sections: - -
SummaryOriginating updateStatusDate resolved
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
June 11, 2019
KB4503273
Resolved
KB4512499
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
August 13, 2019
KB4512476
Resolved
KB4517301
August 16, 2019
02:00 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >
June 11, 2019
KB4503273
Resolved External
August 09, 2019
07:03 PM PT
Event Viewer may close or you may receive an error when using Custom Views
When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

See details >
June 11, 2019
KB4503273
Resolved
KB4503271
June 20, 2019
02:00 PM PT
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493471
Resolved
May 14, 2019
01:19 PM PT
Authentication may fail for services after the Kerberos ticket expires
Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

See details >
March 12, 2019
KB4489880
Resolved
KB4499149
May 14, 2019
10:00 AM PT
NETDOM.EXE fails to run
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >
March 12, 2019
KB4489880
Resolved
KB4493471
April 09, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
February 12, 2019
KB4487023
Resolved
KB4487022
February 19, 2019
02:00 PM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 17, 2019
KB4480974
Resolved
KB4489880
March 12, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487023
Resolved
KB4493471
April 09, 2019
10:00 AM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480968
Resolved
KB4490514
February 19, 2019
02:00 PM PT
" @@ -63,6 +62,15 @@ sections: " +- title: July 2019 +- items: + - type: markdown + text: " + + +
DetailsOriginating updateStatusHistory
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503273 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512499.

Back to top
June 11, 2019
KB4503273
Resolved
KB4512499
Resolved:
August 17, 2019
02:00 PM PT

Opened:
July 10, 2019
02:51 PM PT
+ " + - title: June 2019 - items: - type: markdown @@ -97,7 +105,6 @@ sections: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487022.

Back to top
February 12, 2019
KB4487023
Resolved
KB4487022
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to top
February 12, 2019
KB4487023
Resolved
KB4493471
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -108,6 +115,5 @@ sections: text: " -
DetailsOriginating updateStatusHistory
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480974, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489880.

Back to top
January 17, 2019
KB4480974
Resolved
KB4489880
Resolved:
March 12, 2019
10:00 AM PT

Opened:
January 17, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480968, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, “Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).”

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490514.

Back to top
January 08, 2019
KB4480968
Resolved
KB4490514
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-server-2012.yml b/windows/release-information/resolved-issues-windows-server-2012.yml index 7725b0bf92..4bd64240b8 100644 --- a/windows/release-information/resolved-issues-windows-server-2012.yml +++ b/windows/release-information/resolved-issues-windows-server-2012.yml @@ -32,6 +32,7 @@ sections: - type: markdown text: " + @@ -42,13 +43,10 @@ sections: - - -
SummaryOriginating updateStatusDate resolved
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
June 11, 2019
KB4503285
Resolved
KB4512512
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
August 13, 2019
KB4512518
Resolved
KB4517302
August 16, 2019
02:00 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >
June 11, 2019
KB4503285
Resolved External
August 09, 2019
07:03 PM PT
Some devices and generation 2 Hyper-V VMs may have issues installing updates
Some devices and generation 2 Hyper-V virtual machines (VMs) may have issues installing some updates when Secure Boot is enabled.

See details >
June 11, 2019
KB4503285
Resolved
KB4503295
June 21, 2019
02:00 PM PT
Layout and cell size of Excel sheets may change when using MS UI Gothic
When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel.

See details >
April 25, 2019
KB4493462
Resolved
KB4499171
May 14, 2019
10:00 AM PT
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >
April 09, 2019
KB4493451
Resolved
May 14, 2019
01:21 PM PT
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >
April 09, 2019
KB4493451
Resolved
May 14, 2019
01:19 PM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
February 12, 2019
KB4487025
Resolved
KB4487024
February 19, 2019
02:00 PM PT
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
January 15, 2019
KB4480971
Resolved
KB4487024
February 19, 2019
02:00 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
February 12, 2019
KB4487025
Resolved
KB4493451
April 09, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
February 12, 2019
KB4487025
Resolved
KB4489891
March 12, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
January 08, 2019
KB4480975
Resolved
KB4493451
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
January 08, 2019
KB4480975
Resolved
KB4493451
April 09, 2019
10:00 AM PT
Virtual machines fail to restore
Virtual machines (VMs) may fail to restore successfully if the VM has been saved and restored once before.

See details >
January 08, 2019
KB4480975
Resolved
KB4490516
February 19, 2019
02:00 PM PT
Event Viewer may not show some event descriptions for network interface cards
The Event Viewer may not show some event descriptions for network interface cards (NIC).

See details >
September 11, 2018
KB4457135
Resolved
KB4489891
March 12, 2019
10:00 AM PT
" @@ -70,6 +68,15 @@ sections: " +- title: July 2019 +- items: + - type: markdown + text: " + + +
DetailsOriginating updateStatusHistory
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503285 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512512.

Back to top
June 11, 2019
KB4503285
Resolved
KB4512512
Resolved:
August 17, 2019
02:00 PM PT

Opened:
July 10, 2019
02:51 PM PT
+ " + - title: June 2019 - items: - type: markdown @@ -115,7 +122,6 @@ sections: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487024.

Back to top
February 12, 2019
KB4487025
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487025, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489891.

Back to top
February 12, 2019
KB4487025
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
@@ -126,10 +132,8 @@ sections: - type: markdown text: " - -
DetailsOriginating updateStatusHistory
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480971, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4487024.

Back to top
January 15, 2019
KB4480971
Resolved
KB4487024
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 15, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480975, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480975, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493451.

Back to top
January 08, 2019
KB4480975
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Virtual machines fail to restore
After installing KB4480975, virtual machines (VM) may fail to restore successfully if the VM has been saved and restored once before. The error message is, \"Failed to restore the virtual machine state: Cannot restore this virtual machine because the saved state data cannot be read. Delete the saved state data and then try to start the virtual machine. (0xC0370027).\"

This affects AMD Bulldozer Family 15h, AMD Jaguar Family 16h, and AMD Puma Family 16h (second generation) microarchitectures.

Affected platforms: 
  • Client: Windows 8.1; Windows 7 SP1 
  • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4490516.

Back to top
January 08, 2019
KB4480975
Resolved
KB4490516
Resolved:
February 19, 2019
02:00 PM PT

Opened:
January 08, 2019
10:00 AM PT
" diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index 4a6c046585..cca3c91d12 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -60,13 +60,13 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ - @@ -96,10 +96,10 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
OS Build 14393.3025

June 11, 2019
KB4503267
Resolved
KB4512495
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 14393.3144

August 13, 2019
KB4512517
Resolved
KB4512495
August 17, 2019
02:00 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 14393.3115

July 16, 2019
KB4507459
Resolved
KB4512517
August 13, 2019
10:00 AM PT
Internet Explorer 11 and apps using the WebBrowser control may fail to render
JavaScript may fail to render as expected in Internet Explorer 11 and in apps using JavaScript or the WebBrowser control.

See details >
OS Build 14393.3085

July 09, 2019
KB4507460
Resolved
KB4512517
August 13, 2019
10:00 AM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >
OS Build 14393.3025

June 11, 2019
KB4503267
Resolved External
August 09, 2019
07:03 PM PT
Apps and scripts using the NetQueryDisplayInformation API may fail with error
Applications and scripts that call the NetQueryDisplayInformation API or the WinNT provider equivalent may fail to return results after the first page of data.

See details >
OS Build 14393.3053

June 18, 2019
KB4503294
Investigating
August 01, 2019
05:00 PM PT
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4507459
July 16, 2019
10:00 AM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
OS Build 14393.3025

June 11, 2019
KB4503267
Mitigated
July 10, 2019
07:09 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Mitigated
April 25, 2019
02:00 PM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

See details >
OS Build 14393.2608

November 13, 2018
KB4467691
Mitigated
February 19, 2019
10:00 AM PT
Cluster service may fail if the minimum password length is set to greater than 14
The cluster service may fail to start with the error “2245 (NERR_PasswordTooShort)” if the Group Policy “Minimum Password Length” is configured with greater than 14 characters.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
April 25, 2019
02:00 PM PT
+ -
DetailsOriginating updateStatusHistory
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503267 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512495.

Back to top
OS Build 14393.3025

June 11, 2019
KB4503267
Resolved
KB4512495
Resolved:
August 17, 2019
02:00 PM PT

Opened:
July 10, 2019
02:51 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4507459. Devices that are domain controllers or domain members are both affected.

To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
 

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4512517. To safeguard your upgrade experience, the compatibility hold on devices from being offered Windows 10, version 1903 or Windows Server, version 1903 is still in place. Once the issue is addressed on Windows 10, version 1903, this safeguard hold will be removed for all affected platforms. Check the Windows 10, version 1903 section of the release information dashboard for the most up to date information on this and other safeguard holds.

Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

Back to top
OS Build 14393.3115

July 16, 2019
KB4507459
Resolved
KB4512517
Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
Internet Explorer 11 and apps using the WebBrowser control may fail to render
Internet Explorer 11 may fail to render some JavaScript after installing KB4507460. You may also have issues with apps using JavaScript or the WebBrowser control, such as the present PowerPoint feature of Skype Meeting Broadcast.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server 2016
Resolution: This issue was resolved in KB4512517.

Back to top
OS Build 14393.3085

July 09, 2019
KB4507460
Resolved
KB4512517
Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 26, 2019
04:58 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503267 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Workaround:
To mitigate this issue on an SCCM server:
  1. Verify Variable Window Extension is enabled.
  2. Set the values of TFTP block size to 4096 and TFTP window size to 1. For guidance on how to configure them, see Customize the RamDisk TFTP block and window sizes on PXE-enabled distribution points.
Note Try the default values for TFTP block size and TFTP window size first but depending on your environment and overall settings, you may need to adjust them for your setup. You can also try the Enable a PXE responder without Windows Deployment Service setting. For more information on this setting, see Install and configure distribution points in Configuration Manager.

To mitigate this issue on a WDS server without SCCM:
  1. In WDS TFTP settings, verify Variable Window Extension is enabled.
  2. In the Boot Configuration Data (BCD) of the imported image, set RamDiskTFTPBlockSize to 1456.
  3. In the BCD of the imported image, set RamDiskTFTPWindowSize to 4.
Note Try the default values for RamDiskTFTPBlockSize and RamDiskTFTPWindowSize first but depending on your environment and overall settings, you may need to adjust them for your setup.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.3025

June 11, 2019
KB4503267
Mitigated
Last updated:
July 10, 2019
07:09 PM PT

Opened:
July 10, 2019
02:51 PM PT
" diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index 22dc09d48a..9fa8392574 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -60,10 +60,10 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ -
SummaryOriginating updateStatusLast updated
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
OS Build 16299.1217

June 11, 2019
KB4503284
Resolved
KB4512494
August 16, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 16299.1331

August 13, 2019
KB4512516
Resolved
KB4512494
August 16, 2019
02:00 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 16299.1296

July 16, 2019
KB4507465
Resolved
KB4512516
August 13, 2019
10:00 AM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >
OS Build 16299.1217

June 11, 2019
KB4503284
Resolved External
August 09, 2019
07:03 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
OS Build 16299.1217

June 11, 2019
KB4503284
Mitigated
July 10, 2019
07:09 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Mitigated
April 25, 2019
02:00 PM PT
" @@ -90,9 +90,9 @@ sections: - type: markdown text: " + -
DetailsOriginating updateStatusHistory
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503284 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512494.

Back to top
OS Build 16299.1217

June 11, 2019
KB4503284
Resolved
KB4512494
Resolved:
August 16, 2019
02:00 PM PT

Opened:
July 10, 2019
02:51 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4507465. Devices that are domain controllers or domain members are both affected.

To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
 

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4512516. To safeguard your upgrade experience, the compatibility hold on devices from being offered Windows 10, version 1903 or Windows Server, version 1903 is still in place. Once the issue is addressed on Windows 10, version 1903, this safeguard hold will be removed for all affected platforms. Check the Windows 10, version 1903 section of the release information dashboard for the most up to date information on this and other safeguard holds.

Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

Back to top
OS Build 16299.1296

July 16, 2019
KB4507465
Resolved
KB4512516
Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503284 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Workaround:
To mitigate this issue on an SCCM server:
  1. Verify Variable Window Extension is enabled.
  2. Set the values of TFTP block size to 4096 and TFTP window size to 1. For guidance on how to configure them, see Customize the RamDisk TFTP block and window sizes on PXE-enabled distribution points.
Note Try the default values for TFTP block size and TFTP window size first but depending on your environment and overall settings, you may need to adjust them for your setup. You can also try the Enable a PXE responder without Windows Deployment Service setting. For more information on this setting, see Install and configure distribution points in Configuration Manager.

To mitigate this issue on a WDS server without SCCM:
  1. In WDS TFTP settings, verify Variable Window Extension is enabled.
  2. In the Boot Configuration Data (BCD) of the imported image, set RamDiskTFTPBlockSize to 1456.
  3. In the BCD of the imported image, set RamDiskTFTPWindowSize to 4.
Note Try the default values for RamDiskTFTPBlockSize and RamDiskTFTPWindowSize first but depending on your environment and overall settings, you may need to adjust them for your setup.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.1217

June 11, 2019
KB4503284
Mitigated
Last updated:
July 10, 2019
07:09 PM PT

Opened:
July 10, 2019
02:51 PM PT
" diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml index a0e9fb7109..c9f0739b5a 100644 --- a/windows/release-information/status-windows-10-1803.yml +++ b/windows/release-information/status-windows-10-1803.yml @@ -65,10 +65,10 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- + + -
SummaryOriginating updateStatusLast updated
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 17134.950

August 13, 2019
KB4512501
Investigating
August 17, 2019
01:37 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
OS Build 17134.829

June 11, 2019
KB4503286
Resolved
KB4512509
August 19, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 17134.950

August 13, 2019
KB4512501
Resolved
KB4512509
August 19, 2019
02:00 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 17134.915

July 16, 2019
KB4507466
Resolved
KB4512501
August 13, 2019
10:00 AM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >
OS Build 17134.829

June 11, 2019
KB4503286
Resolved External
August 09, 2019
07:03 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
OS Build 17134.829

June 11, 2019
KB4503286
Mitigated
July 10, 2019
07:09 PM PT
Startup to a black screen after installing updates
Your device may startup to a black screen during the first logon after installing updates.

See details >
OS Build 17134.829

June 11, 2019
KB4503286
Mitigated
June 14, 2019
04:41 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Mitigated
April 25, 2019
02:00 PM PT
@@ -86,7 +86,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512501, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: Microsoft is working on a resolution and estimates a solution will be available over the coming days.

The ‘optional’ update will be available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive this update once it is released and install it.

Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS).

Back to top
OS Build 17134.950

August 13, 2019
KB4512501
Investigating
Last updated:
August 17, 2019
01:37 PM PT

Opened:
August 14, 2019
03:34 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512501, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4512509. The ‘optional’ update will be available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive KB4512509 and install. For instructions, see Update Windows 10.

Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS).

Back to top
OS Build 17134.950

August 13, 2019
KB4512501
Resolved
KB4512509
Resolved:
August 19, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on your Apple MacOS device when trying to access network shares via CIFS or SMBv1 on a Windows devices that has installed updates on June 11, 2019 (KB4503286) or later. When you encounter this issue, in MacOS you may receive the error, “There was a problem connecting to the server “{Server Host Name}”. Check the server name or IP address, and then try again. If you continue to have problems, contact your system administrator.”

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: For guidance on this issue, see the Apple support article If your Mac can't use NTLM to connect to a Windows server. There is no update for Windows needed for this issue.

Back to top
OS Build 17134.829

June 11, 2019
KB4503286
Resolved External
Last updated:
August 09, 2019
07:03 PM PT

Opened:
August 09, 2019
04:25 PM PT
" @@ -96,9 +96,9 @@ sections: - type: markdown text: " + -
DetailsOriginating updateStatusHistory
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503286 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512509.

Back to top
OS Build 17134.829

June 11, 2019
KB4503286
Resolved
KB4512509
Resolved:
August 19, 2019
02:00 PM PT

Opened:
July 10, 2019
02:51 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4507466. Devices that are domain controllers or domain members are both affected.

To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
 

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4512501. To safeguard your upgrade experience, the compatibility hold on devices from being offered Windows 10, version 1903 or Windows Server, version 1903 is still in place. Once the issue is addressed on Windows 10, version 1903, this safeguard hold will be removed for all affected platforms. Check the Windows 10, version 1903 section of the release information dashboard for the most up to date information on this and other safeguard holds.

Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

Back to top
OS Build 17134.915

July 16, 2019
KB4507466
Resolved
KB4512501
Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503286 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Workaround:
To mitigate this issue on an SCCM server:
  1. Verify Variable Window Extension is enabled.
  2. Set the values of TFTP block size to 4096 and TFTP window size to 1. For guidance on how to configure them, see Customize the RamDisk TFTP block and window sizes on PXE-enabled distribution points.
Note Try the default values for TFTP block size and TFTP window size first but depending on your environment and overall settings, you may need to adjust them for your setup. You can also try the Enable a PXE responder without Windows Deployment Service setting. For more information on this setting, see Install and configure distribution points in Configuration Manager.

To mitigate this issue on a WDS server without SCCM:
  1. In WDS TFTP settings, verify Variable Window Extension is enabled.
  2. In the Boot Configuration Data (BCD) of the imported image, set RamDiskTFTPBlockSize to 1456.
  3. In the BCD of the imported image, set RamDiskTFTPWindowSize to 4.
Note Try the default values for RamDiskTFTPBlockSize and RamDiskTFTPWindowSize first but depending on your environment and overall settings, you may need to adjust them for your setup.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17134.829

June 11, 2019
KB4503286
Mitigated
Last updated:
July 10, 2019
07:09 PM PT

Opened:
July 10, 2019
02:51 PM PT
" diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index 9be5808d94..4c3dfc4364 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -64,11 +64,11 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ - @@ -98,9 +98,9 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
OS Build 17763.557

June 11, 2019
KB4503327
Resolved
KB4512534
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 17763.678

August 13, 2019
KB4511553
Resolved
KB4512534
August 17, 2019
02:00 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 17763.652

July 22, 2019
KB4505658
Resolved
KB4511553
August 13, 2019
10:00 AM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >
OS Build 17763.557

June 11, 2019
KB4503327
Resolved External
August 09, 2019
07:03 PM PT
Apps and scripts using the NetQueryDisplayInformation API may fail with error
Applications and scripts that call the NetQueryDisplayInformation API or the WinNT provider equivalent may fail to return results after the first page of data.

See details >
OS Build 17763.55

October 09, 2018
KB4464330
Investigating
August 01, 2019
05:00 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
OS Build 17763.557

June 11, 2019
KB4503327
Mitigated
July 10, 2019
07:09 PM PT
Startup to a black screen after installing updates
Your device may startup to a black screen during the first logon after installing updates.

See details >
OS Build 17763.557

June 11, 2019
KB4503327
Mitigated
June 14, 2019
04:41 PM PT
Devices with some Asian language packs installed may receive an error
After installing the KB4493509 devices with some Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_F

See details >
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
May 03, 2019
10:59 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 17763.253

January 08, 2019
KB4480116
Mitigated
April 09, 2019
10:00 AM PT
+ -
DetailsOriginating updateStatusHistory
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503327 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512534.

Back to top
OS Build 17763.557

June 11, 2019
KB4503327
Resolved
KB4512534
Resolved:
August 17, 2019
02:00 PM PT

Opened:
July 10, 2019
02:51 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4505658. Devices that are domain controllers or domain members are both affected.

To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
 

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4511553. To safeguard your upgrade experience, the compatibility hold on devices from being offered Windows 10, version 1903 or Windows Server, version 1903 is still in place. Once the issue is addressed on Windows 10, version 1903, this safeguard hold will be removed for all affected platforms. Check the Windows 10, version 1903 section of the release information dashboard for the most up to date information on this and other safeguard holds.

Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

Back to top
OS Build 17763.652

July 22, 2019
KB4505658
Resolved
KB4511553
Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503327 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Workaround:
To mitigate this issue on an SCCM server:
  1. Verify Variable Window Extension is enabled.
  2. Set the values of TFTP block size to 4096 and TFTP window size to 1. For guidance on how to configure them, see Customize the RamDisk TFTP block and window sizes on PXE-enabled distribution points.
Note Try the default values for TFTP block size and TFTP window size first but depending on your environment and overall settings, you may need to adjust them for your setup. You can also try the Enable a PXE responder without Windows Deployment Service setting. For more information on this setting, see Install and configure distribution points in Configuration Manager.

To mitigate this issue on a WDS server without SCCM:
  1. In WDS TFTP settings, verify Variable Window Extension is enabled.
  2. In the Boot Configuration Data (BCD) of the imported image, set RamDiskTFTPBlockSize to 1456.
  3. In the BCD of the imported image, set RamDiskTFTPWindowSize to 4.
Note Try the default values for RamDiskTFTPBlockSize and RamDiskTFTPWindowSize first but depending on your environment and overall settings, you may need to adjust them for your setup.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.557

June 11, 2019
KB4503327
Mitigated
Last updated:
July 10, 2019
07:09 PM PT

Opened:
July 10, 2019
02:51 PM PT
" diff --git a/windows/release-information/status-windows-10-1903.yml b/windows/release-information/status-windows-10-1903.yml index 1039a0f7f1..1d23df7da7 100644 --- a/windows/release-information/status-windows-10-1903.yml +++ b/windows/release-information/status-windows-10-1903.yml @@ -65,7 +65,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- + @@ -96,7 +96,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 18362.295

August 13, 2019
KB4512508
Investigating
August 17, 2019
01:38 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 18362.295

August 13, 2019
KB4512508
Investigating
August 17, 2019
01:49 PM PT
Updates may fail to install and you may receive Error 0x80073701
Installation of updates may fail and you may receive an error, \"Updates Failed, There were problems installing some updates, but we'll try again later\" and \"Error 0x80073701.\"

See details >
OS Build 18362.145

May 29, 2019
KB4497935
Investigating
August 16, 2019
04:28 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 18362.145

May 29, 2019
KB4497935
Investigating
August 13, 2019
06:59 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >
OS Build 18362.175

June 11, 2019
KB4503293
Resolved External
August 09, 2019
07:03 PM PT
- +
DetailsOriginating updateStatusHistory
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512508, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: Microsoft is working on a resolution and estimates a solution will be available late August. The ‘optional’ update will be available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive the update once it is released.

Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS).

Back to top
OS Build 18362.295

August 13, 2019
KB4512508
Investigating
Last updated:
August 17, 2019
01:38 PM PT

Opened:
August 14, 2019
03:34 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512508, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Next steps: Microsoft is working on a resolution and estimates a solution will be available late August. The ‘optional’ update will be available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive the update once it is released.

Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS).

Back to top
OS Build 18362.295

August 13, 2019
KB4512508
Investigating
Last updated:
August 17, 2019
01:49 PM PT

Opened:
August 14, 2019
03:34 PM PT
Updates may fail to install and you may receive Error 0x80073701
Installation of updates may fail and you may receive the error message, \"Updates Failed, There were problems installing some updates, but we'll try again later\" or \"Error 0x80073701\" on the Windows Update dialog or within Update history.

Affected platforms:
  • Client: Windows 10, version 1903
  • Server: Windows Server, version 1903
Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 18362.145

May 29, 2019
KB4497935
Investigating
Last updated:
August 16, 2019
04:28 PM PT

Opened:
August 16, 2019
01:41 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on your Apple MacOS device when trying to access network shares via CIFS or SMBv1 on a Windows devices that has installed updates on June 11, 2019 (KB4503293) or later. When you encounter this issue, in MacOS you may receive the error, “There was a problem connecting to the server “{Server Host Name}”. Check the server name or IP address, and then try again. If you continue to have problems, contact your system administrator.”

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: For guidance on this issue, see the Apple support article If your Mac can't use NTLM to connect to a Windows server. There is no update for Windows needed for this issue.

Back to top
OS Build 18362.175

June 11, 2019
KB4503293
Resolved External
Last updated:
August 09, 2019
07:03 PM PT

Opened:
August 09, 2019
04:25 PM PT
diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index 32a79ba231..15f5bd4ccc 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -60,12 +60,12 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ -
SummaryOriginating updateStatusLast updated
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
June 11, 2019
KB4503292
Resolved
KB4512514
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
August 13, 2019
KB4512506
Resolved
KB4517297
August 16, 2019
02:00 PM PT
IA64 and x64 devices may fail to start after installing updates
After installing updates released on or after August 13, 2019, IA64 and x64 devices using EFI Boot may fail to start.

See details >
August 13, 2019
KB4512506
Mitigated
August 17, 2019
12:59 PM PT
Windows updates that are SHA-2 signed may not be offered for Symantec and Norton AV
Windows udates that are SHA-2 signed are not available with Symantec or Norton antivirus program installed

See details >
August 13, 2019
KB4512506
Investigating
August 16, 2019
04:28 PM PT
System may be unresponsive after restart with certain McAfee antivirus products
Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

See details >
April 09, 2019
KB4493472
Resolved External
August 13, 2019
06:59 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >
June 11, 2019
KB4503292
Resolved External
August 09, 2019
07:03 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
June 11, 2019
KB4503292
Mitigated
July 10, 2019
02:59 PM PT
" @@ -93,7 +93,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503292 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Workaround:
To mitigate this issue on an SCCM server, set the values of TFTP block size to 4096 and TFTP window size to 1. For guidance on how to configure them, see Customize the RamDisk TFTP block and window sizes on PXE-enabled distribution points.

Note Try the default values for TFTP block size and TFTP window size first but depending on your environment and overall settings, you may need to adjust them for your setup. You can also try the Enable a PXE responder without Windows Deployment Service setting. For more information on this setting, see Install and configure distribution points in Configuration Manager.

To mitigate this issue on a WDS server without SCCM:
  1. In the Boot Configuration Data (BCD) of the imported image, set RamDiskTFTPBlockSize to 1456.
  2. In the BCD of the imported image, set RamDiskTFTPWindowSize to 4.
Note Try the default values for RamDiskTFTPBlockSize and RamDiskTFTPWindowSize first but depending on your environment and overall settings, you may need to adjust them for your setup.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
June 11, 2019
KB4503292
Mitigated
Last updated:
July 10, 2019
02:59 PM PT

Opened:
July 10, 2019
02:51 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503292 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512514.

Back to top
June 11, 2019
KB4503292
Resolved
KB4512514
Resolved:
August 17, 2019
02:00 PM PT

Opened:
July 10, 2019
02:51 PM PT
" diff --git a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml index 9d7b7f6c5a..3efbd362b4 100644 --- a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml @@ -60,10 +60,10 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ -
SummaryOriginating updateStatusLast updated
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
June 11, 2019
KB4503276
Resolved
KB4512478
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
August 13, 2019
KB4512488
Resolved
KB4517298
August 16, 2019
02:00 PM PT
System may be unresponsive after restart with certain McAfee antivirus products
Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

See details >
April 09, 2019
KB4493446
Resolved External
August 13, 2019
06:59 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >
June 11, 2019
KB4503276
Resolved External
August 09, 2019
07:03 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
June 11, 2019
KB4503276
Mitigated
July 10, 2019
07:09 PM PT
Japanese IME doesn't show the new Japanese Era name as a text input option
If previous dictionary updates are installed, the Japanese input method editor (IME) doesn't show the new Japanese Era name as a text input option.

See details >
April 25, 2019
KB4493443
Mitigated
May 15, 2019
05:53 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >
January 08, 2019
KB4480963
Mitigated
April 25, 2019
02:00 PM PT
@@ -91,7 +91,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503276 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Workaround:
To mitigate this issue on an SCCM server:
  1. Verify Variable Window Extension is enabled.
  2. Set the values of TFTP block size to 4096 and TFTP window size to 1. For guidance on how to configure them, see Customize the RamDisk TFTP block and window sizes on PXE-enabled distribution points.
Note Try the default values for TFTP block size and TFTP window size first but depending on your environment and overall settings, you may need to adjust them for your setup. You can also try the Enable a PXE responder without Windows Deployment Service setting. For more information on this setting, see Install and configure distribution points in Configuration Manager.

To mitigate this issue on a WDS server without SCCM:
  1. In WDS TFTP settings, verify Variable Window Extension is enabled.
  2. In the Boot Configuration Data (BCD) of the imported image, set RamDiskTFTPBlockSize to 1456.
  3. In the BCD of the imported image, set RamDiskTFTPWindowSize to 4.
Note Try the default values for RamDiskTFTPBlockSize and RamDiskTFTPWindowSize first but depending on your environment and overall settings, you may need to adjust them for your setup.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
June 11, 2019
KB4503276
Mitigated
Last updated:
July 10, 2019
07:09 PM PT

Opened:
July 10, 2019
02:51 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503276 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512478.

Back to top
June 11, 2019
KB4503276
Resolved
KB4512478
Resolved:
August 17, 2019
02:00 PM PT

Opened:
July 10, 2019
02:51 PM PT
" diff --git a/windows/release-information/status-windows-server-2008-sp2.yml b/windows/release-information/status-windows-server-2008-sp2.yml index b8b9bb20a0..d1010bdae7 100644 --- a/windows/release-information/status-windows-server-2008-sp2.yml +++ b/windows/release-information/status-windows-server-2008-sp2.yml @@ -60,9 +60,9 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ -
SummaryOriginating updateStatusLast updated
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
June 11, 2019
KB4503273
Resolved
KB4512499
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
August 13, 2019
KB4512476
Resolved
KB4517301
August 16, 2019
02:00 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >
June 11, 2019
KB4503273
Resolved External
August 09, 2019
07:03 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
June 11, 2019
KB4503273
Mitigated
July 10, 2019
02:59 PM PT
" @@ -88,6 +88,6 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503273 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Workaround:
To mitigate this issue on an SCCM server, set the values of TFTP block size to 4096 and TFTP window size to 1. For guidance on how to configure them, see Customize the RamDisk TFTP block and window sizes on PXE-enabled distribution points.

Note Try the default values for TFTP block size and TFTP window size first but depending on your environment and overall settings, you may need to adjust them for your setup. You can also try the Enable a PXE responder without Windows Deployment Service setting. For more information on this setting, see Install and configure distribution points in Configuration Manager.

To mitigate this issue on a WDS server without SCCM:
  1. In the Boot Configuration Data (BCD) of the imported image, set RamDiskTFTPBlockSize to 1456.
  2. In the BCD of the imported image, set RamDiskTFTPWindowSize to 4.
Note Try the default values for RamDiskTFTPBlockSize and RamDiskTFTPWindowSize first but depending on your environment and overall settings, you may need to adjust them for your setup.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
June 11, 2019
KB4503273
Mitigated
Last updated:
July 10, 2019
02:59 PM PT

Opened:
July 10, 2019
02:51 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503273 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512499.

Back to top
June 11, 2019
KB4503273
Resolved
KB4512499
Resolved:
August 17, 2019
02:00 PM PT

Opened:
July 10, 2019
02:51 PM PT
" diff --git a/windows/release-information/status-windows-server-2012.yml b/windows/release-information/status-windows-server-2012.yml index df2dfdfbe6..055acb57ff 100644 --- a/windows/release-information/status-windows-server-2012.yml +++ b/windows/release-information/status-windows-server-2012.yml @@ -60,9 +60,9 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ -
SummaryOriginating updateStatusLast updated
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
June 11, 2019
KB4503285
Resolved
KB4512512
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
August 13, 2019
KB4512518
Resolved
KB4517302
August 16, 2019
02:00 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >
June 11, 2019
KB4503285
Resolved External
August 09, 2019
07:03 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
June 11, 2019
KB4503285
Mitigated
July 10, 2019
07:09 PM PT
Japanese IME doesn't show the new Japanese Era name as a text input option
If previous dictionary updates are installed, the Japanese input method editor (IME) doesn't show the new Japanese Era name as a text input option.

See details >
April 25, 2019
KB4493462
Mitigated
May 15, 2019
05:53 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >
January 08, 2019
KB4480975
Mitigated
April 25, 2019
02:00 PM PT
@@ -90,7 +90,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503285 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Workaround:
To mitigate this issue on an SCCM server:
  1. Verify Variable Window Extension is enabled.
  2. Set the values of TFTP block size to 4096 and TFTP window size to 1. For guidance on how to configure them, see Customize the RamDisk TFTP block and window sizes on PXE-enabled distribution points.
Note Try the default values for TFTP block size and TFTP window size first but depending on your environment and overall settings, you may need to adjust them for your setup. You can also try the Enable a PXE responder without Windows Deployment Service setting. For more information on this setting, see Install and configure distribution points in Configuration Manager.

To mitigate this issue on a WDS server without SCCM:
  1. In WDS TFTP settings, verify Variable Window Extension is enabled.
  2. In the Boot Configuration Data (BCD) of the imported image, set RamDiskTFTPBlockSize to 1456.
  3. In the BCD of the imported image, set RamDiskTFTPWindowSize to 4.
Note Try the default values for RamDiskTFTPBlockSize and RamDiskTFTPWindowSize first but depending on your environment and overall settings, you may need to adjust them for your setup.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
June 11, 2019
KB4503285
Mitigated
Last updated:
July 10, 2019
07:09 PM PT

Opened:
July 10, 2019
02:51 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503285 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512512.

Back to top
June 11, 2019
KB4503285
Resolved
KB4512512
Resolved:
August 17, 2019
02:00 PM PT

Opened:
July 10, 2019
02:51 PM PT
" From d1c05ca3a01c8bd0fac61c69f679f55cb33dce24 Mon Sep 17 00:00:00 2001 From: DocsPreview <49669258+DocsPreview@users.noreply.github.com> Date: Tue, 20 Aug 2019 12:32:51 -0700 Subject: [PATCH 031/285] Merge from master to live (#956) * safety checkin * added location for group policy object * replaced reboot w/ restart * safety commit for some initial noodlings * restructured to emphasize new policy; connected to TOC * adjusting heading levels * fixing tables * Latest change for August 20 (#955) --- windows/deployment/TOC.md | 1 + .../wufb-pastdeadline-restart-warning.png | Bin 0 -> 52613 bytes .../images/wufb-pastdeadline-restartnow.png | Bin 0 -> 23060 bytes .../images/wufb-restart-imminent-warning.png | Bin 0 -> 41159 bytes .../images/wufb-update-deadline-warning.png | Bin 0 -> 31090 bytes .../update/wufb-compliancedeadlines.md | 273 +++++++++++------- .../status-windows-10-1903.yml | 4 +- 7 files changed, 176 insertions(+), 102 deletions(-) create mode 100644 windows/deployment/update/images/wufb-pastdeadline-restart-warning.png create mode 100644 windows/deployment/update/images/wufb-pastdeadline-restartnow.png create mode 100644 windows/deployment/update/images/wufb-restart-imminent-warning.png create mode 100644 windows/deployment/update/images/wufb-update-deadline-warning.png diff --git a/windows/deployment/TOC.md b/windows/deployment/TOC.md index cc903e11ec..2ac2f8253f 100644 --- a/windows/deployment/TOC.md +++ b/windows/deployment/TOC.md @@ -249,6 +249,7 @@ ### Use Windows Update for Business #### [Deploy updates using Windows Update for Business](update/waas-manage-updates-wufb.md) #### [Configure Windows Update for Business](update/waas-configure-wufb.md) +#### [Enforcing compliance deadlines for updates](update/wufb-compliancedeadlines.md) #### [Integrate Windows Update for Business with management solutions](update/waas-integrate-wufb.md) #### [Walkthrough: use Group Policy to configure Windows Update for Business](update/waas-wufb-group-policy.md) #### [Walkthrough: use Intune to configure Windows Update for Business](https://docs.microsoft.com/intune/windows-update-for-business-configure) diff --git a/windows/deployment/update/images/wufb-pastdeadline-restart-warning.png b/windows/deployment/update/images/wufb-pastdeadline-restart-warning.png new file mode 100644 index 0000000000000000000000000000000000000000..984afea6ed65d637c32d8e1e02698bf706241616 GIT binary patch literal 52613 zcmV)@K!LxBP)Px#1ZP1_K>z@;j|==^1poj532;bRa{vGi!vFvd!vV){sAK>D%^FEWK~#8N?EMFL zR@aq14y)6_y~QndoH&kq+#6NBqC)SzH}&3o7eW;w2?-&(5Fh~(UG(0&G1vxoJ8|0l zzL{CyTIWR$ahOT|6K2MqpyxS{-uJ%up0dy0Yp;FoDOR}t_wWDy@7F)w{=5Bm`|tMO z?Y|%T-@pIczg_F6Q_Dz8t zh^pEQt6vAhs&DM=bUWQnx6|$PLrkxS;`P}J1l$I<_4gM*p1gQFtorcA{^_^V?Q}cc zPPfw!F*zlmU*sYIx4~`w-3Id8>2|uEZl@npx((#F)9rLS-A+I9bQ{QTr`zdvx}ARH z={AtxPPfzTbUXdX(`_LCF{HGcT)Ular`zdvx}I(cko#mXWx~prsedM{ebQkq@Zo=b zx9Xq8#Cy#B`mby4-`nrG@%xWIS^K2@IT;{U`!X!D;kBDRb7Rtdmd|>Q^7GZR7MWW2 zPc_%ADfjmL{#;Ib`pf)&Ea|(psIA|-cH@0N{$$a2>+fCv^Y_1P50<|F&wu-V{(qe; zdU<1c-#vTNy#Mlki_YEbzW1NL>{eQ{h2bgXRBhP`2S3a!# z<}&5N);k3@z6ln=^yhW|Lf#`VXQ%t-@E(5We;c0^-otBt1^g}hdS3q*QW|X8HhZ5$ z*n20koyojrQ5dz^j^FLcdOtWFzKaPN&16!|b*n6e24Cd*b z#4?lkOcI}AdA>g~g}m;R?7WlNPPHZFyWjNLj&1vk`+w9)x*+nBPJK{6S#&}DZTYTy zEWiI}$=)js4(xyPjQZPG`XaqaHP;=yWq&t+_Rp!kE*3DepDTk1ZC&q=A62>) zKyFPo?%L&}Bn!dZqy*EqNeoQ7( z%b?@WB(Tf&6cO{9t`lf)_S|12Mbb*94$8}-d+q5ju73w`?fsHwh>D2GU*-GXkSuyG zlEg%!V{CxJ{Z>W%9_lo=4(Mp7{}^TLI)Y6ly0=3u_Ylv=M+1 zylp5nu|)~^&xUAW9RfK6XiS#h+Lh%0LZWgQCT#(3i;-HC-;&y|-|X4;MB}7fI(Wq! z`8m*F?D^l?H=nXjpsXn~e=-Vx=I5{SEXF8cxAD$0Y+e6vp7#$h8Kxv=WC0B$C$`lj zBeU<_|07Sv;ToM+zp0^iSfwR8b6~P#5-^$Tet%E@TY%aE<~K{s zgVCSz6zB>3?3gV7(@e54{q^6UgfI4tN;@cdCD0}Wydp5|Hukq{O5`f}hCC7}v+H@7 zHvD~g{2ztl_Jul(d3uIq05@Ph$!OaC}{Y4|JIuwvshzN`O# zZ?X_T%7)}nAa2MFlc~StXogH~{%m{tejXkEA`d=q`s3!${-D!84&)Z_5D;seR^w_$ z82&}Po(l&u3pcJpVyOMWzHpFE>*w!R6l_hh8wM|lP0^I9&iF<&}KD`)nN2Y(mCGa;^JJkt!d z{0}juTairvyT?;TF?3XnLfGzhaM5r7mxfj}M4<6p(`LON@*rqaKkW27ZNiqiqxT^< zd-lfU;Khj7gTUmQ#%B_lPYmr$?@?%TboL#*HH>icXWP?v0 zhTU6|hHOOEM8*s`(^$Cy`y`PAY+6giHcxcM6uz$Ya}SoKB#`-)x*iVbwQ?ibv(}oohPe z&rCr7zn|}qGf62djLPEV?A>GV(-CR-`M4|^AEOg*8h|mLn?G-o8JeNOkqyZKYPd?u zE3mWiEi`QV4l;?SM`z={K{RAfMnihZDW_>(cB=dz5BS-T<=r(X13w?1i>}_WjN~+= zB#==^t#DXvyZN&}wj?KSPawAuIC^K}o*^0d#pq;oWuIA_{w7GVKmS$~BIjo3OCa}% zLpK8XljHJm|6uAH9lVW~#;*T%l-vGN(_(+rIg&5~lBxrrxACMyagXM8-lL&B5idWH z5jrBh{PZXA{T)pBA5CV=--C7VVtE0jER*;_n-H6}FzV~|zsa-h$>iawJXl|ohbCd@ zy@G|^n<3%9k;e}<{o_C`_Q?(n5Qr0a+*0vw(sBgVZbla`DgX`C%8%^aB@XXQO+j!? z3pxzcuuG9qAa#NzocWOo@FvMb9qlYZ%HbT1?41`-ed=S_x@*RX?vv8|^|S5CGUJEO zOLj7DKGTIP=&^y(WM5Q7_jEioGzU!|e~STy8`+W31b7*)%4IU3uFp5m{|A>Gqv2Dq z3C&;q3mzOsgCjGyjJ;Z34qN2;y=Q);NkFb>N-wLe+|n_kqy?KUe};SgX=h$!i3CPt z7k|sy`%_MS)DzcOJP?qM)=z$q@fB^b?iB`GKiVaKzv*)~q`v}kCIjSNDQ4KAyI&k0 z8WM|+0&cNyf6Xw{%R<$kePU*>{P)|g>UiJ46m*gE@FC8~E?BMz({~_jhIwxOy!1$s z$Gyy>8y%6gH%X*M4Jhk&X8*VI_yMPX6v!nUGaYUKzstip$K&PcnYjA@{uTX`t7)K7 zysrqhj^S8;;ykK%9D%i)6sH7s?vd!^8f;j}cV1n_>#5GVL5cO*ODtApP}pAluJJkj zX9#(7h39>`N53oS`5S-NZ#T>1#%ENXDObN;Hwt}k|6TXCUpM((zt@8xs(kxX=@~j( zdnDqyX>;+?ta)TwWH@>u#jyChe3aVjrwE3hZQWwX9(b=`39nPG1nQTk<)h{JMRb+Z z^vE!V_UowScwk}~%WfZ2WxirA?#z#2x8>UPWZKJXs$+Y(rVTgTb7L}Xx}J2eo|F9l z>iO$3Xix1jYA>t3Z8v^yPuH(mQ(pHD%fl;?OVF9dY2zswG6L}-PXtEcjJBE&-eS+^toML%Jas1+vTJ@J=nM2Y+JuX zj4NJ?L!W+)pZJBFezg%RR^Q7GOda@)>egP*>-iZ+uf%&g5R6`ns>g#P^QmK+F(yE! zO|`ef(X9F>8d_|7a3=nh_Qnr%3gCYv3eWI_MAmW7uHR7>o?EbYwZzlX@mMk z!!O_0fg6*N`StQ{?6Y<`eZa$XKWh3PbN57=t_gsa$SS@M7l8$iq1Zw$71k zUk17k%)q??Q7kta5A~16{az8clg`jKfQsal$U4R2LH|%Z;1gzPhj%7AyUvDxXco?W z@-?0u5|8^lqR_=VmURq*9m8;Ig}pvBGM0IlZz6uuKNj89W)~)J&F{}g2ZrC>*j_8Q zc-%E00r&Thg0&(9D!jF3IItYCF|i+O%HP2^6Am6>4Ap~ipMNwuljRu);l^kE5^%5P zth=&L+yxx$L-m78GCHze53+roHI>UHiL&7{1ScCt79DxbM*Y~IM#M5~{Ma`BZYSea z-ei{=W)YxtBn!87i9!$m1a$MKuE`kLp04bR`~9PEm#5^TG1BWZCtT9doo#%8fY^gf z(nKU;Uy2&NvtZ9UcK79V4_?z$M*|v~kDY){1K4(r%R8yw@p#xj0(Vm{tlR{qmKj)G zykgN=G8YSG-K{+fU`K#;2w=U)&@{m={l4wAj1R_7FS z_m0MW1Cr5!k;m}72JHIy3q0x{#{OVl?yQ$b9PS;Ih`ZR2RxXj|dS`z|dWHm~!p2*( z!zfSc+kHONOUc!&DJg>59D z*;5vF0%kw03!$8yf>5-6KQ^8D5Ks6;P%qh^{i$QFxs*`~9_t^32Ye+XwVCyyEYuGg z!Z2g%Y`5&WqwKzw%+4;yz5OOo@AO`Y{jV`{6Y&YeHQZ~#wjWjc$AO$lvm>ND>^ysYcFw?K z;|p=|kAK9#xJt9>`SL>-5x;B;tlka8!^87Y+IAMLm#$&knGdk?{AX~As)5xzA^63F zLaaFVDP9YyfwdzQ*g2d`vE_g z2!;yvXb4Y_&O-Ix^H_KBGpspx4UOkMhI0h#(uaay}qWObsNL{rDchGoi z+K!`NFpaZM41qcuF{_UAzN^@H`Z8KR_!QI1TByu49LEIs7pz6o{xe8v*oUR(uMs>x zLq_vqbfw(Her(A`Z0Q6Y1gd@0;g`Asi*_ADUfU7u`0#V|iL60avc23*C$RZE%Xt4Y z6t`U@aK^!gPE*mCPs%d1Ui=hIXFtSZwlA-79|~KK(Rs(iIc+`a4__pJQJ)Aj*8QU4 z7*UGS9mm)^~Z^Q9MZJU2*sd2D6W?`m#UhtfrQ4#-_^_S+!mH1m5|rw6R3IHm!`dbDnzq z5n3;Qi8%|mp@Ul>x{w@nl%oisJ<*}gtlf%Fzy2LQ|Mm~q#rlpaScjmcKUS1M2Q%zK{RyDVJYwdQ`4g0X|%4e8dy%9OorLX?< z|HJ;PUt-Ov5Aa6FBI;}$9ZkH22>h6bc>nP+aw@f6G{{5xX&!49lYk=}nHzRv#i2_W z7*>P>1fRPHWudD}EY=@8kF_T*QUV*IhJJXQXxC^`Kbnfmm1&=fT7w44Yg%Md8mDzx6{|dOJR?$g? zVcOiam{71BkBlnBYcq0i=%Y{JoxBVkJ+d$|a~;lI`wVYI6ykv~1!PD`I84CkpHK^{ zH)bMv$tIlp_$vH^vhduvx$uuI$C=MQ$Bg18SiLn3=!NGvS&zduL!AUA|~anF!#qSZo|t{O7KuX3aVR=W9`9ncxh@Ho|~MGwI|P` zpm`sx-V8z?I^#>f{}Y1d)!>&SQ{WL>g|B}9M;xM4vU+Pa#ulx?l`p=+PX$>03kZa> zF)=0|n=V|1ZNHg#eoPW}ef?WJH7pTbdrzj(euN`m{0qDz3h>LJvFH_4j?iSh&yLN+W5beh`isxu7gKCt%jX9XN31 zbKIrKL^DGAOh?X=X6(826&(5n<0t;J@W~&(#SRjacjuJiiAkkor*jPx)^LfHYdYQy zEX1X+zQ(N5HF$nx5`2TwsYhSnz}4TNyH_;s@{Yo`OP^qV>n=PuCK-L^RN>SozlDE# zHF|~>swZ z7x2#H95U*7^a&}(l`p@r3;mL_5cw!jA{=j9Fw$M?$ zHJQ)ngJxxj&KuJT@z}_0JU^5&y7VDtRcyk~#}%RbAd(3$%R4QzrbQ9G@a(2I_XAJ2 z3dpspP~&)Z3}HKH%#23z*!XnpzxFjg{o*$Wo!>~HN+I)Zz=dm9aqmDr+l!%)V<;M3un8+;Lv9VHlFwx>1z+Op0kj!au-?;UxI@h^KqxF7-`r$hF~kN zC9I^3`^Auv)5*L$lSUeW7pBdJV^B8Q&YVZqx}Cf}1FuaXu#;_TD8i}_ft;*s@A)g} z7rF@d49vvQYhR&%R52ZgK#I=volwjuS&i+dKjiaM$sU_<{FC3Kn}%U}vYl_wKt0)9 z&E89ld?KjS>_7IQt@^ch5+=`GjT09?#GTH%HyE!@FU5z9G@j}oLFY9RRxb~MS70ug z>nG^o9EtL6r;)c#{W1wQj=}sNhQPA5*md#>??xs>(i)vuTzF(o>pEY0|5dhP3M!$qu@$lIK?s^9zose6^n$0Yf-o7EbBKD z4UEoG8SPoUMV-{N&Ue_?Gb?fNtKZ?LgW@rzbUpSk3b=v!saud!H#*~ zGcXzlzx)brQ487jKv=tK*e?SP{k7O z@+Cs%Kyd4<;nH_zAZg`3G#ornkf$B>3dAZpw)C}h+;3CHjF_!@N7890Y59nSM(n9nS9erGiHpSy%nsnzgF zti>TliuZa_$KKE^H_Dn(f`dmgb~4I*d-ejOOJ)wc6WjF0G`u`28GR{>yw!WL_Au*8 zU43&_5#ImoOGf6bQ&0A#D{YvzyY=`vI=7Xy2S&Jf zJXR`!ErGnFX9~=iE0w!&^>%#l#kaWApUTuX0YOWSV9TlZVXGkt?_4vl+Ny6jMr1EU z{ecsBc2p8h5wu-G*zwNH+dUsI1y#_8dmKaNt0-8A9-DYe%eHC4Nsj!|@BCQT z{}HZAk$H4PRR^xHKSIqA znT?;uec5-t5-`4WBNiRKND!cb)A5YRZzRM1J?i$IMAiONsNQoF`%YgX2z`Usr)FaN z`KuUTw2sfx(4-grQs5O+fi)*7*Pc;i~h~nNM1PM7U=WKW;RATdqi*$gYczOhl z{FBcJvYCwBg0YQG%rR`f>60D=h7D&v!uF59MA4oTSh4RoR_r=}ON`#an@+=q@{F!+ z!x`#Y;g(}~VjLqOmuOh~$H3k@4i27l9-bLyHQ&|?*DyG54Ow|2wp{rdKAA1(LML{T z?0%#GM^0P&1~CeHd~gbmU;P5!NlP$d?mBFK|5M!IFR;=OVjO~NH(}%1Yv|?@h(`y6 zqvgYEcxrqBY+NJJ-80yt-;yVR=uWcjWAA^AaTV-O0hB-M=$ML$g{!cWjNFdSaBAU7 zeDKw8Fn7mMR35y5#k&vT;0NzBqWuQ;ZYcFy)AKoD*@@B!>K z1|FcHwG?!8C!qC?LQ3Nv)E~VJJ36I1JVS8c!>f2ZhNR4eV6By<9!cmCkcO?-ev9$B z1W4MXW`me{|FpfQ#uuaQ!!Pjg$U;6to%Bq?_LG;;cJ?C5cb~w*eW$Tv&jEb$FMmMn zif!oZ5`oILv(%~IAb!byJmAlI_X|YlK?T_K{uhi&7BOGik4Gwg&PchwZ6EfW`2d>_ zoX5ovKgSy8CkNPjRw4G$A$HeD0d2+FD+{)?ueKBCF*toK^C&VS2xfAD-k12MP-kg_ z`hHWK`+=uh0ptoD&1OygQ_YIPPGko*0&;rH*ad4*zwH=}Ti$yPf);PXwzCYiT`6F{ zLMjgpf}TF4ssR;y&fxK(so4MFm+*|B=j}(qx@C}&&&QeH{1I;iRvLy;yJa6DDhU|< zSbhNSqe9vCCy;xQsb5=JZB=tPp&9l>%Mht*rtk=?inv0~@E zZsnYa)U}6DcjN<0nNmW}1pK6b41w5o3gw3=-+WI8IcmH1Vgk-vj& zdn*i?jeD`_*eS9mg0jMRD%z@}pQC6U%Xo7dk{fnm%gJl7@gRWFakwXztgrIcSX;f|{V|_ag@6M{giAz^;UjTn&+d6xtVE4Ie z=o7jS&rU7F?hik~!-J{#1T9-BDS_N2b}9CK@G0(en}bmV@?9T(OGeH*Xtsi5G>Tge zp>`h`IT^5d(dnB*AZMQtXeN}jVCfOc%Y)8|5yOa_b-3{L?+Aho=%3Mufm!P@EPXkF zqZp43PQt$TuVG^Gdge=c>!n`r82H64zbgn+}71(@| zK;AdR0Qn99`S1*MVtuv{$ep4z^C=l!`)6V!fxLRt9(csn(eW?FgzTm8NT|V6)91rl zYZv+^;++}uux9@;9RB1hJU5jF?-|2(5y0u(%%TrE`Vi{$qHX)(JSPk5KlqZ4tq^w( znup_zXvSyOvaMR|l1F3D#7~E3wKW;~&5$uA2R~6hrb>A|SOM zuTQUFWXpE>F)H(qLkBuBtKMlyUEPKyM;Xz%C8Dc)81{VdFyd z5OoiuF1xTC+O<}vTDis$$V;&2qc8F3Sm}8J?CB7;pZO3eEB3)Nc?AaNG_cMq;1<7t z^`*`_6GvRK&_8iGc3-@P&4bv ze&FdJ1#-RYG+~ZBpMad(;K0R?F|l$FY+Mr1#!!9s0)^BJ|6ZMpsRWL%{|yY6iW!PdMBVlSh^|~i zMPuk`R+gorqfaC{_z)1O2=9c<$HlLIi#I0ow>KGDz8Q!fo>AEG!8J2ZZ1rj|a+-D_ zYts+mVel9l46RYY61;1|fd+0c<~hnRSlD-To2S zbLA2yB{ITzek!lA-fuEWxoaeuHPH(Quxh z469$$ancEEuN|x238-v6h`P2D7N`Ag1gyyvm+Ux+{c_wr!|>>sES&rFE4()F2YF;-HG}~r;xdNH&$=n0jn1$un+jW z%6E^4t!E;-`)87|G8})EzcB(jc1UHoEnF7@pSj-Ee_ z@TH8Hdb6%hQK%$aT}m>c5ZvlLw)xd*7?imhr#|@_J>0_ZF2VHNH~+$@ksz<3ojwz> z`ruh?x%dqutpwaVECpLX{tPcpCTMw3#$@J}H7 zXgVrd4&cP6-=YJf9?#_E<^^XDtpt9NzrRBL=oJcEIYv(cq+2u^+V*0@uEQiNmvPT9 z*;z6k_Kn3Zl7J}%b?D|i13T%|W6EhGug|vh2cu(q$0&@-TYCB&Pc#(4K zOFPs%3m@iBQf8-NN|B%5Sx8-X0PBu3itQyGor&`8#|V~Z(V^!=%h1f*!SIW(#8EoC zhX;@ZIWzSq8PL#*TO@ulb{@`OxrS#(kbF3@9ggu>$v#hQq}*TBuqNyAY9Oo`-E?t_ zMHjJr7lP}{!Fbp&5?}wzpWqz31ReT?;p~O?;S|Kad~Q5`F(w@shzX8*(f=&-VH?+y zl{XzFkiVCLH-i@7AfxHK{T2POAH0%D?7|4{moYe*tp3F@=%^WABA|+xWD`GDHm>xK z1G%Oj5;VxbwIIcYKyK@$mmR$37>>jhJFxfw!}DGdX6dzqb1>4DZNlNtenTVLilB-$ z42KS3^P%&&M|r*%gqVdio#)Q!+{gnu>S<^(YX0rb5OSB0OqgTLS{V$ zHttF2PQ_bGhO^`1M+jN49tq1fqxHy1T>j!4JjYP^;r-%gRD6LF)I!kwi~gy z6;o@sptS8U##Gap^@_vWb4qaGi?30$X)nfCv?8tLATD3MhFu3w!lBP>bR_#(edHn| zvMZRgpb;5t$FWbp!FC#)eb4cDVN5a({O_3a3nzcx%Z^9`?Azm|RoSJ?~AXl_uP3Gu8 zhHgWkE@?e(UUt7eDVHQ;4uL!d&rB-8{*S)GqP9cq<7T8R*@(l`q0t2-6$I06p0Q{m zsBJra86m|>*yr1D_4mKSmiIqnIniW>sW|xcZ}9RIIywTAncnE9X_nM$tt9j)#B&pi zagKemlw@RP*%}l#@4&@xzQwN3|HMcsgJ2tqMSD&Wa6U#z^FZxa0S^WBf$RYt8o6)uaVQZll`+Ui5)r10kNHX%w$aLBU zBRjVQMiqrP`T1`dT^+@Y1=|p}stsAYuHXUxRD@Nm$AT>fF{Ne;^>+t$Q#T$M%IJqq zaLK{a{y>pj?CdY5rCocqD2TLl zh0p^!#Z)mQUug-YHHVc<#lbxsgYz3H{6m;aK%KR0AMPB?j`z$oFKxQf;3v-Cg!!BI zBWv|GxI|T8YRzUmGJze+(0E|(O7w}Wq<0Us%s=)oqw?gk9*}digTlVcxSe%Xbf~qmLkgSfO zxwS7r#5)xZZYh|Uy9#BSb|JfEA3|!{@aS;Osb-!GSKkaOr-R&zxtn(*pkg~lrY*r% zGPsUfwBcTkdxz#Dan)uNZ#{@vwOjFeXeA~Ttwv|p2;4I$8xt38!CiycAFfFlS-yeb zS_o?`j?yrMTROqK92u*(qO^4vGFlIyPhx`sho6njLCVUVZ1(}`)j{-)Wn`lH%>kCV z@n$zj8mbxpX9P5bPOb6C8FVAFwAJvNhEiP9@#wfxMo)WCy0Hxf8~3A6!YWg)+3n9Y z8c&SLL)_|JDA{_P0J0fANmUp*e>M9i77tP9f~(fy{!w%qjL14jA1OGlH2`vmGvRi!i048Qpy~%$Ikwi_a+JtvQ=aNX!UR`qVUc^EI_&&-+(dQ;SK9NMoIUn~8 znTt3Qp~6kOkxYj+x}Xs~`jeG=Y0U)X<)v)`w9#E6x_P8ycHt_NFw$~NTTAj3i-*US zBYM?7l(n=WpEBx~w4CKd@>ybm52H~tm!=F%{3LxksV>?nQItC zKuh5{QYkewqIum4?Y#Ib!y7HsFe?)K@b_LpObjojz#2}F!w^uD?Z|k=AWfNOL6E}O z_V28N7LPb8BxjgRHf7a^|1}=3MMq*vn#tls_Ar13JRlu5TGYYNRs*~Q>>jfb5ch<}V*2{%#gY{A!Y>ZcDSro3BEg(lB&#&1qdP&xo z^)YSd|M%E_Mj>YQj-GL4UaD&!{_boEiN%z(V8Lus)Q|b}(zQsopZ97Qz(eD$e3lMW z3vx_*do$lYtRtfhv!{(%hh8u%Z=<+!xXe$(7L=35P|bFrbc{xh>IaQGtDhuKy*$-_ zt*}&IXx59$=*`arF?&6y14A_S{@z4bYiQ!_ICv-4VcW?|uosZ~(x?RZeKaJ))R)g{ z!4u2Sz8;#=XWFOLcm!V~FSB@u*RS`nS)kMVx?c2VJ54Ch`#mHVe%DZ$>ZR)@T;{Vz zNBLjNuN~9S*?Bhhkg?CmBMYT0t$hh_{qqgrS_uRtBh4D=%{n^Eu&Gc_-z8T@ zn3}t<1w>X(;nV>wEMnXBn~|ZGm0S8uj!`;cp4W?RfrpVDlV*d^(d*^67WtUT1Cp_s zCBpJ$AAO|z0$H|Q?a`cltxRNH&ElVS+v_97%ZNkwXoaF=E18(SV)A79+AxaXY|54l z^^EM(kg*I)^q{Gg1WDdD?$Q%YFfeuE{nuq^#`bmZk1gE_Apg&kgrua;0$QaTuebm9 z{iN$shIT>!NB1eU=XtZ#{w$M}VSxT?c8vg+#wn1cVLVILJ^#REj7V>QPiPHhXVv2D zSHDGQ^+tMl&FElWs*CP#SJE5vHtEJP+dtnd-SCX^F>O@3$?qn$U;F-VH-6XW8)d8f zZg#!>T6_Bb_wT2h{jO`*>ulvMZM+Ux)Q)PDaB_xx2k-~Zm8ZoKw=U1)F1jpesr`+h#( zOW&1$<8^-jE4}@X(v8pFtX?l7n9Elnrj*fIjRm!WCm%EMTH^gPz@Ka5Ss&SLt!rRd^D5Z7J} zWVPDK(axJJ{x6i{b}~z%&GLSNqMzm<$CxRoT20w2q6)cdc2d@2RyTR}e=3o^-8nE5 z3wIntGyC}E*$UZNr@>_70r|$U+iRMd_CLAV^S9IO^g~YnR6tG-to>WWygD-U68kbI z>gY|qXA-O##yYspq(M)CjoSC|8E_FaSM`|kPkyxh4WSl0w}^^C%ww;sOP z^S9IO^aD=+OhB$<#OyuO(SdAH`&*kaOU-vTi7Z#-z2kXmR1Lv85<0J9W+BmFQsqx?EiF<)6qD!ZxQ=4pAlCw zdU!+=%=I2e?;39R?d|j`VX67+bda&Fspjy^g(#U`rtH;He|* z$lRICOCY^~)61Uk=lRc`p8R-SbG83sy!Ljwoqi z#!VvZ`jc7qk2ZU_Smu}JFv-|&hu=3Qb9%pqRs`h6IbLVz8cxx^Fb3rR_hqIjp>obP z-kO1uz`hNIjb9XXfgm2RfNdx;^Qdq3?Co?r{h-tT7?5ka5P{N63;gb-*UiG%|H$Cm z@BMoKLHFo>r9a;jHB!Gc)8OpwculUN?E& zN_Kg(_WwueZ{2&Nd~Q|!{=TF+x|V}}3D{!0?<*7Uvq2_XNE+Wlv_iG}Nc zaGm{VhRb}kb+4w>sowL<;xZjE_m|J#n5RDfJ^k>v?zx?Ar(2xCZDacY8p9y-u4O&J7Yz3A-Zk&L_C zSs%}Y>oYB~c;EG56~A0FBw(-M6>l24msWcfvL2bR*Ge}&Z=?CJnp&sni{=GhCV$sl zVdcg4GCbFYVcOrqGSr~0ed#>R7%{K&IUSB`3G>x{KF4k*>OQrZPRBCuR(T3& z$QqfSIq#D|q{A`H{uvsd)|jvPT?-m43sKBQ`Er<&i^)@qUX&lpqwMvf*TzH`>HJK9 z^U&D8`odCIZJZ>zSq{vWBhx&69nPS0CDr%JON+oL8_L_XU57^2j6NwyXwjM3SgCww?J3*=5@-?9PDjgL^5CYubmg~RezZ8 zY&&JBDUWtOnpaJ^NG~KC(?8S$>ZP5To6fxDnElvi8e-9*A9Uba?4z=68HHJZobqLI z@S-ezBiKgjj&#zCZD*um%jnINp(uoH)r(v^y>n5$bxIcVHuJ~LAsT9%oSn|ORKK&% zl7W$*>U2BZPPZW48X%{EdWo&fB><4+Qi%o90&82hSd1xJjd?rHA!^Y&WN$r+;N^R8 zUjV_DplK`MWhic@uE`lV%|QnZW%%>E*+7RttVKWp^Wfl_jILf$u;X_N023q$WIEx+ z7^DAO*!w4=Bk!^DEoD9Cp|eLcLukutMQ!XQK)%a65_fpSprZhp<=WACICyLLg!vJi z1l-mHavLuJxQsK8Hhy`q z_ef(|e4b$0Q43rI`~(y2G-%^ZaP|?{upNpJ3=q+o5U9<`C2Xg)@-c@#&u^g^8YSJnE+SXN|YO9x#1j>$zR0NQW zM#Nn0JuNeQ>Xly-I=Mx{!A<=lV5a_=e#}Cr{&D7IslCxNIaRig z4x>Z=1lB9b$kR9&{x0XN-8e0W1^=Zj-A=dDe>vTfp%p5vVTJ@)h1oJ-E3Z5_IK?7l z@h)Vx9>t3jXz*^~cyf3GlIqr?e)BG}b1^G{5%VXQJUBWNy=D+tv~ta>2#<{`!1FT- zV5^Oh2x@j@P4*sSL>}q<9LKW6o&?rnkpx*WEgGqo*$NDG61Y|zYFeBanKdH>8*QLO zV6i8Avlj#PnMb42Fo29)LoKX74O;-OBjh@m(?b*;khN;;mjLdbvI0phCu#g-qy%iS zG<$&n!L2hLgf?-q5vUSCtewN4m8-AJo=-U(Mi(t8q64#|;ddtB+8O5{rby#weQg4i zkAO>Ieylm-&K$v|@>xHfz|=|48KBD~Xvd(NXApr`vLF-mXSo7@$%7!*fzHSPmS-xj z6I2F}DHGIfwC9Z81@Iot$gv_g+iF~!z-mB{GP3p~=qs8aV95a(CoS3Vb4Nx&4lGmm zY0TL{rwpD27l2E+Q9pO#4L9MVo^ zil=14dTZtj8NB*S{ih}D12dOmMp+|loo4eH)>+`mI(ODgBdv^;lk_5^_RKf?? z^yEON)KL+I_5-3!%_>7Wk2^fV(ak-?w9AH$qMMgijIuqfr;Vppqp}_>cj&zJm{Pr- zWki_Oz&fke)&RdiS`ir?o*(;L`+E@JwSw4QGo%RMV&if`(oyxVSzvZETe_WYr~gX2 z6+o^jW->;FlUgui!b!JWIE602g0?fT*TM^@D7+q5k4}Tg9N(UWjK(%hn7fpDlQ9#d zZ9F0f+;g$x!>{q?v?^$O&!Quj;Fz$0_fNwej?-vNF*MR*8WIgi;3c-CeK5o%ougpm zI13%z_#2H#tWitHZ3v{catuy1OizZrZoKZOrS$x+kl%@b)Q`XSX5KV(h3wXvXY5LY z)M+OINXIZ((+OES1;fTE6u%gmV)lgSbeWtUH8lxuw_9IZ~IVYCmmS_M@Lk>FgP#gH0gCA5c zc9@-(kvmbQVz8bO=-h86>&4#));b)*s&6o?wTE~=o#Dvu1TJgW7}jkz+r_#DFi+=M zuyf}#TAuC5vNb%#d+hsB2HMKkE1I&3MTfr3Lrb6K=rklEQ13U}0IrFGw6vUHWlOpA zaAA8`R~tqiwr+gJB?TSLE|{#3C+nmAu6u^EzGSd&bXamCT3XM3vetppY@^O%?dZyT z`-Z{Jg@D;t8+@^D0&7Qpe{(A4RIWwQM(xoa%62hA(z&D5vF@H(m{#3p$bxM@_88QN<*(rkgv##!pU|i;)W3MU9gY9uo#vML^m|fM32kAVXAC!aW zB_tiJ)6d3d;>DTNA6Lm=d*4uYF8oZ=VmTl?7M)yYvd)uOXO`(s=j6(0MLQ2FN+Qt9 zfe6UWkm2|2=ytlD{>$kf2XX=t*^l;n?nEZq(Xccz*Gxn#--Q|F4KygSM(+@es%XIj zQ?)r%9)2~w0`r>pFeD{F5PTFmYoCqr#m#0j`+%rIWV9S*NF0agWvxhI8b?NC=N5zh zIm_|V^eWup8Hb6r+ws7dxtLbggq(Hz;F8`zkS0KTWa93T=?JWELHN>5m|V4mAQg%M zY0J!JNTZ9E;epZf5W09XGV7a=zjimCo{){lr(}F*@EW{4s|-i~1xQ`f z2B%r+n3!8{Kzv}v5=1X=LCC5${A64ielltvk{Wj+q4Mt{f zgjK;ay&h-2`3>T0sCTTxmw)&cV+)qSDP;kAN0j01$pFYeH^2EPXgWr@@5G#%_2}*! zi=Pb5KsaqBf=(v6ZUbJPU5cltmLYuE7R0XHiC@fKY#gfCyM|_NGxFQ%mZn<)_? z(@L@J>@_4*Z@?W4bv4#0mY&sg068l+;~}!m#HND?&sl(?^}DgG?Jyqp3`0TdQOsG? zieC&3$MH`-gJ05eJUuuaUI}%`Ub6!kYYxCGdI?T`@moAIVJ>FW?m%pHBc|0KK;DWb z+}Ud;emW!%YfoRnsCkX(zBx)(#^7vSs{U*hG783} zXKKM>Y&-S=-VR=fhGQS$rLp-KUa%Ic4xhp6BVw`U^i}xAm7|PNR7KMsRP8=X5L|~} zk4?u@!wEhf`MA?R8S4(6#;@m8qF-Dcigp}F)Phw=psXJEi9|`uUQDmui%G>BkwoXB z(^_;e!GO3jq^;V8MMo~;fuW2p1~Cd@6f``w4moWX8FhssZ^LoSn%{!ag=?_&2tFAGIN&T z+)ex89=8GmV-_HE;RdtUa}j}lWMUbX5p1pANWhyx^;o`jC&9KA@npDG&rU&1C7Il+ zodk(c_{S6@vvwWg2o$a7uHvO3A*ej|F`gKkhqnSNv2@pQBsJ_IkPuW}4}(qLAT;hf zfyC-&EZb^1G}e_)WaYt&=&G@O?|gLdPDa(i3wU)xCZ3;Eh?=d3U_%E|ux2NMOV+?Y zx(Eqmg~|16F#q8D7!f@WHTy2W>fJz0Ppd^k%MrXeeF0Kd?ndmwCT!hz5>W)$gf+Wh z_1rl8d}<+zHyniX%sez+{uILq_A^RX!f8$+em%ViMLSO;u&No4vkz=M*{{7q$gtNV zYUK{(uiS(_!KGNf_Y7QOYbcM&7{oGDTTddaycvl)9OUI`n7891WmAsKx;6w+URJ%w zz-kEl$uSl~;%kw;{)jm!B8|~ZP;mps7B(Px%|Yfj3olb&TJ|1B)7CbONMaek7>TiY zYmmRX1%A__kxJRevM*Mix{N3M!%?>V5bpL5#Nez(9Dn}`hGbMR&wBI^&WD4GwpLEW zuf`-JpUxqMedQTFA6qVdjOlZ$F(#)56Y`hg1>c#dX+4M@gLClQ^g^sW`625Xgk(C> zq{?;hO|L}e_QSAxX)ID#??DWidnG~p#fg;9n_&o9eE>7ED)7?8d{l2fgv_etxNivU z#DAU{QZWZH_ovO=)Shmq+v&fMZp9e6Wwj)M+&>rg1af4(bFdHe$w_wV`9q1ichRdJ+4lj={MkAS~Q)C6hf4xXzgy0g5JTkz9+EzS778Jea z5Q1_SAZOzNOssB&-P^OVc=K+IDs929CKTb&M_&+xmZ6@&J1D-IkwgQk_ngPblsYWi zdy+t%f?n|((X?|X;+CvO#L^vjeO3+jkS#wyr3iQUWsq@SKxFww^b4*;+n2w^vqQpB zcl;{)##X|SLT)+n0eVH2pnM-0`LJAg$1cG94LdO`c_G>3C4xl)d~!BmHD%M?i!%32 zLRZg7H0sdV8T0VctO_jJdk!7w?8>(tMKB|fRz@O&QYtYycOmM}eFop;3e=Nxf}_TW+fbfm05 zhN3pInH>-YgU^Re!O}%oCSxT8-#8X3Jv7V95 z%(Ar@n^TVs?|+7$4$8rt6$cPn-hlkNjVRrI4vz(-p`J3xVPw^?`v|7yH^L)kA+~(@ z1s?SZN9C?l@Jw3(Pdb(zC$8WLvgW5JW#Z>!vtY}JLVK&cGN%O3jfzA4t|Lfi6tINO zabR=_?jMwj=Vq4Rf&P(guBL(aF2~D(3oxpx6%7X}7z8#(1qtGwB5;04f;22YhX#`UpWIP~m72;R4 zAbCYA!~1;vbbJ{m6O^qPmcKH)9FykL(TK5mB%0}#Qwfw$j4Q&!V@olpcr))y$6z|g z*CUtGX%sP^O~`57fsth!@#`6L3C=CBc8NmI&|(ZJSc9L>sY2+|jmTZGh3s_`9QsAU zIjRbYOEw^{aVP5b9z#c`Nf?^32q{hbc<&axG%W)o>F{EgZN{Y1wYXDLG~KBOjGlBZ zg@<-1oHS)ozO#q z;hF@Oq&lQDZbMXU6Yd{1A5V`fL}J5s)^!tn*f)CNIcmXHL@eIPXfO*?3hObsXchWV z=FSOKczad}Mi)23zUM3q$X|+DS(>fn*U|E!CqS85)%4xiBG_jFRWnq|^A1a@xWu<>O6rjF4}Y#Zxkc1h%C z%^)$eGn{z8hD=yjdp=|3q!|@#k2l-t7)|F#dFnn#=3_!{)>my)ei~o(;Wd{e)`kBy zJx&J{usl1J+gFEEM6n#r(1~O}q`=yZbE|KWy zOs1_i3Zx_}*2h+7PxfVgo{8oj&G=A1Tl$*q(3C~hO?A{E8E;KNY~3c5Z9Wd`cgDlE z58LIPYoZg$)Xs%@>6%WQ(y@AcRUQX+_(?FUSBCEc<(yxTy2JKgg1 z&jjQqT?ZwzzqmlnBi=087Pwh!zY+r3O`rP_rgk8=fQFX(i*09`1ydTHGHg+d*MA;? zQfyqy{4)sTi3ZFq3{pcXd|r%F4v^QhqSM}!fF(fEP?%O+{-YpkR&wT;_as^xZz2fQ zi4NC%)`F!U1dt27OA(K@YUrS)_?`)LZrX-G+a_q+1_8FfTRNpAr+6F4Z>Rr; z^iRdeO}Y*S8b{}UZI&e#Xf}fSKQ=8)K>p{`j08Mt8v(^IXgVRw}(|EpNTsMFI$Cl)@zH?kR0=Y^0te1}0fyl6M?NgIrR+L(Hm=us- zXXFO_DI4>dzZr069=gZmZ7K7=n&eECbcly`b+lpBV6W{4wDFZ!l1Y|b7yq}@Ujn%$ z>bWitBO{Rk$)sJ*H>TS_emng)rGG9)E;f1n;AMrrOctQCfVcLF`QePi-s+?_T9Re# z+tOw^GJ&@Na00m*in%Tm1Dpo1H5{OO#qitZB~Z#VAb%?WRvS*41CTYu;IqSW%=BmZj$%ybUXc5(yayZ|4s$H zS-$^YL07=TkX>8RdK0M3j0mwO%kY3e!vbQuxBb72@5Vg--uB(BZvWA<-@ksVp4D%E z{#|VoP+P{$1=w<2Y#)Ki0+RYn<|vl!qwQWT0I%zcU^MKaXr_H=Mxbu?;r@YGH?AxCt^0Hy0I^A%(wkod(yR=UB5Bi`1^l$ zZ~Jd5@5XjA88BDWA{K68+>(=`KFP$AD0jow^$hcp?AoK7zbfNDN;lS_{rlf~rv2Xb zbmRTs|Ltb!X8Hd;&;6}*V;=ha{XE;hxA*nmD)YvA{zspc{-b_2{Z&C+EP|?YLodp1t8@XOQynG#&z4n zQQpsMwtAT)VYY*aghm6h)4kVcHV9<&yyo|cZQE#URrO%`+Nn>6KN#Tl(e|^fw~w|- zWf{s-0H$_m&li8S$1)ACgLkwU|1{&BtgGdq1WWxL$Px|Es7#F;Uti>5+GoZ|nTMWL zn|NJqumGm=SG|;veplNh2PVnOkI#M=zO!5cft^5ALqMkes*9f0R;fBff_YMwrY*jD zIVh!L(kv6osgsws0gh)L+9zB?C3Iwxy~@{Ev}TNW7w|u2Em;ywZT)zEe=Y7(K9nEp zW~26cYpY-amgc_my6WB0JI=D0%U^xWzGpj)yv+;Cd|tD#YB>fo)@|CLz03bR#%#^9 z%)tz*cL2*{ADDg4DQB~@rVb)8?H4erof<>eym0B8rGK>TthO`OcDpuAmeY#F?zM{~ zpOuqfozy1HDABxfD}PN%)oNtD_+{HD1Ire-%CB9Y`CTuzE`UXu(}Ccm4p ze3nbyw9L4XjZwCKnrg9B?~rlZAe3QA8M9zVL3Nb^3OJbT*@5<6mN9J0X)~5R#x*;_-iOAfQ|Scg0#qrDl~X*rxJB_^Dj1cy81+z?XcCt5d(k%Mk)#0*Ud8wo!Dk;DWnJG?jl2;2M7OH z(>}A3RtG*1$UFB}IaDhDB6RRfLU;E#I0O(FeWKZBEsb%0cv<}ePw zB2%_Qf95H$F@Rc39mz%yPn`f2#d}zH%1-;ZckzsYjSHXm%3*(|qZ8|+Jgoq5O4$mgjCW}kY>UG49}z86W7PT3mgph!vj zl4x{E_GHdYb*2uokF~%`+hN!Q5aj)JHYu;OUR^!n_?*C+vJ!Cdz8;i|y+6T=^|x}A zgQEV^4m)XP65FOV7q$dDGvsAXKgvaC_XKp*tS31?Hvw0^u|a{ZfZCjN*&fh52&JDNhWgW#nff~PF&EUGi#P>hzRA?#VZgU*go}hCv8LRNL=ugW2f#L zyUNb#%|`((J_CgFg{1U@nnCoE!Kn7He!s2 zwrQqJrN6x25K2Q1<+z9k?!vhObm>oBpx$cAuGSJ5C+1f|SqWdLbLunNoWV2JPYzLi zudNwuXuIZ67UQVf@$(j?TfxZ9I4QlIjaFxh2~knH4a&glQ&MQWY_x9~?i`Sg*QOCb z#as#2cK&RPUnvD8Pe#x+Y?YlO&qV?25Qz>1P#awrv!x*HY9!cTH z5OnyQjMI0nQ3MAwvxUmzP6y*wj0cBSqM&&n9v{c=T6O53Zy11a1|F;%0l}6app%T$ z9?e@9fOQgBQ#r&;4ErRI7!U8SLnXxC#T*G7Wc`+*3<9Qpql* zO_^DHgyG>~DTrHt7WWOVgpEfw^NK}R0TDr2`)S*=okpfqMgeR`_OAfPifwT4NT3|3 z3zVAy7e)dd*bX^oW84O8i_pa{6;VsJ;um8wF?-bxydJffh9Nl;DAWeZpc7@FJ$np` zm9r$Em{WeG+5_I_~kFhTQMuy zb{ggYI&m-UQC`kEQD0;gAT8|R=#@Bp%YYWd5<02Y)^S= zlQ?6TUOMH8AVg4ckE=jnHT%bdIz!#C@tMc_1Ri9-#yJsCjO`HM+!8Uaq7{R3SDRI% z)&nF%-s?f9NgXl(WZKI*4q!W7sW0qrfu~+d>qIE!XCIJ{!1|qdVMGwiZbHxLY@b#X z`zjif^P!_Asj&}`eMaKx*~JK4yc6AAqmBJ_q+_46n0+#dI?b{jXnWQJ)n}z_Tb}6; z>jCN?_641T>Uxh$Af6vbeb&)|h8a`e2x>Zb<7cC@ap&k75{*K<7djt(6RU9VNIvhD zfbRWgp@&N_?&STyo?Qi($i?VAB_Fnq(YRw+DW00BH6FyA07i=a=i;s*S$KX*Av(#n z>8uUd6MVY{Wa2G?*W01hcsHaHybG9P(}8vCAB7jD<`H|Sv$QYk z0NE+~!q_1l(*QbsZIH%#SoEJHhlTDC2q(t!^;q`&}8-w-mD zS@f)8HdJ7p{z3+!!w9UYyx)ahmU&t`PUSN+Y_{F%J(k%!5Z3)@{AA8n0fht?IRxgV{CdqM3uPJFYCv@( zyEoejh`scSK$pG~Vbyc8ITXV|hb%ae-6-sqBk2=@S7zqpjo@n?LG&Z|7#2W)V|m))@2N3qcyneMn$CTSJ2YRrC)@27j0ebYy`pN+ z-N<7aY_(N^lbm0fQBE`Tq=P5=g~GniY(ArCfc@?mitg-J`(7-Q%5UYYEe_azX9A+5 z*eBa2Bkz@fdz|KA+xd_1Mo=l8JhkhZp$L^=F2SFj8kyDJ%MpNX(_n#uds zW;qhds9y?#%9dmG?&BG10AWhi0Bu{@2sPbHt|Zw>jc#|rcpN9vY{Vk zPW=@_H9({2%ZYXA%gB@9sZGV68zG&LY{S{NVbnE7J41@lc;Pd+P7BA1Bj+(NhHdYq zdsx2e=SmO~ttKXo1d>!r|kc{-jjR>t> zjnxOv;K^ZhJRa0r*6GzL1=xJ~W6aDd$NKFDFfx8A+~Zf_{cnDU$40X4Zj=%2F{!Qz zC%^dbpF=ue`I>av9hzTW4d?pufhcCdp z1P*%&YgoZLJTCeB#=3Tqdb6N@p zWK@#rCF7+zb%?KPMf{QtcxF~P0W%fTYqwx(MKi*eZXx5Kfs*~2!*>}zyCv2ka`_H; zXRX1b;}&3M>1rfZufj7^7gDhb;GeSwDa$q>ZRJ+g;=^3zn)f(N5;&9Q+fk>keQE}zY;M^THut?Ku~1=(xE*$ zz6QYyHY2ubEs~e4!_Vm06eT#PuSRt38jPK{9$g3IV9?wKj4xepV3IeiNn3) z3J|)e6-i`%+pm0y=cbopU}7zPHZlcnNwr9<--gU(t?)}BL+=%iU(YH*+S0X%s#${x zg)7lX3|3>*WJ>`#OYyS_#RS}3es08zvx@lKB1A9TfT*RLFmx^fx8E#0IywUpi#H*( zxE`zb9*19Y30|I(gP^+2h+No;pA1jO=-hgI^QV8o^z!BCN+9q{Uxhi9tKm(#+mTTV zaJw*4tJ!-7dp`aGZw8m)jzO7-TDTr*%Uj`|xtvagz^iuzl>6wc71(|0Q_L)D9FgR-w9XSD0wnAs_6I+RQ86CY&=N!3q7iKNlj$uWOj1ZIYv&kih zt!>8m`Rma;tOi#<`xKRHnsM)_xfoX1h=j#W@XK1xC?^f2M?c1EGcu94|9$j|nos7N ziE%|6FneJ$-ixiK9Y>-kbt<;L3FWPOG5^TNbR+~W&s03%F$YTyUBa~DT7*`v#lXTQ zJUz7lV=K1s_e?xCHU(3ut9OyXir~Bzxe$THb*MRdiJ+T+sr6gXV<4G%?-(rDb_yT< z;a}jFxP%Orj-%Ifbasuyf%9ME&FR`Kk09ori&y59qwLrPSiLqFW74WIzvVcb$*%wO zr{5ra!8!tExY-AO|CtLo`QhhyatLvVbukC3tIgK4RDH#l-53xNoS2Ras|Yr3mj|Vd+1RZp9e6UY?nu0EMRd zOwcm3Ldc}D*X+c>)8{cbrWm8hCeoVs;uj2UD%#FsN^T`W%NAi${Xu%sNUWwJI>ppr z!R8~V-FFrb4x4Mn95s$RiU6^A&sqGOp;H(QFt&<-UcM2#uUx}ZBMK2z*@}5vPvThu z+SW54(fBvxVLFZ>sr59DY8^x%fGq#Ud;}a1l=7MR=3! zvb^mC97E^f@YmlWAf*<=@>XNPuH)$HO{0~Q>p2SxcOOM&>q-1%ND8X??3AMAh*;Q& z;)544JfjA=Z2L1~3bFLq$4Fj#7z0z6V(EcPWE2UAZ+Rb63#t*lXe}MxE)2?Cg2P|^ zp2{`PoSszPb_(9nHCTH5GG^r0VL9dC8d;6!W>lH5PGgVvGaRkjeHw0g8}Ulea_qbM z4c=w_Ll!onV%r6H#8sKP%qdxi4M(ov)yet1uZ)b0jH7onT%wla@;85kPk03ZX*r7a zoPVPZjGbphV`>%e9y9ZO>$RIm1np;M> zIwlbC$rx+)U&N@?TGZ`2hpHXt@vG6fSaO&;7nzLW<}CNwDaQNCcBnp)4;vJ}L+KwUFi%>!U@Qhl3 zwhuppQ$#J>qUb3G)zsVBWm_@3bTf8c`wCA_$Yh_Nh0E+b6l^|(Sc1@FQ%mv4)JkkV zauNecbUFqsfJ=H4{Hfo|PP`AV;9LUCDZDc=o_%rwy}}9+wQ@H?>Y6byXCXFT{tWJn zj+eI`!>gm`A#TwQtUCE29JE;(qvAV#;<53>XJ)t1UyjVfvg6kU)I`uIg8j*tGl}&hfa5VGXfbmHsC~w&dzqmT;%xt)3 ztVF@~bBGc^>X<^YQMUp*>iMWSdl}D6$v{Tic@l@s1fxo`Rdo4=y|C#Wh5UKKKE8&LSBJDaEn_=kU^$dDwXJ zGF}R*BcW)(7MAxDlD;>h7bAcKuIca@%r2-yEp_y{u}SC~Q;!tm?}63pGmyXQA|u~Age+K& zR`%&Hi5VRzV-x9Le>r}0JpC`Ge;mkJF)|h_hVmMl)Yy+*e+_HUb35l_MCMYQx%?@9 z;ys&2{wewdlA*pZ1=F-&^_q1EE33trifvSk*;KMq4C^aULhzqju#Dw0wDC%X14HKW zgID1bM^^DtEFK-2kESCRkg{|qGM8+G)vsq^-N{ekK^9{5^e_Z2YN1!%f)^)cBVkbk zQtMV=`9T6sNH&`G97P9)Ja-StK+Dd97*nP{02K?sN~u&*{CJ zPhP^~V<-zU3G2SWDBidWKAFwvL@+w_!AD4{T!Co>bN}RpXl^@%S?O%!&!%7!8ByY@ z0~naR42!lMVf_LT)o>USvgRYWVikhwH(_+<0_1Nz1FKhqvEtyzsM&T9Loyd4k;>y1 zUXBrSm!r0IH@rd^DVR_$kD+uNDq8m79RlVvlgiL^>@qrggyOlWDX2X30Rm#_kak_b z>tpj#v|(=i8Ct;8Va zQNQC9`b=k7`|330Z9ahb`if#LR20$i^Mg6z9dH2U2b8()sREob1H z&S>P>Sthz$x_&EG?mC7?$5+7W<>`!sS}~Xm)iq{5;@P*0R&T&U*7KE7@mPNJ0=hU( zM|$&dtYoM@GOrHdHBESFyg-Lw*Cz~9=5IhKBNywQLD+QQC>|e5{d{3MiW;^eW63Vo zC4vkv8k36GqH-hq?1fqQ`S^L*O5Izqbq^Z$9y5Thw!JY;+v*bdU7}G$#x|v}1wlny zkiUwy@X8oEier>x5qbvA!@|vbFqZv#mrpEK>^_F)$LHaWfIP~2BPPzP!`cJKF*B_k z^LCxY+Y=K}!mxjMVlJBZ9Y#iDD_Q4q1g6hNA;GR_*=AV%d@P;|szB}Wi@47f3jMCFzPSi0*3s+Kb%d@~3Sj4VU-j$?RbQXWP!VxCsC1gm$Q zqMd9Y5n7A9`HPU+uoL~`D|!D6+N@sS7aCG3hx;s_JMs1J@ch_Bly5zbG1)5_1q8z_ zvK&ijd((1OAb&|S@n{^h{ltk{AFe4^2C z{C!NUYC+uA^9UudxXy^h26|$*@O*4MeiofPGw{<9#n`?72qsmwAcsux@ga$5Id>Iq zQH#*YF&&u%$O;0Fuq5>Ie1}I9DYRx@Usa8n2}eH{g*z&Jpp1u4DB2f43JOGtHK+ztFZI*C%B8u z@Qu)NGP}zdlT?iQ!yn`MY590)P#9uYZeetAjeSYrb`B+zoQH#SK#va3q~jxdp<|jr zgR3FH-0eCGPmj;Uvm=ujhJFa=z(Ph6Ay~Bk41&s5V)L;}cqOzRZ_b*Fv)}v)uT3gK z9s8s8XIT0>zItJ#yyB! zu@jFCOhDU5pI~4@4Jx-DMbx5AxW_#al_UiN!}3tQ=`cp*HR1lj1U9nL;qzOt=fbD( zoSlitd5ckX_yT@8ff3gGpWw;#HfG%R4>OetQByVx(UkB-Bb zxlL#~{sA8LPs6Oboz%@w7bSMuOd7(G7YU~uA+9s zVRZ2zi2Kud>F{pabMMf6tiA9Ro(xEWSK2~6Nqu{Mas>fD53QH3A&5llS92EOk@1yu z6me)iaTaffRS_U5Cjw*dX}MT^;v;mYGqdWcvE(2OFKI$Lqs?bWXW}sXHKvaC;FpH= zXFoN^L%tqVj{C^Gt$YfIF(eAT!jagpi;?~jMq=4$ICP!_su0gkt3utrGZ>b%04;lu z;^9FV7+A0w8_s-y;Ur5-uYQGx`iEiV?(@We?f3;rSL>b=C~RWHG{i68i0I|pF?ZVuyf8i&BMMjHy#$R5r@&e-(kQIE zeZmk^-;9veI}o|L4fpwmGqkS7kkYlrxV!XEL10}Aq8F}V2>l^L)wL|U8ktS|5L>&E z2D$^kA_EMr-HHx$JogXEL}1lg^h#Jq1z(DhX_Yj7hOt%4FrmDe3bz1}OEw{9MH}XA zJB$a1W#EF`Dh+9SN_5dL*sckJQy$@J{>^+{<>y5@fp#%)`${Wh0iI zeAh5C869}xmWuJ^O?Zz6sqxA_i7Svo#YtPe8E?j~C0kA~2Q0^tp=>>K8ObYl!@(&A zAxpL*oiaNLN%GhE`*bn zJ4WdxCmpkM3f_)dfwprWn|BH6tGD9UK{QO~7|dSKj8w`iq~Q=ApR@o|Yc~;uX>d*% zn7wej8HenbQir7V2asOB8Ck6d@%X3=Oeb(YKPeaEik9KMh$=IMHJs(%J226lB$c&x zE7BUaVavf2xIcgfrD?2WNDq(6MatSeNLt*A{FY;QVOAMRH}1!hE&C8vzaCQ;w7|wC z9AuTqvMN_#5^-vPGVHeHrO)Sn7D8&f@{{}(Gl|y(XbcU%bPKK z*-msHS_ErNd-F)e{Uh?t$wd8TQ@&zsHQz>g0WEj|c+)GI&MS69^Vz)Z7MGJ4ItC>+^Qt zT!!&05wUs~0;`+R%{K@A;>lRo?m#d8meQ~rA&WO4dF=tb6;#V8v=u)ek%kHE|EH$T z#nTfjk-hF9;;1`5WV{_IzZuK-BX{Li6t3Qhpe5U2<4Nb}nLwLJ!|eK9h-ZCM$=b)4 zHp1RN9h!35LdQ3*g!ZTx*_!&P>Ba65cy4Se<}BV!Qj~y@D4<+Y(vjP z*7?0Tn2@&&d5oH(7PS&soAI+TX$Yc?#nv^WoKd!89HY2*gV1>D8X{^LVZR-NIV1#w zGpiXvhMM6O>A-zMvJkR#2Ob|+!ulm(TE$wFtZqg$9oGG07o+n4>JB5%blOZI`~N-K zl4o)y1{5`!si9^K3-i*t3Cmpd@8Re_l5Po*_gAPxFDuZcx3{JTwb9&Ejg{-51J_ux zbRD(Ddt4*XjiJ00-pad}o|VSw5(x(?hR$#_3w1nL9>XlXwENI6?E7v60@!4)}yvI{hndY;8A?Wb- zc+8?RDcpLRvS+>6Nq4vf!@gf24L^xSz>u8J*+@=003m=t>y-yPw!N!IFh5@(%3)nQ zdc-hK)>TvR{A7fR4&q>~Sv;B{kDMu9u~gL1n=^O7}VL{r}UHESq| zKvIM4C$Hc!ALYw?uP+R-b_!**6p2nwtea*JX>WJ7*=hityJi=8u)TC99odeq<^T%T zQ*+97j;2CRG9MfFG<4Ri3LQW(AP@JA%SWeP)5*3MVDrfj(1TH*t?Hr|;5ul+IT;-_ z3#cz;;2wvihc00PnUa}JquEWGB}4t|<~R|ZHFc0qQTJIn1ySaDo=G!?G*wM~NFB3L z-Kl3?y{KoJ-`qdn%+%T5U6j?jJnY$t)zj&@+9*+qRL(VcCz zWfUXbH49)ES$5Rnwpa=5|7767h(DSv-rtK$$T#5QDT7D);FFu%jfi7KrGXhi8`+ZFy@3X z_OXLxPAAdBWfpCoWlPrPBr$=x$PMeMgG@9LK*O@CgI4geT&>Tr>c_TeN}m_y{az6I zCe>r4>{@Fm$jBX7RyQx|xD)k>5rUZ+MSZaM)C?cl2Jo(4_ z(bYW&He|}O+eb!Zp@vb=&&Jc1T-jDe3HC1GW*vZ;UM-TUKBLaJ4^wKW@h;by%uDs; zcP%(#A9kg4*0$Kzl8>>~L?bgZdLdgO=9!U(zrxXfAl(Wex2#@b#ROsmUdxI)Rg{&M zLYbGLnPzc`Whh4TTGd(nE~8XF0(4Dn)7(sd%^Ri?3MhSfUDFx`HZi6NIg@z227-{*~S*M2u*X{t+fEp zY=fZw=RMTJM;R5xt!l%N{B>~X7sS3}e(ZMvuBIGo@r*^s1@L^1;JOb4QMC6@ZgaU|fb!I?;0vl|0R0z@WF{g{{f!OZqD za@YUs@;3IR{8VqXO`mm7`+d58{daTU|3JDGKyH=@D@l+h2|Q>J1SbKAr2{Ec0-m+z zH=CX9(#TFIG%|NhCsL!EoR9y&!{-yk$Nw&v2i}CTZ zQ5;`_mY5)wOsQjk$%Vg*O_Oy<4sr@+$*(a|DU1|M*BMpWk(mmL4cS zO`{7)M+fF%M}ya5nGRZKpcS0{^C-t;mahe3WV=SsbzNjafMEeE^|`=O%f_{|+p>K8 zx{j%BCY07^$wPXe#QGa{mTlx=qE6|AfSzQ z{dqqFHeBq+gV%J@3qe9a-+=~b9l-mg0DM-3*})P{Jix+B5vLqmtPXd~7@kD!!#uRxLczXDX=}fa)USrc&86%yMv#v?!E1 zOGcnFjbg}Pr5F}~H;EuGE6FPYNd9ViFO-VFpoqtr48%j&dFG)U!R z0S!erIh2d!s%S)DlS;6s9LZ#?S#L4VE(}LIF%0g=q&jv`#3a`0TgbW+DCtnFy);z8 zGR4dWX;_SomHBq%GZrAHJP7b&t~MSa%%5#yIBw%b(3f7g3Mjq zk=31UQM^v#L?@>u>t?YU@3B<`r0)aDcz-ePRdf=<|4{(uKpDRlIna?PPqjrLYzW77 za5aFZ2v23Pjv^7Nn{j%kzWiOuI6mRPb-A&g7GlG;Gk?RZ(>AMR^ikF5jU9Ry8OPmBatwy`h>;Oo%$BMw(*)KYi@T2d4$l?|2F z0^-_6K*~lIz;ZiMAq9%sPel8a81_L~Xd@tdvETj#QtkI~9c&Fa(y%&Gsk(SZ8}QM- z9##X$+O;=_SWy3X+#Nussj?_LGw#O!b{g{}Xqg2mR6wzM%K-;8a;=0Uz;t7~?;avn zqjqTD6@j>-q`8!tm^}M1fJQe^V3mMQ9#Le->;unSwwVT@-wCE&0@9clL6S1PCxC6x zcq9#3@{*A#V(3VNdc;2jotckiD9Cc{!GQ!;=ArUcKg&i&+OmKKEN3QTqYRBPGXG8* zN@0{^tG!^@2R3Bg+T+6vQ?a}*1Y_05O4}`vE!z{=&BkKPS7ZJiC`Sv^k1|WlwNTBD zWpp7BX_(E9GB&^yK#)@8*jLjBHI^Ge8Bjh3KzW_|plC|KA(m)Ia5L@Da(C*Iz^o$) zguRLScwGP@urlnEV8On#caLLzv=@<>tHzN@21sZWF?RIPaFZCbKuAZ#sa|5Fv=z!q zTP>K=l0-tx{yiGTWB*eR1mbe|+MLexxAdB_Hk+fdeCdgzGqYiwe;Mn}@--B}cFDm@ zRw7FsDJKD%+9@#YL1)s1PD-p-d)3%!weFw={9R+@>BdQFQ!MGMWqS@wAE|uHiBpt= z0aodjg=m;)Kz5^hHGHEwu?-d==QaK=a$svfQ_esbq5Jun_F*=ilQULdQ@0FRqRe^> zq)rH1cwG)a&PEZKA&owT78_%~cP2TwXP};u?oo~`*MUw<^_G*;y9qlvSJp+cKr zrsRw)KrVUS6a)Xa(=7pVy|593Adre7C_L8w24bgH3Rj&%F|E24BMa7%LD4Yv;zKX@ z#0Uf)G$Jzrp9-YYVf2#EIim$ut^{m%hRp5?=cL%`e08pvE!h$k#V{orm6oWRy-WxS zhPBez?x2xrk*so`jh4Ixeo5(=;jdy z2eMJaC&8ms_|^0>%-?q&J%-Zh>Lrk;q7>HE?580XMmeeNG$?CNMG%bGBx{|%ulmvO&4Ck= z4g1^5ISn2ORmfU@)N*>i_U4d0eTt|b+DweVLD08lerC9YPTTBuNitwh9qm8^wR0yp z=!L9XG#(m}iistSn6qFlJmM?NYzV{lBuhpMod_JAHPoek;WhJqL5_;D(hGfi)8}lD zVTS4h)=?3MhIYKQ7Z06`hTizuuxrVMk)riLer7+LHnDyVjBo@*wq67k0;`fD76T%h zwkJm|9W~%aU{qAX=*jH0qq*pqWISRjoYFIgju`i;~gMDvSIU0G+r;bp+#PV5|Hls2iF5uHU1L-`Sl{N;G zgU|~@eYYbh8}=(_Vpuv zRXOY*;fDHHb&)f)oa3uRN2zOapsIH}_We-OEdg>f?oHtvAZI7>nqfxl{7z&Wcl$;m zVMQB)D_UXoUNE|Q2IDRTcfLBLF~PrG!ul1;9rE!RKPpPu&g!9gv`>Gd8#vQXb{~zBJk9hEZpZ6j3uY9pjU7) z@>>sJMAlOCCR_WhOetG~;+?0_mB!qaj=;SAW=D1)C_OTSA*_2efk(q21U+`79RZ`G zTPW@wz-zA2^z!kzcd%xkkV&~~MnD7}A#?2D6a&AEwMcK+&3aJjsCah`V0#8-@cBR* zHk}s1_b!hhyb)N2jMgJ~G9U!D%tP$<{sCn2TC5>MWxIQjLB2dL32XNr!eb*fBtZjo z%Qq{`%A2>NyPPS(zMFR>enRG}6X+!)J2G(@*u9JZ^t{=z&^Z|Q`;&2r6$>=!6njv< zkN9VxbMIJ$mbV~zVH4~%tA~d9(BM3>Yv%d(L?o}>kBEiqFgtA_7STz{(52)Knp(PS zD?B6X@ZPjCtUqxDPmIks8=G0V1)-Z?Jl+}`W`;w$d4=OAgW`;H)}};ax|$tic7~*k zJA1`YAN10RVY_P>?hBw^FnTdg)2oPpz`mu?jmWG+S=%La={FJg`3B-4ZSv$o{qTxF z>9*tO6SIhYCq0T|8&WKLf)HqJ{L3jnIzn$cE`rueGqO=mCo?8z3HnS)LJ^(NgxVc^ zmMqm(hg36~4A9UM>nzr*AvEf@y+ZvJRIZly-${M2a}I~SOBn9*j=)_*3Sm!O zh*-P@LA9Ic-02WV03Klb9kc~6KX-SXX`Hc!mPX_>Aam^j5*0Fb0-T1(v=gD7b0F@c z?sV~{K5E#5U}WPSiwB0~m}tYsg;57tvUZ}hca5bJBngod)CO(?$f61C_xZ+P)y7u1 zhn27&1lZZQhcda|Kqnx5(ojZ6Iub=|HvNKew_lu*pS5F% z(E$fV3<6RDYd1zzn#I<|We)D8zTUxdYz^BlqgGVK5CTZGhYMA?pGcqe=zS!Ez5SFAU4U*{~@jIQi#Gv$j0Ic7mC z>W{sTQ3Xr!%=BCY(m^FPY{%dtmhT;isQOLFZ`cCwtmVjP+J|#rd;|BWGQ1X8g5;H3 zk+|+K2FDiRof*Yw*n1pd3!0GHuotI4{~U8lR+=G+iDkUQg~xou5x;l`rq?!Me8wVFY(79a(uh3@@N#%P_Fw%B^V^PNVAe8hK6MF^YYw7_ z{oxz60KXiagUp3%@WPA*h+DNC32Sy>NLd>Jguv*O2>19Z1o3z4zCjo=w*jL|Hkfq) zs}G(=hUPspqWal{blgXlm)3L`!F8=zee4p_n~vhq(TNCNxeGD18!?>E_MV-E_rLiq z3bvoXoqkVQL;4qCl84G#~ZzOaw` zM3rK0%VDH8@5KwV2>K)zW=Kf-KrqW$y&H@7pF`iI<#>fM45F^ZuR93GSvh!TS_X0( zHenX~)-h=jb{sy1Jr_U5+rgz6o!@|jI_lT5Ry;(KGrMplHXOTv(G?r9c+V-E{rDPO z(v}$~WZf?ejwy{OZrz8#Ma@{S>y%kBe3wroQrGN8s1~C%?!xOc%aOeP5T5XlfMeWp zWHq*-OP?7CTD%ocPOpJg?*#lhuoBn4{u+hbkK>LZ1@KL(N5O{u$lZ7lW9F`)gQU~- zE`URyDAesdivbCxn6Pj=`*AOxm_%K#-E6iC2(I0RJH4VQpIU_0Z$@&{4*X(l4kMWw ztfAaODVNL*yYcg3bUGvonl3wq&rB?BhBoAiT)d6;vK2ltRhYYe7t%K#!pOoVJTWR0 zq08C``WbkBS_x9u9>ybMt5CD`5Rw{q;sxrkl?VIJF%~|tCCJ`<2;uB^ExLPlU@+c| zT#T7j>k(1E0b|mZAb}3??Wjex+h}6S9!8RjFntm2qF<0%_>|MU3v(Lw;ql=q7+SCr z!F09}#GZ!+(IJsgnV}{zbwwJA9h(_(MvlyIGkNHPFfLmxG>i3={ zu+GPwWc>XD=VIfzEAY=>iHMbLW}k>|WOUjc%|CxFiZ|^+|2c{H;{O2wsdb1UFilLY z#ER1&px1;*EZTe07*W>xeHfm;m~A3kamvQ@q7~S9@&fMcI|ULM1ahBK8SE*0z(#*{~BG-yV&cT_=#yxC8zfRapPQH3XG4V#CEx@b-i_ zbasirkZjfKC~W$KXef;SyJkCFeguZ0$NMJA4j5pHPaQ56{G&W2cxG9i>88mn^oW230ifPL6@7BtssT zSqX>tLXg{f6rt6ux90h}q`^778qLQ)#PgGiaro1(@Y3K=Os4V9-9(^Tx&ftI5984x zkz|F5WRH80zjVFXsq)o13otak6srzhz?k$}ge=&MX#~YFxroVSH8qAh9_ge{xf)KW)YcMA+~))N0(5Ada}&9Yv?@Q3nh@#Fb9$hxF%!C_G7H) za>|KhBw#KaNDdb7Ka1IOtFiymRrHRiBpAiesP%q9de1g{XE2w}_W?54u6#CgDV;b0%ycbwbnO0*Rb=WOoIdWDUKo$GJ z{@o~yD{MgR=H1W=Tr+&qI|!qzc461~57E8fBxKY#A)a8Aw0t`Pt2e-o&L@2S8bq&T zKQ7;epsY$nHJ!wcYk$DN*ix)JbQX66WD)@LVeeOjRdf_@5D=eb)U@r?Sv=N10?&*s z!PXBx#p9zBcpn)&opbHheRFglE7M7;ymY>!_;5jJ1>0>P#AXg+%d!x))W zwjD+Es(qM7GPC~38FcCwO3>ec`5X6=Q4@IkrNBL9wE^UZJtGa-8aa0jmK?u~XNJb& zXCqRv>cW>8M8{D~o9_^igZF~xWA%}b@$A%E9Q*haJU^Zw>ZYhOhjx&KO|7G^F`afJnonFd+w{&^xZbQZE!lP&vx}CaboWvCMHON>@4b&Y za3`av@Zx%GXIot2DzW!>G4Z=byAuE@^|MHlPMg)Sc0F~D%U9svr1Q!b?t-IvttOTnOJb- zLoC^J0xLFdN8dT=aE&X)%M-|q6sEewBD;A%#?fH4=;ZiEpJQhJBJ>F*|`WUU5;f3E)aZDaj$OzHtyPs$A;2@kvUm8=VDm)GR)t0gkX|j zR=qv$8wjhH74@`XLEBkI9Rza6IP?iF!IFa?;kAi*SkL=95P1F48&E|C-KF;g%q(4l zrTfm{#i^Busosvb8Zx6k2`C^No|9RDa^=y8vL?+sQT?Xp zlp$-=MOeKUfmtPuh+4jljBz1~n-BBa96U=vZrF4X1?#qBM8#TIJvRlusf<*b&SQM? z3S>8K!sLv3*m~|G{BmRpDh^)3b7L~mYjz=yp1+Jf(UtIvDZ#JDQ64l>GxqLZZH5P` zw;e{}!c}x4L99y-o*0sWMSCt_Ktu^P>_3HvCi6ZzI9obr?I*5x8a7^8*g%kU3@X8+ zV~cR`({C|4E)Omd^Y9jd`u;)bj9SPh*{{!09x=-ZvejEC_aqdo*@?+%g{a$g7@qO< z$X(Qm@P(TR^3fPaeO$1KI`d8>tTmsXpg6I7GZt>#1FN^DVZz*HSh#K<8uncv+aw`* zX%2j2N|C+g97fX_ZQHROVT??YwqC)?Lnld8*e>r96P0O((fWNS3~=|3tVSL6!0MGL z=;jhl5WIw6O=r}>=*q?^1k1J@z_)+=gV`z6>Wvw+#Sc(gzXqB z0P4L*L@AybkwW6I4vDK-&lhK+Uw9r??K_Pwbi!7i3(%3yelgpXSiS_|D|Vsh>>N~* zuvxu5jWQ3x5`LbYUVyo~&k$2G@ye6}tlN7UuTCt$+C!&s*ANYH(CO1|T_b9->F6cO zV+?E=MU=3wheT#$$Jq}tBXd3mglFTuDH(Wz?X2E*3`Hx}!LM+W*~h7L`ynJV;+;lD zZuJ&*;Md_uB{A8*Ya99nC82NpGCVUO-!e3%m#aS4-% zS@h_y1Xp6ir+>oCxeGC;vI#|-51P%0yi=CI-Zc(>DK$9zZ~u7Sqt!9 z;&QU+^(feU8t&nhSW0H_^q5pEp&w&hj@K@Lr{FiQ71QQ##L3UT!~=t?@mSPhlik}aT zN8&2Vd;MO#GkZQt_nw1WbU9_ix;w_RlgqH|!q<3Z;#_RH_!+t|f*M?~9?K6Lhd-mE zci2ab`%Yqf_DW1CXvF+oAG1x3XuI$+`b~<*d>YtDvd`e9ZHQXD9+T(Qqi{bBk?c*& z)3rx=F%30p`2mKw_1JLkV|4RPg>%9()Ev8tcLV2R-QkOHBj~;rT!{RJX5_TdLFrT) z=Xkt2D;srWNsjD?O{Xs*s&Ow3uM9`t{|r5+=OMl20LJ7j#ZWq~^`|~W?^%Udck~?Q zwVX!b`lE=e--tnEhkL*HBYsN8mc_is%v*(5r{q#TAEHmxLi7zQ#jCRyAd+GJyD`g* zBe!;nN3XyNY#=)vncs+C&#Xq#-t!ohzZy@Dnui?>+aH}+iu;FWU=pLpF5Yxn9@*xl zw)W<6Ph5d+1o=gW&SPqREncM4e=~GG`e!!5ZB7os^elXntI1YZn~0-t>PECuradQz z5xma9pFp11u!oFxKY=CEZ2GnG*abW_mid5f`~QRM5hN>H@rAO^6nteteY1!d-%hcS68aq#M=crSV> z?jT4mQXPWcw*bnTyeDW+wG+6{DJDA=_m8`|2>P_&8U&3%H9rrQ>A6d8tcMeWOhXE<@ zPg;%p{UY$l@GypOt1y|NV~-)(cx*@kLg%l-41)Wsvx?BsX%@P_=-TfqA>sYHqB8B>cF0?W+71KnMxVq#G}W>&2+OV=MF z1DssG3^R+C;%B3?(9wAoM&;GRi6Pt5lQS{Bya8j2n&F;MgP%_-gj4(?^D@iMB@C{~ zH5f2&9lCo*!HvK=y=onN3z|)6`q=19%&cs{q@ra6!X@Z9u!v!wWl>LOk0=aJUI6dp zg}7@#GKLn>=;p6LAF?EKAce+s-IDR-=yW)zt;7S2UVM{kpyS$}nNp0N;bm|nI}5B@ z1^@I#hP6F1FosNy1`$$*esOh}Qqct8tW|hobT(d|Q$of$7tb@w>77sq8_M2RQ}NuB z@z(5l7{&g6Bccu-iM3>5EO%TU+!7YykwIx@*TLt)>M*IY731@lnu7vt$&9sYrj~}k z7haCgibl*RTZ3OtFT#N2TI@P-gaEOSvLLghW9aM|gPG}dh-L^qG`S2f)6w2JA|B)B zuEn&{%@|0q=)!UzpHPCa70q~fNHX4=nT^Sn8!)tFJ?j4_Oc-k4d4jxKR}+HgOxbU@aVD@(F(7xN~SJeA5=Ai+eccRJ9;Y(Lry`p3-8pMEE6^;b)WQGa5<6 zV`QXL7OcaBigkEq&LX@SvjQQNt1&FC61MIMxX(8dQ`mp6hc86`q*_d6IRoglA0C;7 zz9I7|(<%a$wgL#pP)2PobP%>4d3-hnFH@IY!gW$lI(|tu{5Ew^`%6LM&K8*ty?6g)K{50k5!F{X4S zo*Ei!*&@K3AV%GArM)~ty?b&h`?PqenWj68pdU#+9GYE8f)I#jf~pZ(xenut8qi}z z4(1fpW5>ahMhE;-R+eI$oj7gDHopr5Yb6*!PXZ zbE7gbr*ti5&07QigbLit=+iTKIePS;M{rGsw))VE-iL;#8(EJjSc9P%OVNY!eROO- z##e1Hdw)MSXCd`J6R*uFgMTXJ<&utHOfE*>lvS|l7X(l0efWYV_{`l%OiChl)FO<} z4bEL*_L|pJRx@)&7hO$%moc5m3=^W~G?Ny?;?0rKGcw4zJPqFKOd9cxmJlcn)m+HgvbvlqAy|7mO zX?kMcSwsXxa6M?qnzOEHl$v+kkBX{&UsMl`N$W%x_ar(tmgC6ZUG-L< z^)OQ&`C0pyXyyU)*3>M`#a8{S`f64O^U^)N=fI|KFy%#g=yW8V_R>cu$HdVv*={W#Cscx*h*?)%jJBPtuAu}C?j^xu(b~t*%fJp``K1Vjggu7XNZ=w0CoC0Cj zXDVzQCtHkH3!?f3Qw~w+AHyhcb_pH0)wLf-m_sdkmYFF zDEr#1kaiA+eIM3AWq21-KZ}?rf7jLlnljgKHpz_k22sSUDX#1z&1O>nyHjo?I#zus z7pK`QFPzRmTNP+{ly;+iQKSp*(pUDqxyHJxe;rAlG}Y6C@{wNX#He18NLjQN6^+D; zSJ}Qke3t!cj>4m?H2W;8p%sDEE&PpnYI>&j@B%achx?wzRQ&WgNevX3m&NX?My z0QL<@mQ_#6jwH$~6x2Q}8gg?AVp%N5Og+3V$A6mXhg1@U9cC`F8myO|Y_R5(Yc8m! zAL-aNEvvWj(E=0+DwPTo&Hu`S;T( zNoSz>x&CCdG&r3oZdnOOA=6QqvQ-ZzEoe{&XaR;DuiI$h2ib{be+ZVPxxxzlv?Sdu zPS9Lsv65^mHi3%Ds9owzXZuqDO`EhlT&pcLPgV<52;i)TI@lblt2yFkZaK>`4j_ez zve9)N1Emv`1Qb*hft^m>HU_H~#bVGj5-kQXMs4b*{VgntBsr)~I$7OPH`ZGVT6m9{ zcdTmyMZaRpGwdHNJh73JG4rh3Wy1dgA(dyAg%bqyS<^;UH`QOVptGYjj~hed5`YXs#FIV73-~QTG(P%ADX(Uf0&2*Tyw4IXtbzA3r4gricXob*GpXg z3W7i$UY%XYuzQUKFwAxV>;v|ftzMu7ka6j3#6jA!K;=?)l+FLYz3%|ivO3fLrZIpf zn>Cwc^DCmUCPrg4*+df+DN=?hOaUWpWU=rT!|F5eKwKxO2TczJg9Ai=p$}C!xagbGO%Y^w@NqbfCLi} zm%;zkW>nr~v>U^Ep*z)y$Xx@3@~LE!LEPL-{wCYrK zeIVL?r?UpCTeWMEl_YpeKkJRss&}Mb?j#(sOf5WyWqak>r3Wg-VE9Te0dD3K`pe^@+c z3?gy$0iCFof-*5M#YTxx8OF5px< z6aO47sY8{{hGAsxrAtqbY?vM+l2NR99k7rp0iB{#1EpIX&|&)2P`%^#Oiy$Pz7~~< ztJ&xxv}acN(H)(X*1c1yvLpG#{>E-!7(R!?vTxmM1j~ zkNnS-qoqZ}!15G9SR>cTv_eYYI_;^>t)qexT(irlOGuBL>l0WwS-Ui;V|(P`T8XiDkXj)eQk zO$2MIAlRmq$1t6eReduaoig;4s;M3{_-H9af`ks3D9!BP91L_xbf`YklT5wat!N)h zQql~_gbszp_!2o#YA}~RbPXmN^fl<(K`NDp>Wg*7{G0S^Z7+|5O9tcBpr-neS;zC~ zM|Gh-qc)(EsUjie!-Nc#i6nE?E0LuA^lCTiQ>q)bDN5YhXKflbH4|ohl6=GTKL--q zSI+h+{V^(kwQ;+@R)e#(0}U1;S=A%sl)a^2X;9rTPiiA1KIKvESZP#wXgSY>0+Fzm zYnYD4Q8~Cu{Xtp-b?B)J{dV!UH#4D3cWp?t?CTLK5A_ifj!HS3qkqnBn{;HF zM7G*xBjF`>G9oyL>&U(I>6m&4)wKpWwpj^u=LIw6NvCXe8dd|1+O6{L4P+)vn2;i} zFC>?!Z&6rd|CD-d)7q-?loCAUJt+MB=yJp*6S*qgPOGs&N@^m>iKtDB9Z641CyiB5 zR;VQ;Qt4$-qhiIgV~fDU*%-W=)-${%11WuCgH+>_P7;$^N%)abBt#LRrm5Dr)EGH6 zCs9fYIWLW$CvZKzccoSFct__&zIJ+3o!!Vv9VOTPyDEwuiR5i32~7f3<*IS0!}C9p zl^Te`^b@P65Q`mwq$+7cCqFF?4OEOn`PShGuQQTt8HP9D1R9Atj|fxc#Ppi9BI!+p z?1iC0KtyR$f+SP=zba+~%SMfw`LY8clr-tbW(zD!k8~A}KU_6Nk*g7~h)t(drB`Gm z(gy$$>%X@suqo zZK_w5sZQn6jwEh3opbOFjiHoHGHpuo@CJ7OY=CyQM8WnM5jV{0S<=0ch|+Ec-@N>5 z!1D4Ls5{mR-FZ4yRM%b}Rqxi$=~g7@-4r7~g2EHQuzWcSi6BYa$xM?_Sw0#(RHm`g z;^-e_r9Z^lvV;=FL88}XF7b?$AxAKQ;X2iNtzHBy~#91=SO^UU=Jc;b3{7oteRPQ?8KaOSQ z^($S5ZmO=?@0v!l?^9?}{h0*JG=;M)BBG0JKr$5&Y)6_AXwa1^2!$z~JDSaSd5~ZA zL$ygifm@rDomWocCg~9h(*VH1D}n>))luRE^=*|C!!kc=?;Zl?K%eoA(i8DPN+F zga_>9UKJ#wmS#UG6{4grMM0F#OnrcngGh*tfq7`89SbC9>0CF7!aAIYD=?i?m>!XM zYi#Nq(vP8!!Ct&}be@ghTRKtP0@J}kK@y#a-i{8lY_%2{XrLmB5Pf)M9F1bMPRh>2 z&gOMUrG;f`?iD}N9LT#QD-wkW<(!0KjZtATos>dUPwHScMW-LrET?5BmZv(G1`$b# zip%pSA|v^kJ;PI4^&kC&a>^~z^#(eUhB|{0p9UhuE&UtpkjlRe=;~CgW9DBHvGS#I zRT^|bx73yDq_F88@rUIRjz~oHA+ySmg8@6a256I9Ng$S1KM{EY3CoI7z2%iNKS`Kj zB2nd;<>t-K=st<*O&o56iWg=cJ3MEQHeiUrv=rnGo_gAB#>j-yzl0LinZnWZUUB=& z%w{iEMDF^E zL4xUE*?Y@zN{8AY$&CZE1Rrn7$D1j8gP62HDr}{PZC-<}%3A%7^csS8 zl8+iyfKU~VpvEEcl7Eq-)*=~>HO%w>%dDxlq;%75VT7g*pfs_}L=t*8_xevyrP1H1 z;wK(he`{{+NRzlbni)f z3sdP=8vSMxlx8cE>=jm|Eyd|S#qCMx%E$Q*uXz0Ad9EB)wjvXir_739gs*qTXXM3p z$2g3P8UDHUV{YhP{lEqZfBES@Eze29w)8444VZdr@Ku{pJTfaS%A3kjb>hz-)8dtp zmv#}d)vfvQ$js8nFwdojevDu>0Q=*#{9BlMdIO}$(gYt1oB!G1NN^xh9HubK%1G`M z56j4Apk6vHeuib63v3qQm6`HxZAQc|$)53sOLc>m+blh52P!kK+`M+FciAgGg+sH1 zFbhXz$g(xH%Swmx;kEbrIOo@&HV^gfF9TdMkz0e;M#^S2$qZK;&BI%FY|Y4_4BNl}ng&Bph4sU$V1VD_JdKsqk= z8!!h;r~dm};`%gPN?8Ah#{OmJ_hKjy|H$_6W#r}WSsucrl*t$M_gU@(`MlKn`Foew zKM0pfr7_T#S9 z60}R7iSe8EqGv%Brf)t>|I&b$k0~`eCAR_#>fXYS9EbQ;LDwAoWWWUEu0M>lMcZ&| z-1C@Odk6_*W@GS_MaWsc6TUXtsNQh`zvxwhq!$)o@~)Fe$eoWZZ+wh9x{pHd@)el0 z^$6NLGZyQPe}FstPs2+GPhs?&RakZCByLU^gx#kcZs|G#g$q`ruzDjB^OxYN&V?90ZwvAkZ$gi8)d*>ugN~V1h{@-B z)Mz|DaTR{}XaRowbOkz%TZ6>xc_is~@T^q5uH=BwcQmd`c>(>aHsiX~v3PFAYW$@8 z2n?ON0>c(Iq+FEbY)oSA#7sus= zG}6TbvH8%25}qz*eJHB;VZ_0~!J#4GlGn&7$=U_Bv0ADqv3;KUnjF%30{_co1Va#_ zFVh{;5vm<2x)okWvD=RzfznS0l4$!J)63zDqI9plsk&hIzF*^+{3)n@^*BQLza7)> zn1)atac-^kc%8I+4xx68oPM>xxE<}H`IP^TrTC||46CKSPSZ}u;5!UQm>rGJ^7gjI zEPhtaM|KgiQIOr=xA#qNxI8uK6S7}w~rT+bPEukGy%S( ziMFk-k@nnbi%){CzS2E{@>fK+qwQdaZ3D6c1tegSeeBRl$XL9YZWvGW1T>1uN8@N6 zpV$6jZKu-5R!P#@-lf9=`3TXL#?ECXX@9*#DVpjqf%eX7`;xYL*%mF%8WOc1TOT>K zTV;$LE7z&Wz!p6R2M31+gD-{1bxMmwsJ)}1x_DU!M@XzXL~)f)OljRYp~&`(N`a1a zCrFc?PZlJ0Pk3PBiehXGU-lxO6%`fu|3VqPq2JCI5;?5 zuDE0(_v8HLc`bYR?R2702OZ?*96^de^&T*LoA5oee_6x)lVr8Y- z0{@=mD!QnE;mqp}%J3fs(MZf_Pc5rZTaQIYw z^+fLA;NakJNpM8&;NalUz~PA8!NI|yfx{8GgM))Z1BWAW2L}g-1`bE$4h{|uUj@Fz z?aq$K9UK}ebS<22w$Uv+H0x{yVJDS!`;T2tqRSq>TG)jay2U3^2l#Yga5S34==wVy z2+T)#d^Yo(UT`-{wDT=)Cbq$|Rc{c>ug($l4oKL$@ zLzmqYL${^r^7p_6A3@6^7#xv1I5b4ClP69edXb7-Q-@8UjKSUSOVC795x&5~Qv~$_Di=RUrj-{a~9@Q96A%i{Sq)NswPP9%kAe8qO!v*@9_o{~U?udH5ue$4|72uyvw_unpW#0hs@DRIa!S~Q$zCXjXGY>7(JUpaw z?b(%vpu!CspJ7{fkNFy3lznB0i6_m}e~|b;_HMp;eoZKBER1 zFK$E@!^={hXT5}xvsU@b;POZ2%(cj5on_8gL-QJpn6(kZsy5>J*_$zJ<`(oRoR7v@ zlHy<&v^*|`BXS3a1_rH%Ka!432TtPH`)4tC>j5mPJ&d{APhifD)0nyabyRIXiP_su zU>?nLwx7bBZKp81_9We$CiqTs70vojcHaN5@%h?$v)?Y@C*Vf!7y6;uAJ1(1pX2uv zFwbK=^J|Y`%Fa`mR`(hfY&nKM{_aocJ8m9)?S_)XbI>G4>*N>Zvp%B7ph<@jIPk_h zc=ff@sM=VE`LFE5g4+F9@XCJ7edQqLy>b8xw$iQvVBuD#oAsvW!kT@UPrF4myD@9i z9&A2z3h$o%7}q3`$eHh;<#90_kvljvFo?+8W?;>}6G*A7K`8s@_xqHgS+5FQn_7wQ zrcB0-y(i-Ol<~wwH0xQ88+%ov8Q-th({FCBce-zuJQ2QjzJNfWSc_v;ui zaWM&KsHvF_kNq6=(J^`WT8A|3Ir#=Urj^5YUmy6|4<*tVhVCRF;XRT=3~v}{MNVy< zOJwq$>2FOtEwTJ;5PsZ$0uH|U9=_Ryd2&SV;BbXP%M5KtV)gE$=s9gS?tXd(9)5N_ z?&>p^Brp+o448^L`&HnF{VQ?TfJ*#G&wdkeXa5Q_-z__u@2Y3Mi|zw%eq{gC+}H1i z{{K3RNwf?2;r}wz&z*hCEp9Jf?|=Efv(FU#xX*MvIAARP^@&NSKKLg3j$cXglDg>< zgvCjdX^^}c^5Bcry#Zsf?c_U%&zVc|OSg}m;o6-OljYy#K{v5^4FWz>$*mj7N?D(! zrgpnYOuCW#FP@u@qi5d1w>mqC+`-|>g%SA(Y}s`X{ip80?R_W}cPmEYZZ9IV+Z_0k zNs!6a@b#p`E9gDh{|uPxKLbcvLOUYxpCMrO|98$TKYllQUf|~xD((d+6)k-4CozY6T;G7tHmV-C2__oKdDq2GM|zw>@CbblfKI*tIsbOBC$0YW(V zgv6C0G+_)PV#%{@i}CZJb8*;+oD#buatDVi6h`FfczMrZq|P{m+xpEy^WGH*?=}+= zJ?Fufx*VaY)d){rf{^4z2;sXB)@unuQx+4|9%v5hxybB%$xGquJe%Y)4Zeh#@O58^ zMkyrBq!;1qwh$pb_?}Q{Pq`1VFz7#ZF~Vdfu`5m?Oi#sA&)g(s9vYF%@9i@gH}tB& zy8W-?xv?B{wChIq*LrLAXX$r-*2VED}*uL}lB5$XR%94buI6`#MOhTEtwaaEY6(BT`ekd*5 zT?lcsBSLi3nCx^BjkZ=M(7lBz|8!>;)X=OrZI3t+uXst?c9~5+XA{~osta)PNakLc zVR1Q3e+hnej>w%v?%;6c!q&*sv2M>%^qpRZ+ezZrr;^l2$|0%CNU|Q$hNS3yDM3QN z0G^#B@Q4)p={6sYk{9C1>cc4AegbK0PvYACi*ZfYNf@wbFK*3TW9#mP%Xi@3k?Y{= zx}1Z>Du%Hb;mPwz+9Y~^co)WV-cEx`XwQYXcR&T2Cs$z2{BXML%i zA|*ZR|G08u9Q~23wQQnGa5~aYGzp&nHHyhWSbNSGq8TqGdtWrusta)xM=Z%cLF7-u z?^NbpiqkF|zZ^Unhu(Y_|Kirj9UQJ;_=$WyiM-#`THOA4Ihv=4$g4@PEBq3(NR)(2 zGWU_VKMkQh79qU*0+erg9Xnq;jUlsM#!GvTW8=~Hap%BU*nIX67%+V;rfu4f)kogN zb-gLACvSkS_eO*!FEAqaanJ}B_IXHhXL=adJp(JzETs~w54??Ek6lD=5rG$zG(YcS z=L?94&c>@J&mcaRakj~}Q>{jd@g!+&Uu>I$vQ1}j^8I(wZ|r0oJ9`!*CUCI$`Lnpb zM?VOLByXg*Jl0K#EZ*&=l z>mDn>ZQau_r|uvMme-+aM;%5gL?or{e@V!}w<$Sa-#s5!$Bu-r14*8P!c9H%aZTa` z4i=+u?W1Yn$R3~RFlj}l)=KS2c^Z9a*`M0?k6kItk-0$qC|e_ zL_YdLB7YV#^yuEkiUEr zo-MD&|NY}%FtPRo?jJcBGdI;>!=A%PUsi{2_b9^7GiNbw-99`waW+2s?I(EqgAZ}< zGqd1pJsLN38HTO<4`JKU)7X9bEtFJm!PjFlP`-XIj+{7-n$z!~#qbv~>E&JMK5;$T z=gj2*b{uy+QHIKW@1n)va)h<}HNrb-U??V$GcWCO{1W+lj>sJxu4vRJ^6A_013!`5 zN5?NjC3To*Ae4^k*kk0UXpey3B30j zO5%$Vkv!kx^QEo~5_Ww^BCqC*VIh9pzZ}>1n)Ia*dFaJN-gYELuh@h4-g_S(eDnz> ztlEjMQ{p}J;U_3sycRF-+Kc&{j$n1oer&9(#r=beaZA@M?4k7glcy?ibz%vgD4T&9 zt6rwvZ_xVJWwuZM&S$0}^p^usd*BqtuiTD^4q5QE&%sS3^4CB49WrLGN3Z-Umf?p; zE?$W3C*Q#xoimVCU5l*;52L(l5%OPt6%${o#h+Q0!zVAs(!;0m-Gt!??Kl{rvDwUr zcCZv#xDO7h#1SWvJ2+h7xR}Tv*B1xb7X8uy&TxK=RE)j`5O52eM3JY^B?>976m z6_iZBY$7M&waY{P#&JE{i|6wvqxRrYT+?Gb!!E&!qh~Rs zdLMibkAN>K1J`xQMD6?kjTV{n@j%)fY&i2Vo}0V^YxbRj@18;EUa%C$-+CL}^QL3{ z=?}1>b{Ce`)S>R=>nK>V1K}Mq5E@Ss*N0M-tF|Jx&&ET8%5n4ziM+ETatDVi7xmZ3 zr)|UcN#x$g&c$Dl$VsxvOA+3+3Pa}C;lSDd!kpSuIP}3M7`5ss{x!7~DXIpJ$M?yDddz@?13SF^h3g8vh(353G@g^jL^{w6vm+onOitd3_?Mn>J~f zyzw~J>^%YB{R2?>%2BM}e*#;!?ZNu3uVT#7T6CIRgCWc6uz1x5oOtU4+&`ooOHRLs z>D!KA!txz>X<05kAqg^IiI3jm&_+Nl}5_!Mr9+5Y)<%W#nQ@$7BiB|)Z;kxRSz5W6$U|Z>aNkqKX#Y$xBHLu(hF+C;WaJdw)_V-P zb9T|SaH;8cc_e)*QcD)${{Drys?}4t``HR~EM9@zx)&inYbH94sm24tDsWS;QFw6h zWHjwUl8w#BO+7QvXY^Ful2S&AJP%D03-CbtJY1VR4&UujjE6GkBBIl1-1$T)o*26n z?Q-WZ?PUmwDnP3t6YztlCgB^2CFqzj1K;gN0*|Ex-lc>Rc`;`frT&kdnRsAOgwPM$4;%0U#~Ut9y+8$3A`r>(hlj6V0)5G4J7uU&lQO5xq#9<{rze^d`YxV zn2WIPbL@bT@6lDZ-7vD-EJ}_frpHL4skG}wx5>-sZochCIUi2|f$#(GOdBQgyZTPx zpc5c++I?XnfAbuX%g;F?x2=dI#|{jy%`il2i=p1zk-Iw5jgIiQ)UFafNqV-=yhARU zYDwmiESl*yI+yRy(|-;@yC|C5Yrx1xL_DSEDETAkE?nCT6<=FEV;Fu%`OP39Gp!_f z)AVS|KZR(lw6#fRSj=N=Im5_Ac>638IMbLg##H(?R{mlb28sL^&rQVvJEBj2j>sJx zu29&4pfqgQeHeYJj^dWy({Nw%NZguQhMOLrL`iZ2ZhU+yZcd$mTOOZ+8&hf5dkSvg z^JdzAFLg5A(3~Q-lj*Jk%^#nMX1%L$bMHyGrO!0FnS@(=SK_)}GiWyjcO;kK_TCfm zJxZU=pO}qik5`%BTT{w$Gl^N@eUD~6Ek4F`qvD}o#dm88?URep?)g$Q>oXh6_PmFI zW9O29au50)Bnh)gRFHhu zM_dsiWAm~9=y603BBA~)4Zc>CoLiIZq>H`9bCiOI5}5?0>2uG(dwu(0?-wK3f1l;P zK7zRk`1PYDrR|oqm$EF)6dsf!E#~8wnfP(vLL7YkZAat|4p%fpwt}1J5sh6@!WN*?aIGAN>yokDJeY3`0cxC^Vsj8#J#0P^ylIDa7$N{~ar~ z)FExkOURzJ9yzl%5bOEA1{qcBky*8g*j(=!c&~3C?EPW{`|q>d*GDin0Xr{@>{%O$ zwaA#gn&x%Low){Cvo~N6?WeBUhPOZb2;c1Nh}^;9%7v}NX5*>Jt1+YQ1g6#<$CB*_ z@zS>4SY5jlE4S^%!X1Y&zwRiOY&(o)JBaOvv1G>)&&+pWsmyv_U_OGSemAoB{2V%G zHaGRdpnES2zngPmcxL^#lId8xbq}hUzWKWjqPp%Nme%Y;>t~DM>o6Rlok|fFM@cU5@{sCm38~EY}-C8XP#Hp9l|Q+b@8hwu<+I6Sn=xq27y&O_TeSwW6`Tj zd)*Ps!?N0asM>iLi*_DG>7vcJN*7DSFz-Rj5Wm8&~Nk_;-1DVg~7>43uo?9|ZD>{pHqzb@tF8mJRJxKGIdL0b7c`f|bX`U^zP?cW`Kc&~5ow#SBLyDR7F{ zhdAxtAi98A2qfN*iG!!;IHQP3>SIsVm>Qfj*99aap4nAyQ+jT`x(@w=_6L z7b4O=ppIafk;G$JKKl3>tQ>;D5xIjyLj;K|VFF2DEIWQ42|(ASrK4#~8X{ve5f+UOOzlT4>ishzL7T7bujP(y6aUWguM31|sJK9Z@F{2hC>y+DW1
}zkr1Uq z*3`)IU0M*OI#%jp8v>*fR~JhpNm-Wklb5o-iVzv6`Xk@QGG8_z2P=ypa76Cl&@d53 zk`B=}Ig)ylm<*D3u5Eh@rCHnNwEx*iPrAOpLWCr6P>CmT$7P@~)2aJ8ui~I%`olSk z2#L>TnzMrDF@TUxW6&ga1P6tYo?X%;`YBn7ODFZCekcPU6P(8 zKa#;$4O`|ZGs!$6j)dKX1lCz;mBd*{A|p|2JveAS10eb7G6+3Q`Yy%SqDOE*$fVyw zmIWnslVC-Bmp?R!NeypAC*~n~7zbq%d%OmxQD_{ShLBh-6FG_8!QqOB5w)$Os?*C( z?;=hiKmsDZuNq#uJhEn*ZH-*;{`VwQy`Rrpa44KWnEFOA%4QyRJYQk|e}!>*Ky{~C zMu;6i^75ekg|K|249qisf&4fkcW}6p5Rm$U{dc+G%SvCvA?{Dd`GM(tx%>_JazyUn z;NZ}};fUP9!NH+{!x6cIgM&i@ha++a2M31+j?W|Vv==wRcdw4aW;!@HI5=F6_}NhW z{F!MYZsTqJ&J#JY?a&(-HKzvoi?^e|!NI}7;j+W1d0R1W^FjRiPk%J}*6$pV|M}0l zUG6-?yPx~HpZmGr<@@{7AOGNg3lKSfe=#!uGydY>;NalU01yzof&T}pSNsAvzd5G> O00002<{LTmcP-JB!)ZV>=bA3DaLHzW#R~%?Me>=drs!5Bz ztD7M{dTYR2i7JY|d)Juo1!ns3t^L_aM)$1;>fnDH+^Ay(;N3gjN?8d}4KJg!T!d6j z$=e$uc+ue;s)N%=-g0(233v@`74!&dL>bg%&I*%v5|T8K9L{gNkenv!563(^firD^ zke&@8UqX9y`0V4BTc5UzT77rMGuJAIrAq3B9VmFxejxO7dQJ|pQ>y8Fi7c1@qgytw ztEGs@?;Utf%c%zIg|f9W#q0tnc~C+Osi2R}0~B0qvs48qO;Dv#X@)}ht$|iCOK)#P z@%{Vv@m}9N7OS;qX_fO}`WzPv)yxZu;v&LjeEB$%|QJzug+ut7pMB@JqivAB9 z)zAgb!j0`M?A|j5x`@ajo#zY%m(yzl4mz!eaK{k<+3G>|u@Wj}}N*rtyB1ZMM z@$LshPv{%f{@BJvK~HcX@)@ycs#-|k_e5}gAoe(|E8l5w)C+P#pr?oiu(Y3DU44rt6 zkU$!K-5(HbLer&3=GK&*k&_j;#O&1mFiolTY~$$`b9qLr;RVDiZBdEbo<(y0V1Z-4 z&Wz$I^vSX(bah;e^~m8Joni_mvk4Y=Vgdrm$Ms?sx{Y6@{LDh%|(y3+pBt&dpN|noL2*>$4W5 z>pjeas#mU1R&$zE()4UH-NIUWZ*LakZm$v4%^#M1J>|BUY~rH?6F@IxP_$h@SJ4wFa&h$?cBa?uC8mRO5GI621!fmL>?^Y-49PddxbG3;3WG zd4AJ-%2<~hWgs$hm)kD3A{8>io$Cn-D*hC8CPWE^XH{a$6n5Dm@qm1xVRp?_?d#1U z?Vg`xbkqMK-xlCFD&Bcqlc7yyLFD-g@Z`<}$bOV`qwK{3#N{%|-{SLCG4pO)$OP0x z(!0JNe-Nz0IbcoNyKdCl7kAG8xm1(%GlU__%a4H^ zWjIr_#4W2vjM;j?M-Rhjp^Fl0Um%_*QQg{-ZF4kjp&V;@UA8kqfQ}KCy3}>rg4%RS zJ?x4M{U-!p>e+-&HdJCoCvOC}hU^Eo%NjddsJAbq8kK=U&m485=#uF$y6=31`Bklb zjbsrHbuIg^iXo|-N8Y?c`Q@L0yhpS_uL)7cR|1?zvfIRRY`FO#H5h{hQCivrNA~gG zmyr}^@1;7O?!}k^wdF=&EX45DN;^*&zj0!OWyiW)X8ANUAwyDb%WJ)n3lrVxTI5U! zOh_7u-j_kjK_=kUAo#jSN*ChYxgKG@vZ}3P1T>@Q zJ)qKBZ~oq8KR=PnWt4k=v<$TTatq{~Kx^v%(z+&2SmbMkXKJ9~UV>uSJnc}!xePI} zy)`z=TxxU;f= zqm!n76MV?;8RPz|eMSgFmR}Y3*nDM~&^+Y8@dl!kDJhh1FUxk*4BWz7=iYhU;5vI4 zmtuP!VZ1RqeRz6-ysmOEG`{#i>`L`}H{MsTTQ$;vPfTb1dA9hJwoSf2v9v@nd8~t` zcl6V?VHVYwO6r33e@YP;GmCOg`lhdZ9d?BAq+z*K7X3r@AK?Uk=--G{oVxG+AUjn=eg ztk1fw89$lDXIMy%b0`&8XP(^Z?C|QJc1I7Im$0tY2YS|^=(lgt%I9Ikv~5_WEI)ml zWOpuwsy*p)i9VFgK|&%`QX$`#)`*gM83NIK%cj3&7qp6c&3Bg{ z4gG@3qzaOgi|@V7qZzD*r}=lA4%|YTL&}B?vGumPV>h@;X#H_^!^Suoz-hW9%9!Lw`5ci& z=c_j?!MI|*pQydxXm!D+#>y`c=PEJcD#>?)z|v;Rl+b`zBB15pv?7gQ730URy!9iu z+`fURDmFElz*L(FRSG3d;(8@ogA?!EmMl)!oJ=-}MsQ^bDS&ShT+8W{39jOsFtX!b zXpQOeEBSy2Ak2j0j(lLV7^8=ZaKc-aYjwY`wPr0L1AnK7I=njkDLZBN&$(=$I~ zOtSGzdM#Izl4Wyi+aQX+YwkSS&ZS)Q)o6`r^>b`_8vV@A&N{qh3e(dD2-!p@=!COu zS~|MtUQFDxEYSq!({GZfRkaoFmk6kI4|xWsoe;dRaSXCne%*x1dDn0DuDC1_SXnXjpkghrd0{-W*f3dDqHLD8Hab8Ov}BO} z5~c~N>&4K#@`9Ie@7O!vVxAWdB4E45+tv5Fm%kS9-0HLYPDr70FjvQ>K|izF^Ry*> zP*R4nrrI|C^0i(iB4XA5keLZN`S4eFfB6?&hnJZ=9A_y&K&H$Wrq}+16tlZXWBB)( zj(7wd()p?NT>%kYVFBi6jg+$v>DPYTUF}dAeP;Ow#)Dd_YE}pD+g}~y+hiRREXoPm zF5ie+2Sz54hRkZVt)gzSI@ZS7D}x61&nc_@<63gbCj~vVF;#5d zlMTJY@T2;0toM&B>t(G?TRMs9OEY}+?g+AL=l+6?aIpZv=|{ld;K=<4xpdelFfkW^ zHHin76F?dq+p}aC9#P}d84B$w-i6nv;^$d-c{oz$S-sEO`$)d+L$Ej>qeLj3NC=G^+05)f$&RuD-`X zO!02-7`TH=-5xl0`W}N5@X{PfPI)CSc_6<)epN&QSw+^}rAx)=r?2gjFwtp6ce>Ek zubHixUN#PGmKDF(x2P=djwxc`A1WtB8YA?8?)KK)F!tbW&?kKYw&J(WYsLKTRNVOC zZ{^r%#L2aWG(IQoEVevdTA&vLZw_A}rrlkfao+GAD3trvT{vkf#yyAW=jQQ|mk*_6 zS!9;TL9%Hl)TLU6RZ>aNQBaOro)De>juQLK(MsOCB@J`G82bA`-(O-t<|nYHxZf+g z*+n~6CMm8nvFMOndV&FkL)sKZn%TGDn#9y$PHCpKl?%Q7s$YPyl5(Ngc)(cg^C5j0 z8zEZi!Mo%Ekk1Nr{5WwXe`a}~iU#JFp`tC*%#*f;oLQo1eiFx(CHQJl+)l7d&9-AL zSmp=?UKH|~xP||8C%^)uA&xct_dC=Z2O3)$6^NPlI0ea%NDz7p=QxNrt~UI>d5t0D zVq2vi*!_S%Xu&6>PD^6B#^Vl60c6tEZ(DQ-tIIi*Z za}s2oeO2v7cKm}zFK+2Qn*n8ln=USPYeZM`-PLZ&jNFS6XA1W1rFa=1IIK{KIUHFq zNtx%pjR0Wh&$EHww(5Mf)BEOazni7?2+K*F!QV4wLUs@`@o+NHve-@*%KcLF@~&74 zlbCIweDZSVT1gEMB5$K(>kFp1gwaR<*0_PSg&OZyx-EUA6SE{AOWlcCSvc0{K)3Lz z@|tb?(ZX-zZS#y9?uC);C>$$I>6CkSiC7%*J13>>@*Y{QL>#k2E-Ih}nb6A8QvJY& z?31`FKQ3yrZeumm)Ddw-+F>cm+`o7@KR(<#({%@t z1wIIObzO$~r*xciZhe&&zoV1rl~wj|N&d%xohl`paf~flJYfhBM)z~6(W{EPB1_9 z$T=TaH|&G;MFJ|7Q#8G`m4LIAMx=F9kAt~HCzHxlXc}JK`o)amZ$~B{JuQMS;;vmq6 zzb~>-CSq-SJa_6S@;K3=leJ-qKcM;XIYaNL9-^C3Nn{V2$n|IqKTBLCGM;I%-+A7! znUJenH!rLQ+~2)E3HuggGP~AjC3Ll=9SiJ0c9dC}9?0#I7PF%r&t}MKvw-cOn zh$tH~4A`V+`QvWn#+Ce#h!(W82VN$(h34gw54`9&w`MoYKvt77()bwwtUq7OppUEH zqQ@@T84BZ~>xciP-KIn50_OQPZuZz3t?`GSi5@gj>7#T{JoE`lhi_Uh0&bx^b&Dch z($KHaf2D<~UGqPkqziM@W_fL|UF~b<@;rqKdQ0zh*j{&DvsONmiRdEC$mIrKwd#Ci z=-_)!Z`U;XwIo<0rnYsd>RTYiQF<-3K)c9J*2^ioY~Vh!PWZfIuQ$xz*@nDFDN zCNUHAn8;+B;Ik#(qk@~I%h^hLN;b*?y4V3Ti~u3)o>_(_g+{RiNe{`mIrdWYglrUE zbd6iJ5c5k8KRnqc_=dru8zlu4$@h4i-y%-cC+XC>N?+jVHfEDo^e@>CbWoB~^()4h zc$Iy9E0(bOzm~!s;ibAj-47{K?SMYA`80vAfD#G|7w;R@+spRv%WC@*=PFV-vw_S5 zn3q@C(`j1hXK74a+(2~B1*=Du57vB3C#L} z_FrN?vdj17jBEhER1B4pU)T_DLibD2d)IL#-tF>hIr-qmgIwM#X$`4VDr*&^;l3=q zS1EM$>#5nm%5H&Dj={G{_25Sw*K)f6S)~G*+DrGT3|q^80TlDNi(w@qWh(Qo^h$Es z4W5rm+!7Iq2?IU;--`jkUn{!PMcju}Ge9ket{a6I30U}#ankqto3 z&IezGn%eHKqeew}w&Oq)O6OOkmxUrS`Bq~Cp6>$2@$Nn&$WjTHOf(Gv$x-t}>pEv7 z{Mc?|$0==pF?=rbvx&kNJUi?`OqHf4I+6qrae|_Sn%}drm4?8qQ^P{;iurc4?)EGU z8X;oFe1{LFjMRG8|TN^1tL%i4SDrxR4w75#77Y zY`c5V*~?|^)peYQcy1$mHG8cmDh>7QGvz*QrF^aSH|i1+D{>HsobQp?GWmzB8qeujTW`M-&bmAu;)LZ5FT^Lc!}P{t zUMS%?l!bp)TVxF;9k1<*L^DfA3Sbnu$esKLlPJW@^1u8q-1)~X`Tt=KRnpYMkCARB zCW`oyqmcgq4;8L7W+vyXUP-+L6Z@Z;>aUwK^!(p$RWB}J>}Mhe34=LT{e!!Vqbh-L zfxMU-o4eGmgs-;G%z+!3w`==1y)4hgjn%c6e{cfEh8(rxCFHkt`r$4gY_J3)?mLuX z@0kGfM(U8(!~wzTY93FJ|CNyG=V*^ab@1M+vy{j2jG1-MY8_fK+`S znSBv>V=;Xz{s#xY$e9!usxw7UWAjysTXTRt9< zNqGi|S&H_B%j>G0?W^7e$UVt+=E<#^1R6?SjQWw+CBX`K%_%Kz%11+@cBeLjAIJ2$ z^_MSC9#fsd(6E+Eo-0Y;Mc?Kg!5x9@p+D+!dr!ZYFxD0RzF0Utb6=hm8GkiQrJDOk zW-i71c9rNaqed?Vz;=Zp>FywxNDxT(8=3xgCQ`p=-;KE z5B@f|qr8?Qaw4_C*&9acJUaOF+MS|PHZ-X8M+P_VgpXEQVET|dPm7uCQFE=mJ{@sP z5npC@@F>Gcb#qLb=Vj%&X@}6J7&p*7!|5=5g1MB~{TXmldH%vv+FcRRZpUymY;gsJ zV|ZBpe#Ar?KX$c{?>3zj$h|~*qO?HzLx8>2I=U0uz85)4kV2C_S^-m=kD5nATxF|J zEHxlw<O;V~TBS`ov)^yKmWgrLt8Hqf}l(3y~L zxA_}n$CM3XfUenfEwS9fogW@2%Td+jq<+}F%s3;FB{`mIi_r5=I`Rb;RadK9s!9*C zc|3hSscEmV-5#{!D*v+k=LA|sbvDAcS96qz6YxqIhwLJ2R2Jq0Sn`>&;g0$gN$3ivO-pZjBFsIiYwm(1Pwf7MeeRLpfnsaQEN#FKjWxy;+cr)63Cq1M6ji zhD9Y7?nTm9lj!f7tGHBJx+vqZL|YO1ijCnu@zq;QH0D}qikb{+s5`$YR`-1JG>63f zziZ>?IOo>5jBbg_gTt_*fg;;g`Q24yp366CY`zDBM@D!n8f5nNQuRv{`LgK7Mj0G_0zz>kOwL zltsV2T&%SwyiH=8S&IB4P%(n}uG6aR^hmBxDxb!P_MB&GL3v5~ZAwI!M$E)}wW;d~ zdD0y-i0e3O|9*S;1ne|E+bdZO0QvA6=5i0as6vFK04p9a!t8dJj4evDup!3ECZht# zmX&=go^Y1KMbtl|-)1YmUOe5kxA;VTZV{U29b-x(e95H}2!k0s5YId|D2P0YTQbP& z+bN%WNN$}I$&&1(pWqH_5^~O;s}dRVav91tnMY2BPcvA<#k)n*I~x{`F&ay{lWv)8 zMY^WnmsDNp$yO%B_9b4V^%Yvx4QA3uttnHu7$&Kmce;oH#_}G9gyb|;`tb_Ymq35ZDkQWiv@)gcU{oa_ z5Gpj}Q7&IGp|oXdMvOU!fPSw$ax!jURZzjnla5+)+YY%H4VwnMpIeIl(AMGAu)n#q z8`Ihqp}0xBY2=tA$SnDrLBdY~Vz(y1lKkvscU%)W)*dDEAi>ZuGoj7GFlVEdGhXen z=B%>_gz`!`<{`dP=&s?(B&8?949gvwA*uDcM7>R$7s@R@YP9W4WpUS9M)~ti{F2v1vW^xwVRU#-vWR9D89s*r2%GEYQHJv9hEPe;2fT+h8J?2p zIuI8HErn|;e*r_FS%}!h(HAM|o4OQl;zx1o;?gm1y)`s9~H~`Wi0NN7GrACZ!t}=Qwb3 zb-Z^;h=0F;afYpoG5*tK556#%xLvg&qpKGD?{r17>OPHE5ebZhLEsD%NBR+Yd<~E? zyR3{-s0x{>YOA)5yTmHX8Xf+OA78U3 z4&NM!Ny92f@bM>zQn+L|6R30gteMfFK^9WV%udZ?0;Wo1-%&Qw<|8h-+(%gGj#bw5 zL0Lk@|F}Iiu94J_iQZt$gE^Mdp`3(~P9AY{5QL0xBL+nod8&L+Fum^?x=O)Sf(SS3aO^IWm%B#feqT}VysLb*W~D2yPa4EFwPePUwE8;S{Gzk4146Z_A7S< z!~YxJ`f(^%P0umQq?Xt0Qf_Ey5gPs=ZlBEj`zM)l8|E9uY6tV5iY0xQF5aT2^pZbv zQW-uN0z@&&#QF)szZe}8!>VGDUPp!nIa^b^33xlr^6@5xrbIP zw@kIaB~4n-Gs(&iSKJ)<3b&I2KJ#AcziEhnE zTc|G`9GEnAYq>P3cr*GS`w%91o~npSC%#m8yw3|Ja*U_1z>-W9l=ONiJw!|ZJw(*} z>!m#CW>iLWfmY=PB#6uXB6T*q;)SjjuD@bp^wJND=42f6mNWGf`rcLMUMEs|)jR+^ z`<@D<@Yt9(1>%b2Y(n>4A&j0E?>ML7pSd9CWpVP!BpZjKtB&Y>2&Y3XYO;2)6le8dCi2yUtFM>>c?^`fW zN*Sg~KKiT+nbOxzbAL&VyrXqD6E0WVb#(mNU+zhof^#1k8G@BUE_2{zd=CgG6Y7Tv zxo#-1i)uZ%^(BJ>4bmI(x%EmC^e4MV1z^rVm5b%XTyZj)J$96L4bW;RUSZhCJ*dd2w7F6~*~>tJWoM$DViH^0}%jfXwAyGjEJvu9EoS_om2^5nJ+fS?j>v`vFR-l34bBde%pD zS?{913{Ae-G@}PyU2IOp!3_O1j2rqImSmBMNoSTA!n?fR;7^|3_q?X3+Gv%!`{yj1Z zW9YbEv|Du$h1nRGi&@r!>?<8c^Qn{>P6415pqcO?2Hr7An$t2GruY2K3 z!?sU1lV6Q5jp}E7EGzqgHPVlMhr)oK$Nn#&!yM_GdAP5fR#V?ET*(NcGOi!uAe^^# z=a)h*|N0{EyfS>9t2YA2^G8c`d&uZ$;Pi zv-GT>_CD{1LS`R3g2N5o1Ty&(rUxF?jB zwp3dl9x<4a&seu*t)3Q8hob8~-fA&O@*q)MuH@-6pVK14;kQH;z14s$$O5+D;B>UYW^HS`mgx9@DviI9!=mJ_T1|^jP1U+@AmAxCi+P#w50zKnl73wbiXKcTq$h`*zF4N5dU2^#xUAlI8!yPFXDXaKhS7l% z7@2AzPo3pR9X)dro}HmzmUYY(s0`dlE*i8KiO()d+AnAn^sGw|Y)Ue(9kSVNPYcsi zYAyR{&i6v?Pn7o*PVcb)_5w1eE5)LnBuRCoQ#>~tn&ops)K(h2I^hn zoLJ#$k$@3I+f%-6B9@@u`MOXGQ8_LuUkg8AL;b!@8{498rR$P>CS$&r>JKqa6N=f=mYR?0F^fw^g5dq3 z_%oym*$ZT3Wn>niD(ZJZ<0wdSA+bL@@W!UQfKCd6-VZ4TW9Cg91cr@%WRs)K<^%Ta z-F+qs%DPIV-iv;`2GM=JC!A!@ts-Szu7$+Sr{+5|7XqVyu^C9r9@1Ypl_>x z3)@HP2d5yn%N=ri+SZ_YYu~-q<2Uj~g_Rbiin@I}My`qk{!Ut+LUYeQ@wx8T1vP}q ze-{3o8);}H?p<;^{#4zwRjvS?F!V5EAW-X`^j(zHQ0ks+St-u*&W?+VVtat*%$c-*L{tcN8NY3-}2bd@x`&a8W6b^1kG%H6B>Fr8*~9z($n-qk+x{ zMt#lG{fe)#m5yA}FXwA_y0C{p8?iS=~IK zhkv&1^qUNhRyydp)-B^9pg^2+_nIT*4A)xG&qh1Fh^G(aRQ<<3nBQ+;VmJv;I(CVq zeG1L=uSjT0nvhaogU=;tq(_gE9xk2kYX$dAE?ZA|cxW*-YFNcqVAOX~;6R?WprSW{ zMfNSs&aliOl0@U(T-BQdU~Fg?)2*m!oAkiwOJl>_JTdn{T7^_3+dpm|4KWlXI{o|b z4q0z6NnDe{S*wlV331P)QE^Hj8n1xpT{ql`e~#B&P}Nb-mu&*mdbeNT_?(v|>s~Uh zV1z!dWr) zeb|77$9CS-AM$WjWACe^qg2z0rGB#EqI%Gm`UK!0Xfe{ErU%gzG1ixlLA|ByKa3jS zl!gMuRow7f6234cs64Z{hU{XbaXMHrgw%ik*-0L-ed>Jt&mZE@nB$1nGODlOu`+U3 z0b_{i!X_OoZg~?3bm^WC;H`|aRojCw=Eg%%>$;7Z=%- z(c&CZKncukJx|jtdRV2%lP{6emZ+0XYg&9yaZ5eJ9ubBl`Nyvs5i!(M)`+WL#EsG& zp88Mf;`aSiynT$$u-Sg`poxEOin&u{7;Q==OC^gRb1L+UJ0?a;BbE}&{_ULGCOVu@ zRQ_y*5u9Ird&_pyc%|7l6ccltkcJzPrt<1VP%5xP*0N3lE(Gu@z+1@hkMwT=z*g(W zTibNeZaL<7RW+BR2}D-=q6fc9#*9&>N?6`>wkeQ26_FFU2La zh&6%B7i@mT8-BMp=tOOlmqQe!kA#f4KDt#!RUaXd2NNg$3_#Ubz0b&FuzxBdJh8PQ zzULM;p8YqbE&Va(;zX(n(V$h$JLlV?T5fk6b1>(k*RP)ioPQfpcjh5STgjBExPw}} zjZ>o4wvn2$aYV29cw?P=+cgaLl%&y^m9g!t#S6f8=2mmcGX zWIdK2!iS~%Hwk@I-79XN9B~3EAu*Aij^kOLLp2_qpA=V_f%gyEn3p<93#5j{BL@34 z@j?IDB=Q6&@U5_zx~w(1U;{)kZlC6F%}9{h#a`MnXWRi&(xILgsNZE%0W~4~xXDA0 z*c5vmzzpagc_?R`dnNP0dj<9Vi(MlQ;Zzz#ie-|9spm~`G2)Tki73BH)~X8E`SkoB zg&5f9_NAfZm7O0lo@C`R)07w(=Ia;p2;$nmS9&&82&mY(ovUm1il;_&lPR^?e&Z-| zP+1-OC42L)=KKm~w}fF27xGa&1Y^*mb4C97L+O&T{qwdImi<2HOiK;m(|G(!n6?CB z+3AY;;kTfUP^XeAG_&tS;#V^f>qJi-ncV5CX8&Y_u~YD{0Ru3nUP!88OKRTTgQds+ zb~FVcBSc=&E};cLcft^H$n5_qJ%+ENK~OiVn#sBMiK@Dt{vnk+vZgWn_SB2Y8{&X#OGd0 z7sfQj5gro^CdAvx>h3)bD+vKm94p%2q9NGIaLzLp$2<6ZMx#!6eN_n91S6>Kd9pyz zN9+&4^WUW&MFXboshYmS3v>cOwvJ`(|MI*8I!uKObwmY%x=sjy>&gQ>761{#qk$x` z1DjtO_wTJY79_-sD|ep~Psf#RO}eQHNUAH@zv3+TTr<{(c2c&r0dhN5y1fK+j!c>;c0FWxsP`G9PDx_+mPZB?0kE9&ym{J2v$aUrNrq8|4s@Ewu4 zZbg#*jDQ1tWEm!zrvab7B#eU_p?pD48qd(BvyN*U`(P*RBpMfrREKqO{cS=>uDFH} zsU#jxY(^kV<9Y1+cOzzoNQ}vz^ljUETSDeR9YBYA9NFvYtN4LfBO9b5cxb<5vlrV4 z>vI~eH@nz)`KO16688Wz)Cj@9oFti~lw^z_HaFunLb|%Ffrzd#T|Xsh5l12Lnj=Qb z$JeRWs-;_MeP}=S_an^zywkh|YqU;F)c{fDgfpZJh@Cby_s0rR#3h;`oKxZ5CB!a2 z0N+#qen}HCA+#!}IzP=b&Kf)|*8VmThk3Z4v2Tm2$hBk93NLcw@>4aJ_-#G^MTLRT z@KmvrC~0>RBAqs~meA7|f+}p4vI%KE!ezRed@jd$!2UVFo_fJx(Z4vnB^MIH9#1zr zTm7;~tMV<87s12i*=1G2p=DI)jR#^0f{<}-$Na0L{MyL_RN<$B@rQHh z&B{%^eTxKSq;JM#Fb4PC(um-XE)UMmLvO0arphI$znsVN28H^VQfn&RjG8j&RLRb| z-Oia)>o+C-i@w-ESM_LT{2Qi~A*O}a)0BU4*1cB-&f-gNCTtF1nnCZcLH+*Qm! z%7x;fW@s555$lo4;+5NV8ooufM&&+c*U_e5U6Nu62)?G3R`4>!w2l;#w8`TlW7e3K z<;ZlULlyMRN(TLe=qw+w$$tl_Y>3W<5T$B;zhOe=M#SJf@|5%fc}c8X?kH3A1qFKzRup-G@x!X-}1zY|ad2W6)qr=E>bX zJ?3C(PH=({vm7<4)y-JNOu%<6G*~J`B9yO$=dMRB^;CoL;-HeOBKezBERswTjp- zjBf;N+@-5$5wSdVG6VTj>1u?9ZvRlYTDQYuBf*?W40QJ*T4Pg*vBiIY^GOYUOJ6D8 z)wqOv>&WEHiw}~v*_Ch6eQ^tl++)|B&tcL7o!sYisOZJjZXmlmeBV#*lwvR_@N!IJ z#v2C}VhPd_(AI8SO4w@Pm_y9hKe5c-v3m1*e@ zuLg()0~gR=hy$r|XzU#~W+`oPSW)(93IFXmDOPI0lV%e-aR`SoXisSZYbvH^OE-0D zIu7GB>iG~&txAuwXi2KE`VlC{R`GSJR{J={)jTPR;$mO3YtzhM;f8oRf^%N<0ZM@Z zHFX;xC}>+D-m~(;)s`+Xkcn^=K{#Byi9R7@kcfXjM9 zO6OSp>SRC?;jzhx2>`tPRtjr#pBhW@)rbJwE82tf=S_=uhhz!IB-or(#Z1?%4iOjH z9l}&0k;U-5((VldhD@b8%Haq=j=1;MhI$T>E4);l6M}eEJGIcHO&$i`R6yYP5aNwn z*q|N+n_kMXtzy>M=;TM~(F>Tu6@#c;+xdD2YVYemkqG;zE#p4A$vM#+RL6@`MUJE_ z5eND^^#PT_Tgg5#=|E3+t1Z$bvvs^)b+c9uEe0lcV<>gW|CWcXY%L{>uxyz^s^SDn zT3?zUiAtUlkrhx`#t)WV73NIte}7hHic90aU0b+?8c)JSs>%-D{p4TJaOt@n7g4AsqhFKoPH$~DcjCK4yV_N zLQIX$z%lhf^O;m@ig=YSiINEcY6pu(+87u;R+bcPc9TX=rZ5Q%;qH z>qNlc^_ZD|^D@Mlx{*VDvyxYM9qd(c(Ph4*;VsA$tMxalnWybGsm132CCck5nUcKy zr1);WG4BUX1YNPrMg~@x&Gaq()2u_^oM2(4H+B;XUyqGvO*Yui?&yCH3Ei$R4#1caQ*(F)v=sl11oA$0Ujuqk%iZ$a~r0(8LN5K<1YMdfbc zrS*!vuQ-E$ayosK&myc7zffn?6RPOC0+p%2`DtYIw>8J`Q&j4&y^JHm5;twql3M#2 z53eydFZOa7*53i`QCN|SNK3&zZY<%;jNGs4i$GN3L7M3UD7?1u@E5&*?eGiX~WK8 zB26PguyjJav#8>iDq2Kakg4%AJ^qP9yAr8Ff2S}+q`jQboOLP}Ek4tTD;vXrgIq$( zC@v+nUz^CR(#t)Uq2k7j`7#tc1v{^1YpuqJ0tH9HjN3jD<+Cj|9n;#cc@sH^ z>G;H2yACkcr0I_ox$C}KhY;Jz%JVUkVVPD1nJ`QOimU0@L5(Fb(@(K!ZbZtI|FWp( zT}eYT?ny5dt-4`X>2n*Rsi7VFf^Yrj?m?(Ob>@-=VWZ22%?XLM!P#O;)~F`-lB)(d zI$w@rZt>Jc-SSb2+V9C!qW>^gNaRUK+CNC#I6i};K-uJ-AuEA3WRaaN^TCb8TZtQF zvCoqOKs|(?TA53%5U8V|uSu&ATYA&AX#Fst@+qU}rzah_RJvxpoR=kcF@&U+P9~X` zpBN<&5SiyjvQ322C|si+(TzZy6Y~OO^Y1&PALqI#dm>}iw|6tVyk?$YWbQuDK~5-U z*oXZH&!~ixL&LhH7|+iME#sU6P-JxOyY_f!u)ro&E!lhpB>7TwFXBfy0p9D8 zk(#G_p=VRgm3*K^i#qy;EO99Tg_4@KMFg_`JDEcxLE)q)^jrJO}P^@`~Lmlo&|h2)$nh`Y}IUG zJBp?45rw5Zv~G9l;Jd&T0defj#s9F0YI${KZ@`DyWvr>nw1?5 zx!+{sad8hGs3+|a3C`c5pO6oQ zI1YgNBXus3r#J*PNy|vp?5NS_&_rh&nc@|)2A4`~D_$&|+};vH)qAfd)*_#KV18c zOhQ>6=GEP2LQ0@ZkXCjBGZAy2nqMZiu|+8D{Sbf<1@>(p&zT|BO>&Em^ed8@bSz4z zV}6ys@cniFv~6;8a)}sa8pR!*0#WtDxF<`F94JZuf*$Cm=od&m**j21^X1M9RjrR~ z_~e3iGX|jWx!4$k*m&b28V zzD|NZkU1Nm$V()vL$PONn>>2BRUv@cFPJB3k;E5w7#Iw7y+a9A9M7&RcA?BU7j5rN zqGl(}lXj7?hN~-v#=RsAlyAno9vgb_1Kpt4K=JNPA%doLPxetzTwh9OoJzc^E^V1; zNA!@c=)fH%nzBHU6}kI!@Q@R!v4DZudgTt)DN|4FS$j*b%Y?9o3t1-SB-LMXio#Pg zrp#*4Z0%PA+%ftK0p>MRCERj8x~deX>EyncH}GaFDTSQ?iFFaT=%H7) zF<=%no91(F3W>YfnYuIGy{|k(%2%9?;#Ng%burd0iM1nA&1U?=MY3yL%Si!1>PRW0~>tf6>|Y3r4*| z<*&MNi5G)My)$F76*PGWd0|a-j88$1ne7l3QB}b|W_G~z z_w314&foKF9`Kf$okKCPvF~#VFt=#}Ylv=DqX1NKtDj$!#b29DBQ4D6nCcZj)&DDP zpgR&wpEcCBZO+AIa|M}dBIv)YwcH&Iwe)`Bl!`79*C!}xmwJSX&xT==bTxn8=`Kc{_>}u)678mSn&S_Qa%3u20-Lnl@g;t{TyS0~G0vq#(I*f4 zT%xo;SsXM`2em+8KIu;YXPz5Yaf~T-sR@ip<-1z^e48FsCKET`6>V1IeF#gYjAiTR*yF z#G`k~WQAQ%Z9y^8h#h?A^_5iw|3CEAW?JkGr2Y zhVkB2({iT>+ANy>6w{p^;38&%IIHIu;k}V0B%%co&R(^*;&}KdTlQvCK<^om&NFIRC316+>K^l%^=&V zX}YfhAO*=bO_jDL_!iAkH9HArr!kO#43>XLLe+=m|4%9B{m)kWH}G2rYE!f*iq;;j z+FNak)`;0?Nw}?AEkcaiTT#@C-b(Ggi^LXU+_s24YZEm>$Tz+}J+J4-=lKK9bAEE8xQ4nT{dzNKf~n(6S#QW%=6nI&zwg4? z8eJl12Yna8mW9){i}+BtN2laf)kSf_)(ux9i|6Hv$AQqo;@SJo|3r$;eW*9(Xxnu0 z=2RlQR)S}?c32iy9P)HscuUnj&wID0upV_^a+dFoE(~os{9!zDV&AL;uEdUzYS6U# z@o4srYeY^@>O{kgjVk-Nn39Q2yBG>>lxbryzeMwM-#OEz+(a5ZL258cpu-ZYne*S7 z{o)ZleIoIt)desh(A9tME#y6cEbHw6RB}W*SCXT3FtaFNrQi@mFYY|aMr*z?@Q1Pf z9|x0!HA?A6F5)HpXeHAC73^9DwGqFwTkMV4+6Gn z6~eNT!$TP}4+u=0_x{yaVUVqaGYMs7P4Jlsx%!4Y@Rc-bx7^O$X52Lhu+FLf@fD@9 z{ff?#M1V%_<8yj1vx4zAVfRL#DR%I3Hk<>$4|k`nNPiW*)=j23IpKP-e+xM3zm_UM zCuLN{a{FblN{wxRDpm5%De3*P79?)@jJIWkT*~Kr8Itl^rD`PwxVyDQw|Uru+0zlw zM#i$ce=Nc`$$Zb|_qu`$hDYTl*nvD&nS*nZB-L$qFNFAQyV9v!ICM6n0me{_67D?; zDw=9+CUDQ&vc^~{C8{8fkqx*?Q3tcXpLXz(Papmh0O{%*nx0Uz?zcU9sp&!p!d?|~ zPm92BrJREK-k(W6V2j{)v%rpif%z1dvgJbqk7>RL z*OB1y&x|sDc_*ftv7M_7G}K}f^RA85{ovceDFX$+kS#7|Nd=6gaNQVf+2qDsMuYrT z*~ZnWx$G!9?yQe_*q#oCK#!S_MHO{3;JWJ7+7Axc!G@k4x-QHUQZ@+^%S}j`vY@Yb z)=u&xOGmM4R_6#fr!{zT8r!ewjks@j56^jlSbmhDA<@{b5t@Wzazf0Cok>`vmJ~_# z_!Kow>VqtdeK}#u$C%mpinmk*Asp)PYnD>pT#-Fh?AraA$}`*FW;WWxW|Px1_u`+2 z3x(x5`TWT#G$HVt;_0iU<^%o|DK6)o@ut2vO?A{@q&s1r)N5C5CsGifZ`?5x>E&Pc)LqdGJ(7+aJ4`}HmjzEG~P#Q?0N zU?|N=QsvA@V3#gkU7BLCv`>m_rk>-Q_xkf|zw#W0TjL_r|Pu#rP~^R2-9N5JM%qk)&*M`3Fqle^Wb ze*1=6U>bDQBx@td2r9FscG%p<&*az6t;Hj4i{;$ztBTiJ-CBxUtfh=Q7-^_Z(lUV2 zHq?3s?N2ifGCyWLb%-&1@R+iK`Ss&h>4RVEbs&qx<)r;ZHYGcMZP={^# z5s<4B`7% zw_zv01>ZD6zIWK9uXE%M2R*tZyCyZ~9CUAG{Qb!==ln8(1zZ&@joGPT-5$7z6cz)h zbtd*@)u>-=vn)(!-}HqWtnd(!#54))j@Yc7VyzJW+B?MW74q@hr7Ah@2cvm*+st7VCyYbs!5iF}dfmr1M<* zuEm#E9WD#UDe3Y#*QQrv&)?8MGHaM{q+Df(JN|h^Z1;0Yi%RDNTiWB45I6Ml8^0ep3r7ikHsR`J3k7;;1S1#45 zpfK+9Tv^&m1c6QLduh$kLRC^|-(}XsW{b?&+ndnmh&N~1^LWSd5K{3|m=vS*z-w(GE3>kz!t*8KO1VTez1Ic4K z**0MF2nC1=*VY-=q)4FJVL(D96*&t54Xs<{;rP`5JIsOK7H{*I7VH^6_S8_O0b7&L zk?I5Za>xPR?($1wLp>`lwKF;M{e@TOiFieiD}E%`HEq93nv?06LJA?qKyxs2=x7K%8l!MC7wHR?}ysS9Zkt;86-)vu!ARZS$ z_Iro(EJ-nI`))4pIXzZ^yK*32!6;Igs_88_fS2=1z-&MTw|-mnNlAzG>cQ%%Ed}R#c9!_+YjtBOe(!jmrIEU(E|ncAY_{=HAIh7MRt_~ytM1!c7+WRqir z>-MLIiF_~rd;s+vqWoJ86vge+M$cn)2$t^xTtB1#}uS zBU!_FhPyr2iDcIj`wBPB+7sv#D_ah2N;-ol8J;=ZS}(KnIoq_X6=G*&#@fXcway^G zdk5m0N8PI%Z|PE#P?gW#;PHvAt(zlv_Qxy!I#S;Y!)t9F3J<6;ra5%$D=5US>6a?- z5O?D8p!5-EUkml}O=fj1me)|Laf@fpYtdMp*`(ckwjO=h{qfjsG2KM}?tb~C*11@$ zif_8jbbg=zn*hzD-z;g$@J&roZ=#HJLPAGbk{}rz`F!cqZHb=7`!|6PlS0?aGgS&#t>o3 zPa&^_=9VMYY{R-t@)MEVp~R)+jW7lgcvTiSG(ZNIIC^(WkE^DHhVL;gsKfG}I)^*| z(txfj73I11Q_tY+QRGwBqyi?Ao-Hp8Ry(_f%re+#6KW*^)0vt`7F;*B}1SA7`{ z_;J9H)fkvKgsJM=An4Qe%Q^3TP#)Nq2C@gy_FS}-z8xl8B1b@OAz0|wT=y^BuKw0L zGv5OLS3zdClBzW2f6B{N^;-)y?j5?m)3oLG`2l?9@4J6mwk`>^o0f*rvJ84cLB((C za^Jpo%y-4@I|wa8;G9*-2S2u07$BK^n5Ke7bAN-Sm;^y8VhQXQRW63z=U$C1j4SUIM8aSV^5q}WPYZ|2n%C!GhcbMS*_+XDRGILP2 ziB$RU96%Uy`l9yNO5#{YqCBUtj&ga`C6NXuA0 z#&$5b%r$|$MBDw}H`)`7X zEYe`r`khV2i}sP8^+C*HtN-I0lbbsuR~tx_Te)=DbEo#uKdXL=FRS^84|R6Jo7;GL z_E&!V`mo|gJubjM2|U_1mEt{Hw61JkiCaXUh?rR!6`#wmGg}y;W%3A+bmuZ$9f%|{ zW)RGk`!?{~ka-K{XW0VSOA6{dc`15ytP{{fm5&rdadEj_i_Kt$gB+R^uR11X6j#>Z z15;hNjN%KMGtaLaE)eBR4$9lrLZUR~3w4`({>P<|v_CI>{8x7%QobDx=N;H12_z>) z&q!LTusJp`@!7@I5VlL^&jJ^bJH1V6UVBl$dy>h?zx>}2-WgNd;2z$+V6Qs&-%&b~ zZ+Xdl$`lWnWsyurv(%@fF;@+i&2X!|3Cjz@JQ%Q48V{(uv=>^itIer+mP+PY+lIhT zTN=)RKWRek8lhFa9|GL!nRXg1DBk~2yu^|EZ`4u)evUA=n2rGV>qcX?u2!p--p~}U zlSF}l9t%1d#%=CvAg@cDR@Qg^PGLkz37dUvZ12M zhLe`uz2%L5Z@qxHnCRWLO>(}C_18&|%hNrPvsGI3YEOw%({ucEI??_|!$}NX&4Abgh#30XP2O;- z*=nvPKe6)H1gR))A%a{j9siEqVZT~yw!AU-`j{x(y5O*?J8>v|img!iyTx_xm{SPt z6{`=t{4vRP5+9%dZgeFq6VO-OC!<1vRpAsEwU`k1T!VR6HuzOyYHG5(kfKNi4Od34 z+54vQ3;W6&?x|PwsuxIrCd_k%z*?OO10IjT+ODli`D=jHS7gr5p#@AhXv3lnVu!D# z68!`<{o$u1OG9TGkwn7oT>S8GcHN{!%-p8tGryZesAxk(Rc%@^6QgEV{DR`QqC;%J zGyD3sDUXVH^VWIKNp^=9(|gq;eC3T9&S(5X;Ztt=fc_VlZCXqFmLPnOXY?+MqV*ux zO!2X25waE7=9hMm(YJS(O9I453Fkk9s>#cW8GPV+J-k35dW|a(q zZaU2^Gx{;ky{y=IX{iS`O^NH5z7hIXEtrZg3Mq_dzYFAdcO2R9^A+RL7Gric7(I%v z2|Xgpj;YeXT+q^lhH+=nda3@FU1y6O zpEktoJ&suTXf zW*XF#FJ8M8tQtR!kF0P<;Y$VBgo{;ZTa2f07dgtat|z@c4d_z54bf8sIGA%r>r&M@ zU|xBxgf+zm%9^F&8okw0lcsca^HCGj-q967*CPbUGDqJBV3AhWiVLIGLMR4T`O@?sF`nk%cX=Mu2-iQez|hmuth;PEbv> z^Qk3FOloH6pt4$(!pkYX002JpE>*^|T}C1im#uDBtM=iaF=cbXt^ltY>C^qgy)+Zg z&xXz4sfLT&2K}@xvW3OnxH>DJn~dO|Wu__IjMgH#W*$w{nTW|kD+7L6WJI(%WnC_K zkFV@xr&lfA3TF7zis;UB2`=*x-a(Zl5FhFIXBWUyK78lN%AOdiO??vwFl7!5RYhgH z8xo7xNk@q8}q0nX|?Awg2C63^eSE4wk;5DeAh{ zZ#CenJ2+kfOG3kx(fDD$7v}q$!@tH?()8W87yk_lP@GIyzpQG;pcp=3@Mk^z0)gk2 z*O`_r!9tV33>_RoAft0(4-j+0`c;@eeN(!rjOJ1f|D&_KO~;kjNzLtJ-FD%FWxVtd z`v9+Cuswy^w8K|++rD&$<*kKcaKucsb#0A0K@Dy`T_z=4{O27?7?lO_SmKobynn=% zvYFr2Hh60bM=;+ZDkG<%|9)*PY?D+M{~h!;h325eRBY*$&`_%I((5E#`{&zsr4~+M zlfuN@O-0PzpUEY__iR6k9Rk{%DUu;vQ{2C5AjNQ zBM{J5b$~RNhlBO*Gu?0S<@SEOE+DunL7sa(E+XA;w$Bc5GX;?md@Oz->-9sDtrn9I zAk;8-c<`4J5>~V*n?(pv0l`De$y`uk!#7YOe#qT$HQL(<{SQLfCp$`-%p71*-YE63 z@{A9|Bl1F&gNegMs$aB3TwH1|834%-myU=U#6%BfS*F~i_MrP!7a@tk<_+iP=km9> z`8XZd#Y7H|zUa$4_N0!gwAE192MzH3-vzffwO9Yckn7ivpDZaCE2N}hi5d&X{Dd* z-s)NAUe;hKpxCzF3E@2HG+Dh(qD5VFK&qc&Dl^YH8L6ZIM1seM2Ll5`l9m!z0RsaEec55K-@fiStDz3hb!~4pIjem2O|9O6`y2&%(^Zotv^|SW< ziBhd{J^sWs+}4DgU}aeHlR~{pAO!UBv7_iu+WetUKmBp}394H8(3UmyE?Rys#u$^>2!hr*E0WqRvTA=y!}q*|LU=FWbGm^OppQd8sNeMMZvjw*qgUa zU+*$uiOogehG7^;pZvgj)&x}Y7WlFN5NJpuI+)3+yc}7> zdZGL4pM$CI$yHqRQoERWGKF5i_b02e-VssCuw9CCNr=C5*AGkIB-Wgq;C=i!D}bvE zlj&o`;vC2Hd_Pda!RXNa&K!o-pijXxfI3@PTv%m@l!rd2$e$08#AnoSS4|d}(Jd1| zKHcCl(c-4$CIjiW1Z%RT7`o3pk&x_9mji(@>~6x?x z=(FX(BF0gefAT;=XjsQ~z+mFzX$4_6M|7acLG0lN@t4e35k; zu$74BL?`eDsxeJQ=i*zCQ22D*Ab#YS!)1$&OwuM#AVOKO$ETJi_zp>w>yXNEXtLBsS#?IDo`vW!j*cF`)a<;vZ+Ql@Ab%w{kZLa;D%2Wdwoe z`M+ucG}6iflBP@xUzEW!UTg?&=oJOi**MZV$_eQG83$U5LhbCIY_aoYT4+0)?6CCb z6!i~BB)ML+XPZEc-;{!3X-E%hJy>iGVR@iVi!%5CRRV4l?cHP`vooIDqU|G~^&*)4 z9I)8FscF$F3ORDi9YgC~^VO6EWA87^JENRIH0{WRk81@G= z{_aTJ6r;$%K2TW7;mUCN`@{;>9@W%H>i{5T2a0OTxXB*}Zaj$7oVHemLI|HTA${A2 z+#R4#%NN9QurI6)>d_GY{)z);JJ%TR+B$Xj2Au>Yp0=fz#+jN>KD5pDft_sOn{5e3 ztCE)exJVmZGvxjYf-~(;{*&t4?BElxjjBq2tSXZvntt$`jY&~HyzU&KEk=36GtOSI zBc%fZGdWM)TmyL%)pl#vjvwCYBaQG-1l#(ux<+}}3dAb*td(T_ehilQcXz`>*ZcU; z0d~mXXiZZ04c6rFP_dJ=-4A-H+q(K$-HyHKRY1}kN07EsBo-7zDH;Wx<*{VnLUdZr z)3vmO_&e9QRyzu|KFDkd!Y#`SHtpx^n<@Dd6c+k4r#oS^#^#Pim2zl)K*o2s0lqg) zaK^~kzTa0;_2R`2PwR=_&xFS|X1D|2q>q(mR5VmNv+&vAGlZ>UnQPzZIw7}sb%}&B zuC=**!M>WKKcD{FX*tzM7FF0W&qq6HVL@20wHN)SL56G~7}K9Vr>q@Z#aWk5SKHf0 zHhk`QkFN1lPZkH@fP4~0692(>Y+;A#AEn(Hy+_YWH+FBf#EMCMGV93{-h#>K^ofdKL)bBzrE~_ zOQU)OTV`&lweS*6_-m-XVx=0+1Au zCd97el3Qz-`#i+wME9?Lbnh!VkQa=A8ef?x=W|N`@pGi=T=qvZSR7QiynCEicomwS zW5@P1t+9AsnCXSH%YpYLJxxxgci?ZTPeJHhQ||s{#tPbXcA4`ZG!ti7erbAIOvQ#+ z9ekSbY)*{zt9G#!&NdEMWUzLU6~6d6q2<0!aRyKrEP|YMJW>3NOb7wBcHjg8VGfO^ zo@G7CfHVwx5)M}~-9#T4)1%yjE;8P1g$uBYhJONrzV8r+68Q8vB>PjG@vq>mj6fg3 zxt`WNESrK__a}4=#ubk7;&tA74Gu+E9?T9OzmmjL7@b!-V4}`p6*bLtk;^br3ILcGjC_@ zdrB(Ght!qxKtJL#n-n< zOh-#wlQLa@hnXz7wY3Ogd?;Q1nKU?xV<8*tKI}V`I&IH1;H;KBhD#yS^G|2Hrf)CzXDjDh$V?U5ws<5k`e^%aC=Kf6R zw1C035ejREAX94pB=q~-`V0JvGsD)Gzc^P0mke^18zD`X`n_$p`MuPZOd{b1GnB}RC}TtGkm+^%{V-Z? zC&ngKynzoJye`GXKGyO4`_;SwvHRA2D=0Ixp0w*ft*%EdKO@HSKap?abwx{UM*9Wg zwtLvzrNxy-ZG2wZw|07Q{JWEiaIUS^jqb*DgO0RM4LyC~+YT9oM`v@Tv^p@_74*dq zs-0WA?9s@~Z3jv)aB6SPhCG@DJ$l+^EK3}!`&j{0UpEI79dNu_Xr9B<@ocpq5>Kk~bbPeT=1I*hOwF69QsRLu+)XU4Q#-yjwn&Sq{O3#v3R8I`ol zp{xV{=ws*js3z9Gp~5en4ZJ1eB($8s)bv{KX>qe6D%ge)R9|?K9^!$_#sjNjI43WY-#Zpda1}(FT+q zu}u%MBTJ9Dk=s1T40Z)9ujsH8*w9bj$bv} zETYxQ;5YAHcmDZiLX5AA1VrX;%Ia1y=-zp(@|9&Zyzt`}Dj`I9luZE6V2kGF{{mQ-B3^?o zF?{@kqEu(Wn@6A=vIP8R@Lc_#@#mf9Y?Ck^7c`3SnA1H6$v(sCgHKGPuh>1+Gp-I` z^}qGwXKlpfexwilYfo4udO8}pCR(rj$AXP zGrXIF29X{?O4MpDwc|xJbD~NM{M4PSBqsRtcDVj-^S0XhrT}p^T+X$t&b9a!#2xdG zsEvG|K>f#5=!P%;fGp-xdvdQqx@zf=Vz6eN}4j*DtR}()D}Uf1;xxF^EW=x#T?Uv%AEV_Z9^^ zDRth{m|gNhdxMTSy(f)l;vk>oKW$uMvLela`+FA`#~IGs5GN0LeYYL<5*6>M5neGg zx{)w1SUUrerpqrqmscklKX^J>GvF`D&p!A3$-e(ajCXEy_J5QcUvq_zM$YYA|l5a2{da%ZxW=Y!M(>IWm`6LT&_QOd-pSQ5(+ajSD`pG7#-KvIAxV6+c6m z3Mp$lh~l{Xq!II_StbU}K*{P*pm6TN?whO~5|j4DW@iAgpXM%5d`aPRcRwK5~9 zA-SP(B=6dPR$4AQe8pU3L zz(lP+1wZ=m7vHEwqw`~wooQ2a5uv#2y{ig6IG&rC(pCTsp)%C4D{$(kK=^LGBx7eW z)U64H1~YJHR=2T)H>ZU2NI0}0^_v?Zwho`k_eLus8I7xVf|LbsOR1bD@YGY}o*NmC zl6jlnB;V2}e)Kf%y`AJ%SdzEH&jH`RJe7Xrh%K*S#;4Em*TPd2h)kfch49Vrjdo*$ zB~o-`A~DNr{}9sD#<&gD3AM0_e^!8@-HAv_o|orzk6P+mAIcONBZ9OGz7Zdf%Sjgd z(B1P|Jf5euuH7C#ZNkAJox@p9q#dmAi9^5epAwBB`gkLEY^lvZP^HWm^ zPKv6#>|>q=R7KtM5Xw&Zg_OHOy)O;b+l`O|h5yi_6j{OSxl0ucqxrb7Ki8#jJ!_Hqa0dA?C79`BIdLP6THWiP_)__G0_P9spSfI^>3}zKTG?PVWO3o$f zci-mL2i_x6L8#(Y$6sqge1+Vh4XDi?H7Fd5Vy0DZ*b0>V{;1$mhwDdwaq$hRLGxz_ zgmE1IiN9{hHQh7JA3^$$*=7O1cc<+Wn|%PDG3LGr+@p;Grky$8Kj=hOc8MVyX8VK) zs{ZcP9?j!qs7Mr08dz<*69qbK%{(f*Uore6{u|H)qiC>n=s(aP#(pIgZ$URbw*0Vj zh^x_=m1f2^h97xM5NEI|3A(s|8fB6`O5rD=SM-hW1SlFTzUa2Tg?|>fc7}E+4yY`) zEScP#aEk7K%JiNtSU|Fmmo&MjtK@&@&GA`T z+1R^w_{6Lfa)x_+EKxtqivhfv8NaWLwN41(7v8V2s=m4YaxKR~(Zg#rF|K>u4fk*( ztoq}w0tdEp6-#sA@PYA*k&32^3mLCLqsU+cxpN7IEr_8<^*np=ou6irPat!am z7UX@|Pu}TAUQz`>9E;vd&}u*|K80(vgDPc;yoxCw6oJ?ee&>~QlkJ`$wbXJyAq$^n z&CqK4HugZ=xA)GANTM2+KB&1j@=@LzYdEe_UqDu&KI-He^?QJ{(v8UZ}SlgR$ zPUEsrLe|sr7V6f^MGCyx|G}J}Hz=(I#$Woi&)yDz@BVT z{|WZ-UaCL2sAT6&{{vD44gW?l43hD@9O^`%lzCULYsAA4it&dK#9ae9n!X^)8ne%& z;WbqMqzi{C07a7p7avym!4>=V5IH{-B)6&sz(d#$Arc zzjr-<1mB31h$U6QA&kulzDkZ%Blo+vj`=g@5C&siKOgLK*y_j2+mwg%9S4tF7Q_q7drsMlwleFrVgXj^$z8QiSwl z?sk2=cA=^^Ov;5;n)p5gl`nGpwtuQqtSvyvGN6mc==-Mr7_EZ?N(Al=1dq zMh<$A$o>!149o8L2*~=Pea}KW6W0e0WCmtcyrEU4OvalR?8`pK2p*+M(j6FKIHmIj z%&CJ>ML0Wo_5ENa&53;0vNq{79sHi(-29%mv=r%IbEo;_$~Gf*n;Mz)b3)4R0m@Bb zVqV%agg5O2^F~{jA3;OkhS}r?h&C+X^4?JuV}AvCdZSZ~Zw9{S`$R%}D-`ZLL93np z8D^0-%gpM?<;_qQCk1(i{d9XJJ^T9x7p753wk+R`3Ceo?a*ha(9q|i5+y$1`nGJTApWwlOGT6 z8EnSvgj*RgUqRRuPaM9Me-+2$Nm|GfRl4D$c^B|Jam>SvBNYcLVuiNE)CT;S5Zcll zBzr#j75`_>G=Wz&ul#18hA=Gki0IoH3jbX+O?ErggA`cj;qJtmhm@^W(E&)b=)N;gKCjZXF<+V8Uzbmn|0r1Q}rTeEe$uX}s4@aH%w~ z#}*Xu{tFLJ?=H9Hy#w5Zx#(8)$A+r~`yv~JNJsx?Y0 zf|`>5Y07XYOgOs*XeG?0p?{1(=jTaqdMF7>JUC7cqL#$zNuIJtE@7ZaU!qQB`*d30 z6he7K93IepbG?%uvL7~X*NZXc(#7mUXN%pTT|&$BpmxHyJL##`5ULR2XB4awmIoNDC`mNj!em*@RBY{}S+{v^0@o^^3p6g5)Br@&2 zx=xpuT{XcR1*~7HptN&F8+8C)-d#oL+sogi>YF7P!hbc5P^0kHZeE;%+@73aOEnkw z>t|}#J`YWgyQ!DzX2s=fbh@^ZEK7*gN%hwT#Jdf&NY~W0?Y;KoD7ypc*IjA(spCd| ze^pyc?&LwSK0d&8`kmp!RC#bo)T!6&W)Bk5%EjE;c)a&<>j>A)6Qb^ ziOWwsE4{dXOPX`;f2|ed-&*bz=I^SDZ{AQ}G*g~Qiv203D*F6%c(cdK{>XKn>tb*! z))Zf9CU5HIc7E|sinCwoI4|1| zhOK#HCqtvVkp1TCsZO0psXMJ1saaNEtb3CWtDPK*IJ^0r!k>>;g@Sz!vV0$$epXfe z<`Z2%!39h(D68PY+*p{q^&Q-1BFD}rQC5A9*HypHCs7ZwPYsZd6BzvZM8H`KMciAoHBLfN#h<$n{Jq1|yzzKR7CToY=ThWEou*oZsO?i$sJ( zPSW5s$+U8MbmzizoB6jHy@7aK5@mEC&wz{sSwksNUu#tKm}_+7gjvf|8JX-)B;sr$ z*Rg{k0gDsjWQdp&UCuiN^@zg#^ihMblj^Tpzn<*Hu1G!gakt!I^-KvOvTm|=`uLo_PM`YY z;{5=GhAn*E62KD;fnnFV3C6QbwT%JCv$^p#qLT0gI7DBav`r*MPb} zzTaqJwb!pE=mr?9mWyUzpjOP)>NgX60mzyVZL^JEaYo9)O-sGrj8B(rp}BPU$USEX zy0F7}P=j_pIBFppf{qqMQU)e4m<51(XM!vBq51L#(qoGQk^u$fK@Pl4?l7X?bz-Oq zIxzivW?wXeDX_sfyoK6<7p9*LDU5V@%rPd{pR|WI+H^PwA-_FKLCRs~Swm2o!T6`+ zzg^J;mLY!_%@xybH)3qtE;&6~rs053;+?fg*6XiXwn6o>AFnbQ65=@zBw}6w0y;!!oGn z@j!msSPe;18Da>9l5<&M3S8+pK3&bXk&WVp6e81~?zra2MQPT=R zl=DjP1e{Z}M(|S?#NzBJA*)EKoUvi%!2PcBDZ*6%TrD#N%NPI;c0`F?D3VjM1^P0? z=$|)dXqN3C5Wbe1z(rmaMr8hMHJO-Uo8rmRzD=Ka)tmCW?>(zrrA|DIS8)L&!R6^* zeVxZE@!bT)vRAEY1!UcI^JOkv{xEuD`oO7bP$`vMU&CIdg3{TtCn1!e;F$@OOsTM& z97GEHt;4J(LgUrGmgg&#Potw3>3g66oe9KjVm35NTC>J z+X2Jiawb6;OIbihT7xE(NH_dCHbmo!p3JFM!O^Hs&f9KPcXur^gMIRi)1o5_9sR-T zCO4*n98eGhjTu+}3)Y0L6hWF=(Bd(plC>Q*NKuLKH1r^q!Nms=D?`~zFlLBjA9W~4 zpk%`;w)BlJn|*|$fghql5-djc4=zbFpJAYkqJqm0*qeGcXor6sP;`9W`k(G9aZ_E{H55t@p2D1r5mw zn#7l&8f{YWC9QZ$6p9Azug66$$DyTknn}`H$Ywf$e0ov({VwPe*c*6j@!Jom5cmYu z$qEgW2@HY{aBXPggaRtcj&J1roM8s%f_UyQA@#}D8IsoV2Iu%JsRl)cgtw+c7Uu+k z*+J-*oL0*+S64Btg0}V-RDu@QFWBsU*dXXRvhyAmLEhG2{^skSp$zu=P;t$TKUblT zm$7rl2Fy2SS`#0u1<@QRTmSOVp`hH$4ly=PuBw(dUdNHu4&Lw~aW@b;J-Ta7xlmLI z1yH}3?ndURUXP;&*_a0*i0pJ0&^law=XplohSjQqRpWLu^&=jSU(Bxi1@*N5ZWdG& zY>wGO33qOa^kTJ23d#K(zB?%lGKTWw9csRf=#C9^RD&AN7cMWnuiCIEb~VL4mrJhn zDcR;`gJdk z1apcpTp(V(o-ZxAJ{>^~&AOzLj>8fECQ>%I_an!8aa)p(JYB^#=h_aQDx7%>%P0r3 zyGtoVT09)msaPdBI6}`8a*z=LXr+3SwROf9(GE`IB{OA2t$%zi;P9JSudN9!8{851 zlf-VFvUY1b30ABoKjW!KQ&Oc+YECY>GZq$mKQBPAAcEdh^p zx{b>`+qX#nD~i$l4|#_SH>o~jsPawb-8ULC5XG*spOtZPzo6cj`djQ|~k9 zh*`50dpL+=Jbi~W{G$;c!JSAVew??}Ss0CKVsq4|dAq56!2@8%1mD~lFWq#SQ18TT zcbOSx$lkJ@yCaPYsz;QL<|?#%62tNWLDDux+I)WhMk$S1efh!T%d2tlA7+Nkc0 z*5CnX_P^ogXZOVBkLEUZT3`#)2_BME5bGP5V)Y&)<>%!`$)n|rsMZg!h1PMjwvR*P zh!vASPvV4Gk>xftxHnrzRS95aUm~yf;|x=;9$2fpU;bRdk;-X+Jig`L4Ho)9+oZk6 z9eu2cWBMhxSY&m|OTm36-V(E7aex>1^bGh)&%dc#KlBK>a&1QB#V%9o(6;M(7^orj z@XW~_TUeDB`+c2uzQJF*l!=`3E?0#ai9UJX%B$foChh$w69h9xkbHfSfvI-hHC~9# z7>_(6mDz>YS?6=8E>*A?&KhKL$b!kB6D@EkI4B$J%;Nv4%@1H8a(|Q_m@PV-Cg(#c z2MFyt@WULRnG}s`W=*pA9w76${FIRBw#Ui{Yty|fQUq}l0tSm*Hblg677Qj%;UAqS^T6%UY$gCR6bk0#r#jgDP$?hi5(P2paUY6f`06Hv3Ej; zO$%?-;Kw=5ud3zP+WOFCk28q%(*2#-E4;ETXY_N+Tx%)suj9m~;|VSgKO-#Z9+=4L z4yi|w8?EiFP*gSK(INO}I$*E^p-aNSg|zt#LJom!V&yEds`Rrs&;}XWw2B zSqQ@QybcA{z}3Uo208CCJ)~VUiM7*BAgYD1kK9+=o)4^E7O^*tSorzGHbbiuf|SNO)rUm9!^?(^ta z%i~R~Rel_J(-G@oD#OPYvb2k8`aVjd7cW1cno<-T?^^v7xj7@1`8UXL$>?8o@^J22 z08UuRZjzM8$~CHf4W~)#`b3BfF1aWs*-*& z5F!)Tnnw^v+Tc!B=Y?ihlnQ9F5d3Gi60IMfr!bI*viByC(9tr_{3WNVIQ~ip8Bk^k zQw2*hn3orw%X2o2QO68Tcat_66-9sfPjAXDFV;SMt?AGS?ou$HDi!Ujqob$!*5Y}IGJ^>I%bpvZ(sxp2wq&Z?# z-MYLHrFO;iodh4HbwSXcqU^;QW@fm)k*_asW5wSoh#xHW;r6ot6#Qefkddh8Ze;Zu zu_AA|zT2N0A{Jp~)Z4)HaKP={B7ZOPL#yW^5gi)lU3U4$-oH@O13hBZSQxY#YN&~>`xay#Cdz16^PY7==svc!(#5=idr-%P5_&9>`FwtTqCee@g z1PXRnkshm2IkuLXe?i1u5jsICEM-m@-%@Lgho*|4{gBCJ(~8Uvm4hw`E8m|K9Ta~T z-upy?CCm7w7rNX#irexBl2XdnI-Ig%GHk>#DRa^+`-F(SscX3(BXqFw2fEh5I7YjX zvDm}C8I=_25AfZMXNI?tr(g9K$nmsVZ*rv{WCtVof1q@5{(!}q2xHAe}+v+8Gl|8*)-3A zhqX?G?|uFS{+n#0cRZWKy5gR864wt6xN7qOwhU|2vsf8TdpuR^&&xN@`PYNXMu=*; z^_!cBRljyUNd%nJ3v^cC`K5S49ZoZy=Bx(`0oSIt%1y6?qAKYHR_At46cdstX?3o` z=uz%@Jt3I{*XUU9yJFPWlPRM6mjVd+Au=ZR0OXpdV-GV6uHSCCz4Uug$_=MHZRSgc z1J}0^<)Em^OawGc-LSA=>R1##qRd|yp%Y0xU~6}Qv3_8>2-8+bRSnDppa7q6D_#}0 zCjK5V{b}ADBHcD933}d?D*f2T1>p6+eJ79tEtF(cygcdjV7K%f61b^Hts)aKi5}Fm zP193xH)HcRT_dxf^00x+HKFOB7OSiR=;p~qjE0*ZdzStkp^gzRmCNr3yI5t4~n^R()NQLD3>xw|a z8|2|WNU^&a2FOQbx^6K@Rfo%3^dLRb4l&ssH07X{-IBeO)e_=hn^fNR*WWZi}jB-@tx41<2swUI##8_9$8+4t(G0GsTI5<6hkNtqk&|>rvS0UxSTe|x zUcS*?d5{QRDoSh^dfDj?w|=lUP>%(PZCGMD&&PO5bnN)9c~xzK+$kB+KvgE zgKF}2pgrt<@Dc_gTiWrO{cCaNrept4;d+@H4oqnA&(>Oqr-33~#*6@Rl1|2qH z5|s!*dxJt-$@Y@*Z@Fh;gLhZr%&0b3Z`KkctTj=%H`SBtRhBgUY7()iW=AGSIciAme%e{o6aR;-Y%X$TT0+ z3PP%LNp07EO;1Xm_tnz>n3{V)~$d!;U!l%iNgun}IT-#GO4+*T20XxX21S$| ze-IdU#$rDFzA7Q-_Fq)-(hr@Pq+%SH335N&{?Q?FI!axKkMcmt@&}=E-ZHD#Uk4Ps zqnpT7)*~U8V2Jh{EVM~jj4IiU3k*F<;7>1t0M&>zU)85L_Ca*1df32$Z4R`>naIftXtFqxFm+zFt%CZ zz(GObb$XU7e?oglxYKr0HaSPBg|o@w$LocF+NpffWEt2-N~Bu|7TGEN@e(OLSlej~ zbFjbnl@Hthg!c82<5z#IcKqCMPN^u7h`E`0G5=yAjz|jh*{1zCIYp*n>+_^bY#Ux8 z%&85YGwloKHIxAIV;SDa14s@@u+6L4%=(C{ZC3Y%1vfe^Z+sRq183*v&jcbMFtV%K z7o=$o-4Wp3J^v@^EHW!ZrX&^<6uWIvGZZ$4&F#)`nE6(!Pb22#mL!y7UozLG#geAe zo`%yYP*3}A5E#0W@m;(8Z-fnYRqThzi-b<&8LXK~g%)@NoXh>3jT;gIiiY?Hc(-LU+)nu}SLe0te;uJ^ULNtM2Wri z-KqAoZyJRv8MHcNmnZ)LuEd^NP;ZXEjRlLqfe8$tspVWG6j`)_Zs7>`YU1xK;vbw- z=Q=ysrlbfK&W>BWN&Sv`Xdz0VQR!Gy-IX?L?d5+D*l5B0XfM8>!|aRkU!@9+fMgRBDaN8N_&3!vtrJott+dBq<3q#5=OB0Ayy=`q~2g%vHDn?H3hIytj+GCR4-ihoFowe)25Zk1vFF5J%| zLg_<=6L%9<%zyh_8F6{1Jj|DB;9&+c+om^{h^csBL_A2J62L2-I<9c2i14SpayRn& zeB7s0Fiz{eJBtU=n9CW8HSPxnoBTu~-#3b@+?-tpo{6_gG2a18D@3}Qd%X`m)B6$b z-}e^wANbljrqslQJ_D*u(t2YiO&ElDzyPx}wvlvO2V&1*>as-O-bCf_enmOdA8U>d z{FbOjKD@1Y%0BD#d@hL$es#r;meDM>c~M_b(L+k2V=hg%T_wiz(gMCJI|?xaD$Z04 zMvn2n0o`}>?ce9CN%l&#b87Dm7vrdUrc>W>twAEka1rWm#iW0%)W{BnVsA@Rs&3p) zteO_pHC5OiC6vEG84bVy zVw7yuz5h8X$_E!2NxEkeEH+Ss*&ljh=6Xw#1E_!g^r3q>c%8Gj_7^Px% zTGah{67F<;%)sopD}A0Kv!q8Nz2HZo`p@#EVg&fEa4uuI^mjE><9F@la8F{nqBQ|4 zPfu-5Nez8uf zHQvU3Ct+ytC+#clP0ig*MUrMhy-(fDjMa;k`p{YMfcC1kvMF)IPJkH^_p@DD@jcj5 z)4yNwoVTEb0srMQ2XAmUGYQX=;wr_K6Qrf^JfTj09c@%JY~qCCmAZp z)g{D~D9u>KeQ!iG_O`HSV2#KT2A=40=Jo?@O*fPt4L?>v*7w#wA~bABs$hGovz!cH zn~LtwkMw)J7)sVx+!jV?0Zp0ByR5C>Zko-ecx>Cy3s#zmmjC_2ZE{vFg2C~$MPMlL z(MIV}$*|e$f&RwQ)G(X+mgS=TiM;995pO0inCUe`g<4Ucrl<$;?No<}Z7suf&9M?8 zjgcnp*{mnkw|_(k`=O_f0Rc#TBej@2E_Z7I}O-d8MYl!gGGY7o|N&E4$9O~jOf&KMu@+{Y+Ga7>i=Abxp9(@u=Q*NDJj zF^b@U93m?Q3%tS7yC)@4nPpc*rY7MgnmVj@1Fa&2+|5b<_c3Q^I=Z2s6TCfQEY($~ z#*3yLQ5ott7WHzdpXNZ!UGCr&R;^cC#6u}noRXp|UTL-?=w17j7YKmk->|3k`A}OWr^pE0XjG{Fa8>4^293L89Rj+kE zWEXOif>)63&l#@y0lu0DL;!U9WaED<@Iw1+p7h(8fEVu<#rPa)%9Lhwpsx={GstS= zmoS{ksc6-+9K@^-2N0v`$#eeG$sJO&rBLNgaX5&kO5vKDuoPp5bg#xDO^#*`E zf?jiCr>0^4pk+%qD>pSlg+`Xux=6hAN2d(8eraQ^8 zU&Tv%E6S7(4pW2gJ)s`vyK-}qgb+MGNlB^&oUWIbeLB!Vk;*q8oMwDqs_5RfID<6< z{=Ei`Ma*Z|-@BX#GJ4Q{gR|sXE3Z;`N@kVJs@Sw#;JNu=@wUt%m!gg9avF$ZKnbgL zvKzg{R=%I*I@$#(*%fsmri{{s^+c>W-J>)tk0v2YRejz&`vb}68>L`-X6GT{IUC;7 zd}e@zU?=c61SA-0?X;8qjbX^ZzRBR{T7NBAChU8hpxt0GcvJy@0b-KW@LDYInXGM_ zCaw{bJqyMs@;+y@E~gep+j62*>_>{2{5m*Nyju^(gApElICRv5_@|2=(+F)}RNHpt zYiT@-+gM4y`ltnLlhk^-G=omfKOUFeZgYd-=P|B(-7Hz=INNv?df2r$rT`@!cNM{U z>)+!Rd(48x^ZPKEfG2eqmOpl(yE=---zq#((BuncvU5(Uf#Z z=*)}heGFcSgo?nK<@0(zhF_A{kg5$j&|5tudh()HpKKS|L}{6~coxwPgeB~NrZaJ_ zR&ZqbDGjW0%bPg@R5~K7ck&SIuX*>sFm4`d3alYO>P+-KwBN(J3&KPP`T7ejj`cz& z)+Gaea&8ZeUX@_=g{=&R=dL9aGN{CKyuK z|0-AhD)-bS0Dsd;Y;3cG&k(1#rP~^zW@ZF}$Ta*bq+1zjQVy&TWhr;Y2UqzrI!-a+ zKs)tq`)_L!ermxZ+2%QxCfJX#ji!)umMCUG%)L>djSgKfhg;-Q|W-$0wltE{?o2s=p!=4?SkpbHx+l6Evb~dbjbNT1}xrQCPj=>C; zdH@;e`i9Y67su>~l{I9ev&N>{4&qo-m?`7q&W73!!niBm*Tg>_0ESBikyisZuom%k z?lRctFSbN;QZ&Vu2kJ4xY8>Dd*HKFdPWXP*nm4%@8%%}+5x+Vwplf+w%a~d9KWx2K zR9sEhwH*kq!Civ8gy8N3ClEq6?(WvO1-Ibt7NmhdUk-QC^4zMpseXaCtg+*P~A zuBx@>yk>WzU&|+;kS<*heGRE09;#)y)vF7qT@m-L*aerQl^c-2ZHvU4?z7{alS^i2 z%!Km3RJm+OfPkgo<73h~P=C%krPQKF`Dh16h65{iTE0-o-hm{xPy4>W3n;ux)yY0^ zO&xjZAUZs5%mnlb-ga|!m~*y{wSb(H2D_br*s}T!b!M?|6u|+K=0MA@xOP8;n+7&7 zHG`i}puzl4h2($r zNP)yfOSRGKYpy8QNakK<`uB!ps>SZA;i2>P-GbYtxvTU&KYTMxg{=_tFlP#3ThhE6 zs}+-#u?TgwLc4-T7WDxXUp!4NhrguMq^ND+jNB0-gt8en244a_xI|U<2C#x;Vt5_? zsn#EUSi#=aU_x_$oXN$;cZukmoDL?`<{)6p0*I1&)Ey^>kO)bZx|E_xETka!kCW0u z&d0G(!Jv`lgpHi9n8r*bTIUtc^_T>8j9fpuoD}F-4cA5G=Mf<3yhf7O^n8!zwcKT;C;=)>l-d9j?`;Lw;!02Fc^ph)Td~w646bp#yk`WeiHWj zNPbKfd&zz5;B~LDvcv_yy>B}(l28`cVaDFCS=GrJ^v952CuxsN#F*P?zoM(SHpj^5 zmTqOOg_QcZ{&Sr#vgbbQz~Cd|g=ep#rYBlAzFlAAR`7*9Abk1RjM92mz=REmcn&E7 znSH0NJ7(%-T?$AU(9{wXs5|oMv9PQVj_Q>r;ViWiUh?Rt^m%hD90i7Kakos-Cy{+G z;i&E^Q^P3BA2kDa4IceCvA~kk_xeC&jX?!AM9t3pg4u9CDm@&3y5j|(Owkc`_H8z5 zqJN$d_3RRr^SV=ddqW_grlZJ<1qDO5Q(K*j)A9^|WwqpYr&iF^tTlfWiu6w4ZK{Ah z^RRoitO5S+bPE#lh+D3~rog{b{_vJ(v+dbbTBM?2{5lKFY+^2Sl^7KWF?LC_Tu9Jm?{d1|c<{&v;2=W@TD;!~6f)Hdb(lyoa|LNqopPRRRzVUXDO)F52GIW4wr{?7z8v-XPbEfp1Ys z9XGxl8u0lTp$fUAJoZ7?qaX~$>Kpm3+7fl!iiLSQE)BOV{x1-GkluuyRPMID5F81j zx8d;~=26E`;Pkx{Sm|^Vth4)AqelIn`uTnzc5vX^pspoR(szt0E2%uS#uN`v67R; zN2V>SY!o5aX?Y%C+x@;hhzlHeDlt4q)HiqA6@KBeo@qRM+!%6`0UkZC^XHCTJA>Hl^mI~T{?xA_ygPSEH2M|d9 z>tHXhdAH{!<^MhmN}n`ez+{tTe?0%k-y5_mm)U~eLEfbXZl3||Y_&ZsCcZoMvMhw{ zFIMh;^qipY=u=SNJ>sIUEizaz8*8nNs!6UsrznDM@MFSLHUv-BXHzE+mvXX8TdaiI zwE=UsLUzYl(M9HdkyCi(YSp(i-{(oYd)jb5Wqu)H#>kYhm=%z!5JHJn1(2Prz=ceo z?tfBmK-k1xt0^jwQD!v9sx{u#6@coTG-%_NTsX z3m&O{Ph8uFOb}mTa0p5v`&vM6*{qETB34fbx95^KFu4?zEO{N0K)~_Gg?|`{lBj$w zbXRz98$TEhc&mQIoBLzH!i04>Xz+?w%j1CMsaSI(+|V+$_Sk2IR1sbIc%+XDmaM15 zSWN9>vi=KfmQ0@!mxo(MYA_5DH{5bi*dLQOmK^5+xqme{HzNiGxzd&%ykuBhbH=PB zS}pF>ib0VXP2CU92SSX(Yjk=jw+yNFZNmON(XLNRk>JqwNQR6&W~7H`Kh zmHcA|nj>?d%@Ei+FO^)CHwj!j!AK(OhJ3SYJy0=AA1mp1dx6)_dgMKEh+sYQ7`{D< zcO>0z`M(<%rZ-CE{Vg~OsvXa`C#96EFw&6U7LR`u)1s|wXDzk+jPWOFphPEeLT%JqBF4>F$F0idGIOGYR-3* z9#1+@ja3Ne%zVCWiq@#GClSmy4Gvw4$L78Qqjl*UrAjgG<)g$j=F8qNCze$oax!Y> zzX6XOeCa*fG4Bx5=4^ItFox;6g}G`*uJmPmQeX4;Wa|GMjNX`lQr;#b1JTK$t*#Jt zL$+5O?W-Ko-SClloEBTaKe;PiopK{N|P(K_crg8 z+Ob(vdBZpChV&t2HIUz3$#zZ6tbUEqq!0~VepVR}mNd(^yOoI=q88D4APapAKls@m zJZy*Ov|ri15iw>V9qBoHRsf=Q5;>#L8&~UPVae}X=eA|*|G|=*bDH3guJkbd z=CG%JG9L@t20+^;eebC9v27R|Ru4 zc=rdHdwi7SzNq+r&0cdS407`EE5x02k9;Vt#6G%c%YzPkn|VIhX^b5A69+k2ek@Vx zALD_?S%bhIB{V|(h6q=@WHKG85-fWc3${We?{DgjC9_s=hbGv+yO_>3osx(O);t9e`?V;7W_V!Em3JZ#5_9xt_P)#^irwaCh@ zOyLUIu_2GXttLlWE#D1NAhhLgw5T?^20^WgV(#`*N3o16*%D@|tg)rvz*mnJb9-4y zLv<7tblI)vI-vOR3yi2jO+!UtTF$#&hZKXcmK7E#e7;S~F! zwsx%%pJcJ%ftKw4WwOnN#EO8eV0sy|Aq=|c2<3O(;9!VQ0m|sc#;TBQ+`vB!&dDbs zvP&*PlUyGo)5gJF;Rgczn6nvoUDV#h-}ld@&ml}J1f)Sn=q;c47_mm&$h$TIrCZk{ zV~m}vA1>e_=CXAUDIBLJCU!m)cF4|`pmP_SgxFPgI^(U@1j1BNvO`o&Ly1k6l~d02 zg8JJ*J+DudPi~vpVI{IjhFx6>ATJ4geA1_|*UvcN3ikzmcS0{^=CFI;^ICaJ;ZTt! zpu@Pls3y{Cdj61Xw`JjkEt{eeO6_@xMXYYkVgKqj-1-TFjJ~Grw96i0zlYbDvj%^f zN`6*NQrs}gmMl8##$2h9BhP>Iqm(ztn8$l0@HJq(Y&d=~Fj=iQOv5UISzvY9!<`v>gliDhSSN%6`ntJ`ms$2Pq zl7GWmAm_Jb1nU%mL(f>FAL(sVgC*V+Yd4WnH0GNLV2 zqY0&*bEb66TFq$#2W=SK12ueq0@lXi5eKoRv`g`T#YRXr|H){zwp@RL=N z|(szSTrhq_GE00|-^ zxkn$AlG~#Kt|D$yh+_76jpqu6x`nd6CX;z$!GzA~mhdSuW=F54_{RE=&JLE;J>Om6 z?)gLx@1vvRLM9#nX=DM`Y`k)`NI&UECC=S%BVgAei5%KPXZU zQtVgzAROEA>qP>h>=v&r7wu$DUW7qj!-_0|AcT+3#86NS5nS<{@iBoP-5_4UFR?q# zEhku8KKXj`T~#k?yF_c{2BaG{y~rlS@qElKqprWP4A*I?weLdfyHq9uN!R(egnCW* zw=K$fDpss_Z<|#Ii8ZOaCT)$Fb-KLE>1)Ts{w(YvS(gpW7YL^M^0Ep6gftL~I6WyHA+gZYnEBuvZ zo+#HBbZ5({c0vIhH+$vJ7iVHRtH9nGuqn4quL*FleEbDpe5h8rhOFWTkEy^~9I z`l}mxnLAluk54%D*Xa}C{5U>8YHWV&Z+l4UCC)DU2PPxC>oa9l;-@jSNZ;6GIw}Bz zCDR804opEdzktf{nZ>*DJg+^{3PD$_S3t*VO|n7%S^~&Pk)Mf|T!I5n_dOm#h_^lJ zl@`IaWzPs7PpRVspuv>#CyZw+&CxW~c}KGT@OunL-3~jvz^fL;9Z*ltCu4)w`tcMb_0L9}hm}x)0EjMf2{PUK zdZUmQ5{md~NBD}5RHf)v^Bd})^g!l*VF;BTVH~QtkBOQw>hy136qVRf)1d6|`|dJ_ zb2092hE^qJ20n1Iq|n}OT8|U%c4;0^I4(p`=EoMfmHQZ@D@sOxh-!==B3{1kJ=E+_ z(j(|5u!KDNdRz2UGM}(@)S+#L$)az1$(-8H>E$Z~{hNgKyPVKSUW4`TWYeO~Aud>Z z?A&H-3;k@>h>XC5%ZEl3$ma?7`>|e0Ny~2_ldT`XOPEVMkhK)g*-?hVZvTrwud(8y z{OGa|Ecui)$chFp-W)eOQ^Rhn;ZzNY9b>=;nJE@+TX6WqaClc319Jr5o(}0eWVel> zm6Hy&3kRqA_=L9gYx8gXPoZOswHp~4sPlSwd!X~*3)qdJDcif3yL*xeLG~4o7B{3b zEw$Qo(gAQRak>$Usro&-oJ>q3bQgc zv3q-h7(LbAs+8ICj7)>}Rqxl%AP<0_y!Xmn*OuV6x=eQTQ?K3aKD9o$PqSWp*~HpX z0F`})KZLwDtWsiEF0c<@AsF(3#;O=l^<%%i4DQy@<|9&g2`pyDkeUkiar)-7#?;bK z-!>`o_%N05yMmff*T-B=!&yfP@t^D)Kqu?qCVy#6}fn-kPrS!Z)}pNPJp$ zqp!b2^fb@=d51k}m~j`)+Ov!U5MjS#e5Z1W$dobuv+ys-n;ez*CEjW>E#htOZDvC( z@}FQmO6;9V536Dcsw^S-Uv7&TCFU@TqWD;^FfN#HTvN1V__33zf3G9V)~mRElzmpc z(M{`bVZK49opf(p_2%PU>D{S#mqnDSJk#R z_ts#0P>eRN9odA>nQ{a7s3?;X99UyfzEgke%OI6WwiSSa@EizpO@TFk_(|i>H6rOr z5;VmRtp98|$=SXnrz1POl?Cvi!{03L-2c1CWsmZ%G(5!XC{|SHxY94%6QBmi-fp4{xp3V9=xCd5M_hxr)fl=eh3Wz+)NB@ z|C8=bR5HZQI#T57mmI@M8e%K4l>SQk6l)^Xo*-0OO?uO}5c<+|`BOw!P-^ortcj4* zT5yH0mu=Z2y{C=TB~O|xUNaVp_WF0D0ghc_{^U;&COjM!^jP%W2z_9WaXMoOV>#f* z)L`wf`Cd0bbLhuJ`iSmr-a|9NI~}XYj9}jsqQWcuJ>E4!g*`rx9+FEqi%yyZo`$ixD-tb7$ zR>hxTjfP@IAGEH4U&JiZ8w=8Gle61uY8w3)gZJ~xj2A^e`ZVG#+JYCC?e6ZlxqWDX z%G(#<_18aZw03gjOf4W)a;hT6#c%aW6H!q_;}?UiE>(BdTU;vCg2j36DAeS=4JHLO zL-&xi<2QY!#2Hah*<+Psj@)0PScD&4b>%M#_K>2!;#ru_HP^(~nSnE04coa`@t!|m zqy<53fcx=t=bWskdw(lwXO{$&qz?cwFgRJeRq%TPfjf_CqZ5(Ix%P1DYN|iC)PIMt z!_sW0t@2?vd(6dOJd7gMJ+>5^{|tU!^4YH4+jLnqg69@~Pj+8#e6O!oy1C^52K_+(ve?&-f;@R;r4U?(TKl0>+)_pK~mL$-|*;K%klJD zDZqJN={aY#V0Hs`vdqWNE}v;2e0!d@%HK0g4{dvD_GnD*M)K#|LSf3KmF=OUq&W4$ z-B^s9Ll>W0wH@2?krWv#WvrsJVpPOAY+EXtQ?{N7PnNk7`SVK%cjN3WnAG;bhUe;{ z4pOPya@f9DYyZ#w`dH?Bs{OB)7#CJCYgzR*<=k%y-y>H}N5_dZNkd_l>dUf>$9)|U zXu#ni5SdiD_edbE;oz2zl9yz#Pc&rBL}VLBJ82crCN|eRo9Hz41mHFS;M$P_ z9De0Ban@?-XjUm}Qy!p1)gdent}%eiuOL(GQUB~s7)sBrj8T?jc-mdUYhc%1;i-yN z;UJ_$BN9mp6C0Law+3V9?&}H9&E@7{A?X4RxwFRe+!&QW7ZvqYm%B6E_!#9&r5&GU zfKDa&x0$k*(2Z}8d?~Mq4li5lFyK*pqk&<1+Xo!kkCrKrB`KLuo7`Ar_p&D4Zk(-6KB^4udIf$%#P%Z@;;PoStO;O>Zo5jW8fm%jQ zeMa*3tF@dhOYEbCx&pTBpCz*4yRvi605~1is;6}6SFU2~8VgfSs|mL-HxB7-gmsXG zN)ra1x2F~sIpH8i#p`STm)$xqnrx!HSV4G;?G%5uA?8o1ZP10Be_Q^TZV>p_9VMGE z9{wF#s~Xe^Sbo|oz=Il}E%5B(V?T~LKbmcf>%oJJk6a)a(>w|=U@`HHc$=(xj=7Ut zI|fmnZ+|T!r2OR-{xJwMH(E_JRz@2~$>hF9q@RJWb0e%{tl~&#FCLF^#XilAx7qJl z7U-jt##(rOGd~81KK&5}$cn@2mOIncMJ8|S3nE+0+VcleQ6SiSbCNGSJ;;X+9_=uF z&%%`7mEQkua_xZzavR0@+_lPuZ?qoT(X$XiR^7@O(p`Y35PA1=b=%=^q{G0Zj|Wmx zBv|N;j6HnJX@3rYoR$@oZ5teNz%)hj=9~5Cp~*2ycFk>riv3XDZuH-yIn!pVTY2Mz zq^Ydm@H5}G{kDofLEC~F>@+G+4d*A#PBmI=KH%0ffmA;#f#5Hw)(u#2MCt_D%snK= zDK0J0L9eG8q96H}6=FB{$N}Ic9xt6*_PBTo71VyA!a@fPe zxWmTd+jXb0zeVN2Zp6R^y3-Z(gz1b5y#%;E2D3A_Y-`Z4iu!j}xK_6cp>c%Es z@wptLj;{J3;Kyn~&a-2b%td;Vo&9>j;yV*iprubOI7zCL)4AQuTy~`O{kxoY4p_Dd zm*;FE*$-wGRs0$;MPKu8X6GPt5^;k-N--r|Giz|e6nhYoLw{UsCUI%o9|~SrTe(t8 z?RgxFr26`19;j@Mwo0vZjWH_Qhih#j9x77X)f?|)F=sR=vhWDYPQel@fRdjuS?6z| zphg!Veg=vm=X&GshO9Mv6=FM4v(?TD!RBjbqf3sY+t+4Y;v+1uMDxOUrIBv=M!UXI z<$6KAuIJlLU8M}m-q`TgF&n{u`z{pHf@+dl)S9lT&XE6BVtqB&ftRBmiDmXcnG`BI z$nbtQ3d1wkw7mFv4eUQJuF&A>D7#k@E8m}s4VoLHo%1TE{amg|R%wYM9^KAanRaYD zIwI2{W(C*qff2Z7-JWwg1c4!DoA){rJ5^f$Sh#}Dz893aWK$5&dpcot`gZc4k14NQ z6QP>QrQ7PaNTr-$QhL>VU-_M3HyW^VBD#|dW-7Jr*e8lPJ5q_B&EUDK;NjLF~7#U^86jPqc5@YSLpLotG?U298jy>mWHDP%m>HB=* zy&2`IT&sX8dsj}@FK7S#FEIe>rkNSwsQoIn*CzB%4+yBAQg5q=7g=EcSQRzam0&z< z0ai9|BzhRTpn7SBnnq4CK6c!|Bgtondp*&_$H6r^{Mp(`3YJC0+v>uC*o|@U5!g2G zrm=>*wI6~^97N7e^*`{(``Q^HLyguE^G0S}+`kO#dWs$O2GHWFwyOvJ?=3i>(4T3e zug)HG+eSO$di$(I=O<@NPbI8&QRhmZ(B(r(b+v_zHjX&cKFAxKWTGjAslDkLmD(OMu_6-W>-J%prvv$svM-K9`6VD+b!GWTJG z8c|+QH@7Gz_Tk3G0t@{xatZu-ruC6Sv5yhebc~5X39B)kG4gug?-F^ zh!8oVdA*GaFeHi|Q}k)Fs1%t?7%La-1*>y8O=^%Kcb>ks{6C;j?0@?-f)okNEKB*9 zH-zcj+7(x+zpmz*cGQ$suV&j^Stle{LXV(vI6KE^XfdY&U0SfnHheuzliqF0LxP7!Al0hv`Ps?k%O7h1P zyXCZ2!`u3C$~)r9pNelEA0x;AQ?Q3s?%>D3HjixW#S}b5WJgg$LW%g zRA}2fS9rt`Y-iG`hKgJ1R(e+gF@M=O0gWH5U1W@Dg9+G~3dT97ft%jegtdC}p3N1= z1>D_xK4pv@T<}K+DJI>326|@w(@gcWokZ<{U+N-e?mGA$hWsy##?&N33}c{H_q*Ds z0}YWFn9C6N+HXCBa)noi9Bp3{>VNdp*xndusoND<*3)s3z1wUP>I|TyjZx|*wb#q? zRtnRd1Fg(&Wy=MAuK<*{|HzWaRcIH0Z?l!B$2)A)HDzZD=6Dhi1^0{xJk`mTx!RY4 zO$@-Iac(!0Q-Q=hqPCq=%U)7 znrnW9q8@&Za59=uvG`%-ss}hY*P0C-zQ0^8*hr-CU(n2}Fz_|{Z)zv!c!x=8ECgzE zK2Vb>`@+Gx(%HV7zS+Lu$iX)0G*;Ix!Q&(bMsDOgk4BvbI~AvylLiUmn7BY{7PDk7 zoXpnd#;a<_21|Ip!F>blbTTpov~spl28zI&%C39e&b$r60~hdL8V&o{d%(sH)7{3 zMXo4UfWgEYrnOT)RLHCgaD{b%ko0{{U{IY>2T4|cc=kk)d zm7p^E_+d+B&m?RMo00$fpcw*_oP==b9~ha(|(SJ|G(*hCN;%WA}TrChYRp&;Gw;P%}NDn~X13vP!F(!=kH6&X%l zN_35;+|m~96{@=q#d67#YSLP)zM3bZClxIHCYyIM+#xhJp2~G^Em$rzzP&5sQXt5 zH8S~e>f%gJ4?AD|49yKD{$v-@i(h2~EmISEXk!$ZPk)V?$cZT%lf67{KZ(jRUPNB_ zW?{O3IFkRZm|G(Ehxz@KL-Jv@v$jw?k{jI52?sZaeriyY)!;!=4E>X|LHB5q1&$nQ zWbXVpJuwEvlLeB?A_C_X8*Z^`DipFmCMhR@e(suXjm^pqYeEom8$pewm|A?J1PwP+e+d6+U-T{aE}Zv+;W>Gb-r?`vxy%|D?;~qF8>~Gn zuEzl`Fy;sS`ye0O=Ly0<3b0o!ALKq=N+Dh|4L8!9$|Lp{wMPx_<1Zrk>Fl{|>4Ey^ z!7ub-GgJ-LnHU;Wl`nPI)6cjoC;Z5^Lezw@mRP?}gtsR{B1YGOc99JETN5^>`O`gm z)h%&<^9Fiy;Kk0H2pw=^pvL(AqL;yL6j0og3yg>z9-HMtyR%a#jF~__;`NN_7R-Zh z1k=OJvXa{hV^1c_%S7}`q%|W9nHDX z4%#g|fsaZa=hPsdnxoziLW-A9@qi@f-^hg&c;W7mxBEBHC2h`PS%Sp8e^<@L$I%~u z??5}>;=%))K$8S|{K4cG67xL2et|*4CaGl zFBUG0;LKRWR|4zg05v#Om|#P~VH!#VdzG<)8#026-UA{z{dTfg%;7+b_)R|p#*t7|A^7p0jLA_Tb$M2(SJY4YTCmC^BGeekKh z)cGew!?GTp`Dp$3Y>UFtt4h%&EIS~T-`X`LiHPmRLM}cwCr>Ea4}W^Cgee#9G*Z%+DH@ z|3oa zHa~^5Z=p;HLTCw?LTPSM!M}TbV+T3gV9?=B$WE^)rAmp7XtfgXdYR-Kta6%+S&1!< z&p41IM1AyoB0>03DY=wSMi{55TwM&mr}k@Mu?5QR#;=MR9awqYcQC&Pft1I40#8#W z_0$m|0_(&%(OL9t#&dT#AZJC+6>6(Vhdmq@CA~0yxTC_dqSTIOI0TxB&P*TkxK3ZW+hadacBjIP!$de3P3K(HX<{*W?jGBWR`@Jy-fXAy7J0BvAWC2iEILGMRAf z+U3lo!vk(}@q{$|wMt2MTGKIK_9;IRKS^w^y%YR!!*3O)=Eatnjh}7#j8^uY7ox^} zY9_2pG2;mej$5_tmx}Ku8mAx%J@pzWR{~a|oY*1M9!>K*f{1srWYKBXSBmQx-!S@6 zlg+-krh}9=B$5fA5c0StXp+&FwQxWfOfd8B+BZI-Zsxy<8z*IqRDl)6-xamF<|J&BhzT4(fl{11_jgan7d{UesD$I=L6&sn9XgP|O3{>FTLsmGUfhaT z@SRv|4V9kKagb1sxu@y_FEl1-_01UMs`a(mjN9OP%K4)3#{phisBEa&#_2cs)OIt} zb!bm5q&U~&)edqQE74shNtmD=`84LmS!VIs$h=ZaYY0{=JLlH|?K4NA1rf`+Q{yRF zY^Z0S5hqLw8LPAs$7-#oH27qX zaQC;<)eZiVD>gK9;GV?z*$X8te@GIdp$9jbdsA$0zk1GAWfvDAU7Dr`-P=owsPXaP zdiRwlU;h;GGU(y!8d+8l6teV5T_YAu&(4KmX~7T=@NBkA{EBa9}}R@taS zo&oT~X$P8vPI)xgbbej#l-kR~?}3-PT&NA8DIY%&RSI$g#Sm84MTEY!( zgM3(y2NMbqhL75Rt5yhrh}=K0M5sF&I%hM{0d;e zOVYDLq&|y059uz_1`-OA5j29O=jskF(M}}BlzA?HCJYVKpSY3yW?dUfp?(qWLp6J zmItFGwJ3A0mTJ^sIT)=9KG8~2V1a$3YURdY=Ak@Z-pM)u1cI~^Tkq%*17O^U^XH|9 zuJ!qEAX+vVhhZZP8v%(Cc9NlTOe%;QYi6^QvCb<#hA#I&a#)6hQ}tD^EXb!DZDrP6 zpzJO?*xZG&d2h7mdXxKNq^#$6#o^%6^Jj9R^w<#NlV7Djv>fgvU830s%4&0rjlO*} zI^wISSd+Slls?E@O>Ihgyra@`4Iij_Dl|9@&Do{{PPBc&&$roDgDaenUCo|Bk_Y&2 zfzP)W1JW+SDhKxcUR8u_<(h_n&{GE{nU9I4GK zyL$m7$ll1+$MF&K#hONYd9`6#4ahS*r=j{<Tn;2}dtrrDM`0RyB zPN@07cxQePMS7lZ?8|Jb#|D+%u|lNcb*f$y$XWxw{bgDIQ)&yGtbOso1j zYkvIEZ6iBZVi4yA#@q7$ns=0hc5x-KMg$u{7%NaA7oRQ0-l-_+`@gh3E{M>@@<9bntWz`pL0+YG_r6A?<=>qK+)H0INQ)aMFu2h~Z zG+kC#DMp$0g93K7d>QiJ$?ITg&jJ}@R*J@`s^6u)kc<2&n-Sz>@|iUSaFD@Ic7I=F zy37xw5>wUt@#FQy@#c)`-}8?vyICK+&T07IOSX5v?KXnlu>wA$$2u&mh_+zpIdVCw z$C5r2j?1h=tX7soa}Sl6nVb*=e*JW2NDC4J@}HHWI_P(J3w>#Y#Y8KT-qDVFek#t_ z|IXj3?I1gWCPW65 z-893Zu^P=heEnF%$x%hD8-K)DrL(fy@!|DL8B|*lD){G@)m>)apDiF9-K?t2(*lmM zZg=n1+HRj3EbDwr=#IJw{HQxILWzp3swaBp?e01??zxOcuDK@}lm{2ZBfNEalgP9( z&4q&zWnV(Q@fz>owT^o;S}Ja!C9;+#)da@@7U3sMR7YJOg%%$|zg)`qXBZ|m^3$M? zx5t5!=Yhx<4)-)@6KT;HSdb-vy?uzX2&j~Pe7G02bfxESp%E%H*Yn{;K0mux~Q8)H9vmPK16+q~^Cs+qUj z>XKX*wW{~uR(sdu&O~!rZ-sO{GzZoft(hnC&dMtDIzITg&#+n>4TfjQJDgV`?WQgV z|76VP%JE(-uuMgL+gymOTFz`V-wWrbegR32>t5Aa9na6rIw~9ch z`4W#9oR?%5GPR{pgO{^4KltlhQD?23G(P;{wAW#eQgN1`=g-NotRt?B)1BekmXh-} zO36bO2;4mF^~$7jc~E*gl*lj3m#nO=>X&> zRti}++k5-%>dsu7oumB?%5WcUdAz2x!iQ$7miX-YTtAl|Sn0K6b?_hRZa+hB`nWn` zp9Uq%{oz`_w!`tdQ|DSp<<^y^hZydza8oa0HLv8t+k3ep%;?qjo=G3>?^3)A%}<^*cQq{!X(C4u?! z8EeL|y$PVFJv3-n&gIqrE~D`DF9t-bPJK8ntIxB!`@LMs^i!fr^{j*sz!)<9f`kEV z`lMmOqUNle&JJ!=-gLN})qw3u+g=6lm+?R0fI8yNCc-sjV8IMwyH_Rv#*c{3Hdq0g z8EQ8E(C#Dbt6+d;C)0()*5sQ1;QMtUYbhKaFwrc!#BG+yT2rt+ek`-0e%GqJDuG9l zkOHwrZdaSKPspBsH3!jB&K?&5?0)?>4n+#Tomza}CdKx1476ffTj)nWNj%-Et1$7d zPjije8g9~L*;o<#)zaZIHk99J^<*|>)Z$bZxg1=$--N*y@>q*}%5EK2@cB4x@X-$-+r?BEj z&rQV7+V+e%hyW3#D}{ysI`_Gjg%1FlD>8A)NS#4~pvfA{j?)EHI3E6)Mb>|2dY_>N ztZLG;MWYm9@pas-C=$paESWCghTQk3upi1xzH^4P$}OrPTi_b*j+Nmm5{*H|c}HIH zIMEAeI*7vw^;@D%lDbq<)9bi;$^q^b&4#Z-^HrsSLx)FBywt^ptR;0Z-~!G*wN<7z zv&Yw7xmQ(@O0Y=!t)l5u_LVQmqW@iq80(MhY#;riw}hlOdn!f@rGV7BR;RWnv5#ZzSex<+k$Yl+n7&I7LsTr!( zm0#3I15?qFXiB#|nCFG^je>vC1He;c$hxnR2nTs{+5{-J1AZ=HuhkK{i7!o)j_sSa z5-jipOwRUt((`G{>X$8hQ_BuXvMGV}W`TqE^b$)u)BU^%l~=U3!!v&@9+k(*jg09ik+{eN7BajQo4!8&UWa4==A5G>ufj z=@3sc^#PU!3^+}Mz$JbSu_dzjF<*lO|0f+GA^*GQ9+4?!u<@#@v+J5D*%#%Du?RvU z6q;)t+b4<-fd85#F0X$|aV!riK2x*8zY&jgeu#EGuADuh?i>zio|~H9`a2&d*pD5L zcWE4#{5hT;xZa;XH7%G0nX-s((AhKVjWI=&r!ubEpEm{>p#Y@9pHE+4j)lb0_ycWKqYPfDs6=dw{H7Y8aoa9bI^rXQvx zU%fGYg5e1prco^{6$-E`F#56TTQIsV4(4jnd&Hj|FIE9gvvX$)rcRT#Zp5;-U?AsYC>u ze(7~_N&Gaz63QzoJstYfnI}UT<&Z9$7H2Lcv(f*~i|3@jM6i&?^i^i^&_X$@Yc}4WDQk3!%Dh#{zZ4{ufYkETbf* zz!8VHotu|WBysc=qYMiwX^41u% z52fhpuE3u9huGsYQVlQ(S~V`(G#kD-IFJln)d+*I3|1KtABQ=2y8m1@1-O7cPAH64m;C2s=A-`&A=THIj5_=slE|$)ILYugmoX`Dwm@zz zVA>$(M?X_bIv8Ca$HF@x)eC2%xv!>(73yKy!28@@Hl&ZYmZ9a}(lVf}LWYs=y7WCQ zBQDDio18p7#@*OFSJH-iCBJ+!*z_8WJ!nEBS+F9?6#V!to}^UaK@p^!70wn{SCL`` z`Zd;>(UY+GFWR&q={Pr5d>sYinT=U;mIU&u5IR$m3{91Gh)hR!AO6Q&v7oviW;H!p zwfj0lH7ERdYohCloD-vrb$dX_O_2qN;T=f97ApM>U(Y(6OSJgE0Yd6hHKTFFHBI)~ z0u>%vNXB*PjAz50`Q8^Ps-I8H7bKQIXQ(!O&-_(>k*BTezI$9YyXOs4Jd!!}4`(e0 zq5W!af`b!gS9P~H0}re3k199v42C(mt~eDzp8?s)!?t0XDxt`!9Uk;-uWy(OzFRDA zIZaZ{QElcToo_P~1{8kxgw5V~bvGx>OW=ERZO_VedxdN5KSeGNik7F;WF|nt3C^~e zeTSEz35UlSb_Zvb=-1qSs|YWzgF0?UWf%IJ1sylP z_`VN_Zt+T9TdYpk*s39n{qN`HYoaS!mIS}I9mk@>8jdn3!yL<~<$8zROgG*|_BI6a z-cf{}@{_;f#9~w#e$0*;2-Uo5Mv09|?b`pb*L}B( zLW=llEx&v~`iIn9=IeBD3O@QD$Dk3 z*J$I-_jo$M3zYqfk}L=FM*}8k@&4?ze{E8GZ(4R(f_SSK7MWQRTJgeM{i30VT%$se zcG>@J>bMF4D)^x&r(xg1MNF}+7{@#R9vdp5&r1Um<9^Q4dF)E`B9sDMaR_qEBIdEY zOd-P;IiJ@?@H*&EJ`AQzeV&Lj#8u(iO7^jhS(XCA!k~p+U=tlB@!HbT_h1F z2|ZnivI*V*#V|wd22$m$qHDu~N8>(;-B*A5MEUbq7R3?`ALj23DX8=c-tc|}jm`|) zl7KeUibxtmjrRhA4h%1zTG*IvI*jfhcg6`ehIwb$P)ZB_uN39rChO1QfO`fbSq3nV z6;IB-DzCq#@1a~*9#*;?@L*h-ZRz?Yndln}tqAN1pon&3BQKPf4BjUa5+&y^N|jHH zf~`H{K$||UdXKk1R-`sRr~PzhH=j3bbhX3cd*rn7gy{5WZ`h;pNDs%_YsvLT?4~1_?eBOok7?+ zbJegambBYr$!)g-qalt>wL)_Z_*Mwy?(b(uus7R(P!hV{dcBjQoUP_m#FgAe2=sX> z9emAZltc`)uOb#y3c9b7c}(`Br23!b8z8ZEdr!g))VK9>yEaaHw|zgmJt)27mpVS~ zFJoYjs#piS-+Bk;k3viau;v5^g$7xc%7W@O$7;?VKR?OqJ0G-{-M^4DOB3E1R9HSS zA*Dcu#6S)xuIb3&_7gGz!eNG1yal!9$w}| z!Zg|_dlsRg$@Jhl$%N49UXkz?3i-(u0CXyHXHeX$G;NcXg}ST~K3m^1s=F6u8&oTp z_r=%lJ^i@28!*|hnvTXOy)~H>orX|;qf_>B4c(|oW$!?~u zhVbBPEpR~LIl>=w!Ib;qKYaP*?18DZ7M#C5cp2P z-0M(0kIUdA5s>}5>7Tjs-m3!hPn&d6#RhBBkDOPCm=VDpk7ubKcTic}Z4MJyeGVq$ zI3KqDdNPx2&A}dWKq4456p8~Ms*CQcDN{e4^?|O6gn?HKjs1l~^);TDT~6H>Oz$Wk z<0!59ie+ApYO7nB|D>1$@Q-6hZh7lpB;aIY(!=(^%Rkh7f4apI%oCW@&GCZt=sM!P zZ^j6PI(t=)QMtXy`P`RT$^yxECX1qS6_Did#A+l_-X$d)&VmMnrnKeRkhq@C%5~## zN6P4~ntL68kw$&DPKQ$#PRS8ulEZarT$k08GZNtwI*O^J6PhV6`fe@D< zxaMbE)OeR9ieKfmvH%5|E$noujra#N4ANnf%($ci6*2bVoI$5L{GFdyVjCs+LTm=i z@1#^!`yicgex%5^h}qsvjg*F0BqUMt^J#zWx?f@Iy*uT|PjOjkc>4&IYX(g06(^~A zKq$4?_?t~iSaW2`kQYM@HBIduRqcl3I*D{PFa`qUB>dJYW;7e@=V+OL*0 zF=n`*%WrbXCJku68K*Ok4;{Q_k#&**o(ZaNmP%~rv}ZGk2yJxkjmNI+Ypv9?H%)~) z5ABGo1RP0#6%M)Th{q-h&3(2dqdramQ655d)aP=_QMT7_3Qk5vx3)%R{Ykw85+6Ao zTg%G_GRb|EU3Tx^9TCm?Fs`R`sH0ABU%BPHLi@qtVRF(Sqa3FDP8jHUbiE1q)V4)f zk2v$~?B#2E@BsHEdL#@RV;OXZCO%E-4K0Ng$EFCF{r%jXvA?*Mr=s3==feE-ol?q9 zF=-(vZ$cnsh?`nOr}Fi6Lj-6xh>rKGM?vh6`$1&aL#U*DKC@2YeARAfWA0Y&lSZd#T1@?vFpA?w3jH$=H*3^qdp$REaS^pM8B)wFVNU#Y?eF!?U9 zdLzgyJ~z((>1cS}f5NDgNNVe2?BO?{+4+&utUB{rq`Lul2ah&wuBN$f_==R0yM&W5 zJjnEQ@FMfK9qz^6-jPpXUQcfG1F1nVZPwFG2@l^lx+|3$>Yt($dh5PV`$pm#ic0>V z6cWAFMCr!KF;yhvK3`tHUD66XYHYV2|7*N2=S_zX30~cY+^O2;2gXrurNvlMRlJU# zm1=6g^`OF@x%}c$MY?o)&hKBj_|*fT7{t6RV}sS#UFHV znlEL79~@3R7`Wfs`!~M5cR3m~OA4<|H02BNti_{*mCQl(pms&?YD4Ah7epe|17Yhc z8^qEkU$sZzp`N#X-~*)vvqk{iE|UqL=!{3;j8o{@s`6l8e61zb1%?WkLwpQm;SgY%o{Td!+tifoxb!;eIQ>9TD*=#lx`N}v_lSAkMGI%D`*_e&hy!`$PFyT<6 zv+B&Ef5mbD! zC)k3W;YTXKdPXXQ{G7rzTv!pEE?w~Plul3y%y#X` z{QY$0E*wi0(HcUTQx1lccdlh?6zE7OUsn8ALT!*|1P6`;F0VN)*z!oCJK+z>KKB+D z8wfmvv-djz8<({@J;ho)cn$a4yT4m7M*C~8Cbto>f8u=Yb-)yewY+7PQ#x00W!KUE zb;&VHV*ZjW42rVGu(NnVe1B7^8_FypM0{U{C>LKwS{sSOD- zI>*lTCbo?WWXWk6tD3IZyC|eyQ2)E}4A9p(WNC#w{bSs;#p8Hp@d|ello4`H)FST4 zW(QOH{4Mjns7QQIYlH(;2#(o{HSKdZPEIu757Y2$HD`8GThft%oT%G^_3*6soj>~a z-*fFHPlK*_0sIy*-epRE!E)qe0@T(YES{`w391{PcvL9(GO?d>_8oDmS8s2ZZ5F*n z=2SC+=qm|bP z4}Eon6$eWd-vEpJh)1i$s$|dg2_5 zUqhJPDZdQw!%rE;jd!uoH&%z=Y2H?^GC(XY6kOQ=)q8crjxg%1B*SZ`)p@ri8KlgN z&Kcoq{ie+T)#X9=;3~(pp`CkWYkDmAdgJgVuyJC zF~{wSKA{k93p3{|W+>aPcl!EB3&E|bRgLcISvBGWLOi6J&25F)7gbR)ihxvjm( z#FA8xwtPL9L-pMMkS;}l86grtm6wQT9CZn}Z(phZFm2^ZmY6974+VQ=7=Na@#mIad z1x5^oT!{cO+wM2(=Jau1$F59Du|_N1vVX95j*Muy@QLZp$kH(m!D=sRR?EGj&6BjD zXvlB*{Hc_I8*Y~{2f&U_?L5Dox$SC^%GPW55)!^*#!SBA2fHxRjB=0lpr$z#zci%{ z_P$Vex@55{;>sT8uv3KHk&T-mNQDz`^zc^`Ct6@PZH#Z>j`A`UcSa+aJ6tjE2oE@( zQ|1sgKN|9FPdP(9Y9SKRlla%}F=nk0eFMqUo@fVg`s8nlUi^*LSPY!2kY+LXL^~lc zTIhoIA6E2up!%~RyZqiz0Tq}{lwLSu^T?kQSr!>!aPgGJvkJ54e#=K_vCJY^swM}} zC&|?}PLzBOy0q2akmf0%LOcfAa8r=Z=jvOlkK?T-MwAKRZajIMrm?X)>NsJlTtw-2 zpJVIrAv(c1PnI}obf~Ez(c}!rYs4sb#`}7Zk9#$Y9-BMa~!24ZbkPxOYXx{cj<70)vuG6b_p5aB)j!Mcs3 zy1Z6#?D*H6*^pIw`SCb+<1L@CNYDYor{D=Nj}@$)k+jn+(y=5*sPN87uYR4ScLt_T z#Q1(xUNQUWfx;yJ*R~HNt~+CT z5k}AH?A>|?ZJ6D)m(6Bdy`Bg3byyrSJ6sRkM)YvA$@uE_3K8g4&%A+EJ_A)HP%7?XOg6dS zIECkb+}&rlhh)y-^uOT5{s>zW*YHIpMGNGc$bXm^j9$Gai-9X25VH{9ohbkivLjNN z)$>30Zj8?;5aM%MLApbe10n;06sgTxSjUbj0gACCKAyLMFAGY%w|M)Mv#1^6xmG-CNRZnozpua{ZxS zUvj=&p3)v0&)cpU$V9`82F(VjeK!bITvV%GwEk9dN1n@P7?Bu@|7T5e)0?2dl%D5$ z!}@X~YZbKxCH!;n6KWZU1@DoF2uR!)c-^pE%7z=Eo{;*G-IXy)?VjtdiDM}>zO@DY zueB}4nUF|3Lz`uBTxpE`qfB2ZjFQS{eKrZBN>HmMoqkQ_>Cz8|3rpU{nflKZm{+mE zcTC-WaF%=Lzks6@LcEt_+htC(!%Y1dJL{JPi6D@+2{{dR0_^7pM z^18lOn84rLZb*$vG`w{c7%0q*jclf|@#=hO!OH^n!A`t23#NlV^~@sBCkQjQdWJqG zd+bpSGdJ?+wYkexrw`b1@H3*7tFKBl(zG`t{E=KH=rm}u_o|*Fc4bH730@sYB4kY$ zN)Lh|?<6!IpD*S;+|}3{Ub3XPDUp<%>9;2s0I7;PjrsnTwpvdPWscsu&!<>VD72nQ z16+gl9HqACV`s++Ii^Od!{99SUP7R(Rn!X<4fHP6 zqRm?X_F7S5yG zN3{XbZ|C&ANt+Ra40~O6WtZzF&exV6=8fkskj{PuBHIA*ER)kWdm*Q&rByPXS z4(hso6330l4>erUgb?)HgV?`6_~m6i*bskHJ+PAbO0ua05_<@x{~?E8 zu=sGOinDH=JcDOF-`@x9O_}Cqd7XtzjEtQU&%XEv00NJ0LtRO-u%OfD=t-Lp({319f*&zD28( zAq`n^W=!AxMg!bhxo<7vtLp1Y&3JSnDy9)V*_Bjc@r_Z3f{kV_Y>kjWSJWcEFw(nd zKOTx;iLy2Owf0_~TNm4Z)e;M{exZ)#M85N@Pn=05@9Bq}SnsN!eU~4Natzd6???Og zHtcr1R+7$K6^bq~9J@FgcJmhHcIxR-pv)Ey4(-421}9ZU+fS1F^1$le9Xa}zN_Rv| zJ+Wo{&69e*w{*VXg-&kauo$3N&1}h-(Owy`HNphN1K6E%L`@C`VkbiToO{zHz6`beq+b2huf zpo3S8HN&|tC#uoU2REzwvJuE}TP@+1r&|c23esGJ=Y*}J*kUPUy%m$WEm@x;NrjG@ zDIf}wi%eT>tA7G(;ObzoZ_Tk%w+fVxo1 z5pm-7Tk#z^FTg$P2NU{@?E~xSV*Yomh;#{O#^b8hs-uctxm9GQo0P--xcJg$}*W8#xk`rIm3_aw?O<<2T3!1ZTNv_ zZc%RRUs-`_^dzrw$fkIMM4RudTJV|J0a5XvgpH{xP}!r%`&C;kHynQQW0)-s`-GfR z%*CB5MmHM7fgYRD53$NGW1q-vwsUX>{yN3>a=N+pzMF1?jtNEnvw`zkYqnhLnoO6Y z7QKb$ePDen`F(hcwmz#}%+foYW}8D3%u;cav-D~#I5g-ly5kbihw&L0r{1iOJSnM# zIyg5OWGl&ZnnY}~$> zZR4O>`=ENePVv^lvk0MzfO@D)nFzbZ6MDbHd7poj54OjShTgfBUyTg>Z(v_63-pxy zjioerHLmkYV3~CG?&jpJq|IW*;i z6y(05Fmb(`Ivjjs2v{~T^jepQoam!omyDdsvd&sFS#JDxXfzdNz2NmkNyQJmlSO58 zv@j?WMIK?x-M`Cs?q<29Mm}0Po!(X3jS$Pwin=pBXf)I%J^)=LEbT~B9XI?tfkF3K z9+lu!(n=C68RjoEUw;8@F-M&S>sQRQB{!+eP*&9%ucsQdgAjFt#zD_}Ap?FBzz2H0g|+M+rQb2kgH!x|jEF@fQi~ zm85;N`skV#mUFq?YRKI5F7b_EG|>W-l2~X58N@!F7Ed~YcD(pulG&d2zp1*KU0t}M zW5(UxyW?p?rV6I78%WlaC$fiJE3W z)i!7dHgn_Ly>+7^77rXM4g9i`6tuEiV(ky|jaYeTJi$dDy8?*T*794jAN?NGRFr%< z-uEz-x~gQD_~KhtJ>a*UZ>v5q%IlBDQ|kO@mR!>jzE*5@zkuWjFvA+6C6FNxO<7Pq z8kpH|#AEfG_^IAK@?~R`+t+V`Dv~kh_rKXH8t!zH30*Xve{r*Lvi)2hfaP6!LO-Cs z@jhrH)oaYhdiUj+8h>`)u~D>oEDcxbDgvYESB=bpNt^bsNjvBnmcqn1gSsVb@s|hp zp?-0G%Z+6N+|OY_s6$AKlDgGkS4Z7Gw2$- zJ@=X+NN37V8|KHN%k)ck!1N}|AqLAvk=OIr(=(RI^CtSH5)PTQS497tw;Yw1tK#J! zN_77XKmXHDS4#Z&7L8sDrMX89}$BA-89@H#9d}Avf%|Y8P(*Plr4q zg}l9XqpLX~ACLVwJ%8gI(x9}Ee}J|;<_%?RxIr)9Cf;&QPrH8^`0{(~4*tF@GQzhT zyr;H;G+fOD)!|zO$xcd53J$J51@p-g`K^xbrfBF12Zz)D-vvMHT5bae=Z~r+EA`RO z?9>!Bop`XR^A@Kt%TqeSN;;jzPzwt7oFE78=k|km5tKC}6ekQlCWP$p;PHuOubyvT z?*j|Y+Gah=P*H49{H{$MYtL%@ejd%$=*$OK236|SrkX^nsGNDs12tNYZUsgu3fTpu zTu7TKTZhR<2jE;b=df*Yy}L=Z9yklrDK*V;c1n%8aaJQ1kHDFd&#-T0Ho8z#2!^IE zEFI2|W00-yN<41LZYbf23R#hhEXHA&$gjmhxlF=?TI@P<6^{u^o|Vebf>z1Ha?HX{+{V`F5NJ2= z8O&DTPs5Y>FP`Y~8>T0H9`Qy{nyYYZWCYvZSH(21L6%3hP@=T5_M5iGkZhWI1L=zi zo#{cn@vL4#CX9t@7l{2|P)!xY7xN7fMo@B-2_d{Ms?_H5agtJ_S_tO>FP;2Ry z>p4xDtlk&cd?A4aceGp|@%GR!y~xDMSc2R?fSkW};g_pkx4+NbG~H03s7E&cAuj31 zcfb)M=lAg=aKo-&KU{KHtEXD@skl(%yjl$r8O zo)(0V7FIk?v~Brx9ONhB&W*pbZNeL#0L^!zXrW32@d#~y;TZ9TVrm6zy&8JG8@juCFqI~DBMKea)46CEx)WU;%QYS*eD8j*%TEtjki3s3Gian2kEqOcWYJLeLXz@SsNk*ZRn7 zG})nFZtfV5`szmuP!$$o-->|`+Uqov+0Yp7g-1l#&`9t)%rA|;(?N9D$Ph+=2PEE} z3lN6B6K4qej3v*Nk@*rCBc#YLpxE?IF=I!UeDovo#ymRXFTAK2^l(~BE6kc541}9h z!D1*web4HdTAPJpp z0l$j~4O8~b_e4cD^Z`#vnpBofES3>0*mprXM950Sa-yrKy>_5-IS5dX`M~a8A-X?r zhXQ@-18PvTBBX^GJqa!!yZ)U&eUb+D#R-DMQykpL2L!*En`*cUd3Z(s z3w-nzhABEUg6h_`-djtNOGL}M#_irwrrwy|?@eeVNJo<8IkZ5Psepfo@OaK}vJ@yD zy59%qU*XY`Wzj2_3gD4q+3@ATy3)w3s7l0V(dE{3{$>iA9u+V%NK6V7(u}LqvphZ<|pp5Lw-j`n>!ax3G zLA~|R{M18>B>!wL70R|=O`oM<=62Y`jI=SIM!NX#g%>M8UsdxX#!{w z4!;G`)-rC8Qh$l${?gh{OZ{b?YJn#Xn==9Kg&qae%Dq-3a^xyT2;WJsN;mMnZksn3 z`Jvb(Iv_$&s;xyH?hM%-89^2vWQR9`yHLp`A<5PRVBePBB%qDTg^R=eo~#dwO5lS@ zC3gVYOaMXv5N63&!VEe*`5+90v1zR!ArUqNA$*jJ{e!BDUCBQhVHzBF`0KCnNh#>4 z_nYEG;VDXS00~O*2wAd5$y5})jT;#NC4A+_aJMj88*+eR{?hUn2}dLZL!*9eG$s)J{#vx?|IsRDOy}x(?fevCT{>T>zGrUPg>+|Fp_O6WvXX4BI>0iy)@&I*Z5 z&D?f?H!eK`yDZeUgcj)t{X&<*G4fWC3vFjpR&Jmoj?V?o92xZ>#t{kcFY<)o3(O5O zVzSuzVrf;Rmpe`+y`dJP@kgI}1Jx)6x)*QVDuOLTzrIf{VmYnJbIVVOzF{^Avn~BB zfaUI{8Hz)?v>78Eq1I>{iW~ODk(*2|#$vVLK?_YLxU9)c%1g`NVk?cey7qHpj)aq^`_iJNYta2%lARcLn$omcIs+zXI-@HoScM{^2?gYlbd9 z!DTGT@3ghz=X!sJyA4R@-pki#&V8Bg*_RD&!M|>(&7g&S{1Y-n%k9qL+vturlyo^Y zN$qfVRE&cq-aRY%aLfIKouORV3sJnFhnk+RE<&P;q9)Q{UVh;zMg0gnL=WJbU-i zXOy6Vy&h8nUmF*f;^_d9gal>tgq8~Ahi!9$0Co=M1ycjznVcxn(V!RIG^MKo5yl-Y z(m)}43Ss_U^-mk`bg24R6KIj{HSpj2tx~xRkosEOukE&Nb4P+r_i0qu1lPEy7W1vw z`nfNQC;E88ZT_M{yNIG~C>20XA3*FJMV~Gm3%^wpj}kdP(2?|l@YgU4~Gn{FR4#|+ruDv$cS|OMUMr3~&yNbXH+X&|fo z`)aSapaHHvN_86FVA3(^Rm*RQ%29Pk7s%d1Iol!CZ)vynbxlA;KD)8J1TL4-Xxh~v zLA+A^9F~_doJurWs&)~&L;5}llD%ijUKMMB5@x!kvDR!bX_)k>mHtmth`z7{w$(LA zd-Gsq#KBQN(^A`l${)!+PJ#>y;G^>Hf#SkLTTeh_V%+=D9hd)K0AvCGEdm#w!T*Ls z`F|@zR-d-%{pU0%gS{GlsGd7JX%@DXD7aIu1xlpvmd4Dv`8JCGx(*k)A0$3=Sz24! zl9KYe!GFJ<0$BR@<{IyThIPE;4@23j9RCmEA_6N<5iSPxOKS)ey7e#qf6atpRplIc4(R`W0o)fv9KPqEH#m3sUwP7!-Zc#Bd!DK7yq3Kw z$3+ryr7Ly+b2~p6h=IS3bds)%-@R<&`%1a>Kl5!x{{9G8AS~q5?pDYcS~X_G89q>D zn~&YI`9QG=J^d2^ttsWM61$#~FljUb8FN2B{zatfovA*- zH#c9TBG>@FrhI5MGWh50XQdgB);q`V)~(=8>@YzG{MR*{N*9I@K3hBUN+oKK%l2Y4 zXH-hv)Z5bo2`K`bAOVSzY>eRWmLJz@-9JS!gA))bW@;0Kt;}3Dt&xVXk=JAt`Beli z|K{4mjV+aI#z?SRsXo@X@^lYLda;MEAMu396nry$pI){)%)f01(9te`>{@7Xx+geYafP}!3V08RRf$NC z);zq|(Du4B%Xe);n&kUT_2NrKcM9jC&{saDR@nA8DECDG!RzwJCzT(IeZ@SU!^qhU#|jlfmYH%b&C3drZ!@c-*T`A~ zn@p3`Gk`cOCva(bXYNK&AObZxs9K^w7=F}-+u?ECPvHrd)xoF69C)1D$FzOLUHoyK zMZHytB%p^^i=;r7R+??}`2p@()z)L@d$cOdstrij9D}BobA~k>2o{%;i21OYov*ZF zkh)y%V;~^3B+10Ny>!nkYe=}zOq^K!Bi_|wCmGC7QM$wDaK9FE*nF3D_eE{Ktq>yq zg-@4eueT1!K4kr(F1N?~EVJu@cx7jpjnkhk%)?V3G;tB+^HAS)F!9eSgejMma_0NG z=#pD%RK?cP*?1c4D&LY^B8ziXRhT`KH8x|`hnXzJGHA0(_E*l~gL5}=zQ5pc>aCY`z}|X^OzVccl|PwYC^r{F zd&7y#;WsZVGTa;3^ClbE?&8zs*L;%A;eR~tGAj${3&_ug;(OFpyaSl?6;u2Xs+UE7 z*>GQhPz(0E(TTdg><6p$4&jxE%PgkncjM`|B30?TWQ}}Omav(py)lLZOx*gKyK!NQ zPHnSMN%FkY&tZ+n>g$z}h7%Xw+Fl2rmTvoNwc%sT(?zYY_6RZBRv?#Oq&VSJ_(5&` z*oqmBkY;I!mx6T{rsvD`WT?^XD#2eRl|^ujo5W`3)3@LHH zfZ%o3FccFu3uYVl4v4ZGIuIB~g)GuO$_r^rGM!$7=*VXjfk{Nm0IFTy# z_{PNXMqG0FzR0 zV|H$*g1M%h1TR)bNQD36isuuWEfW34EJ8N}{oq#ok-S~Sqga&P925o88=YYL;LIVh zHZ}dnr=q<^D|pL7-~JCtb?hpl0P@YY`@wYVRQE82^!WiwM`S>m)3u$@-(!gK%&h^N z?ev)jeFsirY0yu~E5^TgmC3UV>nCdx%AQ!s%0weMyBw~~)klC;o zR58!#rthLtkqYm*iNkBSpL5G2k*FF|QM^HIBaP-R;f)6R@|-24xE^06J9PA4KvG#+ zyQke+D~eYNlnv(GFDev^(I%kKqngTH-NrRL7IV%6f&Rha4eOn0@^>?{O_F!Hi2U}H zyVBGW2&Sy@Zp%}xvBAby*MA-kNQAIwUg!=54RUdL*4GLBe! z3Y;%YAMp8gG%C+Uc2$zQE;!jun{=%ji67T*~11`xoK{uvPJF&7O7 zt5Iq)E9WLEpPV6toQ`wBcH3s_{J2Iwt1_p_+|$T+1e4aNXyL{2)4wY|iduu5UVm^t z;Iofw(0>KXJ#s-+4MwvSyX2vNHp;JSu2M$+HFS^YA5V^8f#$yz>sQ_6XwR1Hwd8r6 zEt~WBPNp2a@)0$yL=;1A#y^l_8g{L`MCQhZYP3v$AIFU_K~LCFQPm(}(AYx9b3#ZD z?T;_89fMY~{3RdpkiwB+opGZk$&g8rQ?TU}Hboejr@l>V%FQfd(-_rD-#(&!%~+H& z%Pusi)I6)FoEYioB(=RSD%f#gv2tfQfH!zT)x>4cD*z9mjq%je7{)9XKC#at43IbM zHC9Qy@E%>Y+-c#a^iVAOJdhfOMtJ092!S?xqW@N@hbKG!B8Ov4MAbHnggA$*UZs+t zKRRRKRHpv(T?qk^uW;EfyY?n6490FA+lnlotW@vs=BVvAKE;MSsS$+TDUBFUbzPQ! z{5jCzt*jS1LqlyL^uhWeJ+yaSr4CRtCW_U9U3T)dgiKa&K0lsYr|GHi&|XaM8!Pob zO@?hb>7Ib?G46t-4I0LSuJ@DrlH1cy(SfGec3NALxZaB1^k5j!#<1fR!Y<-xC|{g! zuvqMtl)??1W5^8Amyx_d4d8bhRLV}~c~lN519}}kbT?vmFL~*K4=pVB6JTN{u3Zx| zdbI8I=2EWqq9(F;ZG>9u+Ov!tJAdQ&v)WEO#^qb>b;VPfo)L6bQ*-ygadfEAAc><3 z>bc8IkTXznj0^n%;U?Vs<^!ytEEM(LB zQ`b}dyh4$XIWCNUBw=#_u3_1eAU zr{|M@uj>)kv6LzDTZEqNg#TO1eMd(!e6c|3j(*5%^O60rVJr~q&?ncI>@-Me#R7N7 z{=*gC)?^rdlQ!oQEVEP$`MCse9ZE1d_E3OfS{d=;it^zre%oLdA2H9vmr&-f@9lHt z3aC+Ahl-q>7G17z+02o)$utEj*gCj)O;I>S!n;CbZ$z|P$RZu0BhF%Ms@=k?#H1k9 zme7S3nK9%eoWe_Oi^iqkfBMy7wUQrCY>+JtPlQ5E!5+X}G;Nm{tX&Ew3Rb#z(Ro#P zi|6S!cEz4&VDI5t`+!_|6L_U*_m4oe*CcQN3m()l8jiEv@IL+OLxaw zR7=H$TJp!~6K6>p!H+2S)hI&3J;YK(X}7--mwDC^w7MAjKXG0XfBQ}n#z`7>U>HLK zvKzT&{&4DA7*_m8E1PR37+&ubXGGhAtTaY*=ow&V#NFkgcdwKcNxmq=7{Pwxx1w&A z)(aqwnVmqE23%^Pn1@4WNO`V}5rp1Nq<Kvz&CP|I&lZ^!Le zi3`S#d_}+uPP$|fImU;i7zGtS z3X#N|yPAoVsGvc5#2<@)+LOlRFRJNNTnAO7UWd&(%?}3={-9@9$6>FU?Fan26*ACb zDv=QjMRKSfw8+biB=n{YNR7IklRA*$2Z&3ulB9Ufq+RSyK@?Q_H$E@H$ZCh?HxU7$>AI%Or$#I$1R7rFodhpHIYDBmvLW;M zj3$Xa0hq{ZdBAqbKFGg}I=;MB#U^}V=TKBAPq;C_5Mf~i&udHK^|?Fa1G4lz0t2~% z(Yv%5Ddvq8PyVBJfI@N|G8NDmA2^1iYBe@x`>Sf8oIHhiaN=YfliK!fREH-*c{sVq z!FY^>s<$BAN*}d1I0>ifMU#m@RYIL~ybZr*ZI7x6E!na#EVoZJY$h}T#}6mTFmnLj zkY94*JDK;_6U_;EK;aJ)g^2Hs3KR_%(2596^(f2MZWMgSVJQWRWybD5rHFXdNJdl6 zc9Bj~tioHuWW`mr2*SAOH6rYeqxal4B_3UCBze&{)?=a;OYXr-^2mR&w#FsMBJq^4 zY@IMwB1o#i@#KT}oZ>y+wYWl*k`%c#GyT6h-c3Ng>-#h0g7PnNIGVoY9#y+w0mbC%1L-SP*qHd()aD67TtqV zD&cjGiy+2J-V)C`Z*Op;!dpoi?T99f$D>UkJrWH?4M+aj(3NFH4`et2U)S_U94jHb zdUjPtxLrBs!5TGiMG6AkRjM2C;-+a<;n1w^H%fle3dR~z zeO6+3+vhX(Ftdv2Y#r=$2Z|~;obR|rv!S@p9O521M^I^lWg{*Cs!>*Fk#DWl#SbUw ziqJ9{kB39pIiGNNm1Bg#AMv2p4iXz$i##2im}nOpOb z@RymXKj?@D-kdVzDp|k;(TaBO?r`0Si;)}~QL5k{D6kTjYstX8zCzeL8>==!%_bv4p9SZBhmSf4woDE8XRH<6wRXY=W`xQ^BsLGG;O2dznziV+jTSe~1{&G~* z6X6za0JF>IolkFkHf{STF46>MQt&Co-ran_R{BTG;`)K549xyK4L8dzc7hc>Juz@$ zUp@h7aWg;*F_3?rvLx+&$BN=V(`a0zLaD}0{DYke%bwVwbxKpslH4ueEm1X%zm)1D zQ<1;B%nRFX%+N!d=t+;K&df^$u0TQTyI!D^?Sq~i$?vspNt1XuGw1aeahx1( zr%5~J107I>Jk1P;^k|HIfT0n-$~3egHqwTUw_4Ju^rYnk#E`l^qFeT3uDlvds)qu7 zb_cT)6Wd6EO@nus{jr==NqI5VU2mMZSCBn42E3LHAoxHL)3P2$MF`;EKy@axD4`qb zYu{XSFfg9h5cvRLsUaVhF-x*+J&m4+IxsCh(*F`U5?~Mp#xvm``5=G7I1H>xRiNaY z6EqB{ZN84X1nBUpW>)gKsuY%0TSTIWjK^YqwZ$+2u@hr2=y zQqQ0B7P5*PexLxB>?qj5)|s!MX_jF(EHZXN)a21^p~&ot$aQWq#2^XDv2Vx6Ud&Jr zkYe=GUmDP1Lhd0sEHcrg!RAp_x>LS!lC>gS7)S6J+56KW`gIS}5eq+k_>ZPVDtu8vn;YKY-kXUBff$Ohn?>s1D6qQEU&Q}|u zxS~*?w4os2);vH}T<(#mXJZ&5k?aOs@*b`k?H7f`Mj}6uNZd0(nG#D2M3gej(Nu>3 zr4PvviOYNXJlm2YZ|6}t0QCgQLvacR{BX(6qR2`6M58NtItP)LFZd)#3#_)H8&tdS z1zW`@qwBgzt^@;J&J~$wt1Y`0L7s-6o*ndN>y9!WCHl5<%(DW=0fP2iJ`0^pE=j}^UCkf zdPYXohdg|9d<`DH&pJ{Au#M;uCEMV4<~Z9vUT9mf3c zMxoVy%}+Qr)48w>)eYuNBJ)+j(H%fT z=Wb2#uGn%2f|or@oVKl8TTsq~w>&4Q8^&*6G}m8J%$#AYjTH(ZA+h{^&D-zhy=$^> zha?@ZW5y^5V6)#_J!t)U0`awXZ{8jw?erBI=kXHA(MMAyJc2NC-c z#D+diqQLc1!^OQVgTndPIm9ZuT>Gy?j4W#^R)vmp=C1KP;9%DECo|CS;c!uq9~$z< zF|R6oxAr-U+jjQpJD7d(SQlsK5f~TRNeQJlOLIW=x>vmkx3yS{UHHopenWy0+xSn^>DHTh1AeWkvj}hNmr4o zxD&|^vodbm!NWVrY`ZJty#=z?{1^|d@O$m=qQV}CEMg+vM!A5NPbP>fmI7!LVXj{H z1TmN!w(q?UVy0hU=b^`5Vqq~GAN}c3;$U_BvHbyee_tOZ5^Rd%0;O8oy1wv0>X#$4 zybTda+%)iZ=m&y{c1^J{^JaNMc%+ZR{BTG%cYg0z{Zif;v&DP~sGkitSTZzZ)|Gr0 zG(EISY$VK%Sltsj(mpu%to>;~@7FuQyg&lmeacmt@^&6gFI_<4zVrwJ4>sdcY?zwn znF)}hN$soQjNg$sW1vqtM)@1oymW^Qhf*a4N>ve_2k4mIT_KYz{kwd?1kx?%A@vwa z3(XN{a=l!ITBWkvd@}uL%PjXe^Lcvm6ALYDm(p^A@5nm92*=~r)I-%H%Dm?^0j{9%e4D(;fp>MM1sx(%pTsf@AdD`?%yAX*CnFM)?`O0gI}4-C5Bwl>6x`) zr+#vCq&I9Li%IyITr90kqkkW%{FHV;_aaz$PcLbC-FpJK{sIdjupB!GF%$UOECM`xJMC{*>-Keau*4SH(aSU$rs}LUC+Y!oA@iWdT@U{zs8z7kV54I(ulsVDV+Wv} zxsavNgDl^5?%ohX0(k~^ej5F5DJmWvj9zIcRRJeT9d4K}TuR#1%JrJ0T5E!!VohR(0}mIe{j$ROva_5t?o6A7A&%4WJW0R_8%82e|s(1XL+g^OG^hS zvQU=lh!-a$Pg-i}*-w7_c(b2mxVel;u1<^8w-XTR+!p#^z|9IQCXO^5OX2!UJEL#> zXNQx4?6G8XRFv-D!=O$^7Oy=GL-n2vs9(Edsek*HrzpLLd);iDXcHf?lvR;?xoM&sv4#H9uGGtcwEmadJwOdv`r?w

3WI0KD!Jt#qz9+Uy5lLqulf#l^TAtRH`BaM=d7B)MLkzB zB$JUog+z5GtvL4(fAoD4PJVdlZGBv^ecEZ)FSA}gs<>i)afDGG1(Cd7aERu8rzpTc z)CHS!TZ@uy-=9fcYqhkMp3Z51al|KF_0LfpRyBIyt`SCVu2=)BA3Pc;tSA8=yIQu0 z^vVt!wO9N6FYp}EcEuGWHk^h)C$SsT*PS$yU`9opTpl+g>(c$AV`G|C%Tj+AorxAW zZ%`!NU!p*gs@Qe}=5unv=N2bPFf|gv9_nDTXKb zC)IKX4){N>-~?V6oI+tXr~ZH?DZr9AUnm&&zamq^zRxhZ6AUkA0DR>^}BG>#~TesX$mc8 zJpShmuf#tt1qmRqQ&l1Xjy&5aR0&mwayf~ghMf%?Id0KBbBVrgjhL3*EiTtC6ny=- zrgxm-yh_X__8Ory6OBCH{RMXJwps#o$RXx&nrF?1+;lV+c%t#p(K3cIr2MCl0b=Ra z$(}orMVrTXF2jCJurn6;*UP2%SOz;9SfuG(=(Y0N#P6eW@}KWH>gKPDp;fQ3nctWO z-{7DSl@z6Lshko_#dJz#(T~>oFSJ2BpC7rvbq4-6gL`TEj6#YT#_8^qJ<8^1Q?HN1 z#Z)xVfQyaI8bJCZR-(k+43lB^<2NTX=;s|W5PP+XK|N5JQN`tI$QenhV>Pjr)3<)> zx?uMCOT*55smcz6LCtFXVUpfhbUVzgV2rsXP?X(lt=wigL}|{Zo~rYyy`xu6yaiLF znFnih^FLE@$0mKz`Sar4n`!bkjVL^SGEOX*p?jTb;9ZIE&*Ssf@>Sg;ee^#9Z(7@i z%W9w*d7Mjqi^oGFS3a-h!=@&8yXK#Nf&KKU9+XlFH`SkVG)!lCGoBR7PRAqL1_8d% zfbe!)e{)v9{|43D8<=YG)N0amZWAl30ZDBZw%H*AJN<5Ldl^lWzWG7AX3+|pi~MGO zo;r+Qume3^qe0eUf@5_R@>f%Kqn#tr@x~2*1D6$l)%qIeT+P6C6CfD8jKP_@0jqaE zi}kNxuhzv8-%O-M#O=ZiNcNVx@@NGZ9(aVSK|(-Pzc5J|hQn+Qain)+#u9K%AnZ#J z-koRl%4=DTGw8RH-xxw3hq(SzpaQL2{&tDJL%S?Vc~qdHa0sT)G4|)=4B# zoz*nLP5;mExEf=_7oS-v{oibIgRW*{C^YKwjn&{s{*Z9~Oa3gQ>W%+n3^X*zocv(; zJ%g?6#d^_b7|&BFOu=%Bei!Ap=tMSGn;+HhLGxEeIr%@srC}diwXS+;YgMwGk-O(z zqN@Z)ievFZ&gIsEvP8NbKl^7?{pU+4|6`ADRF^D6&bS3IGSn#5S`l(x%dbEay9-Sd zQb}1aDlqR%s0gv5S;UqI`KIf4r?Hgk?ee5R_L>8BBE(yF23LjO_rv!}5V)xb6EJM&TH|pIYy9|Vyyfa`~`1=`E86YNbies8~qqy*2XmSaoyeyD|EPQh^NoDWm+Yn}} zb$R)pFk`+c|754=lZEk?-Vv#XsuZ-E-~|GWos%20gBAaS1}6m!fGLH9om2LyF5_z< zXO_pf7(UE?J6F-#FO_*P;4L%UQpjp(WKhrVcBKv`6Z_brXlNy;j3DgO8z(#eDtki= znimqYlN}?z;&Ab~?_)NHe~eSch3#fBDpOgfk1mAMVSa(9Y8{HyRqKm~fK> z{wgEB0QHY{j!(NYrR)ptzI9V)@IcgA%4U-+{eI-IcBA5A9Lc=tA87bOZW)F&bESA8 z(rE%`tG*We3(MS_;I`o=kqb=R9sT1koY&9vJbfwuX@|lNOE=2ymnyz&hz7xTUiB4s zsb)dd1*eLRrL#cY2e>V96v!t9KcW&<%(PGo#Z`~&j)CqSVd1S~XFY?*#M71c#8GBO}s#l6zGeY$NZ;X{#_A z!v~6`jRYLWL+Z@*KF6@?Q+=|gv^o8Sw-;xNspA>aL_{}_Xu2$qU7%vnf39>6L6P9Zz@6UVGV90R^ zkHh>~9r`?xRRJ90rH9@*p#~mU%fK~Kn)zpY&zm(1Z_$!r9rsvvF-}DM+L=FjU>uT} zy|l#=d|`w9u4CKlpE@(tkSft2IWw8qccM-S*HMFFXakdK1H-O@Y>0TitIM<6WYish zMx3>Mw`id2j@6A1F5OOI!D=42D}d-&my8KsoRJ>lx<29R^j``!BP}1wehk$8p7HF} zQo`6GkLGKe5M(j066dJh^hfJcmn4tn5}`{f{qABALLhQv$3OZW%|m0^!|YqXYu_@j zHu4P-?#(jA%^yRC%EOF2O0}sb(-GEgJK&<2-NYJ<0nUU zbOyxjj@{UK0qilBL=eUq0&Bf_$QJxjON>3PeX3vYG%+&7SeL_d%5Y_#5D@u42j9qx zU6Bt#9y4SDs5SqEB%~-mOt9I`LMwT&V5L29vqWcN zpJ>xV>~ol<(y3JQd%xOZDXay}gcjS#QQl+)Dn8J?Do+(P{iOz-+J&U@$TW|@A|;>$ zN&6)m8^33Qd-0)23>Isb1^6#@iN?N0X2{ceQWfCyjq$ZUW=U+kL0SBU2g%s$* zVdT`e7h!Mf23lEY6eDE@9ls*Ujuza`Jbsjtc5vyY)qTLMp+7qHAN@~leDbIqfNF|5^%_R%bA0H48-V#=(_&?`b-BfC;W8CM}< z$5Kf2_*(GvQ4|2@Y+>H%0sh|S*gq<}0;rvphrDTb@}va?GK>^X3j}&C)~y20$VEcZ z6Aw&k!>i=O56B7>cJ46LGqzY}r@k`pS{ewht~6Z=wA=okW&Ze<=p@`MPDw74@ff5qzwZhrBLQsywR53>hXCWg zB0*f{k+QThYedl|!ID7WRz!dEXs#*guP()9(V5ucD?TK;(C$|-juWBQ8L4F_qeH8S z62Aa!)otr%5RTB^_tg(li8`r1@>pkG-#$+2IbDqSy>Huy&gZ|o2u zkd8uuY$szh;~4)qri$P6dIA{LL%a|2w&RKgPcFgrwur_@5o3-rzWk<2h6irJ0^aLdXr%jqbY&w%{Wx5Yda=ddV3)ab zadZ(tvNy&f>Y!0P+*1uV+Uj=B_!dOc2^Jnz)G|gKIWk85u;|4|Eq!`=acm|Vmi~OA zQe5wA%-^}?RE$66N50YVnDeP7l=$@SnVXES$Ek!Dwmqi0))9LeS4RjC7|Vvg8HG>2 zrQ&1tq{H&)e=kEf9sH#!4z({oUaAou#jKJ;uW~+{CV&TRCzHmuJQ{vSq~wak>nIqn znG?H^nqa}a5GYE-i&)bzA^%J?jJ3@%o&~nlgRy#@sm!(3Uh~a=wJJvivmfvCf}TH8 zza`X|e=vSxq?)6N$nTErD3eYpk7YIH$~@m#M{0nZ=PjbOcdqp$ls6VNqhyo5KY4XknKV&5RfZ+sy681ONp>|k)6&wN;B3l9~ zk4u#8Fe_8ppmXW;^0O4AcgyMz@Sw#+T71`2ov@q1$CND z4!n-J&xWNN8!`-6VLg5tssO0vth=-KXYTcsFwkAH*mQ?`@K`hSPab0iG&5g{qS#yr zR*eeR;UpxlzH=??dH@8$8#wf9p1I9oqGnS8U?HFcg`39y>vrL|8cZ9DWM@tFxl4I7cfg7uE8+0!t z7ej-<88Zhs$FhZiPS`th5Sg|YLS8PHBF(}fTfUTdZDFy4Ul&V-xV||AC^NjJLKFhK z!eb{t`%t-g%14&$el3SpwF0-Z`|>OI=#mk7Rj0llIVkS|Ol3rJ2TFazB8+Lgm;ku&|sJW8D&q!I`W}Pt9Pxo&I4mo^!e0)2M$n+yIT_%Ji$f zi4QcpA-@eO8g7jAU|7ejlg#EHbDdAs{p7g|?KCkjjUFbo){rdC#B1h5A%F7+9;{84 z_K?a%o`w)J2ixu_tF`$EDl`SiYYP{OR1|?_lc~T{@H`1eyTZK^Vi5!J0*!uj(ffTtV9k} z1n;g4{EigqK~1$Nt02zVAZ%WW1>*kqPgicmCqYsVvfFa_HzNu zPrxy+&jN10$Ic`%Vi^B~PovMJOrBhLZF?RFldq|XUX8l}uxp?<5yUbo4Lnt!yVa=l zzNwDkIL>T!!au7SY?ofb4O#n@6~w!)jyIr>UHg6Do}?JUvD*^5@?J>2S{gz4?ttc4 z`}~GHR_sb=E6w$CQw*mv&Gzz22vs5{%<@de_8 zd;21LX-sB9py-gx!cYRY3Vi|Ylhdv`OG8%FZe&J34T0u5+49^Xi}ouKAzt+_qOO`)6)*ODkupK{hR#ta9ZVux<-_r)W(0KAn zZ#M!R3vOUMzAbI!({1=RZ!kNRQmd!_3h@H1(08TS0&92F45|Pk5ge^d8muxE}_%%wFQf{o|}P^`$Kz z>pPb+_@OaBJQKk0puDh#AEuUHYhZ-k=Wtwo zmw4@w9JCgE(9iwxibc=rApB7^=KbYCse@stpC1}^;;S3ROS|egF9{-x`=V}fp%SRmXtIxvN&jy@(YOUG0eRJ83`d@IgjgBS+T-cY1!7M^`OjI zOa=CK{M%m0Pi@BEJN@Sq_#S)3+}3J^C)ip_TknA~TP-hJa6Iy?)J)BoAbolc^_dLk z=7I{P#_(;QZg;=Nc2&Q-2+8q!H$GR5B~rMm_uv!4Bvv-g6#SLi<+@m;_U&)wBepX` z{?#&zKy7)Q|F5UF4vXpyx4-F@Qt57FXz3h5Iz+lbMv(3pxt5?~TO_9q#qWF(_70t@VCQDN_(-MOFf!F6gNG6< zb`xaP=zlskVZ*whnse+FDimsle!UdbEyuOerXl&8q58UXpzfnX*p)f|TP3HN4n+=! zIt^sw5(BT`E9$3u_|tJZb&dHGh8j;~rXM9;txm(kMt#(O2Au{V#mD|b$Ox0?tIYs& z1J%d;%%a|(&dm~P?q*`S&BY;PA1(CG8zd)%qEe&nT&QoTUS!UK(0h5Xsi(h09%|HJ zA=*tsl++TJnN`2@CQU+iSPQQ{#e^lp5; z&qTWbxkta?|HW#U1$iGkT!G_Bg7|4&bG?|iwbtJJ5GVAcpGxmMEV-UHc=IrYvB>Os zBl$Tou<5zMZI#a;A=R{zs{_3P#h4Iu@(zc9IadR(%AY`PUqdIQ?B86AH-B`bO0F>Z z(BKWCF|%1EXam6F-7xcskch_5_FkW%LtW@{z4)wVYw9uWc>fXRq)k-%5Wt5^e(Ve( z1#ijUHqPNZX^l3&ioDx4$Y#8nX9^fIpL1r)jXHFCJ}a>p8NzA1fcUv>I(W0SKXvZ0 z@%EhWGW=fP)ZucVr!Dr~F{_i@Kgxj6T9x|b8;gpUZ(zAdPbiXztxr>vfaot9F5d%( ze#hTej)_RXsFk4m6yzM$htTTOG9n%t3bK~N!ms`A{!VgClI^N}p0~#^8+!Tf4igm- zkRa7W;|o!% zp!d1hb9_(9Cg`xG${itjAbk?+f~8B!miZi9A?|0a29({_eReevWY^Td@B8Qw*33CE z+v_Pp^a6or%QdtRc!&NA?P*P=W)s4zvcb9ZG-nh^H|W4pWe-WZuS>XjO!;aSOwQKw zc9yP*#aQPb&8P94i$pbXfYLGHNXKcV>_ak$-Tp@oL-c!(l1fzCbsH1to(ZR*(&NSy zQ`m7a0srAB=P}8pN0mtO-_7%R5ZM6U1B|^JX5AfdOcCJ%G+>FZ(}{^4=Vubr?`B9+ zOSs?@*`JD=pLP~40CAQAw;~HoWf_B*guv*3WuJwvWB9Jj-Sot;J}l7fHX0s1GFBGQ z&+XwzAfjP%lUAng6apCD-&wC69dp* z6WZR7C>Xzz*K)DgOge1)`ah4{d65Z>%B$uoO@1Naw=yh9-r?<^y`P;~=N>iC-f9&! zh0l$1PUc?Fgk3;8ouzt@YQX03GrJVX$g~T&q~cqMpqT%5il~U>q}3xXLonj1^lBOj zTkrhHO^mTtsm<7Pw<;QisQ5Cq{)ng`pvV{^$!N~6`SXfd(7mO1y85ozz_9o74?zAI7_U0bB7$z>YowCPuTH^*Ak4?|tG2W`)F)8M(p3-%f z#9YChUrGpgN11)p+1}=I)g^VXfzbNS??>0$%XsH{p(Twj1nEFM6sT)A#HW*T9z!oN zel9*Rbr|3cv>6VEHOl2S8XoMaPM5ie#QwVX(pZcM|GB_|*kO_*e8ydz4P*m9k}T6oerAIvZ?GPP3R2K+YPxbS9MwqSj8=6Y%4}$Z*&79CIOm z16Qt+VAaeuxt; z#3^1%1Gc-FMe!`A&&1=e?JZ4q7MrLiWn!vv^shaarAY|rZJ8i-aV#RNL%Mhqk;N)j zuBsK%0<(a;WH(*6>@mZP0@%apu;u%MOqu4o zm9DssJr^sst3(~yG-0v9Gy_8#EgPK>vykGgaY@zD=FS&c_fzMWQDU@!lv=KcV~ePS zTa6m_=HOvxGW(e`@hl7`{bTfdilN*BDeaiXSMvgRNp5oed4jmkI)wI~tQo;vuKFou znB~g}XxFRsHOIAjxYisB7OH|W4Cw1WF`(yER~ka)lCW!xpk7|bv`OJ z^C>~!Sol-GOv{QWDTk6u<$HLng=?)5)FzKTX+JIg58(_oDOqCkt(jzbUIo2ibegWBj0cC9IGAKaKl*j=Q=Ct5rbj38;9U(gWYQ&ZxRIzF9 z&@^@cY0s#%pbxBW8MjQQt5)*F$ihz@SQVi%@OwWvZ1bs+-$kMJ%8?4-^{4jgrzjDI zOXltX+L(aIJ8ig5rP!Z;uK5-otS6|1%?HsM<1MYQun+*?B8|$bG=4sxHoQUpR-*A% zO{-?C8adJY2Pw>xv8m7A zsu)6SNQ?m4I}Fft>x@xc{L{fC3%3Azg2xxhke#fmoeVm*;iAcwN2WNl!HZ!*ymf=7tx2#^3ty1U#D1zdpwZ!6acUZVutf@ zHkov{GMj*nI=X*7Nl>GTznrgf<#$9)&Yiq0s;sK%G^#}TxF@~!D#gxkve6{jacL`$ z+=Ci5h>l;~-I#B=;k zo_JQmcmIR={vGFj#=wJ{{}{?3;IpHb=?G0pmkM{Mjtc1Tuv}n3TfEXGDlC%MGEr7? zwQABtcxaiNM{xsmE3;vTW8Ro5^1yxUY-D{59i!P|6R& zv0h@*A5X{t{nz_PTdLQLU8|R`_A^?3pOsgoe2VaAI*j~OM)Bzy)n`x#PLnKV1dRJA z%zGK~1%M+Rhf~EDe~A-D+z9a+YVVR9Kn_-d1k2V!Z@4BmI;W{30(>VDFk$JQbInS4gf+F&1<>zV zoL&D+Lw7yn6i)uZZ+<2)pP*ZTn`WZ521DSzdV`fkeT(YAX5S@VwBU8|2o4S9n&zFC zjoHv)tB~gNn6)f#>+_A}UtUw9zk$B2l(`u>pAS;fT~elQGNi*{i`N`qhn(abmm6UK zC9R=VFFT{+9y?u};!zaz-WJV~l(LtX9u(ZaH$D4s66=Q-mXGS9V^oaK_E zx&K=nr}TG!ve_JC)(m2do4cU#ywEo4yuv`KvVx{Pd3SuS6V_^zTa0yMBm0FUlp!iM z=v_me%|oH)cyJ5t9m;9M%Z%#nhlGM641>F8%)2l946jg}il!NBFMKI$tXT9c3KS`= zyI0hR!)CAXHXzn?y85bXbR6XyAVB#B#3MHe+|n=`1lWyDU^*)G_IU6QcOE6G|I_|I zHdP!5L4}su2-m|v8%dz&`f(2MJI9NgjOF#J|ED`Bc|G8U>sQu3S}>$lWcI4hEssK- z>DY{O|5tV(4d1;BRfhiU#*l7DuE}{3>@L80#4+G9p{eSWVDgD!10HqPz z;#&-RdD!RD=H&8mNV(mAmY=Q&%;Se05-6ZYT;<=)JLu@i|7jj1zK^W%R}(bqqO>Za z&Ih|HK6(Fpw^ah)$GA5r1wTv9oabb=o8SHk9p8(wbSBgRq^x9qig9d`X>7AN|YpyohvOIv}C^tO9V8{VPU zhiPM#R~%1L_}jw|O%dOcW)2%SIi|89n73?>HDFuZ?*3 z4r7wR)W2by1$R}zZuMa;QOP(H&BciH(0B?b4IlKx#|%<(DBN(VXCs*6iHpx0qL05|mO1xZpD81Q|hPaJR(kCk7 z@u~|m-n*Its$1$9p$xCR0U@$hJIPjZBAYp7HjGZ;@uB^$Wb{My*!$&nczix}?w+vB zc8sKI|1+4vmVi+8n4Yavh-~H!hct3nD?Q0kOEoyBp>GP$s3bNQ?c7cHqH9=7=m(Bcyt+aJm zX5$50+`k%PlQWIL?Qy^8)6ZP?Hr3c(C+4+Fjq!HuPmodn@bK+EaSqqQf#i^6_j|=D zhDiJ8y!@R3vq9C5PEDFfmZSX*U--MU)DmX_qJwn9@HH;esElUI!@<;&%{p84axc9O zr>1ZGJ;Ijt=ofjk8$v`&8GIY4m9QQ9xGB1I>XzOqiif@A4Aqyxp6I86|4?|r(4_Ah zuN_M~x?%SUmFat#ODh>Ny(sx0KqjgBdCinvczg}^5@48nkC2O zdRGwQ@P6xVws^t(&ze425@n*0eZ<&zQZ=||n-H_bo52yx!$xMIp4OSi0Pe7z&B5dy z1>U~_Iu?#ideDeQ^)94H=Aa)7W(8^V5~_V#Or}&61C>kE>WS|nBw7ZXFw+e`C)wf^ z@JnuH$09p(QzRx&3~EG*HQAVFJjDT-sOwtB+0J2mtTfjOfLkCi?yGr# zNzU7Bs3NV_Qb`G*H%3D`FDbJ!1drMwxJLO7AXB+__O(>mNXw|}OrD7m*v_KRU=+cw z`eW9tPI8V8X}qt!zzP@m!yZvLa1L4zOH)Z+)C&IMHR)YLtO06fROoNT6n*vEfu5y; zyhrqa+6keUU1DFGEPD5*q6Ok1vsoj1oB7Mv`!@w|g+j*P zE@fr0-SVxcDJ}lO{t9bF4;r2ciP*>Tj+i}O9HB%qbMHq7?8)L7{|rfquzxShV0v7J z9TXbu9ygZ92X0iiLdJw2|G|8YbGJV}sT%kT2=fhWLL2I9`(Sr+r$eCd+x~aaQLS1c z-R(o>l90ody^M;W%!`KOxt1%hDee4sb^Rx^*}JA=;(2U?Ht$qot#>b_?+=2w03@1) zB1y4o16p_(Tio~svstsA`F^%kB;tonyFX20q>bx)2c7+uUL;al%bM@d&)V4i{q-de z^K}kPyT3|~l^a+q{j7oTA?^*lA*-F^B~uBxcAxQk?Avl#kGBq1olM;A38zQ4^pj(A z>n+IdeA-4_@ef1s^UUfb7PAQ#?32NWdBJybs4D7eM8RKAjhyrea-zNW3%{18DGBUZ zIM8$N=W$E{aoYMVRZ*1wC9SA-V}zfIXjY*;+y7C|bedZGv&t9$UozGWIoz{;`@wL6 zbDC$c@~`63W6{bXi9qwd9<&(>Z++i$1~B;^u|l>jr@d!&L?9U0EN#vN%-EZx6^>DY z*a2`xeXX1?nxuwI(68V~Kd>8ng*C&%4c;(rw;u{;`po0BH!_SztMg4XcJ#k>I3;a@ z;h**|yOX;%GB>eu-hQT49g`S*}gk>ZeJ!vQQ zH?k%4uOG!i4UqV_1TpL;uY)yP|)M z=I0`pr$L2%9%p{pzT)cP78f9EhOXXu?1Nuq3+0SMsGzh_+EDBwmM}0UPd&~b(e zzr?I-)(p9DqeMBMeO5%-%F@c2joWX&U_-a^gN1z`@|0bOBF|+p%dBK1DHApK2>Z6( zx%T8=Nf$?Ow)xC@p2;&#CJ78VFqlPk*jj1$iwb`*&LML&!)P>ApzkDj9?60)il4 z(t2FvX3spP@e}W@2SQrASY+(JM&MRS#&OB&;}#q|-7%(6&pO#_&FLsj(|=A-T(Dac z%)lK^n60`C<7$`BWQ*1x!4zo8H>b(d1iwGF8I17m-|)O+m0=iaB#oSTwmFI(=1sl& zg4X`@FJ%QL=}X+-fm|CK)o9>;>hYwqaLLtkvT@CgCP(QCgM&m&dK}xFhGON#Jo=b? z20y49IOVA9%I@mM4P{Na1ern?UrY;XmyRY%-lNRNT=?&C3G$H~A5OO=tebsCh0-$7 z&81%5lGaP%#B?JfrNtKf`n<_#a}k}!`^a^a>+`E9?b@av_bG|$qMh)RcfO#9 zm$MVJgRXmBxtD+UzA)XQNIkvNzVXCdpI1w!Y#~&<&N)(jwf)ZGoaw>$rb68da}mT7 z_Q~~Te8M`GX0%&tVcZK-{=YYW#x>K8HNTB{B)AoO@abqp3s=KBaK|9oi}+|kA9*IS zFHDC?!@FRoV@S9833={Ru3t@MubFK0JR(wvSvxh}o8Xqf%Ic0_b4+sUqCh1VWK0U` z?*XiYvj4+SslXX@pa;m9I51j$sp9{`WW!0sBAqRYyYEH4&#D3w+5RPxMxAB@CK9M6 zl8~>(`7BFvo1sPJ6^|=%{#7WggsyznE@`gJY?4{^2Sa19jN=?O7~>egiCb=H)i?E? zNSXFR&xk>BkoAvlJ<=jkBP1inVL@^HpJc!lzj^(xzz&42?NaLU<1dD{W58Q>B3WG> zExydtpB_-=^j5#{BO{2Uc56@*{KJeP!}o8=cd9(Jii63nUSurYVDqGBsnI7 zHm~h1%sOw%+hS(LSnXK4JXyK1jFi*!)xt(0ViU$FYK(?X#fgxVJx@4}4-#Kn4Y%?)fFj zJIYX~|DI`DWZ|UsPN&*M zy?k48L&v6|9;K_nNB!shh9n;^cICx6X(xKMsCxJN^#v{xjm;FXm!Nfz9>USISVsEo z3;4a4guG>;en!#lboiDgPa*obN@5oirT_>Vq;%_XDlcbLerQzd;YY>HYhQWo?ypK{ zD#ZfgOC(N-;Ln%$ID9bc2*%Im@}8SJ-l zix{l_(i#}^6%I&uGZShfwkFXmPu(g0V0(|*UrEvBG4&{U%^o6W4_=GRb!z&n@ox!v z-=W8TOKTY-{NRtpHY_}EA-|OL;^xDSCy`{7fYn))u|I@^7Zs?%q84Tjww#tbNFC@n zuuhw1)$nXe7{;Ww$4&>DIBAb@PgYYeM0YxNhwrQ zdJCZ0>rZXvfL~b>RPK0o)*gI6!TgtVKVy;^MKnVef(Ob=9mizMRgjdnkfYn}cxVj# zS{sn()I8>jqeS9P)C1N!jl+lo1?`q0v_(-Qw@yk+-z<;>dp$34TZy-Vd_Fl7efxyy zcwkcjeauiek6h0rrRFYzgjIH~-^5x{`wf0^Uv;Y(_$=c%OUTmp2{gRzByi{@*0=J(szL8WO>Zv5|Ib=|!ulaqH^^tfjGc;g#CtRM^ z6KvZ|_u7ek{ry`38Pon4Qmw7LfOo`*jUj#vhI|d5CTqtJstbp9_{R@^DW8u9C1(V%CW{c(DLur)<40aJni3i`SRXf2!JlLn z?B6kL=bxQ9-QTY<0&-P*DtTt(`mL#7%XY73NEY%F*b6QQRr9j0V_w=Y6jy2lu`oVU z7fVGql+E;C7p{EJi>s-ydL-(3O%*+!LKz$gq)4Jb_|y z|4-jL{BAP^-eZojDDc9o;mT6gCk$FHr%xyb6$vRr1%O2Uh%;Y*Ph)iwI3f+{pw(K@)EHA`BiM#aE-{$aU_KX@Mjiit-pQH^+1DZW z^BH2f6J5!*ksk>O1qf|v7OW%O56hnCyXc$~x%&>05^dm7_KlCqY?fa8NN!8)9*0h8 zRxyJe8zHX|>w7^e!7gjBWxA7;KT&y}FwLk0|FO?W88J?~stbz{SD4yrn;PBQS>p?J zrXgrf27$-h2m$J%BSB58#7T#8SS9h2=bmi7CVC7mwCJH}-+ew+X`M*^WpI#xH?Hs? zjTnwic#?;0s*ku4!If$_0$d^GZ!WIfl-FkV+OVr+julYSP&CMTB+nevSW=Ctj(OhN z*G=<(WTVG2l)Qq%CIIF?sn(BKWrEg#;r|yXaYFsq?Dz63{B&n{vHh_YEEwvf32}1v z6F~o8VWkTtCn-bwX3o5UOq#-|zzP#Q;r|&{@WdW#V)aqEP+O5SC-6=js^t+@yk2(j zzhY2hPyEvx)mZ@LsgyCadlY3i2v34!!y>Rr3vXJA|r1Iw3iD7@OfuR|Q)W{R)!!7`$d6 zD|X80_HdnQDoG;QNZC{Ipm5spHslT2!?iuvHJMj~O4|KbF1YOxm$m&U98ZkZ_@r+x zBFyB14gJM`EH5FK9^)miyWqaYD?9HhD`Y_Z{)y&0=Y+y(nXlSIkyj-jTX8FJkJZu; zbn%-8u3GXaM4{zRsj8+rIFjHPD)wQE8=P)8>0Xoj>2_QdhS(R7RG+<%Jm|t!+Al#h zLY~VZ`I7UD5Ezhvm1WmFgsxa_asg#X`oKQ$Y?RMf>`j#Mdv64B(?9+sm*Fb4#MHUM z9ZVwLr)$G4%4y}bE<~CzP7THgRwMm3wjxc-@mH_xkdS?CHh^>~?SSPia>YOJ`4yZ0 zV?^aVrauG(7U~Wen8S8Cm*#RSOI*ZK`8OXO2iiC*JD1ePq=(%MGBU-rt(SFJ2Ik6jTHPKTrm`ysr~gophY1?{qr=;$L7$zZ zF5;x;yv~qia#|^vdD@=WW+|^MjXCuc_X6t4_NyG5ZV&jr8YSyP<1g188#Q4OD8#Po zssUpIKIBlCX+yf(CBD*kRr-_gHd6!$@j5tg!BQ zg%+{p8cce17V{#XJ%Es{W#f?l9H+sx)$(cppPcK`{w!?x{k$v=m)gp`9h=m&+F_0* zpIh<{Fw8Uv!Qr9=^R5tRhKqLvGz-&-^}9uH(JWWA3oti6l@{-;Q|k6oz(u9F+LcZV z3BEE1uCmC!Lk-x=TZi#AoiMk3F^h+u=>^>~gCJu!3#{D7GO_tH( zmd^@i3n1yKkac;EdZN4_cA0=QCz)Bbv3A@S6%`xp5iVn1 zZ*uW{T1!1Isc4GRLmhwRyDOY5O)`Io0G(wO-V5G>{@TMO)@!BbAKkDfnj@dJg>k7MC%BE-)v`~`bV=5Zj>;fa7xFRNgf+az#V~tT zIN*0c*yHqQ@3qHkwgXQ1?3v2H<(U6l$=y#^97jpQhEFLU@A(h%zeqd5R?av4nF=bc z&!|#8ghBgh7wcY*z~+ubPv4 zlD^Cn49(%GG6KKj=m$O)waaq$_2=}p9rcU13S}$Z_a!=Zs#X_|_$m8z z41JxQEdQQ|X?lBM8QB=}E9Yc@SZqE!AvFGBeHcIq0o^l&E5oj35&IjWWSCHA5oGAd z-?In?(I)h@(%?4J#KYjm<-lKRs%YZ}D1g*yvR1!AV-a@v|fXo10B z)Mbepj?W`5lLLO^B?A%A20!LLA?0dU_)?R1uFpcJ$y97;x=)P)a|UMZ&IB{?k(<_e z5=orePTSm*(q5@0dKW1lgZnA>3csNEa+o_FVU~$liP4~-Iv~t@tt%E4oa*^+yHzAo zsh?;F_{f|1BG*UWfZCzJCw+iWSMPg zn{jq5Iby)3=Prmyad4wvYFz3Ez2oTb+@i^wY>%_K5Y?+HpCOXDN2q}?@el|Cz)z?5 z7^@_NQF~}D`7mUoc}Vg?j95@Dqn+T}hAiy!uM(_p`?Hgms%2xUI!fm(s#!=PMoNQx zfqck+jKAUzCL=mjdz#WgYilb-w-4$b>pLOpQ((%E%Z~?4W4WN$a8d)8BYVnC(shn~ zbajfzjG#^X+pCkO)CJuTNKg7>T04(?DQy*;l+-m>Uv8MZu;Jln6dLd3-F+d6N*!{2 z_}n&kW0CabG`V>p^a3P@r-_wor$6c1Z!&Z6vK!eG|8@|WFY=Fzny~5j zpQJUl@C^ZW^+w&Lwg$K4HgEk23x$p|qKO+n1u$?lpFDU|W6SKd95x0L{@5aW6!sgr z4~>UyO^eve9OR9x1n6jMKXyDlw?93SH4Z-I1f!pqr8{iFNFf3o0!19N& zu`^?s+}Z5l0N4n1g-cQ)6hJLB33wP#oJ!;=|_3kJ)wD`8oyC3 zs$Z;&+GmNFntI(9NiZ}{3y!lO8zq2`t60u>Tr$6cKTBi#|58ic7|N( z2%Dq1EM5>dr8=AX8#5TAfs8G{X(doWba+CYDpcT;7&ck)UcHiROoFp4SQGY!lEYPo zzX^q(zRWi0B0%c!&eu^znvO|x+05nYoAZb}#W_iWUs3=Ts4*q9X)O{3z*b!p-Fb30 zJBiI$GavS4PZwX%_tHi*Qiq6orLncrNX}CF@0E;Vu zzw1AH5bi;+!p7>=?0<9gPal$&r|6Vv+Yh{oO(<3)RQKB4pMo)*Icg$!)gi$%RlfFi z{zZG_^F+fDQxcEKvAQkAOmipJZ>RQef1dcqGpddm!9aH5TvDCy1BqN(_#fD1)vXE7sQ zmiSbuj$TrUOsq3QgN_Q`eLX~1<=79@OAE&n4v%$=;8OljY8iBgJ@0m>%|12Wjxpip zJZq6mPqdyxasZw#F7qHwbB~~=EF7CAgpt^%-fg!+IePTon&ftx*h-!mw~MpPJ3RN{ zW)_m!AIy@G+eaJz6{G;Mn&!ook!Sw^363LGP;X+^RP@@H&J`VW54tTZIk8@kdpGarBIl6A2Xf8z=|}a{y1=^ zs3$!*`MS9hD))$Fb?{^9@s3B${w zb;f-5*3P?xII9ylgzUnJRLY3C#Y%`rL4!I9i@voqR(82HBZZ3lDh{6RMxJ!Ba0__F zflg{Hazrc{nU;1??~!l?vEj_!EVGaRY~4PR=Bm_~eSQd$%upKn|$1^@M?1dbWCFi)?ug+F+;YMzFw7e<> zmLtkhkP2e0fS*hKSCX|oYq)FFM0^F^QZNpw6%jV;{JN=6yCxbR8>G}}<-9%HuYCoV6o<%GZqjf?zTZnf?iB(%Ie} znW@)c@!?NaJHE=Qv&02QaM7vyewoFTy^H1DuwdxNm>uCNFJVhO0lq0QXKmjd;R~x4 zUAZj(-dZZk-qKr|r4NB(GWm?_s96=7eh38|8jQ!0qrUXg-!~TAw9nxFxo%6G{~Z`2 zBS5+r>=-X0ihdpFSP$ss*^A8cF9+md(GZn4B(G30`8-*dL{PHztozD-;`3?x-Kif) zL1yD)^U#1yP*60;G9e9Q4fkgYVC?*_7-2&FrTS`G1Wu$biVld5nfP~2OP=Q$f~D?* z;*~cj!VoQ1SMZL_d?nniwX~S6H3Jd>qsQ$S&=FkD)%hg6SlvrTgdH#+V`bc2H;#;s z$ zR^*$mv+womt*iYar@B$x6gYo9yiV?k^+4-^??C%;4gKae@kxcRGO-^5%5`oulIvRV z-ljATxO|+>eOFB<_jKmUEgCqisgl;&<_yP?hoQ62tDqW5^Ic4{?Ty{Ak8G%SG0M_7 zaKwsMxH?=advM|yh}Sx0UDS@{&SUq&%Hc+_pbwfqK+|i!)2B#8hUG9`qe`JvcArajvp&o^e~;;Mg%VC;{wk=f zpvYX3wV)j}qhcR&zZLH$w1njqhZEMunHZGl@_~do2>>GXh~}UQJ9i>a&aw1L>c4 zHU1)`fY&Xku{o%DLH~E93v%o@F-fJ~*^9sZ`jZ`>Z)S?MYhbQiYt7>=@XRr5dIeS$OQkcNR)+Ty?UAG*a-LR=+a>b<{;M<-$0?5 zm=l05M9jv>W~)jpEBM{Y&WgiuW3p2x5GJk0e6GBdk7dmnJh#d*j*PvXwe4UU|Hk5A z{@)T9bY;j`o&CTbrVlc*Lk8yXJZd;w!9_9PX$iqiomKqpRQCB%3pgsh_?pwio?@ga zQP?8a*R(7{8y(n+r7;0yR5LQtp+9{&fA2Cx=+^gjl7}Ae4s_XFY8%1OO<+}uFi=Gm z;ltf}8NZ}p&cTRM(J1WQK>PRm0PMP^iQ}UWIO{Fw!M-$gE<|!+ZVfnTPg-a~2s~z( zEa^{h6}mt5^XclfZ9A)O1h1a2Y=Ki?0>)ySiG~1@u~Vzy)v*m)$PBgUh|C>xm5Ks- z6Q&>W@St|%jW_TGw625i=L{ni+8cU278<p*6a^VhU(N%AovqRhq*S*6M>gFv78VxPOw5I;9Zge+@hc%&rvFD~4N%;Gprdi{1j8R zk@|GravWVs1B(tkgCjAqU-|NRs6aT{?`bUX-%}~lpVnQLnC?zDvHMuvD>x6a2XkeF zrF}&0r8?Gwe{s9L6}Y(XUnxi3>Ei$mFi_(dE#H#TtyY1|U9m#2Nlozrw|H+{F)Sq@ z-!LCxZai@Tw879#)Bw(B-8K0xtu$DwFA6DJl_JQQL~#SPUf||Ol5-)lPATIEEGPJY zH|C`94izr>_byyc1(4_2W>zhfY;KmFXyZ7yK!3EVuKRH}?1$X27Z+;|kU4w^4_+!B z>+fw0k8T;t^>rF7m6<1dWm0=w(h|))Hgz*h#xMXdFA4IpFe4t#-4*l^MLyi92WnD1Zd3$s^*MKSDVTOZ_wvUkt6>C@M1-9eJ>f z^?(@}hMKC7uc-A#q*J)U2|LHR>|$H~h6(ZDjK%vdlC@L{{dy57f?Fz?YaKO79*-fF zHC6G2P(xfyPE5}y%)JT=mO%UxI2d^$E7|$w*$=v$m#vBDL(zFe=;s`21EfXrBRKiv z?9b%;y8=owG5dhi6ZupX?;}5BHA}sl#(qo6U(BTu`Yi&jsU;s0AFjnD4bU;{e0A0J z>S{|_yzQJiRKGM-geGik9Wx9Ey=*!i*WClNHRhuO`gju_Vh2mM56RgW9Db9FfjT22 z8(9JRM&(R~mZF>spZR&LDvcLS2H(_@S=#=n!>nLgvFjCKtz@iyVTnV#EgM9b2L^TC zU3M)@^OS2_nz&ie(6+|B+*g0*D?3HL6?B?mc%QLI1yyWflW&c&d+dojs6IjG4!b7X zX?jn-Ow!uFawy@+X8av+ey0p(2fx^?shnRr!+FSxT@N9Q{q76Gy1)Z^9s6Q*)ylQL zMSRE-b5gv1NK6{V23|}1G8muGEf0n}euXTC{n?R<9BD$caDDmJHwFTycm3;jLCC_| z{dcwPVjh3P?x6r-*C}IF2@JG?=t7_Gc^cg?#Wc5t-K(fjx@(Tze>$^gWAj}usXL9v zgii(kzzfpKiFWySmCNFd1zmJo=2T5HY0ti+SDD?p4`IyumSBr_rjMGFjHdclOR@5e HRrvo0@@F;a literal 0 HcmV?d00001 diff --git a/windows/deployment/update/wufb-compliancedeadlines.md b/windows/deployment/update/wufb-compliancedeadlines.md index bb088093c1..6524be0563 100644 --- a/windows/deployment/update/wufb-compliancedeadlines.md +++ b/windows/deployment/update/wufb-compliancedeadlines.md @@ -1,100 +1,173 @@ ---- -title: Enforce compliance deadlines with policies in Windows Update for Business (Windows 10) -description: Learn how to enforce compliance deadlines using Windows Update for Business. -ms.prod: w10 -ms.mktglfcycl: manage -ms.sitesec: library -audience: itpro author: greg-lindsay -ms.localizationpriority: medium -ms.audience: itpro author: greg-lindsay -ms.date: 06/20/2018 -ms.reviewer: -manager: laurawi -ms.topic: article ---- -# Enforcing compliance deadlines for updates - ->Applies to: Windows 10 - -Deploying feature or quality updates for many organizations is only part of the equation for managing their device ecosystem. The ability to enforce patch compliance is the next important part. Windows Update for Business provides controls to manage deadlines for when devices should migrate to newer revisions. We offer two compliance flows that you can choose from: - -- [Deadline only](#deadline-only) -- [Deadline with user engagement](#deadline-with-user-engagement) - -## Deadline Only - -This flow only enforces the deadline where the device will attempt to silently restart outside of active hours before the deadline is reached. Once the deadline is reached the user is prompted with either a confirmation button or a restart now option. - -### End User Experience - -Once the device is in the pending restart state, it will attempt to restart the device during non-active hours. This is known as the auto-restart period, and by default it does not require user interaction to reboot the device. - ->[!NOTE] ->Deadlines are enforced from pending restart state (for example, when the device has completed the installation and download from Windows Update). - -### Policy overview - -|Policy|Description | -|-|-| -|Specify deadline before auto-restart for update installation|Governs the update experience once the device has entered pending reboot state. It specifies a deadline, in days, to enforce compliance (such as imminent install).| -|Configure Auto-restart warning notification schedule for updates|Configures the reminder notification and the warning notification for a scheduled install. The user can dismiss a reminder, but not the warning.| - -### Suggested Configuration - -|Policy|Location|3 Day Compliance|5 Day Compliance|7 Day Compliance | -|-|-|-|-|-| -|Specify deadline before auto-restart for update installation| GPO: Computer Configuration > Administrative Templates > Windows Components > Windows Update > Specify deadline before auto-restart for update installation |State: Enabled
**Specify the number of days before pending restart will automatically be executed outside of active hours**: 2|State: Enabled
**Specify the number of days before pending restart will automatically be executed outside of active hours**: 3|State: Enabled
**Specify the number of days before pending restart will automatically be executed outside of active hours**: 4 - -### Controlling notification experience for deadline - -|Policy| Location|Suggested Configuration | -|-|-|-| -|Configure Auto-restart warning notification schedule for updates|GPO: Computer Configuration > Administrative Templates > Windows Components > Windows Update > Configure auto-restart warning notifications schedule for updates |State: Enabled
**Reminder** (hours): 2
**Warning** (minutes): 60 | - -### Notification experience for deadline - -Notification users get for a quality update deadline: -![The notification users get for an impending quality update deadline](images/wufb-quality-notification.png) - -Notification users get for a feature update deadline: -![The notification users get for an impending feature update deadline](images/wufb-feature-notification.png) - -## Deadline with user engagement - -This flow provides the end user with prompts to select a time to restart the device before the deadline is reached. If the device is unable to restart at the time specified by the user or the time selected is outside the deadline, the device will restart the next time it is active. - -### End user experience - -Before the deadline the device will be in two states: auto-restart period and engaged-restart period. During the auto-restart period the device will silently try to restart outside of active hours. If the device can't find an idle moment to restart, then the device will go into engaged-restart. The end user, at this point, can select a time that they would like the device to try to restart. Both phases happen before the deadline; once that deadline has passed then the device will restart at the next available time. - -### Policy overview - -|Policy| Description | -|-|-| -|Specify engaged restart transition and notification schedule for updates|Governs how the user will be impacted by the pending reboot. Transition days, first starts out in Auto-Restart where the device will find an idle moment to reboot the device. After 2 days engaged restart will commence and the user will be able to choose a time| -|Configure Auto-restart required notification for updates|Governs the notifications during the Auto-Restart period. During Active hours, the user will be notified that the device is trying to reboot. They will have the option to confirm or dismiss the notification| - -### Suggested configuration - -|Policy| Location| 3 Day Compliance| 5 Day Compliance| 7 Day Compliance | -|-|-|-|-|-| -|Specify engaged restart transition and notification schedule for updates|GPO: Computer Configuration > Administrative Templates > Windows Components > Windows Update > Specify Engaged restart transition and notification schedule for updates|State: Enabled
**Transition** (Days): 2
**Snooze** (Days): 2
**Deadline** (Days): 3|State: Enabled
**Transition** (Days): 2
**Snooze** (Days): 2
**Deadline** (Days): 4|State: Enabled
**Transition** (Days): 2
**Snooze** (Days): 2
**Deadline** (Days): 5| - -### Controlling notification experience for engaged deadline - -|Policy| Location |Suggested Configuration -|-|-|-| -|Configure Auto-restart required notification for updates |GPO: Computer Configuration > Administrative Templates > Windows Components > Windows Update > Configure Auto-restart required notification for updates|State: Enabled
**Method**: 2- User| - -### Notification experience for engaged deadlines -Notification users get for quality update engaged deadline: -![The notification users get for an impending engaged quality update deadline](images/wufb-quality-engaged-notification.png) - -Notification users get for a quality update deadline: -![The notification users get for an impending quality update deadline](images/wufb-quality-notification.png) - -Notification users get for a feature update engaged deadline: -![The notification users get for an impending feature update engaged deadline](images/wufb-feature-update-engaged-notification.png) - -Notification users get for a feature update deadline: -![The notification users get for an impending feature update deadline](images/wufb-feature-update-deadline-notification.png) +--- +title: Enforce compliance deadlines with policies in Windows Update for Business (Windows 10) +description: Learn how to enforce compliance deadlines using Windows Update for Business. +ms.prod: w10 +ms.mktglfcycl: manage +ms.sitesec: library +author: jaimeo +ms.localizationpriority: medium +ms.author: jaimeo +ms.reviewer: +manager: laurawi +ms.topic: article +--- +# Enforcing compliance deadlines for updates + +>Applies to: Windows 10 + +Deploying feature or quality updates for many organizations is only part of the equation for managing their device ecosystem. The ability to enforce update compliance is the next important part. Windows Update for Business provides controls to manage deadlines for when devices should migrate to newer versions. + +The compliance options have changed with the release of Windows 10, version 1903: + +- [Starting with Windows 10, version 1903](#starting-with-windows-10-version-1903) +- [Prior to Windows 10, version 1903](#prior-to-windows-10-version-1903) + + +## Starting with Windows 10, version 1903 + +With a current version of Windows 10, it's best to use the new policy introduced in Windows 10, version 1903: **Specify deadlines for automatic updates and restarts**. In MDM, this policy is available as four separate settings: + +- Update/ConfigureDeadlineForFeatureUpdates +- Update/ConfigureDeadlineForQualityUpdates +- Update/ConfigureDeadlineGracePeriod +- Update/ConfigureDeadlineNoAutoReboot + +This policy starts the countdown for the update installation deadline from when the update is published, instead of starting with the "restart pending" state as the older policies did. + +The policy also includes a configurable grace period to allow, for example, users who have been away to have extra time before being forced to restart their devices. + +Further, the policy includes the option to opt out of automatic restarts until the deadline is reached by presenting the "engaged restart experience" until the deadline has actually expired. At this point the device will automatically schedule a restart regardless of active hours. + + + +### Policy setting overview + +|Policy|Description | +|-|-| +| (starting in Windows 10, version 1903) Specify deadlines for automatic updates and restarts | Similar to the older "Specify deadline before auto-restart for update installation," but starts the deadline countdown from when the update was published. Also introduces a configurable grace period and the option to opt out of automatic restarts until the deadline is reached. | + + + +### Suggested configurations + +|Policy|Location|Quality update deadline in days|Feature update deadline in days|Grace period in days| +|-|-|-|-|-| +|(starting in Windows 10, version 1903) Specify deadlines for automatic updates and restarts | GPO: Computer Configuration > Administrative Templates > Windows Components > Windows Update > Specify deadlines for automatic updates and restarts | 7 | 7 | 2 | + +When **Specify deadlines for automatic updates and restarts** is set (starting in Windows 10, version 1903): + +**While restart is pending, before the deadline occurs:** +- For the first few days, the user receives a toast notification +- After this period, the user receives this dialog: + +![The notification users get for an impending restart prior to deadline](images/wufb-update-deadline-warning.png) +- If the user scheduled a restart, or if an auto restart is scheduled, 15 minutes before the scheduled time the user is receives this notification that the restart is about to occur: + +![The notification users get for an impending restart 15 minutes prior to restart](images/wufb-restart-imminent-warning.png) + +**If the restart is still pending after the deadline passes:** +- Within 12 hours before the deadline passes, the user receives this notification that the deadline is approaching: + +![The notification users get for an approaching restart deadline](images/wufb-pastdeadline-restart-warning.png) +- Once the deadline has passed, the user is forced to restart to keep their devices in compliance and receives this notification: + +![The notification users get for an imminent restart after the deadline](images/wufb-pastdeadline-restartnow.png) + + + + +## Prior to Windows 10, version 1903 + + +Two compliance flows are available: + +- [Deadline only](#deadline-only) +- [Deadline with user engagement](#deadline-with-user-engagement) + +### Deadline only + +This flow only enforces the deadline where the device will attempt to silently restart outside of active hours before the deadline is reached. Once the deadline is reached the user is prompted with either a confirmation button or a restart now option. + +#### End-user experience + +Once the device is in the pending restart state, it will attempt to restart the device during non-active hours. This is known as the auto-restart period, and by default it does not require user interaction to restart the device. + +>[!NOTE] +>Deadlines are enforced from pending restart state (for example, when the device has completed the installation and download from Windows Update). + +#### Policy overview + +|Policy|Description | +|-|-| +|Specify deadline before auto-restart for update installation|Governs the update experience once the device has entered pending restart state. It specifies a deadline, in days, to enforce compliance (such as imminent installation).| +|Configure Auto-restart warning notification schedule for updates|Configures the reminder notification and the warning notification for a scheduled installation. The user can dismiss a reminder, but not the warning.| + + + + +#### Suggested configuration {OK} + +|Policy|Location|3-day compliance|5-day compliance|7-day compliance| +|-|-|-|-|-| +|Specify deadline before auto-restart for update installation| GPO: Computer Configuration > Administrative Templates > Windows Components > Windows Update > Specify deadline before auto-restart for update installation |State: Enabled
**Specify the number of days before pending restart will automatically be executed outside of active hours:** 2| State: Enabled
**Specify the number of days before pending restart will automatically be executed outside of active hours:** 3 | State: Enabled
**Specify the number of days before pending restart will automatically be executed outside of active hours:** 4| + +#### Controlling notification experience for deadline {OK} + +|Policy| Location|Suggested Configuration | +|-|-|-| +|Configure Auto-restart warning notification schedule for updates|GPO: Computer Configuration > Administrative Templates > Windows Components > Windows Update > Configure auto-restart warning notifications schedule for updates |State: Enabled
**Reminder** (hours): 2
**Warning** (minutes): 60 | + +#### Notification experience for deadline + +Notification users get for a quality update deadline: +![The notification users get for an impending quality update deadline](images/wufb-quality-notification.png) + +Notification users get for a feature update deadline: +![The notification users get for an impending feature update deadline](images/wufb-feature-notification.png) + +### Deadline with user engagement + +This flow provides the end user with prompts to select a time to restart the device before the deadline is reached. If the device is unable to restart at the time specified by the user or the time selected is outside the deadline, the device will restart the next time it is active. + +#### End-user experience + +Before the deadline the device will be in two states: auto-restart period and engaged-restart period. During the auto-restart period the device will silently try to restart outside of active hours. If the device can't find an idle moment to restart, then the device will go into engaged-restart. The end user, at this point, can select a time that they would like the device to try to restart. Both phases happen before the deadline; once that deadline has passed then the device will restart at the next available time. + +#### Policy overview + +|Policy| Description | +|-|-| +|Specify engaged restart transition and notification schedule for updates|Governs how the user will be impacted by the pending restart. Transition days, first starts out in Auto-Restart where the device will find an idle moment to restart the device. After 2 days engaged restart will commence and the user will be able to choose a time| +|Configure Auto-restart required notification for updates|Governs the notifications during the Auto-Restart period. During Active hours, the user will be notified that the device is trying to restart. They will have the option to confirm or dismiss the notification| + +#### Suggested configuration + +|Policy| Location| 3-day compliance| 5-day compliance| 7-day compliance | +|-|-|-|-|-| +|Specify engaged restart transition and notification schedule for updates|GPO: Computer Configuration > Administrative Templates > Windows Components > Windows Update > Specify Engaged restart transition and notification schedule for updates|State: Enabled
**Transition** (Days): 2
**Snooze** (Days): 2
**Deadline** (Days): 3|State: Enabled
**Transition** (Days): 2
**Snooze** (Days): 2
**Deadline** (Days): 4|State: Enabled
**Transition** (Days): 2
**Snooze** (Days): 2
**Deadline** (Days): 5| + +#### Controlling notification experience for engaged deadline + +|Policy| Location |Suggested Configuration +|-|-|-| +|Configure Auto-restart required notification for updates |GPO: Computer Configuration > Administrative Templates > Windows Components > Windows Update > Configure Auto-restart required notification for updates|State: Enabled
**Method**: 2- User| + +#### Notification experience for engaged deadlines + +Notification users get for quality update engaged deadline: + +![The notification users get for an impending engaged quality update deadline](images/wufb-quality-engaged-notification.png) + +Notification users get for a quality update deadline: + +![The notification users get for an impending quality update deadline](images/wufb-quality-notification.png) + +Notification users get for a feature update engaged deadline: + +![The notification users get for an impending feature update engaged deadline](images/wufb-feature-update-engaged-notification.png) + +Notification users get for a feature update deadline: + +![The notification users get for an impending feature update deadline](images/wufb-feature-update-deadline-notification.png) + + diff --git a/windows/release-information/status-windows-10-1903.yml b/windows/release-information/status-windows-10-1903.yml index 1d23df7da7..9b7700d02e 100644 --- a/windows/release-information/status-windows-10-1903.yml +++ b/windows/release-information/status-windows-10-1903.yml @@ -65,6 +65,7 @@ sections: - type: markdown text: "

This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ @@ -77,7 +78,6 @@ sections: - @@ -130,10 +130,10 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
Windows Sandbox may fail to start with error code “0x80070002”
Windows Sandbox may fail to start with \"ERROR_FILE_NOT_FOUND (0x80070002)\" on devices in which the operating system language was changed between updates

See details >
OS Build 18362.116

May 20, 2019
KB4505057
Investigating
August 20, 2019
10:50 AM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 18362.295

August 13, 2019
KB4512508
Investigating
August 17, 2019
01:49 PM PT
Updates may fail to install and you may receive Error 0x80073701
Installation of updates may fail and you may receive an error, \"Updates Failed, There were problems installing some updates, but we'll try again later\" and \"Error 0x80073701.\"

See details >
OS Build 18362.145

May 29, 2019
KB4497935
Investigating
August 16, 2019
04:28 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 18362.145

May 29, 2019
KB4497935
Investigating
August 13, 2019
06:59 PM PT
The dGPU may occasionally disappear from device manager on Surface Book 2 with dGPU
Some apps or games that needs to perform graphics intensive operations may close or fail to open on Surface Book 2 devices with Nvidia dGPU.

See details >
OS Build 18362.145

May 29, 2019
KB4497935
Investigating
July 16, 2019
09:04 AM PT
Initiating a Remote Desktop connection may result in black screen
When initiating a Remote Desktop connection to devices with some older GPU drivers, you may receive a black screen.

See details >
OS Build 18362.145

May 29, 2019
KB4497935
Investigating
July 12, 2019
04:42 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
OS Build 18362.175

June 11, 2019
KB4503293
Mitigated
July 10, 2019
07:09 PM PT
Windows Sandbox may fail to start with error code “0x80070002”
Windows Sandbox may fail to start with \"ERROR_FILE_NOT_FOUND (0x80070002)\" on devices in which the operating system language was changed between updates

See details >
OS Build 18362.116

May 20, 2019
KB4505057
Investigating
June 10, 2019
06:06 PM PT
Unable to discover or connect to Bluetooth devices
Microsoft has identified compatibility issues with some versions of Realtek and Qualcomm Bluetooth radio drivers.

See details >
OS Build 18362.116

May 21, 2019
KB4505057
Mitigated
May 21, 2019
04:48 PM PT
Intel Audio displays an intcdaud.sys notification
Microsoft and Intel have identified an issue with a range of Intel Display Audio device drivers that may result in battery drain.

See details >
OS Build 18362.116

May 21, 2019
KB4505057
Mitigated
May 21, 2019
04:47 PM PT
Cannot launch Camera app
Microsoft and Intel have identified an issue affecting Intel RealSense SR300 or Intel RealSense S200 camera apps.

See details >
OS Build 18362.116

May 21, 2019
KB4505057
Mitigated
May 21, 2019
04:47 PM PT
+ - From 2588c48d14d947032a413b0967a4ef47badeffa4 Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Wed, 21 Aug 2019 15:18:09 -0700 Subject: [PATCH 032/285] Replaced ask with consult --- .../configure-microsoft-threat-experts.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts.md b/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts.md index e07aee7cf0..aee91acb16 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts.md @@ -64,7 +64,7 @@ You'll start receiving targeted attack notification from Microsoft Threat Expert 2. From the dashboard, select the same alert topic that you got from the email, to view the details. -## Ask a Microsoft threat expert about suspicious cybersecurity activities in your organization +## Consult a Microsoft threat expert about suspicious cybersecurity activities in your organization >[!NOTE] >The Microsoft Threat Experts' experts-on-demand capability is still in preview. You can only use the experts-on-demand capability if you have applied for preview and your application has been approved. @@ -74,7 +74,7 @@ You can partner with Microsoft Threat Experts who can be engaged directly from w >Alert inquiries related to your organization's customized threat intelligence data are currently not supported. Consult your security operations or incident response team for details. 1. Navigate to the portal page with the relevant information that you'd like to investigate, for example, the **Incident** page. Ensure that the page for the relevant alert or machine is in view before you send an inquiry. -2. From the upper right-hand menu, click **?**. Then, select **Ask a threat expert**. +2. From the upper right-hand menu, click **?**. Then, select **Consult a threat expert**. 3. Asking a threat expert is a two-step process: provide the necessary information and open a support ticket. **Step 1: Provide information** From fc22bb9db724c917da3b65bf024b274e74e227eb Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Wed, 21 Aug 2019 15:19:10 -0700 Subject: [PATCH 033/285] Remove preview for EOD notes --- .../configure-microsoft-threat-experts.md | 5 ----- 1 file changed, 5 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts.md b/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts.md index aee91acb16..c32e8e1b64 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts.md @@ -23,8 +23,6 @@ ms.topic: article - [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) -[!Include[Prerelease information](prerelease.md)] - ## Before you begin To experience the full Microsoft Threat Experts targeted attack notification capability in Microsoft Defender ATP, and preview the experts-on-demand capability, you need to have a valid Premier customer service and support account. Premier charges are not incurred during for the capability in preview, but for the generally available capability, there will be charges. @@ -65,9 +63,6 @@ You'll start receiving targeted attack notification from Microsoft Threat Expert ## Consult a Microsoft threat expert about suspicious cybersecurity activities in your organization ->[!NOTE] ->The Microsoft Threat Experts' experts-on-demand capability is still in preview. You can only use the experts-on-demand capability if you have applied for preview and your application has been approved. - You can partner with Microsoft Threat Experts who can be engaged directly from within the Windows Defender Security Center for timely and accurate response. Experts provide insights to better understand complex threats, targeted attack notifications that you get, or if you need more information about the alerts, a potentially compromised machine, or a threat intelligence context that you see on your portal dashboard. >[!NOTE] From 5f6882c86ce4cd957cd64b5df43f128c1356fed5 Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Wed, 21 Aug 2019 16:13:26 -0700 Subject: [PATCH 034/285] Removed prerelease info --- .../microsoft-defender-atp/microsoft-threat-experts.md | 2 -- 1 file changed, 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-threat-experts.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-threat-experts.md index f799ef59bc..aec30c80ff 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-threat-experts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-threat-experts.md @@ -22,8 +22,6 @@ ms.topic: conceptual **Applies to:** - [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) -[!include[Prerelease information](prerelease.md)] - Microsoft Threat Experts is a managed hunting service that provides Security Operation Centers (SOCs) with expert level monitoring and analysis to help them ensure that critical threats in their unique environments don’t get missed. From 4677672500667fbd1c7fd0358e4bdc2e396686d7 Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Wed, 21 Aug 2019 16:14:04 -0700 Subject: [PATCH 035/285] Update microsoft-threat-experts.md --- .../microsoft-defender-atp/microsoft-threat-experts.md | 3 --- 1 file changed, 3 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-threat-experts.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-threat-experts.md index aec30c80ff..fc6d1fa775 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-threat-experts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-threat-experts.md @@ -35,9 +35,6 @@ Microsoft Threat Experts provides proactive hunting for the most important threa - Scope of compromise and as much context as can be quickly delivered to enable fast SOC response. ## Collaborate with experts, on demand ->[!NOTE] ->The Microsoft Threat Experts' experts-on-demand capability is still in preview. You can only use the experts-on-demand capability if you have applied for preview and your application has been approved. - Customers can engage our security experts directly from within Microsoft Defender Security Center for timely and accurate response. Experts provide insights needed to better understand the complex threats affecting your organization, from alert inquiries, potentially compromised machines, root cause of a suspicious network connection, to additional threat intelligence regarding ongoing advanced persistent threat campaigns. With this capability, you can: - Get additional clarification on alerts including root cause or scope of the incident From 0f750505d40cf105f1c880287d872089692fdc20 Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Wed, 21 Aug 2019 16:43:47 -0700 Subject: [PATCH 036/285] Updated EOD's two step proc --- .../configure-microsoft-threat-experts.md | 37 +++---------------- 1 file changed, 6 insertions(+), 31 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts.md b/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts.md index c32e8e1b64..03a4c23c48 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts.md @@ -68,39 +68,14 @@ You can partner with Microsoft Threat Experts who can be engaged directly from w >[!NOTE] >Alert inquiries related to your organization's customized threat intelligence data are currently not supported. Consult your security operations or incident response team for details. -1. Navigate to the portal page with the relevant information that you'd like to investigate, for example, the **Incident** page. Ensure that the page for the relevant alert or machine is in view before you send an inquiry. +1. Navigate to the portal page with the relevant information that you'd like to investigate, for example, the **Incident** page. Ensure that the page for the relevant alert or machine is in view before you send an investigation request. 2. From the upper right-hand menu, click **?**. Then, select **Consult a threat expert**. -3. Asking a threat expert is a two-step process: provide the necessary information and open a support ticket. - - **Step 1: Provide information** - a. Provide enough information to give the Microsoft Threat Experts enough context to start the investigation. Select the inquiry category from the **Provide information > Inquiry** details drop-down menu.
- - b. Enter the additional details to give the threat experts more context of what you’d like to investigate. Click **Next**, and it takes you to the **Open support ticket** tab.
- - c. Remember to use the ID number from the **Open a support ticket** tab page and include it to the details you will provide in the subsequent Customer Services and Support (CSS) pages.
+3. In the **Investigation topic** field, provide the link to the relevant page for your investigation request. For example, a link to the incident, alert, or machine details page that you would like to investigate. +4. In the next field, provide enough information to give the Microsoft Threat Experts enough context to start the investigation. +5. Enter the email address that you'd like to use to correspond with Microsoft Threat Experts. + - **Step 2: Open a support ticket** - >[!NOTE] - >To experience the full Microsoft Threat Experts preview capability in Microsoft Defender ATP, you need a Premier customer service and support account. However, you will not be charged for the Experts-on-demand service during the preview. - - a. In the **New support request** customer support page, select the following from the dropdown menu and then click **Next**:
- - **Select the product family**: **Security**
- **Select a product**: **Microsoft Threat Experts**
- **Select a category that best describes the issue**: **Microsoft Defender ATP**
- **Select a problem that best describes the issue**: Choose according to your inquiry category
- - b. Fill out the fields with the necessary information about the issue and use the auto-generated ID when you open a Customer Services and Support (CSS) ticket. Then, click **Next**.
- - c. In the **Select a support plan** page, select **Professional No Charge**.
- - d. The severity of your issue has been pre-selected by default, per the support plan, **Professional No Charge**, that you'll use for this public preview. Select the time zone by which you'd like to receive the correspondence. Then, click **Next**.
- - e. Verify your contact details and add another if necessary. Then, click **Next**.
- - f. Review the summary of your support request, and update if necessary. Make sure that you read and understand the **Microsoft Services Agreement** and **Privacy Statement**. Then, click **Submit**. A confirmation page indicating the response time and your support request number shows.
- -## Sample questions to ask Microsoft Threat Experts +## Sample investigation topics that you can consult with Microsoft Threat Experts **Alert information** - We see a new type of alert for a living-off-the-land binary: [AlertID]. Can you tell us something more about this alert and how we can investigate further? From 320d5ce5223585edebe669ab0bba0dd596a8d38a Mon Sep 17 00:00:00 2001 From: John Liu <49762389+ShenLanJohn@users.noreply.github.com> Date: Fri, 23 Aug 2019 17:39:05 -0700 Subject: [PATCH 037/285] CAT Auto Pulish for Windows Release Messages - CAT_AutoPublish_20190823163336 (#980) (#981) --- .../resolved-issues-windows-10-1507.yml | 2 -- .../status-windows-10-1607-and-windows-server-2016.yml | 2 -- windows/release-information/status-windows-10-1703.yml | 6 ++++++ .../status-windows-10-1809-and-windows-server-2019.yml | 2 +- windows/release-information/status-windows-10-1903.yml | 4 ++-- ...status-windows-7-and-windows-server-2008-r2-sp1.yml | 4 ++-- windows/release-information/windows-message-center.yml | 10 ++++++---- 7 files changed, 17 insertions(+), 13 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1507.yml b/windows/release-information/resolved-issues-windows-10-1507.yml index efd586d8b9..6eb7bd7645 100644 --- a/windows/release-information/resolved-issues-windows-10-1507.yml +++ b/windows/release-information/resolved-issues-windows-10-1507.yml @@ -39,7 +39,6 @@ sections:
- @@ -97,7 +96,6 @@ sections:
DetailsOriginating updateStatusHistory
Windows Sandbox may fail to start with error code “0x80070002”
Windows Sandbox may fail to start with \"ERROR_FILE_NOT_FOUND (0x80070002)\" on devices in which the operating system language is changed during the update process when installing Windows 10, version 1903.

Affected platforms:
  • Client: Windows 10, version 1903
Next steps: We are working on a resolution and estimates a solution will be available in late August.

Back to top
OS Build 18362.116

May 20, 2019
KB4505057
Investigating
Last updated:
August 20, 2019
10:50 AM PT

Opened:
May 24, 2019
04:20 PM PT
Intermittent loss of Wi-Fi connectivity
Some older computers may experience loss of Wi-Fi connectivity due to an outdated Qualcomm driver. An updated Wi-Fi driver should be available from your device manufacturer (OEM).

To safeguard your upgrade experience, we have applied a hold on devices with this Qualcomm driver from being offered Windows 10, version 1903, until the updated driver is installed.

Affected platforms:
  • Client: Windows 10, version 1903
Workaround: Before updating to Windows 10, version 1903, you will need to download and install an updated Wi-Fi driver from your device manufacturer (OEM).
 
Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until a new driver has been installed and the Windows 10, version 1903 feature update has been automatically offered to you.

Back to top
OS Build 18362.116

May 21, 2019
KB4505057
Mitigated External
Last updated:
August 01, 2019
08:44 PM PT

Opened:
May 21, 2019
07:13 AM PT
Gamma ramps, color profiles, and night light settings do not apply in some cases
Microsoft has identified some scenarios where gamma ramps, color profiles and night light settings may stop working.

Microsoft has identified some scenarios in which these features may have issues or stop working, for example:
  • Connecting to (or disconnecting from) an external monitor, dock, or projector
  • Rotating the screen
  • Updating display drivers or making other display mode changes
  • Closing full screen applications
  • Applying custom color profiles
  • Running applications that rely on custom gamma ramps
Affected platforms:
  • Client: Windows 10, version 1903
Workaround: If you find that your night light has stopped working, try turning the night light off and on, or restarting your computer. For other color setting issues, restart your computer to correct the issue.

Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 18362.116

May 21, 2019
KB4505057
Mitigated
Last updated:
August 01, 2019
06:27 PM PT

Opened:
May 21, 2019
07:28 AM PT
Display brightness may not respond to adjustments
Microsoft and Intel have identified a driver compatibility issue on devices configured with certain Intel display drivers. After updating to Windows 10, version 1903, brightness settings may sometime appear as if changes applied took effect, yet the actual display brightness doesn't change.

To safeguard your update experience, we have applied a compatibility hold on devices with certain Intel drivers from being offered Windows 10, version 1903, until this issue is resolved.

Affected platforms:
  • Client: Windows 10, version 1903
Resolution: This issue was resolved in KB4505903 and the safeguard hold has been removed. Please ensure you have applied the resolving update before attempting to update to the Windows 10 May 2019 Update (version 1903). Please note, it can take up to 48 hours for the safeguard to be removed.

Back to top
OS Build 18362.116

May 21, 2019
KB4505057
Resolved
KB4505903
Resolved:
July 26, 2019
02:00 PM PT

Opened:
May 21, 2019
07:56 AM PT
Windows Sandbox may fail to start with error code “0x80070002”
Windows Sandbox may fail to start with \"ERROR_FILE_NOT_FOUND (0x80070002)\" on devices in which the operating system language is changed during the update process when installing Windows 10, version 1903.

Affected platforms:
  • Client: Windows 10, version 1903
Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 18362.116

May 20, 2019
KB4505057
Investigating
Last updated:
June 10, 2019
06:06 PM PT

Opened:
May 24, 2019
04:20 PM PT
Unable to discover or connect to Bluetooth devices
Microsoft has identified compatibility issues with some driver versions for Bluetooth radios made by Realtek and Qualcomm. To safeguard your update experience, we have applied a compatibility hold on devices with affected driver versions for Realtek or Qualcomm Bluetooth radios from being offered Windows 10, version 1903 or Windows Server, version 1903 until the driver has been updated.

Affected platforms:
  • Client: Windows 10, version 1903
  • Server: Windows Server, version 1903
Workaround: Check with your device manufacturer (OEM) to see if an updated driver is available and install it.

  • For Qualcomm drivers, you will need to install a driver version greater than 10.0.1.11.
  • For Realtek drivers, you will need to install a driver version greater than 1.5.1011.0.
Note Until an updated driver has been installed, we recommend you do not attempt to manually update using the Update now button or the Media Creation Tool. 

Next steps: Microsoft is working with Realtek and Qualcomm to release new drivers for all affected system via Windows Update.  


Back to top
OS Build 18362.116

May 21, 2019
KB4505057
Mitigated
Last updated:
May 21, 2019
04:48 PM PT

Opened:
May 21, 2019
07:29 AM PT
Intel Audio displays an intcdaud.sys notification
Microsoft and Intel have identified an issue with a range of Intel Display Audio device drivers that may result in higher than normal battery drain. If you see an intcdaud.sys notification or “What needs your attention” notification when trying to update to Windows 10, version 1903, you have an affected Intel Audio Display device driver installed on your machine (intcdaud.sys, versions 10.25.0.3 through 10.25.0.8).
  
To safeguard your update experience, we have applied a compatibility hold on devices with drivers from being offered Windows 10, version 1903 until updated device drivers have been installed.

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809
Workaround:
On the “What needs your attention\" notification, click the Back button to remain on your current version of Windows 10. (Do not click Confirm as this will proceed with the update and you may experience compatibility issues.) Affected devices will automatically revert to the previous working configuration.

For more information, see Intel's customer support guidance and the Microsoft knowledge base article KB4465877.

Note We recommend you do not attempt to update your devices until newer device drivers are installed.

Next steps: You can opt to wait for newer drivers to be installed automatically through Windows Update or check with the computer manufacturer for the latest device driver software availability and installation procedures.

Back to top
OS Build 18362.116

May 21, 2019
KB4505057
Mitigated
Last updated:
May 21, 2019
04:47 PM PT

Opened:
May 21, 2019
07:22 AM PT
Cannot launch Camera app
Microsoft and Intel have identified an issue affecting Intel RealSense SR300 and Intel RealSense S200 cameras when using the Camera app. After updating to the Windows 10 May 2019 Update and launching the Camera app, you may get an error message stating:

\"Close other apps, error code: 0XA00F4243.”


To safeguard your update experience, we have applied a protective hold on machines with Intel RealSense SR300 or Intel RealSense S200 cameras installed from being offered Windows 10, version 1903, until this issue is resolved.

Affected platforms:
  • Client: Windows 10, version 1903
Workaround: To temporarily resolve this issue, perform one of the following:

  • Unplug your camera and plug it back in.

or

  • Disable and re-enable the driver in Device Manager. In the Search box, type \"Device Manager\" and press Enter. In the Device Manager dialog box, expand Cameras, then right-click on any RealSense driver listed and select Disable device. Right click on the driver again and select Enable device.

or

  • Restart the RealSense service. In the Search box, type \"Task Manager\" and hit Enter. In the Task Manager dialog box, click on the Services tab, right-click on RealSense, and select Restart
Note This workaround will only resolve the issue until your next system restart.

Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 18362.116

May 21, 2019
KB4505057
Mitigated
Last updated:
May 21, 2019
04:47 PM PT

Opened:
May 21, 2019
07:20 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
March 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4491101
February 21, 2019
02:00 PM PT
First character of Japanese era name not recognized
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
March 12, 2019
10:00 AM PT
-
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493475

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487018, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Internet Explorer may fail to load images
After installing KB4487018, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4491101.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4491101
Resolved:
February 21, 2019
02:00 PM PT

Opened:
February 12, 2019
10:00 AM PT
First character of Japanese era name not recognized
After installing KB4487018, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index cca3c91d12..fb76299a24 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -66,7 +66,6 @@ sections:
Internet Explorer 11 and apps using the WebBrowser control may fail to render
JavaScript may fail to render as expected in Internet Explorer 11 and in apps using JavaScript or the WebBrowser control.

See details >OS Build 14393.3085

July 09, 2019
KB4507460Resolved
KB4512517August 13, 2019
10:00 AM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >OS Build 14393.3025

June 11, 2019
KB4503267Resolved External
August 09, 2019
07:03 PM PT
Apps and scripts using the NetQueryDisplayInformation API may fail with error
Applications and scripts that call the NetQueryDisplayInformation API or the WinNT provider equivalent may fail to return results after the first page of data.

See details >OS Build 14393.3053

June 18, 2019
KB4503294Investigating
August 01, 2019
05:00 PM PT -
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host.

See details >OS Build 14393.2639

November 27, 2018
KB4467684Resolved
KB4507459July 16, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >OS Build 14393.2724

January 08, 2019
KB4480961Mitigated
April 25, 2019
02:00 PM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

See details >OS Build 14393.2608

November 13, 2018
KB4467691Mitigated
February 19, 2019
10:00 AM PT
Cluster service may fail if the minimum password length is set to greater than 14
The cluster service may fail to start with the error “2245 (NERR_PasswordTooShort)” if the Group Policy “Minimum Password Length” is configured with greater than 14 characters.

See details >OS Build 14393.2639

November 27, 2018
KB4467684Mitigated
April 25, 2019
02:00 PM PT @@ -117,7 +116,6 @@ sections: - type: markdown text: " -
DetailsOriginating updateStatusHistory
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host after installing KB4467684.

Additionally, if you do not follow the best practices, a stop error may occur in vfpext.sys on the hosts.

Affected platforms:
  • Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue was resolved in KB4507459.

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4507459
Resolved:
July 16, 2019
10:00 AM PT

Opened:
November 27, 2018
10:00 AM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
After installing KB4467691, Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

Affected platforms:
  • Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Workaround: Restart the affected machine using the Unified Extensible Firmware Interface (UEFI). Disable Secure Boot and then restart.

If BitLocker is enabled on your machine, you may have to go through BitLocker recovery after Secure Boot has been disabled.

Next steps: Lenovo and Fujitsu are aware of this issue. Please contact your OEM to ask if there is a firmware update available for your device.

Back to top
OS Build 14393.2608

November 13, 2018
KB4467691
Mitigated
Last updated:
February 19, 2019
10:00 AM PT

Opened:
November 13, 2018
10:00 AM PT
Cluster service may fail if the minimum password length is set to greater than 14
After installing KB4467684, the cluster service may fail to start with the error \"2245 (NERR_PasswordTooShort)\" if the Group Policy \"Minimum Password Length\" is configured with greater than 14 characters.

Affected platforms:
  • Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Workaround: Set the domain default \"Minimum Password Length\" policy to less than or equal to 14 characters.

Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
Last updated:
April 25, 2019
02:00 PM PT

Opened:
November 27, 2018
10:00 AM PT
diff --git a/windows/release-information/status-windows-10-1703.yml b/windows/release-information/status-windows-10-1703.yml index 0e11306afb..dbe7b4e91e 100644 --- a/windows/release-information/status-windows-10-1703.yml +++ b/windows/release-information/status-windows-10-1703.yml @@ -20,6 +20,12 @@ sections: text: " Find information on known issues for Windows 10, version 1703. Looking for a specific issue? Press CTRL + F (or Command + F if you are using a Mac) and enter your search term(s). + +
Current status as of August 23, 2019:
+
The Enterprise and Education editions of Windows 10, version 1703 (the Windows 10 Creators Update) will reach end of life on October 9, 2019. The Home, Pro, Pro for Workstations, and IoT Core editions reached end of service on October 8, 2018.

There is no extended support available for any edition of Windows 10, version 1703. Therefore, it will no longer be supported after October 9, 2019 and will not receive monthly security and quality updates containing protections from the latest security threats.

To continue receiving security and quality updates, Microsoft recommends that you update your devices to the latest version of Windows 10. For more information on end of service dates and currently supported versions of Windows 10, see the Windows lifecycle fact sheet. +
+
+ " - items: diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index 4c3dfc4364..5a2c3b8df0 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -118,7 +118,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Devices with some Asian language packs installed may receive an error
After installing the April 2019 Cumulative Update (KB4493509), devices with some Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_FOUND.\"

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Workaround:
  1. Uninstall and reinstall any recently added language packs. For instructions, see \"Manage the input and display language settings in Windows 10\".
  2. Click Check for Updates and install the April 2019 Cumulative Update. For instructions, see \"Update Windows 10\".
Note: If reinstalling the language pack does not mitigate the issue, reset your PC as follows:
  1. Go to Settings app -> Recovery.
  2. Click on Get Started under \"Reset this PC\" recovery option.
  3. Select \"Keep my Files\".
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
Last updated:
May 03, 2019
10:59 AM PT

Opened:
May 02, 2019
04:36 PM PT
Devices with some Asian language packs installed may receive an error
After installing the April 2019 Cumulative Update (KB4493509), devices with some Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_FOUND.\"

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
Workaround:
  1. Uninstall and reinstall any recently added language packs. For instructions, see \"Manage the input and display language settings in Windows 10\".
  2. Click Check for Updates and install the April 2019 Cumulative Update. For instructions, see \"Update Windows 10\".
Note: If reinstalling the language pack does not mitigate the issue, reset your PC as follows:
    1. Go to Settings app -> Recovery.
    2. Click on Get Started under \"Reset this PC\" recovery option.
    3. Select \"Keep my Files\".
Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
Last updated:
May 03, 2019
10:59 AM PT

Opened:
May 02, 2019
04:36 PM PT
" diff --git a/windows/release-information/status-windows-10-1903.yml b/windows/release-information/status-windows-10-1903.yml index 9b7700d02e..1c6c129a90 100644 --- a/windows/release-information/status-windows-10-1903.yml +++ b/windows/release-information/status-windows-10-1903.yml @@ -65,7 +65,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- + @@ -130,7 +130,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
Windows Sandbox may fail to start with error code “0x80070002”
Windows Sandbox may fail to start with \"ERROR_FILE_NOT_FOUND (0x80070002)\" on devices in which the operating system language was changed between updates

See details >
OS Build 18362.116

May 20, 2019
KB4505057
Investigating
August 20, 2019
10:50 AM PT
Windows Sandbox may fail to start with error code “0x80070002”
Windows Sandbox may fail to start with \"ERROR_FILE_NOT_FOUND (0x80070002)\" on devices in which the operating system language was changed between updates

See details >
OS Build 18362.116

May 20, 2019
KB4505057
Investigating
August 20, 2019
11:06 AM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 18362.295

August 13, 2019
KB4512508
Investigating
August 17, 2019
01:49 PM PT
Updates may fail to install and you may receive Error 0x80073701
Installation of updates may fail and you may receive an error, \"Updates Failed, There were problems installing some updates, but we'll try again later\" and \"Error 0x80073701.\"

See details >
OS Build 18362.145

May 29, 2019
KB4497935
Investigating
August 16, 2019
04:28 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 18362.145

May 29, 2019
KB4497935
Investigating
August 13, 2019
06:59 PM PT
- + diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index 15f5bd4ccc..a57a74739b 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -60,10 +60,10 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

DetailsOriginating updateStatusHistory
Windows Sandbox may fail to start with error code “0x80070002”
Windows Sandbox may fail to start with \"ERROR_FILE_NOT_FOUND (0x80070002)\" on devices in which the operating system language is changed during the update process when installing Windows 10, version 1903.

Affected platforms:
  • Client: Windows 10, version 1903
Next steps: We are working on a resolution and estimates a solution will be available in late August.

Back to top
OS Build 18362.116

May 20, 2019
KB4505057
Investigating
Last updated:
August 20, 2019
10:50 AM PT

Opened:
May 24, 2019
04:20 PM PT
Windows Sandbox may fail to start with error code “0x80070002”
Windows Sandbox may fail to start with \"ERROR_FILE_NOT_FOUND (0x80070002)\" on devices in which the operating system language is changed during the update process when installing Windows 10, version 1903.

Affected platforms:
  • Client: Windows 10, version 1903
Next steps: We are working on a resolution and estimates a solution will be available in late August.

Back to top
OS Build 18362.116

May 20, 2019
KB4505057
Investigating
Last updated:
August 20, 2019
11:06 AM PT

Opened:
May 24, 2019
04:20 PM PT
Intermittent loss of Wi-Fi connectivity
Some older computers may experience loss of Wi-Fi connectivity due to an outdated Qualcomm driver. An updated Wi-Fi driver should be available from your device manufacturer (OEM).

To safeguard your upgrade experience, we have applied a hold on devices with this Qualcomm driver from being offered Windows 10, version 1903, until the updated driver is installed.

Affected platforms:
  • Client: Windows 10, version 1903
Workaround: Before updating to Windows 10, version 1903, you will need to download and install an updated Wi-Fi driver from your device manufacturer (OEM).
 
Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until a new driver has been installed and the Windows 10, version 1903 feature update has been automatically offered to you.

Back to top
OS Build 18362.116

May 21, 2019
KB4505057
Mitigated External
Last updated:
August 01, 2019
08:44 PM PT

Opened:
May 21, 2019
07:13 AM PT
Gamma ramps, color profiles, and night light settings do not apply in some cases
Microsoft has identified some scenarios where gamma ramps, color profiles and night light settings may stop working.

Microsoft has identified some scenarios in which these features may have issues or stop working, for example:
  • Connecting to (or disconnecting from) an external monitor, dock, or projector
  • Rotating the screen
  • Updating display drivers or making other display mode changes
  • Closing full screen applications
  • Applying custom color profiles
  • Running applications that rely on custom gamma ramps
Affected platforms:
  • Client: Windows 10, version 1903
Workaround: If you find that your night light has stopped working, try turning the night light off and on, or restarting your computer. For other color setting issues, restart your computer to correct the issue.

Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 18362.116

May 21, 2019
KB4505057
Mitigated
Last updated:
August 01, 2019
06:27 PM PT

Opened:
May 21, 2019
07:28 AM PT
Display brightness may not respond to adjustments
Microsoft and Intel have identified a driver compatibility issue on devices configured with certain Intel display drivers. After updating to Windows 10, version 1903, brightness settings may sometime appear as if changes applied took effect, yet the actual display brightness doesn't change.

To safeguard your update experience, we have applied a compatibility hold on devices with certain Intel drivers from being offered Windows 10, version 1903, until this issue is resolved.

Affected platforms:
  • Client: Windows 10, version 1903
Resolution: This issue was resolved in KB4505903 and the safeguard hold has been removed. Please ensure you have applied the resolving update before attempting to update to the Windows 10 May 2019 Update (version 1903). Please note, it can take up to 48 hours for the safeguard to be removed.

Back to top
OS Build 18362.116

May 21, 2019
KB4505057
Resolved
KB4505903
Resolved:
July 26, 2019
02:00 PM PT

Opened:
May 21, 2019
07:56 AM PT
+ -
SummaryOriginating updateStatusLast updated
Windows updates that are SHA-2 signed may not be offered for Symantec and Norton AV
Windows updates that are SHA-2 signed are not available with Symantec or Norton antivirus program installed

See details >
August 13, 2019
KB4512506
Mitigated External
August 23, 2019
04:25 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
June 11, 2019
KB4503292
Resolved
KB4512514
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
August 13, 2019
KB4512506
Resolved
KB4517297
August 16, 2019
02:00 PM PT
IA64 and x64 devices may fail to start after installing updates
After installing updates released on or after August 13, 2019, IA64 and x64 devices using EFI Boot may fail to start.

See details >
August 13, 2019
KB4512506
Mitigated
August 17, 2019
12:59 PM PT
Windows updates that are SHA-2 signed may not be offered for Symantec and Norton AV
Windows udates that are SHA-2 signed are not available with Symantec or Norton antivirus program installed

See details >
August 13, 2019
KB4512506
Investigating
August 16, 2019
04:28 PM PT
System may be unresponsive after restart with certain McAfee antivirus products
Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

See details >
April 09, 2019
KB4493472
Resolved External
August 13, 2019
06:59 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >
June 11, 2019
KB4503292
Resolved External
August 09, 2019
07:03 PM PT
@@ -81,9 +81,9 @@ sections: - type: markdown text: " + -
DetailsOriginating updateStatusHistory
Windows updates that are SHA-2 signed may not be offered for Symantec and Norton AV
Symantec identified the potential for a negative interaction that may occur after Windows Updates code signed with SHA-2 only certificates are installed on devices with Symantec or Norton antivirus programs installed. The software may not correctly identify files included in the update as code signed by Microsoft, putting the device at risk for a delayed or incomplete update.

Affected platforms:
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1
Mitigation: To mitigate this issue, Symantec and Norton released updates to their anti-virus software. Symantec Endpoint Protection protected devices can safely apply this update and future updates. See the Symantec support article for additional detail. Norton Security and Norton 360 products will automatically install a product update or users may manually run LiveUpdate and reboot until there are no further updates available.

Next Steps: The safeguard hold on affected devices will be removed in the coming week to allow customers time to apply the resolving anti-virus updates.

Back to top
August 13, 2019
KB4512506
Mitigated External
Last updated:
August 23, 2019
04:25 PM PT

Opened:
August 13, 2019
10:05 AM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512506, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4517297. The ‘optional’ update is now available on Microsoft Update Catalog and Windows Server Update Services (WSUS).

Back to top
August 13, 2019
KB4512506
Resolved
KB4517297
Resolved:
August 16, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
IA64 and x64 devices may fail to start after installing updates
IA64 devices (in any configuration) and x64 devices using EFI boot that were provisioned after the July 9th updates and/or skipped the recommended update (KB3133977), may fail to start with the following error:
\"File: \\Windows\\system32\\winload.efi
Status: 0xc0000428
Info: Windows cannot verify the digital signature for this file.\"

Affected platforms:
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1
Take Action: To resolve this issue please follow the steps outlined in the SHA-2 support FAQ article for error code 0xc0000428.

Back to top
August 13, 2019
KB4512506
Mitigated
Last updated:
August 17, 2019
12:59 PM PT

Opened:
August 13, 2019
08:34 AM PT
Windows updates that are SHA-2 signed may not be offered for Symantec and Norton AV
Symantec has identified an issue that occurs when a device is running any Symantec or Norton antivirus program and installs updates for Windows that are signed with SHA-2 certificates only. The Windows updates are blocked or deleted by the antivirus program during installation, which may then cause Windows to stop working or fail to start.

Affected platforms:
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1
Workaround: Guidance for Symantec customers can be found in the Symantec support article and the Norton support article.

Next steps: To safeguard your update experience, Microsoft and Symantec have partnered to place a safeguard hold on devices with an affected version of Symantec Antivirus or Norton Antivirus installed to prevent them from receiving this type of Windows update until a solution is available. We recommend that you do not manually install affected updates until a solution is available. Please reach out to Symantec or Norton support for further guidance.

Back to top
August 13, 2019
KB4512506
Investigating
Last updated:
August 16, 2019
04:28 PM PT

Opened:
August 13, 2019
10:05 AM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on your Apple MacOS device when trying to access network shares via CIFS or SMBv1 on a Windows devices that has installed updates on June 11, 2019 (KB4503292) or later. When you encounter this issue, in MacOS you may receive the error, “There was a problem connecting to the server “{Server Host Name}”. Check the server name or IP address, and then try again. If you continue to have problems, contact your system administrator.”

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: For guidance on this issue, see the Apple support article If your Mac can't use NTLM to connect to a Windows server. There is no update for Windows needed for this issue.

Back to top
June 11, 2019
KB4503292
Resolved External
Last updated:
August 09, 2019
07:03 PM PT

Opened:
August 09, 2019
04:25 PM PT
" diff --git a/windows/release-information/windows-message-center.yml b/windows/release-information/windows-message-center.yml index 6cacd95c0a..0ff0106922 100644 --- a/windows/release-information/windows-message-center.yml +++ b/windows/release-information/windows-message-center.yml @@ -49,11 +49,13 @@ sections: - type: markdown text: " - + + + + - @@ -78,8 +80,8 @@ Given the potential impact to customers and their businesses, we have also relea From 538a694b2712f28b73a1db174f674a4c12238151 Mon Sep 17 00:00:00 2001 From: Orlando Rodriguez <49177883+ojrb@users.noreply.github.com> Date: Sun, 25 Aug 2019 10:39:25 -0500 Subject: [PATCH 038/285] Update mbam-25-server-prerequisites-for-stand-alone-and-configuration-manager-integration-topologies.md --- ...alone-and-configuration-manager-integration-topologies.md | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/mdop/mbam-v25/mbam-25-server-prerequisites-for-stand-alone-and-configuration-manager-integration-topologies.md b/mdop/mbam-v25/mbam-25-server-prerequisites-for-stand-alone-and-configuration-manager-integration-topologies.md index 0dc592b269..368088283f 100644 --- a/mdop/mbam-v25/mbam-25-server-prerequisites-for-stand-alone-and-configuration-manager-integration-topologies.md +++ b/mdop/mbam-v25/mbam-25-server-prerequisites-for-stand-alone-and-configuration-manager-integration-topologies.md @@ -258,8 +258,9 @@ The following table lists the installation prerequisites for the MBAM Administra - @@ -123,7 +122,6 @@ sections: - diff --git a/windows/security/threat-protection/TOC.md b/windows/security/threat-protection/TOC.md index 03328a26ed..ccf58c6fc9 100644 --- a/windows/security/threat-protection/TOC.md +++ b/windows/security/threat-protection/TOC.md @@ -398,7 +398,6 @@ ####### [Get domain related alerts](microsoft-defender-atp/get-domain-related-alerts.md) ####### [Get domain related machines](microsoft-defender-atp/get-domain-related-machines.md) ####### [Get domain statistics](microsoft-defender-atp/get-domain-statistics.md) -####### [Is domain seen in organization (Deprecated)](microsoft-defender-atp/is-domain-seen-in-org.md) ###### [File]() ####### [File methods and properties](microsoft-defender-atp/files.md) @@ -409,9 +408,7 @@ ###### [IP]() ####### [Get IP related alerts](microsoft-defender-atp/get-ip-related-alerts.md) -####### [Get IP related machines (Deprecated)](microsoft-defender-atp/get-ip-related-machines.md) ####### [Get IP statistics](microsoft-defender-atp/get-ip-statistics.md) -####### [Is IP seen in organization (Deprecated)](microsoft-defender-atp/is-ip-seen-org.md) ###### [User]() ####### [User methods](microsoft-defender-atp/user.md) @@ -440,13 +437,13 @@ ##### [Experiment with custom threat intelligence alerts (Deprecated)](microsoft-defender-atp/experiment-custom-ti.md) ##### [Troubleshoot custom threat intelligence issues (Deprecated)](microsoft-defender-atp/troubleshoot-custom-ti.md) -#### [Pull alerts to your SIEM tools]() -##### [Learn about different ways to pull alerts](microsoft-defender-atp/configure-siem.md) +#### [Pull detections to your SIEM tools]() +##### [Learn about different ways to pull detections](microsoft-defender-atp/configure-siem.md) ##### [Enable SIEM integration](microsoft-defender-atp/enable-siem-integration.md) -##### [Configure Splunk to pull alerts](microsoft-defender-atp/configure-splunk.md) -##### [Configure HP ArcSight to pull alerts](microsoft-defender-atp/configure-arcsight.md) -##### [Microsoft Defender ATP SIEM alert API fields](microsoft-defender-atp/api-portal-mapping.md) -##### [Pull alerts using SIEM REST API](microsoft-defender-atp/pull-alerts-using-rest-api.md) +##### [Configure Splunk to pull detections](microsoft-defender-atp/configure-splunk.md) +##### [Configure HP ArcSight to pull detections](microsoft-defender-atp/configure-arcsight.md) +##### [Microsoft Defender ATP detection fields](microsoft-defender-atp/api-portal-mapping.md) +##### [Pull detections using SIEM REST API](microsoft-defender-atp/pull-alerts-using-rest-api.md) ##### [Troubleshoot SIEM tool integration issues](microsoft-defender-atp/troubleshoot-siem.md) #### [Reporting]() diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md b/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md index 9706e81443..ef351af05d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md @@ -1,7 +1,7 @@ --- -title: Microsoft Defender ATP alert API fields -description: Understand how the alert API fields map to the values in Microsoft Defender Security Center -keywords: alerts, alert fields, fields, api, fields, pull alerts, rest api, request, response +title: Microsoft Defender ATP detections API fields +description: Understand how the Detections API fields map to the values in Microsoft Defender Security Center +keywords: detections, detections fields, fields, api, fields, pull Detections, rest api, request, response search.product: eADQiWindows 10XVcnh search.appverid: met150 ms.prod: w10 @@ -15,10 +15,9 @@ manager: dansimp audience: ITPro ms.collection: M365-security-compliance ms.topic: article -ms.date: 10/16/2017 --- -# Microsoft Defender ATP SIEM alert API fields +# Microsoft Defender ATP detections API fields **Applies to:** @@ -26,10 +25,14 @@ ms.date: 10/16/2017 >Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-apiportalmapping-abovefoldlink) -Understand what data fields are exposed as part of the alerts API and how they map to Microsoft Defender Security Center. +Understand what data fields are exposed as part of the detections API and how they map to Microsoft Defender Security Center. -## Alert API fields and portal mapping -The following table lists the available fields exposed in the alerts API payload. It shows examples for the populated values and a reference on how data is reflected on the portal. +>[!Note] +>- [Microsoft Defender ATP Alert](alerts.md) is composed from one or more detections +>- **Microsoft Defender ATP Detection** is composed from the suspicious event occurred on the Machine and its related **Alert** details. + +## Detections API fields and portal mapping +The following table lists the available fields exposed in the detections API payload. It shows examples for the populated values and a reference on how data is reflected on the portal. The ArcSight field column contains the default mapping between the Microsoft Defender ATP fields and the built-in fields in ArcSight. You can download the mapping file from the portal when you enable the SIEM integration feature and you can modify it to match the needs of your organization. For more information, see [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration.md). @@ -39,33 +42,33 @@ Field numbers match the numbers in the images below. > > | Portal label | SIEM field name | ArcSight field | Example value | Description | > |------------------|---------------------------|---------------------|------------------------------------------------------------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| -> | 1 | AlertTitle | name | Windows Defender AV detected 'Mikatz' high-severity malware | Value available for every alert. | -> | 2 | Severity | deviceSeverity | High | Value available for every alert. | -> | 3 | Category | deviceEventCategory | Malware | Value available for every alert. | -> | 4 | Detection source | sourceServiceName | Antivirus | Windows Defender Antivirus or Microsoft Defender ATP. Value available for every alert. | -> | 5 | MachineName | sourceHostName | desktop-4a5ngd6 | Value available for every alert. | -> | 6 | FileName | fileName | Robocopy.exe | Available for alerts associated with a file or process. | -> | 7 | FilePath | filePath | C:\Windows\System32\Robocopy.exe | Available for alerts associated with a file or process. | -> | 8 | UserDomain | sourceNtDomain | CONTOSO | The domain of the user context running the activity, available for Microsoft Defender ATP behavioral based alerts. | -> | 9 | UserName | sourceUserName | liz.bean | The user context running the activity, available for Microsoft Defender ATP behavioral based alerts. | -> | 10 | Sha1 | fileHash | 3da065e07b990034e9db7842167f70b63aa5329 | Available for alerts associated with a file or process. | -> | 11 | Sha256 | deviceCustomString6 | ebf54f745dc81e1958f75e4ca91dd0ab989fc9787bb6b0bf993e2f5 | Available for Windows Defender AV alerts. | -> | 12 | Md5 | deviceCustomString5 | db979c04a99b96d370988325bb5a8b21 | Available for Windows Defender AV alerts. | -> | 13 | ThreatName | deviceCustomString1 | HackTool:Win32/Mikatz!dha | Available for Windows Defender AV alerts. | -> | 14 | IpAddress | sourceAddress | 218.90.204.141 | Available for alerts associated to network events. For example, 'Communication to a malicious network destination'. | -> | 15 | Url | requestUrl | down.esales360.cn | Available for alerts associated to network events. For example, 'Communication to a malicious network destination'. | -> | 16 | RemediationIsSuccess | deviceCustomNumber2 | TRUE | Available for Windows Defender AV alerts. ArcSight value is 1 when TRUE and 0 when FALSE. | -> | 17 | WasExecutingWhileDetected | deviceCustomNumber1 | FALSE | Available for Windows Defender AV alerts. ArcSight value is 1 when TRUE and 0 when FALSE. | -> | 18 | AlertId | externalId | 636210704265059241_673569822 | Value available for every alert. | -> | 19 | LinkToWDATP | flexString1 | `https://securitycenter.windows.com/alert/636210704265059241_673569822` | Value available for every alert. | -> | 20 | AlertTime | deviceReceiptTime | 2017-05-07T01:56:59.3191352Z | The time the activity relevant to the alert occurred. Value available for every alert. | -> | 21 | MachineDomain | sourceDnsDomain | contoso.com | Domain name not relevant for AAD joined machines. Value available for every alert. | +> | 1 | AlertTitle | name | Windows Defender AV detected 'Mikatz' high-severity malware | Value available for every Detection. | +> | 2 | Severity | deviceSeverity | High | Value available for every Detection. | +> | 3 | Category | deviceEventCategory | Malware | Value available for every Detection. | +> | 4 | Detection source | sourceServiceName | Antivirus | Windows Defender Antivirus or Microsoft Defender ATP. Value available for every Detection. | +> | 5 | MachineName | sourceHostName | desktop-4a5ngd6 | Value available for every Detection. | +> | 6 | FileName | fileName | Robocopy.exe | Available for detections associated with a file or process. | +> | 7 | FilePath | filePath | C:\Windows\System32\Robocopy.exe | Available for detections associated with a file or process. | +> | 8 | UserDomain | sourceNtDomain | CONTOSO | The domain of the user context running the activity, available for Microsoft Defender ATP behavioral based detections. | +> | 9 | UserName | sourceUserName | liz.bean | The user context running the activity, available for Microsoft Defender ATP behavioral based detections. | +> | 10 | Sha1 | fileHash | 3da065e07b990034e9db7842167f70b63aa5329 | Available for detections associated with a file or process. | +> | 11 | Sha256 | deviceCustomString6 | ebf54f745dc81e1958f75e4ca91dd0ab989fc9787bb6b0bf993e2f5 | Available for Windows Defender AV detections. | +> | 12 | Md5 | deviceCustomString5 | db979c04a99b96d370988325bb5a8b21 | Available for Windows Defender AV detections. | +> | 13 | ThreatName | deviceCustomString1 | HackTool:Win32/Mikatz!dha | Available for Windows Defender AV detections. | +> | 14 | IpAddress | sourceAddress | 218.90.204.141 | Available for detections associated to network events. For example, 'Communication to a malicious network destination'. | +> | 15 | Url | requestUrl | down.esales360.cn | Available for detections associated to network events. For example, 'Communication to a malicious network destination'. | +> | 16 | RemediationIsSuccess | deviceCustomNumber2 | TRUE | Available for Windows Defender AV detections. ArcSight value is 1 when TRUE and 0 when FALSE. | +> | 17 | WasExecutingWhileDetected | deviceCustomNumber1 | FALSE | Available for Windows Defender AV detections. ArcSight value is 1 when TRUE and 0 when FALSE. | +> | 18 | AlertId | externalId | 636210704265059241_673569822 | Value available for every Detection. | +> | 19 | LinkToWDATP | flexString1 | `https://securitycenter.windows.com/alert/636210704265059241_673569822` | Value available for every Detection. | +> | 20 | AlertTime | deviceReceiptTime | 2017-05-07T01:56:59.3191352Z | The time the event occurred. Value available for every Detection. | +> | 21 | MachineDomain | sourceDnsDomain | contoso.com | Domain name not relevant for AAD joined machines. Value available for every Detection. | > | 22 | Actor | deviceCustomString4 | BORON | Available for alerts related to a known actor group. | -> | 21+5 | ComputerDnsName | No mapping | liz-bean.contoso.com | The machine fully qualified domain name. Value available for every alert. | +> | 21+5 | ComputerDnsName | No mapping | liz-bean.contoso.com | The machine fully qualified domain name. Value available for every Detection. | > | | LogOnUsers | sourceUserId | contoso\liz-bean; contoso\jay-hardee | The domain and user of the interactive logon user/s at the time of the event. Note: For machines on Windows 10 version 1607, the domain information will not be available. | > | | InternalIPv4List | No mapping | 192.168.1.7, 10.1.14.1 | List of IPV4 internal IPs for active network interfaces. | > | | InternalIPv6List | No mapping | fd30:0000:0000:0001:ff4e:003e:0009:000e, FE80:CD00:0000:0CDE:1257:0000:211E:729C | List of IPV6 internal IPs for active network interfaces. | -> | Internal field | LastProcessedTimeUtc | No mapping | 2017-05-07T01:56:58.9936648Z | Time when event arrived at the backend. This field can be used when setting the request parameter for the range of time that alerts are retrieved. | +> | Internal field | LastProcessedTimeUtc | No mapping | 2017-05-07T01:56:58.9936648Z | Time when event arrived at the backend. This field can be used when setting the request parameter for the range of time that detections are retrieved. | > | | Not part of the schema | deviceVendor | | Static value in the ArcSight mapping - 'Microsoft'. | > | | Not part of the schema | deviceProduct | | Static value in the ArcSight mapping - 'Microsoft Defender ATP'. | > | | Not part of the schema | deviceVersion | | Static value in the ArcSight mapping - '2.0', used to identify the mapping versions. @@ -88,7 +91,7 @@ Field numbers match the numbers in the images below. ## Related topics - [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration.md) -- [Configure Splunk to pull Microsoft Defender ATP alerts](configure-splunk.md) -- [Configure ArcSight to pull Microsoft Defender ATP alerts](configure-arcsight.md) -- [Pull Microsoft Defender ATP alerts using REST API](pull-alerts-using-rest-api.md) +- [Configure Splunk to pull Microsoft Defender ATP detections](configure-splunk.md) +- [Configure ArcSight to pull Microsoft Defender ATP detections](configure-arcsight.md) +- [Pull Microsoft Defender ATP detections using REST API](pull-alerts-using-rest-api.md) - [Troubleshoot SIEM tool integration issues](troubleshoot-siem.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-arcsight.md b/windows/security/threat-protection/microsoft-defender-atp/configure-arcsight.md index 22c9359f44..736e5fc809 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-arcsight.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-arcsight.md @@ -1,6 +1,6 @@ --- -title: Configure HP ArcSight to pull Microsoft Defender ATP alerts -description: Configure HP ArcSight to receive and pull alerts from Microsoft Defender Security Center +title: Configure HP ArcSight to pull Microsoft Defender ATP detections +description: Configure HP ArcSight to receive and pull detections from Microsoft Defender Security Center keywords: configure hp arcsight, security information and events management tools, arcsight search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -15,10 +15,9 @@ manager: dansimp audience: ITPro ms.collection: M365-security-compliance ms.topic: article -ms.date: 12/20/2018 --- -# Configure HP ArcSight to pull Microsoft Defender ATP alerts +# Configure HP ArcSight to pull Microsoft Defender ATP detections **Applies to:** @@ -29,10 +28,14 @@ ms.date: 12/20/2018 >Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configurearcsight-abovefoldlink) -You'll need to install and configure some files and tools to use HP ArcSight so that it can pull Microsoft Defender ATP alerts. +You'll need to install and configure some files and tools to use HP ArcSight so that it can pull Microsoft Defender ATP detections. + +>[!Note] +>- [Microsoft Defender ATP Alert](alerts.md) is composed from one or more detections +>- [Microsoft Defender ATP Detection](api-portal-mapping.md) is composed from the suspicious event occurred on the Machine and its related Alert details. ## Before you begin -Configuring the HP ArcSight Connector tool requires several configuration files for it to pull and parse alerts from your Azure Active Directory (AAD) application. +Configuring the HP ArcSight Connector tool requires several configuration files for it to pull and parse detections from your Azure Active Directory (AAD) application. This section guides you in getting the necessary information to set and use the required configuration files correctly. @@ -163,7 +166,7 @@ The following steps assume that you have completed all the required steps in [Be You can now run queries in the HP ArcSight console. -Microsoft Defender ATP alerts will appear as discrete events, with "Microsoft” as the vendor and “Windows Defender ATP” as the device name. +Microsoft Defender ATP detections will appear as discrete events, with "Microsoft” as the vendor and “Windows Defender ATP” as the device name. ## Troubleshooting HP ArcSight connection @@ -187,6 +190,6 @@ Microsoft Defender ATP alerts will appear as discrete events, with "Microsoft” ## Related topics - [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration.md) -- [Configure Splunk to pull Microsoft Defender ATP alerts](configure-splunk.md) -- [Pull Microsoft Defender ATP alerts using REST API](pull-alerts-using-rest-api.md) +- [Configure Splunk to pull Microsoft Defender ATP detections](configure-splunk.md) +- [Pull Microsoft Defender ATP detections using REST API](pull-alerts-using-rest-api.md) - [Troubleshoot SIEM tool integration issues](troubleshoot-siem.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-siem.md b/windows/security/threat-protection/microsoft-defender-atp/configure-siem.md index c5e8719018..89fb09887a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-siem.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-siem.md @@ -1,6 +1,6 @@ --- -title: Pull alerts to your SIEM tools from Microsoft Defender Advanced Threat Protection -description: Learn how to use REST API and configure supported security information and events management tools to receive and pull alerts. +title: Pull detections to your SIEM tools from Microsoft Defender Advanced Threat Protection +description: Learn how to use REST API and configure supported security information and events management tools to receive and pull detections. keywords: configure siem, security information and events management tools, splunk, arcsight, custom indicators, rest api, alert definitions, indicators of compromise search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -18,7 +18,7 @@ ms.topic: article ms.date: 10/16/2017 --- -# Pull alerts to your SIEM tools +# Pull detections to your SIEM tools **Applies to:** @@ -26,8 +26,13 @@ ms.date: 10/16/2017 >Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configuresiem-abovefoldlink) -## Pull alerts using security information and events management (SIEM) tools -Microsoft Defender ATP supports (SIEM) tools to pull alerts. Microsoft Defender ATP exposes alerts through an HTTPS endpoint hosted in Azure. The endpoint can be configured to pull alerts from your enterprise tenant in Azure Active Directory (AAD) using the OAuth 2.0 authentication protocol for an AAD application that represents the specific SIEM connector installed in your environment. +## Pull detections using security information and events management (SIEM) tools + +>[!Note] +>- [Microsoft Defender ATP Alert](alerts.md) is composed from one or more detections +>- [Microsoft Defender ATP Detection](api-portal-mapping.md) is composed from the suspicious event occurred on the Machine and its related Alert details. + +Microsoft Defender ATP supports (SIEM) tools to pull detections. Microsoft Defender ATP exposes alerts through an HTTPS endpoint hosted in Azure. The endpoint can be configured to pull detections from your enterprise tenant in Azure Active Directory (AAD) using the OAuth 2.0 authentication protocol for an AAD application that represents the specific SIEM connector installed in your environment. Microsoft Defender ATP currently supports the following SIEM tools: @@ -39,16 +44,16 @@ To use either of these supported SIEM tools you'll need to: - [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration.md) - Configure the supported SIEM tool: - - [Configure Splunk to pull Microsoft Defender ATP alerts](configure-splunk.md) - - [Configure HP ArcSight to pull Microsoft Defender ATP alerts](configure-arcsight.md) + - [Configure Splunk to pull Microsoft Defender ATP detections](configure-splunk.md) + - [Configure HP ArcSight to pull Microsoft Defender ATP detections](configure-arcsight.md) -For more information on the list of fields exposed in the alerts API see, [Microsoft Defender ATP alert API fields](api-portal-mapping.md). +For more information on the list of fields exposed in the Detection API see, [Microsoft Defender ATP Detection fields](api-portal-mapping.md). -## Pull Microsoft Defender ATP alerts using REST API -Microsoft Defender ATP supports the OAuth 2.0 protocol to pull alerts using REST API. +## Pull Microsoft Defender ATP detections using REST API +Microsoft Defender ATP supports the OAuth 2.0 protocol to pull detections using REST API. -For more information, see [Pull Microsoft Defender ATP alerts using REST API](pull-alerts-using-rest-api.md). +For more information, see [Pull Microsoft Defender ATP detections using REST API](pull-alerts-using-rest-api.md). ## In this section @@ -56,8 +61,8 @@ For more information, see [Pull Microsoft Defender ATP alerts using REST API](pu Topic | Description :---|:--- [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration.md)| Learn about enabling the SIEM integration feature in the **Settings** page in the portal so that you can use and generate the required information to configure supported SIEM tools. -[Configure Splunk to pull Microsoft Defender ATP alerts](configure-splunk.md)| Learn about installing the REST API Modular Input app and other configuration settings to enable Splunk to pull Microsoft Defender ATP alerts. -[Configure HP ArcSight to pull Microsoft Defender ATP alerts](configure-arcsight.md)| Learn about installing the HP ArcSight REST FlexConnector package and the files you need to configure ArcSight to pull Microsoft Defender ATP alerts. -[Microsoft Defender ATP alert API fields](api-portal-mapping.md) | Understand what data fields are exposed as part of the alerts API and how they map to Microsoft Defender Security Center. -[Pull Microsoft Defender ATP alerts using REST API](pull-alerts-using-rest-api.md) | Use the Client credentials OAuth 2.0 flow to pull alerts from Microsoft Defender ATP using REST API. +[Configure Splunk to pull Microsoft Defender ATP detections](configure-splunk.md)| Learn about installing the REST API Modular Input App and other configuration settings to enable Splunk to pull Microsoft Defender ATP detections. +[Configure HP ArcSight to pull Microsoft Defender ATP detections](configure-arcsight.md)| Learn about installing the HP ArcSight REST FlexConnector package and the files you need to configure ArcSight to pull Microsoft Defender ATP detections. +[Microsoft Defender ATP Detection fields](api-portal-mapping.md) | Understand what data fields are exposed as part of the alerts API and how they map to Microsoft Defender Security Center. +[Pull Microsoft Defender ATP detections using REST API](pull-alerts-using-rest-api.md) | Use the Client credentials OAuth 2.0 flow to pull detections from Microsoft Defender ATP using REST API. [Troubleshoot SIEM tool integration issues](troubleshoot-siem.md) | Address issues you might encounter when using the SIEM integration feature. diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-splunk.md b/windows/security/threat-protection/microsoft-defender-atp/configure-splunk.md index 13cf662e66..6d0db578d1 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-splunk.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-splunk.md @@ -1,6 +1,6 @@ --- -title: Configure Splunk to pull Microsoft Defender ATP alerts -description: Configure Splunk to receive and pull alerts from Microsoft Defender Security Center. +title: Configure Splunk to pull Microsoft Defender ATP detections +description: Configure Splunk to receive and pull detections from Microsoft Defender Security Center. keywords: configure splunk, security information and events management tools, splunk search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -17,7 +17,7 @@ ms.collection: M365-security-compliance ms.topic: article --- -# Configure Splunk to pull Microsoft Defender ATP alerts +# Configure Splunk to pull Microsoft Defender ATP detections **Applies to:** @@ -28,7 +28,11 @@ ms.topic: article >Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configuresplunk-abovefoldlink) -You'll need to configure Splunk so that it can pull Microsoft Defender ATP alerts. +You'll need to configure Splunk so that it can pull Microsoft Defender ATP detections. + +>[!Note] +>- [Microsoft Defender ATP Alert](alerts.md) is composed from one or more detections +>- [Microsoft Defender ATP Detection](api-portal-mapping.md) is composed from the suspicious event occurred on the Machine and its related Alert details. ## Before you begin @@ -121,8 +125,8 @@ You'll need to configure Splunk so that it can pull Microsoft Defender ATP alert After completing these configuration steps, you can go to the Splunk dashboard and run queries. -## View alerts using Splunk solution explorer -Use the solution explorer to view alerts in Splunk. +## View detections using Splunk solution explorer +Use the solution explorer to view detections in Splunk. 1. In Splunk, go to **Settings** > **Searchers, reports, and alerts**. @@ -141,12 +145,12 @@ Use the solution explorer to view alerts in Splunk. >[!TIP] -> To mininimize alert duplications, you can use the following query: +> To mininimize Detection duplications, you can use the following query: >```source="rest://windows atp alerts" | spath | dedup _raw | table *``` ## Related topics - [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration.md) -- [Configure ArcSight to pull Microsoft Defender ATP alerts](configure-arcsight.md) -- [Microsoft Defender ATP alert API fields](api-portal-mapping.md) -- [Pull Microsoft Defender ATP alerts using REST API](pull-alerts-using-rest-api.md) +- [Configure ArcSight to pull Microsoft Defender ATP detections](configure-arcsight.md) +- [Microsoft Defender ATP Detection fields](api-portal-mapping.md) +- [Pull Microsoft Defender ATP detections using REST API](pull-alerts-using-rest-api.md) - [Troubleshoot SIEM tool integration issues](troubleshoot-siem.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration.md b/windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration.md index 2c9fa62654..707f89cea2 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration.md @@ -1,6 +1,6 @@ --- title: Enable SIEM integration in Microsoft Defender ATP -description: Enable SIEM integration to receive alerts in your security information and event management (SIEM) solution. +description: Enable SIEM integration to receive detections in your security information and event management (SIEM) solution. keywords: enable siem connector, siem, connector, security information and events search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -15,7 +15,6 @@ manager: dansimp audience: ITPro ms.collection: M365-security-compliance ms.topic: article -ms.date: 12/10/2018 --- # Enable SIEM integration in Microsoft Defender ATP @@ -26,7 +25,11 @@ ms.date: 12/10/2018 >Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-enablesiem-abovefoldlink) -Enable security information and event management (SIEM) integration so you can pull alerts from Microsoft Defender Security Center using your SIEM solution or by connecting directly to the alerts REST API. +Enable security information and event management (SIEM) integration so you can pull detections from Microsoft Defender Security Center using your SIEM solution or by connecting directly to the detections REST API. + +>[!Note] +>- [Microsoft Defender ATP Alert](alerts.md) is composed from one or more detections +>- [Microsoft Defender ATP Detection](api-portal-mapping.md) is composed from the suspicious event occurred on the Machine and its related Alert details. ## Prerequisites - The user who activates the setting must have permissions to create an app in Azure Active Directory (AAD). This is typically someone with a **Global administrator** role. @@ -55,7 +58,7 @@ Enable security information and event management (SIEM) integration so you can p > - WDATP-connector.jsonparser.properties > - WDATP-connector.properties
- If you want to connect directly to the alerts REST API through programmatic access, choose **Generic API**. + If you want to connect directly to the detections REST API through programmatic access, choose **Generic API**. 4. Copy the individual values or select **Save details to file** to download a file that contains all the values. @@ -64,14 +67,14 @@ Enable security information and event management (SIEM) integration so you can p > [!NOTE] > You'll need to generate a new Refresh token every 90 days. -You can now proceed with configuring your SIEM solution or connecting to the alerts REST API through programmatic access. You'll need to use the tokens when configuring your SIEM solution to allow it to receive alerts from Microsoft Defender Security Center. +You can now proceed with configuring your SIEM solution or connecting to the detections REST API through programmatic access. You'll need to use the tokens when configuring your SIEM solution to allow it to receive detections from Microsoft Defender Security Center. ## Integrate Microsoft Defender ATP with IBM QRadar -You can configure IBM QRadar to collect alerts from Microsoft Defender ATP. For more information, see [IBM Knowledge Center](https://www.ibm.com/support/knowledgecenter/SS42VS_DSM/c_dsm_guide_MS_Win_Defender_ATP_overview.html?cp=SS42VS_7.3.1). +You can configure IBM QRadar to collect detections from Microsoft Defender ATP. For more information, see [IBM Knowledge Center](https://www.ibm.com/support/knowledgecenter/SS42VS_DSM/c_dsm_guide_MS_Win_Defender_ATP_overview.html?cp=SS42VS_7.3.1). ## Related topics -- [Configure Splunk to pull Microsoft Defender ATP alerts](configure-splunk.md) -- [Configure HP ArcSight to pull Microsoft Defender ATP alerts](configure-arcsight.md) -- [Microsoft Defender ATP alert API fields](api-portal-mapping.md) -- [Pull Microsoft Defender ATP alerts using REST API](pull-alerts-using-rest-api.md) +- [Configure Splunk to pull Microsoft Defender ATP detections](configure-splunk.md) +- [Configure HP ArcSight to pull Microsoft Defender ATP detections](configure-arcsight.md) +- [Microsoft Defender ATP Detection fields](api-portal-mapping.md) +- [Pull Microsoft Defender ATP detections using REST API](pull-alerts-using-rest-api.md) - [Troubleshoot SIEM tool integration issues](troubleshoot-siem.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-machines.md deleted file mode 100644 index c247c9aa81..0000000000 --- a/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-machines.md +++ /dev/null @@ -1,122 +0,0 @@ ---- -title: Get IP related machines API -description: Retrieves a collection of machines related to a given IP address. -keywords: apis, graph api, supported apis, get, ip, related, machines -search.product: eADQiWindows 10XVcnh -ms.prod: w10 -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.author: macapara -author: mjcaparas -ms.localizationpriority: medium -manager: dansimp -audience: ITPro -ms.collection: M365-security-compliance -ms.topic: article ---- - -# Get IP related machines API (Deprecated) - -**Applies to:** - -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) - -Retrieves a collection of machines that communicated with or from a particular IP. - -## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) - -Permission type | Permission | Permission display name -:---|:---|:--- -Application | Machine.Read.All | 'Read all machine profiles' -Application | Machine.ReadWrite.All | 'Read and write all machine information' -Delegated (work or school account) | Machine.Read | 'Read machine information' -Delegated (work or school account) | Machine.ReadWrite | 'Read and write machine information' - ->[!Note] -> When obtaining a token using user credentials: ->- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information) ->- Response will include only machines, that the user have access to, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information) - -## HTTP request -``` -GET /api/ips/{ip}/machines -``` - -## Request headers - -Name | Type | Description -:---|:---|:--- -Authorization | String | Bearer {token}. **Required**. - - -## Request body -Empty - -## Response -If successful and IP exists - 200 OK with list of [machine](machine.md) entities in the body. If IP do not exist - 404 Not Found. - - -## Example - -**Request** - -Here is an example of the request. - -[!include[Improve request performance](improve-request-performance.md)] - -``` -GET https://api.securitycenter.windows.com/api/ips/10.209.67.177/machines -``` - -**Response** - -Here is an example of the response. - - -``` -HTTP/1.1 200 OK -Content-type: application/json -{ - "@odata.context": "https://api.securitycenter.windows.com/api/$metadata#Machines", - "value": [ - { - "id": "1e5bc9d7e413ddd7902c2932e418702b84d0cc07", - "computerDnsName": "mymachine1.contoso.com", - "firstSeen": "2018-08-02T14:55:03.7791856Z", - "lastSeen": "2018-08-02T14:55:03.7791856Z", - "osPlatform": "Windows10", - "osVersion": "10.0.0.0", - "lastIpAddress": "172.17.230.209", - "lastExternalIpAddress": "167.220.196.71", - "agentVersion": "10.5830.18209.1001", - "osBuild": 18209, - "healthStatus": "Active", - "rbacGroupId": 140, - "riskScore": "Low", - "rbacGroupName": "The-A-Team", - "aadDeviceId": "80fe8ff8-2624-418e-9591-41f0491218f9", - "machineTags": [ "test tag 1", "test tag 2" ] - }, - { - "id": "7292e4b8cb74ff1cc3d8a495eb29dc8858b732f7", - "computerDnsName": "mymachine2.contoso.com", - "firstSeen": "2018-07-09T13:22:45.1250071Z", - "lastSeen": "2018-07-09T13:22:45.1250071Z", - "osPlatform": "Windows10", - "osVersion": "10.0.0.0", - "lastIpAddress": "192.168.12.225", - "lastExternalIpAddress": "79.183.65.82", - "agentVersion": "10.5820.17724.1000", - "osBuild": 17724, - "healthStatus": "Inactive", - "rbacGroupId": 140, - "rbacGroupName": "The-A-Team", - "riskScore": "Low", - "aadDeviceId": null, - "machineTags": [ "test tag 1" ] - } - ] -} -``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/is-domain-seen-in-org.md b/windows/security/threat-protection/microsoft-defender-atp/is-domain-seen-in-org.md deleted file mode 100644 index 38debbe291..0000000000 --- a/windows/security/threat-protection/microsoft-defender-atp/is-domain-seen-in-org.md +++ /dev/null @@ -1,82 +0,0 @@ ---- -title: Is domain seen in org API -description: Use this API to create calls related to checking whether a domain was seen in the organization. -keywords: apis, graph api, supported apis, domain, domain seen -search.product: eADQiWindows 10XVcnh -ms.prod: w10 -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.author: macapara -author: mjcaparas -ms.localizationpriority: medium -manager: dansimp -audience: ITPro -ms.collection: M365-security-compliance -ms.topic: article ---- - -# Was domain seen in org (Deprecated) - -**Applies to:** - -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) - -Answers whether a domain was seen in the organization. - -## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) - -Permission type | Permission | Permission display name -:---|:---|:--- -Application | Url.Read.All | 'Read URLs' -Delegated (work or school account) | URL.Read.All | 'Read URLs' - ->[!Note] -> When obtaining a token using user credentials: ->- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information) - -## HTTP request -``` -GET /api/domains/{domain} -``` - -## Request headers - -Header | Value -:---|:--- -Authorization | Bearer {token}. **Required**. - - -## Request body -Empty - -## Response -If successful and domain exists - 200 OK. If domain does not exist - 404 Not Found. - -## Example - -**Request** - -Here is an example of the request. - -[!include[Improve request performance](improve-request-performance.md)] - -``` -GET https://api.securitycenter.windows.com/api/domains/example.com -Content-type: application/json -``` - -**Response** - -Here is an example of the response. - - -``` -HTTP/1.1 200 OK -Content-type: application/json -{ - "@odata.context": "https://api.securitycenter.windows.com/api/$metadata#Domains/$entity", - "host": "example.com" -} -``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/is-ip-seen-org.md b/windows/security/threat-protection/microsoft-defender-atp/is-ip-seen-org.md deleted file mode 100644 index f112796be2..0000000000 --- a/windows/security/threat-protection/microsoft-defender-atp/is-ip-seen-org.md +++ /dev/null @@ -1,82 +0,0 @@ ---- -title: Is IP seen in org API -description: Answers whether an IP was seen in the organization. -keywords: apis, graph api, supported apis, is, ip, seen, org, organization -search.product: eADQiWindows 10XVcnh -ms.prod: w10 -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.author: macapara -author: mjcaparas -ms.localizationpriority: medium -manager: dansimp -audience: ITPro -ms.collection: M365-security-compliance -ms.topic: article ---- - -# Was IP seen in org (Deprecated) - -**Applies to:** - -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) - -Answers whether an IP was seen in the organization. - -## Permissions -One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md) - -Permission type | Permission | Permission display name -:---|:---|:--- -Application | Ip.Read.All | 'Read IP address profiles' -Delegated (work or school account) | Ip.Read.All | 'Read IP address profiles' - ->[!Note] -> When obtaining a token using user credentials: ->- The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information) - -## HTTP request -``` -GET /api/ips/{ip} -``` - -## Request headers - -Name | Type | Description -:---|:---|:--- -Authorization | String | Bearer {token}. **Required**. - - -## Request body -Empty - -## Response -If successful and IP exists - 200 OK. If IP do not exist - 404 Not Found. - - -## Example - -**Request** - -Here is an example of the request. - -``` -GET https://api.securitycenter.windows.com/api/ips/10.209.67.177 -``` - -**Response** - -Here is an example of the response. - -[!include[Improve request performance](improve-request-performance.md)] - - -``` -HTTP/1.1 200 OK -Content-type: application/json -{ - "@odata.context": "https://api.securitycenter.windows.com/api/$metadata#Ips/$entity", - "id": "10.209.67.177" -} -``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/management-apis.md b/windows/security/threat-protection/microsoft-defender-atp/management-apis.md index 75f1890d2a..40c4a73464 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/management-apis.md +++ b/windows/security/threat-protection/microsoft-defender-atp/management-apis.md @@ -52,7 +52,6 @@ An important aspect of machine management is the ability to analyze the environm Topic | Description :---|:--- Understand threat intelligence concepts | Learn about alert definitions, indicators of compromise, and other threat intelligence concepts. -Supported Microsoft Defender ATP APIs | Learn more about the individual supported entities where you can run API calls to and details such as HTTP request values, request headers and expected responses. Managed security service provider | Get a quick overview on managed security service provider support. diff --git a/windows/security/threat-protection/microsoft-defender-atp/oldTOC.txt b/windows/security/threat-protection/microsoft-defender-atp/oldTOC.txt index f06995f573..9dd1998f62 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/oldTOC.txt +++ b/windows/security/threat-protection/microsoft-defender-atp/oldTOC.txt @@ -392,7 +392,6 @@ ####### [Get domain related alerts](get-domain-related-alerts.md) ####### [Get domain related machines](get-domain-related-machines.md) ####### [Get domain statistics](get-domain-statistics.md) -####### [Is domain seen in organization (Deprecated)](is-domain-seen-in-org.md) ###### [File]() ####### [Methods and properties](files.md) @@ -403,9 +402,7 @@ ###### [IP]() ####### [Get IP related alerts](get-ip-related-alerts.md) -####### [Get IP related machines (Deprecated)](get-ip-related-machines.md) ####### [Get IP statistics](get-ip-statistics.md) -####### [Is IP seen in organization (Deprecated)](is-ip-seen-org.md) ###### [User]() ####### [Methods](user.md) @@ -428,13 +425,13 @@ ##### [Experiment with custom threat intelligence alerts](experiment-custom-ti.md) ##### [Troubleshoot custom threat intelligence issues](troubleshoot-custom-ti.md) -#### [Pull alerts to your SIEM tools]() -##### [Learn about different ways to pull alerts](configure-siem.md) +#### [Pull Detections to your SIEM tools]() +##### [Learn about different ways to pull Detections](configure-siem.md) ##### [Enable SIEM integration](enable-siem-integration.md) -##### [Configure Splunk to pull alerts](configure-splunk.md) -##### [Configure HP ArcSight to pull alerts](configure-arcsight.md) -##### [Microsoft Defender ATP SIEM alert API fields](api-portal-mapping.md) -##### [Pull alerts using SIEM REST API](pull-alerts-using-rest-api.md) +##### [Configure Splunk to pull Detections](configure-splunk.md) +##### [Configure HP ArcSight to pull Detections](configure-arcsight.md) +##### [Microsoft Defender ATP Detection fields](api-portal-mapping.md) +##### [Pull Detections using SIEM REST API](pull-alerts-using-rest-api.md) ##### [Troubleshoot SIEM tool integration issues](troubleshoot-siem.md) #### [Reporting]() diff --git a/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api.md b/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api.md index abf6c2fb00..c8bd39a230 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api.md +++ b/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api.md @@ -1,7 +1,7 @@ --- -title: Pull Microsoft Defender ATP alerts using REST API -description: Pull alerts from Microsoft Defender ATP REST API. -keywords: alerts, pull alerts, rest api, request, response +title: Pull Microsoft Defender ATP detections using REST API +description: Pull detections from Microsoft Defender ATP REST API. +keywords: detections, pull detections, rest api, request, response search.product: eADQiWindows 10XVcnh search.appverid: met150 ms.prod: w10 @@ -17,7 +17,7 @@ ms.collection: M365-security-compliance ms.topic: article --- -# Pull Microsoft Defender ATP alerts using SIEM REST API +# Pull Microsoft Defender ATP detections using SIEM REST API **Applies to:** - [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) @@ -26,7 +26,11 @@ ms.topic: article >Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-pullalerts-abovefoldlink) -Microsoft Defender ATP supports the OAuth 2.0 protocol to pull alerts from the portal. +>[!Note] +>- [Microsoft Defender ATP Alert](alerts.md) is composed from one or more detections +>- [Microsoft Defender ATP Detection](api-portal-mapping.md) is composed from the suspicious event occurred on the Machine and its related Alert details. + +Microsoft Defender ATP supports the OAuth 2.0 protocol to pull detections from the API. In general, the OAuth 2.0 protocol supports four types of flows: - Authorization grant flow @@ -36,19 +40,19 @@ In general, the OAuth 2.0 protocol supports four types of flows: For more information about the OAuth specifications, see the [OAuth Website](http://www.oauth.net). -Microsoft Defender ATP supports the _Authorization grant flow_ and _Client credential flow_ to obtain access to generate alerts from the portal, with Azure Active Directory (AAD) as the authorization server. +Microsoft Defender ATP supports the _Authorization grant flow_ and _Client credential flow_ to obtain access to pull detections, with Azure Active Directory (AAD) as the authorization server. The _Authorization grant flow_ uses user credentials to get an authorization code, which is then used to obtain an access token. The _Client credential flow_ uses client credentials to authenticate against the Microsoft Defender ATP endpoint URL. This flow is suitable for scenarios when an OAuth client creates requests to an API that doesn't require user credentials. -Use the following method in the Microsoft Defender ATP API to pull alerts in JSON format. +Use the following method in the Microsoft Defender ATP API to pull detections in JSON format. >[!NOTE] >Microsoft Defender Security Center merges similar alert detections into a single alert. This API pulls alert detections in its raw form based on the query parameters you set, enabling you to apply your own grouping and filtering. ## Before you begin -- Before calling the Microsoft Defender ATP endpoint to pull alerts, you'll need to enable the SIEM integration application in Azure Active Directory (AAD). For more information, see [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration.md). +- Before calling the Microsoft Defender ATP endpoint to pull detections, you'll need to enable the SIEM integration application in Azure Active Directory (AAD). For more information, see [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration.md). - Take note of the following values in your Azure application registration. You need these values to configure the OAuth flow in your service or daemon app: - Application ID (unique to your application) @@ -59,7 +63,7 @@ Use the following method in the Microsoft Defender ATP API to pull alerts in JSO ## Get an access token Before creating calls to the endpoint, you'll need to get an access token. -You'll use the access token to access the protected resource, which are alerts in Microsoft Defender ATP. +You'll use the access token to access the protected resource, which are detections in Microsoft Defender ATP. To get an access token, you'll need to do a POST request to the token issuing endpoint. Here is a sample request: @@ -105,23 +109,23 @@ Use optional query parameters to specify and control the amount of data returned Name | Value| Description :---|:---|:--- -DateTime?sinceTimeUtc | string | Defines the lower time bound alerts are retrieved from, based on field:
`LastProcessedTimeUtc`
The time range will be: from sinceTimeUtc time to current time.

**NOTE**: When not specified, all alerts generated in the last two hours are retrieved. -DateTime?untilTimeUtc | string | Defines the upper time bound alerts are retrieved.
The time range will be: from `sinceTimeUtc` time to `untilTimeUtc` time.

**NOTE**: When not specified, the default value will be the current time. -string ago | string | Pulls alerts in the following time range: from `(current_time - ago)` time to `current_time` time.

Value should be set according to **ISO 8601** duration format
E.g. `ago=PT10M` will pull alerts received in the last 10 minutes. -int?limit | int | Defines the number of alerts to be retrieved. Most recent alerts will be retrieved based on the number defined.

**NOTE**: When not specified, all alerts available in the time range will be retrieved. -machinegroups | String | Specifies machine groups to pull alerts from.

**NOTE**: When not specified, alerts from all machine groups will be retrieved.

Example:

```https://wdatp-alertexporter-eu.securitycenter.windows.com/api/Alerts/?machinegroups=UKMachines&machinegroups=FranceMachines``` +DateTime?sinceTimeUtc | string | Defines the lower time bound detections are retrieved from, based on field:
`LastProcessedTimeUtc`
The time range will be: from sinceTimeUtc time to current time.

**NOTE**: When not specified, all detections generated in the last two hours are retrieved. +DateTime?untilTimeUtc | string | Defines the upper time bound detections are retrieved.
The time range will be: from `sinceTimeUtc` time to `untilTimeUtc` time.

**NOTE**: When not specified, the default value will be the current time. +string ago | string | Pulls detections in the following time range: from `(current_time - ago)` time to `current_time` time.

Value should be set according to **ISO 8601** duration format
E.g. `ago=PT10M` will pull detections received in the last 10 minutes. +int?limit | int | Defines the number of detections to be retrieved. Most recent detections will be retrieved based on the number defined.

**NOTE**: When not specified, all detections available in the time range will be retrieved. +machinegroups | String | Specifies machine groups to pull detections from.

**NOTE**: When not specified, detections from all machine groups will be retrieved.

Example:

```https://wdatp-alertexporter-eu.securitycenter.windows.com/api/Alerts/?machinegroups=UKMachines&machinegroups=FranceMachines``` DeviceCreatedMachineTags | string | Single machine tag from the registry. CloudCreatedMachineTags | string | Machine tags that were created in Microsoft Defender Security Center. ### Request example -The following example demonstrates how to retrieve all the alerts in your organization. +The following example demonstrates how to retrieve all the detections in your organization. ```syntax GET https://wdatp-alertexporter-eu.windows.com/api/alerts Authorization: Bearer ``` -The following example demonstrates a request to get the last 20 alerts since 2016-09-12 00:00:00. +The following example demonstrates a request to get the last 20 detections since 2016-09-12 00:00:00. ```syntax GET https://wdatp-alertexporter-eu.windows.com/api/alerts?limit=20&sinceTimeUtc=2016-09-12T00:00:00.000 @@ -178,14 +182,14 @@ AuthenticationContext context = new AuthenticationContext(string.Format("https:/ ClientCredential clientCredentials = new ClientCredential(clientId, clientSecret); AuthenticationResult authenticationResult = context.AcquireToken(resource, clientCredentials); ``` -### Use token to connect to the alerts endpoint +### Use token to connect to the detections endpoint ``` HttpClient httpClient = new HttpClient(); httpClient.DefaultRequestHeaders.Authorization = new AuthenticationHeaderValue(authenticationResult.AccessTokenType, authenticationResult.AccessToken); HttpResponseMessage response = httpClient.GetAsync("https://wdatp-alertexporter-eu.windows.com/api/alert").GetAwaiter().GetResult(); -string alertsJson = response.Content.ReadAsStringAsync().Result; -Console.WriteLine("Got alert list: {0}", alertsJson); +string detectionsJson = response.Content.ReadAsStringAsync().Result; +Console.WriteLine("Got detections list: {0}", detectionsJson); ``` @@ -203,7 +207,7 @@ HTTP error code | Description ## Related topics - [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration.md) -- [Configure ArcSight to pull Microsoft Defender ATP alerts](configure-arcsight.md) -- [Configure Splunk to pull Microsoft Defender ATP alerts](configure-splunk.md) -- [Microsoft Defender ATP alert API fields](api-portal-mapping.md) +- [Configure ArcSight to pull Microsoft Defender ATP detections](configure-arcsight.md) +- [Configure Splunk to pull Microsoft Defender ATP detections](configure-splunk.md) +- [Microsoft Defender ATP Detection fields](api-portal-mapping.md) - [Troubleshoot SIEM tool integration issues](troubleshoot-siem.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-siem.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-siem.md index c45bc362d2..e6d27968c0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-siem.md +++ b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-siem.md @@ -25,7 +25,7 @@ ms.topic: troubleshooting -You might need to troubleshoot issues while pulling alerts in your SIEM tools. +You might need to troubleshoot issues while pulling detections in your SIEM tools. This page provides detailed steps to troubleshoot issues you might encounter. @@ -80,7 +80,7 @@ If you encounter an error when trying to enable the SIEM connector application, ## Related topics - [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration.md) -- [Configure ArcSight to pull Microsoft Defender ATP alerts](configure-arcsight.md) -- [Configure Splunk to pull Microsoft Defender ATP alerts](configure-splunk.md) -- [Microsoft Defender ATP alert API fields](api-portal-mapping.md) -- [Pull Microsoft Defender ATP alerts using REST API](pull-alerts-using-rest-api.md) +- [Configure ArcSight to pull Microsoft Defender ATP detections](configure-arcsight.md) +- [Configure Splunk to pull Microsoft Defender ATP detections](configure-splunk.md) +- [Microsoft Defender ATP Detection fields](api-portal-mapping.md) +- [Pull Microsoft Defender ATP detections using REST API](pull-alerts-using-rest-api.md) From 20d80bacbfb22eb699ed80fb115054b9a0140200 Mon Sep 17 00:00:00 2001 From: Deland-Han Date: Wed, 4 Sep 2019 11:18:06 +0800 Subject: [PATCH 090/285] edit --- windows/client-management/TOC.md | 2 +- .../determine-appropriate-page-file-size.md | 29 +++++------ .../generate-kernel-or-complete-crash-dump.md | 29 +++++------ ...page-file.md => introduction-page-file.md} | 20 ++++---- .../system-failure-recovery-options.md | 50 +++++++++---------- .../troubleshoot-windows-startup.md | 20 ++++---- 6 files changed, 74 insertions(+), 76 deletions(-) rename windows/client-management/{introduction-of-page-file.md => introduction-page-file.md} (80%) diff --git a/windows/client-management/TOC.md b/windows/client-management/TOC.md index c998cd5263..05d41bdfa9 100644 --- a/windows/client-management/TOC.md +++ b/windows/client-management/TOC.md @@ -24,7 +24,7 @@ ### [Advanced troubleshooting for Windows startup](troubleshoot-windows-startup.md) #### [How to determine the appropriate page file size for 64-bit versions of Windows](determine-appropriate-page-file-size.md) #### [Generate a kernel or complete crash dump](generate-kernel-or-complete-crash-dump.md) -#### [Introduction to the page file](introduction-of-page-file.md) +#### [Introduction to the page file](introduction-page-file.md) #### [Configure system failure and recovery options in Windows](system-failure-recovery-options.md) #### [Advanced troubleshooting for Windows boot problems](advanced-troubleshooting-boot-problems.md) #### [Advanced troubleshooting for Windows-based computer freeze](troubleshoot-windows-freeze.md) diff --git a/windows/client-management/determine-appropriate-page-file-size.md b/windows/client-management/determine-appropriate-page-file-size.md index af9ebe39dd..b6abb3661e 100644 --- a/windows/client-management/determine-appropriate-page-file-size.md +++ b/windows/client-management/determine-appropriate-page-file-size.md @@ -14,25 +14,25 @@ manager: dcscontentpm # How to determine the appropriate page file size for 64-bit versions of Windows -In summary, page file sizing depends on the system crash dump setting requirements and the system commit charge peak usage or expected usage. Both considerations are unique to each system, even for systems that are identical to other systems. This means that page file sizing is unique to each system and cannot be generalized. +Page file sizing depends on the system crash dump setting requirements and the peak usage or expected peak usage of the system commit charge. Both considerations are unique to each system, even for systems that are identical. This means that page file sizing is also unique to each system and cannot be generalized. ## Determine the appropriate page file size -Use the following considerations for page file sizing for all versions of Windows and Windows Server: +Use the following considerations for page file sizing for all versions of Windows and Windows Server. ### Crash dump setting -If you want a crash dump file to be created during a system crash, a page file or a dedicated dump file must exist and be large enough to back the system crash dump setting. Otherwise, a system memory dump file is not created. +If you want a crash dump file to be created during a system crash, a page file or a dedicated dump file must exist and be large enough to back up the system crash dump setting. Otherwise, a system memory dump file is not created. -For more information, see [Support for system crash dumps](introduction-of-page-file.md#support-for-system-crash-dumps) section. +For more information, see [Support for system crash dumps](introduction-page-file.md#support-for-system-crash-dumps) section. ### Peak system commit charge -The system commit charge cannot exceed the system commit limit. This limit is the sum of physical memory (RAM) and all page files combined. If no page files exist, the system commit limit is slightly less than the physical memory installed. Peak system-committed memory usage can vary greatly between systems. Therefore, physical memory and page file sizing also varies. +The system commit charge cannot exceed the system commit limit. This limit is the sum of physical memory (RAM) and all page files combined. If no page files exist, the system commit limit is slightly less than the physical memory that is installed. Peak system-committed memory usage can vary greatly between systems. Therefore, physical memory and page file sizing also vary. ### Quantity of infrequently accessed pages -The purpose of a page file is to back infrequently accessed modified pages so that they can be removed from physical memory. This provides more available space for more frequently accessed pages. The "\Memory\Modified Page List Bytes" performance counter measures, in part, the number of infrequently accessed modified pages that are destined for the hard disk. However, be aware that not all the memory on the modified page list is written out to disk. Typically, several hundred megabytes of memory remains resident on the modified list. Therefore, consider extending or adding a page file if all the following conditions are true: +The purpose of a page file is to *back* (support) infrequently accessed modified pages so that they can be removed from physical memory. This provides more available space for more frequently accessed pages. The "\Memory\Modified Page List Bytes" performance counter measures, in part, the number of infrequently accessed modified pages that are destined for the hard disk. However, be aware that not all the memory on the modified page list is written out to disk. Typically, several hundred megabytes of memory remains resident on the modified list. Therefore, consider extending or adding a page file if all the following conditions are true: - More available physical memory (\Memory\Available MBytes) is required. @@ -42,7 +42,7 @@ The purpose of a page file is to back infrequently accessed modified pages so th ## Support for system crash dumps -A system crash (also known as a “bug check” or a "Stop error") occurs when the system cannot run correctly. The dump file that is produced from this event is called a system crash dump. A page file or dedicated dump file is used to write a crash dump file (memory.dmp) to disk. Therefore, a page file or a dedicated dump file must be large enough to support the kind of crash dump selected. Otherwise, the system cannot create the crash dump file. +A system crash (also known as a “bug check” or a "Stop error") occurs when the system cannot run correctly. The dump file that is produced from this event is called a system crash dump. A page file or dedicated dump file is used to write a crash dump file (Memory.dmp) to disk. Therefore, a page file or a dedicated dump file must be large enough to support the kind of crash dump selected. Otherwise, the system cannot create the crash dump file. >[!Note] >During startup, system-managed page files are sized respective to the system crash dump settings. This assumes that enough free disk space exists. @@ -58,18 +58,19 @@ A system crash (also known as a “bug check” or a "Stop error") occurs when t The **Automatic memory dump** setting is enabled by default. This is a setting instead of a kind of crash dump. This setting automatically selects the best page file size, depending on the frequency of system crashes. -The Automatic memory dump feature at first selects a small paging file size. It would accommodate the kernel memory most of the time. If the system crashes again within four weeks, the Automatic memory dump feature selects the page file size as either the RAM size or 32 GB, whichever is smaller. +The Automatic memory dump feature initially selects a small paging file size. It would accommodate the kernel memory most of the time. If the system crashes again within four weeks, the Automatic memory dump feature sets the page file size as either the RAM size or 32 GB, whichever is smaller. Kernel memory crash dumps require enough page file space or dedicated dump file space to accommodate the kernel mode side of virtual memory usage. If the system crashes again within four weeks of the previous crash, a Complete memory dump is selected at restart. This requires a page file or dedicated dump file of at least the size of physical memory (RAM) plus 1 MB for header information plus 256 MB for potential driver data to support all the potential data that is dumped from memory. Again, the system-managed page file will be increased to back this kind of crash dump. If the system is configured to have a page file or a dedicated dump file of a specific size, make sure that the size is sufficient to back the crash dump setting that is listed in the table earlier in this section together with and the peak system commit charge. ### Dedicated dump files Computers that are running Microsoft Windows or Microsoft Windows Server usually must have a page file to support a system crash dump. System administrators now have the option to create a dedicated dump file instead. -A dedicated dump file is a page file that is not used for paging. Instead, it is “dedicated” to back a system crash dump file (memory.dmp) when a system crash occurs. Dedicated dump files can be put on any disk volume that can support a page file. We recommend that you use a dedicated dump file when you want a system crash dump, but you do not want a page file. + +A dedicated dump file is a page file that is not used for paging. Instead, it is “dedicated” to back a system crash dump file (Memory.dmp) when a system crash occurs. Dedicated dump files can be put on any disk volume that can support a page file. We recommend that you use a dedicated dump file if you want a system crash dump but you do not want a page file. ## System-managed page files -By default, page files are system managed. This means that the page files increase and decrease based on many factors, such as the amount of physical memory installed, the process of accommodating the system commit charge, and the process of accommodating a system crash dump. +By default, page files are system-managed. This means that the page files increase and decrease based on many factors, such as the amount of physical memory installed, the process of accommodating the system commit charge, and the process of accommodating a system crash dump. For example, when the system commit charge is more than 90 percent of the system commit limit, the page file is increased to back it. This continues to occur until the page file reaches three times the size of physical memory or 4 GB, whichever is larger. This all assumes that the logical disk that is hosting the page file is large enough to accommodate the growth. @@ -77,7 +78,7 @@ The following table lists the minimum and maximum page file sizes of system-mana |Minimum page file size |Maximum page file size| |---------------|------------------| -|Varies based on page file usage history, amount of RAM (RAM ÷ 8, max 32 GB) and crash dump settings. |3 × RAM or 4 GB, whichever is larger. This is then limited to the volume size ÷ 8. However, it can grow to within 1 GB of free space on the volume if required for crash dump settings.| +|Varies based on page file usage history, amount of RAM (RAM ÷ 8, max 32 GB) and crash dump settings. |3 × RAM or 4 GB, whichever is larger. This is then limited to the volume size ÷ 8. However, it can grow to within 1 GB of free space on the volume if required for crash dump settings.| ## Performance counters @@ -109,7 +110,7 @@ Hard page faults are faults that must be resolved by retrieving the data from di High values for these counters (excessive paging) indicate disk access of generally 4 KB per page fault on x86 and x64 versions of Windows and Windows Server. This disk access might or might not be related to page file activity but may contribute to poor disk performance that can cause system-wide delays if the related disks are overwhelmed. -Therefore, we recommend that you monitor the disk performance of the logical disks that host a page file in correlation with these counters. Be aware that a system that has a sustained 100 hard page faults per second experiences 400 KB per second disk transfers. Most 7200 RPM disk drives can handle about 5 MB per second at an IO size of 16 KB or 800 KB per second at an IO size of 4 KB. No performance counter directly measures which logical disk the hard page faults are resolved for. +Therefore, we recommend that you monitor the disk performance of the logical disks that host a page file in correlation with these counters. Be aware that a system that has a sustained 100 hard page faults per second experiences 400 KB per second disk transfers. Most 7,200 RPM disk drives can handle about 5 MB per second at an IO size of 16 KB or 800 KB per second at an IO size of 4 KB. No performance counter directly measures which logical disk the hard page faults are resolved for. ### \Paging File(*)\% Usage @@ -118,11 +119,11 @@ The \Paging File(*)\% Usage performance counter measures the percentage of usage >[!Note] >The size of the Modified Page List (\Memory\Modified Page List Bytes) is the total of modified data that is waiting to be written to disk. -If the Modified Page List (a list of physical memory pages that are the least frequently accessed) contains a lot of memory, and if the % Usage value of all page files is greater than 90, you can make more physical memory available for more frequently access pages by increasing or adding a page file. +If the Modified Page List (a list of physical memory pages that are the least frequently accessed) contains lots of memory, and if the **% Usage** value of all page files is greater than 90, you can make more physical memory available for more frequently access pages by increasing or adding a page file. >[!Note] >Not all the memory on the modified page list is written out to disk. Typically, several hundred megabytes of memory remains resident on the modified list. ## Multiple page files and disk considerations -If a system is configured to have more than one page files, the page file that responds first is the one that is used. This means that page files that are on faster disks are used more frequently. Also, putting a page file on a “fast” or “slow” disk is important only if the page file is frequently accessed and if the disk that is hosting the respective page file is overwhelmed. Be aware that actual page file usage depends greatly on the amount of modified memory that the system is managing. This means that files that already exist on disk (such as .txt, .doc, .dll, and .exe) are not written to a page file. Only modified data that does not already exist on disk (for example, unsaved text in Notepad ) is memory that could potentially be backed by a page file. After the unsaved data is saved to disk as a file, it is backed by the disk and not by a page file. +If a system is configured to have more than one page files, the page file that responds first is the one that is used. This means that page files that are on faster disks are used more frequently. Also, whether you put a page file on a “fast” or “slow” disk is important only if the page file is frequently accessed and if the disk that is hosting the respective page file is overwhelmed. Be aware that actual page file usage depends greatly on the amount of modified memory that the system is managing. This means that files that already exist on disk (such as .txt, .doc, .dll, and .exe) are not written to a page file. Only modified data that does not already exist on disk (for example, unsaved text in Notepad) is memory that could potentially be backed by a page file. After the unsaved data is saved to disk as a file, it is backed by the disk and not by a page file. diff --git a/windows/client-management/generate-kernel-or-complete-crash-dump.md b/windows/client-management/generate-kernel-or-complete-crash-dump.md index 21bffca246..894ed853fc 100644 --- a/windows/client-management/generate-kernel-or-complete-crash-dump.md +++ b/windows/client-management/generate-kernel-or-complete-crash-dump.md @@ -16,7 +16,7 @@ manager: dcscontentpm A system crash (also known as a “bug check” or a "Stop error") occurs when Windows can't run correctly. The dump file that is produced from this event is called a system crash dump. -A manual kernel or complete memory dump file is useful when troubleshooting a number of issues because the process captures a record of system memory at the time of a crash. +A manual kernel or complete memory dump file is useful when you troubleshoot several issues because the process captures a record of system memory at the time of a crash. ## Set up page files @@ -28,27 +28,27 @@ You must be logged on as an administrator or a member of the Administrators grou To enable memory dump setting, follow these steps: -1. In **Control Panel**, click **System and Security** -> **System**, or click **System** directly if control panel is viewed by icons. +1. In **Control Panel**, select **System and Security** > **System**. -2. Click **Advanced system settings**, and then click the **Advanced** tab. +2. Select **Advanced system settings**, and then select the **Advanced** tab. -3. Under **Startup and Recovery**, click **Settings**. +3. In the **Startup and Recovery** area, select **Settings**. 4. Make sure that **Kernel memory dump** or **Complete memory dump** is selected under **Writing Debugging Information**. 5. Restart the computer. >[!Note] -> You can change the dump file path by edit the **Dump file** field. In other words, you can change the path from %SystemRoot%\Memory.dmp to point to a local drive that has enough disk space, such as E:\Memory.dmp. +>You can change the dump file path by edit the **Dump file** field. In other words, you can change the path from %SystemRoot%\Memory.dmp to point to a local drive that has enough disk space, such as E:\Memory.dmp. -### Tips for memory dump +### Tips to generate memory dumps -When computer crashes and restarts, the contents of physical RAM are written to the paging file that is located on the partition on which the operating system is installed. +When the computer crashes and restarts, the contents of physical RAM are written to the paging file that is located on the partition on which the operating system is installed. -Depending on the speed of the hard drive on which Windows is installed, dumping more than 2 gigabytes (GB) of memory may take a long time. Even in a best case scenario, where the dump file is configured to reside on another local hard drive, there will be a significant amount of data being read and written to the hard drives. This can cause a prolonged server outage. +Depending on the speed of the hard disk on which Windows is installed, dumping more than 2 gigabytes (GB) of memory may take a long time. Even in a best case scenario, if the dump file is configured to reside on another local hard drive, a significant amount of data will be read and written to the hard disks. This can cause a prolonged server outage. >[!Note] ->Use this method to generate complete memory dump files with caution. Ideally, you should only do this only when you are explicitly requested to by the Microsoft Customer Support Services Engineer. Any kernel or complete memory dump file debugging should be the last resort when all the standard troubleshooting methods have been completely exhausted. +>Use this method to generate complete memory dump files with caution. Ideally, you should do this only when you are explicitly requested to by the Microsoft Support engineer. Any kernel or complete memory dump file debugging should be the last resort after all standard troubleshooting methods have been completely exhausted. ## Manually generate a memory dump file @@ -58,7 +58,7 @@ If you can log on while the problem is occurring, you can use the Microsoft Sysi 1. Download the [NotMyFault](https://download.sysinternals.com/files/NotMyFault.zip) tool. -2. Click **Start**, and then click **Command Prompt**. +2. Select **Start**, and then select **Command Prompt**. 3. At the command line, run the following command: ```cmd @@ -66,7 +66,7 @@ If you can log on while the problem is occurring, you can use the Microsoft Sysi ``` >[!Note] ->This operation generates a memory dump file and a D1 stop error. +>This operation generates a memory dump file and a D1 Stop error. ### Use NMI @@ -86,13 +86,13 @@ To do this, follow these steps: 3. Type NMICrashDump, and then press Enter. -4. Right-click **NMICrashDump**, and then click **Modify**. +4. Right-click **NMICrashDump**, and then select **Modify**. -5. In the **Value data** box, type 1, and then click **OK**. +5. In the **Value data** box, type **1**, and then select **OK**. 6. Restart the computer. -7. Hardware vendors, such as HP, IBM, and Dell, may provide an Automatic System Recovery (ASR) feature. You should disable this feature during troubleshooting. For example, if HP and Compaq's ASR feature is enabled in the BIOS, disable this feature while you are troubleshooting to generate a complete memory.dmp file. For the exact steps, contact your hardware vendor. +7. Hardware vendors, such as HP, IBM, and Dell, may provide an Automatic System Recovery (ASR) feature. You should disable this feature during troubleshooting. For example, if the HP and Compaq ASR feature is enabled in the BIOS, disable this feature while you troubleshoot to generate a complete Memory.dmp file. For the exact steps, contact your hardware vendor. 8. Enable the NMI switch in the BIOS or by using the Integrated Lights Out (iLO) Web interface. @@ -108,3 +108,4 @@ To do this, follow these steps: ### Use Debugger [Forcing a System Crash from the Debugger](https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/forcing-a-system-crash-from-the-debugger) + diff --git a/windows/client-management/introduction-of-page-file.md b/windows/client-management/introduction-page-file.md similarity index 80% rename from windows/client-management/introduction-of-page-file.md rename to windows/client-management/introduction-page-file.md index ebab8b0352..747ac0b22a 100644 --- a/windows/client-management/introduction-of-page-file.md +++ b/windows/client-management/introduction-page-file.md @@ -12,13 +12,13 @@ ms.reviewer: manager: dcscontentpm --- -# Introduction to the page file +# Introduction to page files A page file (also known as a "paging file") is an optional, hidden system file on a hard disk. ## Functionality -Page files have the following functionalities: +Page files have the following functionalities. ### Physical extension of RAM @@ -30,7 +30,7 @@ Some products or services require a page file for various reasons. For specific For example, the following Windows servers requires page files: -- Windows Server domain controllers +- Windows Server domain controllers (DCs) - DFS Replication (DFS-R) servers @@ -44,7 +44,7 @@ For Windows Server 2012 Hyper-V and Windows Server 2012 R2 Hyper-V, the page fil ### Support for system crash dumps -Page files can be used to "back" (or support) system crash dumps and extend how much system-committed memory (also known as “virtual memory”) a system can back. +Page files can be used to "back" (or support) system crash dumps and extend how much system-committed memory (also known as “virtual memory”) a system can support. For more information about system crash dumps, see [system crash dump options](system-failure-recovery-options.md#under-write-debugging-information). @@ -56,19 +56,19 @@ However, the reason to configure the page file size has not changed. It has alwa ## System committed memory -Page files extend how much "Committed memory" (also known as "Virtual Memory") is used to store modified data. +Page files extend how much "committed memory" (also known as "virtual memory") is used to store modified data. The system commit memory limit is the sum of physical memory and all page files combined. It represents the maximum system-committed memory (also known as the "system commit charge") that the system can support. -![Task manager](images/task-manager.png) +![Task manager](media/task-manager.png) The system commit charge is the total committed or "promised" memory of all committed virtual memory in the system. If the system commit charge reaches the system commit limit, the system and processes might not get committed memory. This condition can cause freezing, crashing, and other malfunctions. Therefore, make sure that you set the system commit limit high enough to support the system commit charge during peak usage. -![Out of memory](images/out-of-memory.png) +![Out of memory](media/out-of-memory.png) -![Task manager](images/task-manager-commit.png) +![Task Manager](media/task-manager-commit.png) -The system committed charge and system committed limit can be measured on the Performance tab in Task Manager or by using the "\Memory\Committed Bytes" and "\Memory\Commit Limit" performance counters. The \Memory\% Committed Bytes In Use counter is a ratio of \Memory\Committed Bytes to \Memory\Commit Limit values. +The system committed charge and system committed limit can be measured on the **Performance** tab in Task Manager or by using the "\Memory\Committed Bytes" and "\Memory\Commit Limit" performance counters. The \Memory\% Committed Bytes In Use counter is a ratio of \Memory\Committed Bytes to \Memory\Commit Limit values. >[!Note] ->System-managed page files automatically grow up to three times physical memory or 4 GB (whichever is larger) when the system commit charge reaches 90 percent of the system commit limit. This assumes that enough free disk space is available to accommodate the growth. +>System-managed page files automatically grow up to three times the physical memory or 4 GB (whichever is larger) when the system commit charge reaches 90 percent of the system commit limit. This assumes that enough free disk space is available to accommodate the growth. diff --git a/windows/client-management/system-failure-recovery-options.md b/windows/client-management/system-failure-recovery-options.md index d2164150e4..04dcbbafc9 100644 --- a/windows/client-management/system-failure-recovery-options.md +++ b/windows/client-management/system-failure-recovery-options.md @@ -14,45 +14,45 @@ manager: dcscontentpm # Configure system failure and recovery options in Windows -This article introduces on how to configure the actions that Windows takes when a system error (also referred to as a bug check, system crash, fatal system error, or stop error) occurs. You can configure the following actions: +This article describes how to configure the actions that Windows takes when a system error (also referred to as a bug check, system crash, fatal system error, or Stop error) occurs. You can configure the following actions: - Write an event to the System log. - Alert administrators (if you have set up administrative alerts). -- Put system memory in a file that advanced users can use for debugging. +- Put system memory into a file that advanced users can use for debugging. - Automatically restart the computer. >[!Note] > You must be logged on as an administrator or a member of the Administrators group to complete this procedure. If your computer is connected to a network, network policy settings may prevent you from completing this procedure. -## Configuring System Failure and Recovery Options +## Configuring system failure and recovery options > [!IMPORTANT] > Follow the steps in this section carefully. Serious problems might occur if you modify the registry incorrectly. Before you modify it, [back up the registry for restoration](https://support.microsoft.com/help/322756) in case problems occur. -The options are available in the Startup and Recovery. You can also use the following methods: +The options are available in the **Startup and Recovery** dialog box. You can also use the following methods: -- Modify the values under the following registry key +- Modify the values under the following registry subkey: **HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\CrashControl** -- To modify the option on your local computer, use the command-line utility (Wmic.exe) to access Windows Management Instrumentation (WMI). +- To modify the option on your local computer, use the command line utility (Wmic.exe) to access Windows Management Instrumentation (WMI). -Follow these steps to view the options in Startup and Recovery. The registry value and wmic commands are also listed for each option: +Follow these steps to view the options in **Startup and Recovery**. (The registry value and Wmic commands are also listed for each option.) -1. In Control Panel, click System and Security -> System, or click System directly if control panel is viewed by icons. +1. In Control Panel, select **System and Security > System**. -2. Click Advanced system settings, click the Advanced tab, under Startup and Recovery, and then click Settings. +2. Select **Advanced system settings**, select the **Advanced** tab, and select **Settings** in the **Startup and Recovery** area. ### Under "System failure" -Click to select the check boxes for the actions that you want Windows to perform when a system error occurs. +Select the check boxes for the actions that you want Windows to perform when a system error occurs. #### Write an event to the System log -The option specifies that event information is recorded in the System log. By default, this option is turned on. +This option specifies that event information is recorded in the System log. By default, this option is turned on. To turn off this option, run the following command or modify the registry value: @@ -76,7 +76,7 @@ To turn off this option, run the following command or modify the registry value: #### Automatically restart -The option specifies that Windows automatically restarts your computer. By default, this option is enabled. +The option specifies that Windows automatically restarts your computer. By default, this option is turned on. To turn off this option, run the following command or modify the registry value: @@ -88,7 +88,7 @@ To turn off this option, run the following command or modify the registry value: ### Under "Write debugging information" -Select the type of information that you want Windows to record in a memory dump file if the computer stops unexpectedly: +Select one of the following type of information that you want Windows to record in a memory dump file if the computer stops unexpectedly: #### (none) @@ -103,7 +103,7 @@ To specify that you do not want Windows to record information in a memory dump f #### Small Memory Dump -The option records the smallest amount of information to help identify the problem. This option requires a paging file of at least 2 megabytes (MB) on the boot volume of your computer and specifies that Windows will create a new file each time the system stops unexpectedly. A history of these files is stored in the folder that is listed under Small Dump Directory (%SystemRoot%\Minidump). In Windows XP and Windows Server 2003, the small memory dump file is used with the Windows Error Reporting feature. +The option records the smallest amount of information to help identify the problem. This option requires a paging file of at least 2 megabytes (MB) on the boot volume of your computer, and specifies that Windows will create a new file each time the system stops unexpectedly. A history of these files is stored in the folder that is listed under Small Dump Directory (%SystemRoot%\Minidump). In Windows XP and Windows Server 2003, the small memory dump file is used together with the Windows Error Reporting feature. To specify that you want to use a small memory dump file, run the following command or modify the registry value: @@ -123,7 +123,7 @@ To specify that you want to use a folder as your Small Dump Directory, run the f #### Kernel Memory Dump -The option records only kernel memory. This option stores more information than a small memory dump file, but it takes less time to complete than a complete memory dump file. The file is stored in %SystemRoot%\Memory.dmp by default, and any previous kernel or complete memory dump files are overwritten if the Overwrite any existing file check box is selected. If you set this option, you must have a sufficiently large paging file on the boot volume. The required size depends on the amount of RAM in your computer (although the maximum amount of space that must be available for a kernel memory dump on a 32-bit system is 2 GB plus 16 MB; on a 64-bit system, the maximum amount of space that must be available for a kernel memory dump is the size of the RAM plus 128 MB). The following table contains guidelines for the size of the paging file: +The option records only kernel memory. This option stores more information than a small memory dump file, but it takes less time to complete than a complete memory dump file. The file is stored in %SystemRoot%\Memory.dmp by default, and any previous kernel or complete memory dump files are overwritten if the **Overwrite any existing file** check box is selected. If you set this option, you must have a sufficiently large paging file on the boot volume. The required size depends on the amount of RAM in your computer However, the maximum amount of space that must be available for a kernel memory dump on a 32-bit system is 2 GB plus 16 MB. On a 64-bit system, the maximum amount of space that must be available for a kernel memory dump is the size of the RAM plus 128 MB. The following table provides guidelines for the size of the paging file: |RAM size |Paging file should be no smaller than| |-------|-----------------| @@ -156,9 +156,9 @@ To specify that you do not want to overwrite any previous kernel or complete mem #### Complete Memory Dump -The option records the contents of system memory when the computer stops unexpectedly. This option is not available on computers with 2 or more GB of RAM. If you select this option, you must have a paging file on the boot volume that is sufficient to hold all the physical RAM plus 1 MB. The file is stored as specified in %SystemRoot%\Memory.dmp by default. +The option records the contents of system memory when the computer stops unexpectedly. This option is not available on computers that have 2 or more GB of RAM. If you select this option, you must have a paging file on the boot volume that is sufficient to hold all the physical RAM plus 1 MB. The file is stored as specified in %SystemRoot%\Memory.dmp by default. -The extra MB is required for a complete memory dump file because Windows writes a header in addition to dumping the memory contents. The header contains a crash dump signature and specifies the values of some kernel variables. The header information does not require a full MB of space, but Windows sizes your paging file in increments of MBs. +The extra megabyte is required for a complete memory dump file because Windows writes a header in addition to dumping the memory contents. The header contains a crash dump signature and specifies the values of some kernel variables. The header information does not require a full megabyte of space, but Windows sizes your paging file in increments of megabytes. To specify that you want to use a complete memory dump file, run the following command or modify the registry value: @@ -185,25 +185,21 @@ To specify that you do not want to overwrite any previous kernel or complete mem - Set the **Overwrite** DWORD value to **0**. >[!Note] ->If you contact Microsoft Product Support Services about a stop error, you might be asked for the memory dump file that is generated by the Write Debugging Information option. +>If you contact Microsoft Support about a Stop error, you might be asked for the memory dump file that is generated by the Write Debugging Information option. -To view system failure and recovery settings for your local computer, type `wmic recoveros` at a command prompt, and then press Enter. To view system failure and recovery settings for a remote computer on your local area network, type `wmic /node: recoveros` at a command prompt, and then press Enter. +To view system failure and recovery settings for your local computer, type **wmic recoveros** at a command prompt, and then press Enter. To view system failure and recovery settings for a remote computer on your local area network, type **wmic /node: recoveros** at a command prompt, and then press Enter. >[!Note] ->To successfully use these Wmic.exe command line examples, you must be logged on by using a user account that has administrative rights on the computer. If you are not logged on by using a user account that has administrative rights on the computer, use the `/user:user_name` and `/password:password` switches. +>To successfully use these Wmic.exe command line examples, you must be logged on by using a user account that has administrative rights on the computer. If you are not logged on by using a user account that has administrative rights on the computer, use the **/user:user_name** and **/password:password** switches. ### Tips - To take advantage of the dump file feature, your paging file must be on the boot volume. If you have moved the paging file to another volume, you must move it back to the boot volume before you use this feature. -- If you set the Kernel Memory Dump or the -Complete Memory Dump option, and you select the -Overwrite any existing file check box, Windows always writes to the same file name. To save individual dump files, click to clear the -Overwrite any existing file check box, and then change the file name after each stop error. +- If you set the Kernel Memory Dump or the Complete Memory Dump option, and you select the **Overwrite any existing file** check box, Windows always writes to the same file name. To save individual dump files, click to clear the **Overwrite any existing file** check box, and then change the file name after each Stop error. -- You can save some memory if you click to clear the -Write an event to the system log and Send an administrative alert check boxes. The memory that you save depends on the computer, but these features typically require about 60 to 70 KB. +- You can save some memory if you click to clear the **Write an event to the system log** and **Send an administrative alert** check boxes. The memory that you save depends on the computer, but these features typically require about 60 to 70 KB. -## Reference +## References [Varieties of Kernel-Mode Dump Files](https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/varieties-of-kernel-mode-dump-files) diff --git a/windows/client-management/troubleshoot-windows-startup.md b/windows/client-management/troubleshoot-windows-startup.md index 604a4e0c3a..70bda5a8f5 100644 --- a/windows/client-management/troubleshoot-windows-startup.md +++ b/windows/client-management/troubleshoot-windows-startup.md @@ -14,29 +14,29 @@ manager: dansimp # Advanced troubleshooting for Windows start-up issues -In these topics, you will learn how to troubleshoot common problems related to Windows start-up. +In these topics, you will learn how to troubleshoot common problems that are related to Windows startup. ## How it works -When Microsoft Windows encounters a condition that compromises safe system operation, the system halts. This condition is referred as Windows start-up problems. Furthermore, it is categorized in 3 buckets. +When Microsoft Windows experiences a condition that compromises safe system operation, the system halts. These Windows startup problems are categorized in the following groups: -- Bug check: It is also commonly referred to as a system crash, a kernel error, or a stop error. +- Bug check: Also commonly known as a system crash, a kernel error, or a Stop error. -- No Boot: Here the system may not produce a bug check but is unable to boot into Windows. +- No boot: The system may not produce a bug check but is unable to start up into Windows. -- Freeze: Also known as System Hang where +- Freeze: Also known as "system hang". -## Best Practices +## Best practices -To understand the underlaying cause of that lead to Windows start-up issues, it is important that the system is configured properly. Here are some best practices: +To understand the underlying cause of Windows startup problems, it's important that the system be configured correctly. Here are some best practices for configuration: ### Page file settings -- [Introduction to the page file](introduction-of-page-file.md) +- [Introduction of page file](introduction-page-file.md) - [How to determine the appropriate page file size for 64-bit versions of Windows](determine-appropriate-page-file-size.md) -### Memory Dump settings +### Memory dump settings - [Configure system failure and recovery options in Windows](system-failure-recovery-options.md) @@ -44,7 +44,7 @@ To understand the underlaying cause of that lead to Windows start-up issues, it ## Troubleshooting -These articles will walk you through the resources you need to troubleshoot Windows start-up issue. +These articles will walk you through the resources you need to troubleshoot Windows startup issues: - [Advanced troubleshooting for Windows boot problems](https://docs.microsoft.com/en-us/windows/client-management/advanced-troubleshooting-boot-problems) From cdaed2d39e24d486c9c040cba87ba0a4c126ed56 Mon Sep 17 00:00:00 2001 From: "Alton(ius) Blom" Date: Wed, 4 Sep 2019 15:08:33 +1000 Subject: [PATCH 091/285] Update microsoft-recommended-block-rules.md updated typo in description. --- .../microsoft-recommended-block-rules.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules.md b/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules.md index 6f92fd0056..8aae066fd4 100644 --- a/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules.md +++ b/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules.md @@ -1,6 +1,6 @@ --- title: Microsoft recommended block rules (Windows 10) -description: To help you plan and begin the initial test stages of a deployment of Microsoft Windows Defender Application Comntrol, this article outlines how to gather information, create a plan, and begin to create and test initial code integrity policies. +description: To help you plan and begin the initial test stages of a deployment of Microsoft Windows Defender Application Control, this article outlines how to gather information, create a plan, and begin to create and test initial code integrity policies. keywords: virtualization, security, malware ms.prod: w10 ms.mktglfcycl: deploy From 2d79cbbbb3e598a2c694bf97ed1e6014647b873e Mon Sep 17 00:00:00 2001 From: Tom Henderson Date: Wed, 4 Sep 2019 17:11:13 +1200 Subject: [PATCH 092/285] Update windows/security/threat-protection/auditing/audit-token-right-adjusted.md Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- .../threat-protection/auditing/audit-token-right-adjusted.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/auditing/audit-token-right-adjusted.md b/windows/security/threat-protection/auditing/audit-token-right-adjusted.md index 1a3e4c8136..a4fb47fef4 100644 --- a/windows/security/threat-protection/auditing/audit-token-right-adjusted.md +++ b/windows/security/threat-protection/auditing/audit-token-right-adjusted.md @@ -12,7 +12,7 @@ description: This topic for the IT professional describes the Advanced Security Audit Token Right Adjusted allows you to audit events generated by adjusting the privileges of a token. -For more information, see [Security Monitoring: A Possible New Way to Detect Privilege Escalation](https://blogs.technet.microsoft.com/nathangau/2018/01/25/security-monitoring-a-possible-new-way-to-detect-privilege-escalation/) +For more information, see [Security Monitoring: A Possible New Way to Detect Privilege Escalation](https://blogs.technet.microsoft.com/nathangau/2018/01/25/security-monitoring-a-possible-new-way-to-detect-privilege-escalation/). | Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments | |-------------------|-----------------|-----------------|------------------|------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| From 316820791b6a332eaf798480eb40b452f69eddd4 Mon Sep 17 00:00:00 2001 From: VLG17 <41186174+VLG17@users.noreply.github.com> Date: Wed, 4 Sep 2019 16:06:52 +0300 Subject: [PATCH 093/285] note ragarding Company Portal change https://github.com/MicrosoftDocs/windows-itpro-docs/issues/3843 info found here: https://blogs.technet.microsoft.com/cbernier/2018/03/08/windows-information-protection-adding-the-intune-company-portal-for-windows-as-an-exempt-app/ --- .../enlightened-microsoft-apps-and-wip.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/windows/security/information-protection/windows-information-protection/enlightened-microsoft-apps-and-wip.md b/windows/security/information-protection/windows-information-protection/enlightened-microsoft-apps-and-wip.md index 5ee54b85a9..3417119d1a 100644 --- a/windows/security/information-protection/windows-information-protection/enlightened-microsoft-apps-and-wip.md +++ b/windows/security/information-protection/windows-information-protection/enlightened-microsoft-apps-and-wip.md @@ -82,6 +82,10 @@ Microsoft still has apps that are unenlightened, but which have been tested and - Skype for Business ## Adding enlightened Microsoft apps to the allowed apps list + +>[!NOTE] +>As of January 2019 it is no longer necessary to add Intune Company Portal as an exempt app since it is now included in the default list of protected apps. + You can add any or all of the enlightened Microsoft apps to your allowed apps list. Included here is the **Publisher name**, **Product or File name**, and **App Type** info for both Microsoft Intune and System Center Configuration Manager. From 41fe70518ee0ba9f549001a3d955662f4d1b37ba Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Wed, 4 Sep 2019 10:08:17 -0700 Subject: [PATCH 094/285] Update microsoft-defender-atp-mac-install-with-intune.md --- .../microsoft-defender-atp-mac-install-with-intune.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md index 2f1cc97a92..21be43c179 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md @@ -170,7 +170,7 @@ Once the Intune changes are propagated to the enrolled devices, you can see them Issue: No license found -Solution: Follow steps above to create a device profile using WindowsDefenderATPOnboarding.xml +Solution: Follow the steps above to create a device profile using WindowsDefenderATPOnboarding.xml ## Logging installation issues From d61a15591a876de7ea4122f27f826dd572f12d71 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Wed, 4 Sep 2019 11:17:04 -0700 Subject: [PATCH 095/285] Update manage-surface-pro-3-firmware-updates.md --- .../manage-surface-pro-3-firmware-updates.md | 13 ------------- 1 file changed, 13 deletions(-) diff --git a/devices/surface/manage-surface-pro-3-firmware-updates.md b/devices/surface/manage-surface-pro-3-firmware-updates.md index 0913c4266d..e37749103c 100644 --- a/devices/surface/manage-surface-pro-3-firmware-updates.md +++ b/devices/surface/manage-surface-pro-3-firmware-updates.md @@ -62,16 +62,3 @@ The individual driver files are also made available in the Microsoft Download Ce **Windows PE and Surface firmware and drivers** A best practice for deployment with any solution that uses the Windows Preinstallation Environment (WinPE), such as System Center Configuration Manager or MDT, is to configure WinPE with only the drivers that are required during the WinPE stage of deployment. These usually include drivers for network adapters and storage controllers. This best practice helps to prevent errors with more complex drivers that rely on components that are not present in WinPE. For Surface Pro 3 devices, this is especially true of the Touch Firmware. The Touch Firmware should never be loaded in a WinPE environment on Surface Pro 3. - -**Update Surface Pro 3 firmware offline through USB** - -In some early versions of Surface Pro 3 firmware, PXE boot performance can be quite slow. This has been resolved with updated firmware, but for organizations where firmware will be updated through operating system deployment, this issue is encountered before the updates can be deployed to the device. In this scenario, you can deploy updated firmware through a USB drive to ensure that when the operating system deployment is initiated, the network boot is quick, and deployment can complete in a timely fashion. To create a USB drive to update Surface Pro 3 firmware, see [How to Update the Surface Pro 3 Firmware Offline using a USB Drive](https://blogs.technet.microsoft.com/askpfeplat/2014/10/19/how-to-update-the-surface-pro-3-firmware-offline-using-a-usb-drive/) on the Ask Premier Field Engineering (PFE) Platforms TechNet Blog. - -  - -  - - - - - From 1f0df824b6b7e9836f5def1e0e7cba059bbf74f0 Mon Sep 17 00:00:00 2001 From: illfated Date: Wed, 4 Sep 2019 21:25:41 +0200 Subject: [PATCH 096/285] Microsoft Defender ATP: amend copy-paste error When using Microsoft Intune as part of the Defender ATP setup, it will become necessary to configure some controlled folder access. This bug looks like it could have been transferred from one of the other pages during editing, but I could not locate it easily enough. Anyway, the correct part of this step is to refer to -- Controlled folder access -- exactly as the page name points to. Thanks to jcampos79 for discovering this text-based bug. Closes #4854 --- .../microsoft-defender-atp/enable-controlled-folders.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/enable-controlled-folders.md b/windows/security/threat-protection/microsoft-defender-atp/enable-controlled-folders.md index a7ff6da08f..40cbdce038 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/enable-controlled-folders.md +++ b/windows/security/threat-protection/microsoft-defender-atp/enable-controlled-folders.md @@ -55,7 +55,7 @@ For more information about disabling local list merging, see [Prevent or allow u > If controlled folder access is configured with Group Policy, PowerShell, or MDM CSPs, the state will change in the Windows Security app after a restart of the device. > If the feature is set to **Audit mode** with any of those tools, the Windows Security app will show the state as **Off**. ->If you are protecting user profile data, we recommend that the user profile should be on the default Windows installation drive. +> If you are protecting user profile data, we recommend that the user profile should be on the default Windows installation drive. ## Intune @@ -63,7 +63,7 @@ For more information about disabling local list merging, see [Prevent or allow u 1. Click **Device configuration** > **Profiles** > **Create profile**. 1. Name the profile, choose **Windows 10 and later** and **Endpoint protection**. ![Create endpoint protection profile](../images/create-endpoint-protection-profile.png) -1. Click **Configure** > **Windows Defender Exploit Guard** > **Network filtering** > **Enable**. +1. Click **Configure** > **Windows Defender Exploit Guard** > **Controlled folder access** > **Enable**. 1. Type the path to each application that has access to protected folders and the path to any additional folder that needs protection and click **Add**. ![Enable controlled folder access in Intune](../images/enable-cfa-intune.png) From a1c744a1db5968834e2177f84313a9f232cea898 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Wed, 4 Sep 2019 12:38:16 -0700 Subject: [PATCH 097/285] Update surface-hub-2s-connect.md --- devices/surface-hub/surface-hub-2s-connect.md | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/devices/surface-hub/surface-hub-2s-connect.md b/devices/surface-hub/surface-hub-2s-connect.md index d3a17d2848..065c6d4b0a 100644 --- a/devices/surface-hub/surface-hub-2s-connect.md +++ b/devices/surface-hub/surface-hub-2s-connect.md @@ -23,11 +23,10 @@ You can display content from your devices to Surface Hub 2S. If the source devic ## Recommended wired configurations -In general, it’s recommended to use native cable connections whenever possible such as USB-C to USB-C or HDMI to HDMI. Other combinations such as MiniDP to HDMI or MiniDP to USB-C will also work. +In general, it’s recommended to use native cable connections whenever possible such as USB-C to USB-C or HDMI to HDMI. Other combinations such as MiniDP to HDMI or MiniDP to USB-C will also work. Some configuration may be required to optimize the video-out experience; refer to the section below: [Mirroring Surface Hub 2S display on another device](#). | **Connection** | **Functionality** | **Description**| | --- | --- | ---| -| USB-C
(via compute module) | Video-in
Video-out
Audio-in
Audio-out

TouchBack and InkBack | Provides video, audio, and TouchBack/InkBack on a single cable.

**NOTE:** Some configuration is required to optimize the video-out experience. Refer to the section below: [Mirroring Surface Hub 2S display on another device](#). | | HDMI + USB-C | HDMI-in for audio and video

USB-C for TouchBack and InkBack | USB-C supports TouchBack and InkBack with the HDMI A/V connection.

Use USB-C to USB-A to connect to legacy computers.

**NOTE:** For best results, connect HDMI before connecting a USB-C cable. If the computer you're using for HDMI is not compatible with TouchBack and InkBack, you won't need a USB-C cable. | | USB-C
(via compute module) | Video-in
Audio-in | Single cable needed for A/V

TouchBack and InkBack not supported

HDCP enabled | | HDMI (in port) | Video, Audio into Surface Hub 2S | Single cable needed for A/V

TouchBack and InkBack not supported

HDCP enabled | From 38375932c78d799e8ec553a5568e87ca41280e9d Mon Sep 17 00:00:00 2001 From: Derek Granito Date: Wed, 4 Sep 2019 13:32:42 -0700 Subject: [PATCH 098/285] Updated how to disable HVCI Prior guidance to disable HVCI was outdated --- ...le-virtualization-based-protection-of-code-integrity.md | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity.md b/windows/security/threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity.md index 91f7206e6d..384885c6d6 100644 --- a/windows/security/threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity.md +++ b/windows/security/threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity.md @@ -274,9 +274,12 @@ B. If you experience software or device malfunction after using the above proced C. If you experience a critical error during boot or your system is unstable after using the above procedure to turn on HVCI, you can recover using the Windows Recovery Environment (Windows RE). To boot to Windows RE, see [Windows RE Technical Reference](https://docs.microsoft.com/windows-hardware/manufacture/desktop/windows-recovery-environment--windows-re--technical-reference). After logging in to Windows RE, you can turn off HVCI by renaming or deleting the SIPolicy.p7b file from the file location in step 3 above and then restart your device. -## How to turn off HVCI on the Windows 10 Fall Creators Update +## How to turn off HVCI -1. Rename or delete the SIPolicy.p7b file located at C:\Windows\System32\CodeIntegrity. +1. Run the following command from an elevated prompt to set the HVCI registry key to off +``` command +reg add "HKLM\SYSTEM\CurrentControlSet\Control\DeviceGuard\Scenarios\HypervisorEnforcedCodeIntegrity" /v "Enabled" /t REG_DWORD /d 0 /f +``` 2. Restart the device. 3. To confirm HVCI has been successfully disabled, open System Information and check **Virtualization-based security Services Running**, which should now have no value displayed. From 019fb11c5f0edec8b22dfce4ed8e63c2169613cb Mon Sep 17 00:00:00 2001 From: Derek Granito Date: Wed, 4 Sep 2019 16:39:29 -0700 Subject: [PATCH 099/285] Update windows/security/threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity.md Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- .../enable-virtualization-based-protection-of-code-integrity.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity.md b/windows/security/threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity.md index 384885c6d6..1edd7842a6 100644 --- a/windows/security/threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity.md +++ b/windows/security/threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity.md @@ -277,7 +277,7 @@ C. If you experience a critical error during boot or your system is unstable aft ## How to turn off HVCI 1. Run the following command from an elevated prompt to set the HVCI registry key to off -``` command +```ini reg add "HKLM\SYSTEM\CurrentControlSet\Control\DeviceGuard\Scenarios\HypervisorEnforcedCodeIntegrity" /v "Enabled" /t REG_DWORD /d 0 /f ``` 2. Restart the device. From e0a346aebb3b172bc54e1a832ac9556118003a82 Mon Sep 17 00:00:00 2001 From: Toby Tu Date: Thu, 5 Sep 2019 11:11:03 +0800 Subject: [PATCH 100/285] update content of upgrade mbam2.5 sp1 --- mdop/mbam-v25/upgrade-mbam2.5-sp1.md | 28 ++++++++++++++++++++++------ 1 file changed, 22 insertions(+), 6 deletions(-) diff --git a/mdop/mbam-v25/upgrade-mbam2.5-sp1.md b/mdop/mbam-v25/upgrade-mbam2.5-sp1.md index 51719e8cbe..18e3f0554a 100644 --- a/mdop/mbam-v25/upgrade-mbam2.5-sp1.md +++ b/mdop/mbam-v25/upgrade-mbam2.5-sp1.md @@ -28,23 +28,39 @@ In this guide, we will use a two-server configuration. One server will be a data 1. Identify the MBAM application pool service account that's used by IIS web servers to read and write data to MBAM databases. 2. Identify the groups that are used during the MBAM web features configuration and the reports web service URL. -3. Identify the SQL Server name and instance name. +3. Identify the SQL Server name and instance name. Watch this video to learn more. + > [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE3ANP1] -4. Identify the SQL Server Reporting Services Account that's used for reading compliance data from the Compliance and Audit database. + +4. Identify the SQL Server Reporting Services Account that's used for reading compliance data from the Compliance and Audit database. Watch this video to learn more. + > [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE3ALdZ] ## Upgrade the MBAM infrastructure to the latest version available +MBAM Server infrastructure installation or upgrade is always performed in the order listed below: + +- SQL Server Database Engine: Databases +- SQL Server Reporting Services: Reports +- Web Server: Web Applications +- SCCM Server: SCCM Integrated Reports if applicable +- Clients: MBAM Agent or Client Update +- Group Policy Templates: Update the existing Group Policy with new templates and enable new settings on existing MBAM Group Policy + > [!NOTE] > We recommend that you create a full database backup of the MBAM databases before you run the upgrades. -### Upgrade the MBAM SQL Server server +### Upgrade the MBAM SQL Server -> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE3ALew] +Watch this video to learn how to upgrade the MBAM SQL Server: -### Upgrade the MBAM web server + > [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE3ALew] -> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE3ALex] +### Upgrade the MBAM Web Server + +Watch this video to learn how to upgrade the MBAM Web Server: + + > [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE3ALex] ## More information From e9c02d4d385d4fbe2e892bfda54d5100ecf59461 Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Thu, 5 Sep 2019 10:39:32 +0500 Subject: [PATCH 101/285] Removed bullet Removed bullet as it was not making any sense. --- .../recommended-network-definitions-for-wip.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/information-protection/windows-information-protection/recommended-network-definitions-for-wip.md b/windows/security/information-protection/windows-information-protection/recommended-network-definitions-for-wip.md index 80814f122c..892ae14cb1 100644 --- a/windows/security/information-protection/windows-information-protection/recommended-network-definitions-for-wip.md +++ b/windows/security/information-protection/windows-information-protection/recommended-network-definitions-for-wip.md @@ -35,7 +35,7 @@ This table includes the recommended URLs to add to your Enterprise Cloud Resourc |-----------------------------|---------------------------------------------------------------------| |Office 365 for Business |
  • contoso.sharepoint.com
  • contoso-my.sharepoint.com
  • contoso-files.sharepoint.com
  • tasks.office.com
  • protection.office.com
  • meet.lync.com
  • teams.microsoft.com
| |Yammer |
  • www.yammer.com
  • yammer.com
  • persona.yammer.com
| -|Outlook Web Access (OWA) |
  • attachments.office.net
| +|Outlook Web Access (OWA) |
    attachments.office.net
| |Microsoft Dynamics |contoso.crm.dynamics.com | |Visual Studio Online |contoso.visualstudio.com | |Power BI |contoso.powerbi.com | From 02bc6ad266e2ec3f5b9d24f54749111f2d946feb Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Thu, 5 Sep 2019 10:40:43 +0500 Subject: [PATCH 102/285] format setting a minor format setting --- .../recommended-network-definitions-for-wip.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/information-protection/windows-information-protection/recommended-network-definitions-for-wip.md b/windows/security/information-protection/windows-information-protection/recommended-network-definitions-for-wip.md index 892ae14cb1..fab8cb5a31 100644 --- a/windows/security/information-protection/windows-information-protection/recommended-network-definitions-for-wip.md +++ b/windows/security/information-protection/windows-information-protection/recommended-network-definitions-for-wip.md @@ -35,7 +35,7 @@ This table includes the recommended URLs to add to your Enterprise Cloud Resourc |-----------------------------|---------------------------------------------------------------------| |Office 365 for Business |
  • contoso.sharepoint.com
  • contoso-my.sharepoint.com
  • contoso-files.sharepoint.com
  • tasks.office.com
  • protection.office.com
  • meet.lync.com
  • teams.microsoft.com
| |Yammer |
  • www.yammer.com
  • yammer.com
  • persona.yammer.com
| -|Outlook Web Access (OWA) |
    attachments.office.net
| +|Outlook Web Access (OWA) |attachments.office.net | |Microsoft Dynamics |contoso.crm.dynamics.com | |Visual Studio Online |contoso.visualstudio.com | |Power BI |contoso.powerbi.com | From 3d1d43ab67292626290b9493faf7db2b83ebb6b8 Mon Sep 17 00:00:00 2001 From: VLG17 <41186174+VLG17@users.noreply.github.com> Date: Thu, 5 Sep 2019 10:14:01 +0300 Subject: [PATCH 103/285] Update windows/security/information-protection/windows-information-protection/enlightened-microsoft-apps-and-wip.md Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- .../enlightened-microsoft-apps-and-wip.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/information-protection/windows-information-protection/enlightened-microsoft-apps-and-wip.md b/windows/security/information-protection/windows-information-protection/enlightened-microsoft-apps-and-wip.md index 3417119d1a..e93deb6f24 100644 --- a/windows/security/information-protection/windows-information-protection/enlightened-microsoft-apps-and-wip.md +++ b/windows/security/information-protection/windows-information-protection/enlightened-microsoft-apps-and-wip.md @@ -84,7 +84,7 @@ Microsoft still has apps that are unenlightened, but which have been tested and ## Adding enlightened Microsoft apps to the allowed apps list >[!NOTE] ->As of January 2019 it is no longer necessary to add Intune Company Portal as an exempt app since it is now included in the default list of protected apps. +> As of January 2019 it is no longer necessary to add Intune Company Portal as an exempt app since it is now included in the default list of protected apps. You can add any or all of the enlightened Microsoft apps to your allowed apps list. Included here is the **Publisher name**, **Product or File name**, and **App Type** info for both Microsoft Intune and System Center Configuration Manager. From 2541efab6ecdaabf209249ca66079e66b68880df Mon Sep 17 00:00:00 2001 From: VLG17 <41186174+VLG17@users.noreply.github.com> Date: Thu, 5 Sep 2019 10:14:11 +0300 Subject: [PATCH 104/285] Update windows/security/information-protection/windows-information-protection/enlightened-microsoft-apps-and-wip.md Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- .../enlightened-microsoft-apps-and-wip.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/information-protection/windows-information-protection/enlightened-microsoft-apps-and-wip.md b/windows/security/information-protection/windows-information-protection/enlightened-microsoft-apps-and-wip.md index e93deb6f24..6ae66b3225 100644 --- a/windows/security/information-protection/windows-information-protection/enlightened-microsoft-apps-and-wip.md +++ b/windows/security/information-protection/windows-information-protection/enlightened-microsoft-apps-and-wip.md @@ -83,7 +83,7 @@ Microsoft still has apps that are unenlightened, but which have been tested and ## Adding enlightened Microsoft apps to the allowed apps list ->[!NOTE] +> [!NOTE] > As of January 2019 it is no longer necessary to add Intune Company Portal as an exempt app since it is now included in the default list of protected apps. You can add any or all of the enlightened Microsoft apps to your allowed apps list. Included here is the **Publisher name**, **Product or File name**, and **App Type** info for both Microsoft Intune and System Center Configuration Manager. From 8d9a0603f4299ad8d2b3205f76957603c71a8c2c Mon Sep 17 00:00:00 2001 From: Jan Kulbe Date: Thu, 5 Sep 2019 12:53:35 +0200 Subject: [PATCH 105/285] sample script syntax error due to ASCII codes for quotes sample script filter syntax contained ASCII codes for single quotes instead of actual quotes, causing the Get-CimInstance commands to error out. --- ...-scripting-with-the-wmi-bridge-provider.md | 24 +++++++++---------- 1 file changed, 12 insertions(+), 12 deletions(-) diff --git a/windows/client-management/mdm/using-powershell-scripting-with-the-wmi-bridge-provider.md b/windows/client-management/mdm/using-powershell-scripting-with-the-wmi-bridge-provider.md index 300711d733..5bdd2eaf0f 100644 --- a/windows/client-management/mdm/using-powershell-scripting-with-the-wmi-bridge-provider.md +++ b/windows/client-management/mdm/using-powershell-scripting-with-the-wmi-bridge-provider.md @@ -50,17 +50,17 @@ New-CimInstance -Namespace $namespaceName -ClassName $className -Property @{Pare Get-CimInstance -Namespace $namespaceName -ClassName $className # Query instances with matching properties -Get-CimInstance -Namespace $namespaceName -ClassName $className -Filter "ParentID='./Vendor/MSFT/Policy/Config' and InstanceID='WiFi'" +Get-CimInstance -Namespace $namespaceName -ClassName $className -Filter "ParentID='./Vendor/MSFT/Policy/Config' and InstanceID='WiFi'" # Modify existing instance -$obj = Get-CimInstance -Namespace $namespaceName -ClassName $className -Filter "ParentID='./Vendor/MSFT/Policy/Config' and InstanceID='WiFi'" +$obj = Get-CimInstance -Namespace $namespaceName -ClassName $className -Filter "ParentID='./Vendor/MSFT/Policy/Config' and InstanceID='WiFi'" $obj.WLANScanMode=500 Set-CimInstance -CimInstance $obj # Delete existing instance try { - $obj = Get-CimInstance -Namespace $namespaceName -ClassName $className -Filter "ParentID='./Vendor/MSFT/Policy/Config' and InstanceID='WiFi'" + $obj = Get-CimInstance -Namespace $namespaceName -ClassName $className -Filter "ParentID='./Vendor/MSFT/Policy/Config' and InstanceID='WiFi'" Remove-CimInstance -CimInstance $obj } catch [Exception] @@ -113,9 +113,9 @@ $session = New-CimSession # Create a new instance for MDM_Policy_User_Config01_Authentication02 ########################################################################## $newInstance = New-Object Microsoft.Management.Infrastructure.CimInstance $className, $namespaceName -$property = [Microsoft.Management.Infrastructure.CimProperty]::Create("ParentID", './Vendor/MSFT/Policy/Config', "string", "Key") +$property = [Microsoft.Management.Infrastructure.CimProperty]::Create("ParentID", './Vendor/MSFT/Policy/Config', "string", "Key") $newInstance.CimInstanceProperties.Add($property) -$property = [Microsoft.Management.Infrastructure.CimProperty]::Create("InstanceID", 'Authentication', "String", "Key") +$property = [Microsoft.Management.Infrastructure.CimProperty]::Create("InstanceID", 'Authentication', "String", "Key") $newInstance.CimInstanceProperties.Add($property) $property = [Microsoft.Management.Infrastructure.CimProperty]::Create("AllowEAPCertSSO", 1, "Sint32", "Property") $newInstance.CimInstanceProperties.Add($property) @@ -138,9 +138,9 @@ $session.EnumerateInstances($namespaceName, $className, $options) # with matching properties ########################################################################## $getInstance = New-Object Microsoft.Management.Infrastructure.CimInstance $className, $namespaceName -$property = [Microsoft.Management.Infrastructure.CimProperty]::Create("ParentID", './Vendor/MSFT/Policy/Config', "string", "Key") +$property = [Microsoft.Management.Infrastructure.CimProperty]::Create("ParentID", './Vendor/MSFT/Policy/Config', "string", "Key") $getInstance.CimInstanceProperties.Add($property) -$property = [Microsoft.Management.Infrastructure.CimProperty]::Create("InstanceID", 'Authentication', "String", "Key") +$property = [Microsoft.Management.Infrastructure.CimProperty]::Create("InstanceID", 'Authentication', "String", "Key") $getInstance.CimInstanceProperties.Add($property) try { @@ -155,9 +155,9 @@ catch [Exception] # Modify existing instance for MDM_Policy_User_Config01_Authentication02 ########################################################################## $getInstance = New-Object Microsoft.Management.Infrastructure.CimInstance $className, $namespaceName -$property = [Microsoft.Management.Infrastructure.CimProperty]::Create("ParentID", './Vendor/MSFT/Policy/Config', "string", "Key") +$property = [Microsoft.Management.Infrastructure.CimProperty]::Create("ParentID", './Vendor/MSFT/Policy/Config', "string", "Key") $getInstance.CimInstanceProperties.Add($property) -$property = [Microsoft.Management.Infrastructure.CimProperty]::Create("InstanceID", 'Authentication', "String", "Key") +$property = [Microsoft.Management.Infrastructure.CimProperty]::Create("InstanceID", 'Authentication', "String", "Key") $getInstance.CimInstanceProperties.Add($property) try { @@ -174,9 +174,9 @@ catch [Exception] # Delete existing instance for MDM_Policy_User_Config01_Authentication02 ########################################################################## $getInstance = New-Object Microsoft.Management.Infrastructure.CimInstance $className, $namespaceName -$property = [Microsoft.Management.Infrastructure.CimProperty]::Create("ParentID", './Vendor/MSFT/Policy/Config', "string", "Key") +$property = [Microsoft.Management.Infrastructure.CimProperty]::Create("ParentID", './Vendor/MSFT/Policy/Config', "string", "Key") $getInstance.CimInstanceProperties.Add($property) -$property = [Microsoft.Management.Infrastructure.CimProperty]::Create("InstanceID", 'Authentication', "String", "Key") +$property = [Microsoft.Management.Infrastructure.CimProperty]::Create("InstanceID", 'Authentication', "String", "Key") $getInstance.CimInstanceProperties.Add($property) try { @@ -209,7 +209,7 @@ $params.Add($param) try { - $instance = Get-CimInstance -Namespace $namespaceName -ClassName $className -Filter "ParentID='./Vendor/MSFT' and InstanceID='WindowsLicensing'" + $instance = Get-CimInstance -Namespace $namespaceName -ClassName $className -Filter "ParentID='./Vendor/MSFT' and InstanceID='WindowsLicensing'" $session.InvokeMethod($namespaceName, $instance, $methodName, $params) } catch [Exception] From e743b8bace2561b310eb157fcca31bee61d8be4b Mon Sep 17 00:00:00 2001 From: illfated Date: Thu, 5 Sep 2019 20:57:16 +0200 Subject: [PATCH 106/285] Update how-windows-update-works.md: amend typo Simple typo correction, along with a few MarkDown codestyle corrections for MD blockquote (`>`) indenting. - typo correction: initates -> initiates - codestyle corrections: 3 MarkDown blockquote indentations amended Thanks to Jessie Gouw (jessiegouw) for reporting the typo. Closes #4866 --- .../deployment/update/how-windows-update-works.md | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/windows/deployment/update/how-windows-update-works.md b/windows/deployment/update/how-windows-update-works.md index 0cce8e0389..e71e615d1f 100644 --- a/windows/deployment/update/how-windows-update-works.md +++ b/windows/deployment/update/how-windows-update-works.md @@ -16,7 +16,7 @@ ms.topic: article # How does Windows Update work? ->Applies to: Windows 10 +> Applies to: Windows 10 The Windows Update workflow has four core areas of functionality: @@ -35,7 +35,7 @@ The Windows Update workflow has four core areas of functionality: ### Install -1. Orchestrator initates the installation. +1. Orchestrator initiates the installation. 2. The arbiter calls the installer to install the package. @@ -96,8 +96,8 @@ When users start scanning in Windows Update through the Settings panel, the foll ![Windows Update scan log 2](images/update-scan-log-2.png) - Common service IDs - >[!IMPORTANT] - >ServiceId here identifies a client abstraction, not any specific service in the cloud. No assumption should be made of which server a serviceId is pointing to, it's totally controlled by the SLS responses. + > [!IMPORTANT] + > ServiceId here identifies a client abstraction, not any specific service in the cloud. No assumption should be made of which server a serviceId is pointing to, it's totally controlled by the SLS responses. |Service|ServiceId| |-------|---------| @@ -116,8 +116,8 @@ Common update failure is caused due to network issues. To find the root of the i - "SOAP faults" can be either client- or server-side issues; read the message. - The WU client uses SLS (Service Locator Service) to discover the configurations and endpoints of Microsoft network update sources – WU, MU, Flighting. - >[!NOTE] - >Warning messages for SLS can be ignored if the search is against WSUS/SCCM. + > [!NOTE] + > Warning messages for SLS can be ignored if the search is against WSUS/SCCM. - On sites that only use WSUS/SCCM, the SLS may be blocked at the firewall. In this case the SLS request will fail, and can’t scan against Windows Update or Microsoft Update but can still scan against WSUS/SCCM, since it’s locally configured. ![Windows Update scan log 3](images/update-scan-log-3.png) From 9a9d64ebaada1329a28cd248881cab9a088eaeba Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Fri, 6 Sep 2019 07:56:11 -0700 Subject: [PATCH 107/285] Updates per support requests --- devices/surface-hub/surface-hub-2s-connect.md | 2 +- .../surface-hub/whiteboard-collaboration.md | 60 +++++++++---------- 2 files changed, 31 insertions(+), 31 deletions(-) diff --git a/devices/surface-hub/surface-hub-2s-connect.md b/devices/surface-hub/surface-hub-2s-connect.md index 065c6d4b0a..500be048ca 100644 --- a/devices/surface-hub/surface-hub-2s-connect.md +++ b/devices/surface-hub/surface-hub-2s-connect.md @@ -67,7 +67,7 @@ You can input video to Surface Hub 2S using USB-C or HDMI, as indicated in the f ## Mirroring Surface Hub 2S display on another device -You can output video to another display using either USB-C or MiniDP, as indicated in the following table. +You can output video to another display using MiniDP, as indicated in the following table. ### Surface Hub 2S video-out settings diff --git a/devices/surface-hub/whiteboard-collaboration.md b/devices/surface-hub/whiteboard-collaboration.md index e921c71e09..c5e5a979bf 100644 --- a/devices/surface-hub/whiteboard-collaboration.md +++ b/devices/surface-hub/whiteboard-collaboration.md @@ -14,55 +14,55 @@ ms.localizationpriority: medium # Set up and use Microsoft Whiteboard +# Set up and use Microsoft Whiteboard +The Microsoft Whiteboard app includes the capability for Surface Hubs and other devices to collaborate in real time on the same board. ->[!IMPORTANT] ->A new Microsoft Whiteboard app was released on July 12, 2018. The existing Whiteboard app that comes installed on Surface Hub and is pinned to the Welcome screen has been renamed **Microsoft Whiteboard 2016**. Microsoft Whiteboard 2016 will be automatically upgraded by May 21, 2019, and the collaboration service for the legacy app will stop functioning after June 7, 2019. For more details, see [Enable Microsoft Whiteboard on Surface Hub](https://support.office.com/article/enable-microsoft-whiteboard-on-surface-hub-b5df4539-f735-42ff-b22a-0f5e21be7627?ui=en-US&rs=en-US&ad=US). +## Prerequisites -The Microsoft Whiteboard app includes the capability for two Surface Hubs to collaborate in real time on the same board. +To use whiteboard collaboration complete the following actions: -By ensuring that your organization meets the prerequisites, users can then ink, collaborate, and ideate together. +- Add Whiteboard.ms, whiteboard.microsoft.com, and wbd.ms to your list of allowed sites. +- Open port: **HTTPS: 443** (normally configured when you first run Surface Hub.) -![example of a whiteboard with collaborative inking](images/wb-collab-example.png) +## Office 365 requirements -## Prerequisites for Whiteboard to Whiteboard collaboration (Microsoft Whiteboard 2016) +- Whiteboard collaboration is only supported in the Office 365 commercial environment and requires Office 365 with cloud-based Azure Active Directory (Azure AD). +- You can only run collaborative sessions among users belonging to the same Office 365 tenant. +- Office 365 Germany or Office 365 operated by 21Vianet do not support whiteboard collaboration. -To get Whiteboard to Whiteboard collaboration up and running, you’ll need to make sure your organization meets the following requirements: - -- Office 365 with cloud-based Azure Active Directory (Azure AD) for all users -- OneDrive for Business deployed for all users who intend to collaborate -- Currently not utilizing Office 365 Germany or Office 365 operated by 21Vianet -- Surface Hub needs to be updated to Windows 10, version 1607 or newer -- Port 443 needs to be open since Whiteboard makes standard https requests -- Whiteboard.ms, whiteboard.microsoft.com, wbd.ms, \*.onenote.com, and your company's SharePoint tenant domain URLs need to be whitelisted for proxies - - ->[!NOTE] ->Collaborative sessions can only take place between users within the same tenant, so users outside of your organization won’t be able to join even if they have a Surface Hub. - -## Using Whiteboard to Whiteboard collaboration (Microsoft Whiteboard 2016) +## Using Whiteboard collaboration To start a collaboration session: 1. In the Whiteboard app, tap the **Sign in** button. 2. Sign in with your organization ID. 3. Tap the **Invite** button next to your name at the top of the app. -4. Tap **Start session**. Whiteboard will generate a link that you can share. +4. Write or type the names of the colleagues you wish to collaborate with. - ![screenshot of the link dialog box on whiteboard](images/wb-collab-link.png) - -5. Copy and paste this link into a Skype chat with another Surface Hub +On the other device, such as a Surface Hub, when you are signed in, the shared board will now appear in the board gallery. -When the other Surface Hub receives the link, the recipient can tap on the link, sign in to Whiteboard, and then begin collaborating. You can copy and paste other content, use smart ink features like Ink to Shape, and co-author together. - -After you’re done, you can export a copy of the Whiteboard collaboration for yourself through the Share charm and leave the board for others to continue working. - ->[!TIP] ->When you start a collaboration session, Whiteboard creates a folder named **Whiteboard App Data** in your OneDrive for Business to store your shared whiteboards. After some collaboration sessions, this folder may continue to sync or process changes indefinitely. You can fix this by choosing to not sync the **Whiteboard App Data** folder to your device. Disabling sync for this folder won't limit your ability to use Whiteboard for collaboration sessions. +### User tips +- Log in to access your whiteboards. As you work, changes are saved automatically. +- Name your whiteboards to help organize your content and find it quickly. Select the … to open the menu. Select the **Options** gear icon to access more tools and features of the Whiteboard. +- Use **Ink to shape** to turn drawing into actual shapes like circles, squares, and triangles. +- Use **Ink to table** to turn a drawn grid into a table with rows and columns. +- You can also change the background color and design from solid to grid or dots. Pick the background, then choose the color from the wheel around it. +- You can export a copy of the Whiteboard collaboration for yourself through the Share charm and leave the board for others to continue working. +> [!NOTE] +> If you are using Whiteboard and cannot sign in, you can collaborate by joining a Teams or Skype for Business meeting, and then sharing your screen. After you’re done, tap **Settings** > **Export to email** or save a copy of the board. The SVG export provides higher resolution than PNG and can be opened in a web browser. +## New features in Whiteboard +The Microsoft Whiteboard app, updated for Surface Hub on July 1, 2019 includes a host of new features including: +- **Automatic Saving** - Boards are saved to the cloud automatically when you sign in, and can be found in the board gallery. +- **Extended collaboration across devices** - You can collaborate using new apps for Windows 10 PC and iOS, and a web version for other devices. +- **Richer canvas** - In addition to ink and images, Whiteboard now includes sticky notes, text and GIFs, with more objects coming soon. +- **Intelligence** – In addition to ink to shape and table, Whiteboard now includes ink beautification to improve handwriting and ink grab to convert images to ink. +- **More color and background options** - Whiteboard now includes more pen colors and thickness options along with additional background colors and designs. +- **Teams Integration** – You can automatically launch Whiteboard from a Teams meeting and share with participants (currently in preview). ## Related topics From 048aef2bb2d7bfb826fc3c233ecca7f9e818081f Mon Sep 17 00:00:00 2001 From: jdgregson Date: Fri, 6 Sep 2019 12:42:24 -0700 Subject: [PATCH 108/285] Moved '.' syntax description to a separate table --- .../configure-wd-app-guard.md | 14 +++++++++++--- 1 file changed, 11 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md index c39a63739c..4ec0350808 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md @@ -33,9 +33,17 @@ These settings, located at **Computer Configuration\Administrative Templates\Net |Policy name|Supported versions|Description| |-----------|------------------|-----------| |Private network ranges for apps|At least Windows Server 2012, Windows 8, or Windows RT|A comma-separated list of IP address ranges that are in your corporate network. Included endpoints or endpoints that are included within a specified IP address range, are rendered using Microsoft Edge and won't be accessible from the Application Guard environment.| -|Enterprise resource domains hosted in the cloud|At least Windows Server 2012, Windows 8, or Windows RT|A pipe-separated (\|) list of your domain cloud resources. Included endpoints are rendered using Microsoft Edge and won't be accessible from the Application Guard environment. Notes: 1) Include a full domain name in the configuration, for example **www.contoso.com**, to trust only in this literal value. 2) You may optionally use "." as a wildcard character to automatically trust subdomains on only one level of the domain hierarchy that is to the left of the dot. Configuring **".constoso.com"** will automatically trust **"local.contoso.com"**, **"shop.contoso.com"**, and all other values on the left. 3) You may optionally use ".." as a wildcard character to automatically trust subdomains on all the levels of the domain hierarchy that are to the left of the dots. Configuring **"..constoso.com"** will automatically trust **"us.shop.contoso.com"**, **"trainning.contoso.com"**, and all other values on the left. | -|Domains categorized as both work and personal|At least Windows Server 2012, Windows 8, or Windows RT|A comma-separated list of domain names used as both work or personal resources. Included endpoints are rendered using Microsoft Edge and will be accessible from the Application Guard and regular Edge environment.| - +|Enterprise resource domains hosted in the cloud|At least Windows Server 2012, Windows 8, or Windows RT|A pipe-separated (\|) list of your domain cloud resources. Included endpoints are rendered using Microsoft Edge and won't be accessible from the Application Guard environment. Notes: this list supports the wildcards detailed in the [Network isolation settings wildcards](#network-isolation-settings-wildcards) table.| +|Domains categorized as both work and personal|At least Windows Server 2012, Windows 8, or Windows RT|A comma-separated list of domain names used as both work or personal resources. Included endpoints are rendered using Microsoft Edge and will be accessible from the Application Guard and regular Edge environment. Notes: this list supports the wildcards detailed in the [Network isolation settings wildcards](#network-isolation-settings-wildcards) table.| + +## Network isolation settings wildcards + +|Value|Number of dots to the left|Meaning| +|-----|--------------------------|-------| +|contoso.com|0|Trust only the literal value of **contoso.com**.| +|www.contoso.com|0|Trust only the literal value of **www.contoso.com**.| +|.contoso.com|1|Trust any domain that ends with the text **contoso.com**. Matching sites include **spearphishingcontoso.com**, **contoso.com**, and **www.contoso.com**.| +|..contoso.com|2|Trust all levels of the domain hierarchy that are to the left of the dot. Matching sites include **shop.contoso.com**, **us.shop.contoso.com**, **www.us.shop.contoso.com**, but NOT **contoso.com** itself.| ## Application-specific settings These settings, located at **Computer Configuration\Administrative Templates\Windows Components\Windows Defender Application Guard**, can help you to manage your company's implementation of Application Guard. From 2cb5c072a68df3079fca8e9a27ff494860d6ee5c Mon Sep 17 00:00:00 2001 From: Marty Hernandez Avedon Date: Fri, 6 Sep 2019 16:46:57 -0400 Subject: [PATCH 109/285] fixes #4760, broken table The formatting was broken because a pipe character was in the wrong place. There was also an extra row due to double spacing below the table. --- ...curity-configure-encryption-types-allowed-for-kerberos.md | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md b/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md index 8a376e6b4f..d3d0816760 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md @@ -35,14 +35,13 @@ The following table lists and explains the allowed encryption types. | Encryption type | Description and version support | | - | - | -| DES_CBC_CRC | Data Encryption Standard with Cipher Block Chaining using the Cyclic Redundancy Check function
Supported in Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. The Windows 7, Windows 10 and Windows Server 2008 R2 operating systems do not support DES| by default. +| DES_CBC_CRC | Data Encryption Standard with Cipher Block Chaining using the Cyclic Redundancy Check function
Supported in Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. The Windows 7, Windows 10 and Windows Server 2008 R2 operating systems do not support DES by default. | | DES_CBC_MD5| Data Encryption Standard with Cipher Block Chaining using the Message-Digest algorithm 5 checksum function
Supported in Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. The Windows 7, Windows 10 and Windows Server 2008 R2 operating systems do not support DES by default. | | RC4_HMAC_MD5| Rivest Cipher 4 with Hashed Message Authentication Code using the Message-Digest algorithm 5 checksum function
Supported in Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows 10 and Windows Server 2008 R2.| | AES128_HMAC_SHA1| Advanced Encryption Standard in 128 bit cipher block with Hashed Message Authentication Code using the Secure Hash Algorithm (1).
Not supported in Windows 2000 Server, Windows XP, or Windows Server 2003. Supported in Windows Vista, Windows Server 2008, Windows 7, Windows 10 and Windows Server 2008 R2. | | AES256_HMAC_SHA1| Advanced Encryption Standard in 256 bit cipher block with Hashed Message Authentication Code using the Secure Hash Algorithm (1).
Not supported in Windows 2000 Server, Windows XP, or Windows Server 2003. Supported in Windows Vista, Windows Server 2008, Windows 7, Windows 10 and Windows Server 2008 R2. | | Future encryption types| Reserved by Microsoft for additional encryption types that might be implemented.| -  - + ### Possible values From 5b96a119d9bff60076b32884643cfca4fcd5f227 Mon Sep 17 00:00:00 2001 From: John Liu <49762389+ShenLanJohn@users.noreply.github.com> Date: Fri, 6 Sep 2019 18:40:31 -0700 Subject: [PATCH 110/285] CAT Auto Pulish for Windows Release Messages - CAT_AutoPublish_20190906173611 (#1061) (#1062) --- .../resolved-issues-windows-10-1607.yml | 6 +++--- .../resolved-issues-windows-10-1703.yml | 6 +++--- .../resolved-issues-windows-10-1709.yml | 6 +++--- .../resolved-issues-windows-10-1803.yml | 6 +++--- ...-issues-windows-10-1809-and-windows-server-2019.yml | 6 +++--- .../resolved-issues-windows-10-1903.yml | 10 +++++----- .../status-windows-10-1607-and-windows-server-2016.yml | 6 +++--- windows/release-information/status-windows-10-1703.yml | 6 +++--- windows/release-information/status-windows-10-1709.yml | 6 +++--- windows/release-information/status-windows-10-1803.yml | 6 +++--- .../status-windows-10-1809-and-windows-server-2019.yml | 6 +++--- windows/release-information/status-windows-10-1903.yml | 10 +++++----- 12 files changed, 40 insertions(+), 40 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1607.yml b/windows/release-information/resolved-issues-windows-10-1607.yml index 08b49123c4..6f92dbe2b1 100644 --- a/windows/release-information/resolved-issues-windows-10-1607.yml +++ b/windows/release-information/resolved-issues-windows-10-1607.yml @@ -32,9 +32,9 @@ sections: - type: markdown text: "
MessageDate
Resolved: Delays starting Internet Explorer 11
On August 16, 2019 at 7:16 AM a server required for downloading the Internet Explorer 11 (IE11) startup page, went down. As a result of the server outage, IE 11 became unresponsive for some customers who had not yet installed the August 2019 security updates. Customers who had the August 2019 security update installed were not affected. In order to ensure your devices remain in a serviced and secure state, we recommend you install the latest monthly update.

This issue was resolved on the server side at 1:00 pm PST. 
August 16, 2019
04:00 PM PT
Take action: SHA-2 code signing support guidance for Windows 7 SP1 and Windows Server 2008 RS2 SP1
Windows 7 SP1 and Windows Server 2008 R2 SP1 update signatures are now SHA-2 based signatures and requires that SHA-2 support to be installed. For important customer guidance on installation and troubleshooting tips, please read the knowledge base article 2019 SHA-2 Code Signing Support requirement for Windows and WSUS.
August 23, 2019
03:35 PM PT
Take action: Windows 10, version 1703 (the Windows 10 Creators Update) reaches end of life on October 9, 2019
The Enterprise and Education editions of Windows 10, version 1703 (the Windows 10 Creators Update) will reach end of life on October 9, 2019. The Home, Pro, Pro for Workstations, and IoT Core editions reached end of service on October 8, 2018.

There is no extended support available for any edition of Windows 10, version 1703. Therefore, it will no longer be supported after October 9, 2019 and will not receive monthly security and quality updates containing protections from the latest security threats.

To continue receiving security and quality updates, Microsoft recommends that you update your devices to the latest version of Windows 10. For more information on end of service dates and currently supported versions of Windows 10, see the Windows lifecycle fact sheet.
August 23, 2019
02:17 PM PT
Resolved: Delays starting Internet Explorer 11
On August 16, 2019 at 7:16 AM a server required for downloading the Internet Explorer 11 (IE11) startup page, went down. As a result of the server outage, IE 11 became unresponsive for some customers who had not yet installed the August 2019 security updates. Customers who had the August 2019 security update installed were not affected. In order to ensure your devices remain in a serviced and secure state, we recommend you install the latest monthly update.

This issue was resolved on the server side at 1:00 pm PST. 
August 16, 2019
04:00 PM PT
August 2019 security update now available for Windows 10, version 1903 and all supported versions of Windows
The August 2019 security update release, referred to as our “B” release, is now available for Windows 10, version 1903 and all supported versions of Windows. A “B” release is the primary, regular update event for each month and is the only regular release that contains security fixes. As a result, we recommend that you install these updates promptly. For more information on the different types of monthly quality updates, see our Windows 10 update servicing cadence primer. To be informed about the latest updates and releases, follow us on Twitter @WindowsUpdate.
August 13, 2019
10:00 AM PT
Advisory: Bluetooth encryption key size vulnerability disclosed (CVE-2019-9506)
On August 13, 2019, Microsoft released security updates to address a Bluetooth key length encryption vulnerability. To exploit this vulnerability, an attacker would need specialized hardware and would be limited by the signal range of the Bluetooth devices in use. For more information about this industry-wide issue, see CVE-2019-9506 | Bluetooth Encryption Key Size Vulnerability in the Microsoft Security Update Guide and important guidance for IT pros in KB4514157. (Note: we are documenting this vulnerability together with guidance for IT admins as part of a coordinated industry disclosure effort.)
August 13, 2019
10:00 AM PT
Advisory: Windows Advanced Local Procedure Call Elevation of Privilege vulnerability disclosed (CVE-2019-1162)
On August 13, 2019, Google Project Zero (GPZ) disclosed an Elevation of Privilege (EoP) vulnerability in how Windows handles calls to Advanced Local Procedure Call (ALPC) that affects Windows operating systems, versions 8.1 and higher. An attacker must already have code execution on the target system to leverage these vulnerabilities. Microsoft released security updates on August 13, 2019 that partially address this issue. Other items disclosed by GPZ require more time to address and we are working to release a resolution in mid-September. For more information, see CVE-2019-1162 | Windows ALPC Elevation of Privilege Vulnerability
August 13, 2019
10:00 AM PT
Take action: Install required updates for Windows 7 SP1 and Windows Server 2008 RS2 SP1 for SHA-2 code sign support
As of August 13, 2019, Windows 7 SP1 and Windows Server 2008 R2 SP1 updates signatures only support SHA-2 code signing. As outlined in 2019 SHA-2 Code Signing Support requirement for Windows and WSUS, we are requiring that SHA-2 code signing support be installed. If you have Windows Update enabled and have applied the security updates released in March 2019 (KB4490628) and August 2019 (KB4474419), you are protected automatically; no further configuration is necessary. If you have not installed the March 2019 updates, you will need to do so in order to continue to receive updates on devices running Windows 7 SP1 and Windows Server 2008 R2 SP1.
August 13, 2019
10:00 AM PT
Take action: Windows 10, version 1803 (the April 2018 Update) reaches end of service on November 12, 2019
Windows 10, version 1803 (the April 2018 Update) will reach end of service on November 12, 2019 for Home and Pro editions. We will begin updating devices running Windows 10, version 1803 to Windows 10, version 1903 (the May 2019 Update) starting July 16, 2019 to help ensure that these devices remain in a serviced and secure state. For more information, see the Windows 10, version 1903 section of the Windows release health dashboard.
August 13, 2019
10:00 AM PT
Advisory: Windows Kernel Information Disclosure Vulnerability (CVE-2019-1125)
On July 9, 2019, Microsoft released a security update for a Windows kernel information disclosure vulnerability (CVE-2019-1125). Customers who have Windows Update enabled and have applied the security updates released on July 9, 2019 are protected automatically; no further configuration is necessary. For more information, see CVE-2019-1125 | Windows Kernel Information Disclosure Vulnerability in the Microsoft Security Update Guide. (Note: we are documenting this mitigation publicly today, instead of back in July, as part of a coordinated industry disclosure effort.)
August 06, 2019
10:00 AM PT
Resolved August 1, 2019 16:00 PT: Microsoft Store users may encounter blank screens when clicking on certain buttons
Some customers running the version of the Microsoft Store app released on July 29, 2019 encountered a blank screen when selecting “Switch out of S mode,” “Get Genuine,” or some “Upgrade to [version]” OS upgrade options. This issue has now been resolved and a new version of the Microsoft Store app has been released. Users who encountered this issue will need to update the Microsoft Store app on their device. If you are still encountering an issue, please see Fix problems with apps from Microsoft Store.
August 01, 2019
02:00 PM PT
Reminder: Windows 10 update servicing cadence
This month we received questions about the cadence of updates we released in April and May 2019. Here's a quick recap of our releases and servicing cadence:
  • April 9, 2019 was the regular Update Tuesday release for all versions of Windows.
  • -
  • May 1, 2019 was an \"optional,\" out of band non-security update (OOB) for Windows 10, version 1809. It was released to Microsoft Catalog and WSUS, providing a critical fix for our OEM partners.
  • -
  • May 3, 2019 was the \"optional\" Windows 10, version 1809 \"C\" release for April. This update contained important Japanese era packages for commercial customers to preview. It was released later than expected and mistakenly targeted as \"required\" (instead of \"optional\") for consumers, which pushed the update out to customers and required a reboot. Within 24 hours of receiving customer reports, we corrected the targeting logic and mitigated the issue.
  • +
  • May 1, 2019 was an \\\"optional,\\\" out of band non-security update (OOB) for Windows 10, version 1809. It was released to Microsoft Catalog and WSUS, providing a critical fix for our OEM partners.
  • +
  • May 3, 2019 was the \\\"optional\\\" Windows 10, version 1809 \\\"C\\\" release for April. This update contained important Japanese era packages for commercial customers to preview. It was released later than expected and mistakenly targeted as \\\"required\\\" (instead of \\\"optional\\\") for consumers, which pushed the update out to customers and required a reboot. Within 24 hours of receiving customer reports, we corrected the targeting logic and mitigated the issue.
For more information about the Windows 10 update servicing cadence, please see the Window IT Pro blog.
May 10, 2019
10:00 AM PT

Windows Server Features

.NET Framework 4.5 features:

    -
  • .NET Framework 4.5

    +
  • .NET Framework 4.5 or 4.6

      +
    • Windows Server 2016 - .NET Framework 4.6 is already installed for these versions of Windows Server, but you must enable it.

    • Windows Server 2012 or Windows Server 2012 R2 - .NET Framework 4.5 is already installed for these versions of Windows Server, but you must enable it.

    • Windows Server 2008 R2 - .NET Framework 4.5 is not included with Windows Server 2008 R2, so you must [download Microsoft .NET Framework 4.5](https://go.microsoft.com/fwlink/?LinkId=392318) and install it separately.

      @@ -273,7 +274,7 @@ The following table lists the installation prerequisites for the MBAM Administra
    • WCF Activation

      • HTTP Activation

      • -
      • Non-HTTP Activation

        +
      • Non-HTTP Activation (Only for Windows Server 2008, 2012 or 2012 R2)

    • TCP Activation

    • From d01f687a1afb0de374e13f146ea16c77a1779d18 Mon Sep 17 00:00:00 2001 From: illfated Date: Sun, 25 Aug 2019 19:59:41 +0200 Subject: [PATCH 039/285] Enterprise Mode schema: duplicate https usage - Resolve duplicate use of https where both http and https was intended - MarkDown code fence XML tag corrections - Replace HTML `
      ` codes with NewLine - Remove redundant space at the end of the version 2 file Resolves #4769 --- ...terprise-mode-schema-version-1-guidance.md | 8 +++---- ...terprise-mode-schema-version-2-guidance.md | 21 +++++++++---------- 2 files changed, 14 insertions(+), 15 deletions(-) diff --git a/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-1-guidance.md b/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-1-guidance.md index 3e8e129b3d..e8ccaf7750 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-1-guidance.md +++ b/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-1-guidance.md @@ -31,9 +31,9 @@ If you don't want to use the Enterprise Mode Site List Manager, you also have th The following is an example of the Enterprise Mode schema v.1. This schema can run on devices running Windows 7 and Windows 8.1. **Important**
      -Make sure that you don't specify a protocol when adding your URLs. Using a URL like `contoso.com` automatically applies to both https://contoso.com and https://contoso.com. +Make sure that you don't specify a protocol when adding your URLs. Using a URL like `contoso.com` automatically applies to both http://contoso.com and https://contoso.com. -``` xml +```xml www.cpandl.com @@ -206,7 +206,7 @@ For example, say you want all of the sites in the contoso.com domain to open usi ### What not to include in your schema We recommend that you not add any of the following items to your schema because they can make your compatibility list behave in unexpected ways: -- Don’t use protocols. For example, `https://`, `https://`, or custom protocols. They break parsing. +- Don’t use protocols. For example, `http://`, `https://`, or custom protocols. They break parsing. - Don’t use wildcards. - Don’t use query strings, ampersands break parsing. @@ -217,7 +217,7 @@ You can use trailing slashes at the path-level, but not at the domain-level: **Example** -``` xml +```xml contoso.com /about/ diff --git a/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-2-guidance.md b/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-2-guidance.md index 17e4e860cf..37daded3cc 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-2-guidance.md +++ b/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-2-guidance.md @@ -26,7 +26,8 @@ ms.date: 12/04/2017 Use the Enterprise Mode Site List Manager to create and update your site list for devices running Windows 7, Windows 8.1, and Windows 10, using the version 2.0 (v.2) of the Enterprise Mode schema. If you don't want to use the Enterprise Mode Site List Manager, you also have the option to update your XML schema using Notepad, or any other XML-editing app. -**Important**
      +**Important** + If you're running Windows 7 or Windows 8.1 and you've been using the version 1.0 (v.1) of the schema, you can continue to do so, but you won't get the benefits that come with the updated schema. For info about the v.1 schema, see [Enterprise Mode schema v.1 guidance](enterprise-mode-schema-version-1-guidance.md). ## Enterprise Mode schema v.2 updates @@ -41,10 +42,11 @@ You can continue to use the v.1 version of the schema on Windows 10, but you wo ### Enterprise Mode v.2 schema example The following is an example of the v.2 version of the Enterprise Mode schema. -**Important**
      -Make sure that you don't specify a protocol when adding your URLs. Using a URL like ``, automatically applies to both https://contoso.com and https://contoso.com. +**Important** + +Make sure that you don't specify a protocol when adding your URLs. Using a URL like ``, automatically applies to both http://contoso.com and https://contoso.com. -``` xml +```xml @@ -214,7 +216,7 @@ In this example, if https://contoso.com and https://contoso.com. +Make sure that you don't specify a protocol. Using <site url="contoso.com"> applies to both http://contoso.com and https://contoso.com.

      Example

       <site url="contoso.com:8080">
      @@ -284,19 +286,16 @@ With:
       
       While the old, replaced attributes aren't supported in the v.2 version of the schema, they'll continue to work in the v.1 version of the schema. If, however, you're using the v.2 version of the schema and these attributes are still there, the v.2 version schema takes precedence. We don’t recommend combining the two schemas, and instead recommend that you move to the v.2 version of the schema to take advantage of the new features.
       
      -**Important**
      +**Important** + Saving your v.1 version of the file using the new Enterprise Mode Site List Manager (schema v.2) automatically updates the XML to the new v.2 version of the schema. ### What not to include in your schema We recommend that you not add any of the following items to your schema because they can make your compatibility list behave in unexpected ways: -- Don’t use protocols. For example, https://, https://, or custom protocols. They break parsing. +- Don’t use protocols. For example, `http://`, `https://`, or custom protocols. They break parsing. - Don’t use wildcards. - Don’t use query strings, ampersands break parsing. ## Related topics - [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) - - - - From e2e480c99bc8986dbbab82872ca8a4cb4fe9c6d9 Mon Sep 17 00:00:00 2001 From: illfated Date: Sun, 25 Aug 2019 20:13:29 +0200 Subject: [PATCH 040/285] Update: NewLine changes - Remove extraneous NewLine breaks - Remove missed HTML `
      ` code --- .../enterprise-mode-schema-version-1-guidance.md | 2 +- .../enterprise-mode-schema-version-2-guidance.md | 3 --- 2 files changed, 1 insertion(+), 4 deletions(-) diff --git a/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-1-guidance.md b/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-1-guidance.md index e8ccaf7750..a4391db8b0 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-1-guidance.md +++ b/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-1-guidance.md @@ -30,7 +30,7 @@ If you don't want to use the Enterprise Mode Site List Manager, you also have th ## Enterprise Mode schema v.1 example The following is an example of the Enterprise Mode schema v.1. This schema can run on devices running Windows 7 and Windows 8.1. -**Important**
      +**Important** Make sure that you don't specify a protocol when adding your URLs. Using a URL like `contoso.com` automatically applies to both http://contoso.com and https://contoso.com. ```xml diff --git a/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-2-guidance.md b/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-2-guidance.md index 37daded3cc..489ffd391d 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-2-guidance.md +++ b/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-2-guidance.md @@ -27,7 +27,6 @@ ms.date: 12/04/2017 Use the Enterprise Mode Site List Manager to create and update your site list for devices running Windows 7, Windows 8.1, and Windows 10, using the version 2.0 (v.2) of the Enterprise Mode schema. If you don't want to use the Enterprise Mode Site List Manager, you also have the option to update your XML schema using Notepad, or any other XML-editing app. **Important** - If you're running Windows 7 or Windows 8.1 and you've been using the version 1.0 (v.1) of the schema, you can continue to do so, but you won't get the benefits that come with the updated schema. For info about the v.1 schema, see [Enterprise Mode schema v.1 guidance](enterprise-mode-schema-version-1-guidance.md). ## Enterprise Mode schema v.2 updates @@ -43,7 +42,6 @@ You can continue to use the v.1 version of the schema on Windows 10, but you wo The following is an example of the v.2 version of the Enterprise Mode schema. **Important** - Make sure that you don't specify a protocol when adding your URLs. Using a URL like ``, automatically applies to both http://contoso.com and https://contoso.com. ```xml @@ -287,7 +285,6 @@ With: While the old, replaced attributes aren't supported in the v.2 version of the schema, they'll continue to work in the v.1 version of the schema. If, however, you're using the v.2 version of the schema and these attributes are still there, the v.2 version schema takes precedence. We don’t recommend combining the two schemas, and instead recommend that you move to the v.2 version of the schema to take advantage of the new features. **Important** - Saving your v.1 version of the file using the new Enterprise Mode Site List Manager (schema v.2) automatically updates the XML to the new v.2 version of the schema. ### What not to include in your schema From b88f2c81d1625262475ea6292b8e81af2e1735ea Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Mon, 26 Aug 2019 16:34:45 +0500 Subject: [PATCH 041/285] Update credential-guard-manage.md --- .../credential-guard/credential-guard-manage.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/identity-protection/credential-guard/credential-guard-manage.md b/windows/security/identity-protection/credential-guard/credential-guard-manage.md index a583960ecd..b8b2673d47 100644 --- a/windows/security/identity-protection/credential-guard/credential-guard-manage.md +++ b/windows/security/identity-protection/credential-guard/credential-guard-manage.md @@ -113,7 +113,7 @@ You can do this by using either the Control Panel or the Deployment Image Servic You can also enable Windows Defender Credential Guard by using the [Windows Defender Device Guard and Windows Defender Credential Guard hardware readiness tool](https://www.microsoft.com/download/details.aspx?id=53337). ``` -DG_Readiness_Tool_v3.5.ps1 -Enable -AutoReboot +DG_Readiness_Tool_v3.6.ps1 -Enable -AutoReboot ``` > [!IMPORTANT] > When running the Windows Defender Device Guard and Windows Defender Credential Guard hardware readiness tool on a non-English operating system, within the script, change `$OSArch = $(gwmi win32_operatingsystem).OSArchitecture` to be `$OSArch = $((gwmi win32_operatingsystem).OSArchitecture).tolower()` instead, in order for the tool to work. @@ -136,7 +136,7 @@ You can view System Information to check that Windows Defender Credential Guard You can also check that Windows Defender Credential Guard is running by using the [Windows Defender Device Guard and Windows Defender Credential Guard hardware readiness tool](https://www.microsoft.com/download/details.aspx?id=53337). ``` -DG_Readiness_Tool_v3.5.ps1 -Ready +DG_Readiness_Tool_v3.6.ps1 -Ready ``` > [!IMPORTANT] > When running the Windows Defender Device Guard and Windows Defender Credential Guard hardware readiness tool on a non-English operating system, within the script, change `*$OSArch = $(gwmi win32_operatingsystem).OSArchitecture` to be `$OSAch = $((gwmi win32_operatingsystem).OSArchitecture).tolower()` instead, in order for the tool to work. From c68106b37ce73468593f2ed7d73e363262cb592d Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Mon, 26 Aug 2019 17:22:11 +0500 Subject: [PATCH 042/285] Update event-5155.md --- .../threat-protection/auditing/event-5155.md | 128 ++++++++++++++---- 1 file changed, 105 insertions(+), 23 deletions(-) diff --git a/windows/security/threat-protection/auditing/event-5155.md b/windows/security/threat-protection/auditing/event-5155.md index 934f310147..de9e17504d 100644 --- a/windows/security/threat-protection/auditing/event-5155.md +++ b/windows/security/threat-protection/auditing/event-5155.md @@ -24,35 +24,47 @@ By default Windows firewall won't prevent a port from being listened by an appli You can add your own filters using the WFP APIs to block listen to reproduce this event: . -There is no event example in this document. - ***Subcategory:*** [Audit Filtering Platform Connection](audit-filtering-platform-connection.md) -***Event Schema:*** +***Event Description:*** -*The Windows Filtering Platform has blocked an application or service from listening on a port for incoming connections.* +This event generates every time [Windows Filtering Platform](https://docs.microsoft.com/windows/win32/fwp/windows-filtering-platform-start-page) blocks an application or service from listening on a port for incoming connections. -*Application Information:* +
      -> *Process ID:%1* -> -> *Application Name:%2* +***Event XML:*** +``` + + + + 5155 + 0 + 0 + 12810 + 0 + 0x8010000000000000 + + 42196 + + + Security + NATHAN-AGENT2 + + + + 2628 + \device\harddiskvolume2\users\test\desktop\netcat\nc.exe + 0.0.0.0 + 5555 + 6 + 84576 + %%14609 + 40 + + -*Network Information:* - -> *Source Address:%3* -> -> *Source Port:%4* -> -> *Protocol:%5* - -*Filter Information:* - -> *Filter Run-Time ID:%6* -> -> *Layer Name:%7* -> -> *Layer Run-Time ID:%8* +``` ***Required Server Roles:*** None. @@ -60,6 +72,76 @@ There is no event example in this document. ***Event Versions:*** 0. +***Field Descriptions:*** + +**Application Information**: + +- **Process ID** \[Type = Pointer\]: hexadecimal Process ID of the process which was permitted to bind to the local port. Process ID (PID) is a number used by the operating system to uniquely identify an active process. To see the PID for a specific process you can, for example, use Task Manager (Details tab, PID column): + + Task manager illustration + + If you convert the hexadecimal value to decimal, you can compare it to the values in Task Manager. + + You can also correlate this process ID with a process ID in other events, for example, “[4688](event-4688.md): A new process has been created” **Process Information\\New Process ID**. + + + +- **Application Name** \[Type = UnicodeString\]**:** full path and the name of the executable for the process. + + Logical disk is displayed in format \\device\\harddiskvolume\#. You can get all local volume numbers by using **diskpart** utility. The command to get volume numbers using diskpart is “**list volume”**: + +DiskPart illustration + +**Network Information:** + +- **Source Address** \[Type = UnicodeString\]**:** the local IP address of the computer running the application. + + - IPv4 Address + + - IPv6 Address + + - :: - all IP addresses in IPv6 format + + - 0.0.0.0 - all IP addresses in IPv4 format + + - 127.0.0.1 , ::1 - localhost + +- **Source Port** \[Type = UnicodeString\]**:** the port number used by the application. + +- **Protocol** \[Type = UInt32\]: the protocol number being used. + +| Service | Protocol Number | +|----------------------------------------------------|-----------------| +| Internet Control Message Protocol (ICMP) | 1 | +| Transmission Control Protocol (TCP) | 6 | +| User Datagram Protocol (UDP) | 17 | +| General Routing Encapsulation (PPTP data over GRE) | 47 | +| Authentication Header (AH) IPSec | 51 | +| Encapsulation Security Payload (ESP) IPSec | 50 | +| Exterior Gateway Protocol (EGP) | 8 | +| Gateway-Gateway Protocol (GGP) | 3 | +| Host Monitoring Protocol (HMP) | 20 | +| Internet Group Management Protocol (IGMP) | 88 | +| MIT Remote Virtual Disk (RVD) | 66 | +| OSPF Open Shortest Path First | 89 | +| PARC Universal Packet Protocol (PUP) | 12 | +| Reliable Datagram Protocol (RDP) | 27 | +| Reservation Protocol (RSVP) QoS | 46 | + +**Filter Information:** + +- **Filter Run-Time ID** \[Type = UInt64\]: unique filter ID which blocks the application from binding to the port. By default, Windows firewall won't prevent a port from binding by an application, and if this application doesn’t match any filters, you will get value 0 in this field. + + To find specific Windows Filtering Platform filter by ID you need to execute the following command: **netsh wfp show filters**. As a result of this command, **filters.xml** file will be generated. You need to open this file and find the specific substring with the required filter ID (**<filterId>**)**,** for example: + + Filters.xml file illustration + +- **Layer Name** \[Type = UnicodeString\]: [Application Layer Enforcement](https://msdn.microsoft.com/library/windows/desktop/aa363971(v=vs.85).aspx) layer name. + +- **Layer Run-Time ID** \[Type = UInt64\]: Windows Filtering Platform layer identifier. To find specific Windows Filtering Platform layer ID you need to execute the following command: **netsh wfp show state**. As result of this command **wfpstate.xml** file will be generated. You need to open this file and find specific substring with required layer ID (**<layerId>**)**,** for example: + +Wfpstate xml illustration + ## Security Monitoring Recommendations - If you use Windows Filtering Platform APIs to block application or services from listening on a port, then you can use this event for troubleshooting and monitoring. From 2c1ded87d40b6b477a534ab7c699d68d246e4f4e Mon Sep 17 00:00:00 2001 From: Michael Niehaus Date: Tue, 27 Aug 2019 08:53:20 -0400 Subject: [PATCH 043/285] Update windows-autopilot-requirements.md Separated the Windows Autopilot deployment service and Windows Activation items into two separate rows to make it easier to read. --- .../windows-autopilot/windows-autopilot-requirements.md | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/windows/deployment/windows-autopilot/windows-autopilot-requirements.md b/windows/deployment/windows-autopilot/windows-autopilot-requirements.md index 9aa928f3f9..1baaf03dea 100644 --- a/windows/deployment/windows-autopilot/windows-autopilot-requirements.md +++ b/windows/deployment/windows-autopilot/windows-autopilot-requirements.md @@ -46,9 +46,10 @@ Windows Autopilot depends on a variety of internet-based services. Access to the In environments that have more restrictive Internet access, or for those that require authentication before internet access can be obtained, additional configuration may be required to whitelist access to the required services. For additional details about each of these services and their specific requirements, review the following details: - - - - - -
      ServiceInformation -
      Windows Autopilot Deployment Service and Windows ActivationAfter a network connection is in place, each Windows 10 device will contact the Windows Autopilot Deployment Service. With Windows 10 builds 18204 and above, the following URLs are used: https://ztd.dds.microsoft.com, https://cs.dds.microsoft.com.
      - -For all supported Windows 10 releases, Windows Autopilot also uses Windows Activation services. See Windows activation or validation fails with error code 0x8004FE33 for details about problems that might occur when you connect to the Internet through a proxy server. +
      Windows Autopilot Deployment ServiceAfter a network connection is in place, each Windows 10 device will contact the Windows Autopilot Deployment Service. With Windows 10 version 1903 and above, the following URLs are used: https://ztd.dds.microsoft.com, https://cs.dds.microsoft.com.
      + +
      Windows ActivationWindows Autopilot also requires Windows Activation services. See Windows activation or validation fails with error code 0x8004FE33 for details about the URLs that need to be accessible for the activation services.
      +
      Azure Active DirectoryUser credentials are validated by Azure Active Directory, and the device can also be joined to Azure Active Directory. See Office 365 IP Address and URL Web service for more information.
      IntuneOnce authenticated, Azure Active Directory will trigger enrollment of the device into the Intune MDM service. See the following link for details about network communication requirements: Intune network configuration requirements and bandwidth.
      Windows UpdateDuring the OOBE process, as well as after the Windows 10 OS is fully configured, the Windows Update service is leveraged to retrieve needed updates. If there are problems connecting to Windows Update, see How to solve connection problems concerning Windows Update or Microsoft Update.
      From 53ea53dddc9939efa13e0b8bfee68d4345c06dec Mon Sep 17 00:00:00 2001 From: Zhanguo Tu Date: Wed, 28 Aug 2019 09:58:34 +0800 Subject: [PATCH 044/285] Update upgrade-mbam2.5-sp1.md --- mdop/mbam-v25/upgrade-mbam2.5-sp1.md | 40 +++++++++++++++------------- 1 file changed, 21 insertions(+), 19 deletions(-) diff --git a/mdop/mbam-v25/upgrade-mbam2.5-sp1.md b/mdop/mbam-v25/upgrade-mbam2.5-sp1.md index 045cee4b55..51719e8cbe 100644 --- a/mdop/mbam-v25/upgrade-mbam2.5-sp1.md +++ b/mdop/mbam-v25/upgrade-mbam2.5-sp1.md @@ -2,48 +2,50 @@ title: Upgrading from MBAM 2.5 to MBAM 2.5 SP1 Servicing Release Update author: TobyTu ms.author: ksharma -manager: dcscontentpm +manager: DCSCPMCAIM365 audience: ITPro ms.topic: article ms.prod: mbam localization_priority: Normal --- -# Upgrading from MBAM 2.5 to MBAM 2.5 SP1 Servicing Release Update +# Upgrade from MBAM 2.5 to MBAM 2.5 SP1 Servicing Release Update -This article provides step-by-step instructions for upgrading Microsoft BitLocker Administration and Monitoring (MBAM) 2.5 to MBAM 2.5 SP1 along with Microsoft Desktop Optimization Pack (MDOP) July 2018 Servicing update in a stand-alone configuration. In this guide we will use a two-server configuration. One of the two servers will be a database server that's running Microsoft SQL Server 2016. This server will host the MBAM databases and reports. The additional server will be a Windows Server 2012 R2 web server and will host "Administration and Monitoring Server" and "Self-Service Portal." +This article provides step-by-step instructions to upgrade Microsoft BitLocker Administration and Monitoring (MBAM) 2.5 to MBAM 2.5 Service Pack 1 (SP1) together with the Microsoft Desktop Optimization Pack (MDOP) July 2018 servicing update in a standalone configuration. -## Preparation steps before you upgrade MBAM 2.5 SP1 server +In this guide, we will use a two-server configuration. One server will be a database server that's running Microsoft SQL Server 2016. This server will host the MBAM databases and reports. The other server will be a Windows Server 2012 R2 web server. This server will host "Administration and Monitoring" and "Self-Service Portal." -### Know the MBAM Servers in your environment +## Prepare to upgrade MBAM 2.5 SP1 -1. SQL Server Database Engine: Server Hosting the MBAM Databases. -2. SQL Server Reporting Services: Server Hosting the MBAM Reports. -3. Internet Information Services (IIS) Web Servers: Server Hosting MBAM Web Applications and Services. -4. (Optional) Microsoft System Center Configuration Manager (SCCM) Primary Site Server: MBAM Configuration Application is run on this server to integrate MBAM Repots with SCCM which are then merged with existing SCCM reports on the SCCM’s SQL Server Reporting Services (SSRS) instance. +### Know the MBAM servers in your environment -### Identify Service Accounts, Groups, Server Name and Reports URL +1. SQL Server Database Engine: Server that hosts the MBAM databases. +2. SQL Server Reporting Services: Server that hosts the MBAM reports. +3. Internet Information Services (IIS) web servers: Server that hosts MBAM Web Applications and MBAM services. +4. (Optional) Microsoft System Center Configuration Manager primary site server: The MBAM configuration application is run on this server to integrate MBAM reports with Configuration Manager. These reports are then merged with existing Configuration Manager reports on the Configuration Manager SQL Server Reporting Services (SSRS) instance. -1. Identify the MBAM App Pool Svc Account used by IIS web servers to Read and Write Data to MBAM Databases. -2. Identify the Groups used during MBAM Web Features Configuration and the Reports Web Service URL. -3. Identify the SQL Server Name and Instance Name. +### Identify service accounts, groups, server name, and reports URL + +1. Identify the MBAM application pool service account that's used by IIS web servers to read and write data to MBAM databases. +2. Identify the groups that are used during the MBAM web features configuration and the reports web service URL. +3. Identify the SQL Server name and instance name. > [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE3ANP1] -4. Identify the SQL Server Reporting Services Account used for reading compliance data from Compliance and Audit Database. +4. Identify the SQL Server Reporting Services Account that's used for reading compliance data from the Compliance and Audit database. > [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE3ALdZ] -## Upgrade the MBAM Infrastructure to the latest version available +## Upgrade the MBAM infrastructure to the latest version available > [!NOTE] -> We recommend that you take a full database backup of the MBAM Databases before performing upgrades. +> We recommend that you create a full database backup of the MBAM databases before you run the upgrades. -### Upgrade the MBAM SQL Server +### Upgrade the MBAM SQL Server server > [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE3ALew] -### Upgrade MBAM Web Server +### Upgrade the MBAM web server > [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE3ALex] ## More information -For more about MBAM 2.5 SP1 known issues, please refer [Release Notes for MBAM 2.5 SP1](https://docs.microsoft.com/microsoft-desktop-optimization-pack/mbam-v25/release-notes-for-mbam-25-sp1). +For more information about known issues in MBAM 2.5 SP1, see [Release Notes for MBAM 2.5 SP1](https://docs.microsoft.com/microsoft-desktop-optimization-pack/mbam-v25/release-notes-for-mbam-25-sp1). From b1e817ea99ff4eb1ebf344d3506bf8c0783d6edc Mon Sep 17 00:00:00 2001 From: Deland-Han Date: Wed, 28 Aug 2019 10:30:55 +0800 Subject: [PATCH 045/285] finish --- windows/client-management/TOC.md | 4 + .../determine-appropriate-page-file-size.md | 128 +++++++++++ .../generate-kernel-or-complete-crash-dump.md | 110 +++++++++ .../images/out-of-memory.png | Bin 0 -> 41165 bytes .../images/task-manager-commit.png | Bin 0 -> 96419 bytes .../client-management/images/task-manager.png | Bin 0 -> 101967 bytes .../introduction-of-page-file.md | 74 +++++++ .../system-failure-recovery-options.md | 209 ++++++++++++++++++ .../troubleshoot-windows-startup.md | 38 +++- 9 files changed, 560 insertions(+), 3 deletions(-) create mode 100644 windows/client-management/determine-appropriate-page-file-size.md create mode 100644 windows/client-management/generate-kernel-or-complete-crash-dump.md create mode 100644 windows/client-management/images/out-of-memory.png create mode 100644 windows/client-management/images/task-manager-commit.png create mode 100644 windows/client-management/images/task-manager.png create mode 100644 windows/client-management/introduction-of-page-file.md create mode 100644 windows/client-management/system-failure-recovery-options.md diff --git a/windows/client-management/TOC.md b/windows/client-management/TOC.md index d3c28bfc73..d3ba01eed3 100644 --- a/windows/client-management/TOC.md +++ b/windows/client-management/TOC.md @@ -22,6 +22,10 @@ ##### [Troubleshoot port exhaustion](troubleshoot-tcpip-port-exhaust.md) ##### [Troubleshoot Remote Procedure Call (RPC) errors](troubleshoot-tcpip-rpc-errors.md) ### [Advanced troubleshooting for Windows startup](troubleshoot-windows-startup.md) +#### [How to determine the appropriate page file size for 64-bit versions of Windows](determine-appropriate-page-file-size.md) +#### [Generate a kernel or complete crash dump](generate-kernel-or-complete-crash-dump.md) +#### [Introduction of page file](introduction-of-page-file.md) +#### [Configure system failure and recovery options in Windows](system-failure-recovery-options.md) #### [Advanced troubleshooting for Windows boot problems](advanced-troubleshooting-boot-problems.md) #### [Advanced troubleshooting for Windows-based computer freeze](troubleshoot-windows-freeze.md) #### [Advanced troubleshooting for stop error or blue screen error](troubleshoot-stop-errors.md) diff --git a/windows/client-management/determine-appropriate-page-file-size.md b/windows/client-management/determine-appropriate-page-file-size.md new file mode 100644 index 0000000000..af9ebe39dd --- /dev/null +++ b/windows/client-management/determine-appropriate-page-file-size.md @@ -0,0 +1,128 @@ +--- +title: How to determine the appropriate page file size for 64-bit versions of Windows +description: Learn how to determine the appropriate page file size for 64-bit versions of Windows. +ms.prod: w10 +ms.sitesec: library +ms.topic: troubleshooting +author: Deland-Han +ms.localizationpriority: medium +ms.author: delhan +ms.date: 8/28/2019 +ms.reviewer: +manager: dcscontentpm +--- + +# How to determine the appropriate page file size for 64-bit versions of Windows + +In summary, page file sizing depends on the system crash dump setting requirements and the system commit charge peak usage or expected usage. Both considerations are unique to each system, even for systems that are identical to other systems. This means that page file sizing is unique to each system and cannot be generalized. + +## Determine the appropriate page file size + +Use the following considerations for page file sizing for all versions of Windows and Windows Server: + +### Crash dump setting + +If you want a crash dump file to be created during a system crash, a page file or a dedicated dump file must exist and be large enough to back the system crash dump setting. Otherwise, a system memory dump file is not created. + +For more information, see [Support for system crash dumps](introduction-of-page-file.md#support-for-system-crash-dumps) section. + +### Peak system commit charge + +The system commit charge cannot exceed the system commit limit. This limit is the sum of physical memory (RAM) and all page files combined. If no page files exist, the system commit limit is slightly less than the physical memory installed. Peak system-committed memory usage can vary greatly between systems. Therefore, physical memory and page file sizing also varies. + +### Quantity of infrequently accessed pages + +The purpose of a page file is to back infrequently accessed modified pages so that they can be removed from physical memory. This provides more available space for more frequently accessed pages. The "\Memory\Modified Page List Bytes" performance counter measures, in part, the number of infrequently accessed modified pages that are destined for the hard disk. However, be aware that not all the memory on the modified page list is written out to disk. Typically, several hundred megabytes of memory remains resident on the modified list. Therefore, consider extending or adding a page file if all the following conditions are true: + +- More available physical memory (\Memory\Available MBytes) is required. + +- The modified page list contains a significant amount of memory. + +- The existing page files are fairly full (\Paging Files(*)\% Usage). + +## Support for system crash dumps + +A system crash (also known as a “bug check” or a "Stop error") occurs when the system cannot run correctly. The dump file that is produced from this event is called a system crash dump. A page file or dedicated dump file is used to write a crash dump file (memory.dmp) to disk. Therefore, a page file or a dedicated dump file must be large enough to support the kind of crash dump selected. Otherwise, the system cannot create the crash dump file. + +>[!Note] +>During startup, system-managed page files are sized respective to the system crash dump settings. This assumes that enough free disk space exists. + +|System crash dump setting |Minimum page file size requirement| +|-----------|-------------------| +|Small memory dump (256 KB) |1 MB| +|Kernel memory dump |Depends on kernel virtual memory usage| +|Complete memory dump |1 x RAM plus 257 MB*| +|Automatic memory dump |Depends on kernel virtual memory usage. For details, see Automatic memory dump.| + +\* 1 MB of header data and device drivers can total 256 MB of secondary crash dump data. + +The **Automatic memory dump** setting is enabled by default. This is a setting instead of a kind of crash dump. This setting automatically selects the best page file size, depending on the frequency of system crashes. + +The Automatic memory dump feature at first selects a small paging file size. It would accommodate the kernel memory most of the time. If the system crashes again within four weeks, the Automatic memory dump feature selects the page file size as either the RAM size or 32 GB, whichever is smaller. + +Kernel memory crash dumps require enough page file space or dedicated dump file space to accommodate the kernel mode side of virtual memory usage. If the system crashes again within four weeks of the previous crash, a Complete memory dump is selected at restart. This requires a page file or dedicated dump file of at least the size of physical memory (RAM) plus 1 MB for header information plus 256 MB for potential driver data to support all the potential data that is dumped from memory. Again, the system-managed page file will be increased to back this kind of crash dump. If the system is configured to have a page file or a dedicated dump file of a specific size, make sure that the size is sufficient to back the crash dump setting that is listed in the table earlier in this section together with and the peak system commit charge. + +### Dedicated dump files + +Computers that are running Microsoft Windows or Microsoft Windows Server usually must have a page file to support a system crash dump. System administrators now have the option to create a dedicated dump file instead. +A dedicated dump file is a page file that is not used for paging. Instead, it is “dedicated” to back a system crash dump file (memory.dmp) when a system crash occurs. Dedicated dump files can be put on any disk volume that can support a page file. We recommend that you use a dedicated dump file when you want a system crash dump, but you do not want a page file. + +## System-managed page files + +By default, page files are system managed. This means that the page files increase and decrease based on many factors, such as the amount of physical memory installed, the process of accommodating the system commit charge, and the process of accommodating a system crash dump. + +For example, when the system commit charge is more than 90 percent of the system commit limit, the page file is increased to back it. This continues to occur until the page file reaches three times the size of physical memory or 4 GB, whichever is larger. This all assumes that the logical disk that is hosting the page file is large enough to accommodate the growth. + +The following table lists the minimum and maximum page file sizes of system-managed page files in Windows 10. + +|Minimum page file size |Maximum page file size| +|---------------|------------------| +|Varies based on page file usage history, amount of RAM (RAM ÷ 8, max 32 GB) and crash dump settings. |3 × RAM or 4 GB, whichever is larger. This is then limited to the volume size ÷ 8. However, it can grow to within 1 GB of free space on the volume if required for crash dump settings.| + +## Performance counters + +Several performance counters are related to page files. This section describes the counters and what they measure. + +### \Memory\Page/sec and other hard page fault counters + +The following performance counters measure hard page faults (which include, but are not limited to, page file reads): + +- \Memory\Page/sec + +- \Memory\Page Reads/sec + +- \Memory\Page Inputs/sec + +The following performance counters measure page file writes: + +- \Memory\Page Writes/sec + +- \Memory\Page Output/sec + +Hard page faults are faults that must be resolved by retrieving the data from disk. Such data can include portions of DLLs, .exe files, memory-mapped files, and page files. These faults might or might not be related to a page file or to a low-memory condition. Hard page faults are a standard function of the operating system. They occur when the following items are read: + +- Parts of image files (.dll and .exe files) as they are used + +- Memory-mapped files + +- A page file + +High values for these counters (excessive paging) indicate disk access of generally 4 KB per page fault on x86 and x64 versions of Windows and Windows Server. This disk access might or might not be related to page file activity but may contribute to poor disk performance that can cause system-wide delays if the related disks are overwhelmed. + +Therefore, we recommend that you monitor the disk performance of the logical disks that host a page file in correlation with these counters. Be aware that a system that has a sustained 100 hard page faults per second experiences 400 KB per second disk transfers. Most 7200 RPM disk drives can handle about 5 MB per second at an IO size of 16 KB or 800 KB per second at an IO size of 4 KB. No performance counter directly measures which logical disk the hard page faults are resolved for. + +### \Paging File(*)\% Usage + +The \Paging File(*)\% Usage performance counter measures the percentage of usage of each page file. 100 percent usage of a page file does not indicate a performance problem as long as the system commit limit is not reached by the system commit charge, and if a significant amount of memory is not waiting to be written to a page file. + +>[!Note] +>The size of the Modified Page List (\Memory\Modified Page List Bytes) is the total of modified data that is waiting to be written to disk. + +If the Modified Page List (a list of physical memory pages that are the least frequently accessed) contains a lot of memory, and if the % Usage value of all page files is greater than 90, you can make more physical memory available for more frequently access pages by increasing or adding a page file. + +>[!Note] +>Not all the memory on the modified page list is written out to disk. Typically, several hundred megabytes of memory remains resident on the modified list. + +## Multiple page files and disk considerations + +If a system is configured to have more than one page files, the page file that responds first is the one that is used. This means that page files that are on faster disks are used more frequently. Also, putting a page file on a “fast” or “slow” disk is important only if the page file is frequently accessed and if the disk that is hosting the respective page file is overwhelmed. Be aware that actual page file usage depends greatly on the amount of modified memory that the system is managing. This means that files that already exist on disk (such as .txt, .doc, .dll, and .exe) are not written to a page file. Only modified data that does not already exist on disk (for example, unsaved text in Notepad ) is memory that could potentially be backed by a page file. After the unsaved data is saved to disk as a file, it is backed by the disk and not by a page file. diff --git a/windows/client-management/generate-kernel-or-complete-crash-dump.md b/windows/client-management/generate-kernel-or-complete-crash-dump.md new file mode 100644 index 0000000000..21bffca246 --- /dev/null +++ b/windows/client-management/generate-kernel-or-complete-crash-dump.md @@ -0,0 +1,110 @@ +--- +title: Generate a kernel or complete crash dump +description: Learn how to generate a kernel or complete crash dump. +ms.prod: w10 +ms.sitesec: library +ms.topic: troubleshooting +author: Deland-Han +ms.localizationpriority: medium +ms.author: delhan +ms.date: 8/28/2019 +ms.reviewer: +manager: dcscontentpm +--- + +# Generate a kernel or complete crash dump + +A system crash (also known as a “bug check” or a "Stop error") occurs when Windows can't run correctly. The dump file that is produced from this event is called a system crash dump. + +A manual kernel or complete memory dump file is useful when troubleshooting a number of issues because the process captures a record of system memory at the time of a crash. + +## Set up page files + +See [Support for system crash dumps](determine-appropriate-page-file-size.md#support-for-system-crash-dumps) for the page file size requirement for system crash dump. + +## Enable memory dump setting + +You must be logged on as an administrator or a member of the Administrators group to complete this procedure. If your computer is connected to a network, network policy settings may prevent you from completing this procedure. + +To enable memory dump setting, follow these steps: + +1. In **Control Panel**, click **System and Security** -> **System**, or click **System** directly if control panel is viewed by icons. + +2. Click **Advanced system settings**, and then click the **Advanced** tab. + +3. Under **Startup and Recovery**, click **Settings**. + +4. Make sure that **Kernel memory dump** or **Complete memory dump** is selected under **Writing Debugging Information**. + +5. Restart the computer. + +>[!Note] +> You can change the dump file path by edit the **Dump file** field. In other words, you can change the path from %SystemRoot%\Memory.dmp to point to a local drive that has enough disk space, such as E:\Memory.dmp. + +### Tips for memory dump + +When computer crashes and restarts, the contents of physical RAM are written to the paging file that is located on the partition on which the operating system is installed. + +Depending on the speed of the hard drive on which Windows is installed, dumping more than 2 gigabytes (GB) of memory may take a long time. Even in a best case scenario, where the dump file is configured to reside on another local hard drive, there will be a significant amount of data being read and written to the hard drives. This can cause a prolonged server outage. + +>[!Note] +>Use this method to generate complete memory dump files with caution. Ideally, you should only do this only when you are explicitly requested to by the Microsoft Customer Support Services Engineer. Any kernel or complete memory dump file debugging should be the last resort when all the standard troubleshooting methods have been completely exhausted. + +## Manually generate a memory dump file + +### Use the NotMyFault tool + +If you can log on while the problem is occurring, you can use the Microsoft Sysinternals NotMyFault tool. To do this, follow these steps: + +1. Download the [NotMyFault](https://download.sysinternals.com/files/NotMyFault.zip) tool. + +2. Click **Start**, and then click **Command Prompt**. +3. At the command line, run the following command: + + ```cmd + notMyfault.exe /crash + ``` + +>[!Note] +>This operation generates a memory dump file and a D1 stop error. + +### Use NMI + +On some computers, you cannot use keyboard to generate a crash dump file. For example, Hewlett-Packard (HP) BladeSystem servers from the Hewlett-Packard Development Company are managed through a browser-based graphical user interface (GUI). A keyboard is not attached to the HP BladeSystem server. + +In these cases, you must generate a complete crash dump file or a kernel crash dump file by using the Non-Maskable Interrupt (NMI) switch that causes an NMI on the system processor. + +To do this, follow these steps: + +> [!IMPORTANT] +> Follow the steps in this section carefully. Serious problems might occur if you modify the registry incorrectly. Before you modify it, [back up the registry for restoration](https://support.microsoft.com/help/322756) in case problems occur. + +1. In Registry Editor, locate the following registry subkey: + **HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\CrashControl** + +2. Right-click **CrashControl**, point to **New**, and then click **DWORD Value**. + +3. Type NMICrashDump, and then press Enter. + +4. Right-click **NMICrashDump**, and then click **Modify**. + +5. In the **Value data** box, type 1, and then click **OK**. + +6. Restart the computer. + +7. Hardware vendors, such as HP, IBM, and Dell, may provide an Automatic System Recovery (ASR) feature. You should disable this feature during troubleshooting. For example, if HP and Compaq's ASR feature is enabled in the BIOS, disable this feature while you are troubleshooting to generate a complete memory.dmp file. For the exact steps, contact your hardware vendor. + +8. Enable the NMI switch in the BIOS or by using the Integrated Lights Out (iLO) Web interface. + + >[!Note] + >For the exact steps, see the BIOS reference manual or contact your hardware vendor. + +9. Test this method on the server by using the NMI switch to generate a dump file. You will see a STOP 0x00000080 hardware malfunction. + +### Use the keyboard + +[Forcing a System Crash from the Keyboard](https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/forcing-a-system-crash-from-the-keyboard) + +### Use Debugger + +[Forcing a System Crash from the Debugger](https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/forcing-a-system-crash-from-the-debugger) diff --git a/windows/client-management/images/out-of-memory.png b/windows/client-management/images/out-of-memory.png new file mode 100644 index 0000000000000000000000000000000000000000..c377389128117592d16f84308068259fa28e8726 GIT binary patch literal 41165 zcmdS9Wl$Ym&@PI*yF&sS*|>Xf0vmUC3m)7(xNqFu-Q8V-yIZgT!JW%{?suy0&-?S7 zsae%Et9o_!>YDDE)%}Dk%6~^iB0_?IfIyX&5?6+RfNc33`Up^;GvVFC_n!pPN%^}d zMD;Yu$>#%%g@~L81Vmjd@~aW-=QH9@DJ>@m2(-cf24oUF8ZiV!uCcVZh^o8(c^0f8 z@%Ocdo38JIKfE-g(i`d6#pYO?Y-n8f;=UB8rv1-F2w1KEyk)^@BG2Yc^^E*w>4nl6 zg*P2t!|eR*{2e!wemMb6ZiRpS;RSXe(cNG70$y_<1B5B!;33tppaO(>{{NGI#Hx;Y zIjjUxBs=g3Fi;*MPpCj%rKul0vHyF*LpMp6$QZ?)HR2=ka}MLzryl(H5jAOT$bx;i z0%v$fe{x}rPp$gmWHNwdJVF>9&qdXN)NNzH!*5o|CdGK-UzAS ze-LRf?GTUqMUV?YU9P$9J+vq1E)w;&U5r#mb(crnW+B29J-H$1QLk!bN`RAzs5CUm zd4T7eOll^nWcethFN6q2cqSAgPv9t;;=o@b|IvQ-0& z`E!#595#!Cwtb<0Fx4E*B1CG<7rbTdH{-Do>c9TyA@Q#z!cZ|RW;E6v2pjkva#^GA(Ho9!RbOt|MitJ3>-CVKo)TtitD}g8YUKrxV)MbbYQq8nN;lXA?>W{h zj6lRd3M^h&EPvA;6d<8sE^&j)`jiwG;tEgfpnc}CgM)~#G2Ty2tAa2_%N4Q7UzMg> zOvmUwsj0YY2sTwC>MPjw%5?xZAv>YS-p(aY1nGfn-!}_$L-rTurR1s&TPxV?!dt{^$j_(M|UsEufWrFa^TbJ~}E$sr!jaH``{W z80Vuq`KhJf+|S$@J2t&c5D?7=w8Un0_~Uyi*!C}kKMmI8xXzm5!`?!tlvl=AwEs?7 z*8z?SP0;toQ!0@00WIKl?8l?t_l?O|+vB2|8UAV^rdH>_u}qmmB1kzxu%rGN)Ir`-pX8cJIOm)$Pp4-$YnsR=~GG>lVLV0b_N74B~N;UiZpHr!cnt}VxI|DZ}z;It1l>nPK zagO-L0zO;#2dx7LpYf@EL9E6FaKE7DZWtiJTnEly zQOJ249@Jd_1h)OFlcQ&Y4Y%5}d5C%E`&3)23ifAkb$Z9Kh&-n-t|b(2zxMnvR~VLU zDnll&;6B%`1)z4&no8Rq>HfZs4A=V792j3{(`QQ&zIqAK%itx0g4IN}rOmgV6mLVE zHp8|w&nniVxNe&QO|$wyDR{i~B~Az$wWl(KME(s6y##ztzMdN>wHA+EXY!lrQ@@S) z`)LV}4Hyz4Z)$pCE2)LrBpec(BVCXYnaV0_s?(tut@b%EL@ zIQ_4Fb8^ftF18v21pk=T)p0}qmcLe$6Sk79*mkC-6U~hHFxSS=Hr=}^E*PKTuNe@! zv#SbzGs$of+4#mBP8Rz}hXw-`Ah0j+3nb6YPQ=V=rJwJ1t~p>&mfA@=jP#i~3}fNP zgpH|?M-e_V^KV}CJg{JU)O9T3A^&kS|FImp1IGnKcsv6I<$rSie9B4g`c3fuOdV+m{Le_;f46FmEZ~57GZdKm|Cv!$ z15ayaSvYT)B%Yf!ZixEAvHriT9BPiX;jHO>r9y+WugC>QUc*vsCN9Y?NS_~)Z0zh} zP_-=U+U1;k&;|XakIZqSYI`x9=V+2oLWFwtQ75kIfkJ^p!9xKT0beH% zdIy2@NKhW;n%cTVr_=|{F_^=6%S&XgSUKGSLQ=(vYWIce_Z+AUF~1x3azxaVH6*VJ z_wF$#ujU4}cgUybm8759g3?E5eKNKlmz%OlD+)=iA4zYEKTHz;nxoLLEhTG>WkWgh z`PkapS~+_D;u93$3MLC$cshB)<;!AS62h}T{pj}9a35f|0mTW?4~Pwn6>nXJtF7V7 z&ydNB`}ZlJyMFgNeD&tDq0wkHeRbYv7pUT7{T6RY`q*SzX7oHNwzbpHJFhgh$^^IN zuk@OtMzSXbl_dVY-Vmhpj1MOt&AK@by2pXQY7^MDr^ohtbi`mGx^+KOj#rze^^HbT z!@6d;ApnkP5=%QzD=RW{P31tN^(|~%pPmw(Ei}NZN^^ze6W$5Up1D@uvjMOKpIv9p z+*nR~OyZz5$FeyRpa&$vC3K0#jP0`YEvZ-_Aisko-28o%gijO?Ic@}wc^d#yAjmqqApj^@_KT)LbQ0*86aF8Ov|(RNNqpUPB=(A6(ia;~U3 zDh9X#Ex02}O zr>D@)SGu!M5soO;9?)Sxt6ggu8u{k&f4Tbw3f6`)d;HBIBoJ{H<0|tMsj0)|;9(Su z`=mp7Qol6bRbi0AG8*CTno5PC;-mb*v_>$`%Rb;9qw`ExdSD1sa01iiS|MJI4A_(B zBJtkK*@K`XDJ|z_pWrE7Pvsp?{RmF`{i23t3S-~-%q4K@9!Oc?GqE0- zKR^Aan9JtEm+_z4xMZ2OG`|BHD(EXz4&v)2)$f$8p4s{EdwV02qQ@}IO6wrYj2t=X zs=^~^P?ik8pCL5tz{;1f7h4ugZ4NZGva;mL)Lg&`Vr!11@ zSk|Ohz11O1v23k~RDx0Kqu-UOUg~|E++hJ7K1ix?3)qP$Oc6)0-_7?GO+KLL|ELS| zniQDmWr?8{ddw6jF^=LUl!x(h7MSk*Vy!`Vt#`lz)I=j?dw6jZ3i8+1B27MRQKvW zG}CwJF)nV^LTN6@FusI8gE@eI$AxGX+WLqI&xq zX((%wQ(}4hVpQ~K4mZp`J&4Ps_I55QG8oA@e{y(_0NB7N%c+IrJ~LNjm~ba;$r1Iq z5rhbBJ-w`~Ty@n4J55Yayr}1ZI>?b#DdwZgPFNzPm1Cko3Vb}g0A{V2qWB*f=!7d4 zDm0K)KpwVr>aYdC67La%IDA0JNe&4$#ZshhQH<_7chK7X_VsL+bWoL&1fUXdAIl9Wu zT0jvYc;OH5*lnwOlc}_SjR%kM^bVV@ez&V>ezYFTKUIyPFu`Z6l#QCt?J}uW4Phek06B4m)L&HF%trmPD0uUht+}3PY;)kJT;Hs-*SH0y5vz zMs{Hy?jZQt2_$iQGkul<7&+`5A%+C0N0Xmt5{+nR=yqY<|0}{!JkR*E|E*mQOI9C_ z8ZCnK_!N-~obJ2V>@j1f7w>k76C47d_3Wf? z)@u7;^XsCzFW_`3++GjlZIBDJ`w_#|Go!J7Xxp@9^{1efLA$^1_US1Y>mzl4_>jml zfmj2EJDAS8Suu94Y(@#B1<6b!N;*8k=Sq1AXeeeu`2jNsmw^=-b?yk`!vg4|d%5^^ z-c54LXFm=Z6q88Yrp~JsB>I!R zun@-cEf(kkpnUpuJ|>bvqRWBl9y_2u?jLS$d2Z<@>@c|<+-qit(6wxH^X2bcTcv|l|=Y|G`QjlS+NY<#n;vu2EV^}icA z8_}NPEFF#OM**h<3gxC4)rO|NKixCKEaMZR++(?e^Z*iO{U6ggb-%lMLfMc(aMU~? zB3s!q=duh~GSpI8FRjoHyFvaX=+b#e)j5szhn$iiG)-3+b-9?RsOF|7X?>LUXPZ%U zPc>>S)i|>sKUTImb~`=OG_QHSVpR-4dWIuWFQS=69-|hQxFt8c-X{<>S$_dRZTFc zEKc!Qt|MmC{7^J@i42$6a`=0HJ;Z6H_QYA1pRpwveTFJk5{oZ^H-S(r^QRhZibcC# zX5p4CR;MMX^R0lrFkM|`;+2w!(JWWAA`AqQe(H3fxs$y5p|VXCEEDb&|u#?XKVQagtuY#t-(S*cr_CKl-& zDRDK{dR|?ot5_d*rX4~XFDhRf*~%qx-xs4Mf=Ig`{dYh!y?lidIC|Au3@+viEncZ< zxzBk_0c1@@Q#R| zLL$k0fi6O_$8I^c{i#<6Ufpz_16h(r3OliJl~|(FOabEC`(FQ7cghfcz^h(qe@hgS z!0p&-k;58K2M9{2Ymo71C3?XtK+~|RR0%enCTpHPNsb&I5keSXAO6@ynM{u-h*sI+ z*SNh+xBuGIDE3V(Hz?OKn@d3zpixX<+kd;JXZ;tQ$gTiB{zQJMd-_NBec`tuNT1km z87H9TO6+0%Y z+_iePY}hJbh+IfG?l(3_s`Kuc6iQ8b%4*38-~E*kgO)6+6H5tyO`KZ*Bv%#3S^zSf z;1I9UN`REMS5UY55o*JdH}ET)FaUNapyRmh@5(cD(Mjvzv6~NHY*MR+;H7?}gehRcl_0-P2gib_Q4JW=dp(s_3W&|vMMH8P?7K?|OL+#u#JQ6*u6|FhEa?=&is#%*(cz1m2W&3v;$P zX5qm5e9sw&t=Y4SY$Mdy94-ZUKzyt%h#)CvKI0?gB3?Z9N6lv$kzX{E+eH1}q=Liv zmQj@1w|E7IxFs*=BpA|SzAE?2Jf49)x|uRXVd*I8{0{x%U!G0)t{x7?D|+m^&2|B$ z_MvY7Xx9QDd+~_pkhfOxJ(XLO$2+E1$a!Ub=pXH2Z#0`cnryVmAR6h*!9v38xCQd6qI&JHca>o<|h4SwdkXR+}<8B1jEAz%j4rnK_TdPd2iKQv5TZ8u$n15ysC&F}e8E>MXnRm;D#E+fbq^KYVk0+g&SD zrimOrbjldJOvpIJO|AO*T|YJj+6a)O{MnRricHl!`(TAy#SOBFP@84jDw4fMD&|?; z+)aG1e4ERt-1{nbPJdk%Z8X};kZ(1CcyD~WRAPw} z-#?zX;V>>4Jft0>Q0}9!9_$M387z*9cy6$+u&&s=>os{(r+O=9uUMRX1p*oqS}y>| zCCu~1N5t4jYN*JML6S4g)M^Xb?RY^u=X-0$ZVjEfbKGw8D>qy7B8d{Ts9KCLz%tVm zFZ$&1O0<3k$ei7rr@5qZo_-SAD^^vup~*j`q)d59oD~S?PMw91h-!(G_m$`K}$&1rvD@v*%lVlx0s}5zrP7|^pg!HH?0OsQZO|gj714J3Ai%S2DSf$&Y5&r{Sd_c;gFQ+KTk6xwP|1*n;_iQLk>ygygaE%%T`laA4Z3+$dhp>li}YAVF18Z=71e@8{4eCfq#_K zD@D^}c5+WrEeH7da$3yB+UiRPHLuPLo~88Rx@HPC6GEdMmGCgLwwn^n+g6_UKpxi+;Rue*;`nF;;N1=Jd;#<%0+|KkiU-qdK|)WX<6Vp zF%cxf<0kn3VPmOl=M%4v8Q=Qnw8E`yS+dyBs^-LnR<>ielU5&LQlAGFu-l}|vRTw2 zMQfRg12Z<2e%9`Knd(J{gvpU^MkI9k@b=s z9$Bftw8%XUlrIt&qISJT6b-5X4#KpXZq6xm3&^>djA!j$CMDh6rp{hl2<==LrSS5p9?H215e^|a&k5J?pH*raAZy&vd~># zaP$)?juG`FwiK2NSZTdPWBBznpN5!D>Uf8LUrk3LajOJI%UJk#aICGEnd3CUBYSLLg*bv>PLR}Wcb}; zkGFBMUv|JrF3RQlCMR6N+_Dfc{>N$6uwwRQtN7EQ$`Nh7{3clvT3QrFIzQK#!--M}GHVS#I))sn>@U$4{Zl8@3b%kfv+KLm2aOjZ(NT z5Bd868y{7tC()IA4G)-K9J92Gxv$@`h=CqkZ5EOK)hNNMg)+3bTATu!fRymopCf^8 z_8Nmz)wW7w0Ptbgu~#$WE-sFt#RqSq#WKsZokcD!=9>T-5HT}yJZijRWI#W~Rw66# zFkXqGwT5K%7C?q3&?3-;T?}K?NgOTJuGb4oj(WiN)MGAAST|QNYl)bmx8UQaJi|RYT8Uz zmKiT5kcV1|V~fq6mPMVB z$yr0^H6=-~q8beg-^k03>u5^B36TkAWrwA>0gybc1x>qsN3G}4%l9>p-~y8@y5JA~ zOj~vKtpPhKda>|ntvO|nqb3x^BjiFbyIvHTk0j#y2-n#Nv>KN5z%$PGyKwIa=t_74 z-Mpgo>mX%pzNB~I=11_niEW#i5Gg`8K6leUC45>7m&Or&dhAra1qga92+wN{+r$}l zpBwpd5LI_N&z!RE^}xIEztr$_gY}Z;JTUo5)AO>8d~H?q?%!xO*v5*lFPMxS1^|&* zIrIshv8-HeSsEJ@o@9J=y1x;kbdFnk9)hZ}YMcZP8RqkR#aw@js09woL45E@x_>Xj z|4nat6$#Y(VU`MnWm4badr$@7zu0R?o9>SuEC_3K9dwZp{*HknqW2B@OL?)lXy#av zFUygmWFm}Dj|#zo5!XNeC!x|R`QK#Ph+HZVad`T2RVjoV<7}~S(utfx&O*AN!0dWa%1X|88ux`Sivx&(fPqfdQ4JDE zk#8Ddj`GWfP0}Skt(}qQtIGztKW3{}gB~?*w!Yp*#}SAE1#0hB(8rLWVj>sd)XOE#mUZbT^Fo2tM8pk=t(oIM z%K2nhb*MM)wV=Qtf8U53#-Q`xz=IZ6g#y#iq>XM|KdA~}rH|bYpSR3zN%FEjwVh%9 zmJ1+!mIucA8N=C4kb9EYER~9)Kk798i@B2}j!f`F&;|T2hGO%|$iU7NjU$U>Vo zBsS_`in4l0JK{w>*~`$xInwZKXYQH$(QVU%(kdf*Z64VEW_aWNjPXky7Jjh#KTF&# zR5F5W3FlMaB$y;idRuld%9C&*FB&_1BO(hgSEez3gF)3Ko0qA#XTaRL*-ydaTsz9E zpM5STGB?(#XoSJFEq11kiemsE9Sx7$N0Dk)JLeuw&^K=V1U<@Le1u_8Yzg>4!W5Re z$fz+OtP`$R2G(8w_3N019v_?JOk)NEBhwTverCdW5(0pQ#wZ?_X2#xLrqIBN+8Hth zCb6ga7o9a1m;9SlOH+1dvz|&Skj{bq>QLvz9QVctdsK`X`zroOiJWc;PEA3M>62P41zI?p}-=+MNP?Wp~Svg!c^Y~x8GPiAIHbDwL(Ztd;WgHR}L zDViUk{f8SIGFd&;1~An+AA1B34B~uj_;k`eN282$?5QdRGhmV=!ZK{8@r5(>FO~=PIeR}_zl#M|HWsH08Kxz{yas0 zTnX`b%?GjhDPi2GkfhOE)1lRdh`bugyO+f)A=TIp4d+M18&suhnJGRYn7c-T0vQ_E z8%T#xk37@9avj$DMpM*Ei5=U*{coj?-)XV8q!4nv{qF0W+r3Tzo3E^h3qhf0e zcAY3D>lF1gZ;5S<7aW0h_oR%vr5Xd0`We3RL$YRSP^5bc$QbK0Y%Xgu5RNeA1|;8IniS@iUh{$f`Ygbd56|Z+<4J znx+WM&fdT{#8`?;*Rc#qU+>HaCunS<@91HduDRJilGSUklTR{>t;Q`uXqJ&;8Uy@^ zTg5f(fwd&T);$XRdW;WJFFM6c9pqX{?2F6?2Vq7HV~0^bdiq ze;DgDR9f~8AMnL$GqIE&)5M!l2PG z34Hk1{~*=mKxMHs+TuA|axmu#)@&?rkxn6_75$oBd;cp|hMLs5H)pq}WN$qN`n|uI z1E1)X6(6D=8fIQWA|Ax0iUq+CuB%>clO1~0Zl_!s&%G)%-H!D9%otlS!#)mS5wF*0 zM5z_OTFQ|BnOhew@D>f@c_;O+aa;}^n0HRN7bdvUvut`8z0nC1UIO3$d(uvUCK8X+4!OBP7oN%R;gWA8G#*{8)p zs%9SJ&JeU0W;~OaQ&}WSTB^r{VUUY~AZ^Rv%;x4mCL^Nth+=~P;mwU5)&FpyBUxV> zYgwfsf(e3KpnwbmVL6a}lM9iia@M&xh2dqY?Bnh1utJdwgxJC`D>EZb>fB#CR_5-Q zz1^{KQNL4z7ijOYfxc>$HC_{`sOuLl_PYA_FWOL7LJKbG`*n?M?A?;{HSb-XS4Qt> zF?H7gkrQOXNaYekbwgQwnnDF@RVe3eT5+^_t69XESztpi6x}{D>Oa`=c)^{%{1ga? z7w5YT8@DzB5TQ|nc5m#ziPJFib#AD{c7Y0!mGUM#bC(y2{gW$VHLTPZfdakEff24u z)$0@Qh@0~|9+0pqcpW$AmsyUgAE@%K2sh#s*WdvVZ?Iy)r;?$XSCu%7%g%aD@g+n! zo1#bVzk~T4p$j~(x6ObSU|DGBDVg8-N-Xrp#{s_XP9J`kl^Ywr9Kt!~q5*~Z@VK)7l zo`{><&r_9oV!Cy5(W!dT-n!xEeXLzj8Ao@zaIEruh!Pos8Th{iSva6Xu@&qk*?#^= z^ZV)nW3BNTHu7Qf3eLeg-X2fRL_y2XZcAd9R}ox1i=bxi#Z84Ggy z>g$^7@-ATpsj-Q>r(v!Ajlb?OU*1A28<$MuKPw$m$=6?lgD4SWLY2p&6&ynLa!w6~ z{zI32KXg!YEKZm$c<7C_Z6-x8081eX_GY~zLzncY+8OCV{nxvP{FFi$AN5R5{#ZBF zyq~9vMM9jjha!-s;P78xKKx1(818LTa4++p`D9la^JMNe-VyVFsnjzgJ%mpQ?>|0a zWbgxo(Ib8*CK)3_Vf@Fa`~;}*x%`Nq;z`NW0H3GWK^||LhQ9>X>$3(eCWU5Ruh8h9 z{+xP^{YN)F-amJ6ySGBJf&ZU9RI#OCV)Av4_iKaZRnLu%29w{_q%H2vBSMdcJ`p!l zCZEdFwDJxW2l3zXF9SaJ*~9#~gdRJJOJw?g+30!)C&(otbZ*;7m#B;^1v}2m8K=iGlD78odh4 zo)u-MC)sDPr0rH|gyD8cN0$3~Pa2iqLs5Mu){*cjTh+~=+-p2La<@{f{uqR_zBbK( ztD`;O#QI8kdtPz;M*q_uobW1T4&gwyaK9cm@A1&wWTff@Culeo{VWS5oT$osnLU^6#Z(=N;xRK z!zSN^$EjUmj^v3waNVnAEG)1j2o-9+pmo?jt9c8d%;!Hg>4Z6j90o`BB;biq((w{aVq&tyEM_W5aAa96n8`P8iCm4cCQdG*Z1S%IfC28v~O;23=YxSmv_wmlFu|R@Woso z>4-2;Pwf9@fKQVH#bE2GZZ6WpM*8-D=?SU>^H0JXGb)&_ZM*8{Aw5b?6@rzZ9XWPk?5&lD_z7OUYzGV>^kd)hf2a zJWD*SzlBSh6d^96NDY-8F1@xpWY>#HqLWF{JYCw(LTCMCylhSd(JzwbU2eAh3XjOn z*wPWwcMdw>Rr=|s{NQwM{QO{}cSbhC39H5MSO*-u5ntIvdSEgV&MT|qm#RO5zTCg1 zT(LOTb7_AmMiD0j&zukXHW^0zWZjG4%$FrusEWUMmWr>dSSd$tCR>GGn}UxQTK6k( zGNJ6k9t$3Kh`F(-{YRVyWOx`1SrT;^J;~^gSD+q%-Fdr#+s)q_Ga~RdpT0 zDTkW2yhB0^kf2k;>KT^y2}XS#bH`KzkG=5+cn6l_+(l~f2b2zGo~ujHptLX3Ft%$i zSMKCXSU=PHSV8O)ubLmkitWiDT8a#PZ6DeTa6gt2rSOy2CrRr3aD%d4S9|Z$4p!fN zz9b}~vG|3Xv$ewQ%No91P3e+&A`o-is%1*HA&>+lo;Ua>`fmIEGx9Jxd4L`tmnj?f z!FyMOdq>K5Yp1Ua>)c@lHzxBFH^*a5Noi%ln9VBtP8Bjg!-=7u8m{+B|3g~|pyq-^ zKXVq%|1Crx=JVy!qsH|rOi^9L_@k-hzk8J49+5i^sg6+}4LDV`*Gg6UX+$4f-y87) zTbejs&QQ{7HNJPiMvru@19_i@`6JNK$`~tUU4Uhr?_Xyf$5gKcoCjZO>)`OgB8C@8 zj3F>`Ei@Ewc(f`>t2%s&nuu_ROd}*ewq&+B&Cu7;G?Ng7x;dyzCKw>*Ga7o#)>7YK_O}gl zQeBz2Tw#$j_CggQ!{>8<+;q5Dat!?L0ioeO4O|&qr^ zv~(3!7h|c1Aq*3lAST!ppBe6E-Di-`u*+(=lt%B3Ku!OR3{qG|$^(5<@^8C`CBCty zFB@L`(x*0TC~B$ahKnZn<}E^YeiiR`B2+J*BtfOVz^4ev;Z*-)EpSP6B2`g>4!I3h zGNHGs^-gKe0jcC@EFoPQrI&SCE2>tJbif=-b9?&=Q;8SQbN5vXr- z@F8hIQysI2Eo=6NfM-V>V7SKmqVP}%cByrnLNN(%76m!Rb<_Vsv337-$k9bi$Wb_j zP<1lvJ5DC7T7q##)o3RELf2NJa;!3u6fX@P)xW?9>N={&jve+^0hD@iU^7~6oP+jft571oG&CJZg zGB;*Ycxk$UKKaTlHGJfo-O11w$_qM28LL*d-***K@-EARnfmHqsddyG+bb9cB!WXj z@uepUj!05ACp6Q^ED;q+sDfv)=-HG}XJFppzc_^KHK zJ+|J*-5VAUzk=HF578*V>iDmLoJkRB4Lu4+k{A<|{A#G$-dI%L`;lx-Mtk^EUGo}f zkD{wSz<$$Pp*T96jW+5}a$~X45{651nNEYC;Lz5ofWUG*mOD;W5E!!rz0;TfnnXYV zhjVI*vqoP{L%rKBLsL0MJ_wrhJk0qv%vIX9gpINpBJ;a8xNBu9gZqwjyd^V-w11)f z--cLu?*OHJHRg76GoRu)6){PUL7=DAEvKYLREArknDW`m^(Qc7NK0OoK$?-J3U3*L zAwCW1m0zS3 zj7&&0@6iF}k7|)gla5{8uS)!E?*LM$gO>L2`*MM^B@}aPsVF4 z!aJjT7(gur>!kH*47R4yMZl+&(A^-egyJkj%guN?so*e2ZZ4`Tv$M{|&n9AbGGT$Y zSiiNeXdjrDzXm1pXR|iLu(jZ}WzhLCpM;deGA4&cY~#I$%k=gREHD(<{jfq}%&F_o zRasZ5B)LseRpm&#xuC9V!kJq@sAHqjyx^ zP}U=a?1BYJcy2ws0OOpTfE)uNyM920E*o80zg+FO$#muNb7{s_2hCSAW8*@L{C+2m z$^I|(h}?o~tOP|(e~7y?kRDK~n(n`e6%0sahRu$A^SPMMpQSn)upv@ zq~z|{+VMK^Tkxx}t6*E&ZCSG|-`>0sRM4Xsi{*ADfYSrp!x3Bgm9*Z%=FZ>ms|7~9 zn0@*gP0B5QSQar9Qn>HV=&6|K=pf4=W1AV3Wpw5k#4-_PW*edGBKvro+3VwT%`S4Y z&SE4csH(G#m6IE2X)>Z>v@$vGM8pL&l!eE}Uaaz~_r(B4>0N9+vT^!rZ1&9K<#oBq zT>UBH(-XRMITH^K7iFg=_fNmWrCwGC|AW*`4@Wj8twmAEFR5VL?c1}ct94ZuR^gp z5-l8ZwG~ut>|@J1(pu_^gDWe82ibuEZdT4t>%vL++l-i;sJ1@`?7kpMhz}#FWGf|G zSaz*0eT&&C3`|TsfVJx|p6fqww9UU4%wwL`<^0LQ!pa%nIXYBA`$I|8l%a<0*{V}D z>QXu!l#!ZFxW+5vc)%qq6zZyB1 z8C9^eCiGFAWLD8=(2x+uq@VD?N*D#<-Z)|@LT$G((}_>BdnRHd-9HIxITWkVYGtU@$OUm~N=iyb^l&ybdcSu}=s(}T(CCozT-_c*b+qU8uZYR*eLDpU?i(4arDed9J~fs> zdW$n!RS(P`I6_p(4dZX$(pD^o1(Fmosjiw#B)!<%>PE%HZW|^fU93%6_|j|`?>OW5 z#w@lPLD~D2U?Jr2HLnGmhOe$c;(?zX%zt|`HnH=MIM_KHSxMdn({iwyD!~Oe$k~ zsL0n?rOdO*M>NbwU&SbkyCNpF0A@|Fq{hv*U$qJJ2in4X%S=x+w)!HB*_7jq?Y!S; zA{h)FC&S*^wrQ)#i|UVmN#}x**0^myn{XcieWg)}Y76Z~O=KG^<0qVaieto*!-yV~ z6l9sYbS(lu4v+9Qo@ao(>goFw?UyyoJ#}6WI$o(HyFzvbEFFo5Klftt?40je9HqHd zRO?%sCk@j6ROB$NC*yHEM9WW3+OcYLC7nxOgO?I^9_Zi%(>>5qD)9{+^|<{!;mGqD z_jhnq)%7%RYDV`{4uQ0L=Ol^RsyLPtPU{^mfsI>!g!JrD--MzQtlEnS4dcS*cBcOx znC{I&sIsYB|AuwiMmh@fFa=|k+}*=E|R^qiOSAu0fki!<~3YYwwCZ)*F&%IZpW?axF|SQ zSba9;oECb5-aAtXD`KQf*GXt*t)Fm@y&m^Qo-|3<>LC^ZAkaxf#}H*RtUlu+=ELMU zM?R88sCgOd^VfIFr%j!=ZTLE#&ZwK@x05$wtAMzX>(> z1#nu#l=hYtIO#(C^&Gg?-oJ%-k;SrX{>m=!bnY8?ZEZ9mch%U(bXV!ENN#D;!3*K= zWzGD2psURIdtn<5<~dUdC(R;blx^bZz7O&^A|mBn4v6soF?CtQuJJ<6Q*j_iS>Rsm zQ-AXlxQcxVbiFw9dw+0gEQcUN_4rVAEW4|U71~ioM`P+oRT(Ksp7HJb)m_ggQaB8B zApLOtlilLl{k{uNzFBK2s-`Tq5B6n=uM6YJc9G^IBEr85@+`*l^j0m@%^WyQD@UkA zotF6)rzX%mb9W*0oq_F{F91=X28ak0myLT<`u(b;HWzn>-Gm`f=M*=F;9}~TDGyJ1 zVW1*?I=44Dh*8}(d-FUbmg7+2A=%u3#p;2O#Gs#@b{U}*@8-bT5UVh=?^Z@`iK5ty z=)!dq=GHTPrX|S7-8BpCYybIIri$_jEJF0>6KwMLngb$gex*)p<<|s0{xN!Uw_C?G zcayC}CHI4T2KqSU51b8i%JDbln%b1JUovU^-YX92Tk;m-kL2&AAT)`TDO8oQhgTu| z_}cja`0}#Rxb%-x9Kaa+no}!d=L79&AVwL49XU}!tU&l$8+Mbx;)q&*g--tuPsnI< zNhHnSWk6L~FY!04<#1sEu|Tj(H4Ll`vV6eJ^6JoN|GoT`jx10umx?FDjYStV6ko%3h48^6NL1 z)BI+zk2xS0*h^+>jvCGJ&Ihh`@NmLPZfuCYO5UrTKY5X>14b^$9WsCh^C;wcY2rtK zRW+<1%Fd}BnCLypQ(5!vmU?mpxj@RqX`A2Ho`}%{(8SfZYeWSNrHI?xF|q_qRgBmT zs(#&7RwkGPD)^OeM=k2ot(a@#a?L^2E3B#j!bm}fS$#>}*WqSvSUn&M=?-;DU)cJ; z>5rG4YA5Lv=1YN8dxs_t&aMGw3pzKA3S)Ca^XNMFkFa&g_e|ZLnYCj_x8$_aykCJP z(9oDVQ8~NO87Vnops$p6Mt#`Ie8B~g^s?&~CINH$c)2#Yl+0xOd@Y^6u8nQXA~#*+ zQ-S4(l=F;9BIcso8$Wk;WbUV!WJ~%n9|mgG0EFx6_8hl~jb;mM6?F6SQLDS#8oaJO~)WmD_dU~}0S{2-D!;W(g;yjgGr9XgL1S?5*GlY>*-<8Mq-Ix#}iM2CW zH0)s{Ud0>{DWis-c8B?bg185hBvfT(8JZTF#P2`u!pMvhP4oz}k4C!NDr@UJv2njT z9S(j1zd4}`9qqo54Q0vD^Y&DO1@->I=1mf_DfIv-}G zy04P2!XSonaSn!Yw<{~){(+^g>0johnUuNO>{(ElXKHexzBr+&Wp1M(J&e*VFbqn6 zIM36Oq$8!AWF0RSG3E;Czg2^yW9*y2Y-|V*4~VbZYg%_heQPM!A?m0nWhU*Ss;Vxs zwk@S#@O*%h0T4FW4((Dy(J;MwZx-d+C$@d%;1ywzQfVJ`Q`1&POU()o@9L2DL^pHv zxyCmu7aY^lN_{}8sn_95n$}$-1lVeIDa|UgEw?cK)h}RXDMp~9o{s1&8I+5P5(z+B zj{Ujq{S_EqxwWzuwk0r9V)X+df{PVVN`}F@gNJDn;d{H-Wkxfz=>;5J zA~*jIWvRnThbP4$tf8Slk?upI7$&B?x-^vG(jKu9-K4cj)`~5qJkJ!+wt#4O0aG6h zFJiuL0_u#*!pjg@8b)@$I|`Xo`y$OrXFeu?N0+L;@b!;nl%%~J?~yOM6dI4(oF%+6UXKCIfsGzp zW^Fv594(CEs31`vo9e>m>x*;S$H*UWAPbFr#`P+%?b6(m5v@dfEE5KtD|Zr}!9Zj~ z^`y_>4|sHUSKV~#s0|aXx`Y`&8T?w$#>=gb$zX+(u-R6|hA^2W+#bL?fO2Go-Te&@ z2D&!`0+q`@w^;~bI$-BWo`O2W=!+WasC@4FaJX%wh-sbck6gg~S+bHby$iehJWE}0 zgpJW^J+_qgZ^i)vC^Z@;+bivVTFq!M z&|~9nabw|Lk6nA}1x2+Lf@3E-BHNZj$C9&z!9*EwV}^164|!i16-T#r8Jr*?Sa1o@ zxNC3?8r*^hhv4pR!QI`xad&rjXxtkM?lAq%z4x2-&97N&{>)m_e|l9{S5?>PQ|CPU zdG_8%`s&pwbpQ&pemaiJaPuP;p2kf5dKhP8(O39TSS}an+ublsufkL1KV!qoCS!7> z#KfpBAt{9Rz_W>yoZHxHpqDl8bq$bBP{wM6wVejFLPJDHX>M_-mooJOeM}4HFa@7a zU`+%rHX=M6UWgy5f&F@EZsQgi-x4hByn*4Fab+*e^69mmTaU^WHyq-J=XQ#{Mb$znReivol4p<|C9$`bU=kIgx)17$4 zb8CXR%8$O~16z`R9q`kL`7buq<-mZ>_z2PP^}s0j%GScaJUi1vQd;&fptJFDT_c02 zZyq-7n}*v^vOz49&etxek~m1!t@q=9dke*Z6m=KPM6JF9mz?6kAtB2yQiA5)LBSqj zL{+~BRpV*28gGS3V-B-$){-f15*{}^jw8Ip^$szytFQ;h*-JTQ_^R=FSq0E~MPD1f zV)$@dW`h<49wnG;L`Y+(kW@y742=K$B!V@X;VEo041*|Uq22u4>{R09ikT*4Bcqk3 zH@QVJGtza>P1Q#h7F1(?{bB8w7Al-z`0C*!JopHK?acVHsTn#D%^yr?@?r5zzi5K~ z>fQ_f^-@93adNTknK`iO?W#^+K}vtKe;(_js#M#R0no})qU|c6_Yimo#2v$iv zBBJy(EqL>8Kv8i~56uU+KaI`J^|iIN%xpDwb(om(*92WCR>n};5J{>+a8XK&Ns+0# znp$#lvTzMMt(9d04`)KEc$49d!!xvv6;zCj*76IDXh)Mlux)61!ZP~a(#_fWGw_FkL?3A;%X-il zvp8ng^&~b_NB>}CXGd^3$_$Rzbz;}+txZ+O-4n4j`Fb;Sl632e6tecK-9?tX51-vc z$TV*+Xq--r)0a|oT@&zTpDVIxDIptudE)0HA+*`w^F zq}DwzbQ*l6p<^|bcPbrCF0z_>-tSIZ^3DkwF2|;aSD-YPqR!o(=a{;7ov)L4X{`-0 z)xYtuucrTgS&?N>%yPiFxEc{ph`7PQ^K?6Zb`iRBLHkQw3xt*)`o&(nl7fFJ&HbHQ z=Y6LS?f!gQ(f(4tw4!nU?KJ;hXfzv6w$foJrnr?g!Q46W-ES6ZtGJb!L=F?iox{z&Ldag(uh_h{T6oakvtG(|+s zKJ(VT5Lrtexfc25VRSI?f%qq8d6&Rv=d|fZyrc~b)YO&)nwdKN$*pTYrGBSAnidol z6|SEAd;%b_*Su(rx$?CUekm~CTi)g~ymf1Y$nhOJ=R zog=83Px6#kg@F>5T1!Ysn7<+AccO7~I~(qu3EFR1bd?oA{U~d7Kfm{I^yNX@Ft3yJA_PHx zv{hmNP`oU&-ZtTNl-3?>p`@f_Ulve5%`hVKJ2X>f*J8rjUh^PLZDR}G!QMU{{>$O$ z`ifeD}K08Xx^NU<8aUEajOC5VS zvlWeP_k;h`dueieN2wmT0;A_A#x^q!)Hzr=Ia$64`bbR*lSkdE-+flAQT+-p(iW{< zUsggXKQS3cuyb19JcXCQa2LHaP_mxLM{cab8rht*8{~~-z^d-p7y1jUYcOY9>8!B9 zC{g?5FiFC|5g3lYES88?RXH&;XfZzE-AYl2<6l-VTTT+bX8gsOylX1Bldmgy3hmO4 zg;VWI+l0%Nj=c-pP8FUJDnwXxT-^Ic&?H3zoemRy$s(2x>*yCOkH_eY zkTH1go<}En>EqrV8=M|#jsQqn?y>%h_ zPe`#(;sQ?SW_A&2wO^`OV!j)_C8V5^0m%WU$_>5vYtBPv&*|$dqp7;Rt|KzvTEBBl z3)L=s=jrI)PRI$B!&Mkj)Q*^?JESMKz&CRwjSYvHP~}AGb+OLa<@Px}s_EO*Zn73r zRZ`xqH6itb+DqwNO!-w11>d6#*CS?#dMktPw;q07AmXFLjqRj^yh$;iEM|lS?e@t{ z*mGpT@7tVK+3094U>LLlpH3TkOcTYm(B?KwVP%JUV@g`VuL1Ox5g##b-h=#*TjnXdgTOm5;1hh9_}k@)B?{qpd* zBq&M2c;`&<4YUx0bv2p&z37&>o3@b^qz&Fpcjma3%v2BNQ9hLgdX{Ik{3+(NRFsk? zQ;;%;TFQfi7>>}hhnTzLgV>lde;$2O!RBy4EG1(CLeXfa$#4p|DTg1+)Rt2iwnt}J zxqzMAvO&aG;9nBD&Dcw*#Yx8@DkHuEi{)l{jI7$1ThA9hq*$E(cqxJ9Trr2SI1u`m z+lZ=X+NCOu6ip@8%@kU`WtkB|1No+^+UZ)n(3cPs+?&`@EIPxUxnLponSssy{r%AM zGNk-~rc7FU9_esCEZ9xKacoHn(k|L30b)(S+R&c8r`+(}HH`r^1aqW|$ES7~c`9Q+7PZV>6OtGq6 zibRPHW(VnSRX;PlfQ+-s5`fPVn~j~b8~4x?$Qur>c$jl=XO9`MwHnJ5{r6ZL0?ee9 zZR%IkhpYlDp3LWiF$62=Nc40_>;(O#feaIo9EHZIwwK?U7AQRW76^u~has~KVtIH@ zyhKXq=CaEtyo#&8M+jJ|ahyxdZ9}GJ40tqZE=(jlJFVkhw|rIA6%ESxQLU|wtHg(4 zFS!m`W68~o-X24Fp99kIGtI`NYd`b6O@zweFa;>DNr1}34RwsYwW~7VsS%#Al3wGa zcg*G>Jn*G;YNUwfg%>(Jr>xOgGE&EF_KSt`vdLyVFuhd{{k;0)VvX03o40+adx{lg@cEygS? z*tJvQ{68#3548w=4Qtd)7HBK5-~5x#!o@m^QR%9`8H9|(h!m>RMdNrsFFSNl3h5@l zPHzmnV*Ez=ZE--RuE2~q=Q5J7iQoR+PI+;|&FPC;ndsKPgI`opG2{P$ihwhrp`ArW zV_T!=ANP<`TViV(`A8fv+4h*$+JXuaptwF?iiTo`=4O$G*Q7?KYKW5?Lpwe+aN{@d zlgOgTrM5@}CRji6e!JdH*uZj7*HRAet~mVy`r)IM=k^QRB;}E25}Ix~2=@4TcQ-Sr z^UGG5q+*fv_8WJmqjqpt8^2O*Xf8iPAha{F70AWtBKVt_CuIJe-|wcRpoH- z!PiwrX3Q50t>&WtW&*R^gc2gLGw0MdwlZ>@b?|Pjq8uGv7@Qv;*<@fA;P~43+sw{0 zbyhba8#8l_)6eoR?9v%EW3%8g4^Q1}CIR>a325+J-*h)FBvo7U$j1L)51s@-&$AJ@ z@#3szGAMqP82E_}+=f$QGY+BNokAc>)KLXejpB>gbcY+~44BoZMmjn=R8#Z^VRIV`8p~bGc39qdP6D8CbhPrF z5;>jjKSfN{k)f-7Dd~>_x9?OOY>%t})b@Cg4Pk#MJL#J9>&Ml!who4QO+uj=nEx&S zbioS>rR#val_9Q3Zr*7>lXYS;W0R7SQk4^QJ-T<+sa}eOHzoKcw0#bT79BG zh`8ruH&~M*{qv=^HwCZXrE#HAv8ZSNXY5vMczB;xkkfhr%iSPcC{2e>B}e6HC`q)G zh=a1mm-66~y)Q`%=qAZYNgAQv1Y3+HDOXPipT@f>Ahf55OR|zZ@Q!8TKs0NS^CVol zkEc(=^3I@Vl|@jc9HK*tx*H9zF8s~&}4 zO-hGgK{#k>v$3n@%Yp4F7jhrCm$7`k@JAJtNqMG*BHZmD2KuL#!I z7iOod!@a+-T6NJE6fei{e<6s)o)PF<8E#>0cl4-9dy1ESn6ikW$L zUnqb3AdYrl$0?z8c9)11x5M94Zn53y))iwKiqo46yCG2=os?3Ora|eAidPL)8m2zu zFn>8(R67frLNd&0>eYK989JNws9{&z>+2H+$h=ex=<>SmPS$8;?ZbU*oN+bv1?Dch zY-Y7Tw)~+pISW#kVzwPD{MlBvnPfj&Nk(4_ze|T)9&d!<ym*zFnNV& zO?s8&t5{Ik7?EFDX#JK?K(=>$O;$pI+gKs1_AnX_E?XXmKbDNawa&A)*it|tj9*C1 z63HIU(?l_LH;9|gFe6UECjcLV%?$GLC&}BztZzew_P7Tdv2_m?u=d>}#M956v8D-TA zt5vZN3#5^`;$(v#NK5^0w1_cyjH%qmFp|^*32R1XdVrKgcay}&KY4N)>9~hKQq(oN zd<5bWrHT~z3kV7XFC;^vD?eGntIAQ48>Z=6k0m#uz)B^UU+( zU=|+T;ARGz@djyKb92UHdD9FS#>Zpqe|XNtfkT9aQQY<1R6KPpwWUQ+Fl-EV5;tb$ zvS5yT(nIAe#t|KwSh(!|+TKWC#d(~~JL}o!ac?Ne>IlIcZNUu2-B3Cw!uDXXS$#$s zWRhnRRMfNgpN_*h8}tvWWz*b+uH_1{_KrEr}@}3H+ ziX*)Mi+OlgkPKTGSX=x~-(Y3sZ{y(t>1G`C)yDrl^}o5Xbs3S_e1Cnt_NOh=g=?|W zqVifyqHHanHI^$IV#h9c4sl)nv#J&`*Rvm^)yI)w;wHZE%c7U>tYRX92s$2O1N9m0 zmvIRV2OS+}X-V1e5D1pNL)}wK_QESMn2-A(_*eu}Q8uW$ETY%fZVMIBRlEZ*K6{a! zLqLDlmE?GP3QN@y-cQRJ3RgA~R!SZ`MMwFSEqErLe0+Q$kVMyEQoIubZdT?_PTcG!$i9yg zS2xD-QmQ-!I;o>O1!&(|d~|+sZfO%)M&XpSsE1BaLFaV)qN;F}Xh^2H(ehnXOi8Bt zMzAwcaV9Y_5wqR#;p(_A`395U3YEhsuz8A@-(%)cePPf75&3pDP**@_E_Y)e0^RDC!=~j*Mw*YlEonb<~}2hQC5$10X%h zR$c=;EYKnIpwsO>DI@V|pG)qf^^1zNoORtl>U1)Qhfo^^JqjSOxuw~yxk{U#!BBl8 z9M6mqkrSuY6SkhRo0J)`J%U5t6VCEsyabEjF0LxuMp|BB@`jPb)>H2*(<;Xnz^e+$BYCdV0p3KBhFR8+t+2k2P& zZ!x|1vwZ|BViRV0L`f`9k&=9NNyr$3_&dfjRsHZWF5XL$YJ4LON;p=s(%Lt#xEGmX z4=nQ8AF4qHTu0Lk&M^vM_yXdP=+@s#&r)7H*84jOkHB_>|I zrGfyW-fY%9b=@w`jvo6H*jP0&gZmvm`CjVJY5^Cca!Cqv(7J~T;T5vq;H{e4PaXHe zg;(jfhBcMhxj{umw!-9N604Anz)6|aB?Wh>gy3Hs+!~K`2X4{qOx&WO3(IYXyGxtP z4JQmn=6^=CY&vec-n}2r>=tse3PXd)TsoDnpy72;6-)pTcHp$f5>dHBUWX2ml{`N7 zk8#Ti1bckDDn$a#xXdWMt4eTchJHjtfm_=j87)pGMbjl;=`U{7f8Q?ZmVoewyXI{9 z#^#)~T%SO2CT#6Li5#P!=RJziN&$Cs>Pf>RcLvaTc_uTiYBe!bli~Ssj!NQzO#vyt z#V)jMN`_UFW7tV`@1Ns@5E$aCbqv=I0o>&jxP_e08*3dN_duPtx91BcImA`|2x;i5 z>B;$x<(7&7kYdGEn%pn9kBtq?%h0ML+gU~)+sfImC#nZz7w3?O=4o>dfA*`}Yvosa zA3@lcTJSbtt4`rJjF=wJFZ>k+c^#OIAqAbSb)Sr;C>x8OC8HKx-DeT<)K-*sk(>_& zaa*=47pilI9)n=R`2^LL8&8i#HT9(>gLM-%@)aJrVeu|jzck9f5Teq!ezoDg)t#{iv zU_~A=&!=ZoQyZj2$Wsw)H#^OGE~gzyA=0&UXn)=IxM+VGoXp(vJ9EFD;CcsO5ypSU zFmZhzZZfrjM^PA@sg%l4u`dH~PpKXh=$LLEL6;CT2ry3G+@1U`{CS0?Fv5qXyi(O) zfnS8)i zUmcMAL0d~J{Sw@%rzyJG>zpWNJR^`_dSx6LvLE|k&*6J^oF^~keoJT9w1JFd4xztmrmzk85{VpE1vd>`kdX_MV zs6dw!V1-#8v7m47kuokrRk5SV@il-fbxE`vr`R5kYF@9eQ+ zM(D%{RrQ(n-&k_6;E#g~yUnhqHf)BO{daz1c;DBKj_hZ@tmJKL?zAs3mZc6+1Q!Nr zjBY9?vkIxs9!FHis!4L4QIdLjwxI1i9vPv*J5GeSbh4q4wpwiAiPM1U*lsr!qu?yg2Fs!6_ZqM& zNyGsXho-j2lUbwM+WsOT1*{hC#W+Vg1hm|&8M`!g@+sgF;qGMSRm}cX0Q_n&ECuj*me6d6>+CckSo_d^wU16nskpm*GF0#17}c!)MUs0` zmlkAdoVlBJ7~@CrOW(k*qQ&o<-Z`MSUZ`oemBGRvVm#MHHk8;-bRg7r;ynvh zWzrlw`bAGwYRh#p9=bqKfXOr|MPgZisF|IERTFIZ^&$U{)K4>=XQomLuWHg>xz{}? z0b@f3io!1)_pnZUR?u^CJMAFH0fCnj^geb=4+rmr@a<5ovTi%c zAGQiRZ8S8G3J@ZN!9Dh1S~%guWr1t&=g>x!N$ZlmY3QP99pZ$+V!W8NtKm+gXI#AW zGvgtzt41kLTNP>dl=RHp)OuI5*V9!L!#3&JVjhc~OgKiJPERRjX0$r53*u6Wv8BJ% zO>w4{N|t%$i<>)s)h7rP#u1Jkv+;TUWDLOf zn*&8|2++I-sDDu_Iw9+q`}mQzY&AH*L&R$YN(8O55E?cxWp6;qb})knIKP|=I0L{v*i?cp3LI6>2i=xdoQaF>M&jHCd|~`aulAO z;Yjb$n^|%nGthRDBVSYK{`t|d8t6Z+V7vs)Q|tV3aDnDZx|N58s{jubvxWmdYxO|7qATb*-`#N#NUGaR|fF@Yqpjq6-EZ>4bH0e z>)txry+8iDqXvj26|o+sSxdHbkg^EFxq>u)8%*spa_>T0puW`@{VD_q9S~l`*@W6Z zQgbQdbAcDBYnPdJ-IaG^EukGh;gFI$%I!kbwea0=lT946r5!gs|tS| z@(9c~U@6HAENqZd+Q*W+)1PSr-oj1QVd8flnmv1Mt9ZIx5u_})E+y21r{^_In{J0^ z9c}knifAPwg&CcE@>SJcF1Lu(Z{eaLj~Qndr>#Z@stR74#9Fqwg(H@0eR)xS1Gg%B zm32tE0(-8!GvR`)HsEzgriy_m5f^-1ZifvUi`?Nb#R`O@#zEbTseHQYoZ57Yo&vF( zEAO+!;ybJTcBjEoOBtDEZd^*gXcpGCv?9i}lj(BOR*Sv3o)Sbb&iXuiTLQxYMX3lQ z4!ZaL=5T%PwzukWr_J?8y0==|mk(8!IuW+9jZcuDhqdui7`K}CGq)T;c6z3shK7!| zHX*?}UwDPKJj&MyS-GhyU-XsH-tpmK#2^toJiJ0BbJ9!bza?t1Q^S;l!9p)bN4SwZ z0&M)q(lE!uBWs;tDD{l&bcD+sALw}ap2C5`)MGr`@9e|gU*@g!O$=PkQd+=5Pzxy# zK8CKYIFL758>is#vyrMRZt368#;yjQ7>NX*(SYB$S%QwPTB|=KMkqh3@R>k!wd%wR z)gU7y#~Vs=OcP|MrHR|v+8bbWXvCOk**e)dTUw$RK~2FHAT*?9YyI-Uq9(BWTp2(J33?3X6+-WC zc!)$g0m2V5F5TNBXN7tc)#reLECV$9Ltb96NP1G}P2uOn2Z(Z=HM%NJ`G1{cx17Ra z3*j-~*T23EDW&NC`#`?Ve?-&6+5e$wHM?K8|NAn2o&Vb+7JIRHgoOQ~SysbFtmO^F zViJN3Mf$kJ{0Vl8nA?adQp4nP)6+2-85!_yYEYHR%F2DeD-pIerB`wT{3JYg5l=#G zVIjr(SSVTz1%+;VP0}f1005u>AUW`*{phCoA(5VzmP|NHb#!!;SP6hS>kcFH{AL;A zNk|Mi>KIa}!8_bmWv$HW9=$g0ttvqK&!-4w6s8c-ch)~jUb`G=`+pb#rI0lQ@cwHD z#7t2uytnd4&}8jr&bm-)Yw`v|O-#baME+i+u-2c)q|yBs#c>_Y;Cj+F52~q5UIhHV z^}fMT5}L@dVidKLg4llmmq6#cGR9b0iWfs2#DA`E4GURKg{r|gkQaPJH%d!WQaioa zgepB!Vq;l#ov`Ah-N(aHn3za-CHW#iyRxa7wr62pLRMN(62X~MRFstJA!dNRU0P-& zNV6a#tOPE|69tq$*OZ|_%uMDVCumoeLdq*YwNp9m*EY9GNaE2Y%_k|TXlH1`t6nu- z)vLxyQrz7;aRr{3huI?kA#mM~M}!r_dFDa3khagemg+C&jtYS^>!*iGTB+01ifB&$ zPOVik`U-#Sp+U7oiaYebI+dums7{EH6O}~#6eh_OTQx*yvg6CGtx1#T=eiUu=u)8W zAE5bp|6?dSvr`eyiv8GMVd*XpXK)*5fx8jBYNbSc8x;>N~2XmwRdZ`1D> z;26Lx8KR)K6x_4@9K!`m+@gR}R9;!wf=<)Y(vcoG)Y!m5o?K>Q`Frr@wgz~U!e^Cu z3WI%0XWxDspHajeGmPMWVrgXwdykN1C#pg*>U#z**DQW<{gB4BQ3DU5bYa>_quG8NZasu)@`8J3>rhq8UX zr(`(0f9W3Q+^>?y}_D)L)RhOtXh0xv$yTx$po{k6E$vy{eMT~`q*R~#HD0)kb~XaZ0&tj$X=>9{IxpVF zKF{szWTqbBH!7T!^lb|JlX+9p?dMIBHZwhql`vD?V-~knNRM3?FRT9Yq$oK+L0^8@ zz!@B)?%t)8!S#;Bp_o6>%}9&;|LeeQh6&v<%SZfGNRa^-XFg3_eR zJ9CP@0Cjk9eRI<6oh45e>Ni9f)yAHDzj*{UIiJ6shri+rpDj0fLu@0m+`P-B4Mx+H zA|_u-jxp4cjCKWFY#S_)lK-O0KWHFFPG%1?4&zxC^W47S)Z^*jNvLOW}rtZza$uL(1ka*~?hb4lf_R znxAfUy-U-~DOb;l&a5APjDPNIvrybv3XZPZ<#*Vp0;Y=#_k49r)LD;QNag;R<819M zFsk0!m2aAzu%w}p_RH~^smjMiSGZ?NxotU~E5*VsYPCVrtY%ys1||mX(UE1L;{lBK*!0fT-4&K;;mP~! zUm0{6Wr?m24sMU>OM(KX@v94S3rmRvzYHiGc9X&?v$F+fb5;NxM3qDfmufh!D)q8w zpck(UEA5+t3s?0ooRkoU8@>}hhzBkw-*r%}sG}VNT^JE(V#S24i~6DWYoN1%GPmu6 zZNvB6FZLmwYA97qKb$xevAI2U<~Z_E=lV|Rn%jTK7hW@Y*@BDeQ~b-ya4#~~mOAH0 zE6gSM-T zWbU_qC9BM%rt!RZN<}M(H;^&>hc)N~>GjS_jYcc$-tYcVrkb47ooCghM&{Cak%O0+ zvsn#ik>d`sEj`|OHh-Syjc^LZSIaiqzEbEPobBWIKEy4Uk2voLzP_$sL}z`AvSw)g z+GCMCw>$!j6S(q_FHIkyAOmWW5G!Mnb*hidjx`~c6tqnHM4fzJO8TH-IVR~c%Xd=? z5tb|Svzf{$I(DzWgRW_%#*m!YI6474FoXBwigwO{ezpBY(n!PW%$MTz*@)~N{c~b6 zDK76TbEa}6Z{SKVGRhKZ&5v)dIo4+1zvdMt8iy|W`|y?!DCu^iBvGv)zMc8XDd4d^ z{4;7(-28&jN^2z^R8U@&G@Hte^z=wd>p16hb*?z4{Me|XiTR%%PXwu34#{Ybf#kLK zWl|>cY{7`|Tjs>Aq-Gg2I$AsVOr%V%1FWIGKfdS1tc{(JseXDt?DG;l6LbdinN5X* zJP&V_>&o;0)53ApDF;~US^Ne(z;g|qlt`LyB3#7L7lV+32i|9aTV5EOk?B7_slb0PD3GPtn?y(pZ06NDmX$*HM>^o^3qkf8xxj)OgmPM#b0GJS*?|_eiZ=J0lMo9J&*?;Wv zFrO&L3y}yT8}MqvUr(IBPykK7#L6F;F^12+KKjP`d_qX9ph4rrOu}q7`5fGnKeqp& zNIEUUHFfD5X%lQy>40q{!4=`(bV%sX&tV92p2hoj%ER*G>_PqwK^ptr>QQ7rItMGv-N%fPZwp4))^^%QTesKdC)JXH=iyiX)c-? z3?0)Icm*l6$BwqC^_qGqa~O=ZRIAbFb1R+b`Swmo2trR6G2MDwl_`|P=7+f!n|_w- za}de2;qFA3x}4PpSGdZFB4LFf!ym$nNup7!<^)_R zR9cw7y4-8Tr|7Ayj?$8oM5X1)PWOQ0iZFTR&H=BZ7jxz?0lRJ5?2Ix8VZ5TIV*38R zzr@3i2lFlDdVhyo0Tc}lPHI#X_?vv!eV3Ra@?YTue)XR*bh&Ic)M+PM>+*Vlk6Ly& zuZP8h51U+KAi`ddy;j>u?GCW!jjRwZ4hxxjO~FP14Q?5e6>hGFkX&-)G$IX(3jZ%tlwFfr><<+$K$-=EB_RV`%C#A46D`dZQ5IsD>G8yvo z7m&gzx5eBv-U_Vf>ZTq=iItb7@tn|rl3K6h^CSpr0u&PW39$CFd$GQ4X*nefxVz$( zm;ELvS%Y(5;~q3gRx?=BDrfWOAjFheOGCf4wke-PoV8s>Su}z#<)uif=j87z=Sp{6 zOaeTmm6ztri!RKs(*XhCLETgaH-K2_9vuQD`=^&-qxe2Wqp!mL3ncy@uAaDa zscMgO74jdzO8fX9?CR#32+RG|hqS`P7vkE7H@%)CEs$KD1_iMRGZu33_>o8$@{;@S zZBAAD2Xwrk|JoLEfjHcs&^?9(qx=`Xj);t`QL#Tm&lUX-!WN)UG_qoLGduX|L;bI- zqz>tIc*$UVK_L69!QvoPcT^34@CvEWmD2s~l{`R)-{KPDz7IXSsk zhgZT(=%pRSZ%T63J*( zzjS=U0)^80nHfb-G;dc|*mggS@Ixtf~fiI!ZrG|_olxB69ona|TW_+BUtULt!(LgBkv;>kNd%S8iL`Rni_My6xpLlT9 zvyllrCh<9P>@c4I(8aB6+{r0vZ!|1z@!MUVRSb zIe7U7%p1>3Gts_~GI?$`U2F3vIk*@86_m7){9-X_D9&wTAynp*m?mFI69{MR(?dg+;cw2bh&G9c9mp2Fn7^@z8S|lnd9QX_JS0>N~n6t zOZHSG=lKq8c*F}Y%#qpJ9Gtad<`<;XU0(D8u`~qQBa%joiG(?(u!MU|peC$(y zq^0HOVwY6Ac>$%PTcf+vAASMWg^Y+wfHby`2|HJxh$)22@`FVl^F~g zEGj3KdXDg(jZj=oB3$Ygt-1N}<1MOjsGDpi?2aw6g4E>_lNMEiKNb8WW$__aBkI?) zhEJL*hEm4H-;J%T7@Dmuf6z12qUhsd@$#(dBxS@?PT$TAwYlfZ3u3DDxpgI-)Kn=ojifZaHJA*Nn~H=R zFGd@#EFX&L2^t)9|2-=M{(S<;6$%mU?Ci*_!84ytIDH?!hU&>!wI*|eoxjCFjpG5W z#i5%s+C5e2ZOquaNL7@d;D116pW9SRNDXYHZ1zfOsfDucDz7c0XR9hHp{DG_0(~>C zM_W_y=Y&*AyuEn6fBExpPS3^RM2a8m@2hhysfeAdzwLELu1PD++*x1Om^YLYiP+Fwj`laFdFpKk`(KowCIO9-R>I~^8Y~|eX!C2!+enTNPVYWm z6`9O$my%w?9@+6v>=QTv&CZF6{Bx-ca7(->izTQETqQd_u~bJwYjSh54l;~lzAWjV<>zw?XIwjsczL2ue| zJ&rD1&qqEP1k>&Ei`|zEHtc#(j$ua3?|&L?;h6g~Z|R{6)e@g9Mqz!n+F)^LQRV42 zH%p6$Ks@(A9i(kpJnHnfF0)Nw^S;m6E1=vaYr0-`a%j%?aVM_9wd>`ygTKxB9P~Kw zHn-E`bq4#pu*tWfrB-o}+AOJb+bEfU?8=1!Iz5F!@vzk5#0EQIPIs@^?V(|6WBqnf z%O(>;!G(U~=10x3Tu+)rP@jaK?s!BJVC{FP7nO--ZUt(ueq!gL9YG4P2?&ZqN)!Pdp5<8rf{@>uG&FQ>{NjPLvVQ)XDiQ79(WhUfJJ zn!w`~Z)RAS+~~JT^pb*poTW2-{LF#7a{T2M?7F899J1=tiqEazIiolu8Ba-*b8Z?E zgVQosZr4MGiHNon>lu$oh~&SkvZ9K@L5!I!?C+1bNX|S7_{!xwAMT>mO*x!l=W{s+ zHND><>d_S#R(qOnaB8x%@E)O$Y8b`du-F?d&uvxrG|&3*egkY(Q?2>iSES`0rd{hD z4og}0F7N8Y)SZpi6+r5KrPGFh)zw+Sw})Km$xgz+QUxOxKwFg7J;xRay8e-o zxCW0=vGdg;d!&!%pLPeK5TZOz5JoTt~eyBIkd z$(^q>98N&&j|_KX!l0_u?B!ENH!z_O1k`4x^*9Cr?y14w%ec2+g=(0 z+?Dx4E|gDctr+uFo^K;+f=o`fYSvx1&nnN-BDXW6I%zVs3-d@(y|o<&`AMwmq`yp z(f;a_o<1tR>OEbqAJ&pBzS^H^C9M$7e;SPT=lZM(aI`ga43tPpzbNX)R+vwJ_jsgJ zwCVCxxcK%^au!Wi+_KL+GH z(N<5&$t7A;8(iO=6sD@GBZP=ffEFl2ib8A;-sfh4M;04QFzheuIGY_2LxZ4V92q@Gmy zjR%coT0m1%CC!|$$;D)wbBomePfIWRu)5hx7ocXb<5B^ymZoM_4THFDOADoYUUC%j z5q0qH;NYO`n~N&_>uGy0^2@Dr*wbM$*Ou)!vRE-ZoeSOg_#Ay-ole^1k08GhFzFUD zNt^4nzoCT1g_&MiP<&!+iQYh8ImKT%%AwjyId29^i}Qr2zJ^8TeSFYksQdsK@bl7w zh5^&l``g>OD%)C#y``O_e`@!pUaSMtQST2mm_)4Ct43L(269b#xlLhE@kfR#&`n@z zVW!OXaxj^%x}!r}KKCYC@eP{;t!57qI%0qBR|S~GKfDd)#l@5AXY1;Kn|v~)w!gQJ zg;1+h&U)-9<)t)HpPX18)c_Thl|)9T7bLiZ$7kk9%0BP)ogN079K`BbN)S!T{<2b# za8V-EQELoLc1}^4vMt=FHKjQsdel~JBXdQKoKNp#HW#g!pOe;oC+_SOF;-rK^o=%| zV>K~N?X|%3*uStDh`vp?(f0$aufcE)(I~UT6>%Rky#k1~SF+0JF@0 zD6UGAEkXdluDw9; zdc7_3!&R}Pc<1n{9CvU{BB%TuXu`Psi6J0`c4PH{mPqg z8(1hL#Ark8cIOcEdJeY%hX3qWoyV$gUVqq$NAt$2uMe%fs9>2(ZrMo}Lc7D1#nbtBs{a%++mV#e>`aM*x)?YUSFoUFX5Q zw2)X+E2v6(3!mdXz$ffpi|ru|jTQyUE9lAo!JmtKrq zx37=TPw6IO{FJ{xFR$zwUent<*ase??V0Z+BrF}%u)umTd4_`fuPd3wWb}4n${a;r z`r9d451-67Jh7v-CPew2<9c2hz(K~8CKdT;oN;Zb!6EAt08}Lnk9-9rRlqs3tEmcf z#sfcz$vS2AZn9=a!}YnhDeYN{-CynN)7gIs^)h#UB}9VLy<*Y@e9#7Dc^+1c}%Ws=F{YFlni zr)YO~_c&Xb1EvjF;s|ZBf?XvYukedr*R?4e0QNoG6Q*-nROX&ratDrF?dl*uhc@|ozv>pi3Kf{WuYb)UcTs%i|H7q0hhD0Ai{!Yw?=4lNkNQp=*J~%`K_U$~O8YPUW~qP|0E9WV;ve3Nf`4jW^qXr`(f-Y_``9-5P^mXCjG z72AB=G^sShNnh{>A-n3qjY&-QdCBzVhSm)0v;R745n0_ZI1WZ7gt{z;OS`pw^3wCu zqpc)=+|Q*L+zMU;NY0^VT!!(*mv?>l!Hr{m!*5^ald=RshWiANO6^y zxqDGNs%Huez=7wRN0+wt&x}&q+Vf1oFhbou z3#epul%>dje-?HwE$$c@qm&i;>vO%y?^s0aT;JS*s-*2@-n)F-R@tDvkU4~CT^@aX z1Gnm4;7cmLyHDOYGOd|9P3b09JMq8E4Z1h7NJ^z%Z!IZUP@))3#47Y%JnnklW@Zrw426qf9US^`cdJ zYZDmXj8bqVF&3Bprx{dJj9vFYnJVdVS5THq&8Zw2(NFe7S@ECU|IQ~r9J_q+;>8O; zfBMBW0|m#R>M+Gm-v3tIKC`fmc^g~jC8tJ6Qyt#o-(OQVkKC|cf0={2mTqD79i0{K z_x}2ol3Q+J*Te*+sU_Ly%uBDKW^?i6!6QeGydjrb(#kR$)F6!yo)^7m=Uvecsy*4` zCB6TaqG51OM{9eU>A8Qs@$C->P?I}x8Yr*4i6)7(II_Bo)hK7bN0kH+0n-kTvka~X{lA08;dP*Y zPSJ23#s1>|cL)S)h?}c7*kNp*gQ=y4rEOjVF;7!oJuoP%Wn{f5gr4kZORY;^t0xRj zkSAFKb9R+XX{c?FGd=pRyRKRFSSr$y$k>MDd;ik(%1N*2Y|4#v&^NHKu+Z1n_l(Le zYpU-^);s*4AFl~WDClVF=;-Jfnd^o%boNrvl0j=uH9N`dzi{d7H7PA^kN{xdn^n+I zSR864viGWO5gALK0z<`;Fl!J5Z@$)s7&}R|JG}NeG|;|CV>O3qy6RljOdc5+OM9S7 z#y2$L^X)F3HIK+`0!=?Y-bZc^lihRD&=nbRZ&|%rU(7LE-)#m!Rnp;-poX+#Oy>;Z zkxh~_j4m1KYT6g{F;()cu48&ZFEYag#`Ra;5wQv@X=1)&hRMVXwfBvjL!$DE3&QPB zopmVeB7g@zHQ7>^=qmooDXU~0P|0{pHJP7f9Gj;GN5*IR+sZ@TjKrh_wKdeW<@t_Y zl2o)_S4l2i+xTq!6tLd0{#X#yv5Cv-L5!I?5U2Smx3+a`Zd=cWK^hnsY%|DhDmhN7 ztPV9i@K3RT(k>j+42aFe@uGiM^RL{CR9vxNHgDBZ(<{gGElRz*V>l&^1Wp&!wNA#4soHViTuJBL9LTE|-q=>@YjgM3*{{xtYUpY+4Nc!AG9n|hBirue3G=w(4q)xFGfYiWgul5taBq7ItO4HWKt9%MP zktuAjj=IX#pLrDo6@xIy2FZs}$*5-RBl(hM+@BjHHrL=u)v->F5?smwHaCQQ;rI&k6ekXSWVBl>)pN!3bLW=Kjlq3i_!Vz8}(@eYKhXya#n%^+c3i?YuJT z>+}7t^Lhqo2&y~kyB85Ah`-U7^p`wk>gX5W()lnd3EacM0{1{04Q>_hc$I@-$eC2n zvOJW>^Cj)M-!}>_MZFIy8Q&eFEph%!ZdohGv}#P2<%O3o==m2uaM2L;C6y1|l2P$X z?B0BCKo);VCEMH5w)v8o?&>B=A~t1IFcNgVa#dZ)A-rWAI5N|?5cQMSq~%>X`;rf- zlE9ag5j6Fx9s$A0p<+*IE^Rdv|As9p`9NRNQ{YDv&$zU@at^*EyGo9?MtG>Hb6s{S zpp8=oEBzG2^tCJ=UM0~Dt*Ak2-PpIyAb-`D>@JNpzxcjEY<1Q82EhAO68Ms4x5Y$m znTB*eU~_VBhP}SPq02WVG?Q_^>PrSnpE0)g0ezEQC4n#5mS}U~uNU-!D{Gj$0Jp(G zC6k(4fPJ3(_c{H5E$h_dy$Q}@QUaF@0^5esH9&-+W)8k&ikmhVzSxxZ08L<}r;#VS zeV#dA65Rh-Uzz94Jzwtr^1PgD5(Zh5niwx~zj0{azxI94&2lInMkS*=kaoyZ7WUPHZLjr?ykFbxrt>M@JdW{H#q%)MrczHa4iSQLgO`09z1a9gkgSq!yvgl zEXU}akf88cvy!xWGL=dN{sJZ(XZ()+B;l(3- z{724OCD*dA$OAxsYff@B;{W=%PFhx3Gq|a~KEnO;lIrjM7oC^vsmm)4GCaLk!7IN7 zH!@1;??WF&xr?ZQg`;U&1$a4YefauWQD^6bS`d%Jb>oSH8%wC5eL({`^X=#3mQ(gA zL-Tg`4Gav`|B^~}4pzpQ+?GClRUr)9+>Z1vD@m<;f?hyVh9)oxny1uM)r}LnJ6jvO zBa~17aQdQxJ323^_vtPXbzlFS&Zfe|t@Dx(rII#Re&#+Stl(RX?P%%FwNXB&qGps( zGlgSUN$~WB`XY_K`&dlX-76c{-BebWXmagqd54&)4r*s}nx)L%owscZfQ>b#csSiV z`ueNK(0R!%Dp?s|qpxyU+_4zb(q87OdVyD1>=As)Z0yK}L00&yZ8Jz<7{JCPU)!hS zo1fb>Kqhx|DdPCSUCBCE+SCa!w<=8vQA(h=5OC{S>k{MMTtjKfi)HMNzBJ@JI z-hMK9aAc5#1}lQ~Y)y5gL+gP%Z+`T$nwm#YHHkFXKj zAD_r_<2fKMplzCj?QE(jb-Z-slY`uUtV)6w0*}7I?&9$)qT=?M7~~r}WL31-lAE8O z|D16ykVx=udnjMB9X!mz!6-T26W_i5`Wv79^!>Iq?(P(A-Y-9UclXY>c75@~DGBR> z{$AiKfw6gCQL&fe;r|}diEMA|n*hO5ALV1OA4h{z9XW;e0?3LZvYvjDSHVAh z!vOijKBP*5cX&s-o2k%e{}Kw$swbj@)(yZV#)jIPaxKJO+x6+2$V%z~UfKKCxXF2@ zcaMJa;hTGQ?Ro#J?{4U(_jV9z)cUw^JwEhN?0V&rm}NrQ5S2FAJD6`KeB|r*Uq_ZT z-~Q<9oigzSjeQ%JL++^B&rI~>CvUuoX5D?=(LN*bmsAonG(6Igl3*_I!yCKbVlHCx zD7u8z4>B!bf|_NjcH_`1ukG5q_uXA$0;k?Pr7G(V2H>C?q%f&-hrU6Y{=h*l9ZmjM zj_P`*KfFp>bKeyD@dy{!k)1nt?t1;zbE+Z16{90G(pHt605(Q0wqvbv?|$#y4=-wl zwbb<>o1bXdiVj!ak3Rb7jW^!>_VR_x5(#f~;jtHMQ zd{$Y{=HXQ`rzDqyL4q0*>$5|z|LxOvckaBXrvrqH)Y+Gzf8)Eaf#tuw^W(3N-ZjZ1 z_Y6?k7WB5OBzPc0O_BbZeBb<+)nsp9)KanZt8o)XgKz%t#APYZv>|ZU?XK`uQ7?q0O;!6SsFax*$ z{0bYJ%9HZz+wi23X;8w(e#yAl_;luHJg8?5h9Ui3b=gTdP2EGtuE1?UN*|%A2-$)a z6B8SgS5%AHn9f51^#_Jnlvz~U(oGx&Wun{DSV2&ujs22+qeDXkOld-HTlc`g*ua*} zm27P6IE#%zwsAFJ2PvZy=#I0J_?%W;|F+=37`d;rsWPLIxqA^Q3Y+caFZ=mzg{zTiDo-2A)-7Mo}jT+yyc#*HKe|J_=+% zS_`rt4I~Ef=zcU1A0MBPP})T#1GC;_W4|OTZ+=4uwwH))DN8MDCxC`QrddeX*3BUM ze#!XM(i&t(BnoK6nvxu(khu7SlFIzFe00Ag(hB&7yewpEVQgY(a+nqG|L$0Z6*mkI zl5n7`!nVFK^g{jJZ57D{;Fi(36aZ)=bY4>Vriy(GVmyGNIt;ok3EeN*(B6w!5mQsZ z{i6FN!NZA7$!o!nphW@8p<>FDlaoRAq@*A}8{NyV3VK!JuvAiaYh6V?>&r33NIM(L zGUH-F3uKn%=M^+IHUU2!-7nePhDFT=D9g5BZAK{w5&#?x61W{bWpOD9F^RcV+xAO> z3a92gz~n$D>Z+`&FKfUJu1{eD6ItIc2}sDPtZ8T^wUnU2$b_td>P~c%0I4A-KRrG! zEq~j7Nz{7lG2{(%1(x56MXVR(LTwD)FNu_xkQ!UoLmFg_zR`ZYVUXK`Xx@$eya@@3 zATMHaZ2Khv@!1unZOH9U_EhI&q=1-=jLf2{W>AghE+Tkc0e@j*za)|&EjO*cZ;UoE zNouVt$pR5^iHX^bjiu?u^|f8yTP*sw^2jO)dBRZIildx#B<^|D(|Vt1(>^ayIt%jc zE`9x(vSVsJh84#d&^gl`E(@qjx<+DIQNIylbx4pF-zT3NM7I;3_9rlq=MJcne-yww zpkOL8b3?7Ij4h;%GCFA!5BrNjo_lDtQ9^rRQbr=;6ZqO1sb2j0u$*6XZ8w>ffHO}- zCC7&Te|vZS)a0GV0ldHLOvhDg*G|h$XLju#wsd#d-C;cjtAa|1vUR52tYA9D<0ELqJ3pg5`*u0_6%GDB%hUxyVVLJP?xSneiXk=LvK=Fr93Jx?Q{P z*L;7-H+i0Co_S{Sp6_#fKac70Xs5K%H7>c77=7&UzTKxA2KB^>+h+hs$?p&ISD&mE z_y_-XTM#e%#tgmkg5(byLFjwSLcQPH%1&tU^74J>_bE5DmgS41{~2@Wx{AY2h~uv| zuDCPj5!1}jwQP>pJ3n9A2mgQ%3Oig?WdK$|N`7CMP;`*yS-n=LH(ALQ*PVXwD9UNK z8MU(-wTn)xwb-20cRmKpp<5t~rn#poBS<;yq*brhF7Lzatbv$!Z5m(|q$B`@23K}rGuxPz1g0C2~Hl%yzwN--c!E$NnbS4#3Tg~H5>WsRexy05Y{ zKTRkUp2?Mz4H)MZTu*0^Gc!Z=g+gHxTjZ#uO7?Juw%N&tE$6Sc-)gF_Eze_qN)ca| z8%O0WvWhHbAyIN_LCfTX-ZkxM(PCHMuF6Vhw<{E8r+psnmv*P4m$R%u32ZEcZQ zT$G)iUf$T)HO;QU(#XGRyH!{}Y@}Dt0s{b8D^JFf)c6Bw7H_>z)ECJS;Sopn_y%zf z1SeKY&Yk4{?E~%}-@SVS|8%0|j-H&S%{sZXM#Mk7mwPaX%k>LAmU68|Jxv&@6SnN+ zg+(8Yi3#7go4aG{fmlgedeRp$A>94DIop5zo6ypVKDCu5tg4>A-0&m*!JGgtcfVio z`|p38+SB{kW?dX=&WH_vbK8e8{6mLNM*hVwEFn&Cb9w%_r9JJuDE3gwZ8a0KOJ4y1 zJRQ$c@?L#%$jcix`=60?j~kUu&Eh|AT>tvcl&;Q6f>t)m(ms8C^YNl_y~@#FpB&5g z<%xS#ibpC{Q(8_z9=}RX7_KF3dDGh`>cr(fwNYWN`@6T-=HEr+UFvr69pevgoe5v}#<7y|K@Clt@7}#83Vdx>V&l|93zL$Op}*Y0DN;T%+3Deuoa}V} zqz>2fzzh9_;koH?xr5953jpx+JWa_9QLpSvtbN43uE;TRw=Uz8P5vU;jKV_Ej*)xP ztgubobDiq($%axvu+NXyZG7zww%XU`jj!xHav-PCHI@vB6W?r}wmY3VLQ`>aOF(=^ zQ>(^FJ9Rc~rQofDiP^WhCgt+-RR0Y;$$iZy17xC0@K^nV`KHjC!@JOykx1gnk^!bE%TnIkaJ+0(yHw4*0pJ;WJ}Iegzy8nYk9;FV14iRFQ*CFz zYf4TJ->XeM{Nr6IvPUCxG)<}|T1(@1`kn2V8kt*_k~FE5b(9MHctu$}PQu0N$_E7V zonukamRHfULKgslHF`cNX`L9jDm)bwxF_mTY308>9!u&q(?ezF1O5>9`IVev zsk9>hQu67)23>4^Y%WF@iQAw^5o_GzV}^>X~%A^ANzB|BtOD%vFRTaV;-YuT=8NM0Ei=;igZ zrNUGJksn@av6;RUZwtx1+||ccIyI7(FVnV%WES1-UG6rdZ4b>X>}0#7%632ZsPDVp z?8-hnI0?m5w3&^?;f{i{LQeb@C2jip`lDgAqbBm@UqwqQ`j-l6ne1d!#;#A!U1;rL z^A`YM?L0_HilXM{=M8$p!h+rPE(gcr0%6t~2)on47MxnyrR;XntXHeQE=*-I5c8Ci zoYNVs1hYP~ypy7suJPNul!IEdnsiz%yRufNx7ZwP-CCNqFA#GUy_s0ti(1Do zz0>u0=_yGkP0i2EGMk!TdUg{4V9h)kOa5@23K}rGuxPz1g0B{E>2>{>@QW5~boo`Z-`2+v} qt2}w~WH}|#(9qD(zP-Kl(!T*Qz*-w@e>>g)0000C&1fe-=&2p%A~yL%GcgS$)P1lNWH0>RyBB)AjYA-Fg0(zv@f(o83L zXYT#h+&{DC`|+K%dUc(1x~g_PRke5RXYUUAtSE*4is%&r0s^{>w73ca0umPj0^-g~ zMEH}jkpx`$*E44osZR*y;CFlQo9BR!3Lg;=Dx=UIj9_M*s|=^U0axuguEg_aC=C9g*@)Q` z-Y2a$E8ZwoU%!8UgWZ3(GDJfDPE4G^D8n$*x7XkCPM^+?w z_wY;d*?YjhQqIe0&cCIv%Fp`=|CWB!A#T3@TQYk4%nA8#i7ga?|6g4KiLan%f1ia@ zd;tF~AV^~UKg|Vq45nx?+1qSzbEL>4BVi&3MEWZh(ECf~tba4$<>A2={#W_yM@}t% zoRGBTZ%!ou8~oWh)(al5GhI(ePiF-Vv+Gy)!U zadUHXbaYJGSX*1$+QNPF<_$JBHXa@x78WTkE-nsEgg7%jJvkp=@PDeZQAOu1;b-qj z2h5m#6;>^@J}tTX;FP#^e5|3a-jg)RB9-<1bMPlEL#2#7uh&;8IG6c&|Z*m9dzxgXr&WoC7v<6pQKw=?|FOU0^qsWE(aVRm>hfJ96 zH$g$jTq#OBd&mjYvvpryP_%qQ6o^O##jl>6NXg$II_IHiYrmJIz^Q3z^lxQ>K%l<99Y!oCCMH9I?2c;#KAUDEF3C%}A=_2A z;5=~~era$lHjWPv7`$ij;O-P8L(qsjgY|C~dnruiz;CEaW@T4h;jXYn}~gJ;f#tp_9$P*EKX3^K%(S-twTUpN)8 z#NT+W-FL8^s+8($(zamE*Rkmv1OH4|d)oE@JEjPD4 zD+#uVk*Lm1^BF9|rXP7w%=o-CH&ZE^wKObBDIzknyquma!OAAQcU?*{c>F2el(iW| zGbal}Wb9`x(^~8FtIcX%C`|hM7d+=3#4flM#{jKw# zW&ITkY0-8WGkY)C2{KJUeIP@jT5kUG(x1-j%`qi_MY&El%y%X6aWUdnRa-m7*SD=L z@U5S<)Jw7No38^^aSa)By;|iurp*Qs?`?+;^OGl<=H@H`0DuWz>+TFLb|IoWk-Vui zb8t4P>{ML&N@%0YXh9To&85C4)n&Ay9b@?@A&~+_!TsvJI{o&vGuB_kmN3oe|1AhC z@(a-f&Xf1<^&sLKmC{y9{iZIcrcvt2mnLrRF;BZ14~Ds7h);3b05kGY|=` zqR>!L!6PFdeG?NBViHnfQc^NvViGelQe$JO{CreDsi+`ce<bwqko>Jh3}DvU+|3@9DF)Bc%GZv-Ow;MH)LZM6*=j!6}{-(INSXMgt=JfQ7i;KA3 z#Kc6hJWVkLQPJDENRB!Bzb5E6+ZQtaiyO>em6eT-8S?I{@#Mf|8Pg zqBACioVmKXx)v@LaB=PWXz}ffMeo0$#uCOio91G{`E-+ZZ`j;~59=(PKI_Wl1sVDkvPN zNPEZ-D|7Qv`Dn;hChZ{y2pYfG5@J`r>o?Xkr`8|mx?*Cuk5u7)}1UhK<4`U`{!=I)?JI>5RdL+V~po3b$4PY zT73^RHBrP(r;S79?@W#N-Z_ylpEio4eBRE%{&=`_f=-zes(Xr!RZ(=ku)e$_R3WuB zYbF5^Jc-u}n8B_1JAEJW2(`dV7)lucFG}_ViMLnJ=etjbQq&j{z7$=#m2hiV9#@6- zTP7M&V{7c!9yNKpU}^z=>T))qe- z$1SzgojFTt^}i>Ev_y}ZS8mdeE6YA8a*_GCB1hFE^vbqYoj*n-wQvqfn4~0kl%Fp> z4Lti1EflIo_2y;jrVT}mbdO1m|2rW{frt(pJDgX6Er~QW9F~oi=F$=4W^#M3g2U3z*bNEuqL1#l|-42FNmfHiXJXrdq2vvhF%F;gRQ@bwN|8Q~Zy0up zN$gC{TKjm@_ zUu7T+CD`uCNxpn~RC;W?$q`K$fd)D)=Wi`T_ige;BI7h^asa4qTkA(cT10rcw&4A} z;6hW{-ti^Vknzjl6m(L1edoa~YCmE@iKJigH>e?mMfDhI_J%g8RI6^?1_lDaaiuU# zl1BK6cgt_%x7XE?7e2@oZ4%p_ME`7I)aE8d|K;F7X{pM)tzr9IP1^Z%!_yt)uEklB zN5o@;Hj@UxypQS*B1;bQ?9S%3pD5I3e{GS4v<-&W%*9;?p5IBF9XJ@S9p|@pTAfnx z^LvVp9%Bkch-*Z7E@MEO7HiL=u#^2m&VsRkie`Irl!!+n#r3Ga{`|4jO;N30*1FiX zMBcfE!?3{Arwh{8H+z#k?wRI|zvLfgI|K9Kz!RL0#7=Tj^@g3GX)MG8X3?OHq#tLa zN_27SPXGB4t7pbW{0EL7f73goojhnr>KZy}=#DZp74x4R1bS?UHDfw}ppCvB;;4?V z9*};Q*~qrlY)S#|PqBl}aT84>V*@%;mWi1;1foIOCCqxYMo*|w9FYxT-C*}I4MDf_ z7H3pdD2Q`Qbxei$d?GzOslB#e=$rab!hpx+`ul^fYCrauIY~S_cPYnHw+5y;Ho^sE zVv?v;Yy~l`uoh8=xv5OmoMhh>w7ibXNn%#sG~YzJ{k0Vf&w+ zTa7RtH(D1=i7%f1Sj}(#xR3~6jR9~xE`C|SaZp~4cd;J0t$^JgWu}}98Wxsml~`cK zXBQ0d{%Di2(F^LV-!a=h?e*ay(?ymFVSt*Kz~hotxER z;B=nGjG3uSP+meF^$M5vX@X`KiAH6E<_snaTIF43oeBrJ+gk_Ote;*!@1^zkrrVQvmKu?oIH^NfH-GU9=ny^o`zWz~}QdEqKQ z67H9d3CRS3<~Jb-P0}K8zaM^);s?oq3&ZgS(*xpGG-jQ?411l5rN|mF^a4;Hu36G+ zy%z(cO|aa!^W;I+^^V&_SIa2+#S#=)ZfH@|er0-1C*npq@>J0?%Ys!#Pvdc<^dyg@ zGxDa1J9nTt4%lO>z02XImz!H^SBg2=iDQv%UfBJLbAB|Z3`%ASF_FEH(g=rWnO8rr zJkGS&?p`7A4qSnjq(}erLfk2@xc{QP2JjGzHZU^1#MO>NJnP&3r3@#qN0Tl~tve@4 zPkFK4cP4xpPfE!8xsc>QLLUAlZz-G0*hOJrtHqz;ohGx(J4xcWoim1!U>@t0@-!cu zeqo$@zH)JJMerXRRAyl8}0-Ki|F#@YD< z&cCW3uCoyMZE$MvB((T?0V+fbAr$;IRdfAphp5l8F=P~)svTUU-Lx6&{A6ZgNql!w zsol;H+@N18-F*q&45r`2s8naS9-gI;gG^-^H*XSpwhkv^M|6g2;D0&%v%@UaJS-&L2p)^%>KJf0)wuL?uXV2kd5tyU@E;LW~Mx%SF)ss;7 zYY~)i=+`Gb{7)KpexciLaC z@weY=asYOS_+>-amQzV_@faF~tI-!OUS7(a9*EcnbMm%7P5<`8BnQ~?5QhwHD43g5 z-=U_Zpu8B+_Vnb3ks=n$*x8k7J+O^Fpum4hitq_MhTPE9lnT|F92@(}!}%V7IaqjS zKel%n8v5!|8GAB^w5HfHaNHVa()7)34}5$c-7Z6fcN@tUS^+$qzaj_`bM~7%EUIG; zvZ7*>Nw2chB^bjs(vnF7ezRi0g`q^=eBFQvZx-n<0e7196+|B`-F>8ooc^)r=j2}L z3`U5StQux0xNaswh3It6_K%IjeAS=gPs7qRdDvIsmll38y#ujp zOYSJ%z?lx98149E1KX^y@Ts4t59smBD$l`-uKw}tFFoY(`2+YZn{HwG589_TU!bh;Q)}e(S+d>=@_+R`_}i&>{mXgw z5sU8L2Ep!uZeuSV9%t}=WzYM~;iJ<{&wO5NRqZN8H%HI@wMNKM%_X?Rl2+$+@MoH^ zDh=J->c?zTLgh=3v03+kUR&ua_GYZ5NAut942rOfvlMiX0l&_#PC+va1AW7{TxYJ+ zylfnmuNW9g?I`wt$g489(oKQ8d+~?r^MyDkmb+P6f<=-EAyQz=Ep(Yki{7B~tJ)@8 z{B&AB#vd=6Lsap1OgB~qN;47vp#7WD!iZli?ZeZ>#Z$@!j8}9dS=0f%;!}x5=7LRNZopzIBzxq+kA8xis6-(Co&9GB^xMfv2&(Br1 zaAEA8weg9HOtdL#G#i|uaa+z5+rtt>^Yfj>BVkgUeW9w=Lj;zRkK?oMIoah?#*puX z$QnOmxIIu|>f>XJo;`VQS)obR>jDRAKwYrle9!c=K24vqJwP0d5~(NYW-R!MT>3WsrcLF+-*ZSa%G344&>)Xvz2BGfrxf*v& zfkb77aWj2A4Y zh{eoLuL&tKk}VGFDnIb6d{FzKtn(rvb@QFe&XP_+sD*Ds?LxfY&aud<%7;7+)gsb@ z?b3zz>2<}AoE)4XTph-bOl9bO!(v5hvM;!=9=<_|YoeOIvyb~9lVk`v{>-1=`c+J$ z!5!zNW%Phxm3K$1x0m*z0Xc7Qh``#u{noKK~}m# z-ejSg^)AU{*FAp5m+Y5N6Doje{zH?-GDnb({wG&RtI@u}2&b_phe&3^TFqVw`j4{G zfUwVGMCl#&`0ldj6kuXvritcw*|OX$e*Ffw#WQh&I1gekc8jg>5&P17@wB5`sr#&- z0PK}qOi4ws)AI6gE$v7ffr><4_CO+y24}!bztx@t%F4^XL6Fm6&o}%B>@q*6zZ*>R z`M~Tso9=vwFV4u>oOnx!5sTvGrJD6-i*Kjb5R4<$5Xh`k;$?eF; ztt_H(r@J+>Gs;^XHpsfg6<^>vf0FWaVp8f7m6EP|-F4ZMq{#M?-&sHin$zB%#^Ktw z(5XGNtu*h+#l{=ebFyikw=$mcIQ;!2e>ko7vx42WgDM`=*np z0jOF5`Tp?Ha?bcO;pAR7Xr$@KJ4!x|6t!@dQOJko?!!_bxy~E6t#6T@($Di$+w^9| z;(Q_HC;RGC6mL{gFIa5kZ_V)y!W0aqle6rdXt~2^;~cHE*zt(DH42Lq?vE}+0mDLO zx|Fs!Ket#Ql`9Xjcv3WLL#cX-!^_z@2LzHiRnABCesxp3Zng}L@v0bt!^-Z{q7J?f z%S^R_VdJ2-N8hby==Yzp>+msI0JlawO-6f&Jo#aoefBlwVkc;I%^KIqlXU` z#7i#DlXU19y{oJalQaZE>wzQ2DCfo_sq$nc&gb!)b~(T5gbAg=mS-{bm)mWk=0jKU zo97vX%R8+L_4dn6lz^rcEpaQC_@RVp?7&1R{psl>TBfIj(jH%G zVvflc@KK7WA&iHN9qw95mdx)+(V+aXtgBcT2u{8B#T8+KmB8^jU{HA_x}}(9z2Ca# zP@>(mkk3_>{s#f-nTxS@!P%pUrJ{<8W;yr!^*kFe9S! zySoC`Md)T_a%qbtqiJ=zj$rNO6(-5d?ATN-=7n5nunW8XFEugEn>TL$HKs-`ZpsRv z=|OH{x1;%+-#~ABdK7X1_y?_Dv%G@yB9^JCsho3I@Po!Pw^#y3?z5m32&;m2PKn>k zX`_TXJS^%m|5JNn%7K(Z1r1Yg%lz^-#}D~F$HDS8wPE-XWt`*w{j~KYsa!X(ICS)Q zz9^eCHwS)ukA5xpw7bxVlDAGXv({>Aywv)iy=_LRpITn2<$T=+v@1DZ@1XG#5|i~! zHtrpPB3+N;P!c)UDRupxqDuMb2c|tX!ZM4GW+2YpE8}O^!Vfr82lqJQLdl>3R@E=_ zyb4NEPd-c$GBT&*i_Vri&&rVQ?(SV8ZC8L}qGQ{g`o?fkQ4%3#C6t)t+sti!;{jmw3RHw;zi=*4B2wyj0QPc4{`#J-z_wn zqFtAaCsaI4gxx zkfK29QU{NTVfMzKAdS>LD`(Fg#gXN^AD9OR4lADh4|NK9Iu%jjU55)%FaOZUr@@5b zAm({4zk-a2l8YnVB=^Fi6CTl{fVz*C&gRX2>nKCDNAF^Z`AR1iK#aPyK6$PStZ(d$ zlDAxCc-)#Wm` zF?1ICMNhC0sZxFY915|r*A|LPC!cjR$tyaIl=(fAZWQj<;_wZrA>Up55Iqq zDT=;Z%~bg&Eb?`{d)28Y7Pj>|P5#gmJWt&!f!w=8dESpkR0A>(3e*!kU(3FD7Kn@c zf+fk_L0{PY1AopLwA7_QA+t=_(v$zI3wS=#u6;z`MWptZzklB3T&J~aRei?g)pB8O zya1^WVEb%H)~WZLC$nDB;YPh)=#X;qwzyAfCf2ZqTYrIeZZe*M{2 zX-d~%Lp5NrC{AlgAY<1<*M02(hgLE9 zcE*O)r`l5K$tm%`&d+k|K@`9ISGdwBbGf|{!!-|mLng>o`Pk0e=&X|-&Anl2Di3qL zb$v6>%RuyWU?r`QyJyO%V2DT3i!^XBe$cpG1!RjjA0#d&r#fI#Vg!CFyP~TYQu>N? z1>>kfSiN55>FB7118;L;zX>n*RD4pNz^*0pBdnm2s4t-KiZI|{@q+5~M>MA+ZSyaN z)zfuM(Fe26+<{;S-lHYnz;7`Bff6{EL;J_Xbn1x$>C-4iNw8LEmUF+;j5KRlqu1?? zrl^PeL~hZO;{6T;Nf0@avq)`X5a4N`$78ynn_I%2)5&5FeVjf!8LUnbGPH>kBi&!3 z1p;{sr;3BassWj9yA$v6B2+!pcQSUtZv~GtTU*r2g`LY$R@f~Y z*)Fw%xY>5ExC1LQR{9G3&dvlGM|^y?{2J)s5mQr6StM}UK^gQk%iVJwdf%@34v(6X z?e-SYwZvm*XrW+4iKIdGx5|nie>CXGkiF~F&B{td?)Oyr$O2Jeqs3*B77$))e@p( z;i>a|1eS9@Q&BTgQSRiM)y8+T*!!lQjIqL;o(zd<*D;gR?DSIT zS$O(4#FR8!E|49jF^H&0R5GX4$2qg{EE+**>B70klMz>S^3-j2c=p4(K$|#|x&ez7 z_vyfQ52((Kb0%jG^W zp?WkmE0yo#B&mhtEkylFwCO)15eB z;FOfgxQz)m`5wnlvL_@&26$Fzaa#qh2wcn%9BEf=#pku6T@U45q6v-}k0>zu=`;>C zwi#uw`)fz$gDb5;j%mA{Y1#kzDMUYzeT>)j(YGqxj@ zNH{IVXU%~EdyaJz$Jq?TY10$(dz3tUecJ^$v-?LPPRl5wN`^4pY27+W;G?x?ZQGg* zuy1qt{P1Oo7z)5e|4sC&*Q8nIT_%4@HHjKhP?wViwlR`#xi(a7v3@F=wh84 ze%>;i%ct=&04-}AU8Sa;`y{ZuWD{*QcszO0jJa=uHdF6ZgC@Ou6*JAv_3cjvRrqV9 zA#I!=aho$h^EQs|GOkTt{Am2k2BnU3KTYDff@$|7da($k3hPp>DD^8(hZp=(hlil_ zoOpZFulk!x0~M%TlUhGnSmy(ltHs)M0`|jLThQiuUq|@15nB!|1Ji<_VNdDpJBgY) z{MY)?er7hv7cmlj+ft2sdUjt}^`;;-od=N0or>o!4ts19q+y?bZ4J;%)K z5c$0o!frECNB8ia{fnDql6m*dAj-RQMu;p@bKZ+eFulE-h4-na>+-4p@CT=$Ws)wi z{0gCIRLZyY74jQk1zQsf4O_>_&A0cDo$GNr-3-@2Ms%o?9q=C3zxf~L3r@axmwvSy z9wShPL_FKF<>JT!MWCr7C6xb#sQP-3@L#OctA4^SWFNq!@bEL7r(6B_ zj34P3seir;;ctvyi0(Uxn}=rx&J8N`o4yX{fcNs|gA?Ii;nxuYsE5#o4$tG`%z)uXf%4aD*OQ zZ=7cGiB6$DMVGLsJLLGi!$YbS5%?Pf1eo_re#*M8zh#8q!T%>F5d8nh_WPgm5&oy< z2$1>X2F)HY9MQuvl}AI$Z7~>aK8cRosQC{nGb4mEcbl+hjwZ>j4gEgv0T67qjC!G2S28gDWEOfB2e=h~5Ma?}d+!^#OBm$kBz`oHD17OV07lB>e= zYF`V_&gy;X9~Gi{3s+NAis=?V%WN1p^9G@9dvZ!c|UY^d0I0* z4x!w>q^3>*du-f92o%@}`ye6#g_l7rM;SLi?u61gS@!x@7UpXRS_f3?(%G)c zXe<_9P||jLE*?}kIHQ7%-~4x>=m083rHy5#QSRd%U$NUMEI8Z6sA8@$)FQ2wiKnn@ z{j!`ra;Hj-Y+4mcrjibH8_esu&w@8%(@D}5JlCkXUkhNyRmZDVuOtJvEk5DuhLUvK zI+TGMn|#k^RW*;AvBcq9IOs1ei@@gpS{b|`&`tOjTzarq-dNLHhw)Q-!Z7RKu$5V} zpS~K=nuG;c%>1XK zk+6;%l>5F-+|N4C#YeKH)ef~2%sn%c^l0V!f?$&mniCn%{dd`EL2ONhdc?g*K?}mjH*h73edC)dr6TFI& z1Zx#t^Va!=_&#G7nQz$f`gD{9^N69`%eC;(GZZ7xj)C~oH!Rd#*PBQdohJRo-s(`ggSZtZnj_n!X@PgC zjfhw1rATnxI$!qBPeNE{T5&q5ijS4#G>QXeE_Zr`FP_g3|2^h9ngl!HsgFP0Z*5L3 z;7OK5kDR>w?;}Iis1?R8O}}?|K8q6w{1nR>6HaRxUN?DrG5g{k{aviK4}Cu&+jGee z;NDg~UofmS16O?caTT{gkSz6lu)$GjP%z++T@zA-PhIC=YMTgIrktI5jT_hbF^)92 zinsxyL-jq08|x8e^V=rVwAntf;ixjC)Ol)bGj~lnfKqq1@MNYMBZRd>{0$sM#3(gz zhL`oy=7599%@SkW&WO;eE~S{C=@P!qaqEVFDDd3x>1Np-@(5w9_;+B`cnut#cSwp` zXPkE}bt97E`!ZFvV9KcNr!Nyy^lpiyXOs4dEUn$>qRu%o5Gg%BXp?FFwj$)j54w@b ziO;N4nx9|ibLFL95NpyDZ3#CdLVSOO@U&mL>`@f~T~0e^`fv{YE{}w`wf9-SB!Jal zv)=ACMj1Z1?38b@`aJOb<+DwD-fS_YcWQ4WJM+e+D%s`zdVz#u9iWqaU5G#K_kjvK z1RmARIlBp!Sj6Phl%;wUkt&EnL-eAs{7Jjp&TIY{fci#*pB@7D5u3P&R^nST^(F5e5gxmI3aJf`QMhT`?>oz6p|#*U?u&w$I(HcezcwI%^be0I3_o!`ZUh*-9-OOgcSm-O%%H(d&)M{|tKE5cHu=^}GMS4YXhl%)%dH$ki z`y7%#yyDZD_bZ`?wocRJBQfQJhU`Z>ex>kDrV*d(G*$TuT1}IJWSJP`nCq$#UFT7< zbZ*y}-jBkw^4X!I=4Jv5nd7Mf&X69nS4u@kN0MllQ*-Uv8=~1uy=N-c8clKR;|dCP;~HHX^{QH- z>GLMWs=f_jkqgDFeX-`-| zR+~>mljkQ5*RXRP=9wxkcJ@l1TlaygX={P<@fWX+pWLZBlA2wHI+*JuKy@etk#K}b zsm0|=oR(kdeM#IBf@yoUy7dYd ztK$K*EEz%$_HNdTkqX|kqyk$Y?QzMiSGR@aE5v14Dn~qw8goQVHW9#qYI4iZ7OaUm6W-r^vaBZ>yhsN<9IfvGpE$r4VTD`c?J>lz#5JD@r z`+6X>`+~LotVFpfDX#UV=*k8L1?>jGV@y#6hkPc421^vS8)_CP^Tc+B=cCOV8D9JJ zEwG{;h|k&qb!s1oV#u=f=IQ5^!^nlO_x0g56yhUzX4Qh$p*q?M9dOw9+U~V~f$MV4 za?N0<+U2RVPI0imPh?hG?_JimRA(S}e+YxnJe;HyK(y`FmA^|OXQyF1rI((KrHOc- z$5r_9JD=4Ga8Y2n!lx`JoP3ZlyIM6~Z6*6ixvsBvPN1BIsU1~ed!{y#=gS3M%jPQ# zhL2l?c(otZ3x&rozF8KniR;>qX@xu`g#UgLi5x7*DNBkrh&^;txrtXY`zYaz;&%In z_!~9$l3gx#QG+V1kG+ECcgK48Oq0G%B6Bjg!y3a#5z)f72KaVzJdh&h?c!Dti6_+( z>f(H$SI#c8>>Oghd25V&*S*^d5t|zObNutpmDPy5qUWSo@Y&0_gM@APayF)XR@dA= zaCW)Q1!Q{PP3rG_3N6&{+iAu^U9je`ot3{e>Fg%slCPkG(=^eXFdD$3x}P#gdF?g`+jof+Zw$&=_`SCSHT@P{oo_<- z7%d)!%oAIP_iu0N$=V-#T&aWCd{{gK!FLV(V&iuM|<3%$?Zk|CL(pA|{Djj`As&$)f~_TXXIjguF;hfSl) zW&ptQjD-5A@MHHAuu1a3T0X)AUnL3j2zh!u=_B*?+6ic6jBFOCFX!ra<*NtY$&Ege zsT9&CRwSRV^tHEf*j-zo^ne;uSRxnvTJ8=TXfr(4FVHp1`?v?5UU&S?@J`#=%N4u` zp=Imy0;XQe?8qm6dSzbK^jYp=dLyR(XPc7Jr0B6m_QM#D9{g~zzen5tv>jG2n%pe= zq!uN3T{o2{pqG4h7&a>O*ex2ATjKX-j<^$0dw-mAztOxQqRj2uL-+V+aeKI2P*lTH>?i&V$f-imMCNklmdH@A*GR`~_G>I6sp#m2~#z zOrQu(rFgkH9o6|GU=aDcq|NZ`=Z~6%cbdNM)rwwzGgxmPiB1_%D30=S(pLHvS}w71 z6r8U`t^@MvxkGmF&V(X8aZ^$N^kir`CvRpZXbnAKDLY9SZEw`XY7Vj+-**BRhaB2Y zFAHo~^}~!`nfb$RK*m*0_A`tXqBm3%6?S;!c_Vt8jJG!!=w{fG#wnv~^BaaA_IX@~ z2=Cu{(uya6gs(Oyl|=8CgPeb2)%x_Duo5j3QLtp{UO?f8!}p@z*F`Bdm+v-+JVW_& zkX=K{XPzR(e6Kf01zj8f?gvSQRJWZxSF1OtXTw^t=Rc;ID3(|*Y(D?>{ zpN`Y5V*OjU0YV*?^J>;vZ9Vh~JG&E@%h)T6C7fZu1W#mw6~Me&<*3XV)GwUc@yg|2)`?8K5b? z`^aGKyt_i{clXfePJ^|)Nq0xVY17c`*&}L*gX@IMxzlm_%PHtX7wGexGGr=Ibtr<> zDw59ZXXZTjJGe*tbnx*r)&5(#XsLl&q!)Ka(TTasWjbY+y zYc3?@k9TFXkO%Lb89{xD!su#%!8_jNVUeafg~Ept3Y^c`UEtEY+Ys7JpY?%(FvaA1 z%|Rvf-TZ2nvfYPp)C!@C%^~a59e>%k30sO9g88jyo5Za0TCP;3*|C#-F;cm1HR6-% zIEFq)dpm79_8ua|-cf?^!0xk2k~+s+r2Lnazkc%XobSu9!fU2+x@++z;A}m&3!f=H zNHuH`fHj`r@6Np#U$x~#@X#~T=( z5A|-ohw%L}u3RV%&~R71YrSEp;1l{^eBh1#dwU+Yny~I(d8~>MC*VM7AY-C+X7h&B z)QUSez>Hwi)+~k&W-FEDR~fBKWMN_QR+c7UFZDTRV+N)7=m;JLgDM?1sXkrO+N+>! zVyRj-yp$igZbt!8cUURMH~ioIWaC1Ico-X zoJ*=kht&+ra%|G{miZiOY_>YRYc5O1N_ZqTRgn#feI$ zU*Q!hdS8!7?BK|M52(dx(`&h&S)mWpa8M;}3+hcys`mZhzytR*#b-juMyLi~{?dUe zZN29-;x-66N})WW=#m{51r8BrYmzhkzBl3?#F^uQdh8E04mu^;m$j|^D9Cs`t*8iBB>?%J7?W?Z#YVK>T?7C! z?<}S}s|WhmP7Nvb{7hvP+{N+tDdipf==j+JN#^^)|!hyI%$A~ zX&U%mN-j=hac@TN`=Z2?(~N7-%&Ny1eqF)ic|gXU<4tY%$`5?= zrKUu_YR@@1qiJx$;@eFPLcSY#o{vH(Dhf1B66@d2m97>Gry-fELIv zc3>?dCFrYBUPv`GX*3@<3hzAA^7RN&Q1wT+q4&&vDAq~?-t#ieo9Irh7ZkMZnK|&| zgr(`yDGJ1Gr!C2=kXGal|JFsRtH^L%l??n&K(}e+PtD*s`v~YeexyY_x%lx;2Fx~e zK-W~jX?j2^ykT@WQ-ayG(X?}ThGJKJ`nwg!5B)V7B^}_lqJHRG(Il zw&DDBKJk;!bp$3P*?~}M4NDBQUt8%^dHQIzWd(fV+jrt32&gmHH? zK#Ub0GK?iP+=G!)9^br80qKP=tCOW2`7r^W_TcZza_&hW^{a7D3b3^e{k9h)a{;dk zV>HW4LARZZ4qz??nZlOQ95_!*@aR%k&mpFGVpwZcU72Hpt3+cNBk^uu7u?`l`rR3g zwp?&0Mm@LYhdj;5HMe%{qkF9wmhh(h!aPe!-E3N=&kl^Z<4QkJ#Z9?zS%P`JEj+B2 z>8ML?EI49l{u1K%`(&Zv%i5<}Q4y%;@}BcE%XCs3ejA5=@MS#@O~Vd}uB4d2M8}Rr z(^8{#WGD;7CA_%Te&-tzZxYp}L=yvzcUO+)Td!mgch|P-JbN^sV?mfAPagU9Hk318 ztM*-7T)t$!y-d&L_V(Ze0e;JAlcAR{kWA@i&*<~lZSGg4KFIm`7D3mQb2ug4?<}l} zA)fV@sXU6aFhuA~EzSIhAdOJ1SK-Z9vFZ=Rk~KfEh8!Ng-4n7gg=c}*Y7&?0mS8vD ztgSbLquzQrkCA22jr&R{o{iZ_8e^^dhya3>vIO#iJLP)%%tt-HF7$RH@F&>blwR3aRZr}o8BY4 z-IZMeVWLl#sXT4(^}rVLnb4isvb#PdB0@rVhS1o|N&&!aggv`(R1O_^v@nrV5>#6@ z!qbNMPIdbBK5sH~{y?Brc7zYWic$nNLmIR@-{?gB3@om5iC;e>18 zh6DMJ3=$tHL*R6~9A4pwR*mBQ=~lzBYLK#UYi_rU!}9)C1JP(Yzuf}wN!!)(IB^GR z5jo2&rhRIa-NJ$jlQhlcOJt#K!l_>r@cSU;hV4I77 z|AUgZRkI}+la!_jYpOB3P$pSCj`BNwj}<>e_^L6}*eM8=%wWoS`YSoxx>L|Qx&`aS z;t;s+xUZRpX$w6Xx>?C&GX;y(o2(y7@;?rxgk$3ajhAyBM}>v$bxs7YFuVO|03-BC z3S7Pfw;Dv2xjA|Bd-C4Ubj_8Ak6o8l6SceWY|n{(zO=_Q5ubw|-U6%psjZ%sx;cTZ zoLLdrm+k47$WLoepce>6&p+xa`I?)A&X>*_X14a8R+T+i(;6zxeuy(~2Wz*g-GkhH zWR-I!_~?_WB^*WsOo$<-E!J|b!gY=phBk`S{YoUt@3H#}%lo!j=c*oCOv$0vE)$OO z6I2VY$N5rBGUMcX%{T)vSZiO)(3{E>pKm-| zGdE`p+1jz7HaPE;e>3G7FXlb8l~qnQ4Xq&&%#OwRvOm`WML8-?xE7=Pwqjy$WqU|p zJFSVPlAUgcL1Z`8kU@p>(rjRsn}?93rQC;(=w2w5@!*pp)1&QtNVC=LUT=$r!2_I* z^`Bs{n*Ig<|EF{d$*yS<%C>oO>bFdE974|J$AH@=s()(Es>d-L8QC^kE5INGz_Rh1&y~`v?$Iv zIuE2)gS@do1b#6G+os7febM&YL0wVOkT%mgo7vJEFOdKLMc7-%Rkdzy!-^7;f`oKQ zm#_$FrMo*N7afakLFw-9?(UTC?w0QE{HE^xJkQzZobUJYCot!{=RHS{Yg{+Xi?;VU z+2l)ey1zE0mpy#z_V+gc%&=s_NjD7x*YjFnY0Kq)yQJaiQVW@Rc6uw~)XJmq3^|AA z7`K*aA(wfTLmmT%bEy=$430@zapk8esr3?@%_>{I(K zEc?C7`{i_V^;yj&2HU0n#7Zb6dW|}((QF(yksZB4`>|%LpBdYRXpOjyLjltE^B7r^ z_N%c=88LhWxtW>r0ZNeB&7ybr6}E0Vqpg~r5cvcspFyKA5Gozd)tV1ODxcxi#ye?O zF7?8hx%|fg?57#Qx@89u+o$9DSnWIOp#b^xELhC+<%%2meOo%`MfrQ)NYF(xxKpE2 z?SA(w!OF!h#{nu_zlSYPSd!>_|2MI$9_J4T43E{OK&JNmG$OPu`t4%^VrB;>g9s@EzMXjM}b8fu^14;fu@FOF>Dab5*iIhd#B?`zQS zS)ZUTERcjNe8QitG3r{unQ2UQrU1HhzR8=84?9Vrt%=z+R^{_YH0i&xxl~I#5*k?N zoKl2K7SArkGEuJLyz7`dAJ*cd!QY)KS}c7;{l(9#)QSmZCq5KikJpx!$(Y^7@%Tnl zFscPkXpWRT>K+C^Z26?r%J;Of8oug_S9T8V$QQ50>nwpkdWNw6c-^=FgM6n<^?BIG ze~bvsM4U@LzifL~hn3=FvM9YU%D{X3_3nksu*@+lGKg)`_*wgRP%A&udfVO8I;@!& z!kdBz%j;k_o~p*}6a8#468}&&Tp^Qqj-&lmdi!Ae=k~M9Q}hVS@WPLniCL(O#3b0r zN@NqA-ugpr?%O@w$lob;EYHJZ=#o8(li$l1-^LJjlR!YjEwF-Zl*8Z`ni_e8RX%#7 zqDdf|NeV){53SQ-cJg!4ifwOOXi43k2sTiPU!RQGY?X{}zWrf}D$RI>ObdpT%lmgE z6eGjro4$E%(qU@*1I$VIlB$fG4OU2PFAvb&X z+shkoI0__((j;#19bv*fAC<<_sv9m@8hXEcn+!GvggjCwSLyxJ!*t>CW69x8+`|5q z#;bm8sAtJ~2SJCS!DHSSLITCDdLSdzi9Z@Xe@a)4I%>Xq&Q2n3pl=-0M$!sSV7;`M7OB5)k6fXrkI%f?ORw?bFho4rcmC(TyieM{KfrFVa@nx zW6X9)N@zwO!vif!gMq8jW`bMpgWFq?+S;Qj(mvIU^IPZ%hE68+vD_&oG*rWCn_q*i zJWfwDuh`I-5~yt+q|KcHJb2DveC5|SEs(hw>|2jt z6Ya1vZE}O#_)m;B5Zx5L7>wyuYt$rrSf~l_Uxi4BOWF)>N}67l!ol0APd1&ZO)5LQzNamgvakLqN7~{7uViA@^mZuUa+gs(KS~qN&_mYr^lWP1E?F#K zxA|%{06XeKErQ8_a-QjRy%HKvVRi3i=T@|73_;^+!s7aA8svnRKGKqqZLy$=Q2KxS zHQXa7GHnue)|@3Je>GvIiAt=LxCHn5D3*8DWfOtUsnDwQ2y?wFN^6JrSxO~Q*Ri|P zX!ChPr&VT-;X%|`X*|{cl<7q;WaZ_xD{T8BUInD1v}XGLOsN*A#=BfUBFI;8g+b|v z3j+lKXl*?o*o#+<#Uiwr@{n~r6yw=#kgf$bfyPxwr+*~R^Fv^8&8CyWnIQ&SWzN|N zu4(H8GyYEc={WVsLhUhL`4B~p0h8Hv$4~6zrpKc!2XL|0MQC^V`Q6hJ+jDe9Ma1DC zru6c*z^~QoT7d-urSHB+3kc=vXl#nh*GZr%3tb)c!E6jH1})n`w~ys~#TaAUNL+Y8 zd;Hro+yw$zMpmo}gU9(4mW#GJ(6#t@hb<1V|JCjYb$W` z6>yTf{dfy4?0+7}iCw3#``0neY_CoG4=|9iO>78z5-1Fx$XCwbs3tmNUb_*#MH9Q9 z8l_=okg50uytsHmLC7R>jOXX~x z=gUs}jnE42!dXM<`?Z!m69$M6YQqm%@EOTocTp->1I8{E8?uf8AhVC6Xwf$*HMSK9 z!$#f6c|@fF9Ie;$inyU-XGS51pN8x{<=LFGwjWa#>}ubVCh>&PJ1E;((G?y??i>UO7=_rT>Qwo?tty+Fq2vEI0` zF6QpZfDh;!!Q0$+u1iw6?I%oV5Dr-fU#V&|Z$?WA>*mgW_hye|zQ2kg#RMn6`=t4* zAx;);`_OTG)#pk&-2= zn!eX4-VKkBc6YhFn0Z!duwdIWbsoM;a=}cMZn;ionk|?ASn-S&R#_exm4KmN?a&u$ z`M6TaAe~}2Mpxf*9gX?B-IX*34BhVzV+wV$+nWdt8}Bk_K#e6qW_o&rt17$MyRug+I}ShYNLN3hFDhdQSg=(6txwo1<_BF4Gs#z%KDQ4h6u%~>iNYV9NpK~FWGSu!%Amg3*t)snIQXy`WnEG^!_zx zN(!J%)?Xj+;u3@Gyr?q7Ww4qT6d5~?Mekcgu`IXgFJYG#>F)hGG}2?+@$ z6mFn|0;%^kiDz9t2^A|f7cE|O5L{?b09_8k4}3KGOcFLKCOC|>tgRSe;$#EZA|km{ z$^f9QO$tVPQ&{rxq8rtXdp~TDnw4HhE?>>81QgT*rRd7jtPn=2bRkFpx zLVvySvEu?uiw}j_J2rh^4ozivRm4yHW6@su`SFrQaq9*>VXKo7TLd)5woi9m-j+hL z!1DM*w-8w`BqlCw=bh|TmLt?ua|BI0L?CfFif=t6e5VhVp#fSd3h}`& zm8fxmmlCBkNEZd@u;SLuj#Is!<~wnTI-3F}<76C4f0(?)dF2u+#nSJ~a%h&sMN)Z& z<0P;t16Wg+@C8bI?k|vJMyvn_yR40akkf3x{(`T($8k54Vlb&AMerAJgZU!<@E3fL zn6@yY*#3(aU602-$?b112tx}EbAOXVBz$CVG`E_jivN-xO?p~U+k&AnF*ZB|U$?u1 z8>U3tb~Pfb&AW*j9xeP%bYZSoQHOQgLU?!*EAgy z33X1zca^S}n?c0-=$*HX^L2OVOc=flVM6#}MY1!Z=8N$A3`#Ab@n>F^s z&Ha5Y)(nW+W^5&+c{2#xbR8!qMXpaUa<)8>WF(QtpSXSr*xvjgM4O8~K97qGUKZ%8 zwY7_#lQO@&*^LBpVrhlccU!I<2jg_tVXLcQFP>jKr}_Oj5bHYiO@9etg?Z&Blu0g9 z0@~s`EeQbz1qE|IEOSy*Q`0tQknzs4X64nSqpwI4NMi+Z43Hi$XfuIoD_T5L{cxhR z_;uK*?pSN&qi}r}RxVFNhAd6iZJ0DAXdfe}O~&F#(J0AH9T5#yBB~kpAbR*Ex0n-R ze2Z@Fx)U@}i$(zN2U^uwU?gc1{$W!F2%#W>{o(4$UQ5&6u+BF*xp~QM-)3u@Ui)&V zT#0VB&yC4CUzcn_jY&f?h?ZWXNmtKTuF++NF(YbZts@11u=~8U;8#r;h(Ev1$cU&2 zkB4qt;cx~q6*r0g0)L;gAvdLy3WBqBAh}AirjeI_g-6SvmcrpqmlaX?-t+Vo{;WmK z3+>#6neP9)%IbBErM6J@l zymj*swdK zIqMW%j}#IT>Io&BnVI2r9K6V~F~o>oB0hLqg#dUSeX`|QcJSP#Ts|W2_8>P2s90^c zE-Nk^_i)|4gS(;xzZJ7!1oeF^NI?{^W-JhQ_Wh+^!v#?nrD-UVM^zRz#hxoj$o@Ap~Hj%OQyM&y>w?E^pwNoPQXX#7*44lBzW`KLpafK*~+FS{8uM?|x3l0fwm-r8oa; zRW-|`fsYoK-RV|vA~Jn#ajD8m^WGP+pTomXF}2^PuxT7hU+ag>GJ2bpHeRt6mue_3 zvgOT0@BI!A1LL&PY=>1Pg&cphx(RrzjL$8r#iH(QJ8$3F9ZZJrr<@AfnSB}gMfg}e zKr0$-D||Vt`fM~>S=(yY!SE_LkI%aJ4Em)}ncYQ55RC=S@O_eJQm}t7p5)(l{c>y| zUV?VxqX}pYWRl1^T3YTm)0v@UFsWOM_pZ;es$h+;>mAh1;NIFn+(}s3=*dZ05Dteg z!!MeFx=B% z9deOY?n9s54^)rCgU~uU+A$m!-Q#%KfCTaGb#VD$1JlEsmqtOwr6rUDbQDqx$Ig78 z1qAeU0qjY&#D#3e_Ys3wGC=`>-c+c!IFVrm?@OXn0orAPM9rY!Hi6o7Ad$H8$`U5U z{V;=VlkTW2{CQaDWp8jDt)ZQv!jFkfgpxid^kt6^LcOs2rqu8V2sRK1+EVFk-4DUd z2^|z5{{Ni%TPKNj$9iG(!@f{uE4) z!T@#j*{$nCk;a3nwABH?a+JpV`y&0|f}LzmJ(@q){7FXOv0>N;GWyVH7BV}qU)B~h z4aYcQN2jIku>6Ki#!M2d5q~cN-nZEnYz8O_^k2!(8(?y!ud98wxBIj29?=9^>-Sxr zM0q#1&h)=8#H=R1#F5b7!gPWWn!Cwy!t7(pcPmnqqGRJ}ZW|`sk#po%sQ;#L{~lH~ zREX7icX$@QtMP7UGf4c`OgF2N&p0s=@I#QB7osmSp}K~wo5=JUm=;lGR#i);+^|TV zXh7etXYAV+-$TQ>9XiaAV!ZR$%KQryIC=KPA>Dh4r{d}urN@KKaYt31x^12x4JkL-h6g{xzjGcAZMcTR8f zW$d8FeJ@143*Lo2S!H{yH@=M(w0TOgeg#VpmTtPd{DEsq@TfLJ3QeS=?N1{FdzMn-%J79zDQe~LZx_UFBB=@`B#c43 zSPj#}yrz1Hk5D(jU-?8hL=1{Iu|)X$j|srGMrzIkJf>$y z*k+ezU`6uXh4ExbOYpvqPPa`g^#W8OqTux}EhLM9HJb1F$r`9)Ijx`n0#0XYW!)ma z6&apBT)7HwxLR)YP&1Z4ieXSHk(99F%5t~~r5czX#C`ViDdZbw+Mi$lz9gN>Qz<{= z*z>DWt$X-tx4n~tHh*%FDYS9>YK6+`{HztS32#y+zv7zf=Be$jZfF>DUTmu3Uvf&{ z+=%5Wo)N_*SC841a;~+_m)BoiQets$zQ(W1CzV>cXnk|{CDLX4C}qKclW<6N3{g-{ zBWg%fTRwEnvEk+m${F>)N+mobC(ZN+6uZ12k(&tNI7JSj7iwf>r$SBa7pV*${<-R&`7QfG~AM!mF%#^QpGNh z)pngJl|@Vm9%YUG!!cyylexo6_u#Duj~qHpSL!Q!9F$9>&?~kn$IGdBXU=Pa+4Oqr zs{?j<@H4m5QMy~MrMjBhuCaL{BluU5YGvz#{?;J3^3XW@jmd{BeXZ87MfH$hp*EOL z+~7ARCqRp>(hd&*kY>;5wY)!e*uI$-WOyo*-<~Xw#=*@U;x5yl@?4td<*Gedi~kJY zGVH`G%TwIfXSS~v+?-*Ji&XmPe17Ji}2n*gA8V$2clAHgd}NX#24iERDqqgDULEYGK5$%@#s?Y> zs`}~9R~ZvFUp|a9;zMg`JGhH@G>X<_D z(}S61g#A3dHXKeap>rsyVbn`)2Qlpda^n4_ToKfif~>n_`~f04Km`sk0|5ttDB zf;83?V@_`POA_F-%k-+cyQy0QjMNnS)+F9Hpx1O~b((3np7kEuj*#4ji*=<`{&-8X zH1+Iq8_LcZVm8evo75W0_blb3Zl4Izb4A6DE^4zGa94HJFE)T&W4zE&b~xk>*q|*7 zN&e+-J8zk|O$curp331P%v0RH9@AGbLs6h@X~hus6;h+Vp6$(cjCpbj8kE_XguL?_ zDb{Gxd$cBu?Vqk{y2z|-(FX6iv6pKyrV{_ZEnZz7`AqQctvyB(T1lQPmsJ{T9+^p~ zbNCkMGvx+tD0zP->oVii43DwREE!$z<;_arkp{eJ+sLW%vW@-i&C#3n8G_)i(6YTY z{6OpI3h3TC_o>oXgM3p=E41_~r`a=m&*FB}&)pYYPn2RTRj*xr@cw1{_cCKEHxROi z5!OvIurukX`SPGGSf;{l<>~`o|FJ|_5Db4E3Eo?czTRF{Ijz7}L4!1VC4T0@?_+a) z=$BZ(XF%v=T_yvWQ(y8Cg9SvRny=mrtgt0FT9oO>I2|n^@=za?ZzFPUn>}m4qZs1W zwxYmoRECECAetXtyn8vj@x5R5Gygr&2>U)A*s(6Lbgn^LyrXmCxedI{Ei-f$xv7A^v?vyY3!L4ulJ!3PkW&T7Q;*A=H z=aOL^E2x=t7LrJ{&!8ZMJdT%uY0cuBdL!adH{N>64={(T3Vr`TRlGSrl0K(wQkPxK z=Pc~u`PV?IaI?rcHjxMYV}vd0MPH+hRh@v!qyr+InmA+YWSrpNuL!1PBS%j;fZWzIF8Y#zo-keMVnOl zwNGMcbwN~;f7Zt50{L>!EwxhBv}z{tmU3mgh?jkUs;^$(^=rQ+uLq<043{ScU2Ac7 z2P`>Q<*P+H+#>46mP3AQ)Rfmnx!E;UiYE*CQ0@kt&cR|b?7zqK24LsSeMqS2 z`{(HrY#H1wpWjwmN#S_ULTA_QdR#Z(n0|V)hz$ysUW*)^peKXtiIp)wP_n zzw{-6n2^@kT_g8HYYDBKD})vm_W@3Rtp(24Q_jZ z^jq*C7=HwhP?Wucl&4{CAg|L-&v_Og%?qqpRJY4^*dHCK3f%l_I@@PbT#%%&WOiP_ z;WB~+_n4(?=ECt|vg0+emhHhRIa8%A&M$DB_g7!0#wx@63fMhx3nkzbtDcqe9p_DgECURgG^>op*i7!()CC;3-iRO(Fm1$|T!n!K`5FXX+k}_g8@*SOt&e4qAr!twW=3f|Yx#y?fqHqb)*;I=n`)och*riNO4C{{3NZzr%eXnN>`pM5ie1)3()|xxJyrA=c>! zB(`_%#XoQTY#mccs}@*$Ufhv5^(TU8luXdG2(=Rr2yB2jqi6;8@SfKUYU{aF{zz?W zvv5pQSHr?Es=d)DkmvB-QS9)yWt`&D0q-c`NFQ6TGfsY*AJCnv@ECKQytKf9y>_## zDat6K*_MnQRu`kSo-kl8G~%Er|2Xzp?=ZtV@Z^krfOXHY66)T0(8gZ+3-4hPlMAtCj$jz^gAQ@qc0uNPwTW` zr%8x1(60R66EB;9gsfsj!-E9Y`xRuw&NbGWSAoICS;& z%xzhR*;9|>=0fJTKi2hiQEd&hKA%Y!6O5Q<44fHD0>@8n71}>GKHn%Una@5l*m5QJ zm*)~u&Zl8-MQv!YvduLguFiA!oO(Ys?$td7!)cr7X~ZntiE5K_YSj0LsJpC$1Q!~X zS~b7_`GMxEd2(oI=v9rI>0w24gbkj>{J}z*wB~W%)|VmgXMz<=>|^zA@jQ`F=8kIW z$DJjbjjU$N={017^;x9;LJm#)d5wCdO1e-21AjDm@|Mf&4=fniY@YAE=<~ zug&aOY7!Ifm4%d0#RrcgDlI7F=WTor1PF-0MBt_Wlo?kwK>_+HicC;z3mwIZ({|9S zg$p+gXPzcGs!uH;Goib9@{57Ir6Fs-ewDlJ@&vxOP+*xRFD&4oy*TLRb$`6*d9`08 z7qv;-$kFq2+VE-wY-Y3YZYP?JK54O91MDE;qKkiOu`woq&4QGU?8{a(TRTMCSsq1s zZFg#eEP9#A(gkiTO|G-56o4f9sI7@(*&X#ZlR~Fk=sydY z)=DKx_!x}oAhOU67q6k!GJzDRxV@eXsx#WEpBxT~;2T&ftkFhnPV&2@41glHAIbra z;>pqe5g)#JV0{S+t4x25IQl!=|Kt9AY22beZPVtalLn*NTb2L(srMyC0YXQx8+CyI zgUK07xfICDJ2yRM-~DqV4|2e&C!zryTxKRsyI{R_p#7|7bQx7yR7Zq>&{2EcB^aY4 z^$vH844{b>_QL_cZWedW#!SrS={9Ig7%>E>~Ef>q?joF0wjS&MOIvevEEycx$ zR&2RUA4lYc7p7a{>4J-`}TE}WMtQnqqM_rU@k*4e6 z-I!psgPR;kVqFVvPak`jDir=g@o zY|VT=>TcZTH|`%1`8;Hy*_>A?F3d~78GO(JiAf=F-yQGsU-<4N&Jm{Jk2CB)eg2b0-eS=(X0Jh%|!=xBj}wU-+>H7~zp$1=DNri0>z~$OAPN-29gTTnTWZBlz-WLg}4kpr|PPTKj36EmB@9JCF1U@!Ovo$V&OTZk){<5dDDp;R4~)&5(Ah zgmNO|;|ey&w)RHBNtx2VNhf@uw-K`TK!0fyYx2RUIO37Es>b9we|J+fdXx3z;bm;; ziW6KU=vEOyovk>rUdr+?K5gGx5{TkG)ee?xP|KAZ9%L6KMVhR-w6vdd%wp~^zYL_3o#>VRYPz4R1Gy zdmie#=;$mh2qdGVO(9GR4LXnAbFg^yD`#a*btqI(30H@vjDrf))}KEzwvRnT4Wp2E zjbY46Qbw#dkEF8Q$S^?jY9k3A+dMELWe5`{)PAw?#g71Ob|g62MeR`Dccng89Pten zYv^*96ZNUil>GGAqEBYM{?^@(4R8@OE~+dYR#sZZ6W-l6<}WnG2Q)&`Hn%1xwLa+? z+E3jESVqmIY*ua;K5~QSo07L}kH;c++a-j;`(nN~2wf>}XpScsU`y}~TLHmf=5^Qy zaAz$dmBh3Q+B z9tp#>)9Sz+i3Bd4b^&zDrqgbK8SSEdyD*0k2{8-)L^V6>Yhyn;*g?=~KAEE+IJG9U z6p^W^j;l2}b#TcLQ#X~qQ#l{VjB;$&&eo8JQ|eBu2wRjKH%4t3-fMh@*jKmg7eG6G z-Pagswx|-DnH;1PixMQ3)6kc}V$4;WUlv9c|lFhk|Ht%tQ zDJnyBd`?{qD3f^Y#FaET)3f9(kOERSeqhMVHi?g*Z^(`)%E}+WN3Snt=;KAprpGPR znDkR;NcKJ8W&R2leHb5mREL?~RX|M?l%JPxc-a~4`V_mAsu{3!ZQmc?Sq!BY&U%MI zBRx#EbCFh)!J0>ID1GQSY79SW>f0#^=jS=H&vOxb17eLuOPP3^B8!b_RINMYf0)bX zHb5!s^rf>XLf%3x?%|}|QxKWWC){Q3WHyH#_GIGfH2O3NTT`vYH7x27upo(kpNw2}=oOao#I>8xQ%@_@7^o%z8@(WO6?d}do;QQyKt*o{W zE&*>FUqmXcyI*f5TyO2)lzD9^yJfge1e{6J^E&r)&qT^Cst-fq%uiGv8Cf)ytuXP( z(Sz&hDw47FI&fk>M|4+{yxV67%bW7Ca}`g3>}*%BDqh*oUObIG7w=rRy`bjEoF= zg4w70jO^dVWsmc6H`ZI?XznXZgBgU0@$p02q3KfX=LHEn*W#Qa9=9DSdNrC&1gNK! zX8q~K%l+Zk3*;5iBN+TVSUV=*B9E_KbcPz$l&MO;zUtMRFRvNfOy)k;IIZ87nPM*n zMfe!C7SbpeC9yc10(I+cx|OCU{Q}bzxY+ujB)(%@U(7vc?NC#(%u`)mT@hcFi2^6= zpA_4Nt@Zaxs4Zu=L$i@%jFLa0Y?#^yPaMtu|279gGmw;&bP@7??Rt%OQ*%$7q)*4H zvOmCF!eT*iT0lvM?NK;VS;8wRvfSlVZ{!8#2z%r8w|LVKFshReL2L_4}iP~ ztg5LwA`4d$OQBme+? z4;Vi&C4E&+chfnYAld)`VIZ1fV+rcWTo@r(2?L9bGjW|z|CdK&cRpr_3n;KgB}=f& zVDze{{xhm4+&Cx?Ncst#A4?)Kbn{Q98%3s|AWm$8AJ@I9 z8d(Qy+}9sb-E-pjXCB)&&U>J=e*h=FBsCtwt5?0g=DMvw_rweU@K5;gL!jJ&LBE#A zer)*m5v$WZwRg8B4%MA5>4tIfzxEeFq;j^K+2fwgD4N|#%DEljqy!99bClRv&?gf25<~$vFK~x0lB)5$^1^?IlFF0oj{p&h zK_O}Q@W%Yx8^t}7xq(5Miyb~>r{Xir=8>IBKuCj6iK=%|pFQKlV@lRMTPaBC!B#3Z z=rDjU{8NtuD%*q`MX?xEf}t>-SMPbv5p0;cOi9qe1ysIGfe+~SPp>=@90~FLiHtoV zlx+9X->Wn*P`VZ(JjokdD2TuT-(KSUZejzg``yGwf%r)H(JIcusEobvkTeT&d4o;W z04Cv`YgKP@o_|k;Zr<>H_G+ElYNZVq#U(5TDjlv%{q=uS9-Ua}ac5|E)$BFFk+x&+ z^g2?Z(4E|YSFg*VxTSP)Z7-6hzC#-;xxwTIQv1?=rx#bg`)}Vgo)*86%uHD(T5Etb zb9*D~)lhCLQS||S)>Z!(liL+&<9cd>fLgNP=|^)|cKLrxRdixN{sQxD;R@vjdXzY7 z#6&*tFN?*rKZLw?dp^~E9R~VcRQkJ5fFgd^K?~MHt>Py0Mu*ZJ9RoJ!w=VsudH$(R ze;MvwP=oV>4d8jn{vFu0zsf6NPi0vskZBwKK-dsnG$`F~I|%=NUm%CFFp4fDBDxD| zdGQ~Y`qY$;r{Jn(zv&t{l9?Zwb_kmf6?hT)qKje~>pzzel`M1$pGYJ_-@!+$lSRbh z($*&1^qF!7ndh4@;@!?YKt2i>g;#Wh^ULNcd_wn`MRLr#xTfM} zVn1Jw>&-L4Gyg&ZWS8H*Q zP21Cv{;>z~uCD@_gJy#=l+o%h{0u6jF63Kai$^4_YLj$=Hy}BPN>gMqofnTg79<|t z&SInOE?z@#6KPr!rQKiD43J^Gb> z`Ta4h=JxCEzQBfoXsv#Ep>{I9tN=74jw# z7bJzh2_O!=J?HC^Rr*oKKmBvvzB2{yhHR^qc>G-`qC=)XW&j)19YB3L%Ws&%+(7qLwc{8oKtVVqlWqTs1TlJ}kn~xR) z0U94ZKEe;6?!U`m?_Jj3N9FqKCp68TkWPjkESQl}jjXUTiU?iK&_sotJ%l zRwh&1%|rU`IiAsCjg*e>gJVV$mc64~i-(xIpWKHSl6pRJa$XFi_~`eASbFyzS;=yu zzKby%)pFq?)G=Rk$WWLWE?%ieN>Lp-kTCA~?I+@yga!8!y_#j z{5=YkATb@1L&g+Pdb;_lb;Kd(T*Z|t0)$ttGETMoIdV25oXf7p4z3gJ)`Bj}6e_>! z9ebS24+%thmhcw~&E&^{F_i808N~N|Qr-uWJe-JGkYu?@l{5{%&)lQTHLz0Tr~#a1 zWMT%zZ?2RY#CcWBBZnn)p|OUZNfK;Sc!jF%fB?{hFbNoyY5CkM(u!XW50if!V3jCT`-B`8mD4 z=eT)8A1!9Kc}9mL-oj~f)#hoY2F>mbhp%qoY*V>P-3gi>ms#z)4{mALN@oq;tC1J> zPzzS%L~!vYCf}P?Mj+rb;5^+8989?!P2VHt24bm^W@&aF|(9 zr78Ihp)EKEF6d9nVTtq81;?v1PY))x8b9mg{$Rxx)QEMSx#`Y1Zb`oJkd~ajxv$+- zztU{LRMlvYNh^VHcNR$ya91Is{GO2dr~l*Cg-mP6$JyCP=RXTt@W*F;=lvfP06=#8 zB^5#*E^^~);*)rbJ=E&)xH%)8Q!>sA+1&7syU3YtfU7(=)q1l1b(fiIk@U&j!g*`w zNs{K-+4`48qhG}|>tt=Xoa&mJpvU%fhqEtAeA2`OZ&9PP&Cf3kp?nEx&7w+ciH1-6 zHw;@viw0IZgJh3-YzMTumA8v0i3qhNsWpxrKPO@(gOG-?lV>Y*Hpk;ldPZ)xs?QT& zGa1WULk4%X-1ozAi*!`+a{4J3UbYbk;2n#Ai}0%wQLt;UhhV2s!EjgNlTLu)PG3+LQhM42|jBw`=Ch8_0#=LB!-)7UW~ z?TS5JvX|0lYCbUv(WV;xpI)WQ^6Hzo)P)CcC&$M@W>r@uix11JD+>0UYGx6E@x!h1 zu@(bE=+!lTlodHYW(#4Tp3E{;)#Ss&F^!JZE?`AlC8 zGvWU|>LDcuPX>KnIXph0yj`m?e3Qxo$V5|v>)(vDS=#ql?so@)rIHEE*x>eKQ{^Q1 z>_F#U?D0I-EM_$8`s>|D7c5uDw)in>UO%dcew?)kTEo_d#%x6iQ4j_9l+f|D^7FLA zNC=hAXkJuI_gMsa`9*R_i2IrRvs>pTU*x^Cr>C8fqhX>C+QNQ^uY#6oxI83-PL7 zVy!C}w0WC$qT?O(5~1;2i^~R3{05-Wzr_br6U6`S-hO!n05UO~p@U_Twv>KHl_@+} ze>YnHg!`eKZwzkE|r+cmWpGo4mAzYy|tO{9+L#X$==V9|2g9z`7qYKLI8zLQ_U zx!$V-4*pwjzFv;MSnfFvNqyL>J6-Q~t35o+j&rt96biV_aCl~}k5S?8Dw*mW8Mhp1 zsd(ruCxv}T$f}TfXn66ZW?yqjal`}C+gRcq0|s9mYp*|}4Bgb%k~ec2pK%^HpI_lx zHZwg9v27;>^p|Y0+kN{SbnJN;;K?YJ4leCvd;|W0SK(gxPTZBXrXs|jbS2n zUHtbJ`dOLbkEdfv)u+SYsd1(GHewT6%fX94uDhP^1k(p@!|_mpbg$+jnzH6cI$c** zOpnS`b^YHq!ukjZNoF`3d)(YDztdsCn6lOpW(#sL?{~+V5hrkex%`W`NiX7ifSpH+_&tC<)Nv!C2Y%6 zmqq(|qMyubO!qk}SyK@a&##f;E|8F~P>?Q={QThHinru%Dr&e&aqnoB)r_KlhKql& z=aLWN#z@OedYKs@Ob%{I=%bSu{taHh#L1ey!2Aas>6ch*^b$t|)@yx@6~!$ZALVHJ zEoQ{O2+w&RpkKnHSBqrboJE*;$Ri~04p@vQaF(fqzskt(X)1GK_ycB;O+8zO`v^*JFF}P+mEz zPjY}jvj?1HZAFA%rus_Ai=h(HTc z8D}+%CvjSZ_^7S_f9$szov5;$Wo+YnLUbkbe^br+yF`CAJ06f#KQ zinB;_D`%nmypg&prw=UUWP1GWH+gWUo$$TCf`c%)0NA|xUiPLl6NH3CZzCh+8ZQRG zcIm72kI}satCtbHW~BgG=AJRTKU7u96wp05)+O_K^J6X7jdH38moUFMhw8@=dCTSl zVTLR}C&*YT&m|jT&e`sB+`Xb+BZF3T$s`?#-e$4;VGP1(plb3hrR})21Ea^YiFvdUhu8E%x zz9goS6@hTX0>i7v-j8dqggoup1(y_lDd}4(ug)_F*Sri(9Rh?kAMciz>^mN3BjEef z!5>~334XQMni$aBuA}&sj$+$dPdc%m^e}<+PdFeMgHL{J>pO!P@pm^>(8+fv^0vI!)Nm~wDcBRI z^kR|o94RJo7;3tTYBnDX3_chbIr=CQ0U3>QOq}BItI&|NkkHSz4|iQ5CnI3OdK|QX zhX_@C0y6m#=C^ODvJ-kOyXC2H>K#*urbLv7C(2GX^4=bllo=tk-G8Z~U^@I*IpD3; z0%K3V`KBl(;QjmeH#Xh5IJl+nTV+Ch11!XhYr=od4{;!g|0hhr^G=%bR&s~{Ln&v` zJxON=$0JJOjO1!(WiiRRBGT8Wf+YISm;hEetN|0i#{W;rdUjz2XIykEl$;71B~z?i z>TJx3O}e>}`znF(F0}S}V%8bbiXkElCC1-Vq>T1SNkIl+oSl^8@9X8_B2gR+45s7z z{(tp3;1r+PNf~j~B*I5xP?DZ_3;cUa3TAw}5&jOiF}evVMTH&k?rZGS&=$&P68JSe zeI`7&lO|_gzz1^k)Mzbv+34ge(JwA@^KhLnE%q9rT;0%AH73psm^IWk2iy?pRQnO>sfcrS!k0+;c4gaK5+}9_b@GO2|z;Zv9t3<4Hz_N1{>p{(`=+n4q zl_oPYe>V7|yO#m-Z#T7qrLMo4MZ9}l{{oYff9BPsHZgFG(Np=RtIc6 zm#?8*cuC@KpGsTWbRH28Y36;*M~`&@~NDAJ6yE#pXpX+$>Q<38_1_``ez_f zmYOyPq;((rY?4OTMwTrd*{JFPQu}Y$M0R;RQ=|v)5#cFvUiG=_@JX5YH~u7z*Ki}d z6)~d;7pimYte^|8c+#x8WqH{l$AaN%jqUjJ5dD6ffLDCt4Tp#fia;Is5Ynb?Cw3)? zh0hRuR!Q^9vR9!$%`t zTOEt!$KfUp5b}KZkeo)CmaeZfaIj|66Y*1&b$H=EB7OPzMweZnsI=jdaPn0zJUkUP zUTLSu_2Fk4o_O|D>T*>}M~F=QPwjbx?Zm0Ge4QjA1*~ z#ObgeEO!iZSEu&j4dl)IiiMhrxi>F1QnTmJJN7}K?yT2Du1_i6mK{h6O)dZt-Oi}M z4xWA|q?$;H|H~J>yhBBZg1X5BvpGPRx(+#C=!KxkJeTjw9thU=PKxedxx-y?`;b0`fh*(dz%uqnuIZ0O=k+` zJ4IYM0v~16rPpO=|FF7;Tc_UxgO&vK4vi%B9Nc9!vNG3ilPL(IwKNkl6ZGWi6(W$I zKSz#`8e}fW&6hDXBF}wGO^@xBXC^6WfhXoK5UYz)4Ly~P6K;bZd_140AP=7SpkP|9 zB?Xz48ZB*Wd1QQyIr(VDIao2u)LOu{LPcL6@piE!256d>vv2m&nOrL~BS_NvJi~y^ z38bH4G8mXjp6*3|I4e*Tii?Y-WFnO1Kb$5gJ#=QJ-3~CoRX}F zzwyIiVcSep)z~=x-D^=&${$MFlj-t07;?~6(s^u}LG=C(1=_Zv-6gzI!Q;D1($ z4z#zvN8EXHg4hVvEG?f(;qse$fr4_+GKfod>r-bdmyHt05Pd% z4_=7XolIp-I<}99efP0_784fHc(9n7p_8)df3?wPKuJ7L$r343JCp3#ac>?N8*ZSG zj=kg0gF609$7~lk1$eT4*{%$tol4)Yz5#Kpo^SRA-C0mcXw3SCk)2KXQ)%4lh z);#BOJJ97`n{M)N)XCy|4{yH4Ppb6J*LM37J(FBp3WSVahbccLe^C$hEGz> zw;@A+$Cds#_TN23fu*u){wul-Fcmf!ii>EzUxG91p6tz@-AI|`Ng*7uG~2UswpjqZ z)t`TGAF7J~0F9E&lfIpN25V#}5*GZpD5Z52LF^e-G5De_CHSDk^w2_{;(frmV(Fty z)TdBwi-peXFIpLV#!-$Kw^(~N%)KDCYiRLXvNvJcD2#&GbG#%Hjw#H9;@Ru%mgquKMi%i(0XT~>EVY0fj~?F zG8b;1CWjwggYmTK0EL6flM&qCVFH2Q*4h!mp~x3KzSDqG)zV8bo<+TKesa=^qdT#d z!J+A*l2yLfzpsmydP{^)8^Wsdf&1H!R49K$C zpf5^Oz>SxsU*6AIA6kKnd#W8IUm=_fZ5Vfn@EeCuFt|9R_#A=axe__=$sV0&&>J>A z+dqwupkKayqd)cKZHrzz-v_C&N^MKrX>M^X=FEEEwZzI@!l-xCACEzN?ksd+6frIi zO^MkwQ+{u%(Zh2g*GUG{Xxgwqq`Db3J0!HKY5H?Vd7cvOCBQcHPx*(4g1#k{U)fef zs=k^UM7P_rvnces^~b?B4kTf14P?&l>N=DjUfRL`Jw_8EgYLq~?`o1#g(F6@yVw=y z%5-YYF;%YS$F}wz{7w;uVqZQ^XQtIt$Y3(H$E+KITFbS78drae!s`1RRFpjA_k#%ALKNkftCe8(DZ zD^zz)*pc_FWo$I2i@{R0J<~B0g&Xa*+=eMUH7u_7T;@vq zme2h8+KT9J4yS)E&i&;{eKcxvSy(48OR9bVdChZl^l1G{jKMN%Yr9>Au^uBwb6u^$ z%gapPyS+~+IA(UdzH9|`Z8i6<6;vRRG(CBd;^?t{zlvqQt_iNmouRQ;zEjJMCoRYA zL_)p~*HcM{=Rdd_qyYMIE}HOB>HLH0JUUE1lr>Zevm#2#R3U`S9OF>QJA^h^rbAYf3 zg>HeIoc!tONlLT#lG)_=1@f*(tmT%=JO`(ul({)==^J(sGtwwjs(kpl)X1nTIwq#X zO74bo7-8&*l*yzGmHA?aJrAb*$$9q?LeMw?xiyn~RJ1s?Z@>@3*xOoH*ju1(HDGBp ztxTwe@QKp(q$!dURm)E>Tua38!cjxnE+q`)Rw4dspf6@a)zmEUr4nv5x`Dc>sfkG* z-mK#yK3(TQ?dJTv#&p~Lk@Z>pPuDik_=R3fsl7%ts9_q{lsY>O=GVJlSrK5u=vEn} z%fA;`zfGwV4w6{|6RHDSW%nQb*--bwkPP1aSN{pLvHT*9;Q&NZ1~tD!sMI*LLEm=Y ztWT(n1EtBDJ?4Luf&Z$MW2XF-zW_vH0y%Nt!p$Sp(^cB*4Gzf5SukpZ9=iL8_C~|3 z(fps>O~BhN|u@stkJ8Vo8Qnpo^2I{iH*@~+#G^d;l@F1$h} z+TL}E(q~`-{E@t{0>96r+(82e<_R9aX*h+mtAhSf4*pYHTsQpvPTr5f7~K3F$N%%L z{;&Sr!vu_1394$!;9C5sxibAh*1p7=1{jjS+Eae*1OAWpOEn-ag?TO%Ej#wW-N#{- zERa*;*c13a>DR;*c>H46+7$W>P?_t-B%b{wLi8Us+~1oI@p z(a_P$vI)GAp9Miip31r$KsUfg$xOJt_|iYw`>!8U<~3TtOnIJCvHx7$mPL$3wj!x# zTe?{M#j}5tqx-Fy`QCqUVa%2z+I`M#FNwX)TA~nIN42y>tOwFt;Z9$r@ph*D4vYEh zU#wR_BXCf?HuP>1rhJ^S%MN+o+40vuWJk#?tmg`$6FIE9`X$yJ4ynJFqE1zwN#hBwK=4nJRLRE8JtnE!X(zF3$ zy|hua3o-e@EwD!`w_uW3?!*U)>F{1#^((Pyb;WSr>ePk9^!Z}fnZ6;sQNQGjdy79bBNu0Q7o4?+Er#0vx*4~^nd5z-phD(pwe^!s-}A@k zR~f!n`KKGSvUl3Yjmj8k7w`kt$w@P;2Wxh8J@bAH<|ox>yZt9ic5x`OP#$u zU;Ael4faRW{qCkXdGq7K@2X3yjewc(>eH`-!%?Jy0l=^m$#b5ErtcqhmC!|)tSh9Y zxu2}p@AZ8cUi|sH% zzC*GuP3E<(Pus@oI{ZF9kKXnfY)ciF_k>HkG~ynt>^CsyMPv=k1P-?7ztOqLZPD9B@7j9o?nF zuTE2`yk~)@sh!=vJ#z4Z|S-fV{xz)JxE^-et;Vf^RSUQt2qwK5Y z{aqZUUVn5==xcxXkBjzS=EwZsm*~!Ve;u{mcX+w=!}cr2!Sqjf(IN;V=e{hT!?`$Hf=!FZ@{zo^GVkpBv0dBCpC)~TN&&+xjzVrUPYiqIT+)5p7zv2^qI(l+SBI?rw}~~r@~R69 z<7B$0^8pk`{uYZzO!NN!GBF&6ep+AWDr|j^d@{MirFpvT-j6{jUz?viL+|Y`?~sKH z!|d(2SZ93(nxdmBGXodz)2MkwKvryDppWA1DkmVyEXay$FEn((Y(qH2LU#fbguJ$E zcJXR@xt~t?na#oS3Qs9*3cB|fEwP$%I(hmu@q>Bn`n-Ud9=3kxlBr)-ZUbV&97nt!kphXZ}(`5{lS~=DgV{lj~3^N&F9%ORw-PX z`J{YWABBGK>{w~q2AyIERLl(=_dksviCTa2yr7p3RLZ%yVrG3#dirVji1vWwfL5dJ zvD-KiZ@=~_r=DsDeqVjXc^J^9xu@c0x1?Ho)1XV%Uz0C=Zy|@4**VI8b0Q+-5#JIE zC9hSoi|o(k%WNF1Zy2<@-=$ols>M7!lV}0ktpB9&1}_iazCDFPQ;@=?%zfK;9HR&K zY{f3t%Z}An+|q0-N{{@WfL;d4V|%Eo1Fas66e4W0TI(Dox8_ZuGZw zjog?MQE)9|Kh!Ew>EKc>)u}m1i2)bY`P<+tk-baLI{ZU)Q^dgWSF&c^YBEZ&uA&%Z zdTX`(8u%dV%fqV{4%Ul|<$Rp?*SJQGZtuUR-(LCY2f_9RuWzX73BvaNLjV1U=cm6C5J8s>cj=Z9ORilJe{6Y{qEQpHR)PHOw*Rzr%^W3VYdgq;)UhN$lG-4dA#E%s<{&uKRB!yWfbY@ z@>S)!8J1*ixIfg7nw=Ur$*`t>cK!TL;s^WB)YQ}^B=@Liwe~PN{Ae`hyos{&x`{Ys zgzrND0&NA>l7it8n)I+KrG!k;6SU_d?&6y>F6WSMC|njQliQoQ?M+;d-R$?gz%vfx z*`TW0VYY>QCzC}+K|y~_)q}^q;Ag4NAfrC^!7?_ue&=&zV`GkkD;m&TiJy`D;KwVe z{Ne8C+x1cN{+E}GYW$Vw!I|;*)1I}f8DCAXL;EJL*BT!!+~wlGnS7(md+hP&Irexu zpE57Xi_+;}Rc~F_9?k5(kL+Y$6qi2}a=#gPVXlHeOIuh|b=%u!m5{$cga1DN4a4U+ zD7?L$CvoEXQDJ?XYr$vcS=kI@6=pn{!G$EDI~THSi)r48FCh@;-Tb-LU)vi+M*VP$ zlkiDjy9Nk&6T1vOo*pkav zlFDaqlFgnn zR%a_(PcziHjN>yTE?#wiy`sNEKGb0{cLKRc9huvJgD}D#>80}NXd6+06$-!cBEI}pwlC+;SVM64F|Zkm393HRmIRbBL`p4vH9 zI=0_Qdtg=hBPTa#cJEt2QaX+%WDxQO3Ps^7zC}9r9nFoIAB!)&_oW3{XPZ$WP~l>R z^%{lN#wU{`9gwLD_^+THS~?_;8ZF=tUIviCDN9?=b5WzLX0A5T*1q>AUPhE31FUM| zefL@;BBEjtH7dYS+gkYsYzC8NsFKBiJT4O6AlMX5a@yGN>z695}Kw;K{@*yf;smTdJj z-3hm9WwDvNSI~AZK*k_|)cTBIB~g>*Q^H8dK;wXeu+n?ql`L7>q-k*)ycyNYkPq1L z^7*zhVWXwOh-OR30rJiYsvhs1#Ze+B2Jx}9^s6eiF)x+7lq4h3(IXSOS|7@cnxD7) z{A7DeK#yWrJpF}5d@e-e3-ywKUnZ^F`VFZcIqO9Eb`Kv(8c-MGILRh6d* zy01nd0T$Sg|69ctWIduLfo&;`)W!I)_KbLZ+4sW7TE+o|$q*D@tBRW!gbgl5IviKS zlAM^{(A|=2GZsDwGSRjanaRi?a^D>^PUj~uGj0^?$!j5YY5!H3`Fl&gSa3U(>q?h zb9FP+Vu%X#S?{~8$afH0a+F@j4SC+NdR1v>^{49arW5|!Pr3Q{AdDTFkQ$eo8mr!k zRVgj3JP_#uKVN}Rqi1Vq5@fEPtN)_D{EckuSXgU9Oo9zBCSM?OE@W*fX6JD~WfyvI z0PP9MDjKl(>91M-s=-v8x^N3??`n-0G2AGNTZo5-yHvSwj)VQGGL|5PzEXMJZG-Y}x1?-yUmv7mf*j9l&w69ezZ*Aj5K zfNDe|aV+{YPn@#I&~1GI`vE}b^vl9?j!bzh#_BoutDWAy-fgwIhN++?b`_g=8=cAI z-F1bM_@$1Ei@WvmhPBmd z&tYwSUxE*zc4Ff4GYcYQZB54KW9fWri;tZPNk+s?=YCr=3hEU; z8&l(?kHsM@N=wh}tNkaOpPua7)DrlRD=%N{uyas!wr-k3AL?%)!-Il1SX%~pE7 zjGdO+UwE@_I`DCjATkwvBm2HVC78v`(oIuNz9;2jwW|80Nqa0NjGQ{htXIMW!tI8E zn$HmVo_$r1*yZcO5-S}iXT-bLROazNB`!R5S*h7s_)1%i*N1u@4U%=rHu2H#+6Q~) zP0dp0)v}=Ma9<7I!6;`ZMqN&Ci;5TEsd76D4+B)WN#seI!vtMLFEQ(5;FtMz(uJLf z(j=w{Q6v^2TQ6m7Npbao{7WL~Z!2qn73HeZ*K{A> zycypeU`x_FM3Gy~KCA_*ciFWMTT+WlBuv#3{L)XDSJ%CJEuy613cvOy7+P$~Oi${& zpxPE_bnsKvF>Rvi;ES2=risIhi|-oyRQPfZeZSHx&;^TNjEbdl>)`v)sL-$4>l%T~W6$o# zWru*!{?wz}jYr}52@4Y*6B=L7{U=#@z6ODvT~@ET!%KU$+%WOmJ$WaL+goPZYH@MQ zTgUsl;Z=H*<}{rB9`gk1&Wu?&i5^Vz}et>r}1_k zw_olSYgb-Z2-D%V-Op&y+W3f+f8Hr4oBk$a$6!25&( zScp#Ne)0IF3)*XRwr5xU;mK(!qL-TFr&0vZI8Qf+Ce%h=;o;n2M>LOcGr}|Ql@U%SSn8{?o1UYx`ISPBNwX{BSgWDTP8RpfWzPV=-k*r zGrr@_E%)UEVd5h?u924OGolp{mdASs%Lb@sr;0e`9&4zK{IFC>nr0vtuczz#kSQNK z7ae*t{F3dPvKl0w+Y8xar)|7sNGd*2yY&peb*)xLc6~bpU@o;u}%e6!Ix;yT?W(&-W@CBOrd@ zm5sz9B*Y_5go>7ty`+<4cu|@HO(Hb+dPk6|C`E<`lJ5wX=d8)+!4cwYr#L}`!{6afJVro;R!4De$X`m^r zW#y@)Ic@_F$3(d`J&=oOhiScDvT5dP{jp)r?H)tPwBGzHvV@!E?xFQC`qR~=02!iE zNhKdye1^}@bL)&7_WF)MW6n}U%Y}A*{`TGq@i$pkW0yB)=Um52Zq$~;XZ$xCU&v4b zlS|2Kb8XStI=rukHtauN)KwmoJ99fcdT|~sGD!P+`VJ>gb1wPAgcl{rIO?_aal%1)ymac{7)nKeuX*`x_9npYkg0ktmgmUp*xl9h9y>MKS5YGi!m$tk-uW>hA>li1 zVurg2Orn;~3S$PbqfNJgVg&j(>oBy!R-vz1Y^ZnELo#$GsG(XD-&Ses-qbcuY;6T!*7 z34H*>R$YlhP@{&&qR+2g1y1h922k6DjVwo9e|gWfjko!-b5K+A@br!D5f!!x?bN4L zzDTO~cu=MsyF2o_Ki||_DjJk>00*&u(^XCoksP!oPOLQx>f4bg!!l3`RXN-n<7;<2 z$3PoKN4s>r_YIbDy>E&VRo=A0-H-2~%(&U!w{PbqmB^WzKllXCXzz9CLp%3v8Jdus zFeTL5yr*JB9dB$=BfqmS)Ic~j6d6ZZH`9u7aWnE&uETE*-*+v zxmi?-eobfP@rrE!n0?qE=DA>CQu}rG{gGCk)y$Q>&-zj!r*umBc}ugvjy}su8O}EAQ%#sklnq_CkM6$M1)YI8Qd79uOxWBw% zmAA<}ZxAxHL1yQNU9RbJzH!Ze6x$nX=oG+fv{|o;eQtD4^i14_0e#%8-+;bHS*AAk>o6uOVTNoa&oH* zdrb|xQ^evQ>XfUY-N038*evP1{A^Ls@B~}&}F?SMU zO!mQ#>Q9rqwY-spe9%M61d&Mbz_SVbhwz#h!sdauKUCNEFYUE(Kzr@>4dzU~xEQY(D2iFb z7r!a+^4Sv^$>`w+`6y->v;S?}>Mwye;5yG?PX7HO1Tf$K(qF^-E!FlFs6PF3 zb^hRTK=iP2*c*EvP3(d>P-YrcRM`-iB1;qASi!9VuCC+4jaJ;!04Efk>R^NPbWb~xF`H3=q*JG;UVfde_&9zkrB}(L4+QSzFlQK zbNZ62gM)>Efq$=2)z;*@YA-UkrZbiSkBpi9&` zF@S-AApH5UIyWQ4N?#KTlDyg>gX-!p(TcGfP8L5WDfURb&Hgk$IQzQBsxmPFf7i2T z<#D$ncILt`c7o1iN;=0^;04YL&!0ULIOOz-3tOs=NBzrD#Hb^b4N*C|1d-xxVQR!L z9r_k}M`s>ys=hzC#=Z+6mga0KceBU=Bw>wgOi)L&CR0WOdwW_BzPGyeo6&BvvD^nY{-RDRx+$Ttp@6+}cxL7>L|e&`RoenLrzG6*GWUwdycaR^_Hri^^JyJ? zVe&c!^qSbgMp8s|PB!A&P4M97`nK<;ijk#T2bQ&Nw`uq2=qO`+)Pqg+G_bmXt@V2? zN`k^&PpREhX$lkPrZMT6!~?Y^l5n(U)gZAMAWM8>RYw!{lu7zchvq@@>|SP(Zs}Fz zblg4X9@d6<@lrZ@${VB?VC`oQdSI}Fw3!r9zrjT5)}x0W3Wz$9#JKu&^|Zvj0a<#= zU()aeK)1w2u{|-&2sV;8xgMH9wA9866_vKe2JxaU)>HR(QD>mQt>6373#GGo)1Jo$Y3b2DvhYP6`A$V;z<-AHG%UJ|h1D?8Z>&HmUZgip7kX zs{~5^o17v!hWNov&$doAmsq>^)36gEMGarx(60(*n@Ccqu4jUCN`{AqhRRHbMENzH z*vX4ucldrV{2)IbRO7{-!WLEy;EI*IzwJZD=Y$%KhML~CgX-4JvuadAnQS8KaY5m0{e*TE2{5#$a@CD5 z6xmLwxzy3eYBq_gP{a?K#MYYjQElUKV#t`*m>N$v`vFmAFTnEwbHY>v)kM#2NLK;+ zQ`MzjaTQ7=M!f;arWvY$BM^Pa=ozR+SefXnFdQ;3U~M>2h1L!ok@F9`cs=4_W4JVf&pK-yyT+j_g>>5U>d8J%d~DteC>FaPzR zEcA+niT=4PJ+m!IeI!wxA$NHH-b`|%22pLLs#865G@UW+Wqy-KKCbZ+1uHH(Zm>sC zwr!L2f(^5|60@sDdBSjs)a5xcU^dR2camz(>jBjyz)+j~WvE%rjp|IYVpB=wkw?l% z6!&QPU;1uD)sZ8}TUMg|z@yZ_PBwsvA4f@3gZP^RTVaEO=1#{R+@KnlE8a9o z=EKc1L`xEoFUt?AT4wex;M?7I)d6=j;KhkX!UEy&1ewwq1}Zqg(u&tqU9($uXYYv7 z3(Kh(L2o_22%2-r7ROlcJE{3gTlhnOau9^`kF90f9LXUoWV1pIlx{+ebgaHbA_(d< zm_8?Dm=uZTC3AIhadQf1%ssd1ez^nT02UOH@}5%<;C~JQ`w3-fx0R)qAB&h|ld|1p zQ_s9P>m(25a>6mFF|)`QmRCJH#p&0HZbU4gQAO7u$k?#}oF*>Gf!Fp3!7Fq1=-hz% z*o=8Bgml@l(n_*{-ccU@{7?Cc`?36v02q#N-EC)g6iiWS6R1jyNu`t`p-tZe8*D~Y zz91}n0+`12^`G0Di7K-jZ?$lM744so^2Zv|fx69}8DCb%q`r=PW0eSI^V292`Bjf! z7ZvZ49erbimm40CwhJf&=~W0NX;f@SVVpO5=g;ygFC5gw%8|a>5@jSNEkNY+qE2#l zFqxJA74=qL$d&vYIvUHEGA5WP?yBekUq0@ry&O<5;>117X&*24?w1)Rn~hVV?lix- zcdXIf?=_tB*BTZdgCNkP1IwPGFdyro3zZM4ks*HX8Y&C7SOl1Gmf!ldU!4dBQxt~{ zr{gA#jpCfNCF&Sfj`>HE6iXG~Fe-u5TKdIG)^0U`(}(f?ar$qyr^*YM|6I}gUx|!r z-hc}ftzUXmBLGJa8EXPu;w{gJEW)2HCq9-M*wS@08t4xkHydIHh+)zeK1jpVzoR~P zJn=CrdA4i;gP`Xg=H=m8WwaBxOH;0yJgkbuR=MD%WKoBG`tpnZiW=y1p71~{Xy z)v*74;(x!M|6UaTZ)^pi#o}L^%SsCc!qyXu$bDA9*~!=uQC_ZSMW2tqt?c-zui+L!|1$}eBqX9_rF)7ynw_hwZw^Z=fK!8k85bT*30crg`k6XQ zGyTKP3k|WkBh1Ts=qyfQ3lm5SYl~E+HEY9k^c!-IBy@FkSK7KMQMDF46V5PA%n>7{ z7opzMJPidMRrS^E985XM^vZilpZ#;3I2WY{BTxAti$I40EA=>GXmtm}y0hr}?r)WG z!SZfp${LOpT4nWqg3p4R2_Xw}3-4Z?c+~5nCPyMpU=>pQ>#N<>_v4amjax2-hlN_z>;+@2#jK2sV3h zrIPfL)|{vE4F^YVZ_vkNKq_@atyq!@Lf+@4=|hqzA|BXjv9^inAL#HrtcO_KR#8Lc zGD|C`%C9}|#nrT8O`wl3@{do|h6~i23pU)j*4o7%emZ;RD&8O^am>7_$-wocD7S+0 zM13)rpOe&=QO(q|Zp1o%QR&6N(PlK1%#c0SZUqYq5_t{cYuwkr7O2^1Cj&P<53t>G z28pc6GgY7KtxbJO$PVq}Bn7Qr4~$*f`<$H}WpPgo#I=cR$8ZX8DFNODxnpO>$ZQYxhG{GN#@RnZ%C|KY<)3VA8##>k0PDP=*0Ypgci} zY}9aGy$MpEYGibX?-WkOIod2ZiGw^{5%S}Q%%Pe^6+fXWZ=DL=T-wO1b%9nzPsgrU zgGv9minbZ-tiym|el)WiFQ{15v-kHFLlrGJik^*T4VpelOeJn?bG-S|Z z(&Fu*>g6L-whEuAVm2GYXJdgnQPh-=_2u@*B#HQna5Ydl`x0@+;)L}$Frq|mx;JmA z3k8SOJ>z6pF|{c?Z^C@eE=_O0$*V*+Ni$0-<ByHM`O@#VKgMnUHn#pRL#~&RGr~LFMWwJIylq|5#=d1QJ|te|OX-I2w{ zMb#A08HXP^TeGGjPo{3%E78DEt|YLkx;o8AqY}Cx;)Aa7Xux@a?qnLJ9;LzTipxap z29xBjGGah3-Jjz*gFjYSIQH#Z?O%yefyBA0afYxXAf> zRx^5|vFJq&KFQ13Hsi~o9ftB$x+7Z#W|qF$nd!PW&vxyJZ3}-?;>*!7Hzn(=XvceS z!wplZ7mys&S>qdoPLNHSKBFlYSP%@9_ zQi+Y*_9q*IqVOxLtYlt3Mjh8ka<0ZbK4SwKr2)X0ZPTVUC63gmi-(++gMxznpe)JW zU0V1yrqAC+w?5Fi+d&8SOq`D)_v08=7fQ%-Tpvc%1b~3>yv(EN2?~DkLG&|q(sL;q z?YCuao_5C44EcE_GEpwrJm*&I$SDh^oJY0V43PP(7Zc%9du;CmIspjxlmFBUf_&8# ziWK>%>e%h=L;y~JKuBM0N3)Z~O}(SSKA&7iCWp;#&*;bgX~Fcl@3kR-d17YD(htZ< zN`{~d5CH|wn3XPUqS`(~l?PylQYh?P;#M zs+Ih8@}?|ia3SyRMVs2BE;JpBfbi37Pj9a>K!5sKP0&`mS<+T1bRIoLs!EZ(GrOwF zkseh1KG+*va$lJ`Et!z3I$;h@^@0Q`jKI-+BQ!HLBW!AQ{6M7^J=cR|&dDxLjaY8e z*haI!*E+HqQ-Bj0k@z`Ny2OqM;)t}Ec8)SnkB0J=ATCv($AZtao-w%iJ1;84q{yYO zCw_;Am!FFB+c;xYiK%4HWO_VDfH`lQ|mZH<;~=~(C6WjjHPAvMEF~1mD`FE zAP#&Neph30Efp1q*8x~~qR6Mzn-hF}$rs{AcPa69NKwSsXy`+>R(pFyxk-KZnW674 zMP8dg>YYz)f-3{8&73rFG2K))dk`~vpWdQ;dMJ2Npi=q*{URw}ELbe3Lr&Ph*~rQ< z5$n-C4h>&L+UmJ9(TkTUlCo%gFOnnJLF^2+(heY*64LLK6)n)pp@qJ{PUrW`hW)FL zdaxvA*_E?MdRp5@$yAk{hV95r zAFCl?Bp%BAvH9R6CU2RYP(J`8;ot~7!dIMSD9L0llNPrO#qgk3<$6v(0v_gRm?F}@F zm1H`kf+QxIC)N#XD=lx7SO$7)BfSMWyY|MyM)PpF(DyHKXsruuIkbXs*ZWj38%!9= z!|f-KlLPZ$cxWr8rM=`z#B?qD*RA-HyYdBoe&g4Jri)YXTnx*4mV+CEumBAnj@RtD zo{)M|a+D*&7nJdMkv92+GGl800D+5MXdB9stDy&O$i^u(88uoU(fvK&21aL z4(v!#V8j+Y%~M(e2rH*7LkbB~^bUck60fmW1nKgFW#Ol&Z(ZjB3W>?`N&Jg#DG<)E zN?fzbt0YmS|3TVY$He)CZ=Y?Ug;Jz=@!}4}-QC@-xZ4b_g+hzF4GiuM#l5%>?pE9# z28W&YyTA9{O?Hz__U|W|%yV+ib8fk=&#hJXDj%EfXA!!CAl}RqTv%~?@9AF2kei&1 zh`;#{JY8+e}2^$Q`scMNkP>U5pfHbO!q?KBZ(>~m;n zuSPDcj!9bBOk&Cb(x>-`3hDK;{_CJ;FsjA-5m`GieCJI)f3sA zDY|JNPI$4T4)A~3n<;;4hJ&7>oQ2x&=%~{f+b-)Z31AKn^T^#4&bj;x-*N_YK5&rJ z(loiKhl75)HHLzdKE~;EORchJf2bK=_;dT!-+b}?E~a$H4|{`T4vf3cJimJf_p7F2 z$stlvgwD>+Pdv@9LsMOi*oJj}AGE$UsysV&j>8)SJ zAVvb7ZK5YpObn`~BGQRb>e649(t&rFx)H#eu~MQ>niuo6ai6q0-lWb$`PKhcaBrlo zRjRfa)E~G0Bp`8?xaO)%>ZD6>JD*un7m`CDMaYUjeKAeKQ?Y!TELWD{CT;OS+Ly20 z0vpX`j4gf0YQlMsw^N;$xJ_!}WKd8B%8z$SuJ`H-RjUY8Dvmg;Ct>9G-p)WdgVHR;z9t^R9>iIpTQM*a{+hZ9A9t{Jc$Kv+)ufcnmSz}|BMYTWO4%flUL*ne_%mbL;&+G8^ z`e|3o&Q~3xJuxgr4JqT=U!*lw!AlXruf8mwJcy9HZF)HE$^(NE-=+T=nY*rCTSA|v zh1r|1KBBel=;%#Q*9<1B(3FN%J&Bv61q$m3if?Y>`e>*+G4KM?F-92PY)Nn_)3H$k(j8^x+qi z8%NO`iIeB+Fzmv`1{i+HRAH6d{=S|8M~+4OJt|e*HIT)q(|odMCIpX%+Qi06Y^v9# z`0MmRp1^cgu3<)@59A#tV$k^bxbPUcB5~}#xq+z5C=L7-gQ%i}l$si58=X+XboBLQ zJgR$=Y7ItB_)^Ov?;$HW888I9W)M%yBcrFNV%#++5m1_oT9`OVv>h>al45wA8%PO7 zRAe@9z`-sM_l!?LQYbWlH2Uu}&HQO7_`T)z?@{5^^R4b@gmz zbYb8~3I17i>0Ubvcc48H3kwz98}Bk6PHyFN*BvJh2UA;2O+6Q{)30MGzkf3h%jd+{ zzAJ}&Rp1uUA`ePn3&(h}m({xvMLT|3_cby(;F??9lJB&qmwoZNK_8+KGkdU!qx0Cx z+I2MYec42-TxtgHLXzt{8uzmaD%zgDGy4qRm(wP_{TCgD4uMok6J2&az0EaUOzqWe zSSFc;v^r|(yuHzes%#pY7#O)(YKl_&G$S>nT5b!l+^^mr@otAK*hxwi%gPqUq`gzO zdVgpqXqX(EjE}1~Jf__1 z4}*DhFQQ+WX!_e5>ZagkgGULEGmQ1pGwt^?tNVGGbBl*7vR7Qz9@?o`l4F3Nl%&G}B1r)dyL|B5~@sw)}?!BSVx0{pQNy z7stIMrOcxvNJ=HdEc+-If)C%Kb+#h7_<<(*d9*V#Y!yYIKF+M%qQ+6$!l#Qvgu;;Y zTFWT4`V^X8I#Nq*^J+z4{`%xVUf!9S1l$GedI?JeUwpD$J4y`@u@&+~i8jP?sxQK0 z-0=ATXZxMNp+p`nWRwiol@E0R9q2VwqnI(2Gt5KhvfLSv8o?$N_<_2fqojvS(%P@5 zTH3^W>d)tzrq9!~Uvj^Xfd~t}T_@Nug((aSIhsjN1hAK^=Sc+8!Yz zDJ7-g?r6QdcF%Y`tU-tYM_y0KZu;NuiSNfO3zC)tVvPJRdZi3KPp3%yoNLxMcA%Rl zb$aar7)fl$$-8m?H5nCnY6Mgc2F~OmRIw%2wMp-`XbSxVB9Xrb`=tSY+IRf6{ebad zFy9=Gzpbo+b%%kJiM*i^y}Z8;Y|Lpfeube1OS@1Q9%M0-qo8AzAi_vigJEb^ z<-^`1DnQaSAh%*fY*dnfB)~KWH)l)HFBAhb#$G%Tk)A%k>;dE20%cn8dIDo`65IZl zhQf-XB!@OILD;2QJmw_QzG!5-ZH|g;xrUpT)E!lRa*WO1RsH?!ud<@54aovwn^=HX zX^j$CmchE>c=O`UhsPc9`0bL4p$Tz*D|}6p3_Gi)oEX?r+Yji8nZ7EYpNAPm@}5Z; zK!tNAg#cT2d&aur?ES>_W5SAWI%23$Xe2#jxqUZuo^QT8=~F~m)KSRveC?L17j=1E zJ_X%v4@f#;aM(}ycMw>IAuJ<`;Rfxr9j0vdySO|{9dfhrtY2#>v?gm>(XA`Hhy0m4 zS;S0S=66VUhYPq$)^om?G4gYD%T~lQZb|sB_eySQQR7io$g@QKlXQZN&$^Uir+0@7 zXXsE6^S2Dn`KbATEVz zZBlcs$b4kY5OEFV-q<-fIoZiH5b8=YJ@&+BA%Bo(AL?5UuOHld|5K@73R5wiH`wh2 zGf92kQYDvp#(KNgyql4R5j6eTQHIBN5{@w^7oji_?O^)eFs__aKibRdZfj}_i7_s2 ze@Qc%TXV&F?e`ZXj&-vj#`t%GG?jvP;=JXS$opFu5|9(y(W@v1qWT+Ju<)V`109*k z+n$e8AuKHC#a0v0;?A6}oH+TnxtMNOR>Gnl+T6vh*;*7*)Re>2NG$+$ADEG0hHsV^ zq0%L)hjt>n^Vw4Q*b{uEXswdvCH50I@3v#pU~Z}ct1ijKsnn}vd=%N2naS1e)xIx{ zpA17v+uO6SpVSF*m6&*4SdB%k2oB3fU9wEqsPfi}HxQWUQ=v4+#%`ljnQi-=Gj4>p zIDw^HUQ6X|T09XD*qV#Mrqr91ZGfVgoR6T>AWA}+eD$lkN!?YHG9F{o^)cugPV4l` zX`tT`icT)H=Y(1jUbQ&%^|>}xKhx6d*X$)@?{6CTF<>??9LX7J(?uhKKF&+AC4j zylWL^f3tSQuX|Vge)9A328C5yZ`-_3?C5b7JCf|&tj$G0 z)NHOQ*nNT%&v#^98SwL4uU1xi)*}J3q@Jepb~+0IRk|!w1BpTT8zcNqhiTAfxPIt__8(W{OyU8igsHA@b023a@y zIdUjOF-A7Oo^f$Di!~=MM>N+<7~5g#`zDX5x3CsEFZ$jZkV4Y<39(e5jo3RA{*8UO zW)83TOT9)*-4M&TR|2CRCk}S}M3%+^TW|$WovbC_@Vj)`@`=4`ZP%P|$wHCsZq=-d zVs^|^TUG)Tuf%IvQC#$9-P-wUQ;FhPMQwT1zsCS1_Pm`BKBPs=YbE>O3E;f@+X>%muYComrx=%8 zAi|zrF5630p`6utb~pcp5N+}cVJwH-oO5=o|CUl6MJ^_EUh56aiyH&bF@-}u8YTAU zw|x8eHPn1^aU)<$#TW8&d~W8wA3mu-*sVKS|NBEClCc@z)^D z4CVQ**#V{+(!b(Y+_!%>*Z-Ri@&9l0cyeMRj?f@X{|^3?HtwtFaEj zX9a16wxZ0W-Mjs@)7A6+F(K}zrl*Sqv^Af*)#x71>=SqYnicu~>4@E$!nVt2nC|Vz zW2i_JGWX+P+6hzU)8*wr7bh63V^-Td^2b2QE7959C!*rk)>>i&eF1@>Dl~LcRgm(M5T6`iqPAB zhAY%p6=JfC^e+kD7yzl{#(wB0`hz6Sn%=v0Yi`Dgr%pziX{yw@6LGmMOLTHLUZf>M z$?uIpz;i%5Y&5Am=VxB3rQUJkCToJ2)gCX~vF~q@)k6HX-g{sa%ldaV zh_p#Ep#$FP%cov z(9juQ$M=PA=94UZqS?|FeMY4NLba+)T^UwyP}Ar?(km3Lj%eenk4?#OzK0n|Zz<21Is<%-3^M(Bp{S(sLld&K>t>W$ zSMztOwp3gqnK@TBb&IK#ApHX2eu@1F5$foC)#7qKknvc^;F}zKmGc=J6kSI?@Wi+F z=#RR!-FQF_J^L*CaS?kS5c9Z9LiE<7(-hj&_Q-U6Chm^kWj0+Dyth$hnILb!`)O2` zacI}`{i+Pl!(-%V3##W++@xd6?SwzfOk+5%RVw)Kywc%#^?7<@dt`nEOmsG3e;UMz z$c?lF!NK}_fWEhf;)pAEs?O$+&tfdP(vtdsxNjFmV`pf*mBZvnj_tD?|g3{9hD9KoRI{xtq(iS7zq12 z5nQ^?wx&nf3S5=V`+aGG+zL#@wUrrowj1_b&$~$k4Mbt~Ht2d<`0O~EIS&=P#BJ93 zPcfPh;Bxr7=oT_a$2~)7z*-Adj+vXvw!H9WS>SM5qzfIi6y1pH65z)e-s8`(G0PL| zADbDS>78LF=U^p6+LvCaDx=?ZarV{1C3*6-!M=#%&vdex`mE_{g_qs)o1EgSl!zLEWLQ#QT1xs`=XX2=WH=JU z9oI`aq=Gx6^=*t4|5AD5ZDilz^Ml-U{WZUvwi|Ht_O|(s&U+x$ZPTN^3FtPiS{j6s zZ^&op3s`CS3GtxL#yTH#7V7Xj#7uMde5>kZ$Hf=%98o)8BjnY$==NRuV%7WW9OjLk z*Gr4IB(9dJ5-0i5@<5y3=~Ly)eWt&@`;?%GbM$n(A5{-Fb#$xe8urWeSZRg-LYw3_ z-*nOhu|WKrroRP$Ct(Dz$c;8l^Rnc_F&R+ zZGx8hNEv4YL!b3QTtUHjacQv!u8!5A!T1qYdY_a85trK z*;!$BKmBRG0gX~KGU&(Lnwpw$%{XCcn$PtS16wei_mIlmpZTLeo4&KN5a9_UbfS2% zvLc(D2Cf+{wMjL6c+|Ln_mmuyLabltno?$0xELlQxv;iyEU;7#_t^2v)8q7&yR)WR z?(qjKH>AtU?O`JYc!prWB%8bOD*-mjk-<0hu2)xD1=~2PaR*09W94#WIOrercx3l~ zU)e91K$OMSuNHrAm65YiFj2R8IT>%ss}g{=FIQmGyrJP8l~v#VR9^@$xbR$l#`2X!qzh}dN; zWhlbMv7Bn@?)FA)*P~BCWrkO3D@ZNXb-C%RO(FKWVkq|>mqc^R_adS=k-Ou&Cit3( zo>!Ir2Cl;fFPD30tHH>J0R`VLdKjF2AG-S;+o6js76~;g6`prbvmCQMk*h|n596CR zj*l!6)+!K{%6E~$GS|;04~J`n&WxbOg<Tf`jj1Z6!L{i<^sRNJZ5kD0s}O ztegUOr=U0Zp(%qBb>P+pXEOcMT1uH>x}jrLk=G&3LN$x0y?$9u(+>kZup}aiOgXU@ z!TrFwPH&z?QUn*P{CmaWuuHjOhQjK`ZUL0R?Bd8Smg2#zk7wQl1%z5z;((-s13ay1 zc~b%gUXV>0Z`ZZ1}(l;m$fHuFq!kx=p(f2i_*A5#bw)^m(N}8L8tz>$0^esZhLjCsdu^`EZa(}7> zIM0QXN*OH&E`FGc2UT=%l6KwjJuz$LCS&Y#ROj8h^ zAtbqcs(EQVX)+oJ6w%AatCLk!yQQBKsvTY-w;X6b5M?RtW%asv-mNse99rMh5!hHb zt>WbIzGr@E@OuI_=)Vm77;7uMs&^CaW8>(CzShGJ3wa^4vn6&`LRNy(W2S zeXfhihMupf$L_82-wz;{!!orMF zrI_`*h1+WMY5Q;n=AkOCE3Pu3J(FR)x>{mhPCidCZ=hC)w+-Dd(>J1IFq2WMfR72V zGzMJ!&v*p1y^sBtW0MTU{0?ht3vA-z;3$6n2%G#)PP>x(re%k3XMrlg!cajs=7qL$ zDj++y9;dVD@!rkrl)H_Whlw{`+h9%JGzt(bx*p+efz(X&A%w1^umqeUUbZfW^(bp% z=&A4!BTAm)x%AB2zj*uf4t_pG3^LxE=?eWrl}TJp_<%Y-QS(6*d;%oy{IP zc)VznI#+lXRdda456tSlxV8ZC^$x}zkyi3`-u~pY_rDKDdH5B}GZJTt*&sk|akEx= zH&@t?#J9^ErC|OHTw){fJ@2a1D)W7@bK`L@wq-#M4O5Cze+R>;U!mCG@kWcQ%^> z4HZlGz0opoR1YhQsP$s;)}O7{aP=~u#smmD7B83ADs_DgdDyPEc6r;*=1R2$+*_NB z_qbg91S`Q4eRo3+B^};A68%L36gxMZSnuFfQ)IzlJj(QKbyZPGMm*S;>>uMuOvH-xUwKc2KZ@*g-x#lnYs<~)9xkmZ3dMW$8q3Y|-%~{9r zJ_#FjiOuaG@v&1ksha#D(3U(6e(~6QFVm^>FT2Ttmjakt%(iENmT-|$cBw|7pb zJhgvzz5P!Xn*uKWVN1|z*tlP^q6jKq0bY;);gEc}-40hOdu$J(ot1Cf*IU^Rol$DT zQDx~hAdLNDOBUtWxKpx%4k`yXMVYFB9%dbRWJ2$6n>pOu?gwR9N1qoc-r!M>9-kyO z*z;V?1Y|<|03v`sdhV-DXyK{vN&h#8?$7Bu*tzzdA z#9-+7aA_1~A}yuBf(&{_ z9ARPAgb^eOdz0Sv@|OLDJ#%lByw;9HE5zG36`G_F*Nb;Pn|! zviNGmCVa0zf^ellT4p0~ZY;m84H!LNTRieaV1#6M$TWYmpGwVn3O#cjK=@JnQ;z?3 z%Qd>~AcH9W4+-?{ZcDzhc04B?3Zsb4q6uD=607JOsj16bnv7*;GL}{e`A7(A;x>67 zFS>fWz2jWcRLDubY<|q}J~_E&K8>axgD$TJ%GKU4N)gGiCxeYC!%~~Xb(3Ot8XkV= z849E%%r*&co)!wtigQuGm{b)8t<1Hz*O~p$?KWrl^?La zd8KakY`IHTQR@=z-Uytu&&1b`q})e`QMH1_blX9!HA5UA$8Mp|<7DIGhb^}vqRCD532!G3U zNZ+Nh!t`z6hi<+EgHt6r!D`6|`#gN=-zpnJ6(#(S0V_%sMqt~Q;#AJaT(GSqULZ$c=)caHh8FlRWuq?hq^EqUqr>EXujrR`@j zTAf&h^X)kwCMMk_K)dp584GmDmCtbT((u*nJF}+?$)etfu0WEEW@tsUevK81d2G$# z!olvEuY2Y7trTjL@9oISSldOIT;S%H;Qc)*f|fu-Bj=YwtFb5O1C8on-0yT-&We}E z&0E8z5*cLK*YRf;eGhXED+C}uy^iaDSwc${hRoKo=vaTH@4Z+i8>K1KwS$@s4RJhD zjyF)SY5m}VWbN+05TOjzhd63~lmaXYY@{OFs-b48qHfOx&y4HJJqr5n26IF|>knaB z**8eK9M(iKdO(XC)`T+Drd0XTz~z2sPjZvh zfk?Via=^nTC5_hg6KG!&1ca-=%Mw0eC_xraJ6*DK-+Z4DfF31TI^ncfdhnprHE2vI zy}73_gT?xmC{Q#zPESgL^}#66G()1~y|w0lD&QPOt-K%Y0Rf$Z@;EqilL&oSIB-;M z05?lDY>>RNiiz1nvH{HDA5q& zD4&0Yd|7ZTOZQd1z^jqSRVd6LgxE0Py+rx^@VlK+R%Y0&Uzl)589;?!f(rCM7}Hwu z-!+Z)cj~#(SJUwin2P0c@O>;+Xd#!>md#aBOLx9K)`~U$m=b7hN@N+s=4L83*<{h! z(6Q*hXJ;pZ-t$B#_OJYG(Y}5BFS=_uZRq@gDe)pvs#h@7q_kiia{D^3r5kFntJMQ z3mXL5eGgZ^Pdy%PY#lvPhB-69a?`Y2@gG3S$)X_p(3VR7TVE}%{-0SLaI=O|5d}rQ zrw+dN_Z%(m5^fo39%__v?)i;=k5IkJMPQ5X12kP}<$PLC=;@Pqxw(@imWdTRNp6ET;Z|-u-Phwe5*;_a_Z@4n`{I<pBcqu8^yHAtzV*`n=%hlh=h zv20H)jaZ*c3BV~8+AhD#o3z*J3!zsTKY8`aAJWX#v@Yg;Mu0-x&o*Zw|zt*eFd*Eo<%Suv=rR zbr#(EU8$ng`EWJmM-q>h_NKa|kT&t-%!4h-^H@tLil`maGwH^;>8X&*$}C#~OVfx8 zI-o#{RrXQH_oaQwvH4V+SBi5}{E2MD@`+oRMGk>5d(+s5NJFIWksX{T7$W^4%y+x`)jR z=8OB2t5GJI+q#7k3^V)s-{Gu^=6G?Qd18|n;+*lW60~GqX@?r#@J1o~E9Fa_JbN4; z^f#n4DeG9IiHy*gd;zxW`5#9zLsnFX3R!U?^8~}rj-&inpFEvfJirE-$JGysg_%13 zWwEqVq@Y$O9u`~CfoNF`sQiM$?O`~{&jA}~1HUL9^`roX|!{gD3W zre1R&-Z4yCxbjkoaI>SbPgdLgA(^d~UeQ$Zw)DmO8r#-C!p=r7q8jk3s_|d>?JdE_ z-?`?LK2A5V(QTL6Zkt}wdW^>1LRvl>Yn1piHHTeLzvhz(>`XJ4P(lKZaUw-kx5wT& zuJ*?BelXAxHw6;JX8%A-8_daKWzXx8C~{X+iu~YkJrmvPR4>Q}{T(|uD^z!~gjtRO zLTza>i~#H0U#{pIf$u8{i=~^3gAq>J+`3s1c*H!v?mUKs-Q0)w4-ffxM>wq7B>e1s@@0K|Hy-iqIUg>N8SGJ5}3%6)( z61a_Qd1<=V6ZLHCIhTq1A#r`}+qPHEo`uR;55B> zO2J(L)LZAb4cZj^U>cS7O*@4UX!30?qFe6uMt=!28v&ah!omkOqqSc;D@Sp1F4>Hh zvlzkSRB{yYmqqQcXOBc1~xL=T=B5t?=b=!8wZDVDE zE1mJ_Evv9m@vhW@x-Vy!j>Linto^2^wDPdrLn3=i`8(&T+vyL1G*0`)nsvc`*g;$Z zNO~MIYppb**aoH9Mlip6Wci<}1kOxI)%q1|g}ja*3LoXPheDU~>x8DXNbG%|+f8Q( zmqyIQ)F%hIG|P3*Exx*Ur>rjOny~H%{i4b|LK#LR?rF>VdJD1NzVH=cWvlon7#K>DRK*Gfvt~dM%CqzW zD zj=p+kO~xY|LdNrMnEh(~i7gcE)gPF-{jWI{b|*x_r0=Wl^mEIuGxyAjN{C7J6n~}; z4SCaPr;6>%$t6d%#Q=ZOw90g^M`bX&ZOCB>_S3vr!|LS*v!XSTX0_PO7n}uhZgS88 z_xtudN*=#8wPaS^sjvlZraiPLhixIp`$|4ef6P=tpA$vchPPmxNRM`yKb)$F8-ZHj z_P*-qa$UNfGPKCoa?2ySzkA!?2``5HYp#Lonob9>FZat-;Ej8@u)8T>+h=A_uF&c^+JuSf@4$n_9Q;r@&oo?$VTjVJ~yv5+Q;h}Q7RKC#PYI?JdJ`>P= zIat#2dGlXv!YeyBfAL)(>C zbP9tNBAqV5_PQ;1b;<4L6kOM5SK+KYd@v&Zzl@7?djz$mnxCF9Eoo8mD{-}}otF~9 zcS%Uz{YRhUVt&O8)XJ~bJ!%ZXt8%1N@_AL5iqbY<+s5A%7ps~kqGnEZfKqYu;|s@b zzvah^i`CGKd(COn@=?!NY9(r|Ds`y-UN4=d#KnHRAyiB$E=FUOZ?}d!$dLNbR^Ys= zxjfTvM=K)Do8(SMDk*Kw`QfCsz#L$KQ!Ad+IaIZ2TWQcxnH9rwSCMu1n&3k*zN73l z68E;T(6c%}e-w{YQUhzgG{g>A@F1_5l$O@Aq%xPAEuqj2wia`xz9Gbl4<5buTGwg| zWSdPOIdP?H25)n>zUnMhf(#DIRFX6>>rI5~kZ(^Ewj#zaRH2GnG0GxdfOV-7W_hgVKM?3F3zRGV&=A7RHWzU$qJWf%-Nss9!BsLGvzg*%*8bQ71)I{Ops&{dV z3~}E48ljv2V@4L{Tf4XzI#|R5gVH7y=q3=`0#rj(jj@s%aty2)bn8+T=&9mA0PGJ# z#Z?cB+-O^qVHAzOTsKCh+P#%b-?m-KF^md%%hvhVq2WP>v^EO&cgY57{RpqZ(Hs*D zKY5-Fkcyf=gqR(WyXMw5rCae7)TyG7dETPo;Q{7p&l-eD<~zX1C5?R?NiB z^uI17A;WJ%HDIfXmRxEUTWh(5@M)E4pZ|uC_$i*K9Zq<8zk!G58B``s#KS?`pgkyD z<-Y(c2bHLjGc}`xuu@992G_FRXoo}N>*KGz#|>-M)U^b63povof&UEmHN6s*406EL zn(KDPXyQ^qrQ~0fa4-c$Wk$!t`6w{T;}yCzN!5a>=(~1HQ2)uF&Ej#&Ii=Kdg#>rmUf{Sf}xwD znN9(F+&`7XaN4PV4cC|I#Nm2T-tDyHG$po63DbQ9EeFAkbdB*|;#2$VT@v5z3g30{ z`<#ydwcwnp4vw}0bzxl}t#^Z9Bs|-ZUhzgX8wQ{29&3X5_-Dz9(0M-{lAgpInD?0 zK(#3%f~|fXYRcj)YI(n2oROpu8ucp%C`19!sS3yd83c!H@!$;z32W}@XB$KW)!cWHO6zz#YaTrM%u}%~zW{GT+?pc)qW`)^~ z-{@6Bb)H=FU7t**9^-G(`%JLI75hi)$h-A1;%7k|CvHOPb?2cU-BD)Prd3iw@vV@M9_Xn}BEc1Ty z3kM~}!u+cf^Q*&O6^On7RA{(iNX5cv-fgpole_6%7njIfaPi_45Drbivuuj9nAHJY zj6C)W>y6N_a}RxxeMA*G6&O4y314T~V0RZRe3UBaViE8!0D`UXnbhm}njrGmc>x)Z zd+bQX0okHm##MViY$n-gD1#|c_S9OyG9X5UJNP%GU}0_`D@|!tQYZet)c_()^qj&Y`>X`%KD!HpG-}TV9G$Tm%4z;BCr1^d{E{!@`!yw91_x`>HGg&tsAL} z{ad=;oJR<$1Bv#|DU!0`LU=L4R8$fY66peX7->nuW#!~lec}=yAsJUFa*@mgNqUih zzz;$dn&kL<%yQwV;mBy@AK&C+s)d&Z$(Dzz$Rb9gMahl~Dv(KXa^&y zgMMN_2(QEPlzBbq!aIvLs|nat$#VnY-Un5E77bx0jb7y`P{mV0r>Pdo3<-%Q7cZn1 ze@k7^FUc{KIE!~%TlRw!uubJ*PFopAvklwL2@hRuraup>yr=^;#aP|QR}H$_g@k7qY8JSNO^B{FP5rv z$Ew-%UOx?}xOe(qvN@LxgzOcmN{20*KPo{QiGBojrX>vXCX*B0)xqfu6`l?};b;I}R|b6h zys1b{Wegv%fLNDpux$EZAS2anaIy>N$njGRptGOD`Tx<_SbL=!m^n6acJ`)uJd5*s zSNsl!OH55)BCY#0jbq2clrb-87FSH+TFk^0N+DVJ+hpQ>qS!PdS7yY)^Xs>CqQ)bn zb2UBLq}dR%y`z%ROX-u3#a9;L0V|3XBax$rnzqfCm}<1a3f;-jnDH`vhH(B(*WUu> z%GoE8jqE&_vv;t0SE18Ge$@*(_zn&{ZN~w84$b#4R{b)r?iYv~;YX*bNVL_5KhFc2 zRBGA1JDxh~|F=b6p6Ih-rKF68XbgJ+qPNvuY9pg-s06XITAH#-3t{8CH_x)+`o&nD zSkqhq3UXd9e?r;L^WqHCU&EBv)*iKD!waA?RmtccD^59$oJF%*?S(mNF1@4h=exS^ zVkN+Z->6$L^Z`i=iX+m3X|m?~(^e#X0kd7TLEmaIqGZCaUg?cUBMntx@V08tt^(X% z_iv-2PE({Wy8qFl-X({?#)kO0^6sBz$Rro@$##=ZsSOc$c#Yg66D3rIOxF%kWiOZ* zML~}w4iEYJ@vm~J65D=~WkK=I0fXL^BCOy@O;&X>q-&6`CY)nE8>neGnL4~Ha zb~?vQ-bf$I_XVr*qG|ldXN(79r0`{5UthF*l%g4%;XlX#s)|sj1U8^!rwh-f1}x$^ z{~7aU@$;nQcMS1le#MG7w`%IRXr3mk;Z)8TQxf{Ud`R^<=&+P9xZgL_&2r{{U&Eh>ASwCAYsNZ3t zZxd^?3+s6fn6Hr*5$JeN>n~^ptya^SeD13{-$Xu6d>g&EP1acVB>? zW3*ZO3A}OP|ChoVi;zQ_{G_5-?gMHBB{<6V06%e`NQkI{@vrBsh=}trvZMkwW1`H5 zf?l^RY$h=&HJyMUS%xYJcIUM1t8U4U?9-0%deVh6?G}w|jrZZKp@b~&Fx`5(bcxT^(;W^b5kPyG3|vS%=mA1 zlcY=@E!Zef7FrsYc31v>)o|^YPdbs7%BazH+UB;rn56aWe7Ep>m{(&T&$c{ytb6|B zRgXYNkn)h!5uY~0|K2Mpi)NI^rSbbk*W8qI8 zIPAWfMbpyw5zhoD)Yeo|OGDM+kwVWl8P2Q=`QLUYiT{h;>9%cKo)-O!?Lg;hyK{bi zoxO|r=~py8A6Rh$qfT?dfM`1{#Za^)dur)GZ}?YES6Et#Xz^QSOPn@&j@1}^VjKV` zSwkz)aA^6&c>^+H%I{}<%|la#s9-*8_0etvqPNBm4L*lSDL84~vzN(YkTr?qDn`kl zH#dhf0OIo=W)h#fZDvEiCQlw7o;#gFKaYo>@r6Kww`%X;w+i|SZl5nYAtY};v^-#q z?;^iS`tS7Cz32{noiewuD0)_W?WENTH5l{_A5Z$ zNnFL#^KE%G#iP2%;8~S)A-;nRLx>Qz9!J>$oq{}L*XqYC<>95vHgcNC?%93&U48Yc z?ef9Z4C0EAtk0)KJ)xUXZi(3261X$(8E3VmN87A6O`=LM=|BmeDmSUC;98o!etP1% z(6g`1K*_SM_QEUtXC)2^(2;WC6paZoxt-~fY$|2+drjtvy)qQYRI1nEtdwlzUL5g1 zI-wql|B|*8Q^OCIjJ1o{dYeX}zk7Ne`y(LS9p{wHJNYv1eWA7-gtj#6mtzvz|5n8H^oCY>ea<4V%M)+t!q0wP3{F|ak+M-RD zNzH0nH-0dp9US~78-KgkiWNVSH!-4ny=uWORJ>$%iK`RFMeZ@FKE8g17$9CeWlXJH zIVX2(WoidRO&i{QpRk8GpF1Y;?!R;j1_RS4^eVP#WuaW=oa|~xZ8ZCzv-Ils+uXm* z70M`>Rjvy6aB9I=&=wpX)}c?+AXsYfI~WDo>9v zERe4ImamOEGPciYlfS%PFjQcitq7#WE!M0gI;FGSGY{<@7eIWK^q-Qsb8Ezk{b2jC zvm$A7IWK4r@lC)-bacE}eeJd3Wc|fMMW*+#8Bs*`!-_){Cnm7zt}v3;f%$tZ8uxi0 zp{Q^u$_{)Q*}(s@tT0?KEXjo}D7uSf{>f2n7^E*-7qjucV80 zh4ZfbJ+(jotuTY~Fi3?S->N{ov0tki^u}({wib1zYXW8I>ldayQw0QJh#&LLsS6Ai z{+r}4$nAHHFrZ*7iai#F8`g*{wm8~1pQbBUBFH62M2B%?WORD)aiF3`E{?=jrA))* z^)7X0RN^^GQ{j5LUJIMocoP#7H0C}c3Qt*thpT3P*kQr)a2P#4U0m*81XY(L)%VUl z1_iOfkHz`v26iaCagv=3N)YRU26purHD7^rH15nR6qK)1!@n8g`r(Bs}j4syy_+rBo zp=(oe9TfaCmyMfjgZwYYI=^0H*P@_LGN?Cy8`o9#+UpRzbfdaOcB;F(I-H8XBQJPR zj9$SjysU;wh=cV1pzbY$;)=fQK?orUBoN#K!5spPYk&a3-7UCV;~pSD@Zb(1xVu|| zYd7u=jk`N@;rD;mY3BI0jqfnHU6q6KI*7SNWSN18aRw=q8B8}20 z77H6)qK~wqqJosx=p|AVk?>E+k7!NVVrhW%R|qnaAR%#rC?g#mS=Vh~cQ%y?PG)RC zK!Di@H7nu59`>u8XF{{O@;^1THSvjfd-l`hY^0odjhVHTj$oFiMi--0<`28(kPx|n zL1r2nhF%B_9Yu5ymPJdVMoe5;uD$`4mDdisvu zzDJ4u{=Ho&$vv>C#uqdy9b$I^*_TI-qY4e_u^<(9zg-`j;G1|#B_HpAGUvrGb8fkz zwOh_qT;yBLtp`r3}rT9!3&Fs=-pXSSpEf;c7;6eb6H?`zUTah{r@9(Ox3GhY0USOqJ-3*Dt8L{WZYlkAtf+4bZ0`;n2v$jQ zzWXa=Y6=vwsQpNBNwk#>^2{a!<@{8ReD}iVqow}$(^MN}bIp}cd1NP7$7}f}X_57= z0Xb9U>;%r%l3yixYK+IhrBwFRUG`DXgZ%z?g5F2JFrC50FLS8ls_6o0gy3U0;C)rP ze?x(7;`CqJM5qH0AQJRo%Mtw-KR16Tl2M|O3rvf&qe&VC)raolM zI=t0XRO67+-OmAtrcuTZm?Yj{C``#p41C>REOHP%ym~ zkp};Q&MXgVZsboGhKXfqOtP~vtsJ}7_at|e7%K>!9xq~D(9Q2a?OFNtTl|Wm@2Ce ztrAA8Ihk@FqYFN~eu)J$Ha0cR!*Q-0f0efFV#RIPhwaze%_rz04ED8t31@>2D`Wyq zbMjI07s0{eHC1&MyVSP7_!}b?AXWV9qrgM^MCg!egBk>y|MKn}Wnhqzj)5U8lB`qQ z_#^k&w&Og6)j$<&C7jIIV*UB=-V4T+k%3T5^5Jx3 z@Br~R(eqggC`7!`nv+mbaMw2C^8NfXEDRZ1cz_?1B)t(Fe49m1PS!!bHWpgA%_`kC zJmmT;V8MN9P=~cJ@Q2F7FU8i#+{o64jIhVtFZNrhT zJ?@27!^vOQ|KZOBsKjl`asnDk&}3qTakjzOuZV+?)pfsGmNZFI4t1=E&}n6Yuu8{j zhq+ftIqRsz7$O5^?A*NQB|jzPpf*-a5q;)Hc3f|-$dCbIY@+9r?iWy73Oro@?W(~2 z-)P!Cy$JXH|G75E({lYEAvD!s;07g0Td=37N+0YIV$y_N)Qm-aYSOegA<8$`50f;J zv#l_TQ&f<1Qc#Fu^n$PWG0T=ej5lQB@q)KLWBq%t1;q7rbuF3Ia;qs>2^kB~#jNos9=2bO zyDM|koi#85Oyq5Z&)Z#LeGt&J>GBGT|I4g)w+5=)YZth^kr*ynFk|Z%^<;vDjlCuW zF!qN2{t(Nu#jEY(zhWMh+jwlq&Qkgh|MF}aU^vy-23`A+i_Hr~`6=|OP%F|cbsQ0w z9l6~){x+{BOY|N)Cj3GifT91xkU-;kl-#0A@^QVH1K`V*$ps7EC7=JC4Ab=)$|79i z`dagmwmL5*M7Jy<%$YOQ`#NC4Wzi0yb|xGsJ@F}epE{HknSZufLs{%yEh&%zrFqA9 zJ40|QRPv2m-EB?q@o*?>hSBTQ-d1lkgGiL1b?fE^{e%5^4JLboK^Oa__2P+>^jobz zlTd9?8=|8;V$rDWWt!YlOS|)z*a{z=^Gj<%Y6|wg^_{mZi}Di2{IFPr_c~r(j|;cv zMph-m5C4ds;wRD+%g)${H(nJR?sF^qzu&HI6g?g?PNmk`%q6kVFiN-kqFgRrO!;U# zmGF-gs!ZuRTwa9h^{|7Dk+b@YWZuC2J$$~}Xkc;2a8ObnYPsy!Og)@KecbyfO&e1+ z!ZcCZ*ta`wITtI|M5gL7aDuD@!~r?!be5o06ildVtJfxDoh@(l+`{O9N#vCLnzz>} z31{i_M%pkS5;*u<@+WdBTVn{GKrsQEYcF2 z7j^qetBKgdrbBB{BWoU@3XFvw?_8Z2Epe|)PfHBlpKS2jXx|sOC96%iDq(njLGb;u16P|N z!R@g<)ROn}!jVYT{H)B@y7k1jiP#Cc(cg8-Xo@2sqUgF_GKQTUC@_bfbiW{@%WUJm zS1Y~<=8;{WiAlpfl{bx=GF5xretg($V^W4xvr0{jT-FKNcZif(FJ%n>HHn-Be`oph z8G5-09`pT6w)%_x_($r#tJfn^G(UQZOvt_4WvCjT>l8V05?{mLWHh+%OGy9AR^=*u z-C7|zyxp3>&2V$wZ=pYIK7|NAUPGCAHsumPC@CY@_d^bKHurn#tQA3=v?>6vM`TaR z{_!7)>D29t&G2(*vs12bH;0*gQkdrTSJAGd_vy{&nF|N_MuF|=r&!nGq*{M&W?GVh>oQ6 zh5sB#0n@#?`616osigcUcly3e*JVWT3!$zBz{>ByJCOS9h@(OYu$Uf5{)Ar$H^j099Ugr$2PRamCG0;ElKBp?p)UtjE! z{am!Gj`ztUGB{qfR^9?J{iU0RpdzK|Or6Um@3nW}+_*yb5D^!_dc&z>OpTWLq;UIJ zU-plYZaMhu?s1@!E9HZ&qh@THos_1R#ctkX2k&1HL`6dOn2;fM8sh~n>5b0krCEK9 z_wA>G4k-$dPdCV?X?42x=T5wk3m~z2pWcVFn2D<3$aQ6c9V&RL;TY;xit5HOxW;In zuGexs4`iD!xehEnoE&ZbIPFbx4^t63nyJ|+WN*?|)bbF$m~ddJ0$6zNuiZ+SAC?5w ztWdtOh0Ewl!@&&-KAZ0qEy%@ds@$o_lzK;-d5@|4Q<5>5bO#;diTmLQcH{?&lUHAG zvrVSMm-0)_=Z|+Bpk=pwf%&Nw^&KFBR{=s?2!9-{VIEKA#NrSv3G23k+<5*@?F$zQw7 zd*3H3VMPE!WoX#{j4-0KYpt~ER%UD!o5Dd&Zwpg}q5O4v4!8cYvB|C6gws@sG7!hJ zy+J*Whx6GvUF2NGU#UaR5xKq?DMJP({k|^t`c8;uNna1^XpC4*!-As}WB=%lK1!Adsw>xIoVEwMah%94`CWEzL{@Z?- zAcB~U^|T9#t-A%xmo?(0&y?+@&u$AfiO*deC?^?z9?>{a58eG@j9qQvq|v1$ma(oZ zBLyD@oW$V@_i{dWXXh^a7X>l)Ca#OT8Q-XTe~%n#8D5qy9bcFpiq^~tCL+b+!8AIc zd>1FPoQqsrQ3~{c8D8zD2g>!tbXClj#pU#z#^!Xx|ExIV@>2%_^*CilaaSHbSA$M2 z&6^7p1Py<6;Nk2fo_%Xd8q>k%HE|a~@WMsaM6*GgobI&in55OGwZatD`Re0@#P0Yc zckw4-vrNe2P~K$m48IQK4E!L!d|^uB>U=8~g{b8IM@o#|utm52A*1O}Ws2LhVcqs1 zlWDWF;>qS?qeYsMtBU(cK}(ZOE9w9Z2N){cGb9PAxrG__X96YzP67w6bJGB*uI+4O3^ z(yE9!`g*tATEl7WK1W$2T~Jk)fo{2)7 z&x6e^=+cH8jb(k<+6Ke${r324-b0O+9s1RBdCn>sS;JAmgNMt7$l|$+=(x09;(Ct- zOXy?lFk5kQP1Io>fHVGr5iMM@@XSYi;B`Kjzn+w9{bvue_L|2J8j>X=v7!-dG+t<{ z^YqI79ZNewlZZPG5XI8HhWjq@eAkS&1 zrO$22E+F#SG)?U3 zPy~*FxcCN2ZmL=_=Xr}+ugbam&2O^(>a*PYI*At!TD)Qv=)o}$6*p1m%w7iukJCf@ zJ-|*gIK$c-gr?zL_8ceOJ& zrF(C6*{)UclynFgk>gUB4itgm;1c1UfLI0vZja^12k(v@1kw3Ecz6>_pKCg(n%+|R zaX}e*a_n^TWo_gqfNn33%i8U%;e(#u@6;q^GRNO7Wu@L{d4HIW*#eS{WVszQP6gE- z&I4Uqq<}l???^M+QbB94^;r~~YXpm#acWm8Qudo=$R@G-K{U*2AbgA#I z>*|D_7g&%FXDw5A=WQf64D-3HAi;(zb*`G=ABQ9jk4ulUM-E7plykc;y#=j0gj$!} zZ^z~?Jh#-k;-SL@5HfuZs>b^>NZ@N-u*^4TloyysnjAwbo6Ac|ivK@!^+jJ?!_3O0jWroG*}QH)26`6OUIt z*d%Gac`L6lzgm#{w|Z{$t7t{4NK#V|lp8wz3k4+YtJ8V%GHq_$=%%)y0Lq;Eiq^*8~qcH+?EX8ru<4}57)(B+_OD1TXMiAL3J30yKjmIR8J{1Sh(Hc(dV2E&ptPO^WQpVmNPS=zL^Ga)Wa ze`6n00o07v&R5)Qh^XN5YGPtnQ7^!zWa_2|oi^~7nWhDQy+hJGU0u2vXnSbAxjnks zc$-qQUdI}Xf48t+&e9(t~(Jv}6d z>{%j%!|yp}} zX>Z&D!}~a2TFu?>KS)P-?Xv-wyjqG)PLj5b3tXLc8U)awob$?q{&)l+quhL!P-NqC zY34rly~Ka&Fszz(`o3dxvgCGIxeAc2D+aNae5oSav6iv-wmgrkYg;B#=Hue<@@9qo z`rYld>7-VA&&OA}c=H0jgTeMqdA>Md%$>{K{?6P*z46$Mejy0%YT+4Pl9Gp5m8H)+ z9SRb=Jvusa4{)eLvXvxwFj@qsuXe-*@1y4gXNDD(w3TN3_*FW!OUgc-{EaZ3D)H$F zS_G&D@t4-$~ znx}U=$yi~25}t7)1pc#|&IzQMDq^ARs+f!hi!~%ijfrgw0OFKw57p+Q zw_TGn^G05ECTe$bwzh67_j)3B*nT2>(?EWI4v@l8cbhjx+QoK9@o|+D{(AVv^0DG3 zw7dZ(-DO=$b$51vStoEKYNSei;Rm^Xfh|sob5`ek;&{_X#pD=X5Sa2-w)J)=0+1C( z0c4uz1oBiO7>}`-v?1{#FaT6~(y2XS5aJg3xz&}lRN8#oT~vFYil#S2OhR&acp!bh z0+ESqxz1q@&@X4tW~uU?sXm_UQEl5$^FxAn)*~UkPM^PDZnM4TsV_+o;D8X9(Ms6O zI*sW7YeFPvPE(Q%ARcP7p5m|Fyz29N>$*L<2M!#TY?u%ynK>S2hqm5^s*NO;Ab1=H zPc3@boYqE??^u<6tGxJgd$y=mrg83Yk~q)N36K40w`lIcp<_2_O^Tpf!_e?7y>|KV zpm{&jrNvWX6B>74A6epVw8<$bS~neGnb%Uk@K~~2*0j=hxEfu&?-%oMJeuM`4GPYW z5V#wtO|kX4y8rvC&$Es6^XSrNB#--^A55=!-f|?~FQDYed)^^<&ek&exdi(hJD&8?v?#(`RWw;>TUvZVu`793Z{M+Mhjo zQ^A2Xt`ZF|DmR%AOWSTVwI0vo9yL$@T|Q*%M$IQflkO3)<+-GxcPEpZhdu7CS)Pl| zbNh0Sit5w-3TBWD`Z@b+K5+HvEwkpXY4k4ol+I&b59*CllPk~O%0afzyl0mn6)3p= zpphNg3?_?V#4g&e;ne$WKz~Cwkebo3Tk9itvD;=pA;YPCeGt`I$&&Y?QkWSp)h%bEhC01!saPhFWIn|vJ#%`c*>I!9(^V4%x42}4q;<)t*?zj#=y z*(A2q6yh{-mLhGhC9Nr*wNH0(vlXovAg?Q3TuYkiYyJ*!Dw$-})_9!!qeS&LiXG9k z3J;?3XJ{NB0&SpgUl8OhV;37WT`pe z+;78XF9&C%|1?JE*SgmB`5iOBfQkP5EVv9%g4c4a;t-I$HYUwzQ@l+S zKcfZ_6f5~pjMX44SlQ&Ze+lzRcA9ob0wVE@!(Y^3&X^q#>m^zZ3cgi-8T@@lLZ;uA zaE!L5Z6M$^++RvK049G@XZ)oSR);H2%tIWXn2;vdFB2Rd85&7PDCA$1DY&e|%Uu+^i;)tm)s?wtO4n23UNVCkr-%RVV#mIuH7^DJ#R*|au9b{2T4i(ZAo53FSaCoy`hj-{+K11-QBjWB z6M=+iou_#%XM2t?hLV}qi?-;N$eIATrgoVg03LhK*ac) z-yq}9(1?5WXgp?|B>(le6Bt?>3GfB>cN_F+{L!PRDBxrJSXba7ozr33Q2|EF7eIMM zPWMr>Y-~qa)XPD@3uCtf{AITN{Jzn_JrR?%jzO}cP=#-i`Ie(QJs#c+jH zkTZZ{Ka;^;C-Jp`S@izeN`nRci~1U>SWYF9++n}Zw^oH}eh9pHiW&aLZ$t)n9~S=p z(%7VK575cE9FI_KJy@WR!@5%WR}R2C(x34HlEJL8vuwTbS^x$WEfIdgv$CZ$lfMmtaMnVcHT9X88Wb`%mAQvb=PdUMS*%fK?A_qtpT zwik6nB&f!zhN~7E^Sioo2fe6fW{-q9v*T3Ii- zz*TZ8h!B(!TcC!zx-J1-H{ouy0`7_5%wIgOV^PT2S~bpULr*eY($9{)+_7z)>gbok z!tfOVlxkbXE!ZR8eHs*!GNxKeI!+w_c83e93w_a(wAqHG$vOc+7xtPFUdsZNobhVe zD9s_8XO3_==G{LdX5o|-Lg@kuO0ajvhRrQp8>VW|pL`Z74&sK!5;m(df2%jpYrc@< zThI&!M+8&4I6FEzPvO9_^Ev_D3`rTPg{$>+ULKxC`l{$GMQ}f_yey6=1Q0GL>X}e9 z(XbJw3zl>ke09T_pdtQ_7c*^1eqnxML0L6D0|O&{tbO!rO^5Y*_OGnghwX{|{c6Z) z^;P{9z?HEsQ5)D%@JV6yBj5wRloXMAT@siYm5LUpY(v;c} ztsqgliZy#)3)%oA-=4^qn6Hh<;>^kmxR_ZO+Zv0iViq-`)D#u8IQ~|pEnO8G%wMNz z#(+!>BVt(HVAB`#BeT=8GN?$hw7C_C$fQqM6GG2dbU$D>fB#-Qp1qzOTimGMF#CP* z?=$7q&o2fF3ejx|K90_!xN^nBWx-q@gv^P)4OG0e(%it`1Z{2b)8UEWz#ex;hJR>R z7x{&~>@2twYRJ$0C_qZxmMLx|)TQuF0RzE*xHNY_W4w%7_{1DRJ5DGIZ@0Mr-4T#n zaB}VC6d++Qv^~MMi>HVksgRx&kEhl-USQ1FfUa+zq++H9m<9$@HIpAO9QmCdTp37V zJyp06t9Ejlp0adyBtQft)0qgOv~q;vy)4u=!yGc?8V8vc`)O*0TQfswCVF!$i)*OF==w#%6E3 zBhQ*TU_w~zkBKE62>E7v+*NR@iiS{l<+Gts@gdSuKAWR=aQ6DIt@YIP6WzIMMhl|u zG@yiIC=q2&g7!^tqPHS}ctByrjv4M!YO;Wp+N<#RF&!*dzM{fBy(hyh^`G)Q%(QbAFYYwpz#d#&As1KNE80a`S8~ZDmDOwZ%a6UF6Ba_vhJJftF zB}$)1sR(*iI4bvnZwD6-hgkOW7b=q+>Ggq#3n5$*GIUi@1`6n#vS|T z_Dp?4CsF8{8mi9P6cZ0W#tl|#VhXE}l0IlUR>>hrNaWRqY3?-<&;@^t>C2Jc{!^1W z^DcT!RY6#`pMICbI>d?BvMBW-nQtkJRz~sm>sx?3A$C0iTb|?Oajxm@71b!8_nqCv z?W2t?3XW+S_BRc6eT`+iy4CXDN^b_6uAHtC`RegZU9*BFd6xtV>zG{gwF8?r)9C7K zb3#p3&5K8`wpQlS(?KJX6X}Buhpc^pIi4b`Tv^(`ragium&a#kNUmtf3lu7Sj%>TZ z==P?vRz1ZZ>Rs}1CY88|$c z87O|euBelJjRi8Eh85MzT69!sDC&ESnO_ZJh6z67(aIZlo#`*SR*PK^XQ*0J;M@F89KWPZ;20#83UM$g5Ql}sOl z93lec3dmMn;S!^)D`45K9jlOfUlnYG6r&ikMFWu$Z!RP#^2ar0L_#iymVbY-g5-t{k@JiEQ4CFVdtv+QQ*Xd=`X<6KZmgL*4ume+pP$Li6^3j?*P^SOf_sj4E>@zQ z`A>A=GCX9k0GFm5Z{7LE-N>fJtw8{?DI%3))=-%n-7a3*BexJt+CKv>HXJD?UboK> zxKSx$vt9bGoH}$-gJhak8h9V>w?VY$IVzZg(-$Csp3Rm(zPhE8DH>zyKG$)JzK#_gLNDUfFh^TYy3Z*>+YI$fy2* z36rzws+p+;j@#VU;^!7T0R6&6-$;K48gN6Z62XUUpTkj<_qMhfzdDEK)NE49Bq|vS z&U=%fQKx2s0s^h+HUQ{*cx$W=y%gvFn5&G_bG^{&^tvSYmjCkm&uRufTwd;cl@rS` z43dR5j~dG?=QM<4fPfg4bx`6c)qP8(=)C}>y?s@KPYWU0f`GrF_*LsgD zM1c^-%q)Q^JYZxcmD-!3jq~pTQLHm?n?naZ7gK9k!H8K+bl}-1+elu{g_e8IJ3oaN z5sX$}22@y(>Zj+XY#JLH7EV334i8C|oktmgb*t1@;n2f!$=oy#cDejKHvnQ_tchNn z_|FiFP~~3p8&NMQCN?!SI$23mU0z+BRp&lDt)LTk)0CQ$GAA$36h`Sm zd@M~%IwB)?F=`*|mb6XVM{8zfA!b7r;SYfLj+s1@(aEZx^XZ3Z0lotLJZ7yV(4WJ; z-I2Z-TG|4${=GX4qSrMkxeCEoL-o?d+_Wr|RYbPu8r&&i%+RkA(vp&ZDQahb`-Sd| zwnee8c#xK&_GoxHauJuqKdh!_oHzqG8BlpK_vnX#90P#1HqRY0rOkzeIp zTK(?+ksm}t3EERL-4uTVx5W=wh4ORifU2ce`^p-K|4L1T9W1u}B82|T?WO4;?oSJr zUc95D$|U2y>W{N)Mr(Sx&v_+N1P|v*`k4#iuj5tAwMqZCMrVEo*%0FsxZ;)zQHhh)Q2v@xJtv(Bg<{s>oYhMa+AuN}@f7(7bCR`$Y z(v(^23oiC8-}#FluL>MYp|6ZVZq{X*?gD6##*(0duXz}3@svx>0{db7agUwHmUS(w z^wPG@H;i*{fkqyE;GT{Nugl&fO-Sze6#9-G7ZJRknw-UTc;7prBsr#yy79UrBlqc< zxh$pNdIo~Hh!)QRLa&J01VuU{wpH}gi$C%+(;#;5xr?1`3phC4FVBM`tnC0KLoJsf zKmAg`e!{_R0hMrY<%q!7!F^^1PN?sUz{-S!b4ULHg0lj81qU}A`ebO|27p+T-aWro z_Wl3rwW{1)s{b^B_`hqSXiC;{N12Y4bo-`jnusXM^p=W}Hb$M$d1I8@lrT^3H6Mhm zywUrzAw*Mw*z0n&OR5!r=$-HAC?G$ku^FV@WOp1EV|*_y+aO9AS3~nyPQ0(MY4(z_`W>_g7n+>M?E!m{RX{`mNMAj)?1>bn{T|-60NjIHMxO&NV-8 z9wn-?)_d5^xfICY^?1Ojo~M+GXGrGUy+2+eZp4TSGIg$Tg!}vUc~L$L+T~8|s*vFb z|7_T(v_E@FeF0d@n7QyRF(L0>A=L3v*#Q;sP=Uj=sqy=?3eEWIqpOqc$E~S*JB|&K z`^WSCUp^&A$jkuc8rn`_YDS$}eXg>YfJfFjfREAgW zAf?2jJKNT!;R3h7HI_$OmdYwgI#=zt-tv)@GF(add=`S<`s^a!AQYebQ-7P_b1SFK zJ|xCJ>$4#>^zlP{1U=&yAN6Vjs?Z;AZUvW;+3uz~OUXWJzPzCv*Vg*vu=lI&(bA~L zj>CGnmjoe+ouT;h-7DW;$5(sPnTK~7GrMWTFsGzTI5=jC=TiaHfj>*KnM&Mt7K)DW z8r9Qb`uFi#PnPE-ODcZ2FgX44dImvv4i8HYvggf}f4*=uFvWad^0?GU0%;{a+S$zT zI)+Y}?j18RVXAklgEmV5&SCB__fvlby_xr>8x(oH_3n1(xQDX3`?1Ec1>T!>ll~C> zY(cK|a@Uj9{T1PeFQLL1e_(9C3?d-J+*SvRxBnQYac zdZ-ZK?u?%d?qmi&1nY%Z;M$P{J%^`DJ303_|HWAdeA!)76}jmP#fZ%Ud<4CF(odOw z#^yCrW$}dco|h%M^^V)46T1nXcRRzh5X1!}Q@v((gOHA$_j<(5Ti?E^8&jKdup=We z>n{aL=*iumg_@7$0{zD6a!KQmCA!#7wMF1^hV1f_>_Q}pjkGj*$M9;sZrl4}aMN5n zCj?vIWEtaQ44@EC>-Kg8*~|$))S0($O}lfqM8Od0uAa+{#g(Fowf@Z+rP) z(~Qg$+qrw0RauF|$6pi=YjYdkWp)9tOZSjvYtLP;e4pY(bfHh(R;IHNU4=A+svg)i zJMRCRD2dVgz;o`X@6tY_mL-^0^9WfqXO>H@Iy92c*)Ms;6X&OMVK#Pkti)NYRp)&< zYZCx6zsV7?Z1uG4=X|Zyr3gFp@{Lv5bi{^8!%HPPIX{GOzunvm&n9rPe*L!`!NXH~ z`n^bZq+Y`Wd%*ZgD!Fs^u>8U8*m#ly2cHX93ae#bKgs*OJBz=!Z*@pEl&r}<_9uij zf1V1+dgWOIMEwDil6(Se+> z5YmssoP*pP=?KbJCvP%sWv*5r+zAdYb+R=ikaAu$?yKw~EmZ~$u1)GX$L>R)Aq^Lv z*KgGu8-wQZpxUDne-(q(uOWt1k;yF=MrOW)qtmZ$i&^e(LYRRRFUAzUH}R7PZUhjV z!+B@^kJnfAF1l$gQ{;J_8#dbZDkJ_K4!RzPW0(b`Q$8~du7&q@xk`OTovF($N_nz+ zr)zPpa}Drtx^_%{AhBwg{sFus739*UmnEl;wAAOF4~Q}jnfnhetw)Kt`6$b2}t z7%lP@HEK1VTFkPm-9hyYz2vQRY(ML2BX*r0cmCD)?bDWd4n?HxtM?fVb44`Vi)BT? zd%xs9Ga-~1y>0MCZ#0BtSCEwPc?*mza`$Xbra{c#s>e`St9vx{&rgfd!)oh!rEiU9 z+go&zl%>{`+-nrB*Jn?dj*fyEk zmw2eCV4^#Eo)_7cf%|Z=Uy|&xrOJ4DU3K%q%vIFOM(M}sY)d}yI8IMBA#_OcHhn^a zJ0kOcnq~n!$h*5r&&V{)$A?HYJvZy&-~T$K7w^9f8YF~Zgv_%l&`YkK1LS#Oo*qTK z5t1r9j`PvPL7+>jsIS^~Zriii130NaYZ?U=z78C>@%bG2P?6XVXiQOy-f;8e|R;8o6XH@JyW&= z|HcnNmxRlxSH61dpZ|!(yT`d?k4!hl9j1d%h;YsI&v#Mg^hxF5dKvblUEM9;T*ORnB7{!!!5BEdXua7z|Tb_qz3oG4&KMKPb&c)=hwpJ+@RkL4q=d%yx;gmXDJHFgKXy7sl)+ zX%Si&I!>3n17aRQ`uE!}6+vyM9cmma?@$N`I^>FPJsUeNdGB|!b8j&cBR^agr#xIY z#ze}Phb?qPfl>%xupvu0tQH`IE~RleEHF=n7Temx!8LC^b!|7`jp@&Aef+7q!Mktc z^Ci4~$!7-cp_h#s8Sn1xx;fi)L&MFncYSvIYXeBy&SrZEb(n5DaVBbyU^;usZclm*lbILT`~!G^s3daH@`(s`4U|8uym{s}BU@{!s1)59CIbwX$@xkXN;yj$0B! z%JW)}-`ZH|R(;!^nrjZt;Ys_6<6<@0k6omy*S~BC)!DV-0zv7v$N7R3)>^gQS>O>{ zmhNTW0v7<^r(KInm74S-XtzHYle$#T8zkOG`~LbN#@tXG)z-H67b$|C*EWgIW6z_P z+uy&WV;tOwd2_lB6a5>#_`;H5P387S%K<&ncoW9&4-XPS*6nwPcV=Ws1mS?QB0`V_ zN!R>TzR>BDUCS28)3YMW!jVt!sK;wRnvKHoK3bGk9Fmu}PsqC65wN5e(gkR3r5s=^ zT#Z^XTff;qK_}ktNXn_1-`sm&)IGT9lod8W+f-pVxrIM)$xW?(0NOX<0u_OEYF9#C zim6}0-61~v8KHO(`G?_cM-2F&E&~>;<<%@Eo9nxpsWxy}FoV@bD7H?kN0TAf7)F14 zWSP79ba@6D(|*$9eXIm#f{tYTZ&7{p6+~py+%@T&cKQKTUWN)U#28sh(>MY3>+Zaw z$aLhQ!=0T9S>S9OTNeaBm|VP8T3o<9c7--62_#k>jCZU~P7R6xm#OEU^VUW4v??w_ zwlA#(qj&wfj9bK!&c;o8IGzPTT!x7KBpk_s)7z)6dLIVk7bxMrZ{alIre>GyoVKqM zRLx5p>tjUy8Ai#}a=F%1#!YncmT|X|kXN6lD$r?=kw?*Ss)?X`ixpF@?MZ! z@YZVmk<AwR;g`qLx)b>e<30c?t3fB^TqWW*VyUT*xB}SMWHzd z%-K@6N2BD9jnk-{GbWe8Hrmuo*KW$mo`ZDWtDLD@lyWybuSlCW^%Y(Zs~S=q3ngaJ zh2Bee`gsllH;0nD5SHNqGKj4%hl9bK7ZMG7r3Kl&GXox{+dXjo`jSo@HLy+jo_VS1 zWZ51E-b2W5TQ+ojwA*55?DcrE?VIUxt4YGDiim*?YN4H3`y%auM}Pd^gTWaiUI zWV=h=R_|H9Ah#frK)b`C*qk~Dto7!z6XZ@d0UrJC<8Q(Su1`#Gc;Wo_8d#SMx6*Zx9 zpjX%mIZd*g;n)t3Z6lm}>oz{K)6hK>cCp5ETlOk>GxEzkSN(2KjnX9V!*T#f&v&Yz z6o7(y3Z+_FcUycOH`C4m#}h?$rnJb8;~WNm`u?inTC3I2_3Ls0dj^9}>qWT-ax*F5 zO5#1ak~<}KChN;H`b|CI58nnR)~m&&Qj#)R81Hw)2CyHf$QKFNE!yLGMTG+w>I2YY zac@6p@R;nKSW1c)tzWh|ICs&G50ftJeuevU<7j%spkujmT+4cT& zXMczBs_p0^9*M;BY!YoCB)O%=WHY>zSle<5)0rn|W=2EO+gh^|vSPScCC%r&G3&gf zmdCoJ$pQqkPI4`tW#rl%S|JzbYnd~g?!63rKj*}lQ;Lq72!E7-@QkKo zLjaK4yP5gi_-x~fd{pkBksF0uC9t0Nk6-)shW~(6y5< ztTpG{tkv&gp+AJ9hR7c#ENY}Xt8`J$NX+z!ID&#zhmk}3a2^&-L33x-4r~PB!hb*C zTcsyD5m~a>3gL`xsJ^F4qm-vpvE#t}-bVa9jWy&?&sXVatGj^Kv*Z=ciy zff4vF_ykV@&v${BPn`s?E0Pya*c32k?}0Py>BDdkU~Hd0Y>7ON8qj^x=TU%zyFmkn z`|0s|^Z!9J?nIC?_ZHzyv^Osqa6-kh*f}}ts;hzHi6ey(3t5FO?%%g^X`p-&c--?} zue{4)0@yY&)C~;{g@lBJh1=J9BK`gSMMOl%$;o44Vx**`6y#&RQfQV;p5Px*3pe0f zf5b{NX2qXHHoz=Urb`%5Fq_WTTn_pcGF0_rD{FriG85sMnh97UkH0%fe_VIxXP zN&rYCo3$lHdn2!=^=dDA07ij93j)#8AqQ;YVMQ4l7(}mSt*x#OFa7)X4~P%I!~43q zxtZ}=un`ROJon;~k2f`Qugjzg=zLXWWv>xyKYV@{YbgR7vM3wYGAk=RYf+`AaaagEaZU2`L9{O2zKqw=5n&LfBg7y zb$y+emp5j{R-`Xr4*>PzDlPn_QpHslk25*304kR4V(b1ipo~ERv@TUEJ7d}cu z!ABLo7&5d0&=u-7tYMaf>6YOliDFbJ7kNDlY>r4f(g6weQ3F^!X}Sf7!3Q}xJ#Jvr7 zf&z|@AD18QU&CN9=Y#j3wookM0%?_#Lg^0Wk_?Q_LyN6NCd<(GRd;1YC%2qXC_5i)yh8+-JoOSzljYT{VdP z#89#ie;I(*cz9#`>!pJR zFzd%OeREILS4blAj;5!1mJmdo*tf|?eFCq0e0CKE4ZkvAI*x%llD?49GBP?jwM0cl z`BIr|z;Ky00T0IdZpLAJhXAPAG^yI%-5mpuwHtIOrgt8hW%rM^dt4p_1PRtU_M zmX)-?^DZCN)~m08s@?gfAlxehtdx-?`VjO13X#3zDonM6ddcQX`Ff>#G zfu(3pmcYw94f-pCiQZ!?w^_H%7>%072o1}bWtS`@v5Sq`5+#a#*8Or&TeA)1IGKqN z&RSHRgXDqCGrOg`LA!2)3NrF1{VRDTC4Vp;x}MU`cHHB?#8C;oF`LC`dvh9`EV!O; zpGHqdNqPir$S};ZXNQO71qC15+l2?TXUD+xLL)Lo3$#t3oX7#uia5`@#0?R6Mw*O! zp&sb4oRnqkVvEw{8vjYKr-ButAQNiaIx5U8u(^U0_4ftV&CHvZe*WTgc|245ve7tF z84q;BG+_SI&f^fD!{XUwrYhnI8TC!G>MIj{MxB4Emf4EiUQ6*ubd(YgWR56+;n_4` zPAyO_Y;JDe*|8AFur;^H88MS*75PWcL(oKtcJJFR)B`eh9&&)6fup@WOGRV0&0%R}q(G@I zTgCy&@A%*mu`lQ-LwRhVh?`FT1#J=_cNYf3Cc(8$3dP1k{K_5PgOK7Kfvy&!5cK;M zLR#k$GCA`Z)^DrK8wA!W?$m|GIaj{eq`zIYFOYwFlttABy{(G#`FrARyJ5GnrC#@- zJrr+u@S*7Rk)VO1DU9oZ&8FS?Zsp9mVV}F2ack8!9UJI&>!2=|2(ME$Il#&kGXRUH z!Yok@jn;5;;|?*FOXutB?fohz$4p1JdhE&(X^s}!MUx8K+|&x>-Qj84g57P*{)xRx zoKCDyyo!Dm7%NU*vm9zqlqH)d-sHf8q^6_X@#`D@3mNI0(W4>ZY6Q?%Je2^AK6@ID zT#7su5SC<(ZWtAlTeOmbB3goapo#GZ)>)h%t+FOwv19X$8+In3qU>?HKtGAW%eG24 zScsh3!Lck7efH@WFm24&Ub)XmNWoBQw4`Z-FR_v)DwGh?tlK^PKzI+v~*8h~kebmEth=YEY1aKmYV- z_bQK*qTDdbUTpE;rUO;Dww*q#9EJvL^cpP?n^ppO)-8wZ39Q74PcXqKw>tcL9V zT%{_dtCRgD&*(0!9Ca0+#l=%nnnWp4gx#rvWKamp*9oqT`J(E-nRyY$!(t)VEfv~8 z(=EvV#uO7W{9Cr4*FFKv6_P?PCNiB#PV~Pu_mzK5_5c4~DiVUAfRuoQfP`F1j&2lb zsnH>f28q$*qD2IxhQP?tqf=T!X+|@0OoS1mrR#V6e*THyxpi)wTkpsFyk5_Eh4L5U z?)b__h0C_&6b(O=6+Q@r#M^x=4KKtGj?FRAcqr>g)0NXYs-p~-)jKHemV4^gCfhX= z(Ee2AszS=T(>(mn$zGl#WBN5xHM*8^TMpoxhM~INjBgukTSkdpQjY~bYW<4h5(#`b zeYu#$=$Tj3kr;mO;rSKkq$P5QIVR@}nZo(%eXO&xIh)^hdnq7w8}iaBKM`P@p9ZaS ztcU5}CNzuP^$q};>%Hl0H)Ougl64y}9v%hYfQ9qn5fQn8mO)8ebNV?{k%?e0FX4gr z>u#bMK-#mm{=0RMQHk1!ON4RCQG^V_^Bo*1`6{B;0&BEPqaWKv*7ed%GX6MS_p&?S z0v-f<|GV#@TO57Ws``7dbq^7C!U@{z@QkcnCy5mo=#Fk}^C5MN_-SuXesa_n+|$-m zOhXp4D&NL*cY*xezLUk5F6U%&;pKSXd8@r^1yG z+uvp}qdSstN8r$Z(obsi`(#duw-PhqqMq8>OIZ9FZn6lImA7NH?&ZMdJN zK}1C4v$L>&eB3ZpK)XpM5EZbjGEprqU%&6*sMMy!R^w*TX~9vNk(~GS?)Y)cDU!j9 zxG0@6J{k6F&f}?8gaZ9z5_;1U?O$}NysA&i7@Ipb)JsBhbZ7J?8n(MYQPkWPJ(NCW zm*3OAJ(V9xwAwFlx#mGMEtX^PS|=P^>r%>|wug}ypC>>b?JNP|EZGXO9z|{z{e?G;x=fOcaJhhHj4n^pK8gdYs1@n(R;rV|Y%4O@NkJ=WPSrF>k= z&Nr^eim^jD!UFYl|3^CrrE%-yL6dbcM2d3TFYLNGdJ#$mc>p;!^tgC_Iac*krxz8) zTztAN5fohU2%zAm@ev7?wzbeF#q^g>8*f`s#7(2^gNbR95UjugCJaN?5k%eyQjV<= zbW{b3MpTF6%}@97OqGSC!zchlFGpAkBKlVkmY0_STe|L|PM9Hftu}4V#?HE$emjjS zxgSUrXXFLK$y5AE>BlBK2mk{bMM`#cr5%dhT+S@ZheeTh?vS2(jKS}xF-EucK?czy z0j~E_YKt|LR4^en<{K~=Oy>l#B(3wEru6fwOuOpLkWt$D8=0XE` zDp}y`?h-}Ham?qDZg5s(%wRn&-8enh?db9A0`Em~NHH3$rv{*4JzW|yD;}ztJ=&h~ zj>m21*#`-gVmtG3_fpgf5MK&g+thmUa)$A1Yt#DTo_~<0{_Hm3a=N*54GR8L6m7ua zQGKAYm(+(4n{6J$9qQ83k_d01k9F4%w%Jsz ze{xuokGSbDbdOhsV`BH^hrTyIZ9;TLWe|%^8ei)gy_T;_tyD=k+P>kA)F!UVG4;m~ z^fH?3ev*loFjq%I&WE7pvU~&-6tYGoU=uxAtZg)7FFbWLd8cR~Sk2H@%<7#=5j9@& zq1z0T&Qc8!p*;+nM04qT5^~b)lkym$SU35wY0sZ4U!ycd5S7}7<09&>_?|b~dNvqi z{8R56_czqW!ob2nU(%aUow)Igp75iHbxRW*>;Zw2jn2V%*<`sxNP(P{r z13Ov$sxIy3F{@81+K)4i8+E;&;R3MQ%l52?BN8m2?v?$GjSYbEOcVEyJ|L&aOa4zK zmvk=6#ZJZ}l5sdJbKPB0PDPUq*vZl$CDpLE^=3CV`&B@Ho^lLa)BmP>80hn$93pAI zK57gRk@D03n1n6ZZOD|WU7o3uF!%hmYWAYShc#KmeZaMh^?cfJg=;vy(RZvB>{$qV zX|JlT=I!|TaOnnEGL64KXE9Zw&$yA>3!4o-Fn-@eCF##r3CT~d%82U7u6{p%rX&j8+XXlK8B-U$XN*WrNugz- z8^O72KX|7WJ{bj@IxI|WKd4NnT(Z8v;@`Q44#^#l*|KvHxo`;zR>l>H4C4sPONddEG48wynX?~ppnLSo+& z^2sfhkw{56SR%H4L+%FzLMl{|0ADE1@G0>B7B60afF8bdn4@r?q?U||1IAuZEA65cWqPm6JG7StVR@vZFKf5~U?=g&=S4v3CcbZE{@ z=2~He-|!%B>$Lxc2CGV+->Z2J2oKD5`t75d=S-JG6uM>_pbfiM+l~nUN#2&$jrj?$ z%BoH@5quawO|M-w!JGe2LM(PMCt{!6{@E~&|5Igs`x?3TgN!cofGV7IR-JKl=D)Nt zJ?7@N+(JDL&P34P1i4`xyII@s*$!cViUoZFsMsq5Q`0AEx27o*%K-u_D5%=h`D#I} zXrg+SkeK-BcF5BNBNj$0*tDXnYlUAGb*7nTq(Wi>q1NZxBMQ8w1FU}p?Pe#Knd_$c z2A_;eCwS|#jHI$IwBT-dEYYva3DJXX^A7 zAqk5c`j=}&%$RMDBN)r4+l6HgO>9pqvKGq0qSKIk8{4h>Z^$+%+>a)dir&wF2uo@p`lk3nZK@732HhKVdUlbPG>i;;j*J1vV)h=-mG5 ziFD!*VtW!bkBAs1z#|Rv)Slu(_;@3@{CB!H}CxJg&E6pkI^xARqi`4F)1n@ zN-?3mUchrt&GiTOKNgv3ych2s4c#lf7bz@@au|82CXVeBlh*vKx*A0c-{t#v@?e`8 zK26?GpQE)iT&&&_*z>NLuDP-UIciCbYqs%-73qkuBaSp07!b_pgI*HK^qaNjAb~ zRk&6Y2z|4-rmZ2>k!B%2>F0#Pl`#seFP)P&uR{cSIvb7HJ?Kk2yI=bCZYXx7-Xh-A zM^vI_dMRbD_=FH8M9^V;n6R_M!jqP;>By({SE346$Q@GB{yI~KhiIDCeVr;R3uYgH zu26e4J#qE&Qn$3!*0D;keNnFcS^zqZ5IRC8;SBb@Z#^&uilMv0$+HB ziK8@a)g+d(d6EVk?=u>j@mtV7Q?e>vk$*lDFr_K(f;39_q5$$o?L&nc`n53!@lS&S z+J0~$Wt?mmh*nIdpQP6FX{WiLQ2*aUt%*k- zZ?w9>c-4^wcf4m0sP#CF9%!4p|KtA@hP$_Oi;MfN-(9za%7k`X2}1L=dEkX{689mP zhx`)-mRroQ#SN3_MJ~A_p(gecUG8UehGv+Dn z!w=Y+Bj#<@4xK@d%8d&W`s&x+cvTI)Xg3PUKatZFUalH!x=zg(u^6Gv82dKq72EN; zsG_gPbgvwnRD{CYn{1X4w~|_zZ&Qt^&kBRmzYR9}xiu`b^0zPKjMrF1e)MCDmfiVjV{40Y|DeO}j~+#~&0)}!Z= zqJPmBE}f^>Qq@^Md6=7CGf>iBWUM^qJ&p!KzB$ct7sFg-&Y~Yc>A>K$imk>gFS7X+ z$NJ~bp974A=ZTTA0$(gFBkNmA`buc~ZvW>pK33pDi ze%Dagf63S(?2QDfo{$TF)FFBQL(E4IaXMx>L5yV%TYLw$3CR7L<|qH@Gm2YGBWOF; zYPUmn;M{ds6Ov*+Tt?~Rk#%#hh-%t5r0)@c^-;PZ6SyB z1m2+L>8!A}r+sXd&Qi=e#zof}sv|>8>tjgOr6n2Cmk&=50%)J8w!RNY8vb+$mm z2m=|{&(`jgBkR|ydH(szdXLT4efQo}tPj5kc2j&P)4NS~9JuAK4g*DmLl@IaBc*p6 zXEf(oOd?21%SN#Wk_z-VzBm0vW)z*s&d#{{u;VY9seK<92N%=dY8kY776ZpKkPQ#>*c@~r_ikq2g|&};G&y?r;t|x$t$`G>wmPtSp!zcZN1<(QO*^Gmf3%t~ zWK#S$`B|;Ie$fmf*FEx{vO>aEN+hwqt`v0MuBFqWk;V z9z`FAW@N~U`|iNzrDKmwx=-3UE~KmDlZL>RpHCeGYS)6XREHNXy4Y9{4;koKTYEqd7K&~v25-E;G*~k^jY{t(9j~qQ?`%uEQA5 ze%`iz_OQIxH8|oh;B3jL%l|V;Sd^q?~)m|7HROAXToRde}6lg1VS=bZ>Xn7 zLqk(##2@f-@RM$dv#TrY;5RARUF+&LA)oJYJK;igOz^?gl#~=eCpR}YU)u3u?^Xap zuJ&!d7cWYRi}{~-vfM@hc#wsKg`Pe+D@zkO=A1>laHm|=i=WsR2rReu0s^4oiY+&A zIDBEjG#M@aBu=eBK>+@NIY);q;`TEkng<652NLZkq+Z!_PvrnX-!fI53xz_(#KyMx zpclKlsUzx$DKA6A6j`Ln6mRm>*H%`TsHi?Rkj#amvxolY+I?pw%;Lz$HoSnQTo8z1 zdvS~vz$2)syq^upg)=tX7Nh1CyeWyV^9clCXy0Ty_pRXDfOi81Gf*?HY~cLP#%&?o zc%dTnx8~-1L`1f>w%*>va_Duv{tZ1qo}eQBKSOaZYTZCwQJaxETB)F*05}sMINrS- zGHi!Tj(o+y7-9WSreKn&fzYm(p}zn{lsBa` zqbPq{@q;OHTJ1Ncz|xFWmIyei?}tDQj^gMN^ETl*jT+!e0gZwHB{w!U*45SZ@bK{W z_lH77Ke_r!u@nf?JRl&>@BTgETV@;b;zB~I!n`TQhK3NBi5%e70iKZm3b$?B0a8wsugfidT!X3<;2Uh=`7Er#wR(1+P%+UGa;I zG~CNQuZt3?kS!I{w({I@IARh%c4!Mp8NQo2J#oZ}QEuCRUV4o-S&R2Ecd=L~yh@uo zmJbkVFF&VDAFa3-d|a0$s<}R+Pf=ZgKBqh*znZVOm*LolH#kymVRS6HR_q|i4(SFv zT_MeKNvry^U_H8+z%o2GmT>`A3@9?}ODm0?5=+{5 z%7&1H$%*I-%HC27lh~?~e(BFgOxXF~8Qg6CrNy3dwxdYta^ZfAfxwBK-RQpoa zlCjWvhxDB*Cw&)WRrS?U+Stuv+L}VJ&C&4?%njYOnHeWCU%KX1+;p|HZQcf{@Vjbx zF(@p`S~vNmZ1mA^FeWZ@CU>n7uF*0~EJ@SA=pusE-4(1V*Ex2=O`PX!)nt{K)E8qf zm>nmr=lxmrw~8s@e=aN?ZYWc8H&1Zm756i8ZdB3W;0xa$SQ$su>h#nNa`j3^X?1k> z4l#jJ_;l>kHESiI^gNewvHhpf3@^%f(YRayIUEsGDqH%p*Z@4`h^ld9jlDLT2>z1} zLmHl3_|i7q#&i@y%M6e@g~s!g89#-=^N;3JGDVc?f9l%I7*9#O4XUZQ;oiEa=X;AR z_z9j7E1Vm>dFSaukgbS0zkAV`tr0ZW%^2@UZ9pxG+;lsqq*b z^Zh%&&R(6(|9}r(Xm&iI0 zbwB^S1Sm_2z9=6f+J8QIV4#S1K_Ki`+Drlf8!UOeSX ze-`=brgxYD=k?C)_8I^awu1W1U3s|LR2+XbuiEHcSZf=H0dP`3EHvKJ@sAynA zvyBUP+NkYptn=K+Q_2cl7j?%Ae!t1xJ9otMHV*#VG5$68egRQI*8lxv3J>`1F7#|} zI3-@0M_TQK^(=S+)$2y7K&QFkJn6-P!@rVzg}u(g^?1?1nXU!LpJS}3dm2TDCm7Eg zJ#K8nJH9PV$W5uxIIzpQR-YJ7vVh$#*oMzS;el7?KPHm4Q%QR$Ti8*BOv-P@XelDi zEYK;f6t@=QwmNP(@}tlJ!ehpesO@IcZw7xq0{TSQSWnz%(JHh^Z$#eyIou_z-<;Mz zrYX^4{w;~#&5Ql8`YGr0->V{-gzsej)!YjD-$Fga|5KPv8PA?lnw@>(@QDRI*r--3 zLyQ8^|HJdqPD6`i;^-)2ZEfu#W^8O+kWUSt1xxxW`@c2bRW4XBEG)Pl#3Uq`RB5EY zo{-Sg)C^ED1T9DaCsMNEsdD6`q<){@jC~elG(GA?@p+ZglcHAT1uNBWx9Fds&}*)H z{&(~_vuEc}HR>SNlWxJ}5-%vt<$NPTBY;CZch~eyMl(f;GxfjD`9MB@{_J&kRIhSy z`T$$gZ}phreQQI+V{dS=H!;@Z?H>?u2ZL59(WYBiDq#)f_2ePj1_3=4t=)0;_xIYO z)+c*k#563XOxjmu2sxRr1o}SS*##t#@HyT44=ey*9v>a@+OCt;a$H7NxyB7RUJJNXprZdH=W1orZtQQ=&1~AS16%v`W)#m8Dy}kKe4mC89 ze6Fnp#AzwY*L3+DR`O-%Y&?{|!ul!^^qDi<@*6~pol#%pRk+l8X9rjcZtRjZQoB6LBKjmbo2vxBh5mAN2d>+PugP{4`B(Bd>o$eKYGA7Gpjl zDeu&{-?h?th7B~b=IfmEdtB@_HlunfW_;2h`@MBXBIrUjXp!AAGO#HbMI!8Z=cfzN za3!NTQ6m6`YU^#9_o@cnb(<^TEL6-eyy>-8Gd(#4jD+6$g#9rB#0{TUuU_qdv!HU* zhBs&1G>Vx{)aLN%jvGB8;||XSyCCV`A)*#kv&$FvyS7m$1K*Ra*XL2h0pvXSwV&Tg zPTg56h~O+JxPKJ?NXJ95ArW1obY=%5S>At@^}$%YS$%ZP^ZMkTOt6q7v>I~=AZv=6 z*=n>|ijT)I+UR%A<<^gVwwyC6Oaj_Dd;Ju4qTOV=Jy5i1x?06;Cy}MY3pftPPn)GG z3DHvMNu>(IAQckGR?KovnnDruWzPB_G6TPwe6hdKGGysm`=h_?= zg4C)VU)ZIUHE$>DYBxpgb~T2X%BNNH(Jp0fZuPZEdqS5_)3|-)mEc6aj-*!}tY!eP z@mQK^TrTEtws-FsNynY;9sI{DAZt#Kyl0_a^Ra9|bqT&7Z`sZ{D(tR{M+3dOaM{gz z?ga;p%bA)L>l10-zlrg#S-=wuf=LP`LLL8*-E{9^P|5$JQcs zHYr{lHG^(nC%dGzj_I$^7=up|lEP+E^f+eUu;;d#9U-%YDgOX#rWTPGPuejP^E!=` zYMx8Lj+l4nLJ;NpUtQOq3(#ah`3#QSl{cDN@#~s)K&4pzIH_ zo+-BhD4H=aL@Ic;_g1Q+n1NF{U3-f;rB&;$yEkWvT!(1?E{akVC-jKhGbQSt7kgw_ zA$4|ZLO%CyX2%?7&wWp0Dk`Frrb9BUx9z1~ZuVxO-_ZN`S0JGj$f?Y7tcO~?r6a(_=Bn&J5GlCQqm*S)B-W$u^(Ii4oA0a{3{Etq<-@xLa zz6g?fj-eRn2V>}fI1O3<7I*E8uT}&iea+jQ1`)vADbi-l@sT9-gSHR@xMGiW8&PBc zHhSpF71ttsKD$VV;<6$o&|b8_(tHREIa;){jZv#CQ(U53%{P{?dCc~)QA{F$^J7@T z5U?iglb(;vVL)GXqWB1HPgkh1 znOSpN|F4Y$#iLZ6gtsP1^{``(^YLSB284RI!cC8Sb~9LL&{B&+MG7}PZQaL*`Q%1V zQN-6qI#Y_CEDPE$PwvU*R{Rlb-bj3B80g-c-4i-{#e7f0zxEqVtuC$>yd_Ilnjs_O zYWluxsCi0two+l;(x&gXV$Iq+0Rdsyq7s)x2eq)@F$*hCHw(WhIXjzb>&2!L30;r) zsw{Srgk1&Vjo!5C&b3PKRuQ@!EpqxMxYh%pW7SwcrdKe_H79+qmY`b|L@7W`qjOa%Ncr4mNIm8tBCSTgoK)6>)O@$Z1^>%&Zj zuToMhDx<~4#m7qFCy>5vkPkbLn=}$O*g<9~q}{_`x#Xu*=ILIowmCxvrK$&&h81MM zMxwzHp1XT70jM}PD&O_fqX#M1yo#_x7|ss4b&44_CntOJYGs(+j~1I|Xi5T8hT(I# za0`2@^S4mwOB~~{s|WnfZAqWURPn2&2xeMmZTsec4$1B=#FJuUsEe0E(Rf~8$e0ec zgu+oh!;-2KeGq$n7~9`wh5Z+E^c>N?3*GFG3W#X1Kb)^hO_i*8nEdqYncdwRIlcrF za@#hj(E7oX_u$6|$0GBZ;P2wWV@Ff7&EHM^hhfE1wl*+nBQ02*dGIy(E& z$*SR&E%0*WKd0j_kXVRlqM%@_q0yivuNPWgR)&N4Mu4QgC4KZ88wWdkE)ZzKo?ONL$lNRM*m67tV>4@T)l=16J%{A{?soplcS2m%nS?-FT z&ealaHIV@&%<+!-{W3CQA)anr+H2fG#9(^3+|^gyrcZCx!8{gtuVf3|*viY_6}qd* zM1*v;RHQ1d^Qjb!3Z|j1BpSr374(_OeECmfnK3lT+c|7j{#fZql>)Xe)eEQ)j~=%l zT*P_2M&2H@noJciaf5oUw&Di(xN_Z_i@eN2Y0t7&e6}2`5`KN#c4W|8r{T6)^!T8T z?k)F4Qqucm5GIC4I$AclPnrKJV&)MA5D2}JPvf$IwOUmbG7PiJgt3FI7i;Ed)a<}9 ziOZ`^7E{M6^#cXh3PB0j5^|T@)1EW{+oJ zA*%|(Q%8r19xgGpl>{CY$`lkI8$una<<-^3C1pFw+1WN?yxT5DRmF^YsyLzyo2TkF z1gz~H|Lm7#1-QKM>^+gzf}ARL{Oy&)^YUcTou~SoUZGjh?qy5Ct?Y+oDQc30JDZrn zMDK+?u$|KNxd7XzUV8(VS!_my!XodJobTJ9BLOinF=k0lPdRs`TX_S#n`+2qJsD-X zX_tCgy_k~6+SQJVHQpcpO@;yNAoh*%#Co7Iw$yTarn<{S<)K6*^!C7i_EMO zNJqd=q+qxsmRFg+X0+hC|7rBzKl*Tw`;xEU9&jGrIwwn}OH^6D_S;6wUrM01U=&Qe zThUxVk?F#cN9H{y0ERe(q$Mh}(0|~lzBe1=af%q-|gYmqKK#52=peH6~{vXO`Fo%E^1Y)`B z{raZ!P_Y^#!1DgJ1~Lni#jMS%O`oOp1gZ?*4A%jvw~xb%E?Qn)nd)q{nuTap^sL>h zVo8P33L4G6nppwT$W}W=v-+@6`};a-W8+}nn}S6KD|p-HXcT<7wvs!v#ji!L^C=N^ zz3N$n`QuHYKIHXWEPE%q{YYWnXjjHuh}*}2z%WCJng+>a;7V_^9)Sn@4Q5UG@U$3rXB8LNx>ZQ$O@Xta9yrUF zxZQDk$YF{*4`7+zEr`3lue!P9N`l;7kuKN-&UUY2MfY#0DwB;%WU4FIX>>9;XU2|- z9Sy2Igd_IZgV1)_97M!vx`ISiRaG=+{G{na+#o$Yz22zm!J@(`Ne`TQ&XzsT2fh|{RG}<=HMJ`~&V5ZrT--3Y;ccC+wO6e5*8D71 zb&WdAaf5lD2dp7OLo#N$n0_H`rP9JLW|;yyKiE}BJd27p>r|zEMzI}BA1mI&2Z(%l zJFxB8FV_y=fz^3R_{f)ZQvYJ4Y}4aGHpQk)4JG$AgM7stKWOhI^{KMU%UUh8xF79f z7sDM@z?{Dz104Fix4rQ?;o4?^CpsYF*h$`>d%@$VuBO)I$op3q(>(l%vMC{@B7H)a z%3v<$WF8g=N;L>{ZYejGPGj&zb;}gQ zImTVoZmdL`h4XGm;zbbFv-;hINLb>LgLHD9LkcF6C4oeDhJ_Or8nk6+uR%V?tmexN z4go$#95f+j_B-5x<@7e4*<2Jfhb$a?06pf*KxMKd{^Pf0LFHz;qm`x~P0#ul?}UF4 z0lhaZbo&aFEi%;y4p68pge{4A@e!yUEkAf!CJeE4Y?5V3c-$&E|6+-+4Ch1P)kJ$I z=h(?<+=Y66BFcCDQ>n{5LCdiQgRLYU&5krdrtAxMr4%cA>jNELGKV9>f*jhIp?6N8 zLjNni@o4@J`MEDuz7h_M+Rf6^J@&l(rvxtnHCk26GHDi!OD$Hzu0V%P3GkXv4#B%) zD$ZY=jPa?HGXM`b`+>1+O(t!yfV|6o9+q?j5T|8YPD_gTEY_EOEmWUEwy!JD> z1DDn8;^=U0k~FcJL~??1h^V5=j3repAA&llO@ch8nA9C!O@-piT*B898S)}EOQ_lY z;7!rfcxjjt{W}7}oc2nq-o8y&1GSG}@|Trm;nXT7LvYY3Kcce1Y%0(Pnum?ddVW1Lm4YzDZ!ktzb+HC0%#4Eo}1qvMa*$`C|EaWU4xR}`V?1*k`GG5dLDyk zG^^pzR_ImnbzhFJwKJ~__39K|uK4@C8372zIY_xI*x}UwY9x)-=f2@tOayTw6Dv+= z80J{{fepo7v5mnHd|VOjh}HfEv0NP8&CtuIpQv$zzYo zPc0xfcIE+V5V~~2s#%y|I+(+%X%|RyQfLTQY)RW)Q$HYe-o$GNs+8kkVjqeE_}578l|U#L2LL$K9<9Z8Xcdr*f-b*!H&Z)SGo`noW|+8Q1hj|j^wR| z#%o>~wZn^?m1o&p-`3HqBBE7SGT9wFeti)O2J>~Q#ewd>O9mf=ygX~I4LLty)?+D&nSyBo-#G;2p4)?pvH5narv8z9G!weP%&GX@VLT7 z15sP^`cU3ytK}DtW4>>R8hC%DwW?7G9iN z=nr{_N;7|Mn)~Gk#7#&+0`*F~M=`@V626hE+YELYP^I+UyHj)YBVo*wfBJOCw0H+O z`;s%=(c$0V)0(Qd?959~&%Uwq*s1@(V;&MUglr{uWB=8|amK;O%ZxPi`@8tx2!zG6 zzkb+!88tG=-|iqHO?w)iCr&b0yn_FX1#0!iDY*QlR6N2J_F=YJvVL{x;Td3(qkG)! z0!o~;M!SP1Ix!%n%8q$k8+=Q}C5;PoDce|Zw8z~kWC%(E^OEvg3PoMRaRh5)Lho3A`>A% zuR$GNk_V0ATmJ6h0wD48yP3CYX_;vaF6+w+nZtJ5C-M@&I>Q`eTb+4u)Jxr1K?vDyY)aOd|SC1vr)$KLZSKmwCxON8}I^phJ8qO*;G_+uU zuht8-o?VKQe_Nke|5SS8);2>>W#UvpSI8J>;2n(1p@^eVc8lziQd8};a)K#&)%fPN+FlIKfxYG<(k)&O8%0c@Ic8zU6SXh- z69$#iDBfe&l$Bc&z%f-?&dT@u6zvZ#p4ShFYm1BNgoHk~XHyk?Q9=ZRAJga+%JtuD z>bso$7?F9uwVc-whUcYVr&|ely2^q2UYjIU5$1-4s#N?iR;5LSH&M_qm-;AM$QT-q z8qw(OetNiYUY~)NoNZhrQvK|{N^6MPc~y3;zoj9@Er`CCQ3t12?_nXRx&4F@(Ei}} zCQq2v>Kfp!dO4I>s4hifuAyqWSC(d0Kepf`6iHDMuEp9v1vt&DkxBRhwZ8ZKOxs!K z#s)N#J7a2T|G6zP+J0+dR{Fllf}lWD#P^_T&-qej%qPE z>N(Wo8zO2LyDV$oMOF(d%4l%jzqzAdVfQ@M(uaO5pEY2ejqh{QZ%~O&a^t3x&L!_n zaF`=BH68O;b(I|eM5U)87y=nJd_(gCm`s^NE;G12uevT*sn~(i72<#KT4n$Za(;us zXv?FSh#exiqi#K08rW=2aQ1l9H$s=hiMyG7|N6&qMsSvp>+wY~+oeiKAdSXc1%{eU=8zzALk$Wp%+ENahdshoqEktF;yoIg`nGWcD_x+JX^)xG)l6%!G zV}zCYlLL!<0FC7DBbb2|#LcEC3-+dC%RJ^+f{y+}6jr#StsQ}kKH+PDRlt5l{CnN3 z8Iwu{mx%d2$M4CDOtqbZ{t?~jyc&HTboP%yS>c<>GWLVYh*#m^?Zw&x6v zs2N4+$TqeFv6M2B7*}`-NcN4`bgFB_Ex1|O<-C#TcfIKehG0QK5z=Xd`_t{5c3eID zn`@i9eAT-$?l2}b;1F|s%U)}l(4E_H%y{?k-ACw=rYVK3?J<{m83q|xi`8H{7JCkC zyF`+#^S;h=D2f=~Mi7r~9LY;S(ut&bW4RF^+wTP7028WBhaj!ppUAdPy_~~SJXm$! z$4L$=Mj7UF#mCmSsY)?0CB=~mT9irtb`^e8XA!(IS52&}8FRqV0I66pwQkFxc~_vj z+z8cBRz3?~_bwobq#PN!Ia;+8bV|s2x*SJg(5l<#vsy~clfY0rr z$!I8ld@-S~rNIA|=q+pY5{uYu7RQq1Ol9=fK*!mOBeoH__J{|`(kADdX(6brK*IHX z9~?^5nv_DDkoRxnb~y*>lhOiGUv{gz(fFSLfTY6e9;xHEqo(sl(UMI)zgyA4C_;Xl zQgtlEhA#?r8bj!)q#q%lBU6$ZtP6HK(*_+1=b|#(Xn@sQ1EnIuSIKVFS552huT0EZiHaTAp z7;8QBy3%d+Yl!N3BSdaXR!z58(UJu{2NQa>I%WWUi~>|__KEerC6@yc^{>1TE{{G! z-o?voj2-xhsq29o+Uj5pMJBaxp03*Tn3`<`JdZp2sPI4$CONB9yA=_N3RkK8&Iff6 z6L)nQ7(Uc{vu{0ONtBnMD^N7#d8Z|S@f<5o3vG6`1o?pKY?nTkd4ovs9KUV^5EKG(Hj^C;0M_h3TF zwvfs(UelQa%_TEdD_#Y11%N@8n~@P&b-P$(EblJ{lTg6F0t{h;6JN$vz#l?FmLq(QJgu}Fz8(AawAoUix>Up80{ z-_Ku_M8UHt;stOpTrp?0v)2p>>4^?2UcoN4`HGFs>1ZsGW@BI4xJszS2|kDS3Yk!7 zj`#tFV5D7;R8C8c^?HkqbnR_}pZ8+=P!&dkXOm*s`WI2c94if4(AZceuP;OYH#`{% zqtVioX6)f}1;*Q)1-Y|=H*c4JwhG_hd4eCz?q82Z-rkT>VD#_ktO&Rr(mPUHl6&0m zmY~(k4z8n)p+GvY11H;Bnm|($cEb4XMo%@+cG8CaelYYTlp5L!5Xg!aKPIi&5eOea z?gdk$B3AumyElaS?i`gP9Kk{DC3hjW|? zI|(QUIkdQR_u@J>Prr!)8}}tY^zL zyAw&|X-e_W5nK>W;{r}Az@$6?p?%)a<|*xnCh_8Yx6vAh67u0N?^*QsfSLlC=t{te z{uB3`Qa&f=U3brJ14NgT0~Z@SMCVv}U0;HBj=)i7X*mVFcs!c*Qnq*a%HpSYS+%u8TNJcfdSqIqZWd0$jf1ID53AOkbySE zeNYX>m54^7HJBl5?Eb8gUlvL)bwIP=~D@+SS{b^xdam!|sBubyyeM zr(aFIXm`Mov1iR6GYtp{5Oz?Huv~JOv>?n`Xf(g||8!RDJrYv(;Cs~WIJe3<1%IWn zWmOk%ojN_o((Qv(&+c^{=#F<59!O^54z-v=9vI%ufvCIL%Gc0#nU3P8eJXbs1vhUl zxPLQG*mn?3@pVyqk}hE=4eWijUFofg4b}Tdzlh+3$$no*Z zS*)w(^n}Qf&oRHLYmVsaZNh?W@_1Ghc;NZx&#@@YOTXvm2U2twFVou}ejgKSyO5wF z$|fS7aVtU~Nebo443Mt*8!P5J(o9wxwakR*pbDa9k9uh}_FoGfttneKNbcaG4TU6X z;Rqd&8FZ{n8%EsvHUS;dN@=Y)XUgYV8bR;=NhF(e}OU>j!SVhY3aT>$`{USbu!{gT{ z3*=$;R5NFVYkCfyMrJJy`{Fkl+}-FhG)3`Qf?qUN(>Jfg`qq9aQy;hb!0go zzuu5&x`U?O$Kh&j@Mx|e!p}69ob#&?IWEHY5O)#UM*zF_TT8;j1dGxZV!w1zu;LXlKGbFVJ zk}7%|aI|-Fyn?G=^_HvkoMZ?mu7H`Dl3RYcC(;{iytEM&mDV(+PlLn5EKzZI);SPR z)VGCwBw_uUH@2U|^3owV4Skr2k0bjb95sK;S30ZK49l8Ji4)LMcVpB3SiW|sQpps4 zg}2>+oUc_<#0=h?pTS@}xIZNIO)jEf)b5YadG~5+TJEl3KOH2xhtuTpx#To>WH$D4 z(=$VXdXBEMbrA?IeOqn9YbF;~zG}=H%WSn|d6J3Rl|BjVOWNb;4Y_k5GT%4D~h z$dqBo*g8W#Y~++j!chza+b>jqVy9S@{T`DaA&TSSc>E&H5s&GY5RA~>fx&Bn;S zuT|^9ZM8G(cQ_BtWvMclp!fgFl9wmsc%uH!a-7uY2?#`g8` z?b}Cnglk65mnlh1U>l}CvO>{VyuDN1{T3;I!0%#}%OPvVI-OTaV5XmsOKTg-aSmU9 z)7Cwy`(+%oaZt?`#!ZVjI@`t+T#j1x)KMDGk>q08JYKP!NokE-R5{dUkXZV1?a^*q z-rj-YU*M8Rpem@k$^K>*!oB*lzx4PtyXvo`k zDF~t#HJA%80lt=;^m94$-#;AA*$FRTGKH^RLZXiNn6r*}50apgr7dp=1~IhPa<==$ z`k2qsmv4fPGkL$I4Q4CPbIVJg;$lvl$!Rd~KbK$O z18ni6Y`V6pgnd^%cOsP|sLuutxsE*D$4(EI>Y<%!yuZ&R&75_7$jj?yi(jr4wJaW` zVbI+8g{Kh5Zqmo6YKf)^x*AlF0nOYz6!w?B2K@He?c*xZR95Y{%q2f-PR8^S^GBrd zo0&Yhlr4=47=dsqh)yA=pQ#Kvu=$Qt^+r=+SwvsRqIft8-NSrP=0+fAs^|E3>^6yq zMS{;ea`WSsg-m@;h!1_S|1Zw&3kXWSXnsA`?au&}rKidMsVR`zFgi$qvSWFbm#?t9 z0Zz66Rmb_7{(AlhO)QNIvdL>^+deT2Dya>6RG}VO=nIfn`pse4@w-tLS1}pHQ=s&X zjmrsx%G^eNXUk`;mV~Ew3NRKfLIFRz>XuYimol1oP)fDZZp~}nmyQoCEEg)N!OZpa z(QUgn>{}(wkJ+WUxObjd?zN)6ylJ|;evcF5?9ufLr@2ExvEoqZ?rUxeCQl3WH=OK_ ze0n`&CK<;}dvL55ZGW=8yLLbB!_L@gI&aNV_8>osQ(z`BZ}}xnYk|80iIDM4Cv9t$ zL8DPZ>L4MFOp9deaph9$oQz!ZJB_?h~DDZEbV0L)LF{W`5DjoG0sGhDW6*GnU$AS;TB>rA@dq z&8yPl&`0QLXJR=EMKi)-78z^fF-CtGZ3b+1U80g0#`Wt7Lm_x$a=Nl-_}=LPAAXQ+Z^oV}M>04z*mWq)4I3 zy%WsxAte8UWke*MFnRnI*NjC8Z`IrYFO1(8gmtkZ<Kf;20BZDO4mZTDuoO=&f z`T>xVj#nfi^MFU6Sk?7*5z3bY=jzFd^n}U%N*FZa{7lYeb$^jzU$Q%@q8Ky z5+|PHP8_HJ-`cs?X7H$L$;wrnR$+yFIUzo!WoBKZNO}l1U5gi+-z(Nz+X` zSn>VT&w8fJo3cy$;?rwUq))<^0R_5UdV2<)M?iRK$}r}5l3nYL@K0Jcl?$b&)xkp! zuJCe!UKCLPRU!KLt9wa3W4p={`A{1rX(K{PX#9$X$gK&kOOIadjsT5X?sNo}&h zTOeFPL6D6xRMGacBj&MUak-Lc@S+|&k%nQ|A{!rGq!%cDnBKX?VY+R+5~s9Qt$$Hv zS)X)ER?u(&0buh(B^kjAEXV9`BpHBi_LsV)w235ogM3PWk`F+Fyd+SM$4Syv%Wq|I zA}CWE8Ic+rDe}u?IipK1%$|hQ;?H4_2;eB&kjv!(c|E7GWnjQrOI1-*85w~>t&-aM zFyU;&oIF3tz-r8w5hV=qEO7tjx9o9-ii_#{9kvrhE9L_F2aLD0z4S0X(YgzeFeW`e zIHy`zQ*=Ij3on42zZ?N+_NLH@qe7M1Spcj=aR-4~znsnL8h_LE*(YyNs^KytW5`X^WZi~JWuyhmg5 zsHu9J$H~oob#?Vz(R$!LI%gQ%tMxzm>q?xVqffycC76EBz1xn2hWVY8>ADePvgtLi z=c^+LK863u!^eM-?p@$ae~BLWM{dD{fft4dGv5 zKCov}9>#=at#Z-V$Bzc@pZju;_Lqdv?x{o@6TIidcOt$$_1!RB0(j2-rw{)3$09kO zN&NpkZUFFIG(@0BoE8T;Xu-Npt89FIr24=1N$LKPFpVPv}U?YjBkrFLe#@M4vXboHO6{WSfz^T8<&d-@|PVrvS*B=WrM7# zn`M-YK)ccNj2^9H#@=~!W7gyQ5f!_x--twuW-J?ZY@hk6Ha1L@FH2^IHcy9!hYer6 zm5Gpe{kp?oEQ{>V*qq(%qy#xG=KDVirHu73{7}boRhMhzICXO@CnC97+12-bPyy}e zx9^{>7FQwSpWgL}!G?MD%UHfNn%s2f)gzuZqLOCuy z*5Ar}s+iMe#NB)0{U-Z$EPOy`%xlr-7f(X|8N$y1Gu)xU&Kr_pyAo7Wvs+bvf2G+~ zot6I02#i9ztH@Diqbd+fR!eFs0~O-=&T7_2!Y2KqB(r=S{ne+Xc5i|50g1PhX=^^W z6`YtZjZWX@=V3<`rf+yuD)7*AoTRp}?SV>Xv12USpRi)pk48KMq|IDo0&GtVfkS_& zrUNBC&!ZMT97Hl~o21$v8hlZRoWD0)Ec|qtMH2>DyDwa0uaqu?Q_r9y2X^~DHq-XW z?Lj%8jyL7M(3^3E7~YLz_@=t9rg*fPd*#Tj^1m1&IZ4t($UJklw^2*-<@;fSN9VHh zPtEivhcG2Qx(f|Ah5+^YiDP#IS!c(Lv^3r<>i7a(@Aey?c|)@UOjK=npC$KBPBR(o ziTjGDdd5zf_ZvRyq86<0r!6^?H{vEBm&aH`rPwNuJL{)UkMO>2r$&PNs-H(t!X7tH z1{HtMO!IL3djkN+%`_(+&^pk~LFs>*8+;*7M%CG9>qCBLA*#vVu#XoPxy`E*WiZcs z5o`*)+S=X5p zBaTy2xCRFIw+mmtlQB5IAsbu1)ex8EZ`nSrfNFPqCqXVmBi91(D2Ai_-L2W_GpY9UV~%n7_08}p0-;y#fSZ$7SpC{Vo_C?b(V{bi%geJ0 z2v>J6Geu2m6H(?FqSJ2Gpy7R*WX_#9FvzvIWFV(={HHv1qp&l#a*<8 zO`4nAJy6qHz8hK>Pkrpx-Mtycc250tffwZqll=cREWt3my(~l^`I8X7e1=L<%Yu4X zIud^z^G??2vjgG}PaXYIy6dBVH5E8nT>wcER)jehkaSks*vCa;M_Hl4*RH0B=Z0H6 z9VJ-cYJZH!%2VGr)0T!XoI={Q_c8b$1I z@g+5M=#=lk`~nK|yAz@Zzpm(Rj@zq!Ve`E})wFCPK7cN(B}exw>Tu$j3cL2l*OK5h z@1U|`7&4RUMB9EG^{6ndpRN4t4~sZzc`d^CM3t6{*U}6Mp#-$cv2hGE5u}0;T#)Uc z*dM>Kh6QGfhma2mt>M=nG2b-xd*x`E*tf+@n7dC(T1sRNAGy{nsn8&_1d39Ja+ZA z;+Yn?Fltj$fyg3D%g-!J`Ljn~K;ZFu^kOL3?q#ducEXdp+kNY>X}&zqCMgNYlOxX1 zaz})4>ucc4$GvOtCaJJ>)7Ondw37<&*C|j`blH>R$HspB$HzipUiiBu&na)m>~`2; zdGzfR>Epq`WB1cT3kSSQgygS~^Ml8mHR9K9_rkkRB)(4uXLTo%$Zf1!k^@h^-jl-| zyRo{I9OxcscP#f$I|~AH2wjZgW>4_mkNPmVZODzI%Ckq@f^~pUwrzGQ`c*J`)xV28 z0(9ejsc+a4@{oHC+7B(|yD?Pv)G-Fvf;xN%d;QAP{ZUPLjtA#P6PiaK)@&h7lUNEWxGcWq#B6%k7r!eH1QJpJ_}9`s?&H<)Ef`)fYi%oe;g z5!`F{`@-%+wswE5F@AUXyjtnxeTXC%&AD)@vYO-xrNv!4waKNvw*YLJ36mbJn85aI zMi7wNik4z0$CG$KgdY9*@-{5EKgwI8=I;3DsdlBoWcZ*l%+C0v+qLVf06dheo$G7T z{7UzS_Tfk#GlD;$#V0@jq*RV%7LGO|n64B

      %nou;v@}I;ErwKMUHBq^b&A$Jt<3 z87iGn9k?jzk_o7ObJA@EhoPGTP8kubDnF|i@?YrYr)c!Qzg+`-5}|$hPz%h=@_JAR z!zJdcw>mq{^1P9VwfiK%1-$!N%S|NKptR9ia@P#4vz={pFM;}G)VF?yE!I)CGUizG zK43WwA0OWa1o!&}ANm?U3@K{`OtcH8qnS)a^X!42wM*R&^)v_&);AQMtW1H34Q;?w z9x`lJx_*{F`JqOso%<8xqoXU{hK^jGBon7YM#v2#DYbE*s<_vEct7Hz-Viyi>SB&K z?JP^CRqayjohOl!whbZ%o~;Ob+>dUuJdqI5w63{WR1c!u8xTEJ%v4K4g%TO99?YVI zYmiGkZp(w8vDWxczs+__ovblIPuSu0L*;1>k=ay?Dnna?iQ^o4#@)s7l~ubqo3i8; z#nzn-WTDi%ow-bsQQ-O~(oCmDN{x*OG>hN$c)7}GxI!qs4vGc#`MuGfemI$9R4?S+ zRCoQDgc*hmsn?KJ!Mn1UYm}W6T4}DgU9ENo8S3F-lYIRBoN%Xcww|i>1h48g*WDJG z1aobISA4Edsy;H98>DfqcwFtz)LNaJ%I{<}9eIgmIC8*SFh6j>kNZ z3)~6DuZJfX=6{H9!&lV{Sw_P&A+L2%Br>yBIu4RFGhZlEhJMYogI_aJlX?fd)iIq3 zuv%8rwkgCe;y0R)+T^Y;ge`+Wov%!tU?q3SQpqJ%CY=*cUklT2 z(Nob&RH{q0g$WS4qTbZNe8F)vbPC8|`JmFev_mw{;_J>RWGZfB&Wod#;1=r#T5+bw zXQpxY=iM@-5Ant--{Qie5_t^go1S*pPj?GYND~B>iY)ZI$3geV#1`vJj`UAQ?cf-v z^??SK9Oy3~Z1-j0+3UAPQE+%VhbkYF(hH-!!bnypz6>{ht{Xz1e@N$c|Fdm47ESej z=0t(GbFqOe%)}Slgu;;{m1~qNk;`+no@?Gh+_6}8;KPefeJwd-L5~aU<;An>#$ur3E&>zV2nrQfCsxlXZLKcALw!1pD&w!Q zTgyQw=Kn}#7wok;r_tYtghj|5CJ?hO)zpEJg5fPp>NTwy@LlQg8Elk|on9)0IeJrfM<30uIusz0I~j6dL z%Np)Og8M6tj1%d7`nmO;TXc67SPc*S+CA<~)}5pxHfs~lrRXupsUx@Nn8-TmZ34Y$k9 zpZuoV3e^)F)!f3pqyc2w?4mrhO_&oUs3C({)_ z^8kJJ<41btr1iAcNEbHjN8tdoa+>&Eb(i3mkGEj%HLuMG;hAlgr|awCinc>OCh>1} z{_r{X&v4VM8$jYs+Wx^3M))j)d#3})1UAibFEgw;&k!wI<-J9bvPGq_!z;&_V~)>4 z75d#G_fiyzCUDfF0@AXsLdZPY?!rDqa#zSE~Ji+~-ccecT>f^nWHcaX{`V?7ABF7S7f()cCP42Y3Wp z#GcS1kCzzkyk-p*8i#AAssZg@mzz0xl97#gf@x2iph3sVnI7FWpNXqm;1L$Tr}w>2 z^Cc@mjxH?#8pYZL+F#Qe^{%l9`n|Sz`dC<24$`|&UU=T0Y@|_5m~aMT^BlD*SG&vj zO^)AuUM%33Q>%4Rq2y?mQKg^gFu=7s>iOOBjAM1)i3(Yl%%+X1F$`?8NXBCH#WCDA zx1Jj0ZoP+6%qG{Zm}JQ9H2tJ=R-)C9PGX6FgV|P2yd}po9Qfd9l;ryi9ab11K6Di{ z@glPPogDyXy!jF82o#z8uIxH2SkT!s7V{FIJfCO=6d~pBkA&k!r#qj{63n626A8RR{S{j zI@zKkstA`j7c*l-*Sh%s`1Mtd%oZMoIhuF?|ZMcu614OUiT>CQY0`>tuG6X#ABWrq6`b?KtsxY zYj7aFbT%9~3OXpEha@6WJWQJoQ}Q^L6>kafYy4FuU$}L5reB+RJj74C!H8lk zk;-W+5p?0%q~H2n8v^7l&)#*`EA|!3(nJdBZm_JcI&!A5vVOIY4jhQ`tskeu{a7nu z{5gq5vTwm;vU=(&vT;dGBBs;i4%T;yL0@v1Pg|DYi@?PYd+)gP=JS2y zZfoF`NDmh)!f&V9R|iGJz+A(C4^AjFtG?}ysg24f=UFCQm>G=BIX6s%r* zIA7s0U#6=`L3g}1Wm#FNaF{r~zqEAGDDEW;d*?T2p8PPv7ib}BFT;2m9~necL=ACm zYQAzRn!2N&jJ+g(xjk7e*bpZnpD2r$Q z89alFdpGZ4L+PR}D1g`EzCN7FBZ&YFo4xK`S~MFkHjZS~c6af3-Q(tRzS!2g*kHMJ z5j!p%w*SFm({~Kl3;P5>(c!D^G^Tce9=4xF!|!($sS?1SXm=w_)HBwm$@J+tJq)(5NvBJ>t?vqW zYDs{xgWYwhysu1jobG~PX4m7%w+roSd_kv&+ACh)WiYA-${&u8t_-wd!?>=gw-c6@ zWgc0D{!giF+v9wfbGsHwAIh!JZw`~we-}x(pS^u*67A%1-g4+nQe(tK?r}WCZoReA z9$}z#D(zO>xI_k(TQ@Q??ntvbzevW6h(WVS6cMR8Xd276-#jbvcGti1*ds$oSYIN#utm=8@2XnW%%Q*?YlkMZ7h*-AVnPkgN zO|Mq-#bHuNyj`laJ>alYN8ii52@x{e_DNySaoCI%sP2_}t3Z!TNmn}RCsu%FbfvDY zo;)b;bS!l_xNNMP|HIYTqKvOY{;gaj+I#KUr+liIN`3KrlS_2^)1}FL)L4NPO!TCr zTPscFZDU0P+(Vwe)nCm!zC2g*_l=5=iHcG#rGd+dE(!|^ds^Pb5ux^sjhU3Rux?DI zbV03?-jAP|>9mf@E;%V&t@?fi%|W=yo~4;a3k^yJL2_U8*T~ojD+r2zhW|>etxtP2 z#3T0_ef%ZkZjoqg#n~jNd^#LmA%=aB_Ute}ljr)7=mvqLOO%dUy3@GZn5f>JsuSTX z*pU-5JXQ0&i%~Wr%6=7af0fe>krx`t4_i7Oj3=_1aP_YQ!LAU^Mgw_LNnkAUkgB)6KPq$*WhrT35QOY%{c`1 zD!v(`!nQAoveslwpb@+IW_F_plSo^Y@endl9n@(lI={f_Lx^bHx&O4i+~d$MAg*Hp zScI)byt^XS7=(haM;0={@k+@f~B@Rd3n|}TTeX_ zrSZXbctmt!wvypGq3+$rRHAu77uUUjd(y6Og4z#${8o(c6uKMRhx*;&$yGzzS3SEQ zK+pE8A`Ry2%9}VPd5|e^kbKR%4&AR@(@?lXiW|PIN;IP4YlE4k!@g8ZS@gLY&j#D@ z+n<~=3ZnD5(W*OI|0DrOfEliPfbKOlxbLKc&GLOay_Uv|x0-2i-0SNl?ICf$y*cq` zW?iv7(dtKkZdCWea9!%vFE-&r``3NrY3q_P_CrxO1(<^ONoh+_`sY{XrHS@6hYL+s zqh&cq`sk6;Zl%M84di4|3;bFS6I>gN0;c-fH>14X#MX`>-4~(&0iq0VD=K9qhd1*p zPac%2c{JS8==e6ODDw`d`oZbR%q-%0?Vu40eldcnR#I348|L(S%&2aEvbzT-LvUeX zG3CPa-rc3}e$l0*)^S&Bx|_$O=~7?=HfO40Xpj8RP!PuqYj+tP-9jD?WMEhbRMOp zywk4ctyQ7G3M-RvoU4Z8m(0=`5!CUt=(LV_14h+~pB)?Yry=WlMfiW1kjUZP14@sv5=sme|28@tjO zzM#4+N$_fDgcI4qg>bTV$Gu*X=Dl8?@l@}i9EK9mbIJRpm0Ku1koKOJhG7Un_q?xu zXz$+{*CybBX4O^?cLL#Scr8*+=SH0Ky)kqr#6OXV6}M(h@sC=5&=Nq|=q;DIP?IXW zu@#R_@%Q9eye6ODxRWio;$JqizVw_HFwKpNJ*aj$p@7ZOqPd)gJCPctH9NqdJjmA0 zaF};CHcdEvn%?I}S2x>tbONqMhx80duD*_?s!zU%8`q$kJ?JnIFFE5?pB_mnQ$RkQ zBaGfUFLhS~bd86;_X$@R-|$&ycLTtof5KpQD_6pASbyibq%s^Hkr`(T+9^7yXlFr zNV%-OVC`M9_O=fIo3s|e4o_{m9tmT)u2zp^El%=08~pL}3fCFU89BR4r(C6I4p#C0 z4a=*Wed~vOE}u~Y?0i(N%$ddf#&Ukwh)Wqix8_=ooWW6usxpdn);FbQ(xi>pv%EC< zwS0j@XN!fOqsBxF!RpE>(~h0p&Nm|yUi?9E7N?w^dP}~sTj{qhL54Ha7v^m#X}a?3 zrRf}FdrpTFC|hg&pA}yRSR}Fz997{C``ZpacS}0mwBRk;Rq-Yauc2}@S zo4ShXA>yB-xhcZ%S)BTQ61RAadZ|se8+V)J9s^S~OIGaa1x%Y{XU;UDiViodFp~M7 z3Z9ZZpCTp`<2b7%Exi;h)Iz=X2<~^^FLpBo#jC3pyPYitsD(?s@b9leV|kb}P*hz1 zbk*4R#c_m@HmzfNL}Hfl;6PMsY{{c^QIzH}qMUqtfy@+*5i`crfsTs$av51yRn$sO z4ug=y7icQ7N>xE5Pre>Jfj%2KFh5@f85pBjsy2#J!p_Rh&N7Dl;$XD6m)8@1QIrPP#>5}O*A0*Ox2RNAx)ocJDdTu9c%iO3O} z6t5~!GecP*&J+`aAwN!)eP~)|R|!Ctj_~6T@Z<5ht*s1qiCgPmB zt0Zb4tQSwlg|2n?Hmx^#rJfeW-cxT5ldw8Xlm{SY|LkfSEfuZQP21ZXOrE&SeJ5+E zcDP}<+B!?ZT0!VPz4SLgv ztJDG^9r5;o%khpk(Y3M|pGwE^^!@BGXDYJUdd*jtBiN98UQ;=ccfV;10nw3+LSF>B zgU?5e<7y5$%;qPB)@EO7)(_wF^Ks$U(4R(9HI{qcewBq+x?Z&BnVic)YK4PqrkE;K zIV4(XWEqxoYF@)#@ZU#&gX=Dd-)M3Zj=87qytr*rr?vpwQZ+v0%Tsi%ckl0Y-oFgA zvwsi&lGfz@x=w>Y*1^j)IqDStkl9@&S+R8}ZWpqq?=H!)J)0%U42FdNoXO{FKVaMx8*r9ksf8!JCsewZU}qM3Px6%gH#S0rn$N{~Cm;nMG#OHO^b974)_Ntd2p zv-v%b+;t{wG=2t6n$Bt>Vb~pJ=P+ewElI#mH?i1U6sgUne_s*WeKDxHX$ce6(3mmZ zT>LD;rfcMWvD*l`Xw6gviQmuhC5Bb=rL0Q7o9LbQQxU47R_Wb-?p1eNFGg z^%0td()6u2Ud*7a!=HKS#=^rhLSyLsLTl0*9{m*q>1&SulbB8_nQdJvMX{~aCrauE3=b&^bgq)Oz1*5$ zbIFOulaP>*G9G(1>AAMbT2No&yBNg5keJtsQ%OLtYC9Y|__-xAO1T|fMg|Ot z1Jl<$4fLF;*0lA_9*bUhy6i0(!^?)P5=Nsrz3@{@%lM8Q%$&~CguMov8u-BXBH1Ol zu?m8j96RRvzgt&HK*|+%R827^U5${0Rn0DOAn>PX%zCA1#|dFCoi16Q&k$0s#54C_ zqb>G`V1gkI?@(a3Ee|(q+B$qdPI$J}zb``aQs9pa!)}EmmL2gyz^U44EtM&FHjnY! zu;&zd4=yFzsWq1IQ7lSHJOfCrsh5N7+8}a*m4iLq@gZ(PFZkk)meC6j&0Dmdt~-qi zg3~;_YpdTChR5ZKF1TU=H~6FG+-FI1yUa9@ms&UypZV&OOK;|-9KOC(F)=Hu7n{j( zIhRh-ZkRoDxAnSjM!^i%7CJt&(XX@Wc*5EvC5mU^1iVHAU!mQHZ9hB_WQ&&8SJqX! z!tkArgyAH3*;dzcP|(vSLO5&Rfd#3=7nTmDh%s}9-Ug-AgZ8Suz+0Do!R2lr_tL%1 zSUvh?X}sV|V}<@a@dx0EU)YFcCK5)jd2U9c6c)2G6c$Y7pD_i0$t(8!R$8UarcKmU zr%3ZISL78y5g$b4_|b4iOaG)uZDIbs6W&}bN z&ZLjL74lEVkT7Sl+qH;>rVYGJH!$;xL0&v@yF#s8|LfqRv4Cico)4<#memok?O$k3 zy=}2OwV%pag_&@dXjBPg5?I?Hs=P6E*pv-D-m4cXO z2_^AJAho1Pw}%&9Un{S@ z5CV#gn-=x17mcGLyT0vbB+qhimW!dvPLj=YhiUteDIo|Tc4GKTB50bcWrs{cc}_DBA`NY2d;>fEPF(}Wmld~uze@; zN>Rza`XiPaO}!#by)0P-eLTN2s(4aQl=c8-8%-eASA~lk`lzin!x!0SU(&TZNQXBG zFz8d8OdlG#9$(K}$1>Zo_Pa)OLLU3@ckd$Go(oBO?Qdidi0*QdTrs1Z`VYI2@Zl$@ zW;+>iFe)1@qMe*`y6*m>eE9rKx8ySlm+jBJj$nD&`q<4cEgX`u#yDc@EStd9$V?`p zvk~bPmgwEYyml`F#p%dnYU$ntbm}UXY$z6FsFUKnph`d*eGL*If^G%{eu?W()y{^L zk6X>Z5T$*m{ZytOdZ~@_Rfz9)pvR=u)kwBn{M?Kq5)SwqoiiJPw+;kJ+T%AR4j8*LJnQq^8H}9a9Y& zY>OI+e6aKn4>0&?gl=?n5yL|}MQIRHuYUqjCD{isxa8yejVwfjFDK#X=qf2^q1{qJ zamwP@Vj!;EPf}n^|3-hS%Gi)-W@Eb8KJD$1FONkzpcjV4VAko&<&_v+QEn#F!U$9z z_Y;GU9w9w6^er|+Y;>HvUEwOtT?)i&wO)h43ESo(=m%W3v?~`AF^E!HTk1$4=83tz z?ZIRyMUxacLsoTHn?LoW`;vr2Bd+J{5+8wvLZa7x#|~4qJopsAh3>p0oO(kkFNO@z#eSEj%&A{{+umTRpvC3uT{X+^Ve z4I!0X-o(1%S0Pr!JS5a>>afD_wy|tmp&ls^!xocX5KL{IhE5Ou%(G=LD*S2!uhvgL zx`I^T(CF0Vdd2+`A=WNI`6bC$gX2WeclWrV%ecW_LBpMsAG^cXj4KVtew}(bpY-H* z{K|HQe~Mv1ZnO;bLALw#iGTY17Y1)B85en!ho+BzG*@fDI8Tcyr~>0 z#YZp90*~A*@A&iwVk=6)VHs;TyCy$;1e<4%@-OC=0?iT8`0Vy|PVS%*Z3Cyd)-lT4 z5-hgy(w0lEKUB=Y$d^myt`Ftoyem62;rex3&jK-Ad-`9AEl$L2sS2B~98g1T%irxv5EQB(i7YBv;K~juY0b#~Jd|&O$)^l13tVm4^L%wCN`3OMu1?Y@&2}udAB;HuWvKpeR_JScA*OCJ&s$i_BfWrZ+aA-7c*1S5G_PWX)I8%+kf2t6a{(gHu4$P z*KE_)?j{fY(-RCSB9sB_mJul0-{bFUrH3EcnB5MEPm=+^caG?ruS(H7xjwZ-*te{f{GVdrVKlv)&#!@kPTVs{3lHgF@s{+>7Uy3~5pcMK#0Fb7`z zP+EjUC@TBw6p+toVT>SM8poPF4`=CN{@X|Q{{cDY`&HSKlb$!EOzf2}6b+rcqV6~p zh1`BMiCGqd`G9T|Q=NG#NzD&l=1z60?;?E3%h+ zL;T)a-Swa^XSp(JFf9=8XoYcmM~LSTknVk;K1CP@jW%d714C(&OiR+ z8lAW!xfargo@Wxa>JS#SC!%lL$J^e=uC*Dxv)FUKF`}8ml);{=+hFj6ErVuMEd}}M zLFW#mV|;@jja2go9Exe=GFsqz1TqZ*M0>z7K0Hq^P~s&ng(oR-6lCZU57EFv|5yz6zpiqCgC@Uioh}tIqUgLvyQ`$S0|6ln80_e-Hx;=nY*fWANm z0o#ER?T`!^Ik>=RK-5(Lvbdf?5JbXBRg`xvP1|i?=T`!AsY;5JB=V3RQ-VaCy;W4M zp8(Q-908mNTLw&dVul2gRwS+f@5n8!e|4R4#%WZub+=NI*}7^#9CI;?uy@kb^?9v) z;-Vqtis!#FPzj%Zf?RUUAtbKVGqqX`u5UL(+>6aQW`byG=n!$+cLjX_LYT&%xN@x3T^ZA!oYEq;`bs#>2NDrw=0tx9%; z`F7YClTx6Hz`Yz@Db7isuEICfzJhO`3kqFgqw!6{KarKhA=g>-)I5BLsDt8OxUO3h z5dHUC{AQr3GF4((NuKUCZq=dWtEQyXr&GahhG##XZ~<$&8?8M+OckZUtw@X&P?Z$A z2R+E=4nH@FLo&e7;)scIrDvi`R*XuA3^3>jvI@GL)RJ%bv2K}rq&@+8vMY4rK8+-irzPV&^mNq7RC>gnw`)Zzgh#<9GG zCvSXwH!}tFu_*Evg>wxO&W(PcTi7UMHn6u+#&v##T_Zt2-<|*_grCo@YCmQp@Wk#|+WM7U|hjKprn%yH7p^R0s5um8KxlN6ny&qd|N9PP{PU_in$PF3}1-AwWylq1QqG=L#Mb z7Z8%3DKTg@SEv}*v~?rbW1%R z0|Bu=vja}@M!~?=uZ8aV5Uql}_pk4gPD-YMRlwHo&->(8TGMk=#wr5kWj=;OF?K7y z9QH&9BVC*qpc94CPea#KwT=m09)HP4b=~bO^)GR)CZs*NHe1$?luK^`5*M{`NT_2mE<%IbJb}b^y zgTYF^2mF?B!{r0Zt=F!%0$7*n5HV@kbul{kVPE^#kfpjlc6&SKB!4?dPCbR;Nu8K*Q92 z)4L`Y+vq$-JBu-ktYa-YpT_m#oNIhTQmkD3ra`f_CO8?`xL5C-9$?Ko8SJB;y~z&E zQ{UM~U4z&xo=xLC2E+qo$0BBa^fHm3UMmtK{<4A(AXpbz>iOOp>?m#>Xj0*r0fuzT zDF)E|nA%DocsUTx!@lotlsO*zskOdS+hcN!LZtQO!qvpm((bhL@;5k7_w!vAovR*K zb9CElmR#eDE8TUeI5|bys4kMUt900`M(_Bq7XfW;h49Iqm2IV;6diW=oSW6&Bq&p_ z#WB4h4CeplRWOnKP|F@*OoeRrd&2#6*r*o)J4`N4qcv^ncV@aUF~iRIjn`%Ch$o|4 zb;3E*qR%ze3lJ~lbah#fL*ZwT9oP?jLk5nd5Bh=^BKR6CbtN-IjUWW&w!=jg_SD^3 zmTtCMSY3;xI0zrdsKztK@s&yIgG^?*dER-GSfLgAzNW$!%bc;0>1TP`6-Bv_gt{O{ zt~{aOFC*o0nXJ@0BbF~iMpMVMyj2>1vzdI&c*pzDQnEMHZiaR2DiedPm2k5;x0F6G zmT-FOb-UYC&ztxbVrYn}Tg}~Sej9l}PRv!Y+kkT*C^m7@C$dzvsFES`^e+VQHy-f& z7r5Ysm&OrGE90crS!}TOw0#?$8Cz($PcW!czO)_pmcdMMb{(_w;jYvg9rWS_i~UU* zZ1KLVb}Bnzy<<8i=pwBi%X&ibkYr)AebKxh0)#sntED48&k-^Paazn^p=;a*ujBg^ z%pKO4-N_PN>)Z3<#D+V}m~pH0*`xj&@84FN$5cE}G4A^vcWVi*#CN#Sr%FTdJ)v!1 z?tX9ZEnT-j3q1|Qg8Sp$@qvbn{}+h*6W4nMdN)GtO0BG>erzSW6XLaKyx)K&E|^~x zjI+qe27Zhqu7i5cH54;LY)sB$*E;IWd@bBMn>I4s1Dj=F6 zkp`##{s<*Atd(xdww{~rTGtwwquC@T-cNP)-WI!*fu5R_w6YGOsHzGl`0b9QacXPD z<#Ue}`E`gLd9IussS)!D^Vqn3NFM@=oGvKYgW4_8)8)!nUx2WAl8l=%`#|JC8B3|K zZUepR*Ytn+BmmK()2NbUd(N}po?OF?f9xe?L>8jJ5PXn_fezF02wkE?_pnb;qM<jV`{W;8jc&lJyHAs+!6AXFs7xeu1r}j6F9sW5Ucw*R&^VPK%SRLr% z;g%0plU`T&>3u1c^MxDbf4QyFW*H_9ZeG&6o-g$%&R1JV*zcthPf3^QgO&Ng{Q~K? z#A35(AJvO9&(&Sm-N73lh^L=0ys<=EP^@W{*z!g5Y3J*y1)Nd1Y>JtK5=!_M1+bSX zFCQFyMgw~k4C-;~J4pLc^(hkI^Po{7<7+Lkm#aUOGJqQCKk1Id2>kx*@MB^z&S7aE zAT4>$uIWI&`>yL!W^!W!x36L>8iQOUhY_EpLQKhYryn934OIU1+oAZ^D}`c9LH2@1 z?~k9vOVkF1+|CE~g2uz4QM(g*sXz=8EM>?GI4c3ienz3#eoUg+`Gcq?fIV~-k_j@| zk$Q(Uff&YECD$ZYUOcSJr{a^f?O1dt5_dajsfiy4&QNd>$K-yO3E#1QcpaKlD^T_cqS#fhW8Q0nx2G zWgM}~f__w59R0`KFR$Y}SCnR$X9f^qN4fxtr>-X?kLlc)aaU5}-bUi1EX^xgE+ct~ zMpR^%=J{*hE>3)$w2l;2`U2r9wy0uEjy$>B*+{`|I)cOX2^sr3rXUT_?{@YmGsNyq z&XCI$wuKSpXUec3Lcig6B5G<~s|t3yyyB`C*OiewMwf?Eekwq( zS%)8`1}a&ZA-R1nUs$A*n`0aw8&570q{&UhM?GF}Fh}-#Vnm}Uj#;lek_{ok?60C5%571#cXt%W^rRl}as}}inC&wRlgv@CdIzp$-6KF40e9~7rfVsD8T^R@pm`xM9;%aK zbpm#al}9{4B%+hlZv&lD$_o56-@Q`IDNY>A9QP^bnRQgNxy?}_(_`$P)^j|rJ{R0N z{EF7Vp>L9_iz(u?&C7knDhPf*M}=ucNH|g7JAXIj(q_gWMjk^OXEQ`{bX#o*v*np{ zOl_zPpum`3LPRj?i=SNAKE|Ia6o0S<3abuoJd>k*gXJ6}w7cUZe*k@O>TaZY$Sr#G zl$6V0DBw^E!)&Q!R*Uh@I;WXrbMEp&`cpdvR)wj}8L3;Q=IrJ1oj_DLy^~G{~vGIZM%daH&-a_N8oI&qf zm)S3Se!KW1!Y`#&9QI`9a(M1kIorN5K_wA~1#Rt$zjo>{6s|W`RT4E@F>QU!!hdOI zB&w#M;1TEJ>24e(iV|~;039Hix?YoY&qQU>xCv{c&w@5=N@&2^!z>7`u>YNs)2Uk%wH z0aE5vbCcdzzhf9#%p4s+}0&yk5sPl=<~J4nCUTMvZO zK$;OyeU}%((^w@wRo&?p8~1Hdjah%}3SLMI6f_uXUXR#Sb-=s_nbuoTM4nKy(=Y?d zc~9a>n3Xqs_`x%kU#eBNNir+E6UvJOvWx?y6If5D5A+hhb{DSNtDuGpY*yNy(KAQn zq1wqRf-(h!6(~?iX5BA417ebM&l8%a%sZ#E32Lo1Dm*Tt`tgO(LS_4K#LZXXDI^mQ z<3Z8K_)22`9S&iNF%6YIT#u6o52*gIF?t|LdU-6lAx6d>tl?rjoRZEZ^@E~3r1Fl_ z>tYx$DB7HMVykvwpTmu9IHNQQqBUKww-`Wt*KHk6i5XJZr%G6!mN)+)MD)eUjSB}J#U&Mb;b=vC2Z~)XyM8c+Uo5-G%fnEuf8bXEtSA(?x+G) zNU{5&*-!FZDuFp?{8BTQXv^dm;f?+hAvBuER_FJ;DI0PXh83QFFHV2;z#PR~wMEm0 z(wD}H6vfslbHjM$h~LeZ>n_2PS~l(*S++4asV^FA=k3R$v+M$W+Dq0?XHuw0>4)qi zwk}Q+D|W?BcHMboz;OS;Sp6G)rTgY0WwTE>yT%N=X|A=g7V>aZTQ-yvhy^gc6j31^ zoM+EBP9|=rpv9j%&GqG?Gk606?R8(KdDDqfm#m-QMQshIoblEo_zu(e2R~xA?jFd&8K((CkT)iDP1il+;CL}%bnqBVm5uQL%#cx>H zE^h6mBp+SY;oIxc_k3&wc9cQdq&jis*Jc&3>@H}MYKCExEA{XV7dzbU zQ?BKo>DaJ{Qa)Jk`7)FU1PENS|6i0IKh)!S8VzKgO4e+o%eSekGZcwHmY_PGEoQddhuOoOy|4wKZNRy3*+y zH9mvxZy_2{b&Yc1*pTTWJJIT_qB@11aBW7X{Wi}ix$v)@1>dNyMJRw(rp&cthsX+i zM~`aJiCb13tQ1d1OPG}mM0+?Qf$HN?}AECOECJb{8qVY>8{d{hkK;w8S6!IeF>QA1zv_yFf#$` zycitOESWXEqqLdIIyR4~Z@cZtTmJ?5sTh;|GR-xJHrB3n_00fs{WnL)kA*PA!D+ns zsKjI^FM(vZJ$eSRUc_eD?ACT{)_#C^rn^&8-A;uBrA};YxeH6d{Heci1m|l_$-K%S z*6WO|G5PHJd|llYBn}Xs?;f9LX>W6n-}m)~m6es?#AowVqPkc2z6)JilrbPe)p_Hw z!>T$=`EFFMWb>*GZJ_(%Y(ADR;iu|%|6osA98gqZTvB?=44W6shSy%$ow%-t;ccg} zLbxRO!!f#An3}4uZrGs+bpob<2A40`@N##_^LI`^awUyTZ`Mq5X&jaa{Toi3ZJ)HY zO_HH__3)Gt(>38#B}i$PJ4U~CM{Z+@!i-VW>qlGBGEc^+vc z6La>6jZ(ya;Pa^|AX7%&+5}Pfwass>{F(Kpwz^AtBj=E#aBBw#ZHGt8Df!G)5B(`w z2?U_$}MIC}Nc7iM_=Ly`p)ZDex8tNyi08`fVP@i%z|AfzrAr``w?q zp<|%uUL4mrqO7@cU>qeyBr*)f$i1s9w9KlkF#3|$N{Wy;NLjsNv>9Ajxc-Aw#OL<~ zt9JX^L$*&fu^Xw%KfTZM8~xg$_bv$FyH}N_etivK(3GuK`RsMkb&VoSsSeif2u~cb z&Xx}A&B%}Ys#7HZ{WiSub3ma#%OGjsRdo6^B`xKafS>mBQw6PeSmFT!w&46B6@f zaTUQ(ls>ndeWnQD^kTH)JuaWCrkwo|v)1E@b~hRrGn@iBCm)$tcZ7Z1$NZ})+5#8I zFRcFvI*;^e)VAc0?tSO#>Tp^JH)yM?ts~$du*k&gSTce%M1Wn0ja@BVkly0(Unh*-e#vX^q<&y%m_CjNe$t@C|9z2pnG2o7X#45k1rT z6aJTSj7>yc(t+pxTA5>J6IB6;3~gk)QsrJhX*RCPN@?Bpc_3Jnw1yDnlR^ZIoI4ON zJ(WIGAG6|?&kiKq^KR~8s8rh@|N{D~t*#IUBh<*q zg(;T=Vgy7Jfyyw*akt!e_+QmjwTJDAA2wyk+?PDAED9v*wnxNbRLj8iTHOI5?Glir zV9=}=Sh-76JPmjw(Q`iSOEyyKgx3bTU?&0SaM)9&=a)3;A# zh#8s@N_+kfE(VYcd(8h~Bftgfna(Vwd+DTJ0Ams@ECFQWF?>tI5 zPtpML7XHnXf6*sdZUm{(x|7K}yk)Jj;fJdTxhgpDO66Zj}t43T8`0UCuhp!6Ih?JPbynB>dB zXCt6#vv9ql0XoyB#RI&PxP8CCv!PF(X67s3mjBTD5tHVS^=b@`rYSKR^1_-ghYb)^ zBTm@H)8(I{4|ReAS~d2*VW)&@k zcg}(T+gH{%H*wyTa+SsMzb7If0t^jkL-n7c_akME59E2zfI5v&TFyGu<{$98g%M@I zI{+R0w=n)cw07W^K#XfofOJIs|JC-t?Djo6kOlmo*LduSl_4_*thMyFJpXTg_EEX- z5&VY>0wVqTJ9;5-Vr?4WmFy60oW`GD?+D?0j@<)HA-csA;73v<^3{$|$j>ijs-`s3 ze^|$|)?mVgP9&-Fqw!FMx1pG+xeejRJ3{LE9&Y7~i-MwCJ9K|jBtQYde7E?kKEwKF zThuh|+vCTVBb{|TvP8WOM&ziI?W$RlTo)P2y6MZsXF8%N{8iVRvM2PT^R5je}d`_+w1-tI3E zI}SQH|0G-fH3CqXaI8oye?H%c)IaLxm)jhhzlb_H^}US-TKrP>(Yo(Fs|rHawtm;S z?n15aAK5*C;(W{3EMaaNJsTPW=_-H+3Q;irSjX>B%!3;unx}t7Y#XH?g|>FI6F>#a z2b(e=b_Zw~X6>mjN`JIgGDgv7MtGg*#}xs7)y-@;qw3dVp{r1HM2Fyj`xzslf@V9J zK7t-X#``9rxhL<3CRns$;yWfEAN^LebHYfX$qTf>_{AsFLFPM+w$FxcOfMe?mtXNQX>E5TZ%oswOII5rAC&ZE_D~YRg*evS z5=UlFr9b+{2;3v1#7;G$X1Mm3_2u~h@)g3PduWNn(?X~hF&9$d8eln&2GJsx*bNDwks6J{B=7uySh)(nwc#8C zP>v6jx%`KnJyyuH0fo^~RUE*84F#l%3%R!?ERH}KJ`+Nj`ofg%dIvi3{JtiKt?lU} z(gpA1wXtu$N#nJG5OZjkEdYZhC@TZZ-@CKli_n~{x?a7zaO zOHJUhuHt4H(XCFRwZRdCCQIfs-u5gu>H-L*n>%|T~4#n1oAYiTKfC6)Z0Co7)z^7sqgd<1Vi zM>_kV(0B<9mAqCC%sA{`F16f0`K>jrE^VH$Kyvfe6zIJO&;EYsajG}xne#O z)8eLoX8VOXzwYATp{ap-1{!fWY81IU@8MkFsa{d)aU&gR>+5{w=^BIK$8s&|h^ z956ZA`-Ib!-H(kW#tA&m|3rbmE2maC0>+r3CsYpm5^q|zrGTOtB%lu=<;HVcP3W)W z37wS8QV*Bv^^EGt{hs+4_HyA%6?YfgG&)FdL(ARwLF@?TouA%%{piVqL4ygEm2)I5 zBnajKBk>29`xk3dn(nm^B|@d=@4*tzY`3rmoY5@)i6Zm!p(Ss^bejCkx3}U;O*iMw zXNV1konhn;#IEa6n<~0jU96TA75fW}>c72@79jZUm!t|Jtaq6ru+XdpjNPk6zN%Sg zXX2Fq zBPDUQ=!^0`l}skF31LbH!H8KfS8R3B$Ni%ZYQPgT*1AtiYa02=U=hE$l1jG4U_WB; z^g6j(OTf-mxhy1A95|Ft{y@b1-F+&pl6m(4|HPe3&0~u6_X_iJTPG3kLFM^tC^v7Z z{%|($h16-9?ousKB@gq$xQTNla13Z{$QX6u5O6&O7Avr%fmV%BLhyeFj!lCFuCJ1M zXh-OP^*}Min1LQB+1g;q@b{1p-qev!P_lgi(LF8;qR!wU>9jVb3{5aCuuUx~P;LP% zAbN8hya>!2ZfQnqj*?2sN>- zVTbTF8h5(PA<2d3c<;LWE?$;Q1Z}OcQrETQ{dtVH_mtJb=!?%uOie9bH<4v=ZY9z{ zQzZoRnMBxtoivocBbr27tWq zK&6I!%JN$vCGUD7{j~QnS^jxDu9@3KvZKu2A6RY|44vhJ$?C?Orw zN-1#s7q&?8=xsD_CV&sY{3ZK%=@b2|BmiF&NZqt;_ z4A;fpw^NZqzsRkw3mhYT`nNcnFN18m_dJt(+K7*jwcUtlY{;oScyIO_mXVG7__u5D z7I2@j|ET8hl3cuRZ|slsHc9zZt!EQDbsv4XVCc%xY>~Nmzq0WA-DIDu*_4DcqQuh+ zgGZbtmmzz!qlp~*_2MyCK{nM8e^nOOgU&tK@2vi{H`@k)MgV{h=-i=%`T%;Qy?Q%Y z!G|*(ikljzUR(DM!nWUCDKnh1oBmg3zOIG=6pXR;tez#9X;4q0FlDWzh2QLS06n<$ANENpaJ&+-5jDn$)dwR)}OTsP%ijlHHZ?j_lS~lV!k5OH3ah^YKm-XsN`- zW3M_IT!cYkch@o5xGA-c`?^r@zNN9C$Bf zy$)b^+iKzF7Iy7SB(Y4QLrXb4?#i9>TSd{Mi~N0fK*BBEpkYplt~UC8JOvTfIKa(* zEKU4CSmSW8QKq1DNCcBa^ec(Q2-v=web#(^F{MeR?|wgG_5fRfrgUqclvoytFWPu* zN{l?wI?4Ge#qT9OnV8|L*0?SiKD8cQ+xK~o2umiTXEh+cF&$92OM5}q&ko`ncUnM~ z*bVERV8=M;&5A-0Vk@OJQv~9=C9=MoKh2MA{W}IVpne*2O6(-QC^YgS!QHcXxMp5AN;~90EZ$1W(e7y!YID&ewgrN9PBl z24wG5Rcq=qpIIfqZnfFq+-AV@di@jo!$@7E?3c&wOrPC#Itf~p!GIcK%l(txUmIoa z=a+o)!HF7;Y&Y+C?mysJd|}Lb&v>;xtK&J`66@0m)XLJPX-i|V z-v__7BahGVAH$x7F%r+_OZVl{$R(CJ3<$|$*Q06P*5^~+O{@u>F8SRLf z#=eaY0m(CZWCwI2B1dz#NEb2jA5Ve&YNd))`PUM1GEn@CmTmBOZCKBj;{J&GUbKGP zjonmw_!{Lup08&0T@AXQM_uYK)LyGkxzzeIH|l9)y)B4e;0pKnW-UJ&#b#Jtyq=joPyI^VR@Y z|Nq%_XM`;9*l5iu+7u+y>-6QeSS2w5YO*2tLf5dUVpTFYo>}m z*lG##vs!X-if@BCu}U2uFeb18;`RSFldUAyik!H23R>{nKxh`*b>E=*wFH#R z5nQu^HQ9lhE}>6f7G!}cT_x?^SGk8-Olpz5%@AEm-5{uN@cTtN=zqzVflk9qh1^yq zxBPYU`ep6d(%CFLP>m`@KFHV^R;T8t{&0!2XI9RE6US0;Bl+D}CVvia>9#<>Wz|GG zzxUdhg8IoELg_IDlW7B>jV5fhJ9iR{?+UOUDxr zz@tK?i$hA@yd~x1AxGC6NEAtpR80eT4DljNij?#b%o2>mJb&lE{>cu zERglC0*oF2xnixQT!ROYnQ}e+0?q-yH}_0j1rk>{pFfr`sY&Gfe(2X%jPt6r3ylnHG?4P6mF{{|6U=o`0AT= zcK7~9mftT}b^^!FKC``Q1LLuKetF%=SQCXZDeP6#w)IOW=-Cyp0Eh+fZlSV$0g@3@ zGczQC>)V20Qr=g>{atGHB2DyP2y3ZX88m6g8X_fOX9F;x-r2$iZ5#rj!`wKM!_ph7 z_cwMBWIhE*wyDi*K$Ot5qo3{a6SR$I>Zm;bUyT>Q{}cQn{owcRUod^m5*X$i76G|} z_D|4|B59$>-o2|OtF9EwYpZ_HssjJQ`y*WUK~7!JUFCBDZ|W`ChEMy44yu{n0sactC$MUJ>W=X|;`wRJu|{!JK|M9W%C} z1G`eVB0O`xAxnkw3cdNWm7wbU^0bLW^!L737uFuLTQz9F!$1P)8woe?1LD7UCjWxw z%CCimant+E>=#T=6>&@6#Km8c*?K|2lwK+8@IHafKbMyolpSGl*b$QWzQ?{KZMR3} zq_n21cFwdWn~6DH>^5VN2JU~ezOTYsGE4dlTo}oHNcXfQ1slU3@DY2ozA9mOlrY3^ z?nkppSB)&%&w|BySTuFQb$>=TKRlEk{6FkWs=8#OQrJ_P|cv(dM_9h=IqL z2nEX4>i>@x+OI$rud0L_9Ll9V{NO;?LS3ywOJd=8>6DN=c-VYl$*NxVXcyGI{Q8u; zQ2^Yub0IRRKJ1iJQGLFN@@_;}qDKFs&FkWnNu=j0`4^!pT1X-x@EqYb#g&yr82}O= zJ6H02Jx+tT=h-m87yaTW{7;=gU#}n;f5u?>>Qb)|zgYi#zZe zB|LKJlmj^|NvgBaUCJM|b3$an50yZFBMjgSEujjas@1(d&sux`F4C@PSuyv-nc4DM zN<@;cQY&nv)x<-d9JAWxHB}*UDy1ci#!e8EGXG+R ze}vLmv7%<451Id{p6=9vZz5c5{B2me(x%iiO^{y8+pgHjW3G{&c8ZN928lZ6wq>4A z<4G`g@;a;ye@R&?=1iQ0fVmy* zt04BYw>owtKNa>96uTLo*q7mT3x-Xty@SbfO!|{t;@_)eOvxfP02Hig2CfZXaV5s3 z`o~N-4#jAvx_gMxf3Kj7^|A3xlQj*%=A}8h%h_$E`h+Ko3|E9jEh?lQXPcP6V??M+ zNegwB8KlOGUfA5)`qo$&Pl0qxGSIH4<&cu&oiH9=?s9fi>(3ST6jtJI=J++B&txZEH})4znraUM#%8^g?Cq)XGM2X{v6B15^OS*{`# zNY}%IG4HRLLRCA8@LV^&b|$-MuiQtKm!jkt&C77>X8oaQH8rC9_<3j{I@~Nn!5~si z3(gzC2uo)$o3*ms&Rsr({>LlY*=P^# zWk>hV?AetFj ztp9NcKW(phuZ=WWS|nzma65}NqKeiH5CG$eS(LuJE8h2>*e1P?I|WPYItLQLX*q6p zzW)+~E*j7Ra*7&urFG=;PZ8z(>hLtq&L^pbNF2D6+TuqNlo`JpKAV;dIZye7ybGT z6wN|rwKF`ow=hZOG{baDU#~guqmG!DMP5mt7BN}uAj^z%Cyt(tD{wZIa)+4I6q84e zh=qg`%5sBYs9r!G;QSfk6>1RC$&e+Gh!aA0!2Ie6XNvG}0T-?(B7Y4A>|LB!64;-5 zyn$E47&aWQn%Ybn*YRRPRYn{nMz|P=R=gG>-cRI7N=h}=dy}$QMJ$us{n=k%lV~PH zCrQ8X$i>*WuTn>@eIaN}s2C zR^CItuwgg>CAR9|_sA17Lni*Xb7O31rO8>;)W{WM_a>z|lyY3E+4W6~Zod4gaY~AO zD^)B+Q2*j_+s)2)H&IRk#ryXSjOX`(vOtstQ(Zz)H;x^5?TPD-Wzl8IZDMA3-TxRb zb;wbkmnDuV4U2CCfK8!Alz?j67IgDIjjYZe1AAWB!le|u*%?kI)@UxfS_!y4A9>78k21b}+juS~wM^rwbD`!#oKHAd2oH6HV_XtuaNx$CmN<~`Ag#G|1Ve0s* zL+TRUie;;4_MCwY!F21Ncs0@`%EDnXbufd4i)U=8+BMoGiWMo;C8`zW>XfAL>8Z`q zD~4lGPU*NGRY=gOb-g-h45vs+MU|Bx7o7lGN=z|Oi<76N#RaI7T>ej#%#r1Ek1bhC3Xe{eUa_3S8*qZ2($2O3-r-nWwqB*L3KrG4aeV?Y&bSvMC<}~;g-Oak3a(to)fJ< zAchqTr&{0OL3G)-p!hQyqj?y3fAibMk4gC}27=GEVz40>RHt3dlsn;p$cb4~qdON)7 zF@HFk)`oxQ-(UD*&oV36wn6&t;BH2DM1^Tkt1MN_Erf-1)X-H4x5RlcQ;&x0LiW?_ zTll|^kEwV~u-ZyEkiS~lvW%(xNl#-(GFlu`7J^)KQB@Y}Q#vIMh3_h*(fcJQIoFaU z(^4C>dz)nC6jkU&C-V;c^x$8VCHeMZXRO?7D{mb5;R@wSCCg|SZFLM=W3uVAZlf8a z-$qo?=6G#v9ykQQ$Tp7OBV;btr0URd0 zk{-OWrtg2-(6wmKOi<2X1MbwwbPCvY~Rkw*Z!Mzq;W>mme|Z9SR~ z{+!jxx!1(scGr{rQ<9L=wuQfQkUbiFo`>A?SeH>CFu+I;F7UM1KKfxr>m-`w@5T*Q z9kCB0N}u4Fz7*rh=er(a8g@d&zGH+-N0n0v_<)IQYiROj-Sxnu@~f4ksIBj~JITRW z45n+8B$MA<{Uv-l6ai-bM5(=40L1`+jJ~lRDhgqy@DGu|% zsuI_$9J#BI*FG8c<+nftC!sUiKdWOvd6Ftye(OI;ym|}O_KVBy+VMEFkg`dIOb|*` z86>}j?i}b#mv=w&4)i2WbtO>* z^)P_51VY7-ZhNPNUZAK9n+^onDv%+G#{EE9CJzq?{2e?CX7-C0zrKD|K1E`+ zvta}a5jDzpMpFjQ&Km=Id+{1Mt<>g@HUKd^f5#4WvCaC!ozd^@q>EEpdG3}i{g_29 z*SC^AbPZ;{F6=TVz>NsxMWZU1WZTsPXF(Z;n^C~q!aCLlZoA!=*N;>@hHjE24^pnI zBvM?DSYNL60*oG~cc@fBm- z_8A~7UFP?2HjqL95S~fjLFaK7%_TO)+Da|3YEwt!$g}M$g5d}ihFxFq^DtU@+viC1 zCtQVeQQ*W5ucu4+M$QzjNc0#?Lx8Jw*jn1gx&F`vREaVqM?%$>7J%ejih1a$jIYTzJxr9;Vvmsa4&!2m6GO%`u%y4GLJpGBUNJ)UT( za&?ssFh43%`ZNJn|9JCaHKzF^@XR9kI%UI;Q_($;R}>C zfyCPj9~QQ$wmnB(`_3=_{`2Xm^X^;s^$sC^=d?9GJ=-@rV>`O};N8U1^mwEiqA@;f z@cF*2;SYa5l{x#t)x`P8WW?;dO_Y0K;)@YyxtdZI9nHZ@UFe=%p*j%jNOZ`#50rcbv{lMvR)HwcT8HyZS3YJ?grgBgN0d+8u0ra0T@D zMJUp9%FZ74Re<56&{JUjcxrQmBd-n*i|hVqkGw{C67%jFevPt>23#E+|EQa_pDHxQ zsT0i*vtDUN29lPDed0{oU#(x9OAp{i6@Q>iw&%U(0orcqp){c}CemPl5zK#%YQaL# z7LYL}I0zqeVByWMA*vzZk7OW$5#)c2%ryLk;jG@lAK|0C%0q=TA^MRRaDy4Y4P~*p02>BZu+l86)C$=4FU6KfCr3l{&UndNP|$K_1q#eFzK2o|D7!F zQmr7z=a8T%M3d)tjGqF)Q_q>zV!qCl{^J;wdyNYo^7R_x&iv?en?blZ(x zcedcSUC{-*p6sD-PWzy|FZiR3QgU8NC%vMeuBR3cvw|f_PTiR?67-(vYj~Z>sZCQL zL?ffMcGfb|w-XZ5GJ_0~FsG4Z5%_((66I=IiJpxyDG-+{RhlsVMRe-mc6^}kYw0qZ zLw_GHc}-^_DF+9GKp$~mbLvYVBm*WW6VC=7IOi%#hT0~BnYruJ!g1#ahoKvky#Zws zYZNV3*du}bJ$L-0ErIOaM&7qx9zr4y^CkS~pomB6dkU9D?QRru&x@FcHFOl1T-=`{ z`-X)l{I7zpZ+klc8qn^%(*5?%T7j2SecK}+8TI7ZKEs|ld~&?Wo1qNq;j%Zo^U1la zJ)8HQ%)|ZsXlXmI>#{Gq|7L)p%j$n56si{t9Eyz;&;*<*%}mJpAct-KfGj*n(lkTf^1Kaa9Lefx`&%A{xI6E zwdKk6+znL*5JU{GXJ@sYc=2U?hnoI{0UCB_!()CTd1R}wXq(|R!ICS@6Vmo}yxro7 z9mY|2G90;{M=zz*=d_>6Uhk{vNWFznLsH*ha~T`!kWqgHEe;j@3X{!l*rqOsCy*d< z=<0Ob<7&d@xuChe4^bvhV4>+~7H02Bzs;uHW0dZgHSay^*H8l49^)g{zuN6aT?!~Z z>bsmMLEK;=tG4BZw>fb2grGooXLn+4`;mM*T518C3`?=d5#UyRgmtmSUiOGcXL}hd-PTlv*A5qV@ZJNpeitpR;HPM%wFSWL4V`pa?$hEmY zrxmU~j=6n3SrvxuY_r?f$J`q9*pm_e;yuDCNBXT1AT;De_2eIy9h@0R%yz9&j+Com zjt|7bJUoz$g>`*S9G{2RRFe6ESAe%(vcLG{_y+G^m})xrgW3 zL}u;*wox6kj-&rGt<)?7Iwgon%dNhwtL=-q7=mOygk!;771@Yn=BL-!$u%bup~2av z^)53D2g&)fVG#}92oh(WL8;ANhfr%~$6#C|nJ)xizTz7=;diG-PIW`5mz5aPpB&3> z<*&@M7ZEZD?_}X^L>n1<*_n&;5fPoanw>T0O#Jzt1`V{a!Tz0Koe&ZF#9A4;_^ewE zaT0v>!yjg!XIx^ZGX<=VNh<-L0&gN!W9c(_?Zzv2zhrm3x_t_T6Tb4{u`=hhQ=DG4 z@ZmQEP92^!dOYOiV z;J%+ZYRg&RJtt))sZd+t+lWED+4_>9fg-{1TK_ZO8H( zAXc~}7G{+sn+P;%+4yd=%Vr)SMB~8KG6lGj_)$z)1HSOBC9Byu-7z+;shAtxubtxr!@!zds-5b)K0@2ed!0^>VHH7-(bPk=-RL zE=($C>-r`kg#SomLig!;HF4gNWGTW1ZkBEa#d&M7(EQ!B9jnTPBHk^CN*;|vZ=`%h zW9uw(xpjL)7-ffoEj4-5l@U!M?Z;o=BAV)Ko`Q-gmo2x_u7Zl1FIEt=9g@0%1i-@2 z!0WvM0U9$PY=#?0x)ixV8X>AQ7v8}hA;t#-MWHoDy6q)$Fn2+>)|3KA&nl?M_B$wh zZ&xIdx_W~6;*{YGD=VA~E>evH`3UvW3@d?o<|c)Tx9F=MPa{XJ{B`MG*&sk*gH@N`TA9$<;B+MzrW;1n5`b z4vm+35=J%i{2XToCWGV>Pnoi0x>E8^TrRSL3p^gZCW1m6Pj|kW>+hwsMA&U$K3;$I z;~C2`ASunBDiQ^2l;58xbkO4J1YyiQ(}$Y9Z>3w+smr5l*m44Di`U^xjxJ=hE{$j$;S zE`?00&t!3#EHO0AP4Nn;OxI5|_~?8eXjaQ%%p>Z= z49|lR6+WGi6qYM#rW~82>rc|&H6o)1D#+R8XUWJ~nRT}LLNJk~9vu*(X;6G)46H#y zlGUZj$iZLxM-}b9GBi5hPf_#+Aq;+iT==8b6$r>6{160T+US+7-4}^LlP0m6lK9zF z@re-Lc^dZ@oF|XPN4+@zdg^!?F z>f0I~sld~9zd*z0SuLC}ekapK9&hm8#^}dtM8iiU{hPugn(&6L*I$l{?Wl?N%xiXd{g}<0h>&Rqw z6w1j(?!TNu)_G=axem>Vf1XL9&QyLxrLMgZs@_UfGR^Q30}ccksAD`KbyqpMERR6CH0dE@z&ekap*4itj!u`? z+2t1vH8V32)znp58@^WMnf=|uSBdw9)5~l*`r8j)Zwc0-iZI;U3}Fui01!!%2S}0r z*=m@7lBM9czd?cU?!*eJr=z1HChcs7l~XXWlQh>>Lfqs`a`wq+d{O^97zpC0NPYsx z`$D_h>VDoWP^%4MjLz6|w7tFGwn^P-l7cd^fxLUzX0q}41hftW0Wg8NAT-wHd+E3khkSCP>}l9B!NhBl25hmvzpQ! zD!P}&gw#ve0`1&-Zw#1OQ%uo895X09!`aZt|cD6%V3qj8N$+kM{- zmMI)FxLkj^Ez+rx-(xiE(^$8gX_bhTLA4Ydkm&Z?Oen~X*?2!7chOTYRn*t9-@W-0 z$-I1fxRUHN@29wqFI?mn5@&YL2a=L>`lwQq?(0qWnzRU24_=*5!9wb}s|FM(UTVSx zKK%CDlxM$VW8bgKnZipXU;IE#-<2)>9R!QZMrIZxtghvwO5YwWI+eN5_{{OsOZKnX z_4)|xCwO8dDO`bVW2et0 z!)FWas(xoY<-BY@3!<<*2)Gv7Er$GhaD(@88^WK9VSSOw^7e z!^6+emIWDg_SrK6yflZ2SFC^)jr@$u=#&#$1urO_+6ot9!{ zm7_8ee1!^|F-sYe&R)+8M^klr55B`z%#)0QV`Y|sH>X6?QAS3_S4>#d6c=fO{Ox7` z-n`=~2!4g+BTfdD!oE{cLy}fB=1V9Id(u8V(-Eg&m0n+_XD|J|qhCvy5X0*z7QDQz z0~7EYnVWl~G*>D2o;$O&7l}DqCBv?;?Cj#Au*@b|ai$-tgM0N#dF#_)5M)eE4fDF- zmhv4Hc?i4_R6b@cIrs5>D&hNeWqQ8h&8@kWoq>_1F*=xXlhCN0o_FR#JL-7c&nx^& zGsk$`?2ZJohb1?U6}3HWNmae%WQ92CRg}Y{(z^>gI|B>-AH#!;kSYe$)#ZD4-j}G_ zsrZG*B*;hxhkyfUp$dD7~K z4v&TYYCREv?-u9eqE6ruN&K0*)5Le?AfFqb0(*%sUjnPEzuVZj0AoWc`#!>L@B1Tu zVI$E)f#rpOQ6f4dRLl|q$6=L2#)L7EfcAC4l6ZUyp|vr_BwVI?iEbhsG$U&eH?%(z zI(Ro{=_3wZ@=<=J7B|vJT)!A@I4TS!vL}Yt*(%yr03SaOKK_11%~=LJuw=tZ2m97a zXe4xis~?}qJT)%F#KqUSp(X%9pCr;Kz#MCQ`7Uvd*kY8DS_8t#(rO2JW}H^Pq|O(L zU#7DyNkZDhq&KDDT`#Qcv59SloY^7Fx|VlpfJ=Bo!58vgg#R*-0RTW%CK0?aJysw~ zEdStyEH8yz-!^Fkk`dk(VWFN_{IyJ^$ouNk-6KN1{yM10F$<>Khn8(CoD|@9^K0sZ zvsH}J%KbRzql$&2Tx61`C1l;yt0o~{TPrZ7Aso4k2{9qKyL@l~GIPX5JVW?iM@ zjD5>1>>!OiN(Dql4n`?DtKt;VPR`L~b~By~Xn(6ytKM3DDa@k^`c|eP0?qCkXJc0p z`T8t-Qht;67Bdf++OdCMFa=<(#N`BPpp)R7QeugeU1z~oQZFq}(bT`zO0lpz)7s}3 z@xD4bq;^GwsL&ZKNrP3&9WXGcRrh?8tCwzUO*f|@~M5~=}W zX#%ThhoI3T9hqlacWGPS)AR_`!>8LReWQj?}nHgn=liSFIc%7 z7k0SMYmIS0c-<<(RK=ki=P#rj&8?TeIr49M13Fwk>!tjYhMx@q7BIIRwRwT~CokF0 zK^@qh!^JP1zHKvmD#VSm(cEVbO->hfzYbX_Ud^p32stFVz6_mU*9q%6iF~Y^;UW7k zq+tiEjyBoFPeeAw-6h3lN+)8?`r)GV^fmRd-8#-fyo4i|e92=}wJQLe5qGUPctbEC z_%t0Fr2RiZ1^~AS?->10DDVaxdjf$v`sC>mfi=H0jp^4@H6c2~#VD>RW_nobj~j`= z0edvYECBXpI_M7$2@~ChzC@xr^`e0W3&_mOCicYI=u;^|kWU<`_XpYF`KrMe#l)9f zkCV?#^qVFC$oNDkb+&T7k#^e2cb_4P!)Vy=f8#djCRh9?g7pn4eM7@feju35W!&ku zIWZCs1T%W6jWNMR4OCB5RE^sY)!SV$OOawMW3nZ|y*cS_JsdNFt6$@$`~UsfQ-h3* z`;vaWc3b*reM|`OzLHG!R8^G(ZHmL!mtI~2h^`Qgl-RzzzmbW3UMX$q?z}4V&D+KR z06Utv&fgu1?*)3K$FcyEAKePf3Xm0FprJaR1E}8Nd$47hnJxEm;44q77o4GI_Bf$#DJN|V9!SbxK|;wzw100OFz za7A=~--P5Y5M~|9LHz%l2;ZkBspvhp112QOo{;y z9avmkoSBK|B$5|KylQ@_VIZ4(vzZ8eYd)L%YZUGid4hqGqPDU;1x!Qu=HyG9wqCKM z3xzQ_1y2ibbyw1vKF}%g?^{29TBz7)oIK+DQuLW!hx)KVla^3M($pDcCf9MRI~!-j zSk3L%^|>AMe9kr6(rCOs$kO4TTd`i_MKrbw;S_ z%x+~oMKSB}E(=XNIIaW;znH$XC=J0x!0JXq6mwG) z6qMQNx$sQ{Yj}usP-XF5T`v)2XlD0JbZ)~(DPhwGbP&d$ zgnzxh!b{_dy4}>CnZ#*fp?%eCd=3>7s3k_nvH8Prpus2Ef7qZRKu~{}Of9CNrzi8U zH?uyr8dZ*yTGr?>SGZWihdCbe5RKQNlp%WqQHq$8uL6ak)*=9!c4R}>qhq7<{R%1Y zh0kGJk1_Yi+iGg)r^c5N z&2jbo4r^HbrmlMFOcO=3dwieMMM||IRkJ7Z4vqlBZj?rzC1m}<7QO41DA+kB%#R?x|yu?C-B4( z@_0EAr9YgmJBK2Bz?s#IuFof}j69V30oMRhDt%K#b5O+`z(i=Lm6sUygbZlxP<^hV z!`Ai>VKjc}K^&u`wo5*k?1+>>FxYIb-&{p6Z!QaM7jj zx2g8UZl%<*4iVwcgZs8Q0j1S5sRGl64r5{tr`WO&m2yIKTU@Ns6rM%$a8ngSQCx21 z-wnh%lVyYJ9x}$cLuF@bB24Vo!$+F051n|!D899-HU(`diKwVuuO~@lHGJ82cv@7h%1XHf& z<5a7Xp(=>Bz0>=xyN}?lhrQ zKk?EF+h2Ieh!zCwzwk@tirGdaPlkhAvo+0kxuR z9EGQ-7FAbEa2(#~t1mm=hN!HRrd2Tgua}6azT~;8G#r6hq3y+XX53tc!z7kKB(QNP zgC%AhqImdgpZ8j|<0+95Jz%XHo#H-_urVS}y0Wo5Yt!8)$e{V8s?$aG`drEe|NvKA4^M=-sVn&38SdZ?3RBoH{8{DUd>06ny>!?V~SaCZpvgqZRQj zZ<3;<^+Z#LHC(87ZB!?FGg_*0o#w=e@6XxS@CdwNyB$MevB>EG>dCHO16~~c@3pie zF#D*qDozJ?J@#hbOMBMxb%M%quvCPJ<9FaOq?tP@lMB(VY8EMGGrA1d6U7jYXARmf zZPApX5_P^aS!|@|VH=E8#|=#ZiQ=!=(Lw^#f%e(e!`e=}Ee| ziZ`7o;PSp&2%rCUx^A%3c-D!YVGX~*`K8AZ@An516YN}rw!1Q|s8ojBF0<9;3z+K^ zr1-U}D_lO;=k?L|gK0#MZ9=nfWbt%_UZ0VCZ*J756P=XNxMGBL?JAwtkO|AHh{9mV zlN{G+<>fx5t&G7riTJ7vh+kVmmj}Ho3m$POJCjK?pphuX+ToGx zN1QQ)aSJCk{jjn%_}j^w+vZMm_Z>pEE(nlSz|0TfOSU$s<=wcweBgZdy;vy&^)|xo zNy}1y9EWzoIA;dyX24>fhLW@fed6gr#a2XC8lj56)x@20<(VH7CnOg~xiaL3hdhU- zF|Ns-;WUl2hg@4i#XR0ytTwSopLqY6IACtMV?2{LyXJyAz2|V$zU@?f#ds`dM9Uv= z9ApB!LU|CZ-AMo4L6o`PnYRPA$2+m&17zyd$q=)+oN)){9zxx?QCE9?&nGT`)1*4L zMN1_`U(3>X=qVx7cuPt(JhZ4=%Sozuh)zzX4^3=Oy_csssqLbTkwT&YTOb=7F~NnO zcGEqc`Dq~;HleMqSo8)jAQpACC;F4gji*|PtM(7cG&a+mZN_jC96=VhI;ClwT&rdLkdJ`btiIO?r5Sj zS7SD;l2c0dXljtNVh$C&d_3HBh3V6c;rKox=q4n3JUQyI@s80b-&l{?DjVGS(Bm#O zg|i9Gz0Eu;nN>!hR+p7w-uF|1Jl@|3jyFN+7w+z`)z>dysG z`9`1R(TuRYt`Z_1Ut6ylG(=!x*LNqqOqI2+>ZJq$`BTgw9vRZA798AEL{6hoFGu6p zj_5GMzdaRO=@r2FqHmPu;DLsGzGXc^^r9Iz!}Moug8P?$Nyz|rV@wAKu?wwT8Oi34 z@JMOXY0u)6*`}sOvZgil6y!NBzP%F;P90f9htEfv_Rs^bG$uP{lOy`n(og!=xP}wF zKC!NQ%qH9PSY$wOne}a4wmME+P&-M-SX7R2i0h3N~7cKYPFzA`$W(8))IuVPF- zI}_awY8@w>Ukowl>dMmdh7M}hC+X1~82Q|tA|J~!_+;!WuWVJw=7{d6OU~VPX^C5H zsUnO71`&{dOn#teWT>jAw>7R5-CIPU(embKP-WHBi7U$BB@9hlb?R14x2Xj~IW{)j zBf0x6b&O8L$V5bALZ3b0Qhl5{+)ztoqSrOJ)t2F@sz%&zc^4UJGMd$vEgtv7)aRM* zx!-`k2Aj&j#GrS)#{*{DPfm9#(c)cw+N`mx?vSS;rO708nTB)o0b_J5f*IIj1sRr3 zRfB@TNp4@X9VZFwkGTYa_?ebl&jb?L)afS^Zh*!+UG~tZL4a1;@>>v6(PVv69S-fr zz)bm}Ys$53z(Q>QF1hE1^yC6JHxpZ5r-?Y?VU=su#*W$gs9#596JNCy1s6vpKb z)l5Q=uB$*t^vrf+q3n9CF5N~=irWF}gz zESlvg{|)xZE7^T0A8(c@W18eSs>vQv_bA6YzD84>=NMDO*dvC?7UD`MByW`@S5@XfU>W6MYwI27p>EoCAjljnKf69g5u*D;}>i`mINs z-`rTVKbmOKr%@a^MQT=Au>4dG7=-*O^e|IkuMA-$_V8a(VMQjKOIFDZn~g&G=}7BN#fS zlAacMQzgLTz8-1n=A-EMmoChGxW(0Y9niGP#5I}lVQm$GGYf<^d1f8Sb*}!!bBcak z?{lL>@Ux8aLoy8;F#V#J!`5tN z{TsA&R_lFi`Zw0ypk1?ca@7n z7kP6+1rqTT1!e^+r^Us23JIJ(BI8wKUUg_5zNAgj6Vnc6zpSv4ra6LN$IxL2<==Y! zK_^p~tYB4LGrA5^3(*tnEn6W6xL>pblPH~gr}!;JvK4UujN!%VLxj$A;-}pvJ%OYp zj)&L+FUYyF=sG)7*^S&^6gZWjEf&%AlVOugZ`A*6ST06m?^awIePCCN9xWJd(x^cv zMHfDM@^5*9XO!H@G|)QnxoOBY=NkETr9Hy^nZm;PaQS0(U1)<&mkrngS0X-mEM@5OOF`1ft%%G( zVoBw$R zoGvLzUeq+4JmVkAXV;Ke06OCJUXgMfsOpKIN)^yLTgd7Mj4)mAvvv!AM0qH)r8x#| zUwB1R3~aJF^ReO3%sTmR6X?&fh7TYyj0ZN@adaijO*`YKx8-dGy$oM)SY+YG7^l)M_H=s56|G}uNZYIVf^awA*LX*_ZXP;SA;1*N2E%k>Z*+$X+iIJpZ87Yphbu@lw$tFMlkjGHbUcoBA3NaFMZ0rXiIYMpUQqf-_Fl$GMh(F-imF{6?)eYQRyGEjqKY$ z*c3hi@OCl!zl2h#;1JGQt7?=bHfzsZ1WJ>iV>aXIfPfY4ktp}8pND^k0wiMoJ9QQ{ zh-)jfDV#};rb!1PVTI3z{MUy@bk)-`S}R(_VFypa4VR2N+PYg)&(6@3Bw=BgXu@!$ zO^GcoaFcCt3_;P$Mz4(_bVE=zRmbC1=`<(IKO1ivQUaztZ|BRA=SmlKOJdgG2l|AIjyBxk2@+Z}0X zQ9pn8%bwY1eagTfQ+ycfwXrAhEW;D4o59SwHCTWZ=-d>N;Jq1A8@pCBt7|6t{`ZBO{1{hj);kWd4JXXSL9Mdu1peQyrMv6^fL6b%JvjiD`eb zf_y3=>Cr+& zUnY+1geHJgoO(`yZ@0qyY|m;->?xr2fGjM~*BItS&1%(>iL+DrB3ngUK>K44rfs6o z4W@AZmES`&V69JE{BFx0=6XaYxnel8@iq-NPkx_LYXO14GE7*F7IP~oxA2Ut{Mljv zRNdlCAo+$wfsqoxH@xBP@94%*-Dnc8z6*Z(d*c=f;%^C;^*u<$AB$r!nrq+l zz(l91oX0Y+-y?4{H*9%~2b%^dZ|a+MLh*zE;J08>PlLLZDWmPq`R`T*&AZX=`iScd znwj%@Y|L}u>+AMWLOMV>w!gMp=+l`mB>b8*YQjV*we6UfHigLsbgn%u=34#rfCaFr zKYZXD{bgrlzcxRCodE5?Sf!$7DrvauT4cD@VW!hF~|KCJtMO^WKh4YlPI) z&g1b;Xtb{)8xTq{%voz1DTn-G;Egy_6^dFimHNyxJ{z-2xfiI#h*_<#puH>$sK}68 z1`6orPyjwYS$SxyMVw?0O3Z|9Py~!@%YN;S03D(}1iNwKAtIL8u*>z_=eq^!OgEO7 zkn zs9P#lXG@fQFRUKP5><36MM_ey8)wX=ee}jx zbT&hk-n0GjR_-YwaikA06+v?d&agZRtyH*6n!xzxW3xL6@L;z5dJ21Q?9__vW^ahs z^z1*q8o#T?>LYA9s12C7%}_Xggu;-tmaF|iF=^D6{?JEtJmqr$#mnC6!vRE#_x&QA zDyzLKeB56HW*DPv_9~qfMA~wZnT{4r$*I%0LgQryO(n0rLgpF1J-2{rWFmMT6Y#Q7 ztKqfpwqto3YSS!odWO0_BeIo;+nq~S zOUY#uyO^oN)wKzy_GUZvOVJ1B>fhu@50c6Ah5(sjAXujD8hL`tyvPYQCKIw{AY7Rh z^7Cs!{b;vO@J(4%JhjObW#TeXORaR;afunYecaCeg@<8}u=G`eIl3m_1jai|21TgS*PJVg%bthRI&8<${E@~XoGge#JTmG7oY%z?anJ|;Z z>z|hyFp(uZxJk2~^PEs>Ucz=eCZ`yRc7CC~-E*F&gV0lUq$=}@bKfJi+>3Ap^i#b2 z0?!_w(x=y$a-cgjP;82zJIO)>jG&IUlzx=7V)CpZEz}>vhJ9mN=FL_fsLlJ$f1FwH zrAZi^pR5?!nw_TzM^99T+fu*3>fl;L#8(UyW}_2%rWRR_vZs9(er&)MN)K(Oup=@W zhcZCM@R%pRYATbO{^aVH$CJGT6*;JniA(VHxIzcAv;pDe7}?Y^u2%}$phP11GjtXz zG(|#0=edZ)7Rw0gvQ{`;D54Xm=o{2ifKgR6$IN^iI+gIAK2;UCtQyI~Pov~eOKQ#= z5xZPFP%b}E52DW-i|F_$QZgB|z}FJmnV{E2jj6)+9h4i`L`W>hDeXONH)2WmCJHHy zHlD{fh^fZmJnKA#wi?-|Ba}mW(acQp2c$SjMh$~NM#gBgu_C1R3hGXBtDZ_Zvu40 z0Ii^mBOZU=)pRyzeu0R$SVVe6k6F6keuhS_ppXk~U>@-43m8|%^z1D!yEf_2#s5O zwdPiSq%K9!!Yk=HKppu<^}jj>x+D?F$o^=n6jJAI*yuo%tjodnpqC-ukP$lvJDWXB zS_14JXrA@rra0C_yw&i;jrk>Mqp(reuTmv4GEsEKF_X+NGoH-q@>bD?#E6Y)x$5+O zk>Ymd<~xneu7fR+MMdQ4Uwl#03ySj2a~20sQR~B(5fGxz5KYST0Yez7CgIgVaQWU{s*b|hmV? z6;lg}*E&2u$HK+8ldPr1^k27eajA)qe$O2^wjDv4k<*cc>; zHp;%Kp~lgX)w3)QS1U}73YcrMq9xzZ03S)~eXS;Gq;68tjyM=Htm9P++14 z7l3WI6lWVWsB}xLr)?avyt$SeFJOISmGUh^Rn~EK0g-xVWQi(})@cV0y;+fHd$mq9Z`M#r}|0{GGJLypJokc2MWA>?J zSezDPE(E@`nzG%Lc~?e)USZaO>_y^v3IpNiq#!OWa91}aJb+iH2ZSVY-hp z{xe}a`Ow@#_pg~)>&rbkRvQ}!7FIdyIJ96*&p{P`)^^6edFF;LewEu^FeNQq8X6i@ z@5b1I2{%m7x!;IM<$+{?WJI@+$u;fCkVofZ)ytWraAzY>V*H^mnG|V7PcaiPE%*f2|;qLnG zf|=RTHl2705|J37wx$Tkki@6oGEQ%3jiln447#x6ao#|qO1rxOW;$tA#`$O~;RYTmCZax;*ut7<*2RT3Nm?ozDyjN{wG+mnWGWwM!mnap zJC>+qjUyfkRWV&Mgd6twbd$mwlYT@8!C1U(_tBMARa3IE)p_C1QKcS_N&fXT)aA^M z)C$t_cBNGpvFgF$PX@`{9_%3cWBzxMd6vq77}(_{PsJ%}0JZc|?M@ryug`j zY_L>O^#5u^r_9nmscrK-!Vye?bCZKz}BX%J`ok$iK~4 zhj%VKZ&LDckQMkPI#>nn8@j$jS1eRMj}R@Y{OPd?6&w1oGm3&|^V>Rj%4qdi;6ILp zPgsh6+)555&FwGo@t3&4uGBQ(SV-;kVR3xNIC!blL7I9&kSYJXTiLp-6&SSgC644E zfI?k&9d5UdabEv+>P+}3fo}|g)|8hBQ zJRr7x%r{xH)uS|UCW3;3-a7c?DN+MF8>q~s%G7aRax1DJJ;B{&HoD|NIejY%eV(|y z=fPLD;^sdQjwJtde`J5GyHVc|UEXOpQ2j&ezI#NgVT`@Ky^V##66H)A)O*VP)_Kk@7iUj-x0)5NH!M?Su#9B{h8L3H=vTU667$CIs_^ zT+oa$wG$pPfGEz%Q)}Ke;~V^0Jg>t{gCMGH?DGA#i-EJMKe?IJ+2>=t!jki0N zfhJP>zEFw1ltXmPl$lUL+MS2+kIia&Mbb9Z+Fw~|+C5vNqfQLKNBZ9n7s#8F(Et^X zW`X7XpZh%rOV%J-3g1WhIIULfZygM=A{3VI`>TE9!!81IezUur6@fA@(6~JYG7E5# zGMB>=ps#q zu0Ec>-uerc5X;Oax}9Hri`hYpaUXy{n$mL}#WYmUFHN#n7qu#UC{ku|T=!DPhXHjj zKGymVFID`Pm(n8kR`$VW|G90CU>5U>n<%-c%lmBSmQ_0W;P?a;XJP(0_A1X?J9E9G z%-uL$AuT~k%0$gXQ-dpI4x-{D)36M0w+Xzp4a&@wet%Ep)q}I`m7KDxG93=pS(f3& z@G6nwp(+=0GHbQ@X-~Vd6J`R7vG0qYuugo1`^=gQYYN8dAYMjkqsNHg}p1S zMN56mP}UnJLF-4sL8=+QFAn5gTsli`;Psstha-|PSN<-kp=2V;$9`Yz>l;^?V;Qp` zQo1Cah<`%OAdh)I2uMg|B^JiGbhA3`lDYuCn6A0tiH2n7bz7bCosA1lW|GEbv7i}C zU-Q?;k$A%+opkx^K6IK<4C(RQ<0kdNv7L!Cr2`1?=-ZKvdzQcc)Y-3IeF$;DW0dj- zU5&!^eLTxR4(Zu$W$mx1}U96qYb0-hR zwUYQQU+HZomyQ?=E^X(V*=6!sK0VQ?!7Z!1N1oUzK|SI!yWPBz zsj+&uzYK0n-u;%(`+P01{Vc7>({^=CsHuoH`=OhVp`hOTMc6-iEb4 zjPrg;{FwQSw6-jN;XQmhOJ42|F&{Not>o z6e1@h(nk$!>#LCRtY~nz1$`C2h?+?}DJj@ls?AJVRo7NmkIg`{v^2oXUe+|Ewncnw zVq>Y7q9!YE{8^@$bzX_5?Qc1v7o0c2D6XVcy~L;o=eh}*T|rGpUU;;AH#QXb)$x*X z!HA}cHwsF^LTTw*m}d0-4oN7#dd1c_(t|miHrWmAxknf*{^zCr>hC%Q}*YA;B2mXmWTj!h?5*%_nWoC zaW#6qmc!KV(Lvt{FTsJfnP-gy7DylN{pLZM6b79J^SE^JZ@|nXBfwI>OV9vgvQ=C2 zCy)_rk^|w85NujlB)Ati0PRZSeB_YM^zPGTirTHkHd0-K0t1Sku^+qmS`i7>(VwAS zO#MvxDDar4XJY&~=WrKY@q1CIkOYkiyrL=DX-s=D?F#xOgRf^t*tiLv65FJLNU()( zx4i}|$reKxrUTDqya4G+JG#}Ly*P}vXpoj=#yWo|1W+vX0DXY;O0gbTE}Bm3^1S-q z4zjwYV*JIf@p%HJwWFkNSVV}_H(U59j1z9;BpbMaxLX=Nrv__(L)3(L>AO2#!yc-{ zHY*(;{gadgG@D%e-Kr{aQzP4MONrLfnO;OWR$3YnX4dij-pO`Z z1NS6WSzF~;Pjf{D1&h=yXMI(78{5>dAf(v2mV%0tS$H$ljMTG=f|@I4WYrXugB?^| zZSD9i(?cv3!eo0;X;!-TydA}Qy2cCshA3k890L5ElZ-hXBxn{;YkZ>&MuV=TG+~k- zx3G;W&O25=lMtBZe*UmV0hox8n_b{W;S|n9n0OZ&*K@->;orf`eXTa`VC|<%wB_hpJZC%H?UAl7c4cp}`q4 zv#GtP%WR(?b4+3aH{GYXb__BpftbRe=M*&&9fbstp9!bk9y6XWcP;)sQJ1$vE6%dI zhf!NVG`zk{Ql8g9I<(kFl}MLh;-+z=)iOY4Cc0vw{l^Kz@CJ=SxSeruI?@%jv$B4= zbVq0zE3ei4x@;WD&U&-!r6=GEGPxR;_kjVUkB)v{#VM5Q$`Vf&_dRC-<7INqtM3J; z%93UqgEV`K!{yc>OY!t+Q2;4};_dvk5!A(|I~Itn`2BJJ>D0+H6irP>yUXK+H9a5^ z^LT6T!t&>JIf$?5rP%4+aJnF@`308SW}W;5iZB(N0!w z_jEFhUfIkI_|O}w_K5v8YFO;Usee6M?4em!cB1*%JT2CxD*{1X_LnndF;+k&=h$Ge z+#@$(9)wF}cFL1QmRDZ*7~v4l!LckASokxu$#Hu+oxBFItI?G*B(0qTkbY|*-J@Wr7P_~4as&{$$Ay(CNIMRL(b2#+u+@;j{cscA77OP8o&Z|e z;N@_YRR+&C!xk|(%tn5c=HXv~#t^RY9Wpz>ATHTs16$eB;CCGQ6DZ_3Lm_X6usx!j zwDix#_R?K6-ORX>5B2KoB@`dw^oOjF>jDCf<+61(mRnhAY4{qqyTBbqWkqv4e+Gg- zv1fTExZkY{I|!NoP&9br1lyNq(bC>rEsO|dPQKOI+sHU`xXPJ>o|u`QsY@h2g;|g( zC?Ko0SwePgiDNDoVNO(3Q+XSk0kJB!#upm*3#`H z!&_0<)vQv<;<&0*7@?x%drM!gsf>ATpx*j|kgN^9^;TvS#XTXhdjy9>7iR3ZsfwZ9rt`>W5!MQikfglf7r;Z5M*Mw zY^vMV4UjfFT!RagXMb8JxStei$J10&TA4ASfj`r}-0c1!jHk>(N8jXXUY(!c8)>A_ z7~qRWuYNe}BH^mcAr-9KSf+3#=~$1sXh)1!#Y8OC5Yb4}>-+{iWj~&@UhkvTe)-FP zGJ>LdBVpDLH?T@L?2tVJ?0dhyL+OKV7& z3*N8)7cYK}2BV1iwgTKQ`k|VAJ6^i>^Dd*uZ@9v;rQ7E<=P1~*u)2_=eNAP~J(Rb5>A-*vIg ztWS|-71Fztd?7U;XvfC^46UuTJ)1KTB_yiYRRsmx=s913ha~(Q^}&INEo#L~l_aMu zQ0Bd@@g!1s6KTAWVtibI!4B z3mz5~3lh zgOhhjXs-%ScU0F_Hdc32mK6nSCLWdFjO(!aDP@g^cQXpLd&zh%q+#i6w)#L3E+~qkxwXSq6l>(<(jA@M zud_eA&)YiKFRbPdG<{qMc&?S&DEgcQ&1HavIZP8*^K{#C>Z~KAfB?_b8ZYVc)L^-H z7UptDBI#~ze?(&iY1!;~U(QZqvQ6z+C+p~gj(M{|(aYvWw zOg1@0X=RRS+}7dWYW!h4?fBC$=1jRO_x@qsP5;5V-)elv(n&<>5e*6&vu(^*!NlD& zv$`4u=xI#&4`S}UxR}{}r+8O>5h)uJx?G1=cV~ENS~b#3gs>Bu`&99%t4b4&M1`BedgAJa*bSel(W@b=7{fNp#nd+{=sMAl% zaxGD%rFD%y)LE)DA~D>S+eEjM$EcaS%aVlnogkp%`q5ETATo@y`4y$g6_jy}GfF8# z4wE628bBko7$CyH>0muy=GCtoGma}gH)&&^z;E(|wBK$vCbqqU)y2J8rUN~$xJpZH zsKe#~MSELNG02Abr45aF9xGJ? zFw_s8c@{{BM$yexb!nK{0c^{>DoAA*MsyO%(ciqJvrm4TAunlCi98&9a|>XZ$jh%B zX8!S*?cMfE3GGfqSnt{$o@1sds@!mXz`S(1No76JARgS454h!}_^R)@L?$Mu(r@(> z4*kGWPld^5$Eac`-9vL&kMI(U`TV>)ODzmcxKFY=tDE79G(0M5iq;n;IrF!R?Ky~2 zY$8QTm5xWV?EKI7NB5Y%tMZxsGeCeVF?tu`SJLA%K6|vapT|DU!N6`P)K~qu{n^^9 zt`H2lv|LUOIf9m_hqd$XSKE`dgrZ2BPp@Ll(UZhPUq{-7Hc|e;?e9>Vj-iv1GT~8S zVNxP8h~?-vaqljwNxTeWN97zd6~guzlEFV>^eFUmk_-IS%_XBo^gaL zdblMcoeIOfiST?=(&}if%9cTydSdUPN|~TW0CEG`wM$IfSSh@c!Np>!NJ&j?N`3)o zTUh~IYg@qh9+0l|*p-fi_)EFAL{h^wdWvBj6p>?qgsIqUx@^7DkM#pE9|^w*4ECRt z)+IMqHU^bih=9n@ZWnVOTj6M>rfFfRwk2eL3!pxOJUm=Hf!S)fH~1wX zElv07lbARo$ceM?WfhZOXfVTDNx0Owgel|s2j3B96~|0WP9n(Qg^iD`O2SZp_1@oBRr6GJ-CYjO-ZIEK-kAlZtJpk|90h5Hb^b1kqAL zGFCWQM;W>5XEk2^q6^asThp}EH*i_UhT@^|$#k^Dd8EL=SVCgSsfOs_=aoCHYsaA>-AG!;eD8g)bi16< zX&bE+(%A8MTB@>+o_Owwjp5I5*y%ea5szML=#K&db{#B#BVdwV&Ys*?E^jgD_1fIF z{UIU%IZ}NKh`ULi(-~YJDP)+pN9u*A_W~as%Rp5Bbd^1mSzZ}&7e{BE$8_v+T&+sI z(V>~)x-rw*$#}!>wK8U;AX=^2rt?_3C_SK=cEvb8*jIcU*jRwQGLzZ!I-Kmb>AWj$ zu7r{)j@tqsi^Kb%mEylieI!`2_s)+7K5^*k)c4?4vcv7gFK925c0FSK_ zmAbNzD4!3xXhq#wV@YLY+~7p|#Kgo}d>J6kr19Cp0wM{|Pn~#g z)UCl>kEc5jz>R5#h8?p!KU<0<3lbt>vULwd=7orFLo<`|1}6Z0Qs0HCeDY}0wN|;putm4P z_c3Ol_8u6m!e<@A(-r)rCoo6%K@-DnxOMz4u_9l}$Te4whsF}#y}kTH^~ zx%p^$+D5A29q*#5&$eczW=@-%TPm-$53mkyC(ml)q_+}E&Hq{IG3Qw)c2SZ__)b|( zFFQH$;|mQ~;Nja`Ck{}hJv`D9k|2i4V2A@HWp)o?;A}0}RXdM}4HL!hD%FK)1+PfP zyBNWJkALR?7J!-v-`%0wS8BN&d&B8ntaY>T@iXA)Z+xX9BbtOKR?Q!1@{`2K%sTt! zwAz!}+&qPgd#b!5|7Mrmm>wqpeX$^Xl!={h3&0qQuAl|oJh0=e&_BsT7~KE7wC=C} z>eBzIQd|93!sdTs;eY{g|2wVaE>gZ~L*#v{ei3C1iSzJ-xc;BN-R}<1TZYmEk39d~ zc{(+5cpsXyvna_qB@WshFFVgOnM2|cwh%8NIce1LG#dsGFHk~&gk3c%B4bR)cydgr@sZi4i$!ifcGVP)I32Vu(H8W5m5P-6 z5ABQ{lbzC|lqZ>4Zy~C3JCV<&@9%qXFIP;{L!q^Vnz25a0mCDudXS#I4qLy&v2%1* zu9)UOa)3BUVm*&*I@CYipuVzM1SSz8m6Oa5uh&f+xpMl*WCVjhhP)Ay< zgWWb9hJN+l#qItK@G`X^42}UijYn6eG>!eaL>Vx-f6J3}G*%$QpA%Du<;1;&Y=F7B z*=J{A;CytcIbrad7GwtVB_ei*Akp{C4muJebR^q$j~O`?&zd0%5z%3oF4?~Heu86Z zp($|GIFIsm`J0O|%1?DpYxWlSRA~%clk1VwH?ENuc*u-*Ii62=p>LeJ*6cZ(7HJMl zOJ?*b623Sm~|>B$%n`fvTL=uhN@+wq{n=E4dSK96qjkNZPhI3WnpEW zt2^vpz$f?82?uDZzJVFCBe+mH`*U&?@ilkuVq~sU0VZ8&b%Ef zt*64iCDECCM|VPqYGoK2ZWW5YAP%M)R{Vch2Zdb=tAc!CCRV2@Gk+x#x(H{E zKXday)`9sCE8@T=!jtJSe{N!d*{rzCZv0h*rMKySJs+ znK%6-!v^=^$_h0n6){j=kzQAV-7}Wa&*2l@yPxLgTfG68@B2?)3T1Fl_>mvy)?GX0 ztz;iP^S$r<=a1KBIon$I9|IYxwc*&$%kTOd~KZxDrb$MtDa#Wg2Ca7Lu2t8A_Jsw8qDK!((~W zJ6YjNUL<8qLJQ$C$6wD)3t4&kwW4EVxTKDi3SV}{yw#jnb#)cCXSLSZm{L7=4Y-`- z`$By%8^z!Z_Da3BOsT!c$gYXjH`(e%M}z1tae1-gV~0L#VQs8JSDh@cA_>gTvN+5u zsrh*A9udq@TuKnaqH!H3+Vw8Mam!9kot&JQVaN)`5+UWCpp|=kLr^RB;x~-Q73z}2 zLqrgXeKwOmi=xXp%L*dQ*?=u28{&;v)pN9$5%Pg^&xVEE)bfjYGq5Yl`&!TR6VX5N z^R_CWyga(;A<9PTm-0pPB=L~JGCA(%B?nz#*^f^0SwZltZ+Uh{#l(*%E?L97VGeeRZY*x4D!9eaU_m}mstlzf!0gj6KluCPV)>jrA%h9 zpt@^fVRVLncx-4!n14({u{m}(4H@)FC3~38l1?Pw#Q_C`@z30cLfYxsWg-j_zXRn zR=kD4$k_)yzlDi|a8;ob1(cOo^o%k-eRG#1OBxw0)n-C@Hou<3v`}ceevpHlo={Fa z3av}N6YkQf5+wcd#-bGaNPb!En=Q4JrNeD{b!8Xq)4JosnzjH*;?g_td5?RwTyyQI zgcd)$Cx9y$&BOi`=GWfXj^GHAxE5bZqi^5qE@D#`?MLHQ(({T(NRypK+=e{3#v`k4 zTv;PupcfC%2LVB)V;xlv@yNG1KtwVwNTA0H8v*ljn#1(!CCSLd?ZN#tn(4K=bo99HAy@W3o&DFP-!q}F+YYh z+Z8Yh2g8fPk1x5Gz!00#fM}(vy}nPaARQZ~V{NRf;|7eb(6vgE+ByLgoTDXW$4CFD zb><%=#Yj+B+)d7=>-oT)Yk-R)zOv&%Pfjf?`SR!W$KY|%9MA3)h9sWx@$o%ctGj5E ze9ccXCs=8{i;)sMMnBJiGkDmqwBntWvX;$ZMIe_t{kyOIgBir^M=53b!+t@9ozcm0 z+71KolwsAHu>UtP50VG?iUSRqh+4MAV}?IM+6y z!CnZ#U`UhqWwMfnf=ybJF&q*nY5U|$lZl|Vuxow4lOYo=8W z&msRTOr*)n#|8hlDaE9UPNTi0&8qBmUj30FQbkIzgRYRbWrJ}UMA`3R-)vtus_pst zp2m-RD^=gge`xr3G;cAuiV}y^Rc;1~E`Pe=LU;3FKYM6uh7`{ZwTlzxBQCt@4DAQ4 zLJ_@F*IGmn3K#TG-nKYL4UuTA zYJ)T&3pWZcA|6{@=Ex8o2Xx+Y zR)#InD=_VE>*%!qIy$0MdtY6N?hQ&SbpaTJ^U;SlR-nP?`Y$&XF1l~6rIu%XjLXGId}nE^cV&R+hC8lSIYjMv8RwNTP&)`&CAqA%E$f}Bp32DhnYvkLE*}F>tmZ#QqF9z zfr`o_NX@egjW=LQ2Ze>`D!IfiwP7bp-3_xhZLms7<;`@&*Y_O?ZCaE;^tKIhA%DbW ztOdXNrJ;+l#!<4a`FnMuaJYgLH#LQgx%oV+N1wxhV;d(*k<&fMi1Dw+uX59UmU^)G zGm6Rf6up~spQ0L12-ZnV!EG61MG9?ru9(^mVt{=$j&Kjj+lfX?kH&t;l4L#(pz`49 zI(p2K3W1Y}7034Xa_6YnWq?4*0NaI%)WIj%eUK3_?zSOIi3hUDDpBQo>&rCkzQ`a1*BkI!-b&o}*smnEdjY2Fo8p-}-2 z{AZ^@ojXyJ!Ra8KlF|wsEqc*gunI6mMg>06NygR%7fFBoGw<=1DIkVKESaAbCL z4^4}5OCHR|W=F%PjAhcKZ62K*Ec4@Zct}mye)xGd8J+mF`>=Gm#*PHV-JKm2#aUc= z+p3VtTqyT@R#QmzmyYLQh;>1!#F@P?M;AQa4#&A2n9WEX2g&llw^3@Qr6z+xlAD>P zhPBVV9hNOi`uTR>BW2I++7^K8@qh)5Yvxj;&5z=WnddqFm9rXMyVY1ljO6 z9l);adB{s}S;BY)M1HHA1kBE!U6;mf%E%*-`C^YKB-VdY-tSKTi9;O-fI9!U>6{sk z`g~SAFvgK{yX=fogSWP^KFhp!nZj$o%(}eSLnj+dw#Rcz0Q}kQ z!2@-zKikj6VPJ9hfcLls(n!f zxfNu?Y7&!@wPwA5u`xuL)J!c6&EBsa@zC8i177^~t+^c~gd70F%Qc(i(#AKyv_$ma zpoP*SmCvm>saj?K*eJCRl-VSv1W@RCXFbKq?YZuvgIH(Hn+Z`R7UBNAgx zpv`4+#o3DEe98Alj5rr!jrP={Cw)Vh|3zd5^ldzgBQoJbb*QN4dOkA-7!FBe=E&7* z{-v&K_rd;_iX=|X4xCq<(grE&ee-aaxi=>23GR|aFAakl{>PKk%+_?W0Enq_^_IXU}Av5ilo&-~aE*@q*qlN5qv-IKNS9X6N+Z6sCu4&hd7VOdS!d9=GZ zraW$@@HybC@gL`Avv7}$XkR|-w@eEBOEjt%&sUN;z7O(fSqk#c%LHV|*W67Od;D}OFaK5=_Gy}dRUYp5Ct2=Ze! zlkB^{8rvHWh1}XTMP0YIS#EhsvEoaH_X`{9*iN&%xU~ zwvz$mhA!L$wf|)81AXp4H(o~|?|(ps^jn&jP~GaWzzFhd9ciw7=re5%RZRP?e@r9Y z=|y*Z9A_VoeDZf20!l&b%*Gy(#QEQjMGjraC!|ojo(%w#(MSVxR8ah)KKCCP(Vn`g zFB`-CZz~y#BkzgPvN_M=6UX}1v8{_8VG}DXsQj5V$M&cp{kFDMe{J#@`X?Dgy=uHctJFfRVOG%rfDcIf4iYH1h#4dv z&-e|lgy@Xv7M0>N)ZXxy2mN!e zRXQ@<;3tf|88duylU4l|8mX~-y=?imOGiLb56XjuJ0z?3Ld5(KiJ3M~s`)nfDq!9G zC56`YhM{3Pgq;NX^MHg=$bIm22cHp)-s_$!FK98EM9WlzS&#JK_4VdHqd-(yYEC5&;zT@0Rn=blC_3wHVYfF1XXDZF}* zDfPAAP+hmcR~_azO}i*>>^a+x^swi86(wmv?dOn-)t#+DjX`%rNR@&T@Zy34K zyN|63Hmf~Xrfj`K#RR}L?igWLTavH0zpNAo9HSN)3`Ec~0YlhEi=mlsf^DRS73;lL z*DpyzxvwMD6og9GY-7CMvy71Ul-|!|7sk*Mxw7#-wn;Z1#M{_Tg9-KMTjh$3TW*;Phui|2ksC2;$hBq(?=_Zkj7j@MHGo%&1{r=(=M0iTI{KQBoX9n$` z>2kdEt22uiw}#tzS>oP5dI6+>tJ~LqqH9NvG}MO@sTtQ%XDgu>n)y6fh~uB`vk5c` z)cyYbyQ>P(%kh7jOThE~MU%So2!%^i&OY`$iKcxKJ&u248&zw`2b} z{^}>=`ALq|efCi`s=qOlV9KD=dec*;0t`gL<8sjNws7 z%oD9A_lY3XJ3Asw#g9{Mjr=%CaI`(YEGb23VZ#v=n_O$KdvAI+>Jsr;Pr31bfDywL z5R3%@sWc*MZPPFJ;XGJU6`VhPa{^C8EvLLHf6Rdqlhb}WoXPi0Vfgf3!HU&%>C5j7 zj5)d8Rm&l0@LAR()|39TK+wzVyY9HRWg9QhY`1K$N`+)Mw|3(;6C)7)>Ao8W#>4T+ z?@TyrcaUR0aBFK2hmZ=FRxXJq94>reE5`riuu{hdrB<2B37zKk{gMl3L$c^NZMrA- z<79aG_TXHr+h-w@OUVrAEY6RSYo+!$uI2-gy%F!{z~^&uTW=ezFGBbpdzrjh^^9p! z^ViyfBL)kuJwL+zh$kQIY}mapP4=L%=5JU z{^55Wy)&9P_Ud*#XRdE<=#$(r%6^@)%-7S->(ci?nB{0iJ(s-Aeo;hHB>Qaslvy-c z#xIFc+TgPM?3H5OLsg>C;?=`b_4f2Lbbg-d#0Hn19*MQ);zE=4Wbr7jNG^-lX6?|f zjD)AiMcX`aqwvFvgW^i>mL|i*!{aJ9P^m~RgEP?RT2Ao2?$wI^$0e|m9&!KmoB8t` zonWNk(@=ABJ+WVSjFbCGtbfb2HC0Cr4wraT8mo0rJcZnv-m_JzQeu^t!#e7Ygj@!@ z`RkmyC9~!3+)%-d92otO&?0rv0HJPM*_D>_?`^8Q|AjS~%WkYds z@sci325BjOZB5(v@5NULQk}gDc&c9x+g6BvQvy$+JeHqQ?n>df>ue=vJDz->w;&wf zIPvc`+xMPHehjV?{qi)|UYkDO;7#v)f_k={dMo0B_>b^@h64OoL;jL<1oCZA%ithd z#fn{T$C7`?bxji)Zv9AJ_+SGXrpn5dwIV$%cpbxvIiyDkVtx*cZe9;uyPldHdPKIH z2h6DkD0!K`zhsRyzoMch{oD4CM|8Rpv}70bwo0@t&FL)95-UlY@`BItPcIl6)=A*N zC7PNhN5U2Y9>lF zkv<-ey6#Wm{YUIO;N8Mja{Gp`uMN((+Kp}cOYrlS(EUcQ5mUY#S*}D2zJg4}c=+vG zob+bjxb#HjZ?5SX)bH=X2=xfN1~K0m-!7io)zzh&JIoIzGPJme8h%$%TvMXEA8?&R zxbZb+Ok2p;p^73Br?31;7+Py~3X4^0Fi;EguVXq<_x0uWkK>aQI9*EdO6YuE=uKru z$`iM+-n9E8I;fcZZPIQvvP`nViwGP%T>j%9->8w7a9=CmK6p$y8knW3)@>7yRzRmW}L zs%)?(_D>rc^5ZT zt61T>*=qAZTp#S-!Koxevh$nl-Y4eY&^&+O`L&rwPcO8U3;WD_4DDKu3(;mY_%p|6 znAGp$A%zKi09f@)xL%V*NH4(LDP(7D#yRmEjek@tio7pbtPfpoe{7B}>r`aYj*k?Q zzu^hKeg_I{>o$c;ZaJ;e*Aixv5fib#7|0zl|GR8yXB%wNW9Xyt`3w{}D2ZQCk@J~T}W>7G*!QK*tw-M~j zS!02>9O`>01En?!bdvD+cf}BKT&^c(%fUta`}-}aCtA-&fBS7y7ZX69q0-089CoNx z=}xlcV{+GR9&f4DrWQ6Peu=S~`Zijqx%MW84b7zuI_fwPG?sL-vP`AcHgwgT`Ovt2 zS-k8dI!?9G@u%qled!3|)*%rci7N6YP)drp7na$UDXB?mabJonO;W=~C^@?2Ds^2X ziz_XMTpH?ROV5Eiaz>izDV%SMqlKS9Vz}~G$EN$Xsx$-9VjG&BCyo#Uqbv5uR$?Cg zCdX%j4TqEl1;htfB1e)uRU*yqHiN=N{C`MOmLqCivNixt52`2|tBV!Eng>j$JePeW z%qQWqZLT{D2^5V?TK;xm2d;nqZ{IV=LoCG3&!NI7#yl*0pu}h}`*V1ZfnmkUyMT!+ zHY1#T)SeROsn#OHJ$=ig%*CNfscZH>q0|!f`C5m~_21pPRiAT!0h22I$7$*ue{uR9 z7H5%}2g0b?-iXFT`0g<#;TwL+Sez-hmwek8T@{s683(k7Xq{G7o=oR7Iwf|-iDKzO z585qEqcV^U8ntM73@la?8i2+DA3)ojb!kz*_2KzA7$$Cv#c*u%%onF3G9EwD=kDWm znsydvXVV-b2J5AA!jJ^lOf|TIvYE&t1)i;kdz~7_0q&Tzhmxcs4{JUTD%4)7j0tU* zYe|-7pTk1FAeN|$4m?aEudM;|H2$T0BuKZUe;GPhtpj7d8r3$H&4}`@>_==}l1mM( zqjR43HILUJ?Qt+v6W4ikbF{$s1BnfDP8iLNW+Okf-Qo*%s%>#T{6W>fZ?$0z2IWNQ zgqPhoBy6qm1n5D-ik?K)xg#O?SW})Lt6ZtBz;V>-TGj@~un0Lj4zBz0;<6~`Is5Y^ zoATk=4NffE7A2sYMYd}-W;T1@^4F&F0_ufso?=7)gpJ^#-L(-=k@bk-*Q9s57@)~^ zGKr485F0Kgjjh16FfDM4F!2L_$}gcgT@kKeb#{F53j$@r`N4$1pBZ=8K{`Uq5Otqp zX3}`$37V+V7K5H#LYfJJvNAB15KY=5DnkGoj1h8c{9jKfDk{r(_>daT_2KM7OKp!uU!}L1WBi~&rB&%$^&*H{qubx| z497LIM$-t@qujoxWwZ3ye&Zj{6vu&2AXQ2{wYJ4q2$~cUx#NV!*Uy#8c+p&b%-v>pyn30WwE6^t0eRm?VtpOM?p5;v%*WtEdrwL(X z&E=Zmyk zf`V!+7LlQ5Ms8@%%O_G8!s1NwNU=C1BuphZ;gk4lJHLzlxXk-`ON5SrMNt)z;f#Zs z8aGLAz0G2M0q~3JCbGqpV<%;vuIN3v6K8U@_GfQQ7iF$`4UhZiOqQw@nLXEOyV-WZ z<&^U1j&|Q_Nt|BifW@;eSpUVk+u!n#0kTXWA4Vz~8V-uz z?6{nRN2^1WkOF!$%Zka!*i=+h?221PBA@i~55FqXZzDpBO)9gJWmO%DC^BNfi4obl z>&FXGD(u3YFi2YvsN2ghVWIbDKK4k5g)!iN(U$IBi?$BGJFqY3UEAa*4rkQ;&b}JFq?) z-8gf$T(ZoI5!#)c@LDGY#|ol7etJm8ntw!>v%6^0tU;*y_J|0MN6e)p zbi-pgUVvCmSLpgp+{3~Qqw`VPh^reEQ2&XOWFI-aLK%qZWJEgowi z-n%0g6eO7TYc2RlB1g2eXZKAXJji@0`|K8V|0XsOoMrG?M+HC{rH!%?lub$91&E-% zi(hPR`CR9+^a?qWcUG5fI3&gl#5yy}HvgNdr>3Q)5}g^Na8rY+h-+$YhCSDh+FU#( zH$N5!-l+c^rSo6T3s%T$fd%${jX1<>2@LIA@#soA?WQ>CeD5CK*q9q2qs@Z}kKt&P zfAJ9}VM%2B8}=%?SV}0p&M0HGo*S|(*53@zGOeI%!Ylg&-%(Y%DXkzR&=!08NzYhU zQK9y?T0;55<%o)LZ`aaTozSeMnyo4eTJ~AU@xN=>hhk z`Cn1gKvqt&m3vEp{H_fV|Qa^nSo^~D6aT2jsP~v|6s)bH_$&s#l z`iX62$sQguG~I~gtU#eiIOntGu?25{${Yt5c96LR!DD_R8*t{9lsW2fZDl10kA@+t zjyI=xKvij;jf|p|R8;G!0cTmu=|U`BKhJho?|UKEcW7h$YJ3i45H|dC3-u8a5B1k- z1uz<6bbKOmtXwz^F*m^m05`%Qcg?C$)Ktq-PR}&d&s^BiAuu>O%}c98`r`%PVkwB) zbU%UnaJ|zKzcl)PBInioGumLrU znp%S$u`>F(UHU6(n^Q1R*<`<8S>J;iSKv%%FIkT#+D}noXJAm`-g((>7myc`+SpDK z+4Z23pnp!gYaK!3YztD3h>n4*;;ue(^qpwAUwvboUmOE`@@dqyDGv7H*Ifz;896)U zXXr{`qMvGa8SG*qWn`QaexdHC$R(xfo*+ZXg6X~PwTfuR!0v6w_)*uKV{SCq*cKfR z7M6SD6;zp#wAfXaSUp_w6BV0DKQ}Sjlek4wHz_z!58-Sw7jU&WM2P&Av}|Y`>fo*5 z8`s>p-Nstud299N4oX`4?}RxIKD$y|oEfUNy#|f~M1TRth4U(`SK3D87S>L>&hAnc zn&RT(s`yvi;S;;O{7ZJPcB_bfFIZrqyKpNaPi-w(SNV`|u_}Q0)@dhssGa zxi(Z?OuH(hGfqYg!2jY`7p@7@NZ+F~N#OGaFQiOteNNDKHXha1KTg)|>jtVQC=Q>= zCjD4pV)*H$8?N{2(`x&gnoj!>0M_U-76X0We~3zf*?D2w&pSWHbva$CwwrgpIb5j3 z?u%gId>}bocJd}_?z%kec_a8_6bcr5uLijAcMJJOjfB>xb=j-hE}f;pl3)sxdc}a( zq)~hCUCFyqZj!=bN#@S4PMlNVr9-)i56k5szC$8oI+w@&sh}(#-FdPx4=}Jm*#Ir9 zsdjtkViAiDV;#OJp@?Rm#kKvAu$AUm9$}jwIrH!lqn_+j?(wf7lYBwL+bHE-itaqV zCwOo3Ja0_z=g&?(k7{N%^I&%%Z6J%G(eg{(mrDi-a>f+w*AN(=`=w z%=LE==g9k4mm+9$Wb8S)B8nlQ@KQn3wO>DB^i;8{sfJni-9V80meY-DN%kg278zwy zM=58-{bp&$`XO4lFIw=6-5&PQN>jxqKPZ;!s^tjgO@h7}8B()jQi;REAnIGDyms8K z$r)DYV#e-n>XG{HY)Lnk(}VIgfEFY3mll3iWxkro8q5r!&IbSK{x~TOjvf?_oO?NA z;`gj98mjwAs!&%7)E1X0%AN9Pt4M5Jwetl?-6Ae+ayfx*IOxsw7wI!Iu0BV6usaNR zrn^WzGwo_Li{&rd*D^16$K~G_9m(}N%{SG%f|+5YZ=CsY3AQZd6Sh~RyE|{^`ctyz zi)&$p`aC~UTMHQl(-%3x_|c<((0B4REYy(7ZB znv-C?k3OROv@M$ANc`HXgfQHeIB+dvkz*^DUidirWOqK#xY=-v!Xy-hX55z=9@Q6fa^p8+Bt{h7lEXYYJB{0S;H z6b~~Pf;8UT8z)l?p6V-~$X>VTL9(Ju4@%=yQ<14&xItYkH&g<6XmsFtz06 z1ckTs83qhOn8r@uZ$pE9fD@s;skjBz$jeMc+g3bHO)dR4FhWm>NHdnq&s$Lf0R|yF z9K5_5&FpNMaeG-A*)2H_>LSt3OzftT;RLWjr=z$D4l?iWOb?>|Rew`l z-ky2&^rwk^UHHAfBe+!0%g0CfJTFC#uXx`Wew#D4VUBeDut}p%xnz*lOfG9^$dNGP z)%Bw>N3g4%n&-IxJp`3TTR9mThH~i`;^^Xx0LBWYh1MEE?u>RzVo^V@`tET*QB{Ya zn*nS5n;T*(vdZ!bbR1cz%kQ1;zMiE@HX2dG6eQtiz3tS@uw~#WUo5xC(uJS~uyXTL z4E-I-jEK@4Qh?4CcSyLK9T;~z%q|uqga6j?zO#$Jde7T&4Aj8YqbqKx!8gg1(bVan zkr9*a%dqK@YpH(eWZ+oK_V)IOxaJ96G&>lBpr%B{DnotdcxX`vx0X=jcdVK$HA zTv6VX?;C{6eiazH4b)IFRBB_>NRLqQGez-#^R$q(v(o?>YWdq}swn&b z`a^tCEGbsw8i`?VQ9ssn9i&31gkCaFTT=GVFi}To9YiAY}*=vn9qG2ZRCG+jNcniEu z9$II3$#P`Mp#34AE2`QcjH<#bT5|jtxI-N-;zV%WlRM8+ctBi6X z&rKAk{8G;D4q5im1=Cgu)|kvfO*UTsf(3Iv^FAlb4+szmK65QLaFRl>A8ceP!62Ut zx{ffPIA;tU7yxm=ygKU67Xx>1qc~9>sQCA*{fgUUx#_q*7Sm0(1Lf)fpX;RA#TL_@ zhYQ+*y`k(ano2OvdP`Q5X!P|meT%IT(BbZVbKU%gZZr;b33TAVT4Ex6J4@c=oP6?r zYy$aUXR8ClSJKTzpOJ}JjkjjXQrq{s4Nwt`B`A;ZZ!ZRC1&Deco!OuFzC91w&H4Ik zAgT?eX5Bo0`MwEU*|w=Hv^hSO{A-eP6K|jfn#+lwm4@_M(`Ix`h>B zTv2Cs(5hKiaVxK_c0qVlITT|V(+{C1{{jjhC*K*dKp_8`fe{i#Nkg?Z+P{8WU1NuW zYPj#3%!fXiw49>(a4!F)?d|Q&s?Nr2ISBKluSD9B-66DZJU#AnA?u=jtZ0yB8svQPy3sW`XpvN%ToJs-qP}B+JQBuX!S_$p%K~^@qtOyZ+4OiQc`#4 z>l}Xu7mdrjM*H~anOP<_QmmL%vG(-0*M|{XgZ^VsAPT6Nx;gT@x&axkwwi*9PFLHu z6lijG)daX(Hw0QYjvvKG$-~b*Y**)hm13Zw#Ifms;BI~hjWOh~n*^UC zyg~(3gIPyC2a2*}pRA`tjiqszw2O}`&3t1z|Kq3Gtvc48ZGRKQ``OQu5d0%oJFV*F zPViV8u|xE{BI|NhQlg)IV$d{F!y6R|>(E;KS?;HWwWX!QtHkbTifqaw>LW%wU`Qg* z%e*Tpb|H$yb4@mAZ2Is@FKj=iKyjROXKOHYaVJB#r&$vPG8MM7tbO>`Q z3w2kc#gq4H({)3%W1kIgq#5K{#K$jdToBdxJ7`1fYEegJQ0nf7xAgC-rR44?t`V_L z4B*95CUAlTjEuuml}Q*n?^R!Q3ghJWpVr>JjyNA=YIYPqPvVZ;lzkcf19QQ5z+`b^ zvDwIk!46AT)oczezG9xmV^Yd=4OxxNAqu0?>$cC^cqE3-jSUS@=eSh(02 z7>e56Y1Nb)4pfSW1 z*0s*5W_*zIo&HTNaq9|ueP?Yv56vBmLe#?zgt^ksz6 zlP&?9otLJqd-;k-fTDQ8HYbl27E?SJ;}7HY_4bl{P?!`UU|u!R#7?EcrD6aHQJUcr zk!e+TaR~JSHk)T*zcLk(q}L!F>Gk&m<#Y{Hyvq1*fiL-)1E`s3?PAjmO6<(K4U&w5 zMxI=RcYF^Z!hAfMagfG3R91A-(_x}!B1E2Pi+XGSU!bj7!Jbk*-0K#v&;)Q*5RSvH zLA7%Fk=@E5mHv9!|Cg|7^^xl^)mK?9|5z2>^Xwduvkhq+9B?L)(FO5^wEyk_p*y2N*d~y%TSAMRKS~DGInx*&G4+BU-4Y6 z6BLjm#V)tnPWc_5`(mJAQNHjxorh#XHLcQ={Ua$+*D@vi|Cd0#aL(d( zx?Uptb}=00lft{>vY{DOn@3X-VauR*^!b)NCx03bvuGy+HUdxjV#3bxPgTN?wG|^w05UQrDk>kFXz+KkAS!pw022m*`)wpa2PY>G6t1AO z14WvA8$9j+!$P~=Y$Jrv-}FP->2L5*P#CHeRS_L9{k%)PvXfKQzk*pD+I2iJu~!CY z!`T#lWODG1@%eV=>bQbSq@5k^B}t3uEHVcAN^%2bnUUt^3h}g(VG919&6wl+@>+wZHZnjfb&Z^CZX1-L!iq2bY9yVace^5FgE66CvT+|!3&O=1$T!J64Cy#Lpe z$wB2Dd0Kx+Np;Pgh(&LkM32@_BTi<5g zkMtIOM>G1N->ynQ0qJ^z0y7La(;!7*U-CWQEF%zJ0~wnGBo;@G|44xzMme*7@2UTtao~Uyt+uT6Bw4#HUV-uRY-s=X{mO)*EaD>;`_%H;=w}9s zLi5oWd+b>>Zz}A%IaM_-)|CdeAu9;OG<8?G8~yg&NH(ebZ4^SrJw@zM^9(iFsRkt5DAd$5kPI8K z2{P9yEm=)Z0Xi{SWr^$M5)4!GlA+aLiRyeao3c(Dn(JE{y1Xn7z#?c89W`@N^Ja4# z$4^SG)5MZi&;|TFb+7peQKrsjKeWc+t3UKHG2*K?;bws!n-B-4vOf6|poW3a!V8ts z)?R-dBX$=R)5~QRU1E`DyZQ3${H5tr9%^C~fx!E(KwCv;#bnt z*od>dnX;+QBa^79umFto#AlfOHQ+eOz3GJj?Zv*+f1m-#C$9f^37*cMod(*T5R;hu z3HKORehQ=<%BSgVwO%HL)F$eVdpzSKn=>5U39SmC!K|p5CsqbRwpKa*Q{cdb;LSq=DK9#kK{4!Zd0gV`OC;bPn3%HmSX!uF}N{?nC}ky02S z`h`PGBRi+ka(?s8aTx=H#qm*wW;FsHXr7~fUWGCtVZOc|1OnB|=nhgpD5@HQUk8`a zTN0+F5@@CJg6_WTo(4UyjI2Bd74ApIjflxuC@JZHjDbKeFE6$`Y=S-K&jL~1IB&CZ z>BEG-Gr@X8}S#!T5R{Z$kcbd+Z2<`&5K|5eYQ|7*d6MZg+% z*H_!2wS&J4UVgY9xb`C!^G&DkySjS%K)aC$!&J2ziTdb5x!KiR|Fs=Vj{p75JY%@p zEsGS40_{m^dCoM}DZ^QQ<3OFX*n4}3@rDw7B)RUk?nLp*7?PG7drwY>Ja|KWCj0RC z5H-5IK=(N@EQr`8EfX!H?g*BX9lISK8c!M{2oXnASGrxexB|IdP#E|}+sc}KMjL0@ zfH>M$E0TGfXK!sE{%*QN?Ba|J8w^?Q{K#}OBnv=!C#s{oK0137MAItKpDXp+0`B5h z^YI|+O$3wBi-XoZc}ljZLXrP93tWi*aqYTG(e81OAqKyrK6&Hz&wnMQo?E2<^XGXv zQX(Jwlag=A*XF}5d}1SSjKk?eCmbI&zV>=ULHug$-5V*$s7gTL9x)ou*-5$6317BA z(N}COZI$%Xi!*$zFCu7QXS<(rk%IVYj)(%o;}X8?@8D)9(^68BlZk<`o@5j*DV^EU zSc(0<_R-zTpac^Ar%`5S^Xw=6kp^B)cMN z03Pn>A{v$(Juz%thm3-A50d1A)>A`Bv(C8S;2v(9>*2ZYzxO`kb~qGM3i)vVeBNTq zN=;scb#rsqN=Yjv%6vGHL~cvN`?Zj2`+}Ngjg60ecw%W&$U-PAkZS+ulqB>&a)lY# zfAqga!2ya=%bald&!!84Qj+O27SK=2W%WFsHPIDM&n!mZuSJ~ zu|;^-qU{D4dK~?&*z=Ex34RCBFhqQM=y)PwwKz9nE65mHWV61`e0ahxVg^R*Me)Q* zGCI7O4*jlJ2{o8C%^oa`5{d?Ef|X^RISWl3#PpZQsd@5wF7Wh!%bwo<=I5Ck^S#dI zzXpun|21F~N_OCOeUkhyUGhGlID=^@L{S^=BqzgK_~3-&G5B<E`;q_ zjFGRmP9J3f91PKE<%AKQ?afzIpc<(LBvI-NCmN*;bX-kO`1~^k_7rcXh<67xqsAZ9 zDShAG1bu`C(x17=2ZrE(I^Tlh`G>>M;7++i*29za&o4oqZL8(&y|WUvF*yu2f|DE5 zh&yOTe@Cuy0X#JFFNS@KvnUO2)r{vTen>Aq9xk7V>z@Wc@f#Wr!HB~2T6g{GhJgxd zZN=5hZfb4ib8>N^pNnW=aB{J&asjvu3l0~+^e>Y%ybH)>0*2GHnUZuDnQe8aL4Nd7 z5D;dID~8$m@kR#rqbD1;E^&G>XlQ8hADWYBDZkb9G~zQd;$pOVyrtju_hCOnQ(|$* zdXUjzDwJUHMtM%Yjs=LMD);2bYh;xXt(#r~A&mZTCZ8K$peq$|xlLXf| z*s2I{Go$paxd6C=#&S%tmlhal_e69mPi{u`Opzr znZqTIE97fLEsG68VP}H48(3EV`Cy|{ zTUW!vDL-F>U}1JsLI$`P$^4Aa>JpVzy}($|eje*1#?1 zF)ArqW4^NZHw;>;Rg@yQO5Tx$ts4?2r*+0@utB6?>8vkNI0L7+q?lizz2G6+ZUDZ5 zSP(Im#7Wrwn3{{r&S+Nxuhg>GvXtIRv+3}0HobwD8&*)=&oK?>F0y3%(BtE|dU2c3 zcIf?78Z(BZ=-l0~R;)So7f_H~i8D)0O-X6dz3nKf8-eC@ zh;jnE?t}M?LEawW&32Q8k|a$EsLiBBj}y}OwJbwjZc&y`U;bA`vz{hEV!GHkh&Hlr z(Yfp338=8aRxyYo$!@^gpvpCV@j9atOjMm#L~oaFCM3 zet}QpxCkSbc`q95OiOjsErQz%&BwZ;b70kYA$SJP^x!ks4s%c&7*~QNM#cLTP+DZW`{?@@|Eyf zlK}ss5AGcY8B17?V3sGoRwp%)tMa@E;?ZUi5%`5`YKYiu8IV{#eM&i=Wxbx-*>@Bg z(6d_R&vpiFPWUHTj&|0BSZKB0We~k28V$h_hmnqQ#14bfWo&_JMwiFAjXo!z@kd)I zL{YfzVr_bFltg1L24Oolf@;=&II8U)vgOLQ4Vd!!owAOSIip!>JoP^$VYM10 z<@HtxpERl=QWYQ}g!mTDA*sYy5M9Fqc-!d+dL)}o6~n;8EKhr()2dzYTAwF7v0vldp912 z>6upT$71hqkxkx@BfVd2I_|p5lJ|r`FmsN*@_v#L< zHMgRN9328 z%9);<6w>`4xcN!4nqebG%IR5&$}8GVjBa-DVGg~gh-nU%?Sl%ZNHkfE7IL&@AeOmB z1ZIl~Jz^SI^7g{vkBCbX#YxNA>e>oEL)GPN39%5@DR|*XZj5<*i(oyOw^HZ|bSw%7Ec1sIf8jvxAD*odBp zW?Wig)s#m+B_1~-3w!H=1g^bn9J_we4W@2{U|4cDP_Q}%OOCdpLO^7c(vy z;Ob~AYR6|86cpZ*=hcv|&C~r+>E$~p(^5NY!NJA-Y4*me616`#o7|&6+xi?S1`Ma2 zIj&x*ee8*s_gEZC^pTqVI>D^f0ib0%zu#~&o!diZg72{^IAf>`l&+?{((i2&zF|I4 zt=3@%&oSA@>UnCX--Sqa+QJ)cL3O=8S#BD-SKHZnYZc1yS*JwcxF0UTV8;)pZ`Ob3 zdd;fHecM%z|m7$s-a`hy=A79%Gcqq&%(vUrm@LY9R zDnBYq3MY93_{r$F=z8;=I!7MzA84Npu47cSYI)=HSly=wo-9sgusRDd=g&INN8@}z zM<13S`jd9L))S}HOqmhgM;cbLJHy8sZJogmlK4cuOgJDwQ+)V|aS(d}{5@$aJR=I@wl*6bUaNFUZo%g!@oQ#Tmtt5iCR_W61Cbc6c`^Hkxc3$+r7x88d7o@kY$O}9+$ZLLE&yKndNp=~Os!~1KB zhn)F5yEpQvo|(;Z^CC@@XYxqSZu(}2@qPJ|Ly=r(&KYpSx$q;I#QjUP2M3uX17e*m z{a7ZOX}8}p!{X_UjHj_ONyqpe6apWTF8)z^+<9)BLzyu5bOcPVoItI`sLC6j{f$o3 z(=gX0W2S)Nz^jJ(`MTqHPtsTGQ!Oxfk*ChBzvi<8E@Lv6;XqwV>n)__{o^wwvVwS8 zV-_5PrKjrGoK)?Vnv-geSuVDJy7 z?V_HlhsHF&h*HyV0kUP%WQL$m_vtd*hwh()1_!q?o)B=lR3~xv5c9AYg70W}mf2nv zWqb2+^%-h!FxK_U8|D!!OKAm81^6!%byv+FJvb z?LRiM#K^M$FJyJC^9AIjwBw{ALk5f{4?_6hW z+CbfoyLAtx7nE+Oy)M0z&Wj0;e5rHr!i4Awe*7zhUsRu_yJr91;({s8ou{%3M_2QT zWiH$1`Buw-!Xj7SA!G9kbJ3_IU<7&2 z#;c?gsUQN6VR+1d?lk-UFxZ+i9FGA3nF1B^pC?|P{tCgr_pV50V+D%OxtvR$2<{6<#f*bd|)0t6V-eH22N_z zfjP^*`OW088BQ3OzqL}gf#WfR5XFC10`gK}(#07bGeO~n_lIg9h9nxIP|f~bi)^{1 zn;hYfMAC_nE^;+k|32sf(iemMWfE5EJ}2&O(<$!`U*wGMx2<7RX#XylQcNl@;x%K% z*bK_2!22WaZwjFX z0{H4*jeg)I3_fI~5Lr~^6`AJS>KpAT&_%}-kbnjv5$;3i4C2y20V4M?ajxoL*ke}; zlEBaqjg8d0(v}}{uAb317ap^NNY_!}CD<{o0>rIzs&|=kIB{$F2Of{@#hz!7oxfw_ z(Jqp|*zYL)K1BaCIct%>OAY>DXPAF`iwd%UaY}WZi7{(K2(eLBp&owU+ae#UWfiZf zEk8yJ6dFdC;SR<2sZ|`AarRq|3g;K^_nQ9pl5#@Cy?TJAr?2G*! zY-(x3*V5=1is?k7sT{qJ3}IMy$$T)6X{D(ddcxIjd%C zI#Snc;ays|Cy^!L_FFFV+1Les`Sk9bC8C-6cmKzknStS?ror%&fQ|vC!54-CGQ?CMfstGW&1{j*!i3)-;EG+fWJ7pj;;W z7J0nQU}za+?iRyIO%T+uA@J!_%yOSh>`c&4R0eBnDA+3XC$F46iIwd^SDuv=uq-B; zG4!XeEWF&*oC~X95~*7^GEvD!$Iy8}f>=2;^{?Q{DXSM!D~H zjcnocfgir$h0XW*-!dilWnG%5tiwZP>VFSfx&HxKNy-dpF7;K&Ix4EXQ1)LubThL| zGsVG99Bd{6cuZHx`yq@1%Fhf&Q;?C3C&R~gXxmzn1Xfl|@RwMwh;eN;5JxOKIBh_= z-IeppL@(8_;rgVT)%V0ZIW^y;mDsWl!7^WcLWIbo%$%XB5*~*qD}{;iSV^Yw=Nf}2 zOa82mNC&MIannNeGYTPPKm~=&>I4d$_JGe@;>QEipMima!{P+I z%=XL0q-R?tnD=&jR7c&VQI3iyn&3TG7I%@cS#*)1ps9UmQfhvP69!zr4i6~TgsByn zRhJNK5vMdZ#TQgT{yxdTIIi66^xUC@fdgx}p25Ez_J_o(JT6e$6F*7ItTLA%I*2H) z;O?=dP=dhCJN(bY?M8R2>ejq*;Pg3lsd(m61|5p?0-NJVFB98d;EK|YV}o+faE<)* zy&N4aBmEzaDLbV8nQx<*kW}EPXNX2CT+2KY#JT`HsZPuZEJz4yaTBLf@TV?DzH@SR z{MJ&nrTldVxUBiq9V5LZhIOh zOtWBzrK_-4KAj%vb@&#n)bT_nKg(0bG&t7PTrFwnpH^+C>U8Dc)f-LT(N@g6@8&(I zx6}?Z=kgr#{-Eu)B@w6Er=h+&EgzqGTKa>q-vmdC$CVwyb+w7o zfqR*=aAE0!(iyQ08RUm(KG!2Ap`^sdmNdqTKJuN5rIr?RyVW=z8WXw9-cu!(=;-XP zQPH(LTV1?v(yn1(@ON$1;tV%^oRLx0PN&(fjrG~tUa6hbW;r8wqo#K0+}Gq&d03?? z*C*acB^%S6tX~DX+V%b&Aa{+9uu26h!=0fdCTHet2Mn(-j9xdpROxN%u2|dV`tu#@F0@8k9@thDD4| zTv(ubjB}W9pdg}wjWYctEW^33qcsYMN_WqUJvFr?S?wBfu6Cj{AYWgXUu8(>DNxO) zrlh1cnX93yX`y6zF|8M?i(BZdWBpkXBM)w1muJG#6cq3zCkGrX;yf;=J;sa+gzcyo%^ z)^EoxPQ|_^*iUNbc&%pe-f~T&0z|;0!ZNuCuKnVTBmwc;i_DCuvx`mz@EYhi7VeSL zkJ6M*l_rH9%qM}E@7Zts#qTd9;2=NbYIOYqH*;-<$p$7vh4vefd9#$5NNK7zu7M;m zR1sy~roQ$sM_P-cRaDJQsCJ@zZzj-ooYUSOni4M^m2Y?05G3(Id7shHTW3lc^el1O z3@DakT!`QxfP zBmx|>z=h(_0qCH*s9Afx{nCEzb`*}zXbEcR=;)|cf+Gr3_j7kKRIvu=G@3@XP$zB$ z?$%3Mo*eT%>)ot-Gg>iJ5bG4V*O`puLn8+JOamq=RALt$gF<5n`E0C=t@I5{3(T1?6g6#g`W1kEW>Z*d`uFVE z%*af*?#tdlQ?glc8Gh4~R@#ZiQ{P(ZQmdhTsCL*S=M`om?+vGxX%%>$4)N14zdUU?}P}`Dl=klQ^is$BmHOWzFF7yJ|>Sp0NQ>V`XVu=4`I^K<~MeikD%l5~RN( zSYmiQDNBL6-v_K7jQcMG_%Bf<_r1>G-YYprG2wK+PvkXuFX`jvz6dTV4T&-mFmeRU z1eP>~F}|VkV>=3K$&rC`)xTa|KeMsEos5zLqVEIy$~R{OK}KR z+}(=1+Z&$yjdAafFF(Q=oMh*0Uu(^|=H9e~`3h){buh(&o|3(-XbdtN%RlnUtA+UG zFJG)@NdX4ZcUr#?88}YY`9zUa*aH*BKjL)0uNT3(^8lRRFww3jIZAne%=TdWl$+&iYKy*e`hTlF&U3- zyt#pmg%y867bg6qE#1&kclT#m#u@B;H-;cX_;db?F>##^z#8%v2jQ+KO?-3@)#HSi zLB;KmN#2U(12^mk-n;`4129utE2B}7ztj}mq(o+F>x0^%by=*e#{j`g1q zXWUHp`r}Q_CPShNu89?2v|DjKl;1~!!1n3_=&&%!{{gW`9>g+&Ac=C0Cjd( zNOk<%8l)*nK}wIFU8>5kdP{R=k`+x*RnZ&EXt3f>p(q0`C6bWKxjvLUdPe0Li_(ll z31)o`t%D>wHO+xf5yj`dW2PuFf43nkdEa1*V|A;&`g=J_u#n8~FUfqr%suH*2FbPA zHpjLXja7S>Yr%S_b0B_>bg7Oc6Te$=9v+*QXP@`~D(5%Mh`q2{?W7o%n9ssZ8xVN-k}L>A9sdU|Pl~ zQ%jb=#oU9pa9UOSmcmlh9~L;M1l0-?Pn;!T(WyH^&GysvH(|FWSvOBXDcQgFN?n#2DSZ@-D#L4n_;F%&BlEs(1 zn@yjga!T57gn>`-^&ZfCyLLFQGnn|Hrfu>;Vd?ux*PfiLg}X#7E=}fkDwuB4dHwV) zg@tVzkIx#!X3UiJ?}pU07WTvU{l(pwJ6R?xj|O7YGt_%#1R1iJg*N88F~fzNxZ2MA z%5Tz7C4i>Oe;T2m4}bO#QmhI|Sg>%}gC%(ty)PZS7|UNA84QefZ3zU>Wx;v>xX&$N z^?Xy?!U-xdPw;zmdaU)7#beCiayV9*{gB6Pv$#reGaolX%@*nI_Iw-~5k1I{gKM^M zeKO_Qp~4ehZC^(Ebu%U5kzki1L6V_w6{urDF<~}b)5ptvAi5cwm5@16*%FQi3uCTg z+!PpFgz2%J?^2+9knLPN!YOr1pR}#-DR=puAzB!?LKLT8-e%H%U1A`%1F=Q=yzx&oOmR>fvf8eeKlmT zI0ls#U|v-i`g^R8iHj}2x!tpV&|C!1jm$N&PulezgEr~)UbPE!MV*!oR~6rcIdM#4 z9*L0X#9i^5d7`4C zD6-rBQZBeO(fpQia%K5Wr3e0`9j#R==)O0g)uh!h;X+LR?~g_+0WGC5C(GWaxBEpU zQZIK`n)g1{IX8iuQT}^oA$%cd^S3EW8~4xS?vZ$Id9^f|anIf-Rsw#GH|r`Kh0;%c z+Cc`C-3P-ElNoB?VatFQ5VO80t-R9SkI&tl)1{% zQOWUsT%@lvHg#p_Je$k_H>4$H6spj9T@_*wPrKzXxDtl7Rj>AWAhlC5D&(LM$Q*EG z2>N7Y*sqokgjc0dbH4h3SlkA<|~9$g{Qr9SlgVH3YoA3nV_C!M6QyFE>s zg7!EI-67kHH`%;ymaFZ)$nqJUc_#zi$9fW{hRe!=5t=jcTx#@8O6_ZxxWm?J74$m*wYL7OMFn+}u zwe4O>Noq=J%=nsf6=vq+$jGInG10q>(t^f;MufYH0??st4SWZgp5GOeOxegL>(ha9 zhcGw1L<1o(lX%eV+ z#Zm7*Vt^pS3^d<#uNF@eIE zppkN!t2s79lUQZXi&(hb8%HkMVH$tanG`P0o;QX|{DUr=j#ub8y01w-F6 zx>ayJX7+lYm8EF!kMhIHJJu6*U=z$8edCjJjSD2iym@dx^qeLKGSM*rzkK1Qi>B+v zLO7ZUe=7*#-uRfNI4XusT5)?e%b|%*i39occrkq8HE3c5G93OjB z$dN_g9{RyWLUp^El=1r-HE)fQYotQ}Ba&jM#kz#1@=s zxRD_Djui^u0kN}00o6%Kj`ykuuWKhmY#uiBEtCqMv5!SyX zdL3bqRm};OTzm;`_!h@FSVcT;H)R62Dfevw?l*jOdP6S_#y?-4{#(x!MAFu5QB2an zF&p#vJeIF+nwvrCez%sD&b*?MarIF9G;?14i{`-l`}1?n#cK3w#f%gs7YxS# zficw%S6KPi`{8oXWoPvD#H>fp3%oKx5(ReC&E$KATkoaXUJEuW%aVgS4k#DhuT7=e zowSXjgpjHp-m$}lm2vD{2Ay`>X&JLs)7CuT`0eTA)6MT5`@>@%J*6eL?$o7H?<&_b zyqe^mpK|)+RKaT47EIdpmK7Tn2dS>-77@x8nNKFv3Or9=RBw-oUS3WS;R`qK-V36y zMj>{!sPI13A4?MjR4+KdPH1RhdeLglv-K6+3Y|9Jnz2cPqr$z5_B->65V*n(?~dF4 zq%_FcA6p@70M0%9A<>^3_~^9yIfB&Rv_)EEI_Z68(Mr!E4`okJZx40iH1@K8+B8Y_ z{MkvuT!#*8@^>-N%10pmVLiow*a_!PMm{S!4AUcuZ0>v#sRk>jk?AzcrlWQF)o3(2 z=qg9iO^+|M6bR5ZCMVpC{+-@yyYzLnyqRu?qw;8B#s$v5Pg^BlU6uMH zKOo3bKbdl6hXDO6DI06gX1r+aEOW-U`hL$OZTZ^8`I|}($ZvMsesUXFO;CO#80^DG zmlc7hMN5`xfCg&K`bo^mp#8<@ZxMEMHhTp&qu0EpX+Qh{8)~shhh?Jxn<_jJeWw!p z{RTNgYT&Gg3tSb&0y^k1vR5?DUbJR0}pe55c?n=Y)$nK_QBRgx^8l%I#n=5>=* z5|IcY{p&K}$Ew(8Meq7@yc;DsmfhjF-u0Xae=o-t=`Z{A8e2a_|IgRM1~w_l`U~M@ zUXi!^xEA}JEJ@^mlI(~hBLxBkfA~dRuD3cgkG7vCky6P8V391n=IktWPSf-nkMALkD-N_BzJNd{yakY%~|~uM3Tb;m4wKp+T7iHUwd>im<}=buLh5BqB77Mz2y$wlI#w z+b(|Wfs(0~@YF8UMQIK!ll z{twy!7oe={>)rkL_<|`u9q47EocvyfdP^c-yMyiB`Ok3vv$niHtz3b&s&b#X7AJ^- zlFxn^sOF2VXP^4X^9^{(X_n54P>o_{+DU=512@0RYc#*LG{5x@%`IgC@M)U_zigev zk%H?6G8IuJY^1xm`f77e0y2&41XdBJL0Aec`x;eD8-c$j=8w-s;EUr4y?_aM`XVz(b$K`G~i>~KKDqs;DC~1G;VxFHU_!&N_7HEm* z=Sm%T=?0|XTAacG_QLm5U5myVm?K^M-9`2nMS=jyMhTxAqlC0VeQ0W{dn0Z!fAUd0 zC5Bza{P~r+3`i~iq+q{s?*94fOoq$%**}0lg_H&_+Os|U;jB3{;rqyEoB3xV#GYU? z#3jO8G}edM6+Tj_A^2@4&upT;^>MvWTTZdyRDV|?&OI8;U|I+Qlr*#dft~ZYck6&b zB=)TvkHKW+Z&=NqzrNxbFE2u=8#WCFR&8DPYN&V&n!nO#Yc{!7ulD);3iC|7O#Dnk z6og_0-E`v98KuGQk27@_Cl-roZbe!uIb|o@AHQ~(uC#U((-CVu+w2Bo#BU?l5&~(Z zB(qW<<*+5)B=708KOO)An%!j@lynA2XMzg$R^9acMn;C7)=9;KUFq>m0RCqiy*1|F zo=Jt9KM-+xuO9K!(lNQ+p$R7m^Z-mdL``x)H$Rx`R1g2U?woy%@F(Tu3;Y&U0zrhX ze$|-@N=k=_#y+d3DvHDQx-}D_*Z7rcaRy$2#`7VoADFaB-0(KDzdajSZ()B$_n4&& zn{|(KCE%Vh4bF^Yf^b>|jZH8j^W$C%Wsy^L8rPJfUqth!f$POr&732*!H$vV=@TkZ zSwi9FRVgwT2n;8FcMgWtc5+23Z`b$dVI5hv-Qvk{ROHH?etuK~I_Ni0&*`*bPBO!( z!f7~QCV=(vteG_P<()M#QDX8D$B{+B#{UxzKAbaj{2JP9D9Hp>6Kz62iyP$VVrO?=o zG58Gk3GD?1&a6(Et6->hh%qD}In9s0rvQRP*eV!X91i0+Q9-RlYSts<{gAq1I@v+&t7drS-Qs(d-EV1^Iyc$v z{hT4T?!$g|r@pWjT6?Ok5u!D-2=Y!N*h^1Ow@Gi>nXMZi$!q^C<#}}Z)w^C^vz05a zTFqfI4I#Oup+ZY*F^!t<;D@yB^17F`CwFelH}5>P_@^{ z-A$ceTg>j2|A}+E+HN8yft{K%v@InjlH0glZ2nd2;)bl7+;(L1JZ*mQgU<6A(<=}6 z1G)O$=t2w$merhe5V_N&fm7s3Qz1Bp+lan!OkOV4wYAnN`}f*h6^XgoZw4iQ=)d5V zZ4b2KP3+!9^!3`j+S+0A|9H4W&ejtX6V_?)M11s&jNrzKZK5Y^SexD{7>#MGzI2b> zPDSi8C5StGW`q=>5eOe}l_5Puo%-3;%fX)eO>2=aqRd;W-mT8B*?~LZgC5>?%NFPM zl?Z-^$7aY+zX%52`Bs{ZwClrTO)I z37sZI#w&YgnN}l~;(fg{y?D)egAS>TrZFkaUPy`x*KyEQRn}!QyHc~k6L_1utsl%G z$+V)Rs+!Sw?)X71(pe@7a;R5aP*8dG9r%=;IRrb{2w13m57L79-is+i4;&NcD4sbz z=sW2RhtjXKhadHIu&{(H4|CQ^N3qdHtoWs0`G|rnv*kE1q|0SFzy?!{gj%rIaM!Ky z7B5D{25b3vwaLid$jE9NCp}m&c}sn#eHduv_nl65*?TQT7$pv$7PHu`!f}`e%AyQS zNRaJ#sCd8y9A+gfRg97HJLpigYd6|lgC5Af*Fv3cE6Eh{PFaeUD;#vadYbt=tp|g? z_TW0v&3yz4q9DNN{cqN?r(W5S63iIYv-}qWyx9wRC0V+K59f@KXBcbPn^dooVXF%sq)-$6S+DAg%>F}hnO%cFZ_!<^AyhMfi2XqhZ0cr z{s3}jQIEOGoE(Uv&Y;}hOSi2#n>Jnq+a#^zVD>swDWUUTznu%Or92EP)iNV$>!F>+ zgR~$2($I&pmT}5y$lL96(?j{3jw|g-*pJ7ng%dFFFh|IaPAV3`2eO9}QS}ZyHqw|$ zIu6_(zf*uEj=rtm_vAdoKd|r%+7A#HFZpw-i2U#Kz(RtT``-cC16_Gtff=T<99L^) zrH^0m`+qPvb9G*YY(O)U^YeUeAO?`*X=}KoSL&S?y4b3{66neVw|MR`naphzlaY_m zLQ_w-{@b`9-Tr-6-7dT6pmO9F9jk|Pu#vLu(b>)!{EqHGg<+FE>Fm|4ps#UW-f)aO zaR`O-cz(q^)KS`g%L;n+GI4YQR0&Bw4 zT-baEIfj2_93EyEfgN%Hk9At9iF3S1I9|Pp7GmzHW7Ln{%eDiF#?j2iKZ51-z$Z@? zHSu~=^@MmKQr3~SE1Y-T24P*_w{Uuh4p7H`LX~aXB|Jaoo~PlW`|XL7R5-tHxzto= z(H}j+_btz+ieyPM^C@&juhr41Kickrz4g?DUUU>ldpuVqI>ZOR`bhJC`uD+i>&ev^ zNzb6hdyGhe_Obte@8KXoA*jsD&+SECcj-H)ccK6HmdxJ||69XXW91`|B5Gcx#1`abyk`+It-s!r8fO?Gv6S6%sA z1=Z{-@Wn1h^Hc_W|dEZQS}62Cbvd5Zn1( zS4Zcp22Ri1|4P3$VBiq&y0qM%DlsxL3JVLHgmLhE?pUKFHqSg>phC0>XIa0E-c~(7 z9A9O6weBiMeCGd3asC1J&~H3yURhG=zG})+YJnPR8?$w))E?7C64F8Cl7z?r5mF!v z+*<*_-{lr}jWW$D=WVELG83#Naut6a-D@Dpz@3zMb#HYL%BpwlPMr1|z_}aSdcGFi zI*p7ha|)ow0BM>QOzx4#Nl_>0H92o@4JK%Udf*CM-A6mP{%g23z$>z2g90L85I{kI zLkU*a(TPBW7O{tQ!kI}+zrQv(H+wD7a`m-$8R4lUo)260q}{Qp6Qm23tDOJuU6>)u zl{;=pK8~M8g7x|(1HdaI${R_>bA;;d)9Zg~yKoa@4KdT&4^f%TUv99l)`1k33O|7`?E7>YEV&YGa z-T4bLS~;COX$84o+F_NPfq93;|7ybk;m!ajL)l z;!L)tFK6Q4h|c8N#zOhm02YHAVYo4X$%nT=W)vL?H4(>N=TRSQ6peW zc0AUWJ`YUkh}uR%Rbq$f9J4a-0Z3=qyGz$0o+5a3QOaf&O$;Hzs&C({)xbDj3-EX+ z|8)CCZQw8ra+A4k?#+Y^(VKSJuzsB)$~uls&Fy!dS5xQlg`*8Qup`U7cdJB5Yz1q} zQ^uc#9VTp!2o#^~k54Ecqf_~z;6?9c+$H?;t_yk_05{Ecd1rHb7Ii_eea9yGqAO?< z@msr{5j#U)Gvf2`!`pMaNQP-p$Y+p&`!6EVqDXc6@}dMHU?#XV$f-x_-$6HDYjFEU zk=SX)kRMy;T@*tigRvT=2{xddH>k;!Q1FO^A|0h7b4R@HLnkDj7hE+RI1n|v&2Pe> zN5jxNW0_H&?m?#N$pYKF$Kc?oZch?4vm8>Yw1&yKoQ(5A;GA&cAG#Xy`$fOM4YROpYLl~RP4 zlu0LO@|N`Q()oC$DsQ#&M5-CH%4hn!@u`ociVvSonXQa#Px{bXz zW8GXtVPCT+LecFtn?u373{>bKgn5^-)eYSy+Tl+Biiz(AkM%KngH6R$bX_jRb1K;` zXLP%{VT~cb*GBr_w!O#|^8$5RQZzD8IbgFj`#plpX*SJ{y}>B|wuC*$;Dr%wnel4P z77<|;*Qk+hRTs42IQjR_&`QAK`G;dR>S5z74a~W8XHF&)J?GBra920Q(C1N(?;BQn zMKPHp%_g5KSeMF5UOwe~Ih%*D!oZ&nx7bmw*RudQ>+F7soE#+Zf2 zv2+$<^@lIaecLT|Xpf`c2ukGeeoJwA9(}aCw+&EbsRIl36 zUl?T>`hyytnF@Wly)G)7rs>sfeM8~uGthpTu_Sch*^lA)Gv(I0-LAV)ybC3jaw5*c zkP_t`4nObkoF9fiF#9OHjd`pm$X_z`e))^NV+H$Ew99?gA3>pi1^v1;2C)P2<`R`j z!=`22)TgqsPD7e5{=2uRikDQdjD}uT5N7{Z&$wMIhRZ8shxyUEI2ywY%7ru@J35mS zyUvR*B?P#s21O9QVXn%x1Kol#gI-wF2e%iq!B=o~L0p&WBl4Uxn%wFA!ove06r*r% z8<%f00P6uj>c*KsABi>_mh$SaU%(hs&ld=~g=%FwrX;4=>*aQlPZC=a(=PX?gOAFp zpB_`%ZIe@gn`O5NB}qRZRMr#tw*3<+bN_(8lZfPh)M|=i*10$4F4!Kz2OVI9=gm12SU8!xrYXr78!0qLZ{-se{!y4vd5(J_5H|W zvItJ%*$r(a+9p+%0^z}lF<*~0bXc;zTEu-P&jbsTPVRcMWY5{%&X_^4M@41RyDtZr z>@OZywfj~<^kr9@*7LgA zrCD;2z_W;gti)jG4sZ)e&7O@fJ@bqLsmO=4hLlTv7-b#hg`z5f7{mO?e2y8X z_{YCE)%^<2bJd4IBcC3Fsy05e=Oe&Y$9J&RaV+5+ouQbX%Um)(1^gx3PFc!6H!(vk z-Bar~`#)Nf1Fbyjm@XyVQK!-VnS##!$U5&ZALym55nRu( z`lIzNs2F=r*-^GO{j8Gwsad{Wq1Au(yC0PqHe)A}JK|3FW%g5WGiva8b`>};0llr! z*}9bq0fmXb+K>+*!9FjB*A;Cd3S%Xb4KWa|cXL;2_&YOtL z*>Fxyr|LZRn|*YcrE#Ba)BMd*W%X}p>C7E$KY)g2-qZfpG_mN;=;qh6%SxkOos-Vc ziUvrOZrE%0){pkgm=a1v278M|IVtXdN9H_89$Gg-kqIPEg<=e{5>Q+c$!~J$URI>< zm+Z)?!)NN>fyfjHhA>_osQ>AjlZ19fD+1Pxq>-V7c!Dr0v!K)r3|X z+tY~}ITGE)r0J;QT86-wz@1Q#FB1bFsb*g@5$u^fl&Ssh9w+S(p;Yu$Qgmmn1DZED ztKzXU4ToU;F+H}JBVE}t3D&;o%|ZQ#it<31`4Tf~l|P}?w8l!Gx$2A4eE8fcP$ zYhvs;oubSzgoSezgvEvaYRbKZnR2M)-Po6@7g`qfj-weS*-ez+z@oIY8DC}pwJrja_uxbWo!2?hTzC{>tMxOq`rg@*qoM-9xQk4^XxN=&jRbiE5S%H>or}-~P0& zI#aq|z}6&t>Ei8E`dTK2X8}!N4{%k>uQK6~xBVW-X-&GjU^kk|#($%#Wk+l>^FiSH zLBmiwyH0yWFa+HC!!zQYPAcc+9;&#mD&F^)b`Sg&{ERfH{uP(WE{~Bjn%^7YeTck) zTjcM$vK@wuu?Yq8aHaNh{yrA(xV`a^RF7Ud>9hd?fdKpr=Ej_!#*MJ#0-ec^L1w}3 zs&Pny1usqcO=xDym4CT{mxM}|o=|KfJ~*S&U}~)x4=;2HxMa4uV!A?ETT#Burt!FN zNU9|~tO>XrF|`};YUA{-R7bjQ5ISnbW^i)QDzXLPS})hc#hHAh(jK2N9{E5`E2 z#C0V#Jcqtp8@Pk;=0<&n>gK_ewnX1!Jntd6{Z)E#v^f&zUi*?t1i{3$1@yjk4eK(P z|L7AR^B(j8DIdnssIHEeDMSfAU3&M(C*?wpa9siC9lB%m$xJmDobabl2_%OeN0F~C zbuJrLN*~8AC@DkbHT|WO%2Ql3x2!@;Sxhxjx-ovqmKJ-=nN=pW;Eg{weK{}|6i-r2 zHRuPI{Kiwkj)$;D8|Pl+-?^@#1G5a1D3yq`KKhE0mQdmr&cH8KAmeC)>L9?+B-oRc zftsbNfhi8dmI*A?$)vB_^@nRKrD|B5=yq^UJiNfO2@53^+00cu{t-pmD4^ii?+F{q z5&1aP$-?Qvc$p2o0$pkS5LG`mO^*07<42Ok&q+ymaSeHh(z+kr1jRjFCz?@8evGX) zfXrfbp_W5jxSIB$O|7gGr;<|l;FXRJKF4oY6dwNu@U z7(IO+zie@|TgKl0rvm30$ktr#aQ~~nH64lw&CARC_3PKbz(8eXWo&Hh>8YbFn}9%8 zzxP#)9G`}k9yTTkHUZZD5#VEb>}S8iBceCiVW)fgefHJ8TliF%rAJnpwTJ+=f1PSO zMWT@W?Y&Kdg5dA!h*Kv3}wShOOG*2 z_Ddf$D!!Uk!~F&(eC~xVI$(6pbHz#)Aqqx2ziIc`3<+o|L;!q*<$c1;A;Il7I4V56 znwpxyD6T)oNf3yGIO2HQMMp%ZAr3x%0#UhA3A-d$Ltvope$!ALXZ;|EJVr=^Mq%;q zJBPPz)$I&7_scr=`eFe6*YbY6#JVFxmzI`bt?Rs5URqiT2M>=3*Sh>b53}CZ-|CZ+ zlKREbMv+Jh@+s-r;Ra9Ug*|)6vWAO11(u5a4pPz4TRk0>4E;u3Q}&_7%FglT{QCN$ zPhB~w{8}QmIuhqovYM{?8erdU-&V$C8poVEliRz!HlFyn0GDZuEo>*Q2WY#wT0?=O|8q+FajNbjg`E-ou&|Jtn10P4mqtRmzU?K;%v?K8Se|15&>_Kvu1ytVhg+n zv4T3nvYtfD80KZ^ja)6aheQXfcDB(rT19nrwRBBQP%_Sp%cl*4zMku&Yz{l>CX7U+ z+ZKt?CPzy%-e%r0{$H3n+5=-n_O0o4lZ}oYM(dHt!2zz>kD9s+{H1BUN`)RBTH~uX z&g@tnn#c%tBU_^l;lIw_Y!~3+5eo8`dX3?^@sxnP+poUk6so#B4jJ;p7M(Y1^jFbB zVd8`T{#iQb#|eEtJv*zatn_H3K*y`!*xVe9q7FQ7v6$6tus0l}la-T^si49lj?$)& z4+X}(!QHG2GLHKpLW887#M$~yMust#Mmz3fqT@c8HQ`(b-7_+LztV&?ViE$A{T|Bx z#*7OShn3#z*}F@{D-Io7*a4~jm~{>NXEm2qE8gmSGPL$%471#WS2eACm{gen<9V zZMUD(z0RA*j#dgqJRF=>EMOJ;-u5;wDXG4u=D)2iP z&temM)tNyKCiT_oH2G}8m(89Tsqt{Wf4r9t0!7o?WmSG}QzuSR>j`7RP`6W8SJ!X9 zu~!WKEpK--{FdTH*Za{5F+0)P*ORK=VtR>jw!G4?Cq{|Sx*-Uo*_JvvgI79!b{fp#GJvEclf@$Ri{gN|#-3aOt! zn%C{zY?Nu7A0jH6wf2;>4AXCO0cia6?hKvfZl)WZhVn>ik%5+&SoK!V{`7q?)Ve7= z`YI8ahO1RC-nLe2GPp#f<*vg?wdT~YzeDgbp!!R-ZMzwVc*r?n>mny2^wZst8p;S% z{I_P#reduYmBM%dgLsIuO)7G&3yA$9QS|~Hv8wVn-j1GEH__N-Aj*PLx6I+Op!?`* zsZQ-!4l8zIZ)oD!1W-|VjF%`nSjWoIa-Q`koZ0kJHw-^{uBU9lFO;F1M<%x3>LwHL zS8CVgaDd?ZeZ@jLDOEZ~I`W~q%DAeyy1I=Gu3J<)mv23FEWg+;JJ6;O-c(>M<%vgAJ?gt=Po_eLu<_EO9hbX)u6|9AOEGZ`L9_By)xb z2gAaw()iK*C!QYfF4oozX~%V%s;ehPN74Bt+VMq;Cw~UQ0#MY-(S4oo{UM4=bvCou z>B(5^7pKF83LC$bON2C>`dD0v(j_%+tW0zA!d<{EH~Ka|^F$`$!;_fl^GN}^Z3;2; zi8FTsDZH+t>hK508|ySjI%=-X8M?)e;VBdqOII;xCLby@gVAMQR`ykb^-QL-N+`ze zSQHl`&}cZ$Izi%ac=$FQTblrz@ z_4~SvDfDU1(Pk{#3VHDDowYfTMXV-V>3UR%voN6Q+P<9#H!&|S|Ax(eD@;XHrf-EQ z&q$cB#5f?$r`9r1(?grhE?j1uX?Y``$+e07FqDdgWo&sT5@Hq%8lGZ69m^?e)DYuG zP5xUT!co4IU?kR79NV_;mPMmNylLPygA0kk0ZpGw0huMuKJ63gET1aXSp}=HRcuLO zokc+tacMM|{WOWk#0%j@o749cF49VA&6=60yqK+KuTT!FbcW3UoM1=UGBvl~8#%1V z;75|tb6Gr6&y0L^O1x?1zUaXF?HWhk*=R*1&Av9xqpRFs@b%V2YJ zbLAJGv^DjfD~0GWp1f!NFJHdUhKiu6kc^*^xT{VNxK#A*ycjK z8_+)$JD18~U=X)CuA(C%250KbFtA5#4xML}^E-CDfoyGV1@WDz=|U=1_8_$BN0kcM zNc#)=G8eSmxX3*7)QRW_;^!7XmBB z0XlaGe!MogmzWnCLW-8JJjK*=1Jm@ar5P&2hur*@Tdy@rB*5Q^Z zC4b^uU5XMYxQECtvzOX%{&9_suRQ-c` zO5b)Ut{R)9IAaM)%uzN0`z$j&7N1yVcKjuUaD&)bM)Zysj0OIfv+DH+_7fT(R_JjI z=$NRVwW^1xPcgffi3judKJe`KZe8&=FgIh4f@#b7jO3O`-rGQA+OZ3H6z}hnD{eaT zYcj=;$!YF70E!ZR%jo4$nJ~rP+CSyfQLl6S&&xC)T;VrrRCIJE=Kf+jKfqk4-Q_bL zD07wPO#U;WaKX}}O$1HFS1 zCWlptoaP)Vz7F54X$j@#)IM#I)%oPWU>;iZuy*4h4Lf_+<+o(g4t{CO{L7qj6G_12 zW$&ni=|9~ru|lme^XIBRpEt~cAz>5MZAR}go$w_2+zG9M^sJz5xO{GFG3`-Y6>Zi) zn*mmqs&@*5EW90u8AbSa)Qo@kE;*a4upa{hnRQ#zvau*^f3JP9ZW{Kg|1pvf7UYAM zbXoZs4+jftsqf9V2}$*)nkzcdnv~pmG|6mJI^^~BGV)xXxk8*oF*i$@t1=s&J~d_4 z9`*J(zb`-Vk_Oq)i>AX(J4rpE(H@M{9ANAFtJYiCsM7NhyfWt1r=o{R%Xl(%7wF<_ zDe*r@8wue}(l@WLB}kUoDPmZds!u2o;xwv-eC)Xo1XJX%F7a7n*`8F!<`;TPw&u? zqczYsma%hv+l5W!gU|Rpv#moGb+;D0f+=pcohj48NO7Q8J36h&cs*UgDl#jH>;|Ma z@GFH_7;THTqJAB8&W2Mj@{w5lDLYl+wW_h=w`NZznYQ6!Qe0hKnv~n#q^F4%u8u@7 zKWF&9g12vJiVrWbG73W6rSB;*o8P<52?Lx}t%vMs$_aGlbz7ZTdUmypyuNu#%Ufyr z$;sjVR8lAbqrXG(IzAe)@lGNMOSB2A*3Ye08eI0Me(|yw>D9l;TXZXgHU~Fg58AAQ zIEdMy8Z%7X>$9Jea;Z{X-I&idc{o0x0c5mPVzJ*}!Grn1+k&jA<=*q<1TgXiWP^kk zaZzsQv9!>b`l8k;w^}$(spv7j2VI~Lns&#>NS_y0JgSN3yQ9~9AsuE;(90U$DP%^5 z$?+CF4ZzlEoC=-mXcq7h9nC_sQf0#J-tk+)cvTFX_keLH;O8 z9Gg~@asq1>ikf%mnLcKd%CpXop;L+?Y!Q}!R&}9VXC+}4xxrdE;O`qDj(0I5=ZR0J znUAdd`U!AmnO!ze+dh%G9%Wf9GudT7Q?aAeE@A4!p8+`@lCGiJ7?C=m7Boph_j-#WtzLxaHpydVy z#G1;$$;rvi4(hk@o`De%hy?{ZZv0uFSJkzZ?w0yBW(UM(=cbNRWj$2Cn{mv4I)B2o zm?;U`6y5!=44>^4dPOKKL+Sqho|>9^W_A`80WM6e%aj!r6}7vo3%1u(ik$zK2KeT0 zmXA zUbS2R>{qr1>}3gqzyG`N!FmV!?_w?Cf7m}TFc0BBHUvywhw?vi2W$bQfl1^1_bCAw z(D&cPf3W=P)enXLpQ5CcYF$)vYU#y{0ub>u4gcqD`zPMAb?qV^8mnR#94bTQpZ|Fq dl4N>!F1TBW9kL37>b({zEiNxsAz~Q#{{S-$C;tEd literal 0 HcmV?d00001 diff --git a/windows/client-management/introduction-of-page-file.md b/windows/client-management/introduction-of-page-file.md new file mode 100644 index 0000000000..4f631455ee --- /dev/null +++ b/windows/client-management/introduction-of-page-file.md @@ -0,0 +1,74 @@ +--- +title: Introduction of page file +description: Learn about the page files in Windows. +ms.prod: w10 +ms.sitesec: library +ms.topic: troubleshooting +author: Deland-Han +ms.localizationpriority: medium +ms.author: delhan +ms.date: 8/22/2019 +ms.reviewer: +manager: dcscontentpm +--- + +# Introduction of page file + +A page file (also known as a "paging file") is an optional, hidden system file on a hard disk. + +## Functionality + +Page files have the following functionalities: + +### Physical extension of RAM + +Page files enable the system to remove infrequently accessed modified pages from physical memory to let the system use physical memory more efficiently for more frequently accessed pages. + +### Application requirements + +Some products or services require a page file for various reasons. For specific information, check the product documentation. + +For example, the following Windows servers requires page files: + +- Windows Server domain controllers + +- DFS Replication (DFS-R) servers + +- Certificate servers + +- ADAM/LDS servers + +This is because the algorithm of the database cache for Extensible Storage Engine (ESENT, or ESE in Microsoft Exchange Server) depends on the "\Memory\Transition Pages RePurposed/sec" performance monitor counter. A page file is required to make sure that the database cache can release memory if other services or applications request memory. + +For Windows Server 2012 Hyper-V and Windows Server 2012 R2 Hyper-V, the page file of the management OS (commonly called the host OS) should be left at the default of setting of "System Managed" . + +### Support for system crash dumps + +Page files can be used to "back" (or support) system crash dumps and extend how much system-committed memory (also known as “virtual memory”) a system can back. + +For more information about system crash dumps, see [system crash dump options](system-failure-recovery-options.md#under-write-debugging-information). + +## Page files in Windows with large physical memory + +When large physical memory is installed, a page file might not be required to support the system commit charge during peak usage. For example, 64-bit versions of Windows and Windows Server support more physical memory (RAM) than 32-bit versions support. The available physical memory alone might be large enough. + +However, the reason to configure the page file size has not changed. It has always been about supporting a system crash dump, if it is necessary, or extending the system commit limit, if it is necessary. For example, when a lot of physical memory is installed, a page file might not be required to back the system commit charge during peak usage. The available physical memory alone might be large enough to do this. However, a page file or a dedicated dump file might still be required to back a system crash dump. + +## System committed memory + +Page files extend how much "Committed memory" (also known as "Virtual Memory") is used to store modified data. + +The system commit memory limit is the sum of physical memory and all page files combined. It represents the maximum system-committed memory (also known as the "system commit charge") that the system can support. + +![Task manager](images/task-manager.png) + +The system commit charge is the total committed or "promised" memory of all committed virtual memory in the system. If the system commit charge reaches the system commit limit, the system and processes might not get committed memory. This condition can cause freezing, crashing, and other malfunctions. Therefore, make sure that you set the system commit limit high enough to support the system commit charge during peak usage. + +![Out of memory](images/out-of-memory.png) + +![Task manager](images/task-manager-commit.png) + +The system committed charge and system committed limit can be measured on the Performance tab in Task Manager or by using the "\Memory\Committed Bytes" and "\Memory\Commit Limit" performance counters. The \Memory\% Committed Bytes In Use counter is a ratio of \Memory\Committed Bytes to \Memory\Commit Limit values. + +>[!Note] +>System-managed page files automatically grow up to three times physical memory or 4 GB (whichever is larger) when the system commit charge reaches 90 percent of the system commit limit. This assumes that enough free disk space is available to accommodate the growth. diff --git a/windows/client-management/system-failure-recovery-options.md b/windows/client-management/system-failure-recovery-options.md new file mode 100644 index 0000000000..d2164150e4 --- /dev/null +++ b/windows/client-management/system-failure-recovery-options.md @@ -0,0 +1,209 @@ +--- +title: Configure system failure and recovery options in Windows +description: Learn about the system failure and recovery options in Windows. +ms.prod: w10 +ms.sitesec: library +ms.topic: troubleshooting +author: Deland-Han +ms.localizationpriority: medium +ms.author: delhan +ms.date: 8/22/2019 +ms.reviewer: +manager: dcscontentpm +--- + +# Configure system failure and recovery options in Windows + +This article introduces on how to configure the actions that Windows takes when a system error (also referred to as a bug check, system crash, fatal system error, or stop error) occurs. You can configure the following actions: + +- Write an event to the System log. + +- Alert administrators (if you have set up administrative alerts). + +- Put system memory in a file that advanced users can use for debugging. + +- Automatically restart the computer. + +>[!Note] +> You must be logged on as an administrator or a member of the Administrators group to complete this procedure. If your computer is connected to a network, network policy settings may prevent you from completing this procedure. + +## Configuring System Failure and Recovery Options + +> [!IMPORTANT] +> Follow the steps in this section carefully. Serious problems might occur if you modify the registry incorrectly. Before you modify it, [back up the registry for restoration](https://support.microsoft.com/help/322756) in case problems occur. + +The options are available in the Startup and Recovery. You can also use the following methods: + +- Modify the values under the following registry key + + **HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\CrashControl** + +- To modify the option on your local computer, use the command-line utility (Wmic.exe) to access Windows Management Instrumentation (WMI). + +Follow these steps to view the options in Startup and Recovery. The registry value and wmic commands are also listed for each option: + +1. In Control Panel, click System and Security -> System, or click System directly if control panel is viewed by icons. + +2. Click Advanced system settings, click the Advanced tab, under Startup and Recovery, and then click Settings. + +### Under "System failure" + +Click to select the check boxes for the actions that you want Windows to perform when a system error occurs. + +#### Write an event to the System log + +The option specifies that event information is recorded in the System log. By default, this option is turned on. + +To turn off this option, run the following command or modify the registry value: + +- ```cmd + wmic recoveros set WriteToSystemLog = False + ``` + +- Set the **LogEvent** DWORD value to **0**. + +#### Send an administrative alert + +The option specifies that administrators are notified of the system error if you configured administrative alerts. By default, this option is turned on. + +To turn off this option, run the following command or modify the registry value: + +- ```cmd + wmic recoveros set SendAdminAlert = False + ``` + +- Set the **SendAlert** DWORD value to **0**. + +#### Automatically restart + +The option specifies that Windows automatically restarts your computer. By default, this option is enabled. + +To turn off this option, run the following command or modify the registry value: + +- ```cmd + wmic recoveros set AutoReboot = False + ``` + +- Set the **AutoReboot** DWORD value to **0**. + +### Under "Write debugging information" + +Select the type of information that you want Windows to record in a memory dump file if the computer stops unexpectedly: + +#### (none) + +The option does not record any information in a memory dump file. + +To specify that you do not want Windows to record information in a memory dump file, run the following command or modify the registry value: + +- ```cmd + wmic recoveros set DebugInfoType = 0 + ``` +- Set the **CrashDumpEnabled** DWORD value to **0**. + +#### Small Memory Dump + +The option records the smallest amount of information to help identify the problem. This option requires a paging file of at least 2 megabytes (MB) on the boot volume of your computer and specifies that Windows will create a new file each time the system stops unexpectedly. A history of these files is stored in the folder that is listed under Small Dump Directory (%SystemRoot%\Minidump). In Windows XP and Windows Server 2003, the small memory dump file is used with the Windows Error Reporting feature. + +To specify that you want to use a small memory dump file, run the following command or modify the registry value: + +- ```cmd + wmic recoveros set DebugInfoType = 3 + ``` + +- Set the **CrashDumpEnabled** DWORD value to **3**. + +To specify that you want to use a folder as your Small Dump Directory, run the following command or modify the registry value: + +- ```cmd + wmic recoveros set MiniDumpDirectory = + ``` + +- Set the **MinidumpDir** Expandable String Value to \. + +#### Kernel Memory Dump + +The option records only kernel memory. This option stores more information than a small memory dump file, but it takes less time to complete than a complete memory dump file. The file is stored in %SystemRoot%\Memory.dmp by default, and any previous kernel or complete memory dump files are overwritten if the Overwrite any existing file check box is selected. If you set this option, you must have a sufficiently large paging file on the boot volume. The required size depends on the amount of RAM in your computer (although the maximum amount of space that must be available for a kernel memory dump on a 32-bit system is 2 GB plus 16 MB; on a 64-bit system, the maximum amount of space that must be available for a kernel memory dump is the size of the RAM plus 128 MB). The following table contains guidelines for the size of the paging file: + +|RAM size |Paging file should be no smaller than| +|-------|-----------------| +|256 MB–1,373 MB |1.5 times the RAM size| +|1,374 MB or greater |32-bit system: 2 GB plus 16 MB
      64-bit system: size of the RAM plus 128 MB| + +To specify that you want to use a kernel memory dump file, run the following command or modify the registry value: + +- ```cmd + wmic recoveros set DebugInfoType = 2 + ``` + +- Set the **CrashDumpEnabled** DWORD value to **2**. + +To specify that you want to use a file as your memory dump file, run the following command or modify the registry value: + +- ```cmd + wmic recoveros set DebugFilePath = + ``` + +- Set the **DumpFile** Expandable String Value to \. + +To specify that you do not want to overwrite any previous kernel or complete memory dump files, run the following command or modify the registry value: + +- ```cmd + wmic recoveros set OverwriteExistingDebugFile = 0 + ``` + +- Set the **Overwrite** DWORD value to **0**. + +#### Complete Memory Dump + +The option records the contents of system memory when the computer stops unexpectedly. This option is not available on computers with 2 or more GB of RAM. If you select this option, you must have a paging file on the boot volume that is sufficient to hold all the physical RAM plus 1 MB. The file is stored as specified in %SystemRoot%\Memory.dmp by default. + +The extra MB is required for a complete memory dump file because Windows writes a header in addition to dumping the memory contents. The header contains a crash dump signature and specifies the values of some kernel variables. The header information does not require a full MB of space, but Windows sizes your paging file in increments of MBs. + +To specify that you want to use a complete memory dump file, run the following command or modify the registry value: + +- ```cmd + wmic recoveros set DebugInfoType = 1 + ``` + +- Set the **CrashDumpEnabled** DWORD value to **1**. + +To specify that you want to use a file as your memory dump file, run the following command or modify the registry value: + +- ```cmd + wmic recoveros set DebugFilePath = + ``` + +- Set the DumpFile Expandable String Value to \. + +To specify that you do not want to overwrite any previous kernel or complete memory dump files, run the following command or modify the registry value: + +- ```cmd + wmic recoveros set OverwriteExistingDebugFile = 0 + ``` + +- Set the **Overwrite** DWORD value to **0**. + +>[!Note] +>If you contact Microsoft Product Support Services about a stop error, you might be asked for the memory dump file that is generated by the Write Debugging Information option. + +To view system failure and recovery settings for your local computer, type `wmic recoveros` at a command prompt, and then press Enter. To view system failure and recovery settings for a remote computer on your local area network, type `wmic /node: recoveros` at a command prompt, and then press Enter. + +>[!Note] +>To successfully use these Wmic.exe command line examples, you must be logged on by using a user account that has administrative rights on the computer. If you are not logged on by using a user account that has administrative rights on the computer, use the `/user:user_name` and `/password:password` switches. + +### Tips + +- To take advantage of the dump file feature, your paging file must be on the boot volume. If you have moved the paging file to another volume, you must move it back to the boot volume before you use this feature. + +- If you set the Kernel Memory Dump or the +Complete Memory Dump option, and you select the +Overwrite any existing file check box, Windows always writes to the same file name. To save individual dump files, click to clear the +Overwrite any existing file check box, and then change the file name after each stop error. + +- You can save some memory if you click to clear the +Write an event to the system log and Send an administrative alert check boxes. The memory that you save depends on the computer, but these features typically require about 60 to 70 KB. + +## Reference + +[Varieties of Kernel-Mode Dump Files](https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/varieties-of-kernel-mode-dump-files) diff --git a/windows/client-management/troubleshoot-windows-startup.md b/windows/client-management/troubleshoot-windows-startup.md index 1dcdb40a64..f7b5450b07 100644 --- a/windows/client-management/troubleshoot-windows-startup.md +++ b/windows/client-management/troubleshoot-windows-startup.md @@ -16,6 +16,38 @@ manager: dansimp In these topics, you will learn how to troubleshoot common problems related to Windows start-up. -- [Advanced troubleshooting for Windows boot problems](advanced-troubleshooting-boot-problems.md) -- [Advanced troubleshooting for Stop error or blue screen error](troubleshoot-stop-errors.md) -- [Advanced troubleshooting for Windows-based computer freeze issues](troubleshoot-windows-freeze.md) +## How it works + +When Microsoft Windows encounters a condition that compromises safe system operation, the system halts. This condition is referred as Windows start-up problems. Furthermore, it is categorized in 3 buckets. + +- Bug check: It is also commonly referred to as a system crash, a kernel error, or a stop error. + +- No Boot: Here the system may not produce a bug check but is unable to boot into Windows. + +- Freeze: Also known as System Hang where + +## Best Practices + +To understand the underlaying cause of that lead to Windows start-up issues, it is important that the system is configured properly. Here are some best practices: + +### Page file settings + +- [Introduction of page file](introduction-of-page-file.md) + +- [How to determine the appropriate page file size for 64-bit versions of Windows](determine-appropriate-page-file-size.md) + +### Memory Dump settings + +- [Configure system failure and recovery options in Windows](system-failure-recovery-options.md) + +- [Generate a kernel or complete crash dump](generate-kernel-or-complete-crash-dump.md) + +## Troubleshooting + +These articles will walk you through the resources you need to troubleshoot Windows start-up issue. + +- [Advanced troubleshooting for Windows boot problems](https://docs.microsoft.com/en-us/windows/client-management/advanced-troubleshooting-boot-problems) + +- [Advanced troubleshooting for Stop error or blue screen error](https://docs.microsoft.com/en-us/windows/client-management/troubleshoot-stop-errors) + +- [Advanced troubleshooting for Windows-based computer freeze issues](https://docs.microsoft.com/en-us/windows/client-management/troubleshoot-windows-freeze) From a302fc19fe303d453f321bd9858819cfdd66f9f3 Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Wed, 28 Aug 2019 15:30:27 +0500 Subject: [PATCH 046/285] Update windows/security/threat-protection/auditing/event-5155.md Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- windows/security/threat-protection/auditing/event-5155.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/auditing/event-5155.md b/windows/security/threat-protection/auditing/event-5155.md index de9e17504d..ac2e1deec7 100644 --- a/windows/security/threat-protection/auditing/event-5155.md +++ b/windows/security/threat-protection/auditing/event-5155.md @@ -28,7 +28,7 @@ You can add your own filters using the WFP APIs to block listen to reproduce thi ***Event Description:*** -This event generates every time [Windows Filtering Platform](https://docs.microsoft.com/windows/win32/fwp/windows-filtering-platform-start-page) blocks an application or service from listening on a port for incoming connections. +This event generates every time the [Windows Filtering Platform](https://docs.microsoft.com/windows/win32/fwp/windows-filtering-platform-start-page) blocks an application or service from listening on a port for incoming connections.
      From 536bdb57c57dcc8e454b42f496c74e4387750f6a Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Wed, 28 Aug 2019 15:30:39 +0500 Subject: [PATCH 047/285] Update windows/security/threat-protection/auditing/event-5155.md Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- windows/security/threat-protection/auditing/event-5155.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/auditing/event-5155.md b/windows/security/threat-protection/auditing/event-5155.md index ac2e1deec7..d64947b8c8 100644 --- a/windows/security/threat-protection/auditing/event-5155.md +++ b/windows/security/threat-protection/auditing/event-5155.md @@ -86,7 +86,7 @@ This event generates every time the [Windows Filtering Platform](https://docs.mi -- **Application Name** \[Type = UnicodeString\]**:** full path and the name of the executable for the process. +- **Application Name** \[Type = UnicodeString\]**:** Full path and the name of the executable for the process. Logical disk is displayed in format \\device\\harddiskvolume\#. You can get all local volume numbers by using **diskpart** utility. The command to get volume numbers using diskpart is “**list volume”**: From aa4ff89329b7010aab8557ad071155f3fcb8e7b9 Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Wed, 28 Aug 2019 15:31:05 +0500 Subject: [PATCH 048/285] Update windows/security/threat-protection/auditing/event-5155.md Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- windows/security/threat-protection/auditing/event-5155.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/auditing/event-5155.md b/windows/security/threat-protection/auditing/event-5155.md index d64947b8c8..a0f9323cf9 100644 --- a/windows/security/threat-protection/auditing/event-5155.md +++ b/windows/security/threat-protection/auditing/event-5155.md @@ -76,7 +76,7 @@ This event generates every time the [Windows Filtering Platform](https://docs.mi **Application Information**: -- **Process ID** \[Type = Pointer\]: hexadecimal Process ID of the process which was permitted to bind to the local port. Process ID (PID) is a number used by the operating system to uniquely identify an active process. To see the PID for a specific process you can, for example, use Task Manager (Details tab, PID column): +- **Process ID** \[Type = Pointer\]: Hexadecimal Process ID (PID) of the process which was permitted to bind to the local port. The PID is a number used by the operating system to uniquely identify an active process. To see the PID for a specific process you can, for example, use Task Manager (Details tab, PID column): Task manager illustration From 3b6c2fabda532b60a1b9519a366d3369a86c97ba Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Wed, 28 Aug 2019 15:31:33 +0500 Subject: [PATCH 049/285] Update windows/security/threat-protection/auditing/event-5155.md Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- windows/security/threat-protection/auditing/event-5155.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/auditing/event-5155.md b/windows/security/threat-protection/auditing/event-5155.md index a0f9323cf9..f1ecd05750 100644 --- a/windows/security/threat-protection/auditing/event-5155.md +++ b/windows/security/threat-protection/auditing/event-5155.md @@ -88,7 +88,7 @@ This event generates every time the [Windows Filtering Platform](https://docs.mi - **Application Name** \[Type = UnicodeString\]**:** Full path and the name of the executable for the process. - Logical disk is displayed in format \\device\\harddiskvolume\#. You can get all local volume numbers by using **diskpart** utility. The command to get volume numbers using diskpart is “**list volume”**: + Logical disk is displayed in the format \\device\\harddiskvolume\#. You can get all local volume numbers by using the **diskpart** utility. The command to get volume numbers using diskpart is “**list volume**”: DiskPart illustration From 6a8d130e7781a84046863291ce121f3177cab356 Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Wed, 28 Aug 2019 15:31:40 +0500 Subject: [PATCH 050/285] Update windows/security/threat-protection/auditing/event-5155.md Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- windows/security/threat-protection/auditing/event-5155.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/auditing/event-5155.md b/windows/security/threat-protection/auditing/event-5155.md index f1ecd05750..edfe11c014 100644 --- a/windows/security/threat-protection/auditing/event-5155.md +++ b/windows/security/threat-protection/auditing/event-5155.md @@ -94,7 +94,7 @@ This event generates every time the [Windows Filtering Platform](https://docs.mi **Network Information:** -- **Source Address** \[Type = UnicodeString\]**:** the local IP address of the computer running the application. +- **Source Address** \[Type = UnicodeString\]**:** The local IP address of the computer running the application. - IPv4 Address From 4718bfeb5ab6d0d849007cd3062ac5273876cb73 Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Wed, 28 Aug 2019 15:31:47 +0500 Subject: [PATCH 051/285] Update windows/security/threat-protection/auditing/event-5155.md Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- windows/security/threat-protection/auditing/event-5155.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/auditing/event-5155.md b/windows/security/threat-protection/auditing/event-5155.md index edfe11c014..2556cef8e3 100644 --- a/windows/security/threat-protection/auditing/event-5155.md +++ b/windows/security/threat-protection/auditing/event-5155.md @@ -106,7 +106,7 @@ This event generates every time the [Windows Filtering Platform](https://docs.mi - 127.0.0.1 , ::1 - localhost -- **Source Port** \[Type = UnicodeString\]**:** the port number used by the application. +- **Source Port** \[Type = UnicodeString\]**:** The port number used by the application. - **Protocol** \[Type = UInt32\]: the protocol number being used. From 5fe14b637bd3330cd06a96798b824549f55e3965 Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Wed, 28 Aug 2019 15:31:58 +0500 Subject: [PATCH 052/285] Update windows/security/threat-protection/auditing/event-5155.md Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- windows/security/threat-protection/auditing/event-5155.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/auditing/event-5155.md b/windows/security/threat-protection/auditing/event-5155.md index 2556cef8e3..b0cf801a8d 100644 --- a/windows/security/threat-protection/auditing/event-5155.md +++ b/windows/security/threat-protection/auditing/event-5155.md @@ -132,7 +132,7 @@ This event generates every time the [Windows Filtering Platform](https://docs.mi - **Filter Run-Time ID** \[Type = UInt64\]: unique filter ID which blocks the application from binding to the port. By default, Windows firewall won't prevent a port from binding by an application, and if this application doesn’t match any filters, you will get value 0 in this field. - To find specific Windows Filtering Platform filter by ID you need to execute the following command: **netsh wfp show filters**. As a result of this command, **filters.xml** file will be generated. You need to open this file and find the specific substring with the required filter ID (**<filterId>**)**,** for example: + To find a specific Windows Filtering Platform filter by ID, you need to execute the following command: **netsh wfp show filters**. As a result of this command, a **filters.xml** file will be generated. You need to open this file and find the specific substring with the required filter ID (**<filterId>**), for example: Filters.xml file illustration From 2ec695456a70137f45002de4b39ee7362fa9807e Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Wed, 28 Aug 2019 15:32:09 +0500 Subject: [PATCH 053/285] Update windows/security/threat-protection/auditing/event-5155.md Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- windows/security/threat-protection/auditing/event-5155.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/auditing/event-5155.md b/windows/security/threat-protection/auditing/event-5155.md index b0cf801a8d..5555db94bd 100644 --- a/windows/security/threat-protection/auditing/event-5155.md +++ b/windows/security/threat-protection/auditing/event-5155.md @@ -138,7 +138,7 @@ This event generates every time the [Windows Filtering Platform](https://docs.mi - **Layer Name** \[Type = UnicodeString\]: [Application Layer Enforcement](https://msdn.microsoft.com/library/windows/desktop/aa363971(v=vs.85).aspx) layer name. -- **Layer Run-Time ID** \[Type = UInt64\]: Windows Filtering Platform layer identifier. To find specific Windows Filtering Platform layer ID you need to execute the following command: **netsh wfp show state**. As result of this command **wfpstate.xml** file will be generated. You need to open this file and find specific substring with required layer ID (**<layerId>**)**,** for example: +- **Layer Run-Time ID** \[Type = UInt64\]: Windows Filtering Platform layer identifier. To find a specific Windows Filtering Platform layer ID, you need to execute the following command: **netsh wfp show state**. As result of this command, a **wfpstate.xml** file will be generated. You need to open this file and find the specific substring with the required layer ID (**<layerId>**), for example: Wfpstate xml illustration From 05e46457a066ebbbe61c7cd807fa191bc40825e2 Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Wed, 28 Aug 2019 15:32:19 +0500 Subject: [PATCH 054/285] Update windows/security/threat-protection/auditing/event-5155.md Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- windows/security/threat-protection/auditing/event-5155.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/auditing/event-5155.md b/windows/security/threat-protection/auditing/event-5155.md index 5555db94bd..210c9bf842 100644 --- a/windows/security/threat-protection/auditing/event-5155.md +++ b/windows/security/threat-protection/auditing/event-5155.md @@ -130,7 +130,7 @@ This event generates every time the [Windows Filtering Platform](https://docs.mi **Filter Information:** -- **Filter Run-Time ID** \[Type = UInt64\]: unique filter ID which blocks the application from binding to the port. By default, Windows firewall won't prevent a port from binding by an application, and if this application doesn’t match any filters, you will get value 0 in this field. +- **Filter Run-Time ID** \[Type = UInt64\]: A unique filter ID which blocks the application from binding to the port. By default, Windows firewall won't prevent a port from binding to an application, and if this application doesn’t match any filters, you will get a 0 value in this field. To find a specific Windows Filtering Platform filter by ID, you need to execute the following command: **netsh wfp show filters**. As a result of this command, a **filters.xml** file will be generated. You need to open this file and find the specific substring with the required filter ID (**<filterId>**), for example: From 107f34dc380cde2f449a67e2bea9ad56acc64861 Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Wed, 28 Aug 2019 15:32:42 +0500 Subject: [PATCH 055/285] Update windows/security/threat-protection/auditing/event-5155.md Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- windows/security/threat-protection/auditing/event-5155.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/auditing/event-5155.md b/windows/security/threat-protection/auditing/event-5155.md index 210c9bf842..4b62fee658 100644 --- a/windows/security/threat-protection/auditing/event-5155.md +++ b/windows/security/threat-protection/auditing/event-5155.md @@ -33,7 +33,7 @@ This event generates every time the [Windows Filtering Platform](https://docs.mi
      ***Event XML:*** -``` +```xml From 27117649bb918b4995980a0398723907ae9702a9 Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Wed, 28 Aug 2019 15:32:56 +0500 Subject: [PATCH 056/285] Update windows/security/threat-protection/auditing/event-5155.md Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- windows/security/threat-protection/auditing/event-5155.md | 1 - 1 file changed, 1 deletion(-) diff --git a/windows/security/threat-protection/auditing/event-5155.md b/windows/security/threat-protection/auditing/event-5155.md index 4b62fee658..9964b6f390 100644 --- a/windows/security/threat-protection/auditing/event-5155.md +++ b/windows/security/threat-protection/auditing/event-5155.md @@ -63,7 +63,6 @@ This event generates every time the [Windows Filtering Platform](https://docs.mi 40 - ``` ***Required Server Roles:*** None. From 302d4d221462d1cf4b78a5c1142fcc4ae7f50cfd Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Wed, 28 Aug 2019 15:38:05 +0500 Subject: [PATCH 057/285] Update kiosk-mdm-bridge.md --- windows/configuration/kiosk-mdm-bridge.md | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/windows/configuration/kiosk-mdm-bridge.md b/windows/configuration/kiosk-mdm-bridge.md index b08ebebd2c..51eeccc08b 100644 --- a/windows/configuration/kiosk-mdm-bridge.md +++ b/windows/configuration/kiosk-mdm-bridge.md @@ -35,7 +35,8 @@ Here’s an example to set AssignedAccess configuration: $nameSpaceName="root\cimv2\mdm\dmmap" $className="MDM_AssignedAccess" $obj = Get-CimInstance -Namespace $namespaceName -ClassName $className -$obj.Configuration = @" +Add-Type -AssemblyName System.Web +$obj.Configuration = [System.Web.HttpUtility]::HtmlEncode(@" @@ -84,7 +85,7 @@ $obj.Configuration = @" -"@ +"@) Set-CimInstance -CimInstance $obj ``` From 7a2a5eeff620fc4182d49216028d688757f7b9b4 Mon Sep 17 00:00:00 2001 From: illfated Date: Thu, 29 Aug 2019 00:13:45 +0200 Subject: [PATCH 058/285] Windows Update resources: add MD code block Description: The list of manual regsvr32.exe commands becomes translated in other languages, to the extent that extra words appear among the commands. This is an attempt to mitigate this behavior in the machine translation, by adding a MarkDown code block around the list of commands. Proposed changes: - Add MD code block around the long list of regsvr32.exe commands - Remove blank space characters at the end of each line (cosmetic) issue ticket reference or closure: Ref. #4800 (Spanish "translation" of commands) Ref. #3569, #3570, #3571, #3572, #3574, #3575 ( [LOC] Back-Translation "regsvr32.exe [...]" ) --- .../update/windows-update-resources.md | 182 +++++++++--------- 1 file changed, 93 insertions(+), 89 deletions(-) diff --git a/windows/deployment/update/windows-update-resources.md b/windows/deployment/update/windows-update-resources.md index c98b9d29d0..41f09d00f0 100644 --- a/windows/deployment/update/windows-update-resources.md +++ b/windows/deployment/update/windows-update-resources.md @@ -1,14 +1,14 @@ --- -title: Windows Update - Additional resources +title: Windows Update - Additional resources description: Additional resources for Windows Update ms.prod: w10 -ms.mktglfcycl: +ms.mktglfcycl: ms.sitesec: library audience: itpro author: greg-lindsay ms.localizationpriority: medium ms.audience: itpro author: greg-lindsay ms.date: 09/18/2018 -ms.reviewer: +ms.reviewer: manager: laurawi ms.topic: article --- @@ -19,106 +19,110 @@ ms.topic: article The following resources provide additional information about using Windows Update. -## WSUS Troubleshooting - -[Troubleshooting issues with WSUS client agents](https://support.microsoft.com/help/10132/) - -[How to troubleshoot WSUS](https://support.microsoft.com/help/4025764/) - -[Error 80244007 when WSUS client scans for updates](https://support.microsoft.com/help/4096317/) - -[Updates may not be installed with Fast Startup in Windows 10](https://support.microsoft.com/help/4011287/) - - -## How do I reset Windows Update components? - -[This script](https://gallery.technet.microsoft.com/scriptcenter/Reset-WindowsUpdateps1-e0c5eb78) will completely reset the Windows Update client settings. It has been tested on Windows 7, 8, 10, and Windows Server 2012 R2. It will configure the services and registry keys related to Windows Update for default settings. It will also clean up files related to Windows Update, in addition to BITS related data. +## WSUS Troubleshooting - -[This script](https://gallery.technet.microsoft.com/scriptcenter/Reset-Windows-Update-Agent-d824badc) allow reset the Windows Update Agent resolving issues with Windows Update. - - -## Reset Windows Update components manually -1. Open a Windows command prompt. To open a command prompt, click **Start > Run**. Copy and paste (or type) the following command and then press ENTER: +[Troubleshooting issues with WSUS client agents](https://support.microsoft.com/help/10132/) + +[How to troubleshoot WSUS](https://support.microsoft.com/help/4025764/) + +[Error 80244007 when WSUS client scans for updates](https://support.microsoft.com/help/4096317/) + +[Updates may not be installed with Fast Startup in Windows 10](https://support.microsoft.com/help/4011287/) + + +## How do I reset Windows Update components? + +[This script](https://gallery.technet.microsoft.com/scriptcenter/Reset-WindowsUpdateps1-e0c5eb78) will completely reset the Windows Update client settings. It has been tested on Windows 7, 8, 10, and Windows Server 2012 R2. It will configure the services and registry keys related to Windows Update for default settings. It will also clean up files related to Windows Update, in addition to BITS related data. + + +[This script](https://gallery.technet.microsoft.com/scriptcenter/Reset-Windows-Update-Agent-d824badc) allow reset the Windows Update Agent resolving issues with Windows Update. + + +## Reset Windows Update components manually +1. Open a Windows command prompt. To open a command prompt, click **Start > Run**. Copy and paste (or type) the following command and then press ENTER: ``` cmd - ``` -2. Stop the BITS service and the Windows Update service. To do this, type the following commands at a command prompt. Press ENTER after you type each command. ``` - net stop bits - net stop wuauserv +2. Stop the BITS service and the Windows Update service. To do this, type the following commands at a command prompt. Press ENTER after you type each command. ``` -3. Delete the qmgr\*.dat files. To do this, type the following command at a command prompt, and then press ENTER: + net stop bits + net stop wuauserv ``` - Del "%ALLUSERSPROFILE%\Application Data\Microsoft\Network\Downloader\qmgr*.dat" +3. Delete the qmgr\*.dat files. To do this, type the following command at a command prompt, and then press ENTER: ``` -4. If this is your first attempt at resolving your Windows Update issues by using the steps in this article, go to step 5 without carrying out the steps in step 4. The steps in step 4 should only be performed at this point in the troubleshooting if you cannot resolve your Windows Update issues after following all steps but step 4. The steps in step 4 are also performed by the "Aggressive" mode of the Fix it Solution above. - 1. Rename the following folders to *.BAK: - - %systemroot%\SoftwareDistribution\DataStore - - %systemroot%\SoftwareDistribution\Download - - %systemroot%\system32\catroot2 - - To do this, type the following commands at a command prompt. Press ENTER after you type each command. - - Ren %systemroot%\SoftwareDistribution\DataStore *.bak - - Ren %systemroot%\SoftwareDistribution\Download *.bak - - Ren %systemroot%\system32\catroot2 *.bak - 2. Reset the BITS service and the Windows Update service to the default security descriptor. To do this, type the following commands at a command prompt. Press ENTER after you type each command. - - sc.exe sdset bits D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;AU)(A;;CCLCSWRPWPDTLOCRRC;;;PU) - - sc.exe sdset wuauserv D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;AU)(A;;CCLCSWRPWPDTLOCRRC;;;PU) -5. Type the following command at a command prompt, and then press ENTER: + Del "%ALLUSERSPROFILE%\Application Data\Microsoft\Network\Downloader\qmgr*.dat" ``` - cd /d %windir%\system32 +4. If this is your first attempt at resolving your Windows Update issues by using the steps in this article, go to step 5 without carrying out the steps in step 4. The steps in step 4 should only be performed at this point in the troubleshooting if you cannot resolve your Windows Update issues after following all steps but step 4. The steps in step 4 are also performed by the "Aggressive" mode of the Fix it Solution above. + 1. Rename the following folders to *.BAK: + - %systemroot%\SoftwareDistribution\DataStore + - %systemroot%\SoftwareDistribution\Download + - %systemroot%\system32\catroot2 + + To do this, type the following commands at a command prompt. Press ENTER after you type each command. + - Ren %systemroot%\SoftwareDistribution\DataStore *.bak + - Ren %systemroot%\SoftwareDistribution\Download *.bak + - Ren %systemroot%\system32\catroot2 *.bak + 2. Reset the BITS service and the Windows Update service to the default security descriptor. To do this, type the following commands at a command prompt. Press ENTER after you type each command. + - sc.exe sdset bits D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;AU)(A;;CCLCSWRPWPDTLOCRRC;;;PU) + - sc.exe sdset wuauserv D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;AU)(A;;CCLCSWRPWPDTLOCRRC;;;PU) +5. Type the following command at a command prompt, and then press ENTER: ``` -6. Reregister the BITS files and the Windows Update files. To do this, type the following commands at a command prompt. Press ENTER after you type each command. - - regsvr32.exe atl.dll - - regsvr32.exe urlmon.dll - - regsvr32.exe mshtml.dll - - regsvr32.exe shdocvw.dll - - regsvr32.exe browseui.dll - - regsvr32.exe jscript.dll - - regsvr32.exe vbscript.dll - - regsvr32.exe scrrun.dll - - regsvr32.exe msxml.dll - - regsvr32.exe msxml3.dll - - regsvr32.exe msxml6.dll - - regsvr32.exe actxprxy.dll - - regsvr32.exe softpub.dll - - regsvr32.exe wintrust.dll - - regsvr32.exe dssenh.dll - - regsvr32.exe rsaenh.dll - - regsvr32.exe gpkcsp.dll - - regsvr32.exe sccbase.dll - - regsvr32.exe slbcsp.dll - - regsvr32.exe cryptdlg.dll - - regsvr32.exe oleaut32.dll - - regsvr32.exe ole32.dll - - regsvr32.exe shell32.dll - - regsvr32.exe initpki.dll - - regsvr32.exe wuapi.dll - - regsvr32.exe wuaueng.dll - - regsvr32.exe wuaueng1.dll - - regsvr32.exe wucltui.dll - - regsvr32.exe wups.dll - - regsvr32.exe wups2.dll - - regsvr32.exe wuweb.dll - - regsvr32.exe qmgr.dll - - regsvr32.exe qmgrprxy.dll - - regsvr32.exe wucltux.dll - - regsvr32.exe muweb.dll - - regsvr32.exe wuwebv.dll -7. Reset Winsock. To do this, type the following command at a command prompt, and then press ENTER: + cd /d %windir%\system32 ``` - netsh winsock reset +6. Reregister the BITS files and the Windows Update files. To do this, type the following commands at a command prompt. Press ENTER after you type each command. + ``` -8. If you are running Windows XP or Windows Server 2003, you have to set the proxy settings. To do this, type the following command at a command prompt, and then press ENTER: + regsvr32.exe atl.dll + regsvr32.exe urlmon.dll + regsvr32.exe mshtml.dll + regsvr32.exe shdocvw.dll + regsvr32.exe browseui.dll + regsvr32.exe jscript.dll + regsvr32.exe vbscript.dll + regsvr32.exe scrrun.dll + regsvr32.exe msxml.dll + regsvr32.exe msxml3.dll + regsvr32.exe msxml6.dll + regsvr32.exe actxprxy.dll + regsvr32.exe softpub.dll + regsvr32.exe wintrust.dll + regsvr32.exe dssenh.dll + regsvr32.exe rsaenh.dll + regsvr32.exe gpkcsp.dll + regsvr32.exe sccbase.dll + regsvr32.exe slbcsp.dll + regsvr32.exe cryptdlg.dll + regsvr32.exe oleaut32.dll + regsvr32.exe ole32.dll + regsvr32.exe shell32.dll + regsvr32.exe initpki.dll + regsvr32.exe wuapi.dll + regsvr32.exe wuaueng.dll + regsvr32.exe wuaueng1.dll + regsvr32.exe wucltui.dll + regsvr32.exe wups.dll + regsvr32.exe wups2.dll + regsvr32.exe wuweb.dll + regsvr32.exe qmgr.dll + regsvr32.exe qmgrprxy.dll + regsvr32.exe wucltux.dll + regsvr32.exe muweb.dll + regsvr32.exe wuwebv.dll ``` - proxycfg.exe -d + +7. Reset Winsock. To do this, type the following command at a command prompt, and then press ENTER: ``` -9. Restart the BITS service and the Windows Update service. To do this, type the following commands at a command prompt. Press ENTER after you type each command. + netsh winsock reset ``` - net start bits - - net start wuauserv +8. If you are running Windows XP or Windows Server 2003, you have to set the proxy settings. To do this, type the following command at a command prompt, and then press ENTER: + ``` + proxycfg.exe -d + ``` +9. Restart the BITS service and the Windows Update service. To do this, type the following commands at a command prompt. Press ENTER after you type each command. + ``` + net start bits + + net start wuauserv ``` 10. If you are running Windows Vista or Windows Server 2008, clear the BITS queue. To do this, type the following command at a command prompt, and then press ENTER: ``` From 797836ac440925e8ba5f7bd25b54f4d71e4598fb Mon Sep 17 00:00:00 2001 From: illfated Date: Thu, 29 Aug 2019 00:28:11 +0200 Subject: [PATCH 059/285] MetaData update: convert ^M (2x) to NewLine - replaced Ctrl-M character with NewLine in MetaData --- .../update/windows-update-resources.md | 262 +++++++++--------- 1 file changed, 132 insertions(+), 130 deletions(-) diff --git a/windows/deployment/update/windows-update-resources.md b/windows/deployment/update/windows-update-resources.md index 41f09d00f0..ead5fd7aaf 100644 --- a/windows/deployment/update/windows-update-resources.md +++ b/windows/deployment/update/windows-update-resources.md @@ -1,130 +1,132 @@ ---- -title: Windows Update - Additional resources -description: Additional resources for Windows Update -ms.prod: w10 -ms.mktglfcycl: -ms.sitesec: library -audience: itpro author: greg-lindsay -ms.localizationpriority: medium -ms.audience: itpro author: greg-lindsay -ms.date: 09/18/2018 -ms.reviewer: -manager: laurawi -ms.topic: article ---- - -# Windows Update - additional resources - ->Applies to: Windows 10 - -The following resources provide additional information about using Windows Update. - -## WSUS Troubleshooting - -[Troubleshooting issues with WSUS client agents](https://support.microsoft.com/help/10132/) - -[How to troubleshoot WSUS](https://support.microsoft.com/help/4025764/) - -[Error 80244007 when WSUS client scans for updates](https://support.microsoft.com/help/4096317/) - -[Updates may not be installed with Fast Startup in Windows 10](https://support.microsoft.com/help/4011287/) - - -## How do I reset Windows Update components? - -[This script](https://gallery.technet.microsoft.com/scriptcenter/Reset-WindowsUpdateps1-e0c5eb78) will completely reset the Windows Update client settings. It has been tested on Windows 7, 8, 10, and Windows Server 2012 R2. It will configure the services and registry keys related to Windows Update for default settings. It will also clean up files related to Windows Update, in addition to BITS related data. - - -[This script](https://gallery.technet.microsoft.com/scriptcenter/Reset-Windows-Update-Agent-d824badc) allow reset the Windows Update Agent resolving issues with Windows Update. - - -## Reset Windows Update components manually -1. Open a Windows command prompt. To open a command prompt, click **Start > Run**. Copy and paste (or type) the following command and then press ENTER: - ``` - cmd - ``` -2. Stop the BITS service and the Windows Update service. To do this, type the following commands at a command prompt. Press ENTER after you type each command. - ``` - net stop bits - net stop wuauserv - ``` -3. Delete the qmgr\*.dat files. To do this, type the following command at a command prompt, and then press ENTER: - ``` - Del "%ALLUSERSPROFILE%\Application Data\Microsoft\Network\Downloader\qmgr*.dat" - ``` -4. If this is your first attempt at resolving your Windows Update issues by using the steps in this article, go to step 5 without carrying out the steps in step 4. The steps in step 4 should only be performed at this point in the troubleshooting if you cannot resolve your Windows Update issues after following all steps but step 4. The steps in step 4 are also performed by the "Aggressive" mode of the Fix it Solution above. - 1. Rename the following folders to *.BAK: - - %systemroot%\SoftwareDistribution\DataStore - - %systemroot%\SoftwareDistribution\Download - - %systemroot%\system32\catroot2 - - To do this, type the following commands at a command prompt. Press ENTER after you type each command. - - Ren %systemroot%\SoftwareDistribution\DataStore *.bak - - Ren %systemroot%\SoftwareDistribution\Download *.bak - - Ren %systemroot%\system32\catroot2 *.bak - 2. Reset the BITS service and the Windows Update service to the default security descriptor. To do this, type the following commands at a command prompt. Press ENTER after you type each command. - - sc.exe sdset bits D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;AU)(A;;CCLCSWRPWPDTLOCRRC;;;PU) - - sc.exe sdset wuauserv D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;AU)(A;;CCLCSWRPWPDTLOCRRC;;;PU) -5. Type the following command at a command prompt, and then press ENTER: - ``` - cd /d %windir%\system32 - ``` -6. Reregister the BITS files and the Windows Update files. To do this, type the following commands at a command prompt. Press ENTER after you type each command. - - ``` - regsvr32.exe atl.dll - regsvr32.exe urlmon.dll - regsvr32.exe mshtml.dll - regsvr32.exe shdocvw.dll - regsvr32.exe browseui.dll - regsvr32.exe jscript.dll - regsvr32.exe vbscript.dll - regsvr32.exe scrrun.dll - regsvr32.exe msxml.dll - regsvr32.exe msxml3.dll - regsvr32.exe msxml6.dll - regsvr32.exe actxprxy.dll - regsvr32.exe softpub.dll - regsvr32.exe wintrust.dll - regsvr32.exe dssenh.dll - regsvr32.exe rsaenh.dll - regsvr32.exe gpkcsp.dll - regsvr32.exe sccbase.dll - regsvr32.exe slbcsp.dll - regsvr32.exe cryptdlg.dll - regsvr32.exe oleaut32.dll - regsvr32.exe ole32.dll - regsvr32.exe shell32.dll - regsvr32.exe initpki.dll - regsvr32.exe wuapi.dll - regsvr32.exe wuaueng.dll - regsvr32.exe wuaueng1.dll - regsvr32.exe wucltui.dll - regsvr32.exe wups.dll - regsvr32.exe wups2.dll - regsvr32.exe wuweb.dll - regsvr32.exe qmgr.dll - regsvr32.exe qmgrprxy.dll - regsvr32.exe wucltux.dll - regsvr32.exe muweb.dll - regsvr32.exe wuwebv.dll - ``` - -7. Reset Winsock. To do this, type the following command at a command prompt, and then press ENTER: - ``` - netsh winsock reset - ``` -8. If you are running Windows XP or Windows Server 2003, you have to set the proxy settings. To do this, type the following command at a command prompt, and then press ENTER: - ``` - proxycfg.exe -d - ``` -9. Restart the BITS service and the Windows Update service. To do this, type the following commands at a command prompt. Press ENTER after you type each command. - ``` - net start bits - - net start wuauserv - ``` -10. If you are running Windows Vista or Windows Server 2008, clear the BITS queue. To do this, type the following command at a command prompt, and then press ENTER: - ``` - bitsadmin.exe /reset /allusers - ``` +--- +title: Windows Update - Additional resources +description: Additional resources for Windows Update +ms.prod: w10 +ms.mktglfcycl: +ms.sitesec: library +audience: itpro +author: greg-lindsay +ms.localizationpriority: medium +ms.audience: itpro +author: greg-lindsay +ms.date: 09/18/2018 +ms.reviewer: +manager: laurawi +ms.topic: article +--- + +# Windows Update - additional resources + +>Applies to: Windows 10 + +The following resources provide additional information about using Windows Update. + +## WSUS Troubleshooting + +[Troubleshooting issues with WSUS client agents](https://support.microsoft.com/help/10132/) + +[How to troubleshoot WSUS](https://support.microsoft.com/help/4025764/) + +[Error 80244007 when WSUS client scans for updates](https://support.microsoft.com/help/4096317/) + +[Updates may not be installed with Fast Startup in Windows 10](https://support.microsoft.com/help/4011287/) + + +## How do I reset Windows Update components? + +[This script](https://gallery.technet.microsoft.com/scriptcenter/Reset-WindowsUpdateps1-e0c5eb78) will completely reset the Windows Update client settings. It has been tested on Windows 7, 8, 10, and Windows Server 2012 R2. It will configure the services and registry keys related to Windows Update for default settings. It will also clean up files related to Windows Update, in addition to BITS related data. + + +[This script](https://gallery.technet.microsoft.com/scriptcenter/Reset-Windows-Update-Agent-d824badc) allow reset the Windows Update Agent resolving issues with Windows Update. + + +## Reset Windows Update components manually +1. Open a Windows command prompt. To open a command prompt, click **Start > Run**. Copy and paste (or type) the following command and then press ENTER: + ``` + cmd + ``` +2. Stop the BITS service and the Windows Update service. To do this, type the following commands at a command prompt. Press ENTER after you type each command. + ``` + net stop bits + net stop wuauserv + ``` +3. Delete the qmgr\*.dat files. To do this, type the following command at a command prompt, and then press ENTER: + ``` + Del "%ALLUSERSPROFILE%\Application Data\Microsoft\Network\Downloader\qmgr*.dat" + ``` +4. If this is your first attempt at resolving your Windows Update issues by using the steps in this article, go to step 5 without carrying out the steps in step 4. The steps in step 4 should only be performed at this point in the troubleshooting if you cannot resolve your Windows Update issues after following all steps but step 4. The steps in step 4 are also performed by the "Aggressive" mode of the Fix it Solution above. + 1. Rename the following folders to *.BAK: + - %systemroot%\SoftwareDistribution\DataStore + - %systemroot%\SoftwareDistribution\Download + - %systemroot%\system32\catroot2 + + To do this, type the following commands at a command prompt. Press ENTER after you type each command. + - Ren %systemroot%\SoftwareDistribution\DataStore *.bak + - Ren %systemroot%\SoftwareDistribution\Download *.bak + - Ren %systemroot%\system32\catroot2 *.bak + 2. Reset the BITS service and the Windows Update service to the default security descriptor. To do this, type the following commands at a command prompt. Press ENTER after you type each command. + - sc.exe sdset bits D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;AU)(A;;CCLCSWRPWPDTLOCRRC;;;PU) + - sc.exe sdset wuauserv D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;AU)(A;;CCLCSWRPWPDTLOCRRC;;;PU) +5. Type the following command at a command prompt, and then press ENTER: + ``` + cd /d %windir%\system32 + ``` +6. Reregister the BITS files and the Windows Update files. To do this, type the following commands at a command prompt. Press ENTER after you type each command. + + ``` + regsvr32.exe atl.dll + regsvr32.exe urlmon.dll + regsvr32.exe mshtml.dll + regsvr32.exe shdocvw.dll + regsvr32.exe browseui.dll + regsvr32.exe jscript.dll + regsvr32.exe vbscript.dll + regsvr32.exe scrrun.dll + regsvr32.exe msxml.dll + regsvr32.exe msxml3.dll + regsvr32.exe msxml6.dll + regsvr32.exe actxprxy.dll + regsvr32.exe softpub.dll + regsvr32.exe wintrust.dll + regsvr32.exe dssenh.dll + regsvr32.exe rsaenh.dll + regsvr32.exe gpkcsp.dll + regsvr32.exe sccbase.dll + regsvr32.exe slbcsp.dll + regsvr32.exe cryptdlg.dll + regsvr32.exe oleaut32.dll + regsvr32.exe ole32.dll + regsvr32.exe shell32.dll + regsvr32.exe initpki.dll + regsvr32.exe wuapi.dll + regsvr32.exe wuaueng.dll + regsvr32.exe wuaueng1.dll + regsvr32.exe wucltui.dll + regsvr32.exe wups.dll + regsvr32.exe wups2.dll + regsvr32.exe wuweb.dll + regsvr32.exe qmgr.dll + regsvr32.exe qmgrprxy.dll + regsvr32.exe wucltux.dll + regsvr32.exe muweb.dll + regsvr32.exe wuwebv.dll + ``` + +7. Reset Winsock. To do this, type the following command at a command prompt, and then press ENTER: + ``` + netsh winsock reset + ``` +8. If you are running Windows XP or Windows Server 2003, you have to set the proxy settings. To do this, type the following command at a command prompt, and then press ENTER: + ``` + proxycfg.exe -d + ``` +9. Restart the BITS service and the Windows Update service. To do this, type the following commands at a command prompt. Press ENTER after you type each command. + ``` + net start bits + + net start wuauserv + ``` +10. If you are running Windows Vista or Windows Server 2008, clear the BITS queue. To do this, type the following command at a command prompt, and then press ENTER: + ``` + bitsadmin.exe /reset /allusers + ``` From f91790a094e6708e5ce8c045c30420e512491791 Mon Sep 17 00:00:00 2001 From: Orlando Rodriguez <49177883+ojrb@users.noreply.github.com> Date: Wed, 28 Aug 2019 19:39:49 -0500 Subject: [PATCH 060/285] Update mdop/mbam-v25/mbam-25-server-prerequisites-for-stand-alone-and-configuration-manager-integration-topologies.md Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- ...nd-alone-and-configuration-manager-integration-topologies.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/mdop/mbam-v25/mbam-25-server-prerequisites-for-stand-alone-and-configuration-manager-integration-topologies.md b/mdop/mbam-v25/mbam-25-server-prerequisites-for-stand-alone-and-configuration-manager-integration-topologies.md index 368088283f..885442c581 100644 --- a/mdop/mbam-v25/mbam-25-server-prerequisites-for-stand-alone-and-configuration-manager-integration-topologies.md +++ b/mdop/mbam-v25/mbam-25-server-prerequisites-for-stand-alone-and-configuration-manager-integration-topologies.md @@ -274,7 +274,7 @@ The following table lists the installation prerequisites for the MBAM Administra

    • WCF Activation

      • HTTP Activation

      • -
      • Non-HTTP Activation (Only for Windows Server 2008, 2012 or 2012 R2)

        +
      • Non-HTTP Activation (Only for Windows Server 2008, 2012, and 2012 R2)

    • TCP Activation

    • From 56160d7434b933a4df00f7001bda3ad95b88cf46 Mon Sep 17 00:00:00 2001 From: Deland-Han Date: Thu, 29 Aug 2019 17:10:55 +0800 Subject: [PATCH 061/285] comment --- windows/client-management/TOC.md | 2 +- windows/client-management/introduction-of-page-file.md | 4 ++-- windows/client-management/troubleshoot-windows-startup.md | 2 +- 3 files changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/client-management/TOC.md b/windows/client-management/TOC.md index d3ba01eed3..c998cd5263 100644 --- a/windows/client-management/TOC.md +++ b/windows/client-management/TOC.md @@ -24,7 +24,7 @@ ### [Advanced troubleshooting for Windows startup](troubleshoot-windows-startup.md) #### [How to determine the appropriate page file size for 64-bit versions of Windows](determine-appropriate-page-file-size.md) #### [Generate a kernel or complete crash dump](generate-kernel-or-complete-crash-dump.md) -#### [Introduction of page file](introduction-of-page-file.md) +#### [Introduction to the page file](introduction-of-page-file.md) #### [Configure system failure and recovery options in Windows](system-failure-recovery-options.md) #### [Advanced troubleshooting for Windows boot problems](advanced-troubleshooting-boot-problems.md) #### [Advanced troubleshooting for Windows-based computer freeze](troubleshoot-windows-freeze.md) diff --git a/windows/client-management/introduction-of-page-file.md b/windows/client-management/introduction-of-page-file.md index 4f631455ee..ebab8b0352 100644 --- a/windows/client-management/introduction-of-page-file.md +++ b/windows/client-management/introduction-of-page-file.md @@ -1,5 +1,5 @@ --- -title: Introduction of page file +title: Introduction to the page file description: Learn about the page files in Windows. ms.prod: w10 ms.sitesec: library @@ -12,7 +12,7 @@ ms.reviewer: manager: dcscontentpm --- -# Introduction of page file +# Introduction to the page file A page file (also known as a "paging file") is an optional, hidden system file on a hard disk. diff --git a/windows/client-management/troubleshoot-windows-startup.md b/windows/client-management/troubleshoot-windows-startup.md index f7b5450b07..604a4e0c3a 100644 --- a/windows/client-management/troubleshoot-windows-startup.md +++ b/windows/client-management/troubleshoot-windows-startup.md @@ -32,7 +32,7 @@ To understand the underlaying cause of that lead to Windows start-up issues, it ### Page file settings -- [Introduction of page file](introduction-of-page-file.md) +- [Introduction to the page file](introduction-of-page-file.md) - [How to determine the appropriate page file size for 64-bit versions of Windows](determine-appropriate-page-file-size.md) From add36a705e5efffe6de1665e31ac5ecf834baebf Mon Sep 17 00:00:00 2001 From: brianreidc7 <31985319+brianreidc7@users.noreply.github.com> Date: Thu, 29 Aug 2019 11:44:20 +0100 Subject: [PATCH 062/285] Clarify the registry key needed to set tags --- .../threat-protection/microsoft-defender-atp/machine-tags.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/machine-tags.md b/windows/security/threat-protection/microsoft-defender-atp/machine-tags.md index 6dff3ffaae..c9543f40e7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/machine-tags.md +++ b/windows/security/threat-protection/microsoft-defender-atp/machine-tags.md @@ -67,7 +67,8 @@ Machines with similar tags can be handy when you need to apply contextual action Use the following registry key entry to add a tag on a machine: - Registry key: `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection\DeviceTagging\` -- Registry key value (string): Group +- Registry key name: `Group` +- Registry key value (REG_SZ): `Name of the tag you want to set` >[!NOTE] >The device tag is part of the machine information report that's generated once a day. As an alternative, you may choose to restart the endpoint that would transfer a new machine information report. From 5cfda3f8607ddddea59d3a14531b38b17c341f50 Mon Sep 17 00:00:00 2001 From: John Liu <49762389+ShenLanJohn@users.noreply.github.com> Date: Thu, 29 Aug 2019 11:35:07 -0700 Subject: [PATCH 063/285] CAT Auto Pulish for Windows Release Messages - 20190829112356 (#1007) * Update deploy-the-latest-firmware-and-drivers-for-surface-devices.md * add table * CAT Auto Pulish for Windows Release Messages - CAT_AutoPublish_20190829102107 (#1006) --- ...irmware-and-drivers-for-surface-devices.md | 2 +- .../status-windows-10-1903.yml | 20 +++++++++---------- .../windows-message-center.yml | 1 + .../respond-file-alerts.md | 12 +++++++++++ 4 files changed, 24 insertions(+), 11 deletions(-) diff --git a/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md b/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md index 4bad708b64..94094f2b60 100644 --- a/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md +++ b/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md @@ -11,7 +11,7 @@ ms.mktglfcycl: deploy ms.pagetype: surface, devices ms.sitesec: library author: dansimp -ms.date: 08/13/2018 +ms.date: 08/13/2019 ms.author: dansimp ms.topic: article --- diff --git a/windows/release-information/status-windows-10-1903.yml b/windows/release-information/status-windows-10-1903.yml index f2377ee4cf..ceed17f7b4 100644 --- a/windows/release-information/status-windows-10-1903.yml +++ b/windows/release-information/status-windows-10-1903.yml @@ -65,18 +65,18 @@ sections: - type: markdown text: "
      This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

      - - + + - + - - + + @@ -95,7 +95,7 @@ sections: - type: markdown text: "
      SummaryOriginating updateStatusLast updated
      Windows Sandbox may fail to start with error code “0x80070002”
      Windows Sandbox may fail to start with \"ERROR_FILE_NOT_FOUND (0x80070002)\" on devices in which the operating system language was changed between updates

      See details >
      OS Build 18362.116

      May 20, 2019
      KB4505057
      Investigating
      August 20, 2019
      11:06 AM PT
      Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
      Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

      See details >
      OS Build 18362.295

      August 13, 2019
      KB4512508
      Investigating
      August 17, 2019
      01:49 PM PT
      Windows Sandbox may fail to start with error code “0x80070002”
      Windows Sandbox may fail to start with \"ERROR_FILE_NOT_FOUND (0x80070002)\" on devices in which the operating system language was changed between updates

      See details >
      OS Build 18362.116

      May 20, 2019
      KB4505057
      Investigating
      KB4512941
      August 20, 2019
      11:06 AM PT
      Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
      Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

      See details >
      OS Build 18362.295

      August 13, 2019
      KB4512508
      Investigating
      KB4512941
      August 17, 2019
      01:49 PM PT
      Updates may fail to install and you may receive Error 0x80073701
      Installation of updates may fail and you may receive an error, \"Updates Failed, There were problems installing some updates, but we'll try again later\" and \"Error 0x80073701.\"

      See details >
      OS Build 18362.145

      May 29, 2019
      KB4497935
      Investigating
      August 16, 2019
      04:28 PM PT
      Domain connected devices that use MIT Kerberos realms will not start up
      Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

      See details >
      OS Build 18362.145

      May 29, 2019
      KB4497935
      Investigating
      August 13, 2019
      06:59 PM PT
      Domain connected devices that use MIT Kerberos realms will not start up
      Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

      See details >
      OS Build 18362.145

      May 29, 2019
      KB4497935
      Investigating
      KB4512941
      August 13, 2019
      06:59 PM PT
      MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
      You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

      See details >
      OS Build 18362.175

      June 11, 2019
      KB4503293
      Resolved External
      August 09, 2019
      07:03 PM PT
      Issues updating when certain versions of Intel storage drivers are installed
      Certain versions of Intel Rapid Storage Technology (Intel RST) drivers may cause updating to Windows 10, version 1903 to fail.

      See details >
      OS Build 18362.145

      May 29, 2019
      KB4497935
      Mitigated External
      August 09, 2019
      07:03 PM PT
      Intermittent loss of Wi-Fi connectivity
      Some older devices may experience loss of Wi-Fi connectivity due to an outdated Qualcomm driver.

      See details >
      OS Build 18362.116

      May 21, 2019
      KB4505057
      Mitigated External
      August 01, 2019
      08:44 PM PT
      Gamma ramps, color profiles, and night light settings do not apply in some cases
      Microsoft has identified some scenarios where gamma ramps, color profiles and night light settings may stop working.

      See details >
      OS Build 18362.116

      May 21, 2019
      KB4505057
      Mitigated
      August 01, 2019
      06:27 PM PT
      Display brightness may not respond to adjustments
      Microsoft and Intel have identified a driver compatibility issue on devices configured with certain Intel display drivers.

      See details >
      OS Build 18362.116

      May 21, 2019
      KB4505057
      Resolved
      KB4505903
      July 26, 2019
      02:00 PM PT
      The dGPU may occasionally disappear from device manager on Surface Book 2 with dGPU
      Some apps or games that needs to perform graphics intensive operations may close or fail to open on Surface Book 2 devices with Nvidia dGPU.

      See details >
      OS Build 18362.145

      May 29, 2019
      KB4497935
      Investigating
      July 16, 2019
      09:04 AM PT
      Initiating a Remote Desktop connection may result in black screen
      When initiating a Remote Desktop connection to devices with some older GPU drivers, you may receive a black screen.

      See details >
      OS Build 18362.145

      May 29, 2019
      KB4497935
      Investigating
      July 12, 2019
      04:42 PM PT
      Devices starting using PXE from a WDS or SCCM servers may fail to start
      Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

      See details >
      OS Build 18362.175

      June 11, 2019
      KB4503293
      Mitigated
      July 10, 2019
      07:09 PM PT
      Initiating a Remote Desktop connection may result in black screen
      When initiating a Remote Desktop connection to devices with some older GPU drivers, you may receive a black screen.

      See details >
      OS Build 18362.145

      May 29, 2019
      KB4497935
      Investigating
      KB4512941
      July 12, 2019
      04:42 PM PT
      Devices starting using PXE from a WDS or SCCM servers may fail to start
      Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

      See details >
      OS Build 18362.175

      June 11, 2019
      KB4503293
      Mitigated
      KB4512941
      July 10, 2019
      07:09 PM PT
      Unable to discover or connect to Bluetooth devices
      Microsoft has identified compatibility issues with some versions of Realtek and Qualcomm Bluetooth radio drivers.

      See details >
      OS Build 18362.116

      May 21, 2019
      KB4505057
      Mitigated
      May 21, 2019
      04:48 PM PT
      Intel Audio displays an intcdaud.sys notification
      Microsoft and Intel have identified an issue with a range of Intel Display Audio device drivers that may result in battery drain.

      See details >
      OS Build 18362.116

      May 21, 2019
      KB4505057
      Mitigated
      May 21, 2019
      04:47 PM PT
      Cannot launch Camera app
      Microsoft and Intel have identified an issue affecting Intel RealSense SR300 or Intel RealSense S200 camera apps.

      See details >
      OS Build 18362.116

      May 21, 2019
      KB4505057
      Mitigated
      May 21, 2019
      04:47 PM PT
      - +
      DetailsOriginating updateStatusHistory
      Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
      After installing KB4512508, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

      Affected platforms:
      • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
      • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
      Next steps: Microsoft is working on a resolution and estimates a solution will be available late August. The ‘optional’ update will be available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive the update once it is released.

      Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS).

      Back to top
      OS Build 18362.295

      August 13, 2019
      KB4512508
      Investigating
      Last updated:
      August 17, 2019
      01:49 PM PT

      Opened:
      August 14, 2019
      03:34 PM PT
      Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
      After installing KB4512508, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

      Affected platforms:
      • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
      • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
      Next steps: Microsoft is working on a resolution and estimates a solution will be available late August. The ‘optional’ update will be available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive the update once it is released.

      Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS).

      Back to top
      OS Build 18362.295

      August 13, 2019
      KB4512508
      Investigating
      KB4512941
      Last updated:
      August 17, 2019
      01:49 PM PT

      Opened:
      August 14, 2019
      03:34 PM PT
      Updates may fail to install and you may receive Error 0x80073701
      Installation of updates may fail and you may receive the error message, \"Updates Failed, There were problems installing some updates, but we'll try again later\" or \"Error 0x80073701\" on the Windows Update dialog or within Update history.

      Affected platforms:
      • Client: Windows 10, version 1903
      • Server: Windows Server, version 1903
      Next steps: We are working on a resolution and will provide an update in an upcoming release.

      Back to top
      OS Build 18362.145

      May 29, 2019
      KB4497935
      Investigating
      Last updated:
      August 16, 2019
      04:28 PM PT

      Opened:
      August 16, 2019
      01:41 PM PT
      MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
      You may receive an error on your Apple MacOS device when trying to access network shares via CIFS or SMBv1 on a Windows devices that has installed updates on June 11, 2019 (KB4503293) or later. When you encounter this issue, in MacOS you may receive the error, “There was a problem connecting to the server “{Server Host Name}”. Check the server name or IP address, and then try again. If you continue to have problems, contact your system administrator.”

      Affected platforms:
      • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
      • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
      Resolution: For guidance on this issue, see the Apple support article If your Mac can't use NTLM to connect to a Windows server. There is no update for Windows needed for this issue.

      Back to top
      OS Build 18362.175

      June 11, 2019
      KB4503293
      Resolved External
      Last updated:
      August 09, 2019
      07:03 PM PT

      Opened:
      August 09, 2019
      04:25 PM PT
      @@ -107,11 +107,11 @@ sections: text: " +

      Affected platforms:
      • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
      • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
      Next steps: At this time, we suggest that devices in an affected environment do not install KB4497935. We are working on a resolution and estimate a solution will be available in late August.

      Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

      Back to top - - + +
      DetailsOriginating updateStatusHistory
      Domain connected devices that use MIT Kerberos realms will not start up
      Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4497935. Devices that are domain controllers or domain members are both affected.

      To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

      Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
      HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
      -

      Affected platforms:
      • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
      • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
      Next steps: At this time, we suggest that devices in an affected environment do not install KB4497935. We are working on a resolution and estimate a solution will be available in late August.

      Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

      Back to top
      OS Build 18362.145

      May 29, 2019
      KB4497935
      Investigating
      Last updated:
      August 13, 2019
      06:59 PM PT

      Opened:
      July 25, 2019
      06:10 PM PT
      OS Build 18362.145

      May 29, 2019
      KB4497935
      Investigating
      KB4512941
      Last updated:
      August 13, 2019
      06:59 PM PT

      Opened:
      July 25, 2019
      06:10 PM PT
      Issues updating when certain versions of Intel storage drivers are installed
      Intel and Microsoft have found incompatibility issues with certain versions of the Intel Rapid Storage Technology (Intel RST) drivers and the Windows 10 May 2019 Update (Windows 10, version 1903).  

      To safeguard your update experience, we have applied a compatibility hold on devices with Intel RST drivers, versions 15.1.0.1002 through version 15.5.2.1053 installed from installing or being offered Windows 10, version 1903 or Windows Server, version 1903, until the driver has been updated.

      Versions 15.5.2.1054 or later are compatible, and a device that has these drivers installed can install the Windows 10 May 2019 Update. For affected devices, the recommended version is 15.9.8.1050.

      Affected platforms:
      • Client: Windows 10, version 1903
      • Server: Windows Server, version 1903
      Workaround: To mitigate this issue before the resolution is released, you will need to update the Intel RST drivers for your device to version 15.5.2.1054 or a later.  Check with your device manufacturer (OEM) to see if an updated driver is available and install it. You can also download the latest Intel RST drivers directly from Intel at Intel® Rapid Storage Technology (Intel® RST) User Interface and Driver. Once your drivers are updated, you can restart the installation process for Windows 10, version 1903. Please note, it can take up to 48 hours before you can update to Windows 10, version 1903.

      Note Until an updated driver has been installed, we recommend you do not attempt to manually update using the Update now button or the Media Creation Tool. 

      Next Steps: We are working on a resolution and estimate a solution will be available in late August.

      Back to top
      OS Build 18362.145

      May 29, 2019
      KB4497935
      Mitigated External
      Last updated:
      August 09, 2019
      07:03 PM PT

      Opened:
      July 25, 2019
      06:10 PM PT
      The dGPU may occasionally disappear from device manager on Surface Book 2 with dGPU
      Microsoft has identified a compatibility issue on some Surface Book 2 devices configured with Nvidia discrete graphics processing unit (dGPU). After updating to Windows 10, version 1903 (May 2019 Feature Update), some apps or games that needs to perform graphics intensive operations may close or fail to open.

      To safeguard your update experience, we have applied a compatibility hold on Surface Book 2 devices with Nvidia dGPUs from being offered Windows 10, version 1903, until this issue is resolved.

      Affected platforms:
      • Client: Windows 10, version 1903
      Workaround: To mitigate the issue if you are already on Windows 10, version 1903, you can restart the device or select the Scan for hardware changes button in the Action menu or on the toolbar in Device Manager.

      Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

      Next steps: We are working on a resolution and will provide an update in an upcoming release.

      Back to top
      OS Build 18362.145

      May 29, 2019
      KB4497935
      Investigating
      Last updated:
      July 16, 2019
      09:04 AM PT

      Opened:
      July 12, 2019
      04:20 PM PT
      Initiating a Remote Desktop connection may result in black screen
      When initiating a Remote Desktop connection to devices with some older GPU drivers, you may receive a black screen. Any version of Windows may encounter this issue when initiating a Remote Desktop connection to a Windows 10, version 1903 device which is running an affected display driver, including the drivers for the Intel 4 series chipset integrated GPU (iGPU).

      Affected platforms:
      • Client: Windows 10, version 1903
      • Server: Windows Server, version 1903
      Next steps: We are working on a resolution that will be made available in upcoming release.

      Back to top
      OS Build 18362.145

      May 29, 2019
      KB4497935
      Investigating
      Last updated:
      July 12, 2019
      04:42 PM PT

      Opened:
      July 12, 2019
      04:42 PM PT
      Devices starting using PXE from a WDS or SCCM servers may fail to start
      Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503293 on a WDS server.

      Affected platforms:
      • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
      Workaround:
      To mitigate this issue on an SCCM server:
      1. Verify Variable Window Extension is enabled.
      2. Set the values of TFTP block size to 4096 and TFTP window size to 1. For guidance on how to configure them, see Customize the RamDisk TFTP block and window sizes on PXE-enabled distribution points.
      Note Try the default values for TFTP block size and TFTP window size first but depending on your environment and overall settings, you may need to adjust them for your setup. You can also try the Enable a PXE responder without Windows Deployment Service setting. For more information on this setting, see Install and configure distribution points in Configuration Manager.

      To mitigate this issue on a WDS server without SCCM:
      1. In WDS TFTP settings, verify Variable Window Extension is enabled.
      2. In the Boot Configuration Data (BCD) of the imported image, set RamDiskTFTPBlockSize to 1456.
      3. In the BCD of the imported image, set RamDiskTFTPWindowSize to 4.
      Note Try the default values for RamDiskTFTPBlockSize and RamDiskTFTPWindowSize first but depending on your environment and overall settings, you may need to adjust them for your setup.

      Next steps: We are working on a resolution and will provide an update in an upcoming release.

      Back to top
      OS Build 18362.175

      June 11, 2019
      KB4503293
      Mitigated
      Last updated:
      July 10, 2019
      07:09 PM PT

      Opened:
      July 10, 2019
      02:51 PM PT
      Initiating a Remote Desktop connection may result in black screen
      When initiating a Remote Desktop connection to devices with some older GPU drivers, you may receive a black screen. Any version of Windows may encounter this issue when initiating a Remote Desktop connection to a Windows 10, version 1903 device which is running an affected display driver, including the drivers for the Intel 4 series chipset integrated GPU (iGPU).

      Affected platforms:
      • Client: Windows 10, version 1903
      • Server: Windows Server, version 1903
      Next steps: We are working on a resolution that will be made available in upcoming release.

      Back to top
      OS Build 18362.145

      May 29, 2019
      KB4497935
      Investigating
      KB4512941
      Last updated:
      July 12, 2019
      04:42 PM PT

      Opened:
      July 12, 2019
      04:42 PM PT
      Devices starting using PXE from a WDS or SCCM servers may fail to start
      Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503293 on a WDS server.

      Affected platforms:
      • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
      Workaround:
      To mitigate this issue on an SCCM server:
      1. Verify Variable Window Extension is enabled.
      2. Set the values of TFTP block size to 4096 and TFTP window size to 1. For guidance on how to configure them, see Customize the RamDisk TFTP block and window sizes on PXE-enabled distribution points.
      Note Try the default values for TFTP block size and TFTP window size first but depending on your environment and overall settings, you may need to adjust them for your setup. You can also try the Enable a PXE responder without Windows Deployment Service setting. For more information on this setting, see Install and configure distribution points in Configuration Manager.

      To mitigate this issue on a WDS server without SCCM:
      1. In WDS TFTP settings, verify Variable Window Extension is enabled.
      2. In the Boot Configuration Data (BCD) of the imported image, set RamDiskTFTPBlockSize to 1456.
      3. In the BCD of the imported image, set RamDiskTFTPWindowSize to 4.
      Note Try the default values for RamDiskTFTPBlockSize and RamDiskTFTPWindowSize first but depending on your environment and overall settings, you may need to adjust them for your setup.

      Next steps: We are working on a resolution and will provide an update in an upcoming release.

      Back to top
      OS Build 18362.175

      June 11, 2019
      KB4503293
      Mitigated
      KB4512941
      Last updated:
      July 10, 2019
      07:09 PM PT

      Opened:
      July 10, 2019
      02:51 PM PT
      " @@ -120,7 +120,7 @@ sections: - type: markdown text: " - + diff --git a/windows/release-information/windows-message-center.yml b/windows/release-information/windows-message-center.yml index 0ff0106922..a69de08f66 100644 --- a/windows/release-information/windows-message-center.yml +++ b/windows/release-information/windows-message-center.yml @@ -50,6 +50,7 @@ sections: text: "
      DetailsOriginating updateStatusHistory
      Windows Sandbox may fail to start with error code “0x80070002”
      Windows Sandbox may fail to start with \"ERROR_FILE_NOT_FOUND (0x80070002)\" on devices in which the operating system language is changed during the update process when installing Windows 10, version 1903.

      Affected platforms:
      • Client: Windows 10, version 1903
      Next steps: We are working on a resolution and estimates a solution will be available in late August.

      Back to top
      OS Build 18362.116

      May 20, 2019
      KB4505057
      Investigating
      Last updated:
      August 20, 2019
      11:06 AM PT

      Opened:
      May 24, 2019
      04:20 PM PT
      Windows Sandbox may fail to start with error code “0x80070002”
      Windows Sandbox may fail to start with \"ERROR_FILE_NOT_FOUND (0x80070002)\" on devices in which the operating system language is changed during the update process when installing Windows 10, version 1903.

      Affected platforms:
      • Client: Windows 10, version 1903
      Next steps: We are working on a resolution and estimates a solution will be available in late August.

      Back to top
      OS Build 18362.116

      May 20, 2019
      KB4505057
      Investigating
      KB4512941
      Last updated:
      August 20, 2019
      11:06 AM PT

      Opened:
      May 24, 2019
      04:20 PM PT
      Intermittent loss of Wi-Fi connectivity
      Some older computers may experience loss of Wi-Fi connectivity due to an outdated Qualcomm driver. An updated Wi-Fi driver should be available from your device manufacturer (OEM).

      To safeguard your upgrade experience, we have applied a hold on devices with this Qualcomm driver from being offered Windows 10, version 1903, until the updated driver is installed.

      Affected platforms:
      • Client: Windows 10, version 1903
      Workaround: Before updating to Windows 10, version 1903, you will need to download and install an updated Wi-Fi driver from your device manufacturer (OEM).
       
      Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until a new driver has been installed and the Windows 10, version 1903 feature update has been automatically offered to you.

      Back to top
      OS Build 18362.116

      May 21, 2019
      KB4505057
      Mitigated External
      Last updated:
      August 01, 2019
      08:44 PM PT

      Opened:
      May 21, 2019
      07:13 AM PT
      Gamma ramps, color profiles, and night light settings do not apply in some cases
      Microsoft has identified some scenarios where gamma ramps, color profiles and night light settings may stop working.

      Microsoft has identified some scenarios in which these features may have issues or stop working, for example:
      • Connecting to (or disconnecting from) an external monitor, dock, or projector
      • Rotating the screen
      • Updating display drivers or making other display mode changes
      • Closing full screen applications
      • Applying custom color profiles
      • Running applications that rely on custom gamma ramps
      Affected platforms:
      • Client: Windows 10, version 1903
      Workaround: If you find that your night light has stopped working, try turning the night light off and on, or restarting your computer. For other color setting issues, restart your computer to correct the issue.

      Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

      Next steps: We are working on a resolution and will provide an update in an upcoming release.

      Back to top
      OS Build 18362.116

      May 21, 2019
      KB4505057
      Mitigated
      Last updated:
      August 01, 2019
      06:27 PM PT

      Opened:
      May 21, 2019
      07:28 AM PT
      Display brightness may not respond to adjustments
      Microsoft and Intel have identified a driver compatibility issue on devices configured with certain Intel display drivers. After updating to Windows 10, version 1903, brightness settings may sometime appear as if changes applied took effect, yet the actual display brightness doesn't change.

      To safeguard your update experience, we have applied a compatibility hold on devices with certain Intel drivers from being offered Windows 10, version 1903, until this issue is resolved.

      Affected platforms:
      • Client: Windows 10, version 1903
      Resolution: This issue was resolved in KB4505903 and the safeguard hold has been removed. Please ensure you have applied the resolving update before attempting to update to the Windows 10 May 2019 Update (version 1903). Please note, it can take up to 48 hours for the safeguard to be removed.

      Back to top
      OS Build 18362.116

      May 21, 2019
      KB4505057
      Resolved
      KB4505903
      Resolved:
      July 26, 2019
      02:00 PM PT

      Opened:
      May 21, 2019
      07:56 AM PT
      + diff --git a/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md index 3910cda2ff..ee0bb0ff9b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md @@ -40,6 +40,18 @@ Response actions run along the top of the file page, and include: You can also submit files for deep analysis, to run the file in a secure cloud sandbox. When the analysis is complete, you'll get a detailed report that provides information about the behavior of the file. You can submit files for deep analysis and read past reports by selecting the **Deep analysis** tab. It's located below the file information cards. +Some actions require certain permissions. The following table describes what action certain permissions can take on portable executable (PE) and non-PE files: + +Permission | PE files | Non-PE files +:---|:---|:--- +View data | X | X +Alerts investigation | ☑ | X +Live response basic | X | X +Live response advanced | ☑ |☑ + +For more information on roles, see [Create and manage roles for role-based access control](user-roles.md). + + ## Stop and quarantine files in your network You can contain an attack in your organization by stopping the malicious process and quarantining the file where it was observed. From 516c549ca2cb0610b1e4310c150192aa11cf1aa9 Mon Sep 17 00:00:00 2001 From: Gary Burns <37640177+gaburn@users.noreply.github.com> Date: Thu, 29 Aug 2019 12:07:48 -0700 Subject: [PATCH 064/285] Update microsoft-defender-atp-mac-install-with-intune.md adding troubleshooting step for common 'no license found' issue --- .../microsoft-defender-atp-mac-install-with-intune.md | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md index da2a6a8dcd..2f1cc97a92 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md @@ -166,6 +166,12 @@ Once the Intune changes are propagated to the enrolled devices, you can see them ![Microsoft Defender icon in status bar screenshot](images/MDATP_Icon_Bar.png) +## Troubleshooting + +Issue: No license found + +Solution: Follow steps above to create a device profile using WindowsDefenderATPOnboarding.xml + ## Logging installation issues For more information on how to find the automatically generated log that is created by the installer when an error occurs, see [Logging installation issues](microsoft-defender-atp-mac-resources.md#logging-installation-issues) . From 17d4fb7dd81d08feee42855e0b5ee368c36658f3 Mon Sep 17 00:00:00 2001 From: John Liu <49762389+ShenLanJohn@users.noreply.github.com> Date: Thu, 29 Aug 2019 19:00:31 -0700 Subject: [PATCH 065/285] CAT Auto Pulish for Windows Release Messages - CAT_AutoPublish_20190829175859 (#1012) (#1013) --- windows/release-information/windows-message-center.yml | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/release-information/windows-message-center.yml b/windows/release-information/windows-message-center.yml index a69de08f66..eee75f9b25 100644 --- a/windows/release-information/windows-message-center.yml +++ b/windows/release-information/windows-message-center.yml @@ -50,6 +50,7 @@ sections: text: "
      MessageDate
      Take Action: Internet Explorer 11 now available on Windows Update/WSUS for Windows Server 2012 and Windows Embedded 8 Standard
      Internet Explorer 11 (KB 4492872) is now available via Windows Update (WU) and Windows Server Update Services (WSUS) for commercial customers running Windows Server 2012 and Windows Embedded 8 Standard. For details about these changes and end of support for IE10, please refer to the IT Pro blog
      August 29, 2019
      08:00 AM PT
      Take action: SHA-2 code signing support guidance for Windows 7 SP1 and Windows Server 2008 RS2 SP1
      Windows 7 SP1 and Windows Server 2008 R2 SP1 update signatures are now SHA-2 based signatures and requires that SHA-2 support to be installed. For important customer guidance on installation and troubleshooting tips, please read the knowledge base article 2019 SHA-2 Code Signing Support requirement for Windows and WSUS.
      August 23, 2019
      03:35 PM PT
      Take action: Windows 10, version 1703 (the Windows 10 Creators Update) reaches end of life on October 9, 2019
      The Enterprise and Education editions of Windows 10, version 1703 (the Windows 10 Creators Update) will reach end of life on October 9, 2019. The Home, Pro, Pro for Workstations, and IoT Core editions reached end of service on October 8, 2018.

      There is no extended support available for any edition of Windows 10, version 1703. Therefore, it will no longer be supported after October 9, 2019 and will not receive monthly security and quality updates containing protections from the latest security threats.

      To continue receiving security and quality updates, Microsoft recommends that you update your devices to the latest version of Windows 10. For more information on end of service dates and currently supported versions of Windows 10, see the Windows lifecycle fact sheet.
      August 23, 2019
      02:17 PM PT
      Resolved: Delays starting Internet Explorer 11
      On August 16, 2019 at 7:16 AM a server required for downloading the Internet Explorer 11 (IE11) startup page, went down. As a result of the server outage, IE 11 became unresponsive for some customers who had not yet installed the August 2019 security updates. Customers who had the August 2019 security update installed were not affected. In order to ensure your devices remain in a serviced and secure state, we recommend you install the latest monthly update.

      This issue was resolved on the server side at 1:00 pm PST. 
      August 16, 2019
      04:00 PM PT
      + From a7f9fd7adfa4087f3b930cbfc98cb98ebea98ab1 Mon Sep 17 00:00:00 2001 From: Tom Henderson Date: Fri, 30 Aug 2019 15:43:49 +1200 Subject: [PATCH 066/285] Add page for Audit Token Right Adjusted --- ...advanced-security-audit-policy-settings.md | 2 +- .../auditing/audit-token-right-adjusted.md | 27 +++++++++++++++++++ 2 files changed, 28 insertions(+), 1 deletion(-) create mode 100644 windows/security/threat-protection/auditing/audit-token-right-adjusted.md diff --git a/windows/security/threat-protection/auditing/advanced-security-audit-policy-settings.md b/windows/security/threat-protection/auditing/advanced-security-audit-policy-settings.md index 6ad79e3e33..7d1e22bb7a 100644 --- a/windows/security/threat-protection/auditing/advanced-security-audit-policy-settings.md +++ b/windows/security/threat-protection/auditing/advanced-security-audit-policy-settings.md @@ -65,7 +65,7 @@ Detailed Tracking security policy settings and audit events can be used to monit - [Audit Process Termination](audit-process-termination.md) - [Audit RPC Events](audit-rpc-events.md) - [Audit Credential Validation](https://docs.microsoft.com/windows/security/threat-protection/auditing/audit-credential-validation) - > **Note:** For more information, see [Security Monitoring](https://blogs.technet.microsoft.com/nathangau/2018/01/25/security-monitoring-a-possible-new-way-to-detect-privilege-escalation/) +- [Audit Token Right Adjusted](https://docs.microsoft.com/windows/security/threat-protection/auditing/audit-token-right-adjusted) ## DS Access diff --git a/windows/security/threat-protection/auditing/audit-token-right-adjusted.md b/windows/security/threat-protection/auditing/audit-token-right-adjusted.md new file mode 100644 index 0000000000..560a49db64 --- /dev/null +++ b/windows/security/threat-protection/auditing/audit-token-right-adjusted.md @@ -0,0 +1,27 @@ +--- +title: Audit Token Right Adjusted (Windows 10) +description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Token Right Adjusted, which determines whether the operating system generates audit events when specific changes are made to the priveleges of a token. +--- + +# Audit Token Right Adjusted + +**Applies to** +- Windows 10 +- Windows Server 2016 + + +Audit Token Right Adjusted allows you to audit events generated by adjusting the priveleges of a token. + +For more information, see [Security Monitoring: A Possible New Way to Detect Privilege Escalation](https://blogs.technet.microsoft.com/nathangau/2018/01/25/security-monitoring-a-possible-new-way-to-detect-privilege-escalation/) + +| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments | +|-------------------|-----------------|-----------------|------------------|------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| +| Domain Controller | IF | No | IF | No | IF – With Success auditing for this subcategory, you can get information related to changes to the proveleges of a token.
      However, if you are using an application or system service that dynamically adjusts token privileges, we do not recommend Success auditing because of the high volume of event “[4703](event-4703.md)(S): A user right was adjusted” that may be generated. As of Windows 10, event 4703 is generated by applications or services that dynamically adjust token privileges. An example of such an application is System Center Configuration Manager, which makes WMI queries at recurring intervals and quickly generates a large number of 4703 events (with the WMI activity listed as coming from **svchost.exe**).
      If one of your applications or services is generating a large number of 4703 events, you might find that your event-management software has filtering logic that can automatically discard the recurring events, which would make it easier to work with Success auditing for this category.
      This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. | +| Member Server | IF | No | IF | No | IF – With Success auditing for this subcategory, you can get information related to changes to the proveleges of a token.
      However, if you are using an application or system service that dynamically adjusts token privileges, we do not recommend Success auditing because of the high volume of event “[4703](event-4703.md)(S): A user right was adjusted” that may be generated. As of Windows 10, event 4703 is generated by applications or services that dynamically adjust token privileges. An example of such an application is System Center Configuration Manager, which makes WMI queries at recurring intervals and quickly generates a large number of 4703 events (with the WMI activity listed as coming from **svchost.exe**).
      If one of your applications or services is generating a large number of 4703 events, you might find that your event-management software has filtering logic that can automatically discard the recurring events, which would make it easier to work with Success auditing for this category.
      This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. | +| Workstation | IF | No | IF | No | IF – With Success auditing for this subcategory, you can get information related to changes to the proveleges of a token.
      However, if you are using an application or system service that dynamically adjusts token privileges, we do not recommend Success auditing because of the high volume of event “[4703](event-4703.md)(S): A user right was adjusted” that may be generated. As of Windows 10, event 4703 is generated by applications or services that dynamically adjust token privileges. An example of such an application is System Center Configuration Manager, which makes WMI queries at recurring intervals and quickly generates a large number of 4703 events (with the WMI activity listed as coming from **svchost.exe**).
      If one of your applications or services is generating a large number of 4703 events, you might find that your event-management software has filtering logic that can automatically discard the recurring events, which would make it easier to work with Success auditing for this category.
      This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. | + +**Events List:** + +- [4703](event-4703.md)(S): A user right was adjusted. + +**Event volume**: High. From c084d21ab6ad7c1165155315bd50591504fb4e66 Mon Sep 17 00:00:00 2001 From: John Liu <49762389+ShenLanJohn@users.noreply.github.com> Date: Fri, 30 Aug 2019 11:11:11 -0700 Subject: [PATCH 067/285] CAT Auto Pulish for Windows Release Messages - CAT_AutoPublish_20190830100739 (#1018) (#1019) --- .../resolved-issues-windows-10-1903.yml | 21 +++++++++++++++ .../status-windows-10-1903.yml | 26 +++++++++---------- .../windows-message-center.yml | 1 + 3 files changed, 35 insertions(+), 13 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1903.yml b/windows/release-information/resolved-issues-windows-10-1903.yml index 46128ad713..e3349d1356 100644 --- a/windows/release-information/resolved-issues-windows-10-1903.yml +++ b/windows/release-information/resolved-issues-windows-10-1903.yml @@ -32,6 +32,12 @@ sections: - type: markdown text: "
      MessageDate
      Feature update install notification on Windows 10, version 1809 (the October 2018 Update)
      We've had reports on August 29th that some customers running Windows 10, version 1809 (the October 2018 Update) have received notification to install the latest feature update (version 1903) early. Updating remains in your control. To install the update, you must select one of the following options: \"Pick a Time\", \"Restart Tonight,\" or \"Restart Now\". If you are not ready to update at this time, simply dismiss the notification by clicking the arrow in the top right corner. If you have updated to Windows 10, version 1903 and would like to go back to your previous version, see the instructions here.
      August 29, 2019
      04:39 PM PT
      Take Action: Internet Explorer 11 now available on Windows Update/WSUS for Windows Server 2012 and Windows Embedded 8 Standard
      Internet Explorer 11 (KB 4492872) is now available via Windows Update (WU) and Windows Server Update Services (WSUS) for commercial customers running Windows Server 2012 and Windows Embedded 8 Standard. For details about these changes and end of support for IE10, please refer to the IT Pro blog
      August 29, 2019
      08:00 AM PT
      Take action: SHA-2 code signing support guidance for Windows 7 SP1 and Windows Server 2008 RS2 SP1
      Windows 7 SP1 and Windows Server 2008 R2 SP1 update signatures are now SHA-2 based signatures and requires that SHA-2 support to be installed. For important customer guidance on installation and troubleshooting tips, please read the knowledge base article 2019 SHA-2 Code Signing Support requirement for Windows and WSUS.
      August 23, 2019
      03:35 PM PT
      Take action: Windows 10, version 1703 (the Windows 10 Creators Update) reaches end of life on October 9, 2019
      The Enterprise and Education editions of Windows 10, version 1703 (the Windows 10 Creators Update) will reach end of life on October 9, 2019. The Home, Pro, Pro for Workstations, and IoT Core editions reached end of service on October 8, 2018.

      There is no extended support available for any edition of Windows 10, version 1703. Therefore, it will no longer be supported after October 9, 2019 and will not receive monthly security and quality updates containing protections from the latest security threats.

      To continue receiving security and quality updates, Microsoft recommends that you update your devices to the latest version of Windows 10. For more information on end of service dates and currently supported versions of Windows 10, see the Windows lifecycle fact sheet.
      August 23, 2019
      02:17 PM PT
      + + + + + + @@ -58,10 +64,24 @@ sections: - type: markdown text: "
      SummaryOriginating updateStatusDate resolved
      Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
      Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

      See details >
      OS Build 18362.295

      August 13, 2019
      KB4512508
      Resolved
      KB4512941
      August 30, 2019
      10:00 AM PT
      Issues updating when certain versions of Intel storage drivers are installed
      Certain versions of Intel Rapid Storage Technology (Intel RST) drivers may cause updating to Windows 10, version 1903 to fail.

      See details >
      OS Build 18362.145

      May 29, 2019
      KB4497935
      Resolved
      KB4512941
      August 30, 2019
      10:00 AM PT
      Initiating a Remote Desktop connection may result in black screen
      When initiating a Remote Desktop connection to devices with some older GPU drivers, you may receive a black screen.

      See details >
      OS Build 18362.145

      May 29, 2019
      KB4497935
      Resolved
      KB4512941
      August 30, 2019
      10:00 AM PT
      Windows Sandbox may fail to start with error code “0x80070002”
      Windows Sandbox may fail to start with \"ERROR_FILE_NOT_FOUND (0x80070002)\" on devices in which the operating system language was changed between updates

      See details >
      OS Build 18362.116

      May 20, 2019
      KB4505057
      Resolved
      KB4512941
      August 30, 2019
      10:00 AM PT
      Devices starting using PXE from a WDS or SCCM servers may fail to start
      Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

      See details >
      OS Build 18362.175

      June 11, 2019
      KB4503293
      Resolved
      KB4512941
      August 30, 2019
      10:00 AM PT
      Domain connected devices that use MIT Kerberos realms will not start up
      Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

      See details >
      OS Build 18362.145

      May 29, 2019
      KB4497935
      Resolved
      KB4512941
      August 30, 2019
      10:00 AM PT
      MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
      You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

      See details >
      OS Build 18362.175

      June 11, 2019
      KB4503293
      Resolved External
      August 09, 2019
      07:03 PM PT
      Display brightness may not respond to adjustments
      Microsoft and Intel have identified a driver compatibility issue on devices configured with certain Intel display drivers.

      See details >
      OS Build 18362.116

      May 21, 2019
      KB4505057
      Resolved
      KB4505903
      July 26, 2019
      02:00 PM PT
      RASMAN service may stop working and result in the error “0xc0000005”
      The Remote Access Connection Manager (RASMAN) service may stop working and result in the error “0xc0000005” with VPN profiles configured as an Always On VPN connection.

      See details >
      OS Build 18362.145

      May 29, 2019
      KB4497935
      Resolved
      KB4505903
      July 26, 2019
      02:00 PM PT
      +
      DetailsOriginating updateStatusHistory
      Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
      After installing KB4512508, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

      Affected platforms:
      • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
      • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
      Resolution: This issue was resolved in KB4512941. The ‘optional’ update is available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive KB4512941 and install. For instructions, see Update Windows 10.

      Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS).

      Back to top
      OS Build 18362.295

      August 13, 2019
      KB4512508
      Resolved
      KB4512941
      Resolved:
      August 30, 2019
      10:00 AM PT

      Opened:
      August 14, 2019
      03:34 PM PT
      MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
      You may receive an error on your Apple MacOS device when trying to access network shares via CIFS or SMBv1 on a Windows devices that has installed updates on June 11, 2019 (KB4503293) or later. When you encounter this issue, in MacOS you may receive the error, “There was a problem connecting to the server “{Server Host Name}”. Check the server name or IP address, and then try again. If you continue to have problems, contact your system administrator.”

      Affected platforms:
      • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
      • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
      Resolution: For guidance on this issue, see the Apple support article If your Mac can't use NTLM to connect to a Windows server. There is no update for Windows needed for this issue.

      Back to top
      OS Build 18362.175

      June 11, 2019
      KB4503293
      Resolved External
      Last updated:
      August 09, 2019
      07:03 PM PT

      Opened:
      August 09, 2019
      04:25 PM PT
      " +- title: July 2019 +- items: + - type: markdown + text: " + + + + + +
      DetailsOriginating updateStatusHistory
      Issues updating when certain versions of Intel storage drivers are installed
      Intel and Microsoft have found incompatibility issues with certain versions of the Intel Rapid Storage Technology (Intel RST) drivers and the Windows 10 May 2019 Update (Windows 10, version 1903).  

      To safeguard your update experience, we have applied a compatibility hold on devices with Intel RST drivers, versions 15.1.0.1002 through version 15.5.2.1053 installed from installing or being offered Windows 10, version 1903 or Windows Server, version 1903, until the driver has been updated.

      Versions 15.5.2.1054 or later are compatible, and a device that has these drivers installed can install the Windows 10 May 2019 Update. For affected devices, the recommended version is 15.9.8.1050.

      Affected platforms:
      • Client: Windows 10, version 1903
      • Server: Windows Server, version 1903
      Workaround: To mitigate this issue before the safeguard hold is removed, you will need to update the Intel RST drivers for your device to version 15.5.2.1054 or a later.  Check with your device manufacturer (OEM) to see if an updated driver is available and install it. You can also download the latest Intel RST drivers directly from Intel at Intel® Rapid Storage Technology (Intel® RST) User Interface and Driver. Once your drivers are updated, you can restart the installation process for Windows 10, version 1903. Please note, it can take up to 48 hours before you can update to Windows 10, version 1903.

      Resolution: This issue was resolved in KB4512941. The safeguard hold is estimated to be removed in early September.

      Back to top
      OS Build 18362.145

      May 29, 2019
      KB4497935
      Resolved
      KB4512941
      Resolved:
      August 30, 2019
      10:00 AM PT

      Opened:
      July 25, 2019
      06:10 PM PT
      Initiating a Remote Desktop connection may result in black screen
      When initiating a Remote Desktop connection to devices with some older GPU drivers, you may receive a black screen. Any version of Windows may encounter this issue when initiating a Remote Desktop connection to a Windows 10, version 1903 device which is running an affected display driver, including the drivers for the Intel 4 series chipset integrated GPU (iGPU).

      Affected platforms:
      • Client: Windows 10, version 1903
      • Server: Windows Server, version 1903
      Resolution: This issue was resolved in KB4512941.

      Back to top
      OS Build 18362.145

      May 29, 2019
      KB4497935
      Resolved
      KB4512941
      Resolved:
      August 30, 2019
      10:00 AM PT

      Opened:
      July 12, 2019
      04:42 PM PT
      Devices starting using PXE from a WDS or SCCM servers may fail to start
      Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503293 on a WDS server.

      Affected platforms:
      • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
      Resolution: This issue was resolved in KB4512941.

      Back to top
      OS Build 18362.175

      June 11, 2019
      KB4503293
      Resolved
      KB4512941
      Resolved:
      August 30, 2019
      10:00 AM PT

      Opened:
      July 10, 2019
      02:51 PM PT
      Domain connected devices that use MIT Kerberos realms will not start up
      Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4497935. Devices that are domain controllers or domain members are both affected.

      To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

      Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
      HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
      +

      Affected platforms:
      • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
      • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
      Resolution: This issue was resolved in KB4512941. The safeguard hold is estimated to be removed in early September.

      Back to top
      OS Build 18362.145

      May 29, 2019
      KB4497935
      Resolved
      KB4512941
      Resolved:
      August 30, 2019
      10:00 AM PT

      Opened:
      July 25, 2019
      06:10 PM PT
      + " + - title: June 2019 - items: - type: markdown @@ -77,6 +97,7 @@ sections: - type: markdown text: " + diff --git a/windows/release-information/status-windows-10-1903.yml b/windows/release-information/status-windows-10-1903.yml index ceed17f7b4..5dd768299d 100644 --- a/windows/release-information/status-windows-10-1903.yml +++ b/windows/release-information/status-windows-10-1903.yml @@ -65,18 +65,18 @@ sections: - type: markdown text: "
      This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

      DetailsOriginating updateStatusHistory
      Windows Sandbox may fail to start with error code “0x80070002”
      Windows Sandbox may fail to start with \"ERROR_FILE_NOT_FOUND (0x80070002)\" on devices in which the operating system language is changed during the update process when installing Windows 10, version 1903.

      Affected platforms:
      • Client: Windows 10, version 1903
      Resolution: This issue was resolved in KB4512941.

      Back to top
      OS Build 18362.116

      May 20, 2019
      KB4505057
      Resolved
      KB4512941
      Resolved:
      August 30, 2019
      10:00 AM PT

      Opened:
      May 24, 2019
      04:20 PM PT
      Display brightness may not respond to adjustments
      Microsoft and Intel have identified a driver compatibility issue on devices configured with certain Intel display drivers. After updating to Windows 10, version 1903, brightness settings may sometime appear as if changes applied took effect, yet the actual display brightness doesn't change.

      To safeguard your update experience, we have applied a compatibility hold on devices with certain Intel drivers from being offered Windows 10, version 1903, until this issue is resolved.

      Affected platforms:
      • Client: Windows 10, version 1903
      Resolution: This issue was resolved in KB4505903 and the safeguard hold has been removed. Please ensure you have applied the resolving update before attempting to update to the Windows 10 May 2019 Update (version 1903). Please note, it can take up to 48 hours for the safeguard to be removed.

      Back to top
      OS Build 18362.116

      May 21, 2019
      KB4505057
      Resolved
      KB4505903
      Resolved:
      July 26, 2019
      02:00 PM PT

      Opened:
      May 21, 2019
      07:56 AM PT
      Loss of functionality in Dynabook Smartphone Link app
      Some users may experience a loss of functionality after updating to Windows 10, version 1903 when using the Dynabook Smartphone Link application on Windows devices. Loss of functionality may affect the display of phone numbers in the Call menu and the ability to answer phone calls on the Windows PC.

      To safeguard your update experience, we have applied a compatibility hold on devices with Dynabook Smartphone Link from being offered Windows 10, version 1903, until this issue is resolved.

      Affected platforms:
      • Client: Windows 10, version 1903
      Resolution: This issue is now resolved and the safeguard hold has been removed. Please note, it can take up to 48 hours before you can update to Windows 10, version 1903.

      Back to top
      OS Build 18362.116

      May 20, 2019
      KB4505057
      Resolved
      Resolved:
      July 11, 2019
      01:54 PM PT

      Opened:
      May 24, 2019
      03:10 PM PT
      Error attempting to update with external USB device or memory card attached
      If you have an external USB device or SD memory card attached when installing Windows 10, version 1903, you may get an error message stating \"This PC can't be upgraded to Windows 10.\" This is caused by inappropriate drive reassignment during installation.

      Sample scenario: An update to Windows 10, version 1903 is attempted on a computer that has a thumb drive inserted into its USB port. Before the update, the thumb drive is mounted in the system as drive G based on the existing drive configuration. After the feature update is installed; however, the device is reassigned a different drive letter (e.g., drive H).

      Note The drive reassignment is not limited to removable drives. Internal hard drives may also be affected.

      To safeguard your update experience, we have applied a hold on devices with an external USB device or SD memory card attached from being offered Windows 10, version 1903 until this issue is resolved.

      Affected platforms:
      • Client: Windows 10, version 1903
      Resolution: This issue is now resolved and the safeguard hold has been removed. Please note, it can take up to 48 hours before you can update to Windows 10, version 1903.

      Back to top
      OS Build 18362.116

      May 21, 2019
      KB4505057
      Resolved
      Resolved:
      July 11, 2019
      01:53 PM PT

      Opened:
      May 21, 2019
      07:38 AM PT
      - - + + + + + + - - - - @@ -95,7 +95,7 @@ sections: - type: markdown text: "
      SummaryOriginating updateStatusLast updated
      Windows Sandbox may fail to start with error code “0x80070002”
      Windows Sandbox may fail to start with \"ERROR_FILE_NOT_FOUND (0x80070002)\" on devices in which the operating system language was changed between updates

      See details >
      OS Build 18362.116

      May 20, 2019
      KB4505057
      Investigating
      KB4512941
      August 20, 2019
      11:06 AM PT
      Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
      Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

      See details >
      OS Build 18362.295

      August 13, 2019
      KB4512508
      Investigating
      KB4512941
      August 17, 2019
      01:49 PM PT
      Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
      Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

      See details >
      OS Build 18362.295

      August 13, 2019
      KB4512508
      Resolved
      KB4512941
      August 30, 2019
      10:00 AM PT
      Issues updating when certain versions of Intel storage drivers are installed
      Certain versions of Intel Rapid Storage Technology (Intel RST) drivers may cause updating to Windows 10, version 1903 to fail.

      See details >
      OS Build 18362.145

      May 29, 2019
      KB4497935
      Resolved
      KB4512941
      August 30, 2019
      10:00 AM PT
      Initiating a Remote Desktop connection may result in black screen
      When initiating a Remote Desktop connection to devices with some older GPU drivers, you may receive a black screen.

      See details >
      OS Build 18362.145

      May 29, 2019
      KB4497935
      Resolved
      KB4512941
      August 30, 2019
      10:00 AM PT
      Windows Sandbox may fail to start with error code “0x80070002”
      Windows Sandbox may fail to start with \"ERROR_FILE_NOT_FOUND (0x80070002)\" on devices in which the operating system language was changed between updates

      See details >
      OS Build 18362.116

      May 20, 2019
      KB4505057
      Resolved
      KB4512941
      August 30, 2019
      10:00 AM PT
      Devices starting using PXE from a WDS or SCCM servers may fail to start
      Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

      See details >
      OS Build 18362.175

      June 11, 2019
      KB4503293
      Resolved
      KB4512941
      August 30, 2019
      10:00 AM PT
      Domain connected devices that use MIT Kerberos realms will not start up
      Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

      See details >
      OS Build 18362.145

      May 29, 2019
      KB4497935
      Resolved
      KB4512941
      August 30, 2019
      10:00 AM PT
      Updates may fail to install and you may receive Error 0x80073701
      Installation of updates may fail and you may receive an error, \"Updates Failed, There were problems installing some updates, but we'll try again later\" and \"Error 0x80073701.\"

      See details >
      OS Build 18362.145

      May 29, 2019
      KB4497935
      Investigating
      August 16, 2019
      04:28 PM PT
      Domain connected devices that use MIT Kerberos realms will not start up
      Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

      See details >
      OS Build 18362.145

      May 29, 2019
      KB4497935
      Investigating
      KB4512941
      August 13, 2019
      06:59 PM PT
      MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
      You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

      See details >
      OS Build 18362.175

      June 11, 2019
      KB4503293
      Resolved External
      August 09, 2019
      07:03 PM PT
      Issues updating when certain versions of Intel storage drivers are installed
      Certain versions of Intel Rapid Storage Technology (Intel RST) drivers may cause updating to Windows 10, version 1903 to fail.

      See details >
      OS Build 18362.145

      May 29, 2019
      KB4497935
      Mitigated External
      August 09, 2019
      07:03 PM PT
      Intermittent loss of Wi-Fi connectivity
      Some older devices may experience loss of Wi-Fi connectivity due to an outdated Qualcomm driver.

      See details >
      OS Build 18362.116

      May 21, 2019
      KB4505057
      Mitigated External
      August 01, 2019
      08:44 PM PT
      Gamma ramps, color profiles, and night light settings do not apply in some cases
      Microsoft has identified some scenarios where gamma ramps, color profiles and night light settings may stop working.

      See details >
      OS Build 18362.116

      May 21, 2019
      KB4505057
      Mitigated
      August 01, 2019
      06:27 PM PT
      Display brightness may not respond to adjustments
      Microsoft and Intel have identified a driver compatibility issue on devices configured with certain Intel display drivers.

      See details >
      OS Build 18362.116

      May 21, 2019
      KB4505057
      Resolved
      KB4505903
      July 26, 2019
      02:00 PM PT
      The dGPU may occasionally disappear from device manager on Surface Book 2 with dGPU
      Some apps or games that needs to perform graphics intensive operations may close or fail to open on Surface Book 2 devices with Nvidia dGPU.

      See details >
      OS Build 18362.145

      May 29, 2019
      KB4497935
      Investigating
      July 16, 2019
      09:04 AM PT
      Initiating a Remote Desktop connection may result in black screen
      When initiating a Remote Desktop connection to devices with some older GPU drivers, you may receive a black screen.

      See details >
      OS Build 18362.145

      May 29, 2019
      KB4497935
      Investigating
      KB4512941
      July 12, 2019
      04:42 PM PT
      Devices starting using PXE from a WDS or SCCM servers may fail to start
      Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

      See details >
      OS Build 18362.175

      June 11, 2019
      KB4503293
      Mitigated
      KB4512941
      July 10, 2019
      07:09 PM PT
      Unable to discover or connect to Bluetooth devices
      Microsoft has identified compatibility issues with some versions of Realtek and Qualcomm Bluetooth radio drivers.

      See details >
      OS Build 18362.116

      May 21, 2019
      KB4505057
      Mitigated
      May 21, 2019
      04:48 PM PT
      Intel Audio displays an intcdaud.sys notification
      Microsoft and Intel have identified an issue with a range of Intel Display Audio device drivers that may result in battery drain.

      See details >
      OS Build 18362.116

      May 21, 2019
      KB4505057
      Mitigated
      May 21, 2019
      04:47 PM PT
      Cannot launch Camera app
      Microsoft and Intel have identified an issue affecting Intel RealSense SR300 or Intel RealSense S200 camera apps.

      See details >
      OS Build 18362.116

      May 21, 2019
      KB4505057
      Mitigated
      May 21, 2019
      04:47 PM PT
      - +
      DetailsOriginating updateStatusHistory
      Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
      After installing KB4512508, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

      Affected platforms:
      • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
      • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
      Next steps: Microsoft is working on a resolution and estimates a solution will be available late August. The ‘optional’ update will be available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive the update once it is released.

      Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS).

      Back to top
      OS Build 18362.295

      August 13, 2019
      KB4512508
      Investigating
      KB4512941
      Last updated:
      August 17, 2019
      01:49 PM PT

      Opened:
      August 14, 2019
      03:34 PM PT
      Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
      After installing KB4512508, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

      Affected platforms:
      • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
      • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
      Resolution: This issue was resolved in KB4512941. The ‘optional’ update is available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive KB4512941 and install. For instructions, see Update Windows 10.

      Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS).

      Back to top
      OS Build 18362.295

      August 13, 2019
      KB4512508
      Resolved
      KB4512941
      Resolved:
      August 30, 2019
      10:00 AM PT

      Opened:
      August 14, 2019
      03:34 PM PT
      Updates may fail to install and you may receive Error 0x80073701
      Installation of updates may fail and you may receive the error message, \"Updates Failed, There were problems installing some updates, but we'll try again later\" or \"Error 0x80073701\" on the Windows Update dialog or within Update history.

      Affected platforms:
      • Client: Windows 10, version 1903
      • Server: Windows Server, version 1903
      Next steps: We are working on a resolution and will provide an update in an upcoming release.

      Back to top
      OS Build 18362.145

      May 29, 2019
      KB4497935
      Investigating
      Last updated:
      August 16, 2019
      04:28 PM PT

      Opened:
      August 16, 2019
      01:41 PM PT
      MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
      You may receive an error on your Apple MacOS device when trying to access network shares via CIFS or SMBv1 on a Windows devices that has installed updates on June 11, 2019 (KB4503293) or later. When you encounter this issue, in MacOS you may receive the error, “There was a problem connecting to the server “{Server Host Name}”. Check the server name or IP address, and then try again. If you continue to have problems, contact your system administrator.”

      Affected platforms:
      • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
      • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
      Resolution: For guidance on this issue, see the Apple support article If your Mac can't use NTLM to connect to a Windows server. There is no update for Windows needed for this issue.

      Back to top
      OS Build 18362.175

      June 11, 2019
      KB4503293
      Resolved External
      Last updated:
      August 09, 2019
      07:03 PM PT

      Opened:
      August 09, 2019
      04:25 PM PT
      @@ -106,12 +106,12 @@ sections: - type: markdown text: " - - + + + + - -
      DetailsOriginating updateStatusHistory
      Domain connected devices that use MIT Kerberos realms will not start up
      Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4497935. Devices that are domain controllers or domain members are both affected.

      To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

      Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
      HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
      -

      Affected platforms:
      • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
      • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
      Next steps: At this time, we suggest that devices in an affected environment do not install KB4497935. We are working on a resolution and estimate a solution will be available in late August.

      Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

      Back to top
      OS Build 18362.145

      May 29, 2019
      KB4497935
      Investigating
      KB4512941
      Last updated:
      August 13, 2019
      06:59 PM PT

      Opened:
      July 25, 2019
      06:10 PM PT
      Issues updating when certain versions of Intel storage drivers are installed
      Intel and Microsoft have found incompatibility issues with certain versions of the Intel Rapid Storage Technology (Intel RST) drivers and the Windows 10 May 2019 Update (Windows 10, version 1903).  

      To safeguard your update experience, we have applied a compatibility hold on devices with Intel RST drivers, versions 15.1.0.1002 through version 15.5.2.1053 installed from installing or being offered Windows 10, version 1903 or Windows Server, version 1903, until the driver has been updated.

      Versions 15.5.2.1054 or later are compatible, and a device that has these drivers installed can install the Windows 10 May 2019 Update. For affected devices, the recommended version is 15.9.8.1050.

      Affected platforms:
      • Client: Windows 10, version 1903
      • Server: Windows Server, version 1903
      Workaround: To mitigate this issue before the resolution is released, you will need to update the Intel RST drivers for your device to version 15.5.2.1054 or a later.  Check with your device manufacturer (OEM) to see if an updated driver is available and install it. You can also download the latest Intel RST drivers directly from Intel at Intel® Rapid Storage Technology (Intel® RST) User Interface and Driver. Once your drivers are updated, you can restart the installation process for Windows 10, version 1903. Please note, it can take up to 48 hours before you can update to Windows 10, version 1903.

      Note Until an updated driver has been installed, we recommend you do not attempt to manually update using the Update now button or the Media Creation Tool. 

      Next Steps: We are working on a resolution and estimate a solution will be available in late August.

      Back to top
      OS Build 18362.145

      May 29, 2019
      KB4497935
      Mitigated External
      Last updated:
      August 09, 2019
      07:03 PM PT

      Opened:
      July 25, 2019
      06:10 PM PT
      Issues updating when certain versions of Intel storage drivers are installed
      Intel and Microsoft have found incompatibility issues with certain versions of the Intel Rapid Storage Technology (Intel RST) drivers and the Windows 10 May 2019 Update (Windows 10, version 1903).  

      To safeguard your update experience, we have applied a compatibility hold on devices with Intel RST drivers, versions 15.1.0.1002 through version 15.5.2.1053 installed from installing or being offered Windows 10, version 1903 or Windows Server, version 1903, until the driver has been updated.

      Versions 15.5.2.1054 or later are compatible, and a device that has these drivers installed can install the Windows 10 May 2019 Update. For affected devices, the recommended version is 15.9.8.1050.

      Affected platforms:
      • Client: Windows 10, version 1903
      • Server: Windows Server, version 1903
      Workaround: To mitigate this issue before the safeguard hold is removed, you will need to update the Intel RST drivers for your device to version 15.5.2.1054 or a later.  Check with your device manufacturer (OEM) to see if an updated driver is available and install it. You can also download the latest Intel RST drivers directly from Intel at Intel® Rapid Storage Technology (Intel® RST) User Interface and Driver. Once your drivers are updated, you can restart the installation process for Windows 10, version 1903. Please note, it can take up to 48 hours before you can update to Windows 10, version 1903.

      Resolution: This issue was resolved in KB4512941. The safeguard hold is estimated to be removed in early September.

      Back to top
      OS Build 18362.145

      May 29, 2019
      KB4497935
      Resolved
      KB4512941
      Resolved:
      August 30, 2019
      10:00 AM PT

      Opened:
      July 25, 2019
      06:10 PM PT
      Initiating a Remote Desktop connection may result in black screen
      When initiating a Remote Desktop connection to devices with some older GPU drivers, you may receive a black screen. Any version of Windows may encounter this issue when initiating a Remote Desktop connection to a Windows 10, version 1903 device which is running an affected display driver, including the drivers for the Intel 4 series chipset integrated GPU (iGPU).

      Affected platforms:
      • Client: Windows 10, version 1903
      • Server: Windows Server, version 1903
      Resolution: This issue was resolved in KB4512941.

      Back to top
      OS Build 18362.145

      May 29, 2019
      KB4497935
      Resolved
      KB4512941
      Resolved:
      August 30, 2019
      10:00 AM PT

      Opened:
      July 12, 2019
      04:42 PM PT
      Devices starting using PXE from a WDS or SCCM servers may fail to start
      Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503293 on a WDS server.

      Affected platforms:
      • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
      Resolution: This issue was resolved in KB4512941.

      Back to top
      OS Build 18362.175

      June 11, 2019
      KB4503293
      Resolved
      KB4512941
      Resolved:
      August 30, 2019
      10:00 AM PT

      Opened:
      July 10, 2019
      02:51 PM PT
      Domain connected devices that use MIT Kerberos realms will not start up
      Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4497935. Devices that are domain controllers or domain members are both affected.

      To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

      Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
      HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
      +

      Affected platforms:
      • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
      • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
      Resolution: This issue was resolved in KB4512941. The safeguard hold is estimated to be removed in early September.

      Back to top
      OS Build 18362.145

      May 29, 2019
      KB4497935
      Resolved
      KB4512941
      Resolved:
      August 30, 2019
      10:00 AM PT

      Opened:
      July 25, 2019
      06:10 PM PT
      The dGPU may occasionally disappear from device manager on Surface Book 2 with dGPU
      Microsoft has identified a compatibility issue on some Surface Book 2 devices configured with Nvidia discrete graphics processing unit (dGPU). After updating to Windows 10, version 1903 (May 2019 Feature Update), some apps or games that needs to perform graphics intensive operations may close or fail to open.

      To safeguard your update experience, we have applied a compatibility hold on Surface Book 2 devices with Nvidia dGPUs from being offered Windows 10, version 1903, until this issue is resolved.

      Affected platforms:
      • Client: Windows 10, version 1903
      Workaround: To mitigate the issue if you are already on Windows 10, version 1903, you can restart the device or select the Scan for hardware changes button in the Action menu or on the toolbar in Device Manager.

      Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

      Next steps: We are working on a resolution and will provide an update in an upcoming release.

      Back to top
      OS Build 18362.145

      May 29, 2019
      KB4497935
      Investigating
      Last updated:
      July 16, 2019
      09:04 AM PT

      Opened:
      July 12, 2019
      04:20 PM PT
      Initiating a Remote Desktop connection may result in black screen
      When initiating a Remote Desktop connection to devices with some older GPU drivers, you may receive a black screen. Any version of Windows may encounter this issue when initiating a Remote Desktop connection to a Windows 10, version 1903 device which is running an affected display driver, including the drivers for the Intel 4 series chipset integrated GPU (iGPU).

      Affected platforms:
      • Client: Windows 10, version 1903
      • Server: Windows Server, version 1903
      Next steps: We are working on a resolution that will be made available in upcoming release.

      Back to top
      OS Build 18362.145

      May 29, 2019
      KB4497935
      Investigating
      KB4512941
      Last updated:
      July 12, 2019
      04:42 PM PT

      Opened:
      July 12, 2019
      04:42 PM PT
      Devices starting using PXE from a WDS or SCCM servers may fail to start
      Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503293 on a WDS server.

      Affected platforms:
      • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
      Workaround:
      To mitigate this issue on an SCCM server:
      1. Verify Variable Window Extension is enabled.
      2. Set the values of TFTP block size to 4096 and TFTP window size to 1. For guidance on how to configure them, see Customize the RamDisk TFTP block and window sizes on PXE-enabled distribution points.
      Note Try the default values for TFTP block size and TFTP window size first but depending on your environment and overall settings, you may need to adjust them for your setup. You can also try the Enable a PXE responder without Windows Deployment Service setting. For more information on this setting, see Install and configure distribution points in Configuration Manager.

      To mitigate this issue on a WDS server without SCCM:
      1. In WDS TFTP settings, verify Variable Window Extension is enabled.
      2. In the Boot Configuration Data (BCD) of the imported image, set RamDiskTFTPBlockSize to 1456.
      3. In the BCD of the imported image, set RamDiskTFTPWindowSize to 4.
      Note Try the default values for RamDiskTFTPBlockSize and RamDiskTFTPWindowSize first but depending on your environment and overall settings, you may need to adjust them for your setup.

      Next steps: We are working on a resolution and will provide an update in an upcoming release.

      Back to top
      OS Build 18362.175

      June 11, 2019
      KB4503293
      Mitigated
      KB4512941
      Last updated:
      July 10, 2019
      07:09 PM PT

      Opened:
      July 10, 2019
      02:51 PM PT
      " @@ -120,7 +120,7 @@ sections: - type: markdown text: " - + diff --git a/windows/release-information/windows-message-center.yml b/windows/release-information/windows-message-center.yml index eee75f9b25..2785208d7d 100644 --- a/windows/release-information/windows-message-center.yml +++ b/windows/release-information/windows-message-center.yml @@ -50,6 +50,7 @@ sections: text: "
      DetailsOriginating updateStatusHistory
      Windows Sandbox may fail to start with error code “0x80070002”
      Windows Sandbox may fail to start with \"ERROR_FILE_NOT_FOUND (0x80070002)\" on devices in which the operating system language is changed during the update process when installing Windows 10, version 1903.

      Affected platforms:
      • Client: Windows 10, version 1903
      Next steps: We are working on a resolution and estimates a solution will be available in late August.

      Back to top
      OS Build 18362.116

      May 20, 2019
      KB4505057
      Investigating
      KB4512941
      Last updated:
      August 20, 2019
      11:06 AM PT

      Opened:
      May 24, 2019
      04:20 PM PT
      Windows Sandbox may fail to start with error code “0x80070002”
      Windows Sandbox may fail to start with \"ERROR_FILE_NOT_FOUND (0x80070002)\" on devices in which the operating system language is changed during the update process when installing Windows 10, version 1903.

      Affected platforms:
      • Client: Windows 10, version 1903
      Resolution: This issue was resolved in KB4512941.

      Back to top
      OS Build 18362.116

      May 20, 2019
      KB4505057
      Resolved
      KB4512941
      Resolved:
      August 30, 2019
      10:00 AM PT

      Opened:
      May 24, 2019
      04:20 PM PT
      Intermittent loss of Wi-Fi connectivity
      Some older computers may experience loss of Wi-Fi connectivity due to an outdated Qualcomm driver. An updated Wi-Fi driver should be available from your device manufacturer (OEM).

      To safeguard your upgrade experience, we have applied a hold on devices with this Qualcomm driver from being offered Windows 10, version 1903, until the updated driver is installed.

      Affected platforms:
      • Client: Windows 10, version 1903
      Workaround: Before updating to Windows 10, version 1903, you will need to download and install an updated Wi-Fi driver from your device manufacturer (OEM).
       
      Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until a new driver has been installed and the Windows 10, version 1903 feature update has been automatically offered to you.

      Back to top
      OS Build 18362.116

      May 21, 2019
      KB4505057
      Mitigated External
      Last updated:
      August 01, 2019
      08:44 PM PT

      Opened:
      May 21, 2019
      07:13 AM PT
      Gamma ramps, color profiles, and night light settings do not apply in some cases
      Microsoft has identified some scenarios where gamma ramps, color profiles and night light settings may stop working.

      Microsoft has identified some scenarios in which these features may have issues or stop working, for example:
      • Connecting to (or disconnecting from) an external monitor, dock, or projector
      • Rotating the screen
      • Updating display drivers or making other display mode changes
      • Closing full screen applications
      • Applying custom color profiles
      • Running applications that rely on custom gamma ramps
      Affected platforms:
      • Client: Windows 10, version 1903
      Workaround: If you find that your night light has stopped working, try turning the night light off and on, or restarting your computer. For other color setting issues, restart your computer to correct the issue.

      Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

      Next steps: We are working on a resolution and will provide an update in an upcoming release.

      Back to top
      OS Build 18362.116

      May 21, 2019
      KB4505057
      Mitigated
      Last updated:
      August 01, 2019
      06:27 PM PT

      Opened:
      May 21, 2019
      07:28 AM PT
      Display brightness may not respond to adjustments
      Microsoft and Intel have identified a driver compatibility issue on devices configured with certain Intel display drivers. After updating to Windows 10, version 1903, brightness settings may sometime appear as if changes applied took effect, yet the actual display brightness doesn't change.

      To safeguard your update experience, we have applied a compatibility hold on devices with certain Intel drivers from being offered Windows 10, version 1903, until this issue is resolved.

      Affected platforms:
      • Client: Windows 10, version 1903
      Resolution: This issue was resolved in KB4505903 and the safeguard hold has been removed. Please ensure you have applied the resolving update before attempting to update to the Windows 10 May 2019 Update (version 1903). Please note, it can take up to 48 hours for the safeguard to be removed.

      Back to top
      OS Build 18362.116

      May 21, 2019
      KB4505057
      Resolved
      KB4505903
      Resolved:
      July 26, 2019
      02:00 PM PT

      Opened:
      May 21, 2019
      07:56 AM PT
      + From a3e8df7887360386fd8e2ca063a005b2d97f9467 Mon Sep 17 00:00:00 2001 From: illfated Date: Sun, 1 Sep 2019 14:02:42 +0200 Subject: [PATCH 068/285] Windows/What's New: amend broken link in See Also The first link under "See Also", "What's New in Windows Server, version 1903" , is broken because it points to the wrong directory for the file 'whats-new-in-windows-server-1903' which resides in the new directory /get-started-19/ instead of the old directory /get-started/. This directory difference is only present in the docs.microsoft.com pages, not on Github. The links are therefore pointing directly to the docs.microsoft.com pages instead of being relative to the Github directory structure. Broken link: https://docs.microsoft.com/windows-server/get-started/whats-new-in-windows-server-1903 Operative link: https://docs.microsoft.com/windows-server/get-started-19/whats-new-in-windows-server-1903 Closes #4784 --- windows/whats-new/whats-new-windows-10-version-1903.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/whats-new/whats-new-windows-10-version-1903.md b/windows/whats-new/whats-new-windows-10-version-1903.md index 0301b62f00..ffee11cd13 100644 --- a/windows/whats-new/whats-new-windows-10-version-1903.md +++ b/windows/whats-new/whats-new-windows-10-version-1903.md @@ -144,7 +144,7 @@ Several new features are coming in the next version of Edge. See the [news from ## See Also -[What's New in Windows Server, version 1903](https://docs.microsoft.com/windows-server/get-started/whats-new-in-windows-server-1903): New and updated features in Windows Server.
      +[What's New in Windows Server, version 1903](https://docs.microsoft.com/windows-server/get-started-19/whats-new-in-windows-server-1903): New and updated features in Windows Server.
      [Windows 10 Features](https://www.microsoft.com/windows/features): Review general information about Windows 10 features.
      [What's New in Windows 10](https://docs.microsoft.com/windows/whats-new/): See what’s new in other versions of Windows 10.
      [What's new in Windows 10](https://docs.microsoft.com/windows-hardware/get-started/what-s-new-in-windows): See what’s new in Windows 10 hardware.
      From 8a614b51efd80cfca739e6587d683bd0f07fd096 Mon Sep 17 00:00:00 2001 From: Zhanguo Tu Date: Mon, 2 Sep 2019 09:55:46 +0800 Subject: [PATCH 069/285] Update TOC.md --- mdop/mbam-v25/TOC.md | 1 + 1 file changed, 1 insertion(+) diff --git a/mdop/mbam-v25/TOC.md b/mdop/mbam-v25/TOC.md index a33c126e12..01a083b8b8 100644 --- a/mdop/mbam-v25/TOC.md +++ b/mdop/mbam-v25/TOC.md @@ -83,6 +83,7 @@ #### [Monitoring Web Service Request Performance Counters](monitoring-web-service-request-performance-counters.md) ### [Using Windows PowerShell to Administer MBAM 2.5](using-windows-powershell-to-administer-mbam-25.md) ## [Troubleshooting MBAM 2.5](troubleshooting-mbam-25.md) +### [Upgrade from MBAM 2.5 to MBAM 2.5 SP1](upgrade-mbam2.5-sp1.md) ## [Applying hotfixes on MBAM 2.5 SP1](apply-hotfix-for-mbam-25-sp1.md) ## [Technical Reference for MBAM 2.5](technical-reference-for-mbam-25.md) ### [Client Event Logs](client-event-logs.md) From 07d09292c1005a1b658720717ec4cd07b6a3151d Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Mon, 2 Sep 2019 09:25:55 +0500 Subject: [PATCH 070/285] Added multifactor unlock Added multifactor unlock feature update using Passport for work CSP. Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/4700 --- .../hello-for-business/feature-multifactor-unlock.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/identity-protection/hello-for-business/feature-multifactor-unlock.md b/windows/security/identity-protection/hello-for-business/feature-multifactor-unlock.md index 662c89648d..9f9b53626a 100644 --- a/windows/security/identity-protection/hello-for-business/feature-multifactor-unlock.md +++ b/windows/security/identity-protection/hello-for-business/feature-multifactor-unlock.md @@ -332,6 +332,7 @@ The Group Policy object contains the policy settings needed to trigger Windows H > * PIN **must** be in at least one of the groups > * Trusted signals **must** be combined with another credential provider > * You cannot use the same unlock factor to satisfy both categories. Therefore, if you include any credential provider in both categories, it means it can satisfy either category, but not both. +> * The multifactor unlock feature is also supported via the Passport for Work CSP, see [Passport For Work CSP](https://docs.microsoft.com/windows/client-management/mdm/passportforwork-csp). 1. Start the **Group Policy Management Console** (gpmc.msc) 2. Expand the domain and select the **Group Policy Object** node in the navigation pane. From 4c85b8800c95420fb095edb509032c63dbff1f63 Mon Sep 17 00:00:00 2001 From: VLG17 <41186174+VLG17@users.noreply.github.com> Date: Mon, 2 Sep 2019 11:58:00 +0300 Subject: [PATCH 071/285] Added policies for 1803 and 1809 (1903 not out yet) https://github.com/MicrosoftDocs/windows-itpro-docs/issues/3912 --- .../new-policies-for-windows-10.md | 226 ++++++++++++++++++ 1 file changed, 226 insertions(+) diff --git a/windows/client-management/new-policies-for-windows-10.md b/windows/client-management/new-policies-for-windows-10.md index 2c02926ece..35b4cfd10c 100644 --- a/windows/client-management/new-policies-for-windows-10.md +++ b/windows/client-management/new-policies-for-windows-10.md @@ -25,6 +25,232 @@ ms.topic: reference Windows 10 includes the following new policies for management. [Download the complete set of Administrative Template (.admx) files for Windows 10](https://www.microsoft.com/download/details.aspx?id=56121). + +## New Group Policy settings in Windows 10, version 1809 + +The following Group Policy settings were added in Windows 10, version 1809: + +**Start Menu and Taskbar** + +- Start Menu and Taskbar\Force Start to be either full screen size or menu size +- Start Menu and Taskbar\Remove "Recently added" list from Start Menu +- Start Menu and Taskbar\Remove All Programs list from the Start menu +- Start Menu and Taskbar\Remove frequent programs list from the Start Menu + +**System** + +- System\Group Policy\Allow asynchronous user Group Policy processing when logging on through Remote Desktop Services +- System\Group Policy\Configure Applications preference extension policy processing +- System\Group Policy\Configure Data Sources preference extension policy processing +- System\Group Policy\Configure Devices preference extension policy processing +- System\Group Policy\Configure Drive Maps preference extension policy processing +- System\Group Policy\Configure Environment preference extension policy processing +- System\Group Policy\Configure Files preference extension policy processing +- System\Group Policy\Configure Folder Options preference extension policy processing +- System\Group Policy\Configure Folders preference extension policy processing +- System\Group Policy\Configure Ini Files preference extension policy processing +- System\Group Policy\Configure Internet Settings preference extension policy processing +- System\Group Policy\Configure Local Users and Groups preference extension policy processing +- System\Group Policy\Configure Network Options preference extension policy processing +- System\Group Policy\Configure Network Shares preference extension policy processing +- System\Group Policy\Configure Power Options preference extension policy processing +- System\Group Policy\Configure Printers preference extension policy processing +- System\Group Policy\Configure Regional Options preference extension policy processing +- System\Group Policy\Configure Registry preference extension policy processing +- System\Group Policy\Configure Scheduled Tasks preference extension policy processing +- System\Group Policy\Configure Services preference extension policy processing +- System\Group Policy\Configure Shortcuts preference extension policy processing +- System\Group Policy\Configure Start Menu preference extension policy processing +- System\Group Policy\Logging and tracing\Configure Applications preference logging and tracing +- System\Group Policy\Logging and tracing\Configure Data Sources preference logging and tracing +- System\Group Policy\Logging and tracing\Configure Devices preference logging and tracing +- System\Group Policy\Logging and tracing\Configure Drive Maps preference logging and tracing +- System\Group Policy\Logging and tracing\Configure Environment preference logging and tracing +- System\Group Policy\Logging and tracing\Configure Files preference logging and tracing +- System\Group Policy\Logging and tracing\Configure Folder Options preference logging and tracing +- System\Group Policy\Logging and tracing\Configure Folders preference logging and tracing +- System\Group Policy\Logging and tracing\Configure Ini Files preference logging and tracing +- System\Group Policy\Logging and tracing\Configure Internet Settings preference logging and tracing +- System\Group Policy\Logging and tracing\Configure Local Users and Groups preference logging and tracing +- System\Group Policy\Logging and tracing\Configure Network Options preference logging and tracing +- System\Group Policy\Logging and tracing\Configure Network Shares preference logging and tracing +- System\Group Policy\Logging and tracing\Configure Power Options preference logging and tracing +- System\Group Policy\Logging and tracing\Configure Printers preference logging and tracing +- System\Group Policy\Logging and tracing\Configure Regional Options preference logging and tracing +- System\Group Policy\Logging and tracing\Configure Registry preference logging and tracing +- System\Group Policy\Logging and tracing\Configure Scheduled Tasks preference logging and tracing +- System\Group Policy\Logging and tracing\Configure Services preference logging and tracing +- System\Group Policy\Logging and tracing\Configure Shortcuts preference logging and tracing +- System\Group Policy\Logging and tracing\Configure Start Menu preference logging and tracing +- System\Kernel DMA Protection\Enumeration policy for external devices incompatible with Kernel DMA Protection +- System\OS Policies\Allow Clipboard History +- System\OS Policies\Allow Clipboard synchronization across devices + +**Windows Components** + +- Windows Components\Data Collection and Preview Builds\Configure Microsoft 365 Update Readiness upload endpoint +- Windows Components\Data Collection and Preview Builds\Disable deleting diagnostic data +- Windows Components\Data Collection and Preview Builds\Disable diagnostic data viewer. +- Windows Components\Delivery Optimization\[Reserved for future use] Cache Server Hostname +- Windows Components\Location and Sensors\Windows Location Provider\Turn off Windows Location Provider +- Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\DFS Management +- Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\File Server Resource Manager +- Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Share and Storage Management +- Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Storage Manager for SANs +- Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Extension snap-ins\DFS Management Extension +- Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Extension snap-ins\Disk Management Extension +- Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Extension snap-ins\File Server Resource Manager Extension +- Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Extension snap-ins\Share and Storage Management Extension +- Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Extension snap-ins\Storage Manager for SANS Extension +- Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Group Policy\Group Policy Management Editor +- Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Group Policy\Group Policy Starter GPO Editor +- Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Group Policy\Preference snap-in extensions\Permit use of Application snap-ins +- Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Group Policy\Preference snap-in extensions\Permit use of Applications preference extension +- Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Group Policy\Preference snap-in extensions\Permit use of Control Panel Settings (Computers) +- Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Group Policy\Preference snap-in extensions\Permit use of Control Panel Settings (Users) +- Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Group Policy\Preference snap-in extensions\Permit use of Data Sources preference extension +- Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Group Policy\Preference snap-in extensions\Permit use of Devices preference extension +- Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Group Policy\Preference snap-in extensions\Permit use of Drive Maps preference extension +- Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Group Policy\Preference snap-in extensions\Permit use of Environment preference extension +- Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Group Policy\Preference snap-in extensions\Permit use of Files preference extension +- Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Group Policy\Preference snap-in extensions\Permit use of Folder Options preference extension +- Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Group Policy\Preference snap-in extensions\Permit use of Folders preference extension +- Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Group Policy\Preference snap-in extensions\Permit use of Ini Files preference extension +- Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Group Policy\Preference snap-in extensions\Permit use of Internet Settings preference extension +- Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Group Policy\Preference snap-in extensions\Permit use of Local Users and Groups preference extension +- Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Group Policy\Preference snap-in extensions\Permit use of Network Options preference extension +- Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Group Policy\Preference snap-in extensions\Permit use of Network Shares preference extension +- Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Group Policy\Preference snap-in extensions\Permit use of Power Options preference extension +- Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Group Policy\Preference snap-in extensions\Permit use of Preferences tab +- Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Group Policy\Preference snap-in extensions\Permit use of Printers preference extension +- Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Group Policy\Preference snap-in extensions\Permit use of Regional Options preference extension +- Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Group Policy\Preference snap-in extensions\Permit use of Registry preference extension +- Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Group Policy\Preference snap-in extensions\Permit use of Scheduled Tasks preference extension +- Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Group Policy\Preference snap-in extensions\Permit use of Services preference extension +- Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Group Policy\Preference snap-in extensions\Permit use of Shortcuts preference extension +- Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Group Policy\Preference snap-in extensions\Permit use of Start Menu preference extension +- Windows Components\OOBE\Don't launch privacy settings experience on user logon +- Windows Components\OOBE\Don't launch privacy settings experience on user logon +- Windows Components\Remote Desktop Services\Remote Desktop Session Host\Application Compatibility\Do not use Remote Desktop Session Host server IP address when virtual IP address is not available +- Windows Components\Remote Desktop Services\Remote Desktop Session Host\Application Compatibility\Select the network adapter to be used for Remote Desktop IP Virtualization +- Windows Components\Remote Desktop Services\Remote Desktop Session Host\Application Compatibility\Turn off Windows Installer RDS Compatibility +- Windows Components\Remote Desktop Services\Remote Desktop Session Host\Application Compatibility\Turn on Remote Desktop IP Virtualization +- Windows Components\Remote Desktop Services\Remote Desktop Session Host\Connections\Allow remote start of unlisted programs +- Windows Components\Remote Desktop Services\Remote Desktop Session Host\Connections\Turn off Fair Share CPU Scheduling +- Windows Components\Remote Desktop Services\Remote Desktop Session Host\Device and Resource Redirection\Allow time zone redirection +- Windows Components\Remote Desktop Services\Remote Desktop Session Host\Device and Resource Redirection\Do not allow Clipboard redirection +- Windows Components\Remote Desktop Services\Remote Desktop Session Host\Printer Redirection\Redirect only the default client printer +- Windows Components\Remote Desktop Services\Remote Desktop Session Host\Printer Redirection\Redirect only the default client printer +- Windows Components\Remote Desktop Services\Remote Desktop Session Host\RD Connection Broker\Use RD Connection Broker load balancing +- Windows Components\Remote Desktop Services\Remote Desktop Session Host\Remote Session Environment\Allow desktop composition for remote desktop sessions +- Windows Components\Remote Desktop Services\Remote Desktop Session Host\Remote Session Environment\Always show desktop on connection +- Windows Components\Remote Desktop Services\Remote Desktop Session Host\Remote Session Environment\Do not allow font smoothing +- Windows Components\Remote Desktop Services\Remote Desktop Session Host\Remote Session Environment\Remove remote desktop wallpaper +- Windows Components\Remote Desktop Services\Remote Desktop Session Host\Session Time Limits\Set time limit for logoff of RemoteApp sessions +- Windows Components\Remote Desktop Services\Remote Desktop Session Host\Session Time Limits\Set time limit for logoff of RemoteApp sessions +- Windows Components\Windows Defender Antivirus\Configure detection for potentially unwanted applications +- Windows Components\Windows Defender Antivirus\Scan\Configure low CPU priority for scheduled scans +- Windows Components\Windows Defender Application Guard\Allow camera and microphone access in Windows Defender Application Guard +- Windows Components\Windows Defender Application Guard\Allow users to trust files that open in Windows Defender Application Guard +- Windows Components\Windows Defender Application Guard\Allow Windows Defender Application Guard to use Root Certificate Authorities from the user’s device +- Windows Components\Windows Defender Application Guard\Configure additional sources for untrusted files in Windows Defender Application Guard. +- Windows Components\Windows Hello for Business\Use Windows Hello for Business certificates as smart card certificates +- Windows Components\Windows Media Player\Do Not Show First Use Dialog Boxes +- Windows Components\Windows Media Player\Prevent Automatic Updates +- Windows Components\Windows Media Player\Prevent CD and DVD Media Information Retrieval +- Windows Components\Windows Media Player\Prevent Desktop Shortcut Creation +- Windows Components\Windows Media Player\Prevent Media Sharing +- Windows Components\Windows Media Player\Prevent Music File Media Information Retrieval +- Windows Components\Windows Media Player\Prevent Quick Launch Toolbar Shortcut Creation +- Windows Components\Windows Media Player\Prevent Radio Station Preset Retrieval +- Windows Components\Windows Media Player\Prevent Video Smoothing +- Windows Components\Windows Media Player\Networking\Configure HTTP Proxy +- Windows Components\Windows Media Player\Networking\Configure MMS Proxy +- Windows Components\Windows Media Player\Networking\Configure Network Buffering +- Windows Components\Windows Media Player\Networking\Configure RTSP Proxy +- Windows Components\Windows Media Player\Networking\Hide Network Tab +- Windows Components\Windows Media Player\Networking\Streaming Media Protocols +- Windows Components\Windows Media Player\Playback\Allow Screen Saver +- Windows Components\Windows Media Player\Playback\Prevent Codec Download +- Windows Components\Windows Media Player\User Interface\Do Not Show Anchor +- Windows Components\Windows Media Player\User Interface\Hide Privacy Tab +- Windows Components\Windows Media Player\User Interface\Hide Security Tab +- Windows Components\Windows Media Player\User Interface\Set and Lock Skin +- Windows Components\Windows Security\Account protection\Hide the Account protection area +- Windows Components\Windows Security\App and browser protection\Hide the App and browser protection area +- Windows Components\Windows Security\App and browser protection\Prevent users from modifying settings +- Windows Components\Windows Security\Device performance and health\Hide the Device performance and health area +- Windows Components\Windows Security\Device security\Disable the Clear TPM button +- Windows Components\Windows Security\Device security\Hide the Device security area +- Windows Components\Windows Security\Device security\Hide the Secure boot area +- Windows Components\Windows Security\Device security\Hide the Security processor (TPM) troubleshooter page +- Windows Components\Windows Security\Device security\Hide the TPM Firmware Update recommendation. +- Windows Components\Windows Security\Enterprise Customization\Configure customized contact information +- Windows Components\Windows Security\Enterprise Customization\Configure customized notifications +- Windows Components\Windows Security\Enterprise Customization\Specify contact company name +- Windows Components\Windows Security\Enterprise Customization\Specify contact email address or Email ID +- Windows Components\Windows Security\Enterprise Customization\Specify contact phone number or Skype ID +- Windows Components\Windows Security\Enterprise Customization\Specify contact website +- Windows Components\Windows Security\Family options\Hide the Family options area +- Windows Components\Windows Security\Firewall and network protection\Hide the Firewall and network protection area +- Windows Components\Windows Security\Notifications\Hide all notifications +- Windows Components\Windows Security\Notifications\Hide non-critical notifications +- Windows Components\Windows Security\Systray\Hide Windows Security Systray +- Windows Components\Windows Security\Virus and threat protection\Hide the Ransomware data recovery area +- Windows Components\Windows Security\Virus and threat protection\Hide the Virus and threat protection area +- Windows Components\Windows Update\Display options for update notifications +- Windows Components\Windows Update\Remove access to "Pause updates" feature + +**Control Panel** + +- Control Panel\Settings Page Visibility +- Control Panel\Regional and Language Options\Allow users to enable online speech recognition services + +**Network** + +- Network\Windows Connection Manager\Enable Windows to soft-disconnect a computer from a network + + +## New Group Policy settings in Windows 10, version 1803 + +The following Group Policy settings were added in Windows 10, version 1803: + +**System* + +- System\Credentials Delegation\Encryption Oracle Remediation +- System\Group Policy\Phone-PC linking on this device +- System\OS Policies\Allow upload of User Activities + +**Windows Components* + +- Windows Components\App Privacy\Let Windows apps access an eye tracker device +- Windows Components\Cloud Content\Turn off Windows Spotlight on Settings +- Windows Components\Data Collection and Preview Builds\Allow device name to be sent in Windows diagnostic data +- Windows Components\Data Collection and Preview Builds\Configure telemetry opt-in setting user interface +- Windows Components\Data Collection and Preview Builds\Configure telemetry opt-in change notifications +- Windows Components\Delivery Optimization\Maximum Background Download Bandwidth (percentage) +- Windows Components\Delivery Optimization\Maximum Foreground Download Bandwidth (percentage) +- Windows Components\Delivery Optimization\Select the source of Group IDs +- Windows Components\Delivery Optimization\Delay background download from http (in secs) +- Windows Components\Delivery Optimization\Delay Foreground download from http (in secs) +- Windows Components\Delivery Optimization\Select a method to restrict Peer Selection +- Windows Components\Delivery Optimization\Set Business Hours to Limit Background Download Bandwidth +- Windows Components\Delivery Optimization\Set Business Hours to Limit Foreground Download Bandwidth +- Windows Components\IME\Turn on Live Sticker +- Windows Components\Remote Desktop Services\Remote Desktop Session Host\Device and Resource Redirection\Do not allow video capture redirection +- Windows Components\Remote Desktop Services\Remote Desktop Session Host\Remote Session Environment\Use hardware graphics adapters for all Remote Desktop Services sessions +- Windows Components\Search\Allow Cortana Page in OOBE on an AAD account +- Windows Components\Store\Disable all apps from Microsoft Store +- Windows Components\Text Input\Allow Uninstallation of Language Features +- Windows Components\Text Input\Improve inking and typing recognition +- Windows Components\Windows Defender Application Guard\Allow hardware-accelerated rendering for Windows Defender Application Guard +- Windows Components\Windows Defender Security Center\Account protection\Hide the Account protection area +- Windows Components\Windows Defender Security Center\Device security\Hide the Device security area +- Windows Components\Windows Defender Security Center\Device security\Hide the Security processor (TPM) troubleshooter page +- Windows Components\Windows Defender Security Center\Device security\Hide the Secure boot area +- Windows Components\Windows Defender Security Center\Virus and threat protection\Hide the Ransomware data recovery area + + ## New Group Policy settings in Windows 10, version 1709 The following Group Policy settings were added in Windows 10, version 1709: From 88cee50f852809e5743db575b710fe65c623ca15 Mon Sep 17 00:00:00 2001 From: Tom Henderson Date: Tue, 3 Sep 2019 08:16:55 +1200 Subject: [PATCH 072/285] Fix typo --- .../auditing/audit-token-right-adjusted.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/auditing/audit-token-right-adjusted.md b/windows/security/threat-protection/auditing/audit-token-right-adjusted.md index 560a49db64..714fa80c3b 100644 --- a/windows/security/threat-protection/auditing/audit-token-right-adjusted.md +++ b/windows/security/threat-protection/auditing/audit-token-right-adjusted.md @@ -16,9 +16,9 @@ For more information, see [Security Monitoring: A Possible New Way to Detect Pri | Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments | |-------------------|-----------------|-----------------|------------------|------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| -| Domain Controller | IF | No | IF | No | IF – With Success auditing for this subcategory, you can get information related to changes to the proveleges of a token.
      However, if you are using an application or system service that dynamically adjusts token privileges, we do not recommend Success auditing because of the high volume of event “[4703](event-4703.md)(S): A user right was adjusted” that may be generated. As of Windows 10, event 4703 is generated by applications or services that dynamically adjust token privileges. An example of such an application is System Center Configuration Manager, which makes WMI queries at recurring intervals and quickly generates a large number of 4703 events (with the WMI activity listed as coming from **svchost.exe**).
      If one of your applications or services is generating a large number of 4703 events, you might find that your event-management software has filtering logic that can automatically discard the recurring events, which would make it easier to work with Success auditing for this category.
      This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. | -| Member Server | IF | No | IF | No | IF – With Success auditing for this subcategory, you can get information related to changes to the proveleges of a token.
      However, if you are using an application or system service that dynamically adjusts token privileges, we do not recommend Success auditing because of the high volume of event “[4703](event-4703.md)(S): A user right was adjusted” that may be generated. As of Windows 10, event 4703 is generated by applications or services that dynamically adjust token privileges. An example of such an application is System Center Configuration Manager, which makes WMI queries at recurring intervals and quickly generates a large number of 4703 events (with the WMI activity listed as coming from **svchost.exe**).
      If one of your applications or services is generating a large number of 4703 events, you might find that your event-management software has filtering logic that can automatically discard the recurring events, which would make it easier to work with Success auditing for this category.
      This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. | -| Workstation | IF | No | IF | No | IF – With Success auditing for this subcategory, you can get information related to changes to the proveleges of a token.
      However, if you are using an application or system service that dynamically adjusts token privileges, we do not recommend Success auditing because of the high volume of event “[4703](event-4703.md)(S): A user right was adjusted” that may be generated. As of Windows 10, event 4703 is generated by applications or services that dynamically adjust token privileges. An example of such an application is System Center Configuration Manager, which makes WMI queries at recurring intervals and quickly generates a large number of 4703 events (with the WMI activity listed as coming from **svchost.exe**).
      If one of your applications or services is generating a large number of 4703 events, you might find that your event-management software has filtering logic that can automatically discard the recurring events, which would make it easier to work with Success auditing for this category.
      This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. | +| Domain Controller | IF | No | IF | No | IF – With Success auditing for this subcategory, you can get information related to changes to the priveleges of a token.
      However, if you are using an application or system service that dynamically adjusts token privileges, we do not recommend Success auditing because of the high volume of event “[4703](event-4703.md)(S): A user right was adjusted” that may be generated. As of Windows 10, event 4703 is generated by applications or services that dynamically adjust token privileges. An example of such an application is System Center Configuration Manager, which makes WMI queries at recurring intervals and quickly generates a large number of 4703 events (with the WMI activity listed as coming from **svchost.exe**).
      If one of your applications or services is generating a large number of 4703 events, you might find that your event-management software has filtering logic that can automatically discard the recurring events, which would make it easier to work with Success auditing for this category.
      This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. | +| Member Server | IF | No | IF | No | IF – With Success auditing for this subcategory, you can get information related to changes to the priveleges of a token.
      However, if you are using an application or system service that dynamically adjusts token privileges, we do not recommend Success auditing because of the high volume of event “[4703](event-4703.md)(S): A user right was adjusted” that may be generated. As of Windows 10, event 4703 is generated by applications or services that dynamically adjust token privileges. An example of such an application is System Center Configuration Manager, which makes WMI queries at recurring intervals and quickly generates a large number of 4703 events (with the WMI activity listed as coming from **svchost.exe**).
      If one of your applications or services is generating a large number of 4703 events, you might find that your event-management software has filtering logic that can automatically discard the recurring events, which would make it easier to work with Success auditing for this category.
      This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. | +| Workstation | IF | No | IF | No | IF – With Success auditing for this subcategory, you can get information related to changes to the priveleges of a token.
      However, if you are using an application or system service that dynamically adjusts token privileges, we do not recommend Success auditing because of the high volume of event “[4703](event-4703.md)(S): A user right was adjusted” that may be generated. As of Windows 10, event 4703 is generated by applications or services that dynamically adjust token privileges. An example of such an application is System Center Configuration Manager, which makes WMI queries at recurring intervals and quickly generates a large number of 4703 events (with the WMI activity listed as coming from **svchost.exe**).
      If one of your applications or services is generating a large number of 4703 events, you might find that your event-management software has filtering logic that can automatically discard the recurring events, which would make it easier to work with Success auditing for this category.
      This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. | **Events List:** From ed256e81f4283620414f325b25c53c0c153b1f9a Mon Sep 17 00:00:00 2001 From: Tom Henderson Date: Tue, 3 Sep 2019 09:50:58 +1200 Subject: [PATCH 073/285] Actually fix typos --- .../auditing/audit-token-right-adjusted.md | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/windows/security/threat-protection/auditing/audit-token-right-adjusted.md b/windows/security/threat-protection/auditing/audit-token-right-adjusted.md index 714fa80c3b..1a3e4c8136 100644 --- a/windows/security/threat-protection/auditing/audit-token-right-adjusted.md +++ b/windows/security/threat-protection/auditing/audit-token-right-adjusted.md @@ -1,6 +1,6 @@ --- title: Audit Token Right Adjusted (Windows 10) -description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Token Right Adjusted, which determines whether the operating system generates audit events when specific changes are made to the priveleges of a token. +description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Token Right Adjusted, which determines whether the operating system generates audit events when specific changes are made to the privileges of a token. --- # Audit Token Right Adjusted @@ -10,15 +10,15 @@ description: This topic for the IT professional describes the Advanced Security - Windows Server 2016 -Audit Token Right Adjusted allows you to audit events generated by adjusting the priveleges of a token. +Audit Token Right Adjusted allows you to audit events generated by adjusting the privileges of a token. For more information, see [Security Monitoring: A Possible New Way to Detect Privilege Escalation](https://blogs.technet.microsoft.com/nathangau/2018/01/25/security-monitoring-a-possible-new-way-to-detect-privilege-escalation/) | Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments | |-------------------|-----------------|-----------------|------------------|------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| -| Domain Controller | IF | No | IF | No | IF – With Success auditing for this subcategory, you can get information related to changes to the priveleges of a token.
      However, if you are using an application or system service that dynamically adjusts token privileges, we do not recommend Success auditing because of the high volume of event “[4703](event-4703.md)(S): A user right was adjusted” that may be generated. As of Windows 10, event 4703 is generated by applications or services that dynamically adjust token privileges. An example of such an application is System Center Configuration Manager, which makes WMI queries at recurring intervals and quickly generates a large number of 4703 events (with the WMI activity listed as coming from **svchost.exe**).
      If one of your applications or services is generating a large number of 4703 events, you might find that your event-management software has filtering logic that can automatically discard the recurring events, which would make it easier to work with Success auditing for this category.
      This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. | -| Member Server | IF | No | IF | No | IF – With Success auditing for this subcategory, you can get information related to changes to the priveleges of a token.
      However, if you are using an application or system service that dynamically adjusts token privileges, we do not recommend Success auditing because of the high volume of event “[4703](event-4703.md)(S): A user right was adjusted” that may be generated. As of Windows 10, event 4703 is generated by applications or services that dynamically adjust token privileges. An example of such an application is System Center Configuration Manager, which makes WMI queries at recurring intervals and quickly generates a large number of 4703 events (with the WMI activity listed as coming from **svchost.exe**).
      If one of your applications or services is generating a large number of 4703 events, you might find that your event-management software has filtering logic that can automatically discard the recurring events, which would make it easier to work with Success auditing for this category.
      This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. | -| Workstation | IF | No | IF | No | IF – With Success auditing for this subcategory, you can get information related to changes to the priveleges of a token.
      However, if you are using an application or system service that dynamically adjusts token privileges, we do not recommend Success auditing because of the high volume of event “[4703](event-4703.md)(S): A user right was adjusted” that may be generated. As of Windows 10, event 4703 is generated by applications or services that dynamically adjust token privileges. An example of such an application is System Center Configuration Manager, which makes WMI queries at recurring intervals and quickly generates a large number of 4703 events (with the WMI activity listed as coming from **svchost.exe**).
      If one of your applications or services is generating a large number of 4703 events, you might find that your event-management software has filtering logic that can automatically discard the recurring events, which would make it easier to work with Success auditing for this category.
      This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. | +| Domain Controller | IF | No | IF | No | IF – With Success auditing for this subcategory, you can get information related to changes to the privileges of a token.
      However, if you are using an application or system service that dynamically adjusts token privileges, we do not recommend Success auditing because of the high volume of event “[4703](event-4703.md)(S): A user right was adjusted” that may be generated. As of Windows 10, event 4703 is generated by applications or services that dynamically adjust token privileges. An example of such an application is System Center Configuration Manager, which makes WMI queries at recurring intervals and quickly generates a large number of 4703 events (with the WMI activity listed as coming from **svchost.exe**).
      If one of your applications or services is generating a large number of 4703 events, you might find that your event-management software has filtering logic that can automatically discard the recurring events, which would make it easier to work with Success auditing for this category.
      This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. | +| Member Server | IF | No | IF | No | IF – With Success auditing for this subcategory, you can get information related to changes to the privileges of a token.
      However, if you are using an application or system service that dynamically adjusts token privileges, we do not recommend Success auditing because of the high volume of event “[4703](event-4703.md)(S): A user right was adjusted” that may be generated. As of Windows 10, event 4703 is generated by applications or services that dynamically adjust token privileges. An example of such an application is System Center Configuration Manager, which makes WMI queries at recurring intervals and quickly generates a large number of 4703 events (with the WMI activity listed as coming from **svchost.exe**).
      If one of your applications or services is generating a large number of 4703 events, you might find that your event-management software has filtering logic that can automatically discard the recurring events, which would make it easier to work with Success auditing for this category.
      This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. | +| Workstation | IF | No | IF | No | IF – With Success auditing for this subcategory, you can get information related to changes to the privileges of a token.
      However, if you are using an application or system service that dynamically adjusts token privileges, we do not recommend Success auditing because of the high volume of event “[4703](event-4703.md)(S): A user right was adjusted” that may be generated. As of Windows 10, event 4703 is generated by applications or services that dynamically adjust token privileges. An example of such an application is System Center Configuration Manager, which makes WMI queries at recurring intervals and quickly generates a large number of 4703 events (with the WMI activity listed as coming from **svchost.exe**).
      If one of your applications or services is generating a large number of 4703 events, you might find that your event-management software has filtering logic that can automatically discard the recurring events, which would make it easier to work with Success auditing for this category.
      This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. | **Events List:** From f3bce048b9cb1152c7949bb904fc11486efcff90 Mon Sep 17 00:00:00 2001 From: illfated Date: Tue, 3 Sep 2019 08:04:27 +0200 Subject: [PATCH 074/285] Windows Defender Antivirus: amend broken link From the issue ticket > Set-mppreference is configured with dead URL. (#4831) - The link "Use the [Set-MpPreference][]" is broken, but without the empty brackets it will work as expected. - Removing the redundant empty brackets after the next link too. Closes #4831 --- .../deploy-manage-report-windows-defender-antivirus.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus.md index 404e3d39cf..b95dce5844 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus.md @@ -41,7 +41,7 @@ Tool|Deployment options (2)|Management options (net Microsoft Intune|[Add endpoint protection settings in Intune](https://docs.microsoft.com/intune/endpoint-protection-configure)|[Configure device restriction settings in Intune](https://docs.microsoft.com/intune/device-restrictions-configure)| [Use the Intune console to manage devices](https://docs.microsoft.com/intune/device-management) System Center Configuration Manager ([1](#fn1))|Use the [Endpoint Protection point site system role][] and [enable Endpoint Protection with custom client settings][]|With [default and customized antimalware policies][] and [client management][]|With the default [Configuration Manager Monitoring workspace][] and [email alerts][] Group Policy and Active Directory (domain-joined)|Use a Group Policy Object to deploy configuration changes and ensure Windows Defender Antivirus is enabled.|Use Group Policy Objects (GPOs) to [Configure update options for Windows Defender Antivirus][] and [Configure Windows Defender features][]|Endpoint reporting is not available with Group Policy. You can generate a list of [Group Policies to determine if any settings or policies are not applied][] -PowerShell|Deploy with Group Policy, System Center Configuration Manager, or manually on individual endpoints.|Use the [Set-MpPreference][] and [Update-MpSignature] [] cmdlets available in the Defender module|Use the appropriate [Get- cmdlets available in the Defender module][] +PowerShell|Deploy with Group Policy, System Center Configuration Manager, or manually on individual endpoints.|Use the [Set-MpPreference] and [Update-MpSignature] cmdlets available in the Defender module.|Use the appropriate [Get- cmdlets available in the Defender module][] Windows Management Instrumentation|Deploy with Group Policy, System Center Configuration Manager, or manually on individual endpoints.|Use the [Set method of the MSFT_MpPreference class][] and the [Update method of the MSFT_MpSignature class][]|Use the [MSFT_MpComputerStatus][] class and the get method of associated classes in the [Windows Defender WMIv2 Provider][] Microsoft Azure|Deploy Microsoft Antimalware for Azure in the [Azure portal, by using Visual Studio virtual machine configuration, or using Azure PowerShell cmdlets](https://docs.microsoft.com/azure/security/azure-security-antimalware#antimalware-deployment-scenarios). You can also [Install Endpoint protection in Azure Security Center](https://docs.microsoft.com/azure/security-center/security-center-install-endpoint-protection)|Configure [Microsoft Antimalware for Virtual Machines and Cloud Services with Azure PowerShell cmdlets](https://docs.microsoft.com/azure/security/azure-security-antimalware#enable-and-configure-antimalware-using-powershell-cmdlets) or [use code samples](https://gallery.technet.microsoft.com/Antimalware-For-Azure-5ce70efe)|Use [Microsoft Antimalware for Virtual Machines and Cloud Services with Azure PowerShell cmdlets](https://docs.microsoft.com/azure/security/azure-security-antimalware#enable-and-configure-antimalware-using-powershell-cmdlets) to enable monitoring. You can also review usage reports in Azure Active Directory to determine suspicious activity, including the [Possibly infected devices][] report and configure an SIEM tool to report on [Windows Defender Antivirus events][] and add that tool as an app in AAD. From ecc07a3487c26e0e15e2b6066ee7ae84051d68e9 Mon Sep 17 00:00:00 2001 From: VLG17 <41186174+VLG17@users.noreply.github.com> Date: Tue, 3 Sep 2019 09:43:10 +0300 Subject: [PATCH 075/285] Update windows/client-management/new-policies-for-windows-10.md Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- windows/client-management/new-policies-for-windows-10.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/new-policies-for-windows-10.md b/windows/client-management/new-policies-for-windows-10.md index 35b4cfd10c..7d31757868 100644 --- a/windows/client-management/new-policies-for-windows-10.md +++ b/windows/client-management/new-policies-for-windows-10.md @@ -215,7 +215,7 @@ The following Group Policy settings were added in Windows 10, version 1809: The following Group Policy settings were added in Windows 10, version 1803: -**System* +**System** - System\Credentials Delegation\Encryption Oracle Remediation - System\Group Policy\Phone-PC linking on this device From aa75d27f9bccc7637ce7a58760934b6960efff87 Mon Sep 17 00:00:00 2001 From: VLG17 <41186174+VLG17@users.noreply.github.com> Date: Tue, 3 Sep 2019 09:43:20 +0300 Subject: [PATCH 076/285] Update windows/client-management/new-policies-for-windows-10.md Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- windows/client-management/new-policies-for-windows-10.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/new-policies-for-windows-10.md b/windows/client-management/new-policies-for-windows-10.md index 7d31757868..3f1b9ce27c 100644 --- a/windows/client-management/new-policies-for-windows-10.md +++ b/windows/client-management/new-policies-for-windows-10.md @@ -221,7 +221,7 @@ The following Group Policy settings were added in Windows 10, version 1803: - System\Group Policy\Phone-PC linking on this device - System\OS Policies\Allow upload of User Activities -**Windows Components* +**Windows Components** - Windows Components\App Privacy\Let Windows apps access an eye tracker device - Windows Components\Cloud Content\Turn off Windows Spotlight on Settings From f6073c6357889d55ee521969c09c851905b77388 Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Tue, 3 Sep 2019 12:24:57 +0500 Subject: [PATCH 077/285] Update upgrading-to-mbam-25-sp1-from-mbam-25.md --- .../upgrading-to-mbam-25-sp1-from-mbam-25.md | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/mdop/mbam-v25/upgrading-to-mbam-25-sp1-from-mbam-25.md b/mdop/mbam-v25/upgrading-to-mbam-25-sp1-from-mbam-25.md index d71c2b2b2a..4e0f5b098c 100644 --- a/mdop/mbam-v25/upgrading-to-mbam-25-sp1-from-mbam-25.md +++ b/mdop/mbam-v25/upgrading-to-mbam-25-sp1-from-mbam-25.md @@ -17,8 +17,8 @@ ms.date: 2/16/2018 This topic describes the process for upgrading the Microsoft BitLocker Administration and Monitoring (MBAM) Server 2.5 and the MBAM Client from 2.5 to MBAM 2.5 SP1. ### Before you begin -#### Download the July 2018 servicing release -[Desktop Optimization Pack](https://www.microsoft.com/download/details.aspx?id=57157) +#### Download the May 2019 servicing release +[Desktop Optimization Pack](https://www.microsoft.com/download/details.aspx?id=58345) #### Verify the installation documentaion Verify you have a current documentation of your MBAM environment, including all server names, database names, service accounts and their passwords. @@ -29,7 +29,7 @@ Verify you have a current documentation of your MBAM environment, including all Note: You will not see an option to remove the Databases; this is expected. 2. Install 2.5 SP1 (Located with MDOP - Microsoft Desktop Optimization Pack 2015 from the Volume Licensing Service Center site: 3. Do not configure it at this time  -4. Install the July 2018 Rollup: https://www.microsoft.com/download/details.aspx?id=57157 +4. Install the May 2019 Rollup: https://www.microsoft.com/download/details.aspx?id=58345 5. Using the MBAM Configurator; re-add the Reports role 6. This will configure the SSRS connection using the latest MBAM code from the rollup  7. Using the MBAM Configurator; re-add the SQL Database role on the SQL Server. @@ -40,13 +40,13 @@ Verify you have a current documentation of your MBAM environment, including all 1. Using the MBAM Configurator; remove the Admin and Self Service Portals from the IIS server 2. Install MBAM 2.5 SP1 3. Do not configure it at this time   -4. Install the July 2018 Rollup on the IIS server(https://www.microsoft.com/download/details.aspx?id=57157) +4. Install the May 2019 Rollup on the IIS server(https://www.microsoft.com/download/details.aspx?id=58345) 5. Using the MBAM Configurator; re-add the Admin and Self Service Portals to the IIS server  -6. This will configure the sites using the latest MBAM code from the July 2018 Rollup +6. This will configure the sites using the latest MBAM code from the May 2019 Rollup 7. Open an elevated command prompt, Type: **IISRESET** and Hit Enter. #### Steps to upgrade the MBAM Clients/Endpoints 1. Uninstall the 2.5 Agent from client endpoints 2. Install the 2.5 SP1 Agent on the client endpoints -3. Push out the July 2018 Rollup Client update to clients running the 2.5 SP1 Agent  -4. There is no need to uninstall the existing client prior to installing the July 2018 Rollup.   +3. Push out the May 2019 Rollup Client update to clients running the 2.5 SP1 Agent  +4. There is no need to uninstall the existing client prior to installing the May 2019 Rollup.   From 53eaa08a1b37c95d929c75c9a83ec7d264dd6f1b Mon Sep 17 00:00:00 2001 From: VLG17 <41186174+VLG17@users.noreply.github.com> Date: Tue, 3 Sep 2019 10:25:23 +0300 Subject: [PATCH 078/285] Update windows/client-management/new-policies-for-windows-10.md Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- windows/client-management/new-policies-for-windows-10.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/new-policies-for-windows-10.md b/windows/client-management/new-policies-for-windows-10.md index 3f1b9ce27c..e5f5732613 100644 --- a/windows/client-management/new-policies-for-windows-10.md +++ b/windows/client-management/new-policies-for-windows-10.md @@ -69,7 +69,7 @@ The following Group Policy settings were added in Windows 10, version 1809: - System\Group Policy\Logging and tracing\Configure Files preference logging and tracing - System\Group Policy\Logging and tracing\Configure Folder Options preference logging and tracing - System\Group Policy\Logging and tracing\Configure Folders preference logging and tracing -- System\Group Policy\Logging and tracing\Configure Ini Files preference logging and tracing +- System\Group Policy\Logging and tracing\Configure INI Files preference logging and tracing - System\Group Policy\Logging and tracing\Configure Internet Settings preference logging and tracing - System\Group Policy\Logging and tracing\Configure Local Users and Groups preference logging and tracing - System\Group Policy\Logging and tracing\Configure Network Options preference logging and tracing From cf79e40de47328bb67bf5b885e984a6e615b0058 Mon Sep 17 00:00:00 2001 From: VLG17 <41186174+VLG17@users.noreply.github.com> Date: Tue, 3 Sep 2019 10:33:27 +0300 Subject: [PATCH 079/285] Update windows/client-management/new-policies-for-windows-10.md Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- windows/client-management/new-policies-for-windows-10.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/new-policies-for-windows-10.md b/windows/client-management/new-policies-for-windows-10.md index e5f5732613..ee17130e61 100644 --- a/windows/client-management/new-policies-for-windows-10.md +++ b/windows/client-management/new-policies-for-windows-10.md @@ -90,7 +90,7 @@ The following Group Policy settings were added in Windows 10, version 1809: - Windows Components\Data Collection and Preview Builds\Configure Microsoft 365 Update Readiness upload endpoint - Windows Components\Data Collection and Preview Builds\Disable deleting diagnostic data -- Windows Components\Data Collection and Preview Builds\Disable diagnostic data viewer. +- Windows Components\Data Collection and Preview Builds\Disable diagnostic data viewer - Windows Components\Delivery Optimization\[Reserved for future use] Cache Server Hostname - Windows Components\Location and Sensors\Windows Location Provider\Turn off Windows Location Provider - Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\DFS Management From 1ce4d0d7674e6e863a0c271bd72e239e196f1c96 Mon Sep 17 00:00:00 2001 From: VLG17 <41186174+VLG17@users.noreply.github.com> Date: Tue, 3 Sep 2019 11:07:28 +0300 Subject: [PATCH 080/285] Update windows/client-management/new-policies-for-windows-10.md Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- windows/client-management/new-policies-for-windows-10.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/new-policies-for-windows-10.md b/windows/client-management/new-policies-for-windows-10.md index ee17130e61..abfee61793 100644 --- a/windows/client-management/new-policies-for-windows-10.md +++ b/windows/client-management/new-policies-for-windows-10.md @@ -184,7 +184,7 @@ The following Group Policy settings were added in Windows 10, version 1809: - Windows Components\Windows Security\Device security\Hide the Device security area - Windows Components\Windows Security\Device security\Hide the Secure boot area - Windows Components\Windows Security\Device security\Hide the Security processor (TPM) troubleshooter page -- Windows Components\Windows Security\Device security\Hide the TPM Firmware Update recommendation. +- Windows Components\Windows Security\Device security\Hide the TPM Firmware Update recommendation - Windows Components\Windows Security\Enterprise Customization\Configure customized contact information - Windows Components\Windows Security\Enterprise Customization\Configure customized notifications - Windows Components\Windows Security\Enterprise Customization\Specify contact company name From aae3562284c9035d0cfb8ca353970dceaf634521 Mon Sep 17 00:00:00 2001 From: VLG17 <41186174+VLG17@users.noreply.github.com> Date: Tue, 3 Sep 2019 11:07:39 +0300 Subject: [PATCH 081/285] Update windows/client-management/new-policies-for-windows-10.md Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- windows/client-management/new-policies-for-windows-10.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/new-policies-for-windows-10.md b/windows/client-management/new-policies-for-windows-10.md index abfee61793..da9546ba23 100644 --- a/windows/client-management/new-policies-for-windows-10.md +++ b/windows/client-management/new-policies-for-windows-10.md @@ -153,7 +153,7 @@ The following Group Policy settings were added in Windows 10, version 1809: - Windows Components\Windows Defender Application Guard\Allow camera and microphone access in Windows Defender Application Guard - Windows Components\Windows Defender Application Guard\Allow users to trust files that open in Windows Defender Application Guard - Windows Components\Windows Defender Application Guard\Allow Windows Defender Application Guard to use Root Certificate Authorities from the user’s device -- Windows Components\Windows Defender Application Guard\Configure additional sources for untrusted files in Windows Defender Application Guard. +- Windows Components\Windows Defender Application Guard\Configure additional sources for untrusted files in Windows Defender Application Guard - Windows Components\Windows Hello for Business\Use Windows Hello for Business certificates as smart card certificates - Windows Components\Windows Media Player\Do Not Show First Use Dialog Boxes - Windows Components\Windows Media Player\Prevent Automatic Updates From 89ece6e3df1985982fef4813eccaf6a40b001cd3 Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Tue, 3 Sep 2019 13:35:02 +0500 Subject: [PATCH 082/285] URL addition of OWA Added URL for OWA attachment protection using WIP Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/3747 --- .../recommended-network-definitions-for-wip.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/information-protection/windows-information-protection/recommended-network-definitions-for-wip.md b/windows/security/information-protection/windows-information-protection/recommended-network-definitions-for-wip.md index 0852a6c1be..80814f122c 100644 --- a/windows/security/information-protection/windows-information-protection/recommended-network-definitions-for-wip.md +++ b/windows/security/information-protection/windows-information-protection/recommended-network-definitions-for-wip.md @@ -35,6 +35,7 @@ This table includes the recommended URLs to add to your Enterprise Cloud Resourc |-----------------------------|---------------------------------------------------------------------| |Office 365 for Business |
      • contoso.sharepoint.com
      • contoso-my.sharepoint.com
      • contoso-files.sharepoint.com
      • tasks.office.com
      • protection.office.com
      • meet.lync.com
      • teams.microsoft.com
      | |Yammer |
      • www.yammer.com
      • yammer.com
      • persona.yammer.com
      | +|Outlook Web Access (OWA) |
      • attachments.office.net
      | |Microsoft Dynamics |contoso.crm.dynamics.com | |Visual Studio Online |contoso.visualstudio.com | |Power BI |contoso.powerbi.com | From 30a8492341d7d78321b12a374d39cf58f82cdafa Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Tue, 3 Sep 2019 13:42:17 +0500 Subject: [PATCH 083/285] Update windows/security/identity-protection/hello-for-business/feature-multifactor-unlock.md Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- .../hello-for-business/feature-multifactor-unlock.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/feature-multifactor-unlock.md b/windows/security/identity-protection/hello-for-business/feature-multifactor-unlock.md index 9f9b53626a..3da855c332 100644 --- a/windows/security/identity-protection/hello-for-business/feature-multifactor-unlock.md +++ b/windows/security/identity-protection/hello-for-business/feature-multifactor-unlock.md @@ -332,7 +332,7 @@ The Group Policy object contains the policy settings needed to trigger Windows H > * PIN **must** be in at least one of the groups > * Trusted signals **must** be combined with another credential provider > * You cannot use the same unlock factor to satisfy both categories. Therefore, if you include any credential provider in both categories, it means it can satisfy either category, but not both. -> * The multifactor unlock feature is also supported via the Passport for Work CSP, see [Passport For Work CSP](https://docs.microsoft.com/windows/client-management/mdm/passportforwork-csp). +> * The multifactor unlock feature is also supported via the Passport for Work CSP. See [Passport For Work CSP](https://docs.microsoft.com/windows/client-management/mdm/passportforwork-csp) for more information. 1. Start the **Group Policy Management Console** (gpmc.msc) 2. Expand the domain and select the **Group Policy Object** node in the navigation pane. From 92fd005e11a96dc29c4abbfc40007603cc7a039b Mon Sep 17 00:00:00 2001 From: Guy Reginiano <45633598+guregini@users.noreply.github.com> Date: Tue, 3 Sep 2019 16:01:15 +0300 Subject: [PATCH 084/285] Fixed text "Automated investigation" instead of "Alert" --- .../microsoft-defender-atp/automated-investigations.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/automated-investigations.md b/windows/security/threat-protection/microsoft-defender-atp/automated-investigations.md index 89c574f14d..0d2841c46b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/automated-investigations.md +++ b/windows/security/threat-protection/microsoft-defender-atp/automated-investigations.md @@ -40,7 +40,7 @@ Entities are the starting point for Automated investigations. When an alert cont >- Windows 10, version 1803 (OS Build 17134.704 with [KB4493464](https://support.microsoft.com/en-us/help/4493464/windows-10-update-kb4493464)) or later >- Later versions of Windows 10 -The alerts start by analyzing the supported entities from the alert and also runs a generic machine playbook to see if there is anything else suspicious on that machine. The outcome and details from the investigation is seen in the Automated investigation view. +The Automated investigation starts by analyzing the supported entities from the alert and also runs a generic machine playbook to see if there is anything else suspicious on that machine. The outcome and details from the investigation is seen in the Automated investigation view. ### Details of an Automated investigation @@ -85,4 +85,4 @@ The default machine group is configured for semi-automatic remediation. This mea When a pending action is approved, the entity is then remediated and this new state is reflected in the **Entities** tab of the investigation. ## Related topic -- [Learn about the automated investigations dashboard](manage-auto-investigation.md) \ No newline at end of file +- [Learn about the automated investigations dashboard](manage-auto-investigation.md) From 838c31842305812db2b78a382e40f6bc59ff0753 Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Tue, 3 Sep 2019 10:37:20 -0700 Subject: [PATCH 085/285] Update configure-microsoft-threat-experts.md --- .../configure-microsoft-threat-experts.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts.md b/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts.md index 03a4c23c48..38e6e04173 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts.md @@ -24,7 +24,7 @@ ms.topic: article - [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ## Before you begin -To experience the full Microsoft Threat Experts targeted attack notification capability in Microsoft Defender ATP, and preview the experts-on-demand capability, you need to have a valid Premier customer service and support account. Premier charges are not incurred during for the capability in preview, but for the generally available capability, there will be charges. +To experience the full Microsoft Threat Experts targeted attack notification capability in Microsoft Defender ATP, or try the the experts-on-demand capability, you need to have a valid Premier customer service and support account. Premier charges are not incurred during for the capability in trial, but for the generally available capability, there will be charges. Ensure that you have Microsoft Defender ATP deployed in your environment with machines enrolled, and not just on a laboratory set-up. From bcf38e118c0521029dd8023c47a0e941d820b4f5 Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Tue, 3 Sep 2019 10:38:59 -0700 Subject: [PATCH 086/285] Update configure-microsoft-threat-experts.md --- .../configure-microsoft-threat-experts.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts.md b/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts.md index 38e6e04173..1120ca2006 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts.md @@ -63,7 +63,7 @@ You'll start receiving targeted attack notification from Microsoft Threat Expert ## Consult a Microsoft threat expert about suspicious cybersecurity activities in your organization -You can partner with Microsoft Threat Experts who can be engaged directly from within the Windows Defender Security Center for timely and accurate response. Experts provide insights to better understand complex threats, targeted attack notifications that you get, or if you need more information about the alerts, a potentially compromised machine, or a threat intelligence context that you see on your portal dashboard. +You can partner with Microsoft Threat Experts who can be engaged directly from within the Microsoft Defender Security Center for timely and accurate response. Experts provide insights to better understand complex threats, targeted attack notifications that you get, or if you need more information about the alerts, a potentially compromised machine, or a threat intelligence context that you see on your portal dashboard. >[!NOTE] >Alert inquiries related to your organization's customized threat intelligence data are currently not supported. Consult your security operations or incident response team for details. @@ -88,7 +88,7 @@ You can partner with Microsoft Threat Experts who can be engaged directly from w - Can you help validate a possible compromise on the following system on [date] with similar behaviors as the previous [malware name] malware detection on the same system in [month]? **Threat intelligence details** -- This morning, we detected a phishing email that delivered a malicious Word document to a user. This caused a series of suspicious events which triggered multiple Windows Defender alerts for [malware name] malware. Do you have any information on this malware? If yes, can you send me a link? +- This morning, we detected a phishing email that delivered a malicious Word document to a user. This caused a series of suspicious events which triggered multiple Microsoft Defender alerts for [malware name] malware. Do you have any information on this malware? If yes, can you send me a link? - I recently saw a [social media reference e.g., Twitter or blog] post about a threat that is targeting my industry. Can you help me understand what protection Microsoft Defender ATP provides against this threat actor? **Microsoft Threat Experts’ alert communications** From dc36b076b83f6f87eb74e638edccc50d52760beb Mon Sep 17 00:00:00 2001 From: adrianwells Date: Tue, 3 Sep 2019 13:40:50 -0400 Subject: [PATCH 087/285] Update waas-overview.md Corrected a typo --- windows/deployment/update/waas-overview.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/update/waas-overview.md b/windows/deployment/update/waas-overview.md index 49efd6e3b2..80a680fadf 100644 --- a/windows/deployment/update/waas-overview.md +++ b/windows/deployment/update/waas-overview.md @@ -132,7 +132,7 @@ Specialized systems—such as devices that control medical equipment, point-of-s > [!NOTE] > Windows 10 Enterprise LTSB is a separate Long Term Servicing Channel version. > ->Long-term Servicing channel is not intended for deployment on most or all the devicess in an organization; it should be used only for special-purpose devices. As a general guideline, a device with Microsoft Office installed is a general-purpose device, typically used by an information worker, and therefore it is better suited for the Semi-Annual servicing channel. +>Long-term Servicing channel is not intended for deployment on most or all the devices in an organization; it should be used only for special-purpose devices. As a general guideline, a device with Microsoft Office installed is a general-purpose device, typically used by an information worker, and therefore it is better suited for the Semi-Annual servicing channel. Microsoft never publishes feature updates through Windows Update on devices that run Windows 10 Enterprise LTSB. Instead, it typically offers new LTSC releases every 2–3 years, and organizations can choose to install them as in-place upgrades or even skip releases over a 10-year life cycle. From 70d8ed254957950bc37c00866b0d626d8c22c857 Mon Sep 17 00:00:00 2001 From: adrianwells Date: Tue, 3 Sep 2019 13:53:58 -0400 Subject: [PATCH 088/285] Update windows/deployment/update/waas-overview.md Makes sense. Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- windows/deployment/update/waas-overview.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/update/waas-overview.md b/windows/deployment/update/waas-overview.md index 80a680fadf..02b95b42a5 100644 --- a/windows/deployment/update/waas-overview.md +++ b/windows/deployment/update/waas-overview.md @@ -132,7 +132,7 @@ Specialized systems—such as devices that control medical equipment, point-of-s > [!NOTE] > Windows 10 Enterprise LTSB is a separate Long Term Servicing Channel version. > ->Long-term Servicing channel is not intended for deployment on most or all the devices in an organization; it should be used only for special-purpose devices. As a general guideline, a device with Microsoft Office installed is a general-purpose device, typically used by an information worker, and therefore it is better suited for the Semi-Annual servicing channel. +> Long-term Servicing channel is not intended for deployment on most or all the devices in an organization; it should be used only for special-purpose devices. As a general guideline, a device with Microsoft Office installed is a general-purpose device, typically used by an information worker, and therefore it is better suited for the Semi-Annual servicing channel. Microsoft never publishes feature updates through Windows Update on devices that run Windows 10 Enterprise LTSB. Instead, it typically offers new LTSC releases every 2–3 years, and organizations can choose to install them as in-place upgrades or even skip releases over a 10-year life cycle. From 8b3979b9a55d226b6a8e52936d057f8812dcdacc Mon Sep 17 00:00:00 2001 From: John Liu <49762389+ShenLanJohn@users.noreply.github.com> Date: Tue, 3 Sep 2019 14:02:07 -0700 Subject: [PATCH 089/285] CAT Auto Pulish for Windows Release Messages - 20190903135254 (#1033) * SIEM connector: change alert notion to Detection * update casing and redirects * remove space json file * fix json * CAT Auto Pulish for Windows Release Messages - CAT_AutoPublish_20190903123340 (#1031) --- .openpublishing.redirection.json | 19 ++- .../resolved-issues-windows-10-1803.yml | 10 ++ ...indows-10-1809-and-windows-server-2019.yml | 12 -- .../status-windows-10-1803.yml | 10 ++ .../status-windows-10-1903.yml | 2 - windows/security/threat-protection/TOC.md | 15 +-- .../api-portal-mapping.md | 71 +++++----- .../configure-arcsight.md | 21 +-- .../microsoft-defender-atp/configure-siem.md | 35 ++--- .../configure-splunk.md | 24 ++-- .../enable-siem-integration.md | 23 ++-- .../get-ip-related-machines.md | 122 ------------------ .../is-domain-seen-in-org.md | 82 ------------ .../microsoft-defender-atp/is-ip-seen-org.md | 82 ------------ .../microsoft-defender-atp/management-apis.md | 1 - .../microsoft-defender-atp/oldTOC.txt | 15 +-- .../pull-alerts-using-rest-api.md | 48 +++---- .../troubleshoot-siem.md | 10 +- 18 files changed, 176 insertions(+), 426 deletions(-) delete mode 100644 windows/security/threat-protection/microsoft-defender-atp/get-ip-related-machines.md delete mode 100644 windows/security/threat-protection/microsoft-defender-atp/is-domain-seen-in-org.md delete mode 100644 windows/security/threat-protection/microsoft-defender-atp/is-ip-seen-org.md diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 16a10bcb81..95b887e08a 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -14778,7 +14778,7 @@ { "source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection-new.md", "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts", -"redirect_document_id": true +"redirect_document_id": false }, { "source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection.md", @@ -14788,7 +14788,7 @@ { "source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection-new.md", "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-machines", -"redirect_document_id": true +"redirect_document_id": false }, { "source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection.md", @@ -15131,6 +15131,21 @@ "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/microsoft-defender-atp/is-domain-seen-in-org.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts", +"redirect_document_id": false +}, +{ +"source_path": "windows/security/threat-protection/microsoft-defender-atp/get-ip-related-machines.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp/is-ip-seen-org.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp/exposed-apis-list", +"redirect_document_id": false +}, +{ "source_path": "windows/security/threat-protection/windows-defender-atp/machineaction-windows-defender-advanced-threat-protection-new.md", "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machineaction", "redirect_document_id": true diff --git a/windows/release-information/resolved-issues-windows-10-1803.yml b/windows/release-information/resolved-issues-windows-10-1803.yml index b3059b9fe8..f6b4c85fb6 100644 --- a/windows/release-information/resolved-issues-windows-10-1803.yml +++ b/windows/release-information/resolved-issues-windows-10-1803.yml @@ -32,6 +32,7 @@ sections: - type: markdown text: "
      MessageDate
      Status update: Windows 10, version 1903 \"D\" optional release available August 30th
      The August optional monthly “D” release for Windows 10, version 1903 is now available. Follow @WindowsUpdate for the latest on the availability of this release.
      August 30, 2019
      08:00 AM PT
      Feature update install notification on Windows 10, version 1809 (the October 2018 Update)
      We've had reports on August 29th that some customers running Windows 10, version 1809 (the October 2018 Update) have received notification to install the latest feature update (version 1903) early. Updating remains in your control. To install the update, you must select one of the following options: \"Pick a Time\", \"Restart Tonight,\" or \"Restart Now\". If you are not ready to update at this time, simply dismiss the notification by clicking the arrow in the top right corner. If you have updated to Windows 10, version 1903 and would like to go back to your previous version, see the instructions here.
      August 29, 2019
      04:39 PM PT
      Take Action: Internet Explorer 11 now available on Windows Update/WSUS for Windows Server 2012 and Windows Embedded 8 Standard
      Internet Explorer 11 (KB 4492872) is now available via Windows Update (WU) and Windows Server Update Services (WSUS) for commercial customers running Windows Server 2012 and Windows Embedded 8 Standard. For details about these changes and end of support for IE10, please refer to the IT Pro blog
      August 29, 2019
      08:00 AM PT
      Take action: SHA-2 code signing support guidance for Windows 7 SP1 and Windows Server 2008 RS2 SP1
      Windows 7 SP1 and Windows Server 2008 R2 SP1 update signatures are now SHA-2 based signatures and requires that SHA-2 support to be installed. For important customer guidance on installation and troubleshooting tips, please read the knowledge base article 2019 SHA-2 Code Signing Support requirement for Windows and WSUS.
      August 23, 2019
      03:35 PM PT
      + @@ -58,6 +59,15 @@ sections:
      " +- title: September 2019 +- items: + - type: markdown + text: " +
      SummaryOriginating updateStatusDate resolved
      Notification issue: \"Your device is missing important security and quality fixes.\"
      Some users may have incorrectly received the notification \"Your device is missing important security and quality fixes.\"

      See details >
      N/A

      Resolved
      September 03, 2019
      12:32 PM PT
      Devices starting using PXE from a WDS or SCCM servers may fail to start
      Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

      See details >
      OS Build 17134.829

      June 11, 2019
      KB4503286
      Resolved
      KB4512509
      August 19, 2019
      02:00 PM PT
      Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
      Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

      See details >
      OS Build 17134.950

      August 13, 2019
      KB4512501
      Resolved
      KB4512509
      August 19, 2019
      02:00 PM PT
      Domain connected devices that use MIT Kerberos realms will not start up
      Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

      See details >
      OS Build 17134.915

      July 16, 2019
      KB4507466
      Resolved
      KB4512501
      August 13, 2019
      10:00 AM PT
      + +
      DetailsOriginating updateStatusHistory
      Notification issue: \"Your device is missing important security and quality fixes.\"
      Some users may have incorrectly received the notification \"Your device is missing important security and quality fixes\" in the Windows Update dialog and a red \"!\" in the task tray on the Windows Update tray icon. This notification is intended for devices that are 90 days or more out of date, but some users with installed updates released in June or July also saw this notification.

      Affected platforms:
      • Client: Windows 10, version 1803
      • Server: Windows Server, version 1803
      Resolution: This issue was resolved on the server side on August 30, 2019. Only devices that are out of date by 90 days or more should now see the notification. No action is required by the user to resolve this issue. If you are still seeing the \"Your device is missing important security and quality fixes\" notification, we recommend selecting Check for Updates in the Windows Update dialog. For instructions, see Update Windows 10. Microsoft always recommends trying to keep your devices up to date, as the monthly updates contain important security fixes. 

      Back to top
      N/A

      Resolved
      Resolved:
      September 03, 2019
      12:32 PM PT

      Opened:
      September 03, 2019
      12:32 PM PT
      + " + - title: August 2019 - items: - type: markdown diff --git a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml index c70c55ae78..99b8f5966a 100644 --- a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml @@ -55,12 +55,6 @@ sections:
      End-user-defined characters (EUDC) may cause blue screen at startup
      If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

      See details >
      OS Build 17763.404

      April 02, 2019
      KB4490481
      Resolved
      KB4493509
      April 09, 2019
      10:00 AM PT
      MSXML6 may cause applications to stop responding
      MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

      See details >
      OS Build 17763.253

      January 08, 2019
      KB4480116
      Resolved
      KB4493509
      April 09, 2019
      10:00 AM PT
      Error 1309 when installing/uninstalling MSI or MSP files
      Users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

      See details >
      OS Build 17763.316

      February 12, 2019
      KB4487044
      Resolved
      KB4489899
      March 12, 2019
      10:00 AM PT
      Internet Explorer may fail to load images
      Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

      See details >
      OS Build 17763.316

      February 12, 2019
      KB4487044
      Resolved
      KB4482887
      March 01, 2019
      10:00 AM PT
      First character of the Japanese era name not recognized
      The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

      See details >
      OS Build 17763.316

      February 12, 2019
      KB4487044
      Resolved
      KB4482887
      March 01, 2019
      10:00 AM PT
      Applications using Microsoft Jet database and Access 95 file format stop working
      Applications that use a Microsoft Jet database with the Microsoft Access 9 file format may randomly stop working.

      See details >
      OS Build 17763.316

      February 12, 2019
      KB4487044
      Resolved
      KB4482887
      March 01, 2019
      10:00 AM PT
      Shared albums may not sync with iCloud for Windows
      Upgrade block: Apple has identified an incompatibility with iCloud for Windows (version 7.7.0.27) where users may experience issues updating or synching Shared Albums.

      See details >
      OS Build 17763.134

      November 13, 2018
      KB4467708
      Resolved
      KB4482887
      March 01, 2019
      10:00 AM PT
      Intel Audio Display (intcdaud.sys) notification during Windows 10 Setup
      Upgrade block: Users may see an Intel Audio Display (intcdaud.sys) notification during setup for devices with certain Intel Display Audio Drivers.

      See details >
      OS Build 17763.134

      November 13, 2018
      KB4467708
      Resolved
      KB4482887
      March 01, 2019
      10:00 AM PT
      F5 VPN clients losing network connectivity
      Upgrade block: After updating to Windows 10, version 1809, F5 VPN clients may lose network connectivity when the VPN service is in a split tunnel configuration.

      See details >
      OS Build 17763.134

      November 13, 2018
      KB4467708
      Resolved
      KB4482887
      March 01, 2019
      10:00 AM PT
      Global DNS outage affects Windows Update customers
      Windows Update customers were recently affected by a network infrastructure event caused by an external DNS service provider's global outage.

      See details >
      N/A

      Resolved
      March 08, 2019
      11:15 AM PT
      Apps may stop working after selecting an audio output device other than the default
      Users with multiple audio devices that select an audio output device different from the \"Default Audio Device\" may find certain applications stop working unexpectedly.

      See details >
      OS Build 17763.348

      March 01, 2019
      KB4482887
      Resolved
      KB4490481
      April 02, 2019
      10:00 AM PT
      @@ -148,9 +142,6 @@ sections: - - -
      DetailsOriginating updateStatusHistory
      Embedded objects may display incorrectly
      Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
       
      For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
       
      Affected platforms:  
      • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1  
      • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2  
      Resolution: This issue is resolved in KB4493509.  

      Back to top
      OS Build 17763.316

      February 12, 2019
      KB4487044
      Resolved
      KB4493509
      Resolved:
      April 09, 2019
      10:00 AM PT

      Opened:
      February 12, 2019
      10:00 AM PT
      Error 1309 when installing/uninstalling MSI or MSP files
      After installing KB4487044, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 

      Affected platforms:
      • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
      • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
      Resolution: This issue is resolved in KB4489899

      Back to top
      OS Build 17763.316

      February 12, 2019
      KB4487044
      Resolved
      KB4489899
      Resolved:
      March 12, 2019
      10:00 AM PT

      Opened:
      February 12, 2019
      10:00 AM PT
      Internet Explorer may fail to load images
      After installing KB4487044, Internet Explorer may fail to load images with a backslash (\\) in their relative source path.

      Affected platforms:
      • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
      • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
      Resolution: This issue is resolved in KB4482887.

      Back to top
      OS Build 17763.316

      February 12, 2019
      KB4487044
      Resolved
      KB4482887
      Resolved:
      March 01, 2019
      10:00 AM PT

      Opened:
      February 12, 2019
      10:00 AM PT
      First character of the Japanese era name not recognized
      After installing KB4487044, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues. 

      Affected platforms:
      • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
      • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
      Resolution: This issue is resolved in KB4482887

      Back to top
      OS Build 17763.316

      February 12, 2019
      KB4487044
      Resolved
      KB4482887
      Resolved:
      March 01, 2019
      10:00 AM PT

      Opened:
      February 12, 2019
      10:00 AM PT
      Applications using Microsoft Jet database and Access 95 file format stop working
      Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

      Affected platforms:
      • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
      • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
      Resolution: This issue is resolved in KB4482887.

      Back to top
      OS Build 17763.316

      February 12, 2019
      KB4487044
      Resolved
      KB4482887
      Resolved:
      March 01, 2019
      10:00 AM PT

      Opened:
      February 12, 2019
      10:00 AM PT
      " @@ -171,8 +162,5 @@ sections: text: " - - -
      DetailsOriginating updateStatusHistory
      Audio not working on monitors or TV connected to a PC via HDMI, USB, or DisplayPort
      Upgrade block: Microsoft has identified issues with certain new Intel display drivers. Intel inadvertently released versions of its display driver (versions 24.20.100.6344, 24.20.100.6345) to OEMs that accidentally turned on unsupported features in Windows. 
       
      As a result, after updating to Windows 10, version 1809, audio playback from a monitor or television connected to a PC via HDMI, USB-C, or a DisplayPort may not function correctly on devices with these drivers.
      Note: This Intel display driver issue is different from the Intel Smart Sound Technology driver (version 09.21.00.3755) audio issue previously documented.

      Affected platforms:
      • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
      • Server: Windows Server, version 1809; Windows Server 2019 
      Next steps: Intel has released updated drivers to OEM device manufacturers. OEMs need to make the updated driver available via Windows Update. For more information, see the Intel Customer Support article.

      Resolution: Microsoft has removed the safeguard hold.



      Back to top
      OS Build 17763.134

      November 13, 2018
      KB4467708
      Resolved
      Resolved:
      May 21, 2019
      07:42 AM PT

      Opened:
      November 13, 2018
      10:00 AM PT
      Shared albums may not sync with iCloud for Windows
      Upgrade block: Users who attempt to install iCloud for Windows (version 7.7.0.27) will see a message displayed that this version iCloud for Windows isn't supported and the install will fail.

      Affected platforms:
      • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
      • Server: Windows Server, version 1809; Windows Server 2019
      To ensure a seamless experience, Microsoft is blocking devices with iCloud for Windows (version 7.7.0.27) software installed from being offered Windows 10, version 1809 until this issue has been resolved. 

      We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool from the Microsoft software download website until this issue is resolved. 
       
      Resolution: Apple has released an updated version of iCloud for Windows (version 7.8.1) that resolves compatibility issues encountered when updating or synching Shared Albums after updating to Windows 10, version 1809. We recommend that you update your iCloud for Windows to version 7.8.1 when prompted before attempting to upgrade to Windows 10, version 1809. You can also manually download the latest version of iCloud for Windows by visiting https://support.apple.com/HT204283.

      Back to top
      OS Build 17763.134

      November 13, 2018
      KB4467708
      Resolved
      KB4482887
      Resolved:
      March 01, 2019
      10:00 AM PT

      Opened:
      November 13, 2018
      10:00 AM PT
      Intel Audio Display (intcdaud.sys) notification during Windows 10 Setup
      Upgrade block: Microsoft and Intel have identified a compatibility issue with a range of Intel Display Audio device drivers (intcdaud.sys, versions 10.25.0.3 - 10.25.0.8) that may result in excessive processor demand and reduced battery life. As a result, the update process to the Windows 10 October 2018 Update (Windows 10, version 1809) will fail and affected devices will automatically revert to the previous working configuration. 

      Affected platforms:
      • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
      • Server: Windows Server, version 1809; Windows Server 2019
      If you see a \"What needs your attention\" notification during installation of the October 2018 Update, you have one of these affected drivers on your system. On the notification, click Back to remain on your current version of Windows 10. 
       
      To ensure a seamless experience, we are blocking devices from being offered the October 2018 Update until updated Intel device drivers are installed on your current operating system. We recommend that you do not attempt to manually update to Windows 10, version 1809, using the Update Now button or the Media Creation Tool from the Microsoft Software Download Center until newer Intel device drivers are available with the update. You can either wait for newer drivers to be installed automatically through Windows Update or check with your computer manufacturer for the latest device driver software availability and installation procedures. For more information about this issue, see Intel's customer support guidance.
       
      Resolution: This issue was resolved in KB4482887 and the upgrade block removed. 

      Back to top
      OS Build 17763.134

      November 13, 2018
      KB4467708
      Resolved
      KB4482887
      Resolved:
      March 01, 2019
      10:00 AM PT

      Opened:
      November 13, 2018
      10:00 AM PT
      F5 VPN clients losing network connectivity
      Upgrade block: After updating to Windows 10, version 1809, F5 VPN clients may lose network connectivity when the VPN service is in a split tunnel configuration.

      Affected platforms:
      • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
      • Server: Windows Server, version 1809; Windows Server 2019
      Resolution: This issue was resolved in KB4482887 and the upgrade block removed. 

      Back to top
      OS Build 17763.134

      November 13, 2018
      KB4467708
      Resolved
      KB4482887
      Resolved:
      March 01, 2019
      10:00 AM PT

      Opened:
      November 13, 2018
      10:00 AM PT
      " diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml index c9f0739b5a..fe3c6577c2 100644 --- a/windows/release-information/status-windows-10-1803.yml +++ b/windows/release-information/status-windows-10-1803.yml @@ -65,6 +65,7 @@ sections: - type: markdown text: "
      This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

      + @@ -81,6 +82,15 @@ sections:
      " +- title: September 2019 +- items: + - type: markdown + text: " +
      SummaryOriginating updateStatusLast updated
      Notification issue: \"Your device is missing important security and quality fixes.\"
      Some users may have incorrectly received the notification \"Your device is missing important security and quality fixes.\"

      See details >
      N/A

      Resolved
      September 03, 2019
      12:32 PM PT
      Devices starting using PXE from a WDS or SCCM servers may fail to start
      Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

      See details >
      OS Build 17134.829

      June 11, 2019
      KB4503286
      Resolved
      KB4512509
      August 19, 2019
      02:00 PM PT
      Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
      Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

      See details >
      OS Build 17134.950

      August 13, 2019
      KB4512501
      Resolved
      KB4512509
      August 19, 2019
      02:00 PM PT
      Domain connected devices that use MIT Kerberos realms will not start up
      Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

      See details >
      OS Build 17134.915

      July 16, 2019
      KB4507466
      Resolved
      KB4512501
      August 13, 2019
      10:00 AM PT
      + +
      DetailsOriginating updateStatusHistory
      Notification issue: \"Your device is missing important security and quality fixes.\"
      Some users may have incorrectly received the notification \"Your device is missing important security and quality fixes\" in the Windows Update dialog and a red \"!\" in the task tray on the Windows Update tray icon. This notification is intended for devices that are 90 days or more out of date, but some users with installed updates released in June or July also saw this notification.

      Affected platforms:
      • Client: Windows 10, version 1803
      • Server: Windows Server, version 1803
      Resolution: This issue was resolved on the server side on August 30, 2019. Only devices that are out of date by 90 days or more should now see the notification. No action is required by the user to resolve this issue. If you are still seeing the \"Your device is missing important security and quality fixes\" notification, we recommend selecting Check for Updates in the Windows Update dialog. For instructions, see Update Windows 10. Microsoft always recommends trying to keep your devices up to date, as the monthly updates contain important security fixes. 

      Back to top
      N/A

      Resolved
      Resolved:
      September 03, 2019
      12:32 PM PT

      Opened:
      September 03, 2019
      12:32 PM PT
      + " + - title: August 2019 - items: - type: markdown diff --git a/windows/release-information/status-windows-10-1903.yml b/windows/release-information/status-windows-10-1903.yml index 5dd768299d..72034e1a27 100644 --- a/windows/release-information/status-windows-10-1903.yml +++ b/windows/release-information/status-windows-10-1903.yml @@ -75,7 +75,6 @@ sections:
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >
OS Build 18362.175

June 11, 2019
KB4503293
Resolved External
August 09, 2019
07:03 PM PT
Intermittent loss of Wi-Fi connectivity
Some older devices may experience loss of Wi-Fi connectivity due to an outdated Qualcomm driver.

See details >
OS Build 18362.116

May 21, 2019
KB4505057
Mitigated External
August 01, 2019
08:44 PM PT
Gamma ramps, color profiles, and night light settings do not apply in some cases
Microsoft has identified some scenarios where gamma ramps, color profiles and night light settings may stop working.

See details >
OS Build 18362.116

May 21, 2019
KB4505057
Mitigated
August 01, 2019
06:27 PM PT
Display brightness may not respond to adjustments
Microsoft and Intel have identified a driver compatibility issue on devices configured with certain Intel display drivers.

See details >
OS Build 18362.116

May 21, 2019
KB4505057
Resolved
KB4505903
July 26, 2019
02:00 PM PT
The dGPU may occasionally disappear from device manager on Surface Book 2 with dGPU
Some apps or games that needs to perform graphics intensive operations may close or fail to open on Surface Book 2 devices with Nvidia dGPU.

See details >
OS Build 18362.145

May 29, 2019
KB4497935
Investigating
July 16, 2019
09:04 AM PT
Unable to discover or connect to Bluetooth devices
Microsoft has identified compatibility issues with some versions of Realtek and Qualcomm Bluetooth radio drivers.

See details >
OS Build 18362.116

May 21, 2019
KB4505057
Mitigated
May 21, 2019
04:48 PM PT
Intel Audio displays an intcdaud.sys notification
Microsoft and Intel have identified an issue with a range of Intel Display Audio device drivers that may result in battery drain.

See details >
OS Build 18362.116

May 21, 2019
KB4505057
Mitigated
May 21, 2019
04:47 PM PT
Windows Sandbox may fail to start with error code “0x80070002”
Windows Sandbox may fail to start with \"ERROR_FILE_NOT_FOUND (0x80070002)\" on devices in which the operating system language is changed during the update process when installing Windows 10, version 1903.

Affected platforms:
  • Client: Windows 10, version 1903
Resolution: This issue was resolved in KB4512941.

Back to top
OS Build 18362.116

May 20, 2019
KB4505057
Resolved
KB4512941
Resolved:
August 30, 2019
10:00 AM PT

Opened:
May 24, 2019
04:20 PM PT
Intermittent loss of Wi-Fi connectivity
Some older computers may experience loss of Wi-Fi connectivity due to an outdated Qualcomm driver. An updated Wi-Fi driver should be available from your device manufacturer (OEM).

To safeguard your upgrade experience, we have applied a hold on devices with this Qualcomm driver from being offered Windows 10, version 1903, until the updated driver is installed.

Affected platforms:
  • Client: Windows 10, version 1903
Workaround: Before updating to Windows 10, version 1903, you will need to download and install an updated Wi-Fi driver from your device manufacturer (OEM).
 
Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until a new driver has been installed and the Windows 10, version 1903 feature update has been automatically offered to you.

Back to top
OS Build 18362.116

May 21, 2019
KB4505057
Mitigated External
Last updated:
August 01, 2019
08:44 PM PT

Opened:
May 21, 2019
07:13 AM PT
Gamma ramps, color profiles, and night light settings do not apply in some cases
Microsoft has identified some scenarios where gamma ramps, color profiles and night light settings may stop working.

Microsoft has identified some scenarios in which these features may have issues or stop working, for example:
  • Connecting to (or disconnecting from) an external monitor, dock, or projector
  • Rotating the screen
  • Updating display drivers or making other display mode changes
  • Closing full screen applications
  • Applying custom color profiles
  • Running applications that rely on custom gamma ramps
Affected platforms:
  • Client: Windows 10, version 1903
Workaround: If you find that your night light has stopped working, try turning the night light off and on, or restarting your computer. For other color setting issues, restart your computer to correct the issue.

Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 18362.116

May 21, 2019
KB4505057
Mitigated
Last updated:
August 01, 2019
06:27 PM PT

Opened:
May 21, 2019
07:28 AM PT
Display brightness may not respond to adjustments
Microsoft and Intel have identified a driver compatibility issue on devices configured with certain Intel display drivers. After updating to Windows 10, version 1903, brightness settings may sometime appear as if changes applied took effect, yet the actual display brightness doesn't change.

To safeguard your update experience, we have applied a compatibility hold on devices with certain Intel drivers from being offered Windows 10, version 1903, until this issue is resolved.

Affected platforms:
  • Client: Windows 10, version 1903
Resolution: This issue was resolved in KB4505903 and the safeguard hold has been removed. Please ensure you have applied the resolving update before attempting to update to the Windows 10 May 2019 Update (version 1903). Please note, it can take up to 48 hours for the safeguard to be removed.

Back to top
OS Build 18362.116

May 21, 2019
KB4505057
Resolved
KB4505903
Resolved:
July 26, 2019
02:00 PM PT

Opened:
May 21, 2019
07:56 AM PT
Unable to discover or connect to Bluetooth devices
Microsoft has identified compatibility issues with some driver versions for Bluetooth radios made by Realtek and Qualcomm. To safeguard your update experience, we have applied a compatibility hold on devices with affected driver versions for Realtek or Qualcomm Bluetooth radios from being offered Windows 10, version 1903 or Windows Server, version 1903 until the driver has been updated.

Affected platforms:
  • Client: Windows 10, version 1903
  • Server: Windows Server, version 1903
Workaround: Check with your device manufacturer (OEM) to see if an updated driver is available and install it.

  • For Qualcomm drivers, you will need to install a driver version greater than 10.0.1.11.
  • For Realtek drivers, you will need to install a driver version greater than 1.5.1011.0.
Note Until an updated driver has been installed, we recommend you do not attempt to manually update using the Update now button or the Media Creation Tool. 

Next steps: Microsoft is working with Realtek and Qualcomm to release new drivers for all affected system via Windows Update.  


Back to top
OS Build 18362.116

May 21, 2019
KB4505057
Mitigated
Last updated:
May 21, 2019
04:48 PM PT

Opened:
May 21, 2019
07:29 AM PT
Intel Audio displays an intcdaud.sys notification
Microsoft and Intel have identified an issue with a range of Intel Display Audio device drivers that may result in higher than normal battery drain. If you see an intcdaud.sys notification or “What needs your attention” notification when trying to update to Windows 10, version 1903, you have an affected Intel Audio Display device driver installed on your machine (intcdaud.sys, versions 10.25.0.3 through 10.25.0.8).
  
To safeguard your update experience, we have applied a compatibility hold on devices with drivers from being offered Windows 10, version 1903 until updated device drivers have been installed.

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809
Workaround:
On the “What needs your attention\" notification, click the Back button to remain on your current version of Windows 10. (Do not click Confirm as this will proceed with the update and you may experience compatibility issues.) Affected devices will automatically revert to the previous working configuration.

For more information, see Intel's customer support guidance and the Microsoft knowledge base article KB4465877.

Note We recommend you do not attempt to update your devices until newer device drivers are installed.

Next steps: You can opt to wait for newer drivers to be installed automatically through Windows Update or check with the computer manufacturer for the latest device driver software availability and installation procedures.

Back to top
OS Build 18362.116

May 21, 2019
KB4505057
Mitigated
Last updated:
May 21, 2019
04:47 PM PT

Opened:
May 21, 2019
07:22 AM PT
Cannot launch Camera app
Microsoft and Intel have identified an issue affecting Intel RealSense SR300 and Intel RealSense S200 cameras when using the Camera app. After updating to the Windows 10 May 2019 Update and launching the Camera app, you may get an error message stating:

\"Close other apps, error code: 0XA00F4243.”


To safeguard your update experience, we have applied a protective hold on machines with Intel RealSense SR300 or Intel RealSense S200 cameras installed from being offered Windows 10, version 1903, until this issue is resolved.

Affected platforms:
  • Client: Windows 10, version 1903
Workaround: To temporarily resolve this issue, perform one of the following:

  • Unplug your camera and plug it back in.

or

  • Disable and re-enable the driver in Device Manager. In the Search box, type \"Device Manager\" and press Enter. In the Device Manager dialog box, expand Cameras, then right-click on any RealSense driver listed and select Disable device. Right click on the driver again and select Enable device.

or

  • Restart the RealSense service. In the Search box, type \"Task Manager\" and hit Enter. In the Task Manager dialog box, click on the Services tab, right-click on RealSense, and select Restart
Note This workaround will only resolve the issue until your next system restart.

Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 18362.116

May 21, 2019
KB4505057
Mitigated
Last updated:
May 21, 2019
04:47 PM PT

Opened:
May 21, 2019
07:20 AM PT
+ - @@ -80,9 +80,9 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusDate resolved
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 14393.3115

July 16, 2019
KB4507459
Resolved
KB4512517
August 13, 2019
10:00 AM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
OS Build 14393.3025

June 11, 2019
KB4503267
Resolved
KB4512495
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 14393.3144

August 13, 2019
KB4512517
Resolved
KB4512495
August 17, 2019
02:00 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 14393.3115

July 16, 2019
KB4507459
Resolved
KB4512517
August 13, 2019
10:00 AM PT
Internet Explorer 11 and apps using the WebBrowser control may fail to render
JavaScript may fail to render as expected in Internet Explorer 11 and in apps using JavaScript or the WebBrowser control.

See details >
OS Build 14393.3085

July 09, 2019
KB4507460
Resolved
KB4512517
August 13, 2019
10:00 AM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >
OS Build 14393.3025

June 11, 2019
KB4503267
Resolved External
August 09, 2019
07:03 PM PT
SCVMM cannot enumerate and manage logical switches deployed on the host
For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Resolved
KB4507459
July 16, 2019
10:00 AM PT
+ -
DetailsOriginating updateStatusHistory
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4507459. Devices that are domain controllers or domain members are both affected.

To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
+

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4512517 and the safeguard hold has been removed. Please note, it can take up to 48 hours before you can update to offered Windows 10, version 1903 or Windows Server, version 1903.

Back to top
OS Build 14393.3115

July 16, 2019
KB4507459
Resolved
KB4512517
Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503267 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512495.

Back to top
OS Build 14393.3025

June 11, 2019
KB4503267
Resolved
KB4512495
Resolved:
August 17, 2019
02:00 PM PT

Opened:
July 10, 2019
02:51 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4507459. Devices that are domain controllers or domain members are both affected.

To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
-

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4512517. To safeguard your upgrade experience, the compatibility hold on devices from being offered Windows 10, version 1903 or Windows Server, version 1903 is still in place. Once the issue is addressed on Windows 10, version 1903, this safeguard hold will be removed for all affected platforms. Check the Windows 10, version 1903 section of the release information dashboard for the most up to date information on this and other safeguard holds.

Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

Back to top
OS Build 14393.3115

July 16, 2019
KB4507459
Resolved
KB4512517
Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
Internet Explorer 11 and apps using the WebBrowser control may fail to render
Internet Explorer 11 may fail to render some JavaScript after installing KB4507460. You may also have issues with apps using JavaScript or the WebBrowser control, such as the present PowerPoint feature of Skype Meeting Broadcast.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server 2016
Resolution: This issue was resolved in KB4512517.

Back to top
OS Build 14393.3085

July 09, 2019
KB4507460
Resolved
KB4512517
Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 26, 2019
04:58 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1703.yml b/windows/release-information/resolved-issues-windows-10-1703.yml index 22ddb295df..582aec0f1a 100644 --- a/windows/release-information/resolved-issues-windows-10-1703.yml +++ b/windows/release-information/resolved-issues-windows-10-1703.yml @@ -32,8 +32,8 @@ sections: - type: markdown text: " + - @@ -71,8 +71,8 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusDate resolved
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 15063.1955

July 16, 2019
KB4507467
Resolved
KB4512507
August 13, 2019
10:00 AM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 15063.1988

August 13, 2019
KB4512507
Resolved
KB4512474
August 17, 2019
02:00 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 15063.1955

July 16, 2019
KB4507467
Resolved
KB4512507
August 13, 2019
10:00 AM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >
OS Build 15063.1868

June 11, 2019
KB4503279
Resolved External
August 09, 2019
07:03 PM PT
Devices with Hyper-V enabled may receive BitLocker error 0xC0210000
Some devices with Hyper-V enabled may start into BitLocker recovery with error 0xC0210000.

See details >
OS Build 15063.1805

May 14, 2019
KB4499181
Resolved
KB4507450
July 09, 2019
10:00 AM PT
Difficulty connecting to some iSCSI-based SANs
Devices may have difficulty connecting to some Storage Area Network (SAN) devices that leverage iSCSI.

See details >
OS Build 15063.1839

May 28, 2019
KB4499162
Resolved
KB4509476
June 26, 2019
04:00 PM PT
- +
DetailsOriginating updateStatusHistory
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4507467. Devices that are domain controllers or domain members are both affected.

To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
-

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4512507. To safeguard your upgrade experience, the compatibility hold on devices from being offered Windows 10, version 1903 or Windows Server, version 1903 is still in place. Once the issue is addressed on Windows 10, version 1903, this safeguard hold will be removed for all affected platforms. Check the Windows 10, version 1903 section of the release information dashboard for the most up to date information on this and other safeguard holds.

Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

Back to top
OS Build 15063.1955

July 16, 2019
KB4507467
Resolved
KB4512507
Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4507467. Devices that are domain controllers or domain members are both affected.

To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
+

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4512507 and the safeguard hold has been removed. Please note, it can take up to 48 hours before you can update to offered Windows 10, version 1903 or Windows Server, version 1903.

Back to top
OS Build 15063.1955

July 16, 2019
KB4507467
Resolved
KB4512507
Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1709.yml b/windows/release-information/resolved-issues-windows-10-1709.yml index 9bf77f7d45..0cdbe87fcb 100644 --- a/windows/release-information/resolved-issues-windows-10-1709.yml +++ b/windows/release-information/resolved-issues-windows-10-1709.yml @@ -32,9 +32,9 @@ sections: - type: markdown text: " + - @@ -73,9 +73,9 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusDate resolved
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 16299.1296

July 16, 2019
KB4507465
Resolved
KB4512516
August 13, 2019
10:00 AM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
OS Build 16299.1217

June 11, 2019
KB4503284
Resolved
KB4512494
August 16, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 16299.1331

August 13, 2019
KB4512516
Resolved
KB4512494
August 16, 2019
02:00 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 16299.1296

July 16, 2019
KB4507465
Resolved
KB4512516
August 13, 2019
10:00 AM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >
OS Build 16299.1217

June 11, 2019
KB4503284
Resolved External
August 09, 2019
07:03 PM PT
Difficulty connecting to some iSCSI-based SANs
Devices may have difficulty connecting to some Storage Area Network (SAN) devices that leverage iSCSI.

See details >
OS Build 16299.1182

May 28, 2019
KB4499147
Resolved
KB4509477
June 26, 2019
04:00 PM PT
Event Viewer may close or you may receive an error when using Custom Views
When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

See details >
OS Build 16299.1217

June 11, 2019
KB4503284
Resolved
KB4503281
June 18, 2019
02:00 PM PT
+ -
DetailsOriginating updateStatusHistory
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4507465. Devices that are domain controllers or domain members are both affected.

To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
+

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4512516 and the safeguard hold has been removed. Please note, it can take up to 48 hours before you can update to offered Windows 10, version 1903 or Windows Server, version 1903.

Back to top
OS Build 16299.1296

July 16, 2019
KB4507465
Resolved
KB4512516
Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503284 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512494.

Back to top
OS Build 16299.1217

June 11, 2019
KB4503284
Resolved
KB4512494
Resolved:
August 16, 2019
02:00 PM PT

Opened:
July 10, 2019
02:51 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4507465. Devices that are domain controllers or domain members are both affected.

To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
-

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4512516. To safeguard your upgrade experience, the compatibility hold on devices from being offered Windows 10, version 1903 or Windows Server, version 1903 is still in place. Once the issue is addressed on Windows 10, version 1903, this safeguard hold will be removed for all affected platforms. Check the Windows 10, version 1903 section of the release information dashboard for the most up to date information on this and other safeguard holds.

Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

Back to top
OS Build 16299.1296

July 16, 2019
KB4507465
Resolved
KB4512516
Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1803.yml b/windows/release-information/resolved-issues-windows-10-1803.yml index f6b4c85fb6..174aa6ebe6 100644 --- a/windows/release-information/resolved-issues-windows-10-1803.yml +++ b/windows/release-information/resolved-issues-windows-10-1803.yml @@ -32,10 +32,10 @@ sections: - type: markdown text: " + - @@ -83,9 +83,9 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusDate resolved
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 17134.915

July 16, 2019
KB4507466
Resolved
KB4512501
August 13, 2019
10:00 AM PT
Notification issue: \"Your device is missing important security and quality fixes.\"
Some users may have incorrectly received the notification \"Your device is missing important security and quality fixes.\"

See details >
N/A

Resolved
September 03, 2019
12:32 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
OS Build 17134.829

June 11, 2019
KB4503286
Resolved
KB4512509
August 19, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 17134.950

August 13, 2019
KB4512501
Resolved
KB4512509
August 19, 2019
02:00 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 17134.915

July 16, 2019
KB4507466
Resolved
KB4512501
August 13, 2019
10:00 AM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >
OS Build 17134.829

June 11, 2019
KB4503286
Resolved External
August 09, 2019
07:03 PM PT
Difficulty connecting to some iSCSI-based SANs
Devices may have difficulty connecting to some Storage Area Network (SAN) devices that leverage iSCSI.

See details >
OS Build 17134.799

May 21, 2019
KB4499183
Resolved
KB4509478
June 26, 2019
04:00 PM PT
Event Viewer may close or you may receive an error when using Custom Views
When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

See details >
OS Build 17134.829

June 11, 2019
KB4503286
Resolved
KB4503288
June 18, 2019
02:00 PM PT
+ -
DetailsOriginating updateStatusHistory
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4507466. Devices that are domain controllers or domain members are both affected.

To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
+

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4512501 and the safeguard hold has been removed. Please note, it can take up to 48 hours before you can update to offered Windows 10, version 1903 or Windows Server, version 1903.

Back to top
OS Build 17134.915

July 16, 2019
KB4507466
Resolved
KB4512501
Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503286 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512509.

Back to top
OS Build 17134.829

June 11, 2019
KB4503286
Resolved
KB4512509
Resolved:
August 19, 2019
02:00 PM PT

Opened:
July 10, 2019
02:51 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4507466. Devices that are domain controllers or domain members are both affected.

To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
-

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4512501. To safeguard your upgrade experience, the compatibility hold on devices from being offered Windows 10, version 1903 or Windows Server, version 1903 is still in place. Once the issue is addressed on Windows 10, version 1903, this safeguard hold will be removed for all affected platforms. Check the Windows 10, version 1903 section of the release information dashboard for the most up to date information on this and other safeguard holds.

Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

Back to top
OS Build 17134.915

July 16, 2019
KB4507466
Resolved
KB4512501
Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml index 99b8f5966a..81e2a0f077 100644 --- a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml @@ -32,9 +32,9 @@ sections: - type: markdown text: " + - @@ -82,9 +82,9 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusDate resolved
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 17763.652

July 22, 2019
KB4505658
Resolved
KB4511553
August 13, 2019
10:00 AM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
OS Build 17763.557

June 11, 2019
KB4503327
Resolved
KB4512534
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 17763.678

August 13, 2019
KB4511553
Resolved
KB4512534
August 17, 2019
02:00 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 17763.652

July 22, 2019
KB4505658
Resolved
KB4511553
August 13, 2019
10:00 AM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >
OS Build 17763.557

June 11, 2019
KB4503327
Resolved External
August 09, 2019
07:03 PM PT
Difficulty connecting to some iSCSI-based SANs
Devices may have difficulty connecting to some Storage Area Network (SAN) devices that leverage iSCSI.

See details >
OS Build 17763.529

May 21, 2019
KB4497934
Resolved
KB4509479
June 26, 2019
04:00 PM PT
Devices with Realtek Bluetooth radios drivers may not pair or connect as expected
Devices with some Realtek Bluetooth radios drivers, in some circumstances, may have issues pairing or connecting to devices.

See details >
OS Build 17763.503

May 14, 2019
KB4494441
Resolved
KB4501371
June 18, 2019
02:00 PM PT
+ -
DetailsOriginating updateStatusHistory
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4505658. Devices that are domain controllers or domain members are both affected.

To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
+

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4511553 and the safeguard hold has been removed. Please note, it can take up to 48 hours before you can update to offered Windows 10, version 1903 or Windows Server, version 1903.

Back to top
OS Build 17763.652

July 22, 2019
KB4505658
Resolved
KB4511553
Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503327 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512534.

Back to top
OS Build 17763.557

June 11, 2019
KB4503327
Resolved
KB4512534
Resolved:
August 17, 2019
02:00 PM PT

Opened:
July 10, 2019
02:51 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4505658. Devices that are domain controllers or domain members are both affected.

To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
-

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4511553. To safeguard your upgrade experience, the compatibility hold on devices from being offered Windows 10, version 1903 or Windows Server, version 1903 is still in place. Once the issue is addressed on Windows 10, version 1903, this safeguard hold will be removed for all affected platforms. Check the Windows 10, version 1903 section of the release information dashboard for the most up to date information on this and other safeguard holds.

Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

Back to top
OS Build 17763.652

July 22, 2019
KB4505658
Resolved
KB4511553
Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1903.yml b/windows/release-information/resolved-issues-windows-10-1903.yml index e3349d1356..56fb3d90af 100644 --- a/windows/release-information/resolved-issues-windows-10-1903.yml +++ b/windows/release-information/resolved-issues-windows-10-1903.yml @@ -32,12 +32,12 @@ sections: - type: markdown text: " + + - - @@ -74,11 +74,11 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusDate resolved
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 18362.145

May 29, 2019
KB4497935
Resolved
KB4512941
August 30, 2019
10:00 AM PT
Issues updating when certain versions of Intel storage drivers are installed
Certain versions of Intel Rapid Storage Technology (Intel RST) drivers may cause updating to Windows 10, version 1903 to fail.

See details >
OS Build 18362.145

May 29, 2019
KB4497935
Resolved
KB4512941
August 30, 2019
10:00 AM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 18362.295

August 13, 2019
KB4512508
Resolved
KB4512941
August 30, 2019
10:00 AM PT
Issues updating when certain versions of Intel storage drivers are installed
Certain versions of Intel Rapid Storage Technology (Intel RST) drivers may cause updating to Windows 10, version 1903 to fail.

See details >
OS Build 18362.145

May 29, 2019
KB4497935
Resolved
KB4512941
August 30, 2019
10:00 AM PT
Initiating a Remote Desktop connection may result in black screen
When initiating a Remote Desktop connection to devices with some older GPU drivers, you may receive a black screen.

See details >
OS Build 18362.145

May 29, 2019
KB4497935
Resolved
KB4512941
August 30, 2019
10:00 AM PT
Windows Sandbox may fail to start with error code “0x80070002”
Windows Sandbox may fail to start with \"ERROR_FILE_NOT_FOUND (0x80070002)\" on devices in which the operating system language was changed between updates

See details >
OS Build 18362.116

May 20, 2019
KB4505057
Resolved
KB4512941
August 30, 2019
10:00 AM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
OS Build 18362.175

June 11, 2019
KB4503293
Resolved
KB4512941
August 30, 2019
10:00 AM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 18362.145

May 29, 2019
KB4497935
Resolved
KB4512941
August 30, 2019
10:00 AM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >
OS Build 18362.175

June 11, 2019
KB4503293
Resolved External
August 09, 2019
07:03 PM PT
Display brightness may not respond to adjustments
Microsoft and Intel have identified a driver compatibility issue on devices configured with certain Intel display drivers.

See details >
OS Build 18362.116

May 21, 2019
KB4505057
Resolved
KB4505903
July 26, 2019
02:00 PM PT
RASMAN service may stop working and result in the error “0xc0000005”
The Remote Access Connection Manager (RASMAN) service may stop working and result in the error “0xc0000005” with VPN profiles configured as an Always On VPN connection.

See details >
OS Build 18362.145

May 29, 2019
KB4497935
Resolved
KB4505903
July 26, 2019
02:00 PM PT
- + + -
DetailsOriginating updateStatusHistory
Issues updating when certain versions of Intel storage drivers are installed
Intel and Microsoft have found incompatibility issues with certain versions of the Intel Rapid Storage Technology (Intel RST) drivers and the Windows 10 May 2019 Update (Windows 10, version 1903).  

To safeguard your update experience, we have applied a compatibility hold on devices with Intel RST drivers, versions 15.1.0.1002 through version 15.5.2.1053 installed from installing or being offered Windows 10, version 1903 or Windows Server, version 1903, until the driver has been updated.

Versions 15.5.2.1054 or later are compatible, and a device that has these drivers installed can install the Windows 10 May 2019 Update. For affected devices, the recommended version is 15.9.8.1050.

Affected platforms:
  • Client: Windows 10, version 1903
  • Server: Windows Server, version 1903
Workaround: To mitigate this issue before the safeguard hold is removed, you will need to update the Intel RST drivers for your device to version 15.5.2.1054 or a later.  Check with your device manufacturer (OEM) to see if an updated driver is available and install it. You can also download the latest Intel RST drivers directly from Intel at Intel® Rapid Storage Technology (Intel® RST) User Interface and Driver. Once your drivers are updated, you can restart the installation process for Windows 10, version 1903. Please note, it can take up to 48 hours before you can update to Windows 10, version 1903.

Resolution: This issue was resolved in KB4512941. The safeguard hold is estimated to be removed in early September.

Back to top
OS Build 18362.145

May 29, 2019
KB4497935
Resolved
KB4512941
Resolved:
August 30, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4497935. Devices that are domain controllers or domain members are both affected.

To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
+

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4512941 and the safeguard hold has been removed. Please note, it can take up to 48 hours before you can update to offered Windows 10, version 1903 or Windows Server, version 1903.

Back to top
OS Build 18362.145

May 29, 2019
KB4497935
Resolved
KB4512941
Resolved:
August 30, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
Issues updating when certain versions of Intel storage drivers are installed
Intel and Microsoft have found incompatibility issues with certain versions of the Intel Rapid Storage Technology (Intel RST) drivers and the Windows 10 May 2019 Update (Windows 10, version 1903).  

To safeguard your update experience, we have applied a compatibility hold on devices with Intel RST drivers, versions 15.1.0.1002 through version 15.5.2.1053 installed from installing or being offered Windows 10, version 1903 or Windows Server, version 1903, until the driver has been updated.

Versions 15.5.2.1054 or later are compatible, and a device that has these drivers installed can install the Windows 10 May 2019 Update. For affected devices, the recommended version is 15.9.8.1050.

Affected platforms:
  • Client: Windows 10, version 1903
  • Server: Windows Server, version 1903
Resolution: This issue was resolved in KB4512941 and the safeguard hold has been removed. Please note, it can take up to 48 hours before you can update to Windows 10, version 1903.

Back to top
OS Build 18362.145

May 29, 2019
KB4497935
Resolved
KB4512941
Resolved:
August 30, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
Initiating a Remote Desktop connection may result in black screen
When initiating a Remote Desktop connection to devices with some older GPU drivers, you may receive a black screen. Any version of Windows may encounter this issue when initiating a Remote Desktop connection to a Windows 10, version 1903 device which is running an affected display driver, including the drivers for the Intel 4 series chipset integrated GPU (iGPU).

Affected platforms:
  • Client: Windows 10, version 1903
  • Server: Windows Server, version 1903
Resolution: This issue was resolved in KB4512941.

Back to top
OS Build 18362.145

May 29, 2019
KB4497935
Resolved
KB4512941
Resolved:
August 30, 2019
10:00 AM PT

Opened:
July 12, 2019
04:42 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503293 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512941.

Back to top
OS Build 18362.175

June 11, 2019
KB4503293
Resolved
KB4512941
Resolved:
August 30, 2019
10:00 AM PT

Opened:
July 10, 2019
02:51 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4497935. Devices that are domain controllers or domain members are both affected.

To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
-

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4512941. The safeguard hold is estimated to be removed in early September.

Back to top
OS Build 18362.145

May 29, 2019
KB4497935
Resolved
KB4512941
Resolved:
August 30, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
" diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index fb76299a24..da23159b5b 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -60,9 +60,9 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ - @@ -95,9 +95,9 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 14393.3115

July 16, 2019
KB4507459
Resolved
KB4512517
August 13, 2019
10:00 AM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
OS Build 14393.3025

June 11, 2019
KB4503267
Resolved
KB4512495
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 14393.3144

August 13, 2019
KB4512517
Resolved
KB4512495
August 17, 2019
02:00 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 14393.3115

July 16, 2019
KB4507459
Resolved
KB4512517
August 13, 2019
10:00 AM PT
Internet Explorer 11 and apps using the WebBrowser control may fail to render
JavaScript may fail to render as expected in Internet Explorer 11 and in apps using JavaScript or the WebBrowser control.

See details >
OS Build 14393.3085

July 09, 2019
KB4507460
Resolved
KB4512517
August 13, 2019
10:00 AM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >
OS Build 14393.3025

June 11, 2019
KB4503267
Resolved External
August 09, 2019
07:03 PM PT
Apps and scripts using the NetQueryDisplayInformation API may fail with error
Applications and scripts that call the NetQueryDisplayInformation API or the WinNT provider equivalent may fail to return results after the first page of data.

See details >
OS Build 14393.3053

June 18, 2019
KB4503294
Investigating
August 01, 2019
05:00 PM PT
+ -
DetailsOriginating updateStatusHistory
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4507459. Devices that are domain controllers or domain members are both affected.

To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
+

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4512517 and the safeguard hold has been removed. Please note, it can take up to 48 hours before you can update to offered Windows 10, version 1903 or Windows Server, version 1903.

Back to top
OS Build 14393.3115

July 16, 2019
KB4507459
Resolved
KB4512517
Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503267 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512495.

Back to top
OS Build 14393.3025

June 11, 2019
KB4503267
Resolved
KB4512495
Resolved:
August 17, 2019
02:00 PM PT

Opened:
July 10, 2019
02:51 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4507459. Devices that are domain controllers or domain members are both affected.

To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
-

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4512517. To safeguard your upgrade experience, the compatibility hold on devices from being offered Windows 10, version 1903 or Windows Server, version 1903 is still in place. Once the issue is addressed on Windows 10, version 1903, this safeguard hold will be removed for all affected platforms. Check the Windows 10, version 1903 section of the release information dashboard for the most up to date information on this and other safeguard holds.

Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

Back to top
OS Build 14393.3115

July 16, 2019
KB4507459
Resolved
KB4512517
Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
Internet Explorer 11 and apps using the WebBrowser control may fail to render
Internet Explorer 11 may fail to render some JavaScript after installing KB4507460. You may also have issues with apps using JavaScript or the WebBrowser control, such as the present PowerPoint feature of Skype Meeting Broadcast.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server 2016
Resolution: This issue was resolved in KB4512517.

Back to top
OS Build 14393.3085

July 09, 2019
KB4507460
Resolved
KB4512517
Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 26, 2019
04:58 PM PT
" diff --git a/windows/release-information/status-windows-10-1703.yml b/windows/release-information/status-windows-10-1703.yml index dbe7b4e91e..804da5f5fe 100644 --- a/windows/release-information/status-windows-10-1703.yml +++ b/windows/release-information/status-windows-10-1703.yml @@ -66,8 +66,8 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ -
SummaryOriginating updateStatusLast updated
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 15063.1955

July 16, 2019
KB4507467
Resolved
KB4512507
August 13, 2019
10:00 AM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 15063.1988

August 13, 2019
KB4512507
Resolved
KB4512474
August 17, 2019
02:00 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 15063.1955

July 16, 2019
KB4507467
Resolved
KB4512507
August 13, 2019
10:00 AM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >
OS Build 15063.1868

June 11, 2019
KB4503279
Resolved External
August 09, 2019
07:03 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Mitigated
April 25, 2019
02:00 PM PT
@@ -95,8 +95,8 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4507467. Devices that are domain controllers or domain members are both affected.

To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
-

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4512507. To safeguard your upgrade experience, the compatibility hold on devices from being offered Windows 10, version 1903 or Windows Server, version 1903 is still in place. Once the issue is addressed on Windows 10, version 1903, this safeguard hold will be removed for all affected platforms. Check the Windows 10, version 1903 section of the release information dashboard for the most up to date information on this and other safeguard holds.

Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

Back to top
OS Build 15063.1955

July 16, 2019
KB4507467
Resolved
KB4512507
Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4507467. Devices that are domain controllers or domain members are both affected.

To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
+

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4512507 and the safeguard hold has been removed. Please note, it can take up to 48 hours before you can update to offered Windows 10, version 1903 or Windows Server, version 1903.

Back to top
OS Build 15063.1955

July 16, 2019
KB4507467
Resolved
KB4512507
Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
" diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index 9fa8392574..27e013f10f 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -60,9 +60,9 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ -
SummaryOriginating updateStatusLast updated
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 16299.1296

July 16, 2019
KB4507465
Resolved
KB4512516
August 13, 2019
10:00 AM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
OS Build 16299.1217

June 11, 2019
KB4503284
Resolved
KB4512494
August 16, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 16299.1331

August 13, 2019
KB4512516
Resolved
KB4512494
August 16, 2019
02:00 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 16299.1296

July 16, 2019
KB4507465
Resolved
KB4512516
August 13, 2019
10:00 AM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >
OS Build 16299.1217

June 11, 2019
KB4503284
Resolved External
August 09, 2019
07:03 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Mitigated
April 25, 2019
02:00 PM PT
@@ -90,9 +90,9 @@ sections: - type: markdown text: " + -
DetailsOriginating updateStatusHistory
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4507465. Devices that are domain controllers or domain members are both affected.

To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
+

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4512516 and the safeguard hold has been removed. Please note, it can take up to 48 hours before you can update to offered Windows 10, version 1903 or Windows Server, version 1903.

Back to top
OS Build 16299.1296

July 16, 2019
KB4507465
Resolved
KB4512516
Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503284 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512494.

Back to top
OS Build 16299.1217

June 11, 2019
KB4503284
Resolved
KB4512494
Resolved:
August 16, 2019
02:00 PM PT

Opened:
July 10, 2019
02:51 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4507465. Devices that are domain controllers or domain members are both affected.

To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
-

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4512516. To safeguard your upgrade experience, the compatibility hold on devices from being offered Windows 10, version 1903 or Windows Server, version 1903 is still in place. Once the issue is addressed on Windows 10, version 1903, this safeguard hold will be removed for all affected platforms. Check the Windows 10, version 1903 section of the release information dashboard for the most up to date information on this and other safeguard holds.

Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

Back to top
OS Build 16299.1296

July 16, 2019
KB4507465
Resolved
KB4512516
Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
" diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml index fe3c6577c2..5b3d8b4dd9 100644 --- a/windows/release-information/status-windows-10-1803.yml +++ b/windows/release-information/status-windows-10-1803.yml @@ -65,10 +65,10 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ - @@ -106,9 +106,9 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 17134.915

July 16, 2019
KB4507466
Resolved
KB4512501
August 13, 2019
10:00 AM PT
Notification issue: \"Your device is missing important security and quality fixes.\"
Some users may have incorrectly received the notification \"Your device is missing important security and quality fixes.\"

See details >
N/A

Resolved
September 03, 2019
12:32 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
OS Build 17134.829

June 11, 2019
KB4503286
Resolved
KB4512509
August 19, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 17134.950

August 13, 2019
KB4512501
Resolved
KB4512509
August 19, 2019
02:00 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 17134.915

July 16, 2019
KB4507466
Resolved
KB4512501
August 13, 2019
10:00 AM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >
OS Build 17134.829

June 11, 2019
KB4503286
Resolved External
August 09, 2019
07:03 PM PT
Startup to a black screen after installing updates
Your device may startup to a black screen during the first logon after installing updates.

See details >
OS Build 17134.829

June 11, 2019
KB4503286
Mitigated
June 14, 2019
04:41 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Mitigated
April 25, 2019
02:00 PM PT
+ -
DetailsOriginating updateStatusHistory
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4507466. Devices that are domain controllers or domain members are both affected.

To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
+

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4512501 and the safeguard hold has been removed. Please note, it can take up to 48 hours before you can update to offered Windows 10, version 1903 or Windows Server, version 1903.

Back to top
OS Build 17134.915

July 16, 2019
KB4507466
Resolved
KB4512501
Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503286 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512509.

Back to top
OS Build 17134.829

June 11, 2019
KB4503286
Resolved
KB4512509
Resolved:
August 19, 2019
02:00 PM PT

Opened:
July 10, 2019
02:51 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4507466. Devices that are domain controllers or domain members are both affected.

To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
-

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4512501. To safeguard your upgrade experience, the compatibility hold on devices from being offered Windows 10, version 1903 or Windows Server, version 1903 is still in place. Once the issue is addressed on Windows 10, version 1903, this safeguard hold will be removed for all affected platforms. Check the Windows 10, version 1903 section of the release information dashboard for the most up to date information on this and other safeguard holds.

Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

Back to top
OS Build 17134.915

July 16, 2019
KB4507466
Resolved
KB4512501
Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
" diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index 5a2c3b8df0..d85effd748 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -64,9 +64,9 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ - @@ -98,9 +98,9 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 17763.652

July 22, 2019
KB4505658
Resolved
KB4511553
August 13, 2019
10:00 AM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
OS Build 17763.557

June 11, 2019
KB4503327
Resolved
KB4512534
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 17763.678

August 13, 2019
KB4511553
Resolved
KB4512534
August 17, 2019
02:00 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 17763.652

July 22, 2019
KB4505658
Resolved
KB4511553
August 13, 2019
10:00 AM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >
OS Build 17763.557

June 11, 2019
KB4503327
Resolved External
August 09, 2019
07:03 PM PT
Apps and scripts using the NetQueryDisplayInformation API may fail with error
Applications and scripts that call the NetQueryDisplayInformation API or the WinNT provider equivalent may fail to return results after the first page of data.

See details >
OS Build 17763.55

October 09, 2018
KB4464330
Investigating
August 01, 2019
05:00 PM PT
Startup to a black screen after installing updates
Your device may startup to a black screen during the first logon after installing updates.

See details >
OS Build 17763.557

June 11, 2019
KB4503327
Mitigated
June 14, 2019
04:41 PM PT
+ -
DetailsOriginating updateStatusHistory
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4505658. Devices that are domain controllers or domain members are both affected.

To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
+

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4511553 and the safeguard hold has been removed. Please note, it can take up to 48 hours before you can update to offered Windows 10, version 1903 or Windows Server, version 1903.

Back to top
OS Build 17763.652

July 22, 2019
KB4505658
Resolved
KB4511553
Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503327 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512534.

Back to top
OS Build 17763.557

June 11, 2019
KB4503327
Resolved
KB4512534
Resolved:
August 17, 2019
02:00 PM PT

Opened:
July 10, 2019
02:51 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4505658. Devices that are domain controllers or domain members are both affected.

To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
-

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4511553. To safeguard your upgrade experience, the compatibility hold on devices from being offered Windows 10, version 1903 or Windows Server, version 1903 is still in place. Once the issue is addressed on Windows 10, version 1903, this safeguard hold will be removed for all affected platforms. Check the Windows 10, version 1903 section of the release information dashboard for the most up to date information on this and other safeguard holds.

Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

Back to top
OS Build 17763.652

July 22, 2019
KB4505658
Resolved
KB4511553
Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
" diff --git a/windows/release-information/status-windows-10-1903.yml b/windows/release-information/status-windows-10-1903.yml index 9201d1cb20..efe7452abd 100644 --- a/windows/release-information/status-windows-10-1903.yml +++ b/windows/release-information/status-windows-10-1903.yml @@ -65,13 +65,13 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ + - - @@ -115,11 +115,11 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 18362.145

May 29, 2019
KB4497935
Resolved
KB4512941
August 30, 2019
10:00 AM PT
Issues updating when certain versions of Intel storage drivers are installed
Certain versions of Intel Rapid Storage Technology (Intel RST) drivers may cause updating to Windows 10, version 1903 to fail.

See details >
OS Build 18362.145

May 29, 2019
KB4497935
Resolved
KB4512941
August 30, 2019
10:00 AM PT
Windows Desktop Search may not return any results and may have high CPU usage
Windows Desktop Search may not return any results and SearchUI.exe may have high CPU usage after installing KB4512941.

See details >
OS Build 18362.329

August 30, 2019
KB4512941
Investigating
September 04, 2019
02:25 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 18362.295

August 13, 2019
KB4512508
Resolved
KB4512941
August 30, 2019
10:00 AM PT
Issues updating when certain versions of Intel storage drivers are installed
Certain versions of Intel Rapid Storage Technology (Intel RST) drivers may cause updating to Windows 10, version 1903 to fail.

See details >
OS Build 18362.145

May 29, 2019
KB4497935
Resolved
KB4512941
August 30, 2019
10:00 AM PT
Initiating a Remote Desktop connection may result in black screen
When initiating a Remote Desktop connection to devices with some older GPU drivers, you may receive a black screen.

See details >
OS Build 18362.145

May 29, 2019
KB4497935
Resolved
KB4512941
August 30, 2019
10:00 AM PT
Windows Sandbox may fail to start with error code “0x80070002”
Windows Sandbox may fail to start with \"ERROR_FILE_NOT_FOUND (0x80070002)\" on devices in which the operating system language was changed between updates

See details >
OS Build 18362.116

May 20, 2019
KB4505057
Resolved
KB4512941
August 30, 2019
10:00 AM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
OS Build 18362.175

June 11, 2019
KB4503293
Resolved
KB4512941
August 30, 2019
10:00 AM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 18362.145

May 29, 2019
KB4497935
Resolved
KB4512941
August 30, 2019
10:00 AM PT
Updates may fail to install and you may receive Error 0x80073701
Installation of updates may fail and you may receive an error, \"Updates Failed, There were problems installing some updates, but we'll try again later\" and \"Error 0x80073701.\"

See details >
OS Build 18362.145

May 29, 2019
KB4497935
Investigating
August 16, 2019
04:28 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >
OS Build 18362.175

June 11, 2019
KB4503293
Resolved External
August 09, 2019
07:03 PM PT
Intermittent loss of Wi-Fi connectivity
Some older devices may experience loss of Wi-Fi connectivity due to an outdated Qualcomm driver.

See details >
OS Build 18362.116

May 21, 2019
KB4505057
Mitigated External
August 01, 2019
08:44 PM PT
- + + -
DetailsOriginating updateStatusHistory
Issues updating when certain versions of Intel storage drivers are installed
Intel and Microsoft have found incompatibility issues with certain versions of the Intel Rapid Storage Technology (Intel RST) drivers and the Windows 10 May 2019 Update (Windows 10, version 1903).  

To safeguard your update experience, we have applied a compatibility hold on devices with Intel RST drivers, versions 15.1.0.1002 through version 15.5.2.1053 installed from installing or being offered Windows 10, version 1903 or Windows Server, version 1903, until the driver has been updated.

Versions 15.5.2.1054 or later are compatible, and a device that has these drivers installed can install the Windows 10 May 2019 Update. For affected devices, the recommended version is 15.9.8.1050.

Affected platforms:
  • Client: Windows 10, version 1903
  • Server: Windows Server, version 1903
Workaround: To mitigate this issue before the safeguard hold is removed, you will need to update the Intel RST drivers for your device to version 15.5.2.1054 or a later.  Check with your device manufacturer (OEM) to see if an updated driver is available and install it. You can also download the latest Intel RST drivers directly from Intel at Intel® Rapid Storage Technology (Intel® RST) User Interface and Driver. Once your drivers are updated, you can restart the installation process for Windows 10, version 1903. Please note, it can take up to 48 hours before you can update to Windows 10, version 1903.

Resolution: This issue was resolved in KB4512941. The safeguard hold is estimated to be removed in early September.

Back to top
OS Build 18362.145

May 29, 2019
KB4497935
Resolved
KB4512941
Resolved:
August 30, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4497935. Devices that are domain controllers or domain members are both affected.

To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
+

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4512941 and the safeguard hold has been removed. Please note, it can take up to 48 hours before you can update to offered Windows 10, version 1903 or Windows Server, version 1903.

Back to top
OS Build 18362.145

May 29, 2019
KB4497935
Resolved
KB4512941
Resolved:
August 30, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
Issues updating when certain versions of Intel storage drivers are installed
Intel and Microsoft have found incompatibility issues with certain versions of the Intel Rapid Storage Technology (Intel RST) drivers and the Windows 10 May 2019 Update (Windows 10, version 1903).  

To safeguard your update experience, we have applied a compatibility hold on devices with Intel RST drivers, versions 15.1.0.1002 through version 15.5.2.1053 installed from installing or being offered Windows 10, version 1903 or Windows Server, version 1903, until the driver has been updated.

Versions 15.5.2.1054 or later are compatible, and a device that has these drivers installed can install the Windows 10 May 2019 Update. For affected devices, the recommended version is 15.9.8.1050.

Affected platforms:
  • Client: Windows 10, version 1903
  • Server: Windows Server, version 1903
Resolution: This issue was resolved in KB4512941 and the safeguard hold has been removed. Please note, it can take up to 48 hours before you can update to Windows 10, version 1903.

Back to top
OS Build 18362.145

May 29, 2019
KB4497935
Resolved
KB4512941
Resolved:
August 30, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
Initiating a Remote Desktop connection may result in black screen
When initiating a Remote Desktop connection to devices with some older GPU drivers, you may receive a black screen. Any version of Windows may encounter this issue when initiating a Remote Desktop connection to a Windows 10, version 1903 device which is running an affected display driver, including the drivers for the Intel 4 series chipset integrated GPU (iGPU).

Affected platforms:
  • Client: Windows 10, version 1903
  • Server: Windows Server, version 1903
Resolution: This issue was resolved in KB4512941.

Back to top
OS Build 18362.145

May 29, 2019
KB4497935
Resolved
KB4512941
Resolved:
August 30, 2019
10:00 AM PT

Opened:
July 12, 2019
04:42 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503293 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512941.

Back to top
OS Build 18362.175

June 11, 2019
KB4503293
Resolved
KB4512941
Resolved:
August 30, 2019
10:00 AM PT

Opened:
July 10, 2019
02:51 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4497935. Devices that are domain controllers or domain members are both affected.

To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
-

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4512941. The safeguard hold is estimated to be removed in early September.

Back to top
OS Build 18362.145

May 29, 2019
KB4497935
Resolved
KB4512941
Resolved:
August 30, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
The dGPU may occasionally disappear from device manager on Surface Book 2 with dGPU
Microsoft has identified a compatibility issue on some Surface Book 2 devices configured with Nvidia discrete graphics processing unit (dGPU). After updating to Windows 10, version 1903 (May 2019 Feature Update), some apps or games that needs to perform graphics intensive operations may close or fail to open.

To safeguard your update experience, we have applied a compatibility hold on Surface Book 2 devices with Nvidia dGPUs from being offered Windows 10, version 1903, until this issue is resolved.

Affected platforms:
  • Client: Windows 10, version 1903
Workaround: To mitigate the issue if you are already on Windows 10, version 1903, you can restart the device or select the Scan for hardware changes button in the Action menu or on the toolbar in Device Manager.

Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 18362.145

May 29, 2019
KB4497935
Investigating
Last updated:
July 16, 2019
09:04 AM PT

Opened:
July 12, 2019
04:20 PM PT
" From 47270b5cde665850a39acd8298eadcb55bcc2278 Mon Sep 17 00:00:00 2001 From: illfated Date: Sat, 7 Sep 2019 21:34:41 +0200 Subject: [PATCH 111/285] Microsoft Defender ATP: amend broken link The link "Get started" at the end of the page "Microsoft Defender Advanced Threat Protection" points to a non-existing page. It may have been renamed and the name "Get started" appropriated as one of the expandable sections in the left hand side index/TOC section. The suggested change is to replace the broken link `get-started.md` with `minimum-requirements.md` found at the same directory level. Broken link: https://github.com/MicrosoftDocs/windows-itpro-docs/blob/master/windows/security/threat-protection/microsoft-defender-atp/get-started.md Replacement link: https://github.com/MicrosoftDocs/windows-itpro-docs/blob/master/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements.md Thanks to xNiklasJern for discovering the broken link. Closes #4832 --- ...icrosoft-defender-advanced-threat-protection.md | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md index 884822f607..7ce66379c0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md @@ -19,9 +19,9 @@ ms.topic: conceptual # Microsoft Defender Advanced Threat Protection ->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-main-abovefoldlink) +> Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-main-abovefoldlink) > ->For more info about Windows 10 Enterprise Edition features and functionality, see [Windows 10 Enterprise edition](https://www.microsoft.com/WindowsForBusiness/buy). +> For more info about Windows 10 Enterprise Edition features and functionality, see [Windows 10 Enterprise edition](https://www.microsoft.com/WindowsForBusiness/buy). Microsoft Defender Advanced Threat Protection is a platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats. @@ -66,9 +66,9 @@ Microsoft Defender ATP uses the following combination of technology built into W
->[!TIP] ->- Learn about the latest enhancements in Microsoft Defender ATP: [What's new in Microsoft Defender ATP](https://cloudblogs.microsoft.com/microsoftsecure/2018/11/15/whats-new-in-windows-defender-atp/). ->- Microsoft Defender ATP demonstrated industry-leading optics and detection capabilities in the recent MITRE evaluation. Read: [Insights from the MITRE ATT&CK-based evaluation](https://cloudblogs.microsoft.com/microsoftsecure/2018/12/03/insights-from-the-mitre-attack-based-evaluation-of-windows-defender-atp/). +> [!TIP] +> - Learn about the latest enhancements in Microsoft Defender ATP: [What's new in Microsoft Defender ATP](https://cloudblogs.microsoft.com/microsoftsecure/2018/11/15/whats-new-in-windows-defender-atp/). +> - Microsoft Defender ATP demonstrated industry-leading optics and detection capabilities in the recent MITRE evaluation. Read: [Insights from the MITRE ATT&CK-based evaluation](https://cloudblogs.microsoft.com/microsoftsecure/2018/12/03/insights-from-the-mitre-attack-based-evaluation-of-windows-defender-atp/). @@ -99,7 +99,7 @@ In conjunction with being able to quickly respond to advanced attacks, Microsoft **[Secure score](overview-secure-score.md)**
->[!NOTE] +> [!NOTE] > Secure score is now part of [Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md) as [Configuration score](configuration-score.md). The secure score page will be available for a few weeks. View the [Secure score](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score) page. Microsoft Defender ATP includes a secure score to help you dynamically assess the security state of your enterprise network, identify unprotected systems, and take recommended actions to improve the overall security of your organization. @@ -127,7 +127,7 @@ To help you maximize the effectiveness of the security platform, you can configu Topic | Description :---|:--- [Overview](overview.md) | Understand the concepts behind the capabilities in Microsoft Defender ATP so you take full advantage of the complete threat protection platform. -[Get started](get-started.md) | Learn about the requirements of the platform and the initial steps you need to take to get started with Microsoft Defender ATP. +[Minimum requirements](minimum-requirements.md) | Learn about the requirements of the platform and the initial steps you need to take to get started with Microsoft Defender ATP. [Configure and manage capabilities](onboard.md)| Configure and manage the individual capabilities in Microsoft Defender ATP. [Troubleshoot Microsoft Defender ATP](troubleshoot-mdatp.md) | Learn how to address issues that you might encounter while using the platform. From 31dc5170cfee73155ccf1299e4f26386feffb4ea Mon Sep 17 00:00:00 2001 From: illfated Date: Sat, 7 Sep 2019 23:05:30 +0200 Subject: [PATCH 112/285] Enterprise Mode schema: convert Important notes As previously discussed in this PR, I have converted the **Important** section headings by using their MarkDown equivalent > [!IMPORTANT] (as well as adding the blockquote for its text content). --- .../enterprise-mode-schema-version-1-guidance.md | 4 ++-- .../enterprise-mode-schema-version-2-guidance.md | 12 ++++++------ 2 files changed, 8 insertions(+), 8 deletions(-) diff --git a/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-1-guidance.md b/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-1-guidance.md index a4391db8b0..292c85b771 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-1-guidance.md +++ b/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-1-guidance.md @@ -30,8 +30,8 @@ If you don't want to use the Enterprise Mode Site List Manager, you also have th ## Enterprise Mode schema v.1 example The following is an example of the Enterprise Mode schema v.1. This schema can run on devices running Windows 7 and Windows 8.1. -**Important** -Make sure that you don't specify a protocol when adding your URLs. Using a URL like `contoso.com` automatically applies to both http://contoso.com and https://contoso.com. +> [!IMPORTANT] +> Make sure that you don't specify a protocol when adding your URLs. Using a URL like `contoso.com` automatically applies to both http://contoso.com and https://contoso.com. ```xml diff --git a/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-2-guidance.md b/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-2-guidance.md index 489ffd391d..66a056c506 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-2-guidance.md +++ b/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-2-guidance.md @@ -26,8 +26,8 @@ ms.date: 12/04/2017 Use the Enterprise Mode Site List Manager to create and update your site list for devices running Windows 7, Windows 8.1, and Windows 10, using the version 2.0 (v.2) of the Enterprise Mode schema. If you don't want to use the Enterprise Mode Site List Manager, you also have the option to update your XML schema using Notepad, or any other XML-editing app. -**Important** -If you're running Windows 7 or Windows 8.1 and you've been using the version 1.0 (v.1) of the schema, you can continue to do so, but you won't get the benefits that come with the updated schema. For info about the v.1 schema, see [Enterprise Mode schema v.1 guidance](enterprise-mode-schema-version-1-guidance.md). +> [!IMPORTANT] +> If you're running Windows 7 or Windows 8.1 and you've been using the version 1.0 (v.1) of the schema, you can continue to do so, but you won't get the benefits that come with the updated schema. For info about the v.1 schema, see [Enterprise Mode schema v.1 guidance](enterprise-mode-schema-version-1-guidance.md). ## Enterprise Mode schema v.2 updates Because of the schema changes, you can't combine the old version (v.1) with the new version (v.2) of the schema. If you look at your XML file, you can tell which version you're using by: @@ -41,8 +41,8 @@ You can continue to use the v.1 version of the schema on Windows 10, but you wo ### Enterprise Mode v.2 schema example The following is an example of the v.2 version of the Enterprise Mode schema. -**Important** -Make sure that you don't specify a protocol when adding your URLs. Using a URL like ``, automatically applies to both http://contoso.com and https://contoso.com. +> [!IMPORTANT] +> Make sure that you don't specify a protocol when adding your URLs. Using a URL like ``, automatically applies to both http://contoso.com and https://contoso.com. ```xml @@ -284,8 +284,8 @@ With: While the old, replaced attributes aren't supported in the v.2 version of the schema, they'll continue to work in the v.1 version of the schema. If, however, you're using the v.2 version of the schema and these attributes are still there, the v.2 version schema takes precedence. We don’t recommend combining the two schemas, and instead recommend that you move to the v.2 version of the schema to take advantage of the new features. -**Important** -Saving your v.1 version of the file using the new Enterprise Mode Site List Manager (schema v.2) automatically updates the XML to the new v.2 version of the schema. +> [!IMPORTANT] +> Saving your v.1 version of the file using the new Enterprise Mode Site List Manager (schema v.2) automatically updates the XML to the new v.2 version of the schema. ### What not to include in your schema We recommend that you not add any of the following items to your schema because they can make your compatibility list behave in unexpected ways: From 2722f1bd8ec1b5ff7f461f4064252d16e036b6fc Mon Sep 17 00:00:00 2001 From: Guy Reginiano <45633598+guregini@users.noreply.github.com> Date: Sun, 8 Sep 2019 11:21:46 +0300 Subject: [PATCH 113/285] Added full-form before the existing parentheses --- .../threat-protection/microsoft-defender-atp/configure-siem.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-siem.md b/windows/security/threat-protection/microsoft-defender-atp/configure-siem.md index 351164afa3..44e2fdd28e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-siem.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-siem.md @@ -32,7 +32,7 @@ ms.date: 10/16/2017 >- [Microsoft Defender ATP Alert](alerts.md) is composed from one or more detections >- [Microsoft Defender ATP Detection](api-portal-mapping.md) is composed from the suspicious event occurred on the Machine and its related Alert details. -Microsoft Defender ATP supports (SIEM) tools to pull detections. Microsoft Defender ATP exposes alerts through an HTTPS endpoint hosted in Azure. The endpoint can be configured to pull detections from your enterprise tenant in Azure Active Directory (AAD) using the OAuth 2.0 authentication protocol for an AAD application that represents the specific SIEM connector installed in your environment. +Microsoft Defender ATP supports security information and event management (SIEM) tools to pull detections. Microsoft Defender ATP exposes alerts through an HTTPS endpoint hosted in Azure. The endpoint can be configured to pull detections from your enterprise tenant in Azure Active Directory (AAD) using the OAuth 2.0 authentication protocol for an AAD application that represents the specific SIEM connector installed in your environment. Microsoft Defender ATP currently supports the following SIEM tools: From 786c0bcc42f7f8ed7a08d5c1ebcce5426091f2ca Mon Sep 17 00:00:00 2001 From: Jonathan Gregson Date: Mon, 9 Sep 2019 08:05:50 -0700 Subject: [PATCH 114/285] Update text in windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md Per review. Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- .../configure-wd-app-guard.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md index 4ec0350808..a039b631e7 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md @@ -33,7 +33,7 @@ These settings, located at **Computer Configuration\Administrative Templates\Net |Policy name|Supported versions|Description| |-----------|------------------|-----------| |Private network ranges for apps|At least Windows Server 2012, Windows 8, or Windows RT|A comma-separated list of IP address ranges that are in your corporate network. Included endpoints or endpoints that are included within a specified IP address range, are rendered using Microsoft Edge and won't be accessible from the Application Guard environment.| -|Enterprise resource domains hosted in the cloud|At least Windows Server 2012, Windows 8, or Windows RT|A pipe-separated (\|) list of your domain cloud resources. Included endpoints are rendered using Microsoft Edge and won't be accessible from the Application Guard environment. Notes: this list supports the wildcards detailed in the [Network isolation settings wildcards](#network-isolation-settings-wildcards) table.| +|Enterprise resource domains hosted in the cloud|At least Windows Server 2012, Windows 8, or Windows RT|A pipe-separated (\|) list of your domain cloud resources. Included endpoints are rendered using Microsoft Edge and won't be accessible from the Application Guard environment. Note: This list supports the wildcards detailed in the [Network isolation settings wildcards](#network-isolation-settings-wildcards) table.| |Domains categorized as both work and personal|At least Windows Server 2012, Windows 8, or Windows RT|A comma-separated list of domain names used as both work or personal resources. Included endpoints are rendered using Microsoft Edge and will be accessible from the Application Guard and regular Edge environment. Notes: this list supports the wildcards detailed in the [Network isolation settings wildcards](#network-isolation-settings-wildcards) table.| ## Network isolation settings wildcards From 07b648846fe07223deeb6f682970eb8df4c0e81c Mon Sep 17 00:00:00 2001 From: Jonathan Gregson Date: Mon, 9 Sep 2019 08:06:15 -0700 Subject: [PATCH 115/285] Update text in windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md Per review. Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- .../configure-wd-app-guard.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md index a039b631e7..d79135d66a 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md @@ -34,7 +34,7 @@ These settings, located at **Computer Configuration\Administrative Templates\Net |-----------|------------------|-----------| |Private network ranges for apps|At least Windows Server 2012, Windows 8, or Windows RT|A comma-separated list of IP address ranges that are in your corporate network. Included endpoints or endpoints that are included within a specified IP address range, are rendered using Microsoft Edge and won't be accessible from the Application Guard environment.| |Enterprise resource domains hosted in the cloud|At least Windows Server 2012, Windows 8, or Windows RT|A pipe-separated (\|) list of your domain cloud resources. Included endpoints are rendered using Microsoft Edge and won't be accessible from the Application Guard environment. Note: This list supports the wildcards detailed in the [Network isolation settings wildcards](#network-isolation-settings-wildcards) table.| -|Domains categorized as both work and personal|At least Windows Server 2012, Windows 8, or Windows RT|A comma-separated list of domain names used as both work or personal resources. Included endpoints are rendered using Microsoft Edge and will be accessible from the Application Guard and regular Edge environment. Notes: this list supports the wildcards detailed in the [Network isolation settings wildcards](#network-isolation-settings-wildcards) table.| +|Domains categorized as both work and personal|At least Windows Server 2012, Windows 8, or Windows RT|A comma-separated list of domain names used as both work or personal resources. Included endpoints are rendered using Microsoft Edge and will be accessible from the Application Guard and regular Edge environment. Note: This list supports the wildcards detailed in the [Network isolation settings wildcards](#network-isolation-settings-wildcards) table.| ## Network isolation settings wildcards From 9cd5361457d1664f197b2da163a58635ee49f43b Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Mon, 9 Sep 2019 13:46:51 -0700 Subject: [PATCH 116/285] Moved Footnotes to the appropriate tags --- .../mdm/policy-csp-abovelock.md | 4 +++- .../mdm/policy-csp-accounts.md | 20 ++++++++-------- .../mdm/policy-csp-activexcontrols.md | 7 +++--- .../mdm/policy-csp-applicationdefaults.md | 7 +++--- .../mdm/policy-csp-applicationmanagement.md | 20 ++++++++-------- .../mdm/policy-csp-appruntime.md | 4 +++- .../mdm/policy-csp-appvirtualization.md | 4 +++- .../mdm/policy-csp-attachmentmanager.md | 4 +++- .../mdm/policy-csp-authentication.md | 20 ++++++++-------- .../mdm/policy-csp-autoplay.md | 4 +++- .../mdm/policy-csp-bitlocker.md | 2 +- .../client-management/mdm/policy-csp-bits.md | 4 ++-- .../mdm/policy-csp-bluetooth.md | 17 +++++++------- .../mdm/policy-csp-browser.md | 18 +++++++-------- .../mdm/policy-csp-camera.md | 4 +++- .../mdm/policy-csp-cellular.md | 4 +++- .../mdm/policy-csp-connectivity.md | 19 ++++++++------- .../mdm/policy-csp-controlpolicyconflict.md | 4 +++- .../mdm/policy-csp-credentialproviders.md | 4 +++- .../mdm/policy-csp-credentialsdelegation.md | 4 +++- .../mdm/policy-csp-credentialsui.md | 4 +++- .../mdm/policy-csp-cryptography.md | 22 ++++++++++-------- .../mdm/policy-csp-dataprotection.md | 4 +++- .../mdm/policy-csp-datausage.md | 4 +++- .../mdm/policy-csp-defender.md | 4 ++-- .../mdm/policy-csp-deliveryoptimization.md | 19 ++++++++------- .../mdm/policy-csp-desktop.md | 4 +++- .../mdm/policy-csp-deviceguard.md | 4 ++-- .../mdm/policy-csp-devicehealthmonitoring.md | 17 ++++++-------- .../mdm/policy-csp-deviceinstallation.md | 4 ++-- .../mdm/policy-csp-devicelock.md | 23 +++++++++---------- .../mdm/policy-csp-display.md | 4 +++- .../mdm/policy-csp-dmaguard.md | 4 ++-- .../mdm/policy-csp-education.md | 4 +++- .../mdm/policy-csp-enterprisecloudprint.md | 4 +++- .../mdm/policy-csp-errorreporting.md | 4 +++- .../mdm/policy-csp-eventlogservice.md | 4 +++- .../mdm/policy-csp-experience.md | 20 ++++++++-------- .../mdm/policy-csp-exploitguard.md | 4 +++- .../mdm/policy-csp-fileexplorer.md | 4 +++- .../client-management/mdm/policy-csp-games.md | 4 +++- .../mdm/policy-csp-handwriting.md | 4 +++- .../mdm/policy-csp-internetexplorer.md | 18 +++++++-------- .../mdm/policy-csp-kerberos.md | 4 ++-- .../mdm/policy-csp-kioskbrowser.md | 4 +++- .../mdm/policy-csp-lanmanworkstation.md | 4 +++- .../mdm/policy-csp-licensing.md | 4 +++- ...policy-csp-localpoliciessecurityoptions.md | 4 ++-- .../mdm/policy-csp-lockdown.md | 4 +++- .../client-management/mdm/policy-csp-maps.md | 4 +++- .../mdm/policy-csp-messaging.md | 4 +++- .../mdm/policy-csp-mssecurityguide.md | 4 +++- .../mdm/policy-csp-msslegacy.md | 4 +++- .../mdm/policy-csp-networkisolation.md | 4 +++- .../mdm/policy-csp-notifications.md | 4 +++- .../client-management/mdm/policy-csp-power.md | 5 ++-- .../mdm/policy-csp-printers.md | 4 +++- .../mdm/policy-csp-privacy.md | 18 +++++++-------- .../mdm/policy-csp-remoteassistance.md | 4 +++- .../mdm/policy-csp-remotedesktopservices.md | 4 +++- .../mdm/policy-csp-remotemanagement.md | 4 +++- .../mdm/policy-csp-remoteprocedurecall.md | 4 +++- .../mdm/policy-csp-remoteshell.md | 4 +++- .../mdm/policy-csp-restrictedgroups.md | 22 ++++++++++-------- .../mdm/policy-csp-search.md | 20 ++++++++-------- .../mdm/policy-csp-security.md | 18 +++++++-------- .../mdm/policy-csp-servicecontrolmanager.md | 7 +++--- .../mdm/policy-csp-settings.md | 18 +++++++-------- .../mdm/policy-csp-smartscreen.md | 4 +++- .../mdm/policy-csp-speech.md | 18 +++++++-------- .../client-management/mdm/policy-csp-start.md | 4 ++-- .../mdm/policy-csp-storage.md | 6 ++--- .../mdm/policy-csp-system.md | 20 ++++++++-------- .../mdm/policy-csp-systemservices.md | 4 +++- .../mdm/policy-csp-taskmanager.md | 4 ++-- .../mdm/policy-csp-taskscheduler.md | 4 +++- .../mdm/policy-csp-textinput.md | 4 ++-- .../mdm/policy-csp-timelanguagesettings.md | 7 +++--- .../mdm/policy-csp-troubleshooting.md | 5 ++-- .../mdm/policy-csp-update.md | 18 +++++++-------- .../mdm/policy-csp-userrights.md | 4 +++- .../client-management/mdm/policy-csp-wifi.md | 18 +++++++-------- .../policy-csp-windowsconnectionmanager.md | 4 +++- ...olicy-csp-windowsdefendersecuritycenter.md | 4 ++-- .../mdm/policy-csp-windowsinkworkspace.md | 4 +++- .../mdm/policy-csp-windowslogon.md | 6 ++--- .../mdm/policy-csp-windowspowershell.md | 4 +++- .../mdm/policy-csp-wirelessdisplay.md | 4 +++- 88 files changed, 385 insertions(+), 302 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-abovelock.md b/windows/client-management/mdm/policy-csp-abovelock.md index b5cb013a88..008c0c74a3 100644 --- a/windows/client-management/mdm/policy-csp-abovelock.md +++ b/windows/client-management/mdm/policy-csp-abovelock.md @@ -199,12 +199,14 @@ The following list shows the supported values:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-accounts.md b/windows/client-management/mdm/policy-csp-accounts.md index 871c434dca..aa13a45f98 100644 --- a/windows/client-management/mdm/policy-csp-accounts.md +++ b/windows/client-management/mdm/policy-csp-accounts.md @@ -195,6 +195,15 @@ The following list shows the supported values:
+Footnotes: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. +- 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. + @@ -215,13 +224,4 @@ The following list shows the supported values: - [Accounts/AllowMicrosoftAccountConnection](#accounts-allowmicrosoftaccountconnection) -
- -Footnotes: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. -- 4 - Added in Windows 10, version 1803. -- 5 - Added in Windows 10, version 1809. - +
\ No newline at end of file diff --git a/windows/client-management/mdm/policy-csp-activexcontrols.md b/windows/client-management/mdm/policy-csp-activexcontrols.md index 09639791f8..850e4ff945 100644 --- a/windows/client-management/mdm/policy-csp-activexcontrols.md +++ b/windows/client-management/mdm/policy-csp-activexcontrols.md @@ -92,12 +92,13 @@ ADMX Info:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. - - + \ No newline at end of file diff --git a/windows/client-management/mdm/policy-csp-applicationdefaults.md b/windows/client-management/mdm/policy-csp-applicationdefaults.md index 7bbea44531..86d413d085 100644 --- a/windows/client-management/mdm/policy-csp-applicationdefaults.md +++ b/windows/client-management/mdm/policy-csp-applicationdefaults.md @@ -199,12 +199,13 @@ This setting supports a range of values between 0 and 1.
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. - - + \ No newline at end of file diff --git a/windows/client-management/mdm/policy-csp-applicationmanagement.md b/windows/client-management/mdm/policy-csp-applicationmanagement.md index 9feb66be2d..e4b53f4189 100644 --- a/windows/client-management/mdm/policy-csp-applicationmanagement.md +++ b/windows/client-management/mdm/policy-csp-applicationmanagement.md @@ -1040,7 +1040,16 @@ XSD: +
+Footnotes: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. +- 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. @@ -1067,14 +1076,3 @@ XSD: - [ApplicationManagement/AllowAppStoreAutoUpdate](#applicationmanagement-allowappstoreautoupdate) - [ApplicationManagement/AllowDeveloperUnlock](#applicationmanagement-allowdeveloperunlock) - -
- -Footnotes: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. -- 4 - Added in Windows 10, version 1803. -- 5 - Added in Windows 10, version 1809. -- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-appruntime.md b/windows/client-management/mdm/policy-csp-appruntime.md index 6f998bebf9..ce22da2a1b 100644 --- a/windows/client-management/mdm/policy-csp-appruntime.md +++ b/windows/client-management/mdm/policy-csp-appruntime.md @@ -89,12 +89,14 @@ ADMX Info:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-appvirtualization.md b/windows/client-management/mdm/policy-csp-appvirtualization.md index 7ecd3a228b..c03f0913f4 100644 --- a/windows/client-management/mdm/policy-csp-appvirtualization.md +++ b/windows/client-management/mdm/policy-csp-appvirtualization.md @@ -1833,12 +1833,14 @@ ADMX Info:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-attachmentmanager.md b/windows/client-management/mdm/policy-csp-attachmentmanager.md index f5630e76f5..bcb75801ca 100644 --- a/windows/client-management/mdm/policy-csp-attachmentmanager.md +++ b/windows/client-management/mdm/policy-csp-attachmentmanager.md @@ -226,12 +226,14 @@ ADMX Info:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-authentication.md b/windows/client-management/mdm/policy-csp-authentication.md index 6ce830a730..aaffc26d7e 100644 --- a/windows/client-management/mdm/policy-csp-authentication.md +++ b/windows/client-management/mdm/policy-csp-authentication.md @@ -499,7 +499,16 @@ Value type is string. +
+Footnotes: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. +- 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. @@ -522,14 +531,3 @@ Value type is string. - [Authentication/AllowFastReconnect](#authentication-allowfastreconnect) - -
- -Footnotes: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. -- 4 - Added in Windows 10, version 1803. -- 5 - Added in Windows 10, version 1809. -- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-autoplay.md b/windows/client-management/mdm/policy-csp-autoplay.md index 0845e952f8..0f89d7ad50 100644 --- a/windows/client-management/mdm/policy-csp-autoplay.md +++ b/windows/client-management/mdm/policy-csp-autoplay.md @@ -242,12 +242,14 @@ ADMX Info:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-bitlocker.md b/windows/client-management/mdm/policy-csp-bitlocker.md index 85d8f6acdc..f160212054 100644 --- a/windows/client-management/mdm/policy-csp-bitlocker.md +++ b/windows/client-management/mdm/policy-csp-bitlocker.md @@ -86,7 +86,7 @@ The following list shows the supported values: > [!NOTE] > To manage encryption of PCs and devices, use [BitLocker CSP](https://docs.microsoft.com/windows/client-management/mdm/bitlocker-csp) -Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. diff --git a/windows/client-management/mdm/policy-csp-bits.md b/windows/client-management/mdm/policy-csp-bits.md index 32fe01163f..16ed678c5f 100644 --- a/windows/client-management/mdm/policy-csp-bits.md +++ b/windows/client-management/mdm/policy-csp-bits.md @@ -494,14 +494,14 @@ Supported values range: 0 - 999
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. - 5 - Added in Windows 10, version 1809. -- 6 - Added in the next major release of Windows 10. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-bluetooth.md b/windows/client-management/mdm/policy-csp-bluetooth.md index 2475975ca6..8633620818 100644 --- a/windows/client-management/mdm/policy-csp-bluetooth.md +++ b/windows/client-management/mdm/policy-csp-bluetooth.md @@ -341,7 +341,15 @@ The default value is an empty string. For more information, see [ServicesAllowed +
+Footnotes: +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. +- 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. @@ -483,12 +491,3 @@ Disabling file transfer shall have the following effects - Fsquirt shall display error message informing user of policy preventing file transfer - 3rd-party apps shall not be permitted to send or receive files using MSFT Bluetooth API -
-Footnotes: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. -- 4 - Added in Windows 10, version 1803. -- 5 - Added in Windows 10, version 1809. -- 6 - Added in Windows 10, version 1903. \ No newline at end of file diff --git a/windows/client-management/mdm/policy-csp-browser.md b/windows/client-management/mdm/policy-csp-browser.md index 6553368bef..35c4f3327a 100644 --- a/windows/client-management/mdm/policy-csp-browser.md +++ b/windows/client-management/mdm/policy-csp-browser.md @@ -3961,7 +3961,16 @@ Supported values: Most restricted value: 0 +
+Footnotes: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. +- 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. @@ -3999,13 +4008,4 @@ Most restricted value: 0 - [Browser/AllowSmartScreen](#browser-allowsmartscreen) -
-Footnotes: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. -- 4 - Added in Windows 10, version 1803. -- 5 - Added in Windows 10, version 1809. -- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-camera.md b/windows/client-management/mdm/policy-csp-camera.md index 0852d91632..4be1ad1ef8 100644 --- a/windows/client-management/mdm/policy-csp-camera.md +++ b/windows/client-management/mdm/policy-csp-camera.md @@ -88,12 +88,14 @@ The following list shows the supported values:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-cellular.md b/windows/client-management/mdm/policy-csp-cellular.md index ff738aa2e1..5748413cdb 100644 --- a/windows/client-management/mdm/policy-csp-cellular.md +++ b/windows/client-management/mdm/policy-csp-cellular.md @@ -329,12 +329,14 @@ ADMX Info:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-connectivity.md b/windows/client-management/mdm/policy-csp-connectivity.md index d86d214339..34d1cca59c 100644 --- a/windows/client-management/mdm/policy-csp-connectivity.md +++ b/windows/client-management/mdm/policy-csp-connectivity.md @@ -963,7 +963,16 @@ ADMX Info: +
+Footnotes: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. +- 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. @@ -987,13 +996,3 @@ ADMX Info: - [Connectivity/AllowUSBConnection](#connectivity-allowusbconnection) -
- -Footnotes: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. -- 4 - Added in Windows 10, version 1803. -- 5 - Added in Windows 10, version 1809. -- 6 - Added in Windows 10, version 1903. \ No newline at end of file diff --git a/windows/client-management/mdm/policy-csp-controlpolicyconflict.md b/windows/client-management/mdm/policy-csp-controlpolicyconflict.md index c9d03ef5de..d237d5342f 100644 --- a/windows/client-management/mdm/policy-csp-controlpolicyconflict.md +++ b/windows/client-management/mdm/policy-csp-controlpolicyconflict.md @@ -106,12 +106,14 @@ The following list shows the supported values:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-credentialproviders.md b/windows/client-management/mdm/policy-csp-credentialproviders.md index 1e3b1dd91e..d997aab7d0 100644 --- a/windows/client-management/mdm/policy-csp-credentialproviders.md +++ b/windows/client-management/mdm/policy-csp-credentialproviders.md @@ -216,12 +216,14 @@ The following list shows the supported values:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-credentialsdelegation.md b/windows/client-management/mdm/policy-csp-credentialsdelegation.md index 80a987c29b..6d6549c026 100644 --- a/windows/client-management/mdm/policy-csp-credentialsdelegation.md +++ b/windows/client-management/mdm/policy-csp-credentialsdelegation.md @@ -91,12 +91,14 @@ ADMX Info:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-credentialsui.md b/windows/client-management/mdm/policy-csp-credentialsui.md index 723426a323..480fd54f21 100644 --- a/windows/client-management/mdm/policy-csp-credentialsui.md +++ b/windows/client-management/mdm/policy-csp-credentialsui.md @@ -160,12 +160,14 @@ ADMX Info:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-cryptography.md b/windows/client-management/mdm/policy-csp-cryptography.md index 4aaf66a50c..ed6fc99adb 100644 --- a/windows/client-management/mdm/policy-csp-cryptography.md +++ b/windows/client-management/mdm/policy-csp-cryptography.md @@ -148,6 +148,18 @@ Lists the Cryptographic Cipher Algorithms allowed for SSL connections. Format is +
+ +Footnotes: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. +- 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. + + ## Cryptography policies supported by Microsoft Surface Hub @@ -156,13 +168,3 @@ Lists the Cryptographic Cipher Algorithms allowed for SSL connections. Format is - [Cryptography/TLSCipherSuites](#cryptography-tlsciphersuites) -
- -Footnotes: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. -- 4 - Added in Windows 10, version 1803. -- 5 - Added in Windows 10, version 1809. - diff --git a/windows/client-management/mdm/policy-csp-dataprotection.md b/windows/client-management/mdm/policy-csp-dataprotection.md index cfa533aef2..5f83c3f3c0 100644 --- a/windows/client-management/mdm/policy-csp-dataprotection.md +++ b/windows/client-management/mdm/policy-csp-dataprotection.md @@ -133,12 +133,14 @@ Setting used by Windows 8.1 Selective Wipe.
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-datausage.md b/windows/client-management/mdm/policy-csp-datausage.md index 1268e6243c..cab2e300d4 100644 --- a/windows/client-management/mdm/policy-csp-datausage.md +++ b/windows/client-management/mdm/policy-csp-datausage.md @@ -111,12 +111,14 @@ ADMX Info:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-defender.md b/windows/client-management/mdm/policy-csp-defender.md index ca0dbef0a2..ff9ec709a1 100644 --- a/windows/client-management/mdm/policy-csp-defender.md +++ b/windows/client-management/mdm/policy-csp-defender.md @@ -2773,14 +2773,14 @@ ADMX Info:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. - 5 - Added in Windows 10, version 1809. -- 6 - Added in the next major release of Windows 10. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-deliveryoptimization.md b/windows/client-management/mdm/policy-csp-deliveryoptimization.md index 66ac43c7f6..05d16f5cba 100644 --- a/windows/client-management/mdm/policy-csp-deliveryoptimization.md +++ b/windows/client-management/mdm/policy-csp-deliveryoptimization.md @@ -1701,7 +1701,16 @@ This policy allows an IT Admin to define the following: +
+Footnotes: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. +- 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. @@ -1796,13 +1805,3 @@ This policy allows an IT Admin to define the following: - [DeliveryOptimization/DOPercentageMaxDownloadBandwidth](#deliveryoptimization-dopercentagemaxdownloadbandwidth) -
- -Footnotes: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. -- 4 - Added in Windows 10, version 1803. -- 5 - Added in Windows 10, version 1809. -- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-desktop.md b/windows/client-management/mdm/policy-csp-desktop.md index ebe8a9efb2..f15c3482ac 100644 --- a/windows/client-management/mdm/policy-csp-desktop.md +++ b/windows/client-management/mdm/policy-csp-desktop.md @@ -90,12 +90,14 @@ ADMX Info:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-deviceguard.md b/windows/client-management/mdm/policy-csp-deviceguard.md index 44a9b306d9..c06a4e40e9 100644 --- a/windows/client-management/mdm/policy-csp-deviceguard.md +++ b/windows/client-management/mdm/policy-csp-deviceguard.md @@ -285,14 +285,14 @@ The following list shows the supported values:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. - 5 - Added in Windows 10, version 1809. -- 6 - Added in the next major release of Windows 10. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-devicehealthmonitoring.md b/windows/client-management/mdm/policy-csp-devicehealthmonitoring.md index c945a7c66c..b2b33436c7 100644 --- a/windows/client-management/mdm/policy-csp-devicehealthmonitoring.md +++ b/windows/client-management/mdm/policy-csp-devicehealthmonitoring.md @@ -198,7 +198,14 @@ In most cases, an IT Pro does not need to define this policy. Instead, it is exp
+Footnotes: +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. +- 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. @@ -217,13 +224,3 @@ In most cases, an IT Pro does not need to define this policy. Instead, it is exp - [DeviceHealthMonitoring/ConfigDeviceHealthMonitoringScope](#devicehealthmonitoring-configdevicehealthmonitoringscope) - [DeviceHealthMonitoring/ConfigDeviceHealthMonitoringUploadDestination](#devicehealthmonitoring-configdevicehealthmonitoringuploaddestination) - -
-Footnotes: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. -- 4 - Added in Windows 10, version 1803. -- 5 - Added in Windows 10, version 1809. -- 6 - Added in Windows 10, version 1903. \ No newline at end of file diff --git a/windows/client-management/mdm/policy-csp-deviceinstallation.md b/windows/client-management/mdm/policy-csp-deviceinstallation.md index e137a5dc9f..75e6a2bd5a 100644 --- a/windows/client-management/mdm/policy-csp-deviceinstallation.md +++ b/windows/client-management/mdm/policy-csp-deviceinstallation.md @@ -654,13 +654,13 @@ To verify the policy is applied, check C:\windows\INF\setupapi.dev.log and see i
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. - 5 - Added in Windows 10, version 1809. -- 6 - Added in the next major release of Windows 10. +- 6 - Added in Windows 10, version 1903. \ No newline at end of file diff --git a/windows/client-management/mdm/policy-csp-devicelock.md b/windows/client-management/mdm/policy-csp-devicelock.md index 1682e10bd8..ed36651548 100644 --- a/windows/client-management/mdm/policy-csp-devicelock.md +++ b/windows/client-management/mdm/policy-csp-devicelock.md @@ -1207,6 +1207,16 @@ Most restricted value is 0. +
+ +Footnotes: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. +- 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. @@ -1253,15 +1263,4 @@ Most restricted value is 0. - [DeviceLock/MinDevicePasswordComplexCharacters](#devicelock-mindevicepasswordcomplexcharacters) - [DeviceLock/MinDevicePasswordLength](#devicelock-mindevicepasswordlength) - - -
- -Footnotes: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. -- 4 - Added in Windows 10, version 1803. -- 5 - Added in Windows 10, version 1809. -- 6 - Added in Windows 10, version 1903. + \ No newline at end of file diff --git a/windows/client-management/mdm/policy-csp-display.md b/windows/client-management/mdm/policy-csp-display.md index e6bdb26828..1bda716377 100644 --- a/windows/client-management/mdm/policy-csp-display.md +++ b/windows/client-management/mdm/policy-csp-display.md @@ -349,12 +349,14 @@ To validate on Desktop, do the following:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-dmaguard.md b/windows/client-management/mdm/policy-csp-dmaguard.md index 84edbd082b..da361d9226 100644 --- a/windows/client-management/mdm/policy-csp-dmaguard.md +++ b/windows/client-management/mdm/policy-csp-dmaguard.md @@ -105,14 +105,14 @@ ADMX Info:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. - 5 - Added in Windows 10, version 1809. -- 6 - Added in the next major release of Windows 10. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-education.md b/windows/client-management/mdm/policy-csp-education.md index 75f755f4fb..56e547eb48 100644 --- a/windows/client-management/mdm/policy-csp-education.md +++ b/windows/client-management/mdm/policy-csp-education.md @@ -182,12 +182,14 @@ The policy value is expected to be a `````` seperated list of printer na
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-enterprisecloudprint.md b/windows/client-management/mdm/policy-csp-enterprisecloudprint.md index 606cfc2ceb..255d2c5715 100644 --- a/windows/client-management/mdm/policy-csp-enterprisecloudprint.md +++ b/windows/client-management/mdm/policy-csp-enterprisecloudprint.md @@ -325,12 +325,14 @@ The default value is an empty string. Otherwise, the value should contain a URL.
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-errorreporting.md b/windows/client-management/mdm/policy-csp-errorreporting.md index d498c385d6..c1dd1a8584 100644 --- a/windows/client-management/mdm/policy-csp-errorreporting.md +++ b/windows/client-management/mdm/policy-csp-errorreporting.md @@ -364,12 +364,14 @@ ADMX Info:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-eventlogservice.md b/windows/client-management/mdm/policy-csp-eventlogservice.md index a12bf88937..c12aeb4299 100644 --- a/windows/client-management/mdm/policy-csp-eventlogservice.md +++ b/windows/client-management/mdm/policy-csp-eventlogservice.md @@ -287,12 +287,14 @@ ADMX Info:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-experience.md b/windows/client-management/mdm/policy-csp-experience.md index 7e61e7696e..93c152be82 100644 --- a/windows/client-management/mdm/policy-csp-experience.md +++ b/windows/client-management/mdm/policy-csp-experience.md @@ -1639,7 +1639,16 @@ Supported values: +
+Footnotes: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. +- 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. @@ -1660,14 +1669,3 @@ Supported values: - [Experience/AllowCortana](#experience-allowcortana) - -
- -Footnotes: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. -- 4 - Added in Windows 10, version 1803. -- 5 - Added in Windows 10, version 1809. -- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-exploitguard.md b/windows/client-management/mdm/policy-csp-exploitguard.md index b1150dc1b9..bd99331c3a 100644 --- a/windows/client-management/mdm/policy-csp-exploitguard.md +++ b/windows/client-management/mdm/policy-csp-exploitguard.md @@ -109,12 +109,14 @@ Here is an example:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-fileexplorer.md b/windows/client-management/mdm/policy-csp-fileexplorer.md index f2666b4442..20df4e5b6a 100644 --- a/windows/client-management/mdm/policy-csp-fileexplorer.md +++ b/windows/client-management/mdm/policy-csp-fileexplorer.md @@ -146,12 +146,14 @@ ADMX Info:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-games.md b/windows/client-management/mdm/policy-csp-games.md index 750f00f237..7160e21904 100644 --- a/windows/client-management/mdm/policy-csp-games.md +++ b/windows/client-management/mdm/policy-csp-games.md @@ -78,12 +78,14 @@ The following list shows the supported values:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-handwriting.md b/windows/client-management/mdm/policy-csp-handwriting.md index 12cb543539..752f2010f7 100644 --- a/windows/client-management/mdm/policy-csp-handwriting.md +++ b/windows/client-management/mdm/policy-csp-handwriting.md @@ -92,12 +92,14 @@ The following list shows the supported values:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-internetexplorer.md b/windows/client-management/mdm/policy-csp-internetexplorer.md index c39e01b943..239f2b5057 100644 --- a/windows/client-management/mdm/policy-csp-internetexplorer.md +++ b/windows/client-management/mdm/policy-csp-internetexplorer.md @@ -17427,7 +17427,16 @@ ADMX Info: +
+Footnotes: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. +- 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. @@ -17459,13 +17468,4 @@ ADMX Info: -
-Footnotes: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. -- 4 - Added in Windows 10, version 1803. -- 5 - Added in Windows 10, version 1809. -- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-kerberos.md b/windows/client-management/mdm/policy-csp-kerberos.md index 2df8f06e1a..58ad5ba29e 100644 --- a/windows/client-management/mdm/policy-csp-kerberos.md +++ b/windows/client-management/mdm/policy-csp-kerberos.md @@ -416,14 +416,14 @@ Devices joined to Azure Active Directory in a hybrid environment need to interac
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. - 5 - Added in Windows 10, version 1809. -- 6 - Added in the next major release of Windows 10. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-kioskbrowser.md b/windows/client-management/mdm/policy-csp-kioskbrowser.md index 99fb4e9a1b..351f5e5e34 100644 --- a/windows/client-management/mdm/policy-csp-kioskbrowser.md +++ b/windows/client-management/mdm/policy-csp-kioskbrowser.md @@ -370,12 +370,14 @@ The value is an int 1-1440 that specifies the amount of minutes the session is i
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-lanmanworkstation.md b/windows/client-management/mdm/policy-csp-lanmanworkstation.md index d185745718..28ed33797b 100644 --- a/windows/client-management/mdm/policy-csp-lanmanworkstation.md +++ b/windows/client-management/mdm/policy-csp-lanmanworkstation.md @@ -88,12 +88,14 @@ This setting supports a range of values between 0 and 1.
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-licensing.md b/windows/client-management/mdm/policy-csp-licensing.md index 4c7c69815e..c933be9fb3 100644 --- a/windows/client-management/mdm/policy-csp-licensing.md +++ b/windows/client-management/mdm/policy-csp-licensing.md @@ -147,12 +147,14 @@ The following list shows the supported values:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md b/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md index ec391230a3..74c59adcec 100644 --- a/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md +++ b/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md @@ -3460,14 +3460,14 @@ The following list shows the supported values:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. - 5 - Added in Windows 10, version 1809. -- 6 - Added in the next major release of Windows 10. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-lockdown.md b/windows/client-management/mdm/policy-csp-lockdown.md index 0f90b19790..b775445fbd 100644 --- a/windows/client-management/mdm/policy-csp-lockdown.md +++ b/windows/client-management/mdm/policy-csp-lockdown.md @@ -88,12 +88,14 @@ The following list shows the supported values:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-maps.md b/windows/client-management/mdm/policy-csp-maps.md index 1028e204b8..7cb5bf15bc 100644 --- a/windows/client-management/mdm/policy-csp-maps.md +++ b/windows/client-management/mdm/policy-csp-maps.md @@ -145,12 +145,14 @@ The following list shows the supported values:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-messaging.md b/windows/client-management/mdm/policy-csp-messaging.md index b2efd6a840..745d653627 100644 --- a/windows/client-management/mdm/policy-csp-messaging.md +++ b/windows/client-management/mdm/policy-csp-messaging.md @@ -198,12 +198,14 @@ The following list shows the supported values:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-mssecurityguide.md b/windows/client-management/mdm/policy-csp-mssecurityguide.md index 4e53332f72..acea48e305 100644 --- a/windows/client-management/mdm/policy-csp-mssecurityguide.md +++ b/windows/client-management/mdm/policy-csp-mssecurityguide.md @@ -372,12 +372,14 @@ ADMX Info:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-msslegacy.md b/windows/client-management/mdm/policy-csp-msslegacy.md index 722b58c97c..ec20518e9d 100644 --- a/windows/client-management/mdm/policy-csp-msslegacy.md +++ b/windows/client-management/mdm/policy-csp-msslegacy.md @@ -256,12 +256,14 @@ ADMX Info:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-networkisolation.md b/windows/client-management/mdm/policy-csp-networkisolation.md index 9404b184fc..aac7ebd8b6 100644 --- a/windows/client-management/mdm/policy-csp-networkisolation.md +++ b/windows/client-management/mdm/policy-csp-networkisolation.md @@ -477,12 +477,14 @@ ADMX Info:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-notifications.md b/windows/client-management/mdm/policy-csp-notifications.md index 1624dfe21f..638cc7018d 100644 --- a/windows/client-management/mdm/policy-csp-notifications.md +++ b/windows/client-management/mdm/policy-csp-notifications.md @@ -237,12 +237,14 @@ Validation:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-power.md b/windows/client-management/mdm/policy-csp-power.md index 643ff5cea3..5b5da040da 100644 --- a/windows/client-management/mdm/policy-csp-power.md +++ b/windows/client-management/mdm/policy-csp-power.md @@ -1561,8 +1561,6 @@ Default value for unattended sleep timeout (plugged in): - -
Footnotes: @@ -1573,3 +1571,6 @@ Footnotes: - 4 - Added in Windows 10, version 1803. - 5 - Added in Windows 10, version 1809. - 6 - Added in Windows 10, version 1903. + + + diff --git a/windows/client-management/mdm/policy-csp-printers.md b/windows/client-management/mdm/policy-csp-printers.md index 16470df06b..7220444c6a 100644 --- a/windows/client-management/mdm/policy-csp-printers.md +++ b/windows/client-management/mdm/policy-csp-printers.md @@ -261,12 +261,14 @@ ADMX Info:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-privacy.md b/windows/client-management/mdm/policy-csp-privacy.md index 65dea5a83d..2e89d86138 100644 --- a/windows/client-management/mdm/policy-csp-privacy.md +++ b/windows/client-management/mdm/policy-csp-privacy.md @@ -5241,7 +5241,16 @@ ADMX Info: +
+Footnotes: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. +- 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. @@ -5284,13 +5293,4 @@ ADMX Info: - [Privacy/LetAppsActivateWithVoiceAboveLock](#privacy-letappsactivatewithvoiceabovelock) -
-Footnotes: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. -- 4 - Added in Windows 10, version 1803. -- 5 - Added in Windows 10, version 1809. -- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-remoteassistance.md b/windows/client-management/mdm/policy-csp-remoteassistance.md index 338d517c12..c6e88e8bc0 100644 --- a/windows/client-management/mdm/policy-csp-remoteassistance.md +++ b/windows/client-management/mdm/policy-csp-remoteassistance.md @@ -336,12 +336,14 @@ ADMX Info:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-remotedesktopservices.md b/windows/client-management/mdm/policy-csp-remotedesktopservices.md index c9c9ba51bf..3f901d522c 100644 --- a/windows/client-management/mdm/policy-csp-remotedesktopservices.md +++ b/windows/client-management/mdm/policy-csp-remotedesktopservices.md @@ -447,12 +447,14 @@ ADMX Info:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-remotemanagement.md b/windows/client-management/mdm/policy-csp-remotemanagement.md index f176045650..8d76918842 100644 --- a/windows/client-management/mdm/policy-csp-remotemanagement.md +++ b/windows/client-management/mdm/policy-csp-remotemanagement.md @@ -1029,12 +1029,14 @@ ADMX Info:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-remoteprocedurecall.md b/windows/client-management/mdm/policy-csp-remoteprocedurecall.md index ade921ae21..48ec861646 100644 --- a/windows/client-management/mdm/policy-csp-remoteprocedurecall.md +++ b/windows/client-management/mdm/policy-csp-remoteprocedurecall.md @@ -171,12 +171,14 @@ ADMX Info:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-remoteshell.md b/windows/client-management/mdm/policy-csp-remoteshell.md index 21cfd117d2..6bf43c0535 100644 --- a/windows/client-management/mdm/policy-csp-remoteshell.md +++ b/windows/client-management/mdm/policy-csp-remoteshell.md @@ -484,12 +484,14 @@ ADMX Info:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-restrictedgroups.md b/windows/client-management/mdm/policy-csp-restrictedgroups.md index 2ee10fa612..0ca2dc4914 100644 --- a/windows/client-management/mdm/policy-csp-restrictedgroups.md +++ b/windows/client-management/mdm/policy-csp-restrictedgroups.md @@ -52,12 +52,6 @@ manager: dansimp -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. -- 4 - Added in Windows 10, version 1803. @@ -132,15 +126,23 @@ Here is an example: ``` + +> [!Note] +> * You should include the local administrator while modifying the administrators group to prevent accidental loss of access +> * Include the entire UPN after AzureAD
+Footnotes: -Take note: -* You should include the local administrator while modifying the administrators group to prevent accidental loss of access -* Include the entire UPN after AzureAD - +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. +- 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. + \ No newline at end of file diff --git a/windows/client-management/mdm/policy-csp-search.md b/windows/client-management/mdm/policy-csp-search.md index f551f810e3..b4dbc0d121 100644 --- a/windows/client-management/mdm/policy-csp-search.md +++ b/windows/client-management/mdm/policy-csp-search.md @@ -918,6 +918,16 @@ The following list shows the supported values: +
+ +Footnotes: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. +- 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. @@ -939,13 +949,3 @@ The following list shows the supported values: - [Search/AllowSearchToUseLocation](#search-allowsearchtouselocation) -
- -Footnotes: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. -- 4 - Added in Windows 10, version 1803. -- 5 - Added in Windows 10, version 1809. -- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-security.md b/windows/client-management/mdm/policy-csp-security.md index 22bddbe478..227172a3da 100644 --- a/windows/client-management/mdm/policy-csp-security.md +++ b/windows/client-management/mdm/policy-csp-security.md @@ -741,7 +741,16 @@ The following list shows the supported values: +
+Footnotes: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. +- 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. @@ -762,13 +771,4 @@ The following list shows the supported values: - [Security/RequireDeviceEncryption](#security-requiredeviceencryption) -
-Footnotes: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. -- 4 - Added in Windows 10, version 1803. -- 5 - Added in Windows 10, version 1809. -- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-servicecontrolmanager.md b/windows/client-management/mdm/policy-csp-servicecontrolmanager.md index 9ce3ab68b9..b2f48b55f4 100644 --- a/windows/client-management/mdm/policy-csp-servicecontrolmanager.md +++ b/windows/client-management/mdm/policy-csp-servicecontrolmanager.md @@ -97,9 +97,6 @@ Supported values: - - -
Footnotes: @@ -109,4 +106,6 @@ Footnotes: - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. - 5 - Added in Windows 10, version 1809. -- 6 - Added in Windows 10, version 1903. \ No newline at end of file +- 6 - Added in Windows 10, version 1903. + + diff --git a/windows/client-management/mdm/policy-csp-settings.md b/windows/client-management/mdm/policy-csp-settings.md index e2a1e35daf..e5dfa160c3 100644 --- a/windows/client-management/mdm/policy-csp-settings.md +++ b/windows/client-management/mdm/policy-csp-settings.md @@ -841,7 +841,16 @@ To validate on Desktop, do the following: +
+Footnotes: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. +- 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. @@ -865,13 +874,4 @@ To validate on Desktop, do the following: - [Settings/AllowVPN](#settings-allowvpn) -
-Footnotes: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. -- 4 - Added in Windows 10, version 1803. -- 5 - Added in Windows 10, version 1809. -- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-smartscreen.md b/windows/client-management/mdm/policy-csp-smartscreen.md index 333716f687..2ecdcf1777 100644 --- a/windows/client-management/mdm/policy-csp-smartscreen.md +++ b/windows/client-management/mdm/policy-csp-smartscreen.md @@ -212,12 +212,14 @@ The following list shows the supported values:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-speech.md b/windows/client-management/mdm/policy-csp-speech.md index 0f385479cb..653fba729d 100644 --- a/windows/client-management/mdm/policy-csp-speech.md +++ b/windows/client-management/mdm/policy-csp-speech.md @@ -84,7 +84,16 @@ The following list shows the supported values: +
+Footnotes: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. +- 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. @@ -105,13 +114,4 @@ The following list shows the supported values: - [Speech/AllowSpeechModelUpdate](#speech-allowspeechmodelupdate) -
-Footnotes: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. -- 4 - Added in Windows 10, version 1803. -- 5 - Added in Windows 10, version 1809. -- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-start.md b/windows/client-management/mdm/policy-csp-start.md index 05e37d1dc9..bd12c8d9b7 100644 --- a/windows/client-management/mdm/policy-csp-start.md +++ b/windows/client-management/mdm/policy-csp-start.md @@ -1856,14 +1856,14 @@ ADMX Info:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. - 5 - Added in Windows 10, version 1809. -- 6 - Added in the next major release of Windows 10. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-storage.md b/windows/client-management/mdm/policy-csp-storage.md index 02d36e60d9..09a9bad5ae 100644 --- a/windows/client-management/mdm/policy-csp-storage.md +++ b/windows/client-management/mdm/policy-csp-storage.md @@ -654,18 +654,16 @@ ADMX Info: - -
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. - 5 - Added in Windows 10, version 1809. -- 6 - Added in the next major release of Windows 10. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-system.md b/windows/client-management/mdm/policy-csp-system.md index 65f8aca2b1..b756f97fc9 100644 --- a/windows/client-management/mdm/policy-csp-system.md +++ b/windows/client-management/mdm/policy-csp-system.md @@ -1578,6 +1578,16 @@ The following list shows the supported values: +
+ +Footnotes: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. +- 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. @@ -1604,13 +1614,3 @@ The following list shows the supported values: - [System/AllowTelemetry](#system-allowtelemetry) -
- -Footnotes: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. -- 4 - Added in Windows 10, version 1803. -- 5 - Added in Windows 10, version 1809. -- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-systemservices.md b/windows/client-management/mdm/policy-csp-systemservices.md index 1b98e5a487..94edf1165e 100644 --- a/windows/client-management/mdm/policy-csp-systemservices.md +++ b/windows/client-management/mdm/policy-csp-systemservices.md @@ -336,12 +336,14 @@ GP Info:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-taskmanager.md b/windows/client-management/mdm/policy-csp-taskmanager.md index 1553b89d93..eab903e15a 100644 --- a/windows/client-management/mdm/policy-csp-taskmanager.md +++ b/windows/client-management/mdm/policy-csp-taskmanager.md @@ -89,14 +89,14 @@ When the policy is set to 0 - users CANNOT execute 'End task' on processes in Ta
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. - 5 - Added in Windows 10, version 1809. -- 6 - Added in the next major release of Windows 10. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-taskscheduler.md b/windows/client-management/mdm/policy-csp-taskscheduler.md index ca2b448d50..c289a0638d 100644 --- a/windows/client-management/mdm/policy-csp-taskscheduler.md +++ b/windows/client-management/mdm/policy-csp-taskscheduler.md @@ -70,12 +70,14 @@ Added in Windows 10, version 1803. This setting determines whether the specific
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-textinput.md b/windows/client-management/mdm/policy-csp-textinput.md index ce3e59ecc4..159687a2c1 100644 --- a/windows/client-management/mdm/policy-csp-textinput.md +++ b/windows/client-management/mdm/policy-csp-textinput.md @@ -1330,14 +1330,14 @@ The following list shows the supported values:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. - 5 - Added in Windows 10, version 1809. -- 6 - Added in the next major release of Windows 10. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-timelanguagesettings.md b/windows/client-management/mdm/policy-csp-timelanguagesettings.md index 5feefe04ae..025ea3bdfd 100644 --- a/windows/client-management/mdm/policy-csp-timelanguagesettings.md +++ b/windows/client-management/mdm/policy-csp-timelanguagesettings.md @@ -130,9 +130,6 @@ Specifies the time zone to be applied to the device. This is the standard Window - - -
Footnotes: @@ -142,4 +139,6 @@ Footnotes: - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. - 5 - Added in Windows 10, version 1809. -- 6 - Added in Windows 10, version 1903. \ No newline at end of file +- 6 - Added in Windows 10, version 1903. + + diff --git a/windows/client-management/mdm/policy-csp-troubleshooting.md b/windows/client-management/mdm/policy-csp-troubleshooting.md index ec68e060bc..734db4e40e 100644 --- a/windows/client-management/mdm/policy-csp-troubleshooting.md +++ b/windows/client-management/mdm/policy-csp-troubleshooting.md @@ -127,8 +127,6 @@ ADMX Info:
- GP English name: Troubleshooting: Allow users to access r - -
Footnotes: @@ -138,4 +136,5 @@ Footnotes: - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. - 5 - Added in Windows 10, version 1809. -- 6 - Added in Windows 10, version 1903. \ No newline at end of file +- 6 - Added in Windows 10, version 1903. + diff --git a/windows/client-management/mdm/policy-csp-update.md b/windows/client-management/mdm/policy-csp-update.md index fdb6615bf6..96eca9c863 100644 --- a/windows/client-management/mdm/policy-csp-update.md +++ b/windows/client-management/mdm/policy-csp-update.md @@ -3951,7 +3951,16 @@ ADMX Info: +
+Footnotes: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. +- 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. @@ -4014,13 +4023,4 @@ ADMX Info: - [Update/ConfigureDeadlineGracePeriod](#update-configuredeadlinegraceperiod) - [Update/ConfigureDeadlineNoAutoReboot](#update-configuredeadlinenoautoreboot) -
-Footnotes: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. -- 4 - Added in Windows 10, version 1803. -- 5 - Added in Windows 10, version 1809. -- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-userrights.md b/windows/client-management/mdm/policy-csp-userrights.md index bf7b2a8067..0676a9df9c 100644 --- a/windows/client-management/mdm/policy-csp-userrights.md +++ b/windows/client-management/mdm/policy-csp-userrights.md @@ -1600,12 +1600,14 @@ GP Info:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-wifi.md b/windows/client-management/mdm/policy-csp-wifi.md index 9bc832c1ff..5e1869e030 100644 --- a/windows/client-management/mdm/policy-csp-wifi.md +++ b/windows/client-management/mdm/policy-csp-wifi.md @@ -381,7 +381,16 @@ Supported operations are Add, Delete, Get, and Replace. +
+Footnotes: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. +- 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. @@ -424,13 +433,4 @@ Supported operations are Add, Delete, Get, and Replace. - [WiFi/AllowWiFiHotSpotReporting](#wifi-allowwifihotspotreporting) -
-Footnotes: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. -- 4 - Added in Windows 10, version 1803. -- 5 - Added in Windows 10, version 1809. -- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-windowsconnectionmanager.md b/windows/client-management/mdm/policy-csp-windowsconnectionmanager.md index 6824a34e5c..1fd6bb88a3 100644 --- a/windows/client-management/mdm/policy-csp-windowsconnectionmanager.md +++ b/windows/client-management/mdm/policy-csp-windowsconnectionmanager.md @@ -97,12 +97,14 @@ ADMX Info:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-windowsdefendersecuritycenter.md b/windows/client-management/mdm/policy-csp-windowsdefendersecuritycenter.md index cc8580325d..f851afd08e 100644 --- a/windows/client-management/mdm/policy-csp-windowsdefendersecuritycenter.md +++ b/windows/client-management/mdm/policy-csp-windowsdefendersecuritycenter.md @@ -1426,14 +1426,14 @@ ADMX Info:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. - 5 - Added in Windows 10, version 1809. -- 6 - Added in the next major release of Windows 10. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-windowsinkworkspace.md b/windows/client-management/mdm/policy-csp-windowsinkworkspace.md index ca2a0c7b72..d20bb37601 100644 --- a/windows/client-management/mdm/policy-csp-windowsinkworkspace.md +++ b/windows/client-management/mdm/policy-csp-windowsinkworkspace.md @@ -149,12 +149,14 @@ Value type is int. The following list shows the supported values:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-windowslogon.md b/windows/client-management/mdm/policy-csp-windowslogon.md index dd40314d62..a8e9418f2e 100644 --- a/windows/client-management/mdm/policy-csp-windowslogon.md +++ b/windows/client-management/mdm/policy-csp-windowslogon.md @@ -544,9 +544,6 @@ To validate on Desktop, do the following: - - -
Footnotes: @@ -557,3 +554,6 @@ Footnotes: - 4 - Added in Windows 10, version 1803. - 5 - Added in Windows 10, version 1809. - 6 - Added in Windows 10, version 1903. + + + diff --git a/windows/client-management/mdm/policy-csp-windowspowershell.md b/windows/client-management/mdm/policy-csp-windowspowershell.md index 9e2d0223b5..69eb80be17 100644 --- a/windows/client-management/mdm/policy-csp-windowspowershell.md +++ b/windows/client-management/mdm/policy-csp-windowspowershell.md @@ -94,12 +94,14 @@ ADMX Info:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. diff --git a/windows/client-management/mdm/policy-csp-wirelessdisplay.md b/windows/client-management/mdm/policy-csp-wirelessdisplay.md index 1ba5d5ec2d..e8bdaab780 100644 --- a/windows/client-management/mdm/policy-csp-wirelessdisplay.md +++ b/windows/client-management/mdm/policy-csp-wirelessdisplay.md @@ -473,12 +473,14 @@ The following list shows the supported values:
-Footnote: +Footnotes: - 1 - Added in Windows 10, version 1607. - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. From c0b4b580023198658c4148c35f7eec6bbc72cc30 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Mon, 9 Sep 2019 14:01:01 -0700 Subject: [PATCH 117/285] Fixed suggestions from build report --- .../client-management/mdm/policy-csp-servicecontrolmanager.md | 2 +- windows/client-management/mdm/policy-csp-troubleshooting.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-servicecontrolmanager.md b/windows/client-management/mdm/policy-csp-servicecontrolmanager.md index b2f48b55f4..43f3e09bab 100644 --- a/windows/client-management/mdm/policy-csp-servicecontrolmanager.md +++ b/windows/client-management/mdm/policy-csp-servicecontrolmanager.md @@ -1,7 +1,7 @@ --- title: Policy CSP - ServiceControlManager description: Policy CSP - ServiceControlManager -ms.author: Heidi.Lohr +ms.author: dansimp ms.topic: article ms.prod: w10 ms.technology: windows diff --git a/windows/client-management/mdm/policy-csp-troubleshooting.md b/windows/client-management/mdm/policy-csp-troubleshooting.md index 734db4e40e..9a4bfe2d6f 100644 --- a/windows/client-management/mdm/policy-csp-troubleshooting.md +++ b/windows/client-management/mdm/policy-csp-troubleshooting.md @@ -1,7 +1,7 @@ --- title: Policy CSP - Troubleshooting description: Policy CSP - Troubleshooting -ms.author: maricia +ms.author: dansimp ms.topic: article ms.prod: w10 ms.technology: windows From 37218250511453a86e6372a2cbbb9c865d24c33f Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Mon, 9 Sep 2019 14:11:23 -0700 Subject: [PATCH 118/285] add - intenal ips cant be added to indicator list --- .../microsoft-defender-atp/manage-indicators.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-indicators.md b/windows/security/threat-protection/microsoft-defender-atp/manage-indicators.md index ca531ec4a1..f0cf3d6772 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-indicators.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-indicators.md @@ -121,6 +121,10 @@ It's important to understand the following prerequisites prior to creating indic - The Antimalware client version must be 4.18.1906.x or later. - Supported on machines on Windows 10, version 1709 or later. - Ensure that **Custom network indicators** is enabled in **Microsoft Defender Security Center > Settings > Advanced features**. For more information, see [Advanced features](advanced-features.md). + + +>[!IMPORTANT] +> Only external IPs can be added to the indicator list. Indicators cannot be created for internal IPs. >[!NOTE] >There may be up to 2 hours latency (usually less) between the time the action is taken, and the URL and IP being blocked. From 8c2860fc27906b85210b0f21a94d64cb6869c906 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Mon, 9 Sep 2019 14:14:25 -0700 Subject: [PATCH 119/285] Minor update --- .../mdm/policy-csp-servicecontrolmanager.md | 9 +++++---- .../client-management/mdm/policy-csp-troubleshooting.md | 7 ++++--- 2 files changed, 9 insertions(+), 7 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-servicecontrolmanager.md b/windows/client-management/mdm/policy-csp-servicecontrolmanager.md index 43f3e09bab..9ce3ab68b9 100644 --- a/windows/client-management/mdm/policy-csp-servicecontrolmanager.md +++ b/windows/client-management/mdm/policy-csp-servicecontrolmanager.md @@ -1,7 +1,7 @@ --- title: Policy CSP - ServiceControlManager description: Policy CSP - ServiceControlManager -ms.author: dansimp +ms.author: Heidi.Lohr ms.topic: article ms.prod: w10 ms.technology: windows @@ -97,6 +97,9 @@ Supported values: + + +
Footnotes: @@ -106,6 +109,4 @@ Footnotes: - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. - 5 - Added in Windows 10, version 1809. -- 6 - Added in Windows 10, version 1903. - - +- 6 - Added in Windows 10, version 1903. \ No newline at end of file diff --git a/windows/client-management/mdm/policy-csp-troubleshooting.md b/windows/client-management/mdm/policy-csp-troubleshooting.md index 9a4bfe2d6f..ec68e060bc 100644 --- a/windows/client-management/mdm/policy-csp-troubleshooting.md +++ b/windows/client-management/mdm/policy-csp-troubleshooting.md @@ -1,7 +1,7 @@ --- title: Policy CSP - Troubleshooting description: Policy CSP - Troubleshooting -ms.author: dansimp +ms.author: maricia ms.topic: article ms.prod: w10 ms.technology: windows @@ -127,6 +127,8 @@ ADMX Info:
- GP English name: Troubleshooting: Allow users to access r + +
Footnotes: @@ -136,5 +138,4 @@ Footnotes: - 3 - Added in Windows 10, version 1709. - 4 - Added in Windows 10, version 1803. - 5 - Added in Windows 10, version 1809. -- 6 - Added in Windows 10, version 1903. - +- 6 - Added in Windows 10, version 1903. \ No newline at end of file From 7d12907836fe37f6ffb27cd5a0abfb937a0cba1c Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Mon, 9 Sep 2019 14:14:40 -0700 Subject: [PATCH 120/285] minor update --- windows/client-management/mdm/policy-csp-search.md | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-search.md b/windows/client-management/mdm/policy-csp-search.md index b4dbc0d121..a23f3146c5 100644 --- a/windows/client-management/mdm/policy-csp-search.md +++ b/windows/client-management/mdm/policy-csp-search.md @@ -947,5 +947,4 @@ Footnotes: ## Search policies supported by HoloLens (1st gen) Development Edition - [Search/AllowSearchToUseLocation](#search-allowsearchtouselocation) - - + \ No newline at end of file From 0c8c2d1395065bb7c363e9e66fd4e5aafa8a5cfd Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Mon, 9 Sep 2019 14:16:39 -0700 Subject: [PATCH 121/285] delete topic, add notes --- .openpublishing.redirection.json | 5 ++ windows/security/threat-protection/TOC.md | 1 - .../enable-custom-ti.md | 56 ------------------- .../post-ti-indicator.md | 5 +- .../microsoft-defender-atp/ti-indicator.md | 4 +- 5 files changed, 11 insertions(+), 60 deletions(-) delete mode 100644 windows/security/threat-protection/microsoft-defender-atp/enable-custom-ti.md diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 5fb03f440d..fc08bbe0f7 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -1336,6 +1336,11 @@ "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/microsoft-defender-atp/enable-custom-ti.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-indicators", +"redirect_document_id": false +}, +{ "source_path": "windows/security/threat-protection/windows-defender-atp/enable-security-analytics-windows-defender-advanced-threat-protection.md", "redirect_url": "/windows/security/threat-protection/windows-defender-atp/enable-secure-score-windows-defender-advanced-threat-protection", "redirect_document_id": true diff --git a/windows/security/threat-protection/TOC.md b/windows/security/threat-protection/TOC.md index 2783c5080d..6d30d66678 100644 --- a/windows/security/threat-protection/TOC.md +++ b/windows/security/threat-protection/TOC.md @@ -429,7 +429,6 @@ ##### [Get CVE-KB map](microsoft-defender-atp/get-cvekbmap-collection.md) #### [API for custom alerts (Deprecated)]() -##### [Enable the custom threat intelligence application (Deprecated)](microsoft-defender-atp/enable-custom-ti.md) ##### [Use the threat intelligence API to create custom alerts (Deprecated)](microsoft-defender-atp/use-custom-ti.md) ##### [Create custom threat intelligence alerts (Deprecated)](microsoft-defender-atp/custom-ti-api.md) ##### [PowerShell code examples (Deprecated)](microsoft-defender-atp/powershell-example-code.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/enable-custom-ti.md b/windows/security/threat-protection/microsoft-defender-atp/enable-custom-ti.md deleted file mode 100644 index 42bfea4ccf..0000000000 --- a/windows/security/threat-protection/microsoft-defender-atp/enable-custom-ti.md +++ /dev/null @@ -1,56 +0,0 @@ ---- -title: Enable the custom threat intelligence API in Microsoft Defender ATP -description: Learn how to setup the custom threat intelligence application in Microsoft Defender ATP to create custom threat intelligence (TI). -keywords: enable custom threat intelligence application, custom ti application, application name, client id, authorization url, resource, client secret, access tokens -search.product: eADQiWindows 10XVcnh -search.appverid: met150 -ms.prod: w10 -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.author: macapara -author: mjcaparas -ms.localizationpriority: medium -manager: dansimp -audience: ITPro -ms.collection: M365-security-compliance -ms.topic: article ---- - -# Enable the custom threat intelligence API in Microsoft Defender ATP (Deprecated) - -**Applies to:** - - -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) - -> [!TIP] -> This topic has been deprecated. See [Indicators](ti-indicator.md) for the updated content. -> -> Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-enablecustomti-abovefoldlink) - -Before you can create custom threat intelligence (TI) using REST API, you'll need to set up the custom threat intelligence application through Microsoft Defender Security Center. - -1. In the navigation pane, select **Settings** > **Threat intel**. - - ![Image of threat intel API menu](images/atp-threat-intel-api.png) - -2. Select **Enable threat intel API**. This activates the **Azure Active Directory application** setup sections with pre-populated values. - -3. Copy the individual values or select **Save details to file** to download a file that contains all the values. - - >[!WARNING] - >The client secret is only displayed once. Make sure you keep a copy of it in a safe place.
- For more information about getting a new secret see, [Learn how to get a new secret](troubleshoot-custom-ti.md#learn-how-to-get-a-new-client-secret). - -4. Select **Generate tokens** to get an access and refresh token. - -You’ll need to use the access token in the Authorization header when doing REST API calls. - -## Related topics -- [Understand threat intelligence concepts](threat-indicator-concepts.md) -- [Create custom alerts using the threat intelligence API](custom-ti-api.md) -- [PowerShell code examples for the custom threat intelligence API](powershell-example-code.md) -- [Python code examples for the custom threat intelligence API](python-example-code.md) -- [Experiment with custom threat intelligence alerts](experiment-custom-ti.md) -- [Troubleshoot custom threat intelligence issues](troubleshoot-custom-ti.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/post-ti-indicator.md b/windows/security/threat-protection/microsoft-defender-atp/post-ti-indicator.md index 10fbaec373..c11e8a4597 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/post-ti-indicator.md +++ b/windows/security/threat-protection/microsoft-defender-atp/post-ti-indicator.md @@ -22,13 +22,14 @@ ms.topic: article - [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->[!Note] +>[!NOTE] > Currently this API is supported only for AppOnly context requests. (See [Get access with application context](exposed-apis-create-app-webapp.md) for more information) - Submits or Updates new [Indicator](ti-indicator.md) entity. - +>[!NOTE] +>There is a limit of 5000 indicators per tenant. ## Permissions One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Get started](apis-intro.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/ti-indicator.md b/windows/security/threat-protection/microsoft-defender-atp/ti-indicator.md index 4d110a041b..1c38ae5395 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/ti-indicator.md +++ b/windows/security/threat-protection/microsoft-defender-atp/ti-indicator.md @@ -28,7 +28,9 @@ Method|Return Type |Description [Submit Indicator](post-ti-indicator.md) | [Indicator](ti-indicator.md) | Submits [Indicator](ti-indicator.md) entity. [Delete Indicator](delete-ti-indicator-by-id.md) | No Content | Deletes [Indicator](ti-indicator.md) entity. -- See the corresponding [page](https://securitycenter.windows.com/preferences2/custom_ti_indicators/files) in the portal: +- See the corresponding [page](https://securitycenter.windows.com/preferences2/custom_ti_indicators/files) in the portal. + +For more information on creating indicators, see [Manage indicators](manage-indicators.md). # Properties Property | Type | Description From 404ad6d084830e0824ab2c051f0826b72c8b9f3e Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Mon, 9 Sep 2019 15:33:38 -0700 Subject: [PATCH 122/285] updated links --- .openpublishing.redirection.json | 2 +- .../threat-protection/intelligence/ransomware-malware.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 16a10bcb81..2cc5313118 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -817,7 +817,7 @@ }, { "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/enable-controlled-folders-exploit-guard", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/enable-controlled-folders", "redirect_document_id": true }, { diff --git a/windows/security/threat-protection/intelligence/ransomware-malware.md b/windows/security/threat-protection/intelligence/ransomware-malware.md index 5ebb6aa87a..b91211e7da 100644 --- a/windows/security/threat-protection/intelligence/ransomware-malware.md +++ b/windows/security/threat-protection/intelligence/ransomware-malware.md @@ -61,6 +61,6 @@ We recommend: * Educate your employees so they can identify social engineering and spear-phishing attacks. -* [Controlled folder access](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard). It can stop ransomware from encrypting files and holding the files for ransom. +* [Controlled folder access](../microsoft-defender-atp/controlled-folders.md). It can stop ransomware from encrypting files and holding the files for ransom. For more general tips, see [prevent malware infection](prevent-malware-infection.md). From 2a514969ce5a1aedf0c010b3cf9fe6a8411e988f Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Mon, 9 Sep 2019 16:15:21 -0700 Subject: [PATCH 123/285] Removed orphan tag --- windows/client-management/mdm/policy-csp-accounts.md | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-accounts.md b/windows/client-management/mdm/policy-csp-accounts.md index aa13a45f98..01145052fc 100644 --- a/windows/client-management/mdm/policy-csp-accounts.md +++ b/windows/client-management/mdm/policy-csp-accounts.md @@ -222,6 +222,4 @@ Footnotes: ## Accounts policies supported by HoloLens (1st gen) Development Edition - [Accounts/AllowMicrosoftAccountConnection](#accounts-allowmicrosoftaccountconnection) - - -
\ No newline at end of file + \ No newline at end of file From b7c0643659189d384c8fa4b234256bdaef176b02 Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Mon, 9 Sep 2019 16:19:27 -0700 Subject: [PATCH 124/285] updating ms.author --- windows/application-management/add-apps-and-features.md | 2 +- .../app-v/appv-connection-group-virtual-environment.md | 2 +- ...ert-a-package-created-in-a-previous-version-of-appv.md | 2 +- ...with-user-published-and-globally-published-packages.md | 2 +- .../app-v/appv-create-a-connection-group.md | 2 +- ...stom-configuration-file-with-the-management-console.md | 2 +- .../appv-create-a-package-accelerator-with-powershell.md | 2 +- .../app-v/appv-create-a-package-accelerator.md | 2 +- ...e-a-virtual-application-package-package-accelerator.md | 2 +- .../app-v/appv-create-and-use-a-project-template.md | 2 +- ...appv-creating-and-managing-virtualized-applications.md | 2 +- ...-application-extensions-with-the-management-console.md | 2 +- .../app-v/appv-delete-a-connection-group.md | 2 +- .../appv-delete-a-package-with-the-management-console.md | 2 +- .../app-v/appv-deploy-appv-databases-with-sql-scripts.md | 2 +- ...ges-with-electronic-software-distribution-solutions.md | 2 +- .../app-v/appv-deploy-the-appv-server-with-a-script.md | 2 +- .../app-v/appv-deploy-the-appv-server.md | 2 +- .../application-management/app-v/appv-deploying-appv.md | 2 +- .../appv-deploying-microsoft-office-2010-wth-appv.md | 2 +- .../appv-deploying-microsoft-office-2013-with-appv.md | 2 +- .../appv-deploying-microsoft-office-2016-with-appv.md | 2 +- ...ges-with-electronic-software-distribution-solutions.md | 2 +- .../app-v/appv-deploying-the-appv-sequencer-and-client.md | 2 +- .../app-v/appv-deploying-the-appv-server.md | 2 +- .../app-v/appv-deployment-checklist.md | 2 +- .../app-v/appv-dynamic-configuration.md | 2 +- ...ges-with-electronic-software-distribution-solutions.md | 2 +- ...enable-reporting-on-the-appv-client-with-powershell.md | 2 +- .../app-v/appv-enable-the-app-v-desktop-client.md | 2 +- .../application-management/app-v/appv-evaluating-appv.md | 2 +- windows/application-management/app-v/appv-for-windows.md | 2 +- .../application-management/app-v/appv-getting-started.md | 2 +- .../app-v/appv-high-level-architecture.md | 2 +- ...the-associated-security-identifiers-with-powershell.md | 2 +- ...ement-and-reporting-databases-on-separate-computers.md | 2 +- ...tall-the-management-server-on-a-standalone-computer.md | 2 +- ...-install-the-publishing-server-on-a-remote-computer.md | 2 +- ...stall-the-reporting-server-on-a-standalone-computer.md | 2 +- .../app-v/appv-install-the-sequencer.md | 2 +- ...ppv-load-the-powershell-cmdlets-and-get-cmdlet-help.md | 2 +- .../application-management/app-v/appv-maintaining-appv.md | 2 +- ...s-running-on-a-stand-alone-computer-with-powershell.md | 2 +- ...on-groups-on-a-stand-alone-computer-with-powershell.md | 2 +- .../app-v/appv-managing-connection-groups.md | 2 +- .../appv-migrating-to-appv-from-a-previous-version.md | 2 +- ...appv-modify-an-existing-virtual-application-package.md | 2 +- .../appv-modify-client-configuration-with-powershell.md | 2 +- .../appv-move-the-appv-server-to-another-computer.md | 2 +- windows/application-management/app-v/appv-operations.md | 2 +- .../app-v/appv-performance-guidance.md | 2 +- .../app-v/appv-planning-checklist.md | 2 +- .../app-v/appv-planning-folder-redirection-with-appv.md | 2 +- .../app-v/appv-planning-for-appv-server-deployment.md | 2 +- .../app-v/appv-planning-for-appv.md | 2 +- .../appv-planning-for-high-availability-with-appv.md | 2 +- .../appv-planning-for-sequencer-and-client-deployment.md | 2 +- .../app-v/appv-planning-for-using-appv-with-office.md | 2 +- ...ppv-with-electronic-software-distribution-solutions.md | 2 +- .../app-v/appv-planning-to-deploy-appv.md | 2 +- .../app-v/appv-preparing-your-environment.md | 2 +- .../application-management/app-v/appv-prerequisites.md | 2 +- .../app-v/appv-publish-a-connection-group.md | 2 +- ...appv-publish-a-packages-with-the-management-console.md | 2 +- ...ter-a-publishing-server-with-the-management-console.md | 2 +- .../app-v/appv-release-notes-for-appv-for-windows-1703.md | 2 +- .../app-v/appv-release-notes-for-appv-for-windows.md | 2 +- windows/application-management/app-v/appv-reporting.md | 2 +- ...installed-applications-inside-a-virtual-environment.md | 2 +- .../app-v/appv-security-considerations.md | 2 +- .../app-v/appv-sequence-a-new-application.md | 2 +- .../app-v/appv-sequence-a-package-with-powershell.md | 2 +- .../app-v/appv-supported-configurations.md | 2 +- .../app-v/appv-technical-reference.md | 2 +- ...er-version-of-a-package-with-the-management-console.md | 2 +- .../application-management/app-v/appv-troubleshooting.md | 2 +- ...-app-v-for-windows-10-from-an-existing-installation.md | 2 +- .../app-v/appv-using-the-client-management-console.md | 2 +- ...-application-extensions-with-the-management-console.md | 2 +- .../app-v/appv-viewing-appv-server-publishing-metadata.md | 2 +- windows/application-management/apps-in-windows-10.md | 2 +- .../change-history-for-application-management.md | 2 +- .../deploy-app-upgrades-windows-10-mobile.md | 2 +- .../enterprise-background-activity-controls.md | 2 +- .../manage-windows-mixed-reality.md | 2 +- windows/application-management/msix-app-packaging-tool.md | 2 +- .../per-user-services-in-windows.md | 4 ++-- .../remove-provisioned-apps-during-update.md | 2 +- .../application-management/sideload-apps-in-windows-10.md | 2 +- .../application-management/svchost-service-refactoring.md | 2 +- windows/client-management/mdm/accountmanagement-csp.md | 2 +- windows/client-management/mdm/accountmanagement-ddf.md | 2 +- windows/client-management/mdm/accounts-csp.md | 2 +- windows/client-management/mdm/accounts-ddf-file.md | 2 +- windows/client-management/mdm/activesync-csp.md | 2 +- windows/client-management/mdm/activesync-ddf-file.md | 2 +- .../add-an-azure-ad-tenant-and-azure-ad-subscription.md | 2 +- windows/client-management/mdm/alljoynmanagement-csp.md | 2 +- windows/client-management/mdm/alljoynmanagement-ddf.md | 2 +- windows/client-management/mdm/application-csp.md | 2 +- .../client-management/mdm/applicationrestrictions-xsd.md | 2 +- windows/client-management/mdm/applocker-csp.md | 2 +- windows/client-management/mdm/applocker-ddf-file.md | 2 +- windows/client-management/mdm/applocker-xsd.md | 2 +- windows/client-management/mdm/appv-deploy-and-config.md | 2 +- windows/client-management/mdm/assign-seats.md | 2 +- windows/client-management/mdm/assignedaccess-csp.md | 2 +- windows/client-management/mdm/assignedaccess-ddf.md | 2 +- .../mdm/azure-active-directory-integration-with-mdm.md | 2 +- ...t-intune-automatic-mdm-enrollment-in-the-new-portal.md | 2 +- windows/client-management/mdm/bitlocker-csp.md | 2 +- windows/client-management/mdm/bitlocker-ddf-file.md | 2 +- windows/client-management/mdm/bootstrap-csp.md | 2 +- windows/client-management/mdm/browserfavorite-csp.md | 2 +- .../mdm/bulk-assign-and-reclaim-seats-from-user.md | 2 +- .../bulk-enrollment-using-windows-provisioning-tool.md | 8 ++++---- windows/client-management/mdm/cellularsettings-csp.md | 2 +- .../mdm/certificate-authentication-device-enrollment.md | 2 +- .../mdm/certificate-renewal-windows-mdm.md | 8 ++++---- windows/client-management/mdm/certificatestore-csp.md | 2 +- .../client-management/mdm/certificatestore-ddf-file.md | 2 +- .../mdm/policy-csp-servicecontrolmanager.md | 2 +- .../client-management/mdm/policy-csp-troubleshooting.md | 2 +- ...v-administering-uev-with-windows-powershell-and-wmi.md | 2 +- windows/configuration/ue-v/uev-administering-uev.md | 2 +- .../ue-v/uev-application-template-schema-reference.md | 2 +- .../ue-v/uev-changing-the-frequency-of-scheduled-tasks.md | 2 +- .../ue-v/uev-configuring-uev-with-group-policy-objects.md | 2 +- ...sic-level-windows-diagnostic-events-and-fields-1903.md | 2 +- .../identity-protection/access-control/access-control.md | 2 +- .../access-control/active-directory-accounts.md | 2 +- .../access-control/active-directory-security-groups.md | 2 +- .../access-control/dynamic-access-control.md | 2 +- .../identity-protection/access-control/local-accounts.md | 2 +- .../access-control/microsoft-accounts.md | 2 +- .../access-control/security-identifiers.md | 2 +- .../access-control/security-principals.md | 2 +- .../access-control/service-accounts.md | 2 +- .../access-control/special-identities.md | 2 +- .../change-history-for-access-protection.md | 2 +- windows/security/identity-protection/configure-s-mime.md | 2 +- .../credential-guard/additional-mitigations.md | 2 +- .../credential-guard/credential-guard-considerations.md | 2 +- .../credential-guard/credential-guard-how-it-works.md | 4 ++-- .../credential-guard/credential-guard-known-issues.md | 2 +- .../credential-guard/credential-guard-manage.md | 2 +- .../credential-guard-not-protected-scenarios.md | 2 +- .../credential-guard-protection-limits.md | 2 +- .../credential-guard/credential-guard-requirements.md | 2 +- .../credential-guard/credential-guard-scripts.md | 2 +- .../credential-guard/credential-guard.md | 2 +- .../identity-protection/enterprise-certificate-pinning.md | 4 ++-- ...nstalling-digital-certificates-on-windows-10-mobile.md | 2 +- .../identity-protection/remote-credential-guard.md | 2 +- .../smart-cards/smart-card-and-remote-desktop-services.md | 2 +- .../smart-cards/smart-card-architecture.md | 2 +- .../smart-card-certificate-propagation-service.md | 2 +- ...smart-card-certificate-requirements-and-enumeration.md | 2 +- .../smart-cards/smart-card-debugging-information.md | 2 +- .../identity-protection/smart-cards/smart-card-events.md | 2 +- .../smart-card-group-policy-and-registry-settings.md | 2 +- .../smart-card-how-smart-card-sign-in-works-in-windows.md | 2 +- .../smart-cards/smart-card-removal-policy-service.md | 2 +- .../smart-card-smart-cards-for-windows-service.md | 2 +- .../smart-cards/smart-card-tools-and-settings.md | 2 +- .../smart-card-windows-smart-card-technical-reference.md | 2 +- .../how-user-account-control-works.md | 2 +- ...ount-control-group-policy-and-registry-key-settings.md | 2 +- .../user-account-control/user-account-control-overview.md | 2 +- .../user-account-control-security-policy-settings.md | 2 +- .../virtual-smart-card-deploy-virtual-smart-cards.md | 2 +- .../virtual-smart-card-evaluate-security.md | 2 +- .../virtual-smart-cards/virtual-smart-card-get-started.md | 2 +- .../virtual-smart-cards/virtual-smart-card-overview.md | 2 +- .../virtual-smart-cards/virtual-smart-card-tpmvscmgr.md | 2 +- .../virtual-smart-card-understanding-and-evaluating.md | 2 +- .../virtual-smart-card-use-virtual-smart-cards.md | 2 +- ...-diffie-hellman-protocol-over-ikev2-vpn-connections.md | 2 +- ...e-single-sign-on-sso-over-vpn-and-wi-fi-connections.md | 2 +- .../identity-protection/vpn/vpn-authentication.md | 2 +- .../identity-protection/vpn/vpn-auto-trigger-profile.md | 2 +- .../identity-protection/vpn/vpn-conditional-access.md | 4 ++-- .../identity-protection/vpn/vpn-connection-type.md | 2 +- windows/security/identity-protection/vpn/vpn-guide.md | 2 +- .../identity-protection/vpn/vpn-name-resolution.md | 2 +- .../identity-protection/vpn/vpn-profile-options.md | 2 +- windows/security/identity-protection/vpn/vpn-routing.md | 2 +- .../identity-protection/vpn/vpn-security-features.md | 2 +- .../windows-credential-theft-mitigation-guide-abstract.md | 2 +- .../bitlocker/bcd-settings-and-bitlocker.md | 2 +- .../bitlocker/bitlocker-and-adds-faq.md | 2 +- .../bitlocker/bitlocker-basic-deployment.md | 2 +- .../bitlocker/bitlocker-countermeasures.md | 2 +- .../bitlocker-deployment-and-administration-faq.md | 2 +- .../bitlocker-device-encryption-overview-windows-10.md | 2 +- .../bitlocker/bitlocker-frequently-asked-questions.md | 2 +- .../bitlocker/bitlocker-group-policy-settings.md | 2 +- .../bitlocker-how-to-deploy-on-windows-server.md | 2 +- .../bitlocker/bitlocker-how-to-enable-network-unlock.md | 2 +- .../bitlocker/bitlocker-key-management-faq.md | 2 +- .../bitlocker/bitlocker-management-for-enterprises.md | 4 ++-- .../bitlocker/bitlocker-network-unlock-faq.md | 2 +- .../bitlocker/bitlocker-overview-and-requirements-faq.md | 2 +- .../bitlocker/bitlocker-overview.md | 2 +- .../bitlocker/bitlocker-recovery-guide-plan.md | 2 +- .../bitlocker/bitlocker-security-faq.md | 4 ++-- .../bitlocker/bitlocker-to-go-faq.md | 2 +- .../bitlocker/bitlocker-upgrading-faq.md | 2 +- ...itlocker-drive-encryption-tools-to-manage-bitlocker.md | 4 ++-- .../bitlocker-use-bitlocker-recovery-password-viewer.md | 4 ++-- .../bitlocker/bitlocker-using-with-other-programs-faq.md | 2 +- ...ur-organization-for-bitlocker-planning-and-policies.md | 2 +- ...ed-volumes-and-storage-area-networks-with-bitlocker.md | 2 +- .../information-protection/encrypted-hard-drive.md | 2 +- .../kernel-dma-protection-for-thunderbolt.md | 2 +- .../secure-the-windows-10-boot-process.md | 2 +- .../tpm/backup-tpm-recovery-information-to-ad-ds.md | 2 +- .../tpm/change-the-tpm-owner-password.md | 2 +- .../tpm/how-windows-uses-the-tpm.md | 2 +- .../tpm/initialize-and-configure-ownership-of-the-tpm.md | 2 +- .../information-protection/tpm/manage-tpm-commands.md | 2 +- .../information-protection/tpm/manage-tpm-lockout.md | 2 +- .../tpm/switch-pcr-banks-on-tpm-2-0-devices.md | 4 ++-- .../information-protection/tpm/tpm-fundamentals.md | 2 +- .../information-protection/tpm/tpm-recommendations.md | 2 +- .../tpm/trusted-platform-module-overview.md | 2 +- ...sted-platform-module-services-group-policy-settings.md | 2 +- .../tpm/trusted-platform-module-top-node.md | 2 +- .../app-behavior-with-wip.md | 2 +- .../collect-wip-audit-event-logs.md | 2 +- .../create-and-verify-an-efs-dra-certificate.md | 2 +- .../create-vpn-and-wip-policy-using-intune-azure.md | 2 +- .../create-wip-policy-using-intune-azure.md | 2 +- .../create-wip-policy-using-sccm.md | 2 +- .../deploy-wip-policy-using-intune-azure.md | 2 +- .../enlightened-microsoft-apps-and-wip.md | 2 +- .../guidance-and-best-practices-wip.md | 2 +- .../how-wip-works-with-labels.md | 2 +- .../limitations-with-wip.md | 2 +- .../mandatory-settings-for-wip.md | 2 +- .../overview-create-wip-policy-sccm.md | 2 +- .../overview-create-wip-policy.md | 2 +- .../protect-enterprise-data-using-wip.md | 2 +- .../recommended-network-definitions-for-wip.md | 2 +- .../testing-scenarios-for-wip.md | 2 +- .../windows-information-protection/using-owa-with-wip.md | 2 +- .../wip-app-enterprise-context.md | 2 +- .../auditing/advanced-security-audit-policy-settings.md | 2 +- .../auditing/advanced-security-auditing-faq.md | 2 +- .../auditing/advanced-security-auditing.md | 2 +- ...ty-monitoring-recommendations-for-many-audit-events.md | 2 +- .../apply-a-basic-audit-policy-on-a-file-or-folder.md | 2 +- .../threat-protection/auditing/audit-account-lockout.md | 2 +- .../auditing/audit-application-generated.md | 2 +- .../auditing/audit-application-group-management.md | 2 +- .../auditing/audit-audit-policy-change.md | 2 +- .../auditing/audit-authentication-policy-change.md | 2 +- .../auditing/audit-authorization-policy-change.md | 2 +- .../auditing/audit-central-access-policy-staging.md | 2 +- .../auditing/audit-certification-services.md | 2 +- .../auditing/audit-computer-account-management.md | 2 +- .../auditing/audit-credential-validation.md | 2 +- .../audit-detailed-directory-service-replication.md | 2 +- .../auditing/audit-detailed-file-share.md | 2 +- .../auditing/audit-directory-service-access.md | 2 +- .../auditing/audit-directory-service-changes.md | 2 +- .../auditing/audit-directory-service-replication.md | 2 +- .../auditing/audit-distribution-group-management.md | 2 +- .../threat-protection/auditing/audit-dpapi-activity.md | 2 +- .../threat-protection/auditing/audit-file-share.md | 2 +- .../threat-protection/auditing/audit-file-system.md | 2 +- .../auditing/audit-filtering-platform-connection.md | 2 +- .../auditing/audit-filtering-platform-packet-drop.md | 2 +- .../auditing/audit-filtering-platform-policy-change.md | 2 +- .../threat-protection/auditing/audit-group-membership.md | 2 +- .../auditing/audit-handle-manipulation.md | 2 +- .../threat-protection/auditing/audit-ipsec-driver.md | 2 +- .../auditing/audit-ipsec-extended-mode.md | 2 +- .../threat-protection/auditing/audit-ipsec-main-mode.md | 2 +- .../threat-protection/auditing/audit-ipsec-quick-mode.md | 2 +- .../auditing/audit-kerberos-authentication-service.md | 2 +- .../auditing/audit-kerberos-service-ticket-operations.md | 2 +- .../threat-protection/auditing/audit-kernel-object.md | 2 +- .../security/threat-protection/auditing/audit-logoff.md | 2 +- .../security/threat-protection/auditing/audit-logon.md | 2 +- .../auditing/audit-mpssvc-rule-level-policy-change.md | 2 +- .../auditing/audit-network-policy-server.md | 2 +- .../auditing/audit-non-sensitive-privilege-use.md | 2 +- .../auditing/audit-other-account-logon-events.md | 2 +- .../auditing/audit-other-account-management-events.md | 2 +- .../auditing/audit-other-logonlogoff-events.md | 2 +- .../auditing/audit-other-object-access-events.md | 2 +- .../auditing/audit-other-policy-change-events.md | 2 +- .../auditing/audit-other-privilege-use-events.md | 2 +- .../auditing/audit-other-system-events.md | 2 +- .../threat-protection/auditing/audit-pnp-activity.md | 2 +- .../threat-protection/auditing/audit-process-creation.md | 2 +- .../auditing/audit-process-termination.md | 2 +- .../security/threat-protection/auditing/audit-registry.md | 2 +- .../threat-protection/auditing/audit-removable-storage.md | 2 +- .../threat-protection/auditing/audit-rpc-events.md | 2 +- windows/security/threat-protection/auditing/audit-sam.md | 2 +- .../auditing/audit-security-group-management.md | 2 +- .../auditing/audit-security-state-change.md | 2 +- .../auditing/audit-security-system-extension.md | 2 +- .../auditing/audit-sensitive-privilege-use.md | 2 +- .../threat-protection/auditing/audit-special-logon.md | 2 +- .../threat-protection/auditing/audit-system-integrity.md | 2 +- .../auditing/audit-user-account-management.md | 2 +- .../auditing/audit-user-device-claims.md | 2 +- .../auditing/basic-audit-account-logon-events.md | 2 +- .../auditing/basic-audit-account-management.md | 2 +- .../auditing/basic-audit-directory-service-access.md | 2 +- .../auditing/basic-audit-logon-events.md | 2 +- .../auditing/basic-audit-object-access.md | 2 +- .../auditing/basic-audit-policy-change.md | 2 +- .../auditing/basic-audit-privilege-use.md | 2 +- .../auditing/basic-audit-process-tracking.md | 2 +- .../auditing/basic-audit-system-events.md | 2 +- .../auditing/basic-security-audit-policies.md | 2 +- .../auditing/basic-security-audit-policy-settings.md | 2 +- ...a-basic-audit-policy-settings-for-an-event-category.md | 2 +- windows/security/threat-protection/auditing/event-1100.md | 2 +- windows/security/threat-protection/auditing/event-1102.md | 2 +- windows/security/threat-protection/auditing/event-1104.md | 2 +- .../block-untrusted-fonts-in-enterprise.md | 2 +- .../change-history-for-threat-protection.md | 2 +- .../device-control/control-usb-devices-using-intune.md | 2 +- windows/security/threat-protection/fips-140-validation.md | 2 +- .../get-support-for-security-baselines.md | 2 +- windows/security/threat-protection/index.md | 4 ++-- .../threat-protection/mbsa-removal-and-guidance.md | 2 +- ...itigation-options-for-app-related-security-policies.md | 3 ++- .../overview-of-threat-mitigations-in-windows-10.md | 4 ++-- ...-controlling-the-health-of-windows-10-based-devices.md | 3 +-- .../threat-protection/security-compliance-toolkit-10.md | 2 +- ...s-event-forwarding-to-assist-in-intrusion-detection.md | 2 +- ...pt-ransomware-worm-targets-out-of-date-systems-wdsi.md | 2 +- .../threat-protection/windows-10-mobile-security-guide.md | 2 +- .../threat-protection/windows-platform-common-criteria.md | 2 +- .../threat-protection/windows-security-baselines.md | 2 +- 341 files changed, 359 insertions(+), 359 deletions(-) diff --git a/windows/application-management/add-apps-and-features.md b/windows/application-management/add-apps-and-features.md index bb0195c0dc..81f0da756e 100644 --- a/windows/application-management/add-apps-and-features.md +++ b/windows/application-management/add-apps-and-features.md @@ -5,7 +5,7 @@ ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: article -ms.author: tracyp +ms.author: dansimp author: msfttracyp ms.localizationpriority: medium ms.date: 04/26/2018 diff --git a/windows/application-management/app-v/appv-connection-group-virtual-environment.md b/windows/application-management/app-v/appv-connection-group-virtual-environment.md index 7fa1f3d1b5..ed2d425dc4 100644 --- a/windows/application-management/app-v/appv-connection-group-virtual-environment.md +++ b/windows/application-management/app-v/appv-connection-group-virtual-environment.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 06/25/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # About the connection group virtual environment diff --git a/windows/application-management/app-v/appv-convert-a-package-created-in-a-previous-version-of-appv.md b/windows/application-management/app-v/appv-convert-a-package-created-in-a-previous-version-of-appv.md index b6228dd6cd..794615f010 100644 --- a/windows/application-management/app-v/appv-convert-a-package-created-in-a-previous-version-of-appv.md +++ b/windows/application-management/app-v/appv-convert-a-package-created-in-a-previous-version-of-appv.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 07/10/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # How to convert a package created in a previous version of App-V diff --git a/windows/application-management/app-v/appv-create-a-connection-group-with-user-published-and-globally-published-packages.md b/windows/application-management/app-v/appv-create-a-connection-group-with-user-published-and-globally-published-packages.md index c7df167fba..312adeb09b 100644 --- a/windows/application-management/app-v/appv-create-a-connection-group-with-user-published-and-globally-published-packages.md +++ b/windows/application-management/app-v/appv-create-a-connection-group-with-user-published-and-globally-published-packages.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 07/10/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # How to create a connection croup with user-published and globally published packages diff --git a/windows/application-management/app-v/appv-create-a-connection-group.md b/windows/application-management/app-v/appv-create-a-connection-group.md index 2dca44be85..9f08b25b41 100644 --- a/windows/application-management/app-v/appv-create-a-connection-group.md +++ b/windows/application-management/app-v/appv-create-a-connection-group.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 07/10/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # How to create a connection group diff --git a/windows/application-management/app-v/appv-create-a-custom-configuration-file-with-the-management-console.md b/windows/application-management/app-v/appv-create-a-custom-configuration-file-with-the-management-console.md index 098316aee4..273b520a59 100644 --- a/windows/application-management/app-v/appv-create-a-custom-configuration-file-with-the-management-console.md +++ b/windows/application-management/app-v/appv-create-a-custom-configuration-file-with-the-management-console.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 07/10/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # How to create a custom configuration file by using the App-V Management Console diff --git a/windows/application-management/app-v/appv-create-a-package-accelerator-with-powershell.md b/windows/application-management/app-v/appv-create-a-package-accelerator-with-powershell.md index a33e8e481a..fb72cbc762 100644 --- a/windows/application-management/app-v/appv-create-a-package-accelerator-with-powershell.md +++ b/windows/application-management/app-v/appv-create-a-package-accelerator-with-powershell.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 07/10/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # How to create a package accelerator by using Windows PowerShell diff --git a/windows/application-management/app-v/appv-create-a-package-accelerator.md b/windows/application-management/app-v/appv-create-a-package-accelerator.md index e16200acad..7f2ec6c3c5 100644 --- a/windows/application-management/app-v/appv-create-a-package-accelerator.md +++ b/windows/application-management/app-v/appv-create-a-package-accelerator.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 07/10/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # How to create a package accelerator diff --git a/windows/application-management/app-v/appv-create-a-virtual-application-package-package-accelerator.md b/windows/application-management/app-v/appv-create-a-virtual-application-package-package-accelerator.md index 936ec0bf29..c6983aab02 100644 --- a/windows/application-management/app-v/appv-create-a-virtual-application-package-package-accelerator.md +++ b/windows/application-management/app-v/appv-create-a-virtual-application-package-package-accelerator.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 07/10/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # How to create a virtual application package using an App-V Package Accelerator diff --git a/windows/application-management/app-v/appv-create-and-use-a-project-template.md b/windows/application-management/app-v/appv-create-and-use-a-project-template.md index 5e2bef4061..54aa412604 100644 --- a/windows/application-management/app-v/appv-create-and-use-a-project-template.md +++ b/windows/application-management/app-v/appv-create-and-use-a-project-template.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 07/10/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # Create and apply an App-V project template to a sequenced App-V package diff --git a/windows/application-management/app-v/appv-creating-and-managing-virtualized-applications.md b/windows/application-management/app-v/appv-creating-and-managing-virtualized-applications.md index 66e540afb8..197cff66cb 100644 --- a/windows/application-management/app-v/appv-creating-and-managing-virtualized-applications.md +++ b/windows/application-management/app-v/appv-creating-and-managing-virtualized-applications.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/18/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # Creating and managing App-V virtualized applications diff --git a/windows/application-management/app-v/appv-customize-virtual-application-extensions-with-the-management-console.md b/windows/application-management/app-v/appv-customize-virtual-application-extensions-with-the-management-console.md index d1a19673a2..aae5ad7d4c 100644 --- a/windows/application-management/app-v/appv-customize-virtual-application-extensions-with-the-management-console.md +++ b/windows/application-management/app-v/appv-customize-virtual-application-extensions-with-the-management-console.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 07/10/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # How to customize virtual applications extensions for a specific AD group by using the Management Console diff --git a/windows/application-management/app-v/appv-delete-a-connection-group.md b/windows/application-management/app-v/appv-delete-a-connection-group.md index cce79c8074..9747e3066d 100644 --- a/windows/application-management/app-v/appv-delete-a-connection-group.md +++ b/windows/application-management/app-v/appv-delete-a-connection-group.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 09/27/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # How to delete a connection group diff --git a/windows/application-management/app-v/appv-delete-a-package-with-the-management-console.md b/windows/application-management/app-v/appv-delete-a-package-with-the-management-console.md index efb08e96ef..3b5027c30b 100644 --- a/windows/application-management/app-v/appv-delete-a-package-with-the-management-console.md +++ b/windows/application-management/app-v/appv-delete-a-package-with-the-management-console.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 09/27/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # How to delete a package in the Management Console diff --git a/windows/application-management/app-v/appv-deploy-appv-databases-with-sql-scripts.md b/windows/application-management/app-v/appv-deploy-appv-databases-with-sql-scripts.md index a8d4e50173..fa0a2dca44 100644 --- a/windows/application-management/app-v/appv-deploy-appv-databases-with-sql-scripts.md +++ b/windows/application-management/app-v/appv-deploy-appv-databases-with-sql-scripts.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/18/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # How to deploy the App-V databases by using SQL scripts diff --git a/windows/application-management/app-v/appv-deploy-appv-packages-with-electronic-software-distribution-solutions.md b/windows/application-management/app-v/appv-deploy-appv-packages-with-electronic-software-distribution-solutions.md index f71def779b..0c013faf96 100644 --- a/windows/application-management/app-v/appv-deploy-appv-packages-with-electronic-software-distribution-solutions.md +++ b/windows/application-management/app-v/appv-deploy-appv-packages-with-electronic-software-distribution-solutions.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 09/27/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # How to deploy App-V packages using electronic software distribution diff --git a/windows/application-management/app-v/appv-deploy-the-appv-server-with-a-script.md b/windows/application-management/app-v/appv-deploy-the-appv-server-with-a-script.md index a2d5fcd633..9ee527503b 100644 --- a/windows/application-management/app-v/appv-deploy-the-appv-server-with-a-script.md +++ b/windows/application-management/app-v/appv-deploy-the-appv-server-with-a-script.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/18/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # How to deploy the App-V server using a script diff --git a/windows/application-management/app-v/appv-deploy-the-appv-server.md b/windows/application-management/app-v/appv-deploy-the-appv-server.md index 96b334816f..d30cf24d63 100644 --- a/windows/application-management/app-v/appv-deploy-the-appv-server.md +++ b/windows/application-management/app-v/appv-deploy-the-appv-server.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/18/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # How to Deploy the App-V Server (new installation) diff --git a/windows/application-management/app-v/appv-deploying-appv.md b/windows/application-management/app-v/appv-deploying-appv.md index ee60adece8..d71a0f0476 100644 --- a/windows/application-management/app-v/appv-deploying-appv.md +++ b/windows/application-management/app-v/appv-deploying-appv.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/18/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # Deploying App-V for Windows 10 diff --git a/windows/application-management/app-v/appv-deploying-microsoft-office-2010-wth-appv.md b/windows/application-management/app-v/appv-deploying-microsoft-office-2010-wth-appv.md index 22c9ac4efb..eb84b6e2b7 100644 --- a/windows/application-management/app-v/appv-deploying-microsoft-office-2010-wth-appv.md +++ b/windows/application-management/app-v/appv-deploying-microsoft-office-2010-wth-appv.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/18/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # Deploying Microsoft Office 2010 by Using App-V diff --git a/windows/application-management/app-v/appv-deploying-microsoft-office-2013-with-appv.md b/windows/application-management/app-v/appv-deploying-microsoft-office-2013-with-appv.md index 2b22d0a46a..6fa996507f 100644 --- a/windows/application-management/app-v/appv-deploying-microsoft-office-2013-with-appv.md +++ b/windows/application-management/app-v/appv-deploying-microsoft-office-2013-with-appv.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/18/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # Deploying Microsoft Office 2013 by Using App-V diff --git a/windows/application-management/app-v/appv-deploying-microsoft-office-2016-with-appv.md b/windows/application-management/app-v/appv-deploying-microsoft-office-2016-with-appv.md index f9239225d9..ce7303bbf8 100644 --- a/windows/application-management/app-v/appv-deploying-microsoft-office-2016-with-appv.md +++ b/windows/application-management/app-v/appv-deploying-microsoft-office-2016-with-appv.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/18/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # Deploying Microsoft Office 2016 by using App-V diff --git a/windows/application-management/app-v/appv-deploying-packages-with-electronic-software-distribution-solutions.md b/windows/application-management/app-v/appv-deploying-packages-with-electronic-software-distribution-solutions.md index 09ff627f45..37adcaae5e 100644 --- a/windows/application-management/app-v/appv-deploying-packages-with-electronic-software-distribution-solutions.md +++ b/windows/application-management/app-v/appv-deploying-packages-with-electronic-software-distribution-solutions.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 09/27/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # Deploying App-V packages by using electronic software distribution (ESD) diff --git a/windows/application-management/app-v/appv-deploying-the-appv-sequencer-and-client.md b/windows/application-management/app-v/appv-deploying-the-appv-sequencer-and-client.md index b1535ba7a9..4edf732dd1 100644 --- a/windows/application-management/app-v/appv-deploying-the-appv-sequencer-and-client.md +++ b/windows/application-management/app-v/appv-deploying-the-appv-sequencer-and-client.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/18/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # Deploying the App-V Sequencer and configuring the client diff --git a/windows/application-management/app-v/appv-deploying-the-appv-server.md b/windows/application-management/app-v/appv-deploying-the-appv-server.md index cb14cc7f5c..576764fb91 100644 --- a/windows/application-management/app-v/appv-deploying-the-appv-server.md +++ b/windows/application-management/app-v/appv-deploying-the-appv-server.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/18/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # Deploying the App-V server diff --git a/windows/application-management/app-v/appv-deployment-checklist.md b/windows/application-management/app-v/appv-deployment-checklist.md index da297a75ef..bb97e27472 100644 --- a/windows/application-management/app-v/appv-deployment-checklist.md +++ b/windows/application-management/app-v/appv-deployment-checklist.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/18/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # App-V Deployment Checklist diff --git a/windows/application-management/app-v/appv-dynamic-configuration.md b/windows/application-management/app-v/appv-dynamic-configuration.md index 61c8be02a4..13a82055b6 100644 --- a/windows/application-management/app-v/appv-dynamic-configuration.md +++ b/windows/application-management/app-v/appv-dynamic-configuration.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 09/27/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # About App-V dynamic configuration diff --git a/windows/application-management/app-v/appv-enable-administrators-to-publish-packages-with-electronic-software-distribution-solutions.md b/windows/application-management/app-v/appv-enable-administrators-to-publish-packages-with-electronic-software-distribution-solutions.md index 007503ac03..656f0264ce 100644 --- a/windows/application-management/app-v/appv-enable-administrators-to-publish-packages-with-electronic-software-distribution-solutions.md +++ b/windows/application-management/app-v/appv-enable-administrators-to-publish-packages-with-electronic-software-distribution-solutions.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/19/2017 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # How to enable only administrators to publish packages by using an ESD diff --git a/windows/application-management/app-v/appv-enable-reporting-on-the-appv-client-with-powershell.md b/windows/application-management/app-v/appv-enable-reporting-on-the-appv-client-with-powershell.md index cbaef2e7a4..39a072c558 100644 --- a/windows/application-management/app-v/appv-enable-reporting-on-the-appv-client-with-powershell.md +++ b/windows/application-management/app-v/appv-enable-reporting-on-the-appv-client-with-powershell.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/19/2017 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # How to Enable Reporting on the App-V Client by Using Windows PowerShell diff --git a/windows/application-management/app-v/appv-enable-the-app-v-desktop-client.md b/windows/application-management/app-v/appv-enable-the-app-v-desktop-client.md index 39b561ebe4..d9644226fb 100644 --- a/windows/application-management/app-v/appv-enable-the-app-v-desktop-client.md +++ b/windows/application-management/app-v/appv-enable-the-app-v-desktop-client.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/18/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # Enable the App-V in-box client diff --git a/windows/application-management/app-v/appv-evaluating-appv.md b/windows/application-management/app-v/appv-evaluating-appv.md index 6381b20416..df7f76ca07 100644 --- a/windows/application-management/app-v/appv-evaluating-appv.md +++ b/windows/application-management/app-v/appv-evaluating-appv.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/19/2017 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp --- diff --git a/windows/application-management/app-v/appv-for-windows.md b/windows/application-management/app-v/appv-for-windows.md index c05dd40169..459032925c 100644 --- a/windows/application-management/app-v/appv-for-windows.md +++ b/windows/application-management/app-v/appv-for-windows.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 09/27/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # Application Virtualization (App-V) for Windows 10 overview diff --git a/windows/application-management/app-v/appv-getting-started.md b/windows/application-management/app-v/appv-getting-started.md index f39cd72041..1b1f6592d5 100644 --- a/windows/application-management/app-v/appv-getting-started.md +++ b/windows/application-management/app-v/appv-getting-started.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/18/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # Getting started with App-V for Windows 10 diff --git a/windows/application-management/app-v/appv-high-level-architecture.md b/windows/application-management/app-v/appv-high-level-architecture.md index a74cef34c4..ab25607096 100644 --- a/windows/application-management/app-v/appv-high-level-architecture.md +++ b/windows/application-management/app-v/appv-high-level-architecture.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/18/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # High-level architecture for App-V diff --git a/windows/application-management/app-v/appv-install-the-appv-databases-and-convert-the-associated-security-identifiers-with-powershell.md b/windows/application-management/app-v/appv-install-the-appv-databases-and-convert-the-associated-security-identifiers-with-powershell.md index f4075f53b1..82b6545be6 100644 --- a/windows/application-management/app-v/appv-install-the-appv-databases-and-convert-the-associated-security-identifiers-with-powershell.md +++ b/windows/application-management/app-v/appv-install-the-appv-databases-and-convert-the-associated-security-identifiers-with-powershell.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/19/2017 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp --- diff --git a/windows/application-management/app-v/appv-install-the-management-and-reporting-databases-on-separate-computers.md b/windows/application-management/app-v/appv-install-the-management-and-reporting-databases-on-separate-computers.md index 30f57f3cb7..ffffedff20 100644 --- a/windows/application-management/app-v/appv-install-the-management-and-reporting-databases-on-separate-computers.md +++ b/windows/application-management/app-v/appv-install-the-management-and-reporting-databases-on-separate-computers.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/18/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # How to Install the Management and Reporting Databases on separate computers from the Management and Reporting Services diff --git a/windows/application-management/app-v/appv-install-the-management-server-on-a-standalone-computer.md b/windows/application-management/app-v/appv-install-the-management-server-on-a-standalone-computer.md index 314545131f..44e1be2801 100644 --- a/windows/application-management/app-v/appv-install-the-management-server-on-a-standalone-computer.md +++ b/windows/application-management/app-v/appv-install-the-management-server-on-a-standalone-computer.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/18/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # How to install the Management Server on a Standalone Computer and Connect it to the Database diff --git a/windows/application-management/app-v/appv-install-the-publishing-server-on-a-remote-computer.md b/windows/application-management/app-v/appv-install-the-publishing-server-on-a-remote-computer.md index c2f081dd15..87ee2f267a 100644 --- a/windows/application-management/app-v/appv-install-the-publishing-server-on-a-remote-computer.md +++ b/windows/application-management/app-v/appv-install-the-publishing-server-on-a-remote-computer.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/18/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # How to install the publishing server on a remote computer diff --git a/windows/application-management/app-v/appv-install-the-reporting-server-on-a-standalone-computer.md b/windows/application-management/app-v/appv-install-the-reporting-server-on-a-standalone-computer.md index a0a7912e96..d476fda616 100644 --- a/windows/application-management/app-v/appv-install-the-reporting-server-on-a-standalone-computer.md +++ b/windows/application-management/app-v/appv-install-the-reporting-server-on-a-standalone-computer.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/18/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # How to install the reporting server on a standalone computer and connect it to the database diff --git a/windows/application-management/app-v/appv-install-the-sequencer.md b/windows/application-management/app-v/appv-install-the-sequencer.md index 6fe3e63862..93180520e7 100644 --- a/windows/application-management/app-v/appv-install-the-sequencer.md +++ b/windows/application-management/app-v/appv-install-the-sequencer.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/18/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # Install the App-V Sequencer diff --git a/windows/application-management/app-v/appv-load-the-powershell-cmdlets-and-get-cmdlet-help.md b/windows/application-management/app-v/appv-load-the-powershell-cmdlets-and-get-cmdlet-help.md index a4597fb812..bc8cd9361e 100644 --- a/windows/application-management/app-v/appv-load-the-powershell-cmdlets-and-get-cmdlet-help.md +++ b/windows/application-management/app-v/appv-load-the-powershell-cmdlets-and-get-cmdlet-help.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 09/27/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # How to load the Windows PowerShell cmdlets for App-V and get cmdlet help diff --git a/windows/application-management/app-v/appv-maintaining-appv.md b/windows/application-management/app-v/appv-maintaining-appv.md index 65f4a157a0..3b54154537 100644 --- a/windows/application-management/app-v/appv-maintaining-appv.md +++ b/windows/application-management/app-v/appv-maintaining-appv.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 09/27/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # Maintaining App-V diff --git a/windows/application-management/app-v/appv-manage-appv-packages-running-on-a-stand-alone-computer-with-powershell.md b/windows/application-management/app-v/appv-manage-appv-packages-running-on-a-stand-alone-computer-with-powershell.md index f0f0b0ad03..c7f1214405 100644 --- a/windows/application-management/app-v/appv-manage-appv-packages-running-on-a-stand-alone-computer-with-powershell.md +++ b/windows/application-management/app-v/appv-manage-appv-packages-running-on-a-stand-alone-computer-with-powershell.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 09/24/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # How to manage App-V packages running on a stand-alone computer by using Windows PowerShell diff --git a/windows/application-management/app-v/appv-manage-connection-groups-on-a-stand-alone-computer-with-powershell.md b/windows/application-management/app-v/appv-manage-connection-groups-on-a-stand-alone-computer-with-powershell.md index c3653ce3be..d4e01266f8 100644 --- a/windows/application-management/app-v/appv-manage-connection-groups-on-a-stand-alone-computer-with-powershell.md +++ b/windows/application-management/app-v/appv-manage-connection-groups-on-a-stand-alone-computer-with-powershell.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/19/2017 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp --- diff --git a/windows/application-management/app-v/appv-managing-connection-groups.md b/windows/application-management/app-v/appv-managing-connection-groups.md index 76ced5b4de..5a94cbc421 100644 --- a/windows/application-management/app-v/appv-managing-connection-groups.md +++ b/windows/application-management/app-v/appv-managing-connection-groups.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/19/2017 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp --- diff --git a/windows/application-management/app-v/appv-migrating-to-appv-from-a-previous-version.md b/windows/application-management/app-v/appv-migrating-to-appv-from-a-previous-version.md index cd519bf28a..dff030f470 100644 --- a/windows/application-management/app-v/appv-migrating-to-appv-from-a-previous-version.md +++ b/windows/application-management/app-v/appv-migrating-to-appv-from-a-previous-version.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/19/2017 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp --- diff --git a/windows/application-management/app-v/appv-modify-an-existing-virtual-application-package.md b/windows/application-management/app-v/appv-modify-an-existing-virtual-application-package.md index a783bac0cb..e2cb4eca48 100644 --- a/windows/application-management/app-v/appv-modify-an-existing-virtual-application-package.md +++ b/windows/application-management/app-v/appv-modify-an-existing-virtual-application-package.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/19/2017 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp --- diff --git a/windows/application-management/app-v/appv-modify-client-configuration-with-powershell.md b/windows/application-management/app-v/appv-modify-client-configuration-with-powershell.md index 11bcc0117b..7fe2f3896f 100644 --- a/windows/application-management/app-v/appv-modify-client-configuration-with-powershell.md +++ b/windows/application-management/app-v/appv-modify-client-configuration-with-powershell.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/19/2017 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp --- diff --git a/windows/application-management/app-v/appv-move-the-appv-server-to-another-computer.md b/windows/application-management/app-v/appv-move-the-appv-server-to-another-computer.md index de47148927..5305207fe6 100644 --- a/windows/application-management/app-v/appv-move-the-appv-server-to-another-computer.md +++ b/windows/application-management/app-v/appv-move-the-appv-server-to-another-computer.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/19/2017 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp --- diff --git a/windows/application-management/app-v/appv-operations.md b/windows/application-management/app-v/appv-operations.md index d5f38d7982..c45c9ab9cf 100644 --- a/windows/application-management/app-v/appv-operations.md +++ b/windows/application-management/app-v/appv-operations.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/18/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # Operations for App-V diff --git a/windows/application-management/app-v/appv-performance-guidance.md b/windows/application-management/app-v/appv-performance-guidance.md index 155f59650e..65ccf02292 100644 --- a/windows/application-management/app-v/appv-performance-guidance.md +++ b/windows/application-management/app-v/appv-performance-guidance.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/19/2017 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp --- diff --git a/windows/application-management/app-v/appv-planning-checklist.md b/windows/application-management/app-v/appv-planning-checklist.md index dc6488afb9..edaf668a89 100644 --- a/windows/application-management/app-v/appv-planning-checklist.md +++ b/windows/application-management/app-v/appv-planning-checklist.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/18/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # App-V Planning Checklist diff --git a/windows/application-management/app-v/appv-planning-folder-redirection-with-appv.md b/windows/application-management/app-v/appv-planning-folder-redirection-with-appv.md index 3a1d781f17..c9c570009a 100644 --- a/windows/application-management/app-v/appv-planning-folder-redirection-with-appv.md +++ b/windows/application-management/app-v/appv-planning-folder-redirection-with-appv.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/18/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # Planning to Use Folder Redirection with App-V diff --git a/windows/application-management/app-v/appv-planning-for-appv-server-deployment.md b/windows/application-management/app-v/appv-planning-for-appv-server-deployment.md index 289e32ec6f..eaf7729f22 100644 --- a/windows/application-management/app-v/appv-planning-for-appv-server-deployment.md +++ b/windows/application-management/app-v/appv-planning-for-appv-server-deployment.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/18/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # Planning for the App-V server deployment diff --git a/windows/application-management/app-v/appv-planning-for-appv.md b/windows/application-management/app-v/appv-planning-for-appv.md index 175946673a..d54d848a2c 100644 --- a/windows/application-management/app-v/appv-planning-for-appv.md +++ b/windows/application-management/app-v/appv-planning-for-appv.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/18/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # Planning for App-V diff --git a/windows/application-management/app-v/appv-planning-for-high-availability-with-appv.md b/windows/application-management/app-v/appv-planning-for-high-availability-with-appv.md index e6167f8707..af66e545e4 100644 --- a/windows/application-management/app-v/appv-planning-for-high-availability-with-appv.md +++ b/windows/application-management/app-v/appv-planning-for-high-availability-with-appv.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/18/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # Planning for high availability with App-V Server diff --git a/windows/application-management/app-v/appv-planning-for-sequencer-and-client-deployment.md b/windows/application-management/app-v/appv-planning-for-sequencer-and-client-deployment.md index adcfe14ddc..4fa3630f7f 100644 --- a/windows/application-management/app-v/appv-planning-for-sequencer-and-client-deployment.md +++ b/windows/application-management/app-v/appv-planning-for-sequencer-and-client-deployment.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/18/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # Planning for the App-V Sequencer and Client Deployment diff --git a/windows/application-management/app-v/appv-planning-for-using-appv-with-office.md b/windows/application-management/app-v/appv-planning-for-using-appv-with-office.md index ae79aea7c4..dac8271c33 100644 --- a/windows/application-management/app-v/appv-planning-for-using-appv-with-office.md +++ b/windows/application-management/app-v/appv-planning-for-using-appv-with-office.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/18/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # Planning for deploying App-V with Office diff --git a/windows/application-management/app-v/appv-planning-to-deploy-appv-with-electronic-software-distribution-solutions.md b/windows/application-management/app-v/appv-planning-to-deploy-appv-with-electronic-software-distribution-solutions.md index 4fec6e664e..7c682239c3 100644 --- a/windows/application-management/app-v/appv-planning-to-deploy-appv-with-electronic-software-distribution-solutions.md +++ b/windows/application-management/app-v/appv-planning-to-deploy-appv-with-electronic-software-distribution-solutions.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/18/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # Planning to Deploy App-V with an electronic software distribution system diff --git a/windows/application-management/app-v/appv-planning-to-deploy-appv.md b/windows/application-management/app-v/appv-planning-to-deploy-appv.md index 8b30ecd4ff..ee9e0b73a9 100644 --- a/windows/application-management/app-v/appv-planning-to-deploy-appv.md +++ b/windows/application-management/app-v/appv-planning-to-deploy-appv.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/18/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # Planning to Deploy App-V for Windows 10 diff --git a/windows/application-management/app-v/appv-preparing-your-environment.md b/windows/application-management/app-v/appv-preparing-your-environment.md index 33dcf85901..57989881e0 100644 --- a/windows/application-management/app-v/appv-preparing-your-environment.md +++ b/windows/application-management/app-v/appv-preparing-your-environment.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/18/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # Preparing your environment for App-V diff --git a/windows/application-management/app-v/appv-prerequisites.md b/windows/application-management/app-v/appv-prerequisites.md index 841c318800..bc458a3f94 100644 --- a/windows/application-management/app-v/appv-prerequisites.md +++ b/windows/application-management/app-v/appv-prerequisites.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/18/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # App-V for Windows 10 prerequisites diff --git a/windows/application-management/app-v/appv-publish-a-connection-group.md b/windows/application-management/app-v/appv-publish-a-connection-group.md index c8c8da79fa..41d35e29a0 100644 --- a/windows/application-management/app-v/appv-publish-a-connection-group.md +++ b/windows/application-management/app-v/appv-publish-a-connection-group.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 09/27/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # How to Publish a Connection Group diff --git a/windows/application-management/app-v/appv-publish-a-packages-with-the-management-console.md b/windows/application-management/app-v/appv-publish-a-packages-with-the-management-console.md index 47e033fcbe..cd4469abe5 100644 --- a/windows/application-management/app-v/appv-publish-a-packages-with-the-management-console.md +++ b/windows/application-management/app-v/appv-publish-a-packages-with-the-management-console.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 09/27/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # How to publish a package by using the Management console diff --git a/windows/application-management/app-v/appv-register-and-unregister-a-publishing-server-with-the-management-console.md b/windows/application-management/app-v/appv-register-and-unregister-a-publishing-server-with-the-management-console.md index da72c8bd99..2134edc7bb 100644 --- a/windows/application-management/app-v/appv-register-and-unregister-a-publishing-server-with-the-management-console.md +++ b/windows/application-management/app-v/appv-register-and-unregister-a-publishing-server-with-the-management-console.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/19/2017 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp --- diff --git a/windows/application-management/app-v/appv-release-notes-for-appv-for-windows-1703.md b/windows/application-management/app-v/appv-release-notes-for-appv-for-windows-1703.md index 9179e46022..dc744d16c2 100644 --- a/windows/application-management/app-v/appv-release-notes-for-appv-for-windows-1703.md +++ b/windows/application-management/app-v/appv-release-notes-for-appv-for-windows-1703.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/19/2017 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp --- diff --git a/windows/application-management/app-v/appv-release-notes-for-appv-for-windows.md b/windows/application-management/app-v/appv-release-notes-for-appv-for-windows.md index daf1783e49..bb14436095 100644 --- a/windows/application-management/app-v/appv-release-notes-for-appv-for-windows.md +++ b/windows/application-management/app-v/appv-release-notes-for-appv-for-windows.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/19/2017 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp --- # Release Notes for App-V for Windows 10, version 1607 diff --git a/windows/application-management/app-v/appv-reporting.md b/windows/application-management/app-v/appv-reporting.md index 214bb3c9bd..57a4526ecf 100644 --- a/windows/application-management/app-v/appv-reporting.md +++ b/windows/application-management/app-v/appv-reporting.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/16/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # About App-V reporting diff --git a/windows/application-management/app-v/appv-running-locally-installed-applications-inside-a-virtual-environment.md b/windows/application-management/app-v/appv-running-locally-installed-applications-inside-a-virtual-environment.md index 5582efb79c..3befc157bd 100644 --- a/windows/application-management/app-v/appv-running-locally-installed-applications-inside-a-virtual-environment.md +++ b/windows/application-management/app-v/appv-running-locally-installed-applications-inside-a-virtual-environment.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 03/08/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp --- diff --git a/windows/application-management/app-v/appv-security-considerations.md b/windows/application-management/app-v/appv-security-considerations.md index 32939d5452..ab6c1c4c32 100644 --- a/windows/application-management/app-v/appv-security-considerations.md +++ b/windows/application-management/app-v/appv-security-considerations.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/16/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # App-V security considerations diff --git a/windows/application-management/app-v/appv-sequence-a-new-application.md b/windows/application-management/app-v/appv-sequence-a-new-application.md index bdb63f9a46..c3e16261db 100644 --- a/windows/application-management/app-v/appv-sequence-a-new-application.md +++ b/windows/application-management/app-v/appv-sequence-a-new-application.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/16/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # Manually sequence a new app using the Microsoft Application Virtualization Sequencer (App-V Sequencer) diff --git a/windows/application-management/app-v/appv-sequence-a-package-with-powershell.md b/windows/application-management/app-v/appv-sequence-a-package-with-powershell.md index 1ccb908974..349ead11a5 100644 --- a/windows/application-management/app-v/appv-sequence-a-package-with-powershell.md +++ b/windows/application-management/app-v/appv-sequence-a-package-with-powershell.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/19/2017 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp --- diff --git a/windows/application-management/app-v/appv-supported-configurations.md b/windows/application-management/app-v/appv-supported-configurations.md index cdf2a4782e..2dce846fd9 100644 --- a/windows/application-management/app-v/appv-supported-configurations.md +++ b/windows/application-management/app-v/appv-supported-configurations.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/16/2018 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article --- # App-V Supported Configurations diff --git a/windows/application-management/app-v/appv-technical-reference.md b/windows/application-management/app-v/appv-technical-reference.md index 910287f6d3..e0f6e0f48d 100644 --- a/windows/application-management/app-v/appv-technical-reference.md +++ b/windows/application-management/app-v/appv-technical-reference.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/19/2017 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp --- diff --git a/windows/application-management/app-v/appv-transfer-access-and-configurations-to-another-version-of-a-package-with-the-management-console.md b/windows/application-management/app-v/appv-transfer-access-and-configurations-to-another-version-of-a-package-with-the-management-console.md index 92cd2124d8..a085b22759 100644 --- a/windows/application-management/app-v/appv-transfer-access-and-configurations-to-another-version-of-a-package-with-the-management-console.md +++ b/windows/application-management/app-v/appv-transfer-access-and-configurations-to-another-version-of-a-package-with-the-management-console.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/19/2017 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp --- diff --git a/windows/application-management/app-v/appv-troubleshooting.md b/windows/application-management/app-v/appv-troubleshooting.md index fdacc04362..fd794d1044 100644 --- a/windows/application-management/app-v/appv-troubleshooting.md +++ b/windows/application-management/app-v/appv-troubleshooting.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/19/2017 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp --- diff --git a/windows/application-management/app-v/appv-upgrading-to-app-v-for-windows-10-from-an-existing-installation.md b/windows/application-management/app-v/appv-upgrading-to-app-v-for-windows-10-from-an-existing-installation.md index 5234b80231..4aedf60d24 100644 --- a/windows/application-management/app-v/appv-upgrading-to-app-v-for-windows-10-from-an-existing-installation.md +++ b/windows/application-management/app-v/appv-upgrading-to-app-v-for-windows-10-from-an-existing-installation.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/19/2017 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp --- # Upgrading to App-V for Windows 10 from an existing installation diff --git a/windows/application-management/app-v/appv-using-the-client-management-console.md b/windows/application-management/app-v/appv-using-the-client-management-console.md index e075bff689..b6691c2fc5 100644 --- a/windows/application-management/app-v/appv-using-the-client-management-console.md +++ b/windows/application-management/app-v/appv-using-the-client-management-console.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/19/2017 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp --- diff --git a/windows/application-management/app-v/appv-view-and-configure-applications-and-default-virtual-application-extensions-with-the-management-console.md b/windows/application-management/app-v/appv-view-and-configure-applications-and-default-virtual-application-extensions-with-the-management-console.md index 2d1bb8bb98..e949a9406e 100644 --- a/windows/application-management/app-v/appv-view-and-configure-applications-and-default-virtual-application-extensions-with-the-management-console.md +++ b/windows/application-management/app-v/appv-view-and-configure-applications-and-default-virtual-application-extensions-with-the-management-console.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/19/2017 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp --- diff --git a/windows/application-management/app-v/appv-viewing-appv-server-publishing-metadata.md b/windows/application-management/app-v/appv-viewing-appv-server-publishing-metadata.md index 771291c90e..eac57684c6 100644 --- a/windows/application-management/app-v/appv-viewing-appv-server-publishing-metadata.md +++ b/windows/application-management/app-v/appv-viewing-appv-server-publishing-metadata.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/19/2017 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp --- diff --git a/windows/application-management/apps-in-windows-10.md b/windows/application-management/apps-in-windows-10.md index 5ce9e92dc8..7b5828d9c2 100644 --- a/windows/application-management/apps-in-windows-10.md +++ b/windows/application-management/apps-in-windows-10.md @@ -7,7 +7,7 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: mobile -ms.author: tracyp +ms.author: dansimp author: msfttracyp ms.localizationpriority: medium ms.topic: article diff --git a/windows/application-management/change-history-for-application-management.md b/windows/application-management/change-history-for-application-management.md index 394767a6af..b7fda33af3 100644 --- a/windows/application-management/change-history-for-application-management.md +++ b/windows/application-management/change-history-for-application-management.md @@ -8,7 +8,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: msfttracyp -ms.author: tracyp +ms.author: dansimp ms.topic: article ms.date: 10/24/2017 ms.reviewer: diff --git a/windows/application-management/deploy-app-upgrades-windows-10-mobile.md b/windows/application-management/deploy-app-upgrades-windows-10-mobile.md index d2c0c0bc21..d176e86059 100644 --- a/windows/application-management/deploy-app-upgrades-windows-10-mobile.md +++ b/windows/application-management/deploy-app-upgrades-windows-10-mobile.md @@ -5,7 +5,7 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: mobile -ms.author: tracyp +ms.author: dansimp author: msfttracyp ms.date: 07/21/2017 ms.reviewer: diff --git a/windows/application-management/enterprise-background-activity-controls.md b/windows/application-management/enterprise-background-activity-controls.md index dfb14cdb36..a9bdc7b123 100644 --- a/windows/application-management/enterprise-background-activity-controls.md +++ b/windows/application-management/enterprise-background-activity-controls.md @@ -2,7 +2,7 @@ author: msfttracyp title: Remove background task resource restrictions description: Allow enterprise background tasks unrestricted access to computer resources. -ms.author: tracyp +ms.author: dansimp ms.date: 10/03/2017 ms.reviewer: manager: dansimp diff --git a/windows/application-management/manage-windows-mixed-reality.md b/windows/application-management/manage-windows-mixed-reality.md index 56d7147923..74edf682a0 100644 --- a/windows/application-management/manage-windows-mixed-reality.md +++ b/windows/application-management/manage-windows-mixed-reality.md @@ -9,7 +9,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.localizationpriority: medium author: msfttracyp -ms.author: tracyp +ms.author: dansimp ms.topic: article --- diff --git a/windows/application-management/msix-app-packaging-tool.md b/windows/application-management/msix-app-packaging-tool.md index 1d38d2f161..adcf842841 100644 --- a/windows/application-management/msix-app-packaging-tool.md +++ b/windows/application-management/msix-app-packaging-tool.md @@ -6,7 +6,7 @@ ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library ms.localizationpriority: medium -ms.author: tracyp +ms.author: dansimp ms.topic: article ms.date: 12/03/2018 ms.reviewer: diff --git a/windows/application-management/per-user-services-in-windows.md b/windows/application-management/per-user-services-in-windows.md index 51a347d915..1100a66787 100644 --- a/windows/application-management/per-user-services-in-windows.md +++ b/windows/application-management/per-user-services-in-windows.md @@ -1,11 +1,11 @@ --- -title: Per-user services in Windows 10 and Windows Server +title: Per-user services in Windows 10 and Windows Server description: Learn about per-user services introduced in Windows 10. ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: mobile -ms.author: tracyp +ms.author: dansimp author: msfttracyp ms.date: 09/14/2017 ms.reviewer: diff --git a/windows/application-management/remove-provisioned-apps-during-update.md b/windows/application-management/remove-provisioned-apps-during-update.md index a828991d9d..27c49f97ae 100644 --- a/windows/application-management/remove-provisioned-apps-during-update.md +++ b/windows/application-management/remove-provisioned-apps-during-update.md @@ -4,7 +4,7 @@ description: How to keep provisioned apps that were removed from your machine fr ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library -ms.author: tracyp +ms.author: dansimp author: msfttracyp ms.date: 05/25/2018 ms.reviewer: diff --git a/windows/application-management/sideload-apps-in-windows-10.md b/windows/application-management/sideload-apps-in-windows-10.md index 3928061aa3..2dc4591d51 100644 --- a/windows/application-management/sideload-apps-in-windows-10.md +++ b/windows/application-management/sideload-apps-in-windows-10.md @@ -4,7 +4,7 @@ description: Sideload line-of-business apps in Windows 10. ms.assetid: C46B27D0-375B-4F7A-800E-21595CF1D53D ms.reviewer: manager: dansimp -ms.author: tracyp +ms.author: dansimp ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/application-management/svchost-service-refactoring.md b/windows/application-management/svchost-service-refactoring.md index 58e0e60b57..3bd1bf1897 100644 --- a/windows/application-management/svchost-service-refactoring.md +++ b/windows/application-management/svchost-service-refactoring.md @@ -5,7 +5,7 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: mobile -ms.author: tracyp +ms.author: dansimp author: msfttracyp ms.date: 07/20/2017 ms.reviewer: diff --git a/windows/client-management/mdm/accountmanagement-csp.md b/windows/client-management/mdm/accountmanagement-csp.md index 7dd8c78df7..294043dca3 100644 --- a/windows/client-management/mdm/accountmanagement-csp.md +++ b/windows/client-management/mdm/accountmanagement-csp.md @@ -1,7 +1,7 @@ --- title: AccountManagement CSP description: Used to configure settings in the Account Manager service -ms.author: lomayor +ms.author: dansimp ms.topic: article ms.prod: w10 ms.technology: windows diff --git a/windows/client-management/mdm/accountmanagement-ddf.md b/windows/client-management/mdm/accountmanagement-ddf.md index 1007c05b28..6f6df91fe0 100644 --- a/windows/client-management/mdm/accountmanagement-ddf.md +++ b/windows/client-management/mdm/accountmanagement-ddf.md @@ -1,7 +1,7 @@ --- title: AccountManagement DDF file description: Used to configure settings in the Account Manager service -ms.author: lomayor +ms.author: dansimp ms.topic: article ms.prod: w10 ms.technology: windows diff --git a/windows/client-management/mdm/accounts-csp.md b/windows/client-management/mdm/accounts-csp.md index 810e5c83fa..a0cc7de5dd 100644 --- a/windows/client-management/mdm/accounts-csp.md +++ b/windows/client-management/mdm/accounts-csp.md @@ -1,7 +1,7 @@ --- title: Accounts CSP description: The Accounts configuration service provider (CSP) is used by the enterprise (1) to rename a device, (2) to create a new local Windows account and joint it to a local user group. -ms.author: lomayor +ms.author: dansimp ms.topic: article ms.prod: w10 ms.technology: windows diff --git a/windows/client-management/mdm/accounts-ddf-file.md b/windows/client-management/mdm/accounts-ddf-file.md index 623ad0d420..0815b489ba 100644 --- a/windows/client-management/mdm/accounts-ddf-file.md +++ b/windows/client-management/mdm/accounts-ddf-file.md @@ -1,7 +1,7 @@ --- title: Accounts DDF file description: XML file containing the device description framework -ms.author: lomayor +ms.author: dansimp ms.topic: article ms.prod: w10 ms.technology: windows diff --git a/windows/client-management/mdm/activesync-csp.md b/windows/client-management/mdm/activesync-csp.md index 9761cd0e66..e2f9441b9c 100644 --- a/windows/client-management/mdm/activesync-csp.md +++ b/windows/client-management/mdm/activesync-csp.md @@ -4,7 +4,7 @@ description: ActiveSync CSP ms.assetid: c65093ef-bd36-4f32-9dab-edb7bcfb3188 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article ms.prod: w10 ms.technology: windows diff --git a/windows/client-management/mdm/activesync-ddf-file.md b/windows/client-management/mdm/activesync-ddf-file.md index 839dfccba1..6e4c1c5000 100644 --- a/windows/client-management/mdm/activesync-ddf-file.md +++ b/windows/client-management/mdm/activesync-ddf-file.md @@ -4,7 +4,7 @@ description: ActiveSync DDF file ms.assetid: c4cd4816-ad8f-45b2-9b81-8abb18254096 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article ms.prod: w10 ms.technology: windows diff --git a/windows/client-management/mdm/add-an-azure-ad-tenant-and-azure-ad-subscription.md b/windows/client-management/mdm/add-an-azure-ad-tenant-and-azure-ad-subscription.md index 174966d463..1eae18e33a 100644 --- a/windows/client-management/mdm/add-an-azure-ad-tenant-and-azure-ad-subscription.md +++ b/windows/client-management/mdm/add-an-azure-ad-tenant-and-azure-ad-subscription.md @@ -4,7 +4,7 @@ description: Here's a step-by-step guide to adding an Azure Active Directory ten ms.assetid: 36D94BEC-A6D8-47D2-A547-EBD7B7D163FA ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article ms.prod: w10 ms.technology: windows diff --git a/windows/client-management/mdm/alljoynmanagement-csp.md b/windows/client-management/mdm/alljoynmanagement-csp.md index 1c55f8740e..e4d45bd4fd 100644 --- a/windows/client-management/mdm/alljoynmanagement-csp.md +++ b/windows/client-management/mdm/alljoynmanagement-csp.md @@ -4,7 +4,7 @@ description: The AllJoynManagement configuration service provider (CSP) allows a ms.assetid: 468E0EE5-EED3-48FF-91C0-89F9D159AA8C ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article ms.prod: w10 ms.technology: windows diff --git a/windows/client-management/mdm/alljoynmanagement-ddf.md b/windows/client-management/mdm/alljoynmanagement-ddf.md index 07ae810983..1a79f57833 100644 --- a/windows/client-management/mdm/alljoynmanagement-ddf.md +++ b/windows/client-management/mdm/alljoynmanagement-ddf.md @@ -4,7 +4,7 @@ description: AllJoynManagement DDF ms.assetid: 540C2E60-A041-4749-A027-BBAF0BB046E4 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article ms.prod: w10 ms.technology: windows diff --git a/windows/client-management/mdm/application-csp.md b/windows/client-management/mdm/application-csp.md index 265cdca9fe..d4fe92e943 100644 --- a/windows/client-management/mdm/application-csp.md +++ b/windows/client-management/mdm/application-csp.md @@ -4,7 +4,7 @@ description: APPLICATION configuration service provider ms.assetid: 0705b5e9-a1e7-4d70-a73d-7f758ffd8099 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article ms.prod: w10 ms.technology: windows diff --git a/windows/client-management/mdm/applicationrestrictions-xsd.md b/windows/client-management/mdm/applicationrestrictions-xsd.md index fbdbc5c383..a088806e23 100644 --- a/windows/client-management/mdm/applicationrestrictions-xsd.md +++ b/windows/client-management/mdm/applicationrestrictions-xsd.md @@ -4,7 +4,7 @@ description: Here's the XSD for the ApplicationManagement/ApplicationRestriction ms.assetid: A5AA2B59-3736-473E-8F70-A90FD61EE426 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article ms.prod: w10 ms.technology: windows diff --git a/windows/client-management/mdm/applocker-csp.md b/windows/client-management/mdm/applocker-csp.md index a9b1b89487..79251bed03 100644 --- a/windows/client-management/mdm/applocker-csp.md +++ b/windows/client-management/mdm/applocker-csp.md @@ -4,7 +4,7 @@ description: AppLocker CSP ms.assetid: 32FEA2C9-3CAD-40C9-8E4F-E3C69637580F ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article ms.prod: w10 ms.technology: windows diff --git a/windows/client-management/mdm/applocker-ddf-file.md b/windows/client-management/mdm/applocker-ddf-file.md index 0a2f4eefd2..fde531cbc9 100644 --- a/windows/client-management/mdm/applocker-ddf-file.md +++ b/windows/client-management/mdm/applocker-ddf-file.md @@ -4,7 +4,7 @@ description: AppLocker DDF file ms.assetid: 79E199E0-5454-413A-A57A-B536BDA22496 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article ms.prod: w10 ms.technology: windows diff --git a/windows/client-management/mdm/applocker-xsd.md b/windows/client-management/mdm/applocker-xsd.md index d8895fa244..d07e9eea71 100644 --- a/windows/client-management/mdm/applocker-xsd.md +++ b/windows/client-management/mdm/applocker-xsd.md @@ -4,7 +4,7 @@ description: Here's the XSD for the AppLocker CSP. ms.assetid: 70CF48DD-AD7D-4BCF-854F-A41BFD95F876 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article ms.prod: w10 ms.technology: windows diff --git a/windows/client-management/mdm/appv-deploy-and-config.md b/windows/client-management/mdm/appv-deploy-and-config.md index 80079aaef9..7c1c0a5050 100644 --- a/windows/client-management/mdm/appv-deploy-and-config.md +++ b/windows/client-management/mdm/appv-deploy-and-config.md @@ -1,7 +1,7 @@ --- title: Deploy and configure App-V apps using MDM description: Deploy and configure App-V apps using MDM -ms.author: lomayor +ms.author: dansimp ms.topic: article ms.prod: w10 ms.technology: windows diff --git a/windows/client-management/mdm/assign-seats.md b/windows/client-management/mdm/assign-seats.md index a69a0c6478..7fe33916b6 100644 --- a/windows/client-management/mdm/assign-seats.md +++ b/windows/client-management/mdm/assign-seats.md @@ -4,7 +4,7 @@ description: The Assign seat operation assigns seat for a specified user in the ms.assetid: B42BF490-35C9-405C-B5D6-0D9F0E377552 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article ms.prod: w10 ms.technology: windows diff --git a/windows/client-management/mdm/assignedaccess-csp.md b/windows/client-management/mdm/assignedaccess-csp.md index d1e42bc7aa..b8eb37197c 100644 --- a/windows/client-management/mdm/assignedaccess-csp.md +++ b/windows/client-management/mdm/assignedaccess-csp.md @@ -4,7 +4,7 @@ description: The AssignedAccess configuration service provider (CSP) is used set ms.assetid: 421CC07D-6000-48D9-B6A3-C638AAF83984 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article ms.prod: w10 ms.technology: windows diff --git a/windows/client-management/mdm/assignedaccess-ddf.md b/windows/client-management/mdm/assignedaccess-ddf.md index c831222412..c4844e943d 100644 --- a/windows/client-management/mdm/assignedaccess-ddf.md +++ b/windows/client-management/mdm/assignedaccess-ddf.md @@ -4,7 +4,7 @@ description: AssignedAccess DDF ms.assetid: 224FADDB-0EFD-4E5A-AE20-1BD4ABE24306 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article ms.prod: w10 ms.technology: windows diff --git a/windows/client-management/mdm/azure-active-directory-integration-with-mdm.md b/windows/client-management/mdm/azure-active-directory-integration-with-mdm.md index 6fc893ba99..0a9fa5c02f 100644 --- a/windows/client-management/mdm/azure-active-directory-integration-with-mdm.md +++ b/windows/client-management/mdm/azure-active-directory-integration-with-mdm.md @@ -4,7 +4,7 @@ description: Azure Active Directory is the world largest enterprise cloud identi ms.assetid: D03B0765-5B5F-4C7B-9E2B-18E747D504EE ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article ms.prod: w10 ms.technology: windows diff --git a/windows/client-management/mdm/azure-ad-and-microsoft-intune-automatic-mdm-enrollment-in-the-new-portal.md b/windows/client-management/mdm/azure-ad-and-microsoft-intune-automatic-mdm-enrollment-in-the-new-portal.md index 548ad13c84..706b102207 100644 --- a/windows/client-management/mdm/azure-ad-and-microsoft-intune-automatic-mdm-enrollment-in-the-new-portal.md +++ b/windows/client-management/mdm/azure-ad-and-microsoft-intune-automatic-mdm-enrollment-in-the-new-portal.md @@ -1,7 +1,7 @@ --- title: Azure AD and Microsoft Intune - Automatic MDM enrollment in the new Portal description: Azure AD and Microsoft Intune - Automatic MDM enrollment in the new Portal -ms.author: lomayor +ms.author: dansimp ms.topic: article ms.prod: w10 ms.technology: windows diff --git a/windows/client-management/mdm/bitlocker-csp.md b/windows/client-management/mdm/bitlocker-csp.md index deb52e3e8a..5d09981ed6 100644 --- a/windows/client-management/mdm/bitlocker-csp.md +++ b/windows/client-management/mdm/bitlocker-csp.md @@ -1,7 +1,7 @@ --- title: BitLocker CSP description: BitLocker CSP -ms.author: lomayor +ms.author: dansimp ms.topic: article ms.prod: w10 ms.technology: windows diff --git a/windows/client-management/mdm/bitlocker-ddf-file.md b/windows/client-management/mdm/bitlocker-ddf-file.md index bb69c429fb..1fed0144fa 100644 --- a/windows/client-management/mdm/bitlocker-ddf-file.md +++ b/windows/client-management/mdm/bitlocker-ddf-file.md @@ -1,7 +1,7 @@ --- title: BitLocker DDF file description: BitLocker DDF file -ms.author: lomayor +ms.author: dansimp ms.topic: article ms.prod: w10 ms.technology: windows diff --git a/windows/client-management/mdm/bootstrap-csp.md b/windows/client-management/mdm/bootstrap-csp.md index 509638a1e4..1f88d3ae9f 100644 --- a/windows/client-management/mdm/bootstrap-csp.md +++ b/windows/client-management/mdm/bootstrap-csp.md @@ -4,7 +4,7 @@ description: BOOTSTRAP CSP ms.assetid: b8acbddc-347f-4543-a45b-ad2ffae3ffd0 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article ms.prod: w10 ms.technology: windows diff --git a/windows/client-management/mdm/browserfavorite-csp.md b/windows/client-management/mdm/browserfavorite-csp.md index 1d59d8ade7..9e1c5633df 100644 --- a/windows/client-management/mdm/browserfavorite-csp.md +++ b/windows/client-management/mdm/browserfavorite-csp.md @@ -4,7 +4,7 @@ description: BrowserFavorite CSP ms.assetid: 5d2351ff-2d6a-4273-9b09-224623723cbf ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article ms.prod: w10 ms.technology: windows diff --git a/windows/client-management/mdm/bulk-assign-and-reclaim-seats-from-user.md b/windows/client-management/mdm/bulk-assign-and-reclaim-seats-from-user.md index 9e077af341..d5a9dfc966 100644 --- a/windows/client-management/mdm/bulk-assign-and-reclaim-seats-from-user.md +++ b/windows/client-management/mdm/bulk-assign-and-reclaim-seats-from-user.md @@ -4,7 +4,7 @@ description: The Bulk assign and reclaim seats from users operation returns recl ms.assetid: 99E2F37D-1FF3-4511-8969-19571656780A ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article ms.prod: w10 ms.technology: windows diff --git a/windows/client-management/mdm/bulk-enrollment-using-windows-provisioning-tool.md b/windows/client-management/mdm/bulk-enrollment-using-windows-provisioning-tool.md index 955a7207d1..d17799b5a8 100644 --- a/windows/client-management/mdm/bulk-enrollment-using-windows-provisioning-tool.md +++ b/windows/client-management/mdm/bulk-enrollment-using-windows-provisioning-tool.md @@ -1,13 +1,13 @@ --- title: Bulk enrollment description: Bulk enrollment is an efficient way to set up a large number of devices to be managed by an MDM server without the need to re-image the devices. In Windows 10. -MS-HAID: -- 'p\_phdevicemgmt.bulk\_enrollment' -- 'p\_phDeviceMgmt.bulk\_enrollment\_using\_Windows\_provisioning\_tool' +MS-HAID: + - 'p\_phdevicemgmt.bulk\_enrollment' + - 'p\_phDeviceMgmt.bulk\_enrollment\_using\_Windows\_provisioning\_tool' ms.assetid: DEB98FF3-CC5C-47A1-9277-9EF939716C87 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article ms.prod: w10 ms.technology: windows diff --git a/windows/client-management/mdm/cellularsettings-csp.md b/windows/client-management/mdm/cellularsettings-csp.md index d982a50e25..edb5e3bdfa 100644 --- a/windows/client-management/mdm/cellularsettings-csp.md +++ b/windows/client-management/mdm/cellularsettings-csp.md @@ -4,7 +4,7 @@ description: CellularSettings CSP ms.assetid: ce8b6f16-37ca-4aaf-98b0-306d12e326df ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article ms.prod: w10 ms.technology: windows diff --git a/windows/client-management/mdm/certificate-authentication-device-enrollment.md b/windows/client-management/mdm/certificate-authentication-device-enrollment.md index 3e90f99dc8..042efca28b 100644 --- a/windows/client-management/mdm/certificate-authentication-device-enrollment.md +++ b/windows/client-management/mdm/certificate-authentication-device-enrollment.md @@ -4,7 +4,7 @@ description: This section provides an example of the mobile device enrollment pr ms.assetid: 57DB3C9E-E4C9-4275-AAB5-01315F9D3910 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article ms.prod: w10 ms.technology: windows diff --git a/windows/client-management/mdm/certificate-renewal-windows-mdm.md b/windows/client-management/mdm/certificate-renewal-windows-mdm.md index 162fbea922..26580c5095 100644 --- a/windows/client-management/mdm/certificate-renewal-windows-mdm.md +++ b/windows/client-management/mdm/certificate-renewal-windows-mdm.md @@ -1,13 +1,13 @@ --- title: Certificate Renewal description: The enrolled client certificate expires after a period of use. -MS-HAID: -- 'p\_phdevicemgmt.certificate\_renewal' -- 'p\_phDeviceMgmt.certificate\_renewal\_windows\_mdm' +MS-HAID: + - 'p\_phdevicemgmt.certificate\_renewal' + - 'p\_phDeviceMgmt.certificate\_renewal\_windows\_mdm' ms.assetid: F910C50C-FF67-40B0-AAB0-CA7CE02A9619 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article ms.prod: w10 ms.technology: windows diff --git a/windows/client-management/mdm/certificatestore-csp.md b/windows/client-management/mdm/certificatestore-csp.md index 276c00951a..aab7f8755b 100644 --- a/windows/client-management/mdm/certificatestore-csp.md +++ b/windows/client-management/mdm/certificatestore-csp.md @@ -4,7 +4,7 @@ description: CertificateStore CSP ms.assetid: 0fe28629-3cc3-42a0-91b3-3624c8462fd3 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article ms.prod: w10 ms.technology: windows diff --git a/windows/client-management/mdm/certificatestore-ddf-file.md b/windows/client-management/mdm/certificatestore-ddf-file.md index 248e475b20..ae68a73283 100644 --- a/windows/client-management/mdm/certificatestore-ddf-file.md +++ b/windows/client-management/mdm/certificatestore-ddf-file.md @@ -4,7 +4,7 @@ description: This topic shows the OMA DM device description framework (DDF) for ms.assetid: D9A12D4E-3122-45C3-AD12-CC4FFAEC08B8 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp ms.topic: article ms.prod: w10 ms.technology: windows diff --git a/windows/client-management/mdm/policy-csp-servicecontrolmanager.md b/windows/client-management/mdm/policy-csp-servicecontrolmanager.md index 9ce3ab68b9..15a529a427 100644 --- a/windows/client-management/mdm/policy-csp-servicecontrolmanager.md +++ b/windows/client-management/mdm/policy-csp-servicecontrolmanager.md @@ -1,7 +1,7 @@ --- title: Policy CSP - ServiceControlManager description: Policy CSP - ServiceControlManager -ms.author: Heidi.Lohr +ms.author: dansimp ms.topic: article ms.prod: w10 ms.technology: windows diff --git a/windows/client-management/mdm/policy-csp-troubleshooting.md b/windows/client-management/mdm/policy-csp-troubleshooting.md index ec68e060bc..082308817e 100644 --- a/windows/client-management/mdm/policy-csp-troubleshooting.md +++ b/windows/client-management/mdm/policy-csp-troubleshooting.md @@ -1,7 +1,7 @@ --- title: Policy CSP - Troubleshooting description: Policy CSP - Troubleshooting -ms.author: maricia +ms.author: dansimp ms.topic: article ms.prod: w10 ms.technology: windows diff --git a/windows/configuration/ue-v/uev-administering-uev-with-windows-powershell-and-wmi.md b/windows/configuration/ue-v/uev-administering-uev-with-windows-powershell-and-wmi.md index 4f1ec82a51..e6a50b2114 100644 --- a/windows/configuration/ue-v/uev-administering-uev-with-windows-powershell-and-wmi.md +++ b/windows/configuration/ue-v/uev-administering-uev-with-windows-powershell-and-wmi.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/19/2017 ms.reviewer: manager: dansimp -ms.author: trudyha +ms.author: dansimp ms.topic: article --- diff --git a/windows/configuration/ue-v/uev-administering-uev.md b/windows/configuration/ue-v/uev-administering-uev.md index c06c6a0d85..16154765ea 100644 --- a/windows/configuration/ue-v/uev-administering-uev.md +++ b/windows/configuration/ue-v/uev-administering-uev.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/19/2017 ms.reviewer: manager: dansimp -ms.author: trudyha +ms.author: dansimp ms.topic: article --- diff --git a/windows/configuration/ue-v/uev-application-template-schema-reference.md b/windows/configuration/ue-v/uev-application-template-schema-reference.md index 156e4af29b..2a219ab6bc 100644 --- a/windows/configuration/ue-v/uev-application-template-schema-reference.md +++ b/windows/configuration/ue-v/uev-application-template-schema-reference.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/19/2017 ms.reviewer: manager: dansimp -ms.author: trudyha +ms.author: dansimp ms.topic: article --- diff --git a/windows/configuration/ue-v/uev-changing-the-frequency-of-scheduled-tasks.md b/windows/configuration/ue-v/uev-changing-the-frequency-of-scheduled-tasks.md index 05d2abc519..63eb702d7d 100644 --- a/windows/configuration/ue-v/uev-changing-the-frequency-of-scheduled-tasks.md +++ b/windows/configuration/ue-v/uev-changing-the-frequency-of-scheduled-tasks.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/19/2017 ms.reviewer: manager: dansimp -ms.author: trudyha +ms.author: dansimp ms.topic: article --- diff --git a/windows/configuration/ue-v/uev-configuring-uev-with-group-policy-objects.md b/windows/configuration/ue-v/uev-configuring-uev-with-group-policy-objects.md index 913d80ac7c..fbaeb69dbf 100644 --- a/windows/configuration/ue-v/uev-configuring-uev-with-group-policy-objects.md +++ b/windows/configuration/ue-v/uev-configuring-uev-with-group-policy-objects.md @@ -9,7 +9,7 @@ ms.prod: w10 ms.date: 04/19/2017 ms.reviewer: manager: dansimp -ms.author: trudyha +ms.author: dansimp ms.topic: article --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md index 54f9081648..f7e901603e 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md @@ -8,7 +8,7 @@ ms.sitesec: library ms.pagetype: security localizationpriority: high author: brianlic-msft -ms.author: brianlic +ms.author: dansimp manager: dansimp ms.collection: M365-security-compliance ms.topic: article diff --git a/windows/security/identity-protection/access-control/access-control.md b/windows/security/identity-protection/access-control/access-control.md index 36a6c863ed..8e6cf74f38 100644 --- a/windows/security/identity-protection/access-control/access-control.md +++ b/windows/security/identity-protection/access-control/access-control.md @@ -7,7 +7,7 @@ ms.sitesec: library ms.pagetype: security audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/access-control/active-directory-accounts.md b/windows/security/identity-protection/access-control/active-directory-accounts.md index 2130ff295b..50958f0314 100644 --- a/windows/security/identity-protection/access-control/active-directory-accounts.md +++ b/windows/security/identity-protection/access-control/active-directory-accounts.md @@ -7,7 +7,7 @@ ms.sitesec: library ms.pagetype: security audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/access-control/active-directory-security-groups.md b/windows/security/identity-protection/access-control/active-directory-security-groups.md index 4981294bac..afaaca56b3 100644 --- a/windows/security/identity-protection/access-control/active-directory-security-groups.md +++ b/windows/security/identity-protection/access-control/active-directory-security-groups.md @@ -7,7 +7,7 @@ ms.sitesec: library ms.pagetype: security audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/access-control/dynamic-access-control.md b/windows/security/identity-protection/access-control/dynamic-access-control.md index 73b4f343aa..1ef5a24b40 100644 --- a/windows/security/identity-protection/access-control/dynamic-access-control.md +++ b/windows/security/identity-protection/access-control/dynamic-access-control.md @@ -7,7 +7,7 @@ ms.sitesec: library ms.pagetype: security audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/access-control/local-accounts.md b/windows/security/identity-protection/access-control/local-accounts.md index 65a665503d..33ef3a0add 100644 --- a/windows/security/identity-protection/access-control/local-accounts.md +++ b/windows/security/identity-protection/access-control/local-accounts.md @@ -7,7 +7,7 @@ ms.sitesec: library ms.pagetype: security audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/access-control/microsoft-accounts.md b/windows/security/identity-protection/access-control/microsoft-accounts.md index 0b346118ef..d1f2624bf6 100644 --- a/windows/security/identity-protection/access-control/microsoft-accounts.md +++ b/windows/security/identity-protection/access-control/microsoft-accounts.md @@ -7,7 +7,7 @@ ms.sitesec: library ms.pagetype: security audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/access-control/security-identifiers.md b/windows/security/identity-protection/access-control/security-identifiers.md index c1d0c47fdc..f8a3185eb0 100644 --- a/windows/security/identity-protection/access-control/security-identifiers.md +++ b/windows/security/identity-protection/access-control/security-identifiers.md @@ -7,7 +7,7 @@ ms.sitesec: library ms.pagetype: security audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/access-control/security-principals.md b/windows/security/identity-protection/access-control/security-principals.md index bc865d734c..111f5d902d 100644 --- a/windows/security/identity-protection/access-control/security-principals.md +++ b/windows/security/identity-protection/access-control/security-principals.md @@ -7,7 +7,7 @@ ms.sitesec: library ms.pagetype: security audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/access-control/service-accounts.md b/windows/security/identity-protection/access-control/service-accounts.md index cd289738ae..bc52668527 100644 --- a/windows/security/identity-protection/access-control/service-accounts.md +++ b/windows/security/identity-protection/access-control/service-accounts.md @@ -7,7 +7,7 @@ ms.sitesec: library ms.pagetype: security audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/access-control/special-identities.md b/windows/security/identity-protection/access-control/special-identities.md index fb7addb918..48f324427e 100644 --- a/windows/security/identity-protection/access-control/special-identities.md +++ b/windows/security/identity-protection/access-control/special-identities.md @@ -7,7 +7,7 @@ ms.sitesec: library ms.pagetype: security audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/change-history-for-access-protection.md b/windows/security/identity-protection/change-history-for-access-protection.md index 5244518021..954dd6020d 100644 --- a/windows/security/identity-protection/change-history-for-access-protection.md +++ b/windows/security/identity-protection/change-history-for-access-protection.md @@ -7,7 +7,7 @@ ms.sitesec: library ms.pagetype: security audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/configure-s-mime.md b/windows/security/identity-protection/configure-s-mime.md index daccf69649..8e823b08e6 100644 --- a/windows/security/identity-protection/configure-s-mime.md +++ b/windows/security/identity-protection/configure-s-mime.md @@ -10,7 +10,7 @@ ms.sitesec: library ms.pagetype: security audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/credential-guard/additional-mitigations.md b/windows/security/identity-protection/credential-guard/additional-mitigations.md index 870cc58a84..63a6a403c2 100644 --- a/windows/security/identity-protection/credential-guard/additional-mitigations.md +++ b/windows/security/identity-protection/credential-guard/additional-mitigations.md @@ -8,7 +8,7 @@ ms.pagetype: security ms.localizationpriority: medium audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/credential-guard/credential-guard-considerations.md b/windows/security/identity-protection/credential-guard/credential-guard-considerations.md index bb9bbc4a97..60d02adb71 100644 --- a/windows/security/identity-protection/credential-guard/credential-guard-considerations.md +++ b/windows/security/identity-protection/credential-guard/credential-guard-considerations.md @@ -8,7 +8,7 @@ ms.pagetype: security ms.localizationpriority: medium audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/credential-guard/credential-guard-how-it-works.md b/windows/security/identity-protection/credential-guard/credential-guard-how-it-works.md index 400ce3d5d2..00a4a3e6bb 100644 --- a/windows/security/identity-protection/credential-guard/credential-guard-how-it-works.md +++ b/windows/security/identity-protection/credential-guard/credential-guard-how-it-works.md @@ -1,6 +1,6 @@ --- title: How Windows Defender Credential Guard works -description: Using virtualization-based security, Windows Defender Credential Guard features a new component called the isolated LSA process, which stores and protects secrets, isolating them from the rest of the operating system, so that only privileged system software can access them. +description: Using virtualization-based security, Windows Defender Credential Guard features a new component called the isolated LSA process, which stores and protects secrets, isolating them from the rest of the operating system, so that only privileged system software can access them. ms.prod: w10 ms.mktglfcycl: explore ms.sitesec: library @@ -8,7 +8,7 @@ ms.pagetype: security ms.localizationpriority: medium audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/credential-guard/credential-guard-known-issues.md b/windows/security/identity-protection/credential-guard/credential-guard-known-issues.md index b9b11df607..e2c7665e97 100644 --- a/windows/security/identity-protection/credential-guard/credential-guard-known-issues.md +++ b/windows/security/identity-protection/credential-guard/credential-guard-known-issues.md @@ -8,7 +8,7 @@ ms.pagetype: security ms.localizationpriority: medium audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/credential-guard/credential-guard-manage.md b/windows/security/identity-protection/credential-guard/credential-guard-manage.md index a583960ecd..f8df57b56a 100644 --- a/windows/security/identity-protection/credential-guard/credential-guard-manage.md +++ b/windows/security/identity-protection/credential-guard/credential-guard-manage.md @@ -8,7 +8,7 @@ ms.pagetype: security ms.localizationpriority: medium audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/credential-guard/credential-guard-not-protected-scenarios.md b/windows/security/identity-protection/credential-guard/credential-guard-not-protected-scenarios.md index 582af34a67..b2f1d37cea 100644 --- a/windows/security/identity-protection/credential-guard/credential-guard-not-protected-scenarios.md +++ b/windows/security/identity-protection/credential-guard/credential-guard-not-protected-scenarios.md @@ -8,7 +8,7 @@ ms.pagetype: security ms.localizationpriority: medium audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/credential-guard/credential-guard-protection-limits.md b/windows/security/identity-protection/credential-guard/credential-guard-protection-limits.md index b3ceb19440..bd6b456162 100644 --- a/windows/security/identity-protection/credential-guard/credential-guard-protection-limits.md +++ b/windows/security/identity-protection/credential-guard/credential-guard-protection-limits.md @@ -8,7 +8,7 @@ ms.pagetype: security ms.localizationpriority: medium audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/credential-guard/credential-guard-requirements.md b/windows/security/identity-protection/credential-guard/credential-guard-requirements.md index 8c3d26bfae..cacd765584 100644 --- a/windows/security/identity-protection/credential-guard/credential-guard-requirements.md +++ b/windows/security/identity-protection/credential-guard/credential-guard-requirements.md @@ -8,7 +8,7 @@ ms.pagetype: security ms.localizationpriority: medium audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/credential-guard/credential-guard-scripts.md b/windows/security/identity-protection/credential-guard/credential-guard-scripts.md index dae9193c68..ae294baabb 100644 --- a/windows/security/identity-protection/credential-guard/credential-guard-scripts.md +++ b/windows/security/identity-protection/credential-guard/credential-guard-scripts.md @@ -8,7 +8,7 @@ ms.pagetype: security ms.localizationpriority: medium audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/credential-guard/credential-guard.md b/windows/security/identity-protection/credential-guard/credential-guard.md index bdcdac0346..e5422219e7 100644 --- a/windows/security/identity-protection/credential-guard/credential-guard.md +++ b/windows/security/identity-protection/credential-guard/credential-guard.md @@ -10,7 +10,7 @@ ms.pagetype: security ms.localizationpriority: medium audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/enterprise-certificate-pinning.md b/windows/security/identity-protection/enterprise-certificate-pinning.md index 6747177c1d..b45b7ac061 100644 --- a/windows/security/identity-protection/enterprise-certificate-pinning.md +++ b/windows/security/identity-protection/enterprise-certificate-pinning.md @@ -2,10 +2,10 @@ title: Enterprise Certificate Pinning ms.mktglfcycl: manage ms.sitesec: library -description: Enterprise certificate pinning is a Windows feature for remembering, or “pinning” a root, issuing certificate authority, or end entity certificate to a given domain name. +description: Enterprise certificate pinning is a Windows feature for remembering, or “pinning” a root, issuing certificate authority, or end entity certificate to a given domain name. audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/installing-digital-certificates-on-windows-10-mobile.md b/windows/security/identity-protection/installing-digital-certificates-on-windows-10-mobile.md index a181ec72c9..65e353cb81 100644 --- a/windows/security/identity-protection/installing-digital-certificates-on-windows-10-mobile.md +++ b/windows/security/identity-protection/installing-digital-certificates-on-windows-10-mobile.md @@ -10,7 +10,7 @@ ms.sitesec: library ms.pagetype: security audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/remote-credential-guard.md b/windows/security/identity-protection/remote-credential-guard.md index 121c58873e..a4029266dd 100644 --- a/windows/security/identity-protection/remote-credential-guard.md +++ b/windows/security/identity-protection/remote-credential-guard.md @@ -7,7 +7,7 @@ ms.sitesec: library ms.pagetype: security audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/smart-cards/smart-card-and-remote-desktop-services.md b/windows/security/identity-protection/smart-cards/smart-card-and-remote-desktop-services.md index 695c7d15b9..5e5003aa9f 100644 --- a/windows/security/identity-protection/smart-cards/smart-card-and-remote-desktop-services.md +++ b/windows/security/identity-protection/smart-cards/smart-card-and-remote-desktop-services.md @@ -7,7 +7,7 @@ ms.sitesec: library ms.pagetype: security audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/smart-cards/smart-card-architecture.md b/windows/security/identity-protection/smart-cards/smart-card-architecture.md index 33bbc7b730..89ddb7fa8a 100644 --- a/windows/security/identity-protection/smart-cards/smart-card-architecture.md +++ b/windows/security/identity-protection/smart-cards/smart-card-architecture.md @@ -7,7 +7,7 @@ ms.sitesec: library ms.pagetype: security audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/smart-cards/smart-card-certificate-propagation-service.md b/windows/security/identity-protection/smart-cards/smart-card-certificate-propagation-service.md index 2bf4650d4b..997384b9e0 100644 --- a/windows/security/identity-protection/smart-cards/smart-card-certificate-propagation-service.md +++ b/windows/security/identity-protection/smart-cards/smart-card-certificate-propagation-service.md @@ -7,7 +7,7 @@ ms.sitesec: library ms.pagetype: security audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/smart-cards/smart-card-certificate-requirements-and-enumeration.md b/windows/security/identity-protection/smart-cards/smart-card-certificate-requirements-and-enumeration.md index cd06dda9a5..a408a47cf2 100644 --- a/windows/security/identity-protection/smart-cards/smart-card-certificate-requirements-and-enumeration.md +++ b/windows/security/identity-protection/smart-cards/smart-card-certificate-requirements-and-enumeration.md @@ -7,7 +7,7 @@ ms.sitesec: library ms.pagetype: security audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/smart-cards/smart-card-debugging-information.md b/windows/security/identity-protection/smart-cards/smart-card-debugging-information.md index 9013c10df6..9ee26abcab 100644 --- a/windows/security/identity-protection/smart-cards/smart-card-debugging-information.md +++ b/windows/security/identity-protection/smart-cards/smart-card-debugging-information.md @@ -7,7 +7,7 @@ ms.sitesec: library ms.pagetype: security audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/smart-cards/smart-card-events.md b/windows/security/identity-protection/smart-cards/smart-card-events.md index cb5e74736a..830bfcfcfc 100644 --- a/windows/security/identity-protection/smart-cards/smart-card-events.md +++ b/windows/security/identity-protection/smart-cards/smart-card-events.md @@ -7,7 +7,7 @@ ms.sitesec: library ms.pagetype: security audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/smart-cards/smart-card-group-policy-and-registry-settings.md b/windows/security/identity-protection/smart-cards/smart-card-group-policy-and-registry-settings.md index dd70a1c7c6..992e66a6c7 100644 --- a/windows/security/identity-protection/smart-cards/smart-card-group-policy-and-registry-settings.md +++ b/windows/security/identity-protection/smart-cards/smart-card-group-policy-and-registry-settings.md @@ -7,7 +7,7 @@ ms.sitesec: library ms.pagetype: security audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/smart-cards/smart-card-how-smart-card-sign-in-works-in-windows.md b/windows/security/identity-protection/smart-cards/smart-card-how-smart-card-sign-in-works-in-windows.md index 08f350db77..56228dff85 100644 --- a/windows/security/identity-protection/smart-cards/smart-card-how-smart-card-sign-in-works-in-windows.md +++ b/windows/security/identity-protection/smart-cards/smart-card-how-smart-card-sign-in-works-in-windows.md @@ -7,7 +7,7 @@ ms.sitesec: library ms.pagetype: security audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/smart-cards/smart-card-removal-policy-service.md b/windows/security/identity-protection/smart-cards/smart-card-removal-policy-service.md index 6f0f59e3d1..dd8812970c 100644 --- a/windows/security/identity-protection/smart-cards/smart-card-removal-policy-service.md +++ b/windows/security/identity-protection/smart-cards/smart-card-removal-policy-service.md @@ -7,7 +7,7 @@ ms.sitesec: library ms.pagetype: security audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/smart-cards/smart-card-smart-cards-for-windows-service.md b/windows/security/identity-protection/smart-cards/smart-card-smart-cards-for-windows-service.md index da07ec19a4..a913f4c769 100644 --- a/windows/security/identity-protection/smart-cards/smart-card-smart-cards-for-windows-service.md +++ b/windows/security/identity-protection/smart-cards/smart-card-smart-cards-for-windows-service.md @@ -7,7 +7,7 @@ ms.sitesec: library ms.pagetype: security audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/smart-cards/smart-card-tools-and-settings.md b/windows/security/identity-protection/smart-cards/smart-card-tools-and-settings.md index 63d129266c..794b8e096c 100644 --- a/windows/security/identity-protection/smart-cards/smart-card-tools-and-settings.md +++ b/windows/security/identity-protection/smart-cards/smart-card-tools-and-settings.md @@ -7,7 +7,7 @@ ms.sitesec: library ms.pagetype: security audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/smart-cards/smart-card-windows-smart-card-technical-reference.md b/windows/security/identity-protection/smart-cards/smart-card-windows-smart-card-technical-reference.md index 747e68618a..03d90751c8 100644 --- a/windows/security/identity-protection/smart-cards/smart-card-windows-smart-card-technical-reference.md +++ b/windows/security/identity-protection/smart-cards/smart-card-windows-smart-card-technical-reference.md @@ -7,7 +7,7 @@ ms.sitesec: library ms.pagetype: security audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/user-account-control/how-user-account-control-works.md b/windows/security/identity-protection/user-account-control/how-user-account-control-works.md index 32d9213cda..4a92507705 100644 --- a/windows/security/identity-protection/user-account-control/how-user-account-control-works.md +++ b/windows/security/identity-protection/user-account-control/how-user-account-control-works.md @@ -9,7 +9,7 @@ ms.sitesec: library ms.pagetype: security audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/user-account-control/user-account-control-group-policy-and-registry-key-settings.md b/windows/security/identity-protection/user-account-control/user-account-control-group-policy-and-registry-key-settings.md index 35ae0d0d3d..e8d50dc97f 100644 --- a/windows/security/identity-protection/user-account-control/user-account-control-group-policy-and-registry-key-settings.md +++ b/windows/security/identity-protection/user-account-control/user-account-control-group-policy-and-registry-key-settings.md @@ -7,7 +7,7 @@ ms.sitesec: library ms.pagetype: security audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/user-account-control/user-account-control-overview.md b/windows/security/identity-protection/user-account-control/user-account-control-overview.md index ad92df7445..15ea04101f 100644 --- a/windows/security/identity-protection/user-account-control/user-account-control-overview.md +++ b/windows/security/identity-protection/user-account-control/user-account-control-overview.md @@ -10,7 +10,7 @@ ms.pagetype: security ms.localizationpriority: medium audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/user-account-control/user-account-control-security-policy-settings.md b/windows/security/identity-protection/user-account-control/user-account-control-security-policy-settings.md index a6bec76e99..e6ee5742aa 100644 --- a/windows/security/identity-protection/user-account-control/user-account-control-security-policy-settings.md +++ b/windows/security/identity-protection/user-account-control/user-account-control-security-policy-settings.md @@ -9,7 +9,7 @@ ms.sitesec: library ms.pagetype: security audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-deploy-virtual-smart-cards.md b/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-deploy-virtual-smart-cards.md index 34667eb1f8..5e643f7d75 100644 --- a/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-deploy-virtual-smart-cards.md +++ b/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-deploy-virtual-smart-cards.md @@ -7,7 +7,7 @@ ms.sitesec: library ms.pagetype: security audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-evaluate-security.md b/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-evaluate-security.md index d7653b982e..f0b0220678 100644 --- a/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-evaluate-security.md +++ b/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-evaluate-security.md @@ -7,7 +7,7 @@ ms.sitesec: library ms.pagetype: security audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-get-started.md b/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-get-started.md index fd93a5fd19..34daf7a11e 100644 --- a/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-get-started.md +++ b/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-get-started.md @@ -7,7 +7,7 @@ ms.sitesec: library ms.pagetype: security audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-overview.md b/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-overview.md index 93cca16a92..8d19264cfa 100644 --- a/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-overview.md +++ b/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-overview.md @@ -7,7 +7,7 @@ ms.sitesec: library ms.pagetype: security audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: conceptual diff --git a/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-tpmvscmgr.md b/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-tpmvscmgr.md index f2ce999ee5..cb25136eb0 100644 --- a/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-tpmvscmgr.md +++ b/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-tpmvscmgr.md @@ -7,7 +7,7 @@ ms.sitesec: library ms.pagetype: security audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-understanding-and-evaluating.md b/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-understanding-and-evaluating.md index 42f77aef08..aab4745ee9 100644 --- a/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-understanding-and-evaluating.md +++ b/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-understanding-and-evaluating.md @@ -7,7 +7,7 @@ ms.sitesec: library ms.pagetype: security audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards.md b/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards.md index bdf8fb184c..db7f20bb3e 100644 --- a/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards.md +++ b/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards.md @@ -7,7 +7,7 @@ ms.sitesec: library ms.pagetype: security audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/identity-protection/vpn/how-to-configure-diffie-hellman-protocol-over-ikev2-vpn-connections.md b/windows/security/identity-protection/vpn/how-to-configure-diffie-hellman-protocol-over-ikev2-vpn-connections.md index 73746dfff2..22355b9383 100644 --- a/windows/security/identity-protection/vpn/how-to-configure-diffie-hellman-protocol-over-ikev2-vpn-connections.md +++ b/windows/security/identity-protection/vpn/how-to-configure-diffie-hellman-protocol-over-ikev2-vpn-connections.md @@ -6,7 +6,7 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, networking author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp ms.localizationpriority: medium ms.date: 02/08/2018 ms.reviewer: diff --git a/windows/security/identity-protection/vpn/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections.md b/windows/security/identity-protection/vpn/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections.md index 7b32119ae3..a162e20e45 100644 --- a/windows/security/identity-protection/vpn/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections.md +++ b/windows/security/identity-protection/vpn/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections.md @@ -9,7 +9,7 @@ author: dulcemontemayor ms.date: 04/19/2017 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp --- # How to use single sign on (SSO) over VPN and Wi-Fi connections diff --git a/windows/security/identity-protection/vpn/vpn-authentication.md b/windows/security/identity-protection/vpn/vpn-authentication.md index 7bb106781a..9f6f6fa2a5 100644 --- a/windows/security/identity-protection/vpn/vpn-authentication.md +++ b/windows/security/identity-protection/vpn/vpn-authentication.md @@ -10,7 +10,7 @@ ms.localizationpriority: medium ms.date: 07/27/2017 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp --- # VPN authentication options diff --git a/windows/security/identity-protection/vpn/vpn-auto-trigger-profile.md b/windows/security/identity-protection/vpn/vpn-auto-trigger-profile.md index 3038aa0e34..09ca26d20e 100644 --- a/windows/security/identity-protection/vpn/vpn-auto-trigger-profile.md +++ b/windows/security/identity-protection/vpn/vpn-auto-trigger-profile.md @@ -10,7 +10,7 @@ ms.localizationpriority: medium ms.date: 07/27/2017 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp --- # VPN auto-triggered profile options diff --git a/windows/security/identity-protection/vpn/vpn-conditional-access.md b/windows/security/identity-protection/vpn/vpn-conditional-access.md index 4e6d182cfc..674df551a5 100644 --- a/windows/security/identity-protection/vpn/vpn-conditional-access.md +++ b/windows/security/identity-protection/vpn/vpn-conditional-access.md @@ -1,12 +1,12 @@ --- title: VPN and conditional access (Windows 10) -description: The VPN client is now able to integrate with the cloud-based Conditional Access Platform to provide a device compliance option for remote clients. Conditional Access is a policy-based evaluation engine that lets you create access rules for any Azure Active Directory (Azure AD) connected application. +description: The VPN client is now able to integrate with the cloud-based Conditional Access Platform to provide a device compliance option for remote clients. Conditional Access is a policy-based evaluation engine that lets you create access rules for any Azure Active Directory (Azure AD) connected application. ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, networking author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.reviewer: ms.localizationpriority: medium diff --git a/windows/security/identity-protection/vpn/vpn-connection-type.md b/windows/security/identity-protection/vpn/vpn-connection-type.md index cb033205df..b6fab222d1 100644 --- a/windows/security/identity-protection/vpn/vpn-connection-type.md +++ b/windows/security/identity-protection/vpn/vpn-connection-type.md @@ -10,7 +10,7 @@ ms.localizationpriority: medium ms.date: 07/27/2017 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp --- # VPN connection types diff --git a/windows/security/identity-protection/vpn/vpn-guide.md b/windows/security/identity-protection/vpn/vpn-guide.md index d5c7cfca83..c72139b6db 100644 --- a/windows/security/identity-protection/vpn/vpn-guide.md +++ b/windows/security/identity-protection/vpn/vpn-guide.md @@ -9,7 +9,7 @@ ms.localizationpriority: medium ms.date: 07/27/2017 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp --- # Windows 10 VPN technical guide diff --git a/windows/security/identity-protection/vpn/vpn-name-resolution.md b/windows/security/identity-protection/vpn/vpn-name-resolution.md index e4f509397e..5c277ef964 100644 --- a/windows/security/identity-protection/vpn/vpn-name-resolution.md +++ b/windows/security/identity-protection/vpn/vpn-name-resolution.md @@ -10,7 +10,7 @@ ms.localizationpriority: medium ms.date: 07/27/2017 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp --- # VPN name resolution diff --git a/windows/security/identity-protection/vpn/vpn-profile-options.md b/windows/security/identity-protection/vpn/vpn-profile-options.md index aed7e145ac..6931c47d7b 100644 --- a/windows/security/identity-protection/vpn/vpn-profile-options.md +++ b/windows/security/identity-protection/vpn/vpn-profile-options.md @@ -9,7 +9,7 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, networking author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp ms.localizationpriority: medium ms.date: 05/17/2018 --- diff --git a/windows/security/identity-protection/vpn/vpn-routing.md b/windows/security/identity-protection/vpn/vpn-routing.md index e9652fe89a..c8ce525e53 100644 --- a/windows/security/identity-protection/vpn/vpn-routing.md +++ b/windows/security/identity-protection/vpn/vpn-routing.md @@ -10,7 +10,7 @@ ms.localizationpriority: medium ms.date: 07/27/2017 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp --- # VPN routing decisions diff --git a/windows/security/identity-protection/vpn/vpn-security-features.md b/windows/security/identity-protection/vpn/vpn-security-features.md index 250ee154a5..18e7b41ec9 100644 --- a/windows/security/identity-protection/vpn/vpn-security-features.md +++ b/windows/security/identity-protection/vpn/vpn-security-features.md @@ -10,7 +10,7 @@ ms.localizationpriority: medium ms.date: 07/27/2017 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp --- # VPN security features diff --git a/windows/security/identity-protection/windows-credential-theft-mitigation-guide-abstract.md b/windows/security/identity-protection/windows-credential-theft-mitigation-guide-abstract.md index 701083c55c..26db02bc64 100644 --- a/windows/security/identity-protection/windows-credential-theft-mitigation-guide-abstract.md +++ b/windows/security/identity-protection/windows-credential-theft-mitigation-guide-abstract.md @@ -9,7 +9,7 @@ ms.sitesec: library ms.pagetype: security audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/information-protection/bitlocker/bcd-settings-and-bitlocker.md b/windows/security/information-protection/bitlocker/bcd-settings-and-bitlocker.md index d08c6e889a..c1b6366ec7 100644 --- a/windows/security/information-protection/bitlocker/bcd-settings-and-bitlocker.md +++ b/windows/security/information-protection/bitlocker/bcd-settings-and-bitlocker.md @@ -9,7 +9,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/bitlocker/bitlocker-and-adds-faq.md b/windows/security/information-protection/bitlocker/bitlocker-and-adds-faq.md index 144180cd40..7bb74bdb71 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-and-adds-faq.md +++ b/windows/security/information-protection/bitlocker/bitlocker-and-adds-faq.md @@ -9,7 +9,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/bitlocker/bitlocker-basic-deployment.md b/windows/security/information-protection/bitlocker/bitlocker-basic-deployment.md index acd70ac9ea..10924772a5 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-basic-deployment.md +++ b/windows/security/information-protection/bitlocker/bitlocker-basic-deployment.md @@ -9,7 +9,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/bitlocker/bitlocker-countermeasures.md b/windows/security/information-protection/bitlocker/bitlocker-countermeasures.md index 2a85725c2c..0177ea0901 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-countermeasures.md +++ b/windows/security/information-protection/bitlocker/bitlocker-countermeasures.md @@ -9,7 +9,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/bitlocker/bitlocker-deployment-and-administration-faq.md b/windows/security/information-protection/bitlocker/bitlocker-deployment-and-administration-faq.md index 5431485c7f..78092912cd 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-deployment-and-administration-faq.md +++ b/windows/security/information-protection/bitlocker/bitlocker-deployment-and-administration-faq.md @@ -9,7 +9,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10.md b/windows/security/information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10.md index 8c9c724383..b9b8646bf0 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10.md +++ b/windows/security/information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10.md @@ -7,7 +7,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/bitlocker/bitlocker-frequently-asked-questions.md b/windows/security/information-protection/bitlocker/bitlocker-frequently-asked-questions.md index 26bf69d169..fce071badf 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-frequently-asked-questions.md +++ b/windows/security/information-protection/bitlocker/bitlocker-frequently-asked-questions.md @@ -9,7 +9,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings.md b/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings.md index e3226ec136..38e7cefb70 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings.md +++ b/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings.md @@ -9,7 +9,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/bitlocker/bitlocker-how-to-deploy-on-windows-server.md b/windows/security/information-protection/bitlocker/bitlocker-how-to-deploy-on-windows-server.md index f8d1a6e1f9..3a17290bcd 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-how-to-deploy-on-windows-server.md +++ b/windows/security/information-protection/bitlocker/bitlocker-how-to-deploy-on-windows-server.md @@ -9,7 +9,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md b/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md index 49b3e4f60f..23276f3144 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md +++ b/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md @@ -9,7 +9,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/bitlocker/bitlocker-key-management-faq.md b/windows/security/information-protection/bitlocker/bitlocker-key-management-faq.md index fa1f49ee5d..6aa957697c 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-key-management-faq.md +++ b/windows/security/information-protection/bitlocker/bitlocker-key-management-faq.md @@ -9,7 +9,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/bitlocker/bitlocker-management-for-enterprises.md b/windows/security/information-protection/bitlocker/bitlocker-management-for-enterprises.md index e6b90ed8bc..caee851596 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-management-for-enterprises.md +++ b/windows/security/information-protection/bitlocker/bitlocker-management-for-enterprises.md @@ -7,12 +7,12 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual -ms.date: 02/28/2019 +ms.date: 02/28/2019 ms.reviewer: --- diff --git a/windows/security/information-protection/bitlocker/bitlocker-network-unlock-faq.md b/windows/security/information-protection/bitlocker/bitlocker-network-unlock-faq.md index 0405362524..79f29f59ec 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-network-unlock-faq.md +++ b/windows/security/information-protection/bitlocker/bitlocker-network-unlock-faq.md @@ -7,7 +7,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/bitlocker/bitlocker-overview-and-requirements-faq.md b/windows/security/information-protection/bitlocker/bitlocker-overview-and-requirements-faq.md index a6622c810c..000e35587d 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-overview-and-requirements-faq.md +++ b/windows/security/information-protection/bitlocker/bitlocker-overview-and-requirements-faq.md @@ -9,7 +9,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/bitlocker/bitlocker-overview.md b/windows/security/information-protection/bitlocker/bitlocker-overview.md index d15b81c76a..0707268a3a 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-overview.md +++ b/windows/security/information-protection/bitlocker/bitlocker-overview.md @@ -3,7 +3,7 @@ title: BitLocker (Windows 10) description: This topic provides a high-level overview of BitLocker, including a list of system requirements, practical applications, and deprecated features. ms.assetid: 40526fcc-3e0d-4d75-90e0-c7d0615f33b2 ms.reviewer: -ms.author: dolmont +ms.author: dansimp ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/information-protection/bitlocker/bitlocker-recovery-guide-plan.md b/windows/security/information-protection/bitlocker/bitlocker-recovery-guide-plan.md index bde16da8e3..16272b6213 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-recovery-guide-plan.md +++ b/windows/security/information-protection/bitlocker/bitlocker-recovery-guide-plan.md @@ -9,7 +9,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/bitlocker/bitlocker-security-faq.md b/windows/security/information-protection/bitlocker/bitlocker-security-faq.md index a12e4c3b02..6bb6a48e28 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-security-faq.md +++ b/windows/security/information-protection/bitlocker/bitlocker-security-faq.md @@ -9,12 +9,12 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual -ms.date: 02/28/2019 +ms.date: 02/28/2019 --- # BitLocker Security FAQ diff --git a/windows/security/information-protection/bitlocker/bitlocker-to-go-faq.md b/windows/security/information-protection/bitlocker/bitlocker-to-go-faq.md index 347a0003b8..f5de0c1816 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-to-go-faq.md +++ b/windows/security/information-protection/bitlocker/bitlocker-to-go-faq.md @@ -3,7 +3,7 @@ title: BitLocker To Go FAQ (Windows 10) description: This topic for the IT professional answers frequently asked questions concerning the requirements to use, upgrade, deploy and administer, and key management policies for BitLocker. ms.assetid: c40f87ac-17d3-47b2-afc6-6c641f72ecee ms.reviewer: -ms.author: dolmont +ms.author: dansimp ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/information-protection/bitlocker/bitlocker-upgrading-faq.md b/windows/security/information-protection/bitlocker/bitlocker-upgrading-faq.md index de4112e3d5..3ec8b9d7db 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-upgrading-faq.md +++ b/windows/security/information-protection/bitlocker/bitlocker-upgrading-faq.md @@ -7,7 +7,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/bitlocker/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md b/windows/security/information-protection/bitlocker/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md index 20ab73acfb..bb6cc83966 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md +++ b/windows/security/information-protection/bitlocker/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md @@ -9,12 +9,12 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual -ms.date: 02/28/2019 +ms.date: 02/28/2019 --- # BitLocker: Use BitLocker Drive Encryption Tools to manage BitLocker diff --git a/windows/security/information-protection/bitlocker/bitlocker-use-bitlocker-recovery-password-viewer.md b/windows/security/information-protection/bitlocker/bitlocker-use-bitlocker-recovery-password-viewer.md index 0e544985b8..56534228b9 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-use-bitlocker-recovery-password-viewer.md +++ b/windows/security/information-protection/bitlocker/bitlocker-use-bitlocker-recovery-password-viewer.md @@ -9,12 +9,12 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual -ms.date: 02/28/2019 +ms.date: 02/28/2019 --- # BitLocker: Use BitLocker Recovery Password Viewer diff --git a/windows/security/information-protection/bitlocker/bitlocker-using-with-other-programs-faq.md b/windows/security/information-protection/bitlocker/bitlocker-using-with-other-programs-faq.md index 8c25c57e76..a093ef4773 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-using-with-other-programs-faq.md +++ b/windows/security/information-protection/bitlocker/bitlocker-using-with-other-programs-faq.md @@ -9,7 +9,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md b/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md index 2f53662c16..1105a1bf99 100644 --- a/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md +++ b/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md @@ -9,7 +9,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md b/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md index 01c9fe213f..c0e83393a2 100644 --- a/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md +++ b/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md @@ -9,7 +9,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/encrypted-hard-drive.md b/windows/security/information-protection/encrypted-hard-drive.md index cf637532f1..d9b80efe97 100644 --- a/windows/security/information-protection/encrypted-hard-drive.md +++ b/windows/security/information-protection/encrypted-hard-drive.md @@ -4,7 +4,7 @@ description: Encrypted Hard Drive uses the rapid encryption that is provided by ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/information-protection/kernel-dma-protection-for-thunderbolt.md b/windows/security/information-protection/kernel-dma-protection-for-thunderbolt.md index f49a974ddd..527daea7c6 100644 --- a/windows/security/information-protection/kernel-dma-protection-for-thunderbolt.md +++ b/windows/security/information-protection/kernel-dma-protection-for-thunderbolt.md @@ -6,7 +6,7 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/secure-the-windows-10-boot-process.md b/windows/security/information-protection/secure-the-windows-10-boot-process.md index 72cb85f143..73692e6065 100644 --- a/windows/security/information-protection/secure-the-windows-10-boot-process.md +++ b/windows/security/information-protection/secure-the-windows-10-boot-process.md @@ -14,7 +14,7 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 11/16/2018 ms.reviewer: -ms.author: dolmont +ms.author: dansimp --- # Secure the Windows 10 boot process diff --git a/windows/security/information-protection/tpm/backup-tpm-recovery-information-to-ad-ds.md b/windows/security/information-protection/tpm/backup-tpm-recovery-information-to-ad-ds.md index 090906ffce..3e3fdfd9b5 100644 --- a/windows/security/information-protection/tpm/backup-tpm-recovery-information-to-ad-ds.md +++ b/windows/security/information-protection/tpm/backup-tpm-recovery-information-to-ad-ds.md @@ -8,7 +8,7 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/tpm/change-the-tpm-owner-password.md b/windows/security/information-protection/tpm/change-the-tpm-owner-password.md index 39e3573cd8..1cb7f1c281 100644 --- a/windows/security/information-protection/tpm/change-the-tpm-owner-password.md +++ b/windows/security/information-protection/tpm/change-the-tpm-owner-password.md @@ -8,7 +8,7 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/tpm/how-windows-uses-the-tpm.md b/windows/security/information-protection/tpm/how-windows-uses-the-tpm.md index fbb2f028fd..c802bfae51 100644 --- a/windows/security/information-protection/tpm/how-windows-uses-the-tpm.md +++ b/windows/security/information-protection/tpm/how-windows-uses-the-tpm.md @@ -9,7 +9,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/tpm/initialize-and-configure-ownership-of-the-tpm.md b/windows/security/information-protection/tpm/initialize-and-configure-ownership-of-the-tpm.md index 8e25014ef9..cf6d045df3 100644 --- a/windows/security/information-protection/tpm/initialize-and-configure-ownership-of-the-tpm.md +++ b/windows/security/information-protection/tpm/initialize-and-configure-ownership-of-the-tpm.md @@ -8,7 +8,7 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/tpm/manage-tpm-commands.md b/windows/security/information-protection/tpm/manage-tpm-commands.md index 5a388b1fc3..bd30e9b8f2 100644 --- a/windows/security/information-protection/tpm/manage-tpm-commands.md +++ b/windows/security/information-protection/tpm/manage-tpm-commands.md @@ -3,7 +3,7 @@ title: Manage TPM commands (Windows 10) description: This topic for the IT professional describes how to manage which Trusted Platform Module (TPM) commands are available to domain users and to local users. ms.assetid: a78e751a-2806-43ae-9c20-2e7ca466b765 ms.reviewer: -ms.author: dolmont +ms.author: dansimp ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/information-protection/tpm/manage-tpm-lockout.md b/windows/security/information-protection/tpm/manage-tpm-lockout.md index 05dbc34f16..37f9839c3e 100644 --- a/windows/security/information-protection/tpm/manage-tpm-lockout.md +++ b/windows/security/information-protection/tpm/manage-tpm-lockout.md @@ -3,7 +3,7 @@ title: Manage TPM lockout (Windows 10) description: This topic for the IT professional describes how to manage the lockout feature for the Trusted Platform Module (TPM) in Windows. ms.assetid: bf27adbe-404c-4691-a644-29ec722a3f7b ms.reviewer: -ms.author: dolmont +ms.author: dansimp ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/information-protection/tpm/switch-pcr-banks-on-tpm-2-0-devices.md b/windows/security/information-protection/tpm/switch-pcr-banks-on-tpm-2-0-devices.md index 7f618aa9ba..d9e1befbcd 100644 --- a/windows/security/information-protection/tpm/switch-pcr-banks-on-tpm-2-0-devices.md +++ b/windows/security/information-protection/tpm/switch-pcr-banks-on-tpm-2-0-devices.md @@ -1,6 +1,6 @@ --- title: Understanding PCR banks on TPM 2.0 devices (Windows 10) -description: This topic for the IT professional provides background about what happens when you switch PCR banks on TPM 2.0 devices. +description: This topic for the IT professional provides background about what happens when you switch PCR banks on TPM 2.0 devices. ms.assetid: 743FCCCB-99A9-4636-8F48-9ECB3A3D10DE ms.reviewer: ms.prod: w10 @@ -8,7 +8,7 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/tpm/tpm-fundamentals.md b/windows/security/information-protection/tpm/tpm-fundamentals.md index 3d930a2334..8f99d1e45e 100644 --- a/windows/security/information-protection/tpm/tpm-fundamentals.md +++ b/windows/security/information-protection/tpm/tpm-fundamentals.md @@ -8,7 +8,7 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/tpm/tpm-recommendations.md b/windows/security/information-protection/tpm/tpm-recommendations.md index 5da4caee6b..bd96309c30 100644 --- a/windows/security/information-protection/tpm/tpm-recommendations.md +++ b/windows/security/information-protection/tpm/tpm-recommendations.md @@ -9,7 +9,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/tpm/trusted-platform-module-overview.md b/windows/security/information-protection/tpm/trusted-platform-module-overview.md index e62328236e..a6c748fa89 100644 --- a/windows/security/information-protection/tpm/trusted-platform-module-overview.md +++ b/windows/security/information-protection/tpm/trusted-platform-module-overview.md @@ -9,7 +9,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/tpm/trusted-platform-module-services-group-policy-settings.md b/windows/security/information-protection/tpm/trusted-platform-module-services-group-policy-settings.md index 1fc294342f..f8b477aa62 100644 --- a/windows/security/information-protection/tpm/trusted-platform-module-services-group-policy-settings.md +++ b/windows/security/information-protection/tpm/trusted-platform-module-services-group-policy-settings.md @@ -8,7 +8,7 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/tpm/trusted-platform-module-top-node.md b/windows/security/information-protection/tpm/trusted-platform-module-top-node.md index 3558bdf368..45c32cd7da 100644 --- a/windows/security/information-protection/tpm/trusted-platform-module-top-node.md +++ b/windows/security/information-protection/tpm/trusted-platform-module-top-node.md @@ -7,7 +7,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/windows-information-protection/app-behavior-with-wip.md b/windows/security/information-protection/windows-information-protection/app-behavior-with-wip.md index f8bb770494..cbb074f9fa 100644 --- a/windows/security/information-protection/windows-information-protection/app-behavior-with-wip.md +++ b/windows/security/information-protection/windows-information-protection/app-behavior-with-wip.md @@ -9,7 +9,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/windows-information-protection/collect-wip-audit-event-logs.md b/windows/security/information-protection/windows-information-protection/collect-wip-audit-event-logs.md index f38a7aa7c0..0d7d91e071 100644 --- a/windows/security/information-protection/windows-information-protection/collect-wip-audit-event-logs.md +++ b/windows/security/information-protection/windows-information-protection/collect-wip-audit-event-logs.md @@ -7,7 +7,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate.md b/windows/security/information-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate.md index 704773750d..f6d1a67328 100644 --- a/windows/security/information-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate.md +++ b/windows/security/information-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate.md @@ -8,7 +8,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune-azure.md b/windows/security/information-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune-azure.md index aeca37426f..8c73819a8e 100644 --- a/windows/security/information-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune-azure.md +++ b/windows/security/information-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune-azure.md @@ -8,7 +8,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md index 85c7bfae87..d6f39a9895 100644 --- a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md +++ b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md @@ -6,7 +6,7 @@ ms.mktglfcycl: explore ms.sitesec: library ms.pagetype: security author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-sccm.md b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-sccm.md index bd212a95e3..61ce1a5f3b 100644 --- a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-sccm.md +++ b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-sccm.md @@ -10,7 +10,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/windows-information-protection/deploy-wip-policy-using-intune-azure.md b/windows/security/information-protection/windows-information-protection/deploy-wip-policy-using-intune-azure.md index cb68d68e93..42caa212cd 100644 --- a/windows/security/information-protection/windows-information-protection/deploy-wip-policy-using-intune-azure.md +++ b/windows/security/information-protection/windows-information-protection/deploy-wip-policy-using-intune-azure.md @@ -8,7 +8,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/windows-information-protection/enlightened-microsoft-apps-and-wip.md b/windows/security/information-protection/windows-information-protection/enlightened-microsoft-apps-and-wip.md index 5ee54b85a9..efa7724d1d 100644 --- a/windows/security/information-protection/windows-information-protection/enlightened-microsoft-apps-and-wip.md +++ b/windows/security/information-protection/windows-information-protection/enlightened-microsoft-apps-and-wip.md @@ -10,7 +10,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/windows-information-protection/guidance-and-best-practices-wip.md b/windows/security/information-protection/windows-information-protection/guidance-and-best-practices-wip.md index 78620f0447..f9e51d4cb9 100644 --- a/windows/security/information-protection/windows-information-protection/guidance-and-best-practices-wip.md +++ b/windows/security/information-protection/windows-information-protection/guidance-and-best-practices-wip.md @@ -10,7 +10,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/windows-information-protection/how-wip-works-with-labels.md b/windows/security/information-protection/windows-information-protection/how-wip-works-with-labels.md index 8205436cc7..5b2d65942a 100644 --- a/windows/security/information-protection/windows-information-protection/how-wip-works-with-labels.md +++ b/windows/security/information-protection/windows-information-protection/how-wip-works-with-labels.md @@ -8,7 +8,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/windows-information-protection/limitations-with-wip.md b/windows/security/information-protection/windows-information-protection/limitations-with-wip.md index e9ee801003..a01fabb5ce 100644 --- a/windows/security/information-protection/windows-information-protection/limitations-with-wip.md +++ b/windows/security/information-protection/windows-information-protection/limitations-with-wip.md @@ -7,7 +7,7 @@ ms.mktglfcycl: explore ms.sitesec: library ms.pagetype: security author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/windows-information-protection/mandatory-settings-for-wip.md b/windows/security/information-protection/windows-information-protection/mandatory-settings-for-wip.md index 36a6fbf255..6b736fd281 100644 --- a/windows/security/information-protection/windows-information-protection/mandatory-settings-for-wip.md +++ b/windows/security/information-protection/windows-information-protection/mandatory-settings-for-wip.md @@ -8,7 +8,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/windows-information-protection/overview-create-wip-policy-sccm.md b/windows/security/information-protection/windows-information-protection/overview-create-wip-policy-sccm.md index 9fe48f688d..40ab9e148d 100644 --- a/windows/security/information-protection/windows-information-protection/overview-create-wip-policy-sccm.md +++ b/windows/security/information-protection/windows-information-protection/overview-create-wip-policy-sccm.md @@ -9,7 +9,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/windows-information-protection/overview-create-wip-policy.md b/windows/security/information-protection/windows-information-protection/overview-create-wip-policy.md index 29087982ee..8905cdb7b4 100644 --- a/windows/security/information-protection/windows-information-protection/overview-create-wip-policy.md +++ b/windows/security/information-protection/windows-information-protection/overview-create-wip-policy.md @@ -9,7 +9,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/windows-information-protection/protect-enterprise-data-using-wip.md b/windows/security/information-protection/windows-information-protection/protect-enterprise-data-using-wip.md index 3854d9221b..62403b8b81 100644 --- a/windows/security/information-protection/windows-information-protection/protect-enterprise-data-using-wip.md +++ b/windows/security/information-protection/windows-information-protection/protect-enterprise-data-using-wip.md @@ -10,7 +10,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/windows-information-protection/recommended-network-definitions-for-wip.md b/windows/security/information-protection/windows-information-protection/recommended-network-definitions-for-wip.md index 0852a6c1be..6ec450316a 100644 --- a/windows/security/information-protection/windows-information-protection/recommended-network-definitions-for-wip.md +++ b/windows/security/information-protection/windows-information-protection/recommended-network-definitions-for-wip.md @@ -8,7 +8,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/windows-information-protection/testing-scenarios-for-wip.md b/windows/security/information-protection/windows-information-protection/testing-scenarios-for-wip.md index 96b109ce32..d056e573c8 100644 --- a/windows/security/information-protection/windows-information-protection/testing-scenarios-for-wip.md +++ b/windows/security/information-protection/windows-information-protection/testing-scenarios-for-wip.md @@ -10,7 +10,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/windows-information-protection/using-owa-with-wip.md b/windows/security/information-protection/windows-information-protection/using-owa-with-wip.md index 7a321fae6b..958ab7847d 100644 --- a/windows/security/information-protection/windows-information-protection/using-owa-with-wip.md +++ b/windows/security/information-protection/windows-information-protection/using-owa-with-wip.md @@ -8,7 +8,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/information-protection/windows-information-protection/wip-app-enterprise-context.md b/windows/security/information-protection/windows-information-protection/wip-app-enterprise-context.md index dc97c95d0d..5a8333cab2 100644 --- a/windows/security/information-protection/windows-information-protection/wip-app-enterprise-context.md +++ b/windows/security/information-protection/windows-information-protection/wip-app-enterprise-context.md @@ -8,7 +8,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp audience: ITPro ms.collection: M365-security-compliance diff --git a/windows/security/threat-protection/auditing/advanced-security-audit-policy-settings.md b/windows/security/threat-protection/auditing/advanced-security-audit-policy-settings.md index 6ad79e3e33..3dffe741a9 100644 --- a/windows/security/threat-protection/auditing/advanced-security-audit-policy-settings.md +++ b/windows/security/threat-protection/auditing/advanced-security-audit-policy-settings.md @@ -3,7 +3,7 @@ title: Advanced security audit policy settings (Windows 10) description: This reference for IT professionals provides information about the advanced audit policy settings that are available in Windows and the audit events that they generate. ms.assetid: 93b28b92-796f-4036-a53b-8b9e80f9f171 ms.reviewer: -ms.author: dolmont +ms.author: dansimp ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/auditing/advanced-security-auditing-faq.md b/windows/security/threat-protection/auditing/advanced-security-auditing-faq.md index 6f5a0b10d2..99b8a989c4 100644 --- a/windows/security/threat-protection/auditing/advanced-security-auditing-faq.md +++ b/windows/security/threat-protection/auditing/advanced-security-auditing-faq.md @@ -3,7 +3,7 @@ title: Advanced security auditing FAQ (Windows 10) description: This topic for the IT professional lists questions and answers about understanding, deploying, and managing security audit policies. ms.assetid: 80f8f187-0916-43c2-a7e8-ea712b115a06 ms.reviewer: -ms.author: dolmont +ms.author: dansimp ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/auditing/advanced-security-auditing.md b/windows/security/threat-protection/auditing/advanced-security-auditing.md index 9838d24e59..9270164aec 100644 --- a/windows/security/threat-protection/auditing/advanced-security-auditing.md +++ b/windows/security/threat-protection/auditing/advanced-security-auditing.md @@ -3,7 +3,7 @@ title: Advanced security audit policies (Windows 10) description: Advanced security audit policy settings are found in Security Settings\\Advanced Audit Policy Configuration\\System Audit Policies and appear to overlap with basic security audit policies, but they are recorded and applied differently. ms.assetid: 6FE8AC10-F48E-4BBF-979B-43A5DFDC5DFC ms.reviewer: -ms.author: dolmont +ms.author: dansimp ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/auditing/appendix-a-security-monitoring-recommendations-for-many-audit-events.md b/windows/security/threat-protection/auditing/appendix-a-security-monitoring-recommendations-for-many-audit-events.md index 085696c83b..d212b266b1 100644 --- a/windows/security/threat-protection/auditing/appendix-a-security-monitoring-recommendations-for-many-audit-events.md +++ b/windows/security/threat-protection/auditing/appendix-a-security-monitoring-recommendations-for-many-audit-events.md @@ -10,7 +10,7 @@ author: dansimp ms.date: 04/19/2017 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp --- # Appendix A: Security monitoring recommendations for many audit events diff --git a/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md b/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md index ca029ce938..e559dc6001 100644 --- a/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md +++ b/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md @@ -3,7 +3,7 @@ title: Apply a basic audit policy on a file or folder (Windows 10) description: You can apply audit policies to individual files and folders on your computer by setting the permission type to record successful access attempts or failed access attempts in the security log. ms.assetid: 565E7249-5CD0-4B2E-B2C0-B3A0793A51E2 ms.reviewer: -ms.author: dolmont +ms.author: dansimp ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/auditing/audit-account-lockout.md b/windows/security/threat-protection/auditing/audit-account-lockout.md index a07d45c508..34e1304ce4 100644 --- a/windows/security/threat-protection/auditing/audit-account-lockout.md +++ b/windows/security/threat-protection/auditing/audit-account-lockout.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the advanced security ms.assetid: da68624b-a174-482c-9bc5-ddddab38e589 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-application-generated.md b/windows/security/threat-protection/auditing/audit-application-generated.md index 3e6d8f2ec9..72a5aecec7 100644 --- a/windows/security/threat-protection/auditing/audit-application-generated.md +++ b/windows/security/threat-protection/auditing/audit-application-generated.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the Advanced Security ms.assetid: 6c58a365-b25b-42b8-98ab-819002e31871 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-application-group-management.md b/windows/security/threat-protection/auditing/audit-application-group-management.md index 4c3d308215..96f7a50301 100644 --- a/windows/security/threat-protection/auditing/audit-application-group-management.md +++ b/windows/security/threat-protection/auditing/audit-application-group-management.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the advanced security ms.assetid: 1bcaa41e-5027-4a86-96b7-f04eaf1c0606 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-audit-policy-change.md b/windows/security/threat-protection/auditing/audit-audit-policy-change.md index 1516cc7761..8f4d1d0d23 100644 --- a/windows/security/threat-protection/auditing/audit-audit-policy-change.md +++ b/windows/security/threat-protection/auditing/audit-audit-policy-change.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the Advanced Security ms.assetid: 7153bf75-6978-4d7e-a821-59a699efb8a9 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-authentication-policy-change.md b/windows/security/threat-protection/auditing/audit-authentication-policy-change.md index 4235b255aa..8020663eb5 100644 --- a/windows/security/threat-protection/auditing/audit-authentication-policy-change.md +++ b/windows/security/threat-protection/auditing/audit-authentication-policy-change.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes this Advanced Security ms.assetid: aa9cea7a-aadf-47b7-b704-ac253b8e79be ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-authorization-policy-change.md b/windows/security/threat-protection/auditing/audit-authorization-policy-change.md index 5bd32ce275..af4339ce53 100644 --- a/windows/security/threat-protection/auditing/audit-authorization-policy-change.md +++ b/windows/security/threat-protection/auditing/audit-authorization-policy-change.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the Advanced Security ms.assetid: ca0587a2-a2b3-4300-aa5d-48b4553c3b36 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-central-access-policy-staging.md b/windows/security/threat-protection/auditing/audit-central-access-policy-staging.md index b3e9bd82c2..061105bbac 100644 --- a/windows/security/threat-protection/auditing/audit-central-access-policy-staging.md +++ b/windows/security/threat-protection/auditing/audit-central-access-policy-staging.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the Advanced Security ms.assetid: D9BB11CE-949A-4B48-82BF-30DC5E6FC67D ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-certification-services.md b/windows/security/threat-protection/auditing/audit-certification-services.md index 1e7ae82e61..4214420b03 100644 --- a/windows/security/threat-protection/auditing/audit-certification-services.md +++ b/windows/security/threat-protection/auditing/audit-certification-services.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the Advanced Security ms.assetid: cdefc34e-fb1f-4eff-b766-17713c5a1b03 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-computer-account-management.md b/windows/security/threat-protection/auditing/audit-computer-account-management.md index 88c48d5853..d0d902a868 100644 --- a/windows/security/threat-protection/auditing/audit-computer-account-management.md +++ b/windows/security/threat-protection/auditing/audit-computer-account-management.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the advanced security ms.assetid: 6c406693-57bf-4411-bb6c-ff83ce548991 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-credential-validation.md b/windows/security/threat-protection/auditing/audit-credential-validation.md index 94710f55e8..feac5d138b 100644 --- a/windows/security/threat-protection/auditing/audit-credential-validation.md +++ b/windows/security/threat-protection/auditing/audit-credential-validation.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the advanced security ms.assetid: 6654b33a-922e-4a43-8223-ec5086dfc926 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-detailed-directory-service-replication.md b/windows/security/threat-protection/auditing/audit-detailed-directory-service-replication.md index 43c9f6822c..2b345207d2 100644 --- a/windows/security/threat-protection/auditing/audit-detailed-directory-service-replication.md +++ b/windows/security/threat-protection/auditing/audit-detailed-directory-service-replication.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the advanced security ms.assetid: 1b89c8f5-bce7-4b20-8701-42585c7ab993 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-detailed-file-share.md b/windows/security/threat-protection/auditing/audit-detailed-file-share.md index e89f8981e1..41ed83320d 100644 --- a/windows/security/threat-protection/auditing/audit-detailed-file-share.md +++ b/windows/security/threat-protection/auditing/audit-detailed-file-share.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the Advanced Security ms.assetid: 60310104-b820-4033-a1cb-022a34f064ae ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-directory-service-access.md b/windows/security/threat-protection/auditing/audit-directory-service-access.md index bd202dbd62..ae15d23652 100644 --- a/windows/security/threat-protection/auditing/audit-directory-service-access.md +++ b/windows/security/threat-protection/auditing/audit-directory-service-access.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the advanced security ms.assetid: ba2562ba-4282-4588-b87c-a3fcb771c7d0 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-directory-service-changes.md b/windows/security/threat-protection/auditing/audit-directory-service-changes.md index c58467c3e4..4110cd1ec6 100644 --- a/windows/security/threat-protection/auditing/audit-directory-service-changes.md +++ b/windows/security/threat-protection/auditing/audit-directory-service-changes.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the advanced security ms.assetid: 9f7c0dd4-3977-47dd-a0fb-ec2f17cad05e ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-directory-service-replication.md b/windows/security/threat-protection/auditing/audit-directory-service-replication.md index bd6d5e2826..06737f9521 100644 --- a/windows/security/threat-protection/auditing/audit-directory-service-replication.md +++ b/windows/security/threat-protection/auditing/audit-directory-service-replication.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the advanced security ms.assetid: b95d296c-7993-4e8d-8064-a8bbe284bd56 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-distribution-group-management.md b/windows/security/threat-protection/auditing/audit-distribution-group-management.md index 40245de335..0c779c954f 100644 --- a/windows/security/threat-protection/auditing/audit-distribution-group-management.md +++ b/windows/security/threat-protection/auditing/audit-distribution-group-management.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the Advanced Security ms.assetid: d46693a4-5887-4a58-85db-2f6cba224a66 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-dpapi-activity.md b/windows/security/threat-protection/auditing/audit-dpapi-activity.md index 60055020e4..835e1fd7f3 100644 --- a/windows/security/threat-protection/auditing/audit-dpapi-activity.md +++ b/windows/security/threat-protection/auditing/audit-dpapi-activity.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the Advanced Security ms.assetid: be4d4c83-c857-4e3d-a84e-8bcc3f2c99cd ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-file-share.md b/windows/security/threat-protection/auditing/audit-file-share.md index f03007042a..512ae2084a 100644 --- a/windows/security/threat-protection/auditing/audit-file-share.md +++ b/windows/security/threat-protection/auditing/audit-file-share.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the Advanced Security ms.assetid: 9ea985f8-8936-4b79-abdb-35cbb7138f78 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-file-system.md b/windows/security/threat-protection/auditing/audit-file-system.md index 4561cde170..fe21575b2b 100644 --- a/windows/security/threat-protection/auditing/audit-file-system.md +++ b/windows/security/threat-protection/auditing/audit-file-system.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the Advanced Security ms.assetid: 6a71f283-b8e5-41ac-b348-0b7ec6ea0b1f ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-filtering-platform-connection.md b/windows/security/threat-protection/auditing/audit-filtering-platform-connection.md index 742645ff1f..734f231b24 100644 --- a/windows/security/threat-protection/auditing/audit-filtering-platform-connection.md +++ b/windows/security/threat-protection/auditing/audit-filtering-platform-connection.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the Advanced Security ms.assetid: d72936e9-ff01-4d18-b864-a4958815df59 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-filtering-platform-packet-drop.md b/windows/security/threat-protection/auditing/audit-filtering-platform-packet-drop.md index 18514b74f8..b953cf56c0 100644 --- a/windows/security/threat-protection/auditing/audit-filtering-platform-packet-drop.md +++ b/windows/security/threat-protection/auditing/audit-filtering-platform-packet-drop.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the Advanced Security ms.assetid: 95457601-68d1-4385-af20-87916ddab906 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-filtering-platform-policy-change.md b/windows/security/threat-protection/auditing/audit-filtering-platform-policy-change.md index 1b7513e57a..c82bbebd49 100644 --- a/windows/security/threat-protection/auditing/audit-filtering-platform-policy-change.md +++ b/windows/security/threat-protection/auditing/audit-filtering-platform-policy-change.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the Advanced Security ms.assetid: 0eaf1c56-672b-4ea9-825a-22dc03eb4041 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-group-membership.md b/windows/security/threat-protection/auditing/audit-group-membership.md index 1075528e00..18b2e9556d 100644 --- a/windows/security/threat-protection/auditing/audit-group-membership.md +++ b/windows/security/threat-protection/auditing/audit-group-membership.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the advanced security ms.assetid: 1CD7B014-FBD9-44B9-9274-CC5715DE58B9 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-handle-manipulation.md b/windows/security/threat-protection/auditing/audit-handle-manipulation.md index 0affb3aee5..3802d34249 100644 --- a/windows/security/threat-protection/auditing/audit-handle-manipulation.md +++ b/windows/security/threat-protection/auditing/audit-handle-manipulation.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the Advanced Security ms.assetid: 1fbb004a-ccdc-4c80-b3da-a4aa7a9f4091 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-ipsec-driver.md b/windows/security/threat-protection/auditing/audit-ipsec-driver.md index 63b1312e9f..0f0a9fa7b5 100644 --- a/windows/security/threat-protection/auditing/audit-ipsec-driver.md +++ b/windows/security/threat-protection/auditing/audit-ipsec-driver.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the Advanced Security ms.assetid: c8b8c02f-5ad0-4ee5-9123-ea8cdae356a5 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-ipsec-extended-mode.md b/windows/security/threat-protection/auditing/audit-ipsec-extended-mode.md index aa272bba54..af3502ddce 100644 --- a/windows/security/threat-protection/auditing/audit-ipsec-extended-mode.md +++ b/windows/security/threat-protection/auditing/audit-ipsec-extended-mode.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the advanced security ms.assetid: 2b4fee9e-482a-4181-88a8-6a79d8fc8049 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-ipsec-main-mode.md b/windows/security/threat-protection/auditing/audit-ipsec-main-mode.md index 4aa16fbf15..d4aa3ebf77 100644 --- a/windows/security/threat-protection/auditing/audit-ipsec-main-mode.md +++ b/windows/security/threat-protection/auditing/audit-ipsec-main-mode.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the advanced security ms.assetid: 06ed26ec-3620-4ef4-a47a-c70df9c8827b ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-ipsec-quick-mode.md b/windows/security/threat-protection/auditing/audit-ipsec-quick-mode.md index d93af71128..54e46c85cd 100644 --- a/windows/security/threat-protection/auditing/audit-ipsec-quick-mode.md +++ b/windows/security/threat-protection/auditing/audit-ipsec-quick-mode.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the advanced security ms.assetid: 7be67a15-c2ce-496a-9719-e25ac7699114 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-kerberos-authentication-service.md b/windows/security/threat-protection/auditing/audit-kerberos-authentication-service.md index 702c61040a..d28314643d 100644 --- a/windows/security/threat-protection/auditing/audit-kerberos-authentication-service.md +++ b/windows/security/threat-protection/auditing/audit-kerberos-authentication-service.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the Advanced Security ms.assetid: 990dd6d9-1a1f-4cce-97ba-5d7e0a7db859 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-kerberos-service-ticket-operations.md b/windows/security/threat-protection/auditing/audit-kerberos-service-ticket-operations.md index 28915808bd..f8bacdd852 100644 --- a/windows/security/threat-protection/auditing/audit-kerberos-service-ticket-operations.md +++ b/windows/security/threat-protection/auditing/audit-kerberos-service-ticket-operations.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the Advanced Security ms.assetid: ddc0abef-ac7f-4849-b90d-66700470ccd6 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-kernel-object.md b/windows/security/threat-protection/auditing/audit-kernel-object.md index 681b6fb44c..44049a109f 100644 --- a/windows/security/threat-protection/auditing/audit-kernel-object.md +++ b/windows/security/threat-protection/auditing/audit-kernel-object.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the Advanced Security ms.assetid: 75619d8b-b1eb-445b-afc9-0f9053be97fb ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-logoff.md b/windows/security/threat-protection/auditing/audit-logoff.md index 573ce06cfd..45e9abeb45 100644 --- a/windows/security/threat-protection/auditing/audit-logoff.md +++ b/windows/security/threat-protection/auditing/audit-logoff.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the Advanced Security ms.assetid: 681e51f2-ba06-46f5-af8c-d9c48d515432 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-logon.md b/windows/security/threat-protection/auditing/audit-logon.md index c0afb77337..3742607eba 100644 --- a/windows/security/threat-protection/auditing/audit-logon.md +++ b/windows/security/threat-protection/auditing/audit-logon.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the Advanced Security ms.assetid: ca968d03-7d52-48c4-ba0e-2bcd2937231b ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-mpssvc-rule-level-policy-change.md b/windows/security/threat-protection/auditing/audit-mpssvc-rule-level-policy-change.md index b5a6ebf13e..25e29659e8 100644 --- a/windows/security/threat-protection/auditing/audit-mpssvc-rule-level-policy-change.md +++ b/windows/security/threat-protection/auditing/audit-mpssvc-rule-level-policy-change.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the Advanced Security ms.assetid: 263461b3-c61c-4ec3-9dee-851164845019 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-network-policy-server.md b/windows/security/threat-protection/auditing/audit-network-policy-server.md index c2e1974295..6d7eaac005 100644 --- a/windows/security/threat-protection/auditing/audit-network-policy-server.md +++ b/windows/security/threat-protection/auditing/audit-network-policy-server.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the Advanced Security ms.assetid: 43b2aea4-26df-46da-b761-2b30f51a80f7 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-non-sensitive-privilege-use.md b/windows/security/threat-protection/auditing/audit-non-sensitive-privilege-use.md index aff3140f1e..f1227802bd 100644 --- a/windows/security/threat-protection/auditing/audit-non-sensitive-privilege-use.md +++ b/windows/security/threat-protection/auditing/audit-non-sensitive-privilege-use.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the Advanced Security ms.assetid: 8fd74783-1059-443e-aa86-566d78606627 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-other-account-logon-events.md b/windows/security/threat-protection/auditing/audit-other-account-logon-events.md index 69fc176e98..edbcb2555d 100644 --- a/windows/security/threat-protection/auditing/audit-other-account-logon-events.md +++ b/windows/security/threat-protection/auditing/audit-other-account-logon-events.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the advanced security ms.assetid: c8c6bfe0-33d2-4600-bb1a-6afa840d75b3 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-other-account-management-events.md b/windows/security/threat-protection/auditing/audit-other-account-management-events.md index 3b5c693e52..cd054ab132 100644 --- a/windows/security/threat-protection/auditing/audit-other-account-management-events.md +++ b/windows/security/threat-protection/auditing/audit-other-account-management-events.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the Advanced Security ms.assetid: 4ce22eeb-a96f-4cf9-a46d-6642961a31d5 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-other-logonlogoff-events.md b/windows/security/threat-protection/auditing/audit-other-logonlogoff-events.md index 27b1498aa4..b10a5106ba 100644 --- a/windows/security/threat-protection/auditing/audit-other-logonlogoff-events.md +++ b/windows/security/threat-protection/auditing/audit-other-logonlogoff-events.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the Advanced Security ms.assetid: 76d987cd-1917-4907-a739-dd642609a458 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-other-object-access-events.md b/windows/security/threat-protection/auditing/audit-other-object-access-events.md index d604e37a8f..3bfc786df1 100644 --- a/windows/security/threat-protection/auditing/audit-other-object-access-events.md +++ b/windows/security/threat-protection/auditing/audit-other-object-access-events.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the Advanced Security ms.assetid: b9774595-595d-4199-b0c5-8dbc12b6c8b2 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-other-policy-change-events.md b/windows/security/threat-protection/auditing/audit-other-policy-change-events.md index 409fbca5d4..e156529bf1 100644 --- a/windows/security/threat-protection/auditing/audit-other-policy-change-events.md +++ b/windows/security/threat-protection/auditing/audit-other-policy-change-events.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the Advanced Security ms.assetid: 8618502e-c21c-41cc-8a49-3dc1eb359e60 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-other-privilege-use-events.md b/windows/security/threat-protection/auditing/audit-other-privilege-use-events.md index 4baf9e7bbb..e13d22c6e3 100644 --- a/windows/security/threat-protection/auditing/audit-other-privilege-use-events.md +++ b/windows/security/threat-protection/auditing/audit-other-privilege-use-events.md @@ -4,7 +4,7 @@ description: This security policy setting is not used. ms.assetid: 5f7f5b25-42a6-499f-8aa2-01ac79a2a63c ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-other-system-events.md b/windows/security/threat-protection/auditing/audit-other-system-events.md index a32b918c93..839166429b 100644 --- a/windows/security/threat-protection/auditing/audit-other-system-events.md +++ b/windows/security/threat-protection/auditing/audit-other-system-events.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the Advanced Security ms.assetid: 2401e4cc-d94e-41ec-82a7-e10914295f8b ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-pnp-activity.md b/windows/security/threat-protection/auditing/audit-pnp-activity.md index 45d18cfb54..6e2ce1aa93 100644 --- a/windows/security/threat-protection/auditing/audit-pnp-activity.md +++ b/windows/security/threat-protection/auditing/audit-pnp-activity.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the advanced security ms.assetid: A3D87B3B-EBBE-442A-953B-9EB75A5F600E ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-process-creation.md b/windows/security/threat-protection/auditing/audit-process-creation.md index 9c91d85cb5..8532644095 100644 --- a/windows/security/threat-protection/auditing/audit-process-creation.md +++ b/windows/security/threat-protection/auditing/audit-process-creation.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the Advanced Security ms.assetid: 67e39fcd-ded6-45e8-b1b6-d411e4e93019 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-process-termination.md b/windows/security/threat-protection/auditing/audit-process-termination.md index d21502c0f1..3943542ccf 100644 --- a/windows/security/threat-protection/auditing/audit-process-termination.md +++ b/windows/security/threat-protection/auditing/audit-process-termination.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the Advanced Security ms.assetid: 65d88e53-14aa-48a4-812b-557cebbf9e50 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-registry.md b/windows/security/threat-protection/auditing/audit-registry.md index 05a3b64156..fe4cd66839 100644 --- a/windows/security/threat-protection/auditing/audit-registry.md +++ b/windows/security/threat-protection/auditing/audit-registry.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the Advanced Security ms.assetid: 02bcc23b-4823-46ac-b822-67beedf56b32 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-removable-storage.md b/windows/security/threat-protection/auditing/audit-removable-storage.md index ea5157c123..96314fa0bd 100644 --- a/windows/security/threat-protection/auditing/audit-removable-storage.md +++ b/windows/security/threat-protection/auditing/audit-removable-storage.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the Advanced Security ms.assetid: 1746F7B3-8B41-4661-87D8-12F734AFFB26 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-rpc-events.md b/windows/security/threat-protection/auditing/audit-rpc-events.md index fb655405ad..f35fb87e98 100644 --- a/windows/security/threat-protection/auditing/audit-rpc-events.md +++ b/windows/security/threat-protection/auditing/audit-rpc-events.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the advanced security ms.assetid: 868aec2d-93b4-4bc8-a150-941f88838ba6 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-sam.md b/windows/security/threat-protection/auditing/audit-sam.md index 62a32f2cf0..31d65aafb1 100644 --- a/windows/security/threat-protection/auditing/audit-sam.md +++ b/windows/security/threat-protection/auditing/audit-sam.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the Advanced Security ms.assetid: 1d00f955-383d-4c95-bbd1-fab4a991a46e ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-security-group-management.md b/windows/security/threat-protection/auditing/audit-security-group-management.md index e6cec0503b..710f45b4ae 100644 --- a/windows/security/threat-protection/auditing/audit-security-group-management.md +++ b/windows/security/threat-protection/auditing/audit-security-group-management.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the advanced security ms.assetid: ac2ee101-557b-4c84-b9fa-4fb23331f1aa ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-security-state-change.md b/windows/security/threat-protection/auditing/audit-security-state-change.md index fde5cabd9b..f002a9938a 100644 --- a/windows/security/threat-protection/auditing/audit-security-state-change.md +++ b/windows/security/threat-protection/auditing/audit-security-state-change.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the Advanced Security ms.assetid: decb3218-a67d-4efa-afc0-337c79a89a2d ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-security-system-extension.md b/windows/security/threat-protection/auditing/audit-security-system-extension.md index b105867ec0..3d2beb88d0 100644 --- a/windows/security/threat-protection/auditing/audit-security-system-extension.md +++ b/windows/security/threat-protection/auditing/audit-security-system-extension.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the Advanced Security ms.assetid: 9f3c6bde-42b2-4a0a-b353-ed3106ebc005 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-sensitive-privilege-use.md b/windows/security/threat-protection/auditing/audit-sensitive-privilege-use.md index 6bcdbbfa2c..ac5edaec4a 100644 --- a/windows/security/threat-protection/auditing/audit-sensitive-privilege-use.md +++ b/windows/security/threat-protection/auditing/audit-sensitive-privilege-use.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the Advanced Security ms.assetid: 915abf50-42d2-45f6-9fd1-e7bd201b193d ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-special-logon.md b/windows/security/threat-protection/auditing/audit-special-logon.md index e711a28222..cae080c72b 100644 --- a/windows/security/threat-protection/auditing/audit-special-logon.md +++ b/windows/security/threat-protection/auditing/audit-special-logon.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the Advanced Security ms.assetid: e1501bac-1d09-4593-8ebb-f311231567d3 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-system-integrity.md b/windows/security/threat-protection/auditing/audit-system-integrity.md index 77eec9f52c..606b78493e 100644 --- a/windows/security/threat-protection/auditing/audit-system-integrity.md +++ b/windows/security/threat-protection/auditing/audit-system-integrity.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the Advanced Security ms.assetid: 942a9a7f-fa31-4067-88c7-f73978bf2034 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-user-account-management.md b/windows/security/threat-protection/auditing/audit-user-account-management.md index 9b29513d13..25d5f2620c 100644 --- a/windows/security/threat-protection/auditing/audit-user-account-management.md +++ b/windows/security/threat-protection/auditing/audit-user-account-management.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the advanced security ms.assetid: f7e72998-3858-4197-a443-19586ecc4bfb ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/audit-user-device-claims.md b/windows/security/threat-protection/auditing/audit-user-device-claims.md index 12475312ea..55da915b55 100644 --- a/windows/security/threat-protection/auditing/audit-user-device-claims.md +++ b/windows/security/threat-protection/auditing/audit-user-device-claims.md @@ -4,7 +4,7 @@ description: This topic for the IT professional describes the advanced security ms.assetid: D3D2BFAF-F2C0-462A-9377-673DB49D5486 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.pagetype: security ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/basic-audit-account-logon-events.md b/windows/security/threat-protection/auditing/basic-audit-account-logon-events.md index cf85964568..f345a84336 100644 --- a/windows/security/threat-protection/auditing/basic-audit-account-logon-events.md +++ b/windows/security/threat-protection/auditing/basic-audit-account-logon-events.md @@ -3,7 +3,7 @@ title: Audit account logon events (Windows 10) description: Determines whether to audit each instance of a user logging on to or logging off from another device in which this device is used to validate the account. ms.assetid: 84B44181-E325-49A1-8398-AECC3CE0A516 ms.reviewer: -ms.author: dolmont +ms.author: dansimp ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/auditing/basic-audit-account-management.md b/windows/security/threat-protection/auditing/basic-audit-account-management.md index f0f32de6c8..e699a88ac1 100644 --- a/windows/security/threat-protection/auditing/basic-audit-account-management.md +++ b/windows/security/threat-protection/auditing/basic-audit-account-management.md @@ -3,7 +3,7 @@ title: Audit account management (Windows 10) description: Determines whether to audit each event of account management on a device. ms.assetid: 369197E1-7E0E-45A4-89EA-16D91EF01689 ms.reviewer: -ms.author: dolmont +ms.author: dansimp ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/auditing/basic-audit-directory-service-access.md b/windows/security/threat-protection/auditing/basic-audit-directory-service-access.md index c8d185907d..5fcf6e9222 100644 --- a/windows/security/threat-protection/auditing/basic-audit-directory-service-access.md +++ b/windows/security/threat-protection/auditing/basic-audit-directory-service-access.md @@ -3,7 +3,7 @@ title: Audit directory service access (Windows 10) description: Determines whether to audit the event of a user accessing an Active Directory object that has its own system access control list (SACL) specified. ms.assetid: 52F02EED-3CFE-4307-8D06-CF1E27693D09 ms.reviewer: -ms.author: dolmont +ms.author: dansimp ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/auditing/basic-audit-logon-events.md b/windows/security/threat-protection/auditing/basic-audit-logon-events.md index 1ad3ccc0e1..5c7672c13a 100644 --- a/windows/security/threat-protection/auditing/basic-audit-logon-events.md +++ b/windows/security/threat-protection/auditing/basic-audit-logon-events.md @@ -3,7 +3,7 @@ title: Audit logon events (Windows 10) description: Determines whether to audit each instance of a user logging on to or logging off from a device. ms.assetid: 78B5AFCB-0BBD-4C38-9FE9-6B4571B94A35 ms.reviewer: -ms.author: dolmont +ms.author: dansimp ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/auditing/basic-audit-object-access.md b/windows/security/threat-protection/auditing/basic-audit-object-access.md index cbdb66dcca..438dd850c9 100644 --- a/windows/security/threat-protection/auditing/basic-audit-object-access.md +++ b/windows/security/threat-protection/auditing/basic-audit-object-access.md @@ -3,7 +3,7 @@ title: Audit object access (Windows 10) description: Determines whether to audit the event of a user accessing an object--for example, a file, folder, registry key, printer, and so forth--that has its own system access control list (SACL) specified. ms.assetid: D15B6D67-7886-44C2-9972-3F192D5407EA ms.reviewer: -ms.author: dolmont +ms.author: dansimp ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/auditing/basic-audit-policy-change.md b/windows/security/threat-protection/auditing/basic-audit-policy-change.md index a648339797..b80e5788af 100644 --- a/windows/security/threat-protection/auditing/basic-audit-policy-change.md +++ b/windows/security/threat-protection/auditing/basic-audit-policy-change.md @@ -3,7 +3,7 @@ title: Audit policy change (Windows 10) description: Determines whether to audit every incident of a change to user rights assignment policies, audit policies, or trust policies. ms.assetid: 1025A648-6B22-4C85-9F47-FE0897F1FA31 ms.reviewer: -ms.author: dolmont +ms.author: dansimp ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/auditing/basic-audit-privilege-use.md b/windows/security/threat-protection/auditing/basic-audit-privilege-use.md index 06685065b5..a3e7893fe6 100644 --- a/windows/security/threat-protection/auditing/basic-audit-privilege-use.md +++ b/windows/security/threat-protection/auditing/basic-audit-privilege-use.md @@ -3,7 +3,7 @@ title: Audit privilege use (Windows 10) description: Determines whether to audit each instance of a user exercising a user right. ms.assetid: C5C6DAAF-8B58-4DFB-B1CE-F0675AE0E9F8 ms.reviewer: -ms.author: dolmont +ms.author: dansimp ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/auditing/basic-audit-process-tracking.md b/windows/security/threat-protection/auditing/basic-audit-process-tracking.md index 67fccdd379..4f02eab9a3 100644 --- a/windows/security/threat-protection/auditing/basic-audit-process-tracking.md +++ b/windows/security/threat-protection/auditing/basic-audit-process-tracking.md @@ -3,7 +3,7 @@ title: Audit process tracking (Windows 10) description: Determines whether to audit detailed tracking information for events such as program activation, process exit, handle duplication, and indirect object access. ms.assetid: 91AC5C1E-F4DA-4B16-BEE2-C92D66E4CEEA ms.reviewer: -ms.author: dolmont +ms.author: dansimp ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/auditing/basic-audit-system-events.md b/windows/security/threat-protection/auditing/basic-audit-system-events.md index 5ad26d7ba5..7811de4253 100644 --- a/windows/security/threat-protection/auditing/basic-audit-system-events.md +++ b/windows/security/threat-protection/auditing/basic-audit-system-events.md @@ -3,7 +3,7 @@ title: Audit system events (Windows 10) description: Determines whether to audit when a user restarts or shuts down the computer or when an event occurs that affects either the system security or the security log. ms.assetid: BF27588C-2AA7-4365-A4BF-3BB377916447 ms.reviewer: -ms.author: dolmont +ms.author: dansimp ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/auditing/basic-security-audit-policies.md b/windows/security/threat-protection/auditing/basic-security-audit-policies.md index 5d332ec48c..1e73acf50d 100644 --- a/windows/security/threat-protection/auditing/basic-security-audit-policies.md +++ b/windows/security/threat-protection/auditing/basic-security-audit-policies.md @@ -3,7 +3,7 @@ title: Basic security audit policies (Windows 10) description: Before you implement auditing, you must decide on an auditing policy. ms.assetid: 3B678568-7AD7-4734-9BB4-53CF5E04E1D3 ms.reviewer: -ms.author: dolmont +ms.author: dansimp ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/auditing/basic-security-audit-policy-settings.md b/windows/security/threat-protection/auditing/basic-security-audit-policy-settings.md index e1da7a0b1e..686cdfdc71 100644 --- a/windows/security/threat-protection/auditing/basic-security-audit-policy-settings.md +++ b/windows/security/threat-protection/auditing/basic-security-audit-policy-settings.md @@ -3,7 +3,7 @@ title: Basic security audit policy settings (Windows 10) description: Basic security audit policy settings are found under Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Audit Policy. ms.assetid: 31C2C453-2CFC-4D9E-BC88-8CE1C1A8F900 ms.reviewer: -ms.author: dolmont +ms.author: dansimp ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/auditing/create-a-basic-audit-policy-settings-for-an-event-category.md b/windows/security/threat-protection/auditing/create-a-basic-audit-policy-settings-for-an-event-category.md index efc25b527e..745c787671 100644 --- a/windows/security/threat-protection/auditing/create-a-basic-audit-policy-settings-for-an-event-category.md +++ b/windows/security/threat-protection/auditing/create-a-basic-audit-policy-settings-for-an-event-category.md @@ -3,7 +3,7 @@ title: Create a basic audit policy for an event category (Windows 10) description: By defining auditing settings for specific event categories, you can create an auditing policy that suits the security needs of your organization. ms.assetid: C9F52751-B40D-482E-BE9D-2C61098249D3 ms.reviewer: -ms.author: dolmont +ms.author: dansimp ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/auditing/event-1100.md b/windows/security/threat-protection/auditing/event-1100.md index cd2694a78a..251aa8834c 100644 --- a/windows/security/threat-protection/auditing/event-1100.md +++ b/windows/security/threat-protection/auditing/event-1100.md @@ -10,7 +10,7 @@ author: dansimp ms.date: 04/19/2017 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp --- # 1100(S): The event logging service has shut down. diff --git a/windows/security/threat-protection/auditing/event-1102.md b/windows/security/threat-protection/auditing/event-1102.md index 4fc3e0021e..c1d44d55e0 100644 --- a/windows/security/threat-protection/auditing/event-1102.md +++ b/windows/security/threat-protection/auditing/event-1102.md @@ -10,7 +10,7 @@ author: dansimp ms.date: 04/19/2017 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp --- # 1102(S): The audit log was cleared. diff --git a/windows/security/threat-protection/auditing/event-1104.md b/windows/security/threat-protection/auditing/event-1104.md index 689ec40ce8..5854f68b90 100644 --- a/windows/security/threat-protection/auditing/event-1104.md +++ b/windows/security/threat-protection/auditing/event-1104.md @@ -10,7 +10,7 @@ author: dansimp ms.date: 04/19/2017 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp --- # 1104(S): The security log is now full. diff --git a/windows/security/threat-protection/block-untrusted-fonts-in-enterprise.md b/windows/security/threat-protection/block-untrusted-fonts-in-enterprise.md index 9059c18b53..70362c9d1c 100644 --- a/windows/security/threat-protection/block-untrusted-fonts-in-enterprise.md +++ b/windows/security/threat-protection/block-untrusted-fonts-in-enterprise.md @@ -10,7 +10,7 @@ ms.mktglfcycl: deploy ms.pagetype: security ms.sitesec: library author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp ms.date: 08/14/2017 ms.localizationpriority: medium --- diff --git a/windows/security/threat-protection/change-history-for-threat-protection.md b/windows/security/threat-protection/change-history-for-threat-protection.md index 7c5320ff0d..af17bfed1e 100644 --- a/windows/security/threat-protection/change-history-for-threat-protection.md +++ b/windows/security/threat-protection/change-history-for-threat-protection.md @@ -1,7 +1,7 @@ --- title: Change history for [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ms.reviewer: -ms.author: dolmont +ms.author: dansimp description: This topic lists new and updated topics in the WWindows Defender ATP content set. ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md index f900f5ea9c..8effd3a06e 100644 --- a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md +++ b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md @@ -6,7 +6,7 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -ms.author: daniha +ms.author: dansimp author: danihalfin ms.date: 02/22/2019 ms.reviewer: diff --git a/windows/security/threat-protection/fips-140-validation.md b/windows/security/threat-protection/fips-140-validation.md index 5548e18dd5..a1ad5ab37c 100644 --- a/windows/security/threat-protection/fips-140-validation.md +++ b/windows/security/threat-protection/fips-140-validation.md @@ -4,7 +4,7 @@ description: This topic provides information on how Microsoft products and crypt ms.prod: w10 audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/threat-protection/get-support-for-security-baselines.md b/windows/security/threat-protection/get-support-for-security-baselines.md index 2c5d379949..c3cdc07f58 100644 --- a/windows/security/threat-protection/get-support-for-security-baselines.md +++ b/windows/security/threat-protection/get-support-for-security-baselines.md @@ -5,7 +5,7 @@ keywords: virtualization, security, malware ms.prod: w10 ms.mktglfcycl: deploy ms.localizationpriority: medium -ms.author: dolmont +ms.author: dansimp author: dulcemontemayor manager: dansimp audience: ITPro diff --git a/windows/security/threat-protection/index.md b/windows/security/threat-protection/index.md index bba7e87609..080a09e0b5 100644 --- a/windows/security/threat-protection/index.md +++ b/windows/security/threat-protection/index.md @@ -7,12 +7,12 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -ms.author: dolmont +ms.author: dansimp author: DulceMontemayor ms.localizationpriority: medium manager: dansimp audience: ITPro -ms.collection: M365-security-compliance +ms.collection: M365-security-compliance ms.topic: conceptual --- diff --git a/windows/security/threat-protection/mbsa-removal-and-guidance.md b/windows/security/threat-protection/mbsa-removal-and-guidance.md index b2d4621b58..d1b7cfa967 100644 --- a/windows/security/threat-protection/mbsa-removal-and-guidance.md +++ b/windows/security/threat-protection/mbsa-removal-and-guidance.md @@ -5,7 +5,7 @@ keywords: MBSA, security, removal ms.prod: w10 ms.mktglfcycl: deploy ms.localizationpriority: medium -ms.author: dolmont +ms.author: dansimp author: dulcemontemayor ms.date: 10/05/2018 ms.reviewer: diff --git a/windows/security/threat-protection/override-mitigation-options-for-app-related-security-policies.md b/windows/security/threat-protection/override-mitigation-options-for-app-related-security-policies.md index 00ba76594e..08c1046f15 100644 --- a/windows/security/threat-protection/override-mitigation-options-for-app-related-security-policies.md +++ b/windows/security/threat-protection/override-mitigation-options-for-app-related-security-policies.md @@ -1,7 +1,8 @@ +--- ms.date: 04/19/2017 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp --- title: Override Process Mitigation Options to help enforce app-related security policies (Windows 10) description: How to use Group Policy to override individual Process Mitigation Options settings and to help enforce specific app-related security policies. diff --git a/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10.md b/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10.md index 06c44d0ef2..25342b7cce 100644 --- a/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10.md +++ b/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10.md @@ -1,6 +1,6 @@ --- title: Mitigate threats by using Windows 10 security features (Windows 10) -description: This topic provides an overview of software and firmware threats faced in the current security landscape, and the mitigations that Windows 10 offers in response to these threats. +description: This topic provides an overview of software and firmware threats faced in the current security landscape, and the mitigations that Windows 10 offers in response to these threats. ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library @@ -10,7 +10,7 @@ author: dulcemontemayor ms.date: 10/13/2017 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp --- # Mitigate threats by using Windows 10 security features diff --git a/windows/security/threat-protection/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices.md b/windows/security/threat-protection/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices.md index a0f5a549a6..1f3bb33e56 100644 --- a/windows/security/threat-protection/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices.md +++ b/windows/security/threat-protection/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices.md @@ -4,14 +4,13 @@ description: This article details an end-to-end solution that helps you protect ms.assetid: 45DB1C41-C35D-43C9-A274-3AD5F31FE873 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp keywords: security, BYOD, malware, device health attestation, mobile ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security, devices author: dulcemontemayor - ms.date: 10/13/2017 ms.localizationpriority: medium --- diff --git a/windows/security/threat-protection/security-compliance-toolkit-10.md b/windows/security/threat-protection/security-compliance-toolkit-10.md index 7036973802..8ce51363fd 100644 --- a/windows/security/threat-protection/security-compliance-toolkit-10.md +++ b/windows/security/threat-protection/security-compliance-toolkit-10.md @@ -5,7 +5,7 @@ keywords: virtualization, security, malware ms.prod: w10 ms.mktglfcycl: deploy ms.localizationpriority: medium -ms.author: dolmont +ms.author: dansimp author: dulcemontemayor manager: dansimp audience: ITPro diff --git a/windows/security/threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection.md b/windows/security/threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection.md index 300f56c569..51ff05189a 100644 --- a/windows/security/threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection.md +++ b/windows/security/threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection.md @@ -4,7 +4,7 @@ description: Learn about an approach to collect events from devices in your orga ms.assetid: 733263E5-7FD1-45D2-914A-184B9E3E6A3F ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/wannacrypt-ransomware-worm-targets-out-of-date-systems-wdsi.md b/windows/security/threat-protection/wannacrypt-ransomware-worm-targets-out-of-date-systems-wdsi.md index 9901c940a8..0d3be5701f 100644 --- a/windows/security/threat-protection/wannacrypt-ransomware-worm-targets-out-of-date-systems-wdsi.md +++ b/windows/security/threat-protection/wannacrypt-ransomware-worm-targets-out-of-date-systems-wdsi.md @@ -12,7 +12,7 @@ author: dulcemontemayor ms.date: 07/27/2017 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp --- # WannaCrypt ransomware worm targets out-of-date systems diff --git a/windows/security/threat-protection/windows-10-mobile-security-guide.md b/windows/security/threat-protection/windows-10-mobile-security-guide.md index 0389c92dd6..eede2665f7 100644 --- a/windows/security/threat-protection/windows-10-mobile-security-guide.md +++ b/windows/security/threat-protection/windows-10-mobile-security-guide.md @@ -4,7 +4,7 @@ description: This guide provides a detailed description of the most important se ms.assetid: D51EF508-699E-4A68-A7CD-91D821A97205 ms.reviewer: manager: dansimp -ms.author: dolmont +ms.author: dansimp keywords: data protection, encryption, malware resistance, smartphone, device, Microsoft Store ms.prod: w10 ms.mktglfcycl: manage diff --git a/windows/security/threat-protection/windows-platform-common-criteria.md b/windows/security/threat-protection/windows-platform-common-criteria.md index 149ba35f1d..f2d8e10f0a 100644 --- a/windows/security/threat-protection/windows-platform-common-criteria.md +++ b/windows/security/threat-protection/windows-platform-common-criteria.md @@ -4,7 +4,7 @@ description: This topic details how Microsoft supports the Common Criteria certi ms.prod: w10 audience: ITPro author: dulcemontemayor -ms.author: dolmont +ms.author: dansimp manager: dansimp ms.collection: M365-identity-device-management ms.topic: article diff --git a/windows/security/threat-protection/windows-security-baselines.md b/windows/security/threat-protection/windows-security-baselines.md index 9a3a439e54..e59d8d582b 100644 --- a/windows/security/threat-protection/windows-security-baselines.md +++ b/windows/security/threat-protection/windows-security-baselines.md @@ -5,7 +5,7 @@ keywords: virtualization, security, malware ms.prod: w10 ms.mktglfcycl: deploy ms.localizationpriority: medium -ms.author: dolmont +ms.author: dansimp author: dulcemontemayor manager: dansimp audience: ITPro From a947d8d255c4f0279cc3424fd03991e61fed9103 Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Mon, 9 Sep 2019 16:45:26 -0700 Subject: [PATCH 125/285] Added MTE option --- .../microsoft-defender-atp/respond-machine-alerts.md | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts.md index d9cfb97c3f..725c73c363 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts.md @@ -173,6 +173,13 @@ When a machine is being isolated, the following notification is displayed to inf ![Image of no network connection](images/atp-notification-isolate.png) +## Consult a threat expert + +You can consult a Microsoft threat expert for more insights regarding a potentially compromised machine or already compromised ones. Microsoft Threat Experts can be engaged directly from within the Microsoft Defender Security Center for timely and accurate response. Experts provide insights not just regarding a potentially compromised machine, but also to better understand complex threats, targeted attack notifications that you get, or if you need more information about the alerts, or a threat intelligence context that you see on your portal dashboard. + +See [Consult a Microsoft Threat Expert](https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts#consult-a-microsoft-threat-expert-about-suspicious-cybersecurity-activities-in-your-organization) for details. + + ## Check activity details in Action center The **Action center** provides information on actions that were taken on a machine or file. You’ll be able to view the following details: From 19a286aa062397f8ace113bab46299a48623f49c Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Mon, 9 Sep 2019 16:56:37 -0700 Subject: [PATCH 126/285] Added MTE option --- .../microsoft-defender-atp/respond-file-alerts.md | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md index 3910cda2ff..3981dddb91 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md @@ -157,6 +157,12 @@ When you select this action, a fly-out will appear. From the fly-out, you can re If a file is not already stored by Microsoft Defender ATP, you cannot download it. Instead, you will see a **Collect file** button in the same location. If a file has not been seen in the organization in the past 30 days, **Collect file** will be disabled. +## Consult a threat expert + +You can consult a Microsoft threat expert for more insights regarding a potentially compromised machine or already compromised ones. Microsoft Threat Experts can be engaged directly from within the Microsoft Defender Security Center for timely and accurate response. Experts provide insights not just regarding a potentially compromised machine, but also to better understand complex threats, targeted attack notifications that you get, or if you need more information about the alerts, or a threat intelligence context that you see on your portal dashboard. + +See [Consult a Microsoft Threat Expert](https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts#consult-a-microsoft-threat-expert-about-suspicious-cybersecurity-activities-in-your-organization) for details. + ## Check activity details in Action center The **Action center** provides information on actions that were taken on a machine or file. You’ll be able to view the following details: From b528fb3eb47d813adb6a28cb9da8dda09b602d93 Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Mon, 9 Sep 2019 17:04:54 -0700 Subject: [PATCH 127/285] Added MTE options in response action topics --- windows/security/threat-protection/TOC.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/windows/security/threat-protection/TOC.md b/windows/security/threat-protection/TOC.md index 5f3fdf726a..65eace7419 100644 --- a/windows/security/threat-protection/TOC.md +++ b/windows/security/threat-protection/TOC.md @@ -71,6 +71,7 @@ ###### [Run antivirus scan](microsoft-defender-atp/respond-machine-alerts.md#run-windows-defender-antivirus-scan-on-machines) ###### [Restrict app execution](microsoft-defender-atp/respond-machine-alerts.md#restrict-app-execution) ###### [Isolate machines from the network](microsoft-defender-atp/respond-machine-alerts.md#isolate-machines-from-the-network) +###### [Consult a threat expert](microsoft-defender-atp/respond-machine-alerts.md#consult-a-threat-expert) ####### [Check activity details in Action center](microsoft-defender-atp/respond-machine-alerts.md#check-activity-details-in-action-center) ##### [Take response actions on a file]() @@ -84,6 +85,7 @@ ###### [Submit files for analysis](microsoft-defender-atp/respond-file-alerts.md#submit-files-for-analysis) ###### [View deep analysis reports](microsoft-defender-atp/respond-file-alerts.md#view-deep-analysis-reports) ###### [Troubleshoot deep analysis](microsoft-defender-atp/respond-file-alerts.md#troubleshoot-deep-analysis) +###### [Consult a threat expert](microsoft-defender-atp/respond-file-alerts.md#consult-a-threat-expert) ##### [Investigate entities using Live response]() ###### [Investigate entities on machines](microsoft-defender-atp/live-response.md) From c9be336b944eef430535eed472423b0ad464b65f Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Mon, 9 Sep 2019 17:10:40 -0700 Subject: [PATCH 128/285] Update TOC.md --- windows/security/threat-protection/TOC.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/TOC.md b/windows/security/threat-protection/TOC.md index 65eace7419..3f05539868 100644 --- a/windows/security/threat-protection/TOC.md +++ b/windows/security/threat-protection/TOC.md @@ -79,13 +79,14 @@ ###### [Stop and quarantine files in your network](microsoft-defender-atp/respond-file-alerts.md#stop-and-quarantine-files-in-your-network) ###### [Restore file from quarantine](microsoft-defender-atp/respond-file-alerts.md#restore-file-from-quarantine) ###### [Add indicators to block or allow a file](microsoft-defender-atp/respond-file-alerts.md#add-indicator-to-block-or-allow-a-file) +###### [Consult a threat expert](microsoft-defender-atp/respond-file-alerts.md#consult-a-threat-expert) ###### [Check activity details in Action center](microsoft-defender-atp/respond-file-alerts.md#check-activity-details-in-action-center) ###### [Download or collect file](microsoft-defender-atp/respond-file-alerts.md#download-or-collect-file) ###### [Deep analysis](microsoft-defender-atp/respond-file-alerts.md#deep-analysis) ###### [Submit files for analysis](microsoft-defender-atp/respond-file-alerts.md#submit-files-for-analysis) ###### [View deep analysis reports](microsoft-defender-atp/respond-file-alerts.md#view-deep-analysis-reports) ###### [Troubleshoot deep analysis](microsoft-defender-atp/respond-file-alerts.md#troubleshoot-deep-analysis) -###### [Consult a threat expert](microsoft-defender-atp/respond-file-alerts.md#consult-a-threat-expert) + ##### [Investigate entities using Live response]() ###### [Investigate entities on machines](microsoft-defender-atp/live-response.md) From f3e92363f623fd02ddc229e99eaed9244d516216 Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Mon, 9 Sep 2019 17:20:40 -0700 Subject: [PATCH 129/285] Update TOC.md --- windows/security/threat-protection/TOC.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/TOC.md b/windows/security/threat-protection/TOC.md index 3f05539868..0b5d121637 100644 --- a/windows/security/threat-protection/TOC.md +++ b/windows/security/threat-protection/TOC.md @@ -72,7 +72,7 @@ ###### [Restrict app execution](microsoft-defender-atp/respond-machine-alerts.md#restrict-app-execution) ###### [Isolate machines from the network](microsoft-defender-atp/respond-machine-alerts.md#isolate-machines-from-the-network) ###### [Consult a threat expert](microsoft-defender-atp/respond-machine-alerts.md#consult-a-threat-expert) -####### [Check activity details in Action center](microsoft-defender-atp/respond-machine-alerts.md#check-activity-details-in-action-center) +###### [Check activity details in Action center](microsoft-defender-atp/respond-machine-alerts.md#check-activity-details-in-action-center) ##### [Take response actions on a file]() ###### [Response actions on files](microsoft-defender-atp/respond-file-alerts.md) From efb0c53adb5a94214fa0abe82a36b95a467b9371 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Mon, 9 Sep 2019 17:28:11 -0700 Subject: [PATCH 131/285] Delete surface.yml Remove surface.yml --- devices/surface/surface.yml | 61 ------------------------------------- 1 file changed, 61 deletions(-) delete mode 100644 devices/surface/surface.yml diff --git a/devices/surface/surface.yml b/devices/surface/surface.yml deleted file mode 100644 index 8287763c1e..0000000000 --- a/devices/surface/surface.yml +++ /dev/null @@ -1,61 +0,0 @@ -### YamlMime:YamlDocument - -documentType: LandingData -title: Surface devices -metadata: - document_id: - title: Surface devices - description: Find tools, step-by-step guides, and other resources to help you plan, deploy, and manage Surface devices in your organization. - keywords: Windows 10, issues, fixes, announcements, Windows Server, advisories - ms.localizationpriority: medium - author: lizap - ms.author: elizapo - manager: dougkim - ms.topic: article - ms.devlang: na - -sections: -- items: - - type: markdown - text: " - Find tools, step-by-step guides, and other resources to help you plan, deploy, and manage Surface devices in your organization. - " -- title: Explore -- items: - - type: markdown - text: " - Evaluate the Surface device portfolio, review the tools and technologies for management of your Surface devices, and learn about Surface technologies and devices with engineering walkthroughs.
- -

**Surface Pro**
Light enough to take anywhere. Powerful enough to use as a full desktop workstation.
See spec

**Surface Book**
Built for extreme performance. Lightning fast access to apps. Up to 16 hours of battery life.
See spec

**Surface Studio**
Professional-grade power and performance. Use it upright or draw on it like a drafting table.
See spec
- " -- title: Plan -- items: - - type: markdown - text: " - Explore essential concepts for the deployment of Windows 10 to Surface devices.
- -

**Try Windows 10 Enterprise free for 90 days**
Try the latest features. Test your apps, hardware, and deployment strategies.
Get started

**Windows 10 upgrade paths**
Upgrade to Windows 10 from a previous version, or from one edition to another.
Explore paths

**Prepare for Windows 10 deployment**
Get familiar with current deployment options and best practices.
Review options
- " -- title: Deploy -- items: - - type: markdown - text: " - Download deployment tools and get step-by-step guidance on how to upgrade a Surface device or deploy a new image.
- -

**Microsoft Deployment Toolkit (MDT)**
Automate Windows 10 deployment, and more easily manage security and configurations.
Download the toolkit

**System Center Configuration Manager**
Use in tandem with MDT to deploy Windows 10 and manage PCs and devices moving forward.
Download an eval

**Surface Deployment Accelerator**
Automate the creation and configuration of Windows images for Surface devices.
Download the accelerator
- " -- title: Manage -- items: - - type: markdown - text: " - Learn how to more easily manage and secure Surface devices in your organization.
- -

**Manage Surface firmware and driver updates**
Download the latest firmware and drivers for Surface devices.
Manage Surface Dock Updater.
Surface update history

**Discover Surface tools for IT**
Surface Diagnostic Toolkit
Surface Data Eraser
Surface Enterprise Management Mode
Surface Pro 3 Asset Tag CLI Utility

**Manage settings and devices**
Manage Windows corporate devices
Manage Surface UEFI Settings
Bitlocker PIN on Surface Pro 3 and other tablets
Enroll and configure Surface devices with SEMM
- " -- title: Stay informed -- items: - - type: markdown - text: " - -

**Surface IT Pro Blog**
Get insight into new Surface products plus tips and tricks for IT professionals.
Learn more

**Surface on Microsoft Mechanics**
View technical demos and walkthroughs of Surface devices, features, and functionality.
Get started

**Follow us on Twitter**
Keep up with the latest news and see the latest product demonstrations.
Visit Twitter
- " From b5634f37ccb5f0d098a81e7d766bfe537ee784c8 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Mon, 9 Sep 2019 17:51:46 -0700 Subject: [PATCH 132/285] Update surface-hub-2s-connect.md --- devices/surface-hub/surface-hub-2s-connect.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/surface-hub/surface-hub-2s-connect.md b/devices/surface-hub/surface-hub-2s-connect.md index 500be048ca..4743891b0c 100644 --- a/devices/surface-hub/surface-hub-2s-connect.md +++ b/devices/surface-hub/surface-hub-2s-connect.md @@ -23,7 +23,7 @@ You can display content from your devices to Surface Hub 2S. If the source devic ## Recommended wired configurations -In general, it’s recommended to use native cable connections whenever possible such as USB-C to USB-C or HDMI to HDMI. Other combinations such as MiniDP to HDMI or MiniDP to USB-C will also work. Some configuration may be required to optimize the video-out experience; refer to the section below: [Mirroring Surface Hub 2S display on another device](#). +In general, it’s recommended to use native cable connections whenever possible such as USB-C to USB-C or HDMI to HDMI. Other combinations such as MiniDP to HDMI or MiniDP to USB-C will also work. Some configuration may be required to optimize the video-out experience; refer to the section below: [Mirroring Surface Hub 2S display on another device](#Mirroring-Surface-Hub-2S-display-on-another-device). | **Connection** | **Functionality** | **Description**| | --- | --- | ---| From 1a10852d7f309ffb14069d8779decae68fcfef7c Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Mon, 9 Sep 2019 22:35:33 -0700 Subject: [PATCH 133/285] Spelled out acronym, fixed typo --- .../microsoft-defender-atp/tvm-security-recommendation.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation.md b/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation.md index f5dbb8135e..0c8c9f14f6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation.md @@ -23,12 +23,12 @@ ms.date: 04/11/2019 The cybersecurity weaknesses identified in your organization are mapped to actionable security recommendations and prioritized by their impact on the security recommendation list. Prioritized recommendation helps shorten the mean time to mitigate or remediate vulnerabilities and drive compliance. -Each security recommendation includes an actionable remediation recommendation which can be pushed into the IT task queue through a built-in integration with Microsoft Intune and SCCM. It is also dynamic in the sense that when the threat landscape changes, the recommendation also changes as it continuously collect information from your environment. +Each security recommendation includes an actionable remediation recommendation which can be pushed into the IT task queue through a built-in integration with Microsoft Intune and Microsoft System Center Configuration Manager (SCCM). It is also dynamic in the sense that when the threat landscape changes, the recommendation also changes as it continuously collect information from your environment. ## The basis of the security recommendation Each machine in the organization is scored based on three important factors: threat, likelihood to be breached, and value, to help customers to focus on the right things at the right time. -- Threat - Characteristics of the vulnerabilities and exploits in your organizations' devices and breach history. Based on these factors, the security recommendations shows the correponding links to active alerts, ongoing threat campaigns, and their corresponding threat analytic reports. +- Threat - Characteristics of the vulnerabilities and exploits in your organizations' devices and breach history. Based on these factors, the security recommendations shows the corresponding links to active alerts, ongoing threat campaigns, and their corresponding threat analytic reports. - Breach likelihood - Your organization's security posture and resilience against threats @@ -36,7 +36,7 @@ Each machine in the organization is scored based on three important factors: thr ## Navigate through your security recommendations -You can access the security recommendation from the Microsoft Defender ATP Threat & Vulnerability Management menu, dashboard, software page, and machine page, to give you the context that you need as you require it. +You can access the security recommendation from the Microsoft Defender ATP Threat & Vulnerability Management menu, dashboard, software page, and machine page, to give you the context that you need, as you require it. There are security recommendations for application, operating system, network, accounts, and security controls. From bde0753b44cb8d633a2cd0756ce2960d8c1c72ea Mon Sep 17 00:00:00 2001 From: martyav Date: Tue, 10 Sep 2019 11:24:32 -0400 Subject: [PATCH 134/285] correcting debranded eg redirects --- .openpublishing.redirection.json | 13 +++++++++---- 1 file changed, 9 insertions(+), 4 deletions(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index d27244616a..5b3aa440d2 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -626,8 +626,13 @@ "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/oldtoc.md", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection", +"redirect_document_id": false +}, +{ "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-rules-in-windows-10-enterprise-e3.md", -"redirect_url": "windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction-rules-in-windows-10-enterprise-e3", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction-rules-in-windows-10-enterprise-e3", "redirect_document_id": true }, { @@ -817,7 +822,7 @@ }, { "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/enable-controlled-folders-exploit-guard", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/enable-controlled-folders", "redirect_document_id": true }, { @@ -887,7 +892,7 @@ }, { "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/evaluate-windows-defender-exploit-guard.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/evaluate-windows-defender", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/evaluate-atp", "redirect_document_id": true }, { @@ -907,7 +912,7 @@ }, { "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/exploit-protection-exploit-guard", +"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/exploit-protection", "redirect_document_id": true }, { From f3a940cbfbe1ac959acc09333bf3942abd28bb99 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Tue, 10 Sep 2019 08:28:29 -0700 Subject: [PATCH 135/285] Update surface-hub-2s-connect.md --- devices/surface-hub/surface-hub-2s-connect.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/surface-hub/surface-hub-2s-connect.md b/devices/surface-hub/surface-hub-2s-connect.md index 4743891b0c..db57e3ee37 100644 --- a/devices/surface-hub/surface-hub-2s-connect.md +++ b/devices/surface-hub/surface-hub-2s-connect.md @@ -14,7 +14,7 @@ ms.localizationpriority: Medium --- # Connect devices to Surface Hub 2S -Surface Hub 2S lets you connect external devices, mirror the display on Surface Hub 2S to another device, and connect a wide variety of third-party peripherals including video conference cameras, conference phones, and room system devices. +Surface Hub 2S lets you connect external devices, mirror the display on Surface Hub 2S to another device, and connect multiple third-party peripherals including video conference cameras, conference phones, and room system devices. You can display content from your devices to Surface Hub 2S. If the source device is Windows-based, that device can also provide TouchBack and InkBack, which takes video and audio from the connected device and presents them on Surface Hub 2S. If Surface Hub 2S encounters a High-Bandwidth Digital Content Protection (HDCP) signal, such as a Blu-ray DVD player, the source is displayed as a black image. From 483934a83d80a5f70956a7e2963c99fbf30078c9 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Tue, 10 Sep 2019 08:34:26 -0700 Subject: [PATCH 136/285] Update whiteboard-collaboration.md --- devices/surface-hub/whiteboard-collaboration.md | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/devices/surface-hub/whiteboard-collaboration.md b/devices/surface-hub/whiteboard-collaboration.md index c5e5a979bf..1b85feaf12 100644 --- a/devices/surface-hub/whiteboard-collaboration.md +++ b/devices/surface-hub/whiteboard-collaboration.md @@ -12,8 +12,6 @@ manager: dansimp ms.localizationpriority: medium --- -# Set up and use Microsoft Whiteboard - # Set up and use Microsoft Whiteboard The Microsoft Whiteboard app includes the capability for Surface Hubs and other devices to collaborate in real time on the same board. @@ -31,7 +29,7 @@ To use whiteboard collaboration complete the following actions: - You can only run collaborative sessions among users belonging to the same Office 365 tenant. - Office 365 Germany or Office 365 operated by 21Vianet do not support whiteboard collaboration. -## Using Whiteboard collaboration +## Collaborating with whiteboards To start a collaboration session: From acf3e6d553a7d545a444bac15c3b24bf1e8cf859 Mon Sep 17 00:00:00 2001 From: martyav Date: Tue, 10 Sep 2019 12:12:28 -0400 Subject: [PATCH 137/285] fixed build warning --- .openpublishing.redirection.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 5b3aa440d2..d6a71496e2 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -893,7 +893,7 @@ { "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/evaluate-windows-defender-exploit-guard.md", "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/evaluate-atp", -"redirect_document_id": true +"redirect_document_id": false }, { "source_path": "windows/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md", From 5efb63490255229df888681cdc13dd24c35ccc61 Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Tue, 10 Sep 2019 09:35:31 -0700 Subject: [PATCH 138/285] Update ransomware-malware.md Fixed broken link to CFA --- .../threat-protection/intelligence/ransomware-malware.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/intelligence/ransomware-malware.md b/windows/security/threat-protection/intelligence/ransomware-malware.md index 5ebb6aa87a..b992070322 100644 --- a/windows/security/threat-protection/intelligence/ransomware-malware.md +++ b/windows/security/threat-protection/intelligence/ransomware-malware.md @@ -61,6 +61,6 @@ We recommend: * Educate your employees so they can identify social engineering and spear-phishing attacks. -* [Controlled folder access](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard). It can stop ransomware from encrypting files and holding the files for ransom. +* [Controlled folder access](https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/controlled-folders). It can stop ransomware from encrypting files and holding the files for ransom. For more general tips, see [prevent malware infection](prevent-malware-infection.md). From ed01645e35dc0f5ac0bce170b6adcba1e07dfb41 Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Tue, 10 Sep 2019 10:02:50 -0700 Subject: [PATCH 139/285] Added update to run the task Updated the document as suggested by the user to update the XML file created by GP preference. Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/4797 --- .../microsoft-defender-atp/configure-endpoints-gp.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md index ca40875aab..ea09c6df8c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md @@ -35,6 +35,8 @@ ms.date: 04/24/2018 > [!NOTE] > To use Group Policy (GP) updates to deploy the package, you must be on Windows Server 2008 R2 or later. +> For Windows Server 2019, you may need to replace NT AUTHORITY\Well-Known-System-Account with NT AUTHORITY\SYSTEM of XML file that Group Policy preference creates. + ## Onboard machines using Group Policy 1. Open the GP configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from [Microsoft Defender Security Center](https://securitycenter.windows.com/): From 8034dddbbdb62878a59412ee602d37825ba9ed3a Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Tue, 10 Sep 2019 10:26:56 -0700 Subject: [PATCH 140/285] pull from public to private and fix warnings --- mdop/mbam-v25/upgrade-mbam2.5-sp1.md | 4 ++-- .../client-management/introduction-page-file.md | 14 +++++--------- 2 files changed, 7 insertions(+), 11 deletions(-) diff --git a/mdop/mbam-v25/upgrade-mbam2.5-sp1.md b/mdop/mbam-v25/upgrade-mbam2.5-sp1.md index 18e3f0554a..491bee386a 100644 --- a/mdop/mbam-v25/upgrade-mbam2.5-sp1.md +++ b/mdop/mbam-v25/upgrade-mbam2.5-sp1.md @@ -2,10 +2,10 @@ title: Upgrading from MBAM 2.5 to MBAM 2.5 SP1 Servicing Release Update author: TobyTu ms.author: ksharma -manager: DCSCPMCAIM365 +manager: audience: ITPro ms.topic: article -ms.prod: mbam +ms.prod: localization_priority: Normal --- diff --git a/windows/client-management/introduction-page-file.md b/windows/client-management/introduction-page-file.md index 747ac0b22a..853c4fda96 100644 --- a/windows/client-management/introduction-page-file.md +++ b/windows/client-management/introduction-page-file.md @@ -7,9 +7,8 @@ ms.topic: troubleshooting author: Deland-Han ms.localizationpriority: medium ms.author: delhan -ms.date: 8/22/2019 -ms.reviewer: -manager: dcscontentpm +ms.reviewer: greglin +manager: --- # Introduction to page files @@ -31,11 +30,8 @@ Some products or services require a page file for various reasons. For specific For example, the following Windows servers requires page files: - Windows Server domain controllers (DCs) - - DFS Replication (DFS-R) servers - - Certificate servers - - ADAM/LDS servers This is because the algorithm of the database cache for Extensible Storage Engine (ESENT, or ESE in Microsoft Exchange Server) depends on the "\Memory\Transition Pages RePurposed/sec" performance monitor counter. A page file is required to make sure that the database cache can release memory if other services or applications request memory. @@ -60,13 +56,13 @@ Page files extend how much "committed memory" (also known as "virtual memory") i The system commit memory limit is the sum of physical memory and all page files combined. It represents the maximum system-committed memory (also known as the "system commit charge") that the system can support. -![Task manager](media/task-manager.png) +![Task manager](images/task-manager.png) The system commit charge is the total committed or "promised" memory of all committed virtual memory in the system. If the system commit charge reaches the system commit limit, the system and processes might not get committed memory. This condition can cause freezing, crashing, and other malfunctions. Therefore, make sure that you set the system commit limit high enough to support the system commit charge during peak usage. -![Out of memory](media/out-of-memory.png) +![Out of memory](images/out-of-memory.png) -![Task Manager](media/task-manager-commit.png) +![Task Manager](images/task-manager-commit.png) The system committed charge and system committed limit can be measured on the **Performance** tab in Task Manager or by using the "\Memory\Committed Bytes" and "\Memory\Commit Limit" performance counters. The \Memory\% Committed Bytes In Use counter is a ratio of \Memory\Committed Bytes to \Memory\Commit Limit values. From f881bf019a8a2f525ba0616d9221d00bf55a90fc Mon Sep 17 00:00:00 2001 From: John Liu <49762389+ShenLanJohn@users.noreply.github.com> Date: Tue, 10 Sep 2019 10:50:36 -0700 Subject: [PATCH 141/285] CAT Auto Pulish for Windows Release Messages - CAT_AutoPublish_20190910100213 (#1073) --- .../resolved-issues-windows-10-1607.yml | 2 ++ ...ssues-windows-10-1809-and-windows-server-2019.yml | 2 -- .../resolved-issues-windows-10-1903.yml | 10 ++++++++++ .../release-information/status-windows-10-1507.yml | 2 -- ...tatus-windows-10-1607-and-windows-server-2016.yml | 6 ++---- .../release-information/status-windows-10-1703.yml | 2 -- .../release-information/status-windows-10-1709.yml | 2 -- .../release-information/status-windows-10-1803.yml | 2 -- ...tatus-windows-10-1809-and-windows-server-2019.yml | 2 -- .../release-information/status-windows-10-1903.yml | 6 ++---- ...atus-windows-7-and-windows-server-2008-r2-sp1.yml | 12 ++++++++++-- ...status-windows-8.1-and-windows-server-2012-r2.yml | 2 -- .../status-windows-server-2008-sp2.yml | 2 -- .../status-windows-server-2012.yml | 2 -- .../release-information/windows-message-center.yml | 1 + 15 files changed, 27 insertions(+), 28 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1607.yml b/windows/release-information/resolved-issues-windows-10-1607.yml index 6f92dbe2b1..6f568f3c14 100644 --- a/windows/release-information/resolved-issues-windows-10-1607.yml +++ b/windows/release-information/resolved-issues-windows-10-1607.yml @@ -32,6 +32,7 @@ sections: - type: markdown text: " + @@ -70,6 +71,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusDate resolved
Apps and scripts using the NetQueryDisplayInformation API may fail with error
Applications and scripts that call the NetQueryDisplayInformation API or the WinNT provider equivalent may fail to return results after the first page of data.

See details >
OS Build 14393.3053

June 18, 2019
KB4503294
Resolved
KB4516044
September 10, 2019
10:00 AM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 14393.3115

July 16, 2019
KB4507459
Resolved
KB4512517
August 13, 2019
10:00 AM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
OS Build 14393.3025

June 11, 2019
KB4503267
Resolved
KB4512495
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 14393.3144

August 13, 2019
KB4512517
Resolved
KB4512495
August 17, 2019
02:00 PM PT
+
DetailsOriginating updateStatusHistory
Apps and scripts using the NetQueryDisplayInformation API may fail with error
 Applications and scripts that call the NetQueryDisplayInformation API or the WinNT provider equivalent may fail to return results after the first page of data, often 50 or 100 entries. When requesting additional pages you may receive the error, “1359: an internal error occurred.”

Affected platforms:
  • Server: Windows Server 2019; Windows Server 2016
Resolution: This issue was resolved in KB4516044.

Back to top
OS Build 14393.3053

June 18, 2019
KB4503294
Resolved
KB4516044
Resolved:
September 10, 2019
10:00 AM PT

Opened:
August 01, 2019
05:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512517, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4512495. This ‘optional’ update is available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive KB4512495 and install. For instructions, see Update Windows 10.

Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS).

Back to top
OS Build 14393.3144

August 13, 2019
KB4512517
Resolved
KB4512495
Resolved:
August 17, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on your Apple MacOS device when trying to access network shares via CIFS or SMBv1 on a Windows devices that has installed updates on June 11, 2019 (KB4503267) or later. When you encounter this issue, in MacOS you may receive the error, “There was a problem connecting to the server “{Server Host Name}”. Check the server name or IP address, and then try again. If you continue to have problems, contact your system administrator.”

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: For guidance on this issue, see the Apple support article If your Mac can't use NTLM to connect to a Windows server. There is no update for Windows needed for this issue.

Back to top
OS Build 14393.3025

June 11, 2019
KB4503267
Resolved External
Last updated:
August 09, 2019
07:03 PM PT

Opened:
August 09, 2019
04:25 PM PT
diff --git a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml index 81e2a0f077..37df3391a5 100644 --- a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml @@ -55,7 +55,6 @@ sections:
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >OS Build 17763.404

April 02, 2019
KB4490481Resolved
KB4493509April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >OS Build 17763.253

January 08, 2019
KB4480116Resolved
KB4493509April 09, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

See details >OS Build 17763.316

February 12, 2019
KB4487044Resolved
KB4489899March 12, 2019
10:00 AM PT -
Global DNS outage affects Windows Update customers
Windows Update customers were recently affected by a network infrastructure event caused by an external DNS service provider's global outage.

See details >N/A

Resolved
March 08, 2019
11:15 AM PT
Apps may stop working after selecting an audio output device other than the default
Users with multiple audio devices that select an audio output device different from the \"Default Audio Device\" may find certain applications stop working unexpectedly.

See details >OS Build 17763.348

March 01, 2019
KB4482887Resolved
KB4490481April 02, 2019
10:00 AM PT " @@ -152,7 +151,6 @@ sections: -
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480116, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to: 
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Global DNS outage affects Windows Update customers
Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider's global outage. A software update to the external provider's DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
While this was not an issue with Microsoft's services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers. 
 
If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you. 

Back to top
N/A

Resolved
Resolved:
March 08, 2019
11:15 AM PT

Opened:
January 29, 2019
02:00 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1903.yml b/windows/release-information/resolved-issues-windows-10-1903.yml index 56fb3d90af..348d00243a 100644 --- a/windows/release-information/resolved-issues-windows-10-1903.yml +++ b/windows/release-information/resolved-issues-windows-10-1903.yml @@ -32,6 +32,7 @@ sections: - type: markdown text: " + @@ -59,6 +60,15 @@ sections:
" +- title: September 2019 +- items: + - type: markdown + text: " +
SummaryOriginating updateStatusDate resolved
Windows Desktop Search may not return any results and may have high CPU usage
Windows Desktop Search may not return any results and SearchUI.exe may have high CPU usage after installing KB4512941.

See details >
OS Build 18362.329

August 30, 2019
KB4512941
Resolved
KB4515384
September 10, 2019
10:00 AM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 18362.145

May 29, 2019
KB4497935
Resolved
KB4512941
August 30, 2019
10:00 AM PT
Issues updating when certain versions of Intel storage drivers are installed
Certain versions of Intel Rapid Storage Technology (Intel RST) drivers may cause updating to Windows 10, version 1903 to fail.

See details >
OS Build 18362.145

May 29, 2019
KB4497935
Resolved
KB4512941
August 30, 2019
10:00 AM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 18362.295

August 13, 2019
KB4512508
Resolved
KB4512941
August 30, 2019
10:00 AM PT
+ +
DetailsOriginating updateStatusHistory
Windows Desktop Search may not return any results and may have high CPU usage
Microsoft is getting reports that a small number of users may not receive results when using Windows Desktop Search and may see high CPU usage from SearchUI.exe when searching after installing KB4512941. This issue is only encountered on devices in which searching the web from Windows Desktop Search has been disabled.

Affected platforms:
  • Client: Windows 10, version 1903
Resolution: This issue was resolved in KB4515384.

Back to top
OS Build 18362.329

August 30, 2019
KB4512941
Resolved
KB4515384
Resolved:
September 10, 2019
10:00 AM PT

Opened:
September 04, 2019
02:25 PM PT
+ " + - title: August 2019 - items: - type: markdown diff --git a/windows/release-information/status-windows-10-1507.yml b/windows/release-information/status-windows-10-1507.yml index 9a8ebe8053..a764bbb877 100644 --- a/windows/release-information/status-windows-10-1507.yml +++ b/windows/release-information/status-windows-10-1507.yml @@ -61,7 +61,6 @@ sections: text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

-
SummaryOriginating updateStatusLast updated
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 10240.18305

August 13, 2019
KB4512497
Resolved
KB4517276
August 17, 2019
02:00 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >
OS Build 10240.18244

June 11, 2019
KB4503291
Resolved External
August 09, 2019
07:03 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Mitigated
April 25, 2019
02:00 PM PT
" @@ -79,7 +78,6 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512497, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4517276. This ‘optional’ update is available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive KB4517276 and install. For instructions, see Update Windows 10.

Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS).

Back to top
OS Build 10240.18305

August 13, 2019
KB4512497
Resolved
KB4517276
Resolved:
August 17, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on your Apple MacOS device when trying to access network shares via CIFS or SMBv1 on a Windows devices that has installed updates on June 11, 2019 (KB4503291) or later. When you encounter this issue, in MacOS you may receive the error, “There was a problem connecting to the server “{Server Host Name}”. Check the server name or IP address, and then try again. If you continue to have problems, contact your system administrator.”

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: For guidance on this issue, see the Apple support article If your Mac can't use NTLM to connect to a Windows server. There is no update for Windows needed for this issue.

Back to top
OS Build 10240.18244

June 11, 2019
KB4503291
Resolved External
Last updated:
August 09, 2019
07:03 PM PT

Opened:
August 09, 2019
04:25 PM PT
" diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index da23159b5b..208a38f5dd 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -60,12 +60,11 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ - - @@ -84,9 +83,8 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
Apps and scripts using the NetQueryDisplayInformation API may fail with error
Applications and scripts that call the NetQueryDisplayInformation API or the WinNT provider equivalent may fail to return results after the first page of data.

See details >
OS Build 14393.3053

June 18, 2019
KB4503294
Resolved
KB4516044
September 10, 2019
10:00 AM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 14393.3115

July 16, 2019
KB4507459
Resolved
KB4512517
August 13, 2019
10:00 AM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
OS Build 14393.3025

June 11, 2019
KB4503267
Resolved
KB4512495
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 14393.3144

August 13, 2019
KB4512517
Resolved
KB4512495
August 17, 2019
02:00 PM PT
Internet Explorer 11 and apps using the WebBrowser control may fail to render
JavaScript may fail to render as expected in Internet Explorer 11 and in apps using JavaScript or the WebBrowser control.

See details >
OS Build 14393.3085

July 09, 2019
KB4507460
Resolved
KB4512517
August 13, 2019
10:00 AM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >
OS Build 14393.3025

June 11, 2019
KB4503267
Resolved External
August 09, 2019
07:03 PM PT
Apps and scripts using the NetQueryDisplayInformation API may fail with error
Applications and scripts that call the NetQueryDisplayInformation API or the WinNT provider equivalent may fail to return results after the first page of data.

See details >
OS Build 14393.3053

June 18, 2019
KB4503294
Investigating
August 01, 2019
05:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Mitigated
April 25, 2019
02:00 PM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

See details >
OS Build 14393.2608

November 13, 2018
KB4467691
Mitigated
February 19, 2019
10:00 AM PT
Cluster service may fail if the minimum password length is set to greater than 14
The cluster service may fail to start with the error “2245 (NERR_PasswordTooShort)” if the Group Policy “Minimum Password Length” is configured with greater than 14 characters.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
April 25, 2019
02:00 PM PT
+ - -
DetailsOriginating updateStatusHistory
Apps and scripts using the NetQueryDisplayInformation API may fail with error
 Applications and scripts that call the NetQueryDisplayInformation API or the WinNT provider equivalent may fail to return results after the first page of data, often 50 or 100 entries. When requesting additional pages you may receive the error, “1359: an internal error occurred.”

Affected platforms:
  • Server: Windows Server 2019; Windows Server 2016
Resolution: This issue was resolved in KB4516044.

Back to top
OS Build 14393.3053

June 18, 2019
KB4503294
Resolved
KB4516044
Resolved:
September 10, 2019
10:00 AM PT

Opened:
August 01, 2019
05:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512517, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4512495. This ‘optional’ update is available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive KB4512495 and install. For instructions, see Update Windows 10.

Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS).

Back to top
OS Build 14393.3144

August 13, 2019
KB4512517
Resolved
KB4512495
Resolved:
August 17, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on your Apple MacOS device when trying to access network shares via CIFS or SMBv1 on a Windows devices that has installed updates on June 11, 2019 (KB4503267) or later. When you encounter this issue, in MacOS you may receive the error, “There was a problem connecting to the server “{Server Host Name}”. Check the server name or IP address, and then try again. If you continue to have problems, contact your system administrator.”

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: For guidance on this issue, see the Apple support article If your Mac can't use NTLM to connect to a Windows server. There is no update for Windows needed for this issue.

Back to top
OS Build 14393.3025

June 11, 2019
KB4503267
Resolved External
Last updated:
August 09, 2019
07:03 PM PT

Opened:
August 09, 2019
04:25 PM PT
Apps and scripts using the NetQueryDisplayInformation API may fail with error
 Applications and scripts that call the NetQueryDisplayInformation API or the WinNT provider equivalent may fail to return results after the first page of data, often 50 or 100 entries. When requesting additional pages you may receive the error, “1359: an internal error occurred.”

Affected platforms:
  • Server: Windows Server 2019; Windows Server 2016
Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.3053

June 18, 2019
KB4503294
Investigating
Last updated:
August 01, 2019
05:00 PM PT

Opened:
August 01, 2019
05:00 PM PT
" diff --git a/windows/release-information/status-windows-10-1703.yml b/windows/release-information/status-windows-10-1703.yml index 804da5f5fe..626ca1a8e2 100644 --- a/windows/release-information/status-windows-10-1703.yml +++ b/windows/release-information/status-windows-10-1703.yml @@ -68,7 +68,6 @@ sections: -
SummaryOriginating updateStatusLast updated
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 15063.1955

July 16, 2019
KB4507467
Resolved
KB4512507
August 13, 2019
10:00 AM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 15063.1988

August 13, 2019
KB4512507
Resolved
KB4512474
August 17, 2019
02:00 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >
OS Build 15063.1868

June 11, 2019
KB4503279
Resolved External
August 09, 2019
07:03 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Mitigated
April 25, 2019
02:00 PM PT
" @@ -86,7 +85,6 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512507, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4512474. This ‘optional’ update is available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive KB4512474 and install. For instructions, see Update Windows 10.

Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS).

Back to top
OS Build 15063.1988

August 13, 2019
KB4512507
Resolved
KB4512474
Resolved:
August 17, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on your Apple MacOS device when trying to access network shares via CIFS or SMBv1 on a Windows devices that has installed updates on June 11, 2019 (KB4503279) or later. When you encounter this issue, in MacOS you may receive the error, “There was a problem connecting to the server “{Server Host Name}”. Check the server name or IP address, and then try again. If you continue to have problems, contact your system administrator.”

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: For guidance on this issue, see the Apple support article If your Mac can't use NTLM to connect to a Windows server. There is no update for Windows needed for this issue.

Back to top
OS Build 15063.1868

June 11, 2019
KB4503279
Resolved External
Last updated:
August 09, 2019
07:03 PM PT

Opened:
August 09, 2019
04:25 PM PT
" diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index 27e013f10f..ef4bc11351 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -63,7 +63,6 @@ sections:
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >OS Build 16299.1296

July 16, 2019
KB4507465Resolved
KB4512516August 13, 2019
10:00 AM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >OS Build 16299.1217

June 11, 2019
KB4503284Resolved
KB4512494August 16, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >OS Build 16299.1331

August 13, 2019
KB4512516Resolved
KB4512494August 16, 2019
02:00 PM PT -
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >OS Build 16299.1217

June 11, 2019
KB4503284Resolved External
August 09, 2019
07:03 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >OS Build 16299.904

January 08, 2019
KB4480978Mitigated
April 25, 2019
02:00 PM PT " @@ -81,7 +80,6 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512516, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4512494. The ‘optional’ update will be available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive KB4512494 and install. For instructions, see Update Windows 10.

Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS).

Back to top
OS Build 16299.1331

August 13, 2019
KB4512516
Resolved
KB4512494
Resolved:
August 16, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on your Apple MacOS device when trying to access network shares via CIFS or SMBv1 on a Windows devices that has installed updates on June 11, 2019 (KB4503284) or later. When you encounter this issue, in MacOS you may receive the error, “There was a problem connecting to the server “{Server Host Name}”. Check the server name or IP address, and then try again. If you continue to have problems, contact your system administrator.”

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: For guidance on this issue, see the Apple support article If your Mac can't use NTLM to connect to a Windows server. There is no update for Windows needed for this issue.

Back to top
OS Build 16299.1217

June 11, 2019
KB4503284
Resolved External
Last updated:
August 09, 2019
07:03 PM PT

Opened:
August 09, 2019
04:25 PM PT
" diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml index 5b3d8b4dd9..a227eb41e0 100644 --- a/windows/release-information/status-windows-10-1803.yml +++ b/windows/release-information/status-windows-10-1803.yml @@ -69,7 +69,6 @@ sections:
Notification issue: \"Your device is missing important security and quality fixes.\"
Some users may have incorrectly received the notification \"Your device is missing important security and quality fixes.\"

See details >N/A

Resolved
September 03, 2019
12:32 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >OS Build 17134.829

June 11, 2019
KB4503286Resolved
KB4512509August 19, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >OS Build 17134.950

August 13, 2019
KB4512501Resolved
KB4512509August 19, 2019
02:00 PM PT -
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >OS Build 17134.829

June 11, 2019
KB4503286Resolved External
August 09, 2019
07:03 PM PT
Startup to a black screen after installing updates
Your device may startup to a black screen during the first logon after installing updates.

See details >OS Build 17134.829

June 11, 2019
KB4503286Mitigated
June 14, 2019
04:41 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >OS Build 17134.523

January 08, 2019
KB4480966Mitigated
April 25, 2019
02:00 PM PT @@ -97,7 +96,6 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512501, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4512509. The ‘optional’ update will be available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive KB4512509 and install. For instructions, see Update Windows 10.

Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS).

Back to top
OS Build 17134.950

August 13, 2019
KB4512501
Resolved
KB4512509
Resolved:
August 19, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on your Apple MacOS device when trying to access network shares via CIFS or SMBv1 on a Windows devices that has installed updates on June 11, 2019 (KB4503286) or later. When you encounter this issue, in MacOS you may receive the error, “There was a problem connecting to the server “{Server Host Name}”. Check the server name or IP address, and then try again. If you continue to have problems, contact your system administrator.”

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: For guidance on this issue, see the Apple support article If your Mac can't use NTLM to connect to a Windows server. There is no update for Windows needed for this issue.

Back to top
OS Build 17134.829

June 11, 2019
KB4503286
Resolved External
Last updated:
August 09, 2019
07:03 PM PT

Opened:
August 09, 2019
04:25 PM PT
" diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index d85effd748..d0f9c241ed 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -67,7 +67,6 @@ sections:
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >OS Build 17763.652

July 22, 2019
KB4505658Resolved
KB4511553August 13, 2019
10:00 AM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >OS Build 17763.557

June 11, 2019
KB4503327Resolved
KB4512534August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >OS Build 17763.678

August 13, 2019
KB4511553Resolved
KB4512534August 17, 2019
02:00 PM PT -
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >OS Build 17763.557

June 11, 2019
KB4503327Resolved External
August 09, 2019
07:03 PM PT
Apps and scripts using the NetQueryDisplayInformation API may fail with error
Applications and scripts that call the NetQueryDisplayInformation API or the WinNT provider equivalent may fail to return results after the first page of data.

See details >OS Build 17763.55

October 09, 2018
KB4464330Investigating
August 01, 2019
05:00 PM PT
Startup to a black screen after installing updates
Your device may startup to a black screen during the first logon after installing updates.

See details >OS Build 17763.557

June 11, 2019
KB4503327Mitigated
June 14, 2019
04:41 PM PT
Devices with some Asian language packs installed may receive an error
After installing the KB4493509 devices with some Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_F

See details >OS Build 17763.437

April 09, 2019
KB4493509Mitigated
May 03, 2019
10:59 AM PT @@ -88,7 +87,6 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4511553, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4512534. This ‘optional’ update is available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive KB4512534 and install. For instructions, see Update Windows 10.

Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS).

Back to top
OS Build 17763.678

August 13, 2019
KB4511553
Resolved
KB4512534
Resolved:
August 17, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on your Apple MacOS device when trying to access network shares via CIFS or SMBv1 on a Windows devices that has installed updates on June 11, 2019 (KB4503327) or later. When you encounter this issue, in MacOS you may receive the error, “There was a problem connecting to the server “{Server Host Name}”. Check the server name or IP address, and then try again. If you continue to have problems, contact your system administrator.”

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: For guidance on this issue, see the Apple support article If your Mac can't use NTLM to connect to a Windows server. There is no update for Windows needed for this issue.

Back to top
OS Build 17763.557

June 11, 2019
KB4503327
Resolved External
Last updated:
August 09, 2019
07:03 PM PT

Opened:
August 09, 2019
04:25 PM PT
Apps and scripts using the NetQueryDisplayInformation API may fail with error
 Applications and scripts that call the NetQueryDisplayInformation API or the WinNT provider equivalent may fail to return results after the first page of data, often 50 or 100 entries. When requesting additional pages you may receive the error, “1359: an internal error occurred.”

Affected platforms:
  • Server: Windows Server 2019; Windows Server 2016
Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.55

October 09, 2018
KB4464330
Investigating
Last updated:
August 01, 2019
05:00 PM PT

Opened:
August 01, 2019
05:00 PM PT
" diff --git a/windows/release-information/status-windows-10-1903.yml b/windows/release-information/status-windows-10-1903.yml index efe7452abd..d203f071d7 100644 --- a/windows/release-information/status-windows-10-1903.yml +++ b/windows/release-information/status-windows-10-1903.yml @@ -65,15 +65,14 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ - - @@ -95,7 +94,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
Windows Desktop Search may not return any results and may have high CPU usage
Windows Desktop Search may not return any results and SearchUI.exe may have high CPU usage after installing KB4512941.

See details >
OS Build 18362.329

August 30, 2019
KB4512941
Resolved
KB4515384
September 10, 2019
10:00 AM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 18362.145

May 29, 2019
KB4497935
Resolved
KB4512941
August 30, 2019
10:00 AM PT
Issues updating when certain versions of Intel storage drivers are installed
Certain versions of Intel Rapid Storage Technology (Intel RST) drivers may cause updating to Windows 10, version 1903 to fail.

See details >
OS Build 18362.145

May 29, 2019
KB4497935
Resolved
KB4512941
August 30, 2019
10:00 AM PT
Windows Desktop Search may not return any results and may have high CPU usage
Windows Desktop Search may not return any results and SearchUI.exe may have high CPU usage after installing KB4512941.

See details >
OS Build 18362.329

August 30, 2019
KB4512941
Investigating
September 04, 2019
02:25 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 18362.295

August 13, 2019
KB4512508
Resolved
KB4512941
August 30, 2019
10:00 AM PT
Initiating a Remote Desktop connection may result in black screen
When initiating a Remote Desktop connection to devices with some older GPU drivers, you may receive a black screen.

See details >
OS Build 18362.145

May 29, 2019
KB4497935
Resolved
KB4512941
August 30, 2019
10:00 AM PT
Windows Sandbox may fail to start with error code “0x80070002”
Windows Sandbox may fail to start with \"ERROR_FILE_NOT_FOUND (0x80070002)\" on devices in which the operating system language was changed between updates

See details >
OS Build 18362.116

May 20, 2019
KB4505057
Resolved
KB4512941
August 30, 2019
10:00 AM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
OS Build 18362.175

June 11, 2019
KB4503293
Resolved
KB4512941
August 30, 2019
10:00 AM PT
Updates may fail to install and you may receive Error 0x80073701
Installation of updates may fail and you may receive an error, \"Updates Failed, There were problems installing some updates, but we'll try again later\" and \"Error 0x80073701.\"

See details >
OS Build 18362.145

May 29, 2019
KB4497935
Investigating
August 16, 2019
04:28 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >
OS Build 18362.175

June 11, 2019
KB4503293
Resolved External
August 09, 2019
07:03 PM PT
Intermittent loss of Wi-Fi connectivity
Some older devices may experience loss of Wi-Fi connectivity due to an outdated Qualcomm driver.

See details >
OS Build 18362.116

May 21, 2019
KB4505057
Mitigated External
August 01, 2019
08:44 PM PT
Gamma ramps, color profiles, and night light settings do not apply in some cases
Microsoft has identified some scenarios where gamma ramps, color profiles and night light settings may stop working.

See details >
OS Build 18362.116

May 21, 2019
KB4505057
Mitigated
August 01, 2019
06:27 PM PT
The dGPU may occasionally disappear from device manager on Surface Book 2 with dGPU
Some apps or games that needs to perform graphics intensive operations may close or fail to open on Surface Book 2 devices with Nvidia dGPU.

See details >
OS Build 18362.145

May 29, 2019
KB4497935
Investigating
July 16, 2019
09:04 AM PT
- +
DetailsOriginating updateStatusHistory
Windows Desktop Search may not return any results and may have high CPU usage
Microsoft is getting reports that a small number of users may not receive results when using Windows Desktop Search and may see high CPU usage from SearchUI.exe when searching after installing KB4512941. This issue is only encountered on devices in which searching the web from Windows Desktop Search has been disabled.

Affected platforms:
  • Client: Windows 10, version 1903
Next steps: We are working on a resolution and estimate a solution will be available in mid-September.

Back to top
OS Build 18362.329

August 30, 2019
KB4512941
Investigating
Last updated:
September 04, 2019
02:25 PM PT

Opened:
September 04, 2019
02:25 PM PT
Windows Desktop Search may not return any results and may have high CPU usage
Microsoft is getting reports that a small number of users may not receive results when using Windows Desktop Search and may see high CPU usage from SearchUI.exe when searching after installing KB4512941. This issue is only encountered on devices in which searching the web from Windows Desktop Search has been disabled.

Affected platforms:
  • Client: Windows 10, version 1903
Resolution: This issue was resolved in KB4515384.

Back to top
OS Build 18362.329

August 30, 2019
KB4512941
Resolved
KB4515384
Resolved:
September 10, 2019
10:00 AM PT

Opened:
September 04, 2019
02:25 PM PT
" @@ -106,7 +105,6 @@ sections: -
DetailsOriginating updateStatusHistory
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512508, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4512941. The ‘optional’ update is available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive KB4512941 and install. For instructions, see Update Windows 10.

Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS).

Back to top
OS Build 18362.295

August 13, 2019
KB4512508
Resolved
KB4512941
Resolved:
August 30, 2019
10:00 AM PT

Opened:
August 14, 2019
03:34 PM PT
Updates may fail to install and you may receive Error 0x80073701
Installation of updates may fail and you may receive the error message, \"Updates Failed, There were problems installing some updates, but we'll try again later\" or \"Error 0x80073701\" on the Windows Update dialog or within Update history.

Affected platforms:
  • Client: Windows 10, version 1903
  • Server: Windows Server, version 1903
Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 18362.145

May 29, 2019
KB4497935
Investigating
Last updated:
August 16, 2019
04:28 PM PT

Opened:
August 16, 2019
01:41 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on your Apple MacOS device when trying to access network shares via CIFS or SMBv1 on a Windows devices that has installed updates on June 11, 2019 (KB4503293) or later. When you encounter this issue, in MacOS you may receive the error, “There was a problem connecting to the server “{Server Host Name}”. Check the server name or IP address, and then try again. If you continue to have problems, contact your system administrator.”

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: For guidance on this issue, see the Apple support article If your Mac can't use NTLM to connect to a Windows server. There is no update for Windows needed for this issue.

Back to top
OS Build 18362.175

June 11, 2019
KB4503293
Resolved External
Last updated:
August 09, 2019
07:03 PM PT

Opened:
August 09, 2019
04:25 PM PT
" diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index a8fa52963a..5722012e0f 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -60,12 +60,12 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ -
SummaryOriginating updateStatusLast updated
You may receive an error when opening or using the Toshiba Qosmio AV Center
Toshiba Qosmio AV Center may error when opening and you may also receive an error in Event Log related to cryptnet.dll.

See details >
August 13, 2019
KB4512506
Investigating
September 10, 2019
09:48 AM PT
Windows updates that are SHA-2 signed may not be offered for Symantec and Norton AV
Windows updates that are SHA-2 signed are not available with Symantec or Norton antivirus program installed

See details >
August 13, 2019
KB4512506
Resolved External
August 27, 2019
02:29 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
June 11, 2019
KB4503292
Resolved
KB4512514
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
August 13, 2019
KB4512506
Resolved
KB4517297
August 16, 2019
02:00 PM PT
IA64 and x64 devices may fail to start after installing updates
After installing updates released on or after August 13, 2019, IA64 and x64 devices using EFI Boot may fail to start.

See details >
August 13, 2019
KB4512506
Mitigated
August 17, 2019
12:59 PM PT
System may be unresponsive after restart with certain McAfee antivirus products
Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

See details >
April 09, 2019
KB4493472
Resolved External
August 13, 2019
06:59 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >
June 11, 2019
KB4503292
Resolved External
August 09, 2019
07:03 PM PT
" @@ -76,6 +76,15 @@ sections:
" +- title: September 2019 +- items: + - type: markdown + text: " + + +
DetailsOriginating updateStatusHistory
You may receive an error when opening or using the Toshiba Qosmio AV Center
After installing KB4512506, you may receive an error when opening or using the Toshiba Qosmio AV Center. You may also receive an error in Event Log related to cryptnet.dll.

Affected platforms:
  • Client: Windows 7 SP1
Next steps: Microsoft is working with Toshiba to resolve this issue and will provide an update in an upcoming release.

Back to top
August 13, 2019
KB4512506
Investigating
Last updated:
September 10, 2019
09:48 AM PT

Opened:
September 10, 2019
09:48 AM PT
+ " + - title: August 2019 - items: - type: markdown @@ -84,7 +93,6 @@ sections:
Windows updates that are SHA-2 signed may not be offered for Symantec and Norton AV
Symantec identified the potential for a negative interaction that may occur after Windows Updates code signed with SHA-2 only certificates are installed on devices with Symantec or Norton antivirus programs installed. The software may not correctly identify files included in the update as code signed by Microsoft, putting the device at risk for a delayed or incomplete update.

Affected platforms:
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1
Resolution: The safeguard hold has been removed. Symantec has completed its evaluation of the impact of this update and future updates to Windows 7/Windows 2008 R2 and has determined that there is no increased risk of a false positive detection for all in-field versions of Symantec Endpoint Protection and Norton antivirus programs. See the Symantec support article for additional detail and please reach out to Symantec or Norton support if you encounter any issues.

Back to topAugust 13, 2019
KB4512506Resolved External
Last updated:
August 27, 2019
02:29 PM PT

Opened:
August 13, 2019
10:05 AM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512506, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4517297. The ‘optional’ update is now available on Microsoft Update Catalog and Windows Server Update Services (WSUS).

Back to topAugust 13, 2019
KB4512506Resolved
KB4517297Resolved:
August 16, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
IA64 and x64 devices may fail to start after installing updates
IA64 devices (in any configuration) and x64 devices using EFI boot that were provisioned after the July 9th updates and/or skipped the recommended update (KB3133977), may fail to start with the following error:
\"File: \\Windows\\system32\\winload.efi
Status: 0xc0000428
Info: Windows cannot verify the digital signature for this file.\"

Affected platforms:
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1
Take Action: To resolve this issue please follow the steps outlined in the SHA-2 support FAQ article for error code 0xc0000428.

Back to topAugust 13, 2019
KB4512506Mitigated
Last updated:
August 17, 2019
12:59 PM PT

Opened:
August 13, 2019
08:34 AM PT -
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on your Apple MacOS device when trying to access network shares via CIFS or SMBv1 on a Windows devices that has installed updates on June 11, 2019 (KB4503292) or later. When you encounter this issue, in MacOS you may receive the error, “There was a problem connecting to the server “{Server Host Name}”. Check the server name or IP address, and then try again. If you continue to have problems, contact your system administrator.”

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: For guidance on this issue, see the Apple support article If your Mac can't use NTLM to connect to a Windows server. There is no update for Windows needed for this issue.

Back to topJune 11, 2019
KB4503292Resolved External
Last updated:
August 09, 2019
07:03 PM PT

Opened:
August 09, 2019
04:25 PM PT " diff --git a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml index 3efbd362b4..362bc0e782 100644 --- a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml @@ -63,7 +63,6 @@ sections:
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >June 11, 2019
KB4503276Resolved
KB4512478August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >August 13, 2019
KB4512488Resolved
KB4517298August 16, 2019
02:00 PM PT
System may be unresponsive after restart with certain McAfee antivirus products
Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

See details >April 09, 2019
KB4493446Resolved External
August 13, 2019
06:59 PM PT -
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >June 11, 2019
KB4503276Resolved External
August 09, 2019
07:03 PM PT
Japanese IME doesn't show the new Japanese Era name as a text input option
If previous dictionary updates are installed, the Japanese input method editor (IME) doesn't show the new Japanese Era name as a text input option.

See details >April 25, 2019
KB4493443Mitigated
May 15, 2019
05:53 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >January 08, 2019
KB4480963Mitigated
April 25, 2019
02:00 PM PT @@ -82,7 +81,6 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512488, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4517298. The ‘optional’ update is now available on Microsoft Update Catalog and Windows Server Update Services (WSUS).

Back to top
August 13, 2019
KB4512488
Resolved
KB4517298
Resolved:
August 16, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on your Apple MacOS device when trying to access network shares via CIFS or SMBv1 on a Windows devices that has installed updates on June 11, 2019 (KB4503276) or later. When you encounter this issue, in MacOS you may receive the error, “There was a problem connecting to the server “{Server Host Name}”. Check the server name or IP address, and then try again. If you continue to have problems, contact your system administrator.”

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: For guidance on this issue, see the Apple support article If your Mac can't use NTLM to connect to a Windows server. There is no update for Windows needed for this issue.

Back to top
June 11, 2019
KB4503276
Resolved External
Last updated:
August 09, 2019
07:03 PM PT

Opened:
August 09, 2019
04:25 PM PT
" diff --git a/windows/release-information/status-windows-server-2008-sp2.yml b/windows/release-information/status-windows-server-2008-sp2.yml index d1010bdae7..2954482f10 100644 --- a/windows/release-information/status-windows-server-2008-sp2.yml +++ b/windows/release-information/status-windows-server-2008-sp2.yml @@ -62,7 +62,6 @@ sections: -
SummaryOriginating updateStatusLast updated
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
June 11, 2019
KB4503273
Resolved
KB4512499
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
August 13, 2019
KB4512476
Resolved
KB4517301
August 16, 2019
02:00 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >
June 11, 2019
KB4503273
Resolved External
August 09, 2019
07:03 PM PT
" @@ -79,7 +78,6 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512476, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4517301. The ‘optional’ update is now available on Microsoft Update Catalog and Windows Server Update Services (WSUS).

Back to top
August 13, 2019
KB4512476
Resolved
KB4517301
Resolved:
August 16, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on your Apple MacOS device when trying to access network shares via CIFS or SMBv1 on a Windows devices that has installed updates on June 11, 2019 (KB4503273) or later. When you encounter this issue, in MacOS you may receive the error, “There was a problem connecting to the server “{Server Host Name}”. Check the server name or IP address, and then try again. If you continue to have problems, contact your system administrator.”

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: For guidance on this issue, see the Apple support article If your Mac can't use NTLM to connect to a Windows server. There is no update for Windows needed for this issue.

Back to top
June 11, 2019
KB4503273
Resolved External
Last updated:
August 09, 2019
07:03 PM PT

Opened:
August 09, 2019
04:25 PM PT
" diff --git a/windows/release-information/status-windows-server-2012.yml b/windows/release-information/status-windows-server-2012.yml index 055acb57ff..e78082f2be 100644 --- a/windows/release-information/status-windows-server-2012.yml +++ b/windows/release-information/status-windows-server-2012.yml @@ -62,7 +62,6 @@ sections: -
SummaryOriginating updateStatusLast updated
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
June 11, 2019
KB4503285
Resolved
KB4512512
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
August 13, 2019
KB4512518
Resolved
KB4517302
August 16, 2019
02:00 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >
June 11, 2019
KB4503285
Resolved External
August 09, 2019
07:03 PM PT
Japanese IME doesn't show the new Japanese Era name as a text input option
If previous dictionary updates are installed, the Japanese input method editor (IME) doesn't show the new Japanese Era name as a text input option.

See details >
April 25, 2019
KB4493462
Mitigated
May 15, 2019
05:53 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >
January 08, 2019
KB4480975
Mitigated
April 25, 2019
02:00 PM PT
@@ -81,7 +80,6 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512518, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4517302. The ‘optional’ update is now available on Microsoft Update Catalog and Windows Server Update Services (WSUS).

Back to top
August 13, 2019
KB4512518
Resolved
KB4517302
Resolved:
August 16, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on your Apple MacOS device when trying to access network shares via CIFS or SMBv1 on a Windows devices that has installed updates on June 11, 2019 (KB4503285) or later. When you encounter this issue, in MacOS you may receive the error, “There was a problem connecting to the server “{Server Host Name}”. Check the server name or IP address, and then try again. If you continue to have problems, contact your system administrator.”

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: For guidance on this issue, see the Apple support article If your Mac can't use NTLM to connect to a Windows server. There is no update for Windows needed for this issue.

Back to top
June 11, 2019
KB4503285
Resolved External
Last updated:
August 09, 2019
07:03 PM PT

Opened:
August 09, 2019
04:25 PM PT
" diff --git a/windows/release-information/windows-message-center.yml b/windows/release-information/windows-message-center.yml index 2785208d7d..eabfaa9012 100644 --- a/windows/release-information/windows-message-center.yml +++ b/windows/release-information/windows-message-center.yml @@ -50,6 +50,7 @@ sections: text: " + From dedefa870cc28a81eba91c197c955dfda80661f2 Mon Sep 17 00:00:00 2001 From: John Liu <49762389+ShenLanJohn@users.noreply.github.com> Date: Tue, 10 Sep 2019 11:11:51 -0700 Subject: [PATCH 142/285] CAT Auto Pulish for Windows Release Messages - CAT_AutoPublish_20190910100213 (#1073) (#1074) --- .../resolved-issues-windows-10-1607.yml | 2 ++ ...ssues-windows-10-1809-and-windows-server-2019.yml | 2 -- .../resolved-issues-windows-10-1903.yml | 10 ++++++++++ .../release-information/status-windows-10-1507.yml | 2 -- ...tatus-windows-10-1607-and-windows-server-2016.yml | 6 ++---- .../release-information/status-windows-10-1703.yml | 2 -- .../release-information/status-windows-10-1709.yml | 2 -- .../release-information/status-windows-10-1803.yml | 2 -- ...tatus-windows-10-1809-and-windows-server-2019.yml | 2 -- .../release-information/status-windows-10-1903.yml | 6 ++---- ...atus-windows-7-and-windows-server-2008-r2-sp1.yml | 12 ++++++++++-- ...status-windows-8.1-and-windows-server-2012-r2.yml | 2 -- .../status-windows-server-2008-sp2.yml | 2 -- .../status-windows-server-2012.yml | 2 -- .../release-information/windows-message-center.yml | 1 + 15 files changed, 27 insertions(+), 28 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1607.yml b/windows/release-information/resolved-issues-windows-10-1607.yml index 6f92dbe2b1..6f568f3c14 100644 --- a/windows/release-information/resolved-issues-windows-10-1607.yml +++ b/windows/release-information/resolved-issues-windows-10-1607.yml @@ -32,6 +32,7 @@ sections: - type: markdown text: "
MessageDate
September 2019 security update available for all supported versions of Windows
The September 2019 security update release, referred to as our “B” release, is now available for Windows 10, version 1903 and all supported versions of Windows. We recommend that you install these updates promptly. To be informed about the latest updates and releases, , follow us on Twitter @WindowsUpdate.
September 10, 2019
09:34 AM PT
Status update: Windows 10, version 1903 \"D\" optional release available August 30th
The August optional monthly “D” release for Windows 10, version 1903 is now available. Follow @WindowsUpdate for the latest on the availability of this release.
August 30, 2019
08:00 AM PT
Feature update install notification on Windows 10, version 1809 (the October 2018 Update)
We've had reports on August 29th that some customers running Windows 10, version 1809 (the October 2018 Update) have received notification to install the latest feature update (version 1903) early. Updating remains in your control. To install the update, you must select one of the following options: \"Pick a Time\", \"Restart Tonight,\" or \"Restart Now\". If you are not ready to update at this time, simply dismiss the notification by clicking the arrow in the top right corner. If you have updated to Windows 10, version 1903 and would like to go back to your previous version, see the instructions here.
August 29, 2019
04:39 PM PT
Take Action: Internet Explorer 11 now available on Windows Update/WSUS for Windows Server 2012 and Windows Embedded 8 Standard
Internet Explorer 11 (KB 4492872) is now available via Windows Update (WU) and Windows Server Update Services (WSUS) for commercial customers running Windows Server 2012 and Windows Embedded 8 Standard. For details about these changes and end of support for IE10, please refer to the IT Pro blog
August 29, 2019
08:00 AM PT
+ @@ -70,6 +71,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusDate resolved
Apps and scripts using the NetQueryDisplayInformation API may fail with error
Applications and scripts that call the NetQueryDisplayInformation API or the WinNT provider equivalent may fail to return results after the first page of data.

See details >
OS Build 14393.3053

June 18, 2019
KB4503294
Resolved
KB4516044
September 10, 2019
10:00 AM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 14393.3115

July 16, 2019
KB4507459
Resolved
KB4512517
August 13, 2019
10:00 AM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
OS Build 14393.3025

June 11, 2019
KB4503267
Resolved
KB4512495
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 14393.3144

August 13, 2019
KB4512517
Resolved
KB4512495
August 17, 2019
02:00 PM PT
+
DetailsOriginating updateStatusHistory
Apps and scripts using the NetQueryDisplayInformation API may fail with error
 Applications and scripts that call the NetQueryDisplayInformation API or the WinNT provider equivalent may fail to return results after the first page of data, often 50 or 100 entries. When requesting additional pages you may receive the error, “1359: an internal error occurred.”

Affected platforms:
  • Server: Windows Server 2019; Windows Server 2016
Resolution: This issue was resolved in KB4516044.

Back to top
OS Build 14393.3053

June 18, 2019
KB4503294
Resolved
KB4516044
Resolved:
September 10, 2019
10:00 AM PT

Opened:
August 01, 2019
05:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512517, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4512495. This ‘optional’ update is available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive KB4512495 and install. For instructions, see Update Windows 10.

Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS).

Back to top
OS Build 14393.3144

August 13, 2019
KB4512517
Resolved
KB4512495
Resolved:
August 17, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on your Apple MacOS device when trying to access network shares via CIFS or SMBv1 on a Windows devices that has installed updates on June 11, 2019 (KB4503267) or later. When you encounter this issue, in MacOS you may receive the error, “There was a problem connecting to the server “{Server Host Name}”. Check the server name or IP address, and then try again. If you continue to have problems, contact your system administrator.”

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: For guidance on this issue, see the Apple support article If your Mac can't use NTLM to connect to a Windows server. There is no update for Windows needed for this issue.

Back to top
OS Build 14393.3025

June 11, 2019
KB4503267
Resolved External
Last updated:
August 09, 2019
07:03 PM PT

Opened:
August 09, 2019
04:25 PM PT
diff --git a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml index 81e2a0f077..37df3391a5 100644 --- a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml @@ -55,7 +55,6 @@ sections:
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >OS Build 17763.404

April 02, 2019
KB4490481Resolved
KB4493509April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >OS Build 17763.253

January 08, 2019
KB4480116Resolved
KB4493509April 09, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

See details >OS Build 17763.316

February 12, 2019
KB4487044Resolved
KB4489899March 12, 2019
10:00 AM PT -
Global DNS outage affects Windows Update customers
Windows Update customers were recently affected by a network infrastructure event caused by an external DNS service provider's global outage.

See details >N/A

Resolved
March 08, 2019
11:15 AM PT
Apps may stop working after selecting an audio output device other than the default
Users with multiple audio devices that select an audio output device different from the \"Default Audio Device\" may find certain applications stop working unexpectedly.

See details >OS Build 17763.348

March 01, 2019
KB4482887Resolved
KB4490481April 02, 2019
10:00 AM PT " @@ -152,7 +151,6 @@ sections: -
DetailsOriginating updateStatusHistory
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480116, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to: 
  • Cache size and location show zero or empty. 
  • Keyboard shortcuts may not work properly. 
  • Webpages may intermittently fail to load or render correctly. 
  • Issues with credential prompts. 
  • Issues when downloading files. 
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
After installing KB4480116, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
 
The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4493509

Back to top
OS Build 17763.253

January 08, 2019
KB4480116
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT
Global DNS outage affects Windows Update customers
Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider's global outage. A software update to the external provider's DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
  • Server: Windows Server, version 1809; Windows Server 2019
While this was not an issue with Microsoft's services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers. 
 
If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you. 

Back to top
N/A

Resolved
Resolved:
March 08, 2019
11:15 AM PT

Opened:
January 29, 2019
02:00 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1903.yml b/windows/release-information/resolved-issues-windows-10-1903.yml index 56fb3d90af..348d00243a 100644 --- a/windows/release-information/resolved-issues-windows-10-1903.yml +++ b/windows/release-information/resolved-issues-windows-10-1903.yml @@ -32,6 +32,7 @@ sections: - type: markdown text: " + @@ -59,6 +60,15 @@ sections:
" +- title: September 2019 +- items: + - type: markdown + text: " +
SummaryOriginating updateStatusDate resolved
Windows Desktop Search may not return any results and may have high CPU usage
Windows Desktop Search may not return any results and SearchUI.exe may have high CPU usage after installing KB4512941.

See details >
OS Build 18362.329

August 30, 2019
KB4512941
Resolved
KB4515384
September 10, 2019
10:00 AM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 18362.145

May 29, 2019
KB4497935
Resolved
KB4512941
August 30, 2019
10:00 AM PT
Issues updating when certain versions of Intel storage drivers are installed
Certain versions of Intel Rapid Storage Technology (Intel RST) drivers may cause updating to Windows 10, version 1903 to fail.

See details >
OS Build 18362.145

May 29, 2019
KB4497935
Resolved
KB4512941
August 30, 2019
10:00 AM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 18362.295

August 13, 2019
KB4512508
Resolved
KB4512941
August 30, 2019
10:00 AM PT
+ +
DetailsOriginating updateStatusHistory
Windows Desktop Search may not return any results and may have high CPU usage
Microsoft is getting reports that a small number of users may not receive results when using Windows Desktop Search and may see high CPU usage from SearchUI.exe when searching after installing KB4512941. This issue is only encountered on devices in which searching the web from Windows Desktop Search has been disabled.

Affected platforms:
  • Client: Windows 10, version 1903
Resolution: This issue was resolved in KB4515384.

Back to top
OS Build 18362.329

August 30, 2019
KB4512941
Resolved
KB4515384
Resolved:
September 10, 2019
10:00 AM PT

Opened:
September 04, 2019
02:25 PM PT
+ " + - title: August 2019 - items: - type: markdown diff --git a/windows/release-information/status-windows-10-1507.yml b/windows/release-information/status-windows-10-1507.yml index 9a8ebe8053..a764bbb877 100644 --- a/windows/release-information/status-windows-10-1507.yml +++ b/windows/release-information/status-windows-10-1507.yml @@ -61,7 +61,6 @@ sections: text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

-
SummaryOriginating updateStatusLast updated
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 10240.18305

August 13, 2019
KB4512497
Resolved
KB4517276
August 17, 2019
02:00 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >
OS Build 10240.18244

June 11, 2019
KB4503291
Resolved External
August 09, 2019
07:03 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Mitigated
April 25, 2019
02:00 PM PT
" @@ -79,7 +78,6 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512497, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4517276. This ‘optional’ update is available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive KB4517276 and install. For instructions, see Update Windows 10.

Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS).

Back to top
OS Build 10240.18305

August 13, 2019
KB4512497
Resolved
KB4517276
Resolved:
August 17, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on your Apple MacOS device when trying to access network shares via CIFS or SMBv1 on a Windows devices that has installed updates on June 11, 2019 (KB4503291) or later. When you encounter this issue, in MacOS you may receive the error, “There was a problem connecting to the server “{Server Host Name}”. Check the server name or IP address, and then try again. If you continue to have problems, contact your system administrator.”

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: For guidance on this issue, see the Apple support article If your Mac can't use NTLM to connect to a Windows server. There is no update for Windows needed for this issue.

Back to top
OS Build 10240.18244

June 11, 2019
KB4503291
Resolved External
Last updated:
August 09, 2019
07:03 PM PT

Opened:
August 09, 2019
04:25 PM PT
" diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index da23159b5b..208a38f5dd 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -60,12 +60,11 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ - - @@ -84,9 +83,8 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
Apps and scripts using the NetQueryDisplayInformation API may fail with error
Applications and scripts that call the NetQueryDisplayInformation API or the WinNT provider equivalent may fail to return results after the first page of data.

See details >
OS Build 14393.3053

June 18, 2019
KB4503294
Resolved
KB4516044
September 10, 2019
10:00 AM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 14393.3115

July 16, 2019
KB4507459
Resolved
KB4512517
August 13, 2019
10:00 AM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
OS Build 14393.3025

June 11, 2019
KB4503267
Resolved
KB4512495
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 14393.3144

August 13, 2019
KB4512517
Resolved
KB4512495
August 17, 2019
02:00 PM PT
Internet Explorer 11 and apps using the WebBrowser control may fail to render
JavaScript may fail to render as expected in Internet Explorer 11 and in apps using JavaScript or the WebBrowser control.

See details >
OS Build 14393.3085

July 09, 2019
KB4507460
Resolved
KB4512517
August 13, 2019
10:00 AM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >
OS Build 14393.3025

June 11, 2019
KB4503267
Resolved External
August 09, 2019
07:03 PM PT
Apps and scripts using the NetQueryDisplayInformation API may fail with error
Applications and scripts that call the NetQueryDisplayInformation API or the WinNT provider equivalent may fail to return results after the first page of data.

See details >
OS Build 14393.3053

June 18, 2019
KB4503294
Investigating
August 01, 2019
05:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Mitigated
April 25, 2019
02:00 PM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

See details >
OS Build 14393.2608

November 13, 2018
KB4467691
Mitigated
February 19, 2019
10:00 AM PT
Cluster service may fail if the minimum password length is set to greater than 14
The cluster service may fail to start with the error “2245 (NERR_PasswordTooShort)” if the Group Policy “Minimum Password Length” is configured with greater than 14 characters.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
April 25, 2019
02:00 PM PT
+ - -
DetailsOriginating updateStatusHistory
Apps and scripts using the NetQueryDisplayInformation API may fail with error
 Applications and scripts that call the NetQueryDisplayInformation API or the WinNT provider equivalent may fail to return results after the first page of data, often 50 or 100 entries. When requesting additional pages you may receive the error, “1359: an internal error occurred.”

Affected platforms:
  • Server: Windows Server 2019; Windows Server 2016
Resolution: This issue was resolved in KB4516044.

Back to top
OS Build 14393.3053

June 18, 2019
KB4503294
Resolved
KB4516044
Resolved:
September 10, 2019
10:00 AM PT

Opened:
August 01, 2019
05:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512517, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4512495. This ‘optional’ update is available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive KB4512495 and install. For instructions, see Update Windows 10.

Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS).

Back to top
OS Build 14393.3144

August 13, 2019
KB4512517
Resolved
KB4512495
Resolved:
August 17, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on your Apple MacOS device when trying to access network shares via CIFS or SMBv1 on a Windows devices that has installed updates on June 11, 2019 (KB4503267) or later. When you encounter this issue, in MacOS you may receive the error, “There was a problem connecting to the server “{Server Host Name}”. Check the server name or IP address, and then try again. If you continue to have problems, contact your system administrator.”

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: For guidance on this issue, see the Apple support article If your Mac can't use NTLM to connect to a Windows server. There is no update for Windows needed for this issue.

Back to top
OS Build 14393.3025

June 11, 2019
KB4503267
Resolved External
Last updated:
August 09, 2019
07:03 PM PT

Opened:
August 09, 2019
04:25 PM PT
Apps and scripts using the NetQueryDisplayInformation API may fail with error
 Applications and scripts that call the NetQueryDisplayInformation API or the WinNT provider equivalent may fail to return results after the first page of data, often 50 or 100 entries. When requesting additional pages you may receive the error, “1359: an internal error occurred.”

Affected platforms:
  • Server: Windows Server 2019; Windows Server 2016
Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.3053

June 18, 2019
KB4503294
Investigating
Last updated:
August 01, 2019
05:00 PM PT

Opened:
August 01, 2019
05:00 PM PT
" diff --git a/windows/release-information/status-windows-10-1703.yml b/windows/release-information/status-windows-10-1703.yml index 804da5f5fe..626ca1a8e2 100644 --- a/windows/release-information/status-windows-10-1703.yml +++ b/windows/release-information/status-windows-10-1703.yml @@ -68,7 +68,6 @@ sections: -
SummaryOriginating updateStatusLast updated
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 15063.1955

July 16, 2019
KB4507467
Resolved
KB4512507
August 13, 2019
10:00 AM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 15063.1988

August 13, 2019
KB4512507
Resolved
KB4512474
August 17, 2019
02:00 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >
OS Build 15063.1868

June 11, 2019
KB4503279
Resolved External
August 09, 2019
07:03 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Mitigated
April 25, 2019
02:00 PM PT
" @@ -86,7 +85,6 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512507, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4512474. This ‘optional’ update is available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive KB4512474 and install. For instructions, see Update Windows 10.

Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS).

Back to top
OS Build 15063.1988

August 13, 2019
KB4512507
Resolved
KB4512474
Resolved:
August 17, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on your Apple MacOS device when trying to access network shares via CIFS or SMBv1 on a Windows devices that has installed updates on June 11, 2019 (KB4503279) or later. When you encounter this issue, in MacOS you may receive the error, “There was a problem connecting to the server “{Server Host Name}”. Check the server name or IP address, and then try again. If you continue to have problems, contact your system administrator.”

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: For guidance on this issue, see the Apple support article If your Mac can't use NTLM to connect to a Windows server. There is no update for Windows needed for this issue.

Back to top
OS Build 15063.1868

June 11, 2019
KB4503279
Resolved External
Last updated:
August 09, 2019
07:03 PM PT

Opened:
August 09, 2019
04:25 PM PT
" diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index 27e013f10f..ef4bc11351 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -63,7 +63,6 @@ sections:
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >OS Build 16299.1296

July 16, 2019
KB4507465Resolved
KB4512516August 13, 2019
10:00 AM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >OS Build 16299.1217

June 11, 2019
KB4503284Resolved
KB4512494August 16, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >OS Build 16299.1331

August 13, 2019
KB4512516Resolved
KB4512494August 16, 2019
02:00 PM PT -
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >OS Build 16299.1217

June 11, 2019
KB4503284Resolved External
August 09, 2019
07:03 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >OS Build 16299.904

January 08, 2019
KB4480978Mitigated
April 25, 2019
02:00 PM PT " @@ -81,7 +80,6 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512516, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4512494. The ‘optional’ update will be available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive KB4512494 and install. For instructions, see Update Windows 10.

Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS).

Back to top
OS Build 16299.1331

August 13, 2019
KB4512516
Resolved
KB4512494
Resolved:
August 16, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on your Apple MacOS device when trying to access network shares via CIFS or SMBv1 on a Windows devices that has installed updates on June 11, 2019 (KB4503284) or later. When you encounter this issue, in MacOS you may receive the error, “There was a problem connecting to the server “{Server Host Name}”. Check the server name or IP address, and then try again. If you continue to have problems, contact your system administrator.”

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: For guidance on this issue, see the Apple support article If your Mac can't use NTLM to connect to a Windows server. There is no update for Windows needed for this issue.

Back to top
OS Build 16299.1217

June 11, 2019
KB4503284
Resolved External
Last updated:
August 09, 2019
07:03 PM PT

Opened:
August 09, 2019
04:25 PM PT
" diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml index 5b3d8b4dd9..a227eb41e0 100644 --- a/windows/release-information/status-windows-10-1803.yml +++ b/windows/release-information/status-windows-10-1803.yml @@ -69,7 +69,6 @@ sections:
Notification issue: \"Your device is missing important security and quality fixes.\"
Some users may have incorrectly received the notification \"Your device is missing important security and quality fixes.\"

See details >N/A

Resolved
September 03, 2019
12:32 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >OS Build 17134.829

June 11, 2019
KB4503286Resolved
KB4512509August 19, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >OS Build 17134.950

August 13, 2019
KB4512501Resolved
KB4512509August 19, 2019
02:00 PM PT -
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >OS Build 17134.829

June 11, 2019
KB4503286Resolved External
August 09, 2019
07:03 PM PT
Startup to a black screen after installing updates
Your device may startup to a black screen during the first logon after installing updates.

See details >OS Build 17134.829

June 11, 2019
KB4503286Mitigated
June 14, 2019
04:41 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >OS Build 17134.523

January 08, 2019
KB4480966Mitigated
April 25, 2019
02:00 PM PT @@ -97,7 +96,6 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512501, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4512509. The ‘optional’ update will be available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive KB4512509 and install. For instructions, see Update Windows 10.

Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS).

Back to top
OS Build 17134.950

August 13, 2019
KB4512501
Resolved
KB4512509
Resolved:
August 19, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on your Apple MacOS device when trying to access network shares via CIFS or SMBv1 on a Windows devices that has installed updates on June 11, 2019 (KB4503286) or later. When you encounter this issue, in MacOS you may receive the error, “There was a problem connecting to the server “{Server Host Name}”. Check the server name or IP address, and then try again. If you continue to have problems, contact your system administrator.”

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: For guidance on this issue, see the Apple support article If your Mac can't use NTLM to connect to a Windows server. There is no update for Windows needed for this issue.

Back to top
OS Build 17134.829

June 11, 2019
KB4503286
Resolved External
Last updated:
August 09, 2019
07:03 PM PT

Opened:
August 09, 2019
04:25 PM PT
" diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index d85effd748..d0f9c241ed 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -67,7 +67,6 @@ sections:
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >OS Build 17763.652

July 22, 2019
KB4505658Resolved
KB4511553August 13, 2019
10:00 AM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >OS Build 17763.557

June 11, 2019
KB4503327Resolved
KB4512534August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >OS Build 17763.678

August 13, 2019
KB4511553Resolved
KB4512534August 17, 2019
02:00 PM PT -
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >OS Build 17763.557

June 11, 2019
KB4503327Resolved External
August 09, 2019
07:03 PM PT
Apps and scripts using the NetQueryDisplayInformation API may fail with error
Applications and scripts that call the NetQueryDisplayInformation API or the WinNT provider equivalent may fail to return results after the first page of data.

See details >OS Build 17763.55

October 09, 2018
KB4464330Investigating
August 01, 2019
05:00 PM PT
Startup to a black screen after installing updates
Your device may startup to a black screen during the first logon after installing updates.

See details >OS Build 17763.557

June 11, 2019
KB4503327Mitigated
June 14, 2019
04:41 PM PT
Devices with some Asian language packs installed may receive an error
After installing the KB4493509 devices with some Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_F

See details >OS Build 17763.437

April 09, 2019
KB4493509Mitigated
May 03, 2019
10:59 AM PT @@ -88,7 +87,6 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4511553, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4512534. This ‘optional’ update is available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive KB4512534 and install. For instructions, see Update Windows 10.

Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS).

Back to top
OS Build 17763.678

August 13, 2019
KB4511553
Resolved
KB4512534
Resolved:
August 17, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on your Apple MacOS device when trying to access network shares via CIFS or SMBv1 on a Windows devices that has installed updates on June 11, 2019 (KB4503327) or later. When you encounter this issue, in MacOS you may receive the error, “There was a problem connecting to the server “{Server Host Name}”. Check the server name or IP address, and then try again. If you continue to have problems, contact your system administrator.”

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: For guidance on this issue, see the Apple support article If your Mac can't use NTLM to connect to a Windows server. There is no update for Windows needed for this issue.

Back to top
OS Build 17763.557

June 11, 2019
KB4503327
Resolved External
Last updated:
August 09, 2019
07:03 PM PT

Opened:
August 09, 2019
04:25 PM PT
Apps and scripts using the NetQueryDisplayInformation API may fail with error
 Applications and scripts that call the NetQueryDisplayInformation API or the WinNT provider equivalent may fail to return results after the first page of data, often 50 or 100 entries. When requesting additional pages you may receive the error, “1359: an internal error occurred.”

Affected platforms:
  • Server: Windows Server 2019; Windows Server 2016
Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.55

October 09, 2018
KB4464330
Investigating
Last updated:
August 01, 2019
05:00 PM PT

Opened:
August 01, 2019
05:00 PM PT
" diff --git a/windows/release-information/status-windows-10-1903.yml b/windows/release-information/status-windows-10-1903.yml index efe7452abd..d203f071d7 100644 --- a/windows/release-information/status-windows-10-1903.yml +++ b/windows/release-information/status-windows-10-1903.yml @@ -65,15 +65,14 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ - - @@ -95,7 +94,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
Windows Desktop Search may not return any results and may have high CPU usage
Windows Desktop Search may not return any results and SearchUI.exe may have high CPU usage after installing KB4512941.

See details >
OS Build 18362.329

August 30, 2019
KB4512941
Resolved
KB4515384
September 10, 2019
10:00 AM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 18362.145

May 29, 2019
KB4497935
Resolved
KB4512941
August 30, 2019
10:00 AM PT
Issues updating when certain versions of Intel storage drivers are installed
Certain versions of Intel Rapid Storage Technology (Intel RST) drivers may cause updating to Windows 10, version 1903 to fail.

See details >
OS Build 18362.145

May 29, 2019
KB4497935
Resolved
KB4512941
August 30, 2019
10:00 AM PT
Windows Desktop Search may not return any results and may have high CPU usage
Windows Desktop Search may not return any results and SearchUI.exe may have high CPU usage after installing KB4512941.

See details >
OS Build 18362.329

August 30, 2019
KB4512941
Investigating
September 04, 2019
02:25 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 18362.295

August 13, 2019
KB4512508
Resolved
KB4512941
August 30, 2019
10:00 AM PT
Initiating a Remote Desktop connection may result in black screen
When initiating a Remote Desktop connection to devices with some older GPU drivers, you may receive a black screen.

See details >
OS Build 18362.145

May 29, 2019
KB4497935
Resolved
KB4512941
August 30, 2019
10:00 AM PT
Windows Sandbox may fail to start with error code “0x80070002”
Windows Sandbox may fail to start with \"ERROR_FILE_NOT_FOUND (0x80070002)\" on devices in which the operating system language was changed between updates

See details >
OS Build 18362.116

May 20, 2019
KB4505057
Resolved
KB4512941
August 30, 2019
10:00 AM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
OS Build 18362.175

June 11, 2019
KB4503293
Resolved
KB4512941
August 30, 2019
10:00 AM PT
Updates may fail to install and you may receive Error 0x80073701
Installation of updates may fail and you may receive an error, \"Updates Failed, There were problems installing some updates, but we'll try again later\" and \"Error 0x80073701.\"

See details >
OS Build 18362.145

May 29, 2019
KB4497935
Investigating
August 16, 2019
04:28 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >
OS Build 18362.175

June 11, 2019
KB4503293
Resolved External
August 09, 2019
07:03 PM PT
Intermittent loss of Wi-Fi connectivity
Some older devices may experience loss of Wi-Fi connectivity due to an outdated Qualcomm driver.

See details >
OS Build 18362.116

May 21, 2019
KB4505057
Mitigated External
August 01, 2019
08:44 PM PT
Gamma ramps, color profiles, and night light settings do not apply in some cases
Microsoft has identified some scenarios where gamma ramps, color profiles and night light settings may stop working.

See details >
OS Build 18362.116

May 21, 2019
KB4505057
Mitigated
August 01, 2019
06:27 PM PT
The dGPU may occasionally disappear from device manager on Surface Book 2 with dGPU
Some apps or games that needs to perform graphics intensive operations may close or fail to open on Surface Book 2 devices with Nvidia dGPU.

See details >
OS Build 18362.145

May 29, 2019
KB4497935
Investigating
July 16, 2019
09:04 AM PT
- +
DetailsOriginating updateStatusHistory
Windows Desktop Search may not return any results and may have high CPU usage
Microsoft is getting reports that a small number of users may not receive results when using Windows Desktop Search and may see high CPU usage from SearchUI.exe when searching after installing KB4512941. This issue is only encountered on devices in which searching the web from Windows Desktop Search has been disabled.

Affected platforms:
  • Client: Windows 10, version 1903
Next steps: We are working on a resolution and estimate a solution will be available in mid-September.

Back to top
OS Build 18362.329

August 30, 2019
KB4512941
Investigating
Last updated:
September 04, 2019
02:25 PM PT

Opened:
September 04, 2019
02:25 PM PT
Windows Desktop Search may not return any results and may have high CPU usage
Microsoft is getting reports that a small number of users may not receive results when using Windows Desktop Search and may see high CPU usage from SearchUI.exe when searching after installing KB4512941. This issue is only encountered on devices in which searching the web from Windows Desktop Search has been disabled.

Affected platforms:
  • Client: Windows 10, version 1903
Resolution: This issue was resolved in KB4515384.

Back to top
OS Build 18362.329

August 30, 2019
KB4512941
Resolved
KB4515384
Resolved:
September 10, 2019
10:00 AM PT

Opened:
September 04, 2019
02:25 PM PT
" @@ -106,7 +105,6 @@ sections: -
DetailsOriginating updateStatusHistory
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512508, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4512941. The ‘optional’ update is available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive KB4512941 and install. For instructions, see Update Windows 10.

Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS).

Back to top
OS Build 18362.295

August 13, 2019
KB4512508
Resolved
KB4512941
Resolved:
August 30, 2019
10:00 AM PT

Opened:
August 14, 2019
03:34 PM PT
Updates may fail to install and you may receive Error 0x80073701
Installation of updates may fail and you may receive the error message, \"Updates Failed, There were problems installing some updates, but we'll try again later\" or \"Error 0x80073701\" on the Windows Update dialog or within Update history.

Affected platforms:
  • Client: Windows 10, version 1903
  • Server: Windows Server, version 1903
Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 18362.145

May 29, 2019
KB4497935
Investigating
Last updated:
August 16, 2019
04:28 PM PT

Opened:
August 16, 2019
01:41 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on your Apple MacOS device when trying to access network shares via CIFS or SMBv1 on a Windows devices that has installed updates on June 11, 2019 (KB4503293) or later. When you encounter this issue, in MacOS you may receive the error, “There was a problem connecting to the server “{Server Host Name}”. Check the server name or IP address, and then try again. If you continue to have problems, contact your system administrator.”

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: For guidance on this issue, see the Apple support article If your Mac can't use NTLM to connect to a Windows server. There is no update for Windows needed for this issue.

Back to top
OS Build 18362.175

June 11, 2019
KB4503293
Resolved External
Last updated:
August 09, 2019
07:03 PM PT

Opened:
August 09, 2019
04:25 PM PT
" diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index a8fa52963a..5722012e0f 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -60,12 +60,12 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ -
SummaryOriginating updateStatusLast updated
You may receive an error when opening or using the Toshiba Qosmio AV Center
Toshiba Qosmio AV Center may error when opening and you may also receive an error in Event Log related to cryptnet.dll.

See details >
August 13, 2019
KB4512506
Investigating
September 10, 2019
09:48 AM PT
Windows updates that are SHA-2 signed may not be offered for Symantec and Norton AV
Windows updates that are SHA-2 signed are not available with Symantec or Norton antivirus program installed

See details >
August 13, 2019
KB4512506
Resolved External
August 27, 2019
02:29 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
June 11, 2019
KB4503292
Resolved
KB4512514
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
August 13, 2019
KB4512506
Resolved
KB4517297
August 16, 2019
02:00 PM PT
IA64 and x64 devices may fail to start after installing updates
After installing updates released on or after August 13, 2019, IA64 and x64 devices using EFI Boot may fail to start.

See details >
August 13, 2019
KB4512506
Mitigated
August 17, 2019
12:59 PM PT
System may be unresponsive after restart with certain McAfee antivirus products
Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

See details >
April 09, 2019
KB4493472
Resolved External
August 13, 2019
06:59 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >
June 11, 2019
KB4503292
Resolved External
August 09, 2019
07:03 PM PT
" @@ -76,6 +76,15 @@ sections:
" +- title: September 2019 +- items: + - type: markdown + text: " + + +
DetailsOriginating updateStatusHistory
You may receive an error when opening or using the Toshiba Qosmio AV Center
After installing KB4512506, you may receive an error when opening or using the Toshiba Qosmio AV Center. You may also receive an error in Event Log related to cryptnet.dll.

Affected platforms:
  • Client: Windows 7 SP1
Next steps: Microsoft is working with Toshiba to resolve this issue and will provide an update in an upcoming release.

Back to top
August 13, 2019
KB4512506
Investigating
Last updated:
September 10, 2019
09:48 AM PT

Opened:
September 10, 2019
09:48 AM PT
+ " + - title: August 2019 - items: - type: markdown @@ -84,7 +93,6 @@ sections:
Windows updates that are SHA-2 signed may not be offered for Symantec and Norton AV
Symantec identified the potential for a negative interaction that may occur after Windows Updates code signed with SHA-2 only certificates are installed on devices with Symantec or Norton antivirus programs installed. The software may not correctly identify files included in the update as code signed by Microsoft, putting the device at risk for a delayed or incomplete update.

Affected platforms:
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1
Resolution: The safeguard hold has been removed. Symantec has completed its evaluation of the impact of this update and future updates to Windows 7/Windows 2008 R2 and has determined that there is no increased risk of a false positive detection for all in-field versions of Symantec Endpoint Protection and Norton antivirus programs. See the Symantec support article for additional detail and please reach out to Symantec or Norton support if you encounter any issues.

Back to topAugust 13, 2019
KB4512506Resolved External
Last updated:
August 27, 2019
02:29 PM PT

Opened:
August 13, 2019
10:05 AM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512506, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4517297. The ‘optional’ update is now available on Microsoft Update Catalog and Windows Server Update Services (WSUS).

Back to topAugust 13, 2019
KB4512506Resolved
KB4517297Resolved:
August 16, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
IA64 and x64 devices may fail to start after installing updates
IA64 devices (in any configuration) and x64 devices using EFI boot that were provisioned after the July 9th updates and/or skipped the recommended update (KB3133977), may fail to start with the following error:
\"File: \\Windows\\system32\\winload.efi
Status: 0xc0000428
Info: Windows cannot verify the digital signature for this file.\"

Affected platforms:
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1
Take Action: To resolve this issue please follow the steps outlined in the SHA-2 support FAQ article for error code 0xc0000428.

Back to topAugust 13, 2019
KB4512506Mitigated
Last updated:
August 17, 2019
12:59 PM PT

Opened:
August 13, 2019
08:34 AM PT -
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on your Apple MacOS device when trying to access network shares via CIFS or SMBv1 on a Windows devices that has installed updates on June 11, 2019 (KB4503292) or later. When you encounter this issue, in MacOS you may receive the error, “There was a problem connecting to the server “{Server Host Name}”. Check the server name or IP address, and then try again. If you continue to have problems, contact your system administrator.”

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: For guidance on this issue, see the Apple support article If your Mac can't use NTLM to connect to a Windows server. There is no update for Windows needed for this issue.

Back to topJune 11, 2019
KB4503292Resolved External
Last updated:
August 09, 2019
07:03 PM PT

Opened:
August 09, 2019
04:25 PM PT " diff --git a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml index 3efbd362b4..362bc0e782 100644 --- a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml @@ -63,7 +63,6 @@ sections:
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >June 11, 2019
KB4503276Resolved
KB4512478August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >August 13, 2019
KB4512488Resolved
KB4517298August 16, 2019
02:00 PM PT
System may be unresponsive after restart with certain McAfee antivirus products
Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

See details >April 09, 2019
KB4493446Resolved External
August 13, 2019
06:59 PM PT -
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >June 11, 2019
KB4503276Resolved External
August 09, 2019
07:03 PM PT
Japanese IME doesn't show the new Japanese Era name as a text input option
If previous dictionary updates are installed, the Japanese input method editor (IME) doesn't show the new Japanese Era name as a text input option.

See details >April 25, 2019
KB4493443Mitigated
May 15, 2019
05:53 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >January 08, 2019
KB4480963Mitigated
April 25, 2019
02:00 PM PT @@ -82,7 +81,6 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512488, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4517298. The ‘optional’ update is now available on Microsoft Update Catalog and Windows Server Update Services (WSUS).

Back to top
August 13, 2019
KB4512488
Resolved
KB4517298
Resolved:
August 16, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on your Apple MacOS device when trying to access network shares via CIFS or SMBv1 on a Windows devices that has installed updates on June 11, 2019 (KB4503276) or later. When you encounter this issue, in MacOS you may receive the error, “There was a problem connecting to the server “{Server Host Name}”. Check the server name or IP address, and then try again. If you continue to have problems, contact your system administrator.”

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: For guidance on this issue, see the Apple support article If your Mac can't use NTLM to connect to a Windows server. There is no update for Windows needed for this issue.

Back to top
June 11, 2019
KB4503276
Resolved External
Last updated:
August 09, 2019
07:03 PM PT

Opened:
August 09, 2019
04:25 PM PT
" diff --git a/windows/release-information/status-windows-server-2008-sp2.yml b/windows/release-information/status-windows-server-2008-sp2.yml index d1010bdae7..2954482f10 100644 --- a/windows/release-information/status-windows-server-2008-sp2.yml +++ b/windows/release-information/status-windows-server-2008-sp2.yml @@ -62,7 +62,6 @@ sections: -
SummaryOriginating updateStatusLast updated
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
June 11, 2019
KB4503273
Resolved
KB4512499
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
August 13, 2019
KB4512476
Resolved
KB4517301
August 16, 2019
02:00 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >
June 11, 2019
KB4503273
Resolved External
August 09, 2019
07:03 PM PT
" @@ -79,7 +78,6 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512476, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4517301. The ‘optional’ update is now available on Microsoft Update Catalog and Windows Server Update Services (WSUS).

Back to top
August 13, 2019
KB4512476
Resolved
KB4517301
Resolved:
August 16, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on your Apple MacOS device when trying to access network shares via CIFS or SMBv1 on a Windows devices that has installed updates on June 11, 2019 (KB4503273) or later. When you encounter this issue, in MacOS you may receive the error, “There was a problem connecting to the server “{Server Host Name}”. Check the server name or IP address, and then try again. If you continue to have problems, contact your system administrator.”

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: For guidance on this issue, see the Apple support article If your Mac can't use NTLM to connect to a Windows server. There is no update for Windows needed for this issue.

Back to top
June 11, 2019
KB4503273
Resolved External
Last updated:
August 09, 2019
07:03 PM PT

Opened:
August 09, 2019
04:25 PM PT
" diff --git a/windows/release-information/status-windows-server-2012.yml b/windows/release-information/status-windows-server-2012.yml index 055acb57ff..e78082f2be 100644 --- a/windows/release-information/status-windows-server-2012.yml +++ b/windows/release-information/status-windows-server-2012.yml @@ -62,7 +62,6 @@ sections: -
SummaryOriginating updateStatusLast updated
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
June 11, 2019
KB4503285
Resolved
KB4512512
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
August 13, 2019
KB4512518
Resolved
KB4517302
August 16, 2019
02:00 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

See details >
June 11, 2019
KB4503285
Resolved External
August 09, 2019
07:03 PM PT
Japanese IME doesn't show the new Japanese Era name as a text input option
If previous dictionary updates are installed, the Japanese input method editor (IME) doesn't show the new Japanese Era name as a text input option.

See details >
April 25, 2019
KB4493462
Mitigated
May 15, 2019
05:53 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >
January 08, 2019
KB4480975
Mitigated
April 25, 2019
02:00 PM PT
@@ -81,7 +80,6 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512518, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4517302. The ‘optional’ update is now available on Microsoft Update Catalog and Windows Server Update Services (WSUS).

Back to top
August 13, 2019
KB4512518
Resolved
KB4517302
Resolved:
August 16, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on your Apple MacOS device when trying to access network shares via CIFS or SMBv1 on a Windows devices that has installed updates on June 11, 2019 (KB4503285) or later. When you encounter this issue, in MacOS you may receive the error, “There was a problem connecting to the server “{Server Host Name}”. Check the server name or IP address, and then try again. If you continue to have problems, contact your system administrator.”

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: For guidance on this issue, see the Apple support article If your Mac can't use NTLM to connect to a Windows server. There is no update for Windows needed for this issue.

Back to top
June 11, 2019
KB4503285
Resolved External
Last updated:
August 09, 2019
07:03 PM PT

Opened:
August 09, 2019
04:25 PM PT
" diff --git a/windows/release-information/windows-message-center.yml b/windows/release-information/windows-message-center.yml index 2785208d7d..eabfaa9012 100644 --- a/windows/release-information/windows-message-center.yml +++ b/windows/release-information/windows-message-center.yml @@ -50,6 +50,7 @@ sections: text: " + From 5d2b893b94281bcc3937e09acd2e642fe6d99d05 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Tue, 10 Sep 2019 11:42:27 -0700 Subject: [PATCH 143/285] pull from public to private and fix warnings --- mdop/mbam-v25/upgrade-mbam2.5-sp1.md | 3 ++- windows/client-management/introduction-page-file.md | 2 +- 2 files changed, 3 insertions(+), 2 deletions(-) diff --git a/mdop/mbam-v25/upgrade-mbam2.5-sp1.md b/mdop/mbam-v25/upgrade-mbam2.5-sp1.md index 491bee386a..f30ade580a 100644 --- a/mdop/mbam-v25/upgrade-mbam2.5-sp1.md +++ b/mdop/mbam-v25/upgrade-mbam2.5-sp1.md @@ -5,7 +5,8 @@ ms.author: ksharma manager: audience: ITPro ms.topic: article -ms.prod: +ms.prod: w10 +manager: miaposto localization_priority: Normal --- diff --git a/windows/client-management/introduction-page-file.md b/windows/client-management/introduction-page-file.md index 853c4fda96..662ae5f90e 100644 --- a/windows/client-management/introduction-page-file.md +++ b/windows/client-management/introduction-page-file.md @@ -8,7 +8,7 @@ author: Deland-Han ms.localizationpriority: medium ms.author: delhan ms.reviewer: greglin -manager: +manager: willchen --- # Introduction to page files From 6b066e3c1a2f5a620db8324d0d677e4fbea7f77c Mon Sep 17 00:00:00 2001 From: denisebmsft Date: Tue, 10 Sep 2019 12:03:35 -0700 Subject: [PATCH 144/285] Update windows-defender-antivirus-on-windows-server-2016.md --- ...fender-antivirus-on-windows-server-2016.md | 30 +++++++++++++------ 1 file changed, 21 insertions(+), 9 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md index 78fd4446c6..5714a5e885 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md +++ b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md @@ -9,9 +9,9 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -ms.author: dansimp -ms.date: 09/03/2018 +author: denisebmsft +ms.author: deniseb +ms.date: 09/10/2019 ms.reviewer: manager: dansimp --- @@ -41,7 +41,6 @@ This topic includes the following instructions for setting up and running Window - [Configure automatic exclusions](#BKMK_DefExclusions) - ## Enable or disable the interface on Windows Server 2016 By default, Windows Defender AV is installed and functional on Windows Server 2016. The user interface is installed by default on some SKUs, but is not required. @@ -87,7 +86,7 @@ This is useful if you have a third-party antivirus product installed on the mach The following PowerShell cmdlet will also uninstall Windows Defender AV on Windows Server 2016: -```PS +```PowerShell Uninstall-WindowsFeature -Name Windows-Defender ``` @@ -95,7 +94,7 @@ To install Windows Defender AV again, use the **Add Roles and Features Wizard** You can also use the following PowerShell cmdlet to install Windows Defender AV: -```PS +```PowerShell Install-WindowsFeature -Name Windows-Defender ``` @@ -103,9 +102,21 @@ Install-WindowsFeature -Name Windows-Defender > Event messages for the antimalware engine included with Windows Defender AV can be found in [Windows Defender AV Events](troubleshoot-windows-defender-antivirus.md). - ## Verify Windows Defender is running -To verify that Windows Defender AV is running on the server, run the following command from a command prompt: + +To verify that Windows Defender AV is running on the server, run the following PowerShell cmdlet: + +```PowerShell +Get-Service -Name windefend +``` + +To verify that firewall protection through Windows Defender is turned on, run the following PowerShell cmdlet: + +```PowerShell +Get-Service -Name mpssvc +``` + +As an alternative to PowerShell, you can use Command Prompt to verify that Windows Defender AV is running. To do that, run the following command from a command prompt: ```DOS sc query Windefend @@ -113,8 +124,9 @@ sc query Windefend The `sc query` command returns information about the Windows Defender service. If Windows Defender is running, the `STATE` value displays `RUNNING`. - + ## Update antimalware Security intelligence + In order to get updated antimalware Security intelligence , you must have the Windows Update service running. If you use an update management service, like Windows Server Update Services (WSUS), make sure that updates for Windows Defender Antivirus Security intelligence are approved for the computers you manage. By default, Windows Update does not download and install updates automatically on Windows Server 2016. You can change this configuration by using one of the following methods: From 80aa703b22cf0f678cc1925c38e19fd0626c1a7e Mon Sep 17 00:00:00 2001 From: denisebmsft Date: Tue, 10 Sep 2019 12:05:50 -0700 Subject: [PATCH 145/285] Update windows-defender-antivirus-on-windows-server-2016.md --- ...fender-antivirus-on-windows-server-2016.md | 19 +++++++------------ 1 file changed, 7 insertions(+), 12 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md index 5714a5e885..f46af493d8 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md +++ b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md @@ -124,7 +124,6 @@ sc query Windefend The `sc query` command returns information about the Windows Defender service. If Windows Defender is running, the `STATE` value displays `RUNNING`. - ## Update antimalware Security intelligence In order to get updated antimalware Security intelligence , you must have the Windows Update service running. If you use an update management service, like Windows Server Update Services (WSUS), make sure that updates for Windows Defender Antivirus Security intelligence are approved for the computers you manage. @@ -160,34 +159,30 @@ The following table lists the services for Windows Defender and the dependent se |Windows Defender Firewall (MpsSvc)|C:\WINDOWS\system32\svchost.exe -k LocalServiceNoNetwork|We recommend leaving the Windows Defender Firewall service enabled.| |Windows Update (Wuauserv)|C:\WINDOWS\system32\svchost.exe -k netsvcs|Windows Update is needed to get Security intelligence updates and antimalware engine updates| - - - ## Submit Samples + Sample submission allows Microsoft to collect samples of potentially malicious software. To help provide continued and up-to-date protection, Microsoft researchers use these samples to analyze suspicious activities and produce updated antimalware Security intelligence. We collect program executable files, such as .exe files and .dll files. We do not collect files that contain personal data, like Microsoft Word documents and PDF files. ### Enable automatic sample submission -- To enable automatic sample submission, start a Windows PowerShell console as an administrator, and set the **SubmitSamplesConsent** value data according to one of the following settings: +To enable automatic sample submission, start a Windows PowerShell console as an administrator, and set the **SubmitSamplesConsent** value data according to one of the following settings: - - **0** Always prompt. The Windows Defender service prompts you to confirm submission of all required files. This is the default setting for Windows Defender, but is not recommended for Windows Server 2016 installations without a GUI. +- **0** Always prompt. The Windows Defender service prompts you to confirm submission of all required files. This is the default setting for Windows Defender, but is not recommended for Windows Server 2016 installations without a GUI. - - **1** Send safe samples automatically. The Windows Defender service sends all files marked as "safe" and prompts for the remainder of the files. +- **1** Send safe samples automatically. The Windows Defender service sends all files marked as "safe" and prompts for the remainder of the files. - - **2** Never send. The Windows Defender service does not prompt and does not send any files. +- **2** Never send. The Windows Defender service does not prompt and does not send any files. - - **3** Send all samples automatically. The Windows Defender service sends all files without a prompt for confirmation. +- **3** Send all samples automatically. The Windows Defender service sends all files without a prompt for confirmation. - ## Configure automatic exclusions + To help ensure security and performance, certain exclusions are automatically added based on the roles and features you install when using Windows Defender AV on Server 2016. See the [Configure exclusions in Windows Defender AV on Windows Server](configure-server-exclusions-windows-defender-antivirus.md) topic for more information. - - ## Related topics - [Windows Defender Antivirus in Windows 10](windows-defender-antivirus-in-windows-10.md) From 89d9902e92aef4c52ed2452a1a5eea69b14cab32 Mon Sep 17 00:00:00 2001 From: denisebmsft Date: Tue, 10 Sep 2019 12:07:19 -0700 Subject: [PATCH 146/285] Update windows-defender-antivirus-on-windows-server-2016.md --- .../windows-defender-antivirus-on-windows-server-2016.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md index f46af493d8..643af15f99 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md +++ b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md @@ -186,6 +186,7 @@ See the [Configure exclusions in Windows Defender AV on Windows Server](configur ## Related topics - [Windows Defender Antivirus in Windows 10](windows-defender-antivirus-in-windows-10.md) + - [Configure exclusions in Windows Defender AV on Windows Server](configure-server-exclusions-windows-defender-antivirus.md) From df6f5765184988b95770321c5cd781307db11889 Mon Sep 17 00:00:00 2001 From: John Liu <49762389+ShenLanJohn@users.noreply.github.com> Date: Tue, 10 Sep 2019 12:07:53 -0700 Subject: [PATCH 147/285] CAT Auto Pulish for Windows Release Messages - CAT_AutoPublish_20190910112417 (#1077) --- windows/release-information/windows-message-center.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/release-information/windows-message-center.yml b/windows/release-information/windows-message-center.yml index eabfaa9012..57a7a4c18d 100644 --- a/windows/release-information/windows-message-center.yml +++ b/windows/release-information/windows-message-center.yml @@ -50,7 +50,7 @@ sections: text: "
MessageDate
September 2019 security update available for all supported versions of Windows
The September 2019 security update release, referred to as our “B” release, is now available for Windows 10, version 1903 and all supported versions of Windows. We recommend that you install these updates promptly. To be informed about the latest updates and releases, , follow us on Twitter @WindowsUpdate.
September 10, 2019
09:34 AM PT
Status update: Windows 10, version 1903 \"D\" optional release available August 30th
The August optional monthly “D” release for Windows 10, version 1903 is now available. Follow @WindowsUpdate for the latest on the availability of this release.
August 30, 2019
08:00 AM PT
Feature update install notification on Windows 10, version 1809 (the October 2018 Update)
We've had reports on August 29th that some customers running Windows 10, version 1809 (the October 2018 Update) have received notification to install the latest feature update (version 1903) early. Updating remains in your control. To install the update, you must select one of the following options: \"Pick a Time\", \"Restart Tonight,\" or \"Restart Now\". If you are not ready to update at this time, simply dismiss the notification by clicking the arrow in the top right corner. If you have updated to Windows 10, version 1903 and would like to go back to your previous version, see the instructions here.
August 29, 2019
04:39 PM PT
Take Action: Internet Explorer 11 now available on Windows Update/WSUS for Windows Server 2012 and Windows Embedded 8 Standard
Internet Explorer 11 (KB 4492872) is now available via Windows Update (WU) and Windows Server Update Services (WSUS) for commercial customers running Windows Server 2012 and Windows Embedded 8 Standard. For details about these changes and end of support for IE10, please refer to the IT Pro blog
August 29, 2019
08:00 AM PT
- + From 310ea035138617c64ac47b7fceca088b0535656f Mon Sep 17 00:00:00 2001 From: denisebmsft Date: Tue, 10 Sep 2019 12:09:21 -0700 Subject: [PATCH 148/285] Update windows-defender-antivirus-on-windows-server-2016.md --- ...indows-defender-antivirus-on-windows-server-2016.md | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md index 643af15f99..5af8d81560 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md +++ b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md @@ -31,15 +31,15 @@ While the functionality, configuration, and management is largely the same for W This topic includes the following instructions for setting up and running Windows Defender AV on a server platform: -- [Enable the interface](#BKMK_UsingDef) +- [Enable the interface](#enable-or-disable-the-interface-on-windows-server-2016) -- [Verify Windows Defender AV is running](#BKMK_DefRun) +- [Verify Windows Defender AV is running](#verify-windows-defender-is-running) -- [Update antimalware Security intelligence](#BKMK_UpdateDef) +- [Update antimalware Security intelligence](#update-antimalware-security-intelligence) -- [Submit Samples](#BKMK_DefSamples) +- [Submit Samples](#submit-samples) -- [Configure automatic exclusions](#BKMK_DefExclusions) +- [Configure automatic exclusions](#configure-automatic-exclusions) ## Enable or disable the interface on Windows Server 2016 By default, Windows Defender AV is installed and functional on Windows Server 2016. The user interface is installed by default on some SKUs, but is not required. From da491c1ff8c068591cc50874b1c9e92658629907 Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Tue, 10 Sep 2019 12:40:25 -0700 Subject: [PATCH 149/285] Update tvm-security-recommendation.md --- .../microsoft-defender-atp/tvm-security-recommendation.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation.md b/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation.md index 0c8c9f14f6..b0e38b75c6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation.md @@ -36,7 +36,7 @@ Each machine in the organization is scored based on three important factors: thr ## Navigate through your security recommendations -You can access the security recommendation from the Microsoft Defender ATP Threat & Vulnerability Management menu, dashboard, software page, and machine page, to give you the context that you need, as you require it. +You can access the security recommendation from the Microsoft Defender ATP Threat & Vulnerability Management menu, dashboard, software page, and machine page to give you the context that you need, as you require it. There are security recommendations for application, operating system, network, accounts, and security controls. From a8680be7feb0e5cbf7a4f002d1c99f2c1c127994 Mon Sep 17 00:00:00 2001 From: John Liu <49762389+ShenLanJohn@users.noreply.github.com> Date: Tue, 10 Sep 2019 13:41:31 -0700 Subject: [PATCH 151/285] CAT Auto Pulish for Windows Release Messages - 20190910123725 (#1079) * Update waas-servicing-differences.md Added two clarifications regarding Windows 10 preview updates. I have consistently fielded questions about why they are 'missing' in people's enterprise environments. It almost always boils down to one of these two notes: they either weren't published to WSUS or they are looking for the word 'Preview' in the title. * Update windows/deployment/update/waas-servicing-differences.md Looks great, thanks Johan! Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> * Update waas-servicing-differences.md Implement the MarkDown standard of using 1 space between the indent marker > and the [!Note] markers * Update windows/deployment/update/waas-servicing-differences.md Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com> * Update windows/deployment/update/waas-servicing-differences.md Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com> * Update windows/deployment/update/waas-servicing-differences.md Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com> * Updated the document Updated the steps in the document related to Windows Analytics Solutions. Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/4392 * Update windows/deployment/update/windows-analytics-FAQ-troubleshooting.md Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com> * Update windows/deployment/update/windows-analytics-FAQ-troubleshooting.md Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com> * Update autopilot-support.md Remove redundant line (PFE was the old term for an Ecosystem PM). And added new alias for Ecosystem PMs (after discussing all this with the Ecosystem PM managers). * Terminology Correction Terminology Correction * Incorrect Command Line Arguments According to this doc https://docs.microsoft.com/en-us/windows-hardware/manufacture/desktop/windows-setup-command-line-options the correct command line argument for ignoring dismissable warnings is /Compat IgnoreWarning not /compat /ignore warning as specified here in the docs. Also, the same incorrect message is included in the setupdiag.exe, so when the report is generated, it is providing incorrect guidance. * Update mbam-25-server-prerequisites-for-stand-alone-and-configuration-manager-integration-topologies.md * Enterprise Mode schema: duplicate https usage - Resolve duplicate use of https where both http and https was intended - MarkDown code fence XML tag corrections - Replace HTML `
` codes with NewLine - Remove redundant space at the end of the version 2 file Resolves #4769 * Update: NewLine changes - Remove extraneous NewLine breaks - Remove missed HTML `
` code * Update credential-guard-manage.md * Update event-5155.md * Update windows-autopilot-requirements.md Separated the Windows Autopilot deployment service and Windows Activation items into two separate rows to make it easier to read. * Update upgrade-mbam2.5-sp1.md * finish * Update windows/security/threat-protection/auditing/event-5155.md Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> * Update windows/security/threat-protection/auditing/event-5155.md Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> * Update windows/security/threat-protection/auditing/event-5155.md Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> * Update windows/security/threat-protection/auditing/event-5155.md Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> * Update windows/security/threat-protection/auditing/event-5155.md Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> * Update windows/security/threat-protection/auditing/event-5155.md Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> * Update windows/security/threat-protection/auditing/event-5155.md Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> * Update windows/security/threat-protection/auditing/event-5155.md Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> * Update windows/security/threat-protection/auditing/event-5155.md Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> * Update windows/security/threat-protection/auditing/event-5155.md Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com> * Update windows/security/threat-protection/auditing/event-5155.md Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com> * Update kiosk-mdm-bridge.md * Windows Update resources: add MD code block Description: The list of manual regsvr32.exe commands becomes translated in other languages, to the extent that extra words appear among the commands. This is an attempt to mitigate this behavior in the machine translation, by adding a MarkDown code block around the list of commands. Proposed changes: - Add MD code block around the long list of regsvr32.exe commands - Remove blank space characters at the end of each line (cosmetic) issue ticket reference or closure: Ref. #4800 (Spanish "translation" of commands) Ref. #3569, #3570, #3571, #3572, #3574, #3575 ( [LOC] Back-Translation "regsvr32.exe [...]" ) * MetaData update: convert ^M (2x) to NewLine - replaced Ctrl-M character with NewLine in MetaData * Update mdop/mbam-v25/mbam-25-server-prerequisites-for-stand-alone-and-configuration-manager-integration-topologies.md Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> * comment * Clarify the registry key needed to set tags * Update microsoft-defender-atp-mac-install-with-intune.md adding troubleshooting step for common 'no license found' issue * Add page for Audit Token Right Adjusted * Windows/What's New: amend broken link in See Also The first link under "See Also", "What's New in Windows Server, version 1903" , is broken because it points to the wrong directory for the file 'whats-new-in-windows-server-1903' which resides in the new directory /get-started-19/ instead of the old directory /get-started/. This directory difference is only present in the docs.microsoft.com pages, not on Github. The links are therefore pointing directly to the docs.microsoft.com pages instead of being relative to the Github directory structure. Broken link: https://docs.microsoft.com/windows-server/get-started/whats-new-in-windows-server-1903 Operative link: https://docs.microsoft.com/windows-server/get-started-19/whats-new-in-windows-server-1903 Closes #4784 * Update TOC.md * Added multifactor unlock Added multifactor unlock feature update using Passport for work CSP. Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/4700 * Added policies for 1803 and 1809 (1903 not out yet) https://github.com/MicrosoftDocs/windows-itpro-docs/issues/3912 * Fix typo * Actually fix typos * Windows Defender Antivirus: amend broken link From the issue ticket > Set-mppreference is configured with dead URL. (#4831) - The link "Use the [Set-MpPreference][]" is broken, but without the empty brackets it will work as expected. - Removing the redundant empty brackets after the next link too. Closes #4831 * Update windows/client-management/new-policies-for-windows-10.md Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com> * Update windows/client-management/new-policies-for-windows-10.md Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com> * Update upgrading-to-mbam-25-sp1-from-mbam-25.md * Update windows/client-management/new-policies-for-windows-10.md Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> * Update windows/client-management/new-policies-for-windows-10.md Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> * Update windows/client-management/new-policies-for-windows-10.md Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> * Update windows/client-management/new-policies-for-windows-10.md Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> * URL addition of OWA Added URL for OWA attachment protection using WIP Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/3747 * Update windows/security/identity-protection/hello-for-business/feature-multifactor-unlock.md Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> * Fixed text "Automated investigation" instead of "Alert" * Update waas-overview.md Corrected a typo * Update windows/deployment/update/waas-overview.md Makes sense. Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com> * edit * Update microsoft-recommended-block-rules.md updated typo in description. * Update windows/security/threat-protection/auditing/audit-token-right-adjusted.md Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> * note ragarding Company Portal change https://github.com/MicrosoftDocs/windows-itpro-docs/issues/3843 info found here: https://blogs.technet.microsoft.com/cbernier/2018/03/08/windows-information-protection-adding-the-intune-company-portal-for-windows-as-an-exempt-app/ * Update microsoft-defender-atp-mac-install-with-intune.md * Microsoft Defender ATP: amend copy-paste error When using Microsoft Intune as part of the Defender ATP setup, it will become necessary to configure some controlled folder access. This bug looks like it could have been transferred from one of the other pages during editing, but I could not locate it easily enough. Anyway, the correct part of this step is to refer to -- Controlled folder access -- exactly as the page name points to. Thanks to jcampos79 for discovering this text-based bug. Closes #4854 * Updated how to disable HVCI Prior guidance to disable HVCI was outdated * Update windows/security/threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity.md Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com> * update content of upgrade mbam2.5 sp1 * Removed bullet Removed bullet as it was not making any sense. * format setting a minor format setting * Update windows/security/information-protection/windows-information-protection/enlightened-microsoft-apps-and-wip.md Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com> * Update windows/security/information-protection/windows-information-protection/enlightened-microsoft-apps-and-wip.md Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com> * sample script syntax error due to ASCII codes for quotes sample script filter syntax contained ASCII codes for single quotes instead of actual quotes, causing the Get-CimInstance commands to error out. * Update how-windows-update-works.md: amend typo Simple typo correction, along with a few MarkDown codestyle corrections for MD blockquote (`>`) indenting. - typo correction: initates -> initiates - codestyle corrections: 3 MarkDown blockquote indentations amended Thanks to Jessie Gouw (jessiegouw) for reporting the typo. Closes #4866 * Moved '.' syntax description to a separate table * fixes #4760, broken table The formatting was broken because a pipe character was in the wrong place. There was also an extra row due to double spacing below the table. * Enterprise Mode schema: convert Important notes As previously discussed in this PR, I have converted the **Important** section headings by using their MarkDown equivalent > [!IMPORTANT] (as well as adding the blockquote for its text content). * Update text in windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md Per review. Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> * Update text in windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md Per review. Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> * Spelled out acronym, fixed typo * pull from public to private and fix warnings * CAT Auto Pulish for Windows Release Messages - CAT_AutoPublish_20190910100213 (#1073) * pull from public to private and fix warnings * CAT Auto Pulish for Windows Release Messages - CAT_AutoPublish_20190910112417 (#1077) * Cat auto publish 20190910112417 (#1081) * Merge changes from master to live (#950) * v 1.6 * removed a known issue * removed references to CB, CBB * Latest changes for publish today (#949) * Merge from master to live (#956) * safety checkin * added location for group policy object * replaced reboot w/ restart * safety commit for some initial noodlings * restructured to emphasize new policy; connected to TOC * adjusting heading levels * fixing tables * Latest change for August 20 (#955) * CAT Auto Pulish for Windows Release Messages - CAT_AutoPublish_20190823163336 (#980) (#981) * CAT Auto Pulish for Windows Release Messages - 20190829112356 (#1007) * Update deploy-the-latest-firmware-and-drivers-for-surface-devices.md * add table * CAT Auto Pulish for Windows Release Messages - CAT_AutoPublish_20190829102107 (#1006) * CAT Auto Pulish for Windows Release Messages - CAT_AutoPublish_20190829175859 (#1012) (#1013) * CAT Auto Pulish for Windows Release Messages - CAT_AutoPublish_20190830100739 (#1018) (#1019) * CAT Auto Pulish for Windows Release Messages - 20190903135254 (#1033) * SIEM connector: change alert notion to Detection * update casing and redirects * remove space json file * fix json * CAT Auto Pulish for Windows Release Messages - CAT_AutoPublish_20190903123340 (#1031) * CAT Auto Pulish for Windows Release Messages - CAT_AutoPublish_20190906173611 (#1061) (#1062) * CAT Auto Pulish for Windows Release Messages - CAT_AutoPublish_20190910100213 (#1073) (#1074) * CAT Auto Pulish for Windows Release Messages - CAT_AutoPublish_20190910112417 --- ...terprise-mode-schema-version-1-guidance.md | 10 +- ...terprise-mode-schema-version-2-guidance.md | 22 +- mdop/mbam-v25/TOC.md | 1 + ...guration-manager-integration-topologies.md | 5 +- mdop/mbam-v25/upgrade-mbam2.5-sp1.md | 61 +++-- .../upgrading-to-mbam-25-sp1-from-mbam-25.md | 14 +- windows/client-management/TOC.md | 4 + .../determine-appropriate-page-file-size.md | 129 +++++++++ .../generate-kernel-or-complete-crash-dump.md | 111 ++++++++ .../images/out-of-memory.png | Bin 0 -> 41165 bytes .../images/task-manager-commit.png | Bin 0 -> 96419 bytes .../client-management/images/task-manager.png | Bin 0 -> 101967 bytes .../introduction-page-file.md | 70 +++++ ...-scripting-with-the-wmi-bridge-provider.md | 24 +- .../new-policies-for-windows-10.md | 226 +++++++++++++++ .../system-failure-recovery-options.md | 205 ++++++++++++++ .../troubleshoot-windows-startup.md | 40 ++- windows/configuration/kiosk-mdm-bridge.md | 5 +- .../update/how-windows-update-works.md | 12 +- windows/deployment/update/waas-overview.md | 2 +- .../update/waas-servicing-differences.md | 10 +- .../windows-analytics-FAQ-troubleshooting.md | 14 +- .../update/windows-update-resources.md | 258 +++++++++--------- windows/deployment/upgrade/setupdiag.md | 2 +- .../windows-autopilot/autopilot-support.md | 6 +- .../windows-autopilot-requirements.md | 7 +- .../windows-message-center.yml | 2 +- .../credential-guard-manage.md | 4 +- .../feature-multifactor-unlock.md | 1 + .../enlightened-microsoft-apps-and-wip.md | 4 + ...recommended-network-definitions-for-wip.md | 1 + ...advanced-security-audit-policy-settings.md | 2 +- .../auditing/audit-token-right-adjusted.md | 27 ++ .../threat-protection/auditing/event-5155.md | 129 +++++++-- ...tion-based-protection-of-code-integrity.md | 7 +- .../automated-investigations.md | 4 +- .../enable-controlled-folders.md | 4 +- .../microsoft-defender-atp/machine-tags.md | 3 +- .../tvm-security-recommendation.md | 6 +- ...e-encryption-types-allowed-for-kerberos.md | 5 +- ...anage-report-windows-defender-antivirus.md | 2 +- ...ft-defender-atp-mac-install-with-intune.md | 6 + .../microsoft-recommended-block-rules.md | 2 +- .../configure-wd-app-guard.md | 14 +- 44 files changed, 1200 insertions(+), 261 deletions(-) create mode 100644 windows/client-management/determine-appropriate-page-file-size.md create mode 100644 windows/client-management/generate-kernel-or-complete-crash-dump.md create mode 100644 windows/client-management/images/out-of-memory.png create mode 100644 windows/client-management/images/task-manager-commit.png create mode 100644 windows/client-management/images/task-manager.png create mode 100644 windows/client-management/introduction-page-file.md create mode 100644 windows/client-management/system-failure-recovery-options.md create mode 100644 windows/security/threat-protection/auditing/audit-token-right-adjusted.md diff --git a/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-1-guidance.md b/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-1-guidance.md index 3e8e129b3d..292c85b771 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-1-guidance.md +++ b/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-1-guidance.md @@ -30,10 +30,10 @@ If you don't want to use the Enterprise Mode Site List Manager, you also have th ## Enterprise Mode schema v.1 example The following is an example of the Enterprise Mode schema v.1. This schema can run on devices running Windows 7 and Windows 8.1. -**Important**
-Make sure that you don't specify a protocol when adding your URLs. Using a URL like `contoso.com` automatically applies to both https://contoso.com and https://contoso.com. +> [!IMPORTANT] +> Make sure that you don't specify a protocol when adding your URLs. Using a URL like `contoso.com` automatically applies to both http://contoso.com and https://contoso.com. -``` xml +```xml www.cpandl.com @@ -206,7 +206,7 @@ For example, say you want all of the sites in the contoso.com domain to open usi ### What not to include in your schema We recommend that you not add any of the following items to your schema because they can make your compatibility list behave in unexpected ways: -- Don’t use protocols. For example, `https://`, `https://`, or custom protocols. They break parsing. +- Don’t use protocols. For example, `http://`, `https://`, or custom protocols. They break parsing. - Don’t use wildcards. - Don’t use query strings, ampersands break parsing. @@ -217,7 +217,7 @@ You can use trailing slashes at the path-level, but not at the domain-level: **Example** -``` xml +```xml contoso.com /about/ diff --git a/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-2-guidance.md b/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-2-guidance.md index 17e4e860cf..66a056c506 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-2-guidance.md +++ b/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-2-guidance.md @@ -26,8 +26,8 @@ ms.date: 12/04/2017 Use the Enterprise Mode Site List Manager to create and update your site list for devices running Windows 7, Windows 8.1, and Windows 10, using the version 2.0 (v.2) of the Enterprise Mode schema. If you don't want to use the Enterprise Mode Site List Manager, you also have the option to update your XML schema using Notepad, or any other XML-editing app. -**Important**
-If you're running Windows 7 or Windows 8.1 and you've been using the version 1.0 (v.1) of the schema, you can continue to do so, but you won't get the benefits that come with the updated schema. For info about the v.1 schema, see [Enterprise Mode schema v.1 guidance](enterprise-mode-schema-version-1-guidance.md). +> [!IMPORTANT] +> If you're running Windows 7 or Windows 8.1 and you've been using the version 1.0 (v.1) of the schema, you can continue to do so, but you won't get the benefits that come with the updated schema. For info about the v.1 schema, see [Enterprise Mode schema v.1 guidance](enterprise-mode-schema-version-1-guidance.md). ## Enterprise Mode schema v.2 updates Because of the schema changes, you can't combine the old version (v.1) with the new version (v.2) of the schema. If you look at your XML file, you can tell which version you're using by: @@ -41,10 +41,10 @@ You can continue to use the v.1 version of the schema on Windows 10, but you wo ### Enterprise Mode v.2 schema example The following is an example of the v.2 version of the Enterprise Mode schema. -**Important**
-Make sure that you don't specify a protocol when adding your URLs. Using a URL like ``, automatically applies to both https://contoso.com and https://contoso.com. +> [!IMPORTANT] +> Make sure that you don't specify a protocol when adding your URLs. Using a URL like ``, automatically applies to both http://contoso.com and https://contoso.com. -``` xml +```xml @@ -214,7 +214,7 @@ In this example, if https://contoso.com and https://contoso.com. +Make sure that you don't specify a protocol. Using <site url="contoso.com"> applies to both http://contoso.com and https://contoso.com.

Example

 <site url="contoso.com:8080">
@@ -284,19 +284,15 @@ With:
 
 While the old, replaced attributes aren't supported in the v.2 version of the schema, they'll continue to work in the v.1 version of the schema. If, however, you're using the v.2 version of the schema and these attributes are still there, the v.2 version schema takes precedence. We don’t recommend combining the two schemas, and instead recommend that you move to the v.2 version of the schema to take advantage of the new features.
 
-**Important**
-Saving your v.1 version of the file using the new Enterprise Mode Site List Manager (schema v.2) automatically updates the XML to the new v.2 version of the schema. +> [!IMPORTANT] +> Saving your v.1 version of the file using the new Enterprise Mode Site List Manager (schema v.2) automatically updates the XML to the new v.2 version of the schema. ### What not to include in your schema We recommend that you not add any of the following items to your schema because they can make your compatibility list behave in unexpected ways: -- Don’t use protocols. For example, https://, https://, or custom protocols. They break parsing. +- Don’t use protocols. For example, `http://`, `https://`, or custom protocols. They break parsing. - Don’t use wildcards. - Don’t use query strings, ampersands break parsing. ## Related topics - [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) - - - - diff --git a/mdop/mbam-v25/TOC.md b/mdop/mbam-v25/TOC.md index a33c126e12..01a083b8b8 100644 --- a/mdop/mbam-v25/TOC.md +++ b/mdop/mbam-v25/TOC.md @@ -83,6 +83,7 @@ #### [Monitoring Web Service Request Performance Counters](monitoring-web-service-request-performance-counters.md) ### [Using Windows PowerShell to Administer MBAM 2.5](using-windows-powershell-to-administer-mbam-25.md) ## [Troubleshooting MBAM 2.5](troubleshooting-mbam-25.md) +### [Upgrade from MBAM 2.5 to MBAM 2.5 SP1](upgrade-mbam2.5-sp1.md) ## [Applying hotfixes on MBAM 2.5 SP1](apply-hotfix-for-mbam-25-sp1.md) ## [Technical Reference for MBAM 2.5](technical-reference-for-mbam-25.md) ### [Client Event Logs](client-event-logs.md) diff --git a/mdop/mbam-v25/mbam-25-server-prerequisites-for-stand-alone-and-configuration-manager-integration-topologies.md b/mdop/mbam-v25/mbam-25-server-prerequisites-for-stand-alone-and-configuration-manager-integration-topologies.md index e6b0faca0c..b95c5a854c 100644 --- a/mdop/mbam-v25/mbam-25-server-prerequisites-for-stand-alone-and-configuration-manager-integration-topologies.md +++ b/mdop/mbam-v25/mbam-25-server-prerequisites-for-stand-alone-and-configuration-manager-integration-topologies.md @@ -260,8 +260,9 @@ The following table lists the installation prerequisites for the MBAM Administra
- -
MessageDate
September 2019 security update available for all supported versions of Windows
The September 2019 security update release, referred to as our “B” release, is now available for Windows 10, version 1903 and all supported versions of Windows. We recommend that you install these updates promptly. To be informed about the latest updates and releases, , follow us on Twitter @WindowsUpdate.
September 10, 2019
09:34 AM PT
September 2019 security update available for all supported versions of Windows
The September 2019 security update release, referred to as our “B” release, is now available for Windows 10, version 1903 and all supported versions of Windows. We recommend that you install these updates promptly. To be informed about the latest updates and releases, follow us on Twitter @WindowsUpdate.
September 10, 2019
09:34 AM PT
Status update: Windows 10, version 1903 \"D\" optional release available August 30th
The August optional monthly “D” release for Windows 10, version 1903 is now available. Follow @WindowsUpdate for the latest on the availability of this release.
August 30, 2019
08:00 AM PT
Feature update install notification on Windows 10, version 1809 (the October 2018 Update)
We've had reports on August 29th that some customers running Windows 10, version 1809 (the October 2018 Update) have received notification to install the latest feature update (version 1903) early. Updating remains in your control. To install the update, you must select one of the following options: \"Pick a Time\", \"Restart Tonight,\" or \"Restart Now\". If you are not ready to update at this time, simply dismiss the notification by clicking the arrow in the top right corner. If you have updated to Windows 10, version 1903 and would like to go back to your previous version, see the instructions here.
August 29, 2019
04:39 PM PT
Take Action: Internet Explorer 11 now available on Windows Update/WSUS for Windows Server 2012 and Windows Embedded 8 Standard
Internet Explorer 11 (KB 4492872) is now available via Windows Update (WU) and Windows Server Update Services (WSUS) for commercial customers running Windows Server 2012 and Windows Embedded 8 Standard. For details about these changes and end of support for IE10, please refer to the IT Pro blog
August 29, 2019
08:00 AM PT

Windows Server Features

.NET Framework 4.5 features:

Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup.

See details >
OS Build 14393.2879

March 19, 2019
KB4489889
Resolved
KB4493470
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Resolved
KB4493470
April 09, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4489882
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 14393.2848

March 12, 2019
KB4489882
Resolved
KB4493473
April 25, 2019
02:00 PM PT
Issue hosting multiple terminal server sessions and a user logs off on Windows Server
In some cases, Windows Server will stop working and restart when hosting multiple terminal server sessions and a user logs off.

See details >
OS Build 14393.2828

February 19, 2019
KB4487006
Resolved
KB4489882
March 12, 2019
10:00 AM PT
" @@ -139,8 +137,6 @@ sections: text: " - -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493470

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487026, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Issue hosting multiple terminal server sessions and a user logs off on Windows Server
In some cases, Windows Server will stop working and restart when hosting multiple terminal server sessions and a user logs off. The faulting driver is win32kbase.sys.

Affected platforms:
  • Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2828

February 19, 2019
KB4487006
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1703.yml b/windows/release-information/resolved-issues-windows-10-1703.yml index 582aec0f1a..0a16421180 100644 --- a/windows/release-information/resolved-issues-windows-10-1703.yml +++ b/windows/release-information/resolved-issues-windows-10-1703.yml @@ -44,7 +44,6 @@ sections:
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >OS Build 15063.1631

February 12, 2019
KB4487020Resolved
KB4493474April 09, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >OS Build 15063.1716

March 19, 2019
KB4489888Resolved
KB4493474April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >OS Build 15063.1563

January 08, 2019
KB4480973Resolved
KB4493474April 09, 2019
10:00 AM PT -
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >OS Build 15063.1659

February 19, 2019
KB4487011Resolved
KB4489871March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >OS Build 15063.1689

March 12, 2019
KB4489871Resolved
KB4493436April 25, 2019
02:00 PM PT " @@ -114,7 +113,6 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493474

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487011, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489871.

Back to top
OS Build 15063.1659

February 19, 2019
KB4487011
Resolved
KB4489871
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1709.yml b/windows/release-information/resolved-issues-windows-10-1709.yml index 0cdbe87fcb..b9fb594146 100644 --- a/windows/release-information/resolved-issues-windows-10-1709.yml +++ b/windows/release-information/resolved-issues-windows-10-1709.yml @@ -46,7 +46,6 @@ sections:
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >OS Build 16299.967

February 12, 2019
KB4486996Resolved
KB4493441April 09, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >OS Build 16299.1059

March 19, 2019
KB4489890Resolved
KB4493441April 09, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >OS Build 16299.904

January 08, 2019
KB4480978Resolved
KB4493441April 09, 2019
10:00 AM PT -
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >OS Build 16299.967

February 12, 2019
KB4486996Resolved
KB4489886March 12, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start Secure Shell from Windows Subsystem for Linux with agent forwarding using a command line switch (ssh –A) or a configuration setting.

See details >OS Build 16299.1029

March 12, 2019
KB4489886Resolved
KB4493441April 09, 2019
10:00 AM PT " @@ -126,7 +125,6 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493441

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4486996, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489886.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4489886
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1803.yml b/windows/release-information/resolved-issues-windows-10-1803.yml index 174aa6ebe6..a65cc10df5 100644 --- a/windows/release-information/resolved-issues-windows-10-1803.yml +++ b/windows/release-information/resolved-issues-windows-10-1803.yml @@ -46,7 +46,6 @@ sections:
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >OS Build 17134.590

February 12, 2019
KB4487017Resolved
KB4493464April 09, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >OS Build 17134.677

March 19, 2019
KB4489894Resolved
KB4493464April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >OS Build 17134.523

January 08, 2019
KB4480966Resolved
KB4493464April 09, 2019
10:00 AM PT -
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

See details >OS Build 17134.590

February 12, 2019
KB4487017Resolved
KB4489868March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >OS Build 17134.648

March 12, 2019
KB4489868Resolved
KB4493437April 25, 2019
02:00 PM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start Secure Shell from Windows Subsystem for Linux with agent forwarding using a command line switch (ssh –A) or a configuration setting.

See details >OS Build 17134.648

March 12, 2019
KB4489868Resolved
KB4493464April 09, 2019
10:00 AM PT @@ -136,7 +135,6 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493464

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487017, users may received \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489868.

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4489868
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml index 37df3391a5..829b497041 100644 --- a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml @@ -54,7 +54,6 @@ sections:
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >OS Build 17763.253

January 08, 2019
KB4480116Resolved
KB4493509April 09, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >OS Build 17763.404

April 02, 2019
KB4490481Resolved
KB4493509April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >OS Build 17763.253

January 08, 2019
KB4480116Resolved
KB4493509April 09, 2019
10:00 AM PT -
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

See details >OS Build 17763.316

February 12, 2019
KB4487044Resolved
KB4489899March 12, 2019
10:00 AM PT
Apps may stop working after selecting an audio output device other than the default
Users with multiple audio devices that select an audio output device different from the \"Default Audio Device\" may find certain applications stop working unexpectedly.

See details >OS Build 17763.348

March 01, 2019
KB4482887Resolved
KB4490481April 02, 2019
10:00 AM PT " @@ -140,7 +139,6 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1  
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2  
Resolution: This issue is resolved in KB4493509.  

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487044, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489899

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4489899
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml index 5305dd2345..aa64a5bbb2 100644 --- a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml @@ -49,7 +49,6 @@ sections:
NETDOM.EXE fails to run
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >March 12, 2019
KB4489878Resolved
KB4493472April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >March 12, 2019
KB4489878Resolved
KB4493472April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >January 08, 2019
KB4480970Resolved
KB4493472April 09, 2019
10:00 AM PT -
Event Viewer may not show some event descriptions for network interface cards
The Event Viewer may not show some event descriptions for network interface cards (NIC).

See details >October 18, 2018
KB4462927Resolved
KB4489878March 12, 2019
10:00 AM PT " @@ -140,12 +139,3 @@ sections:
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493472.

Back to topJanuary 08, 2019
KB4480970Resolved
KB4493472Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT " - -- title: October 2018 -- items: - - type: markdown - text: " - - -
DetailsOriginating updateStatusHistory
Event Viewer may not show some event descriptions for network interface cards
After installing KB4462927, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Affected Platforms:
  • Client: Windows 7 SP1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4489878.

Back to top
October 18, 2018
KB4462927
Resolved
KB4489878
Resolved:
March 12, 2019
10:00 AM PT

Opened:
October 18, 2018
10:00 AM PT
- " diff --git a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml index cee285c22f..6255d324e1 100644 --- a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml @@ -48,7 +48,6 @@ sections:
Devices may not respond at login or Welcome screen if running certain Avast software
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >April 09, 2019
KB4493446Resolved
April 25, 2019
02:00 PM PT
Devices with winsock kernel client may receive error
Devices with a winsock kernel client may receive D1, FC, and other errors.

See details >March 12, 2019
KB4489881Resolved
KB4489893March 19, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >March 12, 2019
KB4489881Resolved
KB4493446April 09, 2019
10:00 AM PT -
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >February 19, 2019
KB4487016Resolved
KB4489881March 12, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >January 08, 2019
KB4480963Resolved
KB4493446April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >January 08, 2019
KB4480963Resolved
KB4493446April 09, 2019
10:00 AM PT @@ -130,7 +129,6 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487016, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012 
Resolution: This issue is resolved in KB4489881.

Back to top
February 19, 2019
KB4487016
Resolved
KB4489881
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml index df7f82cfb2..f81be52e89 100644 --- a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml +++ b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml @@ -40,7 +40,6 @@ sections:
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >April 09, 2019
KB4493471Resolved
May 14, 2019
01:19 PM PT
Authentication may fail for services after the Kerberos ticket expires
Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

See details >March 12, 2019
KB4489880Resolved
KB4499149May 14, 2019
10:00 AM PT
NETDOM.EXE fails to run
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >March 12, 2019
KB4489880Resolved
KB4493471April 09, 2019
10:00 AM PT -
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >January 17, 2019
KB4480974Resolved
KB4489880March 12, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >February 12, 2019
KB4487023Resolved
KB4493471April 09, 2019
10:00 AM PT " @@ -108,12 +107,3 @@ sections:
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to topFebruary 12, 2019
KB4487023Resolved
KB4493471Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT " - -- title: January 2019 -- items: - - type: markdown - text: " - - -
DetailsOriginating updateStatusHistory
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480974, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489880.

Back to top
January 17, 2019
KB4480974
Resolved
KB4489880
Resolved:
March 12, 2019
10:00 AM PT

Opened:
January 17, 2019
10:00 AM PT
- " diff --git a/windows/release-information/resolved-issues-windows-server-2012.yml b/windows/release-information/resolved-issues-windows-server-2012.yml index 4bd64240b8..bb1c5a4635 100644 --- a/windows/release-information/resolved-issues-windows-server-2012.yml +++ b/windows/release-information/resolved-issues-windows-server-2012.yml @@ -44,10 +44,8 @@ sections:
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >April 09, 2019
KB4493451Resolved
May 14, 2019
01:21 PM PT
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >April 09, 2019
KB4493451Resolved
May 14, 2019
01:19 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >February 12, 2019
KB4487025Resolved
KB4493451April 09, 2019
10:00 AM PT -
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >February 12, 2019
KB4487025Resolved
KB4489891March 12, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >January 08, 2019
KB4480975Resolved
KB4493451April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >January 08, 2019
KB4480975Resolved
KB4493451April 09, 2019
10:00 AM PT -
Event Viewer may not show some event descriptions for network interface cards
The Event Viewer may not show some event descriptions for network interface cards (NIC).

See details >September 11, 2018
KB4457135Resolved
KB4489891March 12, 2019
10:00 AM PT " @@ -123,7 +121,6 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487025, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489891.

Back to top
February 12, 2019
KB4487025
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -136,12 +133,3 @@ sections:
MSXML6 may cause applications to stop responding
After installing KB4480975, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493451.

Back to topJanuary 08, 2019
KB4480975Resolved
KB4493451Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT " - -- title: September 2018 -- items: - - type: markdown - text: " - - -
DetailsOriginating updateStatusHistory
Event Viewer may not show some event descriptions for network interface cards
After installing KB4457135, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Affected Platforms:
  • Client: Windows 7 SP1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4489891.

Back to top
September 11, 2018
KB4457135
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
- " diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index 208a38f5dd..562cad0e09 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -60,11 +60,11 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ - @@ -78,6 +78,15 @@ sections:
" +- title: September 2019 +- items: + - type: markdown + text: " +
SummaryOriginating updateStatusLast updated
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) including ChsIME.EXE, may become unresponsive or may have high CPU usage.

See details >
OS Build 14393.3204

September 10, 2019
KB4516044
Mitigated
September 13, 2019
05:25 PM PT
Apps and scripts using the NetQueryDisplayInformation API may fail with error
Applications and scripts that call the NetQueryDisplayInformation API or the WinNT provider equivalent may fail to return results after the first page of data.

See details >
OS Build 14393.3053

June 18, 2019
KB4503294
Resolved
KB4516044
September 10, 2019
10:00 AM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 14393.3115

July 16, 2019
KB4507459
Resolved
KB4512517
August 13, 2019
10:00 AM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
OS Build 14393.3025

June 11, 2019
KB4503267
Resolved
KB4512495
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 14393.3144

August 13, 2019
KB4512517
Resolved
KB4512495
August 17, 2019
02:00 PM PT
Internet Explorer 11 and apps using the WebBrowser control may fail to render
JavaScript may fail to render as expected in Internet Explorer 11 and in apps using JavaScript or the WebBrowser control.

See details >
OS Build 14393.3085

July 09, 2019
KB4507460
Resolved
KB4512517
August 13, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Mitigated
April 25, 2019
02:00 PM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

See details >
OS Build 14393.2608

November 13, 2018
KB4467691
Mitigated
February 19, 2019
10:00 AM PT
Cluster service may fail if the minimum password length is set to greater than 14
The cluster service may fail to start with the error “2245 (NERR_PasswordTooShort)” if the Group Policy “Minimum Password Length” is configured with greater than 14 characters.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
April 25, 2019
02:00 PM PT
+ +
DetailsOriginating updateStatusHistory
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include CHS (Chinese Simplified) and CHT (Chinese Traditional) with Changjie/Quick keyboard.


Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016

Workaround: To mitigate the issue, perform the following steps:
  1. Select the Start button and type Services.
  2. Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
  3. Locate Startup type: and change it to Manual
  4. Select Ok
  5. The TabletInputService service is now in the default configuration and IME should work as expected.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.3204

September 10, 2019
KB4516044
Mitigated
Last updated:
September 13, 2019
05:25 PM PT

Opened:
September 13, 2019
05:25 PM PT
+ " + - title: August 2019 - items: - type: markdown @@ -96,7 +105,6 @@ sections:
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4507459. Devices that are domain controllers or domain members are both affected.

To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
 

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4512517 and the safeguard hold has been removed. Please note, it can take up to 48 hours before you can update to offered Windows 10, version 1903 or Windows Server, version 1903.

Back to topOS Build 14393.3115

July 16, 2019
KB4507459Resolved
KB4512517Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503267 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512495.

Back to topOS Build 14393.3025

June 11, 2019
KB4503267Resolved
KB4512495Resolved:
August 17, 2019
02:00 PM PT

Opened:
July 10, 2019
02:51 PM PT -
Internet Explorer 11 and apps using the WebBrowser control may fail to render
Internet Explorer 11 may fail to render some JavaScript after installing KB4507460. You may also have issues with apps using JavaScript or the WebBrowser control, such as the present PowerPoint feature of Skype Meeting Broadcast.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server 2016
Resolution: This issue was resolved in KB4512517.

Back to topOS Build 14393.3085

July 09, 2019
KB4507460Resolved
KB4512517Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 26, 2019
04:58 PM PT " diff --git a/windows/release-information/status-windows-10-1703.yml b/windows/release-information/status-windows-10-1703.yml index 626ca1a8e2..094b5c9bab 100644 --- a/windows/release-information/status-windows-10-1703.yml +++ b/windows/release-information/status-windows-10-1703.yml @@ -66,6 +66,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ @@ -79,6 +80,15 @@ sections:
" +- title: September 2019 +- items: + - type: markdown + text: " +
SummaryOriginating updateStatusLast updated
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) including ChsIME.EXE, may become unresponsive or may have high CPU usage.

See details >
OS Build 15063.2045

September 10, 2019
KB4516068
Mitigated
September 13, 2019
05:25 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 15063.1955

July 16, 2019
KB4507467
Resolved
KB4512507
August 13, 2019
10:00 AM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 15063.1988

August 13, 2019
KB4512507
Resolved
KB4512474
August 17, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Mitigated
April 25, 2019
02:00 PM PT
+ +
DetailsOriginating updateStatusHistory
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include CHS (Chinese Simplified) and CHT (Chinese Traditional) with Changjie/Quick keyboard.


Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016

Workaround: To mitigate the issue, perform the following steps:
  1. Select the Start button and type Services.
  2. Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
  3. Locate Startup type: and change it to Manual
  4. Select Ok
  5. The TabletInputService service is now in the default configuration and IME should work as expected.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 15063.2045

September 10, 2019
KB4516068
Mitigated
Last updated:
September 13, 2019
05:25 PM PT

Opened:
September 13, 2019
05:25 PM PT
+ " + - title: August 2019 - items: - type: markdown diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index ef4bc11351..4363810035 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -60,6 +60,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ @@ -74,6 +75,15 @@ sections:
" +- title: September 2019 +- items: + - type: markdown + text: " +
SummaryOriginating updateStatusLast updated
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) including ChsIME.EXE, may become unresponsive or may have high CPU usage.

See details >
OS Build 16299.1387

September 10, 2019
KB4516066
Mitigated
September 13, 2019
05:25 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 16299.1296

July 16, 2019
KB4507465
Resolved
KB4512516
August 13, 2019
10:00 AM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
OS Build 16299.1217

June 11, 2019
KB4503284
Resolved
KB4512494
August 16, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 16299.1331

August 13, 2019
KB4512516
Resolved
KB4512494
August 16, 2019
02:00 PM PT
+ +
DetailsOriginating updateStatusHistory
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include CHS (Chinese Simplified) and CHT (Chinese Traditional) with Changjie/Quick keyboard.


Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016

Workaround: To mitigate the issue, perform the following steps:
  1. Select the Start button and type Services.
  2. Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
  3. Locate Startup type: and change it to Manual
  4. Select Ok
  5. The TabletInputService service is now in the default configuration and IME should work as expected.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.1387

September 10, 2019
KB4516066
Mitigated
Last updated:
September 13, 2019
05:25 PM PT

Opened:
September 13, 2019
05:25 PM PT
+ " + - title: August 2019 - items: - type: markdown diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml index 1fe49fd40a..410ce10ff9 100644 --- a/windows/release-information/status-windows-10-1803.yml +++ b/windows/release-information/status-windows-10-1803.yml @@ -65,6 +65,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ @@ -87,6 +88,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) including ChsIME.EXE, may become unresponsive or may have high CPU usage.

See details >
OS Build 17134.1006

September 10, 2019
KB4516058
Mitigated
September 13, 2019
05:25 PM PT
Windows Mixed Reality Portal users may intermittently receive a 15-5 error code
You may receive a 15-5 error code in Windows Mixed Reality Portal and your headset may not respond to \"wake up\" from sleep.

See details >
OS Build 17134.950

August 13, 2019
KB4512501
Mitigated
September 11, 2019
05:32 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 17134.915

July 16, 2019
KB4507466
Resolved
KB4512501
August 13, 2019
10:00 AM PT
Notification issue: \"Your device is missing important security and quality fixes.\"
Some users may have incorrectly received the notification \"Your device is missing important security and quality fixes.\"

See details >
N/A

Resolved
September 03, 2019
12:32 PM PT
+
DetailsOriginating updateStatusHistory
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include CHS (Chinese Simplified) and CHT (Chinese Traditional) with Changjie/Quick keyboard.


Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016

Workaround: To mitigate the issue, perform the following steps:
  1. Select the Start button and type Services.
  2. Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
  3. Locate Startup type: and change it to Manual
  4. Select Ok
  5. The TabletInputService service is now in the default configuration and IME should work as expected.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17134.1006

September 10, 2019
KB4516058
Mitigated
Last updated:
September 13, 2019
05:25 PM PT

Opened:
September 13, 2019
05:25 PM PT
Windows Mixed Reality Portal users may intermittently receive a 15-5 error code
After installing KB4512501, Windows Mixed Reality Portal users may intermittently receive a 15-5 error code. In some cases, Windows Mixed Reality Portal may report that the headset is sleeping and pressing “Wake up” may appear to produce no action.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10, version 1803
Workaround: To mitigate the issue, use the following steps:
  1. Close the Windows Mixed Reality Portal, if it is running.
  2. Open Task Manager by selecting the Start button and typing Task Manager.
  3. In Task Manager under the Processes tab, right click or long press on “Windows Explorer” and select restart.
  4. You can now open the Windows Mixed Reality Portal.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17134.950

August 13, 2019
KB4512501
Mitigated
Last updated:
September 11, 2019
05:32 PM PT

Opened:
September 11, 2019
05:32 PM PT
Notification issue: \"Your device is missing important security and quality fixes.\"
Some users may have incorrectly received the notification \"Your device is missing important security and quality fixes\" in the Windows Update dialog and a red \"!\" in the task tray on the Windows Update tray icon. This notification is intended for devices that are 90 days or more out of date, but some users with installed updates released in June or July also saw this notification.

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
Resolution: This issue was resolved on the server side on August 30, 2019. Only devices that are out of date by 90 days or more should now see the notification. No action is required by the user to resolve this issue. If you are still seeing the \"Your device is missing important security and quality fixes\" notification, we recommend selecting Check for Updates in the Windows Update dialog. For instructions, see Update Windows 10. Microsoft always recommends trying to keep your devices up to date, as the monthly updates contain important security fixes. 

Back to top
N/A

Resolved
Resolved:
September 03, 2019
12:32 PM PT

Opened:
September 03, 2019
12:32 PM PT
diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index 5543553734..6685b4a484 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -64,6 +64,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ @@ -87,6 +88,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) including ChsIME.EXE, may become unresponsive or may have high CPU usage.

See details >
OS Build 17763.737

September 10, 2019
KB4512578
Mitigated
September 13, 2019
05:25 PM PT
Windows Mixed Reality Portal users may intermittently receive a 15-5 error code
You may receive a 15-5 error code in Windows Mixed Reality Portal and your headset may not respond to \"wake up\" from sleep.

See details >
OS Build 17763.678

August 13, 2019
KB4511553
Mitigated
September 11, 2019
05:32 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 17763.652

July 22, 2019
KB4505658
Resolved
KB4511553
August 13, 2019
10:00 AM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
OS Build 17763.557

June 11, 2019
KB4503327
Resolved
KB4512534
August 17, 2019
02:00 PM PT
+
DetailsOriginating updateStatusHistory
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include CHS (Chinese Simplified) and CHT (Chinese Traditional) with Changjie/Quick keyboard.


Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016

Workaround: To mitigate the issue, perform the following steps:
  1. Select the Start button and type Services.
  2. Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
  3. Locate Startup type: and change it to Manual
  4. Select Ok
  5. The TabletInputService service is now in the default configuration and IME should work as expected.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.737

September 10, 2019
KB4512578
Mitigated
Last updated:
September 13, 2019
05:25 PM PT

Opened:
September 13, 2019
05:25 PM PT
Windows Mixed Reality Portal users may intermittently receive a 15-5 error code
After installing KB4511553, Windows Mixed Reality Portal users may intermittently receive a 15-5 error code. In some cases, Windows Mixed Reality Portal may report that the headset is sleeping and pressing “Wake up” may appear to produce no action.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10, version 1803
Workaround: To mitigate the issue, use the following steps:
  1. Close the Windows Mixed Reality Portal, if it is running.
  2. Open Task Manager by selecting the Start button and typing Task Manager.
  3. In Task Manager under the Processes tab, right click or long press on “Windows Explorer” and select restart.
  4. You can now open the Windows Mixed Reality Portal.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.678

August 13, 2019
KB4511553
Mitigated
Last updated:
September 11, 2019
05:32 PM PT

Opened:
September 11, 2019
05:32 PM PT
" diff --git a/windows/release-information/status-windows-10-1903.yml b/windows/release-information/status-windows-10-1903.yml index a33834cce2..4146c05f31 100644 --- a/windows/release-information/status-windows-10-1903.yml +++ b/windows/release-information/status-windows-10-1903.yml @@ -65,8 +65,11 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ + + + - @@ -96,8 +99,11 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
Safeguard on certain devices with some Intel and Broadcom Wi-Fi adapters
Microsoft and NEC have found incompatibility issues with some devices with Intel Centrino 6205/6235 and Broadcom 802.11ac Wi-Fi cards when running Windows 10, version 1903.

See details >
N/A

Mitigated
September 13, 2019
05:25 PM PT
Some users report issues related to the Start menu and Windows Desktop Search
Microsoft has received reports that a small number of users are having issues related to the Start menu and Windows Desktop Search.

See details >
OS Build 18362.356

September 10, 2019
KB4515384
Investigating
September 13, 2019
05:35 PM PT
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) including ChsIME.EXE, may become unresponsive or may have high CPU usage.

See details >
OS Build 18362.356

September 10, 2019
KB4515384
Mitigated
September 13, 2019
05:25 PM PT
Audio in games is quiet or different than expected
Microsoft has received reports that audio in certain games is quieter or different than expected.

See details >
OS Build 18362.356

September 10, 2019
KB4515384
Mitigated
September 13, 2019
05:25 PM PT
Screenshots and Snips have an unnatural orange tint
Users have reported an orange tint on Screenshots and Snips with the Lenovo Vantage app installed

See details >
OS Build 18362.356

September 10, 2019
KB4516115
Resolved External
September 11, 2019
08:54 PM PT
Some users report issues related to the Start menu and Windows Desktop Search
Microsoft has received reports that some users are having issues related to the Start menu and Windows Desktop Search.

See details >
OS Build 18362.356

September 10, 2019
KB4515384
Acknowledged
September 11, 2019
05:18 PM PT
Windows Desktop Search may not return any results and may have high CPU usage
Windows Desktop Search may not return any results and SearchUI.exe may have high CPU usage after installing KB4512941.

See details >
OS Build 18362.329

August 30, 2019
KB4512941
Resolved
KB4515384
September 10, 2019
10:00 AM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 18362.145

May 29, 2019
KB4497935
Resolved
KB4512941
August 30, 2019
10:00 AM PT
Issues updating when certain versions of Intel storage drivers are installed
Certain versions of Intel Rapid Storage Technology (Intel RST) drivers may cause updating to Windows 10, version 1903 to fail.

See details >
OS Build 18362.145

May 29, 2019
KB4497935
Resolved
KB4512941
August 30, 2019
10:00 AM PT
+ + + + -
DetailsOriginating updateStatusHistory
Safeguard on certain devices with some Intel and Broadcom Wi-Fi adapters
Microsoft and NEC have found incompatibility issues with Intel Centrino 6205/6235 and Broadcom 802.11ac Wi-Fi cards when running Windows 10, version 1903 on specific models of NEC devices. If these devices are updated to Windows 10, version 1903, they will no longer be able to use any Wi-Fi connections. The Wi-Fi driver may have a yellow exclamation point in device manager. The task tray icon for networking may show the icon for no internet and Network & Internet settings may not show any Wi-Fi networks.

To safeguard your update experience, we have applied a compatibility hold on the affected devices from being offered Windows 10, version 1903.

Affected platforms:
  • Client: Windows 10, version 1903
Workaround: If you are using an affected device and you have already installed Windows 10, version 1903, you can mitigate the issue disabling then re-enabling the Wi-Fi adapter in Device Manager. You should now be able to use Wi-Fi until your next reboot.

Next steps: Microsoft and NEC are working on a resolution and will provide an update in an upcoming release.

Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

Back to top
N/A

Mitigated
Last updated:
September 13, 2019
05:25 PM PT

Opened:
September 13, 2019
05:25 PM PT
Some users report issues related to the Start menu and Windows Desktop Search
Microsoft has received reports that a small number of users are having issues related to the Start menu and Windows Desktop Search.

Affected platforms:
  • Client: Windows 10, version 1903
Next steps: We are presently investigating and will provide an update when more information is available.

Note As a first step with any issue you may encounter, we recommend you refer to our troubleshooting support guides. If you are having an issue with search, see Fix problems in Windows Search.

Back to top
OS Build 18362.356

September 10, 2019
KB4515384
Investigating
Last updated:
September 13, 2019
05:35 PM PT

Opened:
September 11, 2019
05:18 PM PT
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include CHS (Chinese Simplified) and CHT (Chinese Traditional) with Changjie/Quick keyboard.


Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016

Workaround: To mitigate the issue, perform the following steps:
  1. Select the Start button and type Services.
  2. Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
  3. Locate Startup type: and change it to Manual
  4. Select Ok
  5. The TabletInputService service is now in the default configuration and IME should work as expected.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 18362.356

September 10, 2019
KB4515384
Mitigated
Last updated:
September 13, 2019
05:25 PM PT

Opened:
September 13, 2019
05:25 PM PT
Audio in games is quiet or different than expected
Microsoft has received reports that audio in certain games is quieter or different than expected. At the request of some of our audio partners, we implemented a compatibility change that enabled certain games to query support and render multi-channel audio. Due to customer feedback, we are reverting this change as some games and some devices are not rendering multi-channel audio as expected. This may result in games sounding different than customers are used to and may have missing channels.

Affected platforms:
  • Client: Windows 10, version 1903
Workaround: To mitigate the issue, open settings in the impacted game and disable multi-channel audio, if this option is available. You can also search in the Windows Control Panel for 3rd party audio device control panels and disable Multi-channel audio or Virtual Surround Sound, if these options are available.  

Next steps: We are working on a resolution and estimates a solution will be available in late September.

Back to top
OS Build 18362.356

September 10, 2019
KB4515384
Mitigated
Last updated:
September 13, 2019
05:25 PM PT

Opened:
September 13, 2019
05:25 PM PT
Screenshots and Snips have an unnatural orange tint
When creating screenshots or using similar tools (such as Snipping Tool or Snip & Sketch), the resulting images may have an unnatural orange tint. This issue is caused by the Eye Care mode feature of Lenovo Vantage. This issue started on or around September 5, 2019. 

Affected platforms:
  • Client: Windows 10, version 1903
  • Server: None
Resolution: For guidance on this issue, see the Lenovo support article Screenshots and Snips have an unnatural orange tint. There is no update for Windows needed for this issue.

Back to top
OS Build 18362.356

September 10, 2019
KB4516115
Resolved External
Last updated:
September 11, 2019
08:54 PM PT

Opened:
September 11, 2019
08:54 PM PT
Some users report issues related to the Start menu and Windows Desktop Search
Microsoft has received reports that some users are having issues related to the Start menu and Windows Desktop Search.

Affected platforms:
  • Client: Windows 10, version 1903
Next steps: We are presently investigating and will provide an update when more information is available.

Back to top
OS Build 18362.356

September 10, 2019
KB4515384
Acknowledged
Last updated:
September 11, 2019
05:18 PM PT

Opened:
September 11, 2019
05:18 PM PT
Windows Desktop Search may not return any results and may have high CPU usage
Microsoft is getting reports that a small number of users may not receive results when using Windows Desktop Search and may see high CPU usage from SearchUI.exe when searching after installing KB4512941. This issue is only encountered on devices in which searching the web from Windows Desktop Search has been disabled.

Affected platforms:
  • Client: Windows 10, version 1903
Resolution: This issue was resolved in KB4515384.

Back to top
OS Build 18362.329

August 30, 2019
KB4512941
Resolved
KB4515384
Resolved:
September 10, 2019
10:00 AM PT

Opened:
September 04, 2019
02:25 PM PT
" diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index 33d09744bd..67be794791 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -60,12 +60,11 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- + -
SummaryOriginating updateStatusLast updated
You may receive an error when opening or using the Toshiba Qosmio AV Center
Toshiba Qosmio AV Center may error when opening and you may also receive an error in Event Log related to cryptnet.dll.

See details >
August 13, 2019
KB4512506
Investigating
September 11, 2019
08:58 PM PT
You may receive an error when opening or using the Toshiba Qosmio AV Center
Toshiba Qosmio AV Center may error when opening and you may also receive an error in Event Log related to cryptnet.dll.

See details >
August 13, 2019
KB4512506
Investigating
September 13, 2019
04:25 PM PT
Windows updates that are SHA-2 signed may not be offered for Symantec and Norton AV
Windows updates that are SHA-2 signed are not available with Symantec or Norton antivirus program installed

See details >
August 13, 2019
KB4512506
Resolved External
August 27, 2019
02:29 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
June 11, 2019
KB4503292
Resolved
KB4512514
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
August 13, 2019
KB4512506
Resolved
KB4517297
August 16, 2019
02:00 PM PT
IA64 and x64 devices may fail to start after installing updates
After installing updates released on or after August 13, 2019, IA64 and x64 devices using EFI Boot may fail to start.

See details >
August 13, 2019
KB4512506
Mitigated
August 17, 2019
12:59 PM PT
System may be unresponsive after restart with certain McAfee antivirus products
Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

See details >
April 09, 2019
KB4493472
Resolved External
August 13, 2019
06:59 PM PT
" @@ -81,7 +80,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
You may receive an error when opening or using the Toshiba Qosmio AV Center
After installing KB4512506, you may receive an error when opening or using the Toshiba Qosmio AV Center. You may also receive an error in Event Log related to cryptnet.dll.

Affected platforms:
  • Client: Windows 7 SP1
Next steps: Microsoft is working with Dynabook to resolve this issue and will provide an update in an upcoming release.

Back to top
August 13, 2019
KB4512506
Investigating
Last updated:
September 11, 2019
08:58 PM PT

Opened:
September 10, 2019
09:48 AM PT
You may receive an error when opening or using the Toshiba Qosmio AV Center
After installing KB4512506, you may receive an error when opening or using the Toshiba Qosmio AV Center. You may also receive an error in Event Log related to cryptnet.dll.

Affected platforms:
  • Client: Windows 7 SP1
Next steps: Microsoft is working with Dynabook to resolve this issue and estimate a solution will be available late September.

Back to top
August 13, 2019
KB4512506
Investigating
Last updated:
September 13, 2019
04:25 PM PT

Opened:
September 10, 2019
09:48 AM PT
" @@ -104,12 +103,3 @@ sections:
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503292 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512514.

Back to topJune 11, 2019
KB4503292Resolved
KB4512514Resolved:
August 17, 2019
02:00 PM PT

Opened:
July 10, 2019
02:51 PM PT " - -- title: April 2019 -- items: - - type: markdown - text: " - - -
DetailsOriginating updateStatusHistory
System may be unresponsive after restart with certain McAfee antivirus products
Microsoft and McAfee have identified an issue on devices with McAfee Endpoint Security (ENS) Threat Prevention 10.x or McAfee Host Intrusion Prevention (Host IPS) 8.0 or McAfee VirusScan Enterprise (VSE) 8.8 installed. It may cause the system to have slow startup or become unresponsive at restart after installing this update. 

Affected platforms:
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue has been resolved. McAfee has released an automatic update to address this issue. Guidance for McAfee customers can be found in the following McAfee support articles: 

Back to top
April 09, 2019
KB4493472
Resolved External
Last updated:
August 13, 2019
06:59 PM PT

Opened:
April 09, 2019
10:00 AM PT
- " diff --git a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml index 362bc0e782..504aed7b2e 100644 --- a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml @@ -60,9 +60,9 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ -
SummaryOriginating updateStatusLast updated
Windows RT 8.1 devices may have issues opening Internet Explorer 11
On Windows RT 8.1 devices, Internet Explorer 11 may not open and you may receive an error.

See details >
September 10, 2019
KB4516067
Investigating
September 13, 2019
05:25 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
June 11, 2019
KB4503276
Resolved
KB4512478
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
August 13, 2019
KB4512488
Resolved
KB4517298
August 16, 2019
02:00 PM PT
System may be unresponsive after restart with certain McAfee antivirus products
Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

See details >
April 09, 2019
KB4493446
Resolved External
August 13, 2019
06:59 PM PT
Japanese IME doesn't show the new Japanese Era name as a text input option
If previous dictionary updates are installed, the Japanese input method editor (IME) doesn't show the new Japanese Era name as a text input option.

See details >
April 25, 2019
KB4493443
Mitigated
May 15, 2019
05:53 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >
January 08, 2019
KB4480963
Mitigated
April 25, 2019
02:00 PM PT
@@ -75,6 +75,15 @@ sections:
" +- title: September 2019 +- items: + - type: markdown + text: " + + +
DetailsOriginating updateStatusHistory
Windows RT 8.1 devices may have issues opening Internet Explorer 11
On Windows 8.1 RT devices, Internet Explorer 11 may not open and you may receive the error, \"C:\\Program Files\\Internet Explorer\\iexplore.exe: A certificate was explicitly revoked by its issuer.\"


Affected platforms:
  • Client: Windows RT 8.1
Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
September 10, 2019
KB4516067
Investigating
Last updated:
September 13, 2019
05:25 PM PT

Opened:
September 13, 2019
05:25 PM PT
+ " + - title: August 2019 - items: - type: markdown @@ -102,15 +111,6 @@ sections: " -- title: April 2019 -- items: - - type: markdown - text: " - - -
DetailsOriginating updateStatusHistory
System may be unresponsive after restart with certain McAfee antivirus products
Microsoft and McAfee have identified an issue on devices with McAfee Endpoint Security (ENS) Threat Prevention 10.x or McAfee Host Intrusion Prevention (Host IPS) 8.0 or McAfee VirusScan Enterprise (VSE) 8.8 installed. It may cause the system to have slow startup or become unresponsive at restart after installing this update. 

Affected platforms:
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue has been resolved. McAfee has released an automatic update to address this issue. Guidance for McAfee customers can be found in the following McAfee support articles:  

Back to top
April 09, 2019
KB4493446
Resolved External
Last updated:
August 13, 2019
06:59 PM PT

Opened:
April 09, 2019
10:00 AM PT
- " - - title: January 2019 - items: - type: markdown diff --git a/windows/release-information/windows-message-center.yml b/windows/release-information/windows-message-center.yml index 57a7a4c18d..aad8c98172 100644 --- a/windows/release-information/windows-message-center.yml +++ b/windows/release-information/windows-message-center.yml @@ -1,11 +1,11 @@ ### YamlMime:YamlDocument documentType: LandingData -title: Windows 10 message center +title: Windows message center metadata: document_id: - title: Windows 10 message center - description: Windows 10 message center + title: Windows message center + description: Windows message center keywords: Windows 10, issues, fixes, announcements, Windows Server, advisories ms.localizationpriority: high author: greg-lindsay @@ -50,6 +50,7 @@ sections: text: " + From 2dc3161daa426e22ad704e9c81bff1717490e552 Mon Sep 17 00:00:00 2001 From: John Liu <49762389+ShenLanJohn@users.noreply.github.com> Date: Fri, 13 Sep 2019 18:50:28 -0700 Subject: [PATCH 243/285] CAT Auto Pulish for Windows Release Messages - CAT_AutoPublish_20190913173833 (#1114) (#1115) --- .../resolved-issues-windows-10-1507.yml | 6 ------ .../resolved-issues-windows-10-1607.yml | 4 ---- .../resolved-issues-windows-10-1703.yml | 2 -- .../resolved-issues-windows-10-1709.yml | 2 -- .../resolved-issues-windows-10-1803.yml | 2 -- ...indows-10-1809-and-windows-server-2019.yml | 2 -- ...ndows-7-and-windows-server-2008-r2-sp1.yml | 10 ---------- ...windows-8.1-and-windows-server-2012-r2.yml | 2 -- ...esolved-issues-windows-server-2008-sp2.yml | 10 ---------- .../resolved-issues-windows-server-2012.yml | 12 ----------- ...indows-10-1607-and-windows-server-2016.yml | 12 +++++++++-- .../status-windows-10-1703.yml | 10 ++++++++++ .../status-windows-10-1709.yml | 10 ++++++++++ .../status-windows-10-1803.yml | 2 ++ ...indows-10-1809-and-windows-server-2019.yml | 2 ++ .../status-windows-10-1903.yml | 10 ++++++++-- ...ndows-7-and-windows-server-2008-r2-sp1.yml | 14 ++----------- ...windows-8.1-and-windows-server-2012-r2.yml | 20 +++++++++---------- .../windows-message-center.yml | 7 ++++--- 19 files changed, 58 insertions(+), 81 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1507.yml b/windows/release-information/resolved-issues-windows-10-1507.yml index 6eb7bd7645..b4f166be36 100644 --- a/windows/release-information/resolved-issues-windows-10-1507.yml +++ b/windows/release-information/resolved-issues-windows-10-1507.yml @@ -38,10 +38,7 @@ sections: - - -
MessageDate
Plan for change: End of service reminders for Windows 10, versions 1703 and 1803
The Home, Pro, Pro for Workstations, and IoT Core editions of Windows 10, version 1703 (the Creators Update) will reach end of service on October 8, 2019. The Enterprise and Education editions of Windows 10, version 1803 (the April 2018 Update) will reach end of service on November 12, 2019. We recommend that you update devices running these versions and editions to the latest version of Windows 10—Windows 10, version 1903—as soon as possible to help keep them protected and your environments secure.
September 13, 2019
03:23 PM PT
September 2019 security update available for all supported versions of Windows
The September 2019 security update release, referred to as our “B” release, is now available for Windows 10, version 1903 and all supported versions of Windows. We recommend that you install these updates promptly. To be informed about the latest updates and releases, follow us on Twitter @WindowsUpdate.
September 10, 2019
09:34 AM PT
Status update: Windows 10, version 1903 \"D\" optional release available August 30th
The August optional monthly “D” release for Windows 10, version 1903 is now available. Follow @WindowsUpdate for the latest on the availability of this release.
August 30, 2019
08:00 AM PT
Feature update install notification on Windows 10, version 1809 (the October 2018 Update)
We've had reports on August 29th that some customers running Windows 10, version 1809 (the October 2018 Update) have received notification to install the latest feature update (version 1903) early. Updating remains in your control. To install the update, you must select one of the following options: \"Pick a Time\", \"Restart Tonight,\" or \"Restart Now\". If you are not ready to update at this time, simply dismiss the notification by clicking the arrow in the top right corner. If you have updated to Windows 10, version 1903 and would like to go back to your previous version, see the instructions here.
August 29, 2019
04:39 PM PT
Unable to access some gov.uk websites
gov.uk websites that don’t support “HSTS” may not be accessible

See details >
OS Build 10240.18215

May 14, 2019
KB4499154
Resolved
KB4505051
May 19, 2019
02:00 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
March 12, 2019
10:00 AM PT
First character of Japanese era name not recognized
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >
OS Build 10240.18158

March 12, 2019
KB4489872
Resolved
KB4493475
April 09, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

See details >
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
March 12, 2019
10:00 AM PT
" @@ -95,9 +92,6 @@ sections: text: " - - -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493475

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4493475
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487018, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
First character of Japanese era name not recognized
After installing KB4487018, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Applications using Microsoft Jet database and Access 95 file format stop working
Applications that use a Microsoft Jet database with the Microsoft Access 95 file format may randomly stop working.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489872.

Back to top
OS Build 10240.18132

February 12, 2019
KB4487018
Resolved
KB4489872
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1607.yml b/windows/release-information/resolved-issues-windows-10-1607.yml index 6f568f3c14..ec69b6c4fc 100644 --- a/windows/release-information/resolved-issues-windows-10-1607.yml +++ b/windows/release-information/resolved-issues-windows-10-1607.yml @@ -53,9 +53,7 @@ sections:
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >OS Build 14393.2724

January 08, 2019
KB4480961Resolved
KB4493470April 09, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen may appear at startup.

See details >OS Build 14393.2879

March 19, 2019
KB4489889Resolved
KB4493470April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >OS Build 14393.2724

January 08, 2019
KB4480961Resolved
KB4493470April 09, 2019
10:00 AM PT -
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >OS Build 14393.2791

February 12, 2019
KB4487026Resolved
KB4489882March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >OS Build 14393.2848

March 12, 2019
KB4489882Resolved
KB4493473April 25, 2019
02:00 PM PT -
Issue hosting multiple terminal server sessions and a user logs off on Windows Server
In some cases, Windows Server will stop working and restart when hosting multiple terminal server sessions and a user logs off.

See details >OS Build 14393.2828

February 19, 2019
KB4487006Resolved
KB4489882March 12, 2019
10:00 AM PT " @@ -139,8 +137,6 @@ sections: text: " - -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493470

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4493470
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487026, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2791

February 12, 2019
KB4487026
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Issue hosting multiple terminal server sessions and a user logs off on Windows Server
In some cases, Windows Server will stop working and restart when hosting multiple terminal server sessions and a user logs off. The faulting driver is win32kbase.sys.

Affected platforms:
  • Client: Windows 10, version 1607; Windows 10 Enterprise LTSC 2016
  • Server: Windows Server 2016
Resolution: This issue is resolved in KB4489882.

Back to top
OS Build 14393.2828

February 19, 2019
KB4487006
Resolved
KB4489882
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1703.yml b/windows/release-information/resolved-issues-windows-10-1703.yml index 582aec0f1a..0a16421180 100644 --- a/windows/release-information/resolved-issues-windows-10-1703.yml +++ b/windows/release-information/resolved-issues-windows-10-1703.yml @@ -44,7 +44,6 @@ sections:
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >OS Build 15063.1631

February 12, 2019
KB4487020Resolved
KB4493474April 09, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >OS Build 15063.1716

March 19, 2019
KB4489888Resolved
KB4493474April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >OS Build 15063.1563

January 08, 2019
KB4480973Resolved
KB4493474April 09, 2019
10:00 AM PT -
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >OS Build 15063.1659

February 19, 2019
KB4487011Resolved
KB4489871March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >OS Build 15063.1689

March 12, 2019
KB4489871Resolved
KB4493436April 25, 2019
02:00 PM PT " @@ -114,7 +113,6 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493474

Back to top
OS Build 15063.1631

February 12, 2019
KB4487020
Resolved
KB4493474
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487011, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489871.

Back to top
OS Build 15063.1659

February 19, 2019
KB4487011
Resolved
KB4489871
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1709.yml b/windows/release-information/resolved-issues-windows-10-1709.yml index 0cdbe87fcb..b9fb594146 100644 --- a/windows/release-information/resolved-issues-windows-10-1709.yml +++ b/windows/release-information/resolved-issues-windows-10-1709.yml @@ -46,7 +46,6 @@ sections:
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >OS Build 16299.967

February 12, 2019
KB4486996Resolved
KB4493441April 09, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >OS Build 16299.1059

March 19, 2019
KB4489890Resolved
KB4493441April 09, 2019
10:00 AM PT
MSXML6 causes applications to stop responding if an exception was thrown
MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >OS Build 16299.904

January 08, 2019
KB4480978Resolved
KB4493441April 09, 2019
10:00 AM PT -
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >OS Build 16299.967

February 12, 2019
KB4486996Resolved
KB4489886March 12, 2019
10:00 AM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start Secure Shell from Windows Subsystem for Linux with agent forwarding using a command line switch (ssh –A) or a configuration setting.

See details >OS Build 16299.1029

March 12, 2019
KB4489886Resolved
KB4493441April 09, 2019
10:00 AM PT " @@ -126,7 +125,6 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493441

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4493441
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4486996, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489886.

Back to top
OS Build 16299.967

February 12, 2019
KB4486996
Resolved
KB4489886
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1803.yml b/windows/release-information/resolved-issues-windows-10-1803.yml index 174aa6ebe6..a65cc10df5 100644 --- a/windows/release-information/resolved-issues-windows-10-1803.yml +++ b/windows/release-information/resolved-issues-windows-10-1803.yml @@ -46,7 +46,6 @@ sections:
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >OS Build 17134.590

February 12, 2019
KB4487017Resolved
KB4493464April 09, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >OS Build 17134.677

March 19, 2019
KB4489894Resolved
KB4493464April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >OS Build 17134.523

January 08, 2019
KB4480966Resolved
KB4493464April 09, 2019
10:00 AM PT -
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

See details >OS Build 17134.590

February 12, 2019
KB4487017Resolved
KB4489868March 12, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >OS Build 17134.648

March 12, 2019
KB4489868Resolved
KB4493437April 25, 2019
02:00 PM PT
Stop error when attempting to start SSH from WSL
A stop error occurs when attempting to start Secure Shell from Windows Subsystem for Linux with agent forwarding using a command line switch (ssh –A) or a configuration setting.

See details >OS Build 17134.648

March 12, 2019
KB4489868Resolved
KB4493464April 09, 2019
10:00 AM PT @@ -136,7 +135,6 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493464

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4493464
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487017, users may received \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489868.

Back to top
OS Build 17134.590

February 12, 2019
KB4487017
Resolved
KB4489868
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml index 37df3391a5..829b497041 100644 --- a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml @@ -54,7 +54,6 @@ sections:
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >OS Build 17763.253

January 08, 2019
KB4480116Resolved
KB4493509April 09, 2019
10:00 AM PT
End-user-defined characters (EUDC) may cause blue screen at startup
If you enable per font end-user-defined characters (EUDC), the system may stop working and a blue screen may appear at startup.

See details >OS Build 17763.404

April 02, 2019
KB4490481Resolved
KB4493509April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >OS Build 17763.253

January 08, 2019
KB4480116Resolved
KB4493509April 09, 2019
10:00 AM PT -
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

See details >OS Build 17763.316

February 12, 2019
KB4487044Resolved
KB4489899March 12, 2019
10:00 AM PT
Apps may stop working after selecting an audio output device other than the default
Users with multiple audio devices that select an audio output device different from the \"Default Audio Device\" may find certain applications stop working unexpectedly.

See details >OS Build 17763.348

March 01, 2019
KB4482887Resolved
KB4490481April 02, 2019
10:00 AM PT " @@ -140,7 +139,6 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly. 
 
For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color. 
 
Affected platforms:  
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1  
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2  
Resolution: This issue is resolved in KB4493509.  

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4493509
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487044, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files. 

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489899

Back to top
OS Build 17763.316

February 12, 2019
KB4487044
Resolved
KB4489899
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml index 5305dd2345..aa64a5bbb2 100644 --- a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml @@ -49,7 +49,6 @@ sections:
NETDOM.EXE fails to run
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >March 12, 2019
KB4489878Resolved
KB4493472April 09, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >March 12, 2019
KB4489878Resolved
KB4493472April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >January 08, 2019
KB4480970Resolved
KB4493472April 09, 2019
10:00 AM PT -
Event Viewer may not show some event descriptions for network interface cards
The Event Viewer may not show some event descriptions for network interface cards (NIC).

See details >October 18, 2018
KB4462927Resolved
KB4489878March 12, 2019
10:00 AM PT " @@ -140,12 +139,3 @@ sections:
Internet Explorer 11 authentication issue with multiple concurrent logons
After installing KB4480970, Internet Explorer 11 and other applications that use WININET.DLL may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.
Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493472.

Back to topJanuary 08, 2019
KB4480970Resolved
KB4493472Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT " - -- title: October 2018 -- items: - - type: markdown - text: " - - -
DetailsOriginating updateStatusHistory
Event Viewer may not show some event descriptions for network interface cards
After installing KB4462927, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Affected Platforms:
  • Client: Windows 7 SP1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4489878.

Back to top
October 18, 2018
KB4462927
Resolved
KB4489878
Resolved:
March 12, 2019
10:00 AM PT

Opened:
October 18, 2018
10:00 AM PT
- " diff --git a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml index cee285c22f..6255d324e1 100644 --- a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml @@ -48,7 +48,6 @@ sections:
Devices may not respond at login or Welcome screen if running certain Avast software
Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.

See details >April 09, 2019
KB4493446Resolved
April 25, 2019
02:00 PM PT
Devices with winsock kernel client may receive error
Devices with a winsock kernel client may receive D1, FC, and other errors.

See details >March 12, 2019
KB4489881Resolved
KB4489893March 19, 2019
10:00 AM PT
Custom URI schemes may not start corresponding application
Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.

See details >March 12, 2019
KB4489881Resolved
KB4493446April 09, 2019
10:00 AM PT -
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >February 19, 2019
KB4487016Resolved
KB4489881March 12, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding.
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >January 08, 2019
KB4480963Resolved
KB4493446April 09, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >January 08, 2019
KB4480963Resolved
KB4493446April 09, 2019
10:00 AM PT @@ -130,7 +129,6 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493446.

Back to top
February 12, 2019
KB4487000
Resolved
KB4493446
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487016, users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

Affected platforms: 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012 
Resolution: This issue is resolved in KB4489881.

Back to top
February 19, 2019
KB4487016
Resolved
KB4489881
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 19, 2019
02:00 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml index df7f82cfb2..f81be52e89 100644 --- a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml +++ b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml @@ -40,7 +40,6 @@ sections:
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >April 09, 2019
KB4493471Resolved
May 14, 2019
01:19 PM PT
Authentication may fail for services after the Kerberos ticket expires
Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

See details >March 12, 2019
KB4489880Resolved
KB4499149May 14, 2019
10:00 AM PT
NETDOM.EXE fails to run
NETDOM.EXE fails to run and the error, “The command failed to complete successfully.” appears on screen.

See details >March 12, 2019
KB4489880Resolved
KB4493471April 09, 2019
10:00 AM PT -
First character of the Japanese era name not recognized as an abbreviation
The first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

See details >January 17, 2019
KB4480974Resolved
KB4489880March 12, 2019
10:00 AM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >February 12, 2019
KB4487023Resolved
KB4493471April 09, 2019
10:00 AM PT " @@ -108,12 +107,3 @@ sections:
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4493471.

Back to topFebruary 12, 2019
KB4487023Resolved
KB4493471Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT " - -- title: January 2019 -- items: - - type: markdown - text: " - - -
DetailsOriginating updateStatusHistory
First character of the Japanese era name not recognized as an abbreviation
After installing KB4480974, the first character of the Japanese era name is not recognized as an abbreviation and may cause date parsing issues.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue is resolved in KB4489880.

Back to top
January 17, 2019
KB4480974
Resolved
KB4489880
Resolved:
March 12, 2019
10:00 AM PT

Opened:
January 17, 2019
10:00 AM PT
- " diff --git a/windows/release-information/resolved-issues-windows-server-2012.yml b/windows/release-information/resolved-issues-windows-server-2012.yml index 4bd64240b8..bb1c5a4635 100644 --- a/windows/release-information/resolved-issues-windows-server-2012.yml +++ b/windows/release-information/resolved-issues-windows-server-2012.yml @@ -44,10 +44,8 @@ sections:
System unresponsive after restart if Sophos Endpoint Protection installed
Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

See details >April 09, 2019
KB4493451Resolved
May 14, 2019
01:21 PM PT
System may be unresponsive after restart if Avira antivirus software installed
Devices with Avira antivirus software installed may become unresponsive upon restart.

See details >April 09, 2019
KB4493451Resolved
May 14, 2019
01:19 PM PT
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

See details >February 12, 2019
KB4487025Resolved
KB4493451April 09, 2019
10:00 AM PT -
Error 1309 when installing/uninstalling MSI or MSP files
Users may receive “Error 1309” while installing or uninstalling certain types of MSI and MSP files.

See details >February 12, 2019
KB4487025Resolved
KB4489891March 12, 2019
10:00 AM PT
Internet Explorer 11 authentication issue with multiple concurrent logons
Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.

See details >January 08, 2019
KB4480975Resolved
KB4493451April 09, 2019
10:00 AM PT
MSXML6 may cause applications to stop responding
MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

See details >January 08, 2019
KB4480975Resolved
KB4493451April 09, 2019
10:00 AM PT -
Event Viewer may not show some event descriptions for network interface cards
The Event Viewer may not show some event descriptions for network interface cards (NIC).

See details >September 11, 2018
KB4457135Resolved
KB4489891March 12, 2019
10:00 AM PT " @@ -123,7 +121,6 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Embedded objects may display incorrectly
Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.

For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.

Affected platforms 
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1 
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
Resolution: This issue is resolved in KB4493451.

Back to top
February 12, 2019
KB4487025
Resolved
KB4493451
Resolved:
April 09, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
Error 1309 when installing/uninstalling MSI or MSP files
After installing KB4487025, users may receive \"Error 1309\" while installing or uninstalling certain types of MSI and MSP files.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4489891.

Back to top
February 12, 2019
KB4487025
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
February 12, 2019
10:00 AM PT
" @@ -136,12 +133,3 @@ sections:
MSXML6 may cause applications to stop responding
After installing KB4480975, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
  • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue is resolved in KB4493451.

Back to topJanuary 08, 2019
KB4480975Resolved
KB4493451Resolved:
April 09, 2019
10:00 AM PT

Opened:
January 08, 2019
10:00 AM PT " - -- title: September 2018 -- items: - - type: markdown - text: " - - -
DetailsOriginating updateStatusHistory
Event Viewer may not show some event descriptions for network interface cards
After installing KB4457135, the Event Viewer may not show some event descriptions for network interface cards (NICs).

Affected Platforms:
  • Client: Windows 7 SP1 
  • Server: Windows Server 2012; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4489891.

Back to top
September 11, 2018
KB4457135
Resolved
KB4489891
Resolved:
March 12, 2019
10:00 AM PT

Opened:
September 11, 2018
10:00 AM PT
- " diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index 208a38f5dd..562cad0e09 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -60,11 +60,11 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ - @@ -78,6 +78,15 @@ sections:
" +- title: September 2019 +- items: + - type: markdown + text: " +
SummaryOriginating updateStatusLast updated
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) including ChsIME.EXE, may become unresponsive or may have high CPU usage.

See details >
OS Build 14393.3204

September 10, 2019
KB4516044
Mitigated
September 13, 2019
05:25 PM PT
Apps and scripts using the NetQueryDisplayInformation API may fail with error
Applications and scripts that call the NetQueryDisplayInformation API or the WinNT provider equivalent may fail to return results after the first page of data.

See details >
OS Build 14393.3053

June 18, 2019
KB4503294
Resolved
KB4516044
September 10, 2019
10:00 AM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 14393.3115

July 16, 2019
KB4507459
Resolved
KB4512517
August 13, 2019
10:00 AM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
OS Build 14393.3025

June 11, 2019
KB4503267
Resolved
KB4512495
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 14393.3144

August 13, 2019
KB4512517
Resolved
KB4512495
August 17, 2019
02:00 PM PT
Internet Explorer 11 and apps using the WebBrowser control may fail to render
JavaScript may fail to render as expected in Internet Explorer 11 and in apps using JavaScript or the WebBrowser control.

See details >
OS Build 14393.3085

July 09, 2019
KB4507460
Resolved
KB4512517
August 13, 2019
10:00 AM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Mitigated
April 25, 2019
02:00 PM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

See details >
OS Build 14393.2608

November 13, 2018
KB4467691
Mitigated
February 19, 2019
10:00 AM PT
Cluster service may fail if the minimum password length is set to greater than 14
The cluster service may fail to start with the error “2245 (NERR_PasswordTooShort)” if the Group Policy “Minimum Password Length” is configured with greater than 14 characters.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
April 25, 2019
02:00 PM PT
+ +
DetailsOriginating updateStatusHistory
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include CHS (Chinese Simplified) and CHT (Chinese Traditional) with Changjie/Quick keyboard.


Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016

Workaround: To mitigate the issue, perform the following steps:
  1. Select the Start button and type Services.
  2. Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
  3. Locate Startup type: and change it to Manual
  4. Select Ok
  5. The TabletInputService service is now in the default configuration and IME should work as expected.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.3204

September 10, 2019
KB4516044
Mitigated
Last updated:
September 13, 2019
05:25 PM PT

Opened:
September 13, 2019
05:25 PM PT
+ " + - title: August 2019 - items: - type: markdown @@ -96,7 +105,6 @@ sections:
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4507459. Devices that are domain controllers or domain members are both affected.

To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
 

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4512517 and the safeguard hold has been removed. Please note, it can take up to 48 hours before you can update to offered Windows 10, version 1903 or Windows Server, version 1903.

Back to topOS Build 14393.3115

July 16, 2019
KB4507459Resolved
KB4512517Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503267 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512495.

Back to topOS Build 14393.3025

June 11, 2019
KB4503267Resolved
KB4512495Resolved:
August 17, 2019
02:00 PM PT

Opened:
July 10, 2019
02:51 PM PT -
Internet Explorer 11 and apps using the WebBrowser control may fail to render
Internet Explorer 11 may fail to render some JavaScript after installing KB4507460. You may also have issues with apps using JavaScript or the WebBrowser control, such as the present PowerPoint feature of Skype Meeting Broadcast.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server 2016
Resolution: This issue was resolved in KB4512517.

Back to topOS Build 14393.3085

July 09, 2019
KB4507460Resolved
KB4512517Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 26, 2019
04:58 PM PT " diff --git a/windows/release-information/status-windows-10-1703.yml b/windows/release-information/status-windows-10-1703.yml index 626ca1a8e2..094b5c9bab 100644 --- a/windows/release-information/status-windows-10-1703.yml +++ b/windows/release-information/status-windows-10-1703.yml @@ -66,6 +66,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ @@ -79,6 +80,15 @@ sections:
" +- title: September 2019 +- items: + - type: markdown + text: " +
SummaryOriginating updateStatusLast updated
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) including ChsIME.EXE, may become unresponsive or may have high CPU usage.

See details >
OS Build 15063.2045

September 10, 2019
KB4516068
Mitigated
September 13, 2019
05:25 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 15063.1955

July 16, 2019
KB4507467
Resolved
KB4512507
August 13, 2019
10:00 AM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 15063.1988

August 13, 2019
KB4512507
Resolved
KB4512474
August 17, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Mitigated
April 25, 2019
02:00 PM PT
+ +
DetailsOriginating updateStatusHistory
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include CHS (Chinese Simplified) and CHT (Chinese Traditional) with Changjie/Quick keyboard.


Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016

Workaround: To mitigate the issue, perform the following steps:
  1. Select the Start button and type Services.
  2. Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
  3. Locate Startup type: and change it to Manual
  4. Select Ok
  5. The TabletInputService service is now in the default configuration and IME should work as expected.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 15063.2045

September 10, 2019
KB4516068
Mitigated
Last updated:
September 13, 2019
05:25 PM PT

Opened:
September 13, 2019
05:25 PM PT
+ " + - title: August 2019 - items: - type: markdown diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index ef4bc11351..4363810035 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -60,6 +60,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ @@ -74,6 +75,15 @@ sections:
" +- title: September 2019 +- items: + - type: markdown + text: " +
SummaryOriginating updateStatusLast updated
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) including ChsIME.EXE, may become unresponsive or may have high CPU usage.

See details >
OS Build 16299.1387

September 10, 2019
KB4516066
Mitigated
September 13, 2019
05:25 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 16299.1296

July 16, 2019
KB4507465
Resolved
KB4512516
August 13, 2019
10:00 AM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
OS Build 16299.1217

June 11, 2019
KB4503284
Resolved
KB4512494
August 16, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 16299.1331

August 13, 2019
KB4512516
Resolved
KB4512494
August 16, 2019
02:00 PM PT
+ +
DetailsOriginating updateStatusHistory
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include CHS (Chinese Simplified) and CHT (Chinese Traditional) with Changjie/Quick keyboard.


Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016

Workaround: To mitigate the issue, perform the following steps:
  1. Select the Start button and type Services.
  2. Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
  3. Locate Startup type: and change it to Manual
  4. Select Ok
  5. The TabletInputService service is now in the default configuration and IME should work as expected.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.1387

September 10, 2019
KB4516066
Mitigated
Last updated:
September 13, 2019
05:25 PM PT

Opened:
September 13, 2019
05:25 PM PT
+ " + - title: August 2019 - items: - type: markdown diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml index 1fe49fd40a..410ce10ff9 100644 --- a/windows/release-information/status-windows-10-1803.yml +++ b/windows/release-information/status-windows-10-1803.yml @@ -65,6 +65,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ @@ -87,6 +88,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) including ChsIME.EXE, may become unresponsive or may have high CPU usage.

See details >
OS Build 17134.1006

September 10, 2019
KB4516058
Mitigated
September 13, 2019
05:25 PM PT
Windows Mixed Reality Portal users may intermittently receive a 15-5 error code
You may receive a 15-5 error code in Windows Mixed Reality Portal and your headset may not respond to \"wake up\" from sleep.

See details >
OS Build 17134.950

August 13, 2019
KB4512501
Mitigated
September 11, 2019
05:32 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 17134.915

July 16, 2019
KB4507466
Resolved
KB4512501
August 13, 2019
10:00 AM PT
Notification issue: \"Your device is missing important security and quality fixes.\"
Some users may have incorrectly received the notification \"Your device is missing important security and quality fixes.\"

See details >
N/A

Resolved
September 03, 2019
12:32 PM PT
+
DetailsOriginating updateStatusHistory
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include CHS (Chinese Simplified) and CHT (Chinese Traditional) with Changjie/Quick keyboard.


Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016

Workaround: To mitigate the issue, perform the following steps:
  1. Select the Start button and type Services.
  2. Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
  3. Locate Startup type: and change it to Manual
  4. Select Ok
  5. The TabletInputService service is now in the default configuration and IME should work as expected.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17134.1006

September 10, 2019
KB4516058
Mitigated
Last updated:
September 13, 2019
05:25 PM PT

Opened:
September 13, 2019
05:25 PM PT
Windows Mixed Reality Portal users may intermittently receive a 15-5 error code
After installing KB4512501, Windows Mixed Reality Portal users may intermittently receive a 15-5 error code. In some cases, Windows Mixed Reality Portal may report that the headset is sleeping and pressing “Wake up” may appear to produce no action.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10, version 1803
Workaround: To mitigate the issue, use the following steps:
  1. Close the Windows Mixed Reality Portal, if it is running.
  2. Open Task Manager by selecting the Start button and typing Task Manager.
  3. In Task Manager under the Processes tab, right click or long press on “Windows Explorer” and select restart.
  4. You can now open the Windows Mixed Reality Portal.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17134.950

August 13, 2019
KB4512501
Mitigated
Last updated:
September 11, 2019
05:32 PM PT

Opened:
September 11, 2019
05:32 PM PT
Notification issue: \"Your device is missing important security and quality fixes.\"
Some users may have incorrectly received the notification \"Your device is missing important security and quality fixes\" in the Windows Update dialog and a red \"!\" in the task tray on the Windows Update tray icon. This notification is intended for devices that are 90 days or more out of date, but some users with installed updates released in June or July also saw this notification.

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
Resolution: This issue was resolved on the server side on August 30, 2019. Only devices that are out of date by 90 days or more should now see the notification. No action is required by the user to resolve this issue. If you are still seeing the \"Your device is missing important security and quality fixes\" notification, we recommend selecting Check for Updates in the Windows Update dialog. For instructions, see Update Windows 10. Microsoft always recommends trying to keep your devices up to date, as the monthly updates contain important security fixes. 

Back to top
N/A

Resolved
Resolved:
September 03, 2019
12:32 PM PT

Opened:
September 03, 2019
12:32 PM PT
diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index 5543553734..6685b4a484 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -64,6 +64,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ @@ -87,6 +88,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) including ChsIME.EXE, may become unresponsive or may have high CPU usage.

See details >
OS Build 17763.737

September 10, 2019
KB4512578
Mitigated
September 13, 2019
05:25 PM PT
Windows Mixed Reality Portal users may intermittently receive a 15-5 error code
You may receive a 15-5 error code in Windows Mixed Reality Portal and your headset may not respond to \"wake up\" from sleep.

See details >
OS Build 17763.678

August 13, 2019
KB4511553
Mitigated
September 11, 2019
05:32 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 17763.652

July 22, 2019
KB4505658
Resolved
KB4511553
August 13, 2019
10:00 AM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
OS Build 17763.557

June 11, 2019
KB4503327
Resolved
KB4512534
August 17, 2019
02:00 PM PT
+
DetailsOriginating updateStatusHistory
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include CHS (Chinese Simplified) and CHT (Chinese Traditional) with Changjie/Quick keyboard.


Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016

Workaround: To mitigate the issue, perform the following steps:
  1. Select the Start button and type Services.
  2. Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
  3. Locate Startup type: and change it to Manual
  4. Select Ok
  5. The TabletInputService service is now in the default configuration and IME should work as expected.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.737

September 10, 2019
KB4512578
Mitigated
Last updated:
September 13, 2019
05:25 PM PT

Opened:
September 13, 2019
05:25 PM PT
Windows Mixed Reality Portal users may intermittently receive a 15-5 error code
After installing KB4511553, Windows Mixed Reality Portal users may intermittently receive a 15-5 error code. In some cases, Windows Mixed Reality Portal may report that the headset is sleeping and pressing “Wake up” may appear to produce no action.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10, version 1803
Workaround: To mitigate the issue, use the following steps:
  1. Close the Windows Mixed Reality Portal, if it is running.
  2. Open Task Manager by selecting the Start button and typing Task Manager.
  3. In Task Manager under the Processes tab, right click or long press on “Windows Explorer” and select restart.
  4. You can now open the Windows Mixed Reality Portal.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.678

August 13, 2019
KB4511553
Mitigated
Last updated:
September 11, 2019
05:32 PM PT

Opened:
September 11, 2019
05:32 PM PT
" diff --git a/windows/release-information/status-windows-10-1903.yml b/windows/release-information/status-windows-10-1903.yml index a33834cce2..4146c05f31 100644 --- a/windows/release-information/status-windows-10-1903.yml +++ b/windows/release-information/status-windows-10-1903.yml @@ -65,8 +65,11 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ + + + - @@ -96,8 +99,11 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
Safeguard on certain devices with some Intel and Broadcom Wi-Fi adapters
Microsoft and NEC have found incompatibility issues with some devices with Intel Centrino 6205/6235 and Broadcom 802.11ac Wi-Fi cards when running Windows 10, version 1903.

See details >
N/A

Mitigated
September 13, 2019
05:25 PM PT
Some users report issues related to the Start menu and Windows Desktop Search
Microsoft has received reports that a small number of users are having issues related to the Start menu and Windows Desktop Search.

See details >
OS Build 18362.356

September 10, 2019
KB4515384
Investigating
September 13, 2019
05:35 PM PT
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) including ChsIME.EXE, may become unresponsive or may have high CPU usage.

See details >
OS Build 18362.356

September 10, 2019
KB4515384
Mitigated
September 13, 2019
05:25 PM PT
Audio in games is quiet or different than expected
Microsoft has received reports that audio in certain games is quieter or different than expected.

See details >
OS Build 18362.356

September 10, 2019
KB4515384
Mitigated
September 13, 2019
05:25 PM PT
Screenshots and Snips have an unnatural orange tint
Users have reported an orange tint on Screenshots and Snips with the Lenovo Vantage app installed

See details >
OS Build 18362.356

September 10, 2019
KB4516115
Resolved External
September 11, 2019
08:54 PM PT
Some users report issues related to the Start menu and Windows Desktop Search
Microsoft has received reports that some users are having issues related to the Start menu and Windows Desktop Search.

See details >
OS Build 18362.356

September 10, 2019
KB4515384
Acknowledged
September 11, 2019
05:18 PM PT
Windows Desktop Search may not return any results and may have high CPU usage
Windows Desktop Search may not return any results and SearchUI.exe may have high CPU usage after installing KB4512941.

See details >
OS Build 18362.329

August 30, 2019
KB4512941
Resolved
KB4515384
September 10, 2019
10:00 AM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 18362.145

May 29, 2019
KB4497935
Resolved
KB4512941
August 30, 2019
10:00 AM PT
Issues updating when certain versions of Intel storage drivers are installed
Certain versions of Intel Rapid Storage Technology (Intel RST) drivers may cause updating to Windows 10, version 1903 to fail.

See details >
OS Build 18362.145

May 29, 2019
KB4497935
Resolved
KB4512941
August 30, 2019
10:00 AM PT
+ + + + -
DetailsOriginating updateStatusHistory
Safeguard on certain devices with some Intel and Broadcom Wi-Fi adapters
Microsoft and NEC have found incompatibility issues with Intel Centrino 6205/6235 and Broadcom 802.11ac Wi-Fi cards when running Windows 10, version 1903 on specific models of NEC devices. If these devices are updated to Windows 10, version 1903, they will no longer be able to use any Wi-Fi connections. The Wi-Fi driver may have a yellow exclamation point in device manager. The task tray icon for networking may show the icon for no internet and Network & Internet settings may not show any Wi-Fi networks.

To safeguard your update experience, we have applied a compatibility hold on the affected devices from being offered Windows 10, version 1903.

Affected platforms:
  • Client: Windows 10, version 1903
Workaround: If you are using an affected device and you have already installed Windows 10, version 1903, you can mitigate the issue disabling then re-enabling the Wi-Fi adapter in Device Manager. You should now be able to use Wi-Fi until your next reboot.

Next steps: Microsoft and NEC are working on a resolution and will provide an update in an upcoming release.

Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

Back to top
N/A

Mitigated
Last updated:
September 13, 2019
05:25 PM PT

Opened:
September 13, 2019
05:25 PM PT
Some users report issues related to the Start menu and Windows Desktop Search
Microsoft has received reports that a small number of users are having issues related to the Start menu and Windows Desktop Search.

Affected platforms:
  • Client: Windows 10, version 1903
Next steps: We are presently investigating and will provide an update when more information is available.

Note As a first step with any issue you may encounter, we recommend you refer to our troubleshooting support guides. If you are having an issue with search, see Fix problems in Windows Search.

Back to top
OS Build 18362.356

September 10, 2019
KB4515384
Investigating
Last updated:
September 13, 2019
05:35 PM PT

Opened:
September 11, 2019
05:18 PM PT
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include CHS (Chinese Simplified) and CHT (Chinese Traditional) with Changjie/Quick keyboard.


Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016

Workaround: To mitigate the issue, perform the following steps:
  1. Select the Start button and type Services.
  2. Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
  3. Locate Startup type: and change it to Manual
  4. Select Ok
  5. The TabletInputService service is now in the default configuration and IME should work as expected.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 18362.356

September 10, 2019
KB4515384
Mitigated
Last updated:
September 13, 2019
05:25 PM PT

Opened:
September 13, 2019
05:25 PM PT
Audio in games is quiet or different than expected
Microsoft has received reports that audio in certain games is quieter or different than expected. At the request of some of our audio partners, we implemented a compatibility change that enabled certain games to query support and render multi-channel audio. Due to customer feedback, we are reverting this change as some games and some devices are not rendering multi-channel audio as expected. This may result in games sounding different than customers are used to and may have missing channels.

Affected platforms:
  • Client: Windows 10, version 1903
Workaround: To mitigate the issue, open settings in the impacted game and disable multi-channel audio, if this option is available. You can also search in the Windows Control Panel for 3rd party audio device control panels and disable Multi-channel audio or Virtual Surround Sound, if these options are available.  

Next steps: We are working on a resolution and estimates a solution will be available in late September.

Back to top
OS Build 18362.356

September 10, 2019
KB4515384
Mitigated
Last updated:
September 13, 2019
05:25 PM PT

Opened:
September 13, 2019
05:25 PM PT
Screenshots and Snips have an unnatural orange tint
When creating screenshots or using similar tools (such as Snipping Tool or Snip & Sketch), the resulting images may have an unnatural orange tint. This issue is caused by the Eye Care mode feature of Lenovo Vantage. This issue started on or around September 5, 2019. 

Affected platforms:
  • Client: Windows 10, version 1903
  • Server: None
Resolution: For guidance on this issue, see the Lenovo support article Screenshots and Snips have an unnatural orange tint. There is no update for Windows needed for this issue.

Back to top
OS Build 18362.356

September 10, 2019
KB4516115
Resolved External
Last updated:
September 11, 2019
08:54 PM PT

Opened:
September 11, 2019
08:54 PM PT
Some users report issues related to the Start menu and Windows Desktop Search
Microsoft has received reports that some users are having issues related to the Start menu and Windows Desktop Search.

Affected platforms:
  • Client: Windows 10, version 1903
Next steps: We are presently investigating and will provide an update when more information is available.

Back to top
OS Build 18362.356

September 10, 2019
KB4515384
Acknowledged
Last updated:
September 11, 2019
05:18 PM PT

Opened:
September 11, 2019
05:18 PM PT
Windows Desktop Search may not return any results and may have high CPU usage
Microsoft is getting reports that a small number of users may not receive results when using Windows Desktop Search and may see high CPU usage from SearchUI.exe when searching after installing KB4512941. This issue is only encountered on devices in which searching the web from Windows Desktop Search has been disabled.

Affected platforms:
  • Client: Windows 10, version 1903
Resolution: This issue was resolved in KB4515384.

Back to top
OS Build 18362.329

August 30, 2019
KB4512941
Resolved
KB4515384
Resolved:
September 10, 2019
10:00 AM PT

Opened:
September 04, 2019
02:25 PM PT
" diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index 33d09744bd..67be794791 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -60,12 +60,11 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- + -
SummaryOriginating updateStatusLast updated
You may receive an error when opening or using the Toshiba Qosmio AV Center
Toshiba Qosmio AV Center may error when opening and you may also receive an error in Event Log related to cryptnet.dll.

See details >
August 13, 2019
KB4512506
Investigating
September 11, 2019
08:58 PM PT
You may receive an error when opening or using the Toshiba Qosmio AV Center
Toshiba Qosmio AV Center may error when opening and you may also receive an error in Event Log related to cryptnet.dll.

See details >
August 13, 2019
KB4512506
Investigating
September 13, 2019
04:25 PM PT
Windows updates that are SHA-2 signed may not be offered for Symantec and Norton AV
Windows updates that are SHA-2 signed are not available with Symantec or Norton antivirus program installed

See details >
August 13, 2019
KB4512506
Resolved External
August 27, 2019
02:29 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
June 11, 2019
KB4503292
Resolved
KB4512514
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
August 13, 2019
KB4512506
Resolved
KB4517297
August 16, 2019
02:00 PM PT
IA64 and x64 devices may fail to start after installing updates
After installing updates released on or after August 13, 2019, IA64 and x64 devices using EFI Boot may fail to start.

See details >
August 13, 2019
KB4512506
Mitigated
August 17, 2019
12:59 PM PT
System may be unresponsive after restart with certain McAfee antivirus products
Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

See details >
April 09, 2019
KB4493472
Resolved External
August 13, 2019
06:59 PM PT
" @@ -81,7 +80,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
You may receive an error when opening or using the Toshiba Qosmio AV Center
After installing KB4512506, you may receive an error when opening or using the Toshiba Qosmio AV Center. You may also receive an error in Event Log related to cryptnet.dll.

Affected platforms:
  • Client: Windows 7 SP1
Next steps: Microsoft is working with Dynabook to resolve this issue and will provide an update in an upcoming release.

Back to top
August 13, 2019
KB4512506
Investigating
Last updated:
September 11, 2019
08:58 PM PT

Opened:
September 10, 2019
09:48 AM PT
You may receive an error when opening or using the Toshiba Qosmio AV Center
After installing KB4512506, you may receive an error when opening or using the Toshiba Qosmio AV Center. You may also receive an error in Event Log related to cryptnet.dll.

Affected platforms:
  • Client: Windows 7 SP1
Next steps: Microsoft is working with Dynabook to resolve this issue and estimate a solution will be available late September.

Back to top
August 13, 2019
KB4512506
Investigating
Last updated:
September 13, 2019
04:25 PM PT

Opened:
September 10, 2019
09:48 AM PT
" @@ -104,12 +103,3 @@ sections:
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503292 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512514.

Back to topJune 11, 2019
KB4503292Resolved
KB4512514Resolved:
August 17, 2019
02:00 PM PT

Opened:
July 10, 2019
02:51 PM PT " - -- title: April 2019 -- items: - - type: markdown - text: " - - -
DetailsOriginating updateStatusHistory
System may be unresponsive after restart with certain McAfee antivirus products
Microsoft and McAfee have identified an issue on devices with McAfee Endpoint Security (ENS) Threat Prevention 10.x or McAfee Host Intrusion Prevention (Host IPS) 8.0 or McAfee VirusScan Enterprise (VSE) 8.8 installed. It may cause the system to have slow startup or become unresponsive at restart after installing this update. 

Affected platforms:
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue has been resolved. McAfee has released an automatic update to address this issue. Guidance for McAfee customers can be found in the following McAfee support articles: 

Back to top
April 09, 2019
KB4493472
Resolved External
Last updated:
August 13, 2019
06:59 PM PT

Opened:
April 09, 2019
10:00 AM PT
- " diff --git a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml index 362bc0e782..504aed7b2e 100644 --- a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml @@ -60,9 +60,9 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ -
SummaryOriginating updateStatusLast updated
Windows RT 8.1 devices may have issues opening Internet Explorer 11
On Windows RT 8.1 devices, Internet Explorer 11 may not open and you may receive an error.

See details >
September 10, 2019
KB4516067
Investigating
September 13, 2019
05:25 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
June 11, 2019
KB4503276
Resolved
KB4512478
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
August 13, 2019
KB4512488
Resolved
KB4517298
August 16, 2019
02:00 PM PT
System may be unresponsive after restart with certain McAfee antivirus products
Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

See details >
April 09, 2019
KB4493446
Resolved External
August 13, 2019
06:59 PM PT
Japanese IME doesn't show the new Japanese Era name as a text input option
If previous dictionary updates are installed, the Japanese input method editor (IME) doesn't show the new Japanese Era name as a text input option.

See details >
April 25, 2019
KB4493443
Mitigated
May 15, 2019
05:53 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >
January 08, 2019
KB4480963
Mitigated
April 25, 2019
02:00 PM PT
@@ -75,6 +75,15 @@ sections:
" +- title: September 2019 +- items: + - type: markdown + text: " + + +
DetailsOriginating updateStatusHistory
Windows RT 8.1 devices may have issues opening Internet Explorer 11
On Windows 8.1 RT devices, Internet Explorer 11 may not open and you may receive the error, \"C:\\Program Files\\Internet Explorer\\iexplore.exe: A certificate was explicitly revoked by its issuer.\"


Affected platforms:
  • Client: Windows RT 8.1
Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
September 10, 2019
KB4516067
Investigating
Last updated:
September 13, 2019
05:25 PM PT

Opened:
September 13, 2019
05:25 PM PT
+ " + - title: August 2019 - items: - type: markdown @@ -102,15 +111,6 @@ sections: " -- title: April 2019 -- items: - - type: markdown - text: " - - -
DetailsOriginating updateStatusHistory
System may be unresponsive after restart with certain McAfee antivirus products
Microsoft and McAfee have identified an issue on devices with McAfee Endpoint Security (ENS) Threat Prevention 10.x or McAfee Host Intrusion Prevention (Host IPS) 8.0 or McAfee VirusScan Enterprise (VSE) 8.8 installed. It may cause the system to have slow startup or become unresponsive at restart after installing this update. 

Affected platforms:
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue has been resolved. McAfee has released an automatic update to address this issue. Guidance for McAfee customers can be found in the following McAfee support articles:  

Back to top
April 09, 2019
KB4493446
Resolved External
Last updated:
August 13, 2019
06:59 PM PT

Opened:
April 09, 2019
10:00 AM PT
- " - - title: January 2019 - items: - type: markdown diff --git a/windows/release-information/windows-message-center.yml b/windows/release-information/windows-message-center.yml index 57a7a4c18d..aad8c98172 100644 --- a/windows/release-information/windows-message-center.yml +++ b/windows/release-information/windows-message-center.yml @@ -1,11 +1,11 @@ ### YamlMime:YamlDocument documentType: LandingData -title: Windows 10 message center +title: Windows message center metadata: document_id: - title: Windows 10 message center - description: Windows 10 message center + title: Windows message center + description: Windows message center keywords: Windows 10, issues, fixes, announcements, Windows Server, advisories ms.localizationpriority: high author: greg-lindsay @@ -50,6 +50,7 @@ sections: text: " + From bb1ba29ee06bb63973cb0d9475cc9505db8df1c5 Mon Sep 17 00:00:00 2001 From: illfated Date: Mon, 16 Sep 2019 04:03:41 +0200 Subject: [PATCH 244/285] Update hello-faq.md: English grammar improvement English grammar improvement is needed in one of the first sentences of this document page: " but not date at this time." Thanks to robhurt for noticing and reporting this malformed sentence. Closes #4932 --- .../identity-protection/hello-for-business/hello-faq.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-faq.md b/windows/security/identity-protection/hello-for-business/hello-faq.md index d434eebfd2..3d353686de 100644 --- a/windows/security/identity-protection/hello-for-business/hello-faq.md +++ b/windows/security/identity-protection/hello-for-business/hello-faq.md @@ -22,7 +22,7 @@ ms.reviewer: - Windows 10 ## What about virtual smart cards? -Windows Hello for Business is the modern, two-factor credential for Windows 10. Microsoft will be deprecating virtual smart cards in the future but not date at this time. Customers using Windows 10 and virtual smart cards should move to Windows Hello for Business. Microsoft will publish the date early to ensure customers have adequate lead time to move to Windows Hello for Business. Microsoft recommends new Windows 10 deployments to use Windows Hello for Business. Virtual smart card remain supported for Windows 7 and Windows 8. +Windows Hello for Business is the modern, two-factor credential for Windows 10. Microsoft will be deprecating virtual smart cards in the future, but no date is set at this time. Customers using Windows 10 and virtual smart cards should move to Windows Hello for Business. Microsoft will publish the date early to ensure customers have adequate lead time to move to Windows Hello for Business. Microsoft recommends new Windows 10 deployments to use Windows Hello for Business. Virtual smart card remain supported for Windows 7 and Windows 8. ## What about convenience PIN? Microsoft is committed to its vision of a world without passwords. We recognize the *convenience* provided by convenience PIN, but it stills uses a password for authentication. Microsoft recommends customers using Windows 10 and convenience PINs should move to Windows Hello for Business. New Windows 10 deployments should deploy Windows Hello for Business and not convenience PINs. Microsoft will be deprecating convenience PINs in the future and will publish the date early to ensure customers have adequate lead time to deploy Windows Hello for Business. From 8b4bbfac01a527b44add587f1ab981b396b04be6 Mon Sep 17 00:00:00 2001 From: denisebmsft Date: Mon, 16 Sep 2019 10:09:36 -0700 Subject: [PATCH 245/285] Update preview.md --- .../threat-protection/microsoft-defender-atp/preview.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/windows/security/threat-protection/microsoft-defender-atp/preview.md b/windows/security/threat-protection/microsoft-defender-atp/preview.md index ccec35886a..5d0cf9a4f2 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/preview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/preview.md @@ -42,6 +42,8 @@ Turn on the preview experience setting to be among the first to try upcoming fea ## Preview features The following features are included in the preview release: +- [Tamper Protection settings in Intune](../windows-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md#turn-tamper-protection-on-or-off-for-your-organization-with-intune)
You can now turn Tamper Protection on (or off) for your organization in the Microsoft 365 Device Management portal (Intune). + - [Microsoft Threat Experts - Experts on Demand](microsoft-threat-experts.md)
You now have the option to consult with Microsoft Threat Experts from several places in the portal to help you in the context of your investigation. - [Indicators for IP addresses, URLs/Domains](manage-indicators.md)
You can now allow or block URLs/domains using your own threat intelligence. From 070d39d6890ea0541d90bb589efee8b08fbb9bb9 Mon Sep 17 00:00:00 2001 From: illfated Date: Mon, 16 Sep 2019 19:24:53 +0200 Subject: [PATCH 246/285] MBAM 2.5 Service releases: add May 2019 to list This is yet another page where the May 2019 Service release is missing from the list of service releases of Microsoft Desktop Optimization Pack (MDOP). Proposed change: add May 2019 Service release at the end of the list. Thanks to philschwan for noticing and reporting this detail. Closes #4944 --- mdop/mbam-v25/mbam-25-supported-configurations.md | 1 + 1 file changed, 1 insertion(+) diff --git a/mdop/mbam-v25/mbam-25-supported-configurations.md b/mdop/mbam-v25/mbam-25-supported-configurations.md index 22f5eca17c..95405633b3 100644 --- a/mdop/mbam-v25/mbam-25-supported-configurations.md +++ b/mdop/mbam-v25/mbam-25-supported-configurations.md @@ -598,6 +598,7 @@ The MBAM client is not supported on virtual machines and is also not supported o - [September 2017](https://support.microsoft.com/en-ie/help/4041137/september-2017-servicing-release-for-microsoft-desktop-optimization) - [March 2018](https://support.microsoft.com/help/4074878/march-2018-servicing-release-for-microsoft-desktop-optimization-pack) - [July 2018](https://support.microsoft.com/help/4340040/july-2018-servicing-release-for-microsoft-desktop-optimization-pack) +- [May 2019](https://support.microsoft.com/help/4505175/may-2019-servicing-release-for-microsoft-desktop-optimization-pack) ## Related topics From 9781eeee105adca9d8393f69625970c623ba5558 Mon Sep 17 00:00:00 2001 From: jaimeo Date: Mon, 16 Sep 2019 10:50:40 -0700 Subject: [PATCH 247/285] added some clarifications about ports per GitHub issue #4750 --- .../deployment/update/waas-delivery-optimization.md | 11 ++++++++--- 1 file changed, 8 insertions(+), 3 deletions(-) diff --git a/windows/deployment/update/waas-delivery-optimization.md b/windows/deployment/update/waas-delivery-optimization.md index 1f15840c95..64deb7803d 100644 --- a/windows/deployment/update/waas-delivery-optimization.md +++ b/windows/deployment/update/waas-delivery-optimization.md @@ -8,9 +8,9 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library audience: itpro -author: greg-lindsay +author: jaimeo ms.localizationpriority: medium -ms.author: greglin +ms.author: jaimeo ms.collection: M365-modern-desktop ms.topic: article --- @@ -97,7 +97,12 @@ For more details, check out the [Adopting Windows as a Service at Microsoft](htt **Does Delivery Optimization work with WSUS?**: Yes. Devices will obtain the update payloads from the WSUS server, but must also have an internet connection as they communicate with the Delivery Optimization cloud service for coordination. -**Which ports does Delivery Optimization use?**: For peer-to-peer traffic, it uses 7680 for TCP/IP or 3544 for NAT traversal (optionally Teredo). For client-service communication, it uses HTTP or HTTPS over port 80/443. +**Which ports does Delivery Optimization use?**: Delivery Optimization listens on port 7680 for requests from other peers by using TCP/IP. The service will register and open this port on the device, but you might need to set this port to accept inbound traffic through your firewall yourself. If you don't allow inbound traffic over port 7680, you can't use the peer-to-peer functionality of Delivery Optimization. However, devices can still successfully download by using HTTP or HTTPS traffic over port 80 (such as for default Windows Update data). + +If you set up Delivery Optimization to create peer groups that include devices across NATs (or any form of internal subnet that uses gateways or firewalls between subnets), it will use Teredo. For this to work, you must allow inbound TCP/IP traffic over port 3544. Look for a "NAT traversal" setting in your firewall to set this up. + +Delivery Optimization also communicates with its cloud service by using HTTP/HTTPS over port 80. + **What are the requirements if I use a proxy?**: You must allow Byte Range requests. See [Proxy requirements for Windows Update](https://support.microsoft.com/help/3175743/proxy-requirements-for-windows-update) for details. From 8711cbe0eba302c7fd96e0540fbf8bc2d5a2ae2c Mon Sep 17 00:00:00 2001 From: Mapalko Date: Mon, 16 Sep 2019 12:41:08 -0700 Subject: [PATCH 248/285] fixing headers for dynamic lock and conditional access --- .../hello-for-business/hello-feature-conditional-access.md | 2 +- .../hello-for-business/hello-feature-dynamic-lock.md | 2 +- .../identity-protection/hello-for-business/hello-features.md | 3 ++- windows/security/identity-protection/hello-for-business/toc.md | 2 +- 4 files changed, 5 insertions(+), 4 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-feature-conditional-access.md b/windows/security/identity-protection/hello-for-business/hello-feature-conditional-access.md index 4168a6fc37..4b08f7b6f1 100644 --- a/windows/security/identity-protection/hello-for-business/hello-feature-conditional-access.md +++ b/windows/security/identity-protection/hello-for-business/hello-feature-conditional-access.md @@ -17,7 +17,7 @@ ms.date: 09/09/2019 ms.reviewer: --- -## Conditional access +# Conditional access **Requirements:** diff --git a/windows/security/identity-protection/hello-for-business/hello-feature-dynamic-lock.md b/windows/security/identity-protection/hello-for-business/hello-feature-dynamic-lock.md index a193c1a932..62304559ae 100644 --- a/windows/security/identity-protection/hello-for-business/hello-feature-dynamic-lock.md +++ b/windows/security/identity-protection/hello-for-business/hello-feature-dynamic-lock.md @@ -17,7 +17,7 @@ ms.date: 09/09/2019 ms.reviewer: --- -## Dynamic lock +# Dynamic lock **Requirements:** diff --git a/windows/security/identity-protection/hello-for-business/hello-features.md b/windows/security/identity-protection/hello-for-business/hello-features.md index f73d3cc8f2..83a4dc444e 100644 --- a/windows/security/identity-protection/hello-for-business/hello-features.md +++ b/windows/security/identity-protection/hello-for-business/hello-features.md @@ -25,9 +25,10 @@ ms.date: 05/05/2018 Consider these additional features you can use after your organization deploys Windows Hello for Business. -- [Dynamic lock](hello-feature-dynamic-lock.md) - [Conditional Access](hello-feature-conditional-access.md) - [Dual Enrollment](hello-feature-dual-enrollment.md) +- [Dynamic lock](hello-feature-dynamic-lock.md) +- [Multifactor Unlock](feature-multifactor-unlock.md) - [PIN Reset](hello-feature-pin-reset.md) - [Remote Desktop](hello-feature-remote-desktop.md) diff --git a/windows/security/identity-protection/hello-for-business/toc.md b/windows/security/identity-protection/hello-for-business/toc.md index a9261a5239..3fe33458fc 100644 --- a/windows/security/identity-protection/hello-for-business/toc.md +++ b/windows/security/identity-protection/hello-for-business/toc.md @@ -8,10 +8,10 @@ ## [Windows Hello for Business Features](hello-features.md) ### [Conditional Access](hello-feature-conditional-access.md) +### [Dual Enrollment](hello-feature-dual-enrollment.md) ### [Dynamic Lock](hello-feature-dynamic-lock.md) ### [Multifactor Unlock](feature-multifactor-unlock.md) ### [PIN Reset](hello-feature-pin-reset.md) -### [Dual Enrollment](hello-feature-dual-enrollment.md) ### [Remote Desktop](hello-feature-remote-desktop.md) ## [How Windows Hello for Business works](hello-how-it-works.md) From c22e06dc9fef61b758b14398e61a090ad1af1439 Mon Sep 17 00:00:00 2001 From: Rebecca Agiewich Date: Mon, 16 Sep 2019 16:47:29 -0700 Subject: [PATCH 249/285] fixed spelling error --- .../microsoft-defender-advanced-threat-protection.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md index 7ce66379c0..da64a631d7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md @@ -78,7 +78,7 @@ This built-in capability uses a game-changing risk-based approach to the discove **[Attack surface reduction](overview-attack-surface-reduction.md)**
-The attack surface reduction set of capabilities provide the first line of defense in the stack. By ensuring configuration settings are properly set and exploit mitigation techniques are applied, these set of capabilities resist attacks and exploitations. +The attack surface reduction set of capabilities provide the first line of defense in the stack. By ensuring configuration settings are properly set and exploit mitigation techniques are applied, these set of capabilities resist attacks and exploitation. From 79334aa5ea15db4de7168974429e983a229ec5b4 Mon Sep 17 00:00:00 2001 From: Rebecca Agiewich Date: Mon, 16 Sep 2019 17:07:19 -0700 Subject: [PATCH 250/285] fixed spelling error --- .../identity-protection/hello-for-business/hello-faq.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-faq.md b/windows/security/identity-protection/hello-for-business/hello-faq.md index 3d353686de..0cfbf47cc6 100644 --- a/windows/security/identity-protection/hello-for-business/hello-faq.md +++ b/windows/security/identity-protection/hello-for-business/hello-faq.md @@ -45,7 +45,7 @@ The statement "PIN is stronger than Password" is not directed at the strength of The **Key Admins** and **Enterprise Key Admins** groups are created when you install the first Windows Server 2016 domain controller into a domain. Domain controllers running previous versions of Windows Server cannot translate the security identifier (SID) to a name. To resolve this, transfer the PDC emulator domain role to a domain controller running Windows Server 2016. ## Can I use a convenience PIN with Azure AD? -It is currently possible to set a convience PIN on Azure Active Directory Joined or Hybrid Active Directory Joined devices. Convenience PIN is not supported for Azure Active Directory user accounts. It is only supported for on-premises only Domain Joined users and local account users. +It is currently possible to set a convenience PIN on Azure Active Directory Joined or Hybrid Active Directory Joined devices. Convenience PIN is not supported for Azure Active Directory user accounts. It is only supported for on-premises only Domain Joined users and local account users. ## Can I use an external camera when my laptop is closed or docked? No. Windows 10 currently only supports one Windows Hello for Business camera and does not fluidly switch to an external camera when the computer is docked with the lid closed. The product group is aware of this and is investigating this topic further. From 05679222030a3a32218045ffd6c99db52a8d33cf Mon Sep 17 00:00:00 2001 From: John Liu <49762389+ShenLanJohn@users.noreply.github.com> Date: Mon, 16 Sep 2019 18:16:27 -0700 Subject: [PATCH 251/285] CAT Auto Pulish for Windows Release Messages - CAT_AutoPublish_20190916173707 (#1123) --- .../release-information/status-windows-10-1507.yml | 10 ---------- ...tus-windows-10-1607-and-windows-server-2016.yml | 6 ++---- .../release-information/status-windows-10-1703.yml | 14 ++------------ .../release-information/status-windows-10-1709.yml | 14 ++------------ .../release-information/status-windows-10-1803.yml | 4 ++-- ...tus-windows-10-1809-and-windows-server-2019.yml | 6 ++---- .../release-information/status-windows-10-1903.yml | 4 ++-- ...us-windows-7-and-windows-server-2008-r2-sp1.yml | 2 -- ...atus-windows-8.1-and-windows-server-2012-r2.yml | 10 ---------- .../status-windows-server-2008-sp2.yml | 10 ---------- .../status-windows-server-2012.yml | 10 ---------- .../release-information/windows-message-center.yml | 2 +- 12 files changed, 13 insertions(+), 79 deletions(-) diff --git a/windows/release-information/status-windows-10-1507.yml b/windows/release-information/status-windows-10-1507.yml index a764bbb877..88f03f07b7 100644 --- a/windows/release-information/status-windows-10-1507.yml +++ b/windows/release-information/status-windows-10-1507.yml @@ -60,7 +60,6 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

MessageDate
Plan for change: End of service reminders for Windows 10, versions 1703 and 1803
The Home, Pro, Pro for Workstations, and IoT Core editions of Windows 10, version 1703 (the Creators Update) will reach end of service on October 8, 2019. The Enterprise and Education editions of Windows 10, version 1803 (the April 2018 Update) will reach end of service on November 12, 2019. We recommend that you update devices running these versions and editions to the latest version of Windows 10—Windows 10, version 1903—as soon as possible to help keep them protected and your environments secure.
September 13, 2019
03:23 PM PT
September 2019 security update available for all supported versions of Windows
The September 2019 security update release, referred to as our “B” release, is now available for Windows 10, version 1903 and all supported versions of Windows. We recommend that you install these updates promptly. To be informed about the latest updates and releases, follow us on Twitter @WindowsUpdate.
September 10, 2019
09:34 AM PT
Status update: Windows 10, version 1903 \"D\" optional release available August 30th
The August optional monthly “D” release for Windows 10, version 1903 is now available. Follow @WindowsUpdate for the latest on the availability of this release.
August 30, 2019
08:00 AM PT
Feature update install notification on Windows 10, version 1809 (the October 2018 Update)
We've had reports on August 29th that some customers running Windows 10, version 1809 (the October 2018 Update) have received notification to install the latest feature update (version 1903) early. Updating remains in your control. To install the update, you must select one of the following options: \"Pick a Time\", \"Restart Tonight,\" or \"Restart Now\". If you are not ready to update at this time, simply dismiss the notification by clicking the arrow in the top right corner. If you have updated to Windows 10, version 1903 and would like to go back to your previous version, see the instructions here.
August 29, 2019
04:39 PM PT
-
SummaryOriginating updateStatusLast updated
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 10240.18305

August 13, 2019
KB4512497
Resolved
KB4517276
August 17, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Mitigated
April 25, 2019
02:00 PM PT
" @@ -72,15 +71,6 @@ sections:
" -- title: August 2019 -- items: - - type: markdown - text: " - - -
DetailsOriginating updateStatusHistory
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512497, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4517276. This ‘optional’ update is available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive KB4517276 and install. For instructions, see Update Windows 10.

Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS).

Back to top
OS Build 10240.18305

August 13, 2019
KB4512497
Resolved
KB4517276
Resolved:
August 17, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
- " - - title: January 2019 - items: - type: markdown diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index 562cad0e09..0ff7c2541d 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -60,11 +60,10 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- + - @@ -83,7 +82,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) including ChsIME.EXE, may become unresponsive or may have high CPU usage.

See details >
OS Build 14393.3204

September 10, 2019
KB4516044
Mitigated
September 13, 2019
05:25 PM PT
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.

See details >
OS Build 14393.3204

September 10, 2019
KB4516044
Mitigated
September 16, 2019
05:36 PM PT
Apps and scripts using the NetQueryDisplayInformation API may fail with error
Applications and scripts that call the NetQueryDisplayInformation API or the WinNT provider equivalent may fail to return results after the first page of data.

See details >
OS Build 14393.3053

June 18, 2019
KB4503294
Resolved
KB4516044
September 10, 2019
10:00 AM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 14393.3115

July 16, 2019
KB4507459
Resolved
KB4512517
August 13, 2019
10:00 AM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
OS Build 14393.3025

June 11, 2019
KB4503267
Resolved
KB4512495
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 14393.3144

August 13, 2019
KB4512517
Resolved
KB4512495
August 17, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Mitigated
April 25, 2019
02:00 PM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

See details >
OS Build 14393.2608

November 13, 2018
KB4467691
Mitigated
February 19, 2019
10:00 AM PT
Cluster service may fail if the minimum password length is set to greater than 14
The cluster service may fail to start with the error “2245 (NERR_PasswordTooShort)” if the Group Policy “Minimum Password Length” is configured with greater than 14 characters.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
April 25, 2019
02:00 PM PT
- +
DetailsOriginating updateStatusHistory
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include CHS (Chinese Simplified) and CHT (Chinese Traditional) with Changjie/Quick keyboard.


Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016

Workaround: To mitigate the issue, perform the following steps:
  1. Select the Start button and type Services.
  2. Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
  3. Locate Startup type: and change it to Manual
  4. Select Ok
  5. The TabletInputService service is now in the default configuration and IME should work as expected.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.3204

September 10, 2019
KB4516044
Mitigated
Last updated:
September 13, 2019
05:25 PM PT

Opened:
September 13, 2019
05:25 PM PT
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include Chinese Simplified (ChsIME.EXE) and Chinese Traditional (ChtIME.EXE) with Changjie/Quick keyboard.


Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016

Workaround: To mitigate the issue, perform the following steps:
  1. Select the Start button and type Services.
  2. Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
  3. Locate Startup type: and change it to Manual
  4. Select Ok
  5. The TabletInputService service is now in the default configuration and IME should work as expected.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.3204

September 10, 2019
KB4516044
Mitigated
Last updated:
September 16, 2019
05:36 PM PT

Opened:
September 13, 2019
05:25 PM PT
" @@ -93,7 +92,6 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Apps and scripts using the NetQueryDisplayInformation API may fail with error
 Applications and scripts that call the NetQueryDisplayInformation API or the WinNT provider equivalent may fail to return results after the first page of data, often 50 or 100 entries. When requesting additional pages you may receive the error, “1359: an internal error occurred.”

Affected platforms:
  • Server: Windows Server 2019; Windows Server 2016
Resolution: This issue was resolved in KB4516044.

Back to top
OS Build 14393.3053

June 18, 2019
KB4503294
Resolved
KB4516044
Resolved:
September 10, 2019
10:00 AM PT

Opened:
August 01, 2019
05:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512517, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4512495. This ‘optional’ update is available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive KB4512495 and install. For instructions, see Update Windows 10.

Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS).

Back to top
OS Build 14393.3144

August 13, 2019
KB4512517
Resolved
KB4512495
Resolved:
August 17, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
" diff --git a/windows/release-information/status-windows-10-1703.yml b/windows/release-information/status-windows-10-1703.yml index 094b5c9bab..9a00aca54d 100644 --- a/windows/release-information/status-windows-10-1703.yml +++ b/windows/release-information/status-windows-10-1703.yml @@ -66,9 +66,8 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- + -
SummaryOriginating updateStatusLast updated
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) including ChsIME.EXE, may become unresponsive or may have high CPU usage.

See details >
OS Build 15063.2045

September 10, 2019
KB4516068
Mitigated
September 13, 2019
05:25 PM PT
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.

See details >
OS Build 15063.2045

September 10, 2019
KB4516068
Mitigated
September 16, 2019
05:36 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 15063.1955

July 16, 2019
KB4507467
Resolved
KB4512507
August 13, 2019
10:00 AM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 15063.1988

August 13, 2019
KB4512507
Resolved
KB4512474
August 17, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Mitigated
April 25, 2019
02:00 PM PT
" @@ -85,16 +84,7 @@ sections: - type: markdown text: " - -
DetailsOriginating updateStatusHistory
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include CHS (Chinese Simplified) and CHT (Chinese Traditional) with Changjie/Quick keyboard.


Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016

Workaround: To mitigate the issue, perform the following steps:
  1. Select the Start button and type Services.
  2. Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
  3. Locate Startup type: and change it to Manual
  4. Select Ok
  5. The TabletInputService service is now in the default configuration and IME should work as expected.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 15063.2045

September 10, 2019
KB4516068
Mitigated
Last updated:
September 13, 2019
05:25 PM PT

Opened:
September 13, 2019
05:25 PM PT
- " - -- title: August 2019 -- items: - - type: markdown - text: " - - +
DetailsOriginating updateStatusHistory
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512507, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4512474. This ‘optional’ update is available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive KB4512474 and install. For instructions, see Update Windows 10.

Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS).

Back to top
OS Build 15063.1988

August 13, 2019
KB4512507
Resolved
KB4512474
Resolved:
August 17, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include Chinese Simplified (ChsIME.EXE) and Chinese Traditional (ChtIME.EXE) with Changjie/Quick keyboard.


Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016

Workaround: To mitigate the issue, perform the following steps:
  1. Select the Start button and type Services.
  2. Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
  3. Locate Startup type: and change it to Manual
  4. Select Ok
  5. The TabletInputService service is now in the default configuration and IME should work as expected.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 15063.2045

September 10, 2019
KB4516068
Mitigated
Last updated:
September 16, 2019
05:36 PM PT

Opened:
September 13, 2019
05:25 PM PT
" diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index 4363810035..9bd26e7699 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -60,10 +60,9 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- + -
SummaryOriginating updateStatusLast updated
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) including ChsIME.EXE, may become unresponsive or may have high CPU usage.

See details >
OS Build 16299.1387

September 10, 2019
KB4516066
Mitigated
September 13, 2019
05:25 PM PT
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.

See details >
OS Build 16299.1387

September 10, 2019
KB4516066
Mitigated
September 16, 2019
05:36 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 16299.1296

July 16, 2019
KB4507465
Resolved
KB4512516
August 13, 2019
10:00 AM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
OS Build 16299.1217

June 11, 2019
KB4503284
Resolved
KB4512494
August 16, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 16299.1331

August 13, 2019
KB4512516
Resolved
KB4512494
August 16, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Mitigated
April 25, 2019
02:00 PM PT
" @@ -80,16 +79,7 @@ sections: - type: markdown text: " - -
DetailsOriginating updateStatusHistory
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include CHS (Chinese Simplified) and CHT (Chinese Traditional) with Changjie/Quick keyboard.


Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016

Workaround: To mitigate the issue, perform the following steps:
  1. Select the Start button and type Services.
  2. Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
  3. Locate Startup type: and change it to Manual
  4. Select Ok
  5. The TabletInputService service is now in the default configuration and IME should work as expected.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.1387

September 10, 2019
KB4516066
Mitigated
Last updated:
September 13, 2019
05:25 PM PT

Opened:
September 13, 2019
05:25 PM PT
- " - -- title: August 2019 -- items: - - type: markdown - text: " - - +
DetailsOriginating updateStatusHistory
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512516, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4512494. The ‘optional’ update will be available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive KB4512494 and install. For instructions, see Update Windows 10.

Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS).

Back to top
OS Build 16299.1331

August 13, 2019
KB4512516
Resolved
KB4512494
Resolved:
August 16, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include Chinese Simplified (ChsIME.EXE) and Chinese Traditional (ChtIME.EXE) with Changjie/Quick keyboard.


Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016

Workaround: To mitigate the issue, perform the following steps:
  1. Select the Start button and type Services.
  2. Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
  3. Locate Startup type: and change it to Manual
  4. Select Ok
  5. The TabletInputService service is now in the default configuration and IME should work as expected.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.1387

September 10, 2019
KB4516066
Mitigated
Last updated:
September 16, 2019
05:36 PM PT

Opened:
September 13, 2019
05:25 PM PT
" diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml index 410ce10ff9..a6be94d23c 100644 --- a/windows/release-information/status-windows-10-1803.yml +++ b/windows/release-information/status-windows-10-1803.yml @@ -65,7 +65,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- + @@ -88,7 +88,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) including ChsIME.EXE, may become unresponsive or may have high CPU usage.

See details >
OS Build 17134.1006

September 10, 2019
KB4516058
Mitigated
September 13, 2019
05:25 PM PT
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.

See details >
OS Build 17134.1006

September 10, 2019
KB4516058
Mitigated
September 16, 2019
05:36 PM PT
Windows Mixed Reality Portal users may intermittently receive a 15-5 error code
You may receive a 15-5 error code in Windows Mixed Reality Portal and your headset may not respond to \"wake up\" from sleep.

See details >
OS Build 17134.950

August 13, 2019
KB4512501
Mitigated
September 11, 2019
05:32 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 17134.915

July 16, 2019
KB4507466
Resolved
KB4512501
August 13, 2019
10:00 AM PT
Notification issue: \"Your device is missing important security and quality fixes.\"
Some users may have incorrectly received the notification \"Your device is missing important security and quality fixes.\"

See details >
N/A

Resolved
September 03, 2019
12:32 PM PT
- +
DetailsOriginating updateStatusHistory
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include CHS (Chinese Simplified) and CHT (Chinese Traditional) with Changjie/Quick keyboard.


Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016

Workaround: To mitigate the issue, perform the following steps:
  1. Select the Start button and type Services.
  2. Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
  3. Locate Startup type: and change it to Manual
  4. Select Ok
  5. The TabletInputService service is now in the default configuration and IME should work as expected.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17134.1006

September 10, 2019
KB4516058
Mitigated
Last updated:
September 13, 2019
05:25 PM PT

Opened:
September 13, 2019
05:25 PM PT
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include Chinese Simplified (ChsIME.EXE) and Chinese Traditional (ChtIME.EXE) with Changjie/Quick keyboard.


Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016

Workaround: To mitigate the issue, perform the following steps:
  1. Select the Start button and type Services.
  2. Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
  3. Locate Startup type: and change it to Manual
  4. Select Ok
  5. The TabletInputService service is now in the default configuration and IME should work as expected.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17134.1006

September 10, 2019
KB4516058
Mitigated
Last updated:
September 16, 2019
05:36 PM PT

Opened:
September 13, 2019
05:25 PM PT
Windows Mixed Reality Portal users may intermittently receive a 15-5 error code
After installing KB4512501, Windows Mixed Reality Portal users may intermittently receive a 15-5 error code. In some cases, Windows Mixed Reality Portal may report that the headset is sleeping and pressing “Wake up” may appear to produce no action.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10, version 1803
Workaround: To mitigate the issue, use the following steps:
  1. Close the Windows Mixed Reality Portal, if it is running.
  2. Open Task Manager by selecting the Start button and typing Task Manager.
  3. In Task Manager under the Processes tab, right click or long press on “Windows Explorer” and select restart.
  4. You can now open the Windows Mixed Reality Portal.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17134.950

August 13, 2019
KB4512501
Mitigated
Last updated:
September 11, 2019
05:32 PM PT

Opened:
September 11, 2019
05:32 PM PT
Notification issue: \"Your device is missing important security and quality fixes.\"
Some users may have incorrectly received the notification \"Your device is missing important security and quality fixes\" in the Windows Update dialog and a red \"!\" in the task tray on the Windows Update tray icon. This notification is intended for devices that are 90 days or more out of date, but some users with installed updates released in June or July also saw this notification.

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
Resolution: This issue was resolved on the server side on August 30, 2019. Only devices that are out of date by 90 days or more should now see the notification. No action is required by the user to resolve this issue. If you are still seeing the \"Your device is missing important security and quality fixes\" notification, we recommend selecting Check for Updates in the Windows Update dialog. For instructions, see Update Windows 10. Microsoft always recommends trying to keep your devices up to date, as the monthly updates contain important security fixes. 

Back to top
N/A

Resolved
Resolved:
September 03, 2019
12:32 PM PT

Opened:
September 03, 2019
12:32 PM PT
diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index 6685b4a484..f32d6b5f10 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -64,11 +64,10 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- + - @@ -88,7 +87,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) including ChsIME.EXE, may become unresponsive or may have high CPU usage.

See details >
OS Build 17763.737

September 10, 2019
KB4512578
Mitigated
September 13, 2019
05:25 PM PT
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.

See details >
OS Build 17763.737

September 10, 2019
KB4512578
Mitigated
September 16, 2019
05:36 PM PT
Windows Mixed Reality Portal users may intermittently receive a 15-5 error code
You may receive a 15-5 error code in Windows Mixed Reality Portal and your headset may not respond to \"wake up\" from sleep.

See details >
OS Build 17763.678

August 13, 2019
KB4511553
Mitigated
September 11, 2019
05:32 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 17763.652

July 22, 2019
KB4505658
Resolved
KB4511553
August 13, 2019
10:00 AM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
OS Build 17763.557

June 11, 2019
KB4503327
Resolved
KB4512534
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 17763.678

August 13, 2019
KB4511553
Resolved
KB4512534
August 17, 2019
02:00 PM PT
Apps and scripts using the NetQueryDisplayInformation API may fail with error
Applications and scripts that call the NetQueryDisplayInformation API or the WinNT provider equivalent may fail to return results after the first page of data.

See details >
OS Build 17763.55

October 09, 2018
KB4464330
Investigating
August 01, 2019
05:00 PM PT
Startup to a black screen after installing updates
Your device may startup to a black screen during the first logon after installing updates.

See details >
OS Build 17763.557

June 11, 2019
KB4503327
Mitigated
June 14, 2019
04:41 PM PT
Devices with some Asian language packs installed may receive an error
After installing the KB4493509 devices with some Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_F

See details >
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
May 03, 2019
10:59 AM PT
- +
DetailsOriginating updateStatusHistory
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include CHS (Chinese Simplified) and CHT (Chinese Traditional) with Changjie/Quick keyboard.


Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016

Workaround: To mitigate the issue, perform the following steps:
  1. Select the Start button and type Services.
  2. Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
  3. Locate Startup type: and change it to Manual
  4. Select Ok
  5. The TabletInputService service is now in the default configuration and IME should work as expected.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.737

September 10, 2019
KB4512578
Mitigated
Last updated:
September 13, 2019
05:25 PM PT

Opened:
September 13, 2019
05:25 PM PT
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include Chinese Simplified (ChsIME.EXE) and Chinese Traditional (ChtIME.EXE) with Changjie/Quick keyboard.


Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016

Workaround: To mitigate the issue, perform the following steps:
  1. Select the Start button and type Services.
  2. Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
  3. Locate Startup type: and change it to Manual
  4. Select Ok
  5. The TabletInputService service is now in the default configuration and IME should work as expected.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.737

September 10, 2019
KB4512578
Mitigated
Last updated:
September 16, 2019
05:36 PM PT

Opened:
September 13, 2019
05:25 PM PT
Windows Mixed Reality Portal users may intermittently receive a 15-5 error code
After installing KB4511553, Windows Mixed Reality Portal users may intermittently receive a 15-5 error code. In some cases, Windows Mixed Reality Portal may report that the headset is sleeping and pressing “Wake up” may appear to produce no action.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10, version 1803
Workaround: To mitigate the issue, use the following steps:
  1. Close the Windows Mixed Reality Portal, if it is running.
  2. Open Task Manager by selecting the Start button and typing Task Manager.
  3. In Task Manager under the Processes tab, right click or long press on “Windows Explorer” and select restart.
  4. You can now open the Windows Mixed Reality Portal.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.678

August 13, 2019
KB4511553
Mitigated
Last updated:
September 11, 2019
05:32 PM PT

Opened:
September 11, 2019
05:32 PM PT
" @@ -98,7 +97,6 @@ sections: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4511553, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4512534. This ‘optional’ update is available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive KB4512534 and install. For instructions, see Update Windows 10.

Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS).

Back to top
OS Build 17763.678

August 13, 2019
KB4511553
Resolved
KB4512534
Resolved:
August 17, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
Apps and scripts using the NetQueryDisplayInformation API may fail with error
 Applications and scripts that call the NetQueryDisplayInformation API or the WinNT provider equivalent may fail to return results after the first page of data, often 50 or 100 entries. When requesting additional pages you may receive the error, “1359: an internal error occurred.”

Affected platforms:
  • Server: Windows Server 2019; Windows Server 2016
Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.55

October 09, 2018
KB4464330
Investigating
Last updated:
August 01, 2019
05:00 PM PT

Opened:
August 01, 2019
05:00 PM PT
" diff --git a/windows/release-information/status-windows-10-1903.yml b/windows/release-information/status-windows-10-1903.yml index 4146c05f31..d7af320a1c 100644 --- a/windows/release-information/status-windows-10-1903.yml +++ b/windows/release-information/status-windows-10-1903.yml @@ -65,9 +65,9 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ - @@ -99,9 +99,9 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.

See details >
OS Build 18362.356

September 10, 2019
KB4515384
Mitigated
September 16, 2019
05:36 PM PT
Safeguard on certain devices with some Intel and Broadcom Wi-Fi adapters
Microsoft and NEC have found incompatibility issues with some devices with Intel Centrino 6205/6235 and Broadcom 802.11ac Wi-Fi cards when running Windows 10, version 1903.

See details >
N/A

Mitigated
September 13, 2019
05:25 PM PT
Some users report issues related to the Start menu and Windows Desktop Search
Microsoft has received reports that a small number of users are having issues related to the Start menu and Windows Desktop Search.

See details >
OS Build 18362.356

September 10, 2019
KB4515384
Investigating
September 13, 2019
05:35 PM PT
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) including ChsIME.EXE, may become unresponsive or may have high CPU usage.

See details >
OS Build 18362.356

September 10, 2019
KB4515384
Mitigated
September 13, 2019
05:25 PM PT
Audio in games is quiet or different than expected
Microsoft has received reports that audio in certain games is quieter or different than expected.

See details >
OS Build 18362.356

September 10, 2019
KB4515384
Mitigated
September 13, 2019
05:25 PM PT
Screenshots and Snips have an unnatural orange tint
Users have reported an orange tint on Screenshots and Snips with the Lenovo Vantage app installed

See details >
OS Build 18362.356

September 10, 2019
KB4516115
Resolved External
September 11, 2019
08:54 PM PT
Windows Desktop Search may not return any results and may have high CPU usage
Windows Desktop Search may not return any results and SearchUI.exe may have high CPU usage after installing KB4512941.

See details >
OS Build 18362.329

August 30, 2019
KB4512941
Resolved
KB4515384
September 10, 2019
10:00 AM PT
+ - diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index 67be794791..02b0c3aa47 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -63,7 +63,6 @@ sections: -
DetailsOriginating updateStatusHistory
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include Chinese Simplified (ChsIME.EXE) and Chinese Traditional (ChtIME.EXE) with Changjie/Quick keyboard.


Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016

Workaround: To mitigate the issue, perform the following steps:
  1. Select the Start button and type Services.
  2. Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
  3. Locate Startup type: and change it to Manual
  4. Select Ok
  5. The TabletInputService service is now in the default configuration and IME should work as expected.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 18362.356

September 10, 2019
KB4515384
Mitigated
Last updated:
September 16, 2019
05:36 PM PT

Opened:
September 13, 2019
05:25 PM PT
Safeguard on certain devices with some Intel and Broadcom Wi-Fi adapters
Microsoft and NEC have found incompatibility issues with Intel Centrino 6205/6235 and Broadcom 802.11ac Wi-Fi cards when running Windows 10, version 1903 on specific models of NEC devices. If these devices are updated to Windows 10, version 1903, they will no longer be able to use any Wi-Fi connections. The Wi-Fi driver may have a yellow exclamation point in device manager. The task tray icon for networking may show the icon for no internet and Network & Internet settings may not show any Wi-Fi networks.

To safeguard your update experience, we have applied a compatibility hold on the affected devices from being offered Windows 10, version 1903.

Affected platforms:
  • Client: Windows 10, version 1903
Workaround: If you are using an affected device and you have already installed Windows 10, version 1903, you can mitigate the issue disabling then re-enabling the Wi-Fi adapter in Device Manager. You should now be able to use Wi-Fi until your next reboot.

Next steps: Microsoft and NEC are working on a resolution and will provide an update in an upcoming release.

Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

Back to top
N/A

Mitigated
Last updated:
September 13, 2019
05:25 PM PT

Opened:
September 13, 2019
05:25 PM PT
Some users report issues related to the Start menu and Windows Desktop Search
Microsoft has received reports that a small number of users are having issues related to the Start menu and Windows Desktop Search.

Affected platforms:
  • Client: Windows 10, version 1903
Next steps: We are presently investigating and will provide an update when more information is available.

Note As a first step with any issue you may encounter, we recommend you refer to our troubleshooting support guides. If you are having an issue with search, see Fix problems in Windows Search.

Back to top
OS Build 18362.356

September 10, 2019
KB4515384
Investigating
Last updated:
September 13, 2019
05:35 PM PT

Opened:
September 11, 2019
05:18 PM PT
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include CHS (Chinese Simplified) and CHT (Chinese Traditional) with Changjie/Quick keyboard.


Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016

Workaround: To mitigate the issue, perform the following steps:
  1. Select the Start button and type Services.
  2. Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
  3. Locate Startup type: and change it to Manual
  4. Select Ok
  5. The TabletInputService service is now in the default configuration and IME should work as expected.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 18362.356

September 10, 2019
KB4515384
Mitigated
Last updated:
September 13, 2019
05:25 PM PT

Opened:
September 13, 2019
05:25 PM PT
Audio in games is quiet or different than expected
Microsoft has received reports that audio in certain games is quieter or different than expected. At the request of some of our audio partners, we implemented a compatibility change that enabled certain games to query support and render multi-channel audio. Due to customer feedback, we are reverting this change as some games and some devices are not rendering multi-channel audio as expected. This may result in games sounding different than customers are used to and may have missing channels.

Affected platforms:
  • Client: Windows 10, version 1903
Workaround: To mitigate the issue, open settings in the impacted game and disable multi-channel audio, if this option is available. You can also search in the Windows Control Panel for 3rd party audio device control panels and disable Multi-channel audio or Virtual Surround Sound, if these options are available.  

Next steps: We are working on a resolution and estimates a solution will be available in late September.

Back to top
OS Build 18362.356

September 10, 2019
KB4515384
Mitigated
Last updated:
September 13, 2019
05:25 PM PT

Opened:
September 13, 2019
05:25 PM PT
Screenshots and Snips have an unnatural orange tint
When creating screenshots or using similar tools (such as Snipping Tool or Snip & Sketch), the resulting images may have an unnatural orange tint. This issue is caused by the Eye Care mode feature of Lenovo Vantage. This issue started on or around September 5, 2019. 

Affected platforms:
  • Client: Windows 10, version 1903
  • Server: None
Resolution: For guidance on this issue, see the Lenovo support article Screenshots and Snips have an unnatural orange tint. There is no update for Windows needed for this issue.

Back to top
OS Build 18362.356

September 10, 2019
KB4516115
Resolved External
Last updated:
September 11, 2019
08:54 PM PT

Opened:
September 11, 2019
08:54 PM PT
Windows Desktop Search may not return any results and may have high CPU usage
Microsoft is getting reports that a small number of users may not receive results when using Windows Desktop Search and may see high CPU usage from SearchUI.exe when searching after installing KB4512941. This issue is only encountered on devices in which searching the web from Windows Desktop Search has been disabled.

Affected platforms:
  • Client: Windows 10, version 1903
Resolution: This issue was resolved in KB4515384.

Back to top
OS Build 18362.329

August 30, 2019
KB4512941
Resolved
KB4515384
Resolved:
September 10, 2019
10:00 AM PT

Opened:
September 04, 2019
02:25 PM PT
You may receive an error when opening or using the Toshiba Qosmio AV Center
Toshiba Qosmio AV Center may error when opening and you may also receive an error in Event Log related to cryptnet.dll.

See details >
August 13, 2019
KB4512506
Investigating
September 13, 2019
04:25 PM PT
Windows updates that are SHA-2 signed may not be offered for Symantec and Norton AV
Windows updates that are SHA-2 signed are not available with Symantec or Norton antivirus program installed

See details >
August 13, 2019
KB4512506
Resolved External
August 27, 2019
02:29 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
June 11, 2019
KB4503292
Resolved
KB4512514
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
August 13, 2019
KB4512506
Resolved
KB4517297
August 16, 2019
02:00 PM PT
IA64 and x64 devices may fail to start after installing updates
After installing updates released on or after August 13, 2019, IA64 and x64 devices using EFI Boot may fail to start.

See details >
August 13, 2019
KB4512506
Mitigated
August 17, 2019
12:59 PM PT
" @@ -90,7 +89,6 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Windows updates that are SHA-2 signed may not be offered for Symantec and Norton AV
Symantec identified the potential for a negative interaction that may occur after Windows Updates code signed with SHA-2 only certificates are installed on devices with Symantec or Norton antivirus programs installed. The software may not correctly identify files included in the update as code signed by Microsoft, putting the device at risk for a delayed or incomplete update.

Affected platforms:
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1
Resolution: The safeguard hold has been removed. Symantec has completed its evaluation of the impact of this update and future updates to Windows 7/Windows 2008 R2 and has determined that there is no increased risk of a false positive detection for all in-field versions of Symantec Endpoint Protection and Norton antivirus programs. See the Symantec support article for additional detail and please reach out to Symantec or Norton support if you encounter any issues.

Back to top
August 13, 2019
KB4512506
Resolved External
Last updated:
August 27, 2019
02:29 PM PT

Opened:
August 13, 2019
10:05 AM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512506, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4517297. The ‘optional’ update is now available on Microsoft Update Catalog and Windows Server Update Services (WSUS).

Back to top
August 13, 2019
KB4512506
Resolved
KB4517297
Resolved:
August 16, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
IA64 and x64 devices may fail to start after installing updates
IA64 devices (in any configuration) and x64 devices using EFI boot that were provisioned after the July 9th updates and/or skipped the recommended update (KB3133977), may fail to start with the following error:
\"File: \\Windows\\system32\\winload.efi
Status: 0xc0000428
Info: Windows cannot verify the digital signature for this file.\"

Affected platforms:
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1
Take Action: To resolve this issue please follow the steps outlined in the SHA-2 support FAQ article for error code 0xc0000428.

Back to top
August 13, 2019
KB4512506
Mitigated
Last updated:
August 17, 2019
12:59 PM PT

Opened:
August 13, 2019
08:34 AM PT
" diff --git a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml index 504aed7b2e..57124dd060 100644 --- a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml @@ -62,7 +62,6 @@ sections: -
SummaryOriginating updateStatusLast updated
Windows RT 8.1 devices may have issues opening Internet Explorer 11
On Windows RT 8.1 devices, Internet Explorer 11 may not open and you may receive an error.

See details >
September 10, 2019
KB4516067
Investigating
September 13, 2019
05:25 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
June 11, 2019
KB4503276
Resolved
KB4512478
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
August 13, 2019
KB4512488
Resolved
KB4517298
August 16, 2019
02:00 PM PT
Japanese IME doesn't show the new Japanese Era name as a text input option
If previous dictionary updates are installed, the Japanese input method editor (IME) doesn't show the new Japanese Era name as a text input option.

See details >
April 25, 2019
KB4493443
Mitigated
May 15, 2019
05:53 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >
January 08, 2019
KB4480963
Mitigated
April 25, 2019
02:00 PM PT
@@ -84,15 +83,6 @@ sections: " -- title: August 2019 -- items: - - type: markdown - text: " - - -
DetailsOriginating updateStatusHistory
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512488, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4517298. The ‘optional’ update is now available on Microsoft Update Catalog and Windows Server Update Services (WSUS).

Back to top
August 13, 2019
KB4512488
Resolved
KB4517298
Resolved:
August 16, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
- " - - title: July 2019 - items: - type: markdown diff --git a/windows/release-information/status-windows-server-2008-sp2.yml b/windows/release-information/status-windows-server-2008-sp2.yml index 2954482f10..92caeeca25 100644 --- a/windows/release-information/status-windows-server-2008-sp2.yml +++ b/windows/release-information/status-windows-server-2008-sp2.yml @@ -61,7 +61,6 @@ sections: text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

-
SummaryOriginating updateStatusLast updated
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
June 11, 2019
KB4503273
Resolved
KB4512499
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
August 13, 2019
KB4512476
Resolved
KB4517301
August 16, 2019
02:00 PM PT
" @@ -72,15 +71,6 @@ sections:
" -- title: August 2019 -- items: - - type: markdown - text: " - - -
DetailsOriginating updateStatusHistory
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512476, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4517301. The ‘optional’ update is now available on Microsoft Update Catalog and Windows Server Update Services (WSUS).

Back to top
August 13, 2019
KB4512476
Resolved
KB4517301
Resolved:
August 16, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
- " - - title: July 2019 - items: - type: markdown diff --git a/windows/release-information/status-windows-server-2012.yml b/windows/release-information/status-windows-server-2012.yml index e78082f2be..53d71fb08e 100644 --- a/windows/release-information/status-windows-server-2012.yml +++ b/windows/release-information/status-windows-server-2012.yml @@ -61,7 +61,6 @@ sections: text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

-
SummaryOriginating updateStatusLast updated
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
June 11, 2019
KB4503285
Resolved
KB4512512
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
August 13, 2019
KB4512518
Resolved
KB4517302
August 16, 2019
02:00 PM PT
Japanese IME doesn't show the new Japanese Era name as a text input option
If previous dictionary updates are installed, the Japanese input method editor (IME) doesn't show the new Japanese Era name as a text input option.

See details >
April 25, 2019
KB4493462
Mitigated
May 15, 2019
05:53 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >
January 08, 2019
KB4480975
Mitigated
April 25, 2019
02:00 PM PT
@@ -74,15 +73,6 @@ sections:
" -- title: August 2019 -- items: - - type: markdown - text: " - - -
DetailsOriginating updateStatusHistory
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512518, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4517302. The ‘optional’ update is now available on Microsoft Update Catalog and Windows Server Update Services (WSUS).

Back to top
August 13, 2019
KB4512518
Resolved
KB4517302
Resolved:
August 16, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
- " - - title: July 2019 - items: - type: markdown diff --git a/windows/release-information/windows-message-center.yml b/windows/release-information/windows-message-center.yml index aad8c98172..531c4806b0 100644 --- a/windows/release-information/windows-message-center.yml +++ b/windows/release-information/windows-message-center.yml @@ -50,7 +50,7 @@ sections: text: " - + From e702d40e40154f527cf729891640b2d22e384134 Mon Sep 17 00:00:00 2001 From: John Liu <49762389+ShenLanJohn@users.noreply.github.com> Date: Mon, 16 Sep 2019 18:35:53 -0700 Subject: [PATCH 252/285] CAT Auto Pulish for Windows Release Messages - 20190916182624 (#1124) * Microsoft Defender ATP: amend broken link The link "Get started" at the end of the page "Microsoft Defender Advanced Threat Protection" points to a non-existing page. It may have been renamed and the name "Get started" appropriated as one of the expandable sections in the left hand side index/TOC section. The suggested change is to replace the broken link `get-started.md` with `minimum-requirements.md` found at the same directory level. Broken link: https://github.com/MicrosoftDocs/windows-itpro-docs/blob/master/windows/security/threat-protection/microsoft-defender-atp/get-started.md Replacement link: https://github.com/MicrosoftDocs/windows-itpro-docs/blob/master/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements.md Thanks to xNiklasJern for discovering the broken link. Closes #4832 * Added update to run the task Updated the document as suggested by the user to update the XML file created by GP preference. Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/4797 * Update windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> * Update hello-faq.md: English grammar improvement English grammar improvement is needed in one of the first sentences of this document page: " but not date at this time." Thanks to robhurt for noticing and reporting this malformed sentence. Closes #4932 * MBAM 2.5 Service releases: add May 2019 to list This is yet another page where the May 2019 Service release is missing from the list of service releases of Microsoft Desktop Optimization Pack (MDOP). Proposed change: add May 2019 Service release at the end of the list. Thanks to philschwan for noticing and reporting this detail. Closes #4944 * fixed spelling error * fixed spelling error * CAT Auto Pulish for Windows Release Messages - CAT_AutoPublish_20190916173707 (#1123) --- .../mbam-v25/mbam-25-supported-configurations.md | 1 + .../status-windows-10-1507.yml | 10 ---------- ...s-windows-10-1607-and-windows-server-2016.yml | 6 ++---- .../status-windows-10-1703.yml | 14 ++------------ .../status-windows-10-1709.yml | 14 ++------------ .../status-windows-10-1803.yml | 4 ++-- ...s-windows-10-1809-and-windows-server-2019.yml | 6 ++---- .../status-windows-10-1903.yml | 4 ++-- ...-windows-7-and-windows-server-2008-r2-sp1.yml | 2 -- ...us-windows-8.1-and-windows-server-2012-r2.yml | 10 ---------- .../status-windows-server-2008-sp2.yml | 10 ---------- .../status-windows-server-2012.yml | 10 ---------- .../windows-message-center.yml | 2 +- .../hello-for-business/hello-faq.md | 4 ++-- .../configure-endpoints-gp.md | 2 ++ ...rosoft-defender-advanced-threat-protection.md | 16 ++++++++-------- 16 files changed, 26 insertions(+), 89 deletions(-) diff --git a/mdop/mbam-v25/mbam-25-supported-configurations.md b/mdop/mbam-v25/mbam-25-supported-configurations.md index 22f5eca17c..95405633b3 100644 --- a/mdop/mbam-v25/mbam-25-supported-configurations.md +++ b/mdop/mbam-v25/mbam-25-supported-configurations.md @@ -598,6 +598,7 @@ The MBAM client is not supported on virtual machines and is also not supported o - [September 2017](https://support.microsoft.com/en-ie/help/4041137/september-2017-servicing-release-for-microsoft-desktop-optimization) - [March 2018](https://support.microsoft.com/help/4074878/march-2018-servicing-release-for-microsoft-desktop-optimization-pack) - [July 2018](https://support.microsoft.com/help/4340040/july-2018-servicing-release-for-microsoft-desktop-optimization-pack) +- [May 2019](https://support.microsoft.com/help/4505175/may-2019-servicing-release-for-microsoft-desktop-optimization-pack) ## Related topics diff --git a/windows/release-information/status-windows-10-1507.yml b/windows/release-information/status-windows-10-1507.yml index a764bbb877..88f03f07b7 100644 --- a/windows/release-information/status-windows-10-1507.yml +++ b/windows/release-information/status-windows-10-1507.yml @@ -60,7 +60,6 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

MessageDate
Plan for change: End of service reminders for Windows 10, versions 1703 and 1803
The Home, Pro, Pro for Workstations, and IoT Core editions of Windows 10, version 1703 (the Creators Update) will reach end of service on October 8, 2019. The Enterprise and Education editions of Windows 10, version 1803 (the April 2018 Update) will reach end of service on November 12, 2019. We recommend that you update devices running these versions and editions to the latest version of Windows 10—Windows 10, version 1903—as soon as possible to help keep them protected and your environments secure.
September 13, 2019
03:23 PM PT
Plan for change: End of service reminders for Windows 10, versions 1703 and 1803
The Enterprise and Education editions of Windows 10, version 1703 (the Creators Update) will reach end of service on October 8, 2019. The Home, Pro, Pro for Workstations, and IoT Core editions of Windows 10, version 1803 (the April 2018 Update) will reach end of service on November 12, 2019. We recommend that you update devices running these versions and editions to the latest version of Windows 10—Windows 10, version 1903—as soon as possible to help keep them protected and your environments secure.
September 13, 2019
03:23 PM PT
September 2019 security update available for all supported versions of Windows
The September 2019 security update release, referred to as our “B” release, is now available for Windows 10, version 1903 and all supported versions of Windows. We recommend that you install these updates promptly. To be informed about the latest updates and releases, follow us on Twitter @WindowsUpdate.
September 10, 2019
09:34 AM PT
Status update: Windows 10, version 1903 \"D\" optional release available August 30th
The August optional monthly “D” release for Windows 10, version 1903 is now available. Follow @WindowsUpdate for the latest on the availability of this release.
August 30, 2019
08:00 AM PT
Feature update install notification on Windows 10, version 1809 (the October 2018 Update)
We've had reports on August 29th that some customers running Windows 10, version 1809 (the October 2018 Update) have received notification to install the latest feature update (version 1903) early. Updating remains in your control. To install the update, you must select one of the following options: \"Pick a Time\", \"Restart Tonight,\" or \"Restart Now\". If you are not ready to update at this time, simply dismiss the notification by clicking the arrow in the top right corner. If you have updated to Windows 10, version 1903 and would like to go back to your previous version, see the instructions here.
August 29, 2019
04:39 PM PT
-
SummaryOriginating updateStatusLast updated
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 10240.18305

August 13, 2019
KB4512497
Resolved
KB4517276
August 17, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Mitigated
April 25, 2019
02:00 PM PT
" @@ -72,15 +71,6 @@ sections:
" -- title: August 2019 -- items: - - type: markdown - text: " - - -
DetailsOriginating updateStatusHistory
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512497, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4517276. This ‘optional’ update is available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive KB4517276 and install. For instructions, see Update Windows 10.

Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS).

Back to top
OS Build 10240.18305

August 13, 2019
KB4512497
Resolved
KB4517276
Resolved:
August 17, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
- " - - title: January 2019 - items: - type: markdown diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index 562cad0e09..0ff7c2541d 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -60,11 +60,10 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- + - @@ -83,7 +82,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) including ChsIME.EXE, may become unresponsive or may have high CPU usage.

See details >
OS Build 14393.3204

September 10, 2019
KB4516044
Mitigated
September 13, 2019
05:25 PM PT
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.

See details >
OS Build 14393.3204

September 10, 2019
KB4516044
Mitigated
September 16, 2019
05:36 PM PT
Apps and scripts using the NetQueryDisplayInformation API may fail with error
Applications and scripts that call the NetQueryDisplayInformation API or the WinNT provider equivalent may fail to return results after the first page of data.

See details >
OS Build 14393.3053

June 18, 2019
KB4503294
Resolved
KB4516044
September 10, 2019
10:00 AM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 14393.3115

July 16, 2019
KB4507459
Resolved
KB4512517
August 13, 2019
10:00 AM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
OS Build 14393.3025

June 11, 2019
KB4503267
Resolved
KB4512495
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 14393.3144

August 13, 2019
KB4512517
Resolved
KB4512495
August 17, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Mitigated
April 25, 2019
02:00 PM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

See details >
OS Build 14393.2608

November 13, 2018
KB4467691
Mitigated
February 19, 2019
10:00 AM PT
Cluster service may fail if the minimum password length is set to greater than 14
The cluster service may fail to start with the error “2245 (NERR_PasswordTooShort)” if the Group Policy “Minimum Password Length” is configured with greater than 14 characters.

See details >
OS Build 14393.2639

November 27, 2018
KB4467684
Mitigated
April 25, 2019
02:00 PM PT
- +
DetailsOriginating updateStatusHistory
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include CHS (Chinese Simplified) and CHT (Chinese Traditional) with Changjie/Quick keyboard.


Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016

Workaround: To mitigate the issue, perform the following steps:
  1. Select the Start button and type Services.
  2. Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
  3. Locate Startup type: and change it to Manual
  4. Select Ok
  5. The TabletInputService service is now in the default configuration and IME should work as expected.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.3204

September 10, 2019
KB4516044
Mitigated
Last updated:
September 13, 2019
05:25 PM PT

Opened:
September 13, 2019
05:25 PM PT
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include Chinese Simplified (ChsIME.EXE) and Chinese Traditional (ChtIME.EXE) with Changjie/Quick keyboard.


Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016

Workaround: To mitigate the issue, perform the following steps:
  1. Select the Start button and type Services.
  2. Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
  3. Locate Startup type: and change it to Manual
  4. Select Ok
  5. The TabletInputService service is now in the default configuration and IME should work as expected.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 14393.3204

September 10, 2019
KB4516044
Mitigated
Last updated:
September 16, 2019
05:36 PM PT

Opened:
September 13, 2019
05:25 PM PT
" @@ -93,7 +92,6 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Apps and scripts using the NetQueryDisplayInformation API may fail with error
 Applications and scripts that call the NetQueryDisplayInformation API or the WinNT provider equivalent may fail to return results after the first page of data, often 50 or 100 entries. When requesting additional pages you may receive the error, “1359: an internal error occurred.”

Affected platforms:
  • Server: Windows Server 2019; Windows Server 2016
Resolution: This issue was resolved in KB4516044.

Back to top
OS Build 14393.3053

June 18, 2019
KB4503294
Resolved
KB4516044
Resolved:
September 10, 2019
10:00 AM PT

Opened:
August 01, 2019
05:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512517, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4512495. This ‘optional’ update is available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive KB4512495 and install. For instructions, see Update Windows 10.

Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS).

Back to top
OS Build 14393.3144

August 13, 2019
KB4512517
Resolved
KB4512495
Resolved:
August 17, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
" diff --git a/windows/release-information/status-windows-10-1703.yml b/windows/release-information/status-windows-10-1703.yml index 094b5c9bab..9a00aca54d 100644 --- a/windows/release-information/status-windows-10-1703.yml +++ b/windows/release-information/status-windows-10-1703.yml @@ -66,9 +66,8 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- + -
SummaryOriginating updateStatusLast updated
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) including ChsIME.EXE, may become unresponsive or may have high CPU usage.

See details >
OS Build 15063.2045

September 10, 2019
KB4516068
Mitigated
September 13, 2019
05:25 PM PT
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.

See details >
OS Build 15063.2045

September 10, 2019
KB4516068
Mitigated
September 16, 2019
05:36 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 15063.1955

July 16, 2019
KB4507467
Resolved
KB4512507
August 13, 2019
10:00 AM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 15063.1988

August 13, 2019
KB4512507
Resolved
KB4512474
August 17, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 15063.1563

January 08, 2019
KB4480973
Mitigated
April 25, 2019
02:00 PM PT
" @@ -85,16 +84,7 @@ sections: - type: markdown text: " - -
DetailsOriginating updateStatusHistory
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include CHS (Chinese Simplified) and CHT (Chinese Traditional) with Changjie/Quick keyboard.


Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016

Workaround: To mitigate the issue, perform the following steps:
  1. Select the Start button and type Services.
  2. Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
  3. Locate Startup type: and change it to Manual
  4. Select Ok
  5. The TabletInputService service is now in the default configuration and IME should work as expected.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 15063.2045

September 10, 2019
KB4516068
Mitigated
Last updated:
September 13, 2019
05:25 PM PT

Opened:
September 13, 2019
05:25 PM PT
- " - -- title: August 2019 -- items: - - type: markdown - text: " - - +
DetailsOriginating updateStatusHistory
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512507, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4512474. This ‘optional’ update is available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive KB4512474 and install. For instructions, see Update Windows 10.

Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS).

Back to top
OS Build 15063.1988

August 13, 2019
KB4512507
Resolved
KB4512474
Resolved:
August 17, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include Chinese Simplified (ChsIME.EXE) and Chinese Traditional (ChtIME.EXE) with Changjie/Quick keyboard.


Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016

Workaround: To mitigate the issue, perform the following steps:
  1. Select the Start button and type Services.
  2. Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
  3. Locate Startup type: and change it to Manual
  4. Select Ok
  5. The TabletInputService service is now in the default configuration and IME should work as expected.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 15063.2045

September 10, 2019
KB4516068
Mitigated
Last updated:
September 16, 2019
05:36 PM PT

Opened:
September 13, 2019
05:25 PM PT
" diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index 4363810035..9bd26e7699 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -60,10 +60,9 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- + -
SummaryOriginating updateStatusLast updated
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) including ChsIME.EXE, may become unresponsive or may have high CPU usage.

See details >
OS Build 16299.1387

September 10, 2019
KB4516066
Mitigated
September 13, 2019
05:25 PM PT
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.

See details >
OS Build 16299.1387

September 10, 2019
KB4516066
Mitigated
September 16, 2019
05:36 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 16299.1296

July 16, 2019
KB4507465
Resolved
KB4512516
August 13, 2019
10:00 AM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
OS Build 16299.1217

June 11, 2019
KB4503284
Resolved
KB4512494
August 16, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 16299.1331

August 13, 2019
KB4512516
Resolved
KB4512494
August 16, 2019
02:00 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Mitigated
April 25, 2019
02:00 PM PT
" @@ -80,16 +79,7 @@ sections: - type: markdown text: " - -
DetailsOriginating updateStatusHistory
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include CHS (Chinese Simplified) and CHT (Chinese Traditional) with Changjie/Quick keyboard.


Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016

Workaround: To mitigate the issue, perform the following steps:
  1. Select the Start button and type Services.
  2. Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
  3. Locate Startup type: and change it to Manual
  4. Select Ok
  5. The TabletInputService service is now in the default configuration and IME should work as expected.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.1387

September 10, 2019
KB4516066
Mitigated
Last updated:
September 13, 2019
05:25 PM PT

Opened:
September 13, 2019
05:25 PM PT
- " - -- title: August 2019 -- items: - - type: markdown - text: " - - +
DetailsOriginating updateStatusHistory
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512516, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4512494. The ‘optional’ update will be available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive KB4512494 and install. For instructions, see Update Windows 10.

Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS).

Back to top
OS Build 16299.1331

August 13, 2019
KB4512516
Resolved
KB4512494
Resolved:
August 16, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include Chinese Simplified (ChsIME.EXE) and Chinese Traditional (ChtIME.EXE) with Changjie/Quick keyboard.


Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016

Workaround: To mitigate the issue, perform the following steps:
  1. Select the Start button and type Services.
  2. Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
  3. Locate Startup type: and change it to Manual
  4. Select Ok
  5. The TabletInputService service is now in the default configuration and IME should work as expected.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 16299.1387

September 10, 2019
KB4516066
Mitigated
Last updated:
September 16, 2019
05:36 PM PT

Opened:
September 13, 2019
05:25 PM PT
" diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml index 410ce10ff9..a6be94d23c 100644 --- a/windows/release-information/status-windows-10-1803.yml +++ b/windows/release-information/status-windows-10-1803.yml @@ -65,7 +65,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- + @@ -88,7 +88,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) including ChsIME.EXE, may become unresponsive or may have high CPU usage.

See details >
OS Build 17134.1006

September 10, 2019
KB4516058
Mitigated
September 13, 2019
05:25 PM PT
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.

See details >
OS Build 17134.1006

September 10, 2019
KB4516058
Mitigated
September 16, 2019
05:36 PM PT
Windows Mixed Reality Portal users may intermittently receive a 15-5 error code
You may receive a 15-5 error code in Windows Mixed Reality Portal and your headset may not respond to \"wake up\" from sleep.

See details >
OS Build 17134.950

August 13, 2019
KB4512501
Mitigated
September 11, 2019
05:32 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 17134.915

July 16, 2019
KB4507466
Resolved
KB4512501
August 13, 2019
10:00 AM PT
Notification issue: \"Your device is missing important security and quality fixes.\"
Some users may have incorrectly received the notification \"Your device is missing important security and quality fixes.\"

See details >
N/A

Resolved
September 03, 2019
12:32 PM PT
- +
DetailsOriginating updateStatusHistory
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include CHS (Chinese Simplified) and CHT (Chinese Traditional) with Changjie/Quick keyboard.


Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016

Workaround: To mitigate the issue, perform the following steps:
  1. Select the Start button and type Services.
  2. Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
  3. Locate Startup type: and change it to Manual
  4. Select Ok
  5. The TabletInputService service is now in the default configuration and IME should work as expected.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17134.1006

September 10, 2019
KB4516058
Mitigated
Last updated:
September 13, 2019
05:25 PM PT

Opened:
September 13, 2019
05:25 PM PT
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include Chinese Simplified (ChsIME.EXE) and Chinese Traditional (ChtIME.EXE) with Changjie/Quick keyboard.


Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016

Workaround: To mitigate the issue, perform the following steps:
  1. Select the Start button and type Services.
  2. Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
  3. Locate Startup type: and change it to Manual
  4. Select Ok
  5. The TabletInputService service is now in the default configuration and IME should work as expected.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17134.1006

September 10, 2019
KB4516058
Mitigated
Last updated:
September 16, 2019
05:36 PM PT

Opened:
September 13, 2019
05:25 PM PT
Windows Mixed Reality Portal users may intermittently receive a 15-5 error code
After installing KB4512501, Windows Mixed Reality Portal users may intermittently receive a 15-5 error code. In some cases, Windows Mixed Reality Portal may report that the headset is sleeping and pressing “Wake up” may appear to produce no action.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10, version 1803
Workaround: To mitigate the issue, use the following steps:
  1. Close the Windows Mixed Reality Portal, if it is running.
  2. Open Task Manager by selecting the Start button and typing Task Manager.
  3. In Task Manager under the Processes tab, right click or long press on “Windows Explorer” and select restart.
  4. You can now open the Windows Mixed Reality Portal.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17134.950

August 13, 2019
KB4512501
Mitigated
Last updated:
September 11, 2019
05:32 PM PT

Opened:
September 11, 2019
05:32 PM PT
Notification issue: \"Your device is missing important security and quality fixes.\"
Some users may have incorrectly received the notification \"Your device is missing important security and quality fixes\" in the Windows Update dialog and a red \"!\" in the task tray on the Windows Update tray icon. This notification is intended for devices that are 90 days or more out of date, but some users with installed updates released in June or July also saw this notification.

Affected platforms:
  • Client: Windows 10, version 1803
  • Server: Windows Server, version 1803
Resolution: This issue was resolved on the server side on August 30, 2019. Only devices that are out of date by 90 days or more should now see the notification. No action is required by the user to resolve this issue. If you are still seeing the \"Your device is missing important security and quality fixes\" notification, we recommend selecting Check for Updates in the Windows Update dialog. For instructions, see Update Windows 10. Microsoft always recommends trying to keep your devices up to date, as the monthly updates contain important security fixes. 

Back to top
N/A

Resolved
Resolved:
September 03, 2019
12:32 PM PT

Opened:
September 03, 2019
12:32 PM PT
diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index 6685b4a484..f32d6b5f10 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -64,11 +64,10 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- + - @@ -88,7 +87,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) including ChsIME.EXE, may become unresponsive or may have high CPU usage.

See details >
OS Build 17763.737

September 10, 2019
KB4512578
Mitigated
September 13, 2019
05:25 PM PT
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.

See details >
OS Build 17763.737

September 10, 2019
KB4512578
Mitigated
September 16, 2019
05:36 PM PT
Windows Mixed Reality Portal users may intermittently receive a 15-5 error code
You may receive a 15-5 error code in Windows Mixed Reality Portal and your headset may not respond to \"wake up\" from sleep.

See details >
OS Build 17763.678

August 13, 2019
KB4511553
Mitigated
September 11, 2019
05:32 PM PT
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

See details >
OS Build 17763.652

July 22, 2019
KB4505658
Resolved
KB4511553
August 13, 2019
10:00 AM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
OS Build 17763.557

June 11, 2019
KB4503327
Resolved
KB4512534
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
OS Build 17763.678

August 13, 2019
KB4511553
Resolved
KB4512534
August 17, 2019
02:00 PM PT
Apps and scripts using the NetQueryDisplayInformation API may fail with error
Applications and scripts that call the NetQueryDisplayInformation API or the WinNT provider equivalent may fail to return results after the first page of data.

See details >
OS Build 17763.55

October 09, 2018
KB4464330
Investigating
August 01, 2019
05:00 PM PT
Startup to a black screen after installing updates
Your device may startup to a black screen during the first logon after installing updates.

See details >
OS Build 17763.557

June 11, 2019
KB4503327
Mitigated
June 14, 2019
04:41 PM PT
Devices with some Asian language packs installed may receive an error
After installing the KB4493509 devices with some Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_F

See details >
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
May 03, 2019
10:59 AM PT
- +
DetailsOriginating updateStatusHistory
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include CHS (Chinese Simplified) and CHT (Chinese Traditional) with Changjie/Quick keyboard.


Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016

Workaround: To mitigate the issue, perform the following steps:
  1. Select the Start button and type Services.
  2. Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
  3. Locate Startup type: and change it to Manual
  4. Select Ok
  5. The TabletInputService service is now in the default configuration and IME should work as expected.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.737

September 10, 2019
KB4512578
Mitigated
Last updated:
September 13, 2019
05:25 PM PT

Opened:
September 13, 2019
05:25 PM PT
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include Chinese Simplified (ChsIME.EXE) and Chinese Traditional (ChtIME.EXE) with Changjie/Quick keyboard.


Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016

Workaround: To mitigate the issue, perform the following steps:
  1. Select the Start button and type Services.
  2. Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
  3. Locate Startup type: and change it to Manual
  4. Select Ok
  5. The TabletInputService service is now in the default configuration and IME should work as expected.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.737

September 10, 2019
KB4512578
Mitigated
Last updated:
September 16, 2019
05:36 PM PT

Opened:
September 13, 2019
05:25 PM PT
Windows Mixed Reality Portal users may intermittently receive a 15-5 error code
After installing KB4511553, Windows Mixed Reality Portal users may intermittently receive a 15-5 error code. In some cases, Windows Mixed Reality Portal may report that the headset is sleeping and pressing “Wake up” may appear to produce no action.

Affected platforms:
  • Client: Windows 10, version 1809; Windows 10, version 1803
Workaround: To mitigate the issue, use the following steps:
  1. Close the Windows Mixed Reality Portal, if it is running.
  2. Open Task Manager by selecting the Start button and typing Task Manager.
  3. In Task Manager under the Processes tab, right click or long press on “Windows Explorer” and select restart.
  4. You can now open the Windows Mixed Reality Portal.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.678

August 13, 2019
KB4511553
Mitigated
Last updated:
September 11, 2019
05:32 PM PT

Opened:
September 11, 2019
05:32 PM PT
" @@ -98,7 +97,6 @@ sections: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4511553, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4512534. This ‘optional’ update is available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive KB4512534 and install. For instructions, see Update Windows 10.

Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS).

Back to top
OS Build 17763.678

August 13, 2019
KB4511553
Resolved
KB4512534
Resolved:
August 17, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
Apps and scripts using the NetQueryDisplayInformation API may fail with error
 Applications and scripts that call the NetQueryDisplayInformation API or the WinNT provider equivalent may fail to return results after the first page of data, often 50 or 100 entries. When requesting additional pages you may receive the error, “1359: an internal error occurred.”

Affected platforms:
  • Server: Windows Server 2019; Windows Server 2016
Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 17763.55

October 09, 2018
KB4464330
Investigating
Last updated:
August 01, 2019
05:00 PM PT

Opened:
August 01, 2019
05:00 PM PT
" diff --git a/windows/release-information/status-windows-10-1903.yml b/windows/release-information/status-windows-10-1903.yml index 4146c05f31..d7af320a1c 100644 --- a/windows/release-information/status-windows-10-1903.yml +++ b/windows/release-information/status-windows-10-1903.yml @@ -65,9 +65,9 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ - @@ -99,9 +99,9 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.

See details >
OS Build 18362.356

September 10, 2019
KB4515384
Mitigated
September 16, 2019
05:36 PM PT
Safeguard on certain devices with some Intel and Broadcom Wi-Fi adapters
Microsoft and NEC have found incompatibility issues with some devices with Intel Centrino 6205/6235 and Broadcom 802.11ac Wi-Fi cards when running Windows 10, version 1903.

See details >
N/A

Mitigated
September 13, 2019
05:25 PM PT
Some users report issues related to the Start menu and Windows Desktop Search
Microsoft has received reports that a small number of users are having issues related to the Start menu and Windows Desktop Search.

See details >
OS Build 18362.356

September 10, 2019
KB4515384
Investigating
September 13, 2019
05:35 PM PT
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) including ChsIME.EXE, may become unresponsive or may have high CPU usage.

See details >
OS Build 18362.356

September 10, 2019
KB4515384
Mitigated
September 13, 2019
05:25 PM PT
Audio in games is quiet or different than expected
Microsoft has received reports that audio in certain games is quieter or different than expected.

See details >
OS Build 18362.356

September 10, 2019
KB4515384
Mitigated
September 13, 2019
05:25 PM PT
Screenshots and Snips have an unnatural orange tint
Users have reported an orange tint on Screenshots and Snips with the Lenovo Vantage app installed

See details >
OS Build 18362.356

September 10, 2019
KB4516115
Resolved External
September 11, 2019
08:54 PM PT
Windows Desktop Search may not return any results and may have high CPU usage
Windows Desktop Search may not return any results and SearchUI.exe may have high CPU usage after installing KB4512941.

See details >
OS Build 18362.329

August 30, 2019
KB4512941
Resolved
KB4515384
September 10, 2019
10:00 AM PT
+ - diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index 67be794791..02b0c3aa47 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -63,7 +63,6 @@ sections: -
DetailsOriginating updateStatusHistory
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include Chinese Simplified (ChsIME.EXE) and Chinese Traditional (ChtIME.EXE) with Changjie/Quick keyboard.


Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016

Workaround: To mitigate the issue, perform the following steps:
  1. Select the Start button and type Services.
  2. Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
  3. Locate Startup type: and change it to Manual
  4. Select Ok
  5. The TabletInputService service is now in the default configuration and IME should work as expected.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 18362.356

September 10, 2019
KB4515384
Mitigated
Last updated:
September 16, 2019
05:36 PM PT

Opened:
September 13, 2019
05:25 PM PT
Safeguard on certain devices with some Intel and Broadcom Wi-Fi adapters
Microsoft and NEC have found incompatibility issues with Intel Centrino 6205/6235 and Broadcom 802.11ac Wi-Fi cards when running Windows 10, version 1903 on specific models of NEC devices. If these devices are updated to Windows 10, version 1903, they will no longer be able to use any Wi-Fi connections. The Wi-Fi driver may have a yellow exclamation point in device manager. The task tray icon for networking may show the icon for no internet and Network & Internet settings may not show any Wi-Fi networks.

To safeguard your update experience, we have applied a compatibility hold on the affected devices from being offered Windows 10, version 1903.

Affected platforms:
  • Client: Windows 10, version 1903
Workaround: If you are using an affected device and you have already installed Windows 10, version 1903, you can mitigate the issue disabling then re-enabling the Wi-Fi adapter in Device Manager. You should now be able to use Wi-Fi until your next reboot.

Next steps: Microsoft and NEC are working on a resolution and will provide an update in an upcoming release.

Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved.

Back to top
N/A

Mitigated
Last updated:
September 13, 2019
05:25 PM PT

Opened:
September 13, 2019
05:25 PM PT
Some users report issues related to the Start menu and Windows Desktop Search
Microsoft has received reports that a small number of users are having issues related to the Start menu and Windows Desktop Search.

Affected platforms:
  • Client: Windows 10, version 1903
Next steps: We are presently investigating and will provide an update when more information is available.

Note As a first step with any issue you may encounter, we recommend you refer to our troubleshooting support guides. If you are having an issue with search, see Fix problems in Windows Search.

Back to top
OS Build 18362.356

September 10, 2019
KB4515384
Investigating
Last updated:
September 13, 2019
05:35 PM PT

Opened:
September 11, 2019
05:18 PM PT
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include CHS (Chinese Simplified) and CHT (Chinese Traditional) with Changjie/Quick keyboard.


Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016

Workaround: To mitigate the issue, perform the following steps:
  1. Select the Start button and type Services.
  2. Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
  3. Locate Startup type: and change it to Manual
  4. Select Ok
  5. The TabletInputService service is now in the default configuration and IME should work as expected.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
OS Build 18362.356

September 10, 2019
KB4515384
Mitigated
Last updated:
September 13, 2019
05:25 PM PT

Opened:
September 13, 2019
05:25 PM PT
Audio in games is quiet or different than expected
Microsoft has received reports that audio in certain games is quieter or different than expected. At the request of some of our audio partners, we implemented a compatibility change that enabled certain games to query support and render multi-channel audio. Due to customer feedback, we are reverting this change as some games and some devices are not rendering multi-channel audio as expected. This may result in games sounding different than customers are used to and may have missing channels.

Affected platforms:
  • Client: Windows 10, version 1903
Workaround: To mitigate the issue, open settings in the impacted game and disable multi-channel audio, if this option is available. You can also search in the Windows Control Panel for 3rd party audio device control panels and disable Multi-channel audio or Virtual Surround Sound, if these options are available.  

Next steps: We are working on a resolution and estimates a solution will be available in late September.

Back to top
OS Build 18362.356

September 10, 2019
KB4515384
Mitigated
Last updated:
September 13, 2019
05:25 PM PT

Opened:
September 13, 2019
05:25 PM PT
Screenshots and Snips have an unnatural orange tint
When creating screenshots or using similar tools (such as Snipping Tool or Snip & Sketch), the resulting images may have an unnatural orange tint. This issue is caused by the Eye Care mode feature of Lenovo Vantage. This issue started on or around September 5, 2019. 

Affected platforms:
  • Client: Windows 10, version 1903
  • Server: None
Resolution: For guidance on this issue, see the Lenovo support article Screenshots and Snips have an unnatural orange tint. There is no update for Windows needed for this issue.

Back to top
OS Build 18362.356

September 10, 2019
KB4516115
Resolved External
Last updated:
September 11, 2019
08:54 PM PT

Opened:
September 11, 2019
08:54 PM PT
Windows Desktop Search may not return any results and may have high CPU usage
Microsoft is getting reports that a small number of users may not receive results when using Windows Desktop Search and may see high CPU usage from SearchUI.exe when searching after installing KB4512941. This issue is only encountered on devices in which searching the web from Windows Desktop Search has been disabled.

Affected platforms:
  • Client: Windows 10, version 1903
Resolution: This issue was resolved in KB4515384.

Back to top
OS Build 18362.329

August 30, 2019
KB4512941
Resolved
KB4515384
Resolved:
September 10, 2019
10:00 AM PT

Opened:
September 04, 2019
02:25 PM PT
You may receive an error when opening or using the Toshiba Qosmio AV Center
Toshiba Qosmio AV Center may error when opening and you may also receive an error in Event Log related to cryptnet.dll.

See details >
August 13, 2019
KB4512506
Investigating
September 13, 2019
04:25 PM PT
Windows updates that are SHA-2 signed may not be offered for Symantec and Norton AV
Windows updates that are SHA-2 signed are not available with Symantec or Norton antivirus program installed

See details >
August 13, 2019
KB4512506
Resolved External
August 27, 2019
02:29 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
June 11, 2019
KB4503292
Resolved
KB4512514
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
August 13, 2019
KB4512506
Resolved
KB4517297
August 16, 2019
02:00 PM PT
IA64 and x64 devices may fail to start after installing updates
After installing updates released on or after August 13, 2019, IA64 and x64 devices using EFI Boot may fail to start.

See details >
August 13, 2019
KB4512506
Mitigated
August 17, 2019
12:59 PM PT
" @@ -90,7 +89,6 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Windows updates that are SHA-2 signed may not be offered for Symantec and Norton AV
Symantec identified the potential for a negative interaction that may occur after Windows Updates code signed with SHA-2 only certificates are installed on devices with Symantec or Norton antivirus programs installed. The software may not correctly identify files included in the update as code signed by Microsoft, putting the device at risk for a delayed or incomplete update.

Affected platforms:
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1
Resolution: The safeguard hold has been removed. Symantec has completed its evaluation of the impact of this update and future updates to Windows 7/Windows 2008 R2 and has determined that there is no increased risk of a false positive detection for all in-field versions of Symantec Endpoint Protection and Norton antivirus programs. See the Symantec support article for additional detail and please reach out to Symantec or Norton support if you encounter any issues.

Back to top
August 13, 2019
KB4512506
Resolved External
Last updated:
August 27, 2019
02:29 PM PT

Opened:
August 13, 2019
10:05 AM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512506, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4517297. The ‘optional’ update is now available on Microsoft Update Catalog and Windows Server Update Services (WSUS).

Back to top
August 13, 2019
KB4512506
Resolved
KB4517297
Resolved:
August 16, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
IA64 and x64 devices may fail to start after installing updates
IA64 devices (in any configuration) and x64 devices using EFI boot that were provisioned after the July 9th updates and/or skipped the recommended update (KB3133977), may fail to start with the following error:
\"File: \\Windows\\system32\\winload.efi
Status: 0xc0000428
Info: Windows cannot verify the digital signature for this file.\"

Affected platforms:
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1
Take Action: To resolve this issue please follow the steps outlined in the SHA-2 support FAQ article for error code 0xc0000428.

Back to top
August 13, 2019
KB4512506
Mitigated
Last updated:
August 17, 2019
12:59 PM PT

Opened:
August 13, 2019
08:34 AM PT
" diff --git a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml index 504aed7b2e..57124dd060 100644 --- a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml @@ -62,7 +62,6 @@ sections: -
SummaryOriginating updateStatusLast updated
Windows RT 8.1 devices may have issues opening Internet Explorer 11
On Windows RT 8.1 devices, Internet Explorer 11 may not open and you may receive an error.

See details >
September 10, 2019
KB4516067
Investigating
September 13, 2019
05:25 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
June 11, 2019
KB4503276
Resolved
KB4512478
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
August 13, 2019
KB4512488
Resolved
KB4517298
August 16, 2019
02:00 PM PT
Japanese IME doesn't show the new Japanese Era name as a text input option
If previous dictionary updates are installed, the Japanese input method editor (IME) doesn't show the new Japanese Era name as a text input option.

See details >
April 25, 2019
KB4493443
Mitigated
May 15, 2019
05:53 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >
January 08, 2019
KB4480963
Mitigated
April 25, 2019
02:00 PM PT
@@ -84,15 +83,6 @@ sections: " -- title: August 2019 -- items: - - type: markdown - text: " - - -
DetailsOriginating updateStatusHistory
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512488, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4517298. The ‘optional’ update is now available on Microsoft Update Catalog and Windows Server Update Services (WSUS).

Back to top
August 13, 2019
KB4512488
Resolved
KB4517298
Resolved:
August 16, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
- " - - title: July 2019 - items: - type: markdown diff --git a/windows/release-information/status-windows-server-2008-sp2.yml b/windows/release-information/status-windows-server-2008-sp2.yml index 2954482f10..92caeeca25 100644 --- a/windows/release-information/status-windows-server-2008-sp2.yml +++ b/windows/release-information/status-windows-server-2008-sp2.yml @@ -61,7 +61,6 @@ sections: text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

-
SummaryOriginating updateStatusLast updated
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
June 11, 2019
KB4503273
Resolved
KB4512499
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
August 13, 2019
KB4512476
Resolved
KB4517301
August 16, 2019
02:00 PM PT
" @@ -72,15 +71,6 @@ sections:
" -- title: August 2019 -- items: - - type: markdown - text: " - - -
DetailsOriginating updateStatusHistory
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512476, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4517301. The ‘optional’ update is now available on Microsoft Update Catalog and Windows Server Update Services (WSUS).

Back to top
August 13, 2019
KB4512476
Resolved
KB4517301
Resolved:
August 16, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
- " - - title: July 2019 - items: - type: markdown diff --git a/windows/release-information/status-windows-server-2012.yml b/windows/release-information/status-windows-server-2012.yml index e78082f2be..53d71fb08e 100644 --- a/windows/release-information/status-windows-server-2012.yml +++ b/windows/release-information/status-windows-server-2012.yml @@ -61,7 +61,6 @@ sections: text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

-
SummaryOriginating updateStatusLast updated
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
June 11, 2019
KB4503285
Resolved
KB4512512
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

See details >
August 13, 2019
KB4512518
Resolved
KB4517302
August 16, 2019
02:00 PM PT
Japanese IME doesn't show the new Japanese Era name as a text input option
If previous dictionary updates are installed, the Japanese input method editor (IME) doesn't show the new Japanese Era name as a text input option.

See details >
April 25, 2019
KB4493462
Mitigated
May 15, 2019
05:53 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

See details >
January 08, 2019
KB4480975
Mitigated
April 25, 2019
02:00 PM PT
@@ -74,15 +73,6 @@ sections:
" -- title: August 2019 -- items: - - type: markdown - text: " - - -
DetailsOriginating updateStatusHistory
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512518, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4517302. The ‘optional’ update is now available on Microsoft Update Catalog and Windows Server Update Services (WSUS).

Back to top
August 13, 2019
KB4512518
Resolved
KB4517302
Resolved:
August 16, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
- " - - title: July 2019 - items: - type: markdown diff --git a/windows/release-information/windows-message-center.yml b/windows/release-information/windows-message-center.yml index aad8c98172..531c4806b0 100644 --- a/windows/release-information/windows-message-center.yml +++ b/windows/release-information/windows-message-center.yml @@ -50,7 +50,7 @@ sections: text: " - + diff --git a/windows/security/identity-protection/hello-for-business/hello-faq.md b/windows/security/identity-protection/hello-for-business/hello-faq.md index d434eebfd2..0cfbf47cc6 100644 --- a/windows/security/identity-protection/hello-for-business/hello-faq.md +++ b/windows/security/identity-protection/hello-for-business/hello-faq.md @@ -22,7 +22,7 @@ ms.reviewer: - Windows 10 ## What about virtual smart cards? -Windows Hello for Business is the modern, two-factor credential for Windows 10. Microsoft will be deprecating virtual smart cards in the future but not date at this time. Customers using Windows 10 and virtual smart cards should move to Windows Hello for Business. Microsoft will publish the date early to ensure customers have adequate lead time to move to Windows Hello for Business. Microsoft recommends new Windows 10 deployments to use Windows Hello for Business. Virtual smart card remain supported for Windows 7 and Windows 8. +Windows Hello for Business is the modern, two-factor credential for Windows 10. Microsoft will be deprecating virtual smart cards in the future, but no date is set at this time. Customers using Windows 10 and virtual smart cards should move to Windows Hello for Business. Microsoft will publish the date early to ensure customers have adequate lead time to move to Windows Hello for Business. Microsoft recommends new Windows 10 deployments to use Windows Hello for Business. Virtual smart card remain supported for Windows 7 and Windows 8. ## What about convenience PIN? Microsoft is committed to its vision of a world without passwords. We recognize the *convenience* provided by convenience PIN, but it stills uses a password for authentication. Microsoft recommends customers using Windows 10 and convenience PINs should move to Windows Hello for Business. New Windows 10 deployments should deploy Windows Hello for Business and not convenience PINs. Microsoft will be deprecating convenience PINs in the future and will publish the date early to ensure customers have adequate lead time to deploy Windows Hello for Business. @@ -45,7 +45,7 @@ The statement "PIN is stronger than Password" is not directed at the strength of The **Key Admins** and **Enterprise Key Admins** groups are created when you install the first Windows Server 2016 domain controller into a domain. Domain controllers running previous versions of Windows Server cannot translate the security identifier (SID) to a name. To resolve this, transfer the PDC emulator domain role to a domain controller running Windows Server 2016. ## Can I use a convenience PIN with Azure AD? -It is currently possible to set a convience PIN on Azure Active Directory Joined or Hybrid Active Directory Joined devices. Convenience PIN is not supported for Azure Active Directory user accounts. It is only supported for on-premises only Domain Joined users and local account users. +It is currently possible to set a convenience PIN on Azure Active Directory Joined or Hybrid Active Directory Joined devices. Convenience PIN is not supported for Azure Active Directory user accounts. It is only supported for on-premises only Domain Joined users and local account users. ## Can I use an external camera when my laptop is closed or docked? No. Windows 10 currently only supports one Windows Hello for Business camera and does not fluidly switch to an external camera when the computer is docked with the lid closed. The product group is aware of this and is investigating this topic further. diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md index ca40875aab..914b140411 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md @@ -35,6 +35,8 @@ ms.date: 04/24/2018 > [!NOTE] > To use Group Policy (GP) updates to deploy the package, you must be on Windows Server 2008 R2 or later. +> For Windows Server 2019, you may need to replace NT AUTHORITY\Well-Known-System-Account with NT AUTHORITY\SYSTEM of the XML file that the Group Policy preference creates. + ## Onboard machines using Group Policy 1. Open the GP configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from [Microsoft Defender Security Center](https://securitycenter.windows.com/): diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md index 884822f607..da64a631d7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md @@ -19,9 +19,9 @@ ms.topic: conceptual # Microsoft Defender Advanced Threat Protection ->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-main-abovefoldlink) +> Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-main-abovefoldlink) > ->For more info about Windows 10 Enterprise Edition features and functionality, see [Windows 10 Enterprise edition](https://www.microsoft.com/WindowsForBusiness/buy). +> For more info about Windows 10 Enterprise Edition features and functionality, see [Windows 10 Enterprise edition](https://www.microsoft.com/WindowsForBusiness/buy). Microsoft Defender Advanced Threat Protection is a platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats. @@ -66,9 +66,9 @@ Microsoft Defender ATP uses the following combination of technology built into W
->[!TIP] ->- Learn about the latest enhancements in Microsoft Defender ATP: [What's new in Microsoft Defender ATP](https://cloudblogs.microsoft.com/microsoftsecure/2018/11/15/whats-new-in-windows-defender-atp/). ->- Microsoft Defender ATP demonstrated industry-leading optics and detection capabilities in the recent MITRE evaluation. Read: [Insights from the MITRE ATT&CK-based evaluation](https://cloudblogs.microsoft.com/microsoftsecure/2018/12/03/insights-from-the-mitre-attack-based-evaluation-of-windows-defender-atp/). +> [!TIP] +> - Learn about the latest enhancements in Microsoft Defender ATP: [What's new in Microsoft Defender ATP](https://cloudblogs.microsoft.com/microsoftsecure/2018/11/15/whats-new-in-windows-defender-atp/). +> - Microsoft Defender ATP demonstrated industry-leading optics and detection capabilities in the recent MITRE evaluation. Read: [Insights from the MITRE ATT&CK-based evaluation](https://cloudblogs.microsoft.com/microsoftsecure/2018/12/03/insights-from-the-mitre-attack-based-evaluation-of-windows-defender-atp/). @@ -78,7 +78,7 @@ This built-in capability uses a game-changing risk-based approach to the discove **[Attack surface reduction](overview-attack-surface-reduction.md)**
-The attack surface reduction set of capabilities provide the first line of defense in the stack. By ensuring configuration settings are properly set and exploit mitigation techniques are applied, these set of capabilities resist attacks and exploitations. +The attack surface reduction set of capabilities provide the first line of defense in the stack. By ensuring configuration settings are properly set and exploit mitigation techniques are applied, these set of capabilities resist attacks and exploitation. @@ -99,7 +99,7 @@ In conjunction with being able to quickly respond to advanced attacks, Microsoft **[Secure score](overview-secure-score.md)**
->[!NOTE] +> [!NOTE] > Secure score is now part of [Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md) as [Configuration score](configuration-score.md). The secure score page will be available for a few weeks. View the [Secure score](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score) page. Microsoft Defender ATP includes a secure score to help you dynamically assess the security state of your enterprise network, identify unprotected systems, and take recommended actions to improve the overall security of your organization. @@ -127,7 +127,7 @@ To help you maximize the effectiveness of the security platform, you can configu Topic | Description :---|:--- [Overview](overview.md) | Understand the concepts behind the capabilities in Microsoft Defender ATP so you take full advantage of the complete threat protection platform. -[Get started](get-started.md) | Learn about the requirements of the platform and the initial steps you need to take to get started with Microsoft Defender ATP. +[Minimum requirements](minimum-requirements.md) | Learn about the requirements of the platform and the initial steps you need to take to get started with Microsoft Defender ATP. [Configure and manage capabilities](onboard.md)| Configure and manage the individual capabilities in Microsoft Defender ATP. [Troubleshoot Microsoft Defender ATP](troubleshoot-mdatp.md) | Learn how to address issues that you might encounter while using the platform. From 20ad9afc049957616b3da55e7926078b1d1e648a Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Tue, 17 Sep 2019 09:27:47 -0700 Subject: [PATCH 253/285] known issues --- .../windows-autopilot/known-issues.md | 107 ++++++++++-------- 1 file changed, 61 insertions(+), 46 deletions(-) diff --git a/windows/deployment/windows-autopilot/known-issues.md b/windows/deployment/windows-autopilot/known-issues.md index d1f538dd46..2c2ff9b89a 100644 --- a/windows/deployment/windows-autopilot/known-issues.md +++ b/windows/deployment/windows-autopilot/known-issues.md @@ -1,46 +1,61 @@ ---- -title: Windows Autopilot known issues -ms.reviewer: -manager: laurawi -description: Windows Autopilot deployment -keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune -ms.prod: w10 -ms.mktglfcycl: deploy -ms.localizationpriority: medium -ms.sitesec: library -ms.pagetype: deploy -audience: itpro author: greg-lindsay -ms.author: greglin -ms.collection: M365-modern-desktop -ms.topic: article ---- - - -# Windows Autopilot - known issues - -**Applies to** - -- Windows 10 - -
MessageDate
Plan for change: End of service reminders for Windows 10, versions 1703 and 1803
The Home, Pro, Pro for Workstations, and IoT Core editions of Windows 10, version 1703 (the Creators Update) will reach end of service on October 8, 2019. The Enterprise and Education editions of Windows 10, version 1803 (the April 2018 Update) will reach end of service on November 12, 2019. We recommend that you update devices running these versions and editions to the latest version of Windows 10—Windows 10, version 1903—as soon as possible to help keep them protected and your environments secure.
September 13, 2019
03:23 PM PT
Plan for change: End of service reminders for Windows 10, versions 1703 and 1803
The Enterprise and Education editions of Windows 10, version 1703 (the Creators Update) will reach end of service on October 8, 2019. The Home, Pro, Pro for Workstations, and IoT Core editions of Windows 10, version 1803 (the April 2018 Update) will reach end of service on November 12, 2019. We recommend that you update devices running these versions and editions to the latest version of Windows 10—Windows 10, version 1903—as soon as possible to help keep them protected and your environments secure.
September 13, 2019
03:23 PM PT
September 2019 security update available for all supported versions of Windows
The September 2019 security update release, referred to as our “B” release, is now available for Windows 10, version 1903 and all supported versions of Windows. We recommend that you install these updates promptly. To be informed about the latest updates and releases, follow us on Twitter @WindowsUpdate.
September 10, 2019
09:34 AM PT
Status update: Windows 10, version 1903 \"D\" optional release available August 30th
The August optional monthly “D” release for Windows 10, version 1903 is now available. Follow @WindowsUpdate for the latest on the availability of this release.
August 30, 2019
08:00 AM PT
Feature update install notification on Windows 10, version 1809 (the October 2018 Update)
We've had reports on August 29th that some customers running Windows 10, version 1809 (the October 2018 Update) have received notification to install the latest feature update (version 1903) early. Updating remains in your control. To install the update, you must select one of the following options: \"Pick a Time\", \"Restart Tonight,\" or \"Restart Now\". If you are not ready to update at this time, simply dismiss the notification by clicking the arrow in the top right corner. If you have updated to Windows 10, version 1903 and would like to go back to your previous version, see the instructions here.
August 29, 2019
04:39 PM PT
-
IssueMore information -
The following known issues are resolved by installing the July 26, 2019 KB4505903 update (OS Build 18362.267): - -- Windows Autopilot white glove does not work for a non-English OS and you see a red screen that says "Success." -- Windows Autopilot reports an AUTOPILOTUPDATE error during OOBE after sysprep, reset or other variations. This typically happens if you reset the OS or used a custom sysprepped image. -- BitLocker encryption is not correctly configured. Ex: BitLocker didn’t get an expected notification after policies were applied to begin encryption. -- You are unable to install UWP apps from the Microsoft Store, causing failures during Windows Autopilot. If you are deploying Company Portal as a blocking app during Windows Autopilot ESP, you’ve probably seen this error. -- A user is not granted administrator rights in the Windows Autopilot user-driven Hybrid Azure AD join scenario. This is another non-English OS issue. -Download and install the KB4505903 update.

See the section: How to get this update for information on specific release channels you can use to obtain the update. -
White glove gives a red screen and the Microsoft-Windows-User Device Registration/Admin event log displays HResult error code 0x801C03F3This can happen if Azure AD can’t find an AAD device object for the device that you are trying to deploy. This will occur if you manually delete the object. To fix it, remove the device from AAD, Intune, and Autopilot, then re-register it with Autopilot, which will recreate the AAD device object.
-
To obtain troubleshooting logs use: Mdmdiagnosticstool.exe -area Autopilot;TPM -cab c:\autopilot.cab -
White glove gives a red screenWhite glove is not supported on a VM. -
Error importing Windows Autopilot devices from a .csv fileEnsure that you have not edited the .csv file in Microsoft Excel or an editor other than Notepad. Some of these editors can introduce extra characters causing the file format to be invalid. -
Windows Autopilot for existing devices does not follow the Autopilot OOBE experience.Ensure that the JSON profile file is saved in ANSI/ASCII format, not Unicode or UTF-8. -
Something went wrong is displayed page during OOBE.The client is likely unable to access all the required AAD/MSA-related URLs. For more information, see Networking requirements. -
- -## Related topics - -[Diagnose MDM failures in Windows 10](https://docs.microsoft.com/windows/client-management/mdm/diagnose-mdm-failures-in-windows-10)
-[Troubleshooting Windows Autopilot](troubleshooting.md) +--- +title: Windows Autopilot known issues +ms.reviewer: +manager: laurawi +description: Windows Autopilot deployment +keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune +ms.prod: w10 +ms.mktglfcycl: deploy +ms.localizationpriority: medium +ms.sitesec: library +ms.pagetype: deploy +audience: itpro +author: greg-lindsay +ms.author: greglin +ms.collection: M365-modern-desktop +ms.topic: article +--- + + +# Windows Autopilot - known issues + +**Applies to** + +- Windows 10 + + +
IssueMore information +
The following known issue will be resolved by installing the KB4517211 update, due to be released in late September 2019: + +- TPM attestation fails on Windows 10 1903 due to missing AKI extension in EK certificate. (An additional validation added in Windows 10 1903 to check that the TPM EK certs had the proper attributes according to the TCG specifications uncovered that a number of them don’t, so that validation will be removed). +
The following known issues are resolved by installing the August 30, 2019 KB4512941 update (OS Build 18362.329): + +- Windows Autopilot for existing devices feature does not properly suppress “Activities” page during OOBE. (Because of this, you’ll see that extra page during OOBE). +- TPM attestation state is not cleared by sysprep /generalize, causing TPM attestation failure during later OOBE flow. (This isn’t a particularly common issue, but you could run into it while testing if you are running sysprep /generalize and then rebooting or reimaging the device to go back through an Autopilot white glove or self-deploying scenario). +- TPM attestation may fail if the device has a valid AIK cert but no EK cert. (This is related to the previous item). +- If TPM attestation fails during the Windows Autopilot white glove process, the landing page appears to be hung. (Basically, the white glove landing page, where you click “Provision” to start the white glove process, isn’t reporting errors properly). +- TPM attestation fails on newer Infineon TPMs (firmware version > 7.69). (Prior to this fix, only a specific list of firmware versions was accepted). +- Device naming templates may truncate the computer name at 14 characters instead of 15. +- Assigned Access policies cause a reboot which can interfere with the configuration of single-app kiosk devices. +Download and install the KB4512941 update.

See the section: How to get this update for information on specific release channels you can use to obtain the update. +
The following known issues are resolved by installing the July 26, 2019 KB4505903 update (OS Build 18362.267): + +- Windows Autopilot white glove does not work for a non-English OS and you see a red screen that says "Success." +- Windows Autopilot reports an AUTOPILOTUPDATE error during OOBE after sysprep, reset or other variations. This typically happens if you reset the OS or used a custom sysprepped image. +- BitLocker encryption is not correctly configured. Ex: BitLocker didn’t get an expected notification after policies were applied to begin encryption. +- You are unable to install UWP apps from the Microsoft Store, causing failures during Windows Autopilot. If you are deploying Company Portal as a blocking app during Windows Autopilot ESP, you’ve probably seen this error. +- A user is not granted administrator rights in the Windows Autopilot user-driven Hybrid Azure AD join scenario. This is another non-English OS issue. +Download and install the KB4505903 update.

See the section: How to get this update for information on specific release channels you can use to obtain the update. + +
White glove gives a red screen and the Microsoft-Windows-User Device Registration/Admin event log displays HResult error code 0x801C03F3This can happen if Azure AD can’t find an AAD device object for the device that you are trying to deploy. This will occur if you manually delete the object. To fix it, remove the device from AAD, Intune, and Autopilot, then re-register it with Autopilot, which will recreate the AAD device object.
+
To obtain troubleshooting logs use: Mdmdiagnosticstool.exe -area Autopilot;TPM -cab c:\autopilot.cab +
White glove gives a red screenWhite glove is not supported on a VM. +
Error importing Windows Autopilot devices from a .csv fileEnsure that you have not edited the .csv file in Microsoft Excel or an editor other than Notepad. Some of these editors can introduce extra characters causing the file format to be invalid. +
Windows Autopilot for existing devices does not follow the Autopilot OOBE experience.Ensure that the JSON profile file is saved in ANSI/ASCII format, not Unicode or UTF-8. +
Something went wrong is displayed page during OOBE.The client is likely unable to access all the required AAD/MSA-related URLs. For more information, see Networking requirements. +
+ +## Related topics + +[Diagnose MDM failures in Windows 10](https://docs.microsoft.com/windows/client-management/mdm/diagnose-mdm-failures-in-windows-10)
+[Troubleshooting Windows Autopilot](troubleshooting.md) From 3fc75ba78cadb57c236277a188bcc6b7c4c954d4 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Tue, 17 Sep 2019 09:53:21 -0700 Subject: [PATCH 254/285] known issues --- windows/deployment/windows-autopilot/known-issues.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/deployment/windows-autopilot/known-issues.md b/windows/deployment/windows-autopilot/known-issues.md index 2c2ff9b89a..13b1e24c21 100644 --- a/windows/deployment/windows-autopilot/known-issues.md +++ b/windows/deployment/windows-autopilot/known-issues.md @@ -28,6 +28,7 @@ ms.topic: article The following known issue will be resolved by installing the KB4517211 update, due to be released in late September 2019: - TPM attestation fails on Windows 10 1903 due to missing AKI extension in EK certificate. (An additional validation added in Windows 10 1903 to check that the TPM EK certs had the proper attributes according to the TCG specifications uncovered that a number of them don’t, so that validation will be removed). +Download and install the KB4517211 update.

This update is currently pending release. The following known issues are resolved by installing the August 30, 2019 KB4512941 update (OS Build 18362.329): - Windows Autopilot for existing devices feature does not properly suppress “Activities” page during OOBE. (Because of this, you’ll see that extra page during OOBE). From 851c3d70ac3b24fcdbeba59c4bc22da7b3670d40 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Tue, 17 Sep 2019 09:55:38 -0700 Subject: [PATCH 255/285] known issues --- windows/deployment/windows-autopilot/known-issues.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/windows-autopilot/known-issues.md b/windows/deployment/windows-autopilot/known-issues.md index 13b1e24c21..9ba16cd6f9 100644 --- a/windows/deployment/windows-autopilot/known-issues.md +++ b/windows/deployment/windows-autopilot/known-issues.md @@ -28,7 +28,7 @@ ms.topic: article The following known issue will be resolved by installing the KB4517211 update, due to be released in late September 2019: - TPM attestation fails on Windows 10 1903 due to missing AKI extension in EK certificate. (An additional validation added in Windows 10 1903 to check that the TPM EK certs had the proper attributes according to the TCG specifications uncovered that a number of them don’t, so that validation will be removed). -Download and install the KB4517211 update.

This update is currently pending release. +Download and install the KB4517211 update.

This update is currently pending release. The following known issues are resolved by installing the August 30, 2019 KB4512941 update (OS Build 18362.329): - Windows Autopilot for existing devices feature does not properly suppress “Activities” page during OOBE. (Because of this, you’ll see that extra page during OOBE). From e75d0e07a1e17fb3a9de925534033adf0776fd1d Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Tue, 17 Sep 2019 13:28:52 -0700 Subject: [PATCH 256/285] MetadataUpdates1 --- browsers/edge/about-microsoft-edge.md | 5 +- browsers/edge/available-policies.md | 443 ++++++++-------- .../edge/change-history-for-microsoft-edge.md | 204 ++++---- browsers/edge/edge-technical-demos.md | 77 +-- .../edge/emie-to-improve-compatibility.md | 4 +- .../group-policies/address-bar-settings-gp.md | 67 +-- .../edge/group-policies/adobe-settings-gp.md | 71 +-- .../books-library-management-gp.md | 75 +-- .../browser-settings-management-gp.md | 105 ++-- .../group-policies/developer-settings-gp.md | 62 +-- .../extensions-management-gp.md | 67 +-- .../group-policies/favorites-management-gp.md | 79 +-- .../edge/group-policies/home-button-gp.md | 95 ++-- ...interoperability-enterprise-guidance-gp.md | 159 +++--- .../new-tab-page-settings-gp.md | 93 ++-- .../group-policies/prelaunch-preload-gp.md | 4 +- .../search-engine-customization-gp.md | 6 +- .../security-privacy-management-gp.md | 149 +++--- .../edge/group-policies/start-pages-gp.md | 87 ++-- .../sync-browser-settings-gp.md | 91 ++-- .../group-policies/telemetry-management-gp.md | 63 +-- .../edge/img-microsoft-edge-infographic-lg.md | 31 +- .../edge/managing-group-policy-admx-files.md | 53 +- browsers/edge/microsoft-edge-faq.md | 109 ++-- browsers/edge/microsoft-edge-forrester.md | 73 +-- .../edge/microsoft-edge-kiosk-mode-deploy.md | 4 +- .../allow-a-shared-books-folder-shortdesc.md | 23 +- .../allow-address-bar-drop-down-shortdesc.md | 23 +- .../shortdesc/allow-adobe-flash-shortdesc.md | 23 +- ...learing-browsing-data-on-exit-shortdesc.md | 23 +- ...ion-updates-for-books-library-shortdesc.md | 23 +- .../edge/shortdesc/allow-cortana-shortdesc.md | 23 +- .../allow-developer-tools-shortdesc.md | 23 +- .../edge/troubleshooting-microsoft-edge.md | 75 +-- .../use-powershell-to manage-group-policy.md | 59 +-- browsers/edge/web-app-compat-toolkit.md | 115 ++--- .../add-employees-enterprise-mode-portal.md | 2 +- ...rsion-1-schema-and-enterprise-mode-tool.md | 2 +- ...rsion-2-schema-and-enterprise-mode-tool.md | 2 +- ...sing-the-version-1-enterprise-mode-tool.md | 4 +- ...sing-the-version-2-enterprise-mode-tool.md | 2 +- .../administrative-templates-and-ie11.md | 4 +- ...e-change-request-enterprise-mode-portal.md | 4 +- ...-new-enterprise-mode-site-list-xml-file.md | 2 +- ...ct-data-using-enterprise-site-discovery.md | 4 +- ...nfigure-settings-enterprise-mode-portal.md | 4 +- ...e-change-request-enterprise-mode-portal.md | 4 +- ...n-the-enterprise-mode-site-list-manager.md | 4 +- ...g-the-enterprise-mode-site-list-manager.md | 4 +- .../enterprise-mode-overview-for-ie11.md | 4 +- ...terprise-mode-schema-version-1-guidance.md | 4 +- ...terprise-mode-schema-version-2-guidance.md | 4 +- browsers/enterprise-mode/enterprise-mode.md | 4 +- ...m-the-enterprise-mode-site-list-manager.md | 4 +- ...n-the-enterprise-mode-site-list-manager.md | 4 +- ...s-from-a-local-compatibililty-view-list.md | 4 +- ...-from-a-local-enterprise-mode-site-list.md | 4 +- ...n-the-enterprise-mode-site-list-manager.md | 4 +- ...roduction-change-enterprise-mode-portal.md | 4 +- ...n-the-enterprise-mode-site-list-manager.md | 4 +- ...rprise-mode-logging-and-data-collection.md | 4 +- .../set-up-enterprise-mode-portal.md | 4 +- .../turn-off-enterprise-mode.md | 4 +- ...control-and-logging-for-enterprise-mode.md | 4 +- .../use-the-enterprise-mode-portal.md | 4 +- ...e-the-enterprise-mode-site-list-manager.md | 4 +- .../enterprise-mode/using-enterprise-mode.md | 4 +- ...-changes-preprod-enterprise-mode-portal.md | 4 +- ...anges-production-enterprise-mode-portal.md | 4 +- .../view-apps-enterprise-mode-site-list.md | 4 +- ...nfigure-settings-enterprise-mode-portal.md | 195 ++++---- ...e-change-request-enterprise-mode-portal.md | 147 +++--- ...multiple-operating-systems-or-languages.md | 87 ++-- .../customize-ie11-install-packages.md | 89 ++-- ...n-the-enterprise-mode-site-list-manager.md | 99 ++-- ...g-automatic-version-synchronization-avs.md | 71 +-- ...-ie11-using-software-distribution-tools.md | 67 +-- .../deploy-pinned-sites-using-mdt-2013.md | 243 ++++----- .../deprecated-document-modes.md | 123 ++--- ...g-the-enterprise-mode-site-list-manager.md | 107 ++-- ...ministrative-templates-and-group-policy.md | 221 ++++---- ...anced-protected-mode-problems-with-ie11.md | 61 +-- .../enterprise-mode-overview-for-ie11.md | 111 ++-- ...terprise-mode-schema-version-1-guidance.md | 473 +++++++++--------- ...terprise-mode-schema-version-2-guidance.md | 4 +- ...m-the-enterprise-mode-site-list-manager.md | 99 ++-- ...doc-modes-and-enterprise-mode-site-list.md | 219 ++++---- ...g-the-enterprise-mode-site-list-manager.md | 97 ++-- ...icy-and-advanced-group-policy-mgmt-ie11.md | 87 ++-- ...licy-and-group-policy-mgmt-console-ie11.md | 97 ++-- .../group-policy-and-ie11.md | 97 ++-- ...licy-and-local-group-policy-editor-ie11.md | 73 +-- .../group-policy-compatibility-with-ie11.md | 77 +-- .../group-policy-objects-and-ie11.md | 111 ++-- .../group-policy-preferences-and-ie11.md | 77 +-- .../group-policy-problems-ie11.md | 59 +-- .../group-policy-shortcut-extensions-ie11.md | 99 ++-- .../group-policy-windows-powershell-ie11.md | 77 +-- ...ie11-delivery-through-automatic-updates.md | 285 +++++------ .../ie11-deploy-guide/img-ie11-docmode-lg.md | 33 +- ...o-the-enterprise-mode-site-list-manager.md | 101 ++-- .../ie11-deploy-guide/index.md | 4 +- browsers/internet-explorer/index.md | 2 +- 103 files changed, 3332 insertions(+), 3272 deletions(-) diff --git a/browsers/edge/about-microsoft-edge.md b/browsers/edge/about-microsoft-edge.md index 1b86c5d81f..7785a2e78e 100644 --- a/browsers/edge/about-microsoft-edge.md +++ b/browsers/edge/about-microsoft-edge.md @@ -3,9 +3,10 @@ title: Microsoft Edge system and language requirements description: Overview information about Microsoft Edge, the default browser for Windows 10. This topic includes links to other Microsoft Edge topics. ms.assetid: 70377735-b2f9-4b0b-9658-4cf7c1d745bb ms.reviewer: -audience: itpro manager: dansimp +audience: itpromanager: dansimp +o manager: dansimp ms.author: eravena -author: eavena +author: dansimp ms.prod: edge ms.mktglfcycl: general ms.topic: reference diff --git a/browsers/edge/available-policies.md b/browsers/edge/available-policies.md index 18890c69ed..37bef54e3a 100644 --- a/browsers/edge/available-policies.md +++ b/browsers/edge/available-policies.md @@ -1,221 +1,222 @@ ---- -description: You can customize your organization’s browser settings in Microsoft Edge with Group Policy or Microsoft Intune, or other MDM service. When you do this, you set the policy once and then copy it onto many computers—that is, touch once, configure many. -ms.assetid: 2e849894-255d-4f68-ae88-c2e4e31fa165 -ms.reviewer: -author: eavena -ms.author: eravena -audience: itpro manager: dansimp -ms.prod: edge -ms.mktglfcycl: explore -ms.topic: reference -ms.sitesec: library -title: Group Policy and Mobile Device Management settings for Microsoft Edge (Microsoft Edge for IT Pros) -ms.localizationpriority: medium ---- - -# Group Policy and Mobile Device Management (MDM) settings for Microsoft Edge - -> Applies to: Microsoft Edge on Windows 10 and Windows 10 Mobile - -You can customize your organization’s browser settings in Microsoft Edge with Group Policy or Microsoft Intune, or other MDM service. When you do this, you set the policy once and then copy it onto many computers—that is, touch once, configure many. For example, you can set up multiple security settings in a Group Policy Object (GPO) linked to a domain, and then apply those settings to every computer in the domain. - -Other policy settings in Microsoft Edge include allowing Adobe Flash content to play automatically, provision a favorites list, set default search engine, and more. You configure a Group Policy setting in the Administrative Templates folders, which are registry-based policy settings that Group Policy enforces. Group Policy stores these settings in a specific registry location, which users cannot change. Also, Group Policy-aware Windows features and applications look for these settings in the registry, and if found the policy setting gets used instead of the regular settings. - -**_You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor:_** - -      *Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\* - -When you edit a Group Policy setting, you have the following configuration options: - -- **Enabled** - writes the policy setting to the registry with a value that enables it. -- **Disabled** - writes the policy setting to the registry with a value that disables it. -- **Not configured** - leaves the policy setting undefined. Group Policy does not write the policy setting to the registry and has no impact on computers or users. - -Some policy settings have additional options you can configure. For example, if you want to set the default search engine, set the Start page, or configure the Enterprise Mode Site List, you would type the URL. - - -## Allow a shared books folder -[!INCLUDE [allow-shared-folder-books-include.md](includes/allow-shared-folder-books-include.md)] - -## Allow Address bar drop-down list suggestions -[!INCLUDE [allow-address-bar-suggestions-include.md](includes/allow-address-bar-suggestions-include.md)] - -## Allow Adobe Flash -[!INCLUDE [allow-adobe-flash-include.md](includes/allow-adobe-flash-include.md)] - -## Allow clearing browsing data on exit -[!INCLUDE [allow-clearing-browsing-data-include.md](includes/allow-clearing-browsing-data-include.md)] - -## Allow configuration updates for the Books Library -[!INCLUDE [allow-config-updates-books-include.md](includes/allow-config-updates-books-include.md)] - -## Allow Cortana -[!INCLUDE [allow-cortana-include.md](includes/allow-cortana-include.md)] - -## Allow Developer Tools -[!INCLUDE [allow-dev-tools-include.md](includes/allow-dev-tools-include.md)] - -## Allow extended telemetry for the Books tab -[!INCLUDE [allow-ext-telemetry-books-tab-include.md](includes/allow-ext-telemetry-books-tab-include.md)] - -## Allow Extensions -[!INCLUDE [allow-extensions-include.md](includes/allow-extensions-include.md)] - -## Allow fullscreen mode -[!INCLUDE [allow-full-screen-include](includes/allow-full-screen-include.md)] - -## Allow InPrivate browsing -[!INCLUDE [allow-inprivate-browsing-include.md](includes/allow-inprivate-browsing-include.md)] - -## Allow Microsoft Compatibility List -[!INCLUDE [allow-microsoft-compatibility-list-include.md](includes/allow-microsoft-compatibility-list-include.md)] - -## Allow Microsoft Edge to pre-launch at Windows startup, when the system is idle, and each time Microsoft Edge is closed -[!INCLUDE [allow-prelaunch-include](includes/allow-prelaunch-include.md)] - -## Allow Microsoft Edge to load the Start and New Tab page at Windows startup and each time Microsoft Edge is closed -[!INCLUDE [allow-tab-preloading-include](includes/allow-tab-preloading-include.md)] - -## Allow printing -[!INCLUDE [allow-printing-include.md](includes/allow-printing-include.md)] - -## Allow Saving History -[!INCLUDE [allow-saving-history-include.md](includes/allow-saving-history-include.md)] - -## Allow search engine customization -[!INCLUDE [allow-search-engine-customization-include.md](includes/allow-search-engine-customization-include.md)] - -## Allow sideloading of Extensions -[!INCLUDE [allow-sideloading-extensions-include.md](includes/allow-sideloading-extensions-include.md)] - -## Allow web content on New Tab page -[!INCLUDE [allow-web-content-new-tab-page-include.md](includes/allow-web-content-new-tab-page-include.md)] - -## Always show the Books Library in Microsoft Edge -[!INCLUDE [always-enable-book-library-include.md](includes/always-enable-book-library-include.md)] - -## Configure additional search engines -[!INCLUDE [configure-additional-search-engines-include.md](includes/configure-additional-search-engines-include.md)] - -## Configure Autofill -[!INCLUDE [configure-autofill-include.md](includes/configure-autofill-include.md)] - -## Configure collection of browsing data for Microsoft 365 Analytics -[!INCLUDE [configure-browser-telemetry-for-m365-analytics-include](includes/configure-browser-telemetry-for-m365-analytics-include.md)] - -## Configure cookies -[!INCLUDE [configure-cookies-include.md](includes/configure-cookies-include.md)] - -## Configure Do Not Track -[!INCLUDE [configure-do-not-track-include.md](includes/configure-do-not-track-include.md)] - -## Configure Favorites -[!INCLUDE [configure-favorites-include.md](includes/configure-favorites-include.md)] - -## Configure Favorites Bar -[!INCLUDE [configure-favorites-bar-include.md](includes/configure-favorites-bar-include.md)] - -## Configure Home Button -[!INCLUDE [configure-home-button-include.md](includes/configure-home-button-include.md)] - -## Configure kiosk mode -[!INCLUDE [configure-microsoft-edge-kiosk-mode-include.md](includes/configure-microsoft-edge-kiosk-mode-include.md)] - -## Configure kiosk reset after idle timeout -[!INCLUDE [configure-edge-kiosk-reset-idle-timeout-include.md](includes/configure-edge-kiosk-reset-idle-timeout-include.md)] - -## Configure Open Microsoft Edge With -[!INCLUDE [configure-open-edge-with-include.md](includes/configure-open-edge-with-include.md)] - -## Configure Password Manager -[!INCLUDE [configure-password-manager-include.md](includes/configure-password-manager-include.md)] - -## Configure Pop-up Blocker -[!INCLUDE [configure-pop-up-blocker-include.md](includes/configure-pop-up-blocker-include.md)] - -## Configure search suggestions in Address bar -[!INCLUDE [configure-search-suggestions-address-bar-include.md](includes/configure-search-suggestions-address-bar-include.md)] - -## Configure Start pages -[!INCLUDE [configure-start-pages-include.md](includes/configure-start-pages-include.md)] - -## Configure the Adobe Flash Click-to-Run setting -[!INCLUDE [configure-adobe-flash-click-to-run-include.md](includes/configure-adobe-flash-click-to-run-include.md)] - -## Configure the Enterprise Mode Site List -[!INCLUDE [configure-enterprise-mode-site-list-include.md](includes/configure-enterprise-mode-site-list-include.md)] - -## Configure Windows Defender SmartScreen -[!INCLUDE [configure-windows-defender-smartscreen-include.md](includes/configure-windows-defender-smartscreen-include.md)] - -## Disable lockdown of Start pages -[!INCLUDE [disable-lockdown-of-start-pages-include.md](includes/disable-lockdown-of-start-pages-include.md)] - -## Do not sync -[!INCLUDE [do-not-sync-include.md](includes/do-not-sync-include.md)] - -## Do not sync browser settings -[!INCLUDE [do-not-sync-browser-settings-include.md](includes/do-not-sync-browser-settings-include.md)] - -## Keep favorites in sync between Internet Explorer and Microsoft Edge -[!INCLUDE [keep-fav-sync-ie-edge-include.md](includes/keep-fav-sync-ie-edge-include.md)] - -## Prevent access to the about:flags page -[!INCLUDE [prevent-access-about-flag-include.md](includes/prevent-access-about-flag-include.md)] - -## Prevent bypassing Windows Defender SmartScreen prompts for files -[!INCLUDE [prevent-bypassing-win-defender-files-include.md](includes/prevent-bypassing-win-defender-files-include.md)] - -## Prevent bypassing Windows Defender SmartScreen prompts for sites -[!INCLUDE [prevent-bypassing-win-defender-sites-include.md](includes/prevent-bypassing-win-defender-sites-include.md)] - -## Prevent certificate error overrides -[!INCLUDE [prevent-certificate-error-overrides-include.md](includes/prevent-certificate-error-overrides-include.md)] - -## Prevent changes to Favorites on Microsoft Edge -[!INCLUDE [prevent-changes-to-favorites-include.md](includes/prevent-changes-to-favorites-include.md)] - -## Prevent Microsoft Edge from gathering Live Tile information when pinning a site to Start -[!INCLUDE [prevent-live-tile-pinning-start-include](includes/prevent-live-tile-pinning-start-include.md)] - -## Prevent the First Run webpage from opening on Microsoft Edge -[!INCLUDE [prevent-first-run-webpage-open-include.md](includes/prevent-first-run-webpage-open-include.md)] - -## Prevent turning off required extensions -[!INCLUDE [prevent-turning-off-required-extensions-include.md](includes/prevent-turning-off-required-extensions-include.md)] - -## Prevent users from turning on browser syncing -[!INCLUDE [prevent-users-to-turn-on-browser-syncing-include](includes/prevent-users-to-turn-on-browser-syncing-include.md)] - -## Prevent using Localhost IP address for WebRTC -[!INCLUDE [prevent-localhost-address-for-webrtc-include.md](includes/prevent-localhost-address-for-webrtc-include.md)] - -## Provision Favorites -[!INCLUDE [provision-favorites-include](includes/provision-favorites-include.md)] - -## Send all intranet sites to Internet Explorer 11 -[!INCLUDE [send-all-intranet-sites-ie-include.md](includes/send-all-intranet-sites-ie-include.md)] - -## Set default search engine -[!INCLUDE [set-default-search-engine-include.md](includes/set-default-search-engine-include.md)] - -## Set Home Button URL -[!INCLUDE [set-home-button-url-include](includes/set-home-button-url-include.md)] - -## Set New Tab page URL -[!INCLUDE [set-new-tab-url-include.md](includes/set-new-tab-url-include.md)] - -## Show message when opening sites in Internet Explorer -[!INCLUDE [show-message-opening-sites-ie-include](includes/show-message-opening-sites-ie-include.md)] - -## Unlock Home Button -[!INCLUDE [unlock-home-button-include.md](includes/unlock-home-button-include.md)] - - - -## Related topics -- [Mobile Device Management (MDM) settings](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider) -- [Group Policy and the Group Policy Management Console (GPMC)](https://go.microsoft.com/fwlink/p/?LinkId=617921) -- [Group Policy and the Local Group Policy Editor](https://go.microsoft.com/fwlink/p/?LinkId=617922) -- [Group Policy and the Advanced Group Policy Management (AGPM)](https://go.microsoft.com/fwlink/p/?LinkId=617923) -- [Group Policy and Windows PowerShell](https://go.microsoft.com/fwlink/p/?LinkId=617924). +--- +description: You can customize your organization’s browser settings in Microsoft Edge with Group Policy or Microsoft Intune, or other MDM service. When you do this, you set the policy once and then copy it onto many computers—that is, touch once, configure many. +ms.assetid: 2e849894-255d-4f68-ae88-c2e4e31fa165 +ms.reviewer: +author: dansimp +ms.author: dansimp +audience: itpro +manager: dansimp +ms.prod: edge +ms.mktglfcycl: explore +ms.topic: reference +ms.sitesec: library +title: Group Policy and Mobile Device Management settings for Microsoft Edge (Microsoft Edge for IT Pros) +ms.localizationpriority: medium +--- + +# Group Policy and Mobile Device Management (MDM) settings for Microsoft Edge + +> Applies to: Microsoft Edge on Windows 10 and Windows 10 Mobile + +You can customize your organization’s browser settings in Microsoft Edge with Group Policy or Microsoft Intune, or other MDM service. When you do this, you set the policy once and then copy it onto many computers—that is, touch once, configure many. For example, you can set up multiple security settings in a Group Policy Object (GPO) linked to a domain, and then apply those settings to every computer in the domain. + +Other policy settings in Microsoft Edge include allowing Adobe Flash content to play automatically, provision a favorites list, set default search engine, and more. You configure a Group Policy setting in the Administrative Templates folders, which are registry-based policy settings that Group Policy enforces. Group Policy stores these settings in a specific registry location, which users cannot change. Also, Group Policy-aware Windows features and applications look for these settings in the registry, and if found the policy setting gets used instead of the regular settings. + +**_You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor:_** + +      *Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\* + +When you edit a Group Policy setting, you have the following configuration options: + +- **Enabled** - writes the policy setting to the registry with a value that enables it. +- **Disabled** - writes the policy setting to the registry with a value that disables it. +- **Not configured** - leaves the policy setting undefined. Group Policy does not write the policy setting to the registry and has no impact on computers or users. + +Some policy settings have additional options you can configure. For example, if you want to set the default search engine, set the Start page, or configure the Enterprise Mode Site List, you would type the URL. + + +## Allow a shared books folder +[!INCLUDE [allow-shared-folder-books-include.md](includes/allow-shared-folder-books-include.md)] + +## Allow Address bar drop-down list suggestions +[!INCLUDE [allow-address-bar-suggestions-include.md](includes/allow-address-bar-suggestions-include.md)] + +## Allow Adobe Flash +[!INCLUDE [allow-adobe-flash-include.md](includes/allow-adobe-flash-include.md)] + +## Allow clearing browsing data on exit +[!INCLUDE [allow-clearing-browsing-data-include.md](includes/allow-clearing-browsing-data-include.md)] + +## Allow configuration updates for the Books Library +[!INCLUDE [allow-config-updates-books-include.md](includes/allow-config-updates-books-include.md)] + +## Allow Cortana +[!INCLUDE [allow-cortana-include.md](includes/allow-cortana-include.md)] + +## Allow Developer Tools +[!INCLUDE [allow-dev-tools-include.md](includes/allow-dev-tools-include.md)] + +## Allow extended telemetry for the Books tab +[!INCLUDE [allow-ext-telemetry-books-tab-include.md](includes/allow-ext-telemetry-books-tab-include.md)] + +## Allow Extensions +[!INCLUDE [allow-extensions-include.md](includes/allow-extensions-include.md)] + +## Allow fullscreen mode +[!INCLUDE [allow-full-screen-include](includes/allow-full-screen-include.md)] + +## Allow InPrivate browsing +[!INCLUDE [allow-inprivate-browsing-include.md](includes/allow-inprivate-browsing-include.md)] + +## Allow Microsoft Compatibility List +[!INCLUDE [allow-microsoft-compatibility-list-include.md](includes/allow-microsoft-compatibility-list-include.md)] + +## Allow Microsoft Edge to pre-launch at Windows startup, when the system is idle, and each time Microsoft Edge is closed +[!INCLUDE [allow-prelaunch-include](includes/allow-prelaunch-include.md)] + +## Allow Microsoft Edge to load the Start and New Tab page at Windows startup and each time Microsoft Edge is closed +[!INCLUDE [allow-tab-preloading-include](includes/allow-tab-preloading-include.md)] + +## Allow printing +[!INCLUDE [allow-printing-include.md](includes/allow-printing-include.md)] + +## Allow Saving History +[!INCLUDE [allow-saving-history-include.md](includes/allow-saving-history-include.md)] + +## Allow search engine customization +[!INCLUDE [allow-search-engine-customization-include.md](includes/allow-search-engine-customization-include.md)] + +## Allow sideloading of Extensions +[!INCLUDE [allow-sideloading-extensions-include.md](includes/allow-sideloading-extensions-include.md)] + +## Allow web content on New Tab page +[!INCLUDE [allow-web-content-new-tab-page-include.md](includes/allow-web-content-new-tab-page-include.md)] + +## Always show the Books Library in Microsoft Edge +[!INCLUDE [always-enable-book-library-include.md](includes/always-enable-book-library-include.md)] + +## Configure additional search engines +[!INCLUDE [configure-additional-search-engines-include.md](includes/configure-additional-search-engines-include.md)] + +## Configure Autofill +[!INCLUDE [configure-autofill-include.md](includes/configure-autofill-include.md)] + +## Configure collection of browsing data for Microsoft 365 Analytics +[!INCLUDE [configure-browser-telemetry-for-m365-analytics-include](includes/configure-browser-telemetry-for-m365-analytics-include.md)] + +## Configure cookies +[!INCLUDE [configure-cookies-include.md](includes/configure-cookies-include.md)] + +## Configure Do Not Track +[!INCLUDE [configure-do-not-track-include.md](includes/configure-do-not-track-include.md)] + +## Configure Favorites +[!INCLUDE [configure-favorites-include.md](includes/configure-favorites-include.md)] + +## Configure Favorites Bar +[!INCLUDE [configure-favorites-bar-include.md](includes/configure-favorites-bar-include.md)] + +## Configure Home Button +[!INCLUDE [configure-home-button-include.md](includes/configure-home-button-include.md)] + +## Configure kiosk mode +[!INCLUDE [configure-microsoft-edge-kiosk-mode-include.md](includes/configure-microsoft-edge-kiosk-mode-include.md)] + +## Configure kiosk reset after idle timeout +[!INCLUDE [configure-edge-kiosk-reset-idle-timeout-include.md](includes/configure-edge-kiosk-reset-idle-timeout-include.md)] + +## Configure Open Microsoft Edge With +[!INCLUDE [configure-open-edge-with-include.md](includes/configure-open-edge-with-include.md)] + +## Configure Password Manager +[!INCLUDE [configure-password-manager-include.md](includes/configure-password-manager-include.md)] + +## Configure Pop-up Blocker +[!INCLUDE [configure-pop-up-blocker-include.md](includes/configure-pop-up-blocker-include.md)] + +## Configure search suggestions in Address bar +[!INCLUDE [configure-search-suggestions-address-bar-include.md](includes/configure-search-suggestions-address-bar-include.md)] + +## Configure Start pages +[!INCLUDE [configure-start-pages-include.md](includes/configure-start-pages-include.md)] + +## Configure the Adobe Flash Click-to-Run setting +[!INCLUDE [configure-adobe-flash-click-to-run-include.md](includes/configure-adobe-flash-click-to-run-include.md)] + +## Configure the Enterprise Mode Site List +[!INCLUDE [configure-enterprise-mode-site-list-include.md](includes/configure-enterprise-mode-site-list-include.md)] + +## Configure Windows Defender SmartScreen +[!INCLUDE [configure-windows-defender-smartscreen-include.md](includes/configure-windows-defender-smartscreen-include.md)] + +## Disable lockdown of Start pages +[!INCLUDE [disable-lockdown-of-start-pages-include.md](includes/disable-lockdown-of-start-pages-include.md)] + +## Do not sync +[!INCLUDE [do-not-sync-include.md](includes/do-not-sync-include.md)] + +## Do not sync browser settings +[!INCLUDE [do-not-sync-browser-settings-include.md](includes/do-not-sync-browser-settings-include.md)] + +## Keep favorites in sync between Internet Explorer and Microsoft Edge +[!INCLUDE [keep-fav-sync-ie-edge-include.md](includes/keep-fav-sync-ie-edge-include.md)] + +## Prevent access to the about:flags page +[!INCLUDE [prevent-access-about-flag-include.md](includes/prevent-access-about-flag-include.md)] + +## Prevent bypassing Windows Defender SmartScreen prompts for files +[!INCLUDE [prevent-bypassing-win-defender-files-include.md](includes/prevent-bypassing-win-defender-files-include.md)] + +## Prevent bypassing Windows Defender SmartScreen prompts for sites +[!INCLUDE [prevent-bypassing-win-defender-sites-include.md](includes/prevent-bypassing-win-defender-sites-include.md)] + +## Prevent certificate error overrides +[!INCLUDE [prevent-certificate-error-overrides-include.md](includes/prevent-certificate-error-overrides-include.md)] + +## Prevent changes to Favorites on Microsoft Edge +[!INCLUDE [prevent-changes-to-favorites-include.md](includes/prevent-changes-to-favorites-include.md)] + +## Prevent Microsoft Edge from gathering Live Tile information when pinning a site to Start +[!INCLUDE [prevent-live-tile-pinning-start-include](includes/prevent-live-tile-pinning-start-include.md)] + +## Prevent the First Run webpage from opening on Microsoft Edge +[!INCLUDE [prevent-first-run-webpage-open-include.md](includes/prevent-first-run-webpage-open-include.md)] + +## Prevent turning off required extensions +[!INCLUDE [prevent-turning-off-required-extensions-include.md](includes/prevent-turning-off-required-extensions-include.md)] + +## Prevent users from turning on browser syncing +[!INCLUDE [prevent-users-to-turn-on-browser-syncing-include](includes/prevent-users-to-turn-on-browser-syncing-include.md)] + +## Prevent using Localhost IP address for WebRTC +[!INCLUDE [prevent-localhost-address-for-webrtc-include.md](includes/prevent-localhost-address-for-webrtc-include.md)] + +## Provision Favorites +[!INCLUDE [provision-favorites-include](includes/provision-favorites-include.md)] + +## Send all intranet sites to Internet Explorer 11 +[!INCLUDE [send-all-intranet-sites-ie-include.md](includes/send-all-intranet-sites-ie-include.md)] + +## Set default search engine +[!INCLUDE [set-default-search-engine-include.md](includes/set-default-search-engine-include.md)] + +## Set Home Button URL +[!INCLUDE [set-home-button-url-include](includes/set-home-button-url-include.md)] + +## Set New Tab page URL +[!INCLUDE [set-new-tab-url-include.md](includes/set-new-tab-url-include.md)] + +## Show message when opening sites in Internet Explorer +[!INCLUDE [show-message-opening-sites-ie-include](includes/show-message-opening-sites-ie-include.md)] + +## Unlock Home Button +[!INCLUDE [unlock-home-button-include.md](includes/unlock-home-button-include.md)] + + + +## Related topics +- [Mobile Device Management (MDM) settings](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider) +- [Group Policy and the Group Policy Management Console (GPMC)](https://go.microsoft.com/fwlink/p/?LinkId=617921) +- [Group Policy and the Local Group Policy Editor](https://go.microsoft.com/fwlink/p/?LinkId=617922) +- [Group Policy and the Advanced Group Policy Management (AGPM)](https://go.microsoft.com/fwlink/p/?LinkId=617923) +- [Group Policy and Windows PowerShell](https://go.microsoft.com/fwlink/p/?LinkId=617924). diff --git a/browsers/edge/change-history-for-microsoft-edge.md b/browsers/edge/change-history-for-microsoft-edge.md index 19530f7f71..cfbace17ef 100644 --- a/browsers/edge/change-history-for-microsoft-edge.md +++ b/browsers/edge/change-history-for-microsoft-edge.md @@ -1,102 +1,102 @@ ---- -title: Change history for Microsoft Edge (Microsoft Edge for IT Pros) -description: Discover what's new and updated in the Microsoft Edge for both Windows 10 and Windows 10 Mobile. -ms.prod: edge -ms.topic: reference -ms.mktglfcycl: explore -ms.sitesec: library -ms.localizationpriority: medium -audience: itpro manager: dansimp -ms.author: eravena -author: eavena -ms.date: 10/02/2018 -ms.reviewer: ---- - -# Change history for Microsoft Edge -Discover what's new and updated in the Microsoft Edge for both Windows 10 and Windows 10 Mobile. - - -#### [2018](#tab/2018/) -## October 2018 - -The Microsoft Edge team introduces new group policies and MDM settings for Microsoft Edge on Windows 10. The new policies let you enable/disable -full-screen mode, printing, favorites bar, saving history. You can also prevent certificate error overrides, and configure the New Tab page, Home button, and startup options, as well as manage extensions. - -We have discontinued the **Configure Favorites** group policy, so use the [Provision Favorites](available-policies.md#provision-favorites) policy instead. - ->>You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy: ->> ->>      **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\** - - - -| **New or updated** | **Group Policy** | **Description** | -|--------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------| -| New | [Allow fullscreen mode](group-policies/browser-settings-management-gp.md#allow-fullscreen-mode) | [!INCLUDE [allow-fullscreen-mode-shortdesc](shortdesc/allow-fullscreen-mode-shortdesc.md)] | -| New | [Allow Microsoft Edge to pre-launch at Windows startup, when the system is idle, and each time Microsoft Edge is closed](group-policies/prelaunch-preload-gp.md#allow-microsoft-edge-to-pre-launch-at-windows-startup-when-the-system-is-idle-and-each-time-microsoft-edge-is-closed) | [!INCLUDE [allow-prelaunch-shortdesc](shortdesc/allow-prelaunch-shortdesc.md)] | -| New | [Allow Microsoft Edge to load the Start and New Tab page at Windows startup and each time Microsoft Edge is closed](group-policies/prelaunch-preload-gp.md#allow-microsoft-edge-to-load-the-start-and-new-tab-page-at-windows-startup-and-each-time-microsoft-edge-is-closed) | [!INCLUDE [allow-tab-preloading-shortdesc](shortdesc/allow-tab-preloading-shortdesc.md)] | -| New | [Allow printing](group-policies/browser-settings-management-gp.md#allow-printing) | [!INCLUDE [allow-printing-shortdesc](shortdesc/allow-printing-shortdesc.md)] | -| New | [Allow Saving History](group-policies/browser-settings-management-gp.md#allow-saving-history) | [!INCLUDE [allow-saving-history-shortdesc](shortdesc/allow-saving-history-shortdesc.md)] | -| New | [Allow sideloading of Extensions](group-policies/extensions-management-gp.md#allow-sideloading-of-extensions) | [!INCLUDE [allow-sideloading-of-extensions-shortdesc](shortdesc/allow-sideloading-of-extensions-shortdesc.md)] | -| New | [Configure collection of browsing data for Microsoft 365 Analytics](group-policies/telemetry-management-gp.md#configure-collection-of-browsing-data-for-microsoft-365-analytics) | [!INCLUDE [configure-browser-telemetry-for-m365-analytics-shortdesc](shortdesc/configure-browser-telemetry-for-m365-analytics-shortdesc.md)] | -| New | [Configure Favorites Bar](group-policies/favorites-management-gp.md#configure-favorites-bar) | [!INCLUDE [configure-favorites-bar-shortdesc](shortdesc/configure-favorites-bar-shortdesc.md)] | -| New | [Configure Home Button](group-policies/home-button-gp.md#configure-home-button) | [!INCLUDE [configure-home-button-shortdesc](shortdesc/configure-home-button-shortdesc.md)] | -| New | [Configure kiosk mode](available-policies.md#configure-kiosk-mode) | [!INCLUDE [configure-kiosk-mode-shortdesc](shortdesc/configure-kiosk-mode-shortdesc.md)] | -| New | [Configure kiosk reset after idle timeout](available-policies.md#configure-kiosk-reset-after-idle-timeout) | [!INCLUDE [configure-kiosk-reset-after-idle-timeout-shortdesc](shortdesc/configure-kiosk-reset-after-idle-timeout-shortdesc.md)] | -| New | [Configure Open Microsoft Edge With](group-policies/start-pages-gp.md#configure-open-microsoft-edge-with) | [!INCLUDE [configure-open-microsoft-edge-with-shortdesc](shortdesc/configure-open-microsoft-edge-with-shortdesc.md)] | -| New | [Prevent certificate error overrides](group-policies/security-privacy-management-gp.md#prevent-certificate-error-overrides) | [!INCLUDE [prevent-certificate-error-overrides-shortdesc](shortdesc/prevent-certificate-error-overrides-shortdesc.md)] | -| New | [Prevent users from turning on browser syncing](group-policies/sync-browser-settings-gp.md#prevent-users-from-turning-on-browser-syncing) | [!INCLUDE [prevent-users-to-turn-on-browser-syncing-shortdesc](shortdesc/prevent-users-to-turn-on-browser-syncing-shortdesc.md)] | -| New | [Prevent turning off required extensions](group-policies/extensions-management-gp.md#prevent-turning-off-required-extensions) | [!INCLUDE [prevent-turning-off-required-extensions-shortdesc](shortdesc/prevent-turning-off-required-extensions-shortdesc.md)] | -| New | [Set Home Button URL](group-policies/home-button-gp.md#set-home-button-url) | [!INCLUDE [set-home-button-url-shortdesc](shortdesc/set-home-button-url-shortdesc.md)] | -| New | [Set New Tab page URL](group-policies/new-tab-page-settings-gp.md#set-new-tab-page-url) | [!INCLUDE [set-new-tab-url-shortdesc](shortdesc/set-new-tab-url-shortdesc.md)] | -| Updated | [Show message when opening sites in Internet Explorer](group-policies/interoperability-enterprise-guidance-gp.md#show-message-when-opening-sites-in-internet-explorer) | [!INCLUDE [show-message-when-opening-sites-in-ie-shortdesc](shortdesc/show-message-when-opening-sites-in-ie-shortdesc.md)] | -| New | [Unlock Home Button](group-policies/home-button-gp.md#unlock-home-button) | [!INCLUDE [unlock-home-button-shortdesc](shortdesc/unlock-home-button-shortdesc.md)] | - -#### [2017](#tab/2017/) -## September 2017 - -|New or changed topic | Description | -|---------------------|-------------| -|[Microsoft Edge - Frequently Asked Questions (FAQs) for IT Pros](microsoft-edge-faq.md) | New | - -## February 2017 - -|New or changed topic | Description | -|----------------------|-------------| -|[Available Group Policy and Mobile Device Management (MDM) settings for Microsoft Edge](available-policies.md) |Added new Group Policy and MDM settings for the Windows Insider Program. Reformatted for easier readability outside of scrolling table. | - - -#### [2016](#tab/2016/) -## November 2016 - -|New or changed topic | Description | -|----------------------|-------------| -|[Browser: Microsoft Edge and Internet Explorer 11](enterprise-guidance-using-microsoft-edge-and-ie11.md) |Added the infographic image and a download link.| -|[Use Enterprise Mode to improve compatibility](emie-to-improve-compatibility.md) |Added a note about the 65 second wait before checking for a newer version of the site list .XML file. | -|[Available policies for Microsoft Edge](available-policies.md) |Added notes to the Configure the Enterprise Mode Site List Group Policy and the EnterpriseModeSiteList MDM policy about the 65 second wait before checking for a newer version of the site list .XML file. | -|Microsoft Edge - Deployment Guide for IT Pros |Added a link to the Microsoft Edge infographic, helping you to evaluate the potential impact of using Microsoft Edge in your organization. | -|[Browser: Microsoft Edge and Internet Explorer 11](enterprise-guidance-using-microsoft-edge-and-ie11.md) |Added a link to the Microsoft Edge infographic, helping you to evaluate the potential impact of using Microsoft Edge in your organization. | - -## July 2016 - -|New or changed topic | Description | -|----------------------|-------------| -|[Microsoft Edge requirements and language support](hardware-and-software-requirements.md)| Updated to include a note about the Long Term Servicing Branch (LTSB). | -|[Enterprise guidance about using Microsoft Edge and Internet Explorer 11](enterprise-guidance-using-microsoft-edge-and-ie11.md) | Content moved from What's New section. | -|[Available policies for Microsoft Edge](available-policies.md) |Updated | - - -## June 2016 - -|New or changed topic | Description | -|----------------------|-------------| -|[Security enhancements for Microsoft Edge](security-enhancements-microsoft-edge.md) |New | - -## May 2016 - -|New or changed topic | Description | -|----------------------|-------------| -|[Available Policies for Microsoft Edge](available-policies.md) | Added new policies and the Supported versions column for Windows 10 Insider Preview. | - -* * * +--- +title: Change history for Microsoft Edge (Microsoft Edge for IT Pros) +description: Discover what's new and updated in the Microsoft Edge for both Windows 10 and Windows 10 Mobile. +ms.prod: edge +ms.topic: reference +ms.mktglfcycl: explore +ms.sitesec: library +ms.localizationpriority: medium +audience: itpro +manager: dansimp +author: dansimp +ms.date: 10/02/2018 +ms.reviewer: +--- + +# Change history for Microsoft Edge +Discover what's new and updated in the Microsoft Edge for both Windows 10 and Windows 10 Mobile. + + +#### [2018](#tab/2018/) +## October 2018 + +The Microsoft Edge team introduces new group policies and MDM settings for Microsoft Edge on Windows 10. The new policies let you enable/disable +full-screen mode, printing, favorites bar, saving history. You can also prevent certificate error overrides, and configure the New Tab page, Home button, and startup options, as well as manage extensions. + +We have discontinued the **Configure Favorites** group policy, so use the [Provision Favorites](available-policies.md#provision-favorites) policy instead. + +>>You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy: +>> +>>      **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\** + + + +| **New or updated** | **Group Policy** | **Description** | +|--------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------| +| New | [Allow fullscreen mode](group-policies/browser-settings-management-gp.md#allow-fullscreen-mode) | [!INCLUDE [allow-fullscreen-mode-shortdesc](shortdesc/allow-fullscreen-mode-shortdesc.md)] | +| New | [Allow Microsoft Edge to pre-launch at Windows startup, when the system is idle, and each time Microsoft Edge is closed](group-policies/prelaunch-preload-gp.md#allow-microsoft-edge-to-pre-launch-at-windows-startup-when-the-system-is-idle-and-each-time-microsoft-edge-is-closed) | [!INCLUDE [allow-prelaunch-shortdesc](shortdesc/allow-prelaunch-shortdesc.md)] | +| New | [Allow Microsoft Edge to load the Start and New Tab page at Windows startup and each time Microsoft Edge is closed](group-policies/prelaunch-preload-gp.md#allow-microsoft-edge-to-load-the-start-and-new-tab-page-at-windows-startup-and-each-time-microsoft-edge-is-closed) | [!INCLUDE [allow-tab-preloading-shortdesc](shortdesc/allow-tab-preloading-shortdesc.md)] | +| New | [Allow printing](group-policies/browser-settings-management-gp.md#allow-printing) | [!INCLUDE [allow-printing-shortdesc](shortdesc/allow-printing-shortdesc.md)] | +| New | [Allow Saving History](group-policies/browser-settings-management-gp.md#allow-saving-history) | [!INCLUDE [allow-saving-history-shortdesc](shortdesc/allow-saving-history-shortdesc.md)] | +| New | [Allow sideloading of Extensions](group-policies/extensions-management-gp.md#allow-sideloading-of-extensions) | [!INCLUDE [allow-sideloading-of-extensions-shortdesc](shortdesc/allow-sideloading-of-extensions-shortdesc.md)] | +| New | [Configure collection of browsing data for Microsoft 365 Analytics](group-policies/telemetry-management-gp.md#configure-collection-of-browsing-data-for-microsoft-365-analytics) | [!INCLUDE [configure-browser-telemetry-for-m365-analytics-shortdesc](shortdesc/configure-browser-telemetry-for-m365-analytics-shortdesc.md)] | +| New | [Configure Favorites Bar](group-policies/favorites-management-gp.md#configure-favorites-bar) | [!INCLUDE [configure-favorites-bar-shortdesc](shortdesc/configure-favorites-bar-shortdesc.md)] | +| New | [Configure Home Button](group-policies/home-button-gp.md#configure-home-button) | [!INCLUDE [configure-home-button-shortdesc](shortdesc/configure-home-button-shortdesc.md)] | +| New | [Configure kiosk mode](available-policies.md#configure-kiosk-mode) | [!INCLUDE [configure-kiosk-mode-shortdesc](shortdesc/configure-kiosk-mode-shortdesc.md)] | +| New | [Configure kiosk reset after idle timeout](available-policies.md#configure-kiosk-reset-after-idle-timeout) | [!INCLUDE [configure-kiosk-reset-after-idle-timeout-shortdesc](shortdesc/configure-kiosk-reset-after-idle-timeout-shortdesc.md)] | +| New | [Configure Open Microsoft Edge With](group-policies/start-pages-gp.md#configure-open-microsoft-edge-with) | [!INCLUDE [configure-open-microsoft-edge-with-shortdesc](shortdesc/configure-open-microsoft-edge-with-shortdesc.md)] | +| New | [Prevent certificate error overrides](group-policies/security-privacy-management-gp.md#prevent-certificate-error-overrides) | [!INCLUDE [prevent-certificate-error-overrides-shortdesc](shortdesc/prevent-certificate-error-overrides-shortdesc.md)] | +| New | [Prevent users from turning on browser syncing](group-policies/sync-browser-settings-gp.md#prevent-users-from-turning-on-browser-syncing) | [!INCLUDE [prevent-users-to-turn-on-browser-syncing-shortdesc](shortdesc/prevent-users-to-turn-on-browser-syncing-shortdesc.md)] | +| New | [Prevent turning off required extensions](group-policies/extensions-management-gp.md#prevent-turning-off-required-extensions) | [!INCLUDE [prevent-turning-off-required-extensions-shortdesc](shortdesc/prevent-turning-off-required-extensions-shortdesc.md)] | +| New | [Set Home Button URL](group-policies/home-button-gp.md#set-home-button-url) | [!INCLUDE [set-home-button-url-shortdesc](shortdesc/set-home-button-url-shortdesc.md)] | +| New | [Set New Tab page URL](group-policies/new-tab-page-settings-gp.md#set-new-tab-page-url) | [!INCLUDE [set-new-tab-url-shortdesc](shortdesc/set-new-tab-url-shortdesc.md)] | +| Updated | [Show message when opening sites in Internet Explorer](group-policies/interoperability-enterprise-guidance-gp.md#show-message-when-opening-sites-in-internet-explorer) | [!INCLUDE [show-message-when-opening-sites-in-ie-shortdesc](shortdesc/show-message-when-opening-sites-in-ie-shortdesc.md)] | +| New | [Unlock Home Button](group-policies/home-button-gp.md#unlock-home-button) | [!INCLUDE [unlock-home-button-shortdesc](shortdesc/unlock-home-button-shortdesc.md)] | + +#### [2017](#tab/2017/) +## September 2017 + +|New or changed topic | Description | +|---------------------|-------------| +|[Microsoft Edge - Frequently Asked Questions (FAQs) for IT Pros](microsoft-edge-faq.md) | New | + +## February 2017 + +|New or changed topic | Description | +|----------------------|-------------| +|[Available Group Policy and Mobile Device Management (MDM) settings for Microsoft Edge](available-policies.md) |Added new Group Policy and MDM settings for the Windows Insider Program. Reformatted for easier readability outside of scrolling table. | + + +#### [2016](#tab/2016/) +## November 2016 + +|New or changed topic | Description | +|----------------------|-------------| +|[Browser: Microsoft Edge and Internet Explorer 11](enterprise-guidance-using-microsoft-edge-and-ie11.md) |Added the infographic image and a download link.| +|[Use Enterprise Mode to improve compatibility](emie-to-improve-compatibility.md) |Added a note about the 65 second wait before checking for a newer version of the site list .XML file. | +|[Available policies for Microsoft Edge](available-policies.md) |Added notes to the Configure the Enterprise Mode Site List Group Policy and the EnterpriseModeSiteList MDM policy about the 65 second wait before checking for a newer version of the site list .XML file. | +|Microsoft Edge - Deployment Guide for IT Pros |Added a link to the Microsoft Edge infographic, helping you to evaluate the potential impact of using Microsoft Edge in your organization. | +|[Browser: Microsoft Edge and Internet Explorer 11](enterprise-guidance-using-microsoft-edge-and-ie11.md) |Added a link to the Microsoft Edge infographic, helping you to evaluate the potential impact of using Microsoft Edge in your organization. | + +## July 2016 + +|New or changed topic | Description | +|----------------------|-------------| +|[Microsoft Edge requirements and language support](hardware-and-software-requirements.md)| Updated to include a note about the Long Term Servicing Branch (LTSB). | +|[Enterprise guidance about using Microsoft Edge and Internet Explorer 11](enterprise-guidance-using-microsoft-edge-and-ie11.md) | Content moved from What's New section. | +|[Available policies for Microsoft Edge](available-policies.md) |Updated | + + +## June 2016 + +|New or changed topic | Description | +|----------------------|-------------| +|[Security enhancements for Microsoft Edge](security-enhancements-microsoft-edge.md) |New | + +## May 2016 + +|New or changed topic | Description | +|----------------------|-------------| +|[Available Policies for Microsoft Edge](available-policies.md) | Added new policies and the Supported versions column for Windows 10 Insider Preview. | + +* * * diff --git a/browsers/edge/edge-technical-demos.md b/browsers/edge/edge-technical-demos.md index 8326776612..d8eb14bd02 100644 --- a/browsers/edge/edge-technical-demos.md +++ b/browsers/edge/edge-technical-demos.md @@ -1,38 +1,39 @@ ---- -title: Microsoft Edge training and demonstrations -ms.reviewer: -audience: itpro manager: dansimp -description: Get access to training and demonstrations for Microsoft Edge. -ms.prod: edge -ms.topic: article -ms.manager: elizapo -author: msdmaguire -ms.author: dmaguire -ms.localizationpriority: high ---- - -# Microsoft Edge training and demonstrations - -Explore security and compatibility features of Microsoft Edge, and get tips to increase manageability, productivity, and support for legacy apps. - -## Virtual labs - -Microsoft Hands-On Labs let you experience a software product or technology using a cloud-based private virtual machine environment. Get free access to one or more virtual machines, with no additional software or setup required. - -Check out the **Use Internet Explorer Enterprise Mode to fix compatibility issues (WS00137)" on the [self-paced labs site](https://www.microsoft.com/handsonlabs/SelfPacedLabs/?storyGuid=e4155067-2c7e-4b46-8496-eca38bedca02). - -## Features and functionality - -Find out more about new and improved features of Microsoft Edge, and how you can leverage them to bring increased productivity, security, manageability, and support for legacy apps to your secure, modern desktop. - -### Building a faster browser: Behind the scenes improvements in Microsoft Edge - -Get a behind the scenes look at Microsoft Edge and the improvements we've made to make it faster and more efficient. - -> [!VIDEO https://channel9.msdn.com/events/webplatformsummit/microsoft-edge-web-summit-2017/es14/player] - -### Building a safer browser: Four guards to keep users safe - -Learn about our security strategy and how we use the Four Guards to keep your users safe while they browse the Internet. - -> [!VIDEO https://channel9.msdn.com/events/webplatformsummit/microsoft-edge-web-summit-2017/es03/player] +--- +title: Microsoft Edge training and demonstrations +ms.reviewer: +audience: itpro +manager: dansimp +description: Get access to training and demonstrations for Microsoft Edge. +ms.prod: edge +ms.topic: article +ms.manager: dansimp +author: dansimp +ms.author: dansimp +ms.localizationpriority: high +--- + +# Microsoft Edge training and demonstrations + +Explore security and compatibility features of Microsoft Edge, and get tips to increase manageability, productivity, and support for legacy apps. + +## Virtual labs + +Microsoft Hands-On Labs let you experience a software product or technology using a cloud-based private virtual machine environment. Get free access to one or more virtual machines, with no additional software or setup required. + +Check out the **Use Internet Explorer Enterprise Mode to fix compatibility issues (WS00137)" on the [self-paced labs site](https://www.microsoft.com/handsonlabs/SelfPacedLabs/?storyGuid=e4155067-2c7e-4b46-8496-eca38bedca02). + +## Features and functionality + +Find out more about new and improved features of Microsoft Edge, and how you can leverage them to bring increased productivity, security, manageability, and support for legacy apps to your secure, modern desktop. + +### Building a faster browser: Behind the scenes improvements in Microsoft Edge + +Get a behind the scenes look at Microsoft Edge and the improvements we've made to make it faster and more efficient. + +> [!VIDEO https://channel9.msdn.com/events/webplatformsummit/microsoft-edge-web-summit-2017/es14/player] + +### Building a safer browser: Four guards to keep users safe + +Learn about our security strategy and how we use the Four Guards to keep your users safe while they browse the Internet. + +> [!VIDEO https://channel9.msdn.com/events/webplatformsummit/microsoft-edge-web-summit-2017/es03/player] diff --git a/browsers/edge/emie-to-improve-compatibility.md b/browsers/edge/emie-to-improve-compatibility.md index e9ec39db3f..2925106064 100644 --- a/browsers/edge/emie-to-improve-compatibility.md +++ b/browsers/edge/emie-to-improve-compatibility.md @@ -4,8 +4,8 @@ ms.assetid: 89c75f7e-35ca-4ca8-96fa-b3b498b53bE4 ms.reviewer: audience: itpro manager: dansimp -author: eavena -ms.author: eravena +author: dansimp +ms.author: dansimp ms.manager: dansimp ms.prod: edge ms.topic: reference diff --git a/browsers/edge/group-policies/address-bar-settings-gp.md b/browsers/edge/group-policies/address-bar-settings-gp.md index d29ed1ca88..c9cf088a60 100644 --- a/browsers/edge/group-policies/address-bar-settings-gp.md +++ b/browsers/edge/group-policies/address-bar-settings-gp.md @@ -1,33 +1,34 @@ ---- -title: Microsoft Edge - Address bar group policies -description: Microsoft Edge, by default, shows a list of search suggestions in the address bar. You can minimize network connections from Microsoft Edge to Microsoft services, hiding the functionality of the Address bar drop-down list. -services: -keywords: -ms.localizationpriority: medium -audience: itpro manager: dansimp -author: eavena -ms.author: eravena -ms.date: 10/02/2018 -ms.reviewer: -ms.topic: reference -ms.prod: edge -ms.mktglfcycl: explore -ms.sitesec: library ---- - -# Address bar - -Microsoft Edge, by default, shows a list of search suggestions in the address bar. You can minimize network connections from Microsoft Edge to Microsoft services by hiding the functionality of the Address bar drop-down list. - -You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy: - -      **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\** - - - -## Allow Address bar drop-down list suggestions -[!INCLUDE [allow-address-bar-suggestions-include.md](../includes/allow-address-bar-suggestions-include.md)] - -## Configure search suggestions in Address bar -[!INCLUDE [configure-search-suggestions-address-bar-include.md](../includes/configure-search-suggestions-address-bar-include.md)] - +--- +title: Microsoft Edge - Address bar group policies +description: Microsoft Edge, by default, shows a list of search suggestions in the address bar. You can minimize network connections from Microsoft Edge to Microsoft services, hiding the functionality of the Address bar drop-down list. +services: +keywords: +ms.localizationpriority: medium +audience: itpro +manager: dansimp +author: dansimp +ms.author: dansimp +ms.date: 10/02/2018 +ms.reviewer: +ms.topic: reference +ms.prod: edge +ms.mktglfcycl: explore +ms.sitesec: library +--- + +# Address bar + +Microsoft Edge, by default, shows a list of search suggestions in the address bar. You can minimize network connections from Microsoft Edge to Microsoft services by hiding the functionality of the Address bar drop-down list. + +You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy: + +      **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\** + + + +## Allow Address bar drop-down list suggestions +[!INCLUDE [allow-address-bar-suggestions-include.md](../includes/allow-address-bar-suggestions-include.md)] + +## Configure search suggestions in Address bar +[!INCLUDE [configure-search-suggestions-address-bar-include.md](../includes/configure-search-suggestions-address-bar-include.md)] + diff --git a/browsers/edge/group-policies/adobe-settings-gp.md b/browsers/edge/group-policies/adobe-settings-gp.md index 6efc8ee3f8..5fc4021fce 100644 --- a/browsers/edge/group-policies/adobe-settings-gp.md +++ b/browsers/edge/group-policies/adobe-settings-gp.md @@ -1,35 +1,36 @@ ---- -title: Microsoft Edge - Adobe Flash group policies -description: Adobe Flash Player still has a significant presence on the internet, such as digital ads. However, open standards, such as HTML5, provide many of the capabilities and functionalities becoming an alternative for content on the web. With Adobe no longer supporting Flash after 2020, Microsoft has started to phase out Flash from Microsoft Edge by adding the Configure the Adobe Flash Click-to-Run setting group policy giving you a way to control the list of websites that have permission to run Adobe Flash content. -services: -keywords: -ms.localizationpriority: medium -audience: itpro manager: dansimp -author: eavena -ms.author: eravena -ms.date: 10/02/2018 -ms.reviewer: -ms.topic: reference -ms.prod: edge -ms.mktglfcycl: explore -ms.sitesec: library ---- - -# Adobe Flash - -Adobe Flash Player still has a significant presence on the internet, such as digital ads. However, open standards, such as HTML5, provide many of the capabilities and functionalities becoming an alternative for content on the web. With Adobe no longer supporting Flash after 2020, Microsoft has started to phase out Flash from Microsoft Edge by adding the [Configure the Adobe Flash Click-to-Run setting](#configure-the-adobe-flash-click-to-run-setting) group policy giving you a way to control the list of websites that have permission to run Adobe Flash content. - -To learn more about Microsoft’s plan for phasing out Flash from Microsoft Edge and Internet Explorer, see [The End of an Era — Next Steps for Adobe Flash]( https://blogs.windows.com/msedgedev/2017/07/25/flash-on-windows-timeline/#3Bcc3QjRw0l7XsZ4.97) (blog article). - - -You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy: - -      **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\** - -## Allow Adobe Flash -[!INCLUDE [allow-adobe-flash-include.md](../includes/allow-adobe-flash-include.md)] - - -## Configure the Adobe Flash Click-to-Run setting -[!INCLUDE [configure-adobe-flash-click-to-run-include.md](../includes/configure-adobe-flash-click-to-run-include.md)] - +--- +title: Microsoft Edge - Adobe Flash group policies +description: Adobe Flash Player still has a significant presence on the internet, such as digital ads. However, open standards, such as HTML5, provide many of the capabilities and functionalities becoming an alternative for content on the web. With Adobe no longer supporting Flash after 2020, Microsoft has started to phase out Flash from Microsoft Edge by adding the Configure the Adobe Flash Click-to-Run setting group policy giving you a way to control the list of websites that have permission to run Adobe Flash content. +services: +keywords: +ms.localizationpriority: medium +audience: itpro +manager: dansimp +author: dansimp +ms.author: dansimp +ms.date: 10/02/2018 +ms.reviewer: +ms.topic: reference +ms.prod: edge +ms.mktglfcycl: explore +ms.sitesec: library +--- + +# Adobe Flash + +Adobe Flash Player still has a significant presence on the internet, such as digital ads. However, open standards, such as HTML5, provide many of the capabilities and functionalities becoming an alternative for content on the web. With Adobe no longer supporting Flash after 2020, Microsoft has started to phase out Flash from Microsoft Edge by adding the [Configure the Adobe Flash Click-to-Run setting](#configure-the-adobe-flash-click-to-run-setting) group policy giving you a way to control the list of websites that have permission to run Adobe Flash content. + +To learn more about Microsoft’s plan for phasing out Flash from Microsoft Edge and Internet Explorer, see [The End of an Era — Next Steps for Adobe Flash]( https://blogs.windows.com/msedgedev/2017/07/25/flash-on-windows-timeline/#3Bcc3QjRw0l7XsZ4.97) (blog article). + + +You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy: + +      **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\** + +## Allow Adobe Flash +[!INCLUDE [allow-adobe-flash-include.md](../includes/allow-adobe-flash-include.md)] + + +## Configure the Adobe Flash Click-to-Run setting +[!INCLUDE [configure-adobe-flash-click-to-run-include.md](../includes/configure-adobe-flash-click-to-run-include.md)] + diff --git a/browsers/edge/group-policies/books-library-management-gp.md b/browsers/edge/group-policies/books-library-management-gp.md index 633b5b8b51..c8742367b6 100644 --- a/browsers/edge/group-policies/books-library-management-gp.md +++ b/browsers/edge/group-policies/books-library-management-gp.md @@ -1,37 +1,38 @@ ---- -title: Microsoft Edge - Books Library group policies -description: Microsoft Edge decreases the amount of storage used by book files by downloading them to a shared folder. You can also allow Microsoft Edge to update the configuration data for the library automatically. -services: -keywords: -ms.localizationpriority: medium -audience: itpro manager: dansimp -author: eavena -ms.author: eravena -ms.date: 10/02/2018 -ms.reviewer: -ms.topic: reference -ms.prod: edge -ms.mktglfcycl: explore -ms.sitesec: library ---- - -# Books Library - -Microsoft Edge decreases the amount of storage used by book files by downloading them to a shared folder in Windows. You can configure Microsoft Edge to update the configuration data for the library automatically or gather diagnostic data, such as usage data. - - -You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy: - -      **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\** - -## Allow a shared books folder -[!INCLUDE [allow-shared-folder-books-include.md](../includes/allow-shared-folder-books-include.md)] - -## Allow configuration updates for the Books Library -[!INCLUDE [allow-config-updates-books-include.md](../includes/allow-config-updates-books-include.md)] - -## Allow extended telemetry for the Books tab -[!INCLUDE [allow-ext-telemetry-books-tab-include.md](../includes/allow-ext-telemetry-books-tab-include.md)] - -## Always show the Books Library in Microsoft Edge -[!INCLUDE [always-enable-book-library-include.md](../includes/always-enable-book-library-include.md)] +--- +title: Microsoft Edge - Books Library group policies +description: Microsoft Edge decreases the amount of storage used by book files by downloading them to a shared folder. You can also allow Microsoft Edge to update the configuration data for the library automatically. +services: +keywords: +ms.localizationpriority: medium +audience: itpro +manager: dansimp +author: dansimp +ms.author: dansimp +ms.date: 10/02/2018 +ms.reviewer: +ms.topic: reference +ms.prod: edge +ms.mktglfcycl: explore +ms.sitesec: library +--- + +# Books Library + +Microsoft Edge decreases the amount of storage used by book files by downloading them to a shared folder in Windows. You can configure Microsoft Edge to update the configuration data for the library automatically or gather diagnostic data, such as usage data. + + +You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy: + +      **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\** + +## Allow a shared books folder +[!INCLUDE [allow-shared-folder-books-include.md](../includes/allow-shared-folder-books-include.md)] + +## Allow configuration updates for the Books Library +[!INCLUDE [allow-config-updates-books-include.md](../includes/allow-config-updates-books-include.md)] + +## Allow extended telemetry for the Books tab +[!INCLUDE [allow-ext-telemetry-books-tab-include.md](../includes/allow-ext-telemetry-books-tab-include.md)] + +## Always show the Books Library in Microsoft Edge +[!INCLUDE [always-enable-book-library-include.md](../includes/always-enable-book-library-include.md)] diff --git a/browsers/edge/group-policies/browser-settings-management-gp.md b/browsers/edge/group-policies/browser-settings-management-gp.md index 296b99b037..c4f392209e 100644 --- a/browsers/edge/group-policies/browser-settings-management-gp.md +++ b/browsers/edge/group-policies/browser-settings-management-gp.md @@ -1,52 +1,53 @@ ---- -title: Microsoft Edge - Browser experience group policies -description: Not only do the other Microsoft Edge group policies enhance the browsing experience, but we must also talk about some of the most common or somewhat common browsing experiences. For example, printing web content is a common browsing experience. However, if you want to prevent users from printing web content, Microsoft Edge has a group policy that allows you to prevent printing. -services: -keywords: -ms.localizationpriority: medium -audience: itpro manager: dansimp -author: eavena -ms.author: eravena -ms.date: 10/02/2018 -ms.reviewer: -ms.topic: reference -ms.prod: edge -ms.mktglfcycl: explore -ms.sitesec: library ---- - -# Browser experience - -Not only do the other Microsoft Edge group policies enhance the browsing experience, but we also want to mention some of the other and common browsing experiences. For example, printing web content is a common browsing experience. However, if you want to prevent users from printing web content, Microsoft Edge has a group policy that allows you to prevent printing. The same goes for Pop-up Blocker; Microsoft Edge has a group policy that lets you prevent pop-up windows or let users choose to use Pop-up Blocker. You can use any one of the following group policies to continue enhancing the browsing experience for your users. - - - -You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy: - -      **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\** - -## Allow clearing browsing data on exit -[!INCLUDE [allow-clearing-browsing-data-include](../includes/allow-clearing-browsing-data-include.md)] - -## Allow fullscreen mode -[!INCLUDE [allow-full-screen-include](../includes/allow-full-screen-include.md)] - -## Allow printing -[!INCLUDE [allow-printing-include](../includes/allow-printing-include.md)] - -## Allow Saving History -[!INCLUDE [allow-saving-history-include](../includes/allow-saving-history-include.md)] - -## Configure Autofill -[!INCLUDE [configure-autofill-include](../includes/configure-autofill-include.md)] - -## Configure Pop-up Blocker -[!INCLUDE [configure-pop-up-blocker-include](../includes/configure-pop-up-blocker-include.md)] - -## Do not sync -[!INCLUDE [do-not-sync-include](../includes/do-not-sync-include.md)] - -To learn about the policies to sync the browser settings, see [Sync browser settings](sync-browser-settings-gp.md). - - - +--- +title: Microsoft Edge - Browser experience group policies +description: Not only do the other Microsoft Edge group policies enhance the browsing experience, but we must also talk about some of the most common or somewhat common browsing experiences. For example, printing web content is a common browsing experience. However, if you want to prevent users from printing web content, Microsoft Edge has a group policy that allows you to prevent printing. +services: +keywords: +ms.localizationpriority: medium +audience: itpro +manager: dansimp +author: dansimp +ms.author: dansimp +ms.date: 10/02/2018 +ms.reviewer: +ms.topic: reference +ms.prod: edge +ms.mktglfcycl: explore +ms.sitesec: library +--- + +# Browser experience + +Not only do the other Microsoft Edge group policies enhance the browsing experience, but we also want to mention some of the other and common browsing experiences. For example, printing web content is a common browsing experience. However, if you want to prevent users from printing web content, Microsoft Edge has a group policy that allows you to prevent printing. The same goes for Pop-up Blocker; Microsoft Edge has a group policy that lets you prevent pop-up windows or let users choose to use Pop-up Blocker. You can use any one of the following group policies to continue enhancing the browsing experience for your users. + + + +You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy: + +      **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\** + +## Allow clearing browsing data on exit +[!INCLUDE [allow-clearing-browsing-data-include](../includes/allow-clearing-browsing-data-include.md)] + +## Allow fullscreen mode +[!INCLUDE [allow-full-screen-include](../includes/allow-full-screen-include.md)] + +## Allow printing +[!INCLUDE [allow-printing-include](../includes/allow-printing-include.md)] + +## Allow Saving History +[!INCLUDE [allow-saving-history-include](../includes/allow-saving-history-include.md)] + +## Configure Autofill +[!INCLUDE [configure-autofill-include](../includes/configure-autofill-include.md)] + +## Configure Pop-up Blocker +[!INCLUDE [configure-pop-up-blocker-include](../includes/configure-pop-up-blocker-include.md)] + +## Do not sync +[!INCLUDE [do-not-sync-include](../includes/do-not-sync-include.md)] + +To learn about the policies to sync the browser settings, see [Sync browser settings](sync-browser-settings-gp.md). + + + diff --git a/browsers/edge/group-policies/developer-settings-gp.md b/browsers/edge/group-policies/developer-settings-gp.md index a5d7e4f42b..67fce97c58 100644 --- a/browsers/edge/group-policies/developer-settings-gp.md +++ b/browsers/edge/group-policies/developer-settings-gp.md @@ -1,31 +1,31 @@ ---- -title: Microsoft Edge - Developer tools -description: Microsoft Edge, by default, allows users to use the F12 developer tools as well as access the about:flags page. You can prevent users from using the F12 developer tools or from accessing the about:flags page. -services: -keywords: -ms.localizationpriority: medium -manager: dougkim -author: eavena -ms.author: eravena -ms.date: 10/02/2018 -ms.reviewer: -audience: itpro manager: dansimp -ms.topic: reference -ms.prod: edge -ms.mktglfcycl: explore -ms.sitesec: library ---- - -# Developer tools - -Microsoft Edge, by default, allows users to use the F12 developer tools as well as access the about:flags page. You can prevent users from using the F12 developer tools or from accessing the about:flags page. - -You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy: - -      **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\** - -## Allow Developer Tools -[!INCLUDE [allow-dev-tools-include](../includes/allow-dev-tools-include.md)] - -## Prevent access to the about:flags page -[!INCLUDE [prevent-access-about-flag-include](../includes/prevent-access-about-flag-include.md)] +--- +title: Microsoft Edge - Developer tools +description: Microsoft Edge, by default, allows users to use the F12 developer tools as well as access the about:flags page. You can prevent users from using the F12 developer tools or from accessing the about:flags page. +services: +keywords: +ms.localizationpriority: medium +author: dansimp +ms.author: dansimp +ms.date: 10/02/2018 +ms.reviewer: +audience: itpro +manager: dansimp +ms.topic: reference +ms.prod: edge +ms.mktglfcycl: explore +ms.sitesec: library +--- + +# Developer tools + +Microsoft Edge, by default, allows users to use the F12 developer tools as well as access the about:flags page. You can prevent users from using the F12 developer tools or from accessing the about:flags page. + +You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy: + +      **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\** + +## Allow Developer Tools +[!INCLUDE [allow-dev-tools-include](../includes/allow-dev-tools-include.md)] + +## Prevent access to the about:flags page +[!INCLUDE [prevent-access-about-flag-include](../includes/prevent-access-about-flag-include.md)] diff --git a/browsers/edge/group-policies/extensions-management-gp.md b/browsers/edge/group-policies/extensions-management-gp.md index 5230bc5f52..22ad6057c4 100644 --- a/browsers/edge/group-policies/extensions-management-gp.md +++ b/browsers/edge/group-policies/extensions-management-gp.md @@ -1,33 +1,34 @@ ---- -title: Microsoft Edge - Extensions group policies -description: Currently, Microsoft Edge allows users to add or personalize, and uninstall extensions. You can prevent users from uninstalling extensions or sideloading of extensions, which does not prevent sideloading using Add-AppxPackage via PowerShell. Allowing sideloading of extensions installs and runs unverified extensions. -services: -keywords: -ms.localizationpriority: medium -audience: itpro manager: dansimp -author: eavena -ms.author: eravena -ms.date: 10/02/2018 -ms.reviewer: -ms.topic: reference -ms.prod: edge -ms.mktglfcycl: explore -ms.sitesec: library ---- - -# Extensions - -Currently, Microsoft Edge allows users to add or personalize, and uninstall extensions. You can prevent users from uninstalling extensions or sideloading of extensions, which does not prevent sideloading using Add-AppxPackage via PowerShell. Allowing sideloading of extensions installs and runs unverified extensions. - -You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy: - -      **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\** - -## Allow Extensions -[!INCLUDE [allow-extensions-include](../includes/allow-extensions-include.md)] - -## Allow sideloading of extensions -[!INCLUDE [allow-sideloading-extensions-include](../includes/allow-sideloading-extensions-include.md)] - -## Prevent turning off required extensions -[!INCLUDE [prevent-turning-off-required-extensions-include](../includes/prevent-turning-off-required-extensions-include.md)] +--- +title: Microsoft Edge - Extensions group policies +description: Currently, Microsoft Edge allows users to add or personalize, and uninstall extensions. You can prevent users from uninstalling extensions or sideloading of extensions, which does not prevent sideloading using Add-AppxPackage via PowerShell. Allowing sideloading of extensions installs and runs unverified extensions. +services: +keywords: +ms.localizationpriority: medium +audience: itpro +manager: dansimp +author: dansimp +ms.author: dansimp +ms.date: 10/02/2018 +ms.reviewer: +ms.topic: reference +ms.prod: edge +ms.mktglfcycl: explore +ms.sitesec: library +--- + +# Extensions + +Currently, Microsoft Edge allows users to add or personalize, and uninstall extensions. You can prevent users from uninstalling extensions or sideloading of extensions, which does not prevent sideloading using Add-AppxPackage via PowerShell. Allowing sideloading of extensions installs and runs unverified extensions. + +You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy: + +      **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\** + +## Allow Extensions +[!INCLUDE [allow-extensions-include](../includes/allow-extensions-include.md)] + +## Allow sideloading of extensions +[!INCLUDE [allow-sideloading-extensions-include](../includes/allow-sideloading-extensions-include.md)] + +## Prevent turning off required extensions +[!INCLUDE [prevent-turning-off-required-extensions-include](../includes/prevent-turning-off-required-extensions-include.md)] diff --git a/browsers/edge/group-policies/favorites-management-gp.md b/browsers/edge/group-policies/favorites-management-gp.md index 6ba684a843..58ce30eb7f 100644 --- a/browsers/edge/group-policies/favorites-management-gp.md +++ b/browsers/edge/group-policies/favorites-management-gp.md @@ -1,39 +1,40 @@ ---- -title: Microsoft Edge - Favorites group policies -description: Configure Microsoft Edge to either show or hide the favorites bar on all pages. Microsoft Edge hides the favorites bar by default but shows the favorites bar on the Start and New tab pages. Also, by default, the favorites bar toggle, in Settings, is set to Off but enabled allowing users to make changes. -services: -keywords: -ms.localizationpriority: medium -audience: itpro manager: dansimp -author: eavena -ms.author: eravena -ms.date: 10/02/2018 -ms.reviewer: -ms.topic: reference -ms.prod: edge -ms.mktglfcycl: explore -ms.sitesec: library ---- - -# Favorites - -You can customize the favorites bar, for example, you can turn off features such as Save a Favorite and Import settings, and hide or show the favorites bar on all pages. Another customization you can make is provisioning a standard list of favorites, including folders, to appear in addition to the user’s favorites. If it’s important to keep the favorites in both IE11 and Microsoft Edge synced, you can turn on syncing where changes to the list of favorites in one browser reflect in the other. - ->[!TIP] ->You can find the Favorites under C:\\Users\\<_username_>\\Favorites. - -You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy: - -      **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\** - -## Configure Favorites Bar -[!INCLUDE [configure-favorites-bar-include](../includes/configure-favorites-bar-include.md)] - -## Keep favorites in sync between Internet Explorer and Microsoft Edge -[!INCLUDE [keep-fav-sync-ie-edge-include](../includes/keep-fav-sync-ie-edge-include.md)] - -## Prevent changes to Favorites on Microsoft Edge -[!INCLUDE [prevent-changes-to-favorites-include](../includes/prevent-changes-to-favorites-include.md)] - -## Provision Favorites -[!INCLUDE [provision-favorites-include](../includes/provision-favorites-include.md)] +--- +title: Microsoft Edge - Favorites group policies +description: Configure Microsoft Edge to either show or hide the favorites bar on all pages. Microsoft Edge hides the favorites bar by default but shows the favorites bar on the Start and New tab pages. Also, by default, the favorites bar toggle, in Settings, is set to Off but enabled allowing users to make changes. +services: +keywords: +ms.localizationpriority: medium +audience: itpro +manager: dansimp +author: dansimp +ms.author: dansimp +ms.date: 10/02/2018 +ms.reviewer: +ms.topic: reference +ms.prod: edge +ms.mktglfcycl: explore +ms.sitesec: library +--- + +# Favorites + +You can customize the favorites bar, for example, you can turn off features such as Save a Favorite and Import settings, and hide or show the favorites bar on all pages. Another customization you can make is provisioning a standard list of favorites, including folders, to appear in addition to the user’s favorites. If it’s important to keep the favorites in both IE11 and Microsoft Edge synced, you can turn on syncing where changes to the list of favorites in one browser reflect in the other. + +>[!TIP] +>You can find the Favorites under C:\\Users\\<_username_>\\Favorites. + +You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy: + +      **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\** + +## Configure Favorites Bar +[!INCLUDE [configure-favorites-bar-include](../includes/configure-favorites-bar-include.md)] + +## Keep favorites in sync between Internet Explorer and Microsoft Edge +[!INCLUDE [keep-fav-sync-ie-edge-include](../includes/keep-fav-sync-ie-edge-include.md)] + +## Prevent changes to Favorites on Microsoft Edge +[!INCLUDE [prevent-changes-to-favorites-include](../includes/prevent-changes-to-favorites-include.md)] + +## Provision Favorites +[!INCLUDE [provision-favorites-include](../includes/provision-favorites-include.md)] diff --git a/browsers/edge/group-policies/home-button-gp.md b/browsers/edge/group-policies/home-button-gp.md index f9db9cbcb3..8993518748 100644 --- a/browsers/edge/group-policies/home-button-gp.md +++ b/browsers/edge/group-policies/home-button-gp.md @@ -1,47 +1,48 @@ ---- -title: Microsoft Edge - Home button group policies -description: Microsoft Edge shows the home button, by default, and by clicking it the Start page loads. With the relevant Home button policies, you can configure the Home button to load the New tab page or a specific page. You can also configure Microsoft Edge to hide the home button. -audience: itpro manager: dansimp -ms.author: eravena -author: eavena -ms.date: 10/02/2018 -ms.reviewer: -ms.localizationpriority: medium -ms.prod: edge -ms.mktglfcycl: explore -ms.sitesec: library -ms.topic: reference ---- - -# Home button - -Microsoft Edge shows the home button, by default, and by clicking it the Start page loads. With the relevant Home button policies, you can configure the Home button to load the New tab page or a specific page. You can also configure Microsoft Edge to hide the home button. - -## Relevant group policies - -- [Configure Home Button](#configure-home-button) -- [Set Home Button URL](#set-home-button-url) -- [Unlock Home Button](#unlock-home-button) - -You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy: - -      **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\** - -## Configuration options - -![Show home button and load Start page or New Tab page](../images/home-button-start-new-tab-page-v4-sm.png) - -![Show home button and load custom URL](../images/home-buttom-custom-url-v4-sm.png) - -![Hide home button](../images/home-button-hide-v4-sm.png) - - -## Configure Home Button -[!INCLUDE [configure-home-button-include.md](../includes/configure-home-button-include.md)] - -## Set Home Button URL -[!INCLUDE [set-home-button-url-include](../includes/set-home-button-url-include.md)] - -## Unlock Home Button -[!INCLUDE [unlock-home-button-include.md](../includes/unlock-home-button-include.md)] - +--- +title: Microsoft Edge - Home button group policies +description: Microsoft Edge shows the home button, by default, and by clicking it the Start page loads. With the relevant Home button policies, you can configure the Home button to load the New tab page or a specific page. You can also configure Microsoft Edge to hide the home button. +audience: itpro +manager: dansimp +ms.author: dansimp +author: dansimp +ms.date: 10/02/2018 +ms.reviewer: +ms.localizationpriority: medium +ms.prod: edge +ms.mktglfcycl: explore +ms.sitesec: library +ms.topic: reference +--- + +# Home button + +Microsoft Edge shows the home button, by default, and by clicking it the Start page loads. With the relevant Home button policies, you can configure the Home button to load the New tab page or a specific page. You can also configure Microsoft Edge to hide the home button. + +## Relevant group policies + +- [Configure Home Button](#configure-home-button) +- [Set Home Button URL](#set-home-button-url) +- [Unlock Home Button](#unlock-home-button) + +You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy: + +      **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\** + +## Configuration options + +![Show home button and load Start page or New Tab page](../images/home-button-start-new-tab-page-v4-sm.png) + +![Show home button and load custom URL](../images/home-buttom-custom-url-v4-sm.png) + +![Hide home button](../images/home-button-hide-v4-sm.png) + + +## Configure Home Button +[!INCLUDE [configure-home-button-include.md](../includes/configure-home-button-include.md)] + +## Set Home Button URL +[!INCLUDE [set-home-button-url-include](../includes/set-home-button-url-include.md)] + +## Unlock Home Button +[!INCLUDE [unlock-home-button-include.md](../includes/unlock-home-button-include.md)] + diff --git a/browsers/edge/group-policies/interoperability-enterprise-guidance-gp.md b/browsers/edge/group-policies/interoperability-enterprise-guidance-gp.md index 24dc169b1a..009ea51226 100644 --- a/browsers/edge/group-policies/interoperability-enterprise-guidance-gp.md +++ b/browsers/edge/group-policies/interoperability-enterprise-guidance-gp.md @@ -1,79 +1,80 @@ ---- -title: Microsoft Edge - Interoperability and enterprise mode guidance -description: Microsoft Edge lets you continue to use IE11 for sites that are on your corporate intranet or included on your Enterprise Mode Site List. If you are running web apps that continue to use ActiveX controls, x-ua-compatible headers, or legacy document modes, you need to keep running them in IE11. IE11 offers additional security, manageability, performance, backward compatibility, and modern standards support. -ms.localizationpriority: medium -audience: itpro manager: dansimp -ms.author: eravena -author: eavena -ms.date: 10/02/2018 -ms.reviewer: -ms.prod: edge -ms.mktglfcycl: explore -ms.sitesec: library -ms.topic: reference ---- - -# Interoperability and enterprise mode guidance - -Microsoft Edge is the default browser experience for Windows 10 and Windows 10 Mobile. However, Microsoft Edge lets you continue to use IE11 for sites that are on your corporate intranet or included on your Enterprise Mode Site List. If you are running web apps that continue to use ActiveX controls, x-ua-compatible headers, or legacy document modes, you need to keep running them in IE11. IE11 offers additional security, manageability, performance, backward compatibility, and modern standards support. - ->[!TIP] ->If you are running an earlier version of Internet Explorer, we recommend upgrading to IE11, so that any legacy apps continue to work correctly. - -**Technology not supported by Microsoft Edge** - - -- ActiveX controls - -- Browser Helper Objects - -- VBScript - -- x-ua-compatible headers - -- \ tags - -- Legacy document modes - -If you have specific websites and apps that you know have compatibility problems with Microsoft Edge, you can use the Enterprise Mode site list so that the websites automatically open using Internet Explorer 11. Additionally, if you know that your intranet sites aren't going to work correctly with Microsoft Edge, you can set all intranet sites to open using IE11 automatically. - -Using Enterprise Mode means that you can continue to use Microsoft Edge as your default browser, while also ensuring that your apps continue working on IE11. - -## Relevant group policies - - -1. [Configure the Enterprise Mode Site List](#configure-the-enterprise-mode-site-list) - -2. [Send all intranet sites to Internet Explorer 11](#send-all-intranet-sites-to-internet-explorer-11) - -3. [Show message when opening sites in Internet Explorer](#show-message-when-opening-sites-in-internet-explorer) - -4. [(IE11 policy) Send all sites not included in the Enterprise Mode Site List to Microsoft Edge](#ie11-policy-send-all-sites-not-included-in-the-enterprise-mode-site-list-to-microsoft-edge) - -You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy: - -      **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\** - -## Configuration options - -![Use Enterprise Mode with Microsoft Edge to improve compatibility](../images/use-enterprise-mode-with-microsoft-edge-sm.png) - - -## Configure the Enterprise Mode Site List - -[!INCLUDE [configure-enterprise-mode-site-list-include](../includes/configure-enterprise-mode-site-list-include.md)] - - -## Send all intranet sites to Internet Explorer 11 - -[!INCLUDE [send-all-intranet-sites-ie-include](../includes/send-all-intranet-sites-ie-include.md)] - - -## Show message when opening sites in Internet Explorer - -[!INCLUDE [show-message-opening-sites-ie-include](../includes/show-message-opening-sites-ie-include.md)] - - -## (IE11 policy) Send all sites not included in the Enterprise Mode Site List to Microsoft Edge - -[!INCLUDE [ie11-send-all-sites-not-in-site-list-include](../includes/ie11-send-all-sites-not-in-site-list-include.md)] +--- +title: Microsoft Edge - Interoperability and enterprise mode guidance +description: Microsoft Edge lets you continue to use IE11 for sites that are on your corporate intranet or included on your Enterprise Mode Site List. If you are running web apps that continue to use ActiveX controls, x-ua-compatible headers, or legacy document modes, you need to keep running them in IE11. IE11 offers additional security, manageability, performance, backward compatibility, and modern standards support. +ms.localizationpriority: medium +audience: itpro +manager: dansimp +ms.author: dansimp +author: dansimp +ms.date: 10/02/2018 +ms.reviewer: +ms.prod: edge +ms.mktglfcycl: explore +ms.sitesec: library +ms.topic: reference +--- + +# Interoperability and enterprise mode guidance + +Microsoft Edge is the default browser experience for Windows 10 and Windows 10 Mobile. However, Microsoft Edge lets you continue to use IE11 for sites that are on your corporate intranet or included on your Enterprise Mode Site List. If you are running web apps that continue to use ActiveX controls, x-ua-compatible headers, or legacy document modes, you need to keep running them in IE11. IE11 offers additional security, manageability, performance, backward compatibility, and modern standards support. + +>[!TIP] +>If you are running an earlier version of Internet Explorer, we recommend upgrading to IE11, so that any legacy apps continue to work correctly. + +**Technology not supported by Microsoft Edge** + + +- ActiveX controls + +- Browser Helper Objects + +- VBScript + +- x-ua-compatible headers + +- \ tags + +- Legacy document modes + +If you have specific websites and apps that you know have compatibility problems with Microsoft Edge, you can use the Enterprise Mode site list so that the websites automatically open using Internet Explorer 11. Additionally, if you know that your intranet sites aren't going to work correctly with Microsoft Edge, you can set all intranet sites to open using IE11 automatically. + +Using Enterprise Mode means that you can continue to use Microsoft Edge as your default browser, while also ensuring that your apps continue working on IE11. + +## Relevant group policies + + +1. [Configure the Enterprise Mode Site List](#configure-the-enterprise-mode-site-list) + +2. [Send all intranet sites to Internet Explorer 11](#send-all-intranet-sites-to-internet-explorer-11) + +3. [Show message when opening sites in Internet Explorer](#show-message-when-opening-sites-in-internet-explorer) + +4. [(IE11 policy) Send all sites not included in the Enterprise Mode Site List to Microsoft Edge](#ie11-policy-send-all-sites-not-included-in-the-enterprise-mode-site-list-to-microsoft-edge) + +You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy: + +      **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\** + +## Configuration options + +![Use Enterprise Mode with Microsoft Edge to improve compatibility](../images/use-enterprise-mode-with-microsoft-edge-sm.png) + + +## Configure the Enterprise Mode Site List + +[!INCLUDE [configure-enterprise-mode-site-list-include](../includes/configure-enterprise-mode-site-list-include.md)] + + +## Send all intranet sites to Internet Explorer 11 + +[!INCLUDE [send-all-intranet-sites-ie-include](../includes/send-all-intranet-sites-ie-include.md)] + + +## Show message when opening sites in Internet Explorer + +[!INCLUDE [show-message-opening-sites-ie-include](../includes/show-message-opening-sites-ie-include.md)] + + +## (IE11 policy) Send all sites not included in the Enterprise Mode Site List to Microsoft Edge + +[!INCLUDE [ie11-send-all-sites-not-in-site-list-include](../includes/ie11-send-all-sites-not-in-site-list-include.md)] diff --git a/browsers/edge/group-policies/new-tab-page-settings-gp.md b/browsers/edge/group-policies/new-tab-page-settings-gp.md index 7e0cf5f89e..838228b705 100644 --- a/browsers/edge/group-policies/new-tab-page-settings-gp.md +++ b/browsers/edge/group-policies/new-tab-page-settings-gp.md @@ -1,46 +1,47 @@ ---- -title: Microsoft Edge - New Tab page group policies -description: Microsoft Edge loads the default New tab page by default. With the relevant New Tab policies, you can set a URL to load in the New Tab page and prevent users from making changes. You can also load a blank page instead or let the users choose what loads. -audience: itpro manager: dansimp -ms.author: eravena -author: eavena -ms.date: 10/02/2018 -ms.reviewer: -ms.localizationpriority: medium -ms.prod: edge -ms.mktglfcycl: explore -ms.sitesec: library -ms.topic: reference ---- - - -# New Tab page - -Microsoft Edge loads the default New tab page by default. With the relevant New Tab policies, you can set a URL to load in the New Tab page and prevent users from making changes. You can also load a blank page instead or let the users choose what loads. - ->[!NOTE] ->New tab pages do not load while running InPrivate mode. - -## Relevant group policies - -- [Set New Tab page URL](#set-new-tab-page-url) -- [Allow web content on New Tab page](#allow-web-content-on-new-tab-page) - -You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy: - -      **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\** - -## Configuration options - -![Load the default New Tab page](../images/load-default-new-tab-page-sm.png) - -![Load a blank page instead of the default New Tab page](../images/load-blank-page-not-new-tab-page-sm.png) - -![Let users choose what loads](../images/users-choose-new-tab-page-sm.png) - - -## Set New Tab page URL -[!INCLUDE [set-new-tab-url-include](../includes/set-new-tab-url-include.md)] - -## Allow web content on New Tab page -[!INCLUDE [allow-web-content-new-tab-page-include](../includes/allow-web-content-new-tab-page-include.md)] +--- +title: Microsoft Edge - New Tab page group policies +description: Microsoft Edge loads the default New tab page by default. With the relevant New Tab policies, you can set a URL to load in the New Tab page and prevent users from making changes. You can also load a blank page instead or let the users choose what loads. +audience: itpro +manager: dansimp +ms.author: dansimp +author: dansimp +ms.date: 10/02/2018 +ms.reviewer: +ms.localizationpriority: medium +ms.prod: edge +ms.mktglfcycl: explore +ms.sitesec: library +ms.topic: reference +--- + + +# New Tab page + +Microsoft Edge loads the default New tab page by default. With the relevant New Tab policies, you can set a URL to load in the New Tab page and prevent users from making changes. You can also load a blank page instead or let the users choose what loads. + +>[!NOTE] +>New tab pages do not load while running InPrivate mode. + +## Relevant group policies + +- [Set New Tab page URL](#set-new-tab-page-url) +- [Allow web content on New Tab page](#allow-web-content-on-new-tab-page) + +You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy: + +      **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\** + +## Configuration options + +![Load the default New Tab page](../images/load-default-new-tab-page-sm.png) + +![Load a blank page instead of the default New Tab page](../images/load-blank-page-not-new-tab-page-sm.png) + +![Let users choose what loads](../images/users-choose-new-tab-page-sm.png) + + +## Set New Tab page URL +[!INCLUDE [set-new-tab-url-include](../includes/set-new-tab-url-include.md)] + +## Allow web content on New Tab page +[!INCLUDE [allow-web-content-new-tab-page-include](../includes/allow-web-content-new-tab-page-include.md)] diff --git a/browsers/edge/group-policies/prelaunch-preload-gp.md b/browsers/edge/group-policies/prelaunch-preload-gp.md index 7ff02e7924..3f41505fce 100644 --- a/browsers/edge/group-policies/prelaunch-preload-gp.md +++ b/browsers/edge/group-policies/prelaunch-preload-gp.md @@ -3,8 +3,8 @@ title: Microsoft Edge - Prelaunch and tab preload group policies description: Microsoft Edge pre-launches as a background process during Windows startup when the system is idle waiting to be launched by the user. Pre-launching helps the performance of Microsoft Edge and minimizes the amount of time required to start up Microsoft Edge. audience: itpro manager: dansimp -ms.author: eravena -author: eavena +ms.author: dansimp +author: dansimp ms.prod: edge ms.reviewer: ms.localizationpriority: medium diff --git a/browsers/edge/group-policies/search-engine-customization-gp.md b/browsers/edge/group-policies/search-engine-customization-gp.md index 6d4876ef46..52cf1ca380 100644 --- a/browsers/edge/group-policies/search-engine-customization-gp.md +++ b/browsers/edge/group-policies/search-engine-customization-gp.md @@ -1,10 +1,10 @@ --- title: Microsoft Edge - Search engine customization group policies -description: Microsoft Edge, by default, uses the search engine specified in App settings, which lets users make changes. You can prevent users from making changes and still use the search engine specified in App settings by disabling the Allow search engine customization policy. You can also use the policy-set search engine specified in the OpenSearch XML file in which you can configure up to five additional search engines and setting any one of them as the default. +description: Microsoft Edge, by default, uses the search engine specified in App settings, which lets users make changes. You can prevent users from making changes and still use the search engine specified in App settings by disabling the Allow search engine customization policy. You can also use the policy-set search engine specified in the OpenSearch XML file in which you can configure up to five additional search engines and setting any one of them as the default. audience: itpro manager: dansimp -ms.author: eravena -author: eavena +ms.author: dansimp +author: dansimp ms.prod: edge ms.reviewer: ms.localizationpriority: medium diff --git a/browsers/edge/group-policies/security-privacy-management-gp.md b/browsers/edge/group-policies/security-privacy-management-gp.md index 67e656daa8..66fc6f99a7 100644 --- a/browsers/edge/group-policies/security-privacy-management-gp.md +++ b/browsers/edge/group-policies/security-privacy-management-gp.md @@ -1,74 +1,75 @@ ---- -title: Microsoft Edge - Security and privacy group policies -description: Microsoft Edge helps to defend from increasingly sophisticated and prevalent web-based attacks against Windows. While most websites are safe, some sites have been designed to steal personal information or gain access to your system’s resources. -audience: itpro manager: dansimp -ms.author: eravena -author: eavena -ms.date: 10/02/2018 -ms.reviewer: -ms.localizationpriority: medium -ms.topic: reference ---- - -# Security and privacy - -Microsoft Edge is designed with improved security in mind, helping to defend people from increasingly sophisticated and prevalent web-based attacks against Windows. Because Microsoft Edge is designed like a Universal Windows app, changing the browser to an app, it fundamentally changes the process model so that both the outer manager process and the different content processes all live within app container sandboxes. - -Microsoft Edge runs in 64-bit not just by default, but anytime it’s running on a 64-bit operating system. Because Microsoft Edge doesn’t support legacy ActiveX controls or 3rd-party binary extensions, there’s no longer a reason to run 32-bit processes on a 64-bit system. - -The value of running 64-bit all the time is that it strengthens Windows Address Space Layout Randomization (ASLR), randomizing the memory layout of the browser processes, making it much harder for attackers to hit precise memory locations. In turn, 64-bit processes make ASLR much more effective by making the address space exponentially larger and, therefore, more difficult for attackers to find sensitive memory components. - -For more details on the security features in Microsoft Edge, see [Help protect against web-based security threats](#help-protect-against-web-based-security-threats) below. - -You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy: - -      **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\** - -## Configure cookies -[!INCLUDE [configure-cookies-include](../includes/configure-cookies-include.md)] - -## Configure Password Manager -[!INCLUDE [configure-password-manager-include](../includes/configure-password-manager-include.md)] - -## Configure Windows Defender SmartScreen -[!INCLUDE [configure-windows-defender-smartscreen-include](../includes/configure-windows-defender-smartscreen-include.md)] - -## Prevent bypassing Windows Defender SmartScreen prompts for files -[!INCLUDE [prevent-bypassing-win-defender-files-include](../includes/prevent-bypassing-win-defender-files-include.md)] - -## Prevent bypassing Windows Defender SmartScreen prompts for sites -[!INCLUDE [prevent-bypassing-win-defender-sites-include](../includes/prevent-bypassing-win-defender-sites-include.md)] - -## Prevent certificate error overrides -[!INCLUDE [prevent-certificate-error-overrides-include](../includes/prevent-certificate-error-overrides-include.md)] - -## Prevent using Localhost IP address for WebRTC -[!INCLUDE [prevent-localhost-address-for-webrtc-include](../includes/prevent-localhost-address-for-webrtc-include.md)] - - -## Help protect against web-based security threats - -While most websites are safe, some sites have been intentionally designed to steal sensitive and private information or gain access to your system’s resources. You can help protect against threats by using strong security protocols to ensure against such threats. - -Thieves use things like _phishing_ attacks to convince someone to enter personal information, such as a banking password, into a website that looks like a legitimate bank but isn't. Attempts to identify legitimate websites through the HTTPS lock symbol and the EV Cert green bar have met with only limited success since attackers are too good at faking legitimate experiences for many people to notice the difference. - -Another method thieves often use _hacking_ to attack a system through malformed content that exploits subtle flaws in the browser or various browser extensions. This exploit lets an attacker run code on a device, taking over a browsing session, and perhaps the entire device. - -Microsoft Edge addresses these threats to help make browsing the web a safer experience. - - -| Feature | Description | -|-----------------------------------------------------------------------------------------------------------------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| -| **[Windows Hello](https://blogs.windows.com/bloggingwindows/2015/03/17/making-windows-10-more-personal-and-more-secure-with-windows-hello/)** | Microsoft Edge is the first browser to natively support Windows Hello to authenticate the user and the website with asymmetric cryptography technology, powered by early implementation of the [Web Authentication (formerly FIDO 2.0 Web API) specification](https://w3c.github.io/webauthn/). | -| **Microsoft SmartScreen** | Defends against phishing by performing reputation checks on sites visited and blocking any sites that are thought to be a phishing site. SmartScreen also helps to defend against installing malicious software, drive-by attacks, or file downloads, even from trusted sites. Drive-by attacks are malicious web-based attacks that compromise your system by targeting security vulnerabilities in commonly used software and may be hosted on trusted sites. | -| **Certificate Reputation system** | Collects data about certificates in use, detecting new certificates and flagging fraudulent certificates automatically, and sends the data to Microsoft. The systems and tools in place include
  • Certificate Reputation system: Protects users from fraudulent certificates.
  • Bing Webmaster Tools (for developers): Reports fake certificates directly to Microsoft.
| -| **Microsoft EdgeHTML and modern web standards** | Microsoft Edge uses Microsoft EdgeHTML as the rendering engine. This engine focuses on modern standards letting web developers build and maintain a consistent site across all modern browsers. It also helps to defend against hacking through these security standards features:
  • Support for the W3C standard for [Content Security Policy (CSP)](https://developer.microsoft.com/microsoft-edge/platform/documentation/dev-guide/security/content-Security-Policy), which can help web developers defend their sites against cross-site scripting attacks.
  • Support for the [HTTP Strict Transport Security (HSTS)](https://developer.microsoft.com/microsoft-edge/platform/documentation/dev-guide/security/HSTS/) security feature (IETF-standard compliant). HSTS helps ensure that connections to important sites, such as to your bank, are always secured.

**NOTE:** Both Microsoft Edge and Internet Explorer 11 support HSTS. | -| **Code integrity and image loading restrictions** | Microsoft Edge content processes support code integrity and image load restrictions, helping to prevent malicious DLLs from loading or injecting into the content processes. Only [properly signed images](https://blogs.windows.com/msedgedev/2015/11/17/microsoft-edge-module-code-integrity/) are allowed to load into Microsoft Edge. Binaries on remote devices (such as UNC or WebDAV) can’t load. | -| **Memory corruption mitigations** | Memory corruption attacks frequently happen to apps written in C or C++ don’t provide safety or buffer overflow protection. When an attacker provides malformed input to a program, the program’s memory becomes corrupt allowing the attacker to take control of the program. Although attackers have adapted and invented new ways to attack, we’ve responded with memory safety defenses, mitigating the most common forms of attack, including and especially [use-after-free (UAF)](https://cwe.mitre.org/data/definitions/416.html) vulnerabilities. | -| **Memory Garbage Collector (MemGC) mitigation** | MemGC replaces Memory Protector and helps to protect the browser from UAF vulnerabilities. MemGC frees up memory from the programmer and automating it. Only freeing memory when the automation detects no references left pointing to a given block of memory. | -| **Control Flow Guard** | Attackers use memory corruption attacks to gain control of the CPU program counter to jump to any code location they want. Control Flow Guard, a Microsoft Visual Studio technology, compiles checks around code that performs indirect jumps based on a pointer. Those jumps get restricted to function entry points with known addresses only making attacker take-overs must more difficult constraining where an attack jumps. | -| **All web content runs in an app container sandbox** | Microsoft Edge takes the sandbox even farther, running its content processes in containers not just by default, but all of the time. Microsoft Edge doesn’t support 3rd party binary extensions, so there is no reason for it to run outside of the container, making Microsoft Edge more secure. | -| **Extension model and HTML5 support** | Microsoft Edge does not support binary extensions because they can bring code and data into the browser’s processes without any protection. So if anything goes wrong, the entire browser itself can be compromised or go down. We encourage everyone to use our scripted HTML5-based extension model. For more info about the new extensions, see the [Microsoft Edge Developer Center](https://developer.microsoft.com/microsoft-edge/extensions/). | -| **Reduced attack surfaces** | Microsoft Edge does not support VBScript, JScript, VML, Browser Helper Objects, Toolbars, ActiveX controls, and [document modes](https://msdn.microsoft.com/library/jj676915.aspx). Many IE browser vulnerabilities only appear in legacy document modes, so removing support reduced attack surface making the browser more secure.

It also means that it’s not as backward compatible. With this reduced backward compatibility, Microsoft Edge automatically falls back to Internet Explorer 11 for any apps that need backward compatibility. This fall back happens when you use the Enterprise Mode Site List. | - ---- +--- +title: Microsoft Edge - Security and privacy group policies +description: Microsoft Edge helps to defend from increasingly sophisticated and prevalent web-based attacks against Windows. While most websites are safe, some sites have been designed to steal personal information or gain access to your system’s resources. +audience: itpro +manager: dansimp +ms.author: dansimp +author: dansimp +ms.date: 10/02/2018 +ms.reviewer: +ms.localizationpriority: medium +ms.topic: reference +--- + +# Security and privacy + +Microsoft Edge is designed with improved security in mind, helping to defend people from increasingly sophisticated and prevalent web-based attacks against Windows. Because Microsoft Edge is designed like a Universal Windows app, changing the browser to an app, it fundamentally changes the process model so that both the outer manager process and the different content processes all live within app container sandboxes. + +Microsoft Edge runs in 64-bit not just by default, but anytime it’s running on a 64-bit operating system. Because Microsoft Edge doesn’t support legacy ActiveX controls or 3rd-party binary extensions, there’s no longer a reason to run 32-bit processes on a 64-bit system. + +The value of running 64-bit all the time is that it strengthens Windows Address Space Layout Randomization (ASLR), randomizing the memory layout of the browser processes, making it much harder for attackers to hit precise memory locations. In turn, 64-bit processes make ASLR much more effective by making the address space exponentially larger and, therefore, more difficult for attackers to find sensitive memory components. + +For more details on the security features in Microsoft Edge, see [Help protect against web-based security threats](#help-protect-against-web-based-security-threats) below. + +You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy: + +      **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\** + +## Configure cookies +[!INCLUDE [configure-cookies-include](../includes/configure-cookies-include.md)] + +## Configure Password Manager +[!INCLUDE [configure-password-manager-include](../includes/configure-password-manager-include.md)] + +## Configure Windows Defender SmartScreen +[!INCLUDE [configure-windows-defender-smartscreen-include](../includes/configure-windows-defender-smartscreen-include.md)] + +## Prevent bypassing Windows Defender SmartScreen prompts for files +[!INCLUDE [prevent-bypassing-win-defender-files-include](../includes/prevent-bypassing-win-defender-files-include.md)] + +## Prevent bypassing Windows Defender SmartScreen prompts for sites +[!INCLUDE [prevent-bypassing-win-defender-sites-include](../includes/prevent-bypassing-win-defender-sites-include.md)] + +## Prevent certificate error overrides +[!INCLUDE [prevent-certificate-error-overrides-include](../includes/prevent-certificate-error-overrides-include.md)] + +## Prevent using Localhost IP address for WebRTC +[!INCLUDE [prevent-localhost-address-for-webrtc-include](../includes/prevent-localhost-address-for-webrtc-include.md)] + + +## Help protect against web-based security threats + +While most websites are safe, some sites have been intentionally designed to steal sensitive and private information or gain access to your system’s resources. You can help protect against threats by using strong security protocols to ensure against such threats. + +Thieves use things like _phishing_ attacks to convince someone to enter personal information, such as a banking password, into a website that looks like a legitimate bank but isn't. Attempts to identify legitimate websites through the HTTPS lock symbol and the EV Cert green bar have met with only limited success since attackers are too good at faking legitimate experiences for many people to notice the difference. + +Another method thieves often use _hacking_ to attack a system through malformed content that exploits subtle flaws in the browser or various browser extensions. This exploit lets an attacker run code on a device, taking over a browsing session, and perhaps the entire device. + +Microsoft Edge addresses these threats to help make browsing the web a safer experience. + + +| Feature | Description | +|-----------------------------------------------------------------------------------------------------------------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| +| **[Windows Hello](https://blogs.windows.com/bloggingwindows/2015/03/17/making-windows-10-more-personal-and-more-secure-with-windows-hello/)** | Microsoft Edge is the first browser to natively support Windows Hello to authenticate the user and the website with asymmetric cryptography technology, powered by early implementation of the [Web Authentication (formerly FIDO 2.0 Web API) specification](https://w3c.github.io/webauthn/). | +| **Microsoft SmartScreen** | Defends against phishing by performing reputation checks on sites visited and blocking any sites that are thought to be a phishing site. SmartScreen also helps to defend against installing malicious software, drive-by attacks, or file downloads, even from trusted sites. Drive-by attacks are malicious web-based attacks that compromise your system by targeting security vulnerabilities in commonly used software and may be hosted on trusted sites. | +| **Certificate Reputation system** | Collects data about certificates in use, detecting new certificates and flagging fraudulent certificates automatically, and sends the data to Microsoft. The systems and tools in place include

  • Certificate Reputation system: Protects users from fraudulent certificates.
  • Bing Webmaster Tools (for developers): Reports fake certificates directly to Microsoft.
| +| **Microsoft EdgeHTML and modern web standards** | Microsoft Edge uses Microsoft EdgeHTML as the rendering engine. This engine focuses on modern standards letting web developers build and maintain a consistent site across all modern browsers. It also helps to defend against hacking through these security standards features:
  • Support for the W3C standard for [Content Security Policy (CSP)](https://developer.microsoft.com/microsoft-edge/platform/documentation/dev-guide/security/content-Security-Policy), which can help web developers defend their sites against cross-site scripting attacks.
  • Support for the [HTTP Strict Transport Security (HSTS)](https://developer.microsoft.com/microsoft-edge/platform/documentation/dev-guide/security/HSTS/) security feature (IETF-standard compliant). HSTS helps ensure that connections to important sites, such as to your bank, are always secured.

**NOTE:** Both Microsoft Edge and Internet Explorer 11 support HSTS. | +| **Code integrity and image loading restrictions** | Microsoft Edge content processes support code integrity and image load restrictions, helping to prevent malicious DLLs from loading or injecting into the content processes. Only [properly signed images](https://blogs.windows.com/msedgedev/2015/11/17/microsoft-edge-module-code-integrity/) are allowed to load into Microsoft Edge. Binaries on remote devices (such as UNC or WebDAV) can’t load. | +| **Memory corruption mitigations** | Memory corruption attacks frequently happen to apps written in C or C++ don’t provide safety or buffer overflow protection. When an attacker provides malformed input to a program, the program’s memory becomes corrupt allowing the attacker to take control of the program. Although attackers have adapted and invented new ways to attack, we’ve responded with memory safety defenses, mitigating the most common forms of attack, including and especially [use-after-free (UAF)](https://cwe.mitre.org/data/definitions/416.html) vulnerabilities. | +| **Memory Garbage Collector (MemGC) mitigation** | MemGC replaces Memory Protector and helps to protect the browser from UAF vulnerabilities. MemGC frees up memory from the programmer and automating it. Only freeing memory when the automation detects no references left pointing to a given block of memory. | +| **Control Flow Guard** | Attackers use memory corruption attacks to gain control of the CPU program counter to jump to any code location they want. Control Flow Guard, a Microsoft Visual Studio technology, compiles checks around code that performs indirect jumps based on a pointer. Those jumps get restricted to function entry points with known addresses only making attacker take-overs must more difficult constraining where an attack jumps. | +| **All web content runs in an app container sandbox** | Microsoft Edge takes the sandbox even farther, running its content processes in containers not just by default, but all of the time. Microsoft Edge doesn’t support 3rd party binary extensions, so there is no reason for it to run outside of the container, making Microsoft Edge more secure. | +| **Extension model and HTML5 support** | Microsoft Edge does not support binary extensions because they can bring code and data into the browser’s processes without any protection. So if anything goes wrong, the entire browser itself can be compromised or go down. We encourage everyone to use our scripted HTML5-based extension model. For more info about the new extensions, see the [Microsoft Edge Developer Center](https://developer.microsoft.com/microsoft-edge/extensions/). | +| **Reduced attack surfaces** | Microsoft Edge does not support VBScript, JScript, VML, Browser Helper Objects, Toolbars, ActiveX controls, and [document modes](https://msdn.microsoft.com/library/jj676915.aspx). Many IE browser vulnerabilities only appear in legacy document modes, so removing support reduced attack surface making the browser more secure.

It also means that it’s not as backward compatible. With this reduced backward compatibility, Microsoft Edge automatically falls back to Internet Explorer 11 for any apps that need backward compatibility. This fall back happens when you use the Enterprise Mode Site List. | + +--- diff --git a/browsers/edge/group-policies/start-pages-gp.md b/browsers/edge/group-policies/start-pages-gp.md index ce15044aad..4b9682362f 100644 --- a/browsers/edge/group-policies/start-pages-gp.md +++ b/browsers/edge/group-policies/start-pages-gp.md @@ -1,43 +1,44 @@ ---- -title: Microsoft Edge - Start pages group policies -description: Microsoft Edge loads the pages specified in App settings as the default Start pages. With the relevant Start pages policies, you can configure Microsoft Edge to load either the Start page, New tab page, previously opened pages, or a specific page or pages. You can also configure Microsoft Edge to prevent users from making changes. -audience: itpro manager: dansimp -ms.author: eravena -author: eavena -ms.localizationpriority: medium -ms.date: 10/02/2018 -ms.reviewer: -ms.prod: edge -ms.mktglfcycl: explore -ms.sitesec: library -ms.topic: reference ---- - -# Start pages - -Microsoft Edge loads the pages specified in App settings as the default Start pages. With the relevant Start pages policies, you can configure Microsoft Edge to load either the Start page, New tab page, previously opened pages, or a specific page or pages. You can also configure Microsoft Edge to prevent users from making changes. - -## Relevant group policies - -- [Configure Open Microsoft Edge With](#configure-open-microsoft-edge-with) -- [Configure Start Pages](#configure-start-pages) -- [Disable Lockdown of Start pages](#disable-lockdown-of-start-pages) - -You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy: - -      **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\** - -## Configuration options - -![Load URLs defined in Configure Start pages](../images/load-urls-defined-in-configure-open-edge-with-sm.png) - - -## Configure Open Microsoft Edge With -[!INCLUDE [configure-open-edge-with-include](../includes/configure-open-edge-with-include.md)] - -## Configure Start Pages -[!INCLUDE [configure-start-pages-include](../includes/configure-start-pages-include.md)] - -## Disable Lockdown of Start pages -[!INCLUDE [disable-lockdown-of-start-pages-include](../includes/disable-lockdown-of-start-pages-include.md)] - +--- +title: Microsoft Edge - Start pages group policies +description: Microsoft Edge loads the pages specified in App settings as the default Start pages. With the relevant Start pages policies, you can configure Microsoft Edge to load either the Start page, New tab page, previously opened pages, or a specific page or pages. You can also configure Microsoft Edge to prevent users from making changes. +audience: itpro +manager: dansimp +ms.author: dansimp +author: dansimp +ms.localizationpriority: medium +ms.date: 10/02/2018 +ms.reviewer: +ms.prod: edge +ms.mktglfcycl: explore +ms.sitesec: library +ms.topic: reference +--- + +# Start pages + +Microsoft Edge loads the pages specified in App settings as the default Start pages. With the relevant Start pages policies, you can configure Microsoft Edge to load either the Start page, New tab page, previously opened pages, or a specific page or pages. You can also configure Microsoft Edge to prevent users from making changes. + +## Relevant group policies + +- [Configure Open Microsoft Edge With](#configure-open-microsoft-edge-with) +- [Configure Start Pages](#configure-start-pages) +- [Disable Lockdown of Start pages](#disable-lockdown-of-start-pages) + +You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy: + +      **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\** + +## Configuration options + +![Load URLs defined in Configure Start pages](../images/load-urls-defined-in-configure-open-edge-with-sm.png) + + +## Configure Open Microsoft Edge With +[!INCLUDE [configure-open-edge-with-include](../includes/configure-open-edge-with-include.md)] + +## Configure Start Pages +[!INCLUDE [configure-start-pages-include](../includes/configure-start-pages-include.md)] + +## Disable Lockdown of Start pages +[!INCLUDE [disable-lockdown-of-start-pages-include](../includes/disable-lockdown-of-start-pages-include.md)] + diff --git a/browsers/edge/group-policies/sync-browser-settings-gp.md b/browsers/edge/group-policies/sync-browser-settings-gp.md index 86ed0db6fc..fc5a62e81c 100644 --- a/browsers/edge/group-policies/sync-browser-settings-gp.md +++ b/browsers/edge/group-policies/sync-browser-settings-gp.md @@ -1,45 +1,46 @@ ---- -title: Microsoft Edge - Sync browser settings -description: By default, the “browser” group syncs automatically between the user’s devices, letting users make changes. The “browser” group uses the Sync your Settings option in Settings to sync information like history and favorites. -audience: itpro manager: dansimp -ms.author: eravena -author: eavena -ms.date: 10/02/2018 -ms.reviewer: -ms.localizationpriority: medium -ms.topic: reference ---- - -# Sync browser settings - - -By default, the “browser” group syncs automatically between the user’s devices, letting users make changes. The “browser” group uses the Sync your Settings option in Settings to sync information like history and favorites. You can configure Microsoft Edge to prevent the “browser” group from syncing and prevent users from turning on the _Sync your Settings_ toggle in Settings. If you want syncing turned off by default but not disabled, select the _Allow users to turn “browser” syncing_ option in the Do not sync browser policy. - - -## Relevant policies -- [Do not sync browser settings](#do-not-sync-browser-settings) -- [Prevent users from turning on browser syncing](#prevent-users-from-turning-on-browser-syncing) - -You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy: - -      **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\** - -## Configuration options - -![Sync browser settings automatically](../images/sync-browser-settings-automatically-sm.png) - -![Prevent syncing of browser settings](../images/prevent-syncing-browser-settings-sm.png) - - -### Verify the configuration -To verify the settings: -1. In the upper-right corner of Microsoft Edge, click **More** \(**...**\). -2. Click **Settings**. -3. Under Account, see if the setting is toggled on or off.

![Verify configuration](../images/sync-settings.PNG) - - -## Do not sync browser settings -[!INCLUDE [do-not-sync-browser-settings-include](../includes/do-not-sync-browser-settings-include.md)] - -## Prevent users from turning on browser syncing -[!INCLUDE [prevent-users-to-turn-on-browser-syncing-include](../includes/prevent-users-to-turn-on-browser-syncing-include.md)] +--- +title: Microsoft Edge - Sync browser settings +description: By default, the “browser” group syncs automatically between the user’s devices, letting users make changes. The “browser” group uses the Sync your Settings option in Settings to sync information like history and favorites. +audience: itpro +manager: dansimp +ms.author: dansimp +author: dansimp +ms.date: 10/02/2018 +ms.reviewer: +ms.localizationpriority: medium +ms.topic: reference +--- + +# Sync browser settings + + +By default, the “browser” group syncs automatically between the user’s devices, letting users make changes. The “browser” group uses the Sync your Settings option in Settings to sync information like history and favorites. You can configure Microsoft Edge to prevent the “browser” group from syncing and prevent users from turning on the _Sync your Settings_ toggle in Settings. If you want syncing turned off by default but not disabled, select the _Allow users to turn “browser” syncing_ option in the Do not sync browser policy. + + +## Relevant policies +- [Do not sync browser settings](#do-not-sync-browser-settings) +- [Prevent users from turning on browser syncing](#prevent-users-from-turning-on-browser-syncing) + +You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy: + +      **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\** + +## Configuration options + +![Sync browser settings automatically](../images/sync-browser-settings-automatically-sm.png) + +![Prevent syncing of browser settings](../images/prevent-syncing-browser-settings-sm.png) + + +### Verify the configuration +To verify the settings: +1. In the upper-right corner of Microsoft Edge, click **More** \(**...**\). +2. Click **Settings**. +3. Under Account, see if the setting is toggled on or off.

![Verify configuration](../images/sync-settings.PNG) + + +## Do not sync browser settings +[!INCLUDE [do-not-sync-browser-settings-include](../includes/do-not-sync-browser-settings-include.md)] + +## Prevent users from turning on browser syncing +[!INCLUDE [prevent-users-to-turn-on-browser-syncing-include](../includes/prevent-users-to-turn-on-browser-syncing-include.md)] diff --git a/browsers/edge/group-policies/telemetry-management-gp.md b/browsers/edge/group-policies/telemetry-management-gp.md index 3de0998564..a14fc3aaf6 100644 --- a/browsers/edge/group-policies/telemetry-management-gp.md +++ b/browsers/edge/group-policies/telemetry-management-gp.md @@ -1,31 +1,32 @@ ---- -title: Microsoft Edge - Telemetry and data collection group policies -description: Microsoft Edge gathers diagnostic data, intranet history, internet history, tracking information of sites visited, and Live Tile metadata. You can configure Microsoft Edge to collect all or none of this information. -audience: itpro manager: dansimp -ms.author: eravena -author: eavena -ms.date: 10/02/2018 -ms.reviewer: -ms.localizationpriority: medium -ms.topic: reference ---- - -# Telemetry and data collection - -Microsoft Edge gathers diagnostic data, intranet history, internet history, tracking information of sites visited, and Live Tile metadata. You can configure Microsoft Edge to collect all or none of this information. - -You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy: - -      **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\** - -## Allow extended telemetry for the Books tab -[!INCLUDE [allow-ext-telemetry-books-tab-include.md](../includes/allow-ext-telemetry-books-tab-include.md)] - -## Configure collection of browsing data for Microsoft 365 Analytics -[!INCLUDE [configure-browser-telemetry-for-m365-analytics-include](../includes/configure-browser-telemetry-for-m365-analytics-include.md)] - -## Configure Do Not Track -[!INCLUDE [configure-do-not-track-include.md](../includes/configure-do-not-track-include.md)] - -## Prevent Microsoft Edge from gathering Live Tile information when pinning a site to Start -[!INCLUDE [prevent-live-tile-pinning-start-include](../includes/prevent-live-tile-pinning-start-include.md)] +--- +title: Microsoft Edge - Telemetry and data collection group policies +description: Microsoft Edge gathers diagnostic data, intranet history, internet history, tracking information of sites visited, and Live Tile metadata. You can configure Microsoft Edge to collect all or none of this information. +audience: itpro +manager: dansimp +ms.author: dansimp +author: dansimp +ms.date: 10/02/2018 +ms.reviewer: +ms.localizationpriority: medium +ms.topic: reference +--- + +# Telemetry and data collection + +Microsoft Edge gathers diagnostic data, intranet history, internet history, tracking information of sites visited, and Live Tile metadata. You can configure Microsoft Edge to collect all or none of this information. + +You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy: + +      **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\** + +## Allow extended telemetry for the Books tab +[!INCLUDE [allow-ext-telemetry-books-tab-include.md](../includes/allow-ext-telemetry-books-tab-include.md)] + +## Configure collection of browsing data for Microsoft 365 Analytics +[!INCLUDE [configure-browser-telemetry-for-m365-analytics-include](../includes/configure-browser-telemetry-for-m365-analytics-include.md)] + +## Configure Do Not Track +[!INCLUDE [configure-do-not-track-include.md](../includes/configure-do-not-track-include.md)] + +## Prevent Microsoft Edge from gathering Live Tile information when pinning a site to Start +[!INCLUDE [prevent-live-tile-pinning-start-include](../includes/prevent-live-tile-pinning-start-include.md)] diff --git a/browsers/edge/img-microsoft-edge-infographic-lg.md b/browsers/edge/img-microsoft-edge-infographic-lg.md index 722efc8aa2..9b329c580b 100644 --- a/browsers/edge/img-microsoft-edge-infographic-lg.md +++ b/browsers/edge/img-microsoft-edge-infographic-lg.md @@ -1,15 +1,16 @@ ---- -description: A full-sized view of the Microsoft Edge infographic. -title: Full-sized view of the Microsoft Edge infographic -ms.date: 11/10/2016 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: eravena -author: eavena ---- - -Return to: [Browser: Microsoft Edge and Internet Explorer 11](enterprise-guidance-using-microsoft-edge-and-ie11.md)
-Download image: [Total Economic Impact of Microsoft Edge: Infographic](https://www.microsoft.com/download/details.aspx?id=53892) - -![Full-sized Microsoft Edge infographic](images/img-microsoft-edge-infographic-lg.png) - +--- +description: A full-sized view of the Microsoft Edge infographic. +title: Full-sized view of the Microsoft Edge infographic +ms.date: 11/10/2016 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +author: dansimp +--- + +Return to: [Browser: Microsoft Edge and Internet Explorer 11](enterprise-guidance-using-microsoft-edge-and-ie11.md)
+Download image: [Total Economic Impact of Microsoft Edge: Infographic](https://www.microsoft.com/download/details.aspx?id=53892) + +![Full-sized Microsoft Edge infographic](images/img-microsoft-edge-infographic-lg.png) + diff --git a/browsers/edge/managing-group-policy-admx-files.md b/browsers/edge/managing-group-policy-admx-files.md index f749992d29..8b93e0ebc2 100644 --- a/browsers/edge/managing-group-policy-admx-files.md +++ b/browsers/edge/managing-group-policy-admx-files.md @@ -1,26 +1,27 @@ ---- -title: Managing group policy ADMX files -description: Learn how to centrally administer and incorporate ADMX files when editing the administrative template policy settings inside a local or domain-based Group Policy object. -ms.assetid: -ms.reviewer: -audience: itpro manager: dansimp -author: eavena -ms.author: eravena -ms.prod: edge -ms.sitesec: library -ms.localizationpriority: medium -ms.date: 10/19/2018 ---- - -# Managing group policy ADMX files - ->Applies to: Microsoft Edge on Windows 10 - -ADMX files, which are registry-based policy settings provide an XML-based structure for defining the display of the Administrative Template policy settings in the Group Policy Object Editor. The ADMX files replace ADM files, which used a different markup language. - ->[!NOTE] ->The administrative tools you use—Group Policy Object Editor and Group Policy Management Console—remain mostly unchanged. In the majority of situations, you won’t notice the presence of ADMX files during your day-to-day Group Policy administration tasks. - -Unlike ADM files, ADMX files are not stored in individual GPOs by default; however, this behavior supports less common scenarios. For domain-based enterprises, you can create a central store location of ADMX files accessible by anyone with permission to create or edit GPOs. Group Policy tools continue to recognize other earlier ADM files you have in your existing environment. The Group Policy Object Editor automatically reads and displays Administrative Template policy settings from both the ADMX and ADM files. - -Some situations require a better understanding of how ADMX files are structured and the location of the files. In this article, we show you how ADMX files are incorporated when editing Administrative Template policy settings in a local or domain-based Group Policy object (GPO). +--- +title: Managing group policy ADMX files +description: Learn how to centrally administer and incorporate ADMX files when editing the administrative template policy settings inside a local or domain-based Group Policy object. +ms.assetid: +ms.reviewer: +audience: itpro +manager: dansimp +author: dansimp +ms.author: dansimp +ms.prod: edge +ms.sitesec: library +ms.localizationpriority: medium +ms.date: 10/19/2018 +--- + +# Managing group policy ADMX files + +>Applies to: Microsoft Edge on Windows 10 + +ADMX files, which are registry-based policy settings provide an XML-based structure for defining the display of the Administrative Template policy settings in the Group Policy Object Editor. The ADMX files replace ADM files, which used a different markup language. + +>[!NOTE] +>The administrative tools you use—Group Policy Object Editor and Group Policy Management Console—remain mostly unchanged. In the majority of situations, you won’t notice the presence of ADMX files during your day-to-day Group Policy administration tasks. + +Unlike ADM files, ADMX files are not stored in individual GPOs by default; however, this behavior supports less common scenarios. For domain-based enterprises, you can create a central store location of ADMX files accessible by anyone with permission to create or edit GPOs. Group Policy tools continue to recognize other earlier ADM files you have in your existing environment. The Group Policy Object Editor automatically reads and displays Administrative Template policy settings from both the ADMX and ADM files. + +Some situations require a better understanding of how ADMX files are structured and the location of the files. In this article, we show you how ADMX files are incorporated when editing Administrative Template policy settings in a local or domain-based Group Policy object (GPO). diff --git a/browsers/edge/microsoft-edge-faq.md b/browsers/edge/microsoft-edge-faq.md index e73d7bb1a6..4e520db1e3 100644 --- a/browsers/edge/microsoft-edge-faq.md +++ b/browsers/edge/microsoft-edge-faq.md @@ -1,54 +1,55 @@ ---- -title: Microsoft Edge - Frequently Asked Questions (FAQs) for IT Pros -ms.reviewer: -audience: itpro manager: dansimp -description: Answers to frequently asked questions about Microsoft Edge features, integration, support, and potential problems. -author: msdmaguire -ms.author: dmaguire -ms.prod: edge -ms.topic: article -ms.mktglfcycl: general -ms.sitesec: library -ms.localizationpriority: medium ---- - -# Frequently Asked Questions (FAQs) for IT Pros - ->Applies to: Microsoft Edge on Windows 10 and Windows 10 Mobile - -## How can I get the next major version of Microsoft Edge, based on Chromium? -In December 2018, Microsoft [announced](https://blogs.windows.com/windowsexperience/2018/12/06/microsoft-edge-making-the-web-better-through-more-open-source-collaboration/#8jv53blDvL6TIKuS.97) our intention to adopt the Chromium open source project in the development of Microsoft Edge on the desktop, to create better web compatibility for our customers and less fragmentation of the web for all web developers. You can get more information at the [Microsoft Edge Insiders site](https://www.microsoftedgeinsider.com/). - -## What’s the difference between Microsoft Edge and Internet Explorer 11? How do I know which one to use? -Microsoft Edge is the default browser for all Windows 10 devices. It’s built to be highly compatible with the modern web. For some enterprise web apps and a small set of sites that were built to work with older technologies like ActiveX, [you can use Enterprise Mode](emie-to-improve-compatibility.md) to automatically send users to Internet Explorer 11. - -For more information on how Internet Explorer and Microsoft Edge work together to support your legacy web apps, while still defaulting to the higher security and modern experiences enabled by Microsoft Edge, see [Legacy apps in the enterprise](https://blogs.windows.com/msedgedev/2017/04/07/legacy-web-apps-enterprise/#RAbtRvJSYFaKu2BI.97). - -## Does Microsoft Edge work with Enterprise Mode? -[Enterprise Mode](https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/enterprise-mode-overview-for-ie11) helps you run many legacy web applications with better backward compatibility. You can configure both Microsoft Edge and Internet Explorer to use the same Enterprise Mode Site List, switching seamlessly between browsers to support both modern and legacy web apps. - -## How do I customize Microsoft Edge and related settings for my organization? -You can use Group Policy or Microsoft Intune to manage settings related to Microsoft Edge, such as security settings, folder redirection, and preferences. See [Group Policy and Mobile Device Management (MDM) settings for Microsoft Edge](https://docs.microsoft.com/microsoft-edge/deploy/group-policies/) for a list of policies currently available for Microsoft Edge and configuration information. Note that the preview release of Chromium-based Microsoft Edge might not include management policies or other enterprise functionality; our focus during the preview is modern browser fundamentals. - -## Is Adobe Flash supported in Microsoft Edge? -Adobe Flash is currently supported as a built-in feature of Microsoft Edge on PCs running Windows 10. In July 2017, Adobe announced that Flash support will end after 2020. With this change to Adobe support, we’ve started to phase Flash out of Microsoft Edge by adding the [Configure the Adobe Flash Click-to-Run setting group policy](https://docs.microsoft.com/microsoft-edge/deploy/available-policies#configure-the-adobe-flash-click-to-run-setting) - this lets you control which websites can run Adobe Flash content. - -To learn more about Microsoft’s plan for phasing Flash out of Microsoft Edge and Internet Explorer, see [The End of an Era — Next Steps for Adobe Flash](https://blogs.windows.com/msedgedev/2017/07/25/flash-on-windows-timeline/#3Bcc3QjRw0l7XsZ4.97) (blog article). - -## Does Microsoft Edge support ActiveX controls or BHOs like Silverlight or Java? -No. Microsoft Edge doesn’t support ActiveX controls and BHOs like Silverlight or Java. If you’re running web apps that use ActiveX controls, x-ua-compatible headers, or legacy document modes, you need to keep running them in IE11. IE11 offers additional security, manageability, performance, backward compatibility, and standards support. - -## How often will Microsoft Edge be updated? -In Windows 10, we’re delivering Windows as a service, updated on a cadence driven by quality and the availability of new features. Microsoft Edge security updates are released every two to four weeks, while bigger feature updates are included in the Windows 10 releases on a semi-annual cadence. - -## How can I provide feedback on Microsoft Edge? -Microsoft Edge is an evergreen browser - we’ll continue to evolve both the web platform and the user interface with regular updates. To send feedback on user experience, or on broken or malicious sites, use the **Send Feedback** option under the ellipses icon (**...**) in the Microsoft Edge toolbar. - -## Will Internet Explorer 11 continue to receive updates? -We’re committed to keeping Internet Explorer a supported, reliable, and safe browser. Internet Explorer is still a component of Windows and follows the support lifecycle of the OS on which it’s installed. For details, see [Lifecycle FAQ - Internet Explorer](https://support.microsoft.com/help/17454/). While we continue to support and update Internet Explorer, the latest features and platform updates will only be available in Microsoft Edge. - -## How do I find out what version of Microsoft Edge I have? -In the upper right corner of Microsoft Edge, click the ellipses icon (**...**), and then click **Settings**. Look in the **About Microsoft Edge** section to find your version. - -## What is Microsoft EdgeHTML? -Microsoft EdgeHTML is the web rendering engine that powers the current Microsoft Edge web browser and Windows 10 web app platform. (As opposed to *Microsoft Edge, based on Chromium*.) +--- +title: Microsoft Edge - Frequently Asked Questions (FAQs) for IT Pros +ms.reviewer: +audience: itpro +manager: dansimp +description: Answers to frequently asked questions about Microsoft Edge features, integration, support, and potential problems. +author: dansimp +ms.author: dansimp +ms.prod: edge +ms.topic: article +ms.mktglfcycl: general +ms.sitesec: library +ms.localizationpriority: medium +--- + +# Frequently Asked Questions (FAQs) for IT Pros + +>Applies to: Microsoft Edge on Windows 10 and Windows 10 Mobile + +## How can I get the next major version of Microsoft Edge, based on Chromium? +In December 2018, Microsoft [announced](https://blogs.windows.com/windowsexperience/2018/12/06/microsoft-edge-making-the-web-better-through-more-open-source-collaboration/#8jv53blDvL6TIKuS.97) our intention to adopt the Chromium open source project in the development of Microsoft Edge on the desktop, to create better web compatibility for our customers and less fragmentation of the web for all web developers. You can get more information at the [Microsoft Edge Insiders site](https://www.microsoftedgeinsider.com/). + +## What’s the difference between Microsoft Edge and Internet Explorer 11? How do I know which one to use? +Microsoft Edge is the default browser for all Windows 10 devices. It’s built to be highly compatible with the modern web. For some enterprise web apps and a small set of sites that were built to work with older technologies like ActiveX, [you can use Enterprise Mode](emie-to-improve-compatibility.md) to automatically send users to Internet Explorer 11. + +For more information on how Internet Explorer and Microsoft Edge work together to support your legacy web apps, while still defaulting to the higher security and modern experiences enabled by Microsoft Edge, see [Legacy apps in the enterprise](https://blogs.windows.com/msedgedev/2017/04/07/legacy-web-apps-enterprise/#RAbtRvJSYFaKu2BI.97). + +## Does Microsoft Edge work with Enterprise Mode? +[Enterprise Mode](https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/enterprise-mode-overview-for-ie11) helps you run many legacy web applications with better backward compatibility. You can configure both Microsoft Edge and Internet Explorer to use the same Enterprise Mode Site List, switching seamlessly between browsers to support both modern and legacy web apps. + +## How do I customize Microsoft Edge and related settings for my organization? +You can use Group Policy or Microsoft Intune to manage settings related to Microsoft Edge, such as security settings, folder redirection, and preferences. See [Group Policy and Mobile Device Management (MDM) settings for Microsoft Edge](https://docs.microsoft.com/microsoft-edge/deploy/group-policies/) for a list of policies currently available for Microsoft Edge and configuration information. Note that the preview release of Chromium-based Microsoft Edge might not include management policies or other enterprise functionality; our focus during the preview is modern browser fundamentals. + +## Is Adobe Flash supported in Microsoft Edge? +Adobe Flash is currently supported as a built-in feature of Microsoft Edge on PCs running Windows 10. In July 2017, Adobe announced that Flash support will end after 2020. With this change to Adobe support, we’ve started to phase Flash out of Microsoft Edge by adding the [Configure the Adobe Flash Click-to-Run setting group policy](https://docs.microsoft.com/microsoft-edge/deploy/available-policies#configure-the-adobe-flash-click-to-run-setting) - this lets you control which websites can run Adobe Flash content. + +To learn more about Microsoft’s plan for phasing Flash out of Microsoft Edge and Internet Explorer, see [The End of an Era — Next Steps for Adobe Flash](https://blogs.windows.com/msedgedev/2017/07/25/flash-on-windows-timeline/#3Bcc3QjRw0l7XsZ4.97) (blog article). + +## Does Microsoft Edge support ActiveX controls or BHOs like Silverlight or Java? +No. Microsoft Edge doesn’t support ActiveX controls and BHOs like Silverlight or Java. If you’re running web apps that use ActiveX controls, x-ua-compatible headers, or legacy document modes, you need to keep running them in IE11. IE11 offers additional security, manageability, performance, backward compatibility, and standards support. + +## How often will Microsoft Edge be updated? +In Windows 10, we’re delivering Windows as a service, updated on a cadence driven by quality and the availability of new features. Microsoft Edge security updates are released every two to four weeks, while bigger feature updates are included in the Windows 10 releases on a semi-annual cadence. + +## How can I provide feedback on Microsoft Edge? +Microsoft Edge is an evergreen browser - we’ll continue to evolve both the web platform and the user interface with regular updates. To send feedback on user experience, or on broken or malicious sites, use the **Send Feedback** option under the ellipses icon (**...**) in the Microsoft Edge toolbar. + +## Will Internet Explorer 11 continue to receive updates? +We’re committed to keeping Internet Explorer a supported, reliable, and safe browser. Internet Explorer is still a component of Windows and follows the support lifecycle of the OS on which it’s installed. For details, see [Lifecycle FAQ - Internet Explorer](https://support.microsoft.com/help/17454/). While we continue to support and update Internet Explorer, the latest features and platform updates will only be available in Microsoft Edge. + +## How do I find out what version of Microsoft Edge I have? +In the upper right corner of Microsoft Edge, click the ellipses icon (**...**), and then click **Settings**. Look in the **About Microsoft Edge** section to find your version. + +## What is Microsoft EdgeHTML? +Microsoft EdgeHTML is the web rendering engine that powers the current Microsoft Edge web browser and Windows 10 web app platform. (As opposed to *Microsoft Edge, based on Chromium*.) diff --git a/browsers/edge/microsoft-edge-forrester.md b/browsers/edge/microsoft-edge-forrester.md index b4035d8b3e..23c3505440 100644 --- a/browsers/edge/microsoft-edge-forrester.md +++ b/browsers/edge/microsoft-edge-forrester.md @@ -1,36 +1,37 @@ ---- -title: Forrester Total Economic Impact - Microsoft Edge -ms.reviewer: -audience: itpro manager: dansimp -description: Review the results of the Microsoft Edge study carried out by Forrester Research -ms.prod: edge -ms.topic: article -author: msdmaguire -ms.author: dmaguire -ms.localizationpriority: high ---- -# Measuring the impact of Microsoft Edge - Total Economic Impact (TEI) of Microsoft Edge - -Forrester Research measures the return on investment (ROI) of Microsoft Edge in its latest TEI report and survey. Browse and download these free resources to learn about the impact Microsoft Edge can have in your organization, including significant cost savings in reduced browser help desk tickets and improved browser security, to increased speed, performance, and user productivity. - -## Forrester report video summary -View a brief overview of the Forrester TEI case study that Microsoft commissioned to examine the value your organization can achieve by utilizing Microsoft Edge: - -> ![VIDEO ] - -## Forrester Study report - -Forrester interviewed several customers with more than six months of experience using Microsoft Edge – all customers reported improvements in browser security, increased user productivity, and efficiencies gained in supporting the software. - -[Download the full report](https://www.microsoft.com/download/details.aspx?id=55847) - -## Forrester Study report infographic -Get a graphical summary of the TEI of Microsoft Edge Forrester Study report and highlights of the three-year financial impact of Microsoft Edge. - -[Download the report infographic](https://www.microsoft.com/download/details.aspx?id=55956) - -## Forrester survey infographic - -Forrester surveyed 168 customers using Microsoft Edge form the US, Germany, UK, and Japan, ranging in size from 500 to over 100,000 employees. This document is an abridged version of this survey commissioned by Microsoft and delivery by Forrester consulting. - -[Download the survey infographic](https://www.microsoft.com/download/details.aspx?id=53892) +--- +title: Forrester Total Economic Impact - Microsoft Edge +ms.reviewer: +audience: itpro +manager: dansimp +description: Review the results of the Microsoft Edge study carried out by Forrester Research +ms.prod: edge +ms.topic: article +author: dansimp +ms.author: dansimp +ms.localizationpriority: high +--- +# Measuring the impact of Microsoft Edge - Total Economic Impact (TEI) of Microsoft Edge + +Forrester Research measures the return on investment (ROI) of Microsoft Edge in its latest TEI report and survey. Browse and download these free resources to learn about the impact Microsoft Edge can have in your organization, including significant cost savings in reduced browser help desk tickets and improved browser security, to increased speed, performance, and user productivity. + +## Forrester report video summary +View a brief overview of the Forrester TEI case study that Microsoft commissioned to examine the value your organization can achieve by utilizing Microsoft Edge: + +> ![VIDEO ] + +## Forrester Study report + +Forrester interviewed several customers with more than six months of experience using Microsoft Edge – all customers reported improvements in browser security, increased user productivity, and efficiencies gained in supporting the software. + +[Download the full report](https://www.microsoft.com/download/details.aspx?id=55847) + +## Forrester Study report infographic +Get a graphical summary of the TEI of Microsoft Edge Forrester Study report and highlights of the three-year financial impact of Microsoft Edge. + +[Download the report infographic](https://www.microsoft.com/download/details.aspx?id=55956) + +## Forrester survey infographic + +Forrester surveyed 168 customers using Microsoft Edge form the US, Germany, UK, and Japan, ranging in size from 500 to over 100,000 employees. This document is an abridged version of this survey commissioned by Microsoft and delivery by Forrester consulting. + +[Download the survey infographic](https://www.microsoft.com/download/details.aspx?id=53892) diff --git a/browsers/edge/microsoft-edge-kiosk-mode-deploy.md b/browsers/edge/microsoft-edge-kiosk-mode-deploy.md index 9781a1de92..5e10c3201b 100644 --- a/browsers/edge/microsoft-edge-kiosk-mode-deploy.md +++ b/browsers/edge/microsoft-edge-kiosk-mode-deploy.md @@ -5,13 +5,13 @@ ms.assetid: ms.reviewer: audience: itpro manager: dansimp -author: eavena +author: dansimp ms.author: eravena ms.prod: edge ms.sitesec: library ms.topic: article ms.localizationpriority: medium -ms.date: 10/29/2018 +ms.date: 10/29/2018 --- # Deploy Microsoft Edge kiosk mode diff --git a/browsers/edge/shortdesc/allow-a-shared-books-folder-shortdesc.md b/browsers/edge/shortdesc/allow-a-shared-books-folder-shortdesc.md index 6ca44ca392..ecfa4c5ca0 100644 --- a/browsers/edge/shortdesc/allow-a-shared-books-folder-shortdesc.md +++ b/browsers/edge/shortdesc/allow-a-shared-books-folder-shortdesc.md @@ -1,11 +1,12 @@ ---- -author: eavena -ms.author: eravena -ms.date: 10/02/2018 -ms.reviewer: -audience: itpro manager: dansimp -ms.prod: edge -ms.topic: include ---- - -Microsoft Edge does not use a shared folder by default but downloads book files to a per-user folder for each user. With this policy, you can configure Microsoft Edge to store books from the Books Library to a default, shared folder in Windows, which decreases the amount of storage used by book files. When you enable this policy, Microsoft Edge downloads books to a shared folder after user action to download the book to their device, which allows them to remove downloaded books at any time. For this policy to work correctly, you must also enable the **Allow a Windows app to share application data between users** group policy. Also, the users must be signed in with a school or work account. +--- +author: dansimp +ms.author: dansimp +ms.date: 10/02/2018 +ms.reviewer: +audience: itpro +manager: dansimp +ms.prod: edge +ms.topic: include +--- + +Microsoft Edge does not use a shared folder by default but downloads book files to a per-user folder for each user. With this policy, you can configure Microsoft Edge to store books from the Books Library to a default, shared folder in Windows, which decreases the amount of storage used by book files. When you enable this policy, Microsoft Edge downloads books to a shared folder after user action to download the book to their device, which allows them to remove downloaded books at any time. For this policy to work correctly, you must also enable the **Allow a Windows app to share application data between users** group policy. Also, the users must be signed in with a school or work account. diff --git a/browsers/edge/shortdesc/allow-address-bar-drop-down-shortdesc.md b/browsers/edge/shortdesc/allow-address-bar-drop-down-shortdesc.md index 4b4897683a..116864a49f 100644 --- a/browsers/edge/shortdesc/allow-address-bar-drop-down-shortdesc.md +++ b/browsers/edge/shortdesc/allow-address-bar-drop-down-shortdesc.md @@ -1,11 +1,12 @@ ---- -author: eavena -ms.author: eravena -ms.date: 10/02/2018 -ms.reviewer: -audience: itpro manager: dansimp -ms.prod: edge -ms.topic: include ---- - -Microsoft Edge shows the Address bar drop-down list and makes it available by default, which takes precedence over the Configure search suggestions in Address bar policy. We recommend disabling this policy if you want to minimize network connections from Microsoft Edge to Microsoft service, which hides the functionality of the Address bar drop-down list. When you disable this policy, Microsoft Edge also disables the _Show search and site suggestions as I type_ toggle in Settings. +--- +author: dansimp +ms.author: dansimp +ms.date: 10/02/2018 +ms.reviewer: +audience: itpro +manager: dansimp +ms.prod: edge +ms.topic: include +--- + +Microsoft Edge shows the Address bar drop-down list and makes it available by default, which takes precedence over the Configure search suggestions in Address bar policy. We recommend disabling this policy if you want to minimize network connections from Microsoft Edge to Microsoft service, which hides the functionality of the Address bar drop-down list. When you disable this policy, Microsoft Edge also disables the _Show search and site suggestions as I type_ toggle in Settings. diff --git a/browsers/edge/shortdesc/allow-adobe-flash-shortdesc.md b/browsers/edge/shortdesc/allow-adobe-flash-shortdesc.md index bd2d105ef2..dca6cf6233 100644 --- a/browsers/edge/shortdesc/allow-adobe-flash-shortdesc.md +++ b/browsers/edge/shortdesc/allow-adobe-flash-shortdesc.md @@ -1,11 +1,12 @@ ---- -author: eavena -ms.author: eravena -ms.date: 10/02/2018 -ms.reviewer: -audience: itpro manager: dansimp -ms.prod: edge -ms.topic: include ---- - -Adobe Flash is integrated with Microsoft Edge and runs Adobe Flash content by default. With this policy, you can configure Microsoft Edge to prevent Adobe Flash content from running. +--- +author: dansimp +ms.author: dansimp +ms.date: 10/02/2018 +ms.reviewer: +audience: itpro +manager: dansimp +ms.prod: edge +ms.topic: include +--- + +Adobe Flash is integrated with Microsoft Edge and runs Adobe Flash content by default. With this policy, you can configure Microsoft Edge to prevent Adobe Flash content from running. diff --git a/browsers/edge/shortdesc/allow-clearing-browsing-data-on-exit-shortdesc.md b/browsers/edge/shortdesc/allow-clearing-browsing-data-on-exit-shortdesc.md index 373cac8619..af3d4fefef 100644 --- a/browsers/edge/shortdesc/allow-clearing-browsing-data-on-exit-shortdesc.md +++ b/browsers/edge/shortdesc/allow-clearing-browsing-data-on-exit-shortdesc.md @@ -1,11 +1,12 @@ ---- -author: eavena -ms.author: eravena -ms.date: 10/02/2018 -ms.reviewer: -audience: itpro manager: dansimp -ms.prod: edge -ms.topic: include ---- - -Microsoft Edge does not clear the browsing data on exit by default, but users can configure the _Clear browsing data_ option in Settings. Browsing data includes information you entered in forms, passwords, and even the websites visited. With this policy, you can configure Microsoft Edge to clear the browsing data automatically each time Microsoft Edge closes. +--- +author: dansimp +ms.author: dansimp +ms.date: 10/02/2018 +ms.reviewer: +audience: itpro +manager: dansimp +ms.prod: edge +ms.topic: include +--- + +Microsoft Edge does not clear the browsing data on exit by default, but users can configure the _Clear browsing data_ option in Settings. Browsing data includes information you entered in forms, passwords, and even the websites visited. With this policy, you can configure Microsoft Edge to clear the browsing data automatically each time Microsoft Edge closes. diff --git a/browsers/edge/shortdesc/allow-configuration-updates-for-books-library-shortdesc.md b/browsers/edge/shortdesc/allow-configuration-updates-for-books-library-shortdesc.md index 4775e4ba3e..40a927c882 100644 --- a/browsers/edge/shortdesc/allow-configuration-updates-for-books-library-shortdesc.md +++ b/browsers/edge/shortdesc/allow-configuration-updates-for-books-library-shortdesc.md @@ -1,11 +1,12 @@ ---- -author: eavena -ms.author: eravena -ms.date: 10/02/2018 -ms.reviewer: -audience: itpro manager: dansimp -ms.prod: edge -ms.topic: include ---- - -Microsoft Edge automatically updates the configuration data for the Books library. Disabling this policy prevents Microsoft Edge from updating the configuration data. If Microsoft receives feedback about the amount of data about the Books library, the data comes as a JSON file. +--- +author: dansimp +ms.author: dansimp +ms.date: 10/02/2018 +ms.reviewer: +audience: itpro +manager: dansimp +ms.prod: edge +ms.topic: include +--- + +Microsoft Edge automatically updates the configuration data for the Books library. Disabling this policy prevents Microsoft Edge from updating the configuration data. If Microsoft receives feedback about the amount of data about the Books library, the data comes as a JSON file. diff --git a/browsers/edge/shortdesc/allow-cortana-shortdesc.md b/browsers/edge/shortdesc/allow-cortana-shortdesc.md index 5975b2b148..fbfa0f13b0 100644 --- a/browsers/edge/shortdesc/allow-cortana-shortdesc.md +++ b/browsers/edge/shortdesc/allow-cortana-shortdesc.md @@ -1,11 +1,12 @@ ---- -author: eavena -ms.author: eravena -ms.date: 10/02/2018 -ms.reviewer: -audience: itpro manager: dansimp -ms.prod: edge -ms.topic: include ---- - -Since Microsoft Edge is integration with Cortana, Microsoft Edge allows users to use Cortana voice assistant by default. With this policy, you can configure Microsoft Edge to prevent users from using Cortana but can still search to find items on their device. +--- +author: dansimp +ms.author: dansimp +ms.date: 10/02/2018 +ms.reviewer: +audience: itpro +manager: dansimp +ms.prod: edge +ms.topic: include +--- + +Since Microsoft Edge is integration with Cortana, Microsoft Edge allows users to use Cortana voice assistant by default. With this policy, you can configure Microsoft Edge to prevent users from using Cortana but can still search to find items on their device. diff --git a/browsers/edge/shortdesc/allow-developer-tools-shortdesc.md b/browsers/edge/shortdesc/allow-developer-tools-shortdesc.md index 4084a7dfde..9d134d4a38 100644 --- a/browsers/edge/shortdesc/allow-developer-tools-shortdesc.md +++ b/browsers/edge/shortdesc/allow-developer-tools-shortdesc.md @@ -1,11 +1,12 @@ ---- -author: eavena -ms.author: eravena -ms.date: 10/02/2018 -ms.reviewer: -audience: itpro manager: dansimp -ms.prod: edge -ms.topic: include ---- - -Microsoft Edge allows users to use the F12 developer tools to build and debug web pages by default. With this policy, you can configure Microsoft Edge to prevent users from using the F12 developer tools. +--- +author: dansimp +ms.author: dansimp +ms.date: 10/02/2018 +ms.reviewer: +audience: itpro +manager: dansimp +ms.prod: edge +ms.topic: include +--- + +Microsoft Edge allows users to use the F12 developer tools to build and debug web pages by default. With this policy, you can configure Microsoft Edge to prevent users from using the F12 developer tools. diff --git a/browsers/edge/troubleshooting-microsoft-edge.md b/browsers/edge/troubleshooting-microsoft-edge.md index 5cd394e473..3c50d4d50e 100644 --- a/browsers/edge/troubleshooting-microsoft-edge.md +++ b/browsers/edge/troubleshooting-microsoft-edge.md @@ -1,37 +1,38 @@ ---- -title: Troubleshoot Microsoft Edge -description: -ms.assetid: -ms.reviewer: -audience: itpro manager: dansimp -author: eavena -ms.author: eravena -ms.prod: edge -ms.sitesec: library -title: Deploy Microsoft Edge kiosk mode -ms.localizationpriority: medium -ms.date: 10/15/2018 ---- - -# Troubleshoot Microsoft Edge - - -## Microsoft Edge and IPv6 -We are aware of the known issue with Microsoft Edge and all UWP-based apps, such as Store, Mail, Feedback Hub, and so on. It only happens if you have disabled IPv6 (not recommended), so a temporary workaround is to enable it. - -## Microsoft Edge hijacks .PDF and .HTM files - - - -## Citrix Receiver in Microsoft Edge kiosk mode -If you want to deliver applications to users via Citrix through Microsoft Edge, you must create the kiosk user account and then log into the account to install Citrix Receiver BEFORE setting up assigned access. - -1. Create the kiosk user account. -2. Log into the account. -3. Install Citrix Receiver. -4. Set up assigned access. - - -## Missing SettingSync.admx and SettingSync.adml files - -Make sure to [download](https://www.microsoft.com/download/windows.aspx) the latest templates to C:\windows\policydefinitions\. +--- +title: Troubleshoot Microsoft Edge +description: +ms.assetid: +ms.reviewer: +audience: itpro +manager: dansimp +author: dansimp +ms.author: dansimp +ms.prod: edge +ms.sitesec: library +title: Deploy Microsoft Edge kiosk mode +ms.localizationpriority: medium +ms.date: 10/15/2018 +--- + +# Troubleshoot Microsoft Edge + + +## Microsoft Edge and IPv6 +We are aware of the known issue with Microsoft Edge and all UWP-based apps, such as Store, Mail, Feedback Hub, and so on. It only happens if you have disabled IPv6 (not recommended), so a temporary workaround is to enable it. + +## Microsoft Edge hijacks .PDF and .HTM files + + + +## Citrix Receiver in Microsoft Edge kiosk mode +If you want to deliver applications to users via Citrix through Microsoft Edge, you must create the kiosk user account and then log into the account to install Citrix Receiver BEFORE setting up assigned access. + +1. Create the kiosk user account. +2. Log into the account. +3. Install Citrix Receiver. +4. Set up assigned access. + + +## Missing SettingSync.admx and SettingSync.adml files + +Make sure to [download](https://www.microsoft.com/download/windows.aspx) the latest templates to C:\windows\policydefinitions\. diff --git a/browsers/edge/use-powershell-to manage-group-policy.md b/browsers/edge/use-powershell-to manage-group-policy.md index 4427c17e84..58a6b06b27 100644 --- a/browsers/edge/use-powershell-to manage-group-policy.md +++ b/browsers/edge/use-powershell-to manage-group-policy.md @@ -1,29 +1,30 @@ ---- -title: Use Windows PowerShell to manage group policy -description: -ms.prod: edge -ms.mktglfcycl: explore -ms.sitesec: library -ms.pagetype: security -title: Security enhancements for Microsoft Edge (Microsoft Edge for IT Pros) -ms.localizationpriority: medium -ms.date: 10/02/2018 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: eravena -author: eavena ---- - -# Use Windows PowerShell to manage group policy - -Windows PowerShell supports group policy automation of the same tasks you perform in Group Policy Management Console (GPMC) for domain-based group policy objects (GPOs): - -- Maintain GPOs (GPO creation, removal, backup, and import) -- Associate GPOs with Active Directory service containers (group policy link creation, update, and removal) -- Set permissions on GPOs -- Modify inheritance flags on Active Directory organization units (OUs) and domains -- Configure registry-based policy settings and group policy preferences registry settings (update, retrieval, and removal) -- Create starter GPOs - - - +--- +title: Use Windows PowerShell to manage group policy +description: +ms.prod: edge +ms.mktglfcycl: explore +ms.sitesec: library +ms.pagetype: security +title: Security enhancements for Microsoft Edge (Microsoft Edge for IT Pros) +ms.localizationpriority: medium +ms.date: 10/02/2018 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +author: dansimp +--- + +# Use Windows PowerShell to manage group policy + +Windows PowerShell supports group policy automation of the same tasks you perform in Group Policy Management Console (GPMC) for domain-based group policy objects (GPOs): + +- Maintain GPOs (GPO creation, removal, backup, and import) +- Associate GPOs with Active Directory service containers (group policy link creation, update, and removal) +- Set permissions on GPOs +- Modify inheritance flags on Active Directory organization units (OUs) and domains +- Configure registry-based policy settings and group policy preferences registry settings (update, retrieval, and removal) +- Create starter GPOs + + + diff --git a/browsers/edge/web-app-compat-toolkit.md b/browsers/edge/web-app-compat-toolkit.md index b502df7292..8ec157e607 100644 --- a/browsers/edge/web-app-compat-toolkit.md +++ b/browsers/edge/web-app-compat-toolkit.md @@ -1,57 +1,58 @@ ---- -title: Web Application Compatibility lab kit -ms.reviewer: -audience: itpro manager: dansimp -description: Learn how to use the web application compatibility toolkit for Microsoft Edge. -ms.prod: edge -ms.topic: article -ms.manager: elizapo -author: eavena -ms.author: eravena -ms.localizationpriority: high ---- - -# Web Application Compatibility lab kit - ->Updated: October, 2017 - -Upgrading web applications to modern standards is the best long-term solution to ensure compatibility with today’s web browsers, but using backward compatibility can save time and money. Internet Explorer 11 has features that can ease your browser and operating system upgrades, reducing web application testing and remediation costs. On Windows 10, you can standardize on Microsoft Edge for faster, safer browsing and fall back to Internet Explorer 11 just for sites that need backward compatibility. - -The Web Application Compatibility Lab Kit is a primer for the features and techniques used to provide web application compatibility during a typical enterprise migration to Microsoft Edge. It walks you through how to configure and set up Enterprise Mode, leverage Enterprise Site Discovery, test web apps using the F12 developer tools, and manage the Enterprise Mode Site List. - -The Web Application Compatibility Lab Kit includes: - -- A pre-configured Windows 7 and Windows 10 virtual lab environment with: - - Windows 7 Enterprise Evaluation - - Windows 10 Enterprise Evaluation (version 1607) - - Enterprise Mode Site List Manager - - Enterprise Site Discovery Toolkit -- A "lite" lab option to run the lab on your own Windows 7 or Windows 10 operating system -- A step-by-step lab guide -- A web application compatibility overview video -- A white paper and IT Showcase studies - -Depending on your environment, your web apps may "just work” using the methods described below. Visit [Microsoft Edge Dev](https://developer.microsoft.com/microsoft-edge/) for tools and guidance for web developers. - -There are two versions of the lab kit available: - -- Full version (8 GB) - includes a complete virtual lab environment -- Lite version (400 MB) - includes guidance for running the Lab Kit on your own Windows 7 or Windows 10 operating system - -The Web Application Compatibility Lab Kit is also available in the following languages: - -- Chinese (Simplified) -- Chinese (Traditional) -- French -- German -- Italian -- Japanese -- Korean -- Portuguese (Brazil) -- Russian -- Spanish - -[DOWNLOAD THE LAB KIT](https://www.microsoft.com/evalcenter/evaluate-windows-10-web-application-compatibility-lab) - ->[!TIP] ->Please use a broad bandwidth to download this content to enhance your downloading experience. Lab environment requires 8 GB of available memory and 100 GB of free disk space. +--- +title: Web Application Compatibility lab kit +ms.reviewer: +audience: itpro +manager: dansimp +description: Learn how to use the web application compatibility toolkit for Microsoft Edge. +ms.prod: edge +ms.topic: article +ms.manager: dansimp +author: dansimp +ms.author: dansimp +ms.localizationpriority: high +--- + +# Web Application Compatibility lab kit + +>Updated: October, 2017 + +Upgrading web applications to modern standards is the best long-term solution to ensure compatibility with today’s web browsers, but using backward compatibility can save time and money. Internet Explorer 11 has features that can ease your browser and operating system upgrades, reducing web application testing and remediation costs. On Windows 10, you can standardize on Microsoft Edge for faster, safer browsing and fall back to Internet Explorer 11 just for sites that need backward compatibility. + +The Web Application Compatibility Lab Kit is a primer for the features and techniques used to provide web application compatibility during a typical enterprise migration to Microsoft Edge. It walks you through how to configure and set up Enterprise Mode, leverage Enterprise Site Discovery, test web apps using the F12 developer tools, and manage the Enterprise Mode Site List. + +The Web Application Compatibility Lab Kit includes: + +- A pre-configured Windows 7 and Windows 10 virtual lab environment with: + - Windows 7 Enterprise Evaluation + - Windows 10 Enterprise Evaluation (version 1607) + - Enterprise Mode Site List Manager + - Enterprise Site Discovery Toolkit +- A "lite" lab option to run the lab on your own Windows 7 or Windows 10 operating system +- A step-by-step lab guide +- A web application compatibility overview video +- A white paper and IT Showcase studies + +Depending on your environment, your web apps may "just work” using the methods described below. Visit [Microsoft Edge Dev](https://developer.microsoft.com/microsoft-edge/) for tools and guidance for web developers. + +There are two versions of the lab kit available: + +- Full version (8 GB) - includes a complete virtual lab environment +- Lite version (400 MB) - includes guidance for running the Lab Kit on your own Windows 7 or Windows 10 operating system + +The Web Application Compatibility Lab Kit is also available in the following languages: + +- Chinese (Simplified) +- Chinese (Traditional) +- French +- German +- Italian +- Japanese +- Korean +- Portuguese (Brazil) +- Russian +- Spanish + +[DOWNLOAD THE LAB KIT](https://www.microsoft.com/evalcenter/evaluate-windows-10-web-application-compatibility-lab) + +>[!TIP] +>Please use a broad bandwidth to download this content to enhance your downloading experience. Lab environment requires 8 GB of available memory and 100 GB of free disk space. diff --git a/browsers/enterprise-mode/add-employees-enterprise-mode-portal.md b/browsers/enterprise-mode/add-employees-enterprise-mode-portal.md index 6b9f2add8d..21d571b2f4 100644 --- a/browsers/enterprise-mode/add-employees-enterprise-mode-portal.md +++ b/browsers/enterprise-mode/add-employees-enterprise-mode-portal.md @@ -3,7 +3,7 @@ ms.localizationpriority: low ms.mktglfcycl: deploy ms.pagetype: appcompat description: Details about how to add employees to the Enterprise Mode Site List Portal. -author: eavena +author: dansimp ms.prod: ie11 title: Add employees to the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros) ms.sitesec: library diff --git a/browsers/enterprise-mode/add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md b/browsers/enterprise-mode/add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md index 5b336bc92e..b61f128515 100644 --- a/browsers/enterprise-mode/add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md +++ b/browsers/enterprise-mode/add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md @@ -3,7 +3,7 @@ ms.localizationpriority: low ms.mktglfcycl: deploy ms.pagetype: appcompat description: You can add multiple sites to your Enterprise Mode site list by creating a custom text (TXT) or Extensible Markup Language (XML) file of problematic sites and then adding it in the Bulk add from file area of the Enterprise Mode Site List Manager. -author: eavena +author: dansimp ms.prod: ie11 ms.assetid: 20aF07c4-051a-451f-9c46-5a052d9Ae27c ms.reviewer: diff --git a/browsers/enterprise-mode/add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md b/browsers/enterprise-mode/add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md index 7561149048..0d2acc3714 100644 --- a/browsers/enterprise-mode/add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md +++ b/browsers/enterprise-mode/add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md @@ -3,7 +3,7 @@ ms.localizationpriority: low ms.mktglfcycl: deploy ms.pagetype: appcompat description: Add multiple sites to your Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.2). -author: eavena +author: dansimp ms.prod: ie11 ms.assetid: da659ff5-70d5-4852-995e-4df67c4871dd ms.reviewer: diff --git a/browsers/enterprise-mode/add-single-sites-to-enterprise-mode-site-list-using-the-version-1-enterprise-mode-tool.md b/browsers/enterprise-mode/add-single-sites-to-enterprise-mode-site-list-using-the-version-1-enterprise-mode-tool.md index ccb69e9415..55b2dcd28a 100644 --- a/browsers/enterprise-mode/add-single-sites-to-enterprise-mode-site-list-using-the-version-1-enterprise-mode-tool.md +++ b/browsers/enterprise-mode/add-single-sites-to-enterprise-mode-site-list-using-the-version-1-enterprise-mode-tool.md @@ -3,12 +3,12 @@ ms.localizationpriority: low ms.mktglfcycl: deploy ms.pagetype: appcompat description: Enterprise Mode is a compatibility mode that runs on Internet Explorer 11, letting websites render using a modified browser configuration that's designed to emulate either Windows Internet Explorer 7 or Windows Internet Explorer 8, avoiding the common compatibility problems associated with web apps written and tested on older versions of Internet Explorer. -author: eavena +author: dansimp ms.prod: ie11 ms.assetid: 042e44e8-568d-4717-8fd3-69dd198bbf26 ms.reviewer: manager: dansimp -ms.author: eravena +ms.author: dansimp title: Add sites to the Enterprise Mode site list using the Enterprise Mode Site List Manager (schema v.1) (Internet Explorer 11 for IT Pros) ms.sitesec: library ms.date: 07/27/2017 diff --git a/browsers/enterprise-mode/add-single-sites-to-enterprise-mode-site-list-using-the-version-2-enterprise-mode-tool.md b/browsers/enterprise-mode/add-single-sites-to-enterprise-mode-site-list-using-the-version-2-enterprise-mode-tool.md index d07284e3b6..00f396d1d4 100644 --- a/browsers/enterprise-mode/add-single-sites-to-enterprise-mode-site-list-using-the-version-2-enterprise-mode-tool.md +++ b/browsers/enterprise-mode/add-single-sites-to-enterprise-mode-site-list-using-the-version-2-enterprise-mode-tool.md @@ -3,7 +3,7 @@ ms.localizationpriority: low ms.mktglfcycl: deploy ms.pagetype: appcompat description: Enterprise Mode is a compatibility mode that runs on Internet Explorer 11, letting websites render using a modified browser configuration that''s designed to emulate either Windows Internet Explorer 8 or Windows Internet Explorer 7, avoiding the common compatibility problems associated with web apps written and tested on older versions of Internet Explorer. -author: eavena +author: dansimp ms.prod: ie11 ms.assetid: 513e8f3b-fedf-4d57-8d81-1ea4fdf1ac0b ms.reviewer: diff --git a/browsers/enterprise-mode/administrative-templates-and-ie11.md b/browsers/enterprise-mode/administrative-templates-and-ie11.md index 48dceffb10..d92810ceb5 100644 --- a/browsers/enterprise-mode/administrative-templates-and-ie11.md +++ b/browsers/enterprise-mode/administrative-templates-and-ie11.md @@ -3,12 +3,12 @@ ms.localizationpriority: low ms.mktglfcycl: deploy ms.pagetype: security description: Administrative templates and Internet Explorer 11 -author: eavena +author: dansimp ms.prod: ie11 ms.assetid: 2b390786-f786-41cc-bddc-c55c8a4c5af3 ms.reviewer: manager: dansimp -ms.author: eravena +ms.author: dansimp title: Administrative templates and Internet Explorer 11 (Internet Explorer 11 for IT Pros) ms.sitesec: library ms.date: 07/27/2017 diff --git a/browsers/enterprise-mode/approve-change-request-enterprise-mode-portal.md b/browsers/enterprise-mode/approve-change-request-enterprise-mode-portal.md index 16c6da5049..fd58f63df5 100644 --- a/browsers/enterprise-mode/approve-change-request-enterprise-mode-portal.md +++ b/browsers/enterprise-mode/approve-change-request-enterprise-mode-portal.md @@ -3,14 +3,14 @@ ms.localizationpriority: low ms.mktglfcycl: deploy ms.pagetype: appcompat description: Details about how Approvers can approve open change requests in the Enterprise Mode Site List Portal. -author: eavena +author: dansimp ms.prod: ie11 title: Approve a change request using the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros) ms.sitesec: library ms.date: 07/27/2017 ms.reviewer: manager: dansimp -ms.author: eravena +ms.author: dansimp --- # Approve a change request using the Enterprise Mode Site List Portal diff --git a/browsers/enterprise-mode/check-for-new-enterprise-mode-site-list-xml-file.md b/browsers/enterprise-mode/check-for-new-enterprise-mode-site-list-xml-file.md index ad4f6bbe08..e59c5e151a 100644 --- a/browsers/enterprise-mode/check-for-new-enterprise-mode-site-list-xml-file.md +++ b/browsers/enterprise-mode/check-for-new-enterprise-mode-site-list-xml-file.md @@ -8,7 +8,7 @@ ms.prod: ie11 ms.mktglfcycl: deploy ms.pagetype: appcompat ms.sitesec: library -author: eavena +author: dansimp ms.author: eravena ms.date: 08/14/2017 ms.localizationpriority: low diff --git a/browsers/enterprise-mode/collect-data-using-enterprise-site-discovery.md b/browsers/enterprise-mode/collect-data-using-enterprise-site-discovery.md index 15560fccc7..64c7c36696 100644 --- a/browsers/enterprise-mode/collect-data-using-enterprise-site-discovery.md +++ b/browsers/enterprise-mode/collect-data-using-enterprise-site-discovery.md @@ -2,12 +2,12 @@ ms.localizationpriority: low ms.mktglfcycl: deploy description: Use Internet Explorer to collect data on computers running Windows Internet Explorer 8 through Internet Explorer 11 on Windows 10, Windows 8.1, or Windows 7. -author: eavena +author: dansimp ms.prod: ie11 ms.assetid: a145e80f-eb62-4116-82c4-3cc35fd064b6 ms.reviewer: manager: dansimp -ms.author: eravena +ms.author: dansimp title: Collect data using Enterprise Site Discovery ms.sitesec: library ms.date: 07/27/2017 diff --git a/browsers/enterprise-mode/configure-settings-enterprise-mode-portal.md b/browsers/enterprise-mode/configure-settings-enterprise-mode-portal.md index 070ab271f9..807cc8d2c8 100644 --- a/browsers/enterprise-mode/configure-settings-enterprise-mode-portal.md +++ b/browsers/enterprise-mode/configure-settings-enterprise-mode-portal.md @@ -3,14 +3,14 @@ ms.localizationpriority: low ms.mktglfcycl: deploy ms.pagetype: appcompat description: Details about how the Administrator can use the Settings page to set up Groups and roles, the Enterprise Mode Site List Portal environment, and the freeze dates for production changes. -author: eavena +author: dansimp ms.prod: ie11 title: Use the Settings page to finish setting up the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros) ms.sitesec: library ms.date: 07/27/2017 ms.reviewer: manager: dansimp -ms.author: eravena +ms.author: dansimp --- # Use the Settings page to finish setting up the Enterprise Mode Site List Portal diff --git a/browsers/enterprise-mode/create-change-request-enterprise-mode-portal.md b/browsers/enterprise-mode/create-change-request-enterprise-mode-portal.md index 99f9640e54..cbfc5f11b5 100644 --- a/browsers/enterprise-mode/create-change-request-enterprise-mode-portal.md +++ b/browsers/enterprise-mode/create-change-request-enterprise-mode-portal.md @@ -3,14 +3,14 @@ ms.localizationpriority: low ms.mktglfcycl: deploy ms.pagetype: appcompat description: Details about how to create a change request within the Enterprise Mode Site List Portal. -author: eavena +author: dansimp ms.prod: ie11 title: Create a change request using the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros) ms.sitesec: library ms.date: 07/27/2017 ms.reviewer: manager: dansimp -ms.author: eravena +ms.author: dansimp --- # Create a change request using the Enterprise Mode Site List Portal diff --git a/browsers/enterprise-mode/delete-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md b/browsers/enterprise-mode/delete-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md index 90cef488cc..ad225f2556 100644 --- a/browsers/enterprise-mode/delete-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md +++ b/browsers/enterprise-mode/delete-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md @@ -3,12 +3,12 @@ ms.localizationpriority: low description: Delete a single site from your global Enterprise Mode site list. ms.pagetype: appcompat ms.mktglfcycl: deploy -author: eavena +author: dansimp ms.prod: ie11 ms.assetid: 41413459-b57f-48da-aedb-4cbec1e2981a ms.reviewer: manager: dansimp -ms.author: eravena +ms.author: dansimp title: Delete sites from your Enterprise Mode site list in the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros) ms.sitesec: library ms.date: 07/27/2017 diff --git a/browsers/enterprise-mode/edit-the-enterprise-mode-site-list-using-the-enterprise-mode-site-list-manager.md b/browsers/enterprise-mode/edit-the-enterprise-mode-site-list-using-the-enterprise-mode-site-list-manager.md index 8a17c64622..403690d64f 100644 --- a/browsers/enterprise-mode/edit-the-enterprise-mode-site-list-using-the-enterprise-mode-site-list-manager.md +++ b/browsers/enterprise-mode/edit-the-enterprise-mode-site-list-using-the-enterprise-mode-site-list-manager.md @@ -3,12 +3,12 @@ ms.localizationpriority: low ms.mktglfcycl: deploy ms.pagetype: appcompat description: You can use Internet Explorer 11 and the Enterprise Mode Site List Manager to change whether page rendering should use Enterprise Mode or the default Internet Explorer browser configuration. You can also add, remove, or delete associated comments. -author: eavena +author: dansimp ms.prod: ie11 ms.assetid: 76aa9a85-6190-4c3a-bc25-0f914de228ea ms.reviewer: manager: dansimp -ms.author: eravena +ms.author: dansimp title: Edit the Enterprise Mode site list using the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros) ms.sitesec: library ms.date: 07/27/2017 diff --git a/browsers/enterprise-mode/enterprise-mode-overview-for-ie11.md b/browsers/enterprise-mode/enterprise-mode-overview-for-ie11.md index 9d297faa8d..ae103d5802 100644 --- a/browsers/enterprise-mode/enterprise-mode-overview-for-ie11.md +++ b/browsers/enterprise-mode/enterprise-mode-overview-for-ie11.md @@ -3,12 +3,12 @@ ms.localizationpriority: low ms.mktglfcycl: deploy ms.pagetype: appcompat description: Use the topics in this section to learn how to set up and use Enterprise Mode, Enterprise Mode Site List Manager, and the Enterprise Mode Site List Portal for your company. -author: eavena +author: dansimp ms.prod: ie11 ms.assetid: d52ba8ba-b3c7-4314-ba14-0610e1d8456e ms.reviewer: manager: dansimp -ms.author: eravena +ms.author: dansimp title: Enterprise Mode for Internet Explorer 11 (Internet Explorer 11 for IT Pros) ms.sitesec: library ms.date: 07/27/2017 diff --git a/browsers/enterprise-mode/enterprise-mode-schema-version-1-guidance.md b/browsers/enterprise-mode/enterprise-mode-schema-version-1-guidance.md index 503be19c75..634fd7cd91 100644 --- a/browsers/enterprise-mode/enterprise-mode-schema-version-1-guidance.md +++ b/browsers/enterprise-mode/enterprise-mode-schema-version-1-guidance.md @@ -3,12 +3,12 @@ ms.localizationpriority: low ms.mktglfcycl: deploy ms.pagetype: appcompat description: Use the Enterprise Mode Site List Manager to create and update your Enterprise Mode site list for devices running Windows 7 or Windows 8.1 Update. -author: eavena +author: dansimp ms.prod: ie11 ms.assetid: 17c61547-82e3-48f2-908d-137a71938823 ms.reviewer: manager: dansimp -ms.author: eravena +ms.author: dansimp title: Enterprise Mode schema v.1 guidance (Internet Explorer 11 for IT Pros) ms.sitesec: library ms.date: 07/27/2017 diff --git a/browsers/enterprise-mode/enterprise-mode-schema-version-2-guidance.md b/browsers/enterprise-mode/enterprise-mode-schema-version-2-guidance.md index 135d5914f0..70694a3df2 100644 --- a/browsers/enterprise-mode/enterprise-mode-schema-version-2-guidance.md +++ b/browsers/enterprise-mode/enterprise-mode-schema-version-2-guidance.md @@ -3,12 +3,12 @@ ms.localizationpriority: low ms.mktglfcycl: deploy ms.pagetype: appcompat description: Use the Enterprise Mode Site List Manager to create and update your Enterprise Mode site list for devices running Windows 10. -author: eavena +author: dansimp ms.prod: ie11 ms.assetid: 909ca359-5654-4df9-b9fb-921232fc05f5 ms.reviewer: manager: dansimp -ms.author: eravena +ms.author: dansimp title: Enterprise Mode schema v.2 guidance (Internet Explorer 11 for IT Pros) ms.sitesec: library ms.date: 12/04/2017 diff --git a/browsers/enterprise-mode/enterprise-mode.md b/browsers/enterprise-mode/enterprise-mode.md index 9e9f2933fe..30d32a8d1a 100644 --- a/browsers/enterprise-mode/enterprise-mode.md +++ b/browsers/enterprise-mode/enterprise-mode.md @@ -3,8 +3,8 @@ ms.localizationpriority: low ms.mktglfcycl: deploy ms.pagetype: security description: Use this section to learn about how to turn on Enterprise Mode. -author: eavena -ms.author: eravena +author: dansimp +ms.author: dansimp ms.prod: edge ms.assetid: ms.reviewer: diff --git a/browsers/enterprise-mode/export-your-enterprise-mode-site-list-from-the-enterprise-mode-site-list-manager.md b/browsers/enterprise-mode/export-your-enterprise-mode-site-list-from-the-enterprise-mode-site-list-manager.md index fe2074f29f..4f4cbb32bb 100644 --- a/browsers/enterprise-mode/export-your-enterprise-mode-site-list-from-the-enterprise-mode-site-list-manager.md +++ b/browsers/enterprise-mode/export-your-enterprise-mode-site-list-from-the-enterprise-mode-site-list-manager.md @@ -3,12 +3,12 @@ ms.localizationpriority: low ms.mktglfcycl: deploy ms.pagetype: appcompat description: After you create your Enterprise Mode site list in the Enterprise Mode Site List Manager, you can export the contents to an Enterprise Mode (.EMIE) file. -author: eavena +author: dansimp ms.prod: ie11 ms.assetid: 9ee7c13d-6fca-4446-bc22-d23a0213a95d ms.reviewer: manager: dansimp -ms.author: eravena +ms.author: dansimp title: Export your Enterprise Mode site list from the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros) ms.sitesec: library ms.date: 07/27/2017 diff --git a/browsers/enterprise-mode/remove-all-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md b/browsers/enterprise-mode/remove-all-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md index a0d0943e07..a1d5a8a76b 100644 --- a/browsers/enterprise-mode/remove-all-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md +++ b/browsers/enterprise-mode/remove-all-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md @@ -3,12 +3,12 @@ ms.localizationpriority: low ms.mktglfcycl: deploy ms.pagetype: appcompat description: Instructions about how to clear all of the sites from your global Enterprise Mode site list. -author: eavena +author: dansimp ms.prod: ie11 ms.assetid: 90f38a6c-e0e2-4c93-9a9e-c425eca99e97 ms.reviewer: manager: dansimp -ms.author: eravena +ms.author: dansimp title: Remove all sites from your Enterprise Mode site list using the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros) ms.sitesec: library ms.date: 07/27/2017 diff --git a/browsers/enterprise-mode/remove-sites-from-a-local-compatibililty-view-list.md b/browsers/enterprise-mode/remove-sites-from-a-local-compatibililty-view-list.md index 91bb223310..91ff0fab17 100644 --- a/browsers/enterprise-mode/remove-sites-from-a-local-compatibililty-view-list.md +++ b/browsers/enterprise-mode/remove-sites-from-a-local-compatibililty-view-list.md @@ -3,12 +3,12 @@ ms.localizationpriority: low ms.mktglfcycl: deploy ms.pagetype: appcompat description: Instructions about how to remove sites from a local compatibility view list. -author: eavena +author: dansimp ms.prod: ie11 ms.assetid: f6ecaa75-ebcb-4f8d-8721-4cd6e73c0ac9 ms.reviewer: manager: dansimp -ms.author: eravena +ms.author: dansimp title: Remove sites from a local compatibility view list (Internet Explorer 11 for IT Pros) ms.sitesec: library ms.date: 07/27/2017 diff --git a/browsers/enterprise-mode/remove-sites-from-a-local-enterprise-mode-site-list.md b/browsers/enterprise-mode/remove-sites-from-a-local-enterprise-mode-site-list.md index 5a278479ec..4e7e10efde 100644 --- a/browsers/enterprise-mode/remove-sites-from-a-local-enterprise-mode-site-list.md +++ b/browsers/enterprise-mode/remove-sites-from-a-local-enterprise-mode-site-list.md @@ -3,12 +3,12 @@ ms.localizationpriority: low ms.mktglfcycl: deploy ms.pagetype: appcompat description: Instructions about how to remove sites from a local Enterprise Mode site list. -author: eavena +author: dansimp ms.prod: ie11 ms.assetid: c7d6dd0b-e264-42bb-8c9d-ac2f837018d2 ms.reviewer: manager: dansimp -ms.author: eravena +ms.author: dansimp title: Remove sites from a local Enterprise Mode site list (Internet Explorer 11 for IT Pros) ms.sitesec: library ms.date: 07/27/2017 diff --git a/browsers/enterprise-mode/save-your-site-list-to-xml-in-the-enterprise-mode-site-list-manager.md b/browsers/enterprise-mode/save-your-site-list-to-xml-in-the-enterprise-mode-site-list-manager.md index 5019258eca..2cb578171f 100644 --- a/browsers/enterprise-mode/save-your-site-list-to-xml-in-the-enterprise-mode-site-list-manager.md +++ b/browsers/enterprise-mode/save-your-site-list-to-xml-in-the-enterprise-mode-site-list-manager.md @@ -3,12 +3,12 @@ ms.localizationpriority: low ms.mktglfcycl: deploy ms.pagetype: appcompat description: You can save your current Enterprise Mode compatibility site list as an XML file, for distribution and use by your managed systems. -author: eavena +author: dansimp ms.prod: ie11 ms.assetid: 254a986b-494f-4316-92c1-b089ee8b3e0a ms.reviewer: manager: dansimp -ms.author: eravena +ms.author: dansimp title: Save your site list to XML in the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros) ms.sitesec: library ms.date: 07/27/2017 diff --git a/browsers/enterprise-mode/schedule-production-change-enterprise-mode-portal.md b/browsers/enterprise-mode/schedule-production-change-enterprise-mode-portal.md index 455ae58820..c946663dda 100644 --- a/browsers/enterprise-mode/schedule-production-change-enterprise-mode-portal.md +++ b/browsers/enterprise-mode/schedule-production-change-enterprise-mode-portal.md @@ -3,14 +3,14 @@ ms.localizationpriority: low ms.mktglfcycl: deploy ms.pagetype: appcompat description: Details about how Administrators can schedule approved change requests for production in the Enterprise Mode Site List Portal. -author: eavena +author: dansimp ms.prod: ie11 title: Schedule approved change requests for production using the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros) ms.sitesec: library ms.date: 07/27/2017 ms.reviewer: manager: dansimp -ms.author: eravena +ms.author: dansimp --- # Schedule approved change requests for production using the Enterprise Mode Site List Portal diff --git a/browsers/enterprise-mode/search-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md b/browsers/enterprise-mode/search-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md index cebf4c013d..bf7e73664e 100644 --- a/browsers/enterprise-mode/search-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md +++ b/browsers/enterprise-mode/search-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md @@ -3,12 +3,12 @@ ms.localizationpriority: low ms.mktglfcycl: deploy ms.pagetype: appcompat description: Search to see if a specific site already appears in your global Enterprise Mode site list. -author: eavena +author: dansimp ms.prod: ie11 ms.assetid: e399aeaf-6c3b-4cad-93c9-813df6ad47f9 ms.reviewer: manager: dansimp -ms.author: eravena +ms.author: dansimp title: Search your Enterprise Mode site list in the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros) ms.sitesec: library ms.date: 07/27/2017 diff --git a/browsers/enterprise-mode/set-up-enterprise-mode-logging-and-data-collection.md b/browsers/enterprise-mode/set-up-enterprise-mode-logging-and-data-collection.md index 1be38336f5..47322f0c03 100644 --- a/browsers/enterprise-mode/set-up-enterprise-mode-logging-and-data-collection.md +++ b/browsers/enterprise-mode/set-up-enterprise-mode-logging-and-data-collection.md @@ -3,12 +3,12 @@ ms.localizationpriority: low ms.mktglfcycl: deploy ms.pagetype: appcompat description: Set up and turn on Enterprise Mode logging and data collection in your organization. -author: eavena +author: dansimp ms.prod: ie11 ms.assetid: 2e98a280-f677-422f-ba2e-f670362afcde ms.reviewer: manager: dansimp -ms.author: eravena +ms.author: dansimp title: Set up Enterprise Mode logging and data collection (Internet Explorer 11 for IT Pros) ms.sitesec: library ms.date: 07/27/2017 diff --git a/browsers/enterprise-mode/set-up-enterprise-mode-portal.md b/browsers/enterprise-mode/set-up-enterprise-mode-portal.md index c69c8bd895..21efc17c35 100644 --- a/browsers/enterprise-mode/set-up-enterprise-mode-portal.md +++ b/browsers/enterprise-mode/set-up-enterprise-mode-portal.md @@ -3,14 +3,14 @@ ms.localizationpriority: low ms.mktglfcycl: deploy ms.pagetype: appcompat description: Details about how to set up the Enterprise Mode Site List Portal for your organization. -author: eavena +author: dansimp ms.prod: ie11 title: Set up the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros) ms.sitesec: library ms.date: 07/27/2017 ms.reviewer: manager: dansimp -ms.author: eravena +ms.author: dansimp --- # Set up the Enterprise Mode Site List Portal diff --git a/browsers/enterprise-mode/turn-off-enterprise-mode.md b/browsers/enterprise-mode/turn-off-enterprise-mode.md index ce1f04eaa1..d34ccca8ce 100644 --- a/browsers/enterprise-mode/turn-off-enterprise-mode.md +++ b/browsers/enterprise-mode/turn-off-enterprise-mode.md @@ -3,12 +3,12 @@ ms.localizationpriority: low ms.mktglfcycl: deploy ms.pagetype: appcompat description: How to turn Enterprise Mode off temporarily while testing websites and how to turn it off completely if you no longer want to to use it. -author: eavena +author: dansimp ms.prod: ie11 ms.assetid: 5027c163-71e0-49b8-9dc0-f0a7310c7ae3 ms.reviewer: manager: dansimp -ms.author: eravena +ms.author: dansimp title: Turn off Enterprise Mode (Internet Explorer 11 for IT Pros) ms.sitesec: library ms.date: 07/27/2017 diff --git a/browsers/enterprise-mode/turn-on-local-control-and-logging-for-enterprise-mode.md b/browsers/enterprise-mode/turn-on-local-control-and-logging-for-enterprise-mode.md index a8e5413241..b34f9be63f 100644 --- a/browsers/enterprise-mode/turn-on-local-control-and-logging-for-enterprise-mode.md +++ b/browsers/enterprise-mode/turn-on-local-control-and-logging-for-enterprise-mode.md @@ -3,12 +3,12 @@ ms.localizationpriority: low ms.mktglfcycl: deploy ms.pagetype: appcompat description: Turn on local user control and logging for Enterprise Mode. -author: eavena +author: dansimp ms.prod: ie11 ms.assetid: 6622ecce-24b1-497e-894a-e1fd5a8a66d1 ms.reviewer: manager: dansimp -ms.author: eravena +ms.author: dansimp title: Turn on local control and logging for Enterprise Mode (Internet Explorer 11 for IT Pros) ms.sitesec: library ms.date: 07/27/2017 diff --git a/browsers/enterprise-mode/use-the-enterprise-mode-portal.md b/browsers/enterprise-mode/use-the-enterprise-mode-portal.md index 2b3d7225f2..010448c58d 100644 --- a/browsers/enterprise-mode/use-the-enterprise-mode-portal.md +++ b/browsers/enterprise-mode/use-the-enterprise-mode-portal.md @@ -9,8 +9,8 @@ ms.sitesec: library ms.date: 07/27/2017 ms.reviewer: manager: dansimp -ms.author: eravena -author: eavena +ms.author: dansimp +author: dansimp --- # Use the Enterprise Mode Site List Portal diff --git a/browsers/enterprise-mode/use-the-enterprise-mode-site-list-manager.md b/browsers/enterprise-mode/use-the-enterprise-mode-site-list-manager.md index bcef67f64d..f68c42ca3c 100644 --- a/browsers/enterprise-mode/use-the-enterprise-mode-site-list-manager.md +++ b/browsers/enterprise-mode/use-the-enterprise-mode-site-list-manager.md @@ -3,12 +3,12 @@ ms.localizationpriority: low ms.mktglfcycl: deploy ms.pagetype: appcompat description: Use the topics in this section to learn about how to use the Enterprise Mode Site List Manager. -author: eavena +author: dansimp ms.prod: ie11 ms.assetid: f4dbed4c-08ff-40b1-ab3f-60d3b6e8ec9b ms.reviewer: manager: dansimp -ms.author: eravena +ms.author: dansimp title: Use the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros) ms.sitesec: library ms.date: 12/04/2017 diff --git a/browsers/enterprise-mode/using-enterprise-mode.md b/browsers/enterprise-mode/using-enterprise-mode.md index 79575fbf26..c6f3e6048e 100644 --- a/browsers/enterprise-mode/using-enterprise-mode.md +++ b/browsers/enterprise-mode/using-enterprise-mode.md @@ -3,12 +3,12 @@ ms.localizationpriority: low ms.mktglfcycl: deploy ms.pagetype: security description: Use this section to learn about how to turn on and use IE7 Enterprise Mode or IE8 Enterprise Mode. -author: eavena +author: dansimp ms.prod: ie11 ms.assetid: 238ead3d-8920-429a-ac23-02f089c4384a ms.reviewer: manager: dansimp -ms.author: eravena +ms.author: dansimp title: Using IE7 Enterprise Mode or IE8 Enterprise Mode (Internet Explorer 11 for IT Pros) ms.sitesec: library ms.date: 07/27/2017 diff --git a/browsers/enterprise-mode/verify-changes-preprod-enterprise-mode-portal.md b/browsers/enterprise-mode/verify-changes-preprod-enterprise-mode-portal.md index e003e6bc01..a72f720a3f 100644 --- a/browsers/enterprise-mode/verify-changes-preprod-enterprise-mode-portal.md +++ b/browsers/enterprise-mode/verify-changes-preprod-enterprise-mode-portal.md @@ -3,14 +3,14 @@ ms.localizationpriority: low ms.mktglfcycl: deploy ms.pagetype: appcompat description: Details about how to make sure your change request info is accurate within the pre-production environment of the Enterprise Mode Site List Portal. -author: eavena +author: dansimp ms.prod: ie11 title: Verify your changes using the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros) ms.sitesec: library ms.date: 07/27/2017 ms.reviewer: manager: dansimp -ms.author: eravena +ms.author: dansimp --- # Verify your changes using the Enterprise Mode Site List Portal diff --git a/browsers/enterprise-mode/verify-changes-production-enterprise-mode-portal.md b/browsers/enterprise-mode/verify-changes-production-enterprise-mode-portal.md index 5751efc6ef..8387697841 100644 --- a/browsers/enterprise-mode/verify-changes-production-enterprise-mode-portal.md +++ b/browsers/enterprise-mode/verify-changes-production-enterprise-mode-portal.md @@ -3,14 +3,14 @@ ms.localizationpriority: low ms.mktglfcycl: deploy ms.pagetype: appcompat description: Details about how the Requester makes sure that the change request update is accurate within the production environment using the Enterprise Mode Site List Portal. -author: eavena +author: dansimp ms.prod: ie11 title: Verify the change request update in the production environment using the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros) ms.sitesec: library ms.date: 07/27/2017 ms.reviewer: manager: dansimp -ms.author: eravena +ms.author: dansimp --- # Verify the change request update in the production environment using the Enterprise Mode Site List Portal diff --git a/browsers/enterprise-mode/view-apps-enterprise-mode-site-list.md b/browsers/enterprise-mode/view-apps-enterprise-mode-site-list.md index f81d244053..6ae2c865ea 100644 --- a/browsers/enterprise-mode/view-apps-enterprise-mode-site-list.md +++ b/browsers/enterprise-mode/view-apps-enterprise-mode-site-list.md @@ -3,14 +3,14 @@ ms.localizationpriority: low ms.mktglfcycl: deploy ms.pagetype: appcompat description: Details about how to view the active Enterprise Mode Site List from the Enterprise Mode Site List Portal. -author: eavena +author: dansimp ms.prod: ie11 title: View the apps included in the active Enterprise Mode Site List from the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros) ms.sitesec: library ms.date: 07/27/2017 ms.reviewer: manager: dansimp -ms.author: eravena +ms.author: dansimp --- # View the apps included in the active Enterprise Mode Site List from the Enterprise Mode Site List Portal diff --git a/browsers/internet-explorer/ie11-deploy-guide/configure-settings-enterprise-mode-portal.md b/browsers/internet-explorer/ie11-deploy-guide/configure-settings-enterprise-mode-portal.md index 502c425b80..d01fccf729 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/configure-settings-enterprise-mode-portal.md +++ b/browsers/internet-explorer/ie11-deploy-guide/configure-settings-enterprise-mode-portal.md @@ -1,97 +1,98 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: appcompat -description: Details about how the Administrator can use the Settings page to set up Groups and roles, the Enterprise Mode Site List Portal environment, and the freeze dates for production changes. -author: lomayor -ms.prod: ie11 -title: Use the Settings page to finish setting up the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor ---- - -# Use the Settings page to finish setting up the Enterprise Mode Site List Portal - -**Applies to:** - -- Windows 10 -- Windows 8.1 -- Windows 7 -- Windows Server 2012 R2 -- Windows Server 2008 R2 with Service Pack 1 (SP1) - -The **Settings** page lets anyone with Administrator rights set up groups and roles, set up the Enterprise Mode Site List Portal environment, and choose the freeze dates for production changes. - -## Use the Environment settings area -This area lets you specify the location of your production and pre-production environments, where to store your attachments, your settings location, and the website domain for email notifications. - -**To add location info** -1. Open the Enterprise Mode Site List Portal and click the **Settings** icon in the upper-right area of the page. - - The **Settings** page appears. - -2. In the **Environment settings** area of the page, provide the info for your **Pre-production environment**, your **Production environment**, your **Attachments location**, your **Settings location**, and your **Website domain for email notifications**. - -3. Click **Credentials** to add the appropriate domain, user name, and password for each location, and then click **OK**. - -## Use the Group and role settings area -After you set up your email credentials, you'll be able to add or edit your Group info, along with picking which roles must be Approvers for the group. - -**To add a new group and determine the required change request Approvers** -1. Open the Enterprise Mode Site List Portal and click the **Settings** icon in the upper-right area of the page. - - The **Settings** page appears. - -2. In the **Group and role settings** area of the page, click **Group details**. - - The **Add or edit group names** box appears. - -3. Click the **Add group** tab, and then add the following info: - - - **New group name.** Type name of your new group. - - - **Group head email.** Type the email address for the primary contact for the group. - - - **Group head name.** This box automatically fills, based on the email address. - - - **Active.** Click the check box to make the group active in the system. If you want to keep the group in the system, but you want to prevent access, clear this check box. - -4. Click **Save**. - - -**To set a group's required Approvers** -1. In the **Group and role settings** area of the page, choose the group name you want to update with Approvers from the **Group name** box. - -2. In the **Required approvers** area, choose which roles are required to approve a change request for the group. You can choose one or many roles. - - - **App Manager.** All employees in the selected group must get change request approval by someone assigned this role. - - You can change the name of this role by clicking the pencil icon and providing a new name in the **Edit role name** box. - - - **Group Head.** All employees in the selected group must get change request approval by someone assigned this role. - - You can change the name of this role by clicking the pencil icon and providing a new name in the **Edit role name** box. - - - **Administrator.** All employees in the selected group must get change request approval by someone assigned this role. - -## Use the Freeze production changes area -This optional area lets you specify a period when your employees must stop adding changes to the current Enterprise Mode Site List. This must include both a start and an end date. - -**To add the start and end dates** -1. Open the Enterprise Mode Site List Portal and click the **Settings** icon in the upper-right area of the page. - - The **Settings** page appears. - -2. In the **Freeze production changes** area of the page, use the calendars to provide the **Freeze start date** and the **Freeze end date**. Your employees can't add apps to the production Enterprise Mode Site List during this span of time. - -3. Click **Save**. - -## Related topics -- [Enterprise Mode Site List Portal source code](https://github.com/MicrosoftEdge/enterprise-mode-site-list-portal) - -- [Enterprise Mode and the Enterprise Mode Site List](what-is-enterprise-mode.md) - -- [Use the Enterprise Mode Site List Manager tool or page](use-the-enterprise-mode-site-list-manager.md) +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: appcompat +description: Details about how the Administrator can use the Settings page to set up Groups and roles, the Enterprise Mode Site List Portal environment, and the freeze dates for production changes. +author: dansimp +ms.prod: ie11 +title: Use the Settings page to finish setting up the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +--- + +# Use the Settings page to finish setting up the Enterprise Mode Site List Portal + +**Applies to:** + +- Windows 10 +- Windows 8.1 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2008 R2 with Service Pack 1 (SP1) + +The **Settings** page lets anyone with Administrator rights set up groups and roles, set up the Enterprise Mode Site List Portal environment, and choose the freeze dates for production changes. + +## Use the Environment settings area +This area lets you specify the location of your production and pre-production environments, where to store your attachments, your settings location, and the website domain for email notifications. + +**To add location info** +1. Open the Enterprise Mode Site List Portal and click the **Settings** icon in the upper-right area of the page. + + The **Settings** page appears. + +2. In the **Environment settings** area of the page, provide the info for your **Pre-production environment**, your **Production environment**, your **Attachments location**, your **Settings location**, and your **Website domain for email notifications**. + +3. Click **Credentials** to add the appropriate domain, user name, and password for each location, and then click **OK**. + +## Use the Group and role settings area +After you set up your email credentials, you'll be able to add or edit your Group info, along with picking which roles must be Approvers for the group. + +**To add a new group and determine the required change request Approvers** +1. Open the Enterprise Mode Site List Portal and click the **Settings** icon in the upper-right area of the page. + + The **Settings** page appears. + +2. In the **Group and role settings** area of the page, click **Group details**. + + The **Add or edit group names** box appears. + +3. Click the **Add group** tab, and then add the following info: + + - **New group name.** Type name of your new group. + + - **Group head email.** Type the email address for the primary contact for the group. + + - **Group head name.** This box automatically fills, based on the email address. + + - **Active.** Click the check box to make the group active in the system. If you want to keep the group in the system, but you want to prevent access, clear this check box. + +4. Click **Save**. + + +**To set a group's required Approvers** +1. In the **Group and role settings** area of the page, choose the group name you want to update with Approvers from the **Group name** box. + +2. In the **Required approvers** area, choose which roles are required to approve a change request for the group. You can choose one or many roles. + + - **App Manager.** All employees in the selected group must get change request approval by someone assigned this role. + + You can change the name of this role by clicking the pencil icon and providing a new name in the **Edit role name** box. + + - **Group Head.** All employees in the selected group must get change request approval by someone assigned this role. + + You can change the name of this role by clicking the pencil icon and providing a new name in the **Edit role name** box. + + - **Administrator.** All employees in the selected group must get change request approval by someone assigned this role. + +## Use the Freeze production changes area +This optional area lets you specify a period when your employees must stop adding changes to the current Enterprise Mode Site List. This must include both a start and an end date. + +**To add the start and end dates** +1. Open the Enterprise Mode Site List Portal and click the **Settings** icon in the upper-right area of the page. + + The **Settings** page appears. + +2. In the **Freeze production changes** area of the page, use the calendars to provide the **Freeze start date** and the **Freeze end date**. Your employees can't add apps to the production Enterprise Mode Site List during this span of time. + +3. Click **Save**. + +## Related topics +- [Enterprise Mode Site List Portal source code](https://github.com/MicrosoftEdge/enterprise-mode-site-list-portal) + +- [Enterprise Mode and the Enterprise Mode Site List](what-is-enterprise-mode.md) + +- [Use the Enterprise Mode Site List Manager tool or page](use-the-enterprise-mode-site-list-manager.md) diff --git a/browsers/internet-explorer/ie11-deploy-guide/create-change-request-enterprise-mode-portal.md b/browsers/internet-explorer/ie11-deploy-guide/create-change-request-enterprise-mode-portal.md index 24e93d73e5..d15192b9d3 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/create-change-request-enterprise-mode-portal.md +++ b/browsers/internet-explorer/ie11-deploy-guide/create-change-request-enterprise-mode-portal.md @@ -1,73 +1,74 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: appcompat -description: Details about how to create a change request within the Enterprise Mode Site List Portal. -author: lomayor -ms.prod: ie11 -title: Create a change request using the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor ---- - -# Create a change request using the Enterprise Mode Site List Portal - -**Applies to:** - -- Windows 10 -- Windows 8.1 -- Windows 7 -- Windows Server 2012 R2 -- Windows Server 2008 R2 with Service Pack 1 (SP1) - -Employees assigned to the Requester role can create a change request. A change request is used to tell the Approvers and the Administrator that a website needs to be added or removed from the Enterprise Mode Site List. The employee can navigate to each stage of the process by using the workflow links provided at the top of each page of the portal. - ->[!Important] ->Each Requester must have access to a test machine with Administrator rights, letting him or her get to the pre-production environment to make sure that the requested change is correct. - -**To create a new change request** -1. The Requester (an employee that has been assigned the Requester role) signs into the Enterprise Mode Site List Portal, and clicks **Create new request**. - - The **Create new request** page appears. - -2. Fill out the required fields, based on the group and the app, including: - - - **Group name.** Select the name of your group from the dropdown box. - - - **App name.** Type the name of the app you want to add, delete, or update in the Enterprise Mode Site List. - - - **Search all apps.** If you can't remember the name of your app, you can click **Search all apps** and search the list. - - - **Add new app.** If your app isn't listed, you can click **Add new app** to add it to the list. - - - **Requested by.** Automatically filled in with your name. - - - **Description.** Add descriptive info about the app. - - - **Requested change.** Select whether you want to **Add to EMIE**, **Delete from EMIE**, or **Update to EMIE**. - - - **Reason for request.** Select the best reason for why you want to update, delete, or add the app. - - - **Business impact (optional).** An optional area where you can provide info about the business impact of this app and the change. - - - **App location (URL).** The full URL location to the app, starting with https:// or https://. - - - **App best viewed in.** Select the best browser experience for the app. This can be Internet Explorer 5 through Internet Explorer 11 or one of the IE7Enterprise or IE8Enterprise modes. - - - **Is an x-ua tag used?** Select **Yes** or **No** whether an x-ua-compatible tag is used by the app. For more info about x-ua-compatible tags, see the topics in [Defining document compatibility](https://msdn.microsoft.com/library/cc288325(v=vs.85).aspx). - -4. Click **Save and continue** to save the request and get the app info sent to the pre-production environment site list for testing. - - A message appears that the request was successful, including a **Request ID** number, saying that the change is being made to the pre-production environment site list. - -5. The Requester gets an email with a batch script, that when run, configures their test machine for the pre-production environment, along with the necessary steps to make sure the changed info is correct. - - - **If the change is correct.** The Requester asks the approvers to approve the change request by selecting **Successful** and clicking **Send for approval**. - - - **If the change is incorrect.** The Requester can rollback the change in pre-production or ask for help from the Administrator. - -## Next steps -After the change request is created, the Requester must make sure the suggested changes work in the pre-production environment. For these steps, see the [Verify your changes using the Enterprise Mode Site List Portal](verify-changes-preprod-enterprise-mode-portal.md) topic. +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: appcompat +description: Details about how to create a change request within the Enterprise Mode Site List Portal. +author: dansimp +ms.prod: ie11 +title: Create a change request using the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +--- + +# Create a change request using the Enterprise Mode Site List Portal + +**Applies to:** + +- Windows 10 +- Windows 8.1 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2008 R2 with Service Pack 1 (SP1) + +Employees assigned to the Requester role can create a change request. A change request is used to tell the Approvers and the Administrator that a website needs to be added or removed from the Enterprise Mode Site List. The employee can navigate to each stage of the process by using the workflow links provided at the top of each page of the portal. + +>[!Important] +>Each Requester must have access to a test machine with Administrator rights, letting him or her get to the pre-production environment to make sure that the requested change is correct. + +**To create a new change request** +1. The Requester (an employee that has been assigned the Requester role) signs into the Enterprise Mode Site List Portal, and clicks **Create new request**. + + The **Create new request** page appears. + +2. Fill out the required fields, based on the group and the app, including: + + - **Group name.** Select the name of your group from the dropdown box. + + - **App name.** Type the name of the app you want to add, delete, or update in the Enterprise Mode Site List. + + - **Search all apps.** If you can't remember the name of your app, you can click **Search all apps** and search the list. + + - **Add new app.** If your app isn't listed, you can click **Add new app** to add it to the list. + + - **Requested by.** Automatically filled in with your name. + + - **Description.** Add descriptive info about the app. + + - **Requested change.** Select whether you want to **Add to EMIE**, **Delete from EMIE**, or **Update to EMIE**. + + - **Reason for request.** Select the best reason for why you want to update, delete, or add the app. + + - **Business impact (optional).** An optional area where you can provide info about the business impact of this app and the change. + + - **App location (URL).** The full URL location to the app, starting with https:// or https://. + + - **App best viewed in.** Select the best browser experience for the app. This can be Internet Explorer 5 through Internet Explorer 11 or one of the IE7Enterprise or IE8Enterprise modes. + + - **Is an x-ua tag used?** Select **Yes** or **No** whether an x-ua-compatible tag is used by the app. For more info about x-ua-compatible tags, see the topics in [Defining document compatibility](https://msdn.microsoft.com/library/cc288325(v=vs.85).aspx). + +4. Click **Save and continue** to save the request and get the app info sent to the pre-production environment site list for testing. + + A message appears that the request was successful, including a **Request ID** number, saying that the change is being made to the pre-production environment site list. + +5. The Requester gets an email with a batch script, that when run, configures their test machine for the pre-production environment, along with the necessary steps to make sure the changed info is correct. + + - **If the change is correct.** The Requester asks the approvers to approve the change request by selecting **Successful** and clicking **Send for approval**. + + - **If the change is incorrect.** The Requester can rollback the change in pre-production or ask for help from the Administrator. + +## Next steps +After the change request is created, the Requester must make sure the suggested changes work in the pre-production environment. For these steps, see the [Verify your changes using the Enterprise Mode Site List Portal](verify-changes-preprod-enterprise-mode-portal.md) topic. diff --git a/browsers/internet-explorer/ie11-deploy-guide/create-install-packages-for-multiple-operating-systems-or-languages.md b/browsers/internet-explorer/ie11-deploy-guide/create-install-packages-for-multiple-operating-systems-or-languages.md index c69b357557..6c260e93aa 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/create-install-packages-for-multiple-operating-systems-or-languages.md +++ b/browsers/internet-explorer/ie11-deploy-guide/create-install-packages-for-multiple-operating-systems-or-languages.md @@ -1,43 +1,44 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: Create packages for multiple operating systems or languages -author: lomayor -ms.prod: ie11 -ms.assetid: 44051f9d-63a7-43bf-a427-d0a0a1c717da -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Create packages for multiple operating systems or languages (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Create packages for multiple operating systems or languages -You'll create multiple versions of your custom browser package if: - -- You support more than 1 version of Windows®. - -- You support more than 1 language. - -- You have custom installation packages with only minor differences. Like, having a different phone number. - - **To create a new package** - -1. Create an installation package using the Internet Explorer Customization Wizard 11, as described in the [Internet Explorer Administration Kit 11 (IEAK 11) Customization Wizard options](../ie11-ieak/ieak11-wizard-custom-options.md) topic. - -2. Go to your **CIE/Custom** folder and rename the `Install.ins`file. For example, if you need a version for employees in Texas, rename the file to Texas.ins. - -3. Run the wizard again, using the Custom folder as the destination directory.

-**Important**
-Except for the **Title bar** text, **Favorites**, **Links bar**, **Home page**, and **Search bar**, keep all of your wizard settings the same for all of your build computers. - - - - - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: Create packages for multiple operating systems or languages +author: dansimp +ms.prod: ie11 +ms.assetid: 44051f9d-63a7-43bf-a427-d0a0a1c717da +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Create packages for multiple operating systems or languages (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Create packages for multiple operating systems or languages +You'll create multiple versions of your custom browser package if: + +- You support more than 1 version of Windows®. + +- You support more than 1 language. + +- You have custom installation packages with only minor differences. Like, having a different phone number. + + **To create a new package** + +1. Create an installation package using the Internet Explorer Customization Wizard 11, as described in the [Internet Explorer Administration Kit 11 (IEAK 11) Customization Wizard options](../ie11-ieak/ieak11-wizard-custom-options.md) topic. + +2. Go to your **CIE/Custom** folder and rename the `Install.ins`file. For example, if you need a version for employees in Texas, rename the file to Texas.ins. + +3. Run the wizard again, using the Custom folder as the destination directory.

+**Important**
+Except for the **Title bar** text, **Favorites**, **Links bar**, **Home page**, and **Search bar**, keep all of your wizard settings the same for all of your build computers. + + + + + + + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/customize-ie11-install-packages.md b/browsers/internet-explorer/ie11-deploy-guide/customize-ie11-install-packages.md index d5ebc1d49f..fc43585ae7 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/customize-ie11-install-packages.md +++ b/browsers/internet-explorer/ie11-deploy-guide/customize-ie11-install-packages.md @@ -1,44 +1,45 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: Customize Internet Explorer 11 installation packages -author: lomayor -ms.prod: ie11 -ms.assetid: 10a14a09-673b-4f8b-8d12-64036135e7fd -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Customize Internet Explorer 11 installation packages (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Customize Internet Explorer 11 installation packages -You can customize Internet Explorer 11 to support various browser behaviors, multiple operating system versions and languages, and Setup information (.inf) files. - -|Topic |Description | -|------------------------------------------------------------------------|----------------------------------------------------| -|[Using IEAK 11 to create packages](using-ieak11-to-create-install-packages.md) |How to use the Internet Explorer Administration Kit 11 (IEAK 11) and the IE Customization Wizard 11 to set up, configure, deploy, and maintain IE11. | -|[Create packages for multiple operating systems or languages](create-install-packages-for-multiple-operating-systems-or-languages.md) |How to create multiple versions of your custom installation package, to support multiple operating systems or languages. | -|[Using .INF files to create packages](using-inf-files-to-create-install-packages.md) |How to use the Microsoft® Windows Setup Engine to automate setup tasks and customize your component installations. | - - - -In addition, you can configure IE before, during, or after deployment, using these tools: - -- **IE Administration Kit 11 (IEAK 11)**. Creates customized installation packages that can be deployed through your software distribution system. For more information about the IEAK 11, see [Internet Explorer Administration Kit 11 (IEAK 11) - Administration Guide for IT Pros](../ie11-ieak/index.md). - -- **Group Policy**. Configures and enforces IE11 settings. For more information about settings and configuration options, see [Group policy objects and Internet Explorer 11 (IE11)](group-policy-objects-and-ie11.md). - -- **Unattend.xml**. Customizes some of the IE settings during your Windows installation. This option only applies if you're updating a Windows image with IE11.

**Note**
-You'll only see the new IE11 Unattend.xml settings if your Unattend.xml file's associated with a Windows image that includes the IE11 update. For more information about editing and using the Unattend.xml file, see [Unattended Windows Setup Reference](https://go.microsoft.com/fwlink/p/?LinkId=276788). For more information about using the Windows System Image Manager, see [Windows System Image Manager Technical Reference](https://go.microsoft.com/fwlink/p/?LinkId=276789). - -   - -  - -  - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: Customize Internet Explorer 11 installation packages +author: dansimp +ms.prod: ie11 +ms.assetid: 10a14a09-673b-4f8b-8d12-64036135e7fd +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Customize Internet Explorer 11 installation packages (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Customize Internet Explorer 11 installation packages +You can customize Internet Explorer 11 to support various browser behaviors, multiple operating system versions and languages, and Setup information (.inf) files. + +|Topic |Description | +|------------------------------------------------------------------------|----------------------------------------------------| +|[Using IEAK 11 to create packages](using-ieak11-to-create-install-packages.md) |How to use the Internet Explorer Administration Kit 11 (IEAK 11) and the IE Customization Wizard 11 to set up, configure, deploy, and maintain IE11. | +|[Create packages for multiple operating systems or languages](create-install-packages-for-multiple-operating-systems-or-languages.md) |How to create multiple versions of your custom installation package, to support multiple operating systems or languages. | +|[Using .INF files to create packages](using-inf-files-to-create-install-packages.md) |How to use the Microsoft® Windows Setup Engine to automate setup tasks and customize your component installations. | + + + +In addition, you can configure IE before, during, or after deployment, using these tools: + +- **IE Administration Kit 11 (IEAK 11)**. Creates customized installation packages that can be deployed through your software distribution system. For more information about the IEAK 11, see [Internet Explorer Administration Kit 11 (IEAK 11) - Administration Guide for IT Pros](../ie11-ieak/index.md). + +- **Group Policy**. Configures and enforces IE11 settings. For more information about settings and configuration options, see [Group policy objects and Internet Explorer 11 (IE11)](group-policy-objects-and-ie11.md). + +- **Unattend.xml**. Customizes some of the IE settings during your Windows installation. This option only applies if you're updating a Windows image with IE11.

**Note**
+You'll only see the new IE11 Unattend.xml settings if your Unattend.xml file's associated with a Windows image that includes the IE11 update. For more information about editing and using the Unattend.xml file, see [Unattended Windows Setup Reference](https://go.microsoft.com/fwlink/p/?LinkId=276788). For more information about using the Windows System Image Manager, see [Windows System Image Manager Technical Reference](https://go.microsoft.com/fwlink/p/?LinkId=276789). + +   + +  + +  + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/delete-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md b/browsers/internet-explorer/ie11-deploy-guide/delete-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md index 71d871cad1..e06c6cf34d 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/delete-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md +++ b/browsers/internet-explorer/ie11-deploy-guide/delete-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md @@ -1,49 +1,50 @@ ---- -ms.localizationpriority: medium -description: Delete a single site from your global Enterprise Mode site list. -ms.pagetype: appcompat -ms.mktglfcycl: deploy -author: lomayor -ms.prod: ie11 -ms.assetid: 41413459-b57f-48da-aedb-4cbec1e2981a -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Delete sites from your Enterprise Mode site list in the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Delete sites from your Enterprise Mode site list in the Enterprise Mode Site List Manager - -**Applies to:** - -- Windows 10 -- Windows 8.1 -- Windows 7 -- Windows Server 2012 R2 -- Windows Server 2008 R2 with Service Pack 1 (SP1) - - - **To delete a single site from your global Enterprise Mode site list** - -- From the Enterprise Mode Site List Manager, pick the site you want to delete, and then click **Delete**.
-The site is permanently removed from your list. - -If you delete a site by mistake, you’ll need to manually add it back using the instructions in the following topics, based on operating system. - -- [Add sites to the Enterprise Mode site list using the Enterprise Mode Site List Manager (schema v.2)](add-single-sites-to-enterprise-mode-site-list-using-the-version-2-enterprise-mode-tool.md) - -- [Add sites to the Enterprise Mode site list using the Enterprise Mode Site List Manager (schema v.1)](add-single-sites-to-enterprise-mode-site-list-using-the-version-1-enterprise-mode-tool.md) - -## Related topics -- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853) -- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378) -- [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) -  - -  - - - +--- +ms.localizationpriority: medium +description: Delete a single site from your global Enterprise Mode site list. +ms.pagetype: appcompat +ms.mktglfcycl: deploy +author: dansimp +ms.prod: ie11 +ms.assetid: 41413459-b57f-48da-aedb-4cbec1e2981a +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: lomayor +title: Delete sites from your Enterprise Mode site list in the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Delete sites from your Enterprise Mode site list in the Enterprise Mode Site List Manager + +**Applies to:** + +- Windows 10 +- Windows 8.1 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2008 R2 with Service Pack 1 (SP1) + + + **To delete a single site from your global Enterprise Mode site list** + +- From the Enterprise Mode Site List Manager, pick the site you want to delete, and then click **Delete**.
+The site is permanently removed from your list. + +If you delete a site by mistake, you’ll need to manually add it back using the instructions in the following topics, based on operating system. + +- [Add sites to the Enterprise Mode site list using the Enterprise Mode Site List Manager (schema v.2)](add-single-sites-to-enterprise-mode-site-list-using-the-version-2-enterprise-mode-tool.md) + +- [Add sites to the Enterprise Mode site list using the Enterprise Mode Site List Manager (schema v.1)](add-single-sites-to-enterprise-mode-site-list-using-the-version-1-enterprise-mode-tool.md) + +## Related topics +- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853) +- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378) +- [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) +  + +  + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/deploy-ie11-using-automatic-version-synchronization-avs.md b/browsers/internet-explorer/ie11-deploy-guide/deploy-ie11-using-automatic-version-synchronization-avs.md index 21baca9a6b..b9089ee16a 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/deploy-ie11-using-automatic-version-synchronization-avs.md +++ b/browsers/internet-explorer/ie11-deploy-guide/deploy-ie11-using-automatic-version-synchronization-avs.md @@ -1,35 +1,36 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: You can deploy Internet Explorer 11 to your users' computers by using your custom browser packages and Automatic Version Synchronization (AVS). -author: lomayor -ms.prod: ie11 -ms.assetid: f51224bd-3371-4551-821d-1d62310e3384 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Deploy Internet Explorer 11 using Automatic Version Synchronization (AVS) (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - -# Deploy Internet Explorer 11 using Automatic Version Synchronization (AVS) -You can deploy Internet Explorer 11 to your users' computers by using your custom browser packages and Automatic Version Synchronization (AVS). - -## What is Automatic Version Synchronization? -Automatic Version Synchronization (AVS) lets you use the Internet Explorer Administration Kit 11 (IEAK 11) to synchronize the IE11 setup files on a local computer with the latest setup files on the web. - -You must synchronize the setup files at least once on the local computer, for each language and operating system combination, before proceeding through the rest of the wizard. If your packages have more than one version of IE, you need to keep the versions in separate component download folders, which can be pointed to from the **File Locations** page of the IEAK 11. For more information about using the AVS feature, see [Use the Automatic Version Synchronization page in the IEAK 11 Wizard](../ie11-ieak/auto-version-sync-ieak11-wizard.md) -. - -## Related topics -- [Internet Explorer Administration Kit 11 (IEAK 11) - Administration Guide for IT Pros](../ie11-ieak/index.md) -- [Customize Internet Explorer 11 installation packages](customize-ie11-install-packages.md) - - - - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: You can deploy Internet Explorer 11 to your users' computers by using your custom browser packages and Automatic Version Synchronization (AVS). +author: dansimp +ms.prod: ie11 +ms.assetid: f51224bd-3371-4551-821d-1d62310e3384 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Deploy Internet Explorer 11 using Automatic Version Synchronization (AVS) (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + +# Deploy Internet Explorer 11 using Automatic Version Synchronization (AVS) +You can deploy Internet Explorer 11 to your users' computers by using your custom browser packages and Automatic Version Synchronization (AVS). + +## What is Automatic Version Synchronization? +Automatic Version Synchronization (AVS) lets you use the Internet Explorer Administration Kit 11 (IEAK 11) to synchronize the IE11 setup files on a local computer with the latest setup files on the web. + +You must synchronize the setup files at least once on the local computer, for each language and operating system combination, before proceeding through the rest of the wizard. If your packages have more than one version of IE, you need to keep the versions in separate component download folders, which can be pointed to from the **File Locations** page of the IEAK 11. For more information about using the AVS feature, see [Use the Automatic Version Synchronization page in the IEAK 11 Wizard](../ie11-ieak/auto-version-sync-ieak11-wizard.md) +. + +## Related topics +- [Internet Explorer Administration Kit 11 (IEAK 11) - Administration Guide for IT Pros](../ie11-ieak/index.md) +- [Customize Internet Explorer 11 installation packages](customize-ie11-install-packages.md) + + + + + + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/deploy-ie11-using-software-distribution-tools.md b/browsers/internet-explorer/ie11-deploy-guide/deploy-ie11-using-software-distribution-tools.md index 1df03c3f05..dc31c3230e 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/deploy-ie11-using-software-distribution-tools.md +++ b/browsers/internet-explorer/ie11-deploy-guide/deploy-ie11-using-software-distribution-tools.md @@ -1,33 +1,34 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: Deploy Internet Explorer 11 using software distribution tools -author: lomayor -ms.prod: ie11 -ms.assetid: fd027775-651a-41e1-8ec3-d32eca876d8a -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Deploy Internet Explorer 11 using software distribution tools (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Deploy Internet Explorer 11 using software distribution tools -If you already manage software distribution and updates on your network through software distribution tools, you can also use these tools for ongoing deployments of Internet Explorer. Software distribution tools include: - -- **System Center R2 2012 System Center 2012 R2 Configuration Manager.** Deploy and install Internet Explorer 11 on your user's computers through a software distribution package. For more information about using this tool, see [System Center R2 2012 Configuration Manager](https://go.microsoft.com/fwlink/p/?LinkID=276664). - -- **Windows Server Update Services (WSUS).** Download a single copy of the IE11 updates, caching them to local servers so your users' computers can receive the updates directly from the WSUS servers, instead of through Windows Update. For more information about using this tool, see [Windows Server Update Services](https://go.microsoft.com/fwlink/p/?LinkID=276790). - -- **Group Policy Software Installation.** Deploy and install IE11 on your user's computers through a combination of Group Policy and Microsoft Active Directory. For more information about using this tool, see [Group Policy Software Installation overview](https://go.microsoft.com/fwlink/p/?LinkId=296365). - -- **Microsoft Deployment Toolkit (MDT).** Add the IE11 update to your deployment share, using MDT to update your previously-deployed Windows image. For more information about using this tool, see [Microsoft Deployment Toolkit (MDT)](https://go.microsoft.com/fwlink/p/?LinkID=331148). - -  - -  - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: Deploy Internet Explorer 11 using software distribution tools +author: dansimp +ms.prod: ie11 +ms.assetid: fd027775-651a-41e1-8ec3-d32eca876d8a +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Deploy Internet Explorer 11 using software distribution tools (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Deploy Internet Explorer 11 using software distribution tools +If you already manage software distribution and updates on your network through software distribution tools, you can also use these tools for ongoing deployments of Internet Explorer. Software distribution tools include: + +- **System Center R2 2012 System Center 2012 R2 Configuration Manager.** Deploy and install Internet Explorer 11 on your user's computers through a software distribution package. For more information about using this tool, see [System Center R2 2012 Configuration Manager](https://go.microsoft.com/fwlink/p/?LinkID=276664). + +- **Windows Server Update Services (WSUS).** Download a single copy of the IE11 updates, caching them to local servers so your users' computers can receive the updates directly from the WSUS servers, instead of through Windows Update. For more information about using this tool, see [Windows Server Update Services](https://go.microsoft.com/fwlink/p/?LinkID=276790). + +- **Group Policy Software Installation.** Deploy and install IE11 on your user's computers through a combination of Group Policy and Microsoft Active Directory. For more information about using this tool, see [Group Policy Software Installation overview](https://go.microsoft.com/fwlink/p/?LinkId=296365). + +- **Microsoft Deployment Toolkit (MDT).** Add the IE11 update to your deployment share, using MDT to update your previously-deployed Windows image. For more information about using this tool, see [Microsoft Deployment Toolkit (MDT)](https://go.microsoft.com/fwlink/p/?LinkID=331148). + +  + +  + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/deploy-pinned-sites-using-mdt-2013.md b/browsers/internet-explorer/ie11-deploy-guide/deploy-pinned-sites-using-mdt-2013.md index acb447d590..567b8fbeb8 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/deploy-pinned-sites-using-mdt-2013.md +++ b/browsers/internet-explorer/ie11-deploy-guide/deploy-pinned-sites-using-mdt-2013.md @@ -1,121 +1,122 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: You can pin websites to the Windows 8.1 taskbar for quick access using the Microsoft Deployment Toolkit (MDT) 2013. -author: lomayor -ms.prod: ie11 -ms.assetid: 24f4dcac-9032-4fe8-bf6d-2d712d61cb0c -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Deploy pinned websites using Microsoft Deployment Toolkit (MDT) 2013 (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Deploy pinned websites using Microsoft Deployment Toolkit (MDT) 2013 - -**Applies to:** - -- Windows 10 -- Windows 8.1 -- Windows 7 -- Windows Server 2012 R2 -- Windows Server 2008 R2 with Service Pack 1 (SP1) - -You can pin websites to the Windows 8.1 taskbar for quick access. You pin a website simply by dragging its tab to the taskbar. Some websites can also extend the icon’s Jump List. - -The ability to pin websites to the Windows 8.1 taskbar can help make end users in businesses more productive. As an IT professional, for example, you can pin intranet and SharePoint websites to the taskbar to make them immediately available to users. In this article, you learn how to deploy pinned websites by using Lite Touch Installation in the [Microsoft Deployment Toolkit (MDT) 2013](https://go.microsoft.com/fwlink/p/?LinkId=398474). - -## Deploying pinned websites in MDT 2013 -This topic requires that you have a complete MDT 2013 deployment share that contains Windows 8.1 which comes with Internet Explorer 11. If you’re deploying to Windows 7 clients and need to learn how to add IE11 to an MDT 2013 deployment share as an update, see [Installing Internet Explorer 11 using Microsoft Deployment Toolkit (MDT)](https://go.microsoft.com/fwlink/p/?LinkId=398475) in the TechNet library. - -Deploying pinned websites in MDT 2013 is a 4-step process: - -1. Create a .website file for each website that you want to deploy. When you pin a website to the taskbar, Windows 8.1 creates a .website file that describes how the icon should look and feel. - -2. Copy the .website files to your deployment share. - -3. Copy the .website files to your target computers. - -4. Edit the task sequence of your Unattend.xml answer files to pin the websites to the taskbar. In particular, you want to add each .website file to the **TaskbarLinks** item in Unattend.xml during oobeSystem phase. You can add up to six .website files to the **TaskbarLinks** item. - -Pinned websites are immediately available to every user who logs on to the computer although the user must click each icon to populate its Jump List. - -**Important**
-To follow the examples in this topic, you’ll need to pin the Bing (https://www.bing.com/) and MSN (https://www.msn.com/) websites to the taskbar. - -### Step 1: Creating .website files -The first step is to create a .website file for each website that you want to pin to the Windows 8.1 taskbar during deployment. A .website file is like a shortcut, except it’s a plain text file that describes not only the website’s URL but also how the icon looks. - - **To create each .website file** - -1. Open the website in IE11. - -2. Drag the website’s tab and drop it on the Windows 8.1 taskbar. - -3. Go to `%USERPROFILE%\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar` in Windows Explorer, and copy the bing.website and msn.website files to your desktop. - -### Step 2: Copying the .website files to the deployment share -Next, you must enable your deployment share to copy the bing.website and msn.website files to the **Start** menu on each target computer. - - **To copy .website files to the deployment share** - -1. Open your MDT 2013 deployment share in Windows Explorer. - -2. In the `$OEM$` folder, create the path `$1\Users\Public\Public Links`. If the `$OEM$` folder doesn’t exist, create it at the root of your deployment share. - -3. Copy the bing.website and msn.website files from your desktop to `$OEM$\$1\Users\Public\Public Links` in your deployment share. - -### Step 3: Copying .website files to target computers -After your operating system is installed on the target computer, you need to copy the .website files over so they can be pinned to the taskbar. - - **To copy .website files to target computers** - -1. In the **Deployment Workbench** of MDT 2013, open the deployment share containing the task sequence during which you want to deploy pinned websites, and then click **Task Sequences**. - -2. In the right pane of the **Deployment Workbench**, right-click your task sequence (create a new one if you don’t have one yet), and click **Properties**. - -3. In the **Task Sequence** tab, click the **Postinstall** folder, click **General** from the **Add** button, and then click **Run Command Line**. - -4. Rename the newly created item to *Copy Files* and move it up to the top of the **Postinstall** folder. - -5. In the **Command Line** box enter the following text, `xcopy "%DEPLOYROOT%\$OEM$\$1" "%OSDisk%\" /yqe`. - -6. Click the **Apply** button to save your changes. - -### Step 4: Pinning .website files to the Taskbar -With the .website files ready to copy to the **Public Links** folder on target computers for all users, the last step is to edit the Unattend.xml answer files to pin those .website files to the taskbar. You will need to complete the following steps for each task sequence during which you want to pin these websites to the taskbar. - - **To pin .website files to the Taskbar** - -1. Open the Windows System Image Manager (Windows SIM). - -2. On the **OS Info** tab, click **Edit Unattend.xml** to open the Unattend.xml file. - -2. In the **Windows Image** pane, under **Components** and then **Microsoft-Windows-Shell-Setup**, right-click **TaskbarLinks**, and then click **Add Setting to Pass 7 oobeSystem**. - -3. In the **TaskbarLinks Properties** pane, add the relative path to the target computer’s (not the deployment share’s) .website files that you created earlier. You can add up to six links to the **TaskbarLinks** item. For example, `%PUBLIC%\Users\Public\Public Links\Bing.website` and `%PUBLIC%\Users\Public\Public Links\MSN.website` - -4. On the **File** menu, click **Save Answer File**, and then close Windows SIM. - -5. To close the task sequence, click **OK**. - -## Updating intranet websites for pinning -The MDT 2013 deployment share and task sequences are now ready to pin websites to the taskbar during deployment. This pinning feature can include intranet sites important in your organization. - -You can make your intranet websites act more like applications by extending them to fully support the Windows 8.1 taskbar. This includes creating custom Jump Lists, thumbnail previews, and notifications. For info about extending your intranet websites, see [Pinned Sites Developer Documentation](https://go.microsoft.com/fwlink/p/?LinkId=398484) on MSDN. For more ideas about what to pin, see [Add-ons](https://go.microsoft.com/fwlink/p/?LinkId=398483) in the Internet Explorer Gallery. - -## Related topics -- [Unattended Windows Setup Reference](https://go.microsoft.com/fwlink/p/?LinkId=276788) -- [Windows System Image Manager Technical Reference](https://go.microsoft.com/fwlink/p/?LinkId=276789) -- [Microsoft Deployment Toolkit (MDT)](https://go.microsoft.com/fwlink/p/?LinkId=331148) -- [Windows ADK Overview](https://go.microsoft.com/fwlink/p/?LinkId=276669) - -  - -  - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: You can pin websites to the Windows 8.1 taskbar for quick access using the Microsoft Deployment Toolkit (MDT) 2013. +author: dansimp +ms.prod: ie11 +ms.assetid: 24f4dcac-9032-4fe8-bf6d-2d712d61cb0c +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Deploy pinned websites using Microsoft Deployment Toolkit (MDT) 2013 (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Deploy pinned websites using Microsoft Deployment Toolkit (MDT) 2013 + +**Applies to:** + +- Windows 10 +- Windows 8.1 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2008 R2 with Service Pack 1 (SP1) + +You can pin websites to the Windows 8.1 taskbar for quick access. You pin a website simply by dragging its tab to the taskbar. Some websites can also extend the icon’s Jump List. + +The ability to pin websites to the Windows 8.1 taskbar can help make end users in businesses more productive. As an IT professional, for example, you can pin intranet and SharePoint websites to the taskbar to make them immediately available to users. In this article, you learn how to deploy pinned websites by using Lite Touch Installation in the [Microsoft Deployment Toolkit (MDT) 2013](https://go.microsoft.com/fwlink/p/?LinkId=398474). + +## Deploying pinned websites in MDT 2013 +This topic requires that you have a complete MDT 2013 deployment share that contains Windows 8.1 which comes with Internet Explorer 11. If you’re deploying to Windows 7 clients and need to learn how to add IE11 to an MDT 2013 deployment share as an update, see [Installing Internet Explorer 11 using Microsoft Deployment Toolkit (MDT)](https://go.microsoft.com/fwlink/p/?LinkId=398475) in the TechNet library. + +Deploying pinned websites in MDT 2013 is a 4-step process: + +1. Create a .website file for each website that you want to deploy. When you pin a website to the taskbar, Windows 8.1 creates a .website file that describes how the icon should look and feel. + +2. Copy the .website files to your deployment share. + +3. Copy the .website files to your target computers. + +4. Edit the task sequence of your Unattend.xml answer files to pin the websites to the taskbar. In particular, you want to add each .website file to the **TaskbarLinks** item in Unattend.xml during oobeSystem phase. You can add up to six .website files to the **TaskbarLinks** item. + +Pinned websites are immediately available to every user who logs on to the computer although the user must click each icon to populate its Jump List. + +**Important**
+To follow the examples in this topic, you’ll need to pin the Bing (https://www.bing.com/) and MSN (https://www.msn.com/) websites to the taskbar. + +### Step 1: Creating .website files +The first step is to create a .website file for each website that you want to pin to the Windows 8.1 taskbar during deployment. A .website file is like a shortcut, except it’s a plain text file that describes not only the website’s URL but also how the icon looks. + + **To create each .website file** + +1. Open the website in IE11. + +2. Drag the website’s tab and drop it on the Windows 8.1 taskbar. + +3. Go to `%USERPROFILE%\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar` in Windows Explorer, and copy the bing.website and msn.website files to your desktop. + +### Step 2: Copying the .website files to the deployment share +Next, you must enable your deployment share to copy the bing.website and msn.website files to the **Start** menu on each target computer. + + **To copy .website files to the deployment share** + +1. Open your MDT 2013 deployment share in Windows Explorer. + +2. In the `$OEM$` folder, create the path `$1\Users\Public\Public Links`. If the `$OEM$` folder doesn’t exist, create it at the root of your deployment share. + +3. Copy the bing.website and msn.website files from your desktop to `$OEM$\$1\Users\Public\Public Links` in your deployment share. + +### Step 3: Copying .website files to target computers +After your operating system is installed on the target computer, you need to copy the .website files over so they can be pinned to the taskbar. + + **To copy .website files to target computers** + +1. In the **Deployment Workbench** of MDT 2013, open the deployment share containing the task sequence during which you want to deploy pinned websites, and then click **Task Sequences**. + +2. In the right pane of the **Deployment Workbench**, right-click your task sequence (create a new one if you don’t have one yet), and click **Properties**. + +3. In the **Task Sequence** tab, click the **Postinstall** folder, click **General** from the **Add** button, and then click **Run Command Line**. + +4. Rename the newly created item to *Copy Files* and move it up to the top of the **Postinstall** folder. + +5. In the **Command Line** box enter the following text, `xcopy "%DEPLOYROOT%\$OEM$\$1" "%OSDisk%\" /yqe`. + +6. Click the **Apply** button to save your changes. + +### Step 4: Pinning .website files to the Taskbar +With the .website files ready to copy to the **Public Links** folder on target computers for all users, the last step is to edit the Unattend.xml answer files to pin those .website files to the taskbar. You will need to complete the following steps for each task sequence during which you want to pin these websites to the taskbar. + + **To pin .website files to the Taskbar** + +1. Open the Windows System Image Manager (Windows SIM). + +2. On the **OS Info** tab, click **Edit Unattend.xml** to open the Unattend.xml file. + +2. In the **Windows Image** pane, under **Components** and then **Microsoft-Windows-Shell-Setup**, right-click **TaskbarLinks**, and then click **Add Setting to Pass 7 oobeSystem**. + +3. In the **TaskbarLinks Properties** pane, add the relative path to the target computer’s (not the deployment share’s) .website files that you created earlier. You can add up to six links to the **TaskbarLinks** item. For example, `%PUBLIC%\Users\Public\Public Links\Bing.website` and `%PUBLIC%\Users\Public\Public Links\MSN.website` + +4. On the **File** menu, click **Save Answer File**, and then close Windows SIM. + +5. To close the task sequence, click **OK**. + +## Updating intranet websites for pinning +The MDT 2013 deployment share and task sequences are now ready to pin websites to the taskbar during deployment. This pinning feature can include intranet sites important in your organization. + +You can make your intranet websites act more like applications by extending them to fully support the Windows 8.1 taskbar. This includes creating custom Jump Lists, thumbnail previews, and notifications. For info about extending your intranet websites, see [Pinned Sites Developer Documentation](https://go.microsoft.com/fwlink/p/?LinkId=398484) on MSDN. For more ideas about what to pin, see [Add-ons](https://go.microsoft.com/fwlink/p/?LinkId=398483) in the Internet Explorer Gallery. + +## Related topics +- [Unattended Windows Setup Reference](https://go.microsoft.com/fwlink/p/?LinkId=276788) +- [Windows System Image Manager Technical Reference](https://go.microsoft.com/fwlink/p/?LinkId=276789) +- [Microsoft Deployment Toolkit (MDT)](https://go.microsoft.com/fwlink/p/?LinkId=331148) +- [Windows ADK Overview](https://go.microsoft.com/fwlink/p/?LinkId=276669) + +  + +  + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/deprecated-document-modes.md b/browsers/internet-explorer/ie11-deploy-guide/deprecated-document-modes.md index d892799770..f0f44c2897 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/deprecated-document-modes.md +++ b/browsers/internet-explorer/ie11-deploy-guide/deprecated-document-modes.md @@ -1,61 +1,62 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: appcompat -description: Windows Internet Explorer 8 introduced document modes as a way to move from the proprietary coding of web features to a more standardized type of coding that could run on multiple browsers and devices. -author: lomayor -ms.prod: ie11 -ms.assetid: 00cb1f39-2b20-4d37-9436-62dc03a6320b -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Deprecated document modes and Internet Explorer 11 (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - -# Deprecated document modes and Internet Explorer 11 - -**Applies to:** - -- Windows 10 -- Windows 8.1 -- Windows 7 -- Windows Server 2012 R2 -- Windows Server 2008 R2 with Service Pack 1 (SP1) - -Windows Internet Explorer 8 introduced document modes as a way to move from the proprietary coding of web features to a more standardized type of coding that could run on multiple browsers and devices. Starting with Windows 10, we’re deprecating document modes. - -This means that while Internet Explorer 11 will continue to support document modes, Microsoft Edge won’t. And because of that, it also means that if you want to use Microsoft Edge, you’re going to have to update your legacy webpages and apps to support modern features, browsers, and devices. - ->**Note**
->For specific details about the technologies and APIs that are no longer supported in Microsoft Edge, see [A break from the past, part 2: Saying goodbye to ActiveX, VBScript, attachEvent](https://go.microsoft.com/fwlink/p/?LinkId=615953). - -## What is document mode? -Each release after Internet Explorer 8 has helped with the transition by introducing additional document modes that emulated previously supported versions, while also introducing support for features defined by industry standards. During this time, numerous websites and apps were updated to the latest and greatest industry standards, while many other sites and apps continued to simply rely on document modes to work properly. - -Because our goal with Microsoft Edge is to give users the best site and app viewing experience possible, we’ve decided to stop support for document modes. All websites and apps using legacy features and code will need to be updated to rely on the new modern standards and practices. - -If you have legacy sites and apps that can’t be updated to modern standards, you can continue to use IE11 and document modes. We recommend that you use the **IE11 Standards document mode** because it represents the highest support available for modern standards. You should also use the HTML5 document type declaration to turn on the latest supported standards while using IE11:``. - -## Document modes and IE11 -The compatibility improvements made in IE11 lets older websites just work in the latest standards mode, by default, without requiring emulation of the previous browser behavior. Because older websites are now just working, we’ve decided that Internet Explorer 10 document mode will be the last new document mode. Instead, developers will need to move to using the IE11 document mode going forward. - -## Document mode selection flowchart -This flowchart shows how IE11 works when document modes are used. - -![Flowchart detailing how document modes are chosen in IE11](images/docmode-decisions-sm.png)
-[Click this link to enlarge image](img-ie11-docmode-lg.md) - -## Known Issues with Internet Explorer 8 document mode in Enterprise Mode -The default document mode for Enterprise Mode is Internet Explorer 8. While this mode provides a strong emulation of that browser, it isn’t an exact match. For example, Windows Internet Explorer 9 fundamentally changed how document modes work with iframes and document modes can’t undo architectural changes. It’s also a known issue that Windows 10 supports GDI font rendering while using Enterprise Mode, but uses natural metrics once outside of Enterprise Mode. - -## Related topics -- [Enterprise Mode for Internet Explorer 11](enterprise-mode-overview-for-ie11.md) - -  - -  - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: appcompat +description: Windows Internet Explorer 8 introduced document modes as a way to move from the proprietary coding of web features to a more standardized type of coding that could run on multiple browsers and devices. +author: dansimp +ms.prod: ie11 +ms.assetid: 00cb1f39-2b20-4d37-9436-62dc03a6320b +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Deprecated document modes and Internet Explorer 11 (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + +# Deprecated document modes and Internet Explorer 11 + +**Applies to:** + +- Windows 10 +- Windows 8.1 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2008 R2 with Service Pack 1 (SP1) + +Windows Internet Explorer 8 introduced document modes as a way to move from the proprietary coding of web features to a more standardized type of coding that could run on multiple browsers and devices. Starting with Windows 10, we’re deprecating document modes. + +This means that while Internet Explorer 11 will continue to support document modes, Microsoft Edge won’t. And because of that, it also means that if you want to use Microsoft Edge, you’re going to have to update your legacy webpages and apps to support modern features, browsers, and devices. + +>**Note**
+>For specific details about the technologies and APIs that are no longer supported in Microsoft Edge, see [A break from the past, part 2: Saying goodbye to ActiveX, VBScript, attachEvent](https://go.microsoft.com/fwlink/p/?LinkId=615953). + +## What is document mode? +Each release after Internet Explorer 8 has helped with the transition by introducing additional document modes that emulated previously supported versions, while also introducing support for features defined by industry standards. During this time, numerous websites and apps were updated to the latest and greatest industry standards, while many other sites and apps continued to simply rely on document modes to work properly. + +Because our goal with Microsoft Edge is to give users the best site and app viewing experience possible, we’ve decided to stop support for document modes. All websites and apps using legacy features and code will need to be updated to rely on the new modern standards and practices. + +If you have legacy sites and apps that can’t be updated to modern standards, you can continue to use IE11 and document modes. We recommend that you use the **IE11 Standards document mode** because it represents the highest support available for modern standards. You should also use the HTML5 document type declaration to turn on the latest supported standards while using IE11:``. + +## Document modes and IE11 +The compatibility improvements made in IE11 lets older websites just work in the latest standards mode, by default, without requiring emulation of the previous browser behavior. Because older websites are now just working, we’ve decided that Internet Explorer 10 document mode will be the last new document mode. Instead, developers will need to move to using the IE11 document mode going forward. + +## Document mode selection flowchart +This flowchart shows how IE11 works when document modes are used. + +![Flowchart detailing how document modes are chosen in IE11](images/docmode-decisions-sm.png)
+[Click this link to enlarge image](img-ie11-docmode-lg.md) + +## Known Issues with Internet Explorer 8 document mode in Enterprise Mode +The default document mode for Enterprise Mode is Internet Explorer 8. While this mode provides a strong emulation of that browser, it isn’t an exact match. For example, Windows Internet Explorer 9 fundamentally changed how document modes work with iframes and document modes can’t undo architectural changes. It’s also a known issue that Windows 10 supports GDI font rendering while using Enterprise Mode, but uses natural metrics once outside of Enterprise Mode. + +## Related topics +- [Enterprise Mode for Internet Explorer 11](enterprise-mode-overview-for-ie11.md) + +  + +  + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/edit-the-enterprise-mode-site-list-using-the-enterprise-mode-site-list-manager.md b/browsers/internet-explorer/ie11-deploy-guide/edit-the-enterprise-mode-site-list-using-the-enterprise-mode-site-list-manager.md index 6f6339d452..8ad5f3e6ad 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/edit-the-enterprise-mode-site-list-using-the-enterprise-mode-site-list-manager.md +++ b/browsers/internet-explorer/ie11-deploy-guide/edit-the-enterprise-mode-site-list-using-the-enterprise-mode-site-list-manager.md @@ -1,53 +1,54 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: appcompat -description: You can use Internet Explorer 11 and the Enterprise Mode Site List Manager to change whether page rendering should use Enterprise Mode or the default Internet Explorer browser configuration. You can also add, remove, or delete associated comments. -author: lomayor -ms.prod: ie11 -ms.assetid: 76aa9a85-6190-4c3a-bc25-0f914de228ea -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Edit the Enterprise Mode site list using the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Edit the Enterprise Mode site list using the Enterprise Mode Site List Manager - -**Applies to:** - -- Windows 10 -- Windows 8.1 -- Windows 7 -- Windows Server 2012 R2 -- Windows Server 2008 R2 with Service Pack 1 (SP1) - -You can use Internet Explorer 11 and the Enterprise Mode Site List Manager to change whether page rendering should use Enterprise Mode or the default Internet Explorer browser configuration. You can also add, remove, or delete associated comments. - -If you need to edit a lot of websites, you probably don’t want to do it one at a time. Instead, you can edit your saved XML or TXT file and add the sites back again. For information about how to do this, depending on your operating system and schema version, see [Add multiple sites to the Enterprise Mode site list using a file and Enterprise Mode Site List Manager (schema v.2)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md) or [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.1)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md). - - **To change how your page renders** - -1. In the Enterprise Mode Site List Manager, double-click the site you want to change. - -2. Change the comment or the compatibility mode option. - -3. Click **Save** to validate your changes and to add the updated information to your site list.
-If your change passes validation, it’s added to the global site list. If the update doesn’t pass validation, you’ll get an error message explaining the problem. You’ll then be able to either cancel the update or ignore the validation problem and add it to your list anyway. For more information about fixing validation issues, see [Fix validation problems using the Enterprise Mode Site List Manager](fix-validation-problems-using-the-enterprise-mode-site-list-manager.md). - -4. On the **File** menu, click **Save to XML**, and save the updated file.
-You can save the file locally or to a network share. However, you must make sure you deploy it to the location specified in your registry key. For more information about the registry key, see [Turn on Enterprise Mode and use a site list](turn-on-enterprise-mode-and-use-a-site-list.md). - -## Related topics -- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853) -- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378) -- [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) -  - -  - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: appcompat +description: You can use Internet Explorer 11 and the Enterprise Mode Site List Manager to change whether page rendering should use Enterprise Mode or the default Internet Explorer browser configuration. You can also add, remove, or delete associated comments. +author: dansimp +ms.prod: ie11 +ms.assetid: 76aa9a85-6190-4c3a-bc25-0f914de228ea +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Edit the Enterprise Mode site list using the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Edit the Enterprise Mode site list using the Enterprise Mode Site List Manager + +**Applies to:** + +- Windows 10 +- Windows 8.1 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2008 R2 with Service Pack 1 (SP1) + +You can use Internet Explorer 11 and the Enterprise Mode Site List Manager to change whether page rendering should use Enterprise Mode or the default Internet Explorer browser configuration. You can also add, remove, or delete associated comments. + +If you need to edit a lot of websites, you probably don’t want to do it one at a time. Instead, you can edit your saved XML or TXT file and add the sites back again. For information about how to do this, depending on your operating system and schema version, see [Add multiple sites to the Enterprise Mode site list using a file and Enterprise Mode Site List Manager (schema v.2)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md) or [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.1)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md). + + **To change how your page renders** + +1. In the Enterprise Mode Site List Manager, double-click the site you want to change. + +2. Change the comment or the compatibility mode option. + +3. Click **Save** to validate your changes and to add the updated information to your site list.
+If your change passes validation, it’s added to the global site list. If the update doesn’t pass validation, you’ll get an error message explaining the problem. You’ll then be able to either cancel the update or ignore the validation problem and add it to your list anyway. For more information about fixing validation issues, see [Fix validation problems using the Enterprise Mode Site List Manager](fix-validation-problems-using-the-enterprise-mode-site-list-manager.md). + +4. On the **File** menu, click **Save to XML**, and save the updated file.
+You can save the file locally or to a network share. However, you must make sure you deploy it to the location specified in your registry key. For more information about the registry key, see [Turn on Enterprise Mode and use a site list](turn-on-enterprise-mode-and-use-a-site-list.md). + +## Related topics +- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853) +- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378) +- [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) +  + +  + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/enable-and-disable-add-ons-using-administrative-templates-and-group-policy.md b/browsers/internet-explorer/ie11-deploy-guide/enable-and-disable-add-ons-using-administrative-templates-and-group-policy.md index 4e5e30e18a..2ab127eec5 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/enable-and-disable-add-ons-using-administrative-templates-and-group-policy.md +++ b/browsers/internet-explorer/ie11-deploy-guide/enable-and-disable-add-ons-using-administrative-templates-and-group-policy.md @@ -1,110 +1,111 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: security -description: Enable and disable add-ons using administrative templates and group policy -ms.author: lomayor -author: lomayor -ms.prod: ie11 -ms.assetid: c6fe1cd3-0bfc-4d23-8016-c9601f674c0b -ms.reviewer: -audience: itpro manager: dansimp -title: Enable and disable add-ons using administrative templates and group policy (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 4/12/2018 ---- - - -# Enable and disable add-ons using administrative templates and group policy -Add-ons let your employees personalize Internet Explorer. You can manage IE add-ons using Group Policy and Group Policy templates. - -There are four types of add-ons: - -- **Search Providers.** Type a term and see suggestions provided by your search provider. - -- **Accelerators.** Highlight text on a web page and then click the blue **Accelerator** icon to email, map, search, translate, or do many other tasks. - -- **Web Slices.** Subscribe to parts of a website to get real-time information on the Favorites bar. - -- **Toolbars.** Add features (like stock tickers) to your browser. - -## Using the Local Group Policy Editor to manage group policy objects -You can use the Local Group Policy Editor to change how add-ons work in your organization. - - **To manage add-ons** - -1. In the Local Group Policy Editor, go to `Computer Configuration\Administrative Templates\Windows Components\Internet Explorer`. - -2. Change any or all of these settings to match your company’s policy and requirements. - - - Turn off add-on performance notifications - - - Automatically activate newly installed add-ons - - - Do not allow users to enable or disable add-ons - -3. Go into the **Internet Control Panel\\Advance Page** folder, where you can change: - - - Do not allow resetting IE settings - - - Allow third-party browser extensions - -4. Go into the **Security Features\\Add-on Management** folder, where you can change: - - - Add-on List - - - Deny all add-ons unless specifically allowed in the Add-on List - - - Turn off Adobe Flash in IE and prevent applications from using IE technology to instantiate Flash objects - -5. Close the Local Group Policy Editor when you’re done. - -## Using the CLSID and Administrative Templates to manage group policy objects -Every add-on has a Class ID (CLSID) that you use to enable and disable specific add-ons, using Group Policy and Administrative Templates. - - **To manage add-ons** - -1. Get the CLSID for the add-on you want to enable or disable: - - 1. Open IE, click **Tools**, and then click **Manage Add-ons**. - - 2. Double-click the add-on you want to change. - - 3. In the More Information dialog, click **Copy** and then click **Close**. - - 4. Open Notepad and paste the information for the add-on. - - 5. On the Manage Add-ons windows, click **Close**. - - 6. On the Internet Options dialog, click **Close** and then close IE. - -2. From the copied information, select and copy just the **Class ID** value. - - >[!NOTE] - >You want to copy the curly brackets as well as the CLSID: **{47833539-D0C5-4125-9FA8-0819E2EAAC93}**. - -3. Open the Group Policy Management Editor and go to: Computer Configuration\Policies\Administrative Templates\Windows Components\Internet Explorer\Security Features\Add-on Management. -
**-OR-**
-Open the Local Group Policy Editor and go to: User Configuration\Administrative Templates\Windows Components\Internet Explorer\Security Features\Add-on Management. - -4. Open the **Add-on List** Group Policy Object, select **Enabled**, and then click **Show**.
The Show Contents dialog appears. - -6. In **Value Name**, paste the Class ID for your add-on, for example, **{47833539-D0C5-4125-9FA8-0819E2EAAC93}**. - -6. In **Value**, enter one of the following: - - - **0**. The add-on is disabled and your employees can’t change it. - - - **1**. The add-on is enabled and your employees can’t change it. - - - **2**. The add-on is enabled and your employees can change it. - -7. Close the Show Contents dialog. - -7. In the Group Policy editor, go to: Computer Configuration\Administrative Templates\Windows Components\Internet Explorer. - -8. Double-click **Automatically activate/enable newly installed add-ons** and select **Enabled**.

Enabling turns off the message prompting you to Enable or Don't enable the add-on. - -7. Click **OK** twice to close the Group Policy editor. - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: security +description: Enable and disable add-ons using administrative templates and group policy +ms.author: dansimp +author: dansimp +ms.prod: ie11 +ms.assetid: c6fe1cd3-0bfc-4d23-8016-c9601f674c0b +ms.reviewer: +audience: itpro +manager: dansimp +title: Enable and disable add-ons using administrative templates and group policy (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 4/12/2018 +--- + + +# Enable and disable add-ons using administrative templates and group policy +Add-ons let your employees personalize Internet Explorer. You can manage IE add-ons using Group Policy and Group Policy templates. + +There are four types of add-ons: + +- **Search Providers.** Type a term and see suggestions provided by your search provider. + +- **Accelerators.** Highlight text on a web page and then click the blue **Accelerator** icon to email, map, search, translate, or do many other tasks. + +- **Web Slices.** Subscribe to parts of a website to get real-time information on the Favorites bar. + +- **Toolbars.** Add features (like stock tickers) to your browser. + +## Using the Local Group Policy Editor to manage group policy objects +You can use the Local Group Policy Editor to change how add-ons work in your organization. + + **To manage add-ons** + +1. In the Local Group Policy Editor, go to `Computer Configuration\Administrative Templates\Windows Components\Internet Explorer`. + +2. Change any or all of these settings to match your company’s policy and requirements. + + - Turn off add-on performance notifications + + - Automatically activate newly installed add-ons + + - Do not allow users to enable or disable add-ons + +3. Go into the **Internet Control Panel\\Advance Page** folder, where you can change: + + - Do not allow resetting IE settings + + - Allow third-party browser extensions + +4. Go into the **Security Features\\Add-on Management** folder, where you can change: + + - Add-on List + + - Deny all add-ons unless specifically allowed in the Add-on List + + - Turn off Adobe Flash in IE and prevent applications from using IE technology to instantiate Flash objects + +5. Close the Local Group Policy Editor when you’re done. + +## Using the CLSID and Administrative Templates to manage group policy objects +Every add-on has a Class ID (CLSID) that you use to enable and disable specific add-ons, using Group Policy and Administrative Templates. + + **To manage add-ons** + +1. Get the CLSID for the add-on you want to enable or disable: + + 1. Open IE, click **Tools**, and then click **Manage Add-ons**. + + 2. Double-click the add-on you want to change. + + 3. In the More Information dialog, click **Copy** and then click **Close**. + + 4. Open Notepad and paste the information for the add-on. + + 5. On the Manage Add-ons windows, click **Close**. + + 6. On the Internet Options dialog, click **Close** and then close IE. + +2. From the copied information, select and copy just the **Class ID** value. + + >[!NOTE] + >You want to copy the curly brackets as well as the CLSID: **{47833539-D0C5-4125-9FA8-0819E2EAAC93}**. + +3. Open the Group Policy Management Editor and go to: Computer Configuration\Policies\Administrative Templates\Windows Components\Internet Explorer\Security Features\Add-on Management. +
**-OR-**
+Open the Local Group Policy Editor and go to: User Configuration\Administrative Templates\Windows Components\Internet Explorer\Security Features\Add-on Management. + +4. Open the **Add-on List** Group Policy Object, select **Enabled**, and then click **Show**.
The Show Contents dialog appears. + +6. In **Value Name**, paste the Class ID for your add-on, for example, **{47833539-D0C5-4125-9FA8-0819E2EAAC93}**. + +6. In **Value**, enter one of the following: + + - **0**. The add-on is disabled and your employees can’t change it. + + - **1**. The add-on is enabled and your employees can’t change it. + + - **2**. The add-on is enabled and your employees can change it. + +7. Close the Show Contents dialog. + +7. In the Group Policy editor, go to: Computer Configuration\Administrative Templates\Windows Components\Internet Explorer. + +8. Double-click **Automatically activate/enable newly installed add-ons** and select **Enabled**.

Enabling turns off the message prompting you to Enable or Don't enable the add-on. + +7. Click **OK** twice to close the Group Policy editor. + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/enhanced-protected-mode-problems-with-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/enhanced-protected-mode-problems-with-ie11.md index d1ac1a3190..d0998607dc 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/enhanced-protected-mode-problems-with-ie11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/enhanced-protected-mode-problems-with-ie11.md @@ -1,30 +1,31 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: security -description: Enhanced Protected Mode problems with Internet Explorer -author: lomayor -ms.prod: ie11 -ms.assetid: 15890ad1-733d-4f7e-a318-10399b389f45 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Enhanced Protected Mode problems with Internet Explorer (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Enhanced Protected Mode problems with Internet Explorer -Enhanced Protected Mode further restricts Protected Mode to deny potential attackers access to sensitive or personal information. If this feature is turned on, users might start to see errors asking them to turn it off, like **This webpage wants to run "npctrl.dll. If you trust this site, you can disable Enhanced Protected Mode for this site to run the control**. If your users click the **Disable** box, Enhanced Protected Mode is turned off for only the single visit to that specific site. After the user leaves the site, Enhanced Protected Mode is automatically turned back on. - -You can use your company’s Group Policy to turn Enhanced Protected Mode on or off for all users. For more information, see the [Group policy objects and Internet Explorer 11 (IE11)](group-policy-objects-and-ie11.md) information in this guide. - -For more information about Enhanced Protected Mode, see the [Enhanced Protected Mode](https://go.microsoft.com/fwlink/p/?LinkId=267512) post on IEBlog, and both the [Understanding Enhanced Protected Mode](https://go.microsoft.com/fwlink/p/?LinkId=282662) and the [Enhanced Protected Mode and Local Files](https://go.microsoft.com/fwlink/p/?LinkId=282663) blog posts on IEInternals. - -  - -  - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: security +description: Enhanced Protected Mode problems with Internet Explorer +author: dansimp +ms.prod: ie11 +ms.assetid: 15890ad1-733d-4f7e-a318-10399b389f45 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Enhanced Protected Mode problems with Internet Explorer (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Enhanced Protected Mode problems with Internet Explorer +Enhanced Protected Mode further restricts Protected Mode to deny potential attackers access to sensitive or personal information. If this feature is turned on, users might start to see errors asking them to turn it off, like **This webpage wants to run "npctrl.dll. If you trust this site, you can disable Enhanced Protected Mode for this site to run the control**. If your users click the **Disable** box, Enhanced Protected Mode is turned off for only the single visit to that specific site. After the user leaves the site, Enhanced Protected Mode is automatically turned back on. + +You can use your company’s Group Policy to turn Enhanced Protected Mode on or off for all users. For more information, see the [Group policy objects and Internet Explorer 11 (IE11)](group-policy-objects-and-ie11.md) information in this guide. + +For more information about Enhanced Protected Mode, see the [Enhanced Protected Mode](https://go.microsoft.com/fwlink/p/?LinkId=267512) post on IEBlog, and both the [Understanding Enhanced Protected Mode](https://go.microsoft.com/fwlink/p/?LinkId=282662) and the [Enhanced Protected Mode and Local Files](https://go.microsoft.com/fwlink/p/?LinkId=282663) blog posts on IEInternals. + +  + +  + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-overview-for-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-overview-for-ie11.md index 2059dff44a..71104a8786 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-overview-for-ie11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-overview-for-ie11.md @@ -1,55 +1,56 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: appcompat -description: Use the topics in this section to learn how to set up and use Enterprise Mode, Enterprise Mode Site List Manager, and the Enterprise Mode Site List Portal for your company. -author: lomayor -ms.prod: ie11 -ms.assetid: d52ba8ba-b3c7-4314-ba14-0610e1d8456e -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Enterprise Mode for Internet Explorer 11 (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Enterprise Mode for Internet Explorer 11 - -**Applies to:** - -- Windows 10 -- Windows 8.1 -- Windows 7 -- Windows Server 2012 R2 -- Windows Server 2008 R2 with Service Pack 1 (SP1) - -Use the topics in this section to learn how to set up and use Enterprise Mode and the Enterprise Mode Site List Manager in your company. - -## In this section - -|Topic |Description | -|---------------------------------------------------------------|-----------------------------------------------------------------------------------| -|[Enterprise Mode and the Enterprise Mode Site List](what-is-enterprise-mode.md)|Includes descriptions of the features of Enterprise Mode. | -|[Set up Enterprise Mode logging and data collection](set-up-enterprise-mode-logging-and-data-collection.md) |Guidance about how to turn on local control of Enterprise Mode and how to use ASP or the GitHub sample to collect data from your local computers. | -|[Turn on Enterprise Mode and use a site list](turn-on-enterprise-mode-and-use-a-site-list.md) |Guidance about how to turn on Enterprise Mode and set up a site list, using Group Policy or the registry. | -|[Enterprise Mode schema v.2 guidance](enterprise-mode-schema-version-2-guidance.md) |Guidance about how to write the XML for your site list, including what not to include, how to use trailing slashes, and info about how to target specific sites. | -|[Enterprise Mode schema v.1 guidance](enterprise-mode-schema-version-1-guidance.md) |Guidance about how to write the XML for your site list, including what not to include, how to use trailing slashes, and info about how to target specific sites. | -|[Check for a new Enterprise Mode site list xml file](check-for-new-enterprise-mode-site-list-xml-file.md) |Guidance about how the Enterprise Mode functionality looks for your updated site list. | -|[Turn on local control and logging for Enterprise Mode](turn-on-local-control-and-logging-for-enterprise-mode.md) |Guidance about how to turn on local control of Enterprise Mode, using Group Policy or the registry.| -|[Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) |Guidance about how to use the Enterprise Mode Site List Manager, including how to add and update sites on your site list. | -|[Use the Enterprise Mode Site List Portal](use-the-enterprise-mode-portal.md) |Guidance about how to set up and use the Enterprise Mode Site List Manager, including how to add and update sites on your site list. | -|[Using Enterprise Mode](using-enterprise-mode.md) |Guidance about how to turn on either IE7 Enterprise Mode or IE8 Enterprise Mode. | -|[Fix web compatibility issues using document modes and the Enterprise Mode Site List](fix-compat-issues-with-doc-modes-and-enterprise-mode-site-list.md) |Guidance about how to decide and test whether to use document modes or Enterprise Mode to help fix compatibility issues. | -|[Remove sites from a local Enterprise Mode site list](remove-sites-from-a-local-enterprise-mode-site-list.md) |Guidance about how to remove websites from a device's local Enterprise Mode site list. | -|[Remove sites from a local compatibility view list](remove-sites-from-a-local-compatibililty-view-list.md) |Guidance about how to remove websites from a device's local compatibility view list. | -|[Turn off Enterprise Mode](turn-off-enterprise-mode.md) |Guidance about how to stop using your site list and how to turn off local control, using Group Policy or the registry. | - - - - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: appcompat +description: Use the topics in this section to learn how to set up and use Enterprise Mode, Enterprise Mode Site List Manager, and the Enterprise Mode Site List Portal for your company. +author: dansimp +ms.prod: ie11 +ms.assetid: d52ba8ba-b3c7-4314-ba14-0610e1d8456e +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Enterprise Mode for Internet Explorer 11 (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Enterprise Mode for Internet Explorer 11 + +**Applies to:** + +- Windows 10 +- Windows 8.1 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2008 R2 with Service Pack 1 (SP1) + +Use the topics in this section to learn how to set up and use Enterprise Mode and the Enterprise Mode Site List Manager in your company. + +## In this section + +|Topic |Description | +|---------------------------------------------------------------|-----------------------------------------------------------------------------------| +|[Enterprise Mode and the Enterprise Mode Site List](what-is-enterprise-mode.md)|Includes descriptions of the features of Enterprise Mode. | +|[Set up Enterprise Mode logging and data collection](set-up-enterprise-mode-logging-and-data-collection.md) |Guidance about how to turn on local control of Enterprise Mode and how to use ASP or the GitHub sample to collect data from your local computers. | +|[Turn on Enterprise Mode and use a site list](turn-on-enterprise-mode-and-use-a-site-list.md) |Guidance about how to turn on Enterprise Mode and set up a site list, using Group Policy or the registry. | +|[Enterprise Mode schema v.2 guidance](enterprise-mode-schema-version-2-guidance.md) |Guidance about how to write the XML for your site list, including what not to include, how to use trailing slashes, and info about how to target specific sites. | +|[Enterprise Mode schema v.1 guidance](enterprise-mode-schema-version-1-guidance.md) |Guidance about how to write the XML for your site list, including what not to include, how to use trailing slashes, and info about how to target specific sites. | +|[Check for a new Enterprise Mode site list xml file](check-for-new-enterprise-mode-site-list-xml-file.md) |Guidance about how the Enterprise Mode functionality looks for your updated site list. | +|[Turn on local control and logging for Enterprise Mode](turn-on-local-control-and-logging-for-enterprise-mode.md) |Guidance about how to turn on local control of Enterprise Mode, using Group Policy or the registry.| +|[Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) |Guidance about how to use the Enterprise Mode Site List Manager, including how to add and update sites on your site list. | +|[Use the Enterprise Mode Site List Portal](use-the-enterprise-mode-portal.md) |Guidance about how to set up and use the Enterprise Mode Site List Manager, including how to add and update sites on your site list. | +|[Using Enterprise Mode](using-enterprise-mode.md) |Guidance about how to turn on either IE7 Enterprise Mode or IE8 Enterprise Mode. | +|[Fix web compatibility issues using document modes and the Enterprise Mode Site List](fix-compat-issues-with-doc-modes-and-enterprise-mode-site-list.md) |Guidance about how to decide and test whether to use document modes or Enterprise Mode to help fix compatibility issues. | +|[Remove sites from a local Enterprise Mode site list](remove-sites-from-a-local-enterprise-mode-site-list.md) |Guidance about how to remove websites from a device's local Enterprise Mode site list. | +|[Remove sites from a local compatibility view list](remove-sites-from-a-local-compatibililty-view-list.md) |Guidance about how to remove websites from a device's local compatibility view list. | +|[Turn off Enterprise Mode](turn-off-enterprise-mode.md) |Guidance about how to stop using your site list and how to turn off local control, using Group Policy or the registry. | + + + + + + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-1-guidance.md b/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-1-guidance.md index 292c85b771..ff09fe4405 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-1-guidance.md +++ b/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-1-guidance.md @@ -1,236 +1,237 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: appcompat -description: Use the Enterprise Mode Site List Manager to create and update your Enterprise Mode site list for devices running Windows 7 or Windows 8.1 Update. -author: lomayor -ms.prod: ie11 -ms.assetid: 17c61547-82e3-48f2-908d-137a71938823 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Enterprise Mode schema v.1 guidance (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Enterprise Mode schema v.1 guidance - -**Applies to:** - -- Windows 10 -- Windows 8.1 -- Windows 7 - -Use the Enterprise Mode Site List Manager (schema v.1) to create and update your Enterprise Mode site list for devices running the v.1 version of the schema, or the Enterprise Mode Site List Manager (schema v.2) to create and update your Enterprise Mode site list for devices running the v.2 version of the schema. We strongly recommend moving to the new schema, v.2. For more info, see [Enterprise Mode schema v.2 guidance](enterprise-mode-schema-version-2-guidance.md). - -If you don't want to use the Enterprise Mode Site List Manager, you also have the option to update your XML schema using Notepad, or any other XML-editing app. - -## Enterprise Mode schema v.1 example -The following is an example of the Enterprise Mode schema v.1. This schema can run on devices running Windows 7 and Windows 8.1. - -> [!IMPORTANT] -> Make sure that you don't specify a protocol when adding your URLs. Using a URL like `contoso.com` automatically applies to both http://contoso.com and https://contoso.com. - -```xml - - - www.cpandl.com - www.woodgrovebank.com - adatum.com - contoso.com - relecloud.com - /about - - fabrikam.com - /products - - - - contoso.com - /travel - - fabrikam.com - /products - - - -``` - -### Schema elements -This table includes the elements used by the Enterprise Mode schema. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ElementDescriptionSupported browser
<rules>Root node for the schema. -

Example -

-<rules version="205">
-  <emie>
-    <domain>contoso.com</domain>
-  </emie>
-</rules>
Internet Explorer 11 and Microsoft Edge
<emie>The parent node for the Enterprise Mode section of the schema. All <domain> entries will have either IE8 Enterprise Mode or IE7 Enterprise Mode applied. -

Example -

-<rules version="205">
-  <emie>
-    <domain>contoso.com</domain>
-  </emie>
-</rules>
--or- -

For IPv6 ranges:

<rules version="205">
-  <emie>
-    <domain>[10.122.34.99]:8080</domain>
-  </emie>
-  </rules>
--or- -

For IPv4 ranges:

<rules version="205">
-  <emie>
-    <domain>10.122.34.99:8080</domain>
-  </emie>
-  </rules>
Internet Explorer 11 and Microsoft Edge
<docMode>The parent node for the document mode section of the section. All <domain> entries will get IE5 - IE11 document modes applied. If there's a <domain> element in the <docMode> section that uses the same value as a <domain> element in the <emie> section, the <emie> element is applied. -

Example -

-<rules version="205">
-  <docMode>
-    <domain docMode="7">contoso.com</domain>
-  </docMode>
-</rules>
Internet Explorer 11
<domain>A unique entry added for each site you want to put on the Enterprise Mode site list. The first <domain> element will overrule any additional <domain> elements that use the same value for the section. You can use port numbers for this element. -

Example -

-<emie>
-  <domain>contoso.com:8080</domain>
-</emie>
Internet Explorer 11 and Microsoft Edge
<path>A unique entry added for each path under a domain you want to put on the Enterprise Mode site list. The <path> element is a child of the <domain> element. Additionally, the first <path> element will overrule any additional <path> elements in the schema section. -

Example -

-<emie>
-  <domain exclude="true">fabrikam.com
-    <path exclude="false">/products</path>
-  </domain>
-</emie>

-Where https://fabrikam.com doesn't use IE8 Enterprise Mode, but https://fabrikam.com/products does.

Internet Explorer 11 and Microsoft Edge
- -### Schema attributes -This table includes the attributes used by the Enterprise Mode schema. - - - - - - - - - - - - - - - - - - - - - - - - - -
AttributeDescriptionSupported browser
<version>Specifies the version of the Enterprise Mode Site List. This attribute is supported for the <rules> element.Internet Explorer 11 and Microsoft Edge
<exclude>Specifies the domain or path excluded from applying the behavior and is supported on the <domain> and <path> elements. -

Example -

-<emie>
-  <domain exclude="false">fabrikam.com
-    <path exclude="true">/products</path>
-  </domain>
-</emie>

-Where https://fabrikam.com uses IE8 Enterprise Mode, but https://fabrikam.com/products does not.

Internet Explorer 11 and Microsoft Edge
<docMode>Specifies the document mode to apply. This attribute is only supported on <domain> or <path> elements in the <docMode> section. -

Example -

-<docMode>
-  <domain exclude="false">fabrikam.com
-    <path docMode="7">/products</path>
-  </domain>
-</docMode>
Internet Explorer 11
- -### Using Enterprise Mode and document mode together -If you want to use both Enterprise Mode and document mode together, you need to be aware that <emie> entries override <docMode> entries for the same domain. - -For example, say you want all of the sites in the contoso.com domain to open using IE8 Enterprise Mode, except test.contoso.com, which needs to open in document mode 11. Because Enterprise Mode takes precedence over document mode, if you want test.contoso.com to open using document mode, you'll need to explicitly add it as an exclusion to the <emie> parent node. - -```xml - - - contoso.com - test.contoso.com - - - test.contoso.com - - -``` - -### What not to include in your schema -We recommend that you not add any of the following items to your schema because they can make your compatibility list behave in unexpected ways: -- Don’t use protocols. For example, `http://`, `https://`, or custom protocols. They break parsing. -- Don’t use wildcards. -- Don’t use query strings, ampersands break parsing. - -## How to use trailing slashes -You can use trailing slashes at the path-level, but not at the domain-level: -- **Domain-level.** Don’t add trailing slashes to a domain, it breaks parsing. -- **Path-level.** Adding a trailing slash to a path means that the path ends at that point. By not adding a trailing slash, the rule applies to all of the sub-paths. - -**Example** - -```xml -contoso.com - /about/ - -``` -In this example, `contoso.com/about/careers` will use the default version of Internet Explorer, even though `contoso.com/about/` uses Enterprise Mode. - - -## How to target specific sites -If you want to target specific sites in your organization. - -|Targeted site |Example |Explanation | -|--------------|--------|------------| -|You can specify subdomains in the domain tag. |<docMode>
<domain docMode="5">contoso.com</domain>
<domain docMode="9">info.contoso.com</domain>
<docMode>
|

  • contoso.com uses document mode 5.
  • info.contoso.com uses document mode 9.
  • test.contoso.com also uses document mode 5.
| -|You can specify exact URLs by listing the full path. |<emie>
<domain exclude="false">bing.com</domain>
<domain exclude="false" forceCompatView="true">contoso.com</domain>
<emie>
|
  • bing.com uses IE8 Enterprise Mode.
  • contoso.com uses IE7 Enterprise Mode.
| -|You can nest paths underneath domains. |<emie>
<domain exclude="true">contoso.com
<path exclude="false">/about</path>
<path exclude="true">
/about/business</path>
</domain>
</emie>
|
  • contoso.com will use the default version of IE.
  • contoso.com/about and everything underneath that node will load in Enterprise Mode, except contoso.com/about/business, which will load in the default version of IE.
| -|You can’t add a path underneath a path. The file will still be parsed, but the sub-path will be ignored. |<emie>
<domain exclude="true">contoso.com
<path>/about
<path exclude="true">/business</path>
</path>
</domain>
</emie>
|
  • contoso.com will use the default version of IE.
  • contoso.com/about and everything underneath that node will load in Enterprise Mode, including contoso.com/about/business because the last rule is ignored.
| +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: appcompat +description: Use the Enterprise Mode Site List Manager to create and update your Enterprise Mode site list for devices running Windows 7 or Windows 8.1 Update. +author: dansimp +ms.prod: ie11 +ms.assetid: 17c61547-82e3-48f2-908d-137a71938823 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Enterprise Mode schema v.1 guidance (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Enterprise Mode schema v.1 guidance + +**Applies to:** + +- Windows 10 +- Windows 8.1 +- Windows 7 + +Use the Enterprise Mode Site List Manager (schema v.1) to create and update your Enterprise Mode site list for devices running the v.1 version of the schema, or the Enterprise Mode Site List Manager (schema v.2) to create and update your Enterprise Mode site list for devices running the v.2 version of the schema. We strongly recommend moving to the new schema, v.2. For more info, see [Enterprise Mode schema v.2 guidance](enterprise-mode-schema-version-2-guidance.md). + +If you don't want to use the Enterprise Mode Site List Manager, you also have the option to update your XML schema using Notepad, or any other XML-editing app. + +## Enterprise Mode schema v.1 example +The following is an example of the Enterprise Mode schema v.1. This schema can run on devices running Windows 7 and Windows 8.1. + +> [!IMPORTANT] +> Make sure that you don't specify a protocol when adding your URLs. Using a URL like `contoso.com` automatically applies to both http://contoso.com and https://contoso.com. + +```xml + + + www.cpandl.com + www.woodgrovebank.com + adatum.com + contoso.com + relecloud.com + /about + + fabrikam.com + /products + + + + contoso.com + /travel + + fabrikam.com + /products + + + +``` + +### Schema elements +This table includes the elements used by the Enterprise Mode schema. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ElementDescriptionSupported browser
<rules>Root node for the schema. +

Example +

+<rules version="205">
+  <emie>
+    <domain>contoso.com</domain>
+  </emie>
+</rules>
Internet Explorer 11 and Microsoft Edge
<emie>The parent node for the Enterprise Mode section of the schema. All <domain> entries will have either IE8 Enterprise Mode or IE7 Enterprise Mode applied. +

Example +

+<rules version="205">
+  <emie>
+    <domain>contoso.com</domain>
+  </emie>
+</rules>
+-or- +

For IPv6 ranges:

<rules version="205">
+  <emie>
+    <domain>[10.122.34.99]:8080</domain>
+  </emie>
+  </rules>
+-or- +

For IPv4 ranges:

<rules version="205">
+  <emie>
+    <domain>10.122.34.99:8080</domain>
+  </emie>
+  </rules>
Internet Explorer 11 and Microsoft Edge
<docMode>The parent node for the document mode section of the section. All <domain> entries will get IE5 - IE11 document modes applied. If there's a <domain> element in the <docMode> section that uses the same value as a <domain> element in the <emie> section, the <emie> element is applied. +

Example +

+<rules version="205">
+  <docMode>
+    <domain docMode="7">contoso.com</domain>
+  </docMode>
+</rules>
Internet Explorer 11
<domain>A unique entry added for each site you want to put on the Enterprise Mode site list. The first <domain> element will overrule any additional <domain> elements that use the same value for the section. You can use port numbers for this element. +

Example +

+<emie>
+  <domain>contoso.com:8080</domain>
+</emie>
Internet Explorer 11 and Microsoft Edge
<path>A unique entry added for each path under a domain you want to put on the Enterprise Mode site list. The <path> element is a child of the <domain> element. Additionally, the first <path> element will overrule any additional <path> elements in the schema section. +

Example +

+<emie>
+  <domain exclude="true">fabrikam.com
+    <path exclude="false">/products</path>
+  </domain>
+</emie>

+Where https://fabrikam.com doesn't use IE8 Enterprise Mode, but https://fabrikam.com/products does.

Internet Explorer 11 and Microsoft Edge
+ +### Schema attributes +This table includes the attributes used by the Enterprise Mode schema. + + + + + + + + + + + + + + + + + + + + + + + + + +
AttributeDescriptionSupported browser
<version>Specifies the version of the Enterprise Mode Site List. This attribute is supported for the <rules> element.Internet Explorer 11 and Microsoft Edge
<exclude>Specifies the domain or path excluded from applying the behavior and is supported on the <domain> and <path> elements. +

Example +

+<emie>
+  <domain exclude="false">fabrikam.com
+    <path exclude="true">/products</path>
+  </domain>
+</emie>

+Where https://fabrikam.com uses IE8 Enterprise Mode, but https://fabrikam.com/products does not.

Internet Explorer 11 and Microsoft Edge
<docMode>Specifies the document mode to apply. This attribute is only supported on <domain> or <path> elements in the <docMode> section. +

Example +

+<docMode>
+  <domain exclude="false">fabrikam.com
+    <path docMode="7">/products</path>
+  </domain>
+</docMode>
Internet Explorer 11
+ +### Using Enterprise Mode and document mode together +If you want to use both Enterprise Mode and document mode together, you need to be aware that <emie> entries override <docMode> entries for the same domain. + +For example, say you want all of the sites in the contoso.com domain to open using IE8 Enterprise Mode, except test.contoso.com, which needs to open in document mode 11. Because Enterprise Mode takes precedence over document mode, if you want test.contoso.com to open using document mode, you'll need to explicitly add it as an exclusion to the <emie> parent node. + +```xml + + + contoso.com + test.contoso.com + + + test.contoso.com + + +``` + +### What not to include in your schema +We recommend that you not add any of the following items to your schema because they can make your compatibility list behave in unexpected ways: +- Don’t use protocols. For example, `http://`, `https://`, or custom protocols. They break parsing. +- Don’t use wildcards. +- Don’t use query strings, ampersands break parsing. + +## How to use trailing slashes +You can use trailing slashes at the path-level, but not at the domain-level: +- **Domain-level.** Don’t add trailing slashes to a domain, it breaks parsing. +- **Path-level.** Adding a trailing slash to a path means that the path ends at that point. By not adding a trailing slash, the rule applies to all of the sub-paths. + +**Example** + +```xml +contoso.com + /about/ + +``` +In this example, `contoso.com/about/careers` will use the default version of Internet Explorer, even though `contoso.com/about/` uses Enterprise Mode. + + +## How to target specific sites +If you want to target specific sites in your organization. + +|Targeted site |Example |Explanation | +|--------------|--------|------------| +|You can specify subdomains in the domain tag. |<docMode>
<domain docMode="5">contoso.com</domain>
<domain docMode="9">info.contoso.com</domain>
<docMode>
|
  • contoso.com uses document mode 5.
  • info.contoso.com uses document mode 9.
  • test.contoso.com also uses document mode 5.
| +|You can specify exact URLs by listing the full path. |<emie>
<domain exclude="false">bing.com</domain>
<domain exclude="false" forceCompatView="true">contoso.com</domain>
<emie>
|
  • bing.com uses IE8 Enterprise Mode.
  • contoso.com uses IE7 Enterprise Mode.
| +|You can nest paths underneath domains. |<emie>
<domain exclude="true">contoso.com
<path exclude="false">/about</path>
<path exclude="true">
/about/business</path>
</domain>
</emie>
|
  • contoso.com will use the default version of IE.
  • contoso.com/about and everything underneath that node will load in Enterprise Mode, except contoso.com/about/business, which will load in the default version of IE.
| +|You can’t add a path underneath a path. The file will still be parsed, but the sub-path will be ignored. |<emie>
<domain exclude="true">contoso.com
<path>/about
<path exclude="true">/business</path>
</path>
</domain>
</emie>
|
  • contoso.com will use the default version of IE.
  • contoso.com/about and everything underneath that node will load in Enterprise Mode, including contoso.com/about/business because the last rule is ignored.
| diff --git a/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-2-guidance.md b/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-2-guidance.md index 66a056c506..4bcf595aeb 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-2-guidance.md +++ b/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-2-guidance.md @@ -3,13 +3,13 @@ ms.localizationpriority: medium ms.mktglfcycl: deploy ms.pagetype: appcompat description: Use the Enterprise Mode Site List Manager to create and update your Enterprise Mode site list for devices running Windows 10. -author: lomayor +author: dansimp ms.prod: ie11 ms.assetid: 909ca359-5654-4df9-b9fb-921232fc05f5 ms.reviewer: audience: itpro manager: dansimp -ms.author: lomayor +ms.author: dansimp title: Enterprise Mode schema v.2 guidance (Internet Explorer 11 for IT Pros) ms.sitesec: library ms.date: 12/04/2017 diff --git a/browsers/internet-explorer/ie11-deploy-guide/export-your-enterprise-mode-site-list-from-the-enterprise-mode-site-list-manager.md b/browsers/internet-explorer/ie11-deploy-guide/export-your-enterprise-mode-site-list-from-the-enterprise-mode-site-list-manager.md index abb8513201..cf235b25aa 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/export-your-enterprise-mode-site-list-from-the-enterprise-mode-site-list-manager.md +++ b/browsers/internet-explorer/ie11-deploy-guide/export-your-enterprise-mode-site-list-from-the-enterprise-mode-site-list-manager.md @@ -1,49 +1,50 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: appcompat -description: After you create your Enterprise Mode site list in the Enterprise Mode Site List Manager, you can export the contents to an Enterprise Mode (.EMIE) file. -author: lomayor -ms.prod: ie11 -ms.assetid: 9ee7c13d-6fca-4446-bc22-d23a0213a95d -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Export your Enterprise Mode site list from the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Export your Enterprise Mode site list from the Enterprise Mode Site List Manager - -**Applies to:** - -- Windows 10 -- Windows 8.1 -- Windows 7 -- Windows Server 2012 R2 -- Windows Server 2008 R2 with Service Pack 1 (SP1) - -After you create your Enterprise Mode site list in the Enterprise Mode Site List Manager, you can export the contents to an Enterprise Mode (.EMIE) file. This file includes all of your URLs, including your compatibility mode selections and should be stored somewhere safe. If your list gets deleted by mistake you can easily import this file and return everything back to when this file was last saved. - -**Important**
  -This file is not intended for distribution to your managed devices. Instead, it is only for transferring data and comments from one manager to another. For example, if one administrator leaves and passes the existing data to another administrator. Internet Explorer doesn’t read this file. - - **To export your compatibility list** - -1. On the **File** menu of the Enterprise Mode Site List Manager, click **Export**. - -2. Export the file to your selected location. For example, `C:\Users\\Documents\sites.emie`. - -## Related topics - -- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853) -- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378) -- [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) -  - -  - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: appcompat +description: After you create your Enterprise Mode site list in the Enterprise Mode Site List Manager, you can export the contents to an Enterprise Mode (.EMIE) file. +author: dansimp +ms.prod: ie11 +ms.assetid: 9ee7c13d-6fca-4446-bc22-d23a0213a95d +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Export your Enterprise Mode site list from the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Export your Enterprise Mode site list from the Enterprise Mode Site List Manager + +**Applies to:** + +- Windows 10 +- Windows 8.1 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2008 R2 with Service Pack 1 (SP1) + +After you create your Enterprise Mode site list in the Enterprise Mode Site List Manager, you can export the contents to an Enterprise Mode (.EMIE) file. This file includes all of your URLs, including your compatibility mode selections and should be stored somewhere safe. If your list gets deleted by mistake you can easily import this file and return everything back to when this file was last saved. + +**Important**
  +This file is not intended for distribution to your managed devices. Instead, it is only for transferring data and comments from one manager to another. For example, if one administrator leaves and passes the existing data to another administrator. Internet Explorer doesn’t read this file. + + **To export your compatibility list** + +1. On the **File** menu of the Enterprise Mode Site List Manager, click **Export**. + +2. Export the file to your selected location. For example, `C:\Users\\Documents\sites.emie`. + +## Related topics + +- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853) +- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378) +- [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) +  + +  + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/fix-compat-issues-with-doc-modes-and-enterprise-mode-site-list.md b/browsers/internet-explorer/ie11-deploy-guide/fix-compat-issues-with-doc-modes-and-enterprise-mode-site-list.md index a48b0e5732..f1d72eb1a1 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/fix-compat-issues-with-doc-modes-and-enterprise-mode-site-list.md +++ b/browsers/internet-explorer/ie11-deploy-guide/fix-compat-issues-with-doc-modes-and-enterprise-mode-site-list.md @@ -1,109 +1,110 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: appcompat -description: The Internet Explorer 11 Enterprise Mode site list lets you specify document modes for specific websites, helping you fix compatibility issues without changing a single line of code on the site. -author: lomayor -ms.prod: ie11 -ms.assetid: 4b21bb27-aeac-407f-ae58-ab4c6db2baf6 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Fix web compatibility issues using document modes and the Enterprise Mode site list (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Fix web compatibility issues using document modes and the Enterprise Mode site list -The Internet Explorer 11 Enterprise Mode site list lets you specify document modes for specific websites, helping you fix compatibility issues without changing a single line of code on the site. This addition to the site list is a continuation of our commitment to help you upgrade and stay up-to-date on the latest version of Internet Explorer, while still preserving your investments in existing apps. - -## What does this mean for me? -Enterprises can have critical apps that are coded explicitly for a specific browser version and that might not be in their direct control, making it very difficult and expensive to update to modern standards or newer browser versions. Because you can decide which URLs should open using specific document modes, this update helps ensure better compatibility, faster upgrades, and reduced testing and fixing costs. - -## How does this fix work? -You can continue to use your legacy and orphaned web apps, by specifying a document mode in the centralized Enterprise Mode site list. Then, when IE11 goes to a site on your list, the browser loads the page in the specified document mode just as it would if it were specified through an X-UA-Compatible meta tag on the site. For more information about document modes and X-UA-compatible headers, see [Defining document compatibility](https://go.microsoft.com/fwlink/p/?LinkId=518412). - -**Important**
-Enterprise Mode takes precedence over document modes, so sites that are already included in the Enterprise Mode site list won’t be affected by this update and will continue to load in Enterprise Mode, as usual. - -### When do I use document modes versus Enterprise Mode? -While the `` functionality provides great compatibility for you on Windows Internet Explorer 8 or Windows Internet Explorer 7, the new `` capabilities can help you stay up-to-date regardless of which versions of IE are running in your environment. Because of this, we recommend starting your testing process like this: - -- If your enterprise primarily uses Internet Explorer 8 or Internet Explorer 7 start testing using Enterprise Mode. - -- If your enterprise primarily uses Windows Internet Explorer 9 or Internet Explorer 10, start testing using the various document modes. - -Because you might have multiple versions of IE deployed, you might need to use both Enterprise Mode and document modes to effectively move to IE11. - -### Test your sites for document mode compatibility -To see if this fix might help you, run through this process one step at a time, for each of your problematic sites: - -1. Go to a site having compatibility problems, press **F12** to open the **F12 Developer Tools**, and go to the **Emulation** tool. - - ![Emulation tool showing document mode selection](images/docmode-f12.png) - -2. Starting with the **11 (Default)** option, test your broken scenario.
-If that doesn’t work, continue down to the next lowest document mode, stopping as soon as you find a document mode that fixes your problems. For more information about the Emulation tool, see [Emulate browsers, screen sizes, and GPS locations](https://go.microsoft.com/fwlink/p/?LinkId=518417). - -3. If none of the document modes fix your issue, change the **Browser Profile** to **Enterprise**, pick the mode you want to test with starting with **8** (IE8 Enterprise Mode), and then test your broken scenario. - -### Add your site to the Enterprise Mode site list -After you’ve figured out the document mode that fixes your compatibility problems, you can add the site to your Enterprise Mode site list. - -**Note**
-There are two versions of the Enterprise Mode site list schema and the Enterprise Mode Site List Manager, based on your operating system. For more info about the schemas, see [Enterprise Mode schema v.2 guidance](enterprise-mode-schema-version-2-guidance.md) or [Enterprise Mode schema v.1 guidance](enterprise-mode-schema-version-1-guidance.md). For more info about the different site list management tools, see [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md). - - **To add your site to the site list** - -1. Open the Enterprise Mode Site List Manager, and click **Add**. - - ![Enterprise Mode Site List Manager, showing the available modes](images/emie-listmgr.png) - -2. Add the **URL** and pick the document mode from the **Launch in** box. This should be the same document mode you found fixed your problems while testing the site.
-Similar to Enterprise Mode, you can specify a document mode for a particular web path—such as contoso.com/ERP—or at a domain level. In the above, the entire contoso.com domain loads in Enterprise Mode, while microsoft.com is forced to load into IE8 Document Mode and bing.com loads in IE11. - -**Note**
-For more information about Enterprise Mode, see [What is Enterprise Mode?](what-is-enterprise-mode.md) For more information about the Enterprise Mode Site List Manager and how to add sites to your site list, see [Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md). - - -### Review your Enterprise Mode site list -Take a look at your Enterprise Mode site list and make sure everything is the way you want it. The next step will be to turn the list on and start to use it in your company. The Enterprise Mode Site List Manager will look something like: - -![Enterprise Mode Site List Manager, showing the different modes](images/emie-sitelistmgr.png) - -And the underlying XML code will look something like: - -``` xml - - - bing.com/images - www.msn.com/news - - - - timecard - tar - msdn.microsoft.com - - -``` - -### Turn on Enterprise Mode and using your site list -If you haven’t already turned on Enterprise Mode for your company, you’ll need to do that. You can turn on Enterprise Mode using Group Policy or your registry. For specific instructions and details, see [Turn on Enterprise Mode and use a site list](turn-on-enterprise-mode-and-use-a-site-list.md). - -## Turn off default Compatibility View for your intranet sites -By default, IE11 uses the **Display intranet sites in Compatibility View** setting. However, we’ve heard your feedback and know that you might want to turn this functionality off so you can continue to upgrade your web apps to more modern standards. - -To help you move forward, you can now use the Enterprise Mode site list to specify sites or web paths to use the IE7 document mode, which goes down to IE5 “Quirks” mode if the page doesn’t have an explicit `DOCTYPE` tag. Using this document mode effectively helps you provide the Compatibility View functionality for single sites or a group of sites, which after thorough testing, can help you turn off Compatibility View as the default setting for your intranet sites. - -## Related topics -- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853) -- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378) -- [Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) -  - -  - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: appcompat +description: The Internet Explorer 11 Enterprise Mode site list lets you specify document modes for specific websites, helping you fix compatibility issues without changing a single line of code on the site. +author: dansimp +ms.prod: ie11 +ms.assetid: 4b21bb27-aeac-407f-ae58-ab4c6db2baf6 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Fix web compatibility issues using document modes and the Enterprise Mode site list (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Fix web compatibility issues using document modes and the Enterprise Mode site list +The Internet Explorer 11 Enterprise Mode site list lets you specify document modes for specific websites, helping you fix compatibility issues without changing a single line of code on the site. This addition to the site list is a continuation of our commitment to help you upgrade and stay up-to-date on the latest version of Internet Explorer, while still preserving your investments in existing apps. + +## What does this mean for me? +Enterprises can have critical apps that are coded explicitly for a specific browser version and that might not be in their direct control, making it very difficult and expensive to update to modern standards or newer browser versions. Because you can decide which URLs should open using specific document modes, this update helps ensure better compatibility, faster upgrades, and reduced testing and fixing costs. + +## How does this fix work? +You can continue to use your legacy and orphaned web apps, by specifying a document mode in the centralized Enterprise Mode site list. Then, when IE11 goes to a site on your list, the browser loads the page in the specified document mode just as it would if it were specified through an X-UA-Compatible meta tag on the site. For more information about document modes and X-UA-compatible headers, see [Defining document compatibility](https://go.microsoft.com/fwlink/p/?LinkId=518412). + +**Important**
+Enterprise Mode takes precedence over document modes, so sites that are already included in the Enterprise Mode site list won’t be affected by this update and will continue to load in Enterprise Mode, as usual. + +### When do I use document modes versus Enterprise Mode? +While the `` functionality provides great compatibility for you on Windows Internet Explorer 8 or Windows Internet Explorer 7, the new `` capabilities can help you stay up-to-date regardless of which versions of IE are running in your environment. Because of this, we recommend starting your testing process like this: + +- If your enterprise primarily uses Internet Explorer 8 or Internet Explorer 7 start testing using Enterprise Mode. + +- If your enterprise primarily uses Windows Internet Explorer 9 or Internet Explorer 10, start testing using the various document modes. + +Because you might have multiple versions of IE deployed, you might need to use both Enterprise Mode and document modes to effectively move to IE11. + +### Test your sites for document mode compatibility +To see if this fix might help you, run through this process one step at a time, for each of your problematic sites: + +1. Go to a site having compatibility problems, press **F12** to open the **F12 Developer Tools**, and go to the **Emulation** tool. + + ![Emulation tool showing document mode selection](images/docmode-f12.png) + +2. Starting with the **11 (Default)** option, test your broken scenario.
+If that doesn’t work, continue down to the next lowest document mode, stopping as soon as you find a document mode that fixes your problems. For more information about the Emulation tool, see [Emulate browsers, screen sizes, and GPS locations](https://go.microsoft.com/fwlink/p/?LinkId=518417). + +3. If none of the document modes fix your issue, change the **Browser Profile** to **Enterprise**, pick the mode you want to test with starting with **8** (IE8 Enterprise Mode), and then test your broken scenario. + +### Add your site to the Enterprise Mode site list +After you’ve figured out the document mode that fixes your compatibility problems, you can add the site to your Enterprise Mode site list. + +**Note**
+There are two versions of the Enterprise Mode site list schema and the Enterprise Mode Site List Manager, based on your operating system. For more info about the schemas, see [Enterprise Mode schema v.2 guidance](enterprise-mode-schema-version-2-guidance.md) or [Enterprise Mode schema v.1 guidance](enterprise-mode-schema-version-1-guidance.md). For more info about the different site list management tools, see [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md). + + **To add your site to the site list** + +1. Open the Enterprise Mode Site List Manager, and click **Add**. + + ![Enterprise Mode Site List Manager, showing the available modes](images/emie-listmgr.png) + +2. Add the **URL** and pick the document mode from the **Launch in** box. This should be the same document mode you found fixed your problems while testing the site.
+Similar to Enterprise Mode, you can specify a document mode for a particular web path—such as contoso.com/ERP—or at a domain level. In the above, the entire contoso.com domain loads in Enterprise Mode, while microsoft.com is forced to load into IE8 Document Mode and bing.com loads in IE11. + +**Note**
+For more information about Enterprise Mode, see [What is Enterprise Mode?](what-is-enterprise-mode.md) For more information about the Enterprise Mode Site List Manager and how to add sites to your site list, see [Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md). + + +### Review your Enterprise Mode site list +Take a look at your Enterprise Mode site list and make sure everything is the way you want it. The next step will be to turn the list on and start to use it in your company. The Enterprise Mode Site List Manager will look something like: + +![Enterprise Mode Site List Manager, showing the different modes](images/emie-sitelistmgr.png) + +And the underlying XML code will look something like: + +``` xml + + + bing.com/images + www.msn.com/news + + + + timecard + tar + msdn.microsoft.com + + +``` + +### Turn on Enterprise Mode and using your site list +If you haven’t already turned on Enterprise Mode for your company, you’ll need to do that. You can turn on Enterprise Mode using Group Policy or your registry. For specific instructions and details, see [Turn on Enterprise Mode and use a site list](turn-on-enterprise-mode-and-use-a-site-list.md). + +## Turn off default Compatibility View for your intranet sites +By default, IE11 uses the **Display intranet sites in Compatibility View** setting. However, we’ve heard your feedback and know that you might want to turn this functionality off so you can continue to upgrade your web apps to more modern standards. + +To help you move forward, you can now use the Enterprise Mode site list to specify sites or web paths to use the IE7 document mode, which goes down to IE5 “Quirks” mode if the page doesn’t have an explicit `DOCTYPE` tag. Using this document mode effectively helps you provide the Compatibility View functionality for single sites or a group of sites, which after thorough testing, can help you turn off Compatibility View as the default setting for your intranet sites. + +## Related topics +- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853) +- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378) +- [Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) +  + +  + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/fix-validation-problems-using-the-enterprise-mode-site-list-manager.md b/browsers/internet-explorer/ie11-deploy-guide/fix-validation-problems-using-the-enterprise-mode-site-list-manager.md index 852ac4ae6c..c3c7ead8ff 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/fix-validation-problems-using-the-enterprise-mode-site-list-manager.md +++ b/browsers/internet-explorer/ie11-deploy-guide/fix-validation-problems-using-the-enterprise-mode-site-list-manager.md @@ -1,48 +1,49 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: appcompat -description: When you add multiple sites to your Enterprise Mode site list entries, they’re validated by the Enterprise Mode Site List Manager before they’re entered into your global list. -author: lomayor -ms.prod: ie11 -ms.assetid: 9f80e39f-dcf1-4124-8931-131357f31d67 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Fix validation problems using the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Fix validation problems using the Enterprise Mode Site List Manager - -**Applies to:** - -- Windows 10 -- Windows 8.1 -- Windows 7 -- Windows Server 2012 R2 -- Windows Server 2008 R2 with Service Pack 1 (SP1) - -When you add multiple sites to your Enterprise Mode site list entries, they’re validated by the Enterprise Mode Site List Manager before they’re entered into your global list. If a site doesn’t pass validation, you’ll have a couple of options to address it. - -There are typically 3 types of errors you’ll see: - -- **Validation**. The site caused a validation error. Typically these occur because of typos, malformed URLs, or access-related issues. You can pick the site, click **Add to list** to ignore the problem and accept the site to your site list, or you can click **OK** to keep the site off of your site list. - -- **Duplicate**. The site already exists in the global compatibility list with a different compatibility mode. For example, the site was originally rendered in Enterprise Mode, but this update is for Default IE. You can pick the site, click **Add to list** to ignore the problem and accept the change to your site list, or you can click **OK** to keep your original compatibility mode. - -- **Redirection**. This is the least common type of validation error. Typically in this situation, a site redirects from an easy-to-remember URL to a longer URL. Like `\\tar` redirects to `\\timecard`. You can add the short URL or you can add both the short and long versions to your list.
-Another possibility is that redirection happens multiple times, with an intermediary site experiencing compatibility issues. For example, an employee types a short URL that then redirects multiple times, finally ending up on a non-intranet site. In this situation, you might want to add the intermediary URLs to your Enterprise Mode site list, in case there’s logic in one of them that has compatibility issues. - -## Related topics -- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853) -- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378) -- [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) -  - -  - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: appcompat +description: When you add multiple sites to your Enterprise Mode site list entries, they’re validated by the Enterprise Mode Site List Manager before they’re entered into your global list. +author: dansimp +ms.prod: ie11 +ms.assetid: 9f80e39f-dcf1-4124-8931-131357f31d67 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Fix validation problems using the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Fix validation problems using the Enterprise Mode Site List Manager + +**Applies to:** + +- Windows 10 +- Windows 8.1 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2008 R2 with Service Pack 1 (SP1) + +When you add multiple sites to your Enterprise Mode site list entries, they’re validated by the Enterprise Mode Site List Manager before they’re entered into your global list. If a site doesn’t pass validation, you’ll have a couple of options to address it. + +There are typically 3 types of errors you’ll see: + +- **Validation**. The site caused a validation error. Typically these occur because of typos, malformed URLs, or access-related issues. You can pick the site, click **Add to list** to ignore the problem and accept the site to your site list, or you can click **OK** to keep the site off of your site list. + +- **Duplicate**. The site already exists in the global compatibility list with a different compatibility mode. For example, the site was originally rendered in Enterprise Mode, but this update is for Default IE. You can pick the site, click **Add to list** to ignore the problem and accept the change to your site list, or you can click **OK** to keep your original compatibility mode. + +- **Redirection**. This is the least common type of validation error. Typically in this situation, a site redirects from an easy-to-remember URL to a longer URL. Like `\\tar` redirects to `\\timecard`. You can add the short URL or you can add both the short and long versions to your list.
+Another possibility is that redirection happens multiple times, with an intermediary site experiencing compatibility issues. For example, an employee types a short URL that then redirects multiple times, finally ending up on a non-intranet site. In this situation, you might want to add the intermediary URLs to your Enterprise Mode site list, in case there’s logic in one of them that has compatibility issues. + +## Related topics +- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853) +- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378) +- [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) +  + +  + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/group-policy-and-advanced-group-policy-mgmt-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/group-policy-and-advanced-group-policy-mgmt-ie11.md index 7fc2191028..d2fadc609c 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/group-policy-and-advanced-group-policy-mgmt-ie11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/group-policy-and-advanced-group-policy-mgmt-ie11.md @@ -1,43 +1,44 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: security -description: Overview about Group Policy, Advanced Group Policy Management (AGPM), and Internet Explorer 11 -author: lomayor -ms.prod: ie11 -ms.assetid: 63a7ef4a-6de2-4d08-aaba-0479131e3406 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Group Policy, Advanced Group Policy Management (AGPM), and Internet Explorer 11 (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Group Policy, Advanced Group Policy Management (AGPM), and Internet Explorer 11 -Advanced Group Policy Management (AGPM) is an add-on license that available for the Microsoft Desktop Optimization Pack (MDOP). This license gives you change control and a role assignment-model that helps optimize Group Policy management and reduce the risk of widespread failures. - -From AGPM you can: - -- **Edit GPOs outside of your production environment.** Your GPOs are stored in an outside archive for editing, reviewing, and approving. Then, when you deploy, AGPM moves the GPOs to your production environment. - -- **Assign roles to your employees.** You can assign 3 roles to your employees or groups, including: - - - **Reviewer.** Can view and compare GPOs in the archive. This role can't edit or deploy GPOs. - - - **Editor.** Can view, compare, check-in and out, and edit GPOs in the archive. This role can also request GPO deployment. - - - **Approver.** Can approve GPO creation and deployment to the production environment. - -- **Manage your GPO lifecycle with change control features.** You can use the available version-control, history, and auditing features to help you manage your GPOs while moving through your archive, to your editing process, and finally to your GPO deployment. - -**Note**
-For more information about AGPM, and to get the license, see [Advanced Group Policy Management 4.0 Documents](https://www.microsoft.com/download/details.aspx?id=13975). - -  - -  - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: security +description: Overview about Group Policy, Advanced Group Policy Management (AGPM), and Internet Explorer 11 +author: dansimp +ms.prod: ie11 +ms.assetid: 63a7ef4a-6de2-4d08-aaba-0479131e3406 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Group Policy, Advanced Group Policy Management (AGPM), and Internet Explorer 11 (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Group Policy, Advanced Group Policy Management (AGPM), and Internet Explorer 11 +Advanced Group Policy Management (AGPM) is an add-on license that available for the Microsoft Desktop Optimization Pack (MDOP). This license gives you change control and a role assignment-model that helps optimize Group Policy management and reduce the risk of widespread failures. + +From AGPM you can: + +- **Edit GPOs outside of your production environment.** Your GPOs are stored in an outside archive for editing, reviewing, and approving. Then, when you deploy, AGPM moves the GPOs to your production environment. + +- **Assign roles to your employees.** You can assign 3 roles to your employees or groups, including: + + - **Reviewer.** Can view and compare GPOs in the archive. This role can't edit or deploy GPOs. + + - **Editor.** Can view, compare, check-in and out, and edit GPOs in the archive. This role can also request GPO deployment. + + - **Approver.** Can approve GPO creation and deployment to the production environment. + +- **Manage your GPO lifecycle with change control features.** You can use the available version-control, history, and auditing features to help you manage your GPOs while moving through your archive, to your editing process, and finally to your GPO deployment. + +**Note**
+For more information about AGPM, and to get the license, see [Advanced Group Policy Management 4.0 Documents](https://www.microsoft.com/download/details.aspx?id=13975). + +  + +  + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/group-policy-and-group-policy-mgmt-console-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/group-policy-and-group-policy-mgmt-console-ie11.md index 3c121b3e5e..df5754f0b6 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/group-policy-and-group-policy-mgmt-console-ie11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/group-policy-and-group-policy-mgmt-console-ie11.md @@ -1,48 +1,49 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: security -description: Overview about Group Policy, the Group Policy Management Console (GPMC), and Internet Explorer 11 -author: lomayor -ms.prod: ie11 -ms.assetid: ae3d227d-3da7-46b8-8a61-c71bfeae0c63 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Group Policy, the Group Policy Management Console (GPMC), and Internet Explorer 11 (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Group Policy, the Group Policy Management Console (GPMC), and Internet Explorer 11 -A Microsoft Management Console (MMC)-based tool that uses scriptable interfaces to manage Group Policy. The 32-bit and 64-bit versions are included with Windows Server R2 with Service Pack 1 (SP1) and Windows Server 2012 R2. - -## Why use the GPMC? -The GPMC lets you: - -- Import, export, copy, paste, backup and restore GPOs. - -- Search for existing GPOs. - -- Create reports, including providing the Resultant Set of Policy (RSoP) data in HTML reports that you can save and print. - -- Use simulated RSoP data to prototype your Group Policy before implementing it in the production environment. - -- Obtain RSoP data to view your GPO interactions and to troubleshoot your Group Policy deployment. - -- Create migration tables to let you import and copy GPOs across domains and across forests. Migration tables are files that map references to users, groups, computers, and Universal Naming Convention (UNC) paths in the source GPO to new values in the destination GPO. - -- Create scriptable interfaces to support all of the operations available within the GPMC. You can't use scripts to edit individual policy settings in a GPO. - -For more information about the GPMC, see [Group Policy Management Console](https://go.microsoft.com/fwlink/p/?LinkId=214515) on TechNet. - -## Searching for Group Policy settings -To search for Group Policy settings in the Group Policy Management Console (GPMC), use the [Group Policy Search tool](https://go.microsoft.com/fwlink/p/?LinkId=279857). To find the Group Policy settings, click **Windows Components**, and then click **Internet Explorer**. - -  - -  - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: security +description: Overview about Group Policy, the Group Policy Management Console (GPMC), and Internet Explorer 11 +author: dansimp +ms.prod: ie11 +ms.assetid: ae3d227d-3da7-46b8-8a61-c71bfeae0c63 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Group Policy, the Group Policy Management Console (GPMC), and Internet Explorer 11 (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Group Policy, the Group Policy Management Console (GPMC), and Internet Explorer 11 +A Microsoft Management Console (MMC)-based tool that uses scriptable interfaces to manage Group Policy. The 32-bit and 64-bit versions are included with Windows Server R2 with Service Pack 1 (SP1) and Windows Server 2012 R2. + +## Why use the GPMC? +The GPMC lets you: + +- Import, export, copy, paste, backup and restore GPOs. + +- Search for existing GPOs. + +- Create reports, including providing the Resultant Set of Policy (RSoP) data in HTML reports that you can save and print. + +- Use simulated RSoP data to prototype your Group Policy before implementing it in the production environment. + +- Obtain RSoP data to view your GPO interactions and to troubleshoot your Group Policy deployment. + +- Create migration tables to let you import and copy GPOs across domains and across forests. Migration tables are files that map references to users, groups, computers, and Universal Naming Convention (UNC) paths in the source GPO to new values in the destination GPO. + +- Create scriptable interfaces to support all of the operations available within the GPMC. You can't use scripts to edit individual policy settings in a GPO. + +For more information about the GPMC, see [Group Policy Management Console](https://go.microsoft.com/fwlink/p/?LinkId=214515) on TechNet. + +## Searching for Group Policy settings +To search for Group Policy settings in the Group Policy Management Console (GPMC), use the [Group Policy Search tool](https://go.microsoft.com/fwlink/p/?LinkId=279857). To find the Group Policy settings, click **Windows Components**, and then click **Internet Explorer**. + +  + +  + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/group-policy-and-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/group-policy-and-ie11.md index 574b7f8895..d80c5af350 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/group-policy-and-ie11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/group-policy-and-ie11.md @@ -1,48 +1,49 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: security -description: Use the topics in this section to learn about Group Policy and how to use it to manage Internet Explorer. -author: lomayor -ms.prod: ie11 -ms.assetid: 50383d3f-9ac9-4a30-8852-354b6eb9434a -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Group Policy and Internet Explorer 11 (IE11) (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Group Policy and Internet Explorer 11 (IE11) - -**Applies to:** - -- Windows 10 -- Windows 8.1 -- Windows 7 -- Windows Server 2012 R2 -- Windows Server 2008 R2 with Service Pack 1 (SP1) - -Use the topics in this section to learn about Group Policy and how to use it to manage Internet Explorer. - -## In this section - -|Topic |Description | -|----------------------------------------------------|-----------------------------------------------------------------| -|[New group policy settings for Internet Explorer 11](new-group-policy-settings-for-ie11.md) |Info about many of the new group policy settings added for Internet Explorer 11. | -|[Group Policy management tools](group-policy-objects-and-ie11.md) |Guidance about how to use Microsoft Active Directory Domain Services (AD DS) to manage your Group Policy settings. | -|[ActiveX installation using group policy](activex-installation-using-group-policy.md) |Info about using the ActiveX Installer Service (AXIS) and Group Policy to manage your ActiveX control deployment. | -|[Group Policy and compatibility with Internet Explorer 11](group-policy-compatibility-with-ie11.md) |Our Group Policy recommendations for security, performance, and compatibility with previous versions of IE, regardless of which Zone the website is in. | -|[Group policy preferences and Internet Explorer 11](group-policy-preferences-and-ie11.md) |Info about Group Policy preferences, as compared to Group Policy settings. | -|[Administrative templates and Internet Explorer 11](administrative-templates-and-ie11.md) |Info about Administrative Templates, including where to store them and the related Group Policy settings. | -|[Enable and disable add\-ons using administrative templates and group policy](enable-and-disable-add-ons-using-administrative-templates-and-group-policy.md) |Guidance about how to use your local Group Policy editor or the CLSID and Administrative Templates to manage your Group Policy objects. - - - - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: security +description: Use the topics in this section to learn about Group Policy and how to use it to manage Internet Explorer. +author: dansimp +ms.prod: ie11 +ms.assetid: 50383d3f-9ac9-4a30-8852-354b6eb9434a +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Group Policy and Internet Explorer 11 (IE11) (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Group Policy and Internet Explorer 11 (IE11) + +**Applies to:** + +- Windows 10 +- Windows 8.1 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2008 R2 with Service Pack 1 (SP1) + +Use the topics in this section to learn about Group Policy and how to use it to manage Internet Explorer. + +## In this section + +|Topic |Description | +|----------------------------------------------------|-----------------------------------------------------------------| +|[New group policy settings for Internet Explorer 11](new-group-policy-settings-for-ie11.md) |Info about many of the new group policy settings added for Internet Explorer 11. | +|[Group Policy management tools](group-policy-objects-and-ie11.md) |Guidance about how to use Microsoft Active Directory Domain Services (AD DS) to manage your Group Policy settings. | +|[ActiveX installation using group policy](activex-installation-using-group-policy.md) |Info about using the ActiveX Installer Service (AXIS) and Group Policy to manage your ActiveX control deployment. | +|[Group Policy and compatibility with Internet Explorer 11](group-policy-compatibility-with-ie11.md) |Our Group Policy recommendations for security, performance, and compatibility with previous versions of IE, regardless of which Zone the website is in. | +|[Group policy preferences and Internet Explorer 11](group-policy-preferences-and-ie11.md) |Info about Group Policy preferences, as compared to Group Policy settings. | +|[Administrative templates and Internet Explorer 11](administrative-templates-and-ie11.md) |Info about Administrative Templates, including where to store them and the related Group Policy settings. | +|[Enable and disable add\-ons using administrative templates and group policy](enable-and-disable-add-ons-using-administrative-templates-and-group-policy.md) |Guidance about how to use your local Group Policy editor or the CLSID and Administrative Templates to manage your Group Policy objects. + + + + + + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/group-policy-and-local-group-policy-editor-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/group-policy-and-local-group-policy-editor-ie11.md index 36176c7bde..4ca3868ed5 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/group-policy-and-local-group-policy-editor-ie11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/group-policy-and-local-group-policy-editor-ie11.md @@ -1,36 +1,37 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: security -description: Group Policy, the Local Group Policy Editor, and Internet Explorer 11 -author: lomayor -ms.prod: ie11 -ms.assetid: 6fc30e91-efac-4ba5-9ee2-fa77dcd36467 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Group Policy, the Local Group Policy Editor, and Internet Explorer 11 (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Group Policy, the Local Group Policy Editor, and Internet Explorer 11 -A Microsoft Management Console (MMC)-based tool that manages both computer and user-related configurations for an individual computer policy. This tool is included with Windows® 7 Service Pack 1 (SP1) and Windows 8.1. - -Here's a list of the policy settings you can use, based on the configuration type. For more info, see [Local Group Policy Editor](https://go.microsoft.com/fwlink/p/?LinkId=294912). - -|Computer configuration |User configuration | -|-----------------------|-------------------| -|Windows settings:
  • Name Resolution policy
  • Scripts (Startup/Shutdown)
  • Deployed printers
  • Security settings
  • Policy-based Quality of Service (QoS)
|Windows settings:
  • Scripts (Startup/Shutdown)
  • Deployed printers
  • Security settings
  • Policy-based Quality of Service (QoS)

| -|Administrative templates:
  • Control Panel
  • Network
  • Printers
  • Server
  • System
  • Windows components
  • All settings

|Administrative templates:
  • Control Panel
  • Desktop
  • Network
  • Shared folders
  • Start menu and taskbar
  • System
  • Windows components
  • All settings
| - - -  - -  - -  - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: security +description: Group Policy, the Local Group Policy Editor, and Internet Explorer 11 +author: dansimp +ms.prod: ie11 +ms.assetid: 6fc30e91-efac-4ba5-9ee2-fa77dcd36467 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Group Policy, the Local Group Policy Editor, and Internet Explorer 11 (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Group Policy, the Local Group Policy Editor, and Internet Explorer 11 +A Microsoft Management Console (MMC)-based tool that manages both computer and user-related configurations for an individual computer policy. This tool is included with Windows® 7 Service Pack 1 (SP1) and Windows 8.1. + +Here's a list of the policy settings you can use, based on the configuration type. For more info, see [Local Group Policy Editor](https://go.microsoft.com/fwlink/p/?LinkId=294912). + +|Computer configuration |User configuration | +|-----------------------|-------------------| +|Windows settings:
  • Name Resolution policy
  • Scripts (Startup/Shutdown)
  • Deployed printers
  • Security settings
  • Policy-based Quality of Service (QoS)
|Windows settings:
  • Scripts (Startup/Shutdown)
  • Deployed printers
  • Security settings
  • Policy-based Quality of Service (QoS)

| +|Administrative templates:
  • Control Panel
  • Network
  • Printers
  • Server
  • System
  • Windows components
  • All settings

|Administrative templates:
  • Control Panel
  • Desktop
  • Network
  • Shared folders
  • Start menu and taskbar
  • System
  • Windows components
  • All settings
| + + +  + +  + +  + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/group-policy-compatibility-with-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/group-policy-compatibility-with-ie11.md index 5e66dc9f4c..8a5b6d7859 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/group-policy-compatibility-with-ie11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/group-policy-compatibility-with-ie11.md @@ -1,38 +1,39 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: security -description: Group Policy suggestions for compatibility with Internet Explorer 11 -author: lomayor -ms.prod: ie11 -ms.assetid: 7482c99f-5d79-4344-9e1c-aea9f0a68e18 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Group Policy and compatibility with Internet Explorer 11 (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Group Policy and compatibility with Internet Explorer 11 -Internet Explorer 11 has many Group Policy entries that can be configured for keeping your environment managed and safe. This table includes all of our recommendations around security, performance, and compatibility with the previous versions of Internet Explorer, regardless of which Zone the website is in. - -|Activity |Location |Setting the policy object | -|---------------------------------|----------------------------------------------|-------------------------------------------------------------------------| -|Turn on Compatibility View for all intranet zones |`Administrative Templates\Windows Components\Internet Explorer\Compatibility View` |Double-click **Turn on IE Standards Mode for local intranet** , and then click **Disabled**. | -|Turn on Compatibility View for selected websites, using Group Policy |`Administrative Templates\Windows Components\Internet Explorer\Compatibility View` |Double-click **Use Policy List of Windows Internet Explorer 7 sites** , and then click **Enabled**.Users will be able to add or remove sites manually to their local Compatibility View list, but they won’t be able to remove the sites you specifically added. | -|Turn on Quirks mode for selected websites, using Group Policy |`Administrative Templates\Windows Components\Internet Explorer\Compatibility View` |Double-click **Use Policy List of Quirks Mode sites**, and then click **Enabled**. | -|Ensure your users are using the most up-to-date version of Microsoft’s compatibility list. |`Administrative Templates\Windows Components\Internet Explorer\Compatibility View` |Double-click **Include updated Web site lists from Microsoft**, and then click **Enabled**. | -|Restrict users from making security zone configuration changes. |`Administrative Templates\ Windows Components\Internet Explorer\Internet Control Panel` |Double-click **Disable the Security Page**, and then click **Enabled**. | -|Control which security zone settings are applied to specific websites. |`Administrative Templates\ Windows Components\Internet Explorer\Internet Control Panel\Security Page` |Double-click **Site to Zone Assignment List**, click **Enabled**, and then enter your list of websites and their applicable security zones. | -|Turn off Data Execution Prevention (DEP). |`Administrative Templates\ Windows Components\Internet Explorer\Security Features` |Double-click **Turn off Data Execution Prevention**, and then click **Enabled**. | - -  - -  - -  - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: security +description: Group Policy suggestions for compatibility with Internet Explorer 11 +author: dansimp +ms.prod: ie11 +ms.assetid: 7482c99f-5d79-4344-9e1c-aea9f0a68e18 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Group Policy and compatibility with Internet Explorer 11 (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Group Policy and compatibility with Internet Explorer 11 +Internet Explorer 11 has many Group Policy entries that can be configured for keeping your environment managed and safe. This table includes all of our recommendations around security, performance, and compatibility with the previous versions of Internet Explorer, regardless of which Zone the website is in. + +|Activity |Location |Setting the policy object | +|---------------------------------|----------------------------------------------|-------------------------------------------------------------------------| +|Turn on Compatibility View for all intranet zones |`Administrative Templates\Windows Components\Internet Explorer\Compatibility View` |Double-click **Turn on IE Standards Mode for local intranet** , and then click **Disabled**. | +|Turn on Compatibility View for selected websites, using Group Policy |`Administrative Templates\Windows Components\Internet Explorer\Compatibility View` |Double-click **Use Policy List of Windows Internet Explorer 7 sites** , and then click **Enabled**.Users will be able to add or remove sites manually to their local Compatibility View list, but they won’t be able to remove the sites you specifically added. | +|Turn on Quirks mode for selected websites, using Group Policy |`Administrative Templates\Windows Components\Internet Explorer\Compatibility View` |Double-click **Use Policy List of Quirks Mode sites**, and then click **Enabled**. | +|Ensure your users are using the most up-to-date version of Microsoft’s compatibility list. |`Administrative Templates\Windows Components\Internet Explorer\Compatibility View` |Double-click **Include updated Web site lists from Microsoft**, and then click **Enabled**. | +|Restrict users from making security zone configuration changes. |`Administrative Templates\ Windows Components\Internet Explorer\Internet Control Panel` |Double-click **Disable the Security Page**, and then click **Enabled**. | +|Control which security zone settings are applied to specific websites. |`Administrative Templates\ Windows Components\Internet Explorer\Internet Control Panel\Security Page` |Double-click **Site to Zone Assignment List**, click **Enabled**, and then enter your list of websites and their applicable security zones. | +|Turn off Data Execution Prevention (DEP). |`Administrative Templates\ Windows Components\Internet Explorer\Security Features` |Double-click **Turn off Data Execution Prevention**, and then click **Enabled**. | + +  + +  + +  + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/group-policy-objects-and-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/group-policy-objects-and-ie11.md index 494906c975..403471f4c7 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/group-policy-objects-and-ie11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/group-policy-objects-and-ie11.md @@ -1,55 +1,56 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: security -description: Overview of the available Group Policy management tools -author: lomayor -ms.prod: ie11 -ms.assetid: e33bbfeb-6b80-4e71-8bba-1d0369a87312 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Group Policy management tools (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Group Policy management tools -Group Policy, based on Microsoft Active Directory Domain Services (AD DS), lets you manage your organization's computer and user settings as part of your Group Policy objects (GPOs), which are added and changed in the Group Policy Management Console (GPMC). GPOs can include registry-based Administrative Template policy settings, security settings, software deployment information, scripts, folder redirection, and preferences. The most effective way to target a specific GPO is to use Windows Management Instrumentation (WMI) filters. Like, creating a WMI filter that applies a GPO only to computers with a specific make and model. - -By using Group Policy, you can set up a policy setting once, and then copy that setting onto many computers. For example, you can set up multiple Internet Explorer 11 security settings in a GPO that's linked to a domain, and then apply all of those settings to every computer in the domain. - -**Note**
   -For more information about Group Policy, see the [Group Policy TechCenter](https://go.microsoft.com/fwlink/p/?LinkId=214514). This site provides links to the latest technical documentation, videos, and downloads for Group Policy. - -## Managing settings with GPOs -After deploying IE11 to your organization, you can continue to manage the browser settings by using Active Directory Domain Services (AD DS) together with the following Group Policy-related setting management groups: - -- [Administrative templates and Internet Explorer 11](administrative-templates-and-ie11.md). Used to manage registry-based policies and options. - -- [Group policy preferences and Internet Explorer 11](group-policy-preferences-and-ie11.md). Used to set up and manage options that can be changed by the user after installation. - -**Note**
-Whenever possible, we recommend that you manage IE11 using Administrative Templates, because these settings are always written to secure policy branches in the registry. In addition, we recommend that you deploy using standard user accounts instead of letting your users log on to their computers as administrators. This helps to prevent your users from making unwanted changes to their systems or overriding Group Policy settings. - - -Users won't be able to use the IE11 user interface or the registry to change any managed settings on their computers. However, they will be able to change many of the preferences associated with the settings you set up using the Internet Explorer Administration Kit 11 (IEAK 11). - -## Which GPO tool should I use? -You can use any of these tools to create, manage, view, and troubleshoot Group Policy objects (GPOs). For information about each, see: - -- [Group Policy, the Group Policy Management Console (GPMC), and Internet Explorer 11](group-policy-and-group-policy-mgmt-console-ie11.md). Provides a single location to manage all GPOs, WMI filters, and Group Policy–related permissions across multiple forests in an organization. - -- [Group Policy, the Local Group Policy Editor, and Internet Explorer 11](group-policy-and-local-group-policy-editor-ie11.md). Provides a user interface that lets you edit settings within individual GPOs. - -- [Group Policy, Advanced Group Policy Management (AGPM), and Internet Explorer 11](group-policy-and-advanced-group-policy-mgmt-ie11.md). An add-on license for the Microsoft Desktop Optimization Pack (MDOP) that helps to extend Group Policy for Software Assurance customers. - -- [Group Policy, Windows Powershell, and Internet Explorer 11](group-policy-windows-powershell-ie11.md). A command-line shell and scripting language that helps automate Windows and application administration on a single computer locally, or across many computers remotely. - - - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: security +description: Overview of the available Group Policy management tools +author: dansimp +ms.prod: ie11 +ms.assetid: e33bbfeb-6b80-4e71-8bba-1d0369a87312 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Group Policy management tools (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Group Policy management tools +Group Policy, based on Microsoft Active Directory Domain Services (AD DS), lets you manage your organization's computer and user settings as part of your Group Policy objects (GPOs), which are added and changed in the Group Policy Management Console (GPMC). GPOs can include registry-based Administrative Template policy settings, security settings, software deployment information, scripts, folder redirection, and preferences. The most effective way to target a specific GPO is to use Windows Management Instrumentation (WMI) filters. Like, creating a WMI filter that applies a GPO only to computers with a specific make and model. + +By using Group Policy, you can set up a policy setting once, and then copy that setting onto many computers. For example, you can set up multiple Internet Explorer 11 security settings in a GPO that's linked to a domain, and then apply all of those settings to every computer in the domain. + +**Note**
   +For more information about Group Policy, see the [Group Policy TechCenter](https://go.microsoft.com/fwlink/p/?LinkId=214514). This site provides links to the latest technical documentation, videos, and downloads for Group Policy. + +## Managing settings with GPOs +After deploying IE11 to your organization, you can continue to manage the browser settings by using Active Directory Domain Services (AD DS) together with the following Group Policy-related setting management groups: + +- [Administrative templates and Internet Explorer 11](administrative-templates-and-ie11.md). Used to manage registry-based policies and options. + +- [Group policy preferences and Internet Explorer 11](group-policy-preferences-and-ie11.md). Used to set up and manage options that can be changed by the user after installation. + +**Note**
+Whenever possible, we recommend that you manage IE11 using Administrative Templates, because these settings are always written to secure policy branches in the registry. In addition, we recommend that you deploy using standard user accounts instead of letting your users log on to their computers as administrators. This helps to prevent your users from making unwanted changes to their systems or overriding Group Policy settings. + + +Users won't be able to use the IE11 user interface or the registry to change any managed settings on their computers. However, they will be able to change many of the preferences associated with the settings you set up using the Internet Explorer Administration Kit 11 (IEAK 11). + +## Which GPO tool should I use? +You can use any of these tools to create, manage, view, and troubleshoot Group Policy objects (GPOs). For information about each, see: + +- [Group Policy, the Group Policy Management Console (GPMC), and Internet Explorer 11](group-policy-and-group-policy-mgmt-console-ie11.md). Provides a single location to manage all GPOs, WMI filters, and Group Policy–related permissions across multiple forests in an organization. + +- [Group Policy, the Local Group Policy Editor, and Internet Explorer 11](group-policy-and-local-group-policy-editor-ie11.md). Provides a user interface that lets you edit settings within individual GPOs. + +- [Group Policy, Advanced Group Policy Management (AGPM), and Internet Explorer 11](group-policy-and-advanced-group-policy-mgmt-ie11.md). An add-on license for the Microsoft Desktop Optimization Pack (MDOP) that helps to extend Group Policy for Software Assurance customers. + +- [Group Policy, Windows Powershell, and Internet Explorer 11](group-policy-windows-powershell-ie11.md). A command-line shell and scripting language that helps automate Windows and application administration on a single computer locally, or across many computers remotely. + + + + + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/group-policy-preferences-and-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/group-policy-preferences-and-ie11.md index 473be60b15..ae5c5f783e 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/group-policy-preferences-and-ie11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/group-policy-preferences-and-ie11.md @@ -1,38 +1,39 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: security -description: Info about Group Policy preferences versus Group Policy settings -author: lomayor -ms.prod: ie11 -ms.assetid: f2264c97-7f09-4f28-bb5c-58ab80dcc6ee -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Group policy preferences and Internet Explorer 11 (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Group policy preferences and Internet Explorer 11 -Group Policy preferences are less strict than Group Policy settings, based on: - -| |Group Policy preferences |Group Policy settings | -|-----|-------------------------|----------------------| -|Enforcement |
  • Not enforced
  • Has the user interface turned on
  • Can only be refreshed or applied once
|
  • Enforced
  • Has the user interface turned off
  • Can be refreshed multiple times
| -|Flexibility |Lets you create preference items for registry settings, files, and folders. |
  • Requires app support
  • Needs you to create Administrative Templates for new policy settings
  • Won't let you create policy settings to manage files and folders
| -|Local Group Policy |Not available |Available -|Awareness |Supports apps that aren't Group Policy-aware |Requires apps to be Group Policy-aware | -|Storage |
  • Overwrites the original settings
  • Removing the preference doesn't restore the original setting
|
  • Doesn't overwrite the original settings
  • Stored in the Policy branches of the registry
  • Removing the setting restores the original setting
| -|Targeting and filtering |
  • Targeting is specific, with a user interface for each type of targeting item
  • Supports targeting at the individual preference item level
|
  • Filtering is based on Windows Management Instrumentation (WMI), and requires writing WMI queries
  • Supports filtering at the Group Policy Object (GPO) level
| - - -For more information about Group Policy preferences, see the [Group Policy Settings Reference for Windows and Windows Server](https://go.microsoft.com/fwlink/p/?LinkId=279876). - -  - -  - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: security +description: Info about Group Policy preferences versus Group Policy settings +author: dansimp +ms.prod: ie11 +ms.assetid: f2264c97-7f09-4f28-bb5c-58ab80dcc6ee +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Group policy preferences and Internet Explorer 11 (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Group policy preferences and Internet Explorer 11 +Group Policy preferences are less strict than Group Policy settings, based on: + +| |Group Policy preferences |Group Policy settings | +|-----|-------------------------|----------------------| +|Enforcement |
  • Not enforced
  • Has the user interface turned on
  • Can only be refreshed or applied once
|
  • Enforced
  • Has the user interface turned off
  • Can be refreshed multiple times
| +|Flexibility |Lets you create preference items for registry settings, files, and folders. |
  • Requires app support
  • Needs you to create Administrative Templates for new policy settings
  • Won't let you create policy settings to manage files and folders
| +|Local Group Policy |Not available |Available +|Awareness |Supports apps that aren't Group Policy-aware |Requires apps to be Group Policy-aware | +|Storage |
  • Overwrites the original settings
  • Removing the preference doesn't restore the original setting
|
  • Doesn't overwrite the original settings
  • Stored in the Policy branches of the registry
  • Removing the setting restores the original setting
| +|Targeting and filtering |
  • Targeting is specific, with a user interface for each type of targeting item
  • Supports targeting at the individual preference item level
|
  • Filtering is based on Windows Management Instrumentation (WMI), and requires writing WMI queries
  • Supports filtering at the Group Policy Object (GPO) level
| + + +For more information about Group Policy preferences, see the [Group Policy Settings Reference for Windows and Windows Server](https://go.microsoft.com/fwlink/p/?LinkId=279876). + +  + +  + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/group-policy-problems-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/group-policy-problems-ie11.md index 65ae07a3ce..008e2624c0 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/group-policy-problems-ie11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/group-policy-problems-ie11.md @@ -1,29 +1,30 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: security -description: Links to troubleshooting topics and log files that can help address Group Policy problems with Internet Explorer 11. -author: lomayor -ms.prod: ie11 -ms.assetid: 0da0d9a9-200c-46c4-96be-630e82de017b -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Group Policy problems with Internet Explorer 11 (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Group Policy problems with Internet Explorer 11 -If you're having problems with Group Policy and Internet Explorer 11, or if you're looking for high-level information about the concepts and techniques used to troubleshoot Group Policy, as well as links to detailed reference topics, procedures, and troubleshooting scenario guides, see [Group Policy Analysis and Troubleshooting Overview](https://go.microsoft.com/fwlink/p/?LinkId=279872). - -## Group Policy Object-related Log Files -You can use the Event Viewer to review Group Policy-related messages in the **Windows Logs**, **System** file. All of the Group Policy-related events are shown with a source of **GroupPolicy**. For more information about the Event Viewer, see [What information appears in event logs? (Event Viewer)](https://go.microsoft.com/fwlink/p/?LinkId=294917). - -  - -  - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: security +description: Links to troubleshooting topics and log files that can help address Group Policy problems with Internet Explorer 11. +author: dansimp +ms.prod: ie11 +ms.assetid: 0da0d9a9-200c-46c4-96be-630e82de017b +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Group Policy problems with Internet Explorer 11 (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Group Policy problems with Internet Explorer 11 +If you're having problems with Group Policy and Internet Explorer 11, or if you're looking for high-level information about the concepts and techniques used to troubleshoot Group Policy, as well as links to detailed reference topics, procedures, and troubleshooting scenario guides, see [Group Policy Analysis and Troubleshooting Overview](https://go.microsoft.com/fwlink/p/?LinkId=279872). + +## Group Policy Object-related Log Files +You can use the Event Viewer to review Group Policy-related messages in the **Windows Logs**, **System** file. All of the Group Policy-related events are shown with a source of **GroupPolicy**. For more information about the Event Viewer, see [What information appears in event logs? (Event Viewer)](https://go.microsoft.com/fwlink/p/?LinkId=294917). + +  + +  + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/group-policy-shortcut-extensions-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/group-policy-shortcut-extensions-ie11.md index 7c53292112..1f0caf9bc3 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/group-policy-shortcut-extensions-ie11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/group-policy-shortcut-extensions-ie11.md @@ -1,49 +1,50 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: security -description: Instructions about how to create and configure shortcut preference extensions to file system objects, URLs, and shell objects. -author: lomayor -ms.prod: ie11 -ms.assetid: c6fbf990-13e4-4be7-9f08-5bdd43179b3b -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Group Policy, Shortcut Extensions, and Internet Explorer 11 (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Group Policy, Shortcut Extensions, and Internet Explorer 11 -Group Policy includes the Shortcuts preference extension, which lets you configure shortcuts to: - -- **File system objects.** Traditional shortcuts that link to apps, files, folders, drives, shares, or computers. For example, linking a shortcut to an app from the **Start** screen. - -- **URLs.** Shortcuts to webpages or FTP sites. For example, a link to your intranet site from your employee's **Favorites** folder. - -- **Shell objects.** Shortcuts to objects that appear in the shell namespace, such as printers, desktop items, Control Panel items, the Recycle Bin, and so on. - -## How do I configure shortcuts? -You can create and configure shortcuts for any domain-based Group Policy Object (GPO) in the Group Policy Management Console (GPMC). - - **To create a new Shortcut preference item** - -1. Open GPMC, right-click the Group Policy object that needs the new shortcut extension, and click **Edit**. - -2. From **Computer Configuration** or **User Configuration**, go to **Preferences**, and then go to **Windows Settings**. - -3. Right-click **Shortcuts**, click **New**, and then choose **Shortcut**. - -4. Choose what the shortcut should do, including **Create**, **Delete**, **Replace**, or **Update**. - -5. Type the required shortcut settings and your comments into the **Description** box, and click **OK**. - -For more information about shortcut extensions, including step-by-step guidance, see [Shortcuts Extension](https://go.microsoft.com/fwlink/p/?LinkId=214525) and [Configure a Shortcut Item](https://go.microsoft.com/fwlink/p/?LinkId=301837). - -  - -  - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: security +description: Instructions about how to create and configure shortcut preference extensions to file system objects, URLs, and shell objects. +author: dansimp +ms.prod: ie11 +ms.assetid: c6fbf990-13e4-4be7-9f08-5bdd43179b3b +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Group Policy, Shortcut Extensions, and Internet Explorer 11 (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Group Policy, Shortcut Extensions, and Internet Explorer 11 +Group Policy includes the Shortcuts preference extension, which lets you configure shortcuts to: + +- **File system objects.** Traditional shortcuts that link to apps, files, folders, drives, shares, or computers. For example, linking a shortcut to an app from the **Start** screen. + +- **URLs.** Shortcuts to webpages or FTP sites. For example, a link to your intranet site from your employee's **Favorites** folder. + +- **Shell objects.** Shortcuts to objects that appear in the shell namespace, such as printers, desktop items, Control Panel items, the Recycle Bin, and so on. + +## How do I configure shortcuts? +You can create and configure shortcuts for any domain-based Group Policy Object (GPO) in the Group Policy Management Console (GPMC). + + **To create a new Shortcut preference item** + +1. Open GPMC, right-click the Group Policy object that needs the new shortcut extension, and click **Edit**. + +2. From **Computer Configuration** or **User Configuration**, go to **Preferences**, and then go to **Windows Settings**. + +3. Right-click **Shortcuts**, click **New**, and then choose **Shortcut**. + +4. Choose what the shortcut should do, including **Create**, **Delete**, **Replace**, or **Update**. + +5. Type the required shortcut settings and your comments into the **Description** box, and click **OK**. + +For more information about shortcut extensions, including step-by-step guidance, see [Shortcuts Extension](https://go.microsoft.com/fwlink/p/?LinkId=214525) and [Configure a Shortcut Item](https://go.microsoft.com/fwlink/p/?LinkId=301837). + +  + +  + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/group-policy-windows-powershell-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/group-policy-windows-powershell-ie11.md index dcea0b00e6..2de349942d 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/group-policy-windows-powershell-ie11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/group-policy-windows-powershell-ie11.md @@ -1,38 +1,39 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: security -description: Overview about how Group Policy works with Windows Powershell and Internet Explorer 11 -author: lomayor -ms.prod: ie11 -ms.assetid: e3607cde-a498-4e04-9daa-b331412967fc -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Group Policy, Windows Powershell, and Internet Explorer 11 (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Group Policy, Windows Powershell, and Internet Explorer 11 -Your domain-joined Group Policy Objects (GPOs) can use any of Group Policy-related “cmdlets” that run within Windows PowerShell. - -Each cmdlet is a single-function command-line tool that can: - -- Create, edit, remove, back up, and import GPOs. - -- Create, update, and remove Group Policy links. - -- Set inheritance flags and permissions on organizational units (OU) and domains. - -- Configure registry-based policy settings and registry settings for Group Policy preferences. - -For more info about PowerShell and Group Policy management, see [Use Windows PowerShell to Manage Group Policy](https://go.microsoft.com/fwlink/p/?LinkId=276828). - -  - -  - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: security +description: Overview about how Group Policy works with Windows Powershell and Internet Explorer 11 +author: dansimp +ms.prod: ie11 +ms.assetid: e3607cde-a498-4e04-9daa-b331412967fc +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Group Policy, Windows Powershell, and Internet Explorer 11 (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Group Policy, Windows Powershell, and Internet Explorer 11 +Your domain-joined Group Policy Objects (GPOs) can use any of Group Policy-related “cmdlets” that run within Windows PowerShell. + +Each cmdlet is a single-function command-line tool that can: + +- Create, edit, remove, back up, and import GPOs. + +- Create, update, and remove Group Policy links. + +- Set inheritance flags and permissions on organizational units (OU) and domains. + +- Configure registry-based policy settings and registry settings for Group Policy preferences. + +For more info about PowerShell and Group Policy management, see [Use Windows PowerShell to Manage Group Policy](https://go.microsoft.com/fwlink/p/?LinkId=276828). + +  + +  + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/ie11-delivery-through-automatic-updates.md b/browsers/internet-explorer/ie11-deploy-guide/ie11-delivery-through-automatic-updates.md index 4e3fdb4baa..b4149169e2 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/ie11-delivery-through-automatic-updates.md +++ b/browsers/internet-explorer/ie11-deploy-guide/ie11-delivery-through-automatic-updates.md @@ -1,142 +1,143 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: support -ms.pagetype: security -description: -author: lomayor -ms.author: lomayor -ms.manager: elizapo -ms.prod: ie11 -ms.assetid: -ms.reviewer: -audience: itpro manager: dansimp -title: Internet Explorer 11 delivery through automatic updates -ms.sitesec: library -ms.date: 05/22/2018 ---- - -# Internet Explorer 11 delivery through automatic updates -Internet Explorer 11 makes browsing the web faster, easier, safer, and more reliable than ever. To help customers become more secure and up-to-date, Microsoft will distribute Internet Explorer 11 through Automatic Updates and the Windows Update and Microsoft Update sites. Internet Explorer 11 will be available for users of the 32-bit and 64-bit versions of Windows 7 Service Pack 1 (SP1), and 64-bit version of Windows Server 2008 R2 SP1. This article provides an overview of the delivery process and options available for IT administrators to control how and when Internet Explorer 11 is deployed to their organization through Automatic Updates. - -- [Automatic updates delivery process](https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/ie11-delivery-through-automatic-updates#automatic-updates-delivery-process) - -- [Internet Explorer 11 automatic upgrades](https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/ie11-delivery-through-automatic-updates#internet-explorer-11-automatic-upgrades) - -- [Options for blocking automatic delivery](https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/ie11-delivery-through-automatic-updates#options-for-blocking-automatic-delivery) - -- [Availability of Internet Explorer 11](https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/ie11-delivery-through-automatic-updates#availability-of-internet-explorer-11) - -- [Prevent automatic installation of Internet Explorer 11 with WSUS](https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/ie11-delivery-through-automatic-updates#prevent-automatic-installation-of-internet-explorer-11-with-wsus) - -## Automatic updates delivery process - -Internet Explorer 11 only downloads and installs if it’s available for delivery through Automatic Updates; and Automatic Updates only offer Internet Explorer 11 -to users with local administrator accounts. User’s without local administrator accounts won’t be prompted to install the update and will continue using their -current version of Internet Explorer. - -Internet Explorer 11 replaces Internet Explorer 8, Internet Explorer 9, or Internet Explorer 10. If you decide you don’t want Internet Explorer 11, and you’re running Windows 7 SP1 or Windows Server 2008 R2 with SP1, you can uninstall it from the **View installed updates** section of the **Uninstall an update** page of the Control Panel. - ->[!Note] ->If a user installs Internet Explorer 11 and then removes it, it won’t be re-offered to that computer through Automatic Updates. Instead, the user will have to manually re-install the app. - -## Internet Explorer 11 automatic upgrades - -Internet Explorer 11 is offered through Automatic Updates and Windows Update as an Important update. Users running Windows 7 SP1, who have chosen to download and install updates automatically through Windows Update, are automatically upgraded to Internet Explorer 11. - -Users who were automatically upgraded to Internet Explorer 11 can decide to uninstall Internet Explorer 11. However, Internet Explorer 11 will still appear as an optional update through Windows Update. - -## Options for blocking automatic delivery - -If you use Automatic Updates in your company, but want to stop your users from automatically getting Internet Explorer 11, do one of the following: - -- **Download and use the Internet Explorer 11 Blocker Toolkit.** Includes a Group Policy template and a script that permanently blocks Internet Explorer 11 from being offered by Windows Update or Microsoft Update as a high-priority update. You can download this kit from the [Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=40722). - - >[!Note] - >The toolkit won't stop users with local administrator accounts from manually installing Internet Explorer 11. Using this toolkit also prevents your users from receiving automatic upgrades from Internet Explorer 8, Internet Explorer 9, or Internet Explorer 10 to Internet Explorer 11. For more information, see the [Internet Explorer 11 Blocker Toolkit frequently asked questions](../ie11-faq/faq-ie11-blocker-toolkit.md). - -- **Use an update management solution to control update deployment.** - If you already use an update management solution, like [Windows Server Update Services (WSUS)](https://docs.microsoft.com/windows-server/administration/windows-server-update-services/get-started/windows-server-update-services-wsus) or the more advanced [System Center 2012 Configuration Manager](https://go.microsoft.com/fwlink/?LinkID=276664), you should use that instead of the Internet Explorer Blocker Toolkit. - - >[!Note] - >If you use WSUS to manage updates, and Update Rollups are configured for automatic installation, Internet Explorer will automatically install throughout your company. This scenario is discussed in detail in the Knowledge Base article [here](https://support.microsoft.com/kb/946202). - -Additional information on Internet Explorer 11, including a Readiness Toolkit, technical overview, in-depth feature summary, and Internet Explorer 11 download is available on the [Internet Explorer 11 page of the Microsoft Edge IT Center](https://technet.microsoft.com/microsoft-edge/dn262703.aspx). - -## Availability of Internet Explorer 11 - -Automatic Updates will start to distribute Internet Explorer 11 shortly after the final release of the product and will distribute it through the System Center Configuration Manager, Microsoft Systems Management Server, and WSUS. - -## Prevent automatic installation of Internet Explorer 11 with WSUS - -Internet Explorer 11 will be released to WSUS as an Update Rollup package. Therefore, if you’ve configured WSUS to “auto-approve” Update Rollup packages, it’ll be automatically approved and installed. To stop Internet Explorer 11 from being automatically approved for installation, you need to: - -1. Click **Start**, click **Administrative Tools**, and then click **Microsoft - Windows Server Update Services 3.0**. - -2. Expand *ComputerName*, and then click **Options**. - -3. Click **Automatic Approvals**. - -4. Click the rule that automatically approves an update that is classified as - Update Rollup, and then click **Edit.** - - >[!Note] - >If you don’t see a rule like this, you most likely haven’t configured WSUS to automatically approve Update Rollups for installation. In this situation, you don’t have to do anything else. - -5. Click the **Update Rollups** property under the **Step 2: Edit the properties (click an underlined value)** section. - - >[!Note] - >The properties for this rule will resemble the following:
  • When an update is in Update Rollups
  • Approve the update for all computers
- -6. Clear the **Update Rollup** check box, and then click **OK**. - -7. Click **OK** to close the **Automatic Approvals** dialog box.

After the new Internet Explorer 11 package is available for download, you should manually synchronize the new package to your WSUS server, so that when you re-enable auto-approval it won’t be automatically installed. - -8. Click **Start**, click **Administrative Tools**, and then click **Microsoft Windows Server Update Services 3.0**. - -9. Expand *ComputerName*, and then click **Synchronizations**. - -10. Click **Synchronize Now**. - -11. Expand *ComputerName*, expand **Updates**, and then click **All Updates**. - -12. Choose **Unapproved** in the **Approval**drop down box. - -13. Check to make sure that Microsoft Internet Explorer 11 is listed as an unapproved update. - - >[!Note] - >There may be multiple updates, depending on the imported language and operating system updates. - -**Optional** - -If you need to reset your Update Rollups packages to auto-approve, do this: - -1. Click **Start**, click **Administrative Tools**, and then click **Microsoft Windows Server Update Services 3.0**. - -2. Expand *ComputerName*, and then click **Options**. - -3. Click **Automatic Approvals**. - -4. Click the rule that automatically approves updates of different classifications, and then click **Edit**. - -5. Click the **Update Rollups** property under the **Step 2: Edit the properties (click an underlined value)** section. - -6. Check the **Update Rollups** check box, and then click **OK**. - -7. Click **OK** to close the **Automatic Approvals** dialog box. - ->[!Note] ->Because auto-approval rules are only evaluated when an update is first imported into WSUS, turning this rule back on after the Internet Explorer 11 update has been imported and synchronized to the server won’t cause this update to be auto-approved. - - -## Additional resources - -- [Automatic delivery process](what-is-the-internet-explorer-11-blocker-toolkit.md#automatic-delivery-process) - -- [Internet Explorer 11 Blocker Toolkit download](https://www.microsoft.com/download/details.aspx?id=40722) - -- [Internet Explorer 11 FAQ for IT pros](https://docs.microsoft.com/internet-explorer/ie11-faq/faq-for-it-pros-ie11) - -- [Internet Explorer 11 delivery through automatic updates](https://technet.microsoft.com/microsoft-edge/dn449235) - -- [Internet Explorer 11 deployment guide](https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/index) +--- +ms.localizationpriority: medium +ms.mktglfcycl: support +ms.pagetype: security +description: +author: dansimp +ms.author: dansimp +ms.manager: dansimp +ms.prod: ie11 +ms.assetid: +ms.reviewer: +audience: itpro +manager: dansimp +title: Internet Explorer 11 delivery through automatic updates +ms.sitesec: library +ms.date: 05/22/2018 +--- + +# Internet Explorer 11 delivery through automatic updates +Internet Explorer 11 makes browsing the web faster, easier, safer, and more reliable than ever. To help customers become more secure and up-to-date, Microsoft will distribute Internet Explorer 11 through Automatic Updates and the Windows Update and Microsoft Update sites. Internet Explorer 11 will be available for users of the 32-bit and 64-bit versions of Windows 7 Service Pack 1 (SP1), and 64-bit version of Windows Server 2008 R2 SP1. This article provides an overview of the delivery process and options available for IT administrators to control how and when Internet Explorer 11 is deployed to their organization through Automatic Updates. + +- [Automatic updates delivery process](https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/ie11-delivery-through-automatic-updates#automatic-updates-delivery-process) + +- [Internet Explorer 11 automatic upgrades](https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/ie11-delivery-through-automatic-updates#internet-explorer-11-automatic-upgrades) + +- [Options for blocking automatic delivery](https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/ie11-delivery-through-automatic-updates#options-for-blocking-automatic-delivery) + +- [Availability of Internet Explorer 11](https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/ie11-delivery-through-automatic-updates#availability-of-internet-explorer-11) + +- [Prevent automatic installation of Internet Explorer 11 with WSUS](https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/ie11-delivery-through-automatic-updates#prevent-automatic-installation-of-internet-explorer-11-with-wsus) + +## Automatic updates delivery process + +Internet Explorer 11 only downloads and installs if it’s available for delivery through Automatic Updates; and Automatic Updates only offer Internet Explorer 11 +to users with local administrator accounts. User’s without local administrator accounts won’t be prompted to install the update and will continue using their +current version of Internet Explorer. + +Internet Explorer 11 replaces Internet Explorer 8, Internet Explorer 9, or Internet Explorer 10. If you decide you don’t want Internet Explorer 11, and you’re running Windows 7 SP1 or Windows Server 2008 R2 with SP1, you can uninstall it from the **View installed updates** section of the **Uninstall an update** page of the Control Panel. + +>[!Note] +>If a user installs Internet Explorer 11 and then removes it, it won’t be re-offered to that computer through Automatic Updates. Instead, the user will have to manually re-install the app. + +## Internet Explorer 11 automatic upgrades + +Internet Explorer 11 is offered through Automatic Updates and Windows Update as an Important update. Users running Windows 7 SP1, who have chosen to download and install updates automatically through Windows Update, are automatically upgraded to Internet Explorer 11. + +Users who were automatically upgraded to Internet Explorer 11 can decide to uninstall Internet Explorer 11. However, Internet Explorer 11 will still appear as an optional update through Windows Update. + +## Options for blocking automatic delivery + +If you use Automatic Updates in your company, but want to stop your users from automatically getting Internet Explorer 11, do one of the following: + +- **Download and use the Internet Explorer 11 Blocker Toolkit.** Includes a Group Policy template and a script that permanently blocks Internet Explorer 11 from being offered by Windows Update or Microsoft Update as a high-priority update. You can download this kit from the [Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=40722). + + >[!Note] + >The toolkit won't stop users with local administrator accounts from manually installing Internet Explorer 11. Using this toolkit also prevents your users from receiving automatic upgrades from Internet Explorer 8, Internet Explorer 9, or Internet Explorer 10 to Internet Explorer 11. For more information, see the [Internet Explorer 11 Blocker Toolkit frequently asked questions](../ie11-faq/faq-ie11-blocker-toolkit.md). + +- **Use an update management solution to control update deployment.** + If you already use an update management solution, like [Windows Server Update Services (WSUS)](https://docs.microsoft.com/windows-server/administration/windows-server-update-services/get-started/windows-server-update-services-wsus) or the more advanced [System Center 2012 Configuration Manager](https://go.microsoft.com/fwlink/?LinkID=276664), you should use that instead of the Internet Explorer Blocker Toolkit. + + >[!Note] + >If you use WSUS to manage updates, and Update Rollups are configured for automatic installation, Internet Explorer will automatically install throughout your company. This scenario is discussed in detail in the Knowledge Base article [here](https://support.microsoft.com/kb/946202). + +Additional information on Internet Explorer 11, including a Readiness Toolkit, technical overview, in-depth feature summary, and Internet Explorer 11 download is available on the [Internet Explorer 11 page of the Microsoft Edge IT Center](https://technet.microsoft.com/microsoft-edge/dn262703.aspx). + +## Availability of Internet Explorer 11 + +Automatic Updates will start to distribute Internet Explorer 11 shortly after the final release of the product and will distribute it through the System Center Configuration Manager, Microsoft Systems Management Server, and WSUS. + +## Prevent automatic installation of Internet Explorer 11 with WSUS + +Internet Explorer 11 will be released to WSUS as an Update Rollup package. Therefore, if you’ve configured WSUS to “auto-approve” Update Rollup packages, it’ll be automatically approved and installed. To stop Internet Explorer 11 from being automatically approved for installation, you need to: + +1. Click **Start**, click **Administrative Tools**, and then click **Microsoft + Windows Server Update Services 3.0**. + +2. Expand *ComputerName*, and then click **Options**. + +3. Click **Automatic Approvals**. + +4. Click the rule that automatically approves an update that is classified as + Update Rollup, and then click **Edit.** + + >[!Note] + >If you don’t see a rule like this, you most likely haven’t configured WSUS to automatically approve Update Rollups for installation. In this situation, you don’t have to do anything else. + +5. Click the **Update Rollups** property under the **Step 2: Edit the properties (click an underlined value)** section. + + >[!Note] + >The properties for this rule will resemble the following:

  • When an update is in Update Rollups
  • Approve the update for all computers
+ +6. Clear the **Update Rollup** check box, and then click **OK**. + +7. Click **OK** to close the **Automatic Approvals** dialog box.

After the new Internet Explorer 11 package is available for download, you should manually synchronize the new package to your WSUS server, so that when you re-enable auto-approval it won’t be automatically installed. + +8. Click **Start**, click **Administrative Tools**, and then click **Microsoft Windows Server Update Services 3.0**. + +9. Expand *ComputerName*, and then click **Synchronizations**. + +10. Click **Synchronize Now**. + +11. Expand *ComputerName*, expand **Updates**, and then click **All Updates**. + +12. Choose **Unapproved** in the **Approval**drop down box. + +13. Check to make sure that Microsoft Internet Explorer 11 is listed as an unapproved update. + + >[!Note] + >There may be multiple updates, depending on the imported language and operating system updates. + +**Optional** + +If you need to reset your Update Rollups packages to auto-approve, do this: + +1. Click **Start**, click **Administrative Tools**, and then click **Microsoft Windows Server Update Services 3.0**. + +2. Expand *ComputerName*, and then click **Options**. + +3. Click **Automatic Approvals**. + +4. Click the rule that automatically approves updates of different classifications, and then click **Edit**. + +5. Click the **Update Rollups** property under the **Step 2: Edit the properties (click an underlined value)** section. + +6. Check the **Update Rollups** check box, and then click **OK**. + +7. Click **OK** to close the **Automatic Approvals** dialog box. + +>[!Note] +>Because auto-approval rules are only evaluated when an update is first imported into WSUS, turning this rule back on after the Internet Explorer 11 update has been imported and synchronized to the server won’t cause this update to be auto-approved. + + +## Additional resources + +- [Automatic delivery process](what-is-the-internet-explorer-11-blocker-toolkit.md#automatic-delivery-process) + +- [Internet Explorer 11 Blocker Toolkit download](https://www.microsoft.com/download/details.aspx?id=40722) + +- [Internet Explorer 11 FAQ for IT pros](https://docs.microsoft.com/internet-explorer/ie11-faq/faq-for-it-pros-ie11) + +- [Internet Explorer 11 delivery through automatic updates](https://technet.microsoft.com/microsoft-edge/dn449235) + +- [Internet Explorer 11 deployment guide](https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/index) diff --git a/browsers/internet-explorer/ie11-deploy-guide/img-ie11-docmode-lg.md b/browsers/internet-explorer/ie11-deploy-guide/img-ie11-docmode-lg.md index 48331957e3..5097f83564 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/img-ie11-docmode-lg.md +++ b/browsers/internet-explorer/ie11-deploy-guide/img-ie11-docmode-lg.md @@ -1,16 +1,17 @@ ---- -description: A full-sized view of how document modes are chosen in IE11. -title: Full-sized flowchart detailing how document modes are chosen in IE11 -author: lomayor -ms.date: 04/19/2017 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor ---- - -Return to: [Deprecated document modes and Internet Explorer 11](deprecated-document-modes.md)
- -

- Full-sized flowchart detailing how document modes are chosen in IE11 -

- +--- +description: A full-sized view of how document modes are chosen in IE11. +title: Full-sized flowchart detailing how document modes are chosen in IE11 +author: dansimp +ms.date: 04/19/2017 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +--- + +Return to: [Deprecated document modes and Internet Explorer 11](deprecated-document-modes.md)
+ +

+ Full-sized flowchart detailing how document modes are chosen in IE11 +

+ diff --git a/browsers/internet-explorer/ie11-deploy-guide/import-into-the-enterprise-mode-site-list-manager.md b/browsers/internet-explorer/ie11-deploy-guide/import-into-the-enterprise-mode-site-list-manager.md index add9fe0016..5ab9dd5e58 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/import-into-the-enterprise-mode-site-list-manager.md +++ b/browsers/internet-explorer/ie11-deploy-guide/import-into-the-enterprise-mode-site-list-manager.md @@ -1,50 +1,51 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: appcompat -description: If you need to replace your entire site list because of errors, or simply because it’s out of date, you can import your exported Enterprise Mode site list using the Enterprise Mode Site List Manager. -author: lomayor -ms.prod: ie11 -ms.assetid: cacd5d68-700b-4a96-b4c9-ca2c40c1ac5f -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Import your Enterprise Mode site list to the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Import your Enterprise Mode site list to the Enterprise Mode Site List Manager - -**Applies to:** - -- Windows 10 -- Windows 8.1 -- Windows 7 -- Windows Server 2012 R2 -- Windows Server 2008 R2 with Service Pack 1 (SP1) - -If you need to replace your entire site list because of errors, or simply because it’s out of date, you can import your exported Enterprise Mode site list using the Enterprise Mode Site List Manager. - -**Important**   -Importing your file overwrites everything that’s currently in the tool, so make sure it’s what you really mean to do. - - **To import your compatibility list** - -1. On the **File** menu of the Enterprise Mode Site List Manager, click **Import**. - -2. Go to your exported .EMIE file (for example, `C:\users\\documents\sites.emie`), and then click **Open**. - -3. Review the alert message about all of your entries being overwritten. If you still want to import the file, click **Yes**. - -## Related topics -- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853) -- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378) -- [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) - - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: appcompat +description: If you need to replace your entire site list because of errors, or simply because it’s out of date, you can import your exported Enterprise Mode site list using the Enterprise Mode Site List Manager. +author: dansimp +ms.prod: ie11 +ms.assetid: cacd5d68-700b-4a96-b4c9-ca2c40c1ac5f +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Import your Enterprise Mode site list to the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Import your Enterprise Mode site list to the Enterprise Mode Site List Manager + +**Applies to:** + +- Windows 10 +- Windows 8.1 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2008 R2 with Service Pack 1 (SP1) + +If you need to replace your entire site list because of errors, or simply because it’s out of date, you can import your exported Enterprise Mode site list using the Enterprise Mode Site List Manager. + +**Important**   +Importing your file overwrites everything that’s currently in the tool, so make sure it’s what you really mean to do. + + **To import your compatibility list** + +1. On the **File** menu of the Enterprise Mode Site List Manager, click **Import**. + +2. Go to your exported .EMIE file (for example, `C:\users\\documents\sites.emie`), and then click **Open**. + +3. Review the alert message about all of your entries being overwritten. If you still want to import the file, click **Yes**. + +## Related topics +- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853) +- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378) +- [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) + + + + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/index.md b/browsers/internet-explorer/ie11-deploy-guide/index.md index d2bc3fa2d1..74f09e116d 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/index.md +++ b/browsers/internet-explorer/ie11-deploy-guide/index.md @@ -1,8 +1,8 @@ --- ms.mktglfcycl: deploy description: Use this guide to learn about the several options and processes you'll need to consider while you're planning for, deploying, and customizing Internet Explorer 11 for your employee's devices. -author: lomayor -ms.author: lomayor +author: dansimp +ms.author: dansimp ms.prod: ie11 ms.assetid: bddc2d97-c38d-45c5-9588-1f5bbff2e9c3 title: Internet Explorer 11 (IE11) - Deployment Guide for IT Pros (Internet Explorer 11 for IT Pros) diff --git a/browsers/internet-explorer/index.md b/browsers/internet-explorer/index.md index ad64db8744..89d5effbdb 100644 --- a/browsers/internet-explorer/index.md +++ b/browsers/internet-explorer/index.md @@ -1,7 +1,7 @@ --- ms.mktglfcycl: deploy description: The landing page for IE11 that lets you access the documentation. -author: shortpatti +author: dansimp ms.prod: ie11 title: Internet Explorer 11 (IE11) (Internet Explorer 11 for IT Pros) assetid: be3dc32e-80d9-4d9f-a802-c7db6c50dbe0 From f99225f469673191fcf9581c4c3bf5e70e5bb0bf Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Tue, 17 Sep 2019 13:39:46 -0700 Subject: [PATCH 257/285] updating metadata --- browsers/edge/about-microsoft-edge.md | 334 ++++++------- .../edge/microsoft-edge-kiosk-mode-deploy.md | 2 +- .../add-employees-enterprise-mode-portal.md | 2 +- ...rsion-1-schema-and-enterprise-mode-tool.md | 2 +- ...rsion-2-schema-and-enterprise-mode-tool.md | 2 +- ...sing-the-version-2-enterprise-mode-tool.md | 2 +- ...-new-enterprise-mode-site-list-xml-file.md | 2 +- ...n-the-enterprise-mode-site-list-manager.md | 2 +- .../install-and-deploy-ie11.md | 89 ++-- .../install-ie11-using-microsoft-intune.md | 4 +- ...ing-operating-system-deployment-systems.md | 119 ++--- ...ing-system-center-configuration-manager.md | 77 +-- .../install-ie11-using-the-network.md | 85 ++-- .../install-ie11-using-third-party-tools.md | 101 ++-- ...ing-windows-server-update-services-wsus.md | 105 ++-- .../install-problems-with-ie11.md | 123 ++--- .../intranet-problems-and-ie11.md | 85 ++-- .../ie11-deploy-guide/manage-ie11-overview.md | 85 ++-- ...-explorer-maintenance-settings-for-ie11.md | 197 ++++---- .../missing-the-compatibility-view-button.md | 107 ++-- .../net-framework-problems-with-ie11.md | 67 +-- .../new-group-policy-settings-for-ie11.md | 149 +++--- .../out-of-date-activex-control-blocking.md | 411 ++++++++-------- .../problems-after-installing-ie11.md | 147 +++--- ...n-the-enterprise-mode-site-list-manager.md | 97 ++-- ...s-from-a-local-compatibililty-view-list.md | 85 ++-- ...-from-a-local-enterprise-mode-site-list.md | 117 ++--- ...n-the-enterprise-mode-site-list-manager.md | 93 ++-- ...roduction-change-enterprise-mode-portal.md | 107 ++-- ...n-the-enterprise-mode-site-list-manager.md | 89 ++-- ...-the-default-browser-using-group-policy.md | 77 +-- ...rprise-mode-logging-and-data-collection.md | 321 ++++++------ .../set-up-enterprise-mode-portal.md | 455 +++++++++--------- .../setup-problems-with-ie11.md | 133 ++--- ...uirements-and-language-support-for-ie11.md | 123 ++--- ...s-and-tricks-to-manage-ie-compatibility.md | 271 +++++------ .../ie11-deploy-guide/troubleshoot-ie11.md | 105 ++-- .../turn-off-enterprise-mode.md | 161 ++++--- .../turn-off-natural-metrics.md | 75 +-- ...-on-enterprise-mode-and-use-a-site-list.md | 146 +++--- ...control-and-logging-for-enterprise-mode.md | 129 ++--- .../updated-features-and-tools-with-ie11.md | 101 ++-- .../use-the-enterprise-mode-portal.md | 168 +++---- ...e-the-enterprise-mode-site-list-manager.md | 141 +++--- .../user-interface-problems-with-ie11.md | 117 ++--- .../using-enterprise-mode.md | 121 ++--- ...using-ieak11-to-create-install-packages.md | 133 ++--- ...ng-inf-files-to-create-install-packages.md | 91 ++-- ...-changes-preprod-enterprise-mode-portal.md | 141 +++--- ...anges-production-enterprise-mode-portal.md | 91 ++-- .../view-apps-enterprise-mode-site-list.md | 83 ++-- ...view-enterprise-mode-reports-for-portal.md | 107 ++-- ...tualization-and-compatibility-with-ie11.md | 73 +-- .../what-is-enterprise-mode.md | 337 ++++++------- ...he-internet-explorer-11-blocker-toolkit.md | 305 ++++++------ ...rkflow-processes-enterprise-mode-portal.md | 93 ++-- .../ie11-faq/faq-for-it-pros-ie11.md | 407 ++++++++-------- .../ie11-faq/faq-ie11-blocker-toolkit.md | 241 +++++----- .../internet-explorer/ie11-faq/faq-ieak11.md | 241 +++++----- .../ie11-ieak/accelerators-ieak11-wizard.md | 91 ++-- ...add-and-approve-activex-controls-ieak11.md | 105 ++-- .../add-root-certificate-ieak11-wizard.md | 59 +-- .../additional-settings-ieak11-wizard.md | 83 ++-- .../ie11-ieak/auto-config-ieak11-wizard.md | 119 ++--- ...to-detection-dhcp-or-dns-servers-ieak11.md | 125 ++--- .../auto-version-sync-ieak11-wizard.md | 97 ++-- .../before-you-create-custom-pkgs-ieak11.md | 79 +-- .../ie11-ieak/branding-ins-file-setting.md | 109 ++--- .../ie11-ieak/browser-ui-ieak11-wizard.md | 113 ++--- .../browsertoolbars-ins-file-setting.md | 79 +-- .../browsing-options-ieak11-wizard.md | 4 +- .../ie11-ieak/cabsigning-ins-file-setting.md | 53 +- .../ie11-ieak/compat-view-ieak11-wizard.md | 45 +- .../ie11-ieak/connection-mgr-ieak11-wizard.md | 43 +- .../connection-settings-ieak11-wizard.md | 83 ++-- .../connectionsettings-ins-file-setting.md | 53 +- .../create-build-folder-structure-ieak11.md | 49 +- ...create-manage-deploy-custom-pkgs-ieak11.md | 55 +-- ...create-multiple-browser-packages-ieak11.md | 77 +-- ...install-inf-files-for-custom-components.md | 59 +-- .../custom-components-ieak11-wizard.md | 121 ++--- .../custombranding-ins-file-setting.md | 49 +- .../customize-automatic-search-for-ie.md | 207 ++++---- .../ie11-ieak/extreginf-ins-file-setting.md | 57 +-- ...es-favoritesbar-and-feeds-ieak11-wizard.md | 219 ++++----- .../ie11-ieak/favoritesex-ins-file-setting.md | 53 +- .../feature-selection-ieak11-wizard.md | 4 +- .../ie11-ieak/file-locations-ieak11-wizard.md | 111 ++--- .../ie11-ieak/file-types-ieak11.md | 75 +-- ...irst-run-and-welcome-page-ieak11-wizard.md | 89 ++-- ...lines-toolbar-and-favorites-list-ieak11.md | 57 +-- .../hardware-and-software-reqs-ieak11.md | 105 ++-- .../ie11-ieak/hidecustom-ins-file-setting.md | 65 +-- ...p-command-line-options-and-return-codes.md | 137 +++--- .../ieak-information-and-downloads.md | 103 ++-- .../ie11-ieak/ieak11-wizard-custom-options.md | 89 ++-- .../iexpress-command-line-options.md | 87 ++-- .../iexpress-wizard-for-win-server.md | 145 +++--- ...rls-home-page-and-support-ieak11-wizard.md | 79 +-- browsers/internet-explorer/ie11-ieak/index.md | 4 +- .../internal-install-ieak11-wizard.md | 79 +-- .../isp-security-ins-file-setting.md | 47 +- .../language-selection-ieak11-wizard.md | 75 +-- .../licensing-version-and-features-ieak11.md | 4 +- .../ie11-ieak/media-ins-file-setting.md | 47 +- .../pkg-type-selection-ieak11-wizard.md | 79 +-- .../platform-selection-ieak11-wizard.md | 4 +- .../prep-network-install-with-ieak11.md | 71 +-- .../ie11-ieak/programs-ieak11-wizard.md | 4 +- .../ie11-ieak/proxy-auto-config-examples.md | 363 +++++++------- .../ie11-ieak/proxy-ins-file-setting.md | 61 +-- .../ie11-ieak/proxy-settings-ieak11-wizard.md | 111 ++--- .../register-uninstall-app-ieak11.md | 57 +-- .../rsop-snapin-for-policy-settings-ieak11.md | 93 ++-- .../search-providers-ieak11-wizard.md | 113 ++--- .../ie11-ieak/security-and-ieak11.md | 131 ++--- ...rity-and-privacy-settings-ieak11-wizard.md | 87 ++-- .../security-imports-ins-file-setting.md | 55 +-- ...oubleshooting-custom-browser-pkg-ieak11.md | 247 +++++----- 119 files changed, 6568 insertions(+), 6470 deletions(-) diff --git a/browsers/edge/about-microsoft-edge.md b/browsers/edge/about-microsoft-edge.md index 7785a2e78e..b58f9167db 100644 --- a/browsers/edge/about-microsoft-edge.md +++ b/browsers/edge/about-microsoft-edge.md @@ -1,167 +1,167 @@ ---- -title: Microsoft Edge system and language requirements -description: Overview information about Microsoft Edge, the default browser for Windows 10. This topic includes links to other Microsoft Edge topics. -ms.assetid: 70377735-b2f9-4b0b-9658-4cf7c1d745bb -ms.reviewer: -audience: itpromanager: dansimp -o manager: dansimp -ms.author: eravena -author: dansimp -ms.prod: edge -ms.mktglfcycl: general -ms.topic: reference -ms.sitesec: library -title: Microsoft Edge for IT Pros -ms.localizationpriority: medium -ms.date: 10/02/2018 ---- - -# Microsoft Edge system and language requirements ->Applies to: Microsoft Edge on Windows 10 and Windows 10 Mobile - -Microsoft Edge is the new, default web browser for Windows 10, helping you to experience modern web standards, better performance, improved security, and increased reliability. Microsoft Edge lets you stay up-to-date through the Microsoft Store and to manage your enterprise through Group Policy or your mobile device management (MDM) tools. - - ->[!IMPORTANT] ->The Long-Term Servicing Branch (LTSB) versions of Windows, including Windows Server 2016, don’t include Microsoft Edge or many other Universal Windows Platform (UWP) apps. Systems running the LTSB operating systems do not support these apps because their services get frequently updated with new functionality. For customers who require the LTSB for specialized devices, we recommend using Internet Explorer 11. - - -## Minimum system requirements -Some of the components might also need additional system resources. Check the component's documentation for more information. - - -| Item | Minimum requirements | -|--------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| -| Computer/processor | 1 gigahertz (GHz) or faster (32-bit (x86) or 64-bit (x64)) | -| Operating system |
  • Windows 10 (32-bit or 64-bit)
  • Windows 10 Mobile

Note
For specific Windows 10 Mobile requirements, see the [Minimum hardware requirements for Windows 10 Mobile](https://go.microsoft.com/fwlink/p/?LinkID=699266) topic. | -| Memory |

  • Windows 10 (32-bit) - 1 GB
  • Windows 10 (64-bit) - 2 GB
| -| Hard drive space |
  • Windows 10 (32-bit) - 16 GB
  • Windows 10 (64-bit) - 20 GB
| -| DVD drive | DVD-ROM drive (if installing from a DVD-ROM) | -| Display | Super VGA (800 x 600) or higher-resolution monitor with 256 colors | -| Graphics card | Microsoft DirectX 9 or later with Windows Display Driver Model (WDDM) 1.0 driver | -| Peripherals | Internet connection and a compatible pointing device | - ---- - - -## Supported languages - -Microsoft Edge supports all of the same languages as Windows 10 and you can use the [Microsoft Translator extension](https://www.microsoft.com/p/translator-for-microsoft-edge/9nblggh4n4n3) to translate foreign language web pages and text selections for 60+ languages. - -If the extension does not work after install, restart Microsoft Edge. If the extension still does not work, provide feedback through the Feedback Hub. - - -| Language | Country/Region | Code | -|----------------------------------------------------|-----------------------------------------|----------------| -| Afrikaans (South Africa) | South Africa | af-ZA | -| Albanian (Albania) | Albania | sq-AL | -| Amharic | Ethiopia | am-ET | -| Arabic (Saudi Arabia) | Saudi Arabia | ar-SA | -| Armenian | Armenia | hy-AM | -| Assamese | India | as-IN | -| Azerbaijani (Latin, Azerbaijan) | Azerbaijan | az-Latn-AZ | -| Bangla (Bangladesh) | Bangladesh | bn-BD | -| Bangla (India) | India | bn-IN | -| Basque (Basque) | Spain | eu-ES | -| Belarusian (Belarus) | Belarus | be-BY | -| Bosnian (Latin) | Bosnia and Herzegovina | bs-Latn-BA | -| Bulgarian (Bulgaria) | Bulgaria | bg-BG | -| Catalan (Catalan) | Spain | ca-ES | -| Central Kurdish (Arabic) | Iraq | ku-Arab-IQ | -| Cherokee (Cherokee) | United States | chr-Cher-US | -| Chinese (Hong Kong SAR) | Hong Kong Special Administrative Region | zh-HK | -| Chinese (Simplified, China) | People's Republic of China | zh-CN | -| Chinese (Traditional, Taiwan) | Taiwan | zh-TW | -| Croatian (Croatia) | Croatia | hr-HR | -| Czech (Czech Republic) | Czech Republic | cs-CZ | -| Danish (Denmark) | Denmark | da-DK | -| Dari | Afghanistan | prs-AF | -| Dutch (Netherlands) | Netherlands | nl-NL | -| English (United Kingdom) | United Kingdom | en-GB | -| English (United States) | United States | en-US | -| Estonian (Estonia) | Estonia | et-EE | -| Filipino (Philippines) | Philippines | fil-PH | -| Finnish (Finland) | Finland | fi_FI | -| French (Canada) | Canada | fr-CA | -| French (France) | France | fr-FR | -| Galician (Galician) | Spain | gl-ES | -| Georgian | Georgia | ka-GE | -| German (Germany) | Germany | de-DE | -| Greek (Greece) | Greece | el-GR | -| Gujarati | India | gu-IN | -| Hausa (Latin, Nigeria) | Nigeria | ha-Latn-NG | -| Hebrew (Israel) | Israel | he-IL | -| Hindi (India) | India | hi-IN | -| Hungarian (Hungary) | Hungary | hu-HU | -| Icelandic | Iceland | is-IS | -| Igbo | Nigeria | ig-NG | -| Indonesian (Indonesia) | Indonesia | id-ID | -| Irish | Ireland | ga-IE | -| isiXhosa | South Africa | xh-ZA | -| isiZulu | South Africa | zu-ZA | -| Italian (Italy) | Italy | it-IT | -| Japanese (Japan) | Japan | ja-JP | -| Kannada | India | kn-IN | -| Kazakh (Kazakhstan) | Kazakhstan | kk-KZ | -| Khmer (Cambodia) | Cambodia | km-KH | -| K'iche' | Guatemala | quc-Latn-GT | -| Kinyarwanda | Rwanda | rw-RW | -| KiSwahili | Kenya, Tanzania | sw-KE | -| Konkani | India | kok-IN | -| Korean (Korea) | Korea | ko-KR | -| Kyrgyz | Kyrgyzstan | ky-KG | -| Lao (Laos) | Lao P.D.R. | lo-LA | -| Latvian (Latvia) | Latvia | lv-LV | -| Lithuanian (Lithuania) | Lithuania | lt-LT | -| Luxembourgish (Luxembourg) | Luxembourg | lb-LU | -| Macedonian (Former Yugoslav Republic of Macedonia) | Macedonia (FYROM) | mk-MK | -| Malay (Malaysia) | Malaysia, Brunei, and Singapore | ms-MY | -| Malayalam | India | ml-IN | -| Maltese | Malta | mt-MT | -| Maori | New Zealand | mi-NZ | -| Marathi | India | mr-IN | -| Mongolian (Cyrillic) | Mongolia | mn-MN | -| Nepali | Federal Democratic Republic of Nepal | ne-NP | -| Norwegian (Nynorsk) | Norway | nn-NO | -| Norwegian, Bokmål (Norway) | Norway | nb-NO | -| Odia | India | or-IN | -| Polish (Poland) | Poland | pl-PL | -| Portuguese (Brazil) | Brazil | pt-BR | -| Portuguese (Portugal) | Portugal | pt-PT | -| Punjabi | India | pa-IN | -| Punjabi (Arabic) | Pakistan | pa-Arab-PK | -| Quechua | Peru | quz-PE | -| Romanian (Romania) | Romania | ro-RO | -| Russian (Russia) | Russia | ru-RU | -| Scottish Gaelic | United Kingdom | gd-GB | -| Serbian (Cyrillic, Bosnia, and Herzegovina) | Bosnia and Herzegovina | sr-Cyrl-BA | -| Serbian (Cyrillic, Serbia) | Serbia | sr-Cyrl-RS | -| Serbian (Latin, Serbia) | Serbia | sr-Latn-RS | -| Sesotho sa Leboa | South Africa | nso-ZA | -| Setswana (South Africa) | South Africa and Botswana | tn-ZA | -| Sindhi (Arabic) | Pakistan | sd-Arab-PK | -| Sinhala | Sri Lanka | si-LK | -| Slovak (Slovakia) | Slovakia | sk-SK | -| Slovenian (Slovenia) | Slovenia | sl-SL | -| Spanish (Mexico) | Mexico | es-MX | -| Spanish (Spain, International Sort) | Spain | en-ES | -| Swedish (Sweden) | Sweden | sv-SE | -| Tajik (Cyrillic) | Tajikistan | tg-Cyrl-TJ | -| Tamil (India) | India and Sri Lanka | ta-IN | -| Tatar | Russia | tt-RU | -| Telugu | India | te-IN | -| Thai (Thailand) | Thailand | th-TH | -| Tigrinya (Ethiopia) | Ethiopia | ti-ET | -| Turkish (Turkey) | Turkey | tr-TR | -| Turkmen | Turkmenistan | tk-TM | -| Ukrainian (Ukraine) | Ukraine | uk-UA | -| Urdu | Pakistan | ur-PK | -| Uyghur | People's Republic of China | ug-CN | -| Uzbek (Latin, Uzbekistan) | Uzbekistan | uz-Latn-UZ | -| Valencian | Spain | ca-ES-valencia | -| Vietnamese | Vietnam | vi-VN | -| Welsh | United Kingdom | cy-GB | -| Wolof | Senegal | wo-SN | -| Yoruba | Nigeria | yo-NG | - ---- +--- +title: Microsoft Edge system and language requirements +description: Overview information about Microsoft Edge, the default browser for Windows 10. This topic includes links to other Microsoft Edge topics. +ms.assetid: 70377735-b2f9-4b0b-9658-4cf7c1d745bb +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +author: dansimp +ms.prod: edge +ms.mktglfcycl: general +ms.topic: reference +ms.sitesec: library +title: Microsoft Edge for IT Pros +ms.localizationpriority: medium +ms.date: 10/02/2018 +--- + +# Microsoft Edge system and language requirements +>Applies to: Microsoft Edge on Windows 10 and Windows 10 Mobile + +Microsoft Edge is the new, default web browser for Windows 10, helping you to experience modern web standards, better performance, improved security, and increased reliability. Microsoft Edge lets you stay up-to-date through the Microsoft Store and to manage your enterprise through Group Policy or your mobile device management (MDM) tools. + + +>[!IMPORTANT] +>The Long-Term Servicing Branch (LTSB) versions of Windows, including Windows Server 2016, don’t include Microsoft Edge or many other Universal Windows Platform (UWP) apps. Systems running the LTSB operating systems do not support these apps because their services get frequently updated with new functionality. For customers who require the LTSB for specialized devices, we recommend using Internet Explorer 11. + + +## Minimum system requirements +Some of the components might also need additional system resources. Check the component's documentation for more information. + + +| Item | Minimum requirements | +|--------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| +| Computer/processor | 1 gigahertz (GHz) or faster (32-bit (x86) or 64-bit (x64)) | +| Operating system |
  • Windows 10 (32-bit or 64-bit)
  • Windows 10 Mobile

Note
For specific Windows 10 Mobile requirements, see the [Minimum hardware requirements for Windows 10 Mobile](https://go.microsoft.com/fwlink/p/?LinkID=699266) topic. | +| Memory |

  • Windows 10 (32-bit) - 1 GB
  • Windows 10 (64-bit) - 2 GB
| +| Hard drive space |
  • Windows 10 (32-bit) - 16 GB
  • Windows 10 (64-bit) - 20 GB
| +| DVD drive | DVD-ROM drive (if installing from a DVD-ROM) | +| Display | Super VGA (800 x 600) or higher-resolution monitor with 256 colors | +| Graphics card | Microsoft DirectX 9 or later with Windows Display Driver Model (WDDM) 1.0 driver | +| Peripherals | Internet connection and a compatible pointing device | + +--- + + +## Supported languages + +Microsoft Edge supports all of the same languages as Windows 10 and you can use the [Microsoft Translator extension](https://www.microsoft.com/p/translator-for-microsoft-edge/9nblggh4n4n3) to translate foreign language web pages and text selections for 60+ languages. + +If the extension does not work after install, restart Microsoft Edge. If the extension still does not work, provide feedback through the Feedback Hub. + + +| Language | Country/Region | Code | +|----------------------------------------------------|-----------------------------------------|----------------| +| Afrikaans (South Africa) | South Africa | af-ZA | +| Albanian (Albania) | Albania | sq-AL | +| Amharic | Ethiopia | am-ET | +| Arabic (Saudi Arabia) | Saudi Arabia | ar-SA | +| Armenian | Armenia | hy-AM | +| Assamese | India | as-IN | +| Azerbaijani (Latin, Azerbaijan) | Azerbaijan | az-Latn-AZ | +| Bangla (Bangladesh) | Bangladesh | bn-BD | +| Bangla (India) | India | bn-IN | +| Basque (Basque) | Spain | eu-ES | +| Belarusian (Belarus) | Belarus | be-BY | +| Bosnian (Latin) | Bosnia and Herzegovina | bs-Latn-BA | +| Bulgarian (Bulgaria) | Bulgaria | bg-BG | +| Catalan (Catalan) | Spain | ca-ES | +| Central Kurdish (Arabic) | Iraq | ku-Arab-IQ | +| Cherokee (Cherokee) | United States | chr-Cher-US | +| Chinese (Hong Kong SAR) | Hong Kong Special Administrative Region | zh-HK | +| Chinese (Simplified, China) | People's Republic of China | zh-CN | +| Chinese (Traditional, Taiwan) | Taiwan | zh-TW | +| Croatian (Croatia) | Croatia | hr-HR | +| Czech (Czech Republic) | Czech Republic | cs-CZ | +| Danish (Denmark) | Denmark | da-DK | +| Dari | Afghanistan | prs-AF | +| Dutch (Netherlands) | Netherlands | nl-NL | +| English (United Kingdom) | United Kingdom | en-GB | +| English (United States) | United States | en-US | +| Estonian (Estonia) | Estonia | et-EE | +| Filipino (Philippines) | Philippines | fil-PH | +| Finnish (Finland) | Finland | fi_FI | +| French (Canada) | Canada | fr-CA | +| French (France) | France | fr-FR | +| Galician (Galician) | Spain | gl-ES | +| Georgian | Georgia | ka-GE | +| German (Germany) | Germany | de-DE | +| Greek (Greece) | Greece | el-GR | +| Gujarati | India | gu-IN | +| Hausa (Latin, Nigeria) | Nigeria | ha-Latn-NG | +| Hebrew (Israel) | Israel | he-IL | +| Hindi (India) | India | hi-IN | +| Hungarian (Hungary) | Hungary | hu-HU | +| Icelandic | Iceland | is-IS | +| Igbo | Nigeria | ig-NG | +| Indonesian (Indonesia) | Indonesia | id-ID | +| Irish | Ireland | ga-IE | +| isiXhosa | South Africa | xh-ZA | +| isiZulu | South Africa | zu-ZA | +| Italian (Italy) | Italy | it-IT | +| Japanese (Japan) | Japan | ja-JP | +| Kannada | India | kn-IN | +| Kazakh (Kazakhstan) | Kazakhstan | kk-KZ | +| Khmer (Cambodia) | Cambodia | km-KH | +| K'iche' | Guatemala | quc-Latn-GT | +| Kinyarwanda | Rwanda | rw-RW | +| KiSwahili | Kenya, Tanzania | sw-KE | +| Konkani | India | kok-IN | +| Korean (Korea) | Korea | ko-KR | +| Kyrgyz | Kyrgyzstan | ky-KG | +| Lao (Laos) | Lao P.D.R. | lo-LA | +| Latvian (Latvia) | Latvia | lv-LV | +| Lithuanian (Lithuania) | Lithuania | lt-LT | +| Luxembourgish (Luxembourg) | Luxembourg | lb-LU | +| Macedonian (Former Yugoslav Republic of Macedonia) | Macedonia (FYROM) | mk-MK | +| Malay (Malaysia) | Malaysia, Brunei, and Singapore | ms-MY | +| Malayalam | India | ml-IN | +| Maltese | Malta | mt-MT | +| Maori | New Zealand | mi-NZ | +| Marathi | India | mr-IN | +| Mongolian (Cyrillic) | Mongolia | mn-MN | +| Nepali | Federal Democratic Republic of Nepal | ne-NP | +| Norwegian (Nynorsk) | Norway | nn-NO | +| Norwegian, Bokmål (Norway) | Norway | nb-NO | +| Odia | India | or-IN | +| Polish (Poland) | Poland | pl-PL | +| Portuguese (Brazil) | Brazil | pt-BR | +| Portuguese (Portugal) | Portugal | pt-PT | +| Punjabi | India | pa-IN | +| Punjabi (Arabic) | Pakistan | pa-Arab-PK | +| Quechua | Peru | quz-PE | +| Romanian (Romania) | Romania | ro-RO | +| Russian (Russia) | Russia | ru-RU | +| Scottish Gaelic | United Kingdom | gd-GB | +| Serbian (Cyrillic, Bosnia, and Herzegovina) | Bosnia and Herzegovina | sr-Cyrl-BA | +| Serbian (Cyrillic, Serbia) | Serbia | sr-Cyrl-RS | +| Serbian (Latin, Serbia) | Serbia | sr-Latn-RS | +| Sesotho sa Leboa | South Africa | nso-ZA | +| Setswana (South Africa) | South Africa and Botswana | tn-ZA | +| Sindhi (Arabic) | Pakistan | sd-Arab-PK | +| Sinhala | Sri Lanka | si-LK | +| Slovak (Slovakia) | Slovakia | sk-SK | +| Slovenian (Slovenia) | Slovenia | sl-SL | +| Spanish (Mexico) | Mexico | es-MX | +| Spanish (Spain, International Sort) | Spain | en-ES | +| Swedish (Sweden) | Sweden | sv-SE | +| Tajik (Cyrillic) | Tajikistan | tg-Cyrl-TJ | +| Tamil (India) | India and Sri Lanka | ta-IN | +| Tatar | Russia | tt-RU | +| Telugu | India | te-IN | +| Thai (Thailand) | Thailand | th-TH | +| Tigrinya (Ethiopia) | Ethiopia | ti-ET | +| Turkish (Turkey) | Turkey | tr-TR | +| Turkmen | Turkmenistan | tk-TM | +| Ukrainian (Ukraine) | Ukraine | uk-UA | +| Urdu | Pakistan | ur-PK | +| Uyghur | People's Republic of China | ug-CN | +| Uzbek (Latin, Uzbekistan) | Uzbekistan | uz-Latn-UZ | +| Valencian | Spain | ca-ES-valencia | +| Vietnamese | Vietnam | vi-VN | +| Welsh | United Kingdom | cy-GB | +| Wolof | Senegal | wo-SN | +| Yoruba | Nigeria | yo-NG | + +--- diff --git a/browsers/edge/microsoft-edge-kiosk-mode-deploy.md b/browsers/edge/microsoft-edge-kiosk-mode-deploy.md index 5e10c3201b..b8899ba2b6 100644 --- a/browsers/edge/microsoft-edge-kiosk-mode-deploy.md +++ b/browsers/edge/microsoft-edge-kiosk-mode-deploy.md @@ -6,7 +6,7 @@ ms.reviewer: audience: itpro manager: dansimp author: dansimp -ms.author: eravena +ms.author: dansimp ms.prod: edge ms.sitesec: library ms.topic: article diff --git a/browsers/enterprise-mode/add-employees-enterprise-mode-portal.md b/browsers/enterprise-mode/add-employees-enterprise-mode-portal.md index 21d571b2f4..08d914e629 100644 --- a/browsers/enterprise-mode/add-employees-enterprise-mode-portal.md +++ b/browsers/enterprise-mode/add-employees-enterprise-mode-portal.md @@ -10,7 +10,7 @@ ms.sitesec: library ms.date: 07/27/2017 ms.reviewer: manager: dansimp -ms.author: eravena +ms.author: dansimp --- # Add employees to the Enterprise Mode Site List Portal diff --git a/browsers/enterprise-mode/add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md b/browsers/enterprise-mode/add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md index b61f128515..39adf2816d 100644 --- a/browsers/enterprise-mode/add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md +++ b/browsers/enterprise-mode/add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md @@ -8,7 +8,7 @@ ms.prod: ie11 ms.assetid: 20aF07c4-051a-451f-9c46-5a052d9Ae27c ms.reviewer: manager: dansimp -ms.author: eravena +ms.author: dansimp title: Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.1) (Internet Explorer 11 for IT Pros) ms.sitesec: library ms.date: 07/27/2017 diff --git a/browsers/enterprise-mode/add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md b/browsers/enterprise-mode/add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md index 0d2acc3714..b4da3f64f5 100644 --- a/browsers/enterprise-mode/add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md +++ b/browsers/enterprise-mode/add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md @@ -8,7 +8,7 @@ ms.prod: ie11 ms.assetid: da659ff5-70d5-4852-995e-4df67c4871dd ms.reviewer: manager: dansimp -ms.author: eravena +ms.author: dansimp title: Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.2) (Internet Explorer 11 for IT Pros) ms.sitesec: library ms.date: 10/24/2017 diff --git a/browsers/enterprise-mode/add-single-sites-to-enterprise-mode-site-list-using-the-version-2-enterprise-mode-tool.md b/browsers/enterprise-mode/add-single-sites-to-enterprise-mode-site-list-using-the-version-2-enterprise-mode-tool.md index 00f396d1d4..c1a7aee9b8 100644 --- a/browsers/enterprise-mode/add-single-sites-to-enterprise-mode-site-list-using-the-version-2-enterprise-mode-tool.md +++ b/browsers/enterprise-mode/add-single-sites-to-enterprise-mode-site-list-using-the-version-2-enterprise-mode-tool.md @@ -8,7 +8,7 @@ ms.prod: ie11 ms.assetid: 513e8f3b-fedf-4d57-8d81-1ea4fdf1ac0b ms.reviewer: manager: dansimp -ms.author: eravena +ms.author: dansimp title: Add sites to the Enterprise Mode site list using the Enterprise Mode Site List Manager (schema v.2) (Internet Explorer 11 for IT Pros) ms.sitesec: library ms.date: 07/27/2017 diff --git a/browsers/enterprise-mode/check-for-new-enterprise-mode-site-list-xml-file.md b/browsers/enterprise-mode/check-for-new-enterprise-mode-site-list-xml-file.md index e59c5e151a..7696eedaca 100644 --- a/browsers/enterprise-mode/check-for-new-enterprise-mode-site-list-xml-file.md +++ b/browsers/enterprise-mode/check-for-new-enterprise-mode-site-list-xml-file.md @@ -9,7 +9,7 @@ ms.mktglfcycl: deploy ms.pagetype: appcompat ms.sitesec: library author: dansimp -ms.author: eravena +ms.author: dansimp ms.date: 08/14/2017 ms.localizationpriority: low --- diff --git a/browsers/internet-explorer/ie11-deploy-guide/delete-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md b/browsers/internet-explorer/ie11-deploy-guide/delete-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md index e06c6cf34d..b2c4c0f80a 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/delete-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md +++ b/browsers/internet-explorer/ie11-deploy-guide/delete-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md @@ -9,7 +9,7 @@ ms.assetid: 41413459-b57f-48da-aedb-4cbec1e2981a ms.reviewer: audience: itpro manager: dansimp -ms.author: lomayor +ms.author: dansimp title: Delete sites from your Enterprise Mode site list in the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros) ms.sitesec: library ms.date: 07/27/2017 diff --git a/browsers/internet-explorer/ie11-deploy-guide/install-and-deploy-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/install-and-deploy-ie11.md index f5e959c3c4..e9fcf44f0e 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/install-and-deploy-ie11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/install-and-deploy-ie11.md @@ -1,44 +1,45 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: Use the topics in this section to learn how to customize your Internet Explorer installation package, how to choose the right method for installation, and how to deploy IE into your environment. -author: lomayor -ms.prod: ie11 -ms.assetid: caca18c1-d5c4-4404-84f8-d02bc562915f -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Install and Deploy Internet Explorer 11 (IE11) (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Install and Deploy Internet Explorer 11 (IE11) - -**Applies to:** - -- Windows 10 -- Windows 8.1 Update -- Windows 7 with Service Pack 1 (SP1) -- Windows Server 2012 R2 -- Windows Server 2008 R2 with Service Pack 1 (SP1) - -Use the topics in this section to learn how to customize your Internet Explorer installation package, how to choose the right method for installation, and how to deploy IE into your environment. You can also find more info about your virtualization options for legacy apps. - -## In this section - -|Topic |Description | -|------|------------| -|[Customize Internet Explorer 11 installation packages](customize-ie11-install-packages.md) |Guidance about how to use .INF files or the IE Administration Kit 11 (IEAK 11) to create custom packages and about how to create those packages for multiple operating systems. | -|[Choose how to install Internet Explorer 11 (IE11)](choose-how-to-install-ie11.md) |Guidance for the different ways you can install IE, including using System Center 2012 R2 Configuration Manager, Windows Server Update Services (WSUS), Microsoft Intune, your network, the operating system deployment system, or third-party tools. | -|[Choose how to deploy Internet Explorer 11 (IE11)](choose-how-to-deploy-ie11.md) |Guidance about how to deploy your custom version of IE using Automatic Version Synchronization (AVS) or using your software distribution tools. | -|[Virtualization and compatibility with Internet Explorer 11](virtualization-and-compatibility-with-ie11.md) |Info about the Microsoft-supported options for virtualizing web apps. | - - - - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: Use the topics in this section to learn how to customize your Internet Explorer installation package, how to choose the right method for installation, and how to deploy IE into your environment. +author: dansimp +ms.prod: ie11 +ms.assetid: caca18c1-d5c4-4404-84f8-d02bc562915f +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Install and Deploy Internet Explorer 11 (IE11) (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Install and Deploy Internet Explorer 11 (IE11) + +**Applies to:** + +- Windows 10 +- Windows 8.1 Update +- Windows 7 with Service Pack 1 (SP1) +- Windows Server 2012 R2 +- Windows Server 2008 R2 with Service Pack 1 (SP1) + +Use the topics in this section to learn how to customize your Internet Explorer installation package, how to choose the right method for installation, and how to deploy IE into your environment. You can also find more info about your virtualization options for legacy apps. + +## In this section + +|Topic |Description | +|------|------------| +|[Customize Internet Explorer 11 installation packages](customize-ie11-install-packages.md) |Guidance about how to use .INF files or the IE Administration Kit 11 (IEAK 11) to create custom packages and about how to create those packages for multiple operating systems. | +|[Choose how to install Internet Explorer 11 (IE11)](choose-how-to-install-ie11.md) |Guidance for the different ways you can install IE, including using System Center 2012 R2 Configuration Manager, Windows Server Update Services (WSUS), Microsoft Intune, your network, the operating system deployment system, or third-party tools. | +|[Choose how to deploy Internet Explorer 11 (IE11)](choose-how-to-deploy-ie11.md) |Guidance about how to deploy your custom version of IE using Automatic Version Synchronization (AVS) or using your software distribution tools. | +|[Virtualization and compatibility with Internet Explorer 11](virtualization-and-compatibility-with-ie11.md) |Info about the Microsoft-supported options for virtualizing web apps. | + + + + + + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-microsoft-intune.md b/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-microsoft-intune.md index 25226f2ad0..7dd92ecc08 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-microsoft-intune.md +++ b/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-microsoft-intune.md @@ -2,12 +2,12 @@ ms.localizationpriority: medium ms.mktglfcycl: deploy description: How to add and deploy the Internet Explorer 11 update using Microsoft Intune. -author: lomayor +author: dansimp ms.prod: ie11 ms.assetid: b2dfc08c-78af-4c22-8867-7be3b92b1616 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp title: Install Internet Explorer 11 (IE11) using Microsoft Intune (Internet Explorer 11 for IT Pros) ms.sitesec: library ms.date: 07/27/2017 diff --git a/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-operating-system-deployment-systems.md b/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-operating-system-deployment-systems.md index 5046293535..5dade69199 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-operating-system-deployment-systems.md +++ b/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-operating-system-deployment-systems.md @@ -1,59 +1,60 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: How to install the Internet Explorer 11 update using Microsoft Deployment Toolkit (MDT) and your Windows images. -author: lomayor -ms.prod: ie11 -ms.assetid: e16f9144-170c-4964-a62d-0d1a16f4cd1f -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Install Internet Explorer 11 (IE11) using Microsoft Deployment Toolkit (MDT) and your Windows images (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Install Internet Explorer 11 (IE11) using Microsoft Deployment Toolkit (MDT) and your Windows images - -You can install Internet Explorer 11 (IE11) using Microsoft Deployment Toolkit (MDT) and your Windows images. - -You'll need to extract the .cab file for each supported operating system and platform combination and the .msu file for each prerequisite update. Download the IE11 update and prerequisites here: - -- [Microsoft Download Center](https://go.microsoft.com/fwlink/p/?LinkId=279697) - -- [Microsoft Update Catalog](https://go.microsoft.com/fwlink/p/?LinkId=214287) - -After you install the .msu file updates, you'll need to add them to your MDT deployment. You'll also need to extract the IE11 .cab update file from the IE11 installation package, using the `/x` command-line option. For example, `IE11-Windows6.1-x64-en-us.exe /x:c:\ie11cab`. - -## Installing IE11 using Microsoft Deployment Toolkit (MDT) - -MDT adds IE11 to your Windows images, regardless whether you are creating or deploying a customized or non-customized image. MDT also lets you perform offline servicing during the System Center 2012 R2 Configuration Manager task sequence, letting you add IE11 before starting Windows. For info, see [Microsoft Deployment Toolkit (MDT)](https://go.microsoft.com/fwlink/p/?linkid=331148). - - **To add IE11 to a MDT deployment share** - -1. Right-click **Packages** from each **Deployment Shares** location, and then click **Import OS Packages**. - -2. Go to the **Specify Directory** page, search for your folder with your update files (.cab and .msu) for import, and click **Next**. - -3. Go to the **Summary** page and click **Next**.

-MDT starts importing your update files.

**Note**
Ignore any warnings that say, "Skipping invalid CAB file". This shows up because the **Import OS Packages** wizard skips the IE11\_Support.cab file, which isn't an actual update file. - -4. After the import finishes, click **Finish**. - -### Offline servicing with MDT - -You can add the IE11 update while you're performing offline servicing, or slipstreaming, of your Windows images. This method lets you deploy IE11 without needing any additional installation after you've deployed Windows. - -These articles have step-by-step details about adding packages to your Windows images: - -- For Windows 8.1, see [Add or Remove Packages Offline Using DISM](https://go.microsoft.com/fwlink/p/?LinkId=276791). - -- For Windows 7 SP1, see [Add or Remove Packages Offline](https://go.microsoft.com/fwlink/p/?LinkId=214490). - -  - -  - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: How to install the Internet Explorer 11 update using Microsoft Deployment Toolkit (MDT) and your Windows images. +author: dansimp +ms.prod: ie11 +ms.assetid: e16f9144-170c-4964-a62d-0d1a16f4cd1f +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Install Internet Explorer 11 (IE11) using Microsoft Deployment Toolkit (MDT) and your Windows images (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Install Internet Explorer 11 (IE11) using Microsoft Deployment Toolkit (MDT) and your Windows images + +You can install Internet Explorer 11 (IE11) using Microsoft Deployment Toolkit (MDT) and your Windows images. + +You'll need to extract the .cab file for each supported operating system and platform combination and the .msu file for each prerequisite update. Download the IE11 update and prerequisites here: + +- [Microsoft Download Center](https://go.microsoft.com/fwlink/p/?LinkId=279697) + +- [Microsoft Update Catalog](https://go.microsoft.com/fwlink/p/?LinkId=214287) + +After you install the .msu file updates, you'll need to add them to your MDT deployment. You'll also need to extract the IE11 .cab update file from the IE11 installation package, using the `/x` command-line option. For example, `IE11-Windows6.1-x64-en-us.exe /x:c:\ie11cab`. + +## Installing IE11 using Microsoft Deployment Toolkit (MDT) + +MDT adds IE11 to your Windows images, regardless whether you are creating or deploying a customized or non-customized image. MDT also lets you perform offline servicing during the System Center 2012 R2 Configuration Manager task sequence, letting you add IE11 before starting Windows. For info, see [Microsoft Deployment Toolkit (MDT)](https://go.microsoft.com/fwlink/p/?linkid=331148). + + **To add IE11 to a MDT deployment share** + +1. Right-click **Packages** from each **Deployment Shares** location, and then click **Import OS Packages**. + +2. Go to the **Specify Directory** page, search for your folder with your update files (.cab and .msu) for import, and click **Next**. + +3. Go to the **Summary** page and click **Next**.

+MDT starts importing your update files.

**Note**
Ignore any warnings that say, "Skipping invalid CAB file". This shows up because the **Import OS Packages** wizard skips the IE11\_Support.cab file, which isn't an actual update file. + +4. After the import finishes, click **Finish**. + +### Offline servicing with MDT + +You can add the IE11 update while you're performing offline servicing, or slipstreaming, of your Windows images. This method lets you deploy IE11 without needing any additional installation after you've deployed Windows. + +These articles have step-by-step details about adding packages to your Windows images: + +- For Windows 8.1, see [Add or Remove Packages Offline Using DISM](https://go.microsoft.com/fwlink/p/?LinkId=276791). + +- For Windows 7 SP1, see [Add or Remove Packages Offline](https://go.microsoft.com/fwlink/p/?LinkId=214490). + +  + +  + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-system-center-configuration-manager.md b/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-system-center-configuration-manager.md index 4d91b89af4..2b40174159 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-system-center-configuration-manager.md +++ b/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-system-center-configuration-manager.md @@ -1,38 +1,39 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: appcompat -description: How to install the Internet Explorer 11 update using System Center 2012 R2 Configuration Manager -author: lomayor -ms.prod: ie11 -ms.assetid: 9ede9722-29b3-4cb7-956d-ffa91e7bedbd -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Install Internet Explorer 11 (IE11) using System Center 2012 R2 Configuration Manager (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Install Internet Explorer 11 (IE11) using System Center 2012 R2 Configuration Manager -You can install Internet Explorer 11 (IE11) by using [System Center R2 2012 Configuration Manager](https://go.microsoft.com/fwlink/p/?linkid=276664). Complete these steps for each operating system and platform combination. - - **To install IE11** - -1. Download and approve the [System requirements and language support for Internet Explorer 11 (IE11)](system-requirements-and-language-support-for-ie11.md). - -2. Create a software distribution package that includes the IE11 installation package. - -3. Create a program that includes the command-line needed to run the IE11 installation package. To run the package silently, without restarting and without checking the Internet for updates, use:`ie11_package.exe /quiet /norestart /update-no`. - -4. Move the installation package to your distribution points, and then advertise the package. - -You can also use System Center Essentials 2010 to deploy IE11 installation packages. For info, see [System Center Essentials 2010](https://go.microsoft.com/fwlink/p/?linkid=395200) and the [System Center Essentials 2010 Operations Guide](https://go.microsoft.com/fwlink/p/?LinkId=214266). - -  - -  - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: appcompat +description: How to install the Internet Explorer 11 update using System Center 2012 R2 Configuration Manager +author: dansimp +ms.prod: ie11 +ms.assetid: 9ede9722-29b3-4cb7-956d-ffa91e7bedbd +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Install Internet Explorer 11 (IE11) using System Center 2012 R2 Configuration Manager (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Install Internet Explorer 11 (IE11) using System Center 2012 R2 Configuration Manager +You can install Internet Explorer 11 (IE11) by using [System Center R2 2012 Configuration Manager](https://go.microsoft.com/fwlink/p/?linkid=276664). Complete these steps for each operating system and platform combination. + + **To install IE11** + +1. Download and approve the [System requirements and language support for Internet Explorer 11 (IE11)](system-requirements-and-language-support-for-ie11.md). + +2. Create a software distribution package that includes the IE11 installation package. + +3. Create a program that includes the command-line needed to run the IE11 installation package. To run the package silently, without restarting and without checking the Internet for updates, use:`ie11_package.exe /quiet /norestart /update-no`. + +4. Move the installation package to your distribution points, and then advertise the package. + +You can also use System Center Essentials 2010 to deploy IE11 installation packages. For info, see [System Center Essentials 2010](https://go.microsoft.com/fwlink/p/?linkid=395200) and the [System Center Essentials 2010 Operations Guide](https://go.microsoft.com/fwlink/p/?LinkId=214266). + +  + +  + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-the-network.md b/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-the-network.md index 2dfe51cdf9..9da3cd91fa 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-the-network.md +++ b/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-the-network.md @@ -1,42 +1,43 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: How to install the Internet Explorer 11 update using your network -author: lomayor -ms.prod: ie11 -ms.assetid: 85f6429d-947a-4031-8f93-e26110a35828 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Install Internet Explorer 11 (IE11) using your network (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Install Internet Explorer 11 (IE11) using your network -You can install Internet Explorer 11 (IE11) over your network by putting your custom IE11 installation package in a shared network folder and letting your employees run the Setup program on their own computers. You can create the network folder structure manually, or you can run Internet Explorer Administration Kit 11 (IEAK 11). - -**Note**
If you support multiple architectures and operating systems, create a subfolder for each combination. If you support multiple languages, create a subfolder for each localized installation file. - - **To manually create the folder structure** - -- Copy your custom IE11 installation file into a folder on your network, making sure it's available to your employees. - - **To create the folder structure using IEAK 11** - -- Run the Internet Explorer Customization Wizard 11 in IEAK 11, using the **Full Installation Package** option.

- The wizard automatically puts your custom installation files in your `\\Flat` folder. Where the `` is the location of your other build files. - -**Note**
Use the localized versions of the IE Customization Wizard 11 to create localized IE11 installation packages. - -## Related topics -- [Internet Explorer Administration Kit 11 (IEAK 11) - Administration Guide for IT Pros](../ie11-ieak/index.md) - - - - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: How to install the Internet Explorer 11 update using your network +author: dansimp +ms.prod: ie11 +ms.assetid: 85f6429d-947a-4031-8f93-e26110a35828 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Install Internet Explorer 11 (IE11) using your network (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Install Internet Explorer 11 (IE11) using your network +You can install Internet Explorer 11 (IE11) over your network by putting your custom IE11 installation package in a shared network folder and letting your employees run the Setup program on their own computers. You can create the network folder structure manually, or you can run Internet Explorer Administration Kit 11 (IEAK 11). + +**Note**
If you support multiple architectures and operating systems, create a subfolder for each combination. If you support multiple languages, create a subfolder for each localized installation file. + + **To manually create the folder structure** + +- Copy your custom IE11 installation file into a folder on your network, making sure it's available to your employees. + + **To create the folder structure using IEAK 11** + +- Run the Internet Explorer Customization Wizard 11 in IEAK 11, using the **Full Installation Package** option.

+ The wizard automatically puts your custom installation files in your `\\Flat` folder. Where the `` is the location of your other build files. + +**Note**
Use the localized versions of the IE Customization Wizard 11 to create localized IE11 installation packages. + +## Related topics +- [Internet Explorer Administration Kit 11 (IEAK 11) - Administration Guide for IT Pros](../ie11-ieak/index.md) + + + + + + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-third-party-tools.md b/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-third-party-tools.md index 063f5c2aa2..5d230773e3 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-third-party-tools.md +++ b/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-third-party-tools.md @@ -1,50 +1,51 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: How to install the Internet Explorer 11 update using third-party tools and command-line options. -author: lomayor -ms.prod: ie11 -ms.assetid: 30190c66-49f7-4ca4-8b57-a47656aa0c7e -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Install Internet Explorer 11 (IE11) using third-party tools (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Install Internet Explorer 11 (IE11) using third-party tools -You can install Internet Explorer 11 (IE11) using third-party electronic software distribution (ESD) systems and these command-line options: - -## Setup Modes - -|Command-line options |Description | -|---------------------|------------------------------------------------------| -|`/passive` |Installs without customer involvement. | -|`/quiet` |Installs without customer involvement and without showing the UI. | - -## Setup Options - -|Command-line options |Description | -|---------------------|------------------------------------------------------| -|`/update-no` |Installs without checking for updates.

**Important**
If you don't use this option, you'll need an Internet connection to finish your installation. | -|`/no-default` |Installs without making IE11 the default web browser. | -|`/closeprograms` |Automatically closes running programs. | - - -## Restart Options - -|Command-line options |Description | -|---------------------|------------------------------------------------------| -|`/norestart` |Installs without restarting the computer. | -|`/forcerestart` |Installs and restarts after installation. | - -  - -  - -  - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: How to install the Internet Explorer 11 update using third-party tools and command-line options. +author: dansimp +ms.prod: ie11 +ms.assetid: 30190c66-49f7-4ca4-8b57-a47656aa0c7e +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Install Internet Explorer 11 (IE11) using third-party tools (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Install Internet Explorer 11 (IE11) using third-party tools +You can install Internet Explorer 11 (IE11) using third-party electronic software distribution (ESD) systems and these command-line options: + +## Setup Modes + +|Command-line options |Description | +|---------------------|------------------------------------------------------| +|`/passive` |Installs without customer involvement. | +|`/quiet` |Installs without customer involvement and without showing the UI. | + +## Setup Options + +|Command-line options |Description | +|---------------------|------------------------------------------------------| +|`/update-no` |Installs without checking for updates.

**Important**
If you don't use this option, you'll need an Internet connection to finish your installation. | +|`/no-default` |Installs without making IE11 the default web browser. | +|`/closeprograms` |Automatically closes running programs. | + + +## Restart Options + +|Command-line options |Description | +|---------------------|------------------------------------------------------| +|`/norestart` |Installs without restarting the computer. | +|`/forcerestart` |Installs and restarts after installation. | + +  + +  + +  + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-windows-server-update-services-wsus.md b/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-windows-server-update-services-wsus.md index aba6187431..62bfab42b9 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-windows-server-update-services-wsus.md +++ b/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-windows-server-update-services-wsus.md @@ -1,52 +1,53 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: How to install the Internet Explorer 11 update using Windows Server Update Services (WSUS)' -author: lomayor -ms.prod: ie11 -ms.assetid: 6cbd6797-c670-4236-8423-e0919478f2ce -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Install Internet Explorer 11 (IE11) using Windows Server Update Services (WSUS) (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Install Internet Explorer 11 (IE11) using Windows Server Update Services (WSUS) -Windows Server Update Services (WSUS) lets you download a single copy of the Microsoft product update and cache it on your local WSUS servers. You can then configure your computers to get the update from your local servers instead of Windows Update. For more information about WSUS, see [Windows Server Update Services](https://go.microsoft.com/fwlink/p/?LinkID=276790). - - **To import from Windows Update to WSUS** - -1. Open your WSUS admin site. For example, `https:///WSUSAdmin/`.

- Where `` is the name of your WSUS server. - -2. Choose the top server node or the **Updates** node, and then click **Import Updates**. - -3. To get the updates, install the Microsoft Update Catalog ActiveX control. - -4. Search for Internet Explorer 11 and add its contents to your basket. - -5. After you're done browsing, go to your basket and click **Import**. - - You can also download the updates without importing them by unchecking the **Import directly into Windows Server Update Services** box. - - **To approve Internet Explorer in WSUS for installation** - -6. Open your WSUS admin site and check the **Review synchronization settings** box from the **To Do** list. - -7. Click **Synchronize now** to sync your WSUS server with Windows Update, and then click **Updates** from the navigation bar. - -8. Enter **Internet Explorer 11** into the **Search Contains** box, and then click **Apply**. - -9. Choose the right version of IE11 for your operating system, and click **Approve for installation**. - -10. Click each computer group you want to set up for the WSUS server, picking the right approval level, and then click **OK**. - - - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: How to install the Internet Explorer 11 update using Windows Server Update Services (WSUS)' +author: dansimp +ms.prod: ie11 +ms.assetid: 6cbd6797-c670-4236-8423-e0919478f2ce +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Install Internet Explorer 11 (IE11) using Windows Server Update Services (WSUS) (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Install Internet Explorer 11 (IE11) using Windows Server Update Services (WSUS) +Windows Server Update Services (WSUS) lets you download a single copy of the Microsoft product update and cache it on your local WSUS servers. You can then configure your computers to get the update from your local servers instead of Windows Update. For more information about WSUS, see [Windows Server Update Services](https://go.microsoft.com/fwlink/p/?LinkID=276790). + + **To import from Windows Update to WSUS** + +1. Open your WSUS admin site. For example, `https:///WSUSAdmin/`.

+ Where `` is the name of your WSUS server. + +2. Choose the top server node or the **Updates** node, and then click **Import Updates**. + +3. To get the updates, install the Microsoft Update Catalog ActiveX control. + +4. Search for Internet Explorer 11 and add its contents to your basket. + +5. After you're done browsing, go to your basket and click **Import**. + + You can also download the updates without importing them by unchecking the **Import directly into Windows Server Update Services** box. + + **To approve Internet Explorer in WSUS for installation** + +6. Open your WSUS admin site and check the **Review synchronization settings** box from the **To Do** list. + +7. Click **Synchronize now** to sync your WSUS server with Windows Update, and then click **Updates** from the navigation bar. + +8. Enter **Internet Explorer 11** into the **Search Contains** box, and then click **Apply**. + +9. Choose the right version of IE11 for your operating system, and click **Approve for installation**. + +10. Click each computer group you want to set up for the WSUS server, picking the right approval level, and then click **OK**. + + + + + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/install-problems-with-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/install-problems-with-ie11.md index 29b3b5ca55..3ebe727aeb 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/install-problems-with-ie11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/install-problems-with-ie11.md @@ -1,61 +1,62 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: How to fix potential installation problems with Internet Explorer 11 -author: lomayor -ms.prod: ie11 -ms.assetid: 3ae77745-86ac-40a9-a37d-eebbf37661a3 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Install problems with Internet Explorer 11 (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Install problems with Internet Explorer 11 -Most Internet Explorer 11 installations are straightforward and work the way they should. But it's possible that you might have problems. - -If you do, you can: - -- Check that you meet the minimum operating system requirements and have the prerequisites installed. - -- Check that there are no other updates or restarts waiting. - -- Temporarily turn off your antispyware and antivirus software. - -- Try another IE11 installer. For example from [Windows Update](https://go.microsoft.com/fwlink/p/?LinkId=302315) or from the [Download Internet Explorer 11](https://go.microsoft.com/fwlink/p/?linkid=327753) website. - -- Review the `IE11_main.log` file in the `\Windows` folder. This log file has information about each installation and is appended for each subsequent installation. - -- Make sure you use the same download server URLs that you entered during the Setup process. - -## Internet Explorer didn't finish installing -If Internet Explorer doesn't finish installing, it might mean that Windows Update wasn't able to install an associated update, that you have a previous, unsupported version of IE installed, or that there's a problem with your copy of IE. We recommend you try this: - - **To fix this issue** - -1. Uninstall IE: - - 1. In the Control Panel, open the **Programs and Features** box, scroll down to IE11, and then click **Uninstall**. - - 2. After the uninstall finishes, restart your computer. - -2. Run [Windows Update](https://go.microsoft.com/fwlink/p/?LinkId=302315), clicking **Check for updates**. - -3. Check the list for IE11. If it's included in the list of updates for download, exclude it before you update your computer.

-If you get an error during the Windows Update process, see [Fix the problem with Microsoft Windows Update that is not working](https://go.microsoft.com/fwlink/p/?LinkId=302316). - -4. Restart your computer, making sure all of your the updates are finished. - -5. Try to reinstall IE11 from either Windows Update (if you saw it in Step 3) or from the [Download Internet Explorer 11](https://go.microsoft.com/fwlink/p/?linkid=327753) website. - - - -  - -  - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: How to fix potential installation problems with Internet Explorer 11 +author: dansimp +ms.prod: ie11 +ms.assetid: 3ae77745-86ac-40a9-a37d-eebbf37661a3 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Install problems with Internet Explorer 11 (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Install problems with Internet Explorer 11 +Most Internet Explorer 11 installations are straightforward and work the way they should. But it's possible that you might have problems. + +If you do, you can: + +- Check that you meet the minimum operating system requirements and have the prerequisites installed. + +- Check that there are no other updates or restarts waiting. + +- Temporarily turn off your antispyware and antivirus software. + +- Try another IE11 installer. For example from [Windows Update](https://go.microsoft.com/fwlink/p/?LinkId=302315) or from the [Download Internet Explorer 11](https://go.microsoft.com/fwlink/p/?linkid=327753) website. + +- Review the `IE11_main.log` file in the `\Windows` folder. This log file has information about each installation and is appended for each subsequent installation. + +- Make sure you use the same download server URLs that you entered during the Setup process. + +## Internet Explorer didn't finish installing +If Internet Explorer doesn't finish installing, it might mean that Windows Update wasn't able to install an associated update, that you have a previous, unsupported version of IE installed, or that there's a problem with your copy of IE. We recommend you try this: + + **To fix this issue** + +1. Uninstall IE: + + 1. In the Control Panel, open the **Programs and Features** box, scroll down to IE11, and then click **Uninstall**. + + 2. After the uninstall finishes, restart your computer. + +2. Run [Windows Update](https://go.microsoft.com/fwlink/p/?LinkId=302315), clicking **Check for updates**. + +3. Check the list for IE11. If it's included in the list of updates for download, exclude it before you update your computer.

+If you get an error during the Windows Update process, see [Fix the problem with Microsoft Windows Update that is not working](https://go.microsoft.com/fwlink/p/?LinkId=302316). + +4. Restart your computer, making sure all of your the updates are finished. + +5. Try to reinstall IE11 from either Windows Update (if you saw it in Step 3) or from the [Download Internet Explorer 11](https://go.microsoft.com/fwlink/p/?linkid=327753) website. + + + +  + +  + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/intranet-problems-and-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/intranet-problems-and-ie11.md index cf102f1c8f..16331ab49c 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/intranet-problems-and-ie11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/intranet-problems-and-ie11.md @@ -1,42 +1,43 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: How to fix intranet search problems with Internet Explorer 11 -author: lomayor -ms.prod: ie11 -ms.assetid: 3ee71d93-d9d2-48e1-899e-07932c73faa6 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Fix intranet search problems with Internet Explorer 11 (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Fix intranet search problems with Internet Explorer 11 -After upgrading to Internet Explorer 11, you might experience search issues while using your intranet site. - -## Why is my intranet redirecting me to search results? -IE11 works differently with search, based on whether your organization is domain-joined. - -- **Domain-joined computers.** A single word entry is treated as a search term. However, IE11 also checks for available intranet sites and offers matches through the **Notification bar**. If you select **Yes** from the **Notification bar** to navigate to the intranet site, IE11 associates that word with the site so that the next time you type in the intranet site name, inline auto-complete will resolve to the intranet site address. - -- **Non-domain-joined computers.** A single word entry is treated as an intranet site. However, if the term doesn't resolve to a site, IE11 then treats the entry as a search term and opens your default search provider. - -To explicitly go to an intranet site, regardless of the environment, users can type either a trailing slash like `contoso/` or the `https://` prefix. Either of these will cause IE11 to treat the entry as an intranet search. You can also change the default behavior so that IE11 treats your single word entry in the address bar as an intranet site, regardless of your environment. - - **To enable single-word intranet search** - -1. Open Internet Explorer for the desktop, click the **Tools** menu, and then click **Internet Options**. - -2. Click **Advanced**, check the **Go to an intranet site for a single word entry in the Address bar** box, and then click **OK**. - -If you'd like your entire organization to have single word entries default to an intranet site, you can turn on the **Go to an intranet site for a single word entry in the Address bar** Group Policy. With this policy turned on, a search for `contoso` automatically resolves to `https://contoso`. - -  - -  - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: How to fix intranet search problems with Internet Explorer 11 +author: dansimp +ms.prod: ie11 +ms.assetid: 3ee71d93-d9d2-48e1-899e-07932c73faa6 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Fix intranet search problems with Internet Explorer 11 (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Fix intranet search problems with Internet Explorer 11 +After upgrading to Internet Explorer 11, you might experience search issues while using your intranet site. + +## Why is my intranet redirecting me to search results? +IE11 works differently with search, based on whether your organization is domain-joined. + +- **Domain-joined computers.** A single word entry is treated as a search term. However, IE11 also checks for available intranet sites and offers matches through the **Notification bar**. If you select **Yes** from the **Notification bar** to navigate to the intranet site, IE11 associates that word with the site so that the next time you type in the intranet site name, inline auto-complete will resolve to the intranet site address. + +- **Non-domain-joined computers.** A single word entry is treated as an intranet site. However, if the term doesn't resolve to a site, IE11 then treats the entry as a search term and opens your default search provider. + +To explicitly go to an intranet site, regardless of the environment, users can type either a trailing slash like `contoso/` or the `https://` prefix. Either of these will cause IE11 to treat the entry as an intranet search. You can also change the default behavior so that IE11 treats your single word entry in the address bar as an intranet site, regardless of your environment. + + **To enable single-word intranet search** + +1. Open Internet Explorer for the desktop, click the **Tools** menu, and then click **Internet Options**. + +2. Click **Advanced**, check the **Go to an intranet site for a single word entry in the Address bar** box, and then click **OK**. + +If you'd like your entire organization to have single word entries default to an intranet site, you can turn on the **Go to an intranet site for a single word entry in the Address bar** Group Policy. With this policy turned on, a search for `contoso` automatically resolves to `https://contoso`. + +  + +  + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/manage-ie11-overview.md b/browsers/internet-explorer/ie11-deploy-guide/manage-ie11-overview.md index a464bbc679..2270749c81 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/manage-ie11-overview.md +++ b/browsers/internet-explorer/ie11-deploy-guide/manage-ie11-overview.md @@ -1,42 +1,43 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: Use the topics in this section to learn about how to auto detect your settings, auto configure your configuration settings, and auto configure your proxy configuration settings for Internet Explorer. -author: lomayor -ms.prod: ie11 -ms.assetid: eb3cce62-fc7b-41e3-97b6-2916b85bcf55 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Manage Internet Explorer 11 (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Manage Internet Explorer 11 - -**Applies to:** - -- Windows 10 -- Windows 8.1 -- Windows 7 -- Windows Server 2012 R2 -- Windows Server 2008 R2 with Service Pack 1 (SP1) - -Use the topics in this section to learn about how to auto detect your settings, auto configure your configuration settings, and auto configure your proxy configuration settings for Internet Explorer. - -## In this section - -|Topic |Description | -|------|------------| -|[Auto detect settings Internet Explorer 11](auto-detect-settings-for-ie11.md) |Guidance about how to update your automatic detection of DHCP and DNS servers. | -|[Auto configuration settings for Internet Explorer 11](auto-configuration-settings-for-ie11.md) |Guidance about how to add, update and lock your auto configuration settings. | -|[Auto proxy configuration settings for Internet Explorer 11](auto-proxy-configuration-settings-for-ie11.md) |Guidance about how to add, update, and lock your auto-proxy settings. |  - - - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: Use the topics in this section to learn about how to auto detect your settings, auto configure your configuration settings, and auto configure your proxy configuration settings for Internet Explorer. +author: dansimp +ms.prod: ie11 +ms.assetid: eb3cce62-fc7b-41e3-97b6-2916b85bcf55 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Manage Internet Explorer 11 (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Manage Internet Explorer 11 + +**Applies to:** + +- Windows 10 +- Windows 8.1 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2008 R2 with Service Pack 1 (SP1) + +Use the topics in this section to learn about how to auto detect your settings, auto configure your configuration settings, and auto configure your proxy configuration settings for Internet Explorer. + +## In this section + +|Topic |Description | +|------|------------| +|[Auto detect settings Internet Explorer 11](auto-detect-settings-for-ie11.md) |Guidance about how to update your automatic detection of DHCP and DNS servers. | +|[Auto configuration settings for Internet Explorer 11](auto-configuration-settings-for-ie11.md) |Guidance about how to add, update and lock your auto configuration settings. | +|[Auto proxy configuration settings for Internet Explorer 11](auto-proxy-configuration-settings-for-ie11.md) |Guidance about how to add, update, and lock your auto-proxy settings. |  + + + + + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/missing-internet-explorer-maintenance-settings-for-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/missing-internet-explorer-maintenance-settings-for-ie11.md index 6c19898cf3..c0087953b7 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/missing-internet-explorer-maintenance-settings-for-ie11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/missing-internet-explorer-maintenance-settings-for-ie11.md @@ -1,98 +1,99 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: support -description: IEM-configured settings have been deprecated for Internet Explorer 10 and newer. Use this topic to learn where to go to fix the affected settings through Group Policy Preferences, Administrative Templates (.admx), or the IEAK. -author: lomayor -ms.prod: ie11 -ms.assetid: 89084e01-4e3f-46a6-b90e-48ee58d6821c -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Missing Internet Explorer Maintenance settings for Internet Explorer 11 (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Missing Internet Explorer Maintenance settings for Internet Explorer 11 - -**Applies to:** - -- Windows 10 -- Windows 8.1 -- Windows 7 -- Windows Server 2012 R2 -- Windows Server 2008 R2 with Service Pack 1 (SP1) - -The Internet Explorer Maintenance (IEM) settings have been deprecated in favor of Group Policy Preferences, Administrative Templates (.admx), and the IE Administration Kit 11 (IEAK 11). - -Because of this change, your IEM-configured settings will no longer work on computers running Internet Explorer 10 or newer. To fix this, you need to update the affected settings using Group Policy Preferences, Administrative Templates (.admx), or IE Administration Kit 11 (IEAK 11). - -Because Group Policy Preferences and IEAK 11 run using asynchronous processes, you should choose to use only one of the tools within each group of settings. For example, using only IEAK 11 in the **Security** settings or Group Policy Preferences within the **Internet Zone** settings. Also, it's important to remember that policy is enforced and can't be changed by the user, while preferences are configured, but can be changed by the user. - -For more information about all of the new options and Group Policy, see: - -- [Group policy preferences and Internet Explorer 11](group-policy-preferences-and-ie11.md) - -- [Administrative templates and Internet Explorer 11](administrative-templates-and-ie11.md) - -- [Internet Explorer Administration Kit 11 (IEAK 11) - Administration Guide for IT Pros](../ie11-ieak/index.md) - -- [Group Policy Settings Reference for Windows and Windows Server](https://go.microsoft.com/fwlink/p/?LinkId=279876) - -- [Group Policy ADMX Syntax Reference Guide](https://go.microsoft.com/fwlink/p/?LinkId=276830) - -- [Enable and Disable Settings in a Preference Item](https://go.microsoft.com/fwlink/p/?LinkId=282671) - -## IEM replacements -The IEM settings have replacements you can use in either Group Policy Preferences or IEAK 11. - -### Browser user interface replacements - -|IEM setting |Description |Replacement tool | -|------------|------------|-----------------| -|Browser title |Lets you customize the text that shows up in the title bar of the browser.|On the **Browser User Interface** page of IEAK 11, click **Customize Title Bars**, and then type the text that appears on the title bar of the **Title Bar Text** box.

Your text is appended to the text," Microsoft Internet Explorer provided by". | -|Browser toolbar customizations (background and buttons) |Lets you customize the buttons on the browser toolbar.

  • **Buttons.** Customizes the buttons on the Internet Explorer 11 toolbar.
  • **Background.** No longer available.
|On the **Browser User Interface** page of IEAK 11, click **Add**, type your new toolbar caption, action, and icon, and if the button should appear by default, and then click **OK**. You can also edit, remove, or delete an existing toolbar button from this page. | -|Custom logo and animated bitmaps |Lets you replace the static and animated logos in the upper-right corner of the IE window with customized logos. |This setting isn't available anymore. | - - -### Connection replacements - -|IEM setting |Description |Replacement tool | -|------------|------------|-----------------| -|Connection settings|Lets you import your connection settings from a previously set up computer. These settings define how your employees interact with the connection settings on the **System Polices and Restrictions** page. You can also remove old dial-up connections settings from your employee's computers.|In the **Internet Settings Group Policy Preferences** dialog box, click the **Connections** tab, and set up your proxy settings.

-OR-

On the **Connection Settings** page of IEAK 11, change your connection settings, including importing your current connection settings and deleting existing dial-up connection settings (as needed). | -|Automatic browser configuration |Lets you update your employee's computer after you've deployed IE11, by specifying a URL to an .ins file, an auto-proxy URL, or both. You can decide when the update occurs, in minutes. Typing zero, or not putting in any number, means that automatic configuration only happens after the browser is started and used to go to a page. |In the **Internet Settings Group Policy Preferences** dialog box, click the **Automatic Configuration** tab, and then add your URL.

On the **Automatic Configuration** page of IEAK 11, modify the configuration settings, including providing the URL to an .ins file or an auto-proxy site. | -|Proxy settings |Lets you specify your proxy servers. |In the **Internet Settings Group Policy Preferences** dialog box, click the **Connections** tab, click **LAN Settings**, and then choose whether to turn on automatic detection of your configuration settings and if you want to use proxy servers.

-OR-

On the **Proxy Settings** page of IEAK 11, turn on your proxy settings, adding your proxy server addresses and exceptions. | -|User Agent string |Lets the browser provide identification to visited servers. This string is often used to keep Internet traffic statistics. |This setting isn't available anymore. | - -### URLs replacements - -|IEM setting |Description |Replacement tool | -|------------|------------|-----------------| -|Favorites and links |Lets you use custom URLs for the **Favorites** and **Links** folders. You can also specify the folder order, disable IE Suggested Sites, and import an existing folder structure. |On the **Favorites, Favorites Bar and Feeds** page of IEAK 11, add your custom URLs to the **Favorites**, **Favorites Bar**, or **RSS Feeds** folders, or create new folders.

You can also edit, test, or remove your URLs, sort the list order, or disable IE Suggested Sites. | -|Important URLs |Lets you add custom **Home** pages that can open different tabs. You can also add a **Support** page that shows up when an employee clicks online Help.|In the **Internet Settings Group Policy Preferences** dialog box, click the **General** tab, and add your custom **Home** page.

On the **Important URLs - Home page and Support** page of IEAK 11, add the custom URLs to your **Home** and **Support** pages.

You can also click to retain the previous home page information when the user upgrades to a newer version of IE. | - -### Security Zones and Content Ratings - -|IEM setting |Description |Replacement tool | -|------------|------------|-----------------| -|Security zones |Lets you change your security settings, by zone |In the **Internet Settings Group Policy Preferences** dialog box, click the **Security** tab, and update your security settings, based on zone.

-OR-

On the **Security and Privacy Settings** page of IEAK 11, choose your **Security Zones and Privacy** setting, changing it, as necessary. | -|Content ratings |Lets you change your content ratings so your employees can't view sites with risky content. |On the **Security and Privacy Settings** page of IEAK 11, choose your **Content Ratings** setting, changing it, as necessary. | -|Authenticode settings |Lets you pick your trustworthy software publishers and stop your employees from adding new, untrusted publishers while browsing. |These settings aren't available anymore. | - -### Programs - -|IEM setting |Description |Replacement tool | -|------------|------------|-----------------| -|Programs |Lets you import your default program settings, which specify the programs Windows uses for each Internet service. |In the **Internet Settings Group Policy Preferences** dialog box, click the **Programs** tab, and choose how to open IE11 links.

-OR-

On the **Programs** page of IEAK 11, choose whether to customize or import your program settings. | - -#### Advanced IEM settings -The Advanced IEM settings, including Corporate and Internet settings, were also deprecated. However, they also have replacements you can use in either Group Policy Preferences or IEAK 11. - -**Note**
Advanced IEM Settings were shown under **Programs** and only available when running in **Preference** mode. - -|IEM setting |Description |Replacement tool | -|------------|------------|-----------------| -|Corporate settings |Specifies the location of the file with the settings you use to make IE work best in your organization. |On the Additional Settings page of IEAK 11, expand Corporate Settings, and then customize how your organization handles temporary Internet files, code downloads, menu items, and toolbar buttons. | -|Internet settings |Specifies the location of the file that includes your default IE settings. |In the Internet Settings Group Policy Preferences dialog box, click the Advanced tab, and then update your Internet-related settings, as required

-OR-

On the Additional Settings page of IEAK 11, expand Internet Settings, and then customize your default values in the Internet Options dialog box. | - +--- +ms.localizationpriority: medium +ms.mktglfcycl: support +description: IEM-configured settings have been deprecated for Internet Explorer 10 and newer. Use this topic to learn where to go to fix the affected settings through Group Policy Preferences, Administrative Templates (.admx), or the IEAK. +author: dansimp +ms.prod: ie11 +ms.assetid: 89084e01-4e3f-46a6-b90e-48ee58d6821c +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Missing Internet Explorer Maintenance settings for Internet Explorer 11 (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Missing Internet Explorer Maintenance settings for Internet Explorer 11 + +**Applies to:** + +- Windows 10 +- Windows 8.1 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2008 R2 with Service Pack 1 (SP1) + +The Internet Explorer Maintenance (IEM) settings have been deprecated in favor of Group Policy Preferences, Administrative Templates (.admx), and the IE Administration Kit 11 (IEAK 11). + +Because of this change, your IEM-configured settings will no longer work on computers running Internet Explorer 10 or newer. To fix this, you need to update the affected settings using Group Policy Preferences, Administrative Templates (.admx), or IE Administration Kit 11 (IEAK 11). + +Because Group Policy Preferences and IEAK 11 run using asynchronous processes, you should choose to use only one of the tools within each group of settings. For example, using only IEAK 11 in the **Security** settings or Group Policy Preferences within the **Internet Zone** settings. Also, it's important to remember that policy is enforced and can't be changed by the user, while preferences are configured, but can be changed by the user. + +For more information about all of the new options and Group Policy, see: + +- [Group policy preferences and Internet Explorer 11](group-policy-preferences-and-ie11.md) + +- [Administrative templates and Internet Explorer 11](administrative-templates-and-ie11.md) + +- [Internet Explorer Administration Kit 11 (IEAK 11) - Administration Guide for IT Pros](../ie11-ieak/index.md) + +- [Group Policy Settings Reference for Windows and Windows Server](https://go.microsoft.com/fwlink/p/?LinkId=279876) + +- [Group Policy ADMX Syntax Reference Guide](https://go.microsoft.com/fwlink/p/?LinkId=276830) + +- [Enable and Disable Settings in a Preference Item](https://go.microsoft.com/fwlink/p/?LinkId=282671) + +## IEM replacements +The IEM settings have replacements you can use in either Group Policy Preferences or IEAK 11. + +### Browser user interface replacements + +|IEM setting |Description |Replacement tool | +|------------|------------|-----------------| +|Browser title |Lets you customize the text that shows up in the title bar of the browser.|On the **Browser User Interface** page of IEAK 11, click **Customize Title Bars**, and then type the text that appears on the title bar of the **Title Bar Text** box.

Your text is appended to the text," Microsoft Internet Explorer provided by". | +|Browser toolbar customizations (background and buttons) |Lets you customize the buttons on the browser toolbar.

  • **Buttons.** Customizes the buttons on the Internet Explorer 11 toolbar.
  • **Background.** No longer available.
|On the **Browser User Interface** page of IEAK 11, click **Add**, type your new toolbar caption, action, and icon, and if the button should appear by default, and then click **OK**. You can also edit, remove, or delete an existing toolbar button from this page. | +|Custom logo and animated bitmaps |Lets you replace the static and animated logos in the upper-right corner of the IE window with customized logos. |This setting isn't available anymore. | + + +### Connection replacements + +|IEM setting |Description |Replacement tool | +|------------|------------|-----------------| +|Connection settings|Lets you import your connection settings from a previously set up computer. These settings define how your employees interact with the connection settings on the **System Polices and Restrictions** page. You can also remove old dial-up connections settings from your employee's computers.|In the **Internet Settings Group Policy Preferences** dialog box, click the **Connections** tab, and set up your proxy settings.

-OR-

On the **Connection Settings** page of IEAK 11, change your connection settings, including importing your current connection settings and deleting existing dial-up connection settings (as needed). | +|Automatic browser configuration |Lets you update your employee's computer after you've deployed IE11, by specifying a URL to an .ins file, an auto-proxy URL, or both. You can decide when the update occurs, in minutes. Typing zero, or not putting in any number, means that automatic configuration only happens after the browser is started and used to go to a page. |In the **Internet Settings Group Policy Preferences** dialog box, click the **Automatic Configuration** tab, and then add your URL.

On the **Automatic Configuration** page of IEAK 11, modify the configuration settings, including providing the URL to an .ins file or an auto-proxy site. | +|Proxy settings |Lets you specify your proxy servers. |In the **Internet Settings Group Policy Preferences** dialog box, click the **Connections** tab, click **LAN Settings**, and then choose whether to turn on automatic detection of your configuration settings and if you want to use proxy servers.

-OR-

On the **Proxy Settings** page of IEAK 11, turn on your proxy settings, adding your proxy server addresses and exceptions. | +|User Agent string |Lets the browser provide identification to visited servers. This string is often used to keep Internet traffic statistics. |This setting isn't available anymore. | + +### URLs replacements + +|IEM setting |Description |Replacement tool | +|------------|------------|-----------------| +|Favorites and links |Lets you use custom URLs for the **Favorites** and **Links** folders. You can also specify the folder order, disable IE Suggested Sites, and import an existing folder structure. |On the **Favorites, Favorites Bar and Feeds** page of IEAK 11, add your custom URLs to the **Favorites**, **Favorites Bar**, or **RSS Feeds** folders, or create new folders.

You can also edit, test, or remove your URLs, sort the list order, or disable IE Suggested Sites. | +|Important URLs |Lets you add custom **Home** pages that can open different tabs. You can also add a **Support** page that shows up when an employee clicks online Help.|In the **Internet Settings Group Policy Preferences** dialog box, click the **General** tab, and add your custom **Home** page.

On the **Important URLs - Home page and Support** page of IEAK 11, add the custom URLs to your **Home** and **Support** pages.

You can also click to retain the previous home page information when the user upgrades to a newer version of IE. | + +### Security Zones and Content Ratings + +|IEM setting |Description |Replacement tool | +|------------|------------|-----------------| +|Security zones |Lets you change your security settings, by zone |In the **Internet Settings Group Policy Preferences** dialog box, click the **Security** tab, and update your security settings, based on zone.

-OR-

On the **Security and Privacy Settings** page of IEAK 11, choose your **Security Zones and Privacy** setting, changing it, as necessary. | +|Content ratings |Lets you change your content ratings so your employees can't view sites with risky content. |On the **Security and Privacy Settings** page of IEAK 11, choose your **Content Ratings** setting, changing it, as necessary. | +|Authenticode settings |Lets you pick your trustworthy software publishers and stop your employees from adding new, untrusted publishers while browsing. |These settings aren't available anymore. | + +### Programs + +|IEM setting |Description |Replacement tool | +|------------|------------|-----------------| +|Programs |Lets you import your default program settings, which specify the programs Windows uses for each Internet service. |In the **Internet Settings Group Policy Preferences** dialog box, click the **Programs** tab, and choose how to open IE11 links.

-OR-

On the **Programs** page of IEAK 11, choose whether to customize or import your program settings. | + +#### Advanced IEM settings +The Advanced IEM settings, including Corporate and Internet settings, were also deprecated. However, they also have replacements you can use in either Group Policy Preferences or IEAK 11. + +**Note**
Advanced IEM Settings were shown under **Programs** and only available when running in **Preference** mode. + +|IEM setting |Description |Replacement tool | +|------------|------------|-----------------| +|Corporate settings |Specifies the location of the file with the settings you use to make IE work best in your organization. |On the Additional Settings page of IEAK 11, expand Corporate Settings, and then customize how your organization handles temporary Internet files, code downloads, menu items, and toolbar buttons. | +|Internet settings |Specifies the location of the file that includes your default IE settings. |In the Internet Settings Group Policy Preferences dialog box, click the Advanced tab, and then update your Internet-related settings, as required

-OR-

On the Additional Settings page of IEAK 11, expand Internet Settings, and then customize your default values in the Internet Options dialog box. | + diff --git a/browsers/internet-explorer/ie11-deploy-guide/missing-the-compatibility-view-button.md b/browsers/internet-explorer/ie11-deploy-guide/missing-the-compatibility-view-button.md index ea68f25a40..fbc40cbf73 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/missing-the-compatibility-view-button.md +++ b/browsers/internet-explorer/ie11-deploy-guide/missing-the-compatibility-view-button.md @@ -1,53 +1,54 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: support -description: Internet Explorer 11 uses the latest standards mode, which simplifies web page compatibility for users by removing the **Compatibility View** button and reducing the number of compatibility options in the F12 developer tools for developers. -author: lomayor -ms.prod: ie11 -ms.assetid: 501c96c9-9f03-4913-9f4b-f67bd9edbb61 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Missing the Compatibility View Button (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Missing the Compatibility View Button - -**Applies to:** - -- Windows 10 -- Windows 8.1 -- Windows 7 -- Windows Server 2012 R2 -- Windows Server 2008 R2 with Service Pack 1 (SP1) - -Compatibility View was introduced in Windows Internet Explorer 8 to help existing content continue to work with Windows Internet Explorer 7, while developers updated their content to support modern interoperable web standards. Since then, the Internet Explorer web platform, and the web itself, have changed so that most public web content looks for standards-based features instead of IE 7-compatible behavior. - -Thanks to these changes, using Internet Explorer 11 in the latest standards mode is more compatible with the web than ever before. As a result, IE11 simplifies web page compatibility for users by removing the **Compatibility View** button and reducing the number of compatibility options in the F12 developer tools for developers. - -## What happened to the Compatibility View button? -In previous versions of IE, the **Compatibility View** button would attempt to fix a broken standards-based website, by getting the page to appear like it did in Internet Explorer 7. Today however, more standards-based websites are broken by attempting to appear like they did in Internet Explorer 7. So instead of implementing and using Compatibility View, developers are updating their server configuration to add X-UA-Compatible meta tags, which forces the content to the “edge”, making the **Compatibility View** button disappear. In support of these changes, the Compatibility View button has been completely removed for IE11. - -## What if I still need Compatibility View? -There might be extenuating circumstances in your company, which require you to continue to use Compatibility View. In this situation, this process should be viewed strictly as a workaround. You should work with the website vendor to make sure that the affected pages are updated to match the latest web standards. The functionality described here is currently deprecated and will be removed at a time in the future. - -**Important**
This functionality is only available in Internet Explorer for the desktop. - - **To change your Compatibility View settings** - -1. Open Internet Explorer for the desktop, click **Tools**, and then click **Compatibility View settings**. - -2. In the **Compatibility View Settings** box, add the problematic website URL, and then click **Add**.

-Compatibility View is turned on for this single website, for this specific computer. - -3. Decide if you want your intranet sites displayed using Compatibility View, decide whether to use Microsoft compatibility lists, and then click **Close**. - -  - -  - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: support +description: Internet Explorer 11 uses the latest standards mode, which simplifies web page compatibility for users by removing the **Compatibility View** button and reducing the number of compatibility options in the F12 developer tools for developers. +author: dansimp +ms.prod: ie11 +ms.assetid: 501c96c9-9f03-4913-9f4b-f67bd9edbb61 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Missing the Compatibility View Button (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Missing the Compatibility View Button + +**Applies to:** + +- Windows 10 +- Windows 8.1 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2008 R2 with Service Pack 1 (SP1) + +Compatibility View was introduced in Windows Internet Explorer 8 to help existing content continue to work with Windows Internet Explorer 7, while developers updated their content to support modern interoperable web standards. Since then, the Internet Explorer web platform, and the web itself, have changed so that most public web content looks for standards-based features instead of IE 7-compatible behavior. + +Thanks to these changes, using Internet Explorer 11 in the latest standards mode is more compatible with the web than ever before. As a result, IE11 simplifies web page compatibility for users by removing the **Compatibility View** button and reducing the number of compatibility options in the F12 developer tools for developers. + +## What happened to the Compatibility View button? +In previous versions of IE, the **Compatibility View** button would attempt to fix a broken standards-based website, by getting the page to appear like it did in Internet Explorer 7. Today however, more standards-based websites are broken by attempting to appear like they did in Internet Explorer 7. So instead of implementing and using Compatibility View, developers are updating their server configuration to add X-UA-Compatible meta tags, which forces the content to the “edge”, making the **Compatibility View** button disappear. In support of these changes, the Compatibility View button has been completely removed for IE11. + +## What if I still need Compatibility View? +There might be extenuating circumstances in your company, which require you to continue to use Compatibility View. In this situation, this process should be viewed strictly as a workaround. You should work with the website vendor to make sure that the affected pages are updated to match the latest web standards. The functionality described here is currently deprecated and will be removed at a time in the future. + +**Important**
This functionality is only available in Internet Explorer for the desktop. + + **To change your Compatibility View settings** + +1. Open Internet Explorer for the desktop, click **Tools**, and then click **Compatibility View settings**. + +2. In the **Compatibility View Settings** box, add the problematic website URL, and then click **Add**.

+Compatibility View is turned on for this single website, for this specific computer. + +3. Decide if you want your intranet sites displayed using Compatibility View, decide whether to use Microsoft compatibility lists, and then click **Close**. + +  + +  + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/net-framework-problems-with-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/net-framework-problems-with-ie11.md index df476d43ad..3e564954a6 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/net-framework-problems-with-ie11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/net-framework-problems-with-ie11.md @@ -1,33 +1,34 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: support -description: How to turn managed browser hosting controls back on in Internet Explorer 11. -author: lomayor -ms.prod: ie11 -ms.assetid: b0b7f60f-9099-45ab-84f4-4ac64d7bcb43 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: .NET Framework problems with Internet Explorer 11 (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# .NET Framework problems with Internet Explorer 11 -If you’re having problems launching your legacy apps while running Internet Explorer 11, it’s most likely because Internet Explorer no longer starts apps that use managed browser hosting controls, like in .NET Framework 1.1 and 2.0. - - **To turn managed browser hosting controls back on** - -1. **For x86 systems or for 64-bit processes on x64 systems:** Go to the `HKLM\SOFTWARE\MICROSOFT\.NETFramework` registry key and change the **EnableIEHosting** value to **1**. - -2. **For 32-bit processes on x64 systems:** Go to the `HKLM\SOFTWARE\Wow6432Node\MICROSOFT\.NETFramework` registry key and change the **EnableIEHosting** value to **1**. - -For more information, see the [Web Applications](https://go.microsoft.com/fwlink/p/?LinkId=308903) section of the Application Compatibility in the .NET Framework 4.5 page. - -  - -  - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: support +description: How to turn managed browser hosting controls back on in Internet Explorer 11. +author: dansimp +ms.prod: ie11 +ms.assetid: b0b7f60f-9099-45ab-84f4-4ac64d7bcb43 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: .NET Framework problems with Internet Explorer 11 (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# .NET Framework problems with Internet Explorer 11 +If you’re having problems launching your legacy apps while running Internet Explorer 11, it’s most likely because Internet Explorer no longer starts apps that use managed browser hosting controls, like in .NET Framework 1.1 and 2.0. + + **To turn managed browser hosting controls back on** + +1. **For x86 systems or for 64-bit processes on x64 systems:** Go to the `HKLM\SOFTWARE\MICROSOFT\.NETFramework` registry key and change the **EnableIEHosting** value to **1**. + +2. **For 32-bit processes on x64 systems:** Go to the `HKLM\SOFTWARE\Wow6432Node\MICROSOFT\.NETFramework` registry key and change the **EnableIEHosting** value to **1**. + +For more information, see the [Web Applications](https://go.microsoft.com/fwlink/p/?LinkId=308903) section of the Application Compatibility in the .NET Framework 4.5 page. + +  + +  + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/new-group-policy-settings-for-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/new-group-policy-settings-for-ie11.md index c1cd3ac8b3..bf70df22fd 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/new-group-policy-settings-for-ie11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/new-group-policy-settings-for-ie11.md @@ -1,74 +1,75 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: security -description: New group policy settings for Internet Explorer 11 -author: lomayor -ms.prod: ie11 -ms.assetid: 669cc1a6-e2cb-403f-aa31-c1de52a615d1 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: New group policy settings for Internet Explorer 11 (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# New group policy settings for Internet Explorer 11 -Internet Explorer 11 gives you some new Group Policy settings to help you manage your company's web browser configurations, including: - - -| Policy | Category Path | Supported on | Explanation | -|-----------------------------------------------------------------------------------------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|--------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| -| Allow IE to use the HTTP2 network protocol | Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page | IE11 on Windows 10 | This policy setting determines whether IE uses the HTTP2 network protocol. HTTP2 works with HTTP requests to optimize the latency of network requests through compression, multiplexing, and prioritization.

If you enable this policy setting, IE uses the HTTP2 network protocol.

If you disable this policy setting, IE won't use the HTTP2 network protocol.

If you don't configure this policy setting, users can turn this behavior on or off, using the **Internet Explorer Advanced Internet Options** settings. The default is on. | -| Allow IE to use the SPDY/3 network protocol | Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page | IE11 on Windows 10 | This policy setting determines whether Internet Explorer uses the SPDY/3 network protocol. SPDY/3 works with HTTP requests to optimize the latency of network requests through compression, multiplexing and prioritization.

If you enable this policy setting, Internet Explorer uses the SPDY/3 network protocol.

If you disable this policy setting, Internet Explorer won't use the SPDY/3 network protocol.

If you don't configure this policy setting, users can turn this behavior on or off, on the **Advanced\* tab of the \*\*Internet Options** dialog box. The default is on.

**Note**
We've replaced the SPDY/3 protocol with the HTTP2 protocol in Windows 10. You can configure the HTTP2 protocol by using the **Allow IE to use the HTTP2 network protocol** setting. | -| Allow Microsoft services to provide enhanced suggestions as the user types in the Address bar | Administrative Templates\Windows Components\Internet Explorer | IE11 on Windows 10 | This policy setting allows IE to provide enhanced suggestions as the user types in the Address bar. To provide enhanced suggestions, the user’s keystrokes are sent to Microsoft through Microsoft services.

If you enable this policy setting, users receive enhanced suggestions while typing in the Address bar. In addition, users won’t be able to change the **Suggestions** setting on the **Settings** charm.

If you disable this policy setting, users won’t receive enhanced suggestions while typing in the Address bar. In addition, users won’t be able to change the **Suggestions** setting on the **Settings** charm.

If you don’t configure this policy setting, users can change the **Suggestions** setting on the **Settings** charm. | -| Allow only approved domains to use the TDC ActiveX control |

  • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Intranet Zone
  • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Intranet Zone
  • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Trusted Sites Zone
  • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Trusted Sites Zone
  • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Local Machine Zone
  • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Local Machine Zone
| IE11 in Windows 10 | This policy setting determines whether users can run the Tabular Data Control (TDC) ActiveX control, based on security zone. By default, the TDC ActiveX Control is disabled in the **Internet** and **Restricted Sites** security zones.

If you enable this policy setting, users won’t be able to run the TDC ActiveX control from all sites in the specified zone.

If you disable this policy setting, users can run the TDC Active X control from all sites in the specified zone. | -| Allow SSL3 Fallback | Administrative Templates\Windows Components\Internet Explorer\Security Features | Internet Explorer 11 on Windows 10 | This policy setting allows you to stop websites from falling back to using Secure Socket Layer (SSL) 3.0 or lower, if Transport Layer Security (TLS) 1.0 or higher, fails. This setting doesn’t affect which security protocols are enabled.

If you enable this policy setting and a website fails while using the TLS 1.0 or higher security protocols, Internet Explorer will try to fallback and use SSL 3.0 or lower security protocols.

If you disable or don’t configure this setting, Internet Explorer uses the default system protocols.

**Important:**
By default, SSL 3.0 is disabled. If you choose to enable SSL 3.0, we recommend that you disable or don't configure this setting to help mitigate potential man-in-the-middle attacks. | -| Allow VBScript to run in Internet Explorer |

  • Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Internet Zone
  • Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Intranet Zone
  • Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Local Machine Zone
  • Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Locked-Down Internet Zone
  • Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Locked-Down Intranet Zone
  • Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Locked-Down Local Machine Zone
  • Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Locked-Down Restricted Sites Zone
  • Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Locked-Down Trusted Sites Zone
  • Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Restricted Sites Zone
  • Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Trusted Sites Zone
| Internet Explorer 11 | This policy setting lets you decide whether VBScript can run on pages in specific Internet Explorer zones.

If you enable this policy setting (default), you must also pick one of the following options from the Options box:

  • Enable. VBScript runs on pages in specific zones, without any interaction.
  • Prompt. Employees are prompted whether to allow VBScript to run in the zone.
  • Disable. VBScript is prevented from running in the zone.

If you disable or don’t configure this policy setting, VBScript runs without any interaction in the specified zone. | -| Always send Do Not Track header | Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page | At least Internet Explorer 10 | This policy setting allows you to configure how IE sends the Do Not Track (DNT) header.

If you enable this policy setting, IE sends a `DNT:1` header with all HTTP and HTTPS requests. The `DNT:1` header signals to the servers not to track the user.

**In Internet Explorer 9 and 10:**
If you disable this policy setting, IE only sends the Do Not Track header if a Tracking Protection List is enabled or inPrivate Browsing mode is used.

**In at least IE11:**
If you disable this policy setting, IE only sends the Do Not Track header if inPrivate Browsing mode is used.

If you don't configure the policy setting, users can select the **Always send Do Not Track header** option on the **Advanced\* tab of the \*\*Internet Options** dialog box. By selecting this option, IE sends a `DNT:1` header with all HTTP and HTTPS requests; unless the user grants a site-specific exception, in which case IE sends a `DNT:0` header. By default, this option is enabled. | -| Don't run antimalware programs against ActiveX controls
(Internet, Restricted Zones) |

  • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Internet Zone
  • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Internet Zone
  • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Restricted Sites Zone
  • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Restricted Sites Zone
| IE11 on Windows 10 | This policy setting determines whether IE runs antimalware programs against ActiveX controls, to check if they're safe to load on pages.

If you enable this policy setting, IE won't check with your antimalware program to see if it's safe to create an instance of the ActiveX control.

If you disable this policy setting, IE always checks with your antimalware program to see if it's safe to create an instance of the ActiveX control.

If you don't configure this policy setting, IE always checks with your antimalware program to see if it's safe to create an instance of the ActiveX control. Users can turn this behavior on or off, using the Internet Explorer's **Security** settings. | -| Don't run antimalware programs against ActiveX controls
(Intranet, Trusted, Local Machine Zones) |

  • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Intranet Zone
  • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Intranet Zone
  • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Trusted Sites Zone
  • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Trusted Sites Zone
  • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Local Machine Zone
  • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Local Machine Zone
| IE11 on Windows 10 | This policy setting determines whether IE runs antimalware programs against ActiveX controls, to check if they're safe to load on pages.

If you enable this policy setting, IE won't check with your antimalware program to see if it's safe to create an instance of the ActiveX control.

If you disable this policy setting, IE always checks with your antimalware program to see if it's safe to create an instance of the ActiveX control.

If you don't configure this policy setting, IE won't check with your antimalware program to see if it's safe to create an instance of the ActiveX control. Users can turn this behavior on or off, using Internet Explorer's **Security** settings. | -| Hide the button (next to the New Tab button) that opens Microsoft Edge | User Configuration\Administrative Templates\Windows Components/Internet Explorer\Internet Settings\Advanced Settings\Browsing\ | IE11 on Windows 10, version 1703 | This policy setting lets you decide whether employees can see the open Microsoft Edge button, which appears next to the New Tab button.

If you enable this policy setting, the button to open Microsoft Edge from Internet Explorer will be hidden.

If you disable this policy setting, the button to open Microsoft Edge from Internet Explorer appears.

If you don't configure this policy setting, the button to open Microsoft Edge from Internet Explorer can be configured by your employees. | -| Let users turn on and use Enterprise Mode from the **Tools** menu | Administrative Templates\Windows Components\Internet Explorer | IE11 on Windows 10 | This policy setting lets you decide whether users can turn on Enterprise Mode for websites with compatibility issues. Optionally, this policy also lets you specify where to get reports (through post messages) about the websites for which users turn on Enterprise Mode using the **Tools** menu.

If you enable this policy setting, users can see and use the **Enterprise Mode** option from the **Tools** menu. If you enable this setting, but don’t specify a report location, Enterprise Mode will still be available to your users, but you won’t get any reports.

If you disable or don’t configure this policy setting, the menu option won’t appear and users won’t be able to turn on Enterprise Mode locally. | -| Limit Site Discovery output by Domain | Administrative Templates\Windows Components\Internet Explorer | At least Internet Explorer 8 | This policy setting allows you to control which domains are included in the discovery function of the Internet Explorer Site Discovery Toolkit.

If you enable this policy setting, the Internet Explorer Site Discovery Toolkit collects data from all sites in your specified domains, configured by adding one domain per line to the included text box.

If you disable or don’t configure this setting, the Internet Explorer Site Discovery Toolkit collects data from all sites in all domains.

**Note:**
You can use this setting in conjunction with the other settings that control the Internet Explorer Site Discovery Toolkit. | -| Limit Site Discovery output by Zone | Administrative Templates\Windows Components\Internet Explorer | At least Internet Explorer 8 | This policy setting allows you to control which zones are included in the discovery function of the Internet Explorer Site Discovery Toolkit.

If you enable this policy setting, the Internet Explorer Site Discovery Toolkit collects data from all specified security zones.

If you disable or don’t configure this setting, the Internet Explorer Site Discovery Toolkit collects data from all sites in all security zones.

To specify which zones can collect data, you must include a binary number that represents your selected zones, based on this order:

  • 0 – Restricted Sites zone
  • 0 – Internet zone
  • 0 – Trusted Sites zone
  • 0 – Local Intranet zone
  • 0 – Local Machine zone

**Example 1:** Include only the Local Intranet zone (binary representation: 00010), based on:
  • 0 – Restricted Sites zone
  • 0 – Internet zone
  • 0 – Trusted Sites zone
  • 1 – Local Intranet zone
  • 0 – Local Machine zone

**Example 2:** Include only the Restricted Sites, Trusted Sites, and Local Intranet zones (binary representation: 10110), based on:
  • 1 – Restricted Sites zone
  • 0 – Internet zone
  • 1 – Trusted Sites zone
  • 1 – Local Intranet zone
  • 1 – Local Machine zone

**Note:**
You can use this setting in conjunction with the other settings that control the Internet Explorer Site Discovery Toolkit. | -| Prevent deleting ActiveX Filtering, Tracking Protection and Do Not Track data | Administrative Templates\Windows Components\Internet Explorer\Delete Browsing History | At least Windows Internet Explorer 9 | **In Internet Explorer 9 and Internet Explorer 10:**
This policy setting prevents users from deleting ActiveX Filtering and Tracking Protection data, which includes the list of websites for which the user has chosen to disable ActiveX Filtering or Tracking Protection. In addition, Tracking Protection data is also collected if users turn on the **Personalized Tracking Protection List**, which blocks third-party items while the user is browsing.

**In IE11:**
This policy setting prevents users from deleting ActiveX Filtering, Tracking Protection data, and Do Not Track exceptions, stored in the **Delete Browsing History** dialog box, for visited websites.

If you enable this policy setting, ActiveX Filtering, Tracking Protection and Do Not Track data is preserved when the user clicks **Delete**.

If you disable this policy setting, ActiveX Filtering, Tracking Protection and Do Not Track data is deleted when the user clicks **Delete**.

If you don’t configure this policy setting, users can turn this feature on and off, determining whether to delete ActiveX Filtering, Tracking Protection, and Do Not Track data when clicking **Delete**. | -| Send all sites not included in the Enterprise Mode Site List to Microsoft Edge | Administrative Templates\Windows Components\Internet Explorer | IE11 on Windows 10, version 1607 | This policy setting lets you decide whether to open all sites that aren’t specified to open in IE11 by the Enterprise Mode site list, to open in Microsoft Edge.

If you enable this policy setting, you must also enable the Administrative Templates\Windows Components\Internet Explorer\Use the Enterprise Mode IE website list policy setting and you must include at least one site in the Enterprise Mode site list.

If you disable or don't configure this policy setting, all sites will open based on the currently active browser.

**Note:**
If you’ve also enabled the Administrative Templates\Windows Components\Microsoft Edge\Send all intranet sites to Internet Explorer 11 policy setting, then all intranet sites will continue to open in Internet Explorer 11. | -| Show message when opening sites in Microsoft Edge using Enterprise Mode | Administrative Templates\Windows Components\Internet Explorer | IE11 on Windows 10, version 1607 | This policy setting lets you decide whether employees see an additional page in Internet Explorer 11, stating that a site has been opened using Microsoft Edge with Enterprise Mode.

If you enable this policy setting, employees see an additional page in Internet Explorer 11, stating that a site has been opened using Microsoft Edge with Enterprise Mode.

If you disable or don't configure this policy setting, the default app behavior occurs and no additional page appears. | -| Turn off automatic download of the ActiveX VersionList | Administrative Templates\Windows Components\Internet Explorer\Security Features\Add-on Management | At least Windows Internet Explorer 8 | This policy setting allows you to decide whether Internet Explorer automatically downloads updated versions of Microsoft's VersionList.XML file. This file tells Internet Explorer whether to stop specific ActiveX controls from loading.

If you enable this policy setting, Internet Explorer stops automatically downloading updated versions of the VersionList.XML file.

If you disable or don’t configure this setting, Internet Explorer continues to download updated versions of the VersionList.XML file.

**Important:**
Stopping this file from updating breaks the out-of-date ActiveX control blocking feature, potentially compromising the security of the device. For more info, see the Out-of-Date ActiveX Control Blocking () topic. | -| Turn off loading websites and content in the background to optimize performance | Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page | IE11 on Windows 10 | This policy setting determines whether Internet Explorer preemptively loads websites and content in the background, speeding up performance such that when the user clicks a hyperlink, the background page seamlessly switches into view.

If you enable this policy setting, IE doesn't load any websites or content in the background.

If you disable this policy setting, IE preemptively loads websites and content in the background.

If you don’t configure this policy setting, users can turn this behavior on or off, using IE settings. This feature is turned on by default. | -| Turn off phone number detection | Administrative Templates\Windows Components\Internet Explorer\Internet Settings\Advanced settings\Browsing | IE11 on Windows 10 | This policy setting determines whether phone numbers are recognized and turned into hyperlinks, which can be used to invoke the default phone application on the system.

If you enable this policy setting, phone number detection is turned off. Users won’t be able to modify this setting.

If you disable this policy setting, phone number detection is turned on. Users won’t be able to modify this setting.

If you don't configure this policy setting, users can turn this behavior on or off, using IE settings. The default is on. | -| Turn off sending URL path as UTF-8 | User Configuration\Administrative Templates\Windows Components\Internet Explorer\Internet Settings\URL Encoding | At least Windows Internet Explorer 7 | This policy setting determines whether to let IE send the path portion of a URL using the UTF-8 standard. This standard defines characters so they're readable in any language and lets you exchange Internet addresses (URLs) with characters included in any language.

If you enable this policy setting, UTF-8 is not allowed. Users won't be able to change this setting.

If you disable this policy setting, UTF-8 is allowed. Users won't be able to change this setting.

If you don't configure this policy setting, users can turn this behavior on or off. | -| Turn off sending UTF-8 query strings for URLs | Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page | IE11 on Windows 10 | This policy setting determines whether IE uses 8-bit Unicode Transformation Format (UTF-8) to encode query strings in URLs before sending them to servers or to proxy servers.

If you enable this policy setting, you must specify when to use UTF-8 to encode query strings:

  • **0.** Never encode query strings.
  • **1.** Only encode query strings for URLs that aren't in the Intranet zone.
  • **2.** Only encode query strings for URLs that are in the Intranet zone.
  • **3.** Always encode query strings.

If you disable or don't configure this policy setting, users can turn this behavior on or off, using IE Advanced Options settings. The default is to encode all query strings in UTF-8. | -| Turn off the ability to launch report site problems using a menu option | Administrative Templates\Windows Components\Internet Explorer\Browser menus | Internet Explorer 11 | This policy setting allows you to manage whether users can start the **eport Site Problems** dialog box from the **Internet Explorer** settings area or from the **Tools** menu.

If you enable this policy setting, users won’t be able to start the **Report Site Problems** dialog box from the Internet Explorer settings or the Tools menu.

If you disable or don’t configure this policy setting, users will be able to start the **Report Site Problems** dialog box from the **Internet Explorer** settings area or from the **Tools** menu. | -| Turn off the flip ahead with page prediction feature | Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page | At least Internet Explorer 10 on Windows 8 | This policy setting determines whether a user can swipe across a screen or click Forward to go to the next pre-loaded page of a website.

If you enable this policy setting, flip ahead with page prediction is turned off and the next webpage isn’t loaded into the background.

If you disable this policy setting, flip ahead with page prediction is turned on and the next webpage is loaded into the background.

If you don’t configure this setting, users can turn this behavior on or off, using the **Settings** charm.

**Note**
Microsoft collects your browsing history to improve how flip ahead with page prediction works. This feature isn’t available for Internet Explorer for the desktop. | -| Turn on 64-bit tab processes when running in Enhanced Protected Mode on 64-bit versions of Windows | Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page | IE11 on Windows 10 | This policy setting determines whether IE11 uses 64-bit processes (for greater security) or 32-bit processes (for greater compatibility) when running in Enhanced Protected Mode on 64-bit versions of Windows.

If you enable this policy setting, IE11 will use 64-bit tab processes when running in Enhanced Protected Mode on 64-bit versions of Windows.

If you disable this policy setting, IE11 will use 32-bit tab processes when running in Enhanced Protected Mode on 64-bit versions of Windows.

If you don't configure this policy setting, users can turn this feature on or off using IE settings. This feature is turned off by default.

**Important**
When using 64-bit processes, some ActiveX controls and toolbars might not be available. | -| Turn on Site Discovery WMI output | Administrative Templates\Windows Components\Internet Explorer | At least Internet Explorer 8 | This policy setting allows you to manage the WMI output functionality of the Internet Explorer Site Discovery Toolkit.

If you enable this policy setting, the Internet Explorer Site Discovery Toolkit will log its collected data to an WMI class, which can be aggregated by using a client-management solution, such as System Center Configuration Manager.

If you disable or don’t configure this setting, the Internet Explorer Site Discovery Toolkit won’t log its collected data to an WMI class.

**Note:**
Enabling or disabling this setting won’t impact any other output methods available to the Internet Explorer Site Discovery Toolkit. | -| Turn on Site Discovery XML output | Administrative Templates\Windows Components\Internet Explorer | At least Internet Explorer 8 | This policy setting allows you to manage the XML output functionality of the Internet Explorer Site Discovery Toolkit.

If you enable this policy setting, the Internet Explorer Site Discovery Toolkit will log its collected data to an XML file, stored in your specified location.

If you disable or don’t configure this setting, the Internet Explorer Site Discovery Toolkit won’t log its collected data to an XML file.

**Note:**
Enabling or disabling this setting won’t impact any other output methods available to the Internet Explorer Site Discovery Toolkit. | -| Use the Enterprise Mode IE website list | Administrative Templates\Windows Components\Internet Explorer | IE11 on Windows 10, version 1511 | This policy setting lets you specify where to find the list of websites you want opened using Enterprise Mode, instead of Standard mode, because of compatibility issues. Users can’t edit this list.

If you enable this policy setting, Internet Explorer downloads the Enterprise Mode website list from the `HKEY_CURRENT_USER or HKEY_LOCAL_MACHINE`\Software\Policies\Microsoft\Internet Explorer\Main\EnterpriseMode hive, opening all included websites using Enterprise Mode. We recommend storing and downloading your list from a secure web server `(https://)`, to help protect against data tampering.

If you disable or don’t configure this policy setting, Internet Explorer opens all websites using **Standard** mode. | - -## Removed Group Policy settings -IE11 no longer supports these Group Policy settings: - -- Turn on Internet Explorer 7 Standards Mode - -- Turn off Compatibility View button - -- Turn off Quick Tabs functionality - -- Turn off the quick pick menu - -- Use large icons for command buttons - -## Viewing your policy settings -After you've finished updating and deploying your Group Policy, you can use the Resultant Set of Policy (RSoP) snap-in to view your settings. - -**To use the RSoP snap-in** - -1. Open and run the Resultant Set of Policy (RSoP) wizard, specifying the information you want to see. - -2. Open your wizard results in the Group Policy Management Console (GPMC).

-For complete instructions about how to add, open, and use RSoP, see [Use the RSoP Snap-in](https://go.microsoft.com/fwlink/p/?LinkId=395201) - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: security +description: New group policy settings for Internet Explorer 11 +author: dansimp +ms.prod: ie11 +ms.assetid: 669cc1a6-e2cb-403f-aa31-c1de52a615d1 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: New group policy settings for Internet Explorer 11 (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# New group policy settings for Internet Explorer 11 +Internet Explorer 11 gives you some new Group Policy settings to help you manage your company's web browser configurations, including: + + +| Policy | Category Path | Supported on | Explanation | +|-----------------------------------------------------------------------------------------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|--------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| +| Allow IE to use the HTTP2 network protocol | Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page | IE11 on Windows 10 | This policy setting determines whether IE uses the HTTP2 network protocol. HTTP2 works with HTTP requests to optimize the latency of network requests through compression, multiplexing, and prioritization.

If you enable this policy setting, IE uses the HTTP2 network protocol.

If you disable this policy setting, IE won't use the HTTP2 network protocol.

If you don't configure this policy setting, users can turn this behavior on or off, using the **Internet Explorer Advanced Internet Options** settings. The default is on. | +| Allow IE to use the SPDY/3 network protocol | Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page | IE11 on Windows 10 | This policy setting determines whether Internet Explorer uses the SPDY/3 network protocol. SPDY/3 works with HTTP requests to optimize the latency of network requests through compression, multiplexing and prioritization.

If you enable this policy setting, Internet Explorer uses the SPDY/3 network protocol.

If you disable this policy setting, Internet Explorer won't use the SPDY/3 network protocol.

If you don't configure this policy setting, users can turn this behavior on or off, on the **Advanced\* tab of the \*\*Internet Options** dialog box. The default is on.

**Note**
We've replaced the SPDY/3 protocol with the HTTP2 protocol in Windows 10. You can configure the HTTP2 protocol by using the **Allow IE to use the HTTP2 network protocol** setting. | +| Allow Microsoft services to provide enhanced suggestions as the user types in the Address bar | Administrative Templates\Windows Components\Internet Explorer | IE11 on Windows 10 | This policy setting allows IE to provide enhanced suggestions as the user types in the Address bar. To provide enhanced suggestions, the user’s keystrokes are sent to Microsoft through Microsoft services.

If you enable this policy setting, users receive enhanced suggestions while typing in the Address bar. In addition, users won’t be able to change the **Suggestions** setting on the **Settings** charm.

If you disable this policy setting, users won’t receive enhanced suggestions while typing in the Address bar. In addition, users won’t be able to change the **Suggestions** setting on the **Settings** charm.

If you don’t configure this policy setting, users can change the **Suggestions** setting on the **Settings** charm. | +| Allow only approved domains to use the TDC ActiveX control |

  • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Intranet Zone
  • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Intranet Zone
  • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Trusted Sites Zone
  • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Trusted Sites Zone
  • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Local Machine Zone
  • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Local Machine Zone
| IE11 in Windows 10 | This policy setting determines whether users can run the Tabular Data Control (TDC) ActiveX control, based on security zone. By default, the TDC ActiveX Control is disabled in the **Internet** and **Restricted Sites** security zones.

If you enable this policy setting, users won’t be able to run the TDC ActiveX control from all sites in the specified zone.

If you disable this policy setting, users can run the TDC Active X control from all sites in the specified zone. | +| Allow SSL3 Fallback | Administrative Templates\Windows Components\Internet Explorer\Security Features | Internet Explorer 11 on Windows 10 | This policy setting allows you to stop websites from falling back to using Secure Socket Layer (SSL) 3.0 or lower, if Transport Layer Security (TLS) 1.0 or higher, fails. This setting doesn’t affect which security protocols are enabled.

If you enable this policy setting and a website fails while using the TLS 1.0 or higher security protocols, Internet Explorer will try to fallback and use SSL 3.0 or lower security protocols.

If you disable or don’t configure this setting, Internet Explorer uses the default system protocols.

**Important:**
By default, SSL 3.0 is disabled. If you choose to enable SSL 3.0, we recommend that you disable or don't configure this setting to help mitigate potential man-in-the-middle attacks. | +| Allow VBScript to run in Internet Explorer |

  • Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Internet Zone
  • Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Intranet Zone
  • Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Local Machine Zone
  • Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Locked-Down Internet Zone
  • Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Locked-Down Intranet Zone
  • Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Locked-Down Local Machine Zone
  • Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Locked-Down Restricted Sites Zone
  • Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Locked-Down Trusted Sites Zone
  • Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Restricted Sites Zone
  • Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Trusted Sites Zone
| Internet Explorer 11 | This policy setting lets you decide whether VBScript can run on pages in specific Internet Explorer zones.

If you enable this policy setting (default), you must also pick one of the following options from the Options box:

  • Enable. VBScript runs on pages in specific zones, without any interaction.
  • Prompt. Employees are prompted whether to allow VBScript to run in the zone.
  • Disable. VBScript is prevented from running in the zone.

If you disable or don’t configure this policy setting, VBScript runs without any interaction in the specified zone. | +| Always send Do Not Track header | Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page | At least Internet Explorer 10 | This policy setting allows you to configure how IE sends the Do Not Track (DNT) header.

If you enable this policy setting, IE sends a `DNT:1` header with all HTTP and HTTPS requests. The `DNT:1` header signals to the servers not to track the user.

**In Internet Explorer 9 and 10:**
If you disable this policy setting, IE only sends the Do Not Track header if a Tracking Protection List is enabled or inPrivate Browsing mode is used.

**In at least IE11:**
If you disable this policy setting, IE only sends the Do Not Track header if inPrivate Browsing mode is used.

If you don't configure the policy setting, users can select the **Always send Do Not Track header** option on the **Advanced\* tab of the \*\*Internet Options** dialog box. By selecting this option, IE sends a `DNT:1` header with all HTTP and HTTPS requests; unless the user grants a site-specific exception, in which case IE sends a `DNT:0` header. By default, this option is enabled. | +| Don't run antimalware programs against ActiveX controls
(Internet, Restricted Zones) |

  • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Internet Zone
  • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Internet Zone
  • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Restricted Sites Zone
  • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Restricted Sites Zone
| IE11 on Windows 10 | This policy setting determines whether IE runs antimalware programs against ActiveX controls, to check if they're safe to load on pages.

If you enable this policy setting, IE won't check with your antimalware program to see if it's safe to create an instance of the ActiveX control.

If you disable this policy setting, IE always checks with your antimalware program to see if it's safe to create an instance of the ActiveX control.

If you don't configure this policy setting, IE always checks with your antimalware program to see if it's safe to create an instance of the ActiveX control. Users can turn this behavior on or off, using the Internet Explorer's **Security** settings. | +| Don't run antimalware programs against ActiveX controls
(Intranet, Trusted, Local Machine Zones) |

  • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Intranet Zone
  • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Intranet Zone
  • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Trusted Sites Zone
  • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Trusted Sites Zone
  • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Local Machine Zone
  • Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Local Machine Zone
| IE11 on Windows 10 | This policy setting determines whether IE runs antimalware programs against ActiveX controls, to check if they're safe to load on pages.

If you enable this policy setting, IE won't check with your antimalware program to see if it's safe to create an instance of the ActiveX control.

If you disable this policy setting, IE always checks with your antimalware program to see if it's safe to create an instance of the ActiveX control.

If you don't configure this policy setting, IE won't check with your antimalware program to see if it's safe to create an instance of the ActiveX control. Users can turn this behavior on or off, using Internet Explorer's **Security** settings. | +| Hide the button (next to the New Tab button) that opens Microsoft Edge | User Configuration\Administrative Templates\Windows Components/Internet Explorer\Internet Settings\Advanced Settings\Browsing\ | IE11 on Windows 10, version 1703 | This policy setting lets you decide whether employees can see the open Microsoft Edge button, which appears next to the New Tab button.

If you enable this policy setting, the button to open Microsoft Edge from Internet Explorer will be hidden.

If you disable this policy setting, the button to open Microsoft Edge from Internet Explorer appears.

If you don't configure this policy setting, the button to open Microsoft Edge from Internet Explorer can be configured by your employees. | +| Let users turn on and use Enterprise Mode from the **Tools** menu | Administrative Templates\Windows Components\Internet Explorer | IE11 on Windows 10 | This policy setting lets you decide whether users can turn on Enterprise Mode for websites with compatibility issues. Optionally, this policy also lets you specify where to get reports (through post messages) about the websites for which users turn on Enterprise Mode using the **Tools** menu.

If you enable this policy setting, users can see and use the **Enterprise Mode** option from the **Tools** menu. If you enable this setting, but don’t specify a report location, Enterprise Mode will still be available to your users, but you won’t get any reports.

If you disable or don’t configure this policy setting, the menu option won’t appear and users won’t be able to turn on Enterprise Mode locally. | +| Limit Site Discovery output by Domain | Administrative Templates\Windows Components\Internet Explorer | At least Internet Explorer 8 | This policy setting allows you to control which domains are included in the discovery function of the Internet Explorer Site Discovery Toolkit.

If you enable this policy setting, the Internet Explorer Site Discovery Toolkit collects data from all sites in your specified domains, configured by adding one domain per line to the included text box.

If you disable or don’t configure this setting, the Internet Explorer Site Discovery Toolkit collects data from all sites in all domains.

**Note:**
You can use this setting in conjunction with the other settings that control the Internet Explorer Site Discovery Toolkit. | +| Limit Site Discovery output by Zone | Administrative Templates\Windows Components\Internet Explorer | At least Internet Explorer 8 | This policy setting allows you to control which zones are included in the discovery function of the Internet Explorer Site Discovery Toolkit.

If you enable this policy setting, the Internet Explorer Site Discovery Toolkit collects data from all specified security zones.

If you disable or don’t configure this setting, the Internet Explorer Site Discovery Toolkit collects data from all sites in all security zones.

To specify which zones can collect data, you must include a binary number that represents your selected zones, based on this order:

  • 0 – Restricted Sites zone
  • 0 – Internet zone
  • 0 – Trusted Sites zone
  • 0 – Local Intranet zone
  • 0 – Local Machine zone

**Example 1:** Include only the Local Intranet zone (binary representation: 00010), based on:
  • 0 – Restricted Sites zone
  • 0 – Internet zone
  • 0 – Trusted Sites zone
  • 1 – Local Intranet zone
  • 0 – Local Machine zone

**Example 2:** Include only the Restricted Sites, Trusted Sites, and Local Intranet zones (binary representation: 10110), based on:
  • 1 – Restricted Sites zone
  • 0 – Internet zone
  • 1 – Trusted Sites zone
  • 1 – Local Intranet zone
  • 1 – Local Machine zone

**Note:**
You can use this setting in conjunction with the other settings that control the Internet Explorer Site Discovery Toolkit. | +| Prevent deleting ActiveX Filtering, Tracking Protection and Do Not Track data | Administrative Templates\Windows Components\Internet Explorer\Delete Browsing History | At least Windows Internet Explorer 9 | **In Internet Explorer 9 and Internet Explorer 10:**
This policy setting prevents users from deleting ActiveX Filtering and Tracking Protection data, which includes the list of websites for which the user has chosen to disable ActiveX Filtering or Tracking Protection. In addition, Tracking Protection data is also collected if users turn on the **Personalized Tracking Protection List**, which blocks third-party items while the user is browsing.

**In IE11:**
This policy setting prevents users from deleting ActiveX Filtering, Tracking Protection data, and Do Not Track exceptions, stored in the **Delete Browsing History** dialog box, for visited websites.

If you enable this policy setting, ActiveX Filtering, Tracking Protection and Do Not Track data is preserved when the user clicks **Delete**.

If you disable this policy setting, ActiveX Filtering, Tracking Protection and Do Not Track data is deleted when the user clicks **Delete**.

If you don’t configure this policy setting, users can turn this feature on and off, determining whether to delete ActiveX Filtering, Tracking Protection, and Do Not Track data when clicking **Delete**. | +| Send all sites not included in the Enterprise Mode Site List to Microsoft Edge | Administrative Templates\Windows Components\Internet Explorer | IE11 on Windows 10, version 1607 | This policy setting lets you decide whether to open all sites that aren’t specified to open in IE11 by the Enterprise Mode site list, to open in Microsoft Edge.

If you enable this policy setting, you must also enable the Administrative Templates\Windows Components\Internet Explorer\Use the Enterprise Mode IE website list policy setting and you must include at least one site in the Enterprise Mode site list.

If you disable or don't configure this policy setting, all sites will open based on the currently active browser.

**Note:**
If you’ve also enabled the Administrative Templates\Windows Components\Microsoft Edge\Send all intranet sites to Internet Explorer 11 policy setting, then all intranet sites will continue to open in Internet Explorer 11. | +| Show message when opening sites in Microsoft Edge using Enterprise Mode | Administrative Templates\Windows Components\Internet Explorer | IE11 on Windows 10, version 1607 | This policy setting lets you decide whether employees see an additional page in Internet Explorer 11, stating that a site has been opened using Microsoft Edge with Enterprise Mode.

If you enable this policy setting, employees see an additional page in Internet Explorer 11, stating that a site has been opened using Microsoft Edge with Enterprise Mode.

If you disable or don't configure this policy setting, the default app behavior occurs and no additional page appears. | +| Turn off automatic download of the ActiveX VersionList | Administrative Templates\Windows Components\Internet Explorer\Security Features\Add-on Management | At least Windows Internet Explorer 8 | This policy setting allows you to decide whether Internet Explorer automatically downloads updated versions of Microsoft's VersionList.XML file. This file tells Internet Explorer whether to stop specific ActiveX controls from loading.

If you enable this policy setting, Internet Explorer stops automatically downloading updated versions of the VersionList.XML file.

If you disable or don’t configure this setting, Internet Explorer continues to download updated versions of the VersionList.XML file.

**Important:**
Stopping this file from updating breaks the out-of-date ActiveX control blocking feature, potentially compromising the security of the device. For more info, see the Out-of-Date ActiveX Control Blocking () topic. | +| Turn off loading websites and content in the background to optimize performance | Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page | IE11 on Windows 10 | This policy setting determines whether Internet Explorer preemptively loads websites and content in the background, speeding up performance such that when the user clicks a hyperlink, the background page seamlessly switches into view.

If you enable this policy setting, IE doesn't load any websites or content in the background.

If you disable this policy setting, IE preemptively loads websites and content in the background.

If you don’t configure this policy setting, users can turn this behavior on or off, using IE settings. This feature is turned on by default. | +| Turn off phone number detection | Administrative Templates\Windows Components\Internet Explorer\Internet Settings\Advanced settings\Browsing | IE11 on Windows 10 | This policy setting determines whether phone numbers are recognized and turned into hyperlinks, which can be used to invoke the default phone application on the system.

If you enable this policy setting, phone number detection is turned off. Users won’t be able to modify this setting.

If you disable this policy setting, phone number detection is turned on. Users won’t be able to modify this setting.

If you don't configure this policy setting, users can turn this behavior on or off, using IE settings. The default is on. | +| Turn off sending URL path as UTF-8 | User Configuration\Administrative Templates\Windows Components\Internet Explorer\Internet Settings\URL Encoding | At least Windows Internet Explorer 7 | This policy setting determines whether to let IE send the path portion of a URL using the UTF-8 standard. This standard defines characters so they're readable in any language and lets you exchange Internet addresses (URLs) with characters included in any language.

If you enable this policy setting, UTF-8 is not allowed. Users won't be able to change this setting.

If you disable this policy setting, UTF-8 is allowed. Users won't be able to change this setting.

If you don't configure this policy setting, users can turn this behavior on or off. | +| Turn off sending UTF-8 query strings for URLs | Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page | IE11 on Windows 10 | This policy setting determines whether IE uses 8-bit Unicode Transformation Format (UTF-8) to encode query strings in URLs before sending them to servers or to proxy servers.

If you enable this policy setting, you must specify when to use UTF-8 to encode query strings:

  • **0.** Never encode query strings.
  • **1.** Only encode query strings for URLs that aren't in the Intranet zone.
  • **2.** Only encode query strings for URLs that are in the Intranet zone.
  • **3.** Always encode query strings.

If you disable or don't configure this policy setting, users can turn this behavior on or off, using IE Advanced Options settings. The default is to encode all query strings in UTF-8. | +| Turn off the ability to launch report site problems using a menu option | Administrative Templates\Windows Components\Internet Explorer\Browser menus | Internet Explorer 11 | This policy setting allows you to manage whether users can start the **eport Site Problems** dialog box from the **Internet Explorer** settings area or from the **Tools** menu.

If you enable this policy setting, users won’t be able to start the **Report Site Problems** dialog box from the Internet Explorer settings or the Tools menu.

If you disable or don’t configure this policy setting, users will be able to start the **Report Site Problems** dialog box from the **Internet Explorer** settings area or from the **Tools** menu. | +| Turn off the flip ahead with page prediction feature | Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page | At least Internet Explorer 10 on Windows 8 | This policy setting determines whether a user can swipe across a screen or click Forward to go to the next pre-loaded page of a website.

If you enable this policy setting, flip ahead with page prediction is turned off and the next webpage isn’t loaded into the background.

If you disable this policy setting, flip ahead with page prediction is turned on and the next webpage is loaded into the background.

If you don’t configure this setting, users can turn this behavior on or off, using the **Settings** charm.

**Note**
Microsoft collects your browsing history to improve how flip ahead with page prediction works. This feature isn’t available for Internet Explorer for the desktop. | +| Turn on 64-bit tab processes when running in Enhanced Protected Mode on 64-bit versions of Windows | Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page | IE11 on Windows 10 | This policy setting determines whether IE11 uses 64-bit processes (for greater security) or 32-bit processes (for greater compatibility) when running in Enhanced Protected Mode on 64-bit versions of Windows.

If you enable this policy setting, IE11 will use 64-bit tab processes when running in Enhanced Protected Mode on 64-bit versions of Windows.

If you disable this policy setting, IE11 will use 32-bit tab processes when running in Enhanced Protected Mode on 64-bit versions of Windows.

If you don't configure this policy setting, users can turn this feature on or off using IE settings. This feature is turned off by default.

**Important**
When using 64-bit processes, some ActiveX controls and toolbars might not be available. | +| Turn on Site Discovery WMI output | Administrative Templates\Windows Components\Internet Explorer | At least Internet Explorer 8 | This policy setting allows you to manage the WMI output functionality of the Internet Explorer Site Discovery Toolkit.

If you enable this policy setting, the Internet Explorer Site Discovery Toolkit will log its collected data to an WMI class, which can be aggregated by using a client-management solution, such as System Center Configuration Manager.

If you disable or don’t configure this setting, the Internet Explorer Site Discovery Toolkit won’t log its collected data to an WMI class.

**Note:**
Enabling or disabling this setting won’t impact any other output methods available to the Internet Explorer Site Discovery Toolkit. | +| Turn on Site Discovery XML output | Administrative Templates\Windows Components\Internet Explorer | At least Internet Explorer 8 | This policy setting allows you to manage the XML output functionality of the Internet Explorer Site Discovery Toolkit.

If you enable this policy setting, the Internet Explorer Site Discovery Toolkit will log its collected data to an XML file, stored in your specified location.

If you disable or don’t configure this setting, the Internet Explorer Site Discovery Toolkit won’t log its collected data to an XML file.

**Note:**
Enabling or disabling this setting won’t impact any other output methods available to the Internet Explorer Site Discovery Toolkit. | +| Use the Enterprise Mode IE website list | Administrative Templates\Windows Components\Internet Explorer | IE11 on Windows 10, version 1511 | This policy setting lets you specify where to find the list of websites you want opened using Enterprise Mode, instead of Standard mode, because of compatibility issues. Users can’t edit this list.

If you enable this policy setting, Internet Explorer downloads the Enterprise Mode website list from the `HKEY_CURRENT_USER or HKEY_LOCAL_MACHINE`\Software\Policies\Microsoft\Internet Explorer\Main\EnterpriseMode hive, opening all included websites using Enterprise Mode. We recommend storing and downloading your list from a secure web server `(https://)`, to help protect against data tampering.

If you disable or don’t configure this policy setting, Internet Explorer opens all websites using **Standard** mode. | + +## Removed Group Policy settings +IE11 no longer supports these Group Policy settings: + +- Turn on Internet Explorer 7 Standards Mode + +- Turn off Compatibility View button + +- Turn off Quick Tabs functionality + +- Turn off the quick pick menu + +- Use large icons for command buttons + +## Viewing your policy settings +After you've finished updating and deploying your Group Policy, you can use the Resultant Set of Policy (RSoP) snap-in to view your settings. + +**To use the RSoP snap-in** + +1. Open and run the Resultant Set of Policy (RSoP) wizard, specifying the information you want to see. + +2. Open your wizard results in the Group Policy Management Console (GPMC).

+For complete instructions about how to add, open, and use RSoP, see [Use the RSoP Snap-in](https://go.microsoft.com/fwlink/p/?LinkId=395201) + diff --git a/browsers/internet-explorer/ie11-deploy-guide/out-of-date-activex-control-blocking.md b/browsers/internet-explorer/ie11-deploy-guide/out-of-date-activex-control-blocking.md index 32665259c3..5591606f32 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/out-of-date-activex-control-blocking.md +++ b/browsers/internet-explorer/ie11-deploy-guide/out-of-date-activex-control-blocking.md @@ -1,205 +1,206 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: security -description: Use out-of-date ActiveX control blocking to help you know when IE prevents a webpage from loading outdated ActiveX controls and to update the outdated control, so that it’s safer to use. -author: lomayor -ms.author: lomayor -ms.prod: ie11 -ms.assetid: e61866bb-1ff1-4a8d-96f2-61d3534e8199 -ms.reviewer: -audience: itpro manager: dansimp -title: Out-of-date ActiveX control blocking (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 05/10/2018 ---- - - -# Out-of-date ActiveX control blocking - -**Applies to:** - -- Windows 10 -- Windows 8.1 -- Windows 7 -- Windows Server 2012 R2 -- Windows Server 2008 R2 with Service Pack 1 (SP1) -- Windows Vista SP2 - -ActiveX controls are small apps that let websites provide content, like videos, games, and let you interact with content like toolbars. Unfortunately, because many ActiveX controls aren’t automatically updated, they can become outdated as new versions are released. It’s very important that you keep your ActiveX controls up-to-date because malicious software (or malware) can target security flaws in outdated controls, damaging your computer by collecting info from it, installing unwanted software, or by letting someone else control it remotely. To help avoid this situation, Internet Explorer includes a new security feature, called *out-of-date ActiveX control blocking*. - -Out-of-date ActiveX control blocking lets you: - -- Know when IE prevents a webpage from loading common, but outdated ActiveX controls. - -- Interact with other parts of the webpage that aren’t affected by the outdated control. - -- Update the outdated control, so that it’s up-to-date and safer to use. - -The out-of-date ActiveX control blocking feature works with all [Security Zones](https://go.microsoft.com/fwlink/p/?LinkId=403863), except the Local Intranet Zone and the Trusted Sites Zone. - -It also works with these operating system and IE combinations: - -|Windows operating system |IE version | -|----------------------------------------|---------------------------------| -|Windows 10 |All supported versions of IE.
Microsoft Edge doesn't support ActiveX controls. | -|Windows 8.1 and Windows 8.1 Update |All supported versions of IE | -|Windows 7 SP1 |All supported versions of IE | -|Windows Server 2012 |All supported versions of IE | -|Windows Server 2008 R2 SP1 |All supported versions of IE | -|Windows Server 2008 SP2 |Windows Internet Explorer 9 only | -|Windows Vista SP2 |Windows Internet Explorer 9 only | - -For more info about this new feature, see the [Internet Explorer begins blocking out-of-date ActiveX controls](https://go.microsoft.com/fwlink/p/?LinkId=507691) blog. To see the complete list of out-of-date Active controls blocked by this feature, see [Blocked out-of-date ActiveX controls](blocked-out-of-date-activex-controls.md). - - -## What does the out-of-date ActiveX control blocking notification look like? -When IE blocks an outdated ActiveX control, you’ll see a notification bar similar to this, depending on your version of IE: - -**Internet Explorer 9 through Internet Explorer 11** - -![Warning about outdated activex controls (ie9+)](images/outdatedcontrolwarning.png) - -**Windows Internet Explorer 8** - -![Warning about outdated activex controls (ie8)](images/ieoutdatedcontrolwarning.png) - -Out-of-date ActiveX control blocking also gives you a security warning that tells you if a webpage tries to launch specific outdated apps, outside of IE: - -![Warning about outdated activex controls outside ie](images/ieoutdatedcontroloutsideofie.png) - - -## How do I fix an outdated ActiveX control or app? -From the notification about the outdated ActiveX control, you can go to the control’s website to download its latest version. - - **To get the updated ActiveX control** - -1. From the notification bar, tap or click **Update**.

-IE opens the ActiveX control’s website. - -2. Download the latest version of the control. - -**Security Note:**
If you don’t fully trust a site, you shouldn’t allow it to load an outdated ActiveX control. However, although we don’t recommend it, you can view the missing webpage content by tapping or clicking **Run this time**. This option runs the ActiveX control without updating or fixing the problem. The next time you visit a webpage running the same outdated ActiveX control, you’ll get the notification again. - - **To get the updated app** - -1. From the security warning, tap or click **Update** link.

-IE opens the app’s website. - -2. Download the latest version of the app. - -**Security Note:**
If you don’t fully trust a site, you shouldn’t allow it to launch an outdated app. However, although we don’t recommend it, you can let the webpage launch the app by tapping or clicking **Allow**. This option opens the app without updating or fixing the problem. The next time you visit a webpage running the same outdated app, you’ll get the notification again. - -## How does IE decide which ActiveX controls to block? -IE uses Microsoft’s versionlist.xml or versionlistWin7.xml file to determine whether an ActiveX control should be stopped from loading. These files are updated with newly-discovered out-of-date ActiveX controls, which IE automatically downloads to your local copy of the file. - -You can see your copy of the file here `%LOCALAPPDATA%\Microsoft\Internet Explorer\VersionManager\versionlist.xml` or you can view Microsoft’s version, based on your operating system and version of IE, here: -- [Internet Explorer 11 on Windows 7 SP1 or Windows Server 2008 R2](https://go.microsoft.com/fwlink/p/?LinkId=798230) -- [All other configurations](https://go.microsoft.com/fwlink/p/?LinkId=403864) - -**Security Note:**
Although we strongly recommend against it, if you don’t want your computer to automatically download the updated version list from Microsoft, run the following command from a command prompt: - -``` -reg add "HKCU\Software\Microsoft\Internet Explorer\VersionManager" /v DownloadVersionList /t REG_DWORD /d 0 /f -``` -Turning off this automatic download breaks the out-of-date ActiveX control blocking feature by not letting the version list update with newly outdated controls, potentially compromising the security of your computer. Use this configuration option at your own risk. - -## Out-of-date ActiveX control blocking on managed devices -Out-of-date ActiveX control blocking includes four new Group Policy settings that you can use to manage your web browser configuration, based on your domain controller. You can download the administrative templates, including the new settings, from the [Administrative templates (.admx) for Windows 10](https://go.microsoft.com/fwlink/p/?LinkId=746579) page or the [Administrative Templates (.admx) for Windows 8.1 and Windows Server 2012 R2](https://go.microsoft.com/fwlink/p/?LinkId=746580) page, depending on your operating system. - -### Group Policy settings -Here’s a list of the new Group Policy info, including the settings, location, requirements, and Help text strings. All of these settings can be set in either the Computer Configuration or User Configuration scope, but Computer Configuration takes precedence over User Configuration. - -**Important**
-Out-of-date ActiveX control blocking is turned off in the Local Intranet Zone and the Trusted Sites Zone; therefore, intranet websites and line-of-business apps will continue to use out-of-date ActiveX controls without disruption. - -|Setting |Category path |Supported on |Help text | -|--------|--------------|-------------|----------| -|Turn on ActiveX control logging in IE |`Administrative Templates\Windows Components\Internet Explorer\Security Features\Add-on Management` |Internet Explorer 8 through IE11 |This setting determines whether IE saves log information for ActiveX controls.

If you enable this setting, IE logs ActiveX control information (including the source URI that loaded the control and whether it was blocked) to a local file.

If you disable or don't configure this setting, IE won't log ActiveX control information.

Note that you can turn this setting on or off regardless of the **Turn off blocking of outdated ActiveX controls for IE** or **Turn off blocking of outdated ActiveX controls for IE on specific domains** settings. | -|Remove the **Run this time** button for outdated ActiveX controls in IE |`Administrative Templates\Windows Components\Internet Explorer\Security Features\Add-on Management`|Internet Explorer 8 through IE11 |This setting allows you stop users from seeing the **Run this time** button and from running specific outdated ActiveX controls in IE.

If you enable this setting, users won't see the **Run this time** button on the warning message that appears when IE blocks an outdated ActiveX control.

If you disable or don't configure this setting, users will see the **Run this time** button on the warning message that appears when IE blocks an outdated ActiveX control. Clicking this button lets the user run the outdated ActiveX control once. | -|Turn off blocking of outdated ActiveX controls for IE on specific domains |`Administrative Templates\Windows Components\Internet Explorer\Security Features\Add-on Management` |Internet Explorer 8 through IE11 |This setting allows you to manage a list of domains on which IE will stop blocking outdated ActiveX controls. Outdated ActiveX controls are never blocked in the Intranet Zone.

If you enable this setting, you can enter a custom list of domains for which outdated ActiveX controls won't be blocked in IE. Each domain entry must be formatted like one of the following:

  • **"domainname.TLD".** For example, if you want to include `*.contoso.com/*`, use "contoso.com".
  • **"hostname".** For example, if you want to include `https://example`, use "example".
  • **"file:///path/filename.htm"**. For example, use `file:///C:/Users/contoso/Desktop/index.htm`.

If you disable or don't configure this setting, the list is deleted and IE continues to block specific outdated ActiveX controls on all domains in the Internet Zone. | -|Turn off blocking of outdated ActiveX controls for IE |`Administrative Templates\Windows Components\Internet Explorer\Security Features\Add-on Management` |Internet Explorer 8 through IE11 |This setting determines whether IE blocks specific outdated ActiveX controls. Outdated ActiveX controls are never blocked in the Intranet Zone.

If you enable this setting, IE stops blocking outdated ActiveX controls.

If you disable or don't configure this setting, IE continues to block specific outdated ActiveX controls. | -|Remove the **Update** button in the out-of-date ActiveX control blocking notification for IE |This functionality is only available through the registry |Internet Explorer 8 through IE11 |This setting determines whether the out-of-date ActiveX control blocking notification shows the **Update** button. This button points users to update specific out-of-date ActiveX controls in IE. | - - -If you don't want to use Group Policy, you can also turn these settings on or off using the registry. You can update the registry manually. - -|Setting |Registry setting | -|-------------------------|----------------------------------------------------------------| -|Turn on ActiveX control logging in IE |`reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Ext" /v AuditModeEnabled /t REG_DWORD /d 1 /f`

Where:

  • **0 or not configured.** Logs ActiveX control information (including the source URI that loaded the control and whether it was blocked) to a local file.
  • **1.** Logs ActiveX control information.
| -|Remove **Run this time** button for outdated ActiveX controls in IE |`reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Ext" /v RunThisTimeEnabled /t REG_DWORD /d 0 /f`

Where:

  • **0.** Removes the **Run this time** button.
  • **1 or not configured.** Leaves the **Run this time** button.
| -|Turn off blocking of outdated ActiveX controls for IE on specific domains |reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Ext\Domain" /v contoso.com /t REG_SZ /f

Where:

  • **contoso.com.** A single domain on which outdated ActiveX controls won't be blocked in IE. Use a new `reg add` command for each domain you wish to add to the **Allow** list.
| -|Turn off blocking of outdated ActiveX controls for IE |`reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Ext" /v VersionCheckEnabled /t REG_DWORD /d 0 /f`

Where:

  • **0.** Stops blocking outdated ActiveX controls.
  • **1 or not configured.** Continues to block specific outdated ActiveX controls.
| -|Remove the **Update** button in the out-of-date ActiveX control blocking notification for IE |`reg add "HKCU\Software\Microsoft\Internet Explorer\VersionManager" /v UpdateEnabled /t REG_DWORD /d 0 /f`

Where:

  • **0.** Removes the **Update** button
  • **1 or not configured.** Leaves the **Update** button.
- -## Inventory your ActiveX controls -You can inventory the ActiveX controls being used in your company, by turning on the **Turn on ActiveX control logging in IE** setting: - -- **Windows 10:** Through a comma-separated values (.csv) file or through a local Windows Management Instrumentation (WMI) class. - -- **All other versions of Microsoft Windows:** Through a .csv file only. - - -### Inventory your ActiveX controls by using a .CSV file -If you decide to inventory the ActiveX controls being used in your company by turning on the **Turn on ActiveX control logging in IE** setting, IE logs the ActiveX control information to the `%LOCALAPPDATA%\Microsoft\Internet Explorer\AuditMode\VersionAuditLog.csv` file. - -Here’s a detailed example and description of what’s included in the VersionAuditLog.csv file. - -|Source URI |File path |Product version |File version |Allowed/Blocked |Reason |EPM-compatible | -|-----------|----------|----------------|-------------|----------------|-------|---------------| -|`https://contoso.com/test1.html` |C:\Windows\System32\Macromed\Flash\Flash.ocx |14.0.0.125 |14.0.0.125 |Allowed |Not in blocklist |EPM-compatible | -|`https://contoso.com/test2.html` |C:\Program Files\Java\jre6\bin\jp2iexp.dll |6.0.410.2 |6.0.410.2 |Blocked |Out of date |Not EPM-compatible | - -**Where:** -- **Source URI.** The URL of the page that loaded the ActiveX control. - -- **File path.** The location of the binary that implements the ActiveX control. - -- **Product version.** The product version of the binary that implements the ActiveX control. - -- **File version.** The file version of the binary that implements the ActiveX control. - -- **Allowed/Blocked** Whether IE blocked the ActiveX control. - -- **Enhanced Protected Mode (EPM)-compatible.** Whether the loaded ActiveX control is compatible with [Enhanced Protected Mode](https://go.microsoft.com/fwlink/p/?LinkId=403865).

**Note**
Enhanced Protected Mode isn’t supported on Internet Explorer 9 or earlier versions of IE. Therefore, if you’re using Internet Explorer 8 or Internet Explorer 9, all ActiveX controls will always be marked as not EPM-compatible. - -- **Reason.** The ActiveX control can be blocked or allowed for any of these reasons: - -|Reason |Corresponds to |Description | -|-------------------------|---------------|-------------------------------------------------| -|Version not in blocklist |Allowed |The version of the loaded ActiveX control is explicitly allowed by the IE version list. | -|Trusted domain |Allowed |The ActiveX control was loaded on a domain listed in the **Turn off blocking of outdated ActiveX controls for IE on specific domains** setting. | -|File doesn’t exist |Allowed |The loaded ActiveX control is missing required binaries to run correctly. | -|Out-of-date |Blocked |The loaded ActiveX control is explicitly blocked by the IE version list because it is out-of-date. | -|Not in blocklist |Allowed |The loaded ActiveX control isn’t in the IE version list. | -|Managed by policy |Allowed |The loaded ActiveX control is managed by a Group Policy setting that isn’t listed here, and will be managed in accordance with that Group Policy setting. | -|Trusted Site Zone or intranet |Allowed |The ActiveX control was loaded in the Trusted Sites Zone or the Local Intranet Zone. | -|Hardblocked |Blocked |The loaded ActiveX control is blocked in IE because it contains known security vulnerabilities. | -|Unknown |Allowed or blocked |None of the above apply. | - -### Inventory your ActiveX controls by using a local WMI class -For Windows 10 you also have the option to log your inventory info to a local WMI class. Info logged to this class includes all of info you get from the .csv file, plus the CLSID of the loaded ActiveX control or the name of any apps started from an ActiveX control. - -#### Before you begin -Before you can use WMI to inventory your ActiveX controls, you need to [download the configuration package (.zip file)](https://go.microsoft.com/fwlink/p/?LinkId=616971), which includes: - -- **ConfigureWMILogging.ps1**. A Windows PowerShell script. - -- **ActiveXWMILogging.mof**. A managed object file. - -Before running the PowerShell script, you must copy both the .ps1 and .mof file to the same directory location, on the client computer. - - **To configure IE to use WMI logging** - -1. Open your Group Policy editor and turn on the `Administrative Templates\Windows Components\Internet Explorer\Turn on ActiveX control logging in IE` setting. - -2. On the client device, start PowerShell in elevated mode (using admin privileges) and run `ConfigureWMILogging.ps1` by by-passing the PowerShell execution policy, using this command: - ``` - powershell –ExecutionPolicy Bypass .\ConfigureWMILogging.ps1 - ``` - For more info, see [about_Execution_Policies](https://go.microsoft.com/fwlink/p/?linkid=517460). - -3. **Optional:** Set up your domain firewall for WMI data. For more info, see [Collect data using Enterprise Site Discovery](collect-data-using-enterprise-site-discovery.md). - -The inventory info appears in the WMI class, `IEAXControlBlockingAuditInfo`, located in the WMI namespace, *root\\cimv2\\IETelemetry*. To collect the inventory info from your client computers, we recommend using System Center 2012 R2 Configuration Manager or any agent that can access the WMI data. For more info, see [Collect data using Enterprise Site Discovery](collect-data-using-enterprise-site-discovery.md). - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: security +description: Use out-of-date ActiveX control blocking to help you know when IE prevents a webpage from loading outdated ActiveX controls and to update the outdated control, so that it’s safer to use. +author: dansimp +ms.author: dansimp +ms.prod: ie11 +ms.assetid: e61866bb-1ff1-4a8d-96f2-61d3534e8199 +ms.reviewer: +audience: itpro +manager: dansimp +title: Out-of-date ActiveX control blocking (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 05/10/2018 +--- + + +# Out-of-date ActiveX control blocking + +**Applies to:** + +- Windows 10 +- Windows 8.1 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2008 R2 with Service Pack 1 (SP1) +- Windows Vista SP2 + +ActiveX controls are small apps that let websites provide content, like videos, games, and let you interact with content like toolbars. Unfortunately, because many ActiveX controls aren’t automatically updated, they can become outdated as new versions are released. It’s very important that you keep your ActiveX controls up-to-date because malicious software (or malware) can target security flaws in outdated controls, damaging your computer by collecting info from it, installing unwanted software, or by letting someone else control it remotely. To help avoid this situation, Internet Explorer includes a new security feature, called *out-of-date ActiveX control blocking*. + +Out-of-date ActiveX control blocking lets you: + +- Know when IE prevents a webpage from loading common, but outdated ActiveX controls. + +- Interact with other parts of the webpage that aren’t affected by the outdated control. + +- Update the outdated control, so that it’s up-to-date and safer to use. + +The out-of-date ActiveX control blocking feature works with all [Security Zones](https://go.microsoft.com/fwlink/p/?LinkId=403863), except the Local Intranet Zone and the Trusted Sites Zone. + +It also works with these operating system and IE combinations: + +|Windows operating system |IE version | +|----------------------------------------|---------------------------------| +|Windows 10 |All supported versions of IE.
Microsoft Edge doesn't support ActiveX controls. | +|Windows 8.1 and Windows 8.1 Update |All supported versions of IE | +|Windows 7 SP1 |All supported versions of IE | +|Windows Server 2012 |All supported versions of IE | +|Windows Server 2008 R2 SP1 |All supported versions of IE | +|Windows Server 2008 SP2 |Windows Internet Explorer 9 only | +|Windows Vista SP2 |Windows Internet Explorer 9 only | + +For more info about this new feature, see the [Internet Explorer begins blocking out-of-date ActiveX controls](https://go.microsoft.com/fwlink/p/?LinkId=507691) blog. To see the complete list of out-of-date Active controls blocked by this feature, see [Blocked out-of-date ActiveX controls](blocked-out-of-date-activex-controls.md). + + +## What does the out-of-date ActiveX control blocking notification look like? +When IE blocks an outdated ActiveX control, you’ll see a notification bar similar to this, depending on your version of IE: + +**Internet Explorer 9 through Internet Explorer 11** + +![Warning about outdated activex controls (ie9+)](images/outdatedcontrolwarning.png) + +**Windows Internet Explorer 8** + +![Warning about outdated activex controls (ie8)](images/ieoutdatedcontrolwarning.png) + +Out-of-date ActiveX control blocking also gives you a security warning that tells you if a webpage tries to launch specific outdated apps, outside of IE: + +![Warning about outdated activex controls outside ie](images/ieoutdatedcontroloutsideofie.png) + + +## How do I fix an outdated ActiveX control or app? +From the notification about the outdated ActiveX control, you can go to the control’s website to download its latest version. + + **To get the updated ActiveX control** + +1. From the notification bar, tap or click **Update**.

+IE opens the ActiveX control’s website. + +2. Download the latest version of the control. + +**Security Note:**
If you don’t fully trust a site, you shouldn’t allow it to load an outdated ActiveX control. However, although we don’t recommend it, you can view the missing webpage content by tapping or clicking **Run this time**. This option runs the ActiveX control without updating or fixing the problem. The next time you visit a webpage running the same outdated ActiveX control, you’ll get the notification again. + + **To get the updated app** + +1. From the security warning, tap or click **Update** link.

+IE opens the app’s website. + +2. Download the latest version of the app. + +**Security Note:**
If you don’t fully trust a site, you shouldn’t allow it to launch an outdated app. However, although we don’t recommend it, you can let the webpage launch the app by tapping or clicking **Allow**. This option opens the app without updating or fixing the problem. The next time you visit a webpage running the same outdated app, you’ll get the notification again. + +## How does IE decide which ActiveX controls to block? +IE uses Microsoft’s versionlist.xml or versionlistWin7.xml file to determine whether an ActiveX control should be stopped from loading. These files are updated with newly-discovered out-of-date ActiveX controls, which IE automatically downloads to your local copy of the file. + +You can see your copy of the file here `%LOCALAPPDATA%\Microsoft\Internet Explorer\VersionManager\versionlist.xml` or you can view Microsoft’s version, based on your operating system and version of IE, here: +- [Internet Explorer 11 on Windows 7 SP1 or Windows Server 2008 R2](https://go.microsoft.com/fwlink/p/?LinkId=798230) +- [All other configurations](https://go.microsoft.com/fwlink/p/?LinkId=403864) + +**Security Note:**
Although we strongly recommend against it, if you don’t want your computer to automatically download the updated version list from Microsoft, run the following command from a command prompt: + +``` +reg add "HKCU\Software\Microsoft\Internet Explorer\VersionManager" /v DownloadVersionList /t REG_DWORD /d 0 /f +``` +Turning off this automatic download breaks the out-of-date ActiveX control blocking feature by not letting the version list update with newly outdated controls, potentially compromising the security of your computer. Use this configuration option at your own risk. + +## Out-of-date ActiveX control blocking on managed devices +Out-of-date ActiveX control blocking includes four new Group Policy settings that you can use to manage your web browser configuration, based on your domain controller. You can download the administrative templates, including the new settings, from the [Administrative templates (.admx) for Windows 10](https://go.microsoft.com/fwlink/p/?LinkId=746579) page or the [Administrative Templates (.admx) for Windows 8.1 and Windows Server 2012 R2](https://go.microsoft.com/fwlink/p/?LinkId=746580) page, depending on your operating system. + +### Group Policy settings +Here’s a list of the new Group Policy info, including the settings, location, requirements, and Help text strings. All of these settings can be set in either the Computer Configuration or User Configuration scope, but Computer Configuration takes precedence over User Configuration. + +**Important**
+Out-of-date ActiveX control blocking is turned off in the Local Intranet Zone and the Trusted Sites Zone; therefore, intranet websites and line-of-business apps will continue to use out-of-date ActiveX controls without disruption. + +|Setting |Category path |Supported on |Help text | +|--------|--------------|-------------|----------| +|Turn on ActiveX control logging in IE |`Administrative Templates\Windows Components\Internet Explorer\Security Features\Add-on Management` |Internet Explorer 8 through IE11 |This setting determines whether IE saves log information for ActiveX controls.

If you enable this setting, IE logs ActiveX control information (including the source URI that loaded the control and whether it was blocked) to a local file.

If you disable or don't configure this setting, IE won't log ActiveX control information.

Note that you can turn this setting on or off regardless of the **Turn off blocking of outdated ActiveX controls for IE** or **Turn off blocking of outdated ActiveX controls for IE on specific domains** settings. | +|Remove the **Run this time** button for outdated ActiveX controls in IE |`Administrative Templates\Windows Components\Internet Explorer\Security Features\Add-on Management`|Internet Explorer 8 through IE11 |This setting allows you stop users from seeing the **Run this time** button and from running specific outdated ActiveX controls in IE.

If you enable this setting, users won't see the **Run this time** button on the warning message that appears when IE blocks an outdated ActiveX control.

If you disable or don't configure this setting, users will see the **Run this time** button on the warning message that appears when IE blocks an outdated ActiveX control. Clicking this button lets the user run the outdated ActiveX control once. | +|Turn off blocking of outdated ActiveX controls for IE on specific domains |`Administrative Templates\Windows Components\Internet Explorer\Security Features\Add-on Management` |Internet Explorer 8 through IE11 |This setting allows you to manage a list of domains on which IE will stop blocking outdated ActiveX controls. Outdated ActiveX controls are never blocked in the Intranet Zone.

If you enable this setting, you can enter a custom list of domains for which outdated ActiveX controls won't be blocked in IE. Each domain entry must be formatted like one of the following:

  • **"domainname.TLD".** For example, if you want to include `*.contoso.com/*`, use "contoso.com".
  • **"hostname".** For example, if you want to include `https://example`, use "example".
  • **"file:///path/filename.htm"**. For example, use `file:///C:/Users/contoso/Desktop/index.htm`.

If you disable or don't configure this setting, the list is deleted and IE continues to block specific outdated ActiveX controls on all domains in the Internet Zone. | +|Turn off blocking of outdated ActiveX controls for IE |`Administrative Templates\Windows Components\Internet Explorer\Security Features\Add-on Management` |Internet Explorer 8 through IE11 |This setting determines whether IE blocks specific outdated ActiveX controls. Outdated ActiveX controls are never blocked in the Intranet Zone.

If you enable this setting, IE stops blocking outdated ActiveX controls.

If you disable or don't configure this setting, IE continues to block specific outdated ActiveX controls. | +|Remove the **Update** button in the out-of-date ActiveX control blocking notification for IE |This functionality is only available through the registry |Internet Explorer 8 through IE11 |This setting determines whether the out-of-date ActiveX control blocking notification shows the **Update** button. This button points users to update specific out-of-date ActiveX controls in IE. | + + +If you don't want to use Group Policy, you can also turn these settings on or off using the registry. You can update the registry manually. + +|Setting |Registry setting | +|-------------------------|----------------------------------------------------------------| +|Turn on ActiveX control logging in IE |`reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Ext" /v AuditModeEnabled /t REG_DWORD /d 1 /f`

Where:

  • **0 or not configured.** Logs ActiveX control information (including the source URI that loaded the control and whether it was blocked) to a local file.
  • **1.** Logs ActiveX control information.
| +|Remove **Run this time** button for outdated ActiveX controls in IE |`reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Ext" /v RunThisTimeEnabled /t REG_DWORD /d 0 /f`

Where:

  • **0.** Removes the **Run this time** button.
  • **1 or not configured.** Leaves the **Run this time** button.
| +|Turn off blocking of outdated ActiveX controls for IE on specific domains |reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Ext\Domain" /v contoso.com /t REG_SZ /f

Where:

  • **contoso.com.** A single domain on which outdated ActiveX controls won't be blocked in IE. Use a new `reg add` command for each domain you wish to add to the **Allow** list.
| +|Turn off blocking of outdated ActiveX controls for IE |`reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Ext" /v VersionCheckEnabled /t REG_DWORD /d 0 /f`

Where:

  • **0.** Stops blocking outdated ActiveX controls.
  • **1 or not configured.** Continues to block specific outdated ActiveX controls.
| +|Remove the **Update** button in the out-of-date ActiveX control blocking notification for IE |`reg add "HKCU\Software\Microsoft\Internet Explorer\VersionManager" /v UpdateEnabled /t REG_DWORD /d 0 /f`

Where:

  • **0.** Removes the **Update** button
  • **1 or not configured.** Leaves the **Update** button.
+ +## Inventory your ActiveX controls +You can inventory the ActiveX controls being used in your company, by turning on the **Turn on ActiveX control logging in IE** setting: + +- **Windows 10:** Through a comma-separated values (.csv) file or through a local Windows Management Instrumentation (WMI) class. + +- **All other versions of Microsoft Windows:** Through a .csv file only. + + +### Inventory your ActiveX controls by using a .CSV file +If you decide to inventory the ActiveX controls being used in your company by turning on the **Turn on ActiveX control logging in IE** setting, IE logs the ActiveX control information to the `%LOCALAPPDATA%\Microsoft\Internet Explorer\AuditMode\VersionAuditLog.csv` file. + +Here’s a detailed example and description of what’s included in the VersionAuditLog.csv file. + +|Source URI |File path |Product version |File version |Allowed/Blocked |Reason |EPM-compatible | +|-----------|----------|----------------|-------------|----------------|-------|---------------| +|`https://contoso.com/test1.html` |C:\Windows\System32\Macromed\Flash\Flash.ocx |14.0.0.125 |14.0.0.125 |Allowed |Not in blocklist |EPM-compatible | +|`https://contoso.com/test2.html` |C:\Program Files\Java\jre6\bin\jp2iexp.dll |6.0.410.2 |6.0.410.2 |Blocked |Out of date |Not EPM-compatible | + +**Where:** +- **Source URI.** The URL of the page that loaded the ActiveX control. + +- **File path.** The location of the binary that implements the ActiveX control. + +- **Product version.** The product version of the binary that implements the ActiveX control. + +- **File version.** The file version of the binary that implements the ActiveX control. + +- **Allowed/Blocked** Whether IE blocked the ActiveX control. + +- **Enhanced Protected Mode (EPM)-compatible.** Whether the loaded ActiveX control is compatible with [Enhanced Protected Mode](https://go.microsoft.com/fwlink/p/?LinkId=403865).

**Note**
Enhanced Protected Mode isn’t supported on Internet Explorer 9 or earlier versions of IE. Therefore, if you’re using Internet Explorer 8 or Internet Explorer 9, all ActiveX controls will always be marked as not EPM-compatible. + +- **Reason.** The ActiveX control can be blocked or allowed for any of these reasons: + +|Reason |Corresponds to |Description | +|-------------------------|---------------|-------------------------------------------------| +|Version not in blocklist |Allowed |The version of the loaded ActiveX control is explicitly allowed by the IE version list. | +|Trusted domain |Allowed |The ActiveX control was loaded on a domain listed in the **Turn off blocking of outdated ActiveX controls for IE on specific domains** setting. | +|File doesn’t exist |Allowed |The loaded ActiveX control is missing required binaries to run correctly. | +|Out-of-date |Blocked |The loaded ActiveX control is explicitly blocked by the IE version list because it is out-of-date. | +|Not in blocklist |Allowed |The loaded ActiveX control isn’t in the IE version list. | +|Managed by policy |Allowed |The loaded ActiveX control is managed by a Group Policy setting that isn’t listed here, and will be managed in accordance with that Group Policy setting. | +|Trusted Site Zone or intranet |Allowed |The ActiveX control was loaded in the Trusted Sites Zone or the Local Intranet Zone. | +|Hardblocked |Blocked |The loaded ActiveX control is blocked in IE because it contains known security vulnerabilities. | +|Unknown |Allowed or blocked |None of the above apply. | + +### Inventory your ActiveX controls by using a local WMI class +For Windows 10 you also have the option to log your inventory info to a local WMI class. Info logged to this class includes all of info you get from the .csv file, plus the CLSID of the loaded ActiveX control or the name of any apps started from an ActiveX control. + +#### Before you begin +Before you can use WMI to inventory your ActiveX controls, you need to [download the configuration package (.zip file)](https://go.microsoft.com/fwlink/p/?LinkId=616971), which includes: + +- **ConfigureWMILogging.ps1**. A Windows PowerShell script. + +- **ActiveXWMILogging.mof**. A managed object file. + +Before running the PowerShell script, you must copy both the .ps1 and .mof file to the same directory location, on the client computer. + + **To configure IE to use WMI logging** + +1. Open your Group Policy editor and turn on the `Administrative Templates\Windows Components\Internet Explorer\Turn on ActiveX control logging in IE` setting. + +2. On the client device, start PowerShell in elevated mode (using admin privileges) and run `ConfigureWMILogging.ps1` by by-passing the PowerShell execution policy, using this command: + ``` + powershell –ExecutionPolicy Bypass .\ConfigureWMILogging.ps1 + ``` + For more info, see [about_Execution_Policies](https://go.microsoft.com/fwlink/p/?linkid=517460). + +3. **Optional:** Set up your domain firewall for WMI data. For more info, see [Collect data using Enterprise Site Discovery](collect-data-using-enterprise-site-discovery.md). + +The inventory info appears in the WMI class, `IEAXControlBlockingAuditInfo`, located in the WMI namespace, *root\\cimv2\\IETelemetry*. To collect the inventory info from your client computers, we recommend using System Center 2012 R2 Configuration Manager or any agent that can access the WMI data. For more info, see [Collect data using Enterprise Site Discovery](collect-data-using-enterprise-site-discovery.md). + diff --git a/browsers/internet-explorer/ie11-deploy-guide/problems-after-installing-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/problems-after-installing-ie11.md index 7b0af11274..80a59c9305 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/problems-after-installing-ie11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/problems-after-installing-ie11.md @@ -1,73 +1,74 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: support -description: Possible solutions to the problems you might encounter after installing IE11, such as crashing or seeming slow, getting into an unusable state, or problems with adaptive streaming and DRM playback. -author: lomayor -ms.prod: ie11 -ms.assetid: c4b75ad3-9c4a-4dd2-9fed-69f776f542e6 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Problems after installing Internet Explorer 11 (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 10/16/2017 ---- - - -# Problems after installing Internet Explorer 11 -After you install Internet Explorer 11 in your organization, you might run into the following issues. By following these suggestions, you should be able to fix them. - -## Internet Explorer is in an unusable state -If IE11 gets into an unusable state on an employee's computer, you can use the **Reset Internet Explorer Settings (RIES)** feature to restore the default settings for many of the browser features, including: - -- Search scopes - -- Appearance settings - -- Toolbars - -- ActiveX® controls (resets to the opt-in state, unless they're pre-approved) - -- Branding settings created with IEAK 11 - -RIES does not: - -- Clear the Favorites list, RSS feeds, or Web slices. - -- Reset connection or proxy settings. - -- Affect the applied Administrative Template Group Policy settings. - -RIES turns off all custom toolbars, browser extensions, and customizations installed with IE11. If you change your mind, you can turn each of the customizations back on through the **Manage Add-ons** dialog box. For more information about resetting IE settings, see [How to Reset Internet Explorer Settings](https://go.microsoft.com/fwlink/p/?LinkId=214528). - -## IE is crashing or seems slow -If you notice that CPU usage is running higher than normal, or that IE is frequently crashing or slowing down, you should check your browser add-ons and video card. By default, IE11 uses graphics processing unit (GPU) rendering mode. However, some outdated video cards and video drivers don't support GPU hardware acceleration. If IE11 determines that your current video card or video driver doesn't support GPU hardware acceleration, it'll use Software Rendering mode. - - **To check your browser add-ons** - -1. Start IE11 in **No Add-ons mode** by running the **Run** command from the **Start** menu, and then typing `iexplore.exe -extoff` into the box. - -2. Check if IE still crashes.

- If the browser doesn't crash, open Internet Explorer for the desktop, click the **Tools** menu, and click **Manage Add-ons**. - -3. Click **Toolbars and Extensions**, click each toolbar or extension, clicking **Disable** to turn off all of the browser extensions and toolbars. - -4. Restart IE11. Go back to the **Manage Add-Ons** window and turn on each item, one-by-one.

- After you turn each item back on, see if IE crashes or slows down. Doing it this way will help you identify the add-on that's causing IE to crash. After you've figured out which add-on was causing the problem, turn it off until you have an update from the manufacturer. - - **To check for Software Rendering mode** - -5. Open Internet Explorer for the desktop, click the **Tools** menu, and then click **Internet Options**. - -6. On the **Advanced** tab, go to the **Accelerated graphics** section, and then turn on Software Rendering mode by choosing the **Use software rendering instead of GPU rendering** box.

- If the **Use software rendering instead of GPU rendering** option is greyed out, it means that your current video card or video driver doesn't support GPU hardware acceleration. For more information, see [Windows 10 Support](https://go.microsoft.com/fwlink/?LinkId=746588). - -## Adaptive streaming and DRM playback don’t work with Windows Server 2012 R2 -IE11 in Windows Server 2012 R2 doesn’t include media features like adaptive streaming or Digital Rights Management (DRM) playback. To add these features, you’ll need to download and install the Media Feature Pack from the [Microsoft Download Center](https://go.microsoft.com/fwlink/p/?LinkId=320789), as well as an app that uses PlayReady DRM from the Microsoft Store, such as the Xbox Music app or Xbox Video app. The app must be installed to specifically turn on DRM features, while all other media features are installed with the Media Feature Pack. - - - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: support +description: Possible solutions to the problems you might encounter after installing IE11, such as crashing or seeming slow, getting into an unusable state, or problems with adaptive streaming and DRM playback. +author: dansimp +ms.prod: ie11 +ms.assetid: c4b75ad3-9c4a-4dd2-9fed-69f776f542e6 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Problems after installing Internet Explorer 11 (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 10/16/2017 +--- + + +# Problems after installing Internet Explorer 11 +After you install Internet Explorer 11 in your organization, you might run into the following issues. By following these suggestions, you should be able to fix them. + +## Internet Explorer is in an unusable state +If IE11 gets into an unusable state on an employee's computer, you can use the **Reset Internet Explorer Settings (RIES)** feature to restore the default settings for many of the browser features, including: + +- Search scopes + +- Appearance settings + +- Toolbars + +- ActiveX® controls (resets to the opt-in state, unless they're pre-approved) + +- Branding settings created with IEAK 11 + +RIES does not: + +- Clear the Favorites list, RSS feeds, or Web slices. + +- Reset connection or proxy settings. + +- Affect the applied Administrative Template Group Policy settings. + +RIES turns off all custom toolbars, browser extensions, and customizations installed with IE11. If you change your mind, you can turn each of the customizations back on through the **Manage Add-ons** dialog box. For more information about resetting IE settings, see [How to Reset Internet Explorer Settings](https://go.microsoft.com/fwlink/p/?LinkId=214528). + +## IE is crashing or seems slow +If you notice that CPU usage is running higher than normal, or that IE is frequently crashing or slowing down, you should check your browser add-ons and video card. By default, IE11 uses graphics processing unit (GPU) rendering mode. However, some outdated video cards and video drivers don't support GPU hardware acceleration. If IE11 determines that your current video card or video driver doesn't support GPU hardware acceleration, it'll use Software Rendering mode. + + **To check your browser add-ons** + +1. Start IE11 in **No Add-ons mode** by running the **Run** command from the **Start** menu, and then typing `iexplore.exe -extoff` into the box. + +2. Check if IE still crashes.

+ If the browser doesn't crash, open Internet Explorer for the desktop, click the **Tools** menu, and click **Manage Add-ons**. + +3. Click **Toolbars and Extensions**, click each toolbar or extension, clicking **Disable** to turn off all of the browser extensions and toolbars. + +4. Restart IE11. Go back to the **Manage Add-Ons** window and turn on each item, one-by-one.

+ After you turn each item back on, see if IE crashes or slows down. Doing it this way will help you identify the add-on that's causing IE to crash. After you've figured out which add-on was causing the problem, turn it off until you have an update from the manufacturer. + + **To check for Software Rendering mode** + +5. Open Internet Explorer for the desktop, click the **Tools** menu, and then click **Internet Options**. + +6. On the **Advanced** tab, go to the **Accelerated graphics** section, and then turn on Software Rendering mode by choosing the **Use software rendering instead of GPU rendering** box.

+ If the **Use software rendering instead of GPU rendering** option is greyed out, it means that your current video card or video driver doesn't support GPU hardware acceleration. For more information, see [Windows 10 Support](https://go.microsoft.com/fwlink/?LinkId=746588). + +## Adaptive streaming and DRM playback don’t work with Windows Server 2012 R2 +IE11 in Windows Server 2012 R2 doesn’t include media features like adaptive streaming or Digital Rights Management (DRM) playback. To add these features, you’ll need to download and install the Media Feature Pack from the [Microsoft Download Center](https://go.microsoft.com/fwlink/p/?LinkId=320789), as well as an app that uses PlayReady DRM from the Microsoft Store, such as the Xbox Music app or Xbox Video app. The app must be installed to specifically turn on DRM features, while all other media features are installed with the Media Feature Pack. + + + + + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/remove-all-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md b/browsers/internet-explorer/ie11-deploy-guide/remove-all-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md index f77ef953c0..df8a2b1707 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/remove-all-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md +++ b/browsers/internet-explorer/ie11-deploy-guide/remove-all-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md @@ -1,48 +1,49 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: appcompat -description: Instructions about how to clear all of the sites from your global Enterprise Mode site list. -author: lomayor -ms.prod: ie11 -ms.assetid: 90f38a6c-e0e2-4c93-9a9e-c425eca99e97 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Remove all sites from your Enterprise Mode site list using the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Remove all sites from your Enterprise Mode site list using the Enterprise Mode Site List Manager - -**Applies to:** - -- Windows 10 -- Windows 8.1 -- Windows 7 -- Windows Server 2012 R2 -- Windows Server 2008 R2 with Service Pack 1 (SP1) - -You can clear all of the sites from your global Enterprise Mode site list. - -**Important**   -This is a permanent removal and erases everything. However, if you determine it was a mistake, and you saved an XML copy of your list, you can add the file again by following the steps in the [Add multiple sites to the Enterprise Mode site list using a file and Enterprise Mode Site List Manager (schema v.2)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md) or [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.1)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md), depending on your operating system. - - **To clear your compatibility list** - -1. On the **File** menu of the Enterprise Mode Site List Manager, click **Clear list**. - -2. Click **Yes** in the warning message.

Your sites are all cleared from your list. - -## Related topics -- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853) -- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378) -- [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) - - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: appcompat +description: Instructions about how to clear all of the sites from your global Enterprise Mode site list. +author: dansimp +ms.prod: ie11 +ms.assetid: 90f38a6c-e0e2-4c93-9a9e-c425eca99e97 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Remove all sites from your Enterprise Mode site list using the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Remove all sites from your Enterprise Mode site list using the Enterprise Mode Site List Manager + +**Applies to:** + +- Windows 10 +- Windows 8.1 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2008 R2 with Service Pack 1 (SP1) + +You can clear all of the sites from your global Enterprise Mode site list. + +**Important**   +This is a permanent removal and erases everything. However, if you determine it was a mistake, and you saved an XML copy of your list, you can add the file again by following the steps in the [Add multiple sites to the Enterprise Mode site list using a file and Enterprise Mode Site List Manager (schema v.2)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md) or [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.1)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md), depending on your operating system. + + **To clear your compatibility list** + +1. On the **File** menu of the Enterprise Mode Site List Manager, click **Clear list**. + +2. Click **Yes** in the warning message.

Your sites are all cleared from your list. + +## Related topics +- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853) +- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378) +- [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) + + + + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/remove-sites-from-a-local-compatibililty-view-list.md b/browsers/internet-explorer/ie11-deploy-guide/remove-sites-from-a-local-compatibililty-view-list.md index b682c46207..4995a12e9a 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/remove-sites-from-a-local-compatibililty-view-list.md +++ b/browsers/internet-explorer/ie11-deploy-guide/remove-sites-from-a-local-compatibililty-view-list.md @@ -1,42 +1,43 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: appcompat -description: Instructions about how to remove sites from a local compatibility view list. -author: lomayor -ms.prod: ie11 -ms.assetid: f6ecaa75-ebcb-4f8d-8721-4cd6e73c0ac9 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Remove sites from a local compatibility view list (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Remove sites from a local compatibility view list - -**Applies to:** - -- Windows 10 -- Windows 8.1 -- Windows 7 -- Windows Server 2012 R2 -- Windows Server 2008 R2 with Service Pack 1 (SP1) - -Remove websites that were added to a local compatibility view list by mistake or because they no longer have compatibility problems. - - **To remove sites from a local compatibility view list** - -1. Open Internet Explorer 11, click **Tools**, and then click **Compatibility View Settings**. - -2. Pick the site to remove, and then click **Remove**.

-Sites can only be removed one at a time. If one is removed by mistake, it can be added back using this same box and the **Add** section. - -  - -  - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: appcompat +description: Instructions about how to remove sites from a local compatibility view list. +author: dansimp +ms.prod: ie11 +ms.assetid: f6ecaa75-ebcb-4f8d-8721-4cd6e73c0ac9 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Remove sites from a local compatibility view list (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Remove sites from a local compatibility view list + +**Applies to:** + +- Windows 10 +- Windows 8.1 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2008 R2 with Service Pack 1 (SP1) + +Remove websites that were added to a local compatibility view list by mistake or because they no longer have compatibility problems. + + **To remove sites from a local compatibility view list** + +1. Open Internet Explorer 11, click **Tools**, and then click **Compatibility View Settings**. + +2. Pick the site to remove, and then click **Remove**.

+Sites can only be removed one at a time. If one is removed by mistake, it can be added back using this same box and the **Add** section. + +  + +  + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/remove-sites-from-a-local-enterprise-mode-site-list.md b/browsers/internet-explorer/ie11-deploy-guide/remove-sites-from-a-local-enterprise-mode-site-list.md index 6cfccfd925..c9b859509b 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/remove-sites-from-a-local-enterprise-mode-site-list.md +++ b/browsers/internet-explorer/ie11-deploy-guide/remove-sites-from-a-local-enterprise-mode-site-list.md @@ -1,58 +1,59 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: appcompat -description: Instructions about how to remove sites from a local Enterprise Mode site list. -author: lomayor -ms.prod: ie11 -ms.assetid: c7d6dd0b-e264-42bb-8c9d-ac2f837018d2 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Remove sites from a local Enterprise Mode site list (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Remove sites from a local Enterprise Mode site list - -**Applies to:** - -- Windows 10 -- Windows 8.1 -- Windows 7 -- Windows Server 2012 R2 -- Windows Server 2008 R2 with Service Pack 1 (SP1) - -Remove websites that were added to a local Enterprise Mode site list by mistake or because the sites no longer have compatibility problems. - -**Note**
The changes described in this topic only impact sites added to a local Enterprise Mode site list and not the list of sites deployed to all employees by an administrator. Employees can't delete sites added to the list by an administrator. - -  **To remove single sites from a local Enterprise Mode site list** - -1. Open Internet Explorer 11 and go to the site you want to remove. - -2. Click **Tools**, and then click **Enterprise Mode**.

-The checkmark disappears from next to Enterprise Mode and the site is removed from the list. - -**Note**
If the site is removed by mistake, it can be added back by clicking **Enterprise Mode** again. - - **To remove all sites from a local Enterprise Mode site list** - -1. Open IE11, click **Tools**, and then click **Internet options**. - -2. Click the **Delete** button from the **Browsing history** area. - -3. Click the box next to **Cookies and website data**, and then click **Delete**. - -**Note**
This removes all of the sites from a local Enterprise Mode site list. - -   - -  - -  - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: appcompat +description: Instructions about how to remove sites from a local Enterprise Mode site list. +author: dansimp +ms.prod: ie11 +ms.assetid: c7d6dd0b-e264-42bb-8c9d-ac2f837018d2 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Remove sites from a local Enterprise Mode site list (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Remove sites from a local Enterprise Mode site list + +**Applies to:** + +- Windows 10 +- Windows 8.1 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2008 R2 with Service Pack 1 (SP1) + +Remove websites that were added to a local Enterprise Mode site list by mistake or because the sites no longer have compatibility problems. + +**Note**
The changes described in this topic only impact sites added to a local Enterprise Mode site list and not the list of sites deployed to all employees by an administrator. Employees can't delete sites added to the list by an administrator. + +  **To remove single sites from a local Enterprise Mode site list** + +1. Open Internet Explorer 11 and go to the site you want to remove. + +2. Click **Tools**, and then click **Enterprise Mode**.

+The checkmark disappears from next to Enterprise Mode and the site is removed from the list. + +**Note**
If the site is removed by mistake, it can be added back by clicking **Enterprise Mode** again. + + **To remove all sites from a local Enterprise Mode site list** + +1. Open IE11, click **Tools**, and then click **Internet options**. + +2. Click the **Delete** button from the **Browsing history** area. + +3. Click the box next to **Cookies and website data**, and then click **Delete**. + +**Note**
This removes all of the sites from a local Enterprise Mode site list. + +   + +  + +  + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/save-your-site-list-to-xml-in-the-enterprise-mode-site-list-manager.md b/browsers/internet-explorer/ie11-deploy-guide/save-your-site-list-to-xml-in-the-enterprise-mode-site-list-manager.md index 48ead2d656..28b18117e1 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/save-your-site-list-to-xml-in-the-enterprise-mode-site-list-manager.md +++ b/browsers/internet-explorer/ie11-deploy-guide/save-your-site-list-to-xml-in-the-enterprise-mode-site-list-manager.md @@ -1,46 +1,47 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: appcompat -description: You can save your current Enterprise Mode compatibility site list as an XML file, for distribution and use by your managed systems. -author: lomayor -ms.prod: ie11 -ms.assetid: 254a986b-494f-4316-92c1-b089ee8b3e0a -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Save your site list to XML in the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Save your site list to XML in the Enterprise Mode Site List Manager - -**Applies to:** - -- Windows 10 -- Windows 8.1 -- Windows 7 -- Windows Server 2012 R2 -- Windows Server 2008 R2 with Service Pack 1 (SP1) - -You can save your current Enterprise Mode compatibility site list as an XML file, for distribution and use by your managed systems. - - **To save your list as XML** - -1. On the **File** menu of the Enterprise Mode Site List Manager, click **Save to XML**. - -2. Save the file to the location you specified in your Enterprise Mode registry key, set up when you turned on Enterprise Mode for use in your company. For information about the Enterprise Mode registry key, see [Turn on local control and logging for Enterprise Mode](turn-on-local-control-and-logging-for-enterprise-mode.md).

-The first time a user starts Internet Explorer 11 on a managed device; Internet Explorer will look for a new version of the site list at the specified location. If the browser finds an updated site list, IE downloads the new XML site list and uses it. - -## Related topics -- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853) -- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378) -- [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) -  - -  - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: appcompat +description: You can save your current Enterprise Mode compatibility site list as an XML file, for distribution and use by your managed systems. +author: dansimp +ms.prod: ie11 +ms.assetid: 254a986b-494f-4316-92c1-b089ee8b3e0a +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Save your site list to XML in the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Save your site list to XML in the Enterprise Mode Site List Manager + +**Applies to:** + +- Windows 10 +- Windows 8.1 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2008 R2 with Service Pack 1 (SP1) + +You can save your current Enterprise Mode compatibility site list as an XML file, for distribution and use by your managed systems. + + **To save your list as XML** + +1. On the **File** menu of the Enterprise Mode Site List Manager, click **Save to XML**. + +2. Save the file to the location you specified in your Enterprise Mode registry key, set up when you turned on Enterprise Mode for use in your company. For information about the Enterprise Mode registry key, see [Turn on local control and logging for Enterprise Mode](turn-on-local-control-and-logging-for-enterprise-mode.md).

+The first time a user starts Internet Explorer 11 on a managed device; Internet Explorer will look for a new version of the site list at the specified location. If the browser finds an updated site list, IE downloads the new XML site list and uses it. + +## Related topics +- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853) +- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378) +- [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) +  + +  + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/schedule-production-change-enterprise-mode-portal.md b/browsers/internet-explorer/ie11-deploy-guide/schedule-production-change-enterprise-mode-portal.md index b2a83dc360..4565b9f0c1 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/schedule-production-change-enterprise-mode-portal.md +++ b/browsers/internet-explorer/ie11-deploy-guide/schedule-production-change-enterprise-mode-portal.md @@ -1,53 +1,54 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: appcompat -description: Details about how Administrators can schedule approved change requests for production in the Enterprise Mode Site List Portal. -author: lomayor -ms.prod: ie11 -title: Schedule approved change requests for production using the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor ---- - -# Schedule approved change requests for production using the Enterprise Mode Site List Portal - -**Applies to:** - -- Windows 10 -- Windows 8.1 -- Windows 7 -- Windows Server 2012 R2 -- Windows Server 2008 R2 with Service Pack 1 (SP1) - -After a change request is approved, the original Requester can schedule the change for the production environment. The change can be immediate or set for a future time. - -**To schedule an immediate change** -1. The Requester logs onto the Enterprise Mode Site List Portal and clicks **In Progress** from the left pane. - -2. The Requester clicks the **Approved** status for the change request. - - The **Schedule changes** page appears. - -3. The Requester clicks **Now**, and then clicks **Save**. - - The update is scheduled to immediately update the production environment, and an email is sent to the Requester. After the update finishes, the Requester is asked to verify the changes. - - -**To schedule the change for a different day or time** -1. The Requester logs onto the Enterprise Mode Site List Portal and clicks **In Progress** from the left pane. - -2. The Requester clicks the **Approved** status for the change request. - - The **Schedule changes** page appears. - -3. The Requester clicks **Schedule**, sets the **Preferred day**, **Preferred start time**, and the **Preferred end time**, and then clicks **Save**. - - The update is scheduled to update the production environment on that day and time and an email is sent to the Requester. After the update finishes, the Requester will be asked to verify the changes. - - -## Next steps -After the update to the production environment completes, the Requester must again test the change. If the testing succeeds, the Requester can sign off on the change request. If the testing fails, the Requester can contact the Administrator group for more help. For the production environment testing steps, see the [Verify the change request update in the production environment using the Enterprise Mode Site List Portal](verify-changes-production-enterprise-mode-portal.md) topic. +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: appcompat +description: Details about how Administrators can schedule approved change requests for production in the Enterprise Mode Site List Portal. +author: dansimp +ms.prod: ie11 +title: Schedule approved change requests for production using the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +ms.reviewer: +audience: itprom +manager: dansimp +ms.author: dansimp +--- + +# Schedule approved change requests for production using the Enterprise Mode Site List Portal + +**Applies to:** + +- Windows 10 +- Windows 8.1 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2008 R2 with Service Pack 1 (SP1) + +After a change request is approved, the original Requester can schedule the change for the production environment. The change can be immediate or set for a future time. + +**To schedule an immediate change** +1. The Requester logs onto the Enterprise Mode Site List Portal and clicks **In Progress** from the left pane. + +2. The Requester clicks the **Approved** status for the change request. + + The **Schedule changes** page appears. + +3. The Requester clicks **Now**, and then clicks **Save**. + + The update is scheduled to immediately update the production environment, and an email is sent to the Requester. After the update finishes, the Requester is asked to verify the changes. + + +**To schedule the change for a different day or time** +1. The Requester logs onto the Enterprise Mode Site List Portal and clicks **In Progress** from the left pane. + +2. The Requester clicks the **Approved** status for the change request. + + The **Schedule changes** page appears. + +3. The Requester clicks **Schedule**, sets the **Preferred day**, **Preferred start time**, and the **Preferred end time**, and then clicks **Save**. + + The update is scheduled to update the production environment on that day and time and an email is sent to the Requester. After the update finishes, the Requester will be asked to verify the changes. + + +## Next steps +After the update to the production environment completes, the Requester must again test the change. If the testing succeeds, the Requester can sign off on the change request. If the testing fails, the Requester can contact the Administrator group for more help. For the production environment testing steps, see the [Verify the change request update in the production environment using the Enterprise Mode Site List Portal](verify-changes-production-enterprise-mode-portal.md) topic. diff --git a/browsers/internet-explorer/ie11-deploy-guide/search-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md b/browsers/internet-explorer/ie11-deploy-guide/search-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md index 985b416947..bc468576ed 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/search-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md +++ b/browsers/internet-explorer/ie11-deploy-guide/search-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md @@ -1,44 +1,45 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: appcompat -description: Search to see if a specific site already appears in your global Enterprise Mode site list. -author: lomayor -ms.prod: ie11 -ms.assetid: e399aeaf-6c3b-4cad-93c9-813df6ad47f9 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Search your Enterprise Mode site list in the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Search your Enterprise Mode site list in the Enterprise Mode Site List Manager - -**Applies to:** - -- Windows 10 -- Windows 8.1 -- Windows 7 -- Windows Server 2012 R2 -- Windows Server 2008 R2 with Service Pack 1 (SP1) - -You can search to see if a specific site already appears in your global Enterprise Mode site list so you don’t try to add it again. - - **To search your compatibility list** - -- From the Enterprise Mode Site List Manager, type part of the URL into the **Search** box.

- The search query searches all of the text. For example, entering *“micro”* will return results like, www.microsoft.com, microsoft.com, and microsoft.com/images. Wildcard characters aren’t supported. - -## Related topics -- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853) -- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378) -- [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) - - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: appcompat +description: Search to see if a specific site already appears in your global Enterprise Mode site list. +author: dansimp +ms.prod: ie11 +ms.assetid: e399aeaf-6c3b-4cad-93c9-813df6ad47f9 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Search your Enterprise Mode site list in the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Search your Enterprise Mode site list in the Enterprise Mode Site List Manager + +**Applies to:** + +- Windows 10 +- Windows 8.1 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2008 R2 with Service Pack 1 (SP1) + +You can search to see if a specific site already appears in your global Enterprise Mode site list so you don’t try to add it again. + + **To search your compatibility list** + +- From the Enterprise Mode Site List Manager, type part of the URL into the **Search** box.

+ The search query searches all of the text. For example, entering *“micro”* will return results like, www.microsoft.com, microsoft.com, and microsoft.com/images. Wildcard characters aren’t supported. + +## Related topics +- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853) +- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378) +- [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) + + + + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/set-the-default-browser-using-group-policy.md b/browsers/internet-explorer/ie11-deploy-guide/set-the-default-browser-using-group-policy.md index 829f920161..b6c1af8258 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/set-the-default-browser-using-group-policy.md +++ b/browsers/internet-explorer/ie11-deploy-guide/set-the-default-browser-using-group-policy.md @@ -1,38 +1,39 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: security -description: Use the Group Policy setting, Set a default associations configuration file, to set the default browser for your company devices running Windows 10. -author: lomayor -ms.prod: ie11 -ms.assetid: f486c9db-0dc9-4cd6-8a0b-8cb872b1d361 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Set the default browser using Group Policy (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Set the default browser using Group Policy -You can use the Group Policy setting, **Set a default associations configuration file**, to set the default browser for your company devices running Windows 10. - - **To set the default browser as Internet Explorer 11** - -1. Open your Group Policy editor and go to the **Computer Configuration\Administrative Templates\\Windows Components\\File Explorer\\Set a default associations configuration file** setting.

-Turning this setting on also requires you to create and store a default associations configuration file, locally or on a network share. For more information about creating this file, see [Export or Import Default Application Associations]( https://go.microsoft.com/fwlink/p/?LinkId=618268). - - ![set default associations group policy setting](images/setdefaultbrowsergp.png) - -2. Click **Enabled**, and then in the **Options** area, type the location to your default associations configuration file.

-If this setting is turned on and your employee's device is domain-joined, this file is processed and default associations are applied at logon. If this setting isn't configured or is turned off, or if your employee's device isn't domain-joined, no default associations are applied at logon. - -Your employees can change this setting by changing the Internet Explorer default value from the **Set Default Programs** area of the Control Panel. - -  - -  - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: security +description: Use the Group Policy setting, Set a default associations configuration file, to set the default browser for your company devices running Windows 10. +author: dansimp +ms.prod: ie11 +ms.assetid: f486c9db-0dc9-4cd6-8a0b-8cb872b1d361 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Set the default browser using Group Policy (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Set the default browser using Group Policy +You can use the Group Policy setting, **Set a default associations configuration file**, to set the default browser for your company devices running Windows 10. + + **To set the default browser as Internet Explorer 11** + +1. Open your Group Policy editor and go to the **Computer Configuration\Administrative Templates\\Windows Components\\File Explorer\\Set a default associations configuration file** setting.

+Turning this setting on also requires you to create and store a default associations configuration file, locally or on a network share. For more information about creating this file, see [Export or Import Default Application Associations]( https://go.microsoft.com/fwlink/p/?LinkId=618268). + + ![set default associations group policy setting](images/setdefaultbrowsergp.png) + +2. Click **Enabled**, and then in the **Options** area, type the location to your default associations configuration file.

+If this setting is turned on and your employee's device is domain-joined, this file is processed and default associations are applied at logon. If this setting isn't configured or is turned off, or if your employee's device isn't domain-joined, no default associations are applied at logon. + +Your employees can change this setting by changing the Internet Explorer default value from the **Set Default Programs** area of the Control Panel. + +  + +  + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/set-up-enterprise-mode-logging-and-data-collection.md b/browsers/internet-explorer/ie11-deploy-guide/set-up-enterprise-mode-logging-and-data-collection.md index ea77e11d87..fd55a40ebd 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/set-up-enterprise-mode-logging-and-data-collection.md +++ b/browsers/internet-explorer/ie11-deploy-guide/set-up-enterprise-mode-logging-and-data-collection.md @@ -1,160 +1,161 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: appcompat -description: Set up and turn on Enterprise Mode logging and data collection in your organization. -author: lomayor -ms.prod: ie11 -ms.assetid: 2e98a280-f677-422f-ba2e-f670362afcde -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Set up Enterprise Mode logging and data collection (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Set up Enterprise Mode logging and data collection - -**Applies to:** - -- Windows 10 -- Windows 8.1 -- Windows 7 -- Windows Server 2012 R2 -- Windows Server 2008 R2 with Service Pack 1 (SP1) - -Using Group Policy, you can turn on Enterprise Mode for Internet Explorer and then you can turn on local user control using the **Let users turn on and use Enterprise Mode from the Tools menu** setting, located in the `Administrative Templates\Windows Components\Internet Explorer` category path. After you turn this setting on, your users can turn on Enterprise Mode locally, from the IE **Tools** menu. - -![enterprise mode option on the tools menu](images/ie-emie-toolsmenu.png) - -The **Let users turn on and use Enterprise Mode from the Tools menu** setting also lets you decide where to send the user reports (as a URL). We recommend creating a custom HTTP port 81 to let your incoming user information go to a dedicated site. A dedicated site is important so you can quickly pick out the Enterprise Mode traffic from your other website traffic. - -![group policy to turn on enterprise mode](images/ie-emie-grouppolicy.png) - -Getting these reports lets you find out about sites that aren’t working right, so you can add them to your Enterprise Mode site list, without having to locate them all yourself. For more information about creating and using a site list, see the [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.2)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md) or the [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.1)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md) topic, based on your operating system. - -## Using ASP to collect your data -When you turn logging on, you need a valid URL that points to a server that can be listened to for updates to a user’s registry key. This means you need to set up an endpoint server for the incoming POST messages, which are sent every time the user turns Enterprise Mode on or off from the **Tools** menu. - - **To set up an endpoint server** - -1. Configure an IIS server to work with your Enterprise Mode data collection process. If you’re unsure how to set up IIS, see the [IIS installation webpage](https://go.microsoft.com/fwlink/p/?LinkId=507609). - -2. Open Internet Information Services (IIS) and turn on the ASP components from the **Add Roles and Features Wizard**, **Server Roles** page.

- This lets you create an ASP form that accepts the incoming POST messages. - -3. Open the Internet Information Services (IIS) Manager, click **Bindings**, highlight **Port 81**, click **Edit**, and then change the website information to point to Port 81 so it matches your custom-created port. - - ![IIS Manager, editing website bindings](images/ie-emie-editbindings.png) - -4. Open the **Logging** feature, pick **W3C** for the format, and click **Select Fields** to open the **W3C Logging Fields** box. - - ![IIS Manager, setting logging options](images/ie-emie-logging.png) - -5. Change the WC3 logging fields to include only the **Date**, **Client IP**, **User Name**, and **URI Query** standard fields, and then click **OK**.

- Using only these fields keeps the log file simple, giving you the date, client IP address, and the website URI information for any site changed by your users. - -6. Apply these changes to your default website and close the IIS Manager. - -7. Put your EmIE.asp file into the root of the web server, using this command: - - ``` - <% @ LANGUAGE=javascript %> - <% - Response.AppendToLog(" ;" + Request.Form("URL") + " ;" + Request.Form("EnterpriseMode")); - %> - ``` - This code logs your POST fields to your IIS log file, where you can review all of the collected data. - - -### IIS log file information -This is what your log files will look like after you set everything up and at least one of your users has turned on Enterprise Mode locally from the **Tools** menu. You can see the URL of the problematic website and client IP address of the user that turned on Enterprise Mode. - -![Enterprise Mode log file](images/ie-emie-logfile.png) - - -## Using the GitHub sample to collect your data -Microsoft has created the [EMIE-Data-Collection_Sample](https://go.microsoft.com/fwlink/p/?LinkId=507401) that shows how to collect your Enterprise Mode reports. This sample only shows how to collect data, it doesn’t show how to aggregate the data into your Enterprise Mode site list.

-This sample starts with you turning on Enterprise Mode and logging (either through Group Policy, or by manually setting the EnterpriseMode registry key) so that your users can use Enterprise Mode locally. For the steps to do this, go to [Turn on local control and logging for Enterprise Mode](turn-on-local-control-and-logging-for-enterprise-mode.md). - -**Note**
If you decide to manually change the registry key, you can change the **Enable** setting to `[deployment url]/api/records/`, which automatically sends your reports to this page. - -### Setting up, collecting, and viewing reports -For logging, you’re going to need a valid URL that points to a server that can be listened to for updates to a user’s registry key. This means you need to set up an endpoint server for the incoming POST messages, which are sent every time the user turns Enterprise Mode on or off from the **Tools** menu. These POST messages go into your database, aggregating the report data by URL, giving you the total number of reports where users turned on Enterprise Mode, the total number of reports where users turned off Enterprise Mode, and the date of the last report. - - **To set up the sample** - -1. Set up a server to collect your Enterprise Mode information from your users. - -2. Go to the Internet Explorer/[EMIE-Data_Collection_Sample](https://go.microsoft.com/fwlink/p/?LinkId=507401) page on GitHub and tap or click the **Download ZIP** button to download the complete project. - -3. Open Microsoft Visual Studio 2013 with Update 2, and then open the PhoneHomeSample.sln file. - -4. On the **Build** menu, tap or click **Build Solution**.

- The required packages are automatically downloaded and included in the solution. - - **To set up your endpoint server** - -5. Right-click on the name, PhoneHomeSample, and click **Publish**. - - ![Visual Studio, Publish menu](images/ie-emie-publishsolution.png) - -6. In the **Publish Web** wizard, pick the publishing target and options that work for your organization. - - **Important**
- Make sure you have a database associated with your publishing target. Otherwise, your reports won’t be collected and you’ll have problems deploying the website.  - - ![Visual Studio, Publish Web wizard](images/ie-emie-publishweb.png) - - After you finish the publishing process, you need to test to make sure the app deployed successfully. - - **To test, deploy, and use the app** - -7. Open a registry editor on the computer where you deployed the app, go to the `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Main\EnterpriseMode` key, and change the **Enable** string to: - - ``` "Enable"="https:///api/records/" - ``` - Where `` points to your deployment URL. - -8. After you’re sure your deployment works, you can deploy it to your users using one of the following: - - - Turn on the **Let users turn on and use Enterprise Mode from the Tools menu** Group Policy setting, putting your `` information into the **Options** box. - - - Deploy the registry key in Step 3 using System Center or other management software. - -9. Get your users to visit websites, turning Enterprise Mode on or off locally, as necessary. - - **To view the report results** - -- Go to `https:///List` to see the report results.

-If you’re already on the webpage, you’ll need to refresh the page to see the results. - - ![Enterprise Mode Result report with details](images/ie-emie-reportwdetails.png) - - -### Troubleshooting publishing errors -If you have errors while you’re publishing your project, you should try to update your packages. - - **To update your packages** - -1. From the **Tools** menu of Microsoft Visual Studio, click **NuGet Package Manager**, and click **Manage NuGet Packages for Solution**. - - ![Nuget Package Manager for package updates](images/ie-emie-packageupdate.png) - -2. Click **Updates** on the left side of the tool, and click the **Update All** button.

-You may need to do some additional package cleanup to remove older package versions. - -## Related topics -- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853) -- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378) -- [What is Enterprise Mode?](what-is-enterprise-mode.md) -- [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) -- [Turn on Enterprise Mode and use a site list](turn-on-enterprise-mode-and-use-a-site-list.md) - - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: appcompat +description: Set up and turn on Enterprise Mode logging and data collection in your organization. +author: dansimp +ms.prod: ie11 +ms.assetid: 2e98a280-f677-422f-ba2e-f670362afcde +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Set up Enterprise Mode logging and data collection (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Set up Enterprise Mode logging and data collection + +**Applies to:** + +- Windows 10 +- Windows 8.1 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2008 R2 with Service Pack 1 (SP1) + +Using Group Policy, you can turn on Enterprise Mode for Internet Explorer and then you can turn on local user control using the **Let users turn on and use Enterprise Mode from the Tools menu** setting, located in the `Administrative Templates\Windows Components\Internet Explorer` category path. After you turn this setting on, your users can turn on Enterprise Mode locally, from the IE **Tools** menu. + +![enterprise mode option on the tools menu](images/ie-emie-toolsmenu.png) + +The **Let users turn on and use Enterprise Mode from the Tools menu** setting also lets you decide where to send the user reports (as a URL). We recommend creating a custom HTTP port 81 to let your incoming user information go to a dedicated site. A dedicated site is important so you can quickly pick out the Enterprise Mode traffic from your other website traffic. + +![group policy to turn on enterprise mode](images/ie-emie-grouppolicy.png) + +Getting these reports lets you find out about sites that aren’t working right, so you can add them to your Enterprise Mode site list, without having to locate them all yourself. For more information about creating and using a site list, see the [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.2)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md) or the [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.1)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md) topic, based on your operating system. + +## Using ASP to collect your data +When you turn logging on, you need a valid URL that points to a server that can be listened to for updates to a user’s registry key. This means you need to set up an endpoint server for the incoming POST messages, which are sent every time the user turns Enterprise Mode on or off from the **Tools** menu. + + **To set up an endpoint server** + +1. Configure an IIS server to work with your Enterprise Mode data collection process. If you’re unsure how to set up IIS, see the [IIS installation webpage](https://go.microsoft.com/fwlink/p/?LinkId=507609). + +2. Open Internet Information Services (IIS) and turn on the ASP components from the **Add Roles and Features Wizard**, **Server Roles** page.

+ This lets you create an ASP form that accepts the incoming POST messages. + +3. Open the Internet Information Services (IIS) Manager, click **Bindings**, highlight **Port 81**, click **Edit**, and then change the website information to point to Port 81 so it matches your custom-created port. + + ![IIS Manager, editing website bindings](images/ie-emie-editbindings.png) + +4. Open the **Logging** feature, pick **W3C** for the format, and click **Select Fields** to open the **W3C Logging Fields** box. + + ![IIS Manager, setting logging options](images/ie-emie-logging.png) + +5. Change the WC3 logging fields to include only the **Date**, **Client IP**, **User Name**, and **URI Query** standard fields, and then click **OK**.

+ Using only these fields keeps the log file simple, giving you the date, client IP address, and the website URI information for any site changed by your users. + +6. Apply these changes to your default website and close the IIS Manager. + +7. Put your EmIE.asp file into the root of the web server, using this command: + + ``` + <% @ LANGUAGE=javascript %> + <% + Response.AppendToLog(" ;" + Request.Form("URL") + " ;" + Request.Form("EnterpriseMode")); + %> + ``` + This code logs your POST fields to your IIS log file, where you can review all of the collected data. + + +### IIS log file information +This is what your log files will look like after you set everything up and at least one of your users has turned on Enterprise Mode locally from the **Tools** menu. You can see the URL of the problematic website and client IP address of the user that turned on Enterprise Mode. + +![Enterprise Mode log file](images/ie-emie-logfile.png) + + +## Using the GitHub sample to collect your data +Microsoft has created the [EMIE-Data-Collection_Sample](https://go.microsoft.com/fwlink/p/?LinkId=507401) that shows how to collect your Enterprise Mode reports. This sample only shows how to collect data, it doesn’t show how to aggregate the data into your Enterprise Mode site list.

+This sample starts with you turning on Enterprise Mode and logging (either through Group Policy, or by manually setting the EnterpriseMode registry key) so that your users can use Enterprise Mode locally. For the steps to do this, go to [Turn on local control and logging for Enterprise Mode](turn-on-local-control-and-logging-for-enterprise-mode.md). + +**Note**
If you decide to manually change the registry key, you can change the **Enable** setting to `[deployment url]/api/records/`, which automatically sends your reports to this page. + +### Setting up, collecting, and viewing reports +For logging, you’re going to need a valid URL that points to a server that can be listened to for updates to a user’s registry key. This means you need to set up an endpoint server for the incoming POST messages, which are sent every time the user turns Enterprise Mode on or off from the **Tools** menu. These POST messages go into your database, aggregating the report data by URL, giving you the total number of reports where users turned on Enterprise Mode, the total number of reports where users turned off Enterprise Mode, and the date of the last report. + + **To set up the sample** + +1. Set up a server to collect your Enterprise Mode information from your users. + +2. Go to the Internet Explorer/[EMIE-Data_Collection_Sample](https://go.microsoft.com/fwlink/p/?LinkId=507401) page on GitHub and tap or click the **Download ZIP** button to download the complete project. + +3. Open Microsoft Visual Studio 2013 with Update 2, and then open the PhoneHomeSample.sln file. + +4. On the **Build** menu, tap or click **Build Solution**.

+ The required packages are automatically downloaded and included in the solution. + + **To set up your endpoint server** + +5. Right-click on the name, PhoneHomeSample, and click **Publish**. + + ![Visual Studio, Publish menu](images/ie-emie-publishsolution.png) + +6. In the **Publish Web** wizard, pick the publishing target and options that work for your organization. + + **Important**
+ Make sure you have a database associated with your publishing target. Otherwise, your reports won’t be collected and you’ll have problems deploying the website.  + + ![Visual Studio, Publish Web wizard](images/ie-emie-publishweb.png) + + After you finish the publishing process, you need to test to make sure the app deployed successfully. + + **To test, deploy, and use the app** + +7. Open a registry editor on the computer where you deployed the app, go to the `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Main\EnterpriseMode` key, and change the **Enable** string to: + + ``` "Enable"="https:///api/records/" + ``` + Where `` points to your deployment URL. + +8. After you’re sure your deployment works, you can deploy it to your users using one of the following: + + - Turn on the **Let users turn on and use Enterprise Mode from the Tools menu** Group Policy setting, putting your `` information into the **Options** box. + + - Deploy the registry key in Step 3 using System Center or other management software. + +9. Get your users to visit websites, turning Enterprise Mode on or off locally, as necessary. + + **To view the report results** + +- Go to `https:///List` to see the report results.

+If you’re already on the webpage, you’ll need to refresh the page to see the results. + + ![Enterprise Mode Result report with details](images/ie-emie-reportwdetails.png) + + +### Troubleshooting publishing errors +If you have errors while you’re publishing your project, you should try to update your packages. + + **To update your packages** + +1. From the **Tools** menu of Microsoft Visual Studio, click **NuGet Package Manager**, and click **Manage NuGet Packages for Solution**. + + ![Nuget Package Manager for package updates](images/ie-emie-packageupdate.png) + +2. Click **Updates** on the left side of the tool, and click the **Update All** button.

+You may need to do some additional package cleanup to remove older package versions. + +## Related topics +- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853) +- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378) +- [What is Enterprise Mode?](what-is-enterprise-mode.md) +- [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) +- [Turn on Enterprise Mode and use a site list](turn-on-enterprise-mode-and-use-a-site-list.md) + + + + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/set-up-enterprise-mode-portal.md b/browsers/internet-explorer/ie11-deploy-guide/set-up-enterprise-mode-portal.md index 469464c98f..e63d79527c 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/set-up-enterprise-mode-portal.md +++ b/browsers/internet-explorer/ie11-deploy-guide/set-up-enterprise-mode-portal.md @@ -1,227 +1,228 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: appcompat -description: Details about how to set up the Enterprise Mode Site List Portal for your organization. -author: lomayor -ms.prod: ie11 -title: Set up the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor ---- - -# Set up the Enterprise Mode Site List Portal - -**Applies to:** - -- Windows 10 -- Windows 8.1 -- Windows 7 -- Windows Server 2012 R2 -- Windows Server 2008 R2 with Service Pack 1 (SP1) - -The Enterprise Mode Site List Portal is an open-source web tool on GitHub that allows you to manage your Enterprise Mode Site List, hosted by the app, with multiple users. The portal is designed to use IIS and a SQL Server backend, leveraging Active Directory (AD) for employee management. Updates to your site list are made by submitting new change requests, which are then approved by a designated group of people, put into a pre-production environment for testing, and then deployed immediately, or scheduled for deployment later. - -Before you can begin using the Enterprise Mode Site List Portal, you must set up your environment. - -## Step 1 - Copy the deployment folder to the web server -You must download the deployment folder (**EMIEWebPortal/**), which includes all of the source code for the website, from the [Enterprise Mode Site List Portal](https://github.com/MicrosoftEdge/enterprise-mode-site-list-portal) site to your web server. - -**To download the source code** -1. Download the deployment folder from the [Enterprise Mode Site List Portal](https://github.com/MicrosoftEdge/enterprise-mode-site-list-portal) source code to your web server. - -2. Install the Node.js® package manager, [npm](https://www.npmjs.com/). - - >[!Note] - >You need to install the npm package manager to replace all the third-party libraries we removed to make the Enterprise Mode Site List Portal open-source. - -3. Open File Explorer and then open the **EMIEWebPortal/** folder. - -4. Press and hold **Shift**, right-click the window, then click **Open PowerShell window here**. - -5. Type _npm i_ into the command prompt, then press **Enter**. - - Installs the npm package manager and bulk adds all the third-party libraries back into your codebase. - -6. Go back up a directory, open the solution file **EMIEWebPortal.sln** in Visual Studio, open **Web.config** from **EMIEWebPortal/** folder, and replace MSIT-LOB-COMPAT with your server name hosting your database, replace LOBMerged with your database name, and build the entire solution. - - >[!Note] - >Step 3 of this topic provides the steps to create your database. - -7. Copy the contents of the **EMIEWebPortal/** folder to a dedicated folder on your file system. For example, _D:\EMIEWebApp_. In a later step, you'll designate this folder as your website in the IIS Manager. - -## Step 2 - Create the Application Pool and website, by using IIS -Create a new Application Pool and the website, by using the IIS Manager. - -**To create a new Application Pool** -1. In IIS Manager, expand your local computer in the **Connections** pane, right-click **Application Pools**, then click **Add Application Pool**. - - The **Add Application Pool** box appears. - -2. In the **Add Application Pool** box, enter the following info: - - - **Name.** Type the name of your new application pool. For example, _EMIEWebAppPool_. - - - **.NET CLR version.** Pick the version of .NET CLR used by your application pool from the drop-down box. It must be version 4.0 or higher. - - - **Managed pipeline mode.** Pick **Integrated** from the drop-down box. IIS uses the integrated IIS and ASP.NET request-processing pipeline for managed content. - -3. Click **OK**. - -4. Select your new application pool from the **Application Pool** pane, click **Advanced Settings** from the **Edit Application Pool** area of the **Actions** pane. - - The **Advanced Settings** box appears. - -5. Make sure your **Identity** value is **ApplicationPoolIdentity**, click **OK**, and then close the box. - -6. Open File Explorer and go to your deployment directory, created in Step 1. For example, _D:\EMIEWebApp_. - -7. Right-click on the directory, click **Properties**, and then click the **Security** tab. - -8. Add your new application pool to the list (for example, _IIS AppPool\EMIEWebAppPool_) with **Full control access**, making sure the location searches the local computer. - -9. Add **Everyone** to the list with **Read & execute access**. - -**To create the website** -1. In IIS Manager, expand your local computer in the **Connections** pane, right-click **Sites**, then click **Add Website**. - - The **Add Website** box appears. - -2. In the **Add Website** box, type the name of your website into the **Site name** box. For example, _EMIEWebApp_, and then click **Select**. - - The **Select Application Pool** box appears. - -4. Pick the name of the application pool created earlier in this step, and then click **OK**. For example, _EMIEWebAppPool_. - -5. In the **Physical path** box, browse to your folder that contains your deployment directory. For example, _D:\EMIEWebApp_. - -6. Set up your **Binding**, including your **Binding Type**, **IP address**, and **Port**, as appropriate for your organization. - -7. Clear the **Start Website immediately** check box, and then click **OK**. - -8. In IIS Manager, expand your local computer, and then double-click your new website. For example, _EMIEWebApp_. - - The **<website_name> Home** pane appears. - -9. Double-click the **Authentication** icon, right-click on **Windows Authentication**, and then click **Enable**. - - >[!Note] - >You must also make sure that **Anonymous Authentication** is marked as **Enabled**. - -## Step 3 - Create and prep your database -Create a SQL Server database and run our custom query to create the Enterprise Mode Site List tables. - -**To create and prep your database** -1. Start SQL Server Management Studio. - -2. Open **Object Explorer** and then connect to an instance of the SQL Server Database Engine. - -3. Expand the instance, right-click on **Databases**, and then click **New Database**. - -4. Type a database name. For example, _EMIEDatabase_. - -5. Leave all default values for the database files, and then click **OK**. - -6. Open the **DatabaseScripts/Create DB Tables/1_CreateEMIETables.sql** query file, located in the deployment directory. - -7. Replace the database name placeholder with the database name you created earlier. For example, _EMIEDatabase_. - -8. Run the query. - -## Step 4 - Map your Application Pool to a SQL Server role -Map your ApplicationPoolIdentity to your database, adding the db_owner role. - -**To map your ApplicationPoolIdentity to a SQL Server role** -1. Start SQL Server Management Studio and connect to your database. - -2. Expand the database instance and then open the server-level **Security** folder. - - > [!IMPORTANT] - > Make sure you open the **Security** folder at the server level and not for the database. - -3. Right-click **Logins**, and then click **New Login**. - - The **Login-New** dialog box appears. - -4. Type the following into the **Login name** box, based on your server instance type: - - - **Local SQL Server instance.** If you have a local SQL Server instance, where IIS and SQL Server are on the same server, type the name of your Application Pool. For example, _IIS AppPool\EMIEWebAppPool_. - - - **Remote SQL Server instance.** If you have a remote SQL Server instance, where IIS and SQL Server are on different servers, type `Domain\ServerName$`. - - > [!IMPORTANT] - > Don't click **Search** in the **Login name** box. Login name searches will resolve to a ServerName\AppPool Name account and SQL Server Management Studio won't be able to resolve the account's virtual Security ID (SID). - -5. Click **User Mapping** from the **Select a page** pane, click the checkbox for your database (for example, _EMIEDatabase_) from the **Users mapped to this login** pane, and then click **db_owner** from the list of available roles in the **Database role membership** pane. - -6. Click **OK**. - -## Step 5 - Restart the Application Pool and website -Using the IIS Manager, you must restart both your Application Pool and your website. - -**To restart your Application Pool and website** -1. In IIS Manager, expand your local computer in the **Connections** pane, select your website, then click **Restart** from the **Manage Website** pane. - -2. In the **Connections** pane, select your Application Pool, and then click **Recycle** from the **Application Pool Tasks** pane. - -## Step 6 - Registering as an administrator -After you've created your database and website, you'll need to register yourself (or another employee) as an administrator for the Enterprise Mode Site List Portal. - -**To register as an administrator** -1. Open Microsoft Edge and type your website URL into the Address bar. For example, https://emieportal:8085. - -2. Click **Register now**. - -3. Type your name or alias into the **Email** box, making sure it matches the info in the drop-down box. - -4. Click **Administrator** from the **Role** box, and then click **Save**. - -5. Append your website URL with `/#/EMIEAdminConsole` in the Address bar to go to your administrator console. For example, https://emieportal:8085/#/EMIEAdminConsole. - - A dialog box appears, prompting you for the system user name and password. The default user name is EMIEAdmin and the default password is Admin123. We strongly recommend that you change the password by using the **Change password** link as soon as you're done with your first visit. - -6. Select your name from the available list, and then click **Activate**. - -7. Go to the Enterprise Mode Site List Portal Home page and sign in. - -## Step 7 - Configure the SMTP server and port for email notification -After you've set up the portal, you need to configure your SMTP server and port for email notifications from the system. - -**To set up your SMTP server and port for emails** -1. Open Visual Studio, and then open the web.config file from your deployment directory. - -2. Update the SMTP server and port info with your info, using this format: - - ``` - - - ``` -3. Open the **Settings** page in the Enterprise Mode Site List Portal, and then update the email account and password info. - -## Step 8 - Register the scheduler service -Register the EMIEScheduler tool and service for production site list changes. - -**To register the scheduler service** - -1. Open File Explorer and go to EMIEWebPortal.SchedulerService\EMIEWebPortal.SchedulerService in your deployment directory, and then copy the **App_Data**, **bin**, and **Logs** folders to a separate folder. For example, C:\EMIEService\. - - >[!Important] - >If you can't find the **bin** and **Logs** folders, you probably haven't built the Visual Studio solution. Building the solution creates the folders and files. - -2. In Visual Studio start the Developer Command Prompt as an administrator, and then change the directory to the location of the InstallUtil.exe file. For example, _C:\Windows\Microsoft.NET\Framework\v4.0.30319_. - -3. Run the command, `InstallUtil ""`. For example, _InstallUtil "C:\EMIEService\bin\Debug\EMIEWebPortal.SchedulerService.exe"._ - - You'll be asked for your user name and password for the service. - -4. Open the **Run** command, type `Services.msc`, and then start the EMIEScheduler service. - -## Related topics -- [Enterprise Mode Site List Portal source code](https://github.com/MicrosoftEdge/enterprise-mode-site-list-portal) - -- [Enterprise Mode and the Enterprise Mode Site List](what-is-enterprise-mode.md) - -- [Use the Enterprise Mode Site List Manager tool or page](use-the-enterprise-mode-site-list-manager.md) +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: appcompat +description: Details about how to set up the Enterprise Mode Site List Portal for your organization. +author: dansimp +ms.prod: ie11 +title: Set up the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +--- + +# Set up the Enterprise Mode Site List Portal + +**Applies to:** + +- Windows 10 +- Windows 8.1 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2008 R2 with Service Pack 1 (SP1) + +The Enterprise Mode Site List Portal is an open-source web tool on GitHub that allows you to manage your Enterprise Mode Site List, hosted by the app, with multiple users. The portal is designed to use IIS and a SQL Server backend, leveraging Active Directory (AD) for employee management. Updates to your site list are made by submitting new change requests, which are then approved by a designated group of people, put into a pre-production environment for testing, and then deployed immediately, or scheduled for deployment later. + +Before you can begin using the Enterprise Mode Site List Portal, you must set up your environment. + +## Step 1 - Copy the deployment folder to the web server +You must download the deployment folder (**EMIEWebPortal/**), which includes all of the source code for the website, from the [Enterprise Mode Site List Portal](https://github.com/MicrosoftEdge/enterprise-mode-site-list-portal) site to your web server. + +**To download the source code** +1. Download the deployment folder from the [Enterprise Mode Site List Portal](https://github.com/MicrosoftEdge/enterprise-mode-site-list-portal) source code to your web server. + +2. Install the Node.js® package manager, [npm](https://www.npmjs.com/). + + >[!Note] + >You need to install the npm package manager to replace all the third-party libraries we removed to make the Enterprise Mode Site List Portal open-source. + +3. Open File Explorer and then open the **EMIEWebPortal/** folder. + +4. Press and hold **Shift**, right-click the window, then click **Open PowerShell window here**. + +5. Type _npm i_ into the command prompt, then press **Enter**. + + Installs the npm package manager and bulk adds all the third-party libraries back into your codebase. + +6. Go back up a directory, open the solution file **EMIEWebPortal.sln** in Visual Studio, open **Web.config** from **EMIEWebPortal/** folder, and replace MSIT-LOB-COMPAT with your server name hosting your database, replace LOBMerged with your database name, and build the entire solution. + + >[!Note] + >Step 3 of this topic provides the steps to create your database. + +7. Copy the contents of the **EMIEWebPortal/** folder to a dedicated folder on your file system. For example, _D:\EMIEWebApp_. In a later step, you'll designate this folder as your website in the IIS Manager. + +## Step 2 - Create the Application Pool and website, by using IIS +Create a new Application Pool and the website, by using the IIS Manager. + +**To create a new Application Pool** +1. In IIS Manager, expand your local computer in the **Connections** pane, right-click **Application Pools**, then click **Add Application Pool**. + + The **Add Application Pool** box appears. + +2. In the **Add Application Pool** box, enter the following info: + + - **Name.** Type the name of your new application pool. For example, _EMIEWebAppPool_. + + - **.NET CLR version.** Pick the version of .NET CLR used by your application pool from the drop-down box. It must be version 4.0 or higher. + + - **Managed pipeline mode.** Pick **Integrated** from the drop-down box. IIS uses the integrated IIS and ASP.NET request-processing pipeline for managed content. + +3. Click **OK**. + +4. Select your new application pool from the **Application Pool** pane, click **Advanced Settings** from the **Edit Application Pool** area of the **Actions** pane. + + The **Advanced Settings** box appears. + +5. Make sure your **Identity** value is **ApplicationPoolIdentity**, click **OK**, and then close the box. + +6. Open File Explorer and go to your deployment directory, created in Step 1. For example, _D:\EMIEWebApp_. + +7. Right-click on the directory, click **Properties**, and then click the **Security** tab. + +8. Add your new application pool to the list (for example, _IIS AppPool\EMIEWebAppPool_) with **Full control access**, making sure the location searches the local computer. + +9. Add **Everyone** to the list with **Read & execute access**. + +**To create the website** +1. In IIS Manager, expand your local computer in the **Connections** pane, right-click **Sites**, then click **Add Website**. + + The **Add Website** box appears. + +2. In the **Add Website** box, type the name of your website into the **Site name** box. For example, _EMIEWebApp_, and then click **Select**. + + The **Select Application Pool** box appears. + +4. Pick the name of the application pool created earlier in this step, and then click **OK**. For example, _EMIEWebAppPool_. + +5. In the **Physical path** box, browse to your folder that contains your deployment directory. For example, _D:\EMIEWebApp_. + +6. Set up your **Binding**, including your **Binding Type**, **IP address**, and **Port**, as appropriate for your organization. + +7. Clear the **Start Website immediately** check box, and then click **OK**. + +8. In IIS Manager, expand your local computer, and then double-click your new website. For example, _EMIEWebApp_. + + The **<website_name> Home** pane appears. + +9. Double-click the **Authentication** icon, right-click on **Windows Authentication**, and then click **Enable**. + + >[!Note] + >You must also make sure that **Anonymous Authentication** is marked as **Enabled**. + +## Step 3 - Create and prep your database +Create a SQL Server database and run our custom query to create the Enterprise Mode Site List tables. + +**To create and prep your database** +1. Start SQL Server Management Studio. + +2. Open **Object Explorer** and then connect to an instance of the SQL Server Database Engine. + +3. Expand the instance, right-click on **Databases**, and then click **New Database**. + +4. Type a database name. For example, _EMIEDatabase_. + +5. Leave all default values for the database files, and then click **OK**. + +6. Open the **DatabaseScripts/Create DB Tables/1_CreateEMIETables.sql** query file, located in the deployment directory. + +7. Replace the database name placeholder with the database name you created earlier. For example, _EMIEDatabase_. + +8. Run the query. + +## Step 4 - Map your Application Pool to a SQL Server role +Map your ApplicationPoolIdentity to your database, adding the db_owner role. + +**To map your ApplicationPoolIdentity to a SQL Server role** +1. Start SQL Server Management Studio and connect to your database. + +2. Expand the database instance and then open the server-level **Security** folder. + + > [!IMPORTANT] + > Make sure you open the **Security** folder at the server level and not for the database. + +3. Right-click **Logins**, and then click **New Login**. + + The **Login-New** dialog box appears. + +4. Type the following into the **Login name** box, based on your server instance type: + + - **Local SQL Server instance.** If you have a local SQL Server instance, where IIS and SQL Server are on the same server, type the name of your Application Pool. For example, _IIS AppPool\EMIEWebAppPool_. + + - **Remote SQL Server instance.** If you have a remote SQL Server instance, where IIS and SQL Server are on different servers, type `Domain\ServerName$`. + + > [!IMPORTANT] + > Don't click **Search** in the **Login name** box. Login name searches will resolve to a ServerName\AppPool Name account and SQL Server Management Studio won't be able to resolve the account's virtual Security ID (SID). + +5. Click **User Mapping** from the **Select a page** pane, click the checkbox for your database (for example, _EMIEDatabase_) from the **Users mapped to this login** pane, and then click **db_owner** from the list of available roles in the **Database role membership** pane. + +6. Click **OK**. + +## Step 5 - Restart the Application Pool and website +Using the IIS Manager, you must restart both your Application Pool and your website. + +**To restart your Application Pool and website** +1. In IIS Manager, expand your local computer in the **Connections** pane, select your website, then click **Restart** from the **Manage Website** pane. + +2. In the **Connections** pane, select your Application Pool, and then click **Recycle** from the **Application Pool Tasks** pane. + +## Step 6 - Registering as an administrator +After you've created your database and website, you'll need to register yourself (or another employee) as an administrator for the Enterprise Mode Site List Portal. + +**To register as an administrator** +1. Open Microsoft Edge and type your website URL into the Address bar. For example, https://emieportal:8085. + +2. Click **Register now**. + +3. Type your name or alias into the **Email** box, making sure it matches the info in the drop-down box. + +4. Click **Administrator** from the **Role** box, and then click **Save**. + +5. Append your website URL with `/#/EMIEAdminConsole` in the Address bar to go to your administrator console. For example, https://emieportal:8085/#/EMIEAdminConsole. + + A dialog box appears, prompting you for the system user name and password. The default user name is EMIEAdmin and the default password is Admin123. We strongly recommend that you change the password by using the **Change password** link as soon as you're done with your first visit. + +6. Select your name from the available list, and then click **Activate**. + +7. Go to the Enterprise Mode Site List Portal Home page and sign in. + +## Step 7 - Configure the SMTP server and port for email notification +After you've set up the portal, you need to configure your SMTP server and port for email notifications from the system. + +**To set up your SMTP server and port for emails** +1. Open Visual Studio, and then open the web.config file from your deployment directory. + +2. Update the SMTP server and port info with your info, using this format: + + ``` + + + ``` +3. Open the **Settings** page in the Enterprise Mode Site List Portal, and then update the email account and password info. + +## Step 8 - Register the scheduler service +Register the EMIEScheduler tool and service for production site list changes. + +**To register the scheduler service** + +1. Open File Explorer and go to EMIEWebPortal.SchedulerService\EMIEWebPortal.SchedulerService in your deployment directory, and then copy the **App_Data**, **bin**, and **Logs** folders to a separate folder. For example, C:\EMIEService\. + + >[!Important] + >If you can't find the **bin** and **Logs** folders, you probably haven't built the Visual Studio solution. Building the solution creates the folders and files. + +2. In Visual Studio start the Developer Command Prompt as an administrator, and then change the directory to the location of the InstallUtil.exe file. For example, _C:\Windows\Microsoft.NET\Framework\v4.0.30319_. + +3. Run the command, `InstallUtil ""`. For example, _InstallUtil "C:\EMIEService\bin\Debug\EMIEWebPortal.SchedulerService.exe"._ + + You'll be asked for your user name and password for the service. + +4. Open the **Run** command, type `Services.msc`, and then start the EMIEScheduler service. + +## Related topics +- [Enterprise Mode Site List Portal source code](https://github.com/MicrosoftEdge/enterprise-mode-site-list-portal) + +- [Enterprise Mode and the Enterprise Mode Site List](what-is-enterprise-mode.md) + +- [Use the Enterprise Mode Site List Manager tool or page](use-the-enterprise-mode-site-list-manager.md) diff --git a/browsers/internet-explorer/ie11-deploy-guide/setup-problems-with-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/setup-problems-with-ie11.md index 2e0ad0a745..7dd3e837c0 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/setup-problems-with-ie11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/setup-problems-with-ie11.md @@ -1,66 +1,67 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: support -ms.pagetype: appcompat -description: Reviewing log files to learn more about potential setup problems with Internet Explorer 11. -author: lomayor -ms.prod: ie11 -ms.assetid: 2cd79988-17d1-4317-bee9-b3ae2dd110a0 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Setup problems with Internet Explorer 11 (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Setup problems with Internet Explorer 11 -Installing Internet Explorer creates the following log files, which are stored in the Windows installation folder (typically, the C:\\Windows folder): - -- `IE11_main.log` - -- `IE11_NR_Setup.log` - -- `IE11_uninst.log` - -- `cbs*.log` - -- `WU_ IE11_LangPacks.log` - -These log files continuously record the entire process from the moment the IE setup program starts running until the last .cab file is downloaded, including error codes. The possible error codes are: - -|Error code |Description | -|-----------|-------------------------------------------| -|0 |Success | -|1460 |Timeout | -|3010 |Success, reboot required | -|40001 |USER_ERROR_CANNOT_OPEN_LOG_FILE | -|40003 |USER_ERROR_CANNOT_INITIALIZE_APPLICATION | -|40004 |USER_ERROR_OLD_OS_VERSION | -|40005 |USER_ERROR_WRONG_PLATFORM | -|40006 |USER_ERROR_BAD_SPVERSION | -|40007 |USER_ERROR_MISSING_REQUIRED_PREREQUISITE | -|40008 |USER_ERROR_IE_GREATERVERSION_INSTALLED | -|40010 |USER_ERROR_BAD_LANGUAGE | -|40012 |USER_ERROR_CRYPTO_VALIDATION_FAILED | -|40013 |USER_ERROR_ALREADY_INSTALLED | -|40015 |USER_ERROR_WRONG_OS | -|40016 |USER_ERROR_EXTRACTION_FAILED | -|40019 |USER_ERROR_WINDOWS_PRERELEASE_NOT_SUPPORTED | -|40021 |USER_ERROR_UNSUPPORTED_VIDEO_HARDWARE | -|40022 |USER_ERROR_UNSUPPORTED_VIDEO_DRIVER | -|40023 |USER_ERROR_PREREQUISITE_INSTALL_FAILED | -|40024 |USER_ERROR_NEUTRAL_CAB_DOWNLOAD_FAILED | -|40025 |USER_ERROR_NEUTRAL_CAB_INSTALL_FAILED | -|41001 |USER_ERROR_UNKNOWN | -|50005 |USER_SUCCESS_USER_CANCELLED | - -  - -  - -  - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: support +ms.pagetype: appcompat +description: Reviewing log files to learn more about potential setup problems with Internet Explorer 11. +author: dansimp +ms.prod: ie11 +ms.assetid: 2cd79988-17d1-4317-bee9-b3ae2dd110a0 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Setup problems with Internet Explorer 11 (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Setup problems with Internet Explorer 11 +Installing Internet Explorer creates the following log files, which are stored in the Windows installation folder (typically, the C:\\Windows folder): + +- `IE11_main.log` + +- `IE11_NR_Setup.log` + +- `IE11_uninst.log` + +- `cbs*.log` + +- `WU_ IE11_LangPacks.log` + +These log files continuously record the entire process from the moment the IE setup program starts running until the last .cab file is downloaded, including error codes. The possible error codes are: + +|Error code |Description | +|-----------|-------------------------------------------| +|0 |Success | +|1460 |Timeout | +|3010 |Success, reboot required | +|40001 |USER_ERROR_CANNOT_OPEN_LOG_FILE | +|40003 |USER_ERROR_CANNOT_INITIALIZE_APPLICATION | +|40004 |USER_ERROR_OLD_OS_VERSION | +|40005 |USER_ERROR_WRONG_PLATFORM | +|40006 |USER_ERROR_BAD_SPVERSION | +|40007 |USER_ERROR_MISSING_REQUIRED_PREREQUISITE | +|40008 |USER_ERROR_IE_GREATERVERSION_INSTALLED | +|40010 |USER_ERROR_BAD_LANGUAGE | +|40012 |USER_ERROR_CRYPTO_VALIDATION_FAILED | +|40013 |USER_ERROR_ALREADY_INSTALLED | +|40015 |USER_ERROR_WRONG_OS | +|40016 |USER_ERROR_EXTRACTION_FAILED | +|40019 |USER_ERROR_WINDOWS_PRERELEASE_NOT_SUPPORTED | +|40021 |USER_ERROR_UNSUPPORTED_VIDEO_HARDWARE | +|40022 |USER_ERROR_UNSUPPORTED_VIDEO_DRIVER | +|40023 |USER_ERROR_PREREQUISITE_INSTALL_FAILED | +|40024 |USER_ERROR_NEUTRAL_CAB_DOWNLOAD_FAILED | +|40025 |USER_ERROR_NEUTRAL_CAB_INSTALL_FAILED | +|41001 |USER_ERROR_UNKNOWN | +|50005 |USER_SUCCESS_USER_CANCELLED | + +  + +  + +  + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/system-requirements-and-language-support-for-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/system-requirements-and-language-support-for-ie11.md index 66bf4edda5..a8953ad3f4 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/system-requirements-and-language-support-for-ie11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/system-requirements-and-language-support-for-ie11.md @@ -1,61 +1,62 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: Lists the minimum system requirements and supported languages for Internet Explorer 11. -author: lomayor -ms.prod: ie11 -ms.assetid: 27185e3d-c486-4e4a-9c51-5cb317c0006d -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: System requirements and language support for Internet Explorer 11 (IE11) (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# System requirements and language support for Internet Explorer 11 (IE11) - -**Applies to:** - -- Windows 10 -- Windows 8.1 Update -- Windows 7 with Service Pack 1 (SP1) -- Windows Server 2012 R2 -- Windows Server 2008 R2 with Service Pack 1 (SP1) - -Internet Explorer 11 is available for a number of systems and languages. This topic provides info about the minimum system requirements and language support. - -## Minimum system requirements for IE11 -IE11 is pre-installed on Windows 8.1, Windows 10, and Windows Server 2012 R2 and is listed here for reference. For more info about IE11 on Windows 10, see [Browser: Microsoft Edge and Internet Explorer 11](https://technet.microsoft.com/library/mt156988.aspx). - -**Important**
  -IE11 isn't supported on Windows 8 or Windows Server 2012. - -Some of the components in this table might also need additional system resources. Check the component's documentation for more information. - - -| Item | Minimum requirements | -|--------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| -| Computer/processor | 1 gigahertz (GHz) 32-bit (x86) or 64-bit (x64) | -| Operating system |

  • Windows 10 (32-bit or 64-bit)
  • Windows 8.1 Update (32-bit or 64-bit)
  • Windows 7 with SP1 (32-bit or 64-bit)
  • Windows Server 2012 R2
  • Windows Server 2008 R2 with SP1 (64-bit only)
| -| Memory |
  • Windows 10 (32-bit)-1 GB
  • Windows 10 (64-bit)-2 GB
  • Windows 8.1 Update (32-bit)-1 GB
  • Windows 8.1 Update (64-bit)-2 GB
  • Windows 7 with SP1 (32-bit or 64-bit)-512 MB
  • Windows Server 2012 R2-512 MB
  • Windows Server 2008 R2 with SP1 (64-bit only)-512 MB
| -| Hard drive space |
  • Windows 10 (32-bit)-16 GB
  • Windows 10 (64-bit)-20 GB
  • Windows 8.1 Update (32-bit)-16 GB
  • Windows 8.1 Update (64-bit)-20 GB
  • Windows 7 with SP1 (32-bit)-70 MB
  • Windows 7 with SP1 (64-bit)-120 MB
  • Windows Server 2012 R2-32 GB
  • Windows Server 2008 R2 with SP1 (64-bit only)-200 MB
    • | -| Drive | CD-ROM drive (if installing from a CD-ROM) | -| Display | Super VGA (800 x 600) or higher-resolution monitor with 256 colors | -| Peripherals | Internet connection and a compatible pointing device | - -## Support for .NET Framework -You might experience start up issues where IE11 fails to launch an application that uses managed browser hosting controls with your legacy apps. This is because, starting with Internet Explorer 10, the browser started blocking legacy apps from using the .NET Framework 1.1 and 2.0. To fix this problem, see [.NET Framework problems with Internet Explorer 11](net-framework-problems-with-ie11.md). - -## Support for multiple languages -IE11 is available in 108 languages for Windows 8.1 and Windows 10 and in 97 languages for Windows 7 with SP1. For the list of languages and download links, see [Available language packs based on operating system](https://go.microsoft.com/fwlink/p/?LinkId=281818). - -Computers running localized versions of Windows should run the same version of IE11. For example, if your employees use the Spanish edition of Windows, you should deploy the Spanish version of IE11. On the other hand, if your employees use multiple localized versions of Windows, like Spanish, French, and Catalan, you should install IE11 in one of the languages, and then install language packs for the others. - - - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: Lists the minimum system requirements and supported languages for Internet Explorer 11. +author: dansimp +ms.prod: ie11 +ms.assetid: 27185e3d-c486-4e4a-9c51-5cb317c0006d +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: System requirements and language support for Internet Explorer 11 (IE11) (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# System requirements and language support for Internet Explorer 11 (IE11) + +**Applies to:** + +- Windows 10 +- Windows 8.1 Update +- Windows 7 with Service Pack 1 (SP1) +- Windows Server 2012 R2 +- Windows Server 2008 R2 with Service Pack 1 (SP1) + +Internet Explorer 11 is available for a number of systems and languages. This topic provides info about the minimum system requirements and language support. + +## Minimum system requirements for IE11 +IE11 is pre-installed on Windows 8.1, Windows 10, and Windows Server 2012 R2 and is listed here for reference. For more info about IE11 on Windows 10, see [Browser: Microsoft Edge and Internet Explorer 11](https://technet.microsoft.com/library/mt156988.aspx). + +**Important**
        +IE11 isn't supported on Windows 8 or Windows Server 2012. + +Some of the components in this table might also need additional system resources. Check the component's documentation for more information. + + +| Item | Minimum requirements | +|--------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| +| Computer/processor | 1 gigahertz (GHz) 32-bit (x86) or 64-bit (x64) | +| Operating system |
      • Windows 10 (32-bit or 64-bit)
      • Windows 8.1 Update (32-bit or 64-bit)
      • Windows 7 with SP1 (32-bit or 64-bit)
      • Windows Server 2012 R2
      • Windows Server 2008 R2 with SP1 (64-bit only)
      | +| Memory |
      • Windows 10 (32-bit)-1 GB
      • Windows 10 (64-bit)-2 GB
      • Windows 8.1 Update (32-bit)-1 GB
      • Windows 8.1 Update (64-bit)-2 GB
      • Windows 7 with SP1 (32-bit or 64-bit)-512 MB
      • Windows Server 2012 R2-512 MB
      • Windows Server 2008 R2 with SP1 (64-bit only)-512 MB
      | +| Hard drive space |
      • Windows 10 (32-bit)-16 GB
      • Windows 10 (64-bit)-20 GB
      • Windows 8.1 Update (32-bit)-16 GB
      • Windows 8.1 Update (64-bit)-20 GB
      • Windows 7 with SP1 (32-bit)-70 MB
      • Windows 7 with SP1 (64-bit)-120 MB
      • Windows Server 2012 R2-32 GB
      • Windows Server 2008 R2 with SP1 (64-bit only)-200 MB
        • | +| Drive | CD-ROM drive (if installing from a CD-ROM) | +| Display | Super VGA (800 x 600) or higher-resolution monitor with 256 colors | +| Peripherals | Internet connection and a compatible pointing device | + +## Support for .NET Framework +You might experience start up issues where IE11 fails to launch an application that uses managed browser hosting controls with your legacy apps. This is because, starting with Internet Explorer 10, the browser started blocking legacy apps from using the .NET Framework 1.1 and 2.0. To fix this problem, see [.NET Framework problems with Internet Explorer 11](net-framework-problems-with-ie11.md). + +## Support for multiple languages +IE11 is available in 108 languages for Windows 8.1 and Windows 10 and in 97 languages for Windows 7 with SP1. For the list of languages and download links, see [Available language packs based on operating system](https://go.microsoft.com/fwlink/p/?LinkId=281818). + +Computers running localized versions of Windows should run the same version of IE11. For example, if your employees use the Spanish edition of Windows, you should deploy the Spanish version of IE11. On the other hand, if your employees use multiple localized versions of Windows, like Spanish, French, and Catalan, you should install IE11 in one of the languages, and then install language packs for the others. + + + + + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/tips-and-tricks-to-manage-ie-compatibility.md b/browsers/internet-explorer/ie11-deploy-guide/tips-and-tricks-to-manage-ie-compatibility.md index a4ca6348ac..c5a68132d8 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/tips-and-tricks-to-manage-ie-compatibility.md +++ b/browsers/internet-explorer/ie11-deploy-guide/tips-and-tricks-to-manage-ie-compatibility.md @@ -1,135 +1,136 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: appcompat -description: Find out how to achieve better backward compatibility for your legacy web applications with the Enterprise Mode Site List. -author: lomayor -ms.author: lomayor -ms.prod: ie11 -ms.assetid: -ms.reviewer: -audience: itpro manager: dansimp -title: Tips and tricks to manage Internet Explorer compatibility -ms.sitesec: library -ms.date: 05/10/2018 ---- - -# Tips and tricks to manage Internet Explorer compatibility - -Find out how to achieve better backward compatibility for your legacy web applications with the Enterprise Mode Site List. - -Jump to: -- [Tips for IT professionals](#tips-for-it-professionals) -- [Tips for web developers](#tips-for-web-developers) - -[Enterprise Mode for Internet Explorer 11](enterprise-mode-overview-for-ie11.md) can be very effective in providing backward compatibility for older web apps. The Enterprise Mode Site List includes the ability to put any web app in any document mode, include IE8 and IE7 Enterprise Modes, without changing a single line of code on the website. - -![Internet Explorer Enterprise Modes and document modes](images/img-enterprise-mode-site-list-xml.jpg) - -Sites in the \ section can be rendered in any document mode, as shown in blue above. Some sites designed for older versions of Internet Explorer may require better backward compatibility, and these can leverage the \ section of the Enterprise Mode Site List. IE8 Enterprise Mode provides higher-fidelity emulation for Internet Explorer 8 by using, among other improvements, the original Internet Explorer 8 user agent string. IE7 Enterprise Mode further improves emulation by adding Compatibility View. - -Compatibility View, first introduced with Internet Explorer 8, is basically a switch. If a webpage has no DOCTYPE, that page will be rendered in Internet Explorer 5 mode. If there is a DOCTYPE, the page will be rendered in Internet Explorer 7 mode. You can effectively get Compatibility View by specifying Internet Explorer 7 in the \ section, as this falls back to Internet Explorer 5 automatically if there's no DOCTYPE, or you can use IE7 Enterprise Mode for even better emulation. - -## Tips for IT professionals - -### Inventory your sites - -Upgrading to a new browser can be a time-consuming and potentially costly venture. To help reduce these costs, you can download the [Enterprise Site Discovery Toolkit](https://www.microsoft.com/download/details.aspx?id=44570), which can help you prioritize which sites you should be testing based on their usage in your enterprise. For example, if the data shows that no one is visiting a particular legacy web app, you may not need to test or fix it. The toolkit is supported on Internet Explorer 8, Internet Explorer 9, Internet Explorer 10, and Internet Explorer 11. The toolkit also gives you information about which document mode a page runs in your current browser so you can better understand how to fix that site if it breaks in a newer version of the browser. - -Once you know which sites to test and fix, the following remediation methods may help fix your compatibility issues in Internet Explorer 11 and Windows 10. - -### If you're on Internet Explorer 8 and upgrading to Internet Explorer 11: - -Use the Enterprise Mode Site List to add sites to the Internet Explorer 5, Internet Explorer 7, and Internet Explorer 8 documents modes, as well as IE8 Enterprise Mode and IE7 Enterprise Mode. - -- Sites with the *x-ua-compatible* meta tag or HTTP header set to "IE=edge" may break in Internet Explorer 11 and need to be set to Internet Explorer 8 mode. This is because "edge" in Internet Explorer 8 meant Internet Explorer 8 mode, but "edge" in Internet Explorer 11 means Internet Explorer 11 mode. - -- Sites without a DOCTYPE in zones other than Intranet will default to QME (or "interoperable quirks") rather than Internet Explorer 5 Quirks and may need to be set to Internet Explorer 5 mode. - -- Some sites may need to be added to both Enterprise Mode and Compatibility View to work. You can do this by adding the site to IE7 Enterprise Mode. - -### If you're on Internet Explorer 9 and upgrading to Internet Explorer 11: - -Use the Enterprise Mode Site List to add sites to the Internet Explorer 5, Internet Explorer 7, and Internet Explorer 9 document modes. - -- Sites with the *x-ua-compatible* meta tag or HTTP header set to "IE=edge" may break in Internet Explorer 11 and need to be set to Internet Explorer 9 mode. This is because "edge" in Internet Explorer 9 meant Internet Explorer 9 mode, but "edge" in Internet Explorer 11 means Internet Explorer 11 mode. - -- Sites without a DOCTYPE in zones other than Intranet will default to Interoperable Quirks rather than Internet Explorer 5 Quirks and may need to be set to Internet Explorer 5 mode. - -- If your sites worked in Internet Explorer 9, you won't need IE8 Enterprise Mode or IE7 Enterprise Mode. - -### If you're on Internet Explorer 10 and upgrading to Internet Explorer 11: - -Use the Enterprise Mode Site List to add sites to the Internet Explorer 5, Internet Explorer 7, and Internet Explorer 10 modes. - -- Sites with the *x-ua-compatible* meta tag or HTTP header set to "IE=edge" may break in Internet Explorer 11 and need to be set to Internet Explorer 10 mode. This is because "edge" in Internet Explorer 10 meant Internet Explorer 10 mode, but "edge" in Internet Explorer 11 means Internet Explorer 11 mode. - -- If your sites worked in Internet Explorer 10, you won't need IE8 Enterprise Mode or IE7 Enterprise Mode. - -### If you're on Internet Explorer 11 and upgrading to Windows 10: - -You're all set! You shouldn’t need to make any changes. - -## Tips for web developers - -If your website worked in an older version of Internet Explorer, but no longer works in Internet Explorer 11, you may need to update the site. Here are the set of steps you should take to find the appropriate remediation strategy. - -### Try document modes - -To see if the site works in the Internet Explorer 5, Internet Explorer 7, Internet Explorer 8, Internet Explorer 9, Internet Explorer 10, or Internet Explorer 11 document modes: - -- Open the site in Internet Explorer 11, load the F12 tools by pressing the **F12** key or by selecting **F12 Developer Tools** from the **Tools** menu, and select the **Emulation** tab. - - ![F12 Developer Tools Emulation tab](images/img-f12-developer-tools-emulation.jpg) - -- Run the site in each document mode until you find the mode in which the site works. - - >[!NOTE] - >You will need to make sure the User agent string dropdown matches the same browser version as the Document mode dropdown. For example, if you were testing to see if the site works in Internet Explorer 10, you should update the Document mode dropdown to 10 and the User agent string dropdown to Internet Explorer 10. - -- If you find a mode in which your site works, you will need to add the site domain, sub-domain, or URL to the Enterprise Mode Site List for the document mode in which the site works, or ask the IT administrator to do so. You can add the *x-ua-compatible* meta tag or HTTP header as well. - -### Try IE8 Enterprise Mode - -If a document mode didn't fix your site, try IE8 Enterprise Mode, which benefits sites written for Internet Explorer 5, Internet Explorer 7, and Internet Explorer 8 document modes. - -- Enable the **Let users turn on and use Enterprise Mode from the Tools menu** policy locally on your machine. To do this: - - - Search for and run **gpedit.msc** - - - Navigate to **Computer Configuration** \> **Administrative Template** \> **Windows Components** \> **Internet Explorer**. - - - Enable the **Let users turn on and use Enterprise Mode from the Tools menu** Group Policy setting. - - After making this change, run **gpupdate.exe /force** to make sure the setting is applied locally. You should also make sure to disable this setting once you're done testing. Alternately, you can use a regkey; see [Turn on local control and logging for Enterprise Mode](turn-on-local-control-and-logging-for-enterprise-mode.md) for more information. - -- Restart Internet Explorer 11 and open the site you're testing, then go to **Emulation** tab in the **F12 Developer Tools** and select **Enterprise** from the **Browser profile** dropdown. If the site works, inform the IT administrator that the site needs to be added to the IE8 Enterprise Mode section. - -### Try IE7 Enterprise Mode - -If IE8 Enterprise Mode doesn't work, IE7 Enterprise Mode will give you the Compatibility View behavior that shipped with Internet Explorer 8 with Enterprise Mode. To try this approach: - -- Go to the **Tools** menu, select **Compatibility View Settings**, and add the site to the list. - -- Go to **Emulation** tab in the **F12 Developer Tools** and select **Enterprise** from the **Browser profile** dropdown. - -If the site works, inform the IT administrator that the site needs to be added to the IE7 Enterprise Mode section.\ - ->[!NOTE] ->Adding the same Web path to the Enterprise Mode and sections of the Enterprise Mode Site List will not work, but we will address this in a future update. - -### Update the site for modern web standards - -We recommend that enterprise customers focus their new development on established, modern web standards for better performance and interoperability across devices, and avoid developing sites in older Internet Explorer document modes. We often hear that, due to fact that the Intranet zone defaults to Compatibility View, web developers inadvertently create new sites in the Internet Explorer 7 or Internet Explorer 5 modes in the Intranet zone, depending on whether or not they used a DOCTYPE. As you move your web apps to modern standards, you can enable the **Turn on Internet Explorer Standards Mode for local intranet** Group Policy setting and add those sites that need Internet Explorer 5 or Internet Explorer 7 modes to the Site List. Of course, it is always a good idea to test the app to ensure that these settings work for your environment. - -## Related resources - -- [Document modes](https://msdn.microsoft.com/library/dn384051(v=vs.85).aspx) -- [What is Enterprise Mode?](what-is-enterprise-mode.md) -- [Turn on Enterprise Mode and use a site list](turn-on-enterprise-mode-and-use-a-site-list.md) -- [Enterprise Site Discovery Toolkit](https://www.microsoft.com/download/details.aspx?id=44570) -- [Collect data using Enterprise Site Discovery](collect-data-using-enterprise-site-discovery.md) -- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853) -- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378) -- [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.1)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md) -- [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.2)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md) +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: appcompat +description: Find out how to achieve better backward compatibility for your legacy web applications with the Enterprise Mode Site List. +author: dansimp +ms.author: dansimp +ms.prod: ie11 +ms.assetid: +ms.reviewer: +audience: itpro +manager: dansimp +title: Tips and tricks to manage Internet Explorer compatibility +ms.sitesec: library +ms.date: 05/10/2018 +--- + +# Tips and tricks to manage Internet Explorer compatibility + +Find out how to achieve better backward compatibility for your legacy web applications with the Enterprise Mode Site List. + +Jump to: +- [Tips for IT professionals](#tips-for-it-professionals) +- [Tips for web developers](#tips-for-web-developers) + +[Enterprise Mode for Internet Explorer 11](enterprise-mode-overview-for-ie11.md) can be very effective in providing backward compatibility for older web apps. The Enterprise Mode Site List includes the ability to put any web app in any document mode, include IE8 and IE7 Enterprise Modes, without changing a single line of code on the website. + +![Internet Explorer Enterprise Modes and document modes](images/img-enterprise-mode-site-list-xml.jpg) + +Sites in the \ section can be rendered in any document mode, as shown in blue above. Some sites designed for older versions of Internet Explorer may require better backward compatibility, and these can leverage the \ section of the Enterprise Mode Site List. IE8 Enterprise Mode provides higher-fidelity emulation for Internet Explorer 8 by using, among other improvements, the original Internet Explorer 8 user agent string. IE7 Enterprise Mode further improves emulation by adding Compatibility View. + +Compatibility View, first introduced with Internet Explorer 8, is basically a switch. If a webpage has no DOCTYPE, that page will be rendered in Internet Explorer 5 mode. If there is a DOCTYPE, the page will be rendered in Internet Explorer 7 mode. You can effectively get Compatibility View by specifying Internet Explorer 7 in the \ section, as this falls back to Internet Explorer 5 automatically if there's no DOCTYPE, or you can use IE7 Enterprise Mode for even better emulation. + +## Tips for IT professionals + +### Inventory your sites + +Upgrading to a new browser can be a time-consuming and potentially costly venture. To help reduce these costs, you can download the [Enterprise Site Discovery Toolkit](https://www.microsoft.com/download/details.aspx?id=44570), which can help you prioritize which sites you should be testing based on their usage in your enterprise. For example, if the data shows that no one is visiting a particular legacy web app, you may not need to test or fix it. The toolkit is supported on Internet Explorer 8, Internet Explorer 9, Internet Explorer 10, and Internet Explorer 11. The toolkit also gives you information about which document mode a page runs in your current browser so you can better understand how to fix that site if it breaks in a newer version of the browser. + +Once you know which sites to test and fix, the following remediation methods may help fix your compatibility issues in Internet Explorer 11 and Windows 10. + +### If you're on Internet Explorer 8 and upgrading to Internet Explorer 11: + +Use the Enterprise Mode Site List to add sites to the Internet Explorer 5, Internet Explorer 7, and Internet Explorer 8 documents modes, as well as IE8 Enterprise Mode and IE7 Enterprise Mode. + +- Sites with the *x-ua-compatible* meta tag or HTTP header set to "IE=edge" may break in Internet Explorer 11 and need to be set to Internet Explorer 8 mode. This is because "edge" in Internet Explorer 8 meant Internet Explorer 8 mode, but "edge" in Internet Explorer 11 means Internet Explorer 11 mode. + +- Sites without a DOCTYPE in zones other than Intranet will default to QME (or "interoperable quirks") rather than Internet Explorer 5 Quirks and may need to be set to Internet Explorer 5 mode. + +- Some sites may need to be added to both Enterprise Mode and Compatibility View to work. You can do this by adding the site to IE7 Enterprise Mode. + +### If you're on Internet Explorer 9 and upgrading to Internet Explorer 11: + +Use the Enterprise Mode Site List to add sites to the Internet Explorer 5, Internet Explorer 7, and Internet Explorer 9 document modes. + +- Sites with the *x-ua-compatible* meta tag or HTTP header set to "IE=edge" may break in Internet Explorer 11 and need to be set to Internet Explorer 9 mode. This is because "edge" in Internet Explorer 9 meant Internet Explorer 9 mode, but "edge" in Internet Explorer 11 means Internet Explorer 11 mode. + +- Sites without a DOCTYPE in zones other than Intranet will default to Interoperable Quirks rather than Internet Explorer 5 Quirks and may need to be set to Internet Explorer 5 mode. + +- If your sites worked in Internet Explorer 9, you won't need IE8 Enterprise Mode or IE7 Enterprise Mode. + +### If you're on Internet Explorer 10 and upgrading to Internet Explorer 11: + +Use the Enterprise Mode Site List to add sites to the Internet Explorer 5, Internet Explorer 7, and Internet Explorer 10 modes. + +- Sites with the *x-ua-compatible* meta tag or HTTP header set to "IE=edge" may break in Internet Explorer 11 and need to be set to Internet Explorer 10 mode. This is because "edge" in Internet Explorer 10 meant Internet Explorer 10 mode, but "edge" in Internet Explorer 11 means Internet Explorer 11 mode. + +- If your sites worked in Internet Explorer 10, you won't need IE8 Enterprise Mode or IE7 Enterprise Mode. + +### If you're on Internet Explorer 11 and upgrading to Windows 10: + +You're all set! You shouldn’t need to make any changes. + +## Tips for web developers + +If your website worked in an older version of Internet Explorer, but no longer works in Internet Explorer 11, you may need to update the site. Here are the set of steps you should take to find the appropriate remediation strategy. + +### Try document modes + +To see if the site works in the Internet Explorer 5, Internet Explorer 7, Internet Explorer 8, Internet Explorer 9, Internet Explorer 10, or Internet Explorer 11 document modes: + +- Open the site in Internet Explorer 11, load the F12 tools by pressing the **F12** key or by selecting **F12 Developer Tools** from the **Tools** menu, and select the **Emulation** tab. + + ![F12 Developer Tools Emulation tab](images/img-f12-developer-tools-emulation.jpg) + +- Run the site in each document mode until you find the mode in which the site works. + + >[!NOTE] + >You will need to make sure the User agent string dropdown matches the same browser version as the Document mode dropdown. For example, if you were testing to see if the site works in Internet Explorer 10, you should update the Document mode dropdown to 10 and the User agent string dropdown to Internet Explorer 10. + +- If you find a mode in which your site works, you will need to add the site domain, sub-domain, or URL to the Enterprise Mode Site List for the document mode in which the site works, or ask the IT administrator to do so. You can add the *x-ua-compatible* meta tag or HTTP header as well. + +### Try IE8 Enterprise Mode + +If a document mode didn't fix your site, try IE8 Enterprise Mode, which benefits sites written for Internet Explorer 5, Internet Explorer 7, and Internet Explorer 8 document modes. + +- Enable the **Let users turn on and use Enterprise Mode from the Tools menu** policy locally on your machine. To do this: + + - Search for and run **gpedit.msc** + + - Navigate to **Computer Configuration** \> **Administrative Template** \> **Windows Components** \> **Internet Explorer**. + + - Enable the **Let users turn on and use Enterprise Mode from the Tools menu** Group Policy setting. + + After making this change, run **gpupdate.exe /force** to make sure the setting is applied locally. You should also make sure to disable this setting once you're done testing. Alternately, you can use a regkey; see [Turn on local control and logging for Enterprise Mode](turn-on-local-control-and-logging-for-enterprise-mode.md) for more information. + +- Restart Internet Explorer 11 and open the site you're testing, then go to **Emulation** tab in the **F12 Developer Tools** and select **Enterprise** from the **Browser profile** dropdown. If the site works, inform the IT administrator that the site needs to be added to the IE8 Enterprise Mode section. + +### Try IE7 Enterprise Mode + +If IE8 Enterprise Mode doesn't work, IE7 Enterprise Mode will give you the Compatibility View behavior that shipped with Internet Explorer 8 with Enterprise Mode. To try this approach: + +- Go to the **Tools** menu, select **Compatibility View Settings**, and add the site to the list. + +- Go to **Emulation** tab in the **F12 Developer Tools** and select **Enterprise** from the **Browser profile** dropdown. + +If the site works, inform the IT administrator that the site needs to be added to the IE7 Enterprise Mode section.\ + +>[!NOTE] +>Adding the same Web path to the Enterprise Mode and sections of the Enterprise Mode Site List will not work, but we will address this in a future update. + +### Update the site for modern web standards + +We recommend that enterprise customers focus their new development on established, modern web standards for better performance and interoperability across devices, and avoid developing sites in older Internet Explorer document modes. We often hear that, due to fact that the Intranet zone defaults to Compatibility View, web developers inadvertently create new sites in the Internet Explorer 7 or Internet Explorer 5 modes in the Intranet zone, depending on whether or not they used a DOCTYPE. As you move your web apps to modern standards, you can enable the **Turn on Internet Explorer Standards Mode for local intranet** Group Policy setting and add those sites that need Internet Explorer 5 or Internet Explorer 7 modes to the Site List. Of course, it is always a good idea to test the app to ensure that these settings work for your environment. + +## Related resources + +- [Document modes](https://msdn.microsoft.com/library/dn384051(v=vs.85).aspx) +- [What is Enterprise Mode?](what-is-enterprise-mode.md) +- [Turn on Enterprise Mode and use a site list](turn-on-enterprise-mode-and-use-a-site-list.md) +- [Enterprise Site Discovery Toolkit](https://www.microsoft.com/download/details.aspx?id=44570) +- [Collect data using Enterprise Site Discovery](collect-data-using-enterprise-site-discovery.md) +- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853) +- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378) +- [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.1)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md) +- [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.2)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md) diff --git a/browsers/internet-explorer/ie11-deploy-guide/troubleshoot-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/troubleshoot-ie11.md index 55e4491ac7..39d999c947 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/troubleshoot-ie11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/troubleshoot-ie11.md @@ -1,52 +1,53 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: support -description: Use the topics in this section to learn how to troubleshoot several of the more common problems experienced with Internet Explorer. -author: lomayor -ms.prod: ie11 -ms.assetid: 0361c1a6-3faa-42b2-a588-92439eebeeab -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Troubleshoot Internet Explorer 11 (IE11) (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Troubleshoot Internet Explorer 11 (IE11) - -**Applies to:** - -- Windows 10 -- Windows 8.1 -- Windows 7 -- Windows Server 2012 R2 -- Windows Server 2008 R2 with Service Pack 1 (SP1) - -Use the topics in this section to learn how to troubleshoot several of the more common problems experienced with Internet Explorer. - -## In this section - -|Topic |Description | -|-------|--------------| -|[Setup problems with Internet Explorer 11](setup-problems-with-ie11.md) |Guidance about how to find and understand the error log files created when setup runs. | -|[Install problems with Internet Explorer 11](install-problems-with-ie11.md) |Guidance about how to address potential problems when IE doesn’t finish installing. | -|[Problems after installing Internet Explorer 11](problems-after-installing-ie11.md) |Guidance about how to troubleshoot and help fix instability problems, where IE crashes or seems slow or where Digital Rights Management (DRM) playback doesn’t work. | -|[Auto configuration and auto proxy problems with Internet Explorer 11](auto-configuration-and-auto-proxy-problems-with-ie11.md) |Guidance about how to troubleshoot and help fix problems where branding changes aren’t distributed or where you’re experiencing proxy server setup problems. | -|[User interface problems with Internet Explorer 11](user-interface-problems-with-ie11.md) |Guidance about changes to the IE Customization Wizard, security zones, Favorites, Command, and Status bars, and the search box. | -|[Group Policy problems with Internet Explorer 11](group-policy-problems-ie11.md) |Guidance about how to find the Group Policy Object-related log files for troubleshooting. | -|[.NET Framework problems with Internet Explorer 11](net-framework-problems-with-ie11.md) |Guidance about how to turn managed browser hosting controls back on. | -|[Enhanced Protected Mode problems with Internet Explorer](enhanced-protected-mode-problems-with-ie11.md) |Guidance about how to turn off Enhanced Protected Mode to address compatibility issues. | -|[Fix font rendering problems by turning off natural metrics](turn-off-natural-metrics.md) |Guidance about how to turn off natural metrics to address font rendering problems. | -|[Intranet problems with Internet Explorer 11](intranet-problems-and-ie11.md) |Guidance about how to turn on single-word intranet searches in the address bar. | -|[Browser cache changes and roaming profiles](browser-cache-changes-and-roaming-profiles.md) |Guidance about changes we’ve made to the browser cache to improve the performance, flexibility, reliability, and scalability and how to get the best results while using a roaming profile. | - -  - -  - -  - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: support +description: Use the topics in this section to learn how to troubleshoot several of the more common problems experienced with Internet Explorer. +author: dansimp +ms.prod: ie11 +ms.assetid: 0361c1a6-3faa-42b2-a588-92439eebeeab +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Troubleshoot Internet Explorer 11 (IE11) (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Troubleshoot Internet Explorer 11 (IE11) + +**Applies to:** + +- Windows 10 +- Windows 8.1 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2008 R2 with Service Pack 1 (SP1) + +Use the topics in this section to learn how to troubleshoot several of the more common problems experienced with Internet Explorer. + +## In this section + +|Topic |Description | +|-------|--------------| +|[Setup problems with Internet Explorer 11](setup-problems-with-ie11.md) |Guidance about how to find and understand the error log files created when setup runs. | +|[Install problems with Internet Explorer 11](install-problems-with-ie11.md) |Guidance about how to address potential problems when IE doesn’t finish installing. | +|[Problems after installing Internet Explorer 11](problems-after-installing-ie11.md) |Guidance about how to troubleshoot and help fix instability problems, where IE crashes or seems slow or where Digital Rights Management (DRM) playback doesn’t work. | +|[Auto configuration and auto proxy problems with Internet Explorer 11](auto-configuration-and-auto-proxy-problems-with-ie11.md) |Guidance about how to troubleshoot and help fix problems where branding changes aren’t distributed or where you’re experiencing proxy server setup problems. | +|[User interface problems with Internet Explorer 11](user-interface-problems-with-ie11.md) |Guidance about changes to the IE Customization Wizard, security zones, Favorites, Command, and Status bars, and the search box. | +|[Group Policy problems with Internet Explorer 11](group-policy-problems-ie11.md) |Guidance about how to find the Group Policy Object-related log files for troubleshooting. | +|[.NET Framework problems with Internet Explorer 11](net-framework-problems-with-ie11.md) |Guidance about how to turn managed browser hosting controls back on. | +|[Enhanced Protected Mode problems with Internet Explorer](enhanced-protected-mode-problems-with-ie11.md) |Guidance about how to turn off Enhanced Protected Mode to address compatibility issues. | +|[Fix font rendering problems by turning off natural metrics](turn-off-natural-metrics.md) |Guidance about how to turn off natural metrics to address font rendering problems. | +|[Intranet problems with Internet Explorer 11](intranet-problems-and-ie11.md) |Guidance about how to turn on single-word intranet searches in the address bar. | +|[Browser cache changes and roaming profiles](browser-cache-changes-and-roaming-profiles.md) |Guidance about changes we’ve made to the browser cache to improve the performance, flexibility, reliability, and scalability and how to get the best results while using a roaming profile. | + +  + +  + +  + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/turn-off-enterprise-mode.md b/browsers/internet-explorer/ie11-deploy-guide/turn-off-enterprise-mode.md index d193f26c68..1df0d6b95e 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/turn-off-enterprise-mode.md +++ b/browsers/internet-explorer/ie11-deploy-guide/turn-off-enterprise-mode.md @@ -1,80 +1,81 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: appcompat -description: How to turn Enterprise Mode off temporarily while testing websites and how to turn it off completely if you no longer want to to use it. -author: lomayor -ms.prod: ie11 -ms.assetid: 5027c163-71e0-49b8-9dc0-f0a7310c7ae3 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Turn off Enterprise Mode (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Turn off Enterprise Mode - -**Applies to:** - -- Windows 10 -- Windows 8.1 -- Windows 7 -- Windows Server 2012 R2 -- Windows Server 2008 R2 with Service Pack 1 (SP1) - -It’s important that you test the sites you’re adding, or considering removing, from your Enterprise Mode site list. To make this testing easier, you can turn off the site list or the entire Enterprise Mode functionality. For example, you might have an intranet site on your list that you’ve upgraded to be compatible with the new web standards . If you test the site while the site list is active, Internet Explorer 11 will automatically switch to Enterprise Mode. By turning off the site list, you can see what the page actually looks like and decide whether to remove it from your site list. - -In addition, if you no longer want your users to be able to turn Enterprise Mode on locally, you can remove Enterprise Mode from the local **Tools** menu. - -**Important**
          -Turning off both of these features turns off Enterprise Mode for your company. Turning off Enterprise Mode also causes any websites included in your employee’s manual site lists to not appear in Enterprise Mode. - - **To turn off the site list using Group Policy** - -1. Open your Group Policy editor, like Group Policy Management Console (GPMC). - -2. Go to the **Use the Enterprise Mode IE website list** setting, and then click **Disabled**.

          - Enterprise Mode will no longer look for the site list, effectively turning off Enterprise Mode. However, if you previously turned on local control for your employees, Enterprise Mode will still be available from the **Tools** menu. You need to turn that part of the functionality off separately. - - **To turn off local control using Group Policy** - -3. Open your Group Policy editor, like Group Policy Management Console (GPMC). - -4. Go to the **Let users turn on and use Enterprise Mode from the Tools menu** setting, and then click **Disable**. - -5. Enterprise Mode no longer shows up on the **Tools** menu for your employees. However, if you are still using an Enterprise Mode site list, all of the globally listed sites will still appear in Enterprise Mode. If you want to turn off all of Enterprise Mode, you will need to also turn off the site list functionality. - - **To turn off the site list using the registry** - -6. Open a registry editor, such as regedit.exe. - -7. Go to `HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\EnterpriseMode`, and then delete the **SiteList** value.

          - You can also use HKEY_LOCAL_MACHINE, depending whether you want to turn off the Enterprise Mode site list for users or for computers. - -8. Close all and restart all instances of Internet Explorer.

          - IE11 stops looking at the site list for rendering instructions. However, Enterprise Mode is still available to your users locally (if it was turned on). - - **To turn off local control using the registry** - -9. Open a registry editor, such as regedit.exe. - -10. Go `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Main\EnterpriseMode`, and then delete the **Enable** value.

          - You can also use HKEY_CURRENT_USER, depending whether you want to turn off Enterprise Mode for users or for computers. - -11. Close and restart all instances of IE.

          - Enterprise Mode is no longer a user option on the **Tools** menu in IE11. However, IE11 still looks at the site list (if it was turned on). - -## Related topics -- [What is Enterprise Mode?](what-is-enterprise-mode.md) -- [Turn on Enterprise Mode and use a site list](turn-on-enterprise-mode-and-use-a-site-list.md) -- [Turn on local control and logging for Enterprise Mode](turn-on-local-control-and-logging-for-enterprise-mode.md) -- [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) - - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: appcompat +description: How to turn Enterprise Mode off temporarily while testing websites and how to turn it off completely if you no longer want to to use it. +author: dansimp +ms.prod: ie11 +ms.assetid: 5027c163-71e0-49b8-9dc0-f0a7310c7ae3 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Turn off Enterprise Mode (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Turn off Enterprise Mode + +**Applies to:** + +- Windows 10 +- Windows 8.1 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2008 R2 with Service Pack 1 (SP1) + +It’s important that you test the sites you’re adding, or considering removing, from your Enterprise Mode site list. To make this testing easier, you can turn off the site list or the entire Enterprise Mode functionality. For example, you might have an intranet site on your list that you’ve upgraded to be compatible with the new web standards . If you test the site while the site list is active, Internet Explorer 11 will automatically switch to Enterprise Mode. By turning off the site list, you can see what the page actually looks like and decide whether to remove it from your site list. + +In addition, if you no longer want your users to be able to turn Enterprise Mode on locally, you can remove Enterprise Mode from the local **Tools** menu. + +**Important**
          +Turning off both of these features turns off Enterprise Mode for your company. Turning off Enterprise Mode also causes any websites included in your employee’s manual site lists to not appear in Enterprise Mode. + + **To turn off the site list using Group Policy** + +1. Open your Group Policy editor, like Group Policy Management Console (GPMC). + +2. Go to the **Use the Enterprise Mode IE website list** setting, and then click **Disabled**.

          + Enterprise Mode will no longer look for the site list, effectively turning off Enterprise Mode. However, if you previously turned on local control for your employees, Enterprise Mode will still be available from the **Tools** menu. You need to turn that part of the functionality off separately. + + **To turn off local control using Group Policy** + +3. Open your Group Policy editor, like Group Policy Management Console (GPMC). + +4. Go to the **Let users turn on and use Enterprise Mode from the Tools menu** setting, and then click **Disable**. + +5. Enterprise Mode no longer shows up on the **Tools** menu for your employees. However, if you are still using an Enterprise Mode site list, all of the globally listed sites will still appear in Enterprise Mode. If you want to turn off all of Enterprise Mode, you will need to also turn off the site list functionality. + + **To turn off the site list using the registry** + +6. Open a registry editor, such as regedit.exe. + +7. Go to `HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\EnterpriseMode`, and then delete the **SiteList** value.

          + You can also use HKEY_LOCAL_MACHINE, depending whether you want to turn off the Enterprise Mode site list for users or for computers. + +8. Close all and restart all instances of Internet Explorer.

          + IE11 stops looking at the site list for rendering instructions. However, Enterprise Mode is still available to your users locally (if it was turned on). + + **To turn off local control using the registry** + +9. Open a registry editor, such as regedit.exe. + +10. Go `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Main\EnterpriseMode`, and then delete the **Enable** value.

          + You can also use HKEY_CURRENT_USER, depending whether you want to turn off Enterprise Mode for users or for computers. + +11. Close and restart all instances of IE.

          + Enterprise Mode is no longer a user option on the **Tools** menu in IE11. However, IE11 still looks at the site list (if it was turned on). + +## Related topics +- [What is Enterprise Mode?](what-is-enterprise-mode.md) +- [Turn on Enterprise Mode and use a site list](turn-on-enterprise-mode-and-use-a-site-list.md) +- [Turn on local control and logging for Enterprise Mode](turn-on-local-control-and-logging-for-enterprise-mode.md) +- [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) + + + + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/turn-off-natural-metrics.md b/browsers/internet-explorer/ie11-deploy-guide/turn-off-natural-metrics.md index 890640ae36..90442b3bbc 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/turn-off-natural-metrics.md +++ b/browsers/internet-explorer/ie11-deploy-guide/turn-off-natural-metrics.md @@ -1,37 +1,38 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: support -description: Turn off natural metrics for Internet Explorer 11 -author: lomayor -ms.prod: ie11 -ms.assetid: e31a27d7-662e-4106-a3d2-c6b0531961d5 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Fix font rendering problems by turning off natural metrics (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Fix font rendering problems by turning off natural metrics -By default, Internet Explorer 11 uses “natural metrics”. Natural metrics use inter-pixel spacing that creates more accurately rendered and readable text, avoiding many common font rendering problems with Windows Internet Explorer 9 or older sites. - -However, you might find that many intranet sites need you to use Windows Graphics Device Interface (GDI) metrics. To avoid potential compatibility issues, you must turn off natural metrics for those sites. - - **To turn off natural metrics** - -- Add the following HTTP header to each site: `X-UA-TextLayoutMetrics: gdi` - -

          -OR-

          - -- Add the following <meta> tag to each site: `` - -Turning off natural metrics automatically turns on GDI metrics. - - - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: support +description: Turn off natural metrics for Internet Explorer 11 +author: dansimp +ms.prod: ie11 +ms.assetid: e31a27d7-662e-4106-a3d2-c6b0531961d5 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Fix font rendering problems by turning off natural metrics (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Fix font rendering problems by turning off natural metrics +By default, Internet Explorer 11 uses “natural metrics”. Natural metrics use inter-pixel spacing that creates more accurately rendered and readable text, avoiding many common font rendering problems with Windows Internet Explorer 9 or older sites. + +However, you might find that many intranet sites need you to use Windows Graphics Device Interface (GDI) metrics. To avoid potential compatibility issues, you must turn off natural metrics for those sites. + + **To turn off natural metrics** + +- Add the following HTTP header to each site: `X-UA-TextLayoutMetrics: gdi` + +

          -OR-

          + +- Add the following <meta> tag to each site: `` + +Turning off natural metrics automatically turns on GDI metrics. + + + + + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/turn-on-enterprise-mode-and-use-a-site-list.md b/browsers/internet-explorer/ie11-deploy-guide/turn-on-enterprise-mode-and-use-a-site-list.md index 1a6823e2db..29c8de2486 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/turn-on-enterprise-mode-and-use-a-site-list.md +++ b/browsers/internet-explorer/ie11-deploy-guide/turn-on-enterprise-mode-and-use-a-site-list.md @@ -1,75 +1,71 @@ ---- -title: Turn on Enterprise Mode and use a site list (Internet Explorer 11 for IT Pros) -description: How to turn on Enterprise Mode and specify a site list. -ms.assetid: 800e9c5a-57a6-4d61-a38a-4cb972d833e1 -ms.reviewer: -audience: itpro manager: dansimp -ms.prod: ie11 -ms.mktglfcycl: deploy -ms.pagetype: appcompat -ms.sitesec: library -author: lomayor -ms.author: lomayor -ms.date: 08/14/2017 -ms.localizationpriority: medium - - - - - ---- - - -# Turn on Enterprise Mode and use a site list - -**Applies to:** - -- Windows 10 -- Windows 8.1 -- Windows 7 -- Windows Server 2012 R2 -- Windows Server 2008 R2 with Service Pack 1 (SP1) - -Before you can use a site list with Enterprise Mode, you need to turn the functionality on and set up the system for centralized control. By allowing centralized control, you can create one global list of websites that render using Enterprise Mode. Approximately 65 seconds after Internet Explorer 11 starts, it looks for a properly formatted site list. If a new site list if found, with a different version number than the active list, IE11 loads and uses the newer version. After the initial check, IE11 won’t look for an updated list again until you restart the browser. - ->[!NOTE] ->We recommend that you store and download your website list from a secure web server (https://), to help protect against data tampering. After the list is downloaded, it's stored locally on your employees' computers so if the centralized file location is unavailable, they can still use Enterprise Mode. - - **To turn on Enterprise Mode using Group Policy** - -1. Open your Group Policy editor and go to the `Administrative Templates\Windows Components\Internet Explorer\Use the Enterprise Mode IE website list` setting.

          - Turning this setting on also requires you to create and store a site list. For more information about creating your site list, see the [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) topics. - - ![local group policy editor for using a site list](images/ie-emie-grouppolicysitelist.png) - -2. Click **Enabled**, and then in the **Options** area, type the location to your site list. - - **To turn on Enterprise Mode using the registry** - -3. **For only the local user:** Open a registry editor, like regedit.exe and go to `HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Main\EnterpriseMode`. -

          -OR-

          - For all users on the device: Open a registry editor, like regedit.exe and go to HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Internet Explorer\Main\EnterpriseMode. - -4. Edit the `SiteList` registry key to point to where you want to keep your Enterprise Mode site list file. For example: - - ![enterprise mode with site list in the registry](images/ie-emie-registrysitelist.png) - - - **HTTPS location**: `"SiteList"="https://localhost:8080/sites.xml"` - - - **Local network:** `"SiteList"="\\network\shares\sites.xml"` - - - **Local file:** `"SiteList"="file:///c:\\Users\\\\Documents\\testList.xml"` - - All of your managed devices must have access to this location if you want them to be able to access and use Enterprise Mode and your site list. For information about how to create and use an Enterprise Mode site list, see [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md). - -## Related topics -- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853) -- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378) -- [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.1)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md) -- [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.2)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md) - - - - - - +--- +title: Turn on Enterprise Mode and use a site list (Internet Explorer 11 for IT Pros) +description: How to turn on Enterprise Mode and specify a site list. +ms.assetid: 800e9c5a-57a6-4d61-a38a-4cb972d833e1 +ms.reviewer: +audience: itpro +manager: dansimp +ms.prod: ie11 +ms.mktglfcycl: deploy +ms.pagetype: appcompat +ms.sitesec: library +author: dansimp +ms.author: dansimp +ms.date: 08/14/2017 +ms.localizationpriority: medium +--- + + +# Turn on Enterprise Mode and use a site list + +**Applies to:** + +- Windows 10 +- Windows 8.1 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2008 R2 with Service Pack 1 (SP1) + +Before you can use a site list with Enterprise Mode, you need to turn the functionality on and set up the system for centralized control. By allowing centralized control, you can create one global list of websites that render using Enterprise Mode. Approximately 65 seconds after Internet Explorer 11 starts, it looks for a properly formatted site list. If a new site list if found, with a different version number than the active list, IE11 loads and uses the newer version. After the initial check, IE11 won’t look for an updated list again until you restart the browser. + +>[!NOTE] +>We recommend that you store and download your website list from a secure web server (https://), to help protect against data tampering. After the list is downloaded, it's stored locally on your employees' computers so if the centralized file location is unavailable, they can still use Enterprise Mode. + + **To turn on Enterprise Mode using Group Policy** + +1. Open your Group Policy editor and go to the `Administrative Templates\Windows Components\Internet Explorer\Use the Enterprise Mode IE website list` setting.

          + Turning this setting on also requires you to create and store a site list. For more information about creating your site list, see the [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) topics. + + ![local group policy editor for using a site list](images/ie-emie-grouppolicysitelist.png) + +2. Click **Enabled**, and then in the **Options** area, type the location to your site list. + + **To turn on Enterprise Mode using the registry** + +3. **For only the local user:** Open a registry editor, like regedit.exe and go to `HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Main\EnterpriseMode`. +

          -OR-

          + For all users on the device: Open a registry editor, like regedit.exe and go to HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Internet Explorer\Main\EnterpriseMode. + +4. Edit the `SiteList` registry key to point to where you want to keep your Enterprise Mode site list file. For example: + + ![enterprise mode with site list in the registry](images/ie-emie-registrysitelist.png) + + - **HTTPS location**: `"SiteList"="https://localhost:8080/sites.xml"` + + - **Local network:** `"SiteList"="\\network\shares\sites.xml"` + + - **Local file:** `"SiteList"="file:///c:\\Users\\\\Documents\\testList.xml"` + + All of your managed devices must have access to this location if you want them to be able to access and use Enterprise Mode and your site list. For information about how to create and use an Enterprise Mode site list, see [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md). + +## Related topics +- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853) +- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378) +- [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.1)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md) +- [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.2)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md) + + + + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/turn-on-local-control-and-logging-for-enterprise-mode.md b/browsers/internet-explorer/ie11-deploy-guide/turn-on-local-control-and-logging-for-enterprise-mode.md index 2f52fdfba2..1324c12963 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/turn-on-local-control-and-logging-for-enterprise-mode.md +++ b/browsers/internet-explorer/ie11-deploy-guide/turn-on-local-control-and-logging-for-enterprise-mode.md @@ -1,64 +1,65 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: appcompat -description: Turn on local user control and logging for Enterprise Mode. -author: lomayor -ms.prod: ie11 -ms.assetid: 6622ecce-24b1-497e-894a-e1fd5a8a66d1 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Turn on local control and logging for Enterprise Mode (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Turn on local control and logging for Enterprise Mode - -**Applies to:** - -- Windows 10 -- Windows 8.1 -- Windows 7 -- Windows Server 2012 R2 -- Windows Server 2008 R2 with Service Pack 1 (SP1) - -You can turn on local control of Enterprise Mode so that your users can turn Enterprise Mode on from the **Tools** menu. Turning on this feature also adds the **Enterprise** browser profile to the **Emulation** tab of the F12 developer tools. - -Besides turning on this feature, you also have the option to provide a URL for Enterprise Mode logging. If you turn logging on, Internet Explorer initiates a simple POST back to the supplied address, including the URL and a specification that **EnterpriseMode** was turned on or off through the **Tools** menu. - - **To turn on local control of Enterprise Mode using Group Policy** - -1. Open your Group Policy editor and go to the **Administrative Templates\\Windows Components\\Internet Explorer\\Let users turn on and use Enterprise Mode from the Tools menu** setting. - - ![group policy editor with emie setting](images/ie-emie-editpolicy.png) - -2. Click **Enabled**, and then in the **Options** area, type the location for where to receive reports about when your employees use this functionality to turn Enterprise Mode on or off from the **Tools** menu. - - **To turn on local control of Enterprise Mode using the registry** - -3. Open a registry editor, like regedit.exe and go to `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Main\EnterpriseMode`. - -4. In the right pane, right-click and click **New**, click **String Value**, and then name the new value **Enable**. - -5. Right-click the **Enable** key, click **Modify**, and then type a **Value data** to point to a server that you can listen to for updates. - - ![edit registry string for data collection location](images/ie-emie-editregistrystring.png) - -Your **Value data** location can be any of the following types: - -- **URL location (like, https://www.emieposturl.com/api/records or https://localhost:13000)**. IE sends a POST message to the URL every time a change is made to Enterprise Mode from the **Tools** menu.

          **Important**
          - The `https://www.emieposturl.com/api/records` example will only work if you’ve downloaded the sample discussed in the [Set up Enterprise Mode logging and data collection](set-up-enterprise-mode-logging-and-data-collection.md) topic. If you don’t have the sample, you won’t have the web API. -- **Local network location (like, https://emieposturl/)**. IE sends a POST message to your specified local network location every time a change is made to Enterprise Mode from the **Tools** menu. -- **Empty string**. If you leave the **Value data** box blank; your employees will be able to turn Enterprise Mode on and off from the **Tools** menu, but you won’t collect any logging data. - -For information about how to collect the data provided when your employees turn Enterprise Mode on or off from the **Tools** menu, see [Set up Enterprise Mode logging and data collection](set-up-enterprise-mode-logging-and-data-collection.md). - - - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: appcompat +description: Turn on local user control and logging for Enterprise Mode. +author: dansimp +ms.prod: ie11 +ms.assetid: 6622ecce-24b1-497e-894a-e1fd5a8a66d1 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Turn on local control and logging for Enterprise Mode (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Turn on local control and logging for Enterprise Mode + +**Applies to:** + +- Windows 10 +- Windows 8.1 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2008 R2 with Service Pack 1 (SP1) + +You can turn on local control of Enterprise Mode so that your users can turn Enterprise Mode on from the **Tools** menu. Turning on this feature also adds the **Enterprise** browser profile to the **Emulation** tab of the F12 developer tools. + +Besides turning on this feature, you also have the option to provide a URL for Enterprise Mode logging. If you turn logging on, Internet Explorer initiates a simple POST back to the supplied address, including the URL and a specification that **EnterpriseMode** was turned on or off through the **Tools** menu. + + **To turn on local control of Enterprise Mode using Group Policy** + +1. Open your Group Policy editor and go to the **Administrative Templates\\Windows Components\\Internet Explorer\\Let users turn on and use Enterprise Mode from the Tools menu** setting. + + ![group policy editor with emie setting](images/ie-emie-editpolicy.png) + +2. Click **Enabled**, and then in the **Options** area, type the location for where to receive reports about when your employees use this functionality to turn Enterprise Mode on or off from the **Tools** menu. + + **To turn on local control of Enterprise Mode using the registry** + +3. Open a registry editor, like regedit.exe and go to `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Main\EnterpriseMode`. + +4. In the right pane, right-click and click **New**, click **String Value**, and then name the new value **Enable**. + +5. Right-click the **Enable** key, click **Modify**, and then type a **Value data** to point to a server that you can listen to for updates. + + ![edit registry string for data collection location](images/ie-emie-editregistrystring.png) + +Your **Value data** location can be any of the following types: + +- **URL location (like, https://www.emieposturl.com/api/records or https://localhost:13000)**. IE sends a POST message to the URL every time a change is made to Enterprise Mode from the **Tools** menu.

          **Important**
          + The `https://www.emieposturl.com/api/records` example will only work if you’ve downloaded the sample discussed in the [Set up Enterprise Mode logging and data collection](set-up-enterprise-mode-logging-and-data-collection.md) topic. If you don’t have the sample, you won’t have the web API. +- **Local network location (like, https://emieposturl/)**. IE sends a POST message to your specified local network location every time a change is made to Enterprise Mode from the **Tools** menu. +- **Empty string**. If you leave the **Value data** box blank; your employees will be able to turn Enterprise Mode on and off from the **Tools** menu, but you won’t collect any logging data. + +For information about how to collect the data provided when your employees turn Enterprise Mode on or off from the **Tools** menu, see [Set up Enterprise Mode logging and data collection](set-up-enterprise-mode-logging-and-data-collection.md). + + + + + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/updated-features-and-tools-with-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/updated-features-and-tools-with-ie11.md index a4121ee693..446375289c 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/updated-features-and-tools-with-ie11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/updated-features-and-tools-with-ie11.md @@ -1,50 +1,51 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: appcompat -description: High-level info about some of the new and updated features for Internet Explorer 11. -author: lomayor -ms.prod: ie11 -ms.assetid: f53c6f04-7c60-40e7-9fc5-312220f08156 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: List of updated features and tools - Internet Explorer 11 (IE11) (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# List of updated features and tools - Internet Explorer 11 (IE11) - -**Applies to:** - -- Windows 10 -- Windows 8.1 Update -- Windows 7 with Service Pack 1 (SP1) -- Windows Server 2012 R2 -- Windows Server 2008 R2 with Service Pack 1 (SP1) - -Internet Explorer 11 includes several new features and tools. This topic includes high-level info about the each of them. - -## Updated features and tools -- **Updated web standards.** WebGL, Canvas 2D L2 extensions, fullscreen API, encrypted media extensions, media source extensions, CSS flexible box layout module, mutation observers, like DOM4 and 5.3. - -- **Enhanced Protected Mode.** Extends Protected Mode to further restrict the ability of an attacker to access sensitive or personal information in personal and corporate environments. This feature is turned off by default. For more info, see [Enhanced Protected Mode problems with Internet Explorer](enhanced-protected-mode-problems-with-ie11.md). - -- **Enterprise Mode.** Enterprise Mode, a compatibility mode that runs on IE11 on Windows 8.1 Update and Windows 7 devices, lets websites render using a modified browser configuration that’s designed to emulate Windows Internet Explorer 8, avoiding the common compatibility problems associated with web apps written and tested on older versions of Internet Explorer. For more info, see [What is Enterprise Mode?](what-is-enterprise-mode.md) - -- **Out-of-date ActiveX control blocking**. Helps to keep your ActiveX controls up-to-date, because malicious software (or malware) can target security flaws in outdated controls, damaging your computer by collecting info from it, installing unwanted software, or by letting someone else control it remotely. For more info, see [Out-of-date ActiveX control blocking](out-of-date-activex-control-blocking.md). - -- **Do Not Track (DNT) exceptions.** IE11 lets websites ask whether to track users as they browse a website. If the user approves the request, IE records an exception to the "Do Not Track" rule and sends headers to the website that allow tracking. By respecting these headers and requesting exceptions to the default privacy settings, website owners can develop a trusted relationship with their users about privacy. For more info, see [Internet Explorer 11 - FAQ for IT Pros](../ie11-faq/faq-for-it-pros-ie11.md). - -- **IE Administration Kit (IEAK).** Lets you create custom, branded versions of IE11. For more info and to download the tool, see [Internet Explorer Administration Kit 11 (IEAK 11) - Administration Guide for IT Pros](../ie11-ieak/index.md). - -- **Unattend Settings.** Lets you update the Unattend.xml file, to customize the home page, favorites, search providers, feeds, Accelerators, Web Slices, and settings for top result searches. For more info, see the [Unattend Settings: Microsoft-Windows-IE-InternetExplorer](https://go.microsoft.com/fwlink/p/?LinkId=263709). - -  - -  - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: appcompat +description: High-level info about some of the new and updated features for Internet Explorer 11. +author: dansimp +ms.prod: ie11 +ms.assetid: f53c6f04-7c60-40e7-9fc5-312220f08156 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: List of updated features and tools - Internet Explorer 11 (IE11) (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# List of updated features and tools - Internet Explorer 11 (IE11) + +**Applies to:** + +- Windows 10 +- Windows 8.1 Update +- Windows 7 with Service Pack 1 (SP1) +- Windows Server 2012 R2 +- Windows Server 2008 R2 with Service Pack 1 (SP1) + +Internet Explorer 11 includes several new features and tools. This topic includes high-level info about the each of them. + +## Updated features and tools +- **Updated web standards.** WebGL, Canvas 2D L2 extensions, fullscreen API, encrypted media extensions, media source extensions, CSS flexible box layout module, mutation observers, like DOM4 and 5.3. + +- **Enhanced Protected Mode.** Extends Protected Mode to further restrict the ability of an attacker to access sensitive or personal information in personal and corporate environments. This feature is turned off by default. For more info, see [Enhanced Protected Mode problems with Internet Explorer](enhanced-protected-mode-problems-with-ie11.md). + +- **Enterprise Mode.** Enterprise Mode, a compatibility mode that runs on IE11 on Windows 8.1 Update and Windows 7 devices, lets websites render using a modified browser configuration that’s designed to emulate Windows Internet Explorer 8, avoiding the common compatibility problems associated with web apps written and tested on older versions of Internet Explorer. For more info, see [What is Enterprise Mode?](what-is-enterprise-mode.md) + +- **Out-of-date ActiveX control blocking**. Helps to keep your ActiveX controls up-to-date, because malicious software (or malware) can target security flaws in outdated controls, damaging your computer by collecting info from it, installing unwanted software, or by letting someone else control it remotely. For more info, see [Out-of-date ActiveX control blocking](out-of-date-activex-control-blocking.md). + +- **Do Not Track (DNT) exceptions.** IE11 lets websites ask whether to track users as they browse a website. If the user approves the request, IE records an exception to the "Do Not Track" rule and sends headers to the website that allow tracking. By respecting these headers and requesting exceptions to the default privacy settings, website owners can develop a trusted relationship with their users about privacy. For more info, see [Internet Explorer 11 - FAQ for IT Pros](../ie11-faq/faq-for-it-pros-ie11.md). + +- **IE Administration Kit (IEAK).** Lets you create custom, branded versions of IE11. For more info and to download the tool, see [Internet Explorer Administration Kit 11 (IEAK 11) - Administration Guide for IT Pros](../ie11-ieak/index.md). + +- **Unattend Settings.** Lets you update the Unattend.xml file, to customize the home page, favorites, search providers, feeds, Accelerators, Web Slices, and settings for top result searches. For more info, see the [Unattend Settings: Microsoft-Windows-IE-InternetExplorer](https://go.microsoft.com/fwlink/p/?LinkId=263709). + +  + +  + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/use-the-enterprise-mode-portal.md b/browsers/internet-explorer/ie11-deploy-guide/use-the-enterprise-mode-portal.md index ad67aa915b..3dce53865e 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/use-the-enterprise-mode-portal.md +++ b/browsers/internet-explorer/ie11-deploy-guide/use-the-enterprise-mode-portal.md @@ -1,84 +1,84 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: appcompat -description: Use the topics in this section to learn about how to use the Enterprise Mode Site List Portal. -ms.prod: ie11 -title: Use the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -author: lomayor ---- - -# Use the Enterprise Mode Site List Portal - -**Applies to:** - -- Windows 10 -- Windows 8.1 -- Windows 7 -- Windows Server 2012 R2 -- Windows Server 2008 R2 with Service Pack 1 (SP1) - -Enterprise Mode is a compatibility mode that runs on Internet Explorer 11, letting websites render using a modified browser configuration that’s designed to emulate either Windows Internet Explorer 8 or Windows Internet Explorer 7, avoiding the common compatibility problems associated with web apps written and tested on older versions of Internet Explorer. - -The Enterprise Mode Site List Portal is an open-source web tool on GitHub that allows you to manage your Enterprise Mode Site List, hosted by the app, with multiple users. The portal is designed to use IIS and a SQL Server backend, leveraging Active Directory (AD) for employee management. Updates to your site list are made by submitting new change requests, which are then approved by a designated group of people, put into a pre-production environment for testing, and then deployed immediately, or scheduled for deployment later. - -You can use IE11 and the Enterprise Mode Site List Portal to manage your Enterprise Mode Site List, hosted by the app, with multiple users. - -## Minimum system requirements for portal and test machines -Some of the components in this table might also need additional system resources. Check the component's documentation for more information. - -|Item |Description | -|-----|------------| -|Operating system |Windows 7 or later | -|Memory |16 GB RAM | -|Hard drive space |At least 8 GB of free space, formatted using the NTFS file system for better security | -|Active Directory (AD) |Devices must be domain-joined | -|SQL Server |Microsoft SQL Server Enterprise Edition 2012 or later | -|Visual Studio |Visual Studio 2015 or later | -|Node.js® package manager |npm Developer version or higher | -|Additional server infrastructure |Internet Information Service (IIS) 6.0 or later | - -## Role assignments and available actions -Admins can assign roles to employees for the Enterprise Mode Site List Portal, allowing the employees to perform specific actions, as described in this table. - -|Role assignment |Available actions | -|----------------|------------------| -|Requester |

          • Create a change request


          • Validate changes in the pre-production environment


          • Rollback pre-production and production changes in case of failure


          • Send approval requests


          • View own requests


          • Sign off and close own requests
          | -|Approver

          (includes the App Manager and Group Head roles) |
          • All of the Requester actions, plus:


          • Approve requests
          | -|Administrator |
          • All of the Requester and Approver actions, plus:


          • Add employees to the portal


          • Assign employee roles


          • Approve registrations to the portal


          • Configure portal settings (for example, determine the freeze schedule, determine the pre-production and production XML paths, and determine the attachment upload location)


          • Use the standalone Enterprise Mode Site List Manager page


          • View reports
          | - -## Enterprise Mode Site List Portal workflow by employee role -The following workflow describes how to use the Enterprise Mode Site List Portal. - -1. [The Requester submits a change request for an app](create-change-request-enterprise-mode-portal.md) - -2. [The Requester tests the change request info, verifying its accuracy](verify-changes-preprod-enterprise-mode-portal.md) - -3. [The Approver(s) group accepts the change request](approve-change-request-enterprise-mode-portal.md) - -4. [The Requester schedules the change for the production environment](schedule-production-change-enterprise-mode-portal.md) - -5. [The change is verified against the production site list and signed off](verify-changes-production-enterprise-mode-portal.md) - - -## Related topics -- [Set up the Enterprise Mode Site List Portal](set-up-enterprise-mode-portal.md) - -- [Workflow-based processes for employees using the Enterprise Mode Site List Portal](workflow-processes-enterprise-mode-portal.md) - -- [How to use the Enterprise Mode Site List Manager tool or page](use-the-enterprise-mode-site-list-manager.md) - -- [Enterprise Mode Site List Portal source code](https://github.com/MicrosoftEdge/enterprise-mode-site-list-portal) - -- [Enterprise Mode and the Enterprise Mode Site List](what-is-enterprise-mode.md) -  - -  - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: appcompat +description: Use the topics in this section to learn about how to use the Enterprise Mode Site List Portal. +ms.prod: ie11 +title: Use the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +ms.reviewer: +audience: itproanager: dansimp +ms.author: dansimp +author: dansimp +--- + +# Use the Enterprise Mode Site List Portal + +**Applies to:** + +- Windows 10 +- Windows 8.1 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2008 R2 with Service Pack 1 (SP1) + +Enterprise Mode is a compatibility mode that runs on Internet Explorer 11, letting websites render using a modified browser configuration that’s designed to emulate either Windows Internet Explorer 8 or Windows Internet Explorer 7, avoiding the common compatibility problems associated with web apps written and tested on older versions of Internet Explorer. + +The Enterprise Mode Site List Portal is an open-source web tool on GitHub that allows you to manage your Enterprise Mode Site List, hosted by the app, with multiple users. The portal is designed to use IIS and a SQL Server backend, leveraging Active Directory (AD) for employee management. Updates to your site list are made by submitting new change requests, which are then approved by a designated group of people, put into a pre-production environment for testing, and then deployed immediately, or scheduled for deployment later. + +You can use IE11 and the Enterprise Mode Site List Portal to manage your Enterprise Mode Site List, hosted by the app, with multiple users. + +## Minimum system requirements for portal and test machines +Some of the components in this table might also need additional system resources. Check the component's documentation for more information. + +|Item |Description | +|-----|------------| +|Operating system |Windows 7 or later | +|Memory |16 GB RAM | +|Hard drive space |At least 8 GB of free space, formatted using the NTFS file system for better security | +|Active Directory (AD) |Devices must be domain-joined | +|SQL Server |Microsoft SQL Server Enterprise Edition 2012 or later | +|Visual Studio |Visual Studio 2015 or later | +|Node.js® package manager |npm Developer version or higher | +|Additional server infrastructure |Internet Information Service (IIS) 6.0 or later | + +## Role assignments and available actions +Admins can assign roles to employees for the Enterprise Mode Site List Portal, allowing the employees to perform specific actions, as described in this table. + +|Role assignment |Available actions | +|----------------|------------------| +|Requester |
          • Create a change request


          • Validate changes in the pre-production environment


          • Rollback pre-production and production changes in case of failure


          • Send approval requests


          • View own requests


          • Sign off and close own requests
          | +|Approver

          (includes the App Manager and Group Head roles) |
          • All of the Requester actions, plus:


          • Approve requests
          | +|Administrator |
          • All of the Requester and Approver actions, plus:


          • Add employees to the portal


          • Assign employee roles


          • Approve registrations to the portal


          • Configure portal settings (for example, determine the freeze schedule, determine the pre-production and production XML paths, and determine the attachment upload location)


          • Use the standalone Enterprise Mode Site List Manager page


          • View reports
          | + +## Enterprise Mode Site List Portal workflow by employee role +The following workflow describes how to use the Enterprise Mode Site List Portal. + +1. [The Requester submits a change request for an app](create-change-request-enterprise-mode-portal.md) + +2. [The Requester tests the change request info, verifying its accuracy](verify-changes-preprod-enterprise-mode-portal.md) + +3. [The Approver(s) group accepts the change request](approve-change-request-enterprise-mode-portal.md) + +4. [The Requester schedules the change for the production environment](schedule-production-change-enterprise-mode-portal.md) + +5. [The change is verified against the production site list and signed off](verify-changes-production-enterprise-mode-portal.md) + + +## Related topics +- [Set up the Enterprise Mode Site List Portal](set-up-enterprise-mode-portal.md) + +- [Workflow-based processes for employees using the Enterprise Mode Site List Portal](workflow-processes-enterprise-mode-portal.md) + +- [How to use the Enterprise Mode Site List Manager tool or page](use-the-enterprise-mode-site-list-manager.md) + +- [Enterprise Mode Site List Portal source code](https://github.com/MicrosoftEdge/enterprise-mode-site-list-portal) + +- [Enterprise Mode and the Enterprise Mode Site List](what-is-enterprise-mode.md) +  + +  + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/use-the-enterprise-mode-site-list-manager.md b/browsers/internet-explorer/ie11-deploy-guide/use-the-enterprise-mode-site-list-manager.md index 34f58b78f4..58ffc300ce 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/use-the-enterprise-mode-site-list-manager.md +++ b/browsers/internet-explorer/ie11-deploy-guide/use-the-enterprise-mode-site-list-manager.md @@ -1,70 +1,71 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: appcompat -description: Use the topics in this section to learn about how to use the Enterprise Mode Site List Manager. -author: lomayor -ms.prod: ie11 -ms.assetid: f4dbed4c-08ff-40b1-ab3f-60d3b6e8ec9b -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Use the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 12/04/2017 ---- - - -# Use the Enterprise Mode Site List Manager - -**Applies to:** - -- Windows 10 -- Windows 8.1 -- Windows 7 -- Windows Server 2012 R2 -- Windows Server 2008 R2 with Service Pack 1 (SP1) - -Enterprise Mode is a compatibility mode that runs on Internet Explorer 11, letting websites render using a modified browser configuration that’s designed to emulate either Windows Internet Explorer 8 or Windows Internet Explorer 7, avoiding the common compatibility problems associated with web apps written and tested on older versions of Internet Explorer. - -You can use IE11 and the Enterprise Mode Site List Manager to add individual website domains and domain paths and to specify whether the site renders using Enterprise Mode or the default mode. - -## Enterprise Mode Site List Manager versions -There are currently two versions of the Enterprise Site List Manager, both based on your schema and operating system. Download the [Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853) or the [Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378) tool, based on your operating system. - -|Schema version |Operating system |Enterprise Site List Manager version | -|-----------------|---------------|------------------------------------| -|Enterprise Mode schema, version 2 (v.2) |Windows 10
          -OR-
          Windows 8.1
          -OR-
          Windows 7|Uses the Enterprise Mode Site List Manager (schema v.2) and the v.2 version of the schema. If you import a v.1 version schema into the Enterprise Mode Site List Manager (schema v.2), the XML is saved into the v.2 version of the schema.

          For more info about the v.2 version of the schema, see [Enterprise Mode schema v.2 guidance](enterprise-mode-schema-version-2-guidance.md).| -|Enterprise Mode schema, version 1 (v.1) |Windows 10
          -OR-
          Windows 8.1
          -OR-
          Windows 7|Uses the Enterprise Mode Site List Manager (schema v.1) and the v.1 version of the schema.

          For more info about the v.1 version of the schema, see [Enterprise Mode schema v.1 guidance](enterprise-mode-schema-version-1-guidance.md)| - -## Using the Enterprise Mode Site List Manager -The following topics give you more information about the things that you can do with the Enterprise Mode Site List Manager. - -|Topic |Description | -|------|------------| -|[Add sites to the Enterprise Mode site list using the Enterprise Mode Site List Manager (schema v.2)](add-single-sites-to-enterprise-mode-site-list-using-the-version-2-enterprise-mode-tool.md) |How to add websites to your site list using the Enterprise Mode Site List Manager (schema v.2). | -|[Add sites to the Enterprise Mode site list using the Enterprise Mode Site List Manager (schema v.1)](add-single-sites-to-enterprise-mode-site-list-using-the-version-1-enterprise-mode-tool.md) |How to add websites to your site list using the Enterprise Mode Site List Manager (schema v.1). | -|[Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.2)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md) |How to add several websites to your site list at the same time, using a text or XML file and the Enterprise Mode Site List Manager (schema v.2). | -|[Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.1)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md) |How to add several websites to your site list at the same time, using a text or XML file and the WEnterprise Mode Site List Manager (schema v.1). | -|[Edit the Enterprise Mode site list using the Enterprise Mode Site List Manager](edit-the-enterprise-mode-site-list-using-the-enterprise-mode-site-list-manager.md) |How to edit the compatibility mode for specific websites.

          This topic applies to both versions of the Enterprise Mode Site List Manager. | -|[Fix validation problems using the Enterprise Mode Site List Manager](fix-validation-problems-using-the-enterprise-mode-site-list-manager.md) |How to fix common site list validation errors.

          This topic applies to both versions of the Enterprise Mode Site List Manager. | -|[Search your Enterprise Mode site list in the Enterprise Mode Site List Manager](search-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md) |How to look to see if a site is already in your global Enterprise Mode site list.

          This topic applies to both versions of the Enterprise Mode Site List Manager. | -|[Save your site list to XML in the Enterprise Mode Site List Manager](save-your-site-list-to-xml-in-the-enterprise-mode-site-list-manager.md) |How to save a site list as XML, so you can deploy and use it with your managed systems.

          This topic applies to both versions of the Enterprise Mode Site List Manager. | -|[Export your Enterprise Mode site list from the Enterprise Mode Site List Manager](export-your-enterprise-mode-site-list-from-the-enterprise-mode-site-list-manager.md) |How to export your site list so you can transfer your data and contents to someone else.

          This topic applies to both versions of the Enterprise Mode Site List Manager. | -|[Import your Enterprise Mode site list to the Enterprise Mode Site List Manager](import-into-the-enterprise-mode-site-list-manager.md) |How to import your site list to replace a corrupted or out-of-date list.

          This topic applies to both versions of the Enterprise Mode Site List Manager. | -|[Delete sites from your Enterprise Mode site list in the Enterprise Mode Site List Manager](delete-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md) |How to delete a website from your site list.

          This topic applies to both versions of the Enterprise Mode Site List Manager. | -|[Remove all sites from your Enterprise Mode site list in the Enterprise Mode Site List Manager](remove-all-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md) |How to delete all of the websites in a site list.

          This topic applies to both versions of the Enterprise Mode Site List Manager. | - -## Related topics - - -- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853) -- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378) -- [Enterprise Mode schema v.2 guidance](enterprise-mode-schema-version-2-guidance.md) -- [Enterprise Mode schema v.1 guidance](enterprise-mode-schema-version-1-guidance.md) -  - -  - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: appcompat +description: Use the topics in this section to learn about how to use the Enterprise Mode Site List Manager. +author: dansimp +ms.prod: ie11 +ms.assetid: f4dbed4c-08ff-40b1-ab3f-60d3b6e8ec9b +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Use the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 12/04/2017 +--- + + +# Use the Enterprise Mode Site List Manager + +**Applies to:** + +- Windows 10 +- Windows 8.1 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2008 R2 with Service Pack 1 (SP1) + +Enterprise Mode is a compatibility mode that runs on Internet Explorer 11, letting websites render using a modified browser configuration that’s designed to emulate either Windows Internet Explorer 8 or Windows Internet Explorer 7, avoiding the common compatibility problems associated with web apps written and tested on older versions of Internet Explorer. + +You can use IE11 and the Enterprise Mode Site List Manager to add individual website domains and domain paths and to specify whether the site renders using Enterprise Mode or the default mode. + +## Enterprise Mode Site List Manager versions +There are currently two versions of the Enterprise Site List Manager, both based on your schema and operating system. Download the [Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853) or the [Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378) tool, based on your operating system. + +|Schema version |Operating system |Enterprise Site List Manager version | +|-----------------|---------------|------------------------------------| +|Enterprise Mode schema, version 2 (v.2) |Windows 10
          -OR-
          Windows 8.1
          -OR-
          Windows 7|Uses the Enterprise Mode Site List Manager (schema v.2) and the v.2 version of the schema. If you import a v.1 version schema into the Enterprise Mode Site List Manager (schema v.2), the XML is saved into the v.2 version of the schema.

          For more info about the v.2 version of the schema, see [Enterprise Mode schema v.2 guidance](enterprise-mode-schema-version-2-guidance.md).| +|Enterprise Mode schema, version 1 (v.1) |Windows 10
          -OR-
          Windows 8.1
          -OR-
          Windows 7|Uses the Enterprise Mode Site List Manager (schema v.1) and the v.1 version of the schema.

          For more info about the v.1 version of the schema, see [Enterprise Mode schema v.1 guidance](enterprise-mode-schema-version-1-guidance.md)| + +## Using the Enterprise Mode Site List Manager +The following topics give you more information about the things that you can do with the Enterprise Mode Site List Manager. + +|Topic |Description | +|------|------------| +|[Add sites to the Enterprise Mode site list using the Enterprise Mode Site List Manager (schema v.2)](add-single-sites-to-enterprise-mode-site-list-using-the-version-2-enterprise-mode-tool.md) |How to add websites to your site list using the Enterprise Mode Site List Manager (schema v.2). | +|[Add sites to the Enterprise Mode site list using the Enterprise Mode Site List Manager (schema v.1)](add-single-sites-to-enterprise-mode-site-list-using-the-version-1-enterprise-mode-tool.md) |How to add websites to your site list using the Enterprise Mode Site List Manager (schema v.1). | +|[Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.2)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md) |How to add several websites to your site list at the same time, using a text or XML file and the Enterprise Mode Site List Manager (schema v.2). | +|[Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.1)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md) |How to add several websites to your site list at the same time, using a text or XML file and the WEnterprise Mode Site List Manager (schema v.1). | +|[Edit the Enterprise Mode site list using the Enterprise Mode Site List Manager](edit-the-enterprise-mode-site-list-using-the-enterprise-mode-site-list-manager.md) |How to edit the compatibility mode for specific websites.

          This topic applies to both versions of the Enterprise Mode Site List Manager. | +|[Fix validation problems using the Enterprise Mode Site List Manager](fix-validation-problems-using-the-enterprise-mode-site-list-manager.md) |How to fix common site list validation errors.

          This topic applies to both versions of the Enterprise Mode Site List Manager. | +|[Search your Enterprise Mode site list in the Enterprise Mode Site List Manager](search-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md) |How to look to see if a site is already in your global Enterprise Mode site list.

          This topic applies to both versions of the Enterprise Mode Site List Manager. | +|[Save your site list to XML in the Enterprise Mode Site List Manager](save-your-site-list-to-xml-in-the-enterprise-mode-site-list-manager.md) |How to save a site list as XML, so you can deploy and use it with your managed systems.

          This topic applies to both versions of the Enterprise Mode Site List Manager. | +|[Export your Enterprise Mode site list from the Enterprise Mode Site List Manager](export-your-enterprise-mode-site-list-from-the-enterprise-mode-site-list-manager.md) |How to export your site list so you can transfer your data and contents to someone else.

          This topic applies to both versions of the Enterprise Mode Site List Manager. | +|[Import your Enterprise Mode site list to the Enterprise Mode Site List Manager](import-into-the-enterprise-mode-site-list-manager.md) |How to import your site list to replace a corrupted or out-of-date list.

          This topic applies to both versions of the Enterprise Mode Site List Manager. | +|[Delete sites from your Enterprise Mode site list in the Enterprise Mode Site List Manager](delete-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md) |How to delete a website from your site list.

          This topic applies to both versions of the Enterprise Mode Site List Manager. | +|[Remove all sites from your Enterprise Mode site list in the Enterprise Mode Site List Manager](remove-all-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md) |How to delete all of the websites in a site list.

          This topic applies to both versions of the Enterprise Mode Site List Manager. | + +## Related topics + + +- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853) +- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378) +- [Enterprise Mode schema v.2 guidance](enterprise-mode-schema-version-2-guidance.md) +- [Enterprise Mode schema v.1 guidance](enterprise-mode-schema-version-1-guidance.md) +  + +  + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/user-interface-problems-with-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/user-interface-problems-with-ie11.md index 992abebb63..3a1f3b4596 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/user-interface-problems-with-ie11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/user-interface-problems-with-ie11.md @@ -1,58 +1,59 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: support -description: Info about where features went in the IEAK11, where the Favorites, Command, and Status bars went, and where the search bar went. -author: lomayor -ms.prod: ie11 -ms.assetid: 7324faff-ccb6-4e14-ad91-af12dbca575e -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: User interface problems with Internet Explorer 11 (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# User interface problems with Internet Explorer 11 -Some of the features in both Internet Explorer 11 and IEAK 11 have moved around. Here are some of the more common changes. - -## Where did features go in the Internet Explorer Customization Wizard 11? -Various installation or set up choices can prevent you from seeing certain pages in the Internet Explorer Customization Wizard 11. If, after going through the entire Wizard you still haven't found the screen you were looking for, try: - -- Making sure you picked the right version of IEAK 11 during installation. Most administrators should pick the **Internal** version, which has more screens and options available. - -- Making sure you picked all of the features you wanted from the **Feature Selection** page of the IE Customization Wizard 11. If you don't pick a feature, the associated page won't appear. - -## Where are the security zone settings? -You can see your security zone settings by opening Internet Explorer for the desktop, clicking **Internet Options** from the **Tools** menu, and then clicking **Security**. - -## Where did the Favorites, Command, and Status bars go? -For IE11, the UI has been changed to provide just the controls needed to support essential functionality, hiding anything considered non-essential, such as the **Favorites Bar**, **Command Bar**, **Menu Bar**, and **Status Bar**. This is intended to help focus users on the content of the page, rather than the browser itself. However, if you want these bars to appear, you can turn them back on using Group Policy settings. - - **To turn the toolbars back on** - -- Right click in the IE toolbar heading and choose to turn on the **Command bar**, **Favorites bar**, and **Status bar** from the menu. -

          -OR-

          - In IE, press ALT+V to show the View menu, press T to enter the Toolbars menu, and then press: - - - **C** to turn on the **Command Bar** - - - **F** to turn on the **Favorites Bar** - - - **S** to turn on the **Status Bar** - -## Where did the search box go? -IE11 uses the **One Box** feature, which lets users type search terms directly into the **Address bar**. Any text entered into the **Address bar** that doesn't appear to be a URL is automatically sent to the currently selected search provider. - ->[!NOTE] ->Depending on how you've set up your intranet search, the text entry might resolve to an intranet site. For more information about this, see [Intranet problems with Internet Explorer 11](intranet-problems-and-ie11.md). - - - - - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: support +description: Info about where features went in the IEAK11, where the Favorites, Command, and Status bars went, and where the search bar went. +author: dansimp +ms.prod: ie11 +ms.assetid: 7324faff-ccb6-4e14-ad91-af12dbca575e +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: User interface problems with Internet Explorer 11 (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# User interface problems with Internet Explorer 11 +Some of the features in both Internet Explorer 11 and IEAK 11 have moved around. Here are some of the more common changes. + +## Where did features go in the Internet Explorer Customization Wizard 11? +Various installation or set up choices can prevent you from seeing certain pages in the Internet Explorer Customization Wizard 11. If, after going through the entire Wizard you still haven't found the screen you were looking for, try: + +- Making sure you picked the right version of IEAK 11 during installation. Most administrators should pick the **Internal** version, which has more screens and options available. + +- Making sure you picked all of the features you wanted from the **Feature Selection** page of the IE Customization Wizard 11. If you don't pick a feature, the associated page won't appear. + +## Where are the security zone settings? +You can see your security zone settings by opening Internet Explorer for the desktop, clicking **Internet Options** from the **Tools** menu, and then clicking **Security**. + +## Where did the Favorites, Command, and Status bars go? +For IE11, the UI has been changed to provide just the controls needed to support essential functionality, hiding anything considered non-essential, such as the **Favorites Bar**, **Command Bar**, **Menu Bar**, and **Status Bar**. This is intended to help focus users on the content of the page, rather than the browser itself. However, if you want these bars to appear, you can turn them back on using Group Policy settings. + + **To turn the toolbars back on** + +- Right click in the IE toolbar heading and choose to turn on the **Command bar**, **Favorites bar**, and **Status bar** from the menu. +

          -OR-

          + In IE, press ALT+V to show the View menu, press T to enter the Toolbars menu, and then press: + + - **C** to turn on the **Command Bar** + + - **F** to turn on the **Favorites Bar** + + - **S** to turn on the **Status Bar** + +## Where did the search box go? +IE11 uses the **One Box** feature, which lets users type search terms directly into the **Address bar**. Any text entered into the **Address bar** that doesn't appear to be a URL is automatically sent to the currently selected search provider. + +>[!NOTE] +>Depending on how you've set up your intranet search, the text entry might resolve to an intranet site. For more information about this, see [Intranet problems with Internet Explorer 11](intranet-problems-and-ie11.md). + + + + + + + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/using-enterprise-mode.md b/browsers/internet-explorer/ie11-deploy-guide/using-enterprise-mode.md index 2368c10f34..6bff79cc82 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/using-enterprise-mode.md +++ b/browsers/internet-explorer/ie11-deploy-guide/using-enterprise-mode.md @@ -1,60 +1,61 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: security -description: Use this section to learn about how to turn on and use IE7 Enterprise Mode or IE8 Enterprise Mode. -author: lomayor -ms.prod: ie11 -ms.assetid: 238ead3d-8920-429a-ac23-02f089c4384a -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Using IE7 Enterprise Mode or IE8 Enterprise Mode (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Using IE7 Enterprise Mode or IE8 Enterprise Mode - -**Applies to:** - -- Windows 10 -- Windows 8.1 -- Windows 7 -- Windows Server 2012 R2 -- Windows Server 2008 R2 with Service Pack 1 (SP1) - -Enterprise Mode gives you a way for your legacy websites and apps to run using emulated versions of Windows Internet Explorer 7 or Windows Internet Explorer 8, while your new sites and apps run using Internet Explorer 11, including modern standards and features. - -Although it’s called IE7 Enterprise Mode, it actually turns on Enterprise Mode along with Internet Explorer 7 or Microsoft Internet Explorer 5 Compatibility View. Compatibility View chooses which document mode to use based on whether there’s a `DOCTYPE` tag in your code: - -- **DOCTYPE tag found.** Webpages render using the Internet Explorer 7 document mode. -- **No DOCTYPE tag found.** Webpages render using the Internet Explorer 5 document mode. - -**Important**
          -Because we’ve added the IE7 Enterprise Mode option, we’ve had to rename the original functionality of Enterprise Mode to be IE8 Enterprise Mode. We’ve also replaced Edge Mode with IE11 Document Mode, so you can explicitly use IE11 on Windows 10. - -## Turning on and using IE7 Enterprise Mode or IE8 Enterprise Mode -For instructions about how to add IE7 Enterprise Mode or IE8 Enterprise Mode to your webpages and apps, see: - -- [Add single sites to the Enterprise Mode site list using the Enterprise Mode Site List Manager (schema v.2)](add-single-sites-to-enterprise-mode-site-list-using-the-version-2-enterprise-mode-tool.md) - -- [Add single sites to the Enterprise Mode site list using the Enterprise Mode Site List Manager (schema v.1)](add-single-sites-to-enterprise-mode-site-list-using-the-version-1-enterprise-mode-tool.md) - -- [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.2)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md) - -- [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.1)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md) - -For instructions and more info about how to fix your compatibility issues using Enterprise Mode, see [Fix web compatibility issues using document modes and the Enterprise Mode site list](fix-compat-issues-with-doc-modes-and-enterprise-mode-site-list.md). - -## Related topics -- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853) -- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378) -- [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) -  - -  - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: security +description: Use this section to learn about how to turn on and use IE7 Enterprise Mode or IE8 Enterprise Mode. +author: dansimp +ms.prod: ie11 +ms.assetid: 238ead3d-8920-429a-ac23-02f089c4384a +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Using IE7 Enterprise Mode or IE8 Enterprise Mode (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Using IE7 Enterprise Mode or IE8 Enterprise Mode + +**Applies to:** + +- Windows 10 +- Windows 8.1 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2008 R2 with Service Pack 1 (SP1) + +Enterprise Mode gives you a way for your legacy websites and apps to run using emulated versions of Windows Internet Explorer 7 or Windows Internet Explorer 8, while your new sites and apps run using Internet Explorer 11, including modern standards and features. + +Although it’s called IE7 Enterprise Mode, it actually turns on Enterprise Mode along with Internet Explorer 7 or Microsoft Internet Explorer 5 Compatibility View. Compatibility View chooses which document mode to use based on whether there’s a `DOCTYPE` tag in your code: + +- **DOCTYPE tag found.** Webpages render using the Internet Explorer 7 document mode. +- **No DOCTYPE tag found.** Webpages render using the Internet Explorer 5 document mode. + +**Important**
          +Because we’ve added the IE7 Enterprise Mode option, we’ve had to rename the original functionality of Enterprise Mode to be IE8 Enterprise Mode. We’ve also replaced Edge Mode with IE11 Document Mode, so you can explicitly use IE11 on Windows 10. + +## Turning on and using IE7 Enterprise Mode or IE8 Enterprise Mode +For instructions about how to add IE7 Enterprise Mode or IE8 Enterprise Mode to your webpages and apps, see: + +- [Add single sites to the Enterprise Mode site list using the Enterprise Mode Site List Manager (schema v.2)](add-single-sites-to-enterprise-mode-site-list-using-the-version-2-enterprise-mode-tool.md) + +- [Add single sites to the Enterprise Mode site list using the Enterprise Mode Site List Manager (schema v.1)](add-single-sites-to-enterprise-mode-site-list-using-the-version-1-enterprise-mode-tool.md) + +- [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.2)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md) + +- [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.1)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md) + +For instructions and more info about how to fix your compatibility issues using Enterprise Mode, see [Fix web compatibility issues using document modes and the Enterprise Mode site list](fix-compat-issues-with-doc-modes-and-enterprise-mode-site-list.md). + +## Related topics +- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853) +- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378) +- [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) +  + +  + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/using-ieak11-to-create-install-packages.md b/browsers/internet-explorer/ie11-deploy-guide/using-ieak11-to-create-install-packages.md index d744070926..710c69e3cb 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/using-ieak11-to-create-install-packages.md +++ b/browsers/internet-explorer/ie11-deploy-guide/using-ieak11-to-create-install-packages.md @@ -1,66 +1,67 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: How to use IEAK 11 while planning, customizing, and building the custom installation package. -author: lomayor -ms.prod: ie11 -ms.assetid: af93742f-f955-44ab-bfa2-7bf0c99045d3 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Using Internet Explorer Administration Kit 11 (IEAK 11) to create packages (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Using Internet Explorer Administration Kit 11 (IEAK 11) to create packages -Internet Explorer Administration Kit 11 (IEAK 11) helps you set up, deploy, and maintain Internet Explorer 11. - -**Note**
          IEAK 11 works in network environments, with or without Microsoft Active Directory. - -  - -## Plan, Customize, and Build with the IEAK 11 -Consider these activities while planning, customizing, and building the custom installation package. - -### Plan -Before you begin, you should: - -- **Check the operating system requirements.** Check that the requirements for the computer you're building your installation package from, and the computers you're installing IE11 to, all meet the system requirements for IEAK 11 and IE11. For Internet Explorer requirements, see [System requirements and language support for Internet Explorer 11 (IE11)](system-requirements-and-language-support-for-ie11.md). For IEAK 11 requirements, see [Internet Explorer Administration Kit 11 (IEAK 11) - Administration Guide for IT Pros](../ie11-ieak/index.md). - -- **Decide on your distribution method.** Decide how to distribute your custom installation package: Windows Update, System Center System Center 2012 R2 Configuration Manager, or your network. - -- **Gather URLs and branding and custom graphics.** Collect the URLs for your company's own **Home**, **Search**, and **Support** pages, plus any custom branding and graphic files for the browser toolbar button and the **Favorites** list icons. - -- **Identify trusted network servers.** Decide which servers your employees should use to install the custom IE package. These servers need to be listed as trusted sites. - -- **Set up automatic detection and configuration settings.** Decide whether to automatically customize IE11 the first time it's started. - -- **Identify custom components for uninstallation.** Decide whether to include any custom uninstallation programs. Uninstallation programs let your employees remove your custom components through **Uninstall or change a program** in the Control Panel. - -- **Identify ActiveX controls.** Decide if you'll use ActiveX controls in your company. If you already use ActiveX, you should get an inventory of your active controls. - -### Customize and build -After installing IE11 and the IEAK 11, you should: - -- **Prepare your build computer.** Create your build environment on the computer you're using to build the custom package. - -- **Create your branding and custom graphics.** If you don't have any, create custom branding and graphic files for the browser toolbar button and icons in your **Favorites** list. - -- **Specify your servers as trusted sites.** Identify your installation servers as trusted sites, in the **Trusted sites zone** of the **Internet Options** box. - -- **Turn on automatic detection and configuration settings (Optional).** Set up your network so that IE is automatically customized the first time it's started. - -- **Set up custom components for uninstallation.** Create the custom .inf file you'll use to register your custom uninstallation programs. - -- **Set up ActiveX controls.** Add any new ActiveX controls to the Axaa.adm file, using a text editor. - -- **Create a custom browser package.** Create your custom installation package, using IE Customization Wizard 11. For more information about using the wizard, see [Internet Explorer Administration Kit 11 (IEAK 11) Customization Wizard options](../ie11-ieak/ieak11-wizard-custom-options.md). - -  - -  - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: How to use IEAK 11 while planning, customizing, and building the custom installation package. +author: dansimp +ms.prod: ie11 +ms.assetid: af93742f-f955-44ab-bfa2-7bf0c99045d3 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Using Internet Explorer Administration Kit 11 (IEAK 11) to create packages (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Using Internet Explorer Administration Kit 11 (IEAK 11) to create packages +Internet Explorer Administration Kit 11 (IEAK 11) helps you set up, deploy, and maintain Internet Explorer 11. + +**Note**
          IEAK 11 works in network environments, with or without Microsoft Active Directory. + +  + +## Plan, Customize, and Build with the IEAK 11 +Consider these activities while planning, customizing, and building the custom installation package. + +### Plan +Before you begin, you should: + +- **Check the operating system requirements.** Check that the requirements for the computer you're building your installation package from, and the computers you're installing IE11 to, all meet the system requirements for IEAK 11 and IE11. For Internet Explorer requirements, see [System requirements and language support for Internet Explorer 11 (IE11)](system-requirements-and-language-support-for-ie11.md). For IEAK 11 requirements, see [Internet Explorer Administration Kit 11 (IEAK 11) - Administration Guide for IT Pros](../ie11-ieak/index.md). + +- **Decide on your distribution method.** Decide how to distribute your custom installation package: Windows Update, System Center System Center 2012 R2 Configuration Manager, or your network. + +- **Gather URLs and branding and custom graphics.** Collect the URLs for your company's own **Home**, **Search**, and **Support** pages, plus any custom branding and graphic files for the browser toolbar button and the **Favorites** list icons. + +- **Identify trusted network servers.** Decide which servers your employees should use to install the custom IE package. These servers need to be listed as trusted sites. + +- **Set up automatic detection and configuration settings.** Decide whether to automatically customize IE11 the first time it's started. + +- **Identify custom components for uninstallation.** Decide whether to include any custom uninstallation programs. Uninstallation programs let your employees remove your custom components through **Uninstall or change a program** in the Control Panel. + +- **Identify ActiveX controls.** Decide if you'll use ActiveX controls in your company. If you already use ActiveX, you should get an inventory of your active controls. + +### Customize and build +After installing IE11 and the IEAK 11, you should: + +- **Prepare your build computer.** Create your build environment on the computer you're using to build the custom package. + +- **Create your branding and custom graphics.** If you don't have any, create custom branding and graphic files for the browser toolbar button and icons in your **Favorites** list. + +- **Specify your servers as trusted sites.** Identify your installation servers as trusted sites, in the **Trusted sites zone** of the **Internet Options** box. + +- **Turn on automatic detection and configuration settings (Optional).** Set up your network so that IE is automatically customized the first time it's started. + +- **Set up custom components for uninstallation.** Create the custom .inf file you'll use to register your custom uninstallation programs. + +- **Set up ActiveX controls.** Add any new ActiveX controls to the Axaa.adm file, using a text editor. + +- **Create a custom browser package.** Create your custom installation package, using IE Customization Wizard 11. For more information about using the wizard, see [Internet Explorer Administration Kit 11 (IEAK 11) Customization Wizard options](../ie11-ieak/ieak11-wizard-custom-options.md). + +  + +  + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/using-inf-files-to-create-install-packages.md b/browsers/internet-explorer/ie11-deploy-guide/using-inf-files-to-create-install-packages.md index a49bf820ae..1f7b62dfa5 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/using-inf-files-to-create-install-packages.md +++ b/browsers/internet-explorer/ie11-deploy-guide/using-inf-files-to-create-install-packages.md @@ -1,45 +1,46 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: How to use Setup Information (.inf) files to create installation packages. -author: lomayor -ms.prod: ie11 -ms.assetid: 04fa2ba8-8d84-4af6-ab99-77e4f1961b0e -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Using Setup Information (.inf) files to create packages (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Using Setup Information (.inf) files to create install packages -IEAK 11 uses Setup information (.inf) files to provide uninstallation instructions. Uninstallation instructions let your employees remove components, like files, registry entries, or shortcuts, through the **Uninstall or change a program** box. For details about .inf files, see [INF File Sections and Directives](https://go.microsoft.com/fwlink/p/?LinkId=327959). - - **To add uninstallation instructions to the .inf files** - -- Open the Registry Editor (regedit.exe) and add these registry keys: - ``` - HKLM,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\app-name,"DisplayName",,"description" - HKLM,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\app-name,"UninstallString",,"command-line" - ``` - Where **"description"** is the name that shows up in the **Uninstall or change a program** box and **"command-line"** is the command that runs after the component is picked. -

          Note
          - Make sure your script removes the uninstallation registry key, too. Otherwise, the component name will continue to show up in the Uninstall or change a program. - -## Limitations -.Inf files have limitations: - -- You can't delete directories. - -- You can't use **RenFiles** to move a file to a different location, it only lets you rename a file in its existing location. For detailed information, see [INF RenFiles Directive](https://go.microsoft.com/fwlink/p/?LinkId=298508). - -- You can't use **CopyFiles** to copy a file to another place on your hard drive, it can only copy files from the source disk to the destination directory. For information, see [INF CopyFiles Directive](https://go.microsoft.com/fwlink/p/?LinkId=298510). - - - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: How to use Setup Information (.inf) files to create installation packages. +author: dansimp +ms.prod: ie11 +ms.assetid: 04fa2ba8-8d84-4af6-ab99-77e4f1961b0e +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Using Setup Information (.inf) files to create packages (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Using Setup Information (.inf) files to create install packages +IEAK 11 uses Setup information (.inf) files to provide uninstallation instructions. Uninstallation instructions let your employees remove components, like files, registry entries, or shortcuts, through the **Uninstall or change a program** box. For details about .inf files, see [INF File Sections and Directives](https://go.microsoft.com/fwlink/p/?LinkId=327959). + + **To add uninstallation instructions to the .inf files** + +- Open the Registry Editor (regedit.exe) and add these registry keys: + ``` + HKLM,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\app-name,"DisplayName",,"description" + HKLM,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\app-name,"UninstallString",,"command-line" + ``` + Where **"description"** is the name that shows up in the **Uninstall or change a program** box and **"command-line"** is the command that runs after the component is picked. +

          Note
          + Make sure your script removes the uninstallation registry key, too. Otherwise, the component name will continue to show up in the Uninstall or change a program. + +## Limitations +.Inf files have limitations: + +- You can't delete directories. + +- You can't use **RenFiles** to move a file to a different location, it only lets you rename a file in its existing location. For detailed information, see [INF RenFiles Directive](https://go.microsoft.com/fwlink/p/?LinkId=298508). + +- You can't use **CopyFiles** to copy a file to another place on your hard drive, it can only copy files from the source disk to the destination directory. For information, see [INF CopyFiles Directive](https://go.microsoft.com/fwlink/p/?LinkId=298510). + + + + + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/verify-changes-preprod-enterprise-mode-portal.md b/browsers/internet-explorer/ie11-deploy-guide/verify-changes-preprod-enterprise-mode-portal.md index 5c7c0a3d23..8a161b2ffb 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/verify-changes-preprod-enterprise-mode-portal.md +++ b/browsers/internet-explorer/ie11-deploy-guide/verify-changes-preprod-enterprise-mode-portal.md @@ -1,70 +1,71 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: appcompat -description: Details about how to make sure your change request info is accurate within the pre-production environment of the Enterprise Mode Site List Portal. -author: lomayor -ms.prod: ie11 -title: Verify your changes using the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor ---- - -# Verify your changes using the Enterprise Mode Site List Portal - -**Applies to:** - -- Windows 10 -- Windows 8.1 -- Windows 7 -- Windows Server 2012 R2 -- Windows Server 2008 R2 with Service Pack 1 (SP1) - ->[!Important] ->This step requires that each Requester have access to a test machine with Administrator rights, letting him or her get to the pre-production environment to make sure that the requested change is correct. - -The Requester successfully submits a change request to the Enterprise Mode Site List Portal and then gets an email, including: - -- **EMIE_RegKey**. A batch file that when run, sets the registry key to point to the local pre-production Enterprise Mode Site List. - -- **Test steps**. The suggested steps about how to test the change request details to make sure they're accurate in the pre-production environment. - -- **EMIE_Reset**. A batch file that when run, reverts the changes made to the pre-production registry. - -## Verify and send the change request to Approvers -The Requester tests the changes and then goes back into the Enterprise Mode Site List Portal, **Pre-production verification** page to verify whether the testing was successful. - -**To verify changes and send to the Approver(s)** -1. On the **Pre-production verification** page, the Requester clicks **Successful** and optionally includes any attachments (only .jpeg, .png, .jpg and .txt files are allowed) to support the change request and testing results. - -2. The Requester reviews the pre-defined Approver(s), and then clicks **Send for approval**. - - The Requester, the Approver group, and the Administrator group all get an email, stating that the change request is waiting for approval. - - -**To rollback your pre-production changes** -1. On the **Pre-production verification** page, the Requester clicks **Failed** and optionally includes any attachments (only .jpeg, .png, .jpg and .txt files are allowed) to support the change request and testing results. - -2. Add a description about the issue into the **Issue description** box, and then click **Send failure details**. - - The change request and issue info are sent to the Administrators. - -3. The Requester clicks **Roll back** to roll back the changes in the pre-production environment. - - After the Requester rolls back the changes, the request can be updated and re-submitted. - - -## View rolled back change requests -The original Requester and the Administrator(s) group can view the rolled back change requests. - -**To view the rolled back change request** - -- In the Enterprise Mode Site List Portal, click **Rolled back** from the left pane. - - All rolled back change requests appear, with role assignment determining which ones are visible. - -## Next steps -If the change request is certified as successful, the Requester must next send it to the Approvers for approval. For the Approver-related steps, see the [Approve a change request using the Enterprise Mode Site List Portal](approve-change-request-enterprise-mode-portal.md) topic. +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: appcompat +description: Details about how to make sure your change request info is accurate within the pre-production environment of the Enterprise Mode Site List Portal. +author: dansimp +ms.prod: ie11 +title: Verify your changes using the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +--- + +# Verify your changes using the Enterprise Mode Site List Portal + +**Applies to:** + +- Windows 10 +- Windows 8.1 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2008 R2 with Service Pack 1 (SP1) + +>[!Important] +>This step requires that each Requester have access to a test machine with Administrator rights, letting him or her get to the pre-production environment to make sure that the requested change is correct. + +The Requester successfully submits a change request to the Enterprise Mode Site List Portal and then gets an email, including: + +- **EMIE_RegKey**. A batch file that when run, sets the registry key to point to the local pre-production Enterprise Mode Site List. + +- **Test steps**. The suggested steps about how to test the change request details to make sure they're accurate in the pre-production environment. + +- **EMIE_Reset**. A batch file that when run, reverts the changes made to the pre-production registry. + +## Verify and send the change request to Approvers +The Requester tests the changes and then goes back into the Enterprise Mode Site List Portal, **Pre-production verification** page to verify whether the testing was successful. + +**To verify changes and send to the Approver(s)** +1. On the **Pre-production verification** page, the Requester clicks **Successful** and optionally includes any attachments (only .jpeg, .png, .jpg and .txt files are allowed) to support the change request and testing results. + +2. The Requester reviews the pre-defined Approver(s), and then clicks **Send for approval**. + + The Requester, the Approver group, and the Administrator group all get an email, stating that the change request is waiting for approval. + + +**To rollback your pre-production changes** +1. On the **Pre-production verification** page, the Requester clicks **Failed** and optionally includes any attachments (only .jpeg, .png, .jpg and .txt files are allowed) to support the change request and testing results. + +2. Add a description about the issue into the **Issue description** box, and then click **Send failure details**. + + The change request and issue info are sent to the Administrators. + +3. The Requester clicks **Roll back** to roll back the changes in the pre-production environment. + + After the Requester rolls back the changes, the request can be updated and re-submitted. + + +## View rolled back change requests +The original Requester and the Administrator(s) group can view the rolled back change requests. + +**To view the rolled back change request** + +- In the Enterprise Mode Site List Portal, click **Rolled back** from the left pane. + + All rolled back change requests appear, with role assignment determining which ones are visible. + +## Next steps +If the change request is certified as successful, the Requester must next send it to the Approvers for approval. For the Approver-related steps, see the [Approve a change request using the Enterprise Mode Site List Portal](approve-change-request-enterprise-mode-portal.md) topic. diff --git a/browsers/internet-explorer/ie11-deploy-guide/verify-changes-production-enterprise-mode-portal.md b/browsers/internet-explorer/ie11-deploy-guide/verify-changes-production-enterprise-mode-portal.md index 5678e10583..42db6c85c5 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/verify-changes-production-enterprise-mode-portal.md +++ b/browsers/internet-explorer/ie11-deploy-guide/verify-changes-production-enterprise-mode-portal.md @@ -1,45 +1,46 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: appcompat -description: Details about how the Requester makes sure that the change request update is accurate within the production environment using the Enterprise Mode Site List Portal. -author: lomayor -ms.prod: ie11 -title: Verify the change request update in the production environment using the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor ---- - -# Verify the change request update in the production environment using the Enterprise Mode Site List Portal - -**Applies to:** - -- Windows 10 -- Windows 8.1 -- Windows 7 -- Windows Server 2012 R2 -- Windows Server 2008 R2 with Service Pack 1 (SP1) - -## Verify and sign off on the update in the production environment -The Requester tests the changes in the production environment and then goes back into the Enterprise Mode Site List Portal, **Production verification** page to verify whether the testing was successful. - -**To verify the changes and sign off** -- On the **Production verification** page, the Requester clicks **Successful**, optionally includes any attachments (only .jpeg, .png, .jpg and .txt files are allowed) to support the testing results, optionally includes a description of the change, and then clicks **Sign off**. - - The Requester, Approver group, and Administrator group all get an email, stating that the change request has been signed off. - - -**To rollback production changes** -1. On the **Production verification** page, the Requester clicks **Failed** and optionally includes any attachments (only .jpeg, .png, .jpg and .txt files are allowed) to support the testing results. - -2. Add a description about the issue into the **Change description** box, and then click **Send failure details**. - - The info is sent to the Administrators. - -3. The Requester clicks **Roll back** to roll back the changes in the production environment. - - After the Requester rolls back the changes, the request is automatically handled in the production and pre-production environment site lists. - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: appcompat +description: Details about how the Requester makes sure that the change request update is accurate within the production environment using the Enterprise Mode Site List Portal. +author: dansimp +ms.prod: ie11 +title: Verify the change request update in the production environment using the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +--- + +# Verify the change request update in the production environment using the Enterprise Mode Site List Portal + +**Applies to:** + +- Windows 10 +- Windows 8.1 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2008 R2 with Service Pack 1 (SP1) + +## Verify and sign off on the update in the production environment +The Requester tests the changes in the production environment and then goes back into the Enterprise Mode Site List Portal, **Production verification** page to verify whether the testing was successful. + +**To verify the changes and sign off** +- On the **Production verification** page, the Requester clicks **Successful**, optionally includes any attachments (only .jpeg, .png, .jpg and .txt files are allowed) to support the testing results, optionally includes a description of the change, and then clicks **Sign off**. + + The Requester, Approver group, and Administrator group all get an email, stating that the change request has been signed off. + + +**To rollback production changes** +1. On the **Production verification** page, the Requester clicks **Failed** and optionally includes any attachments (only .jpeg, .png, .jpg and .txt files are allowed) to support the testing results. + +2. Add a description about the issue into the **Change description** box, and then click **Send failure details**. + + The info is sent to the Administrators. + +3. The Requester clicks **Roll back** to roll back the changes in the production environment. + + After the Requester rolls back the changes, the request is automatically handled in the production and pre-production environment site lists. + diff --git a/browsers/internet-explorer/ie11-deploy-guide/view-apps-enterprise-mode-site-list.md b/browsers/internet-explorer/ie11-deploy-guide/view-apps-enterprise-mode-site-list.md index 3c60851368..2be252275c 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/view-apps-enterprise-mode-site-list.md +++ b/browsers/internet-explorer/ie11-deploy-guide/view-apps-enterprise-mode-site-list.md @@ -1,41 +1,42 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: appcompat -description: Details about how to view the active Enterprise Mode Site List from the Enterprise Mode Site List Portal. -author: lomayor -ms.prod: ie11 -title: View the apps included in the active Enterprise Mode Site List from the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor ---- - -# View the apps included in the active Enterprise Mode Site List from the Enterprise Mode Site List Portal - -**Applies to:** - -- Windows 10 -- Windows 8.1 -- Windows 7 -- Windows Server 2012 R2 -- Windows Server 2008 R2 with Service Pack 1 (SP1) - -Any employee with access to the Enterprise Mode Site List Portal can view the apps included in the current Enterprise Mode Site List. - -**To view the active Enterprise Mode Site List** -1. Open the Enterprise Mode Site List Portal and click the **Production sites list** icon in the upper-right area of the page. - - The **Production sites list** page appears, with each app showing its URL, the compatibility mode to use, and the assigned browser to open the site. - -2. Click any URL to view the actual site, using the compatibility mode and opening in the correct browser. - - -**To export the active Enterprise Mode Site List** -1. On the **Production sites list** page, click **Export**. - -2. Save the ProductionSiteList.xlsx file. - - The Excel file includes all apps in the current Enterprise Mode Site List, including URL, compatibility mode, and assigned browser. +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: appcompat +description: Details about how to view the active Enterprise Mode Site List from the Enterprise Mode Site List Portal. +author: dansimp +ms.prod: ie11 +title: View the apps included in the active Enterprise Mode Site List from the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +--- + +# View the apps included in the active Enterprise Mode Site List from the Enterprise Mode Site List Portal + +**Applies to:** + +- Windows 10 +- Windows 8.1 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2008 R2 with Service Pack 1 (SP1) + +Any employee with access to the Enterprise Mode Site List Portal can view the apps included in the current Enterprise Mode Site List. + +**To view the active Enterprise Mode Site List** +1. Open the Enterprise Mode Site List Portal and click the **Production sites list** icon in the upper-right area of the page. + + The **Production sites list** page appears, with each app showing its URL, the compatibility mode to use, and the assigned browser to open the site. + +2. Click any URL to view the actual site, using the compatibility mode and opening in the correct browser. + + +**To export the active Enterprise Mode Site List** +1. On the **Production sites list** page, click **Export**. + +2. Save the ProductionSiteList.xlsx file. + + The Excel file includes all apps in the current Enterprise Mode Site List, including URL, compatibility mode, and assigned browser. diff --git a/browsers/internet-explorer/ie11-deploy-guide/view-enterprise-mode-reports-for-portal.md b/browsers/internet-explorer/ie11-deploy-guide/view-enterprise-mode-reports-for-portal.md index 30db2d2faa..20ad5ac557 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/view-enterprise-mode-reports-for-portal.md +++ b/browsers/internet-explorer/ie11-deploy-guide/view-enterprise-mode-reports-for-portal.md @@ -1,53 +1,54 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: appcompat -description: Details about how an Administrator can view the available Enterprise Mode reports from the Enterprise Mode Site List Portal. -author: lomayor -ms.prod: ie11 -title: View the available Enterprise Mode reports from the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor ---- - -# View the available Enterprise Mode reports from the Enterprise Mode Site List Portal - -**Applies to:** - -- Windows 10 -- Windows 8.1 -- Windows 7 -- Windows Server 2012 R2 -- Windows Server 2008 R2 with Service Pack 1 (SP1) - -Administrators can view the Microsoft-provided Enterprise Mode reports from the Enterprise Mode Site List Portal. - -**To view the reports** -1. Open the Enterprise Mode Site List Portal and click the **Enterprise Mode reports** icon in the upper-right area of the page. - - The **Enterprise Mode reports** page appears, with each app showing its URL, the compatibility mode to use, and the assigned browser to open the site. - -2. Use the calendars to provide the **From date** and **To date**, determining the span of time the report covers. - -3. Click **Apply**. - - The reports all change to reflect the appropriate timeframe and group, including: - - - **Total number of websites in the site list.** A box at the top of the reports page that tells you the total number of websites included in the Enterprise Mode Sit List. - - - **All websites by docmode.** Shows how many change requests exist, based on the different doc modes included in the **App best viewed in** field. - - - **All websites by browser.** Shows how many apps require which browser, including **IE11**, **MSEdge**, or **None**. - - - **All requests by status.** Shows how many change requests exist, based on each status. - - - **All requests by change type.** Shows how many change requests exist, based on the **Requested change** field. - - - **Request status by group.** Shows how many change requests exist, based on both group and status. - - - **Reasons for request.** Shows how many change request reasons exist, based on the **Reason for request** field. - - - **Requested changes by app name.** Shows what specific apps were **Added to site list**, **Deleted from site list**, or **Updated from site list**. +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: appcompat +description: Details about how an Administrator can view the available Enterprise Mode reports from the Enterprise Mode Site List Portal. +author: dansimp +ms.prod: ie11 +title: View the available Enterprise Mode reports from the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +--- + +# View the available Enterprise Mode reports from the Enterprise Mode Site List Portal + +**Applies to:** + +- Windows 10 +- Windows 8.1 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2008 R2 with Service Pack 1 (SP1) + +Administrators can view the Microsoft-provided Enterprise Mode reports from the Enterprise Mode Site List Portal. + +**To view the reports** +1. Open the Enterprise Mode Site List Portal and click the **Enterprise Mode reports** icon in the upper-right area of the page. + + The **Enterprise Mode reports** page appears, with each app showing its URL, the compatibility mode to use, and the assigned browser to open the site. + +2. Use the calendars to provide the **From date** and **To date**, determining the span of time the report covers. + +3. Click **Apply**. + + The reports all change to reflect the appropriate timeframe and group, including: + + - **Total number of websites in the site list.** A box at the top of the reports page that tells you the total number of websites included in the Enterprise Mode Sit List. + + - **All websites by docmode.** Shows how many change requests exist, based on the different doc modes included in the **App best viewed in** field. + + - **All websites by browser.** Shows how many apps require which browser, including **IE11**, **MSEdge**, or **None**. + + - **All requests by status.** Shows how many change requests exist, based on each status. + + - **All requests by change type.** Shows how many change requests exist, based on the **Requested change** field. + + - **Request status by group.** Shows how many change requests exist, based on both group and status. + + - **Reasons for request.** Shows how many change request reasons exist, based on the **Reason for request** field. + + - **Requested changes by app name.** Shows what specific apps were **Added to site list**, **Deleted from site list**, or **Updated from site list**. diff --git a/browsers/internet-explorer/ie11-deploy-guide/virtualization-and-compatibility-with-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/virtualization-and-compatibility-with-ie11.md index e83c91bf67..e5de6fffdd 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/virtualization-and-compatibility-with-ie11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/virtualization-and-compatibility-with-ie11.md @@ -1,36 +1,37 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: virtualization -description: Virtualization and compatibility with Internet Explorer 11 -author: lomayor -ms.prod: ie11 -ms.assetid: b0388c04-2584-4b6d-a7a8-4e0476773a80 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Virtualization and compatibility with Internet Explorer 11 (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Virtualization and compatibility with Internet Explorer 11 -If your company is considering upgrading to the latest version of Internet Explorer, but is hesitant because of a large number of web apps that need to be tested and moved, we recommend that you consider virtualization. Virtualization lets you set up a virtual environment where you can run earlier versions of IE. - -**Important**
          -We strongly suggest that while you're using virtualization, you also update your web apps so they run natively in the newer version of IE. For more information about how to update your code, see the [Internet Explorer 11 Compatibility Cookbook (Windows)](https://go.microsoft.com/fwlink/p/?LinkId=279707) to learn about the developer features that have been changed or deprecated since Internet Explorer 10. - -The Microsoft-supported options for virtualizing web apps are: - -- **Microsoft Enterprise Desktop Virtualization (MED-V).** Uses Microsoft Virtual PC to provide an enterprise solution for desktop virtualization. With MED-V, you can easily create, deliver, and manage corporate Virtual PC images on any Windows®-based desktop. For more information, see [MED-V](https://go.microsoft.com/fwlink/p/?LinkId=271653). - -- **Client Hyper-V.** Uses the same virtualization technology previously available in Windows Server, but now installed for Windows 8.1. For more information, see [Client Hyper-V](https://go.microsoft.com/fwlink/p/?LinkId=271654).

          -For more information about virtualization options, see [Microsoft Desktop Virtualization](https://go.microsoft.com/fwlink/p/?LinkId=271662). - -  - -  - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: virtualization +description: Virtualization and compatibility with Internet Explorer 11 +author: dansimp +ms.prod: ie11 +ms.assetid: b0388c04-2584-4b6d-a7a8-4e0476773a80 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Virtualization and compatibility with Internet Explorer 11 (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Virtualization and compatibility with Internet Explorer 11 +If your company is considering upgrading to the latest version of Internet Explorer, but is hesitant because of a large number of web apps that need to be tested and moved, we recommend that you consider virtualization. Virtualization lets you set up a virtual environment where you can run earlier versions of IE. + +**Important**
          +We strongly suggest that while you're using virtualization, you also update your web apps so they run natively in the newer version of IE. For more information about how to update your code, see the [Internet Explorer 11 Compatibility Cookbook (Windows)](https://go.microsoft.com/fwlink/p/?LinkId=279707) to learn about the developer features that have been changed or deprecated since Internet Explorer 10. + +The Microsoft-supported options for virtualizing web apps are: + +- **Microsoft Enterprise Desktop Virtualization (MED-V).** Uses Microsoft Virtual PC to provide an enterprise solution for desktop virtualization. With MED-V, you can easily create, deliver, and manage corporate Virtual PC images on any Windows®-based desktop. For more information, see [MED-V](https://go.microsoft.com/fwlink/p/?LinkId=271653). + +- **Client Hyper-V.** Uses the same virtualization technology previously available in Windows Server, but now installed for Windows 8.1. For more information, see [Client Hyper-V](https://go.microsoft.com/fwlink/p/?LinkId=271654).

          +For more information about virtualization options, see [Microsoft Desktop Virtualization](https://go.microsoft.com/fwlink/p/?LinkId=271662). + +  + +  + + + diff --git a/browsers/internet-explorer/ie11-deploy-guide/what-is-enterprise-mode.md b/browsers/internet-explorer/ie11-deploy-guide/what-is-enterprise-mode.md index 0f89abe875..269b2bec06 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/what-is-enterprise-mode.md +++ b/browsers/internet-explorer/ie11-deploy-guide/what-is-enterprise-mode.md @@ -1,168 +1,169 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: appcompat -description: Info about the features included in Enterprise Mode with Internet Explorer 11. -author: lomayor -ms.prod: ie11 -ms.assetid: 3c77e9f3-eb21-46d9-b5aa-f9b2341cfefa -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Enterprise Mode and the Enterprise Mode Site List (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 10/25/2018 ---- - - -# Enterprise Mode and the Enterprise Mode Site List - -**Applies to:** - -- Windows 10 -- Windows 8.1 -- Windows 7 -- Windows Server 2012 R2 -- Windows Server 2008 R2 with Service Pack 1 (SP1) - -Internet Explorer and Microsoft Edge can work together to support your legacy web apps, while still defaulting to the higher bar for security and modern experiences enabled by Microsoft Edge. Working with multiple browsers can be difficult, particularly if you have a substantial number of internal sites. To help manage this dual-browser experience, we are introducing a new web tool specifically targeted towards larger organizations: the [Enterprise Mode Site List Portal](https://github.com/MicrosoftEdge/enterprise-mode-site-list-portal). - -## Available dual-browser experiences -If you have specific websites and apps that you know have compatibility problems with Microsoft Edge, you can use the Enterprise Mode site list so that the websites automatically open using Internet Explorer 11. Additionally, if you know that your intranet sites aren't going to work correctly with Microsoft Edge, you can set all intranet sites to open using IE11 automatically. - -Using Enterprise Mode means that you can continue to use Microsoft Edge as your default browser, while also ensuring that your apps continue working on IE11. - ->[!TIP] -> If you are running an earlier version of Internet Explorer, we recommend upgrading to IE11, so that any legacy apps continue to work correctly. - -For Windows 10 and Windows 10 Mobile, Microsoft Edge is the default browser experience. However, Microsoft Edge lets you continue to use IE11 for sites that are on your corporate intranet or included on your Enterprise Mode Site List. - - -## What is Enterprise Mode? -Enterprise Mode, a compatibility mode that runs on Internet Explorer 11 on Windows 10, Windows 8.1, and Windows 7 devices, lets websites render using a modified browser configuration that’s designed to emulate either Windows Internet Explorer 7 or Windows Internet Explorer 8. Running in this mode helps to avoid many of the common compatibility problems associated with web apps written and tested on older versions of Internet Explorer. - -Many customers identify web app compatibility as a significant cost to upgrading because web apps need to be tested and upgraded before adopting a new browser. The improved compatibility provided by Enterprise Mode can help give customers confidence to upgrade to IE11, letting customers benefit from modern web standards, increased performance, improved security, and better reliability. - -### Enterprise Mode features -Enterprise Mode includes the following features: - -- **Improved web app and website compatibility.** Through improved emulation, Enterprise Mode lets many legacy web apps run unmodified on IE11, supporting several site patterns that aren’t currently supported by existing document modes. - -- **Tool-based management for website lists.** Use the Enterprise Mode Site List Manager to add website domains and domain paths and to specify whether a site renders using Enterprise Mode. -Download the [Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853) or the [Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378), based on your operating system and schema. - -- **Centralized control.** You can specify the websites or web apps to interpret using Enterprise Mode, through an XML file on a website or stored locally. Domains and paths within those domains can be treated differently, allowing granular control. Use Group Policy to let users turn Enterprise Mode on or off from the Tools menu and to decide whether the Enterprise browser profile appears on the Emulation tab of the F12 developer tools. - - >[!Important] - >All centrally-made decisions override any locally-made choices. - -- **Integrated browsing.** When Enterprise Mode is set up, users can browse the web normally, letting the browser change modes automatically to accommodate Enterprise Mode sites. - -- **Data gathering.** You can configure Enterprise Mode to collect local override data, posting back to a named server. This lets you "crowd source" compatibility testing from key users; gathering their findings to add to your central site list. - -## Enterprise Mode and the Enterprise Mode Site List XML file -The Enterprise Mode Site List is an XML document that specifies a list of sites, their compat mode, and their intended browser. Using [Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853), you can automatically start a webpage using a specific browser. In the case of IE11, the webpage can also be launched in a specific compat mode, so it always renders correctly. Your employees can easily view this site list by typing _about:compat_ in either Microsoft Edge or IE11. - -Starting with Windows 10, version 1511 (also known as the Anniversary Update), you can also [restrict IE11 to only the legacy web apps that need it](https://blogs.windows.com/msedgedev/2016/05/19/edge14-ie11-better-together/), automatically sending sites not included in the Enterprise Mode Site List to Microsoft Edge. - -### Site list xml file -This is a view of the [raw EMIE v2 schema.xml file](https://gist.github.com/kypflug/9e9961de771d2fcbd86b#file-emie-v2-schema-xml). There are equivalent Enterprise Mode Site List policies for both [Microsoft Edge](https://docs.microsoft.com/microsoft-edge/deploy/emie-to-improve-compatibility) and [Internet Explorer 11](turn-on-enterprise-mode-and-use-a-site-list.md). The Microsoft Edge list is used to determine which sites should open in IE11; while the IE11 list is used to determine the compat mode for a site, and which sites should open in Microsoft Edge. We recommend using one list for both browsers, where each policy points to the same XML file location. - -```xml - - - - EnterpriseSiteListManager - 10586 - 20150728.135021 - - - - IE8Enterprise - IE11 - - - default - IE11 - - - IE7Enterprise - IE11 - - - - - IE8Enterprise" - IE11 - - - IE7 - IE11 - - - IE7 - IE11 - - - -``` - -## Enterprise Mode Site List Manager and the Enterprise Mode Site List Portal tools -You can build and manage your Enterprise Mode Site List is by using any generic text editor. However, we’ve also provided a couple tools that can make that process even easier. - -### Enterprise Mode Site List Manager -This tool helps you create error-free XML documents with simple n+1 versioning and URL verification. We recommend using this tool if your site list is relatively small. For more info about this tool, see the Use the [Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) topics. - -There are 2 versions of this tool, both supported on Windows 7, Windows 8.1, and Windows 10: - -- [Enterprise Mode Site List Manager (schema v.1)](https://www.microsoft.com/download/details.aspx?id=42501). This is an older version of the schema that you must use if you want to create and update your Enterprise Mode Site List for devices running the v.1 version of the schema. - - We strongly recommend moving to the new schema, v.2. For more info, see [Enterprise Mode schema v.2 guidance](enterprise-mode-schema-version-2-guidance.md). - -- [Enterprise Mode Site List Manager (schema v.2)](https://www.microsoft.com/download/details.aspx?id=49974). The updated version of the schema, including new functionality. You can use this version of the schema to create and update your Enterprise Mode Site List for devices running the v.2 version of the schema. - - If you open a v.1 version of your Enterprise Mode Site List using this version, it will update the schema to v.2, automatically. For more info, see [Enterprise Mode schema v.1 guidance](enterprise-mode-schema-version-1-guidance.md). - -If your list is too large to add individual sites, or if you have more than one person managing the site list, we recommend using the Enterprise Site List Portal. - -### Enterprise Mode Site List Portal -The [Enterprise Mode Site List Portal](https://github.com/MicrosoftEdge/enterprise-mode-site-list-portal) is an open-source web tool on GitHub that allows you to manage your Enterprise Mode Site List, hosted by the app, with multiple users. The portal is designed to use IIS and a SQL Server backend, leveraging Active Directory (AD) for employee management. - -In addition to all the functionality of the Enterprise Mode Site List Manager tool, the Enterprise Mode Site List Portal helps you: - -- Manage site lists from any device supporting Windows 7 or greater. - -- Submit change requests. - -- Operate offline through an on-premise solution. - -- Provide role-based governance. - -- Test configuration settings before releasing to a live environment. - -Updates to your site list are made by submitting new change requests, which are then approved by a designated group of people, put into a pre-production environment for testing, and then deployed immediately, or scheduled for deployment later. - -Because the tool is open-source, the source code is readily available for examination and experimentation. We encourage you to [fork the code, submit pull requests, and send us your feedback](https://github.com/MicrosoftEdge/enterprise-mode-site-list-portal)! For more info about the Enterprise Mode Site List Portal, see the [Use the Enterprise Mode Site List Portal](use-the-enterprise-mode-portal.md) topics. - -## Related topics - -- [Enterprise Mode Site List Portal source code](https://github.com/MicrosoftEdge/enterprise-mode-site-list-portal) - -- [Technical guidance, tools, and resources on Enterprise browsing](https://technet.microsoft.com/ie) - -- [Enterprise Mode Site List Manager (schema v.1)](https://www.microsoft.com/download/details.aspx?id=42501) - -- [Enterprise Mode Site List Manager (schema v.2)](https://www.microsoft.com/download/details.aspx?id=49974) - -- [Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) - -- [Collect data using Enterprise Site Discovery](collect-data-using-enterprise-site-discovery.md) - -- [Web Application Compatibility Lab Kit](https://technet.microsoft.com/microsoft-edge/mt612809.aspx) - -- [Microsoft Services Support](https://www.microsoft.com/microsoftservices/support.aspx) - -- [Find a Microsoft partner on Pinpoint](https://partnercenter.microsoft.com/pcv/search) +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: appcompat +description: Info about the features included in Enterprise Mode with Internet Explorer 11. +author: dansimp +ms.prod: ie11 +ms.assetid: 3c77e9f3-eb21-46d9-b5aa-f9b2341cfefa +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Enterprise Mode and the Enterprise Mode Site List (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 10/25/2018 +--- + + +# Enterprise Mode and the Enterprise Mode Site List + +**Applies to:** + +- Windows 10 +- Windows 8.1 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2008 R2 with Service Pack 1 (SP1) + +Internet Explorer and Microsoft Edge can work together to support your legacy web apps, while still defaulting to the higher bar for security and modern experiences enabled by Microsoft Edge. Working with multiple browsers can be difficult, particularly if you have a substantial number of internal sites. To help manage this dual-browser experience, we are introducing a new web tool specifically targeted towards larger organizations: the [Enterprise Mode Site List Portal](https://github.com/MicrosoftEdge/enterprise-mode-site-list-portal). + +## Available dual-browser experiences +If you have specific websites and apps that you know have compatibility problems with Microsoft Edge, you can use the Enterprise Mode site list so that the websites automatically open using Internet Explorer 11. Additionally, if you know that your intranet sites aren't going to work correctly with Microsoft Edge, you can set all intranet sites to open using IE11 automatically. + +Using Enterprise Mode means that you can continue to use Microsoft Edge as your default browser, while also ensuring that your apps continue working on IE11. + +>[!TIP] +> If you are running an earlier version of Internet Explorer, we recommend upgrading to IE11, so that any legacy apps continue to work correctly. + +For Windows 10 and Windows 10 Mobile, Microsoft Edge is the default browser experience. However, Microsoft Edge lets you continue to use IE11 for sites that are on your corporate intranet or included on your Enterprise Mode Site List. + + +## What is Enterprise Mode? +Enterprise Mode, a compatibility mode that runs on Internet Explorer 11 on Windows 10, Windows 8.1, and Windows 7 devices, lets websites render using a modified browser configuration that’s designed to emulate either Windows Internet Explorer 7 or Windows Internet Explorer 8. Running in this mode helps to avoid many of the common compatibility problems associated with web apps written and tested on older versions of Internet Explorer. + +Many customers identify web app compatibility as a significant cost to upgrading because web apps need to be tested and upgraded before adopting a new browser. The improved compatibility provided by Enterprise Mode can help give customers confidence to upgrade to IE11, letting customers benefit from modern web standards, increased performance, improved security, and better reliability. + +### Enterprise Mode features +Enterprise Mode includes the following features: + +- **Improved web app and website compatibility.** Through improved emulation, Enterprise Mode lets many legacy web apps run unmodified on IE11, supporting several site patterns that aren’t currently supported by existing document modes. + +- **Tool-based management for website lists.** Use the Enterprise Mode Site List Manager to add website domains and domain paths and to specify whether a site renders using Enterprise Mode. +Download the [Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853) or the [Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378), based on your operating system and schema. + +- **Centralized control.** You can specify the websites or web apps to interpret using Enterprise Mode, through an XML file on a website or stored locally. Domains and paths within those domains can be treated differently, allowing granular control. Use Group Policy to let users turn Enterprise Mode on or off from the Tools menu and to decide whether the Enterprise browser profile appears on the Emulation tab of the F12 developer tools. + + >[!Important] + >All centrally-made decisions override any locally-made choices. + +- **Integrated browsing.** When Enterprise Mode is set up, users can browse the web normally, letting the browser change modes automatically to accommodate Enterprise Mode sites. + +- **Data gathering.** You can configure Enterprise Mode to collect local override data, posting back to a named server. This lets you "crowd source" compatibility testing from key users; gathering their findings to add to your central site list. + +## Enterprise Mode and the Enterprise Mode Site List XML file +The Enterprise Mode Site List is an XML document that specifies a list of sites, their compat mode, and their intended browser. Using [Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853), you can automatically start a webpage using a specific browser. In the case of IE11, the webpage can also be launched in a specific compat mode, so it always renders correctly. Your employees can easily view this site list by typing _about:compat_ in either Microsoft Edge or IE11. + +Starting with Windows 10, version 1511 (also known as the Anniversary Update), you can also [restrict IE11 to only the legacy web apps that need it](https://blogs.windows.com/msedgedev/2016/05/19/edge14-ie11-better-together/), automatically sending sites not included in the Enterprise Mode Site List to Microsoft Edge. + +### Site list xml file +This is a view of the [raw EMIE v2 schema.xml file](https://gist.github.com/kypflug/9e9961de771d2fcbd86b#file-emie-v2-schema-xml). There are equivalent Enterprise Mode Site List policies for both [Microsoft Edge](https://docs.microsoft.com/microsoft-edge/deploy/emie-to-improve-compatibility) and [Internet Explorer 11](turn-on-enterprise-mode-and-use-a-site-list.md). The Microsoft Edge list is used to determine which sites should open in IE11; while the IE11 list is used to determine the compat mode for a site, and which sites should open in Microsoft Edge. We recommend using one list for both browsers, where each policy points to the same XML file location. + +```xml + + + + EnterpriseSiteListManager + 10586 + 20150728.135021 + + + + IE8Enterprise + IE11 + + + default + IE11 + + + IE7Enterprise + IE11 + + + + + IE8Enterprise" + IE11 + + + IE7 + IE11 + + + IE7 + IE11 + + + +``` + +## Enterprise Mode Site List Manager and the Enterprise Mode Site List Portal tools +You can build and manage your Enterprise Mode Site List is by using any generic text editor. However, we’ve also provided a couple tools that can make that process even easier. + +### Enterprise Mode Site List Manager +This tool helps you create error-free XML documents with simple n+1 versioning and URL verification. We recommend using this tool if your site list is relatively small. For more info about this tool, see the Use the [Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) topics. + +There are 2 versions of this tool, both supported on Windows 7, Windows 8.1, and Windows 10: + +- [Enterprise Mode Site List Manager (schema v.1)](https://www.microsoft.com/download/details.aspx?id=42501). This is an older version of the schema that you must use if you want to create and update your Enterprise Mode Site List for devices running the v.1 version of the schema. + + We strongly recommend moving to the new schema, v.2. For more info, see [Enterprise Mode schema v.2 guidance](enterprise-mode-schema-version-2-guidance.md). + +- [Enterprise Mode Site List Manager (schema v.2)](https://www.microsoft.com/download/details.aspx?id=49974). The updated version of the schema, including new functionality. You can use this version of the schema to create and update your Enterprise Mode Site List for devices running the v.2 version of the schema. + + If you open a v.1 version of your Enterprise Mode Site List using this version, it will update the schema to v.2, automatically. For more info, see [Enterprise Mode schema v.1 guidance](enterprise-mode-schema-version-1-guidance.md). + +If your list is too large to add individual sites, or if you have more than one person managing the site list, we recommend using the Enterprise Site List Portal. + +### Enterprise Mode Site List Portal +The [Enterprise Mode Site List Portal](https://github.com/MicrosoftEdge/enterprise-mode-site-list-portal) is an open-source web tool on GitHub that allows you to manage your Enterprise Mode Site List, hosted by the app, with multiple users. The portal is designed to use IIS and a SQL Server backend, leveraging Active Directory (AD) for employee management. + +In addition to all the functionality of the Enterprise Mode Site List Manager tool, the Enterprise Mode Site List Portal helps you: + +- Manage site lists from any device supporting Windows 7 or greater. + +- Submit change requests. + +- Operate offline through an on-premise solution. + +- Provide role-based governance. + +- Test configuration settings before releasing to a live environment. + +Updates to your site list are made by submitting new change requests, which are then approved by a designated group of people, put into a pre-production environment for testing, and then deployed immediately, or scheduled for deployment later. + +Because the tool is open-source, the source code is readily available for examination and experimentation. We encourage you to [fork the code, submit pull requests, and send us your feedback](https://github.com/MicrosoftEdge/enterprise-mode-site-list-portal)! For more info about the Enterprise Mode Site List Portal, see the [Use the Enterprise Mode Site List Portal](use-the-enterprise-mode-portal.md) topics. + +## Related topics + +- [Enterprise Mode Site List Portal source code](https://github.com/MicrosoftEdge/enterprise-mode-site-list-portal) + +- [Technical guidance, tools, and resources on Enterprise browsing](https://technet.microsoft.com/ie) + +- [Enterprise Mode Site List Manager (schema v.1)](https://www.microsoft.com/download/details.aspx?id=42501) + +- [Enterprise Mode Site List Manager (schema v.2)](https://www.microsoft.com/download/details.aspx?id=49974) + +- [Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) + +- [Collect data using Enterprise Site Discovery](collect-data-using-enterprise-site-discovery.md) + +- [Web Application Compatibility Lab Kit](https://technet.microsoft.com/microsoft-edge/mt612809.aspx) + +- [Microsoft Services Support](https://www.microsoft.com/microsoftservices/support.aspx) + +- [Find a Microsoft partner on Pinpoint](https://partnercenter.microsoft.com/pcv/search) diff --git a/browsers/internet-explorer/ie11-deploy-guide/what-is-the-internet-explorer-11-blocker-toolkit.md b/browsers/internet-explorer/ie11-deploy-guide/what-is-the-internet-explorer-11-blocker-toolkit.md index 2343973365..98f659748d 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/what-is-the-internet-explorer-11-blocker-toolkit.md +++ b/browsers/internet-explorer/ie11-deploy-guide/what-is-the-internet-explorer-11-blocker-toolkit.md @@ -1,152 +1,153 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: support -ms.pagetype: security -description: How to download and use the Internet Explorer 11 Blocker Toolkit to turn off the automatic delivery of IE11 through the Automatic Updates feature of Windows Update. -author: lomayor -ms.author: lomayor -ms.manager: elizapo -ms.prod: ie11 -ms.assetid: fafeaaee-171c-4450-99f7-5cc7f8d7ba91 -ms.reviewer: -audience: itpro manager: dansimp -title: What is the Internet Explorer 11 Blocker Toolkit? (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 05/10/2018 ---- - - -# What is the Internet Explorer 11 Blocker Toolkit? - -**Applies to:** - -- Windows 10 -- Windows 8.1 -- Windows 7 -- Windows Server 2012 R2 -- Windows Server 2008 R2 with Service Pack 1 (SP1) - -The Internet Explorer 11 Blocker Toolkit lets you turn off the automatic delivery of IE11 through the **Automatic Updates** feature of Windows Update. - ->[!IMPORTANT] ->The IE11 Blocker Toolkit does not stop users from manually installing IE11 from the [Microsoft Download Center](https://go.microsoft.com/fwlink/p/?linkid=327753). Also, even if you have installed previous versions of the toolkit before, like for Internet Explorer 10, you still need to install this version to prevent the installation of IE11. - -## Install the toolkit - -1. Download the IE11 Blocker Toolkit from [Toolkit to Disable Automatic Delivery of Internet Explorer 11](https://go.microsoft.com/fwlink/p/?LinkId=327745). - -2. Accept the license agreement and store the included four files on your local computer. - -3. Start an elevated Command Prompt by going to **Start**>**All Programs**>**Accessories**> right-clicking on **Command Prompt**, and then choosing **Run as Administrator**. - -4. In the Command Prompt, change to the location where you put the 4 files. - -5. In the Command Prompt, type `ie11_blocker.cmd /B` and press Enter.

          -Wait for the message, **Blocking deployment of IE11 on the local machine. The operation completed successfully.** - -6. Close the Command Prompt. - -For answers to frequently asked questions, see [Internet Explorer 11 Blocker Toolkit: Frequently Asked Questions](https://go.microsoft.com/fwlink/p/?LinkId=314063). - -## Automatic updates -Internet Explorer 11 makes browsing the web faster, easier, safer, and more reliable than ever. To help customers become more secure and up-to-date, Microsoft will distribute Internet Explorer 11 through Automatic Updates and the Windows Update and Microsoft Update sites. Internet Explorer 11 will be available for users of the 32-bit and 64-bit versions of Windows 7 Service Pack 1 (SP1), and 64-bit version of Windows Server 2008 R2 SP1. This article provides an overview of the delivery process and options available for IT administrators to control how and when Internet Explorer 11 is deployed to their organization through Automatic Updates. - -### Automatic delivery process -Internet Explorer 11 only downloads and installs if it’s available for delivery through Automatic Updates; and Automatic Updates only offer Internet Explorer 11 to users with local administrator accounts. User’s without local administrator accounts won’t be prompted to install the update and will continue using their current version of Internet Explorer. - -Internet Explorer 11 replaces Internet Explorer 8, Internet Explorer 9, or Internet Explorer 10. If you decide you don’t want Internet Explorer 11, and you’re running Windows 7 SP1 or Windows Server 2008 R2 with SP1, you can uninstall it from the **View installed updates** section of the **Uninstall an update** page of the Control Panel.  - -### Internet Explorer 11 automatic upgrades - -Internet Explorer 11 is offered through Automatic Updates and Windows Update as an Important update. Users running Windows 7 SP1, who have chosen to download and install updates automatically through Windows Update, are automatically upgraded to Internet Explorer 11. - -Users who were automatically upgraded to Internet Explorer 11 can decide to uninstall Internet Explorer 11. However, Internet Explorer 11 will still appear as an optional update through Windows Update. - -### Options for blocking automatic delivery - -If you use Automatic Updates in your company, but want to stop your users from automatically getting Internet Explorer 11, do one of the following: - -- **Download and use the Internet Explorer 11 Blocker Toolkit.** Includes a Group Policy template and a script that permanently blocks Internet Explorer 11 from being offered by Windows Update or Microsoft Update as a high-priority update. You can download this kit from the [Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=40722). - - >[!NOTE] - >The toolkit won't stop users with local administrator accounts from manually installing Internet Explorer 11. Using this toolkit also prevents your users from receiving automatic upgrades from Internet Explorer 8, Internet Explorer 9, or Internet Explorer 10 to Internet Explorer 11. For more information, see the [Internet Explorer 11 Blocker Toolkit frequently asked questions](https://docs.microsoft.com/internet-explorer/ie11-faq/faq-for-it-pros-ie11). - -- **Use an update management solution to control update deployment.** If you already use an update management solution, like [Windows Server Update Services (WSUS)](https://docs.microsoft.com/windows-server/administration/windows-server-update-services/get-started/windows-server-update-services-wsus) or the more advanced [System Center 2012 Configuration Manager](https://go.microsoft.com/fwlink/?LinkID=276664), you should use that instead of the Internet Explorer Blocker Toolkit. - ->[!NOTE] ->If you use WSUS to manage updates, and Update Rollups are configured for automatic installation, Internet Explorer will automatically install throughout your company. - - -### Prevent automatic installation of Internet Explorer 11 with WSUS - -Internet Explorer 11 will be released to WSUS as an Update Rollup package. Therefore, if you’ve configured WSUS to “auto-approve” Update Rollup packages, it’ll be automatically approved and installed. To stop Internet Explorer 11 from being automatically approved for installation, you need to: - -1. Click **Start**, click **Administrative Tools**, and then click **Microsoft Windows Server Update Services 3.0**. - -2. Expand *ComputerName*, and then click **Options**. - -3. Click **Automatic Approvals**. - -4. Click the rule that automatically approves an update that is classified as Update Rollup, and then click **Edit.** - - >[!NOTE] - >If you don’t see a rule like this, you most likely haven’t configured WSUS to automatically approve Update Rollups for installation. In this situation, you don’t have to do anything else. - -5. Click the **Update Rollups** property under the **Step 2: Edit the properties (click an underlined value)** section. - - >[!NOTE] - >The properties for this rule will resemble the following:

          • When an update is in Update Rollups
          • Approve the update for all computers
          - -6. Clear the **Update Rollup** check box, and then click **OK**. - -7. Click **OK** to close the **Automatic Approvals** dialog box. - -After the new Internet Explorer 11 package is available for download, you should manually synchronize the new package to your WSUS server, so that when you re-enable auto-approval it won’t be automatically installed. - -1. Click **Start**, click **Administrative Tools**, and then click **Microsoft Windows Server Update Services 3.0**. - -2. Expand *ComputerName*, and then click **Synchronizations**. - -3. Click **Synchronize Now**. - -4. Expand *ComputerName*, expand **Updates**, and then click **All Updates**. - -5. Choose **Unapproved** in the **Approval**drop down box. - -6. Check to make sure that Microsoft Internet Explorer 11 is listed as an unapproved update. - ->[!NOTE] ->There may be multiple updates, depending on the imported language and operating system updates. - -### Optional - Reset update rollups packages to auto-approve - -1. Click **Start**, click **Administrative Tools**, and then click **Microsoft Windows Server Update Services 3.0**. - -2. Expand *ComputerName*, and then click **Options**. - -3. Click **Automatic Approvals**. - -4. Click the rule that automatically approves updates of different classifications, and then click **Edit**. - -5. Click the **Update Rollups** property under the **Step 2: Edit the properties (click an underlined value)** section. - -6. Check the **Update Rollups** check box, and then click **OK**. - -7. Click **OK** to close the **Automatic Approvals** dialog box. - ->[!NOTE] ->Because auto-approval rules are only evaluated when an update is first imported into WSUS, turning this rule back on after the Internet Explorer 11 update has been imported and synchronized to the server won’t cause this update to be auto-approved. - - - -## Additional resources - -- [Internet Explorer 11 Blocker Toolkit download](https://www.microsoft.com/download/details.aspx?id=40722) - -- [Internet Explorer 11 Blocker Toolkit - Frequently Asked Questions](../ie11-faq/faq-ie11-blocker-toolkit.md) - -- [Internet Explorer 11 FAQ for IT pros](https://docs.microsoft.com/internet-explorer/ie11-faq/faq-for-it-pros-ie11) - -- [Internet Explorer 11 delivery through automatic updates](ie11-delivery-through-automatic-updates.md) - -- [Internet Explorer 11 deployment guide](https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/index) +--- +ms.localizationpriority: medium +ms.mktglfcycl: support +ms.pagetype: security +description: How to download and use the Internet Explorer 11 Blocker Toolkit to turn off the automatic delivery of IE11 through the Automatic Updates feature of Windows Update. +author: dansimp +ms.author: dansimp +ms.manager: elizapo +ms.prod: ie11 +ms.assetid: fafeaaee-171c-4450-99f7-5cc7f8d7ba91 +ms.reviewer: +audience: itpro +manager: dansimp +title: What is the Internet Explorer 11 Blocker Toolkit? (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 05/10/2018 +--- + + +# What is the Internet Explorer 11 Blocker Toolkit? + +**Applies to:** + +- Windows 10 +- Windows 8.1 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2008 R2 with Service Pack 1 (SP1) + +The Internet Explorer 11 Blocker Toolkit lets you turn off the automatic delivery of IE11 through the **Automatic Updates** feature of Windows Update. + +>[!IMPORTANT] +>The IE11 Blocker Toolkit does not stop users from manually installing IE11 from the [Microsoft Download Center](https://go.microsoft.com/fwlink/p/?linkid=327753). Also, even if you have installed previous versions of the toolkit before, like for Internet Explorer 10, you still need to install this version to prevent the installation of IE11. + +## Install the toolkit + +1. Download the IE11 Blocker Toolkit from [Toolkit to Disable Automatic Delivery of Internet Explorer 11](https://go.microsoft.com/fwlink/p/?LinkId=327745). + +2. Accept the license agreement and store the included four files on your local computer. + +3. Start an elevated Command Prompt by going to **Start**>**All Programs**>**Accessories**> right-clicking on **Command Prompt**, and then choosing **Run as Administrator**. + +4. In the Command Prompt, change to the location where you put the 4 files. + +5. In the Command Prompt, type `ie11_blocker.cmd /B` and press Enter.

          +Wait for the message, **Blocking deployment of IE11 on the local machine. The operation completed successfully.** + +6. Close the Command Prompt. + +For answers to frequently asked questions, see [Internet Explorer 11 Blocker Toolkit: Frequently Asked Questions](https://go.microsoft.com/fwlink/p/?LinkId=314063). + +## Automatic updates +Internet Explorer 11 makes browsing the web faster, easier, safer, and more reliable than ever. To help customers become more secure and up-to-date, Microsoft will distribute Internet Explorer 11 through Automatic Updates and the Windows Update and Microsoft Update sites. Internet Explorer 11 will be available for users of the 32-bit and 64-bit versions of Windows 7 Service Pack 1 (SP1), and 64-bit version of Windows Server 2008 R2 SP1. This article provides an overview of the delivery process and options available for IT administrators to control how and when Internet Explorer 11 is deployed to their organization through Automatic Updates. + +### Automatic delivery process +Internet Explorer 11 only downloads and installs if it’s available for delivery through Automatic Updates; and Automatic Updates only offer Internet Explorer 11 to users with local administrator accounts. User’s without local administrator accounts won’t be prompted to install the update and will continue using their current version of Internet Explorer. + +Internet Explorer 11 replaces Internet Explorer 8, Internet Explorer 9, or Internet Explorer 10. If you decide you don’t want Internet Explorer 11, and you’re running Windows 7 SP1 or Windows Server 2008 R2 with SP1, you can uninstall it from the **View installed updates** section of the **Uninstall an update** page of the Control Panel.  + +### Internet Explorer 11 automatic upgrades + +Internet Explorer 11 is offered through Automatic Updates and Windows Update as an Important update. Users running Windows 7 SP1, who have chosen to download and install updates automatically through Windows Update, are automatically upgraded to Internet Explorer 11. + +Users who were automatically upgraded to Internet Explorer 11 can decide to uninstall Internet Explorer 11. However, Internet Explorer 11 will still appear as an optional update through Windows Update. + +### Options for blocking automatic delivery + +If you use Automatic Updates in your company, but want to stop your users from automatically getting Internet Explorer 11, do one of the following: + +- **Download and use the Internet Explorer 11 Blocker Toolkit.** Includes a Group Policy template and a script that permanently blocks Internet Explorer 11 from being offered by Windows Update or Microsoft Update as a high-priority update. You can download this kit from the [Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=40722). + + >[!NOTE] + >The toolkit won't stop users with local administrator accounts from manually installing Internet Explorer 11. Using this toolkit also prevents your users from receiving automatic upgrades from Internet Explorer 8, Internet Explorer 9, or Internet Explorer 10 to Internet Explorer 11. For more information, see the [Internet Explorer 11 Blocker Toolkit frequently asked questions](https://docs.microsoft.com/internet-explorer/ie11-faq/faq-for-it-pros-ie11). + +- **Use an update management solution to control update deployment.** If you already use an update management solution, like [Windows Server Update Services (WSUS)](https://docs.microsoft.com/windows-server/administration/windows-server-update-services/get-started/windows-server-update-services-wsus) or the more advanced [System Center 2012 Configuration Manager](https://go.microsoft.com/fwlink/?LinkID=276664), you should use that instead of the Internet Explorer Blocker Toolkit. + +>[!NOTE] +>If you use WSUS to manage updates, and Update Rollups are configured for automatic installation, Internet Explorer will automatically install throughout your company. + + +### Prevent automatic installation of Internet Explorer 11 with WSUS + +Internet Explorer 11 will be released to WSUS as an Update Rollup package. Therefore, if you’ve configured WSUS to “auto-approve” Update Rollup packages, it’ll be automatically approved and installed. To stop Internet Explorer 11 from being automatically approved for installation, you need to: + +1. Click **Start**, click **Administrative Tools**, and then click **Microsoft Windows Server Update Services 3.0**. + +2. Expand *ComputerName*, and then click **Options**. + +3. Click **Automatic Approvals**. + +4. Click the rule that automatically approves an update that is classified as Update Rollup, and then click **Edit.** + + >[!NOTE] + >If you don’t see a rule like this, you most likely haven’t configured WSUS to automatically approve Update Rollups for installation. In this situation, you don’t have to do anything else. + +5. Click the **Update Rollups** property under the **Step 2: Edit the properties (click an underlined value)** section. + + >[!NOTE] + >The properties for this rule will resemble the following:

          • When an update is in Update Rollups
          • Approve the update for all computers
          + +6. Clear the **Update Rollup** check box, and then click **OK**. + +7. Click **OK** to close the **Automatic Approvals** dialog box. + +After the new Internet Explorer 11 package is available for download, you should manually synchronize the new package to your WSUS server, so that when you re-enable auto-approval it won’t be automatically installed. + +1. Click **Start**, click **Administrative Tools**, and then click **Microsoft Windows Server Update Services 3.0**. + +2. Expand *ComputerName*, and then click **Synchronizations**. + +3. Click **Synchronize Now**. + +4. Expand *ComputerName*, expand **Updates**, and then click **All Updates**. + +5. Choose **Unapproved** in the **Approval**drop down box. + +6. Check to make sure that Microsoft Internet Explorer 11 is listed as an unapproved update. + +>[!NOTE] +>There may be multiple updates, depending on the imported language and operating system updates. + +### Optional - Reset update rollups packages to auto-approve + +1. Click **Start**, click **Administrative Tools**, and then click **Microsoft Windows Server Update Services 3.0**. + +2. Expand *ComputerName*, and then click **Options**. + +3. Click **Automatic Approvals**. + +4. Click the rule that automatically approves updates of different classifications, and then click **Edit**. + +5. Click the **Update Rollups** property under the **Step 2: Edit the properties (click an underlined value)** section. + +6. Check the **Update Rollups** check box, and then click **OK**. + +7. Click **OK** to close the **Automatic Approvals** dialog box. + +>[!NOTE] +>Because auto-approval rules are only evaluated when an update is first imported into WSUS, turning this rule back on after the Internet Explorer 11 update has been imported and synchronized to the server won’t cause this update to be auto-approved. + + + +## Additional resources + +- [Internet Explorer 11 Blocker Toolkit download](https://www.microsoft.com/download/details.aspx?id=40722) + +- [Internet Explorer 11 Blocker Toolkit - Frequently Asked Questions](../ie11-faq/faq-ie11-blocker-toolkit.md) + +- [Internet Explorer 11 FAQ for IT pros](https://docs.microsoft.com/internet-explorer/ie11-faq/faq-for-it-pros-ie11) + +- [Internet Explorer 11 delivery through automatic updates](ie11-delivery-through-automatic-updates.md) + +- [Internet Explorer 11 deployment guide](https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/index) diff --git a/browsers/internet-explorer/ie11-deploy-guide/workflow-processes-enterprise-mode-portal.md b/browsers/internet-explorer/ie11-deploy-guide/workflow-processes-enterprise-mode-portal.md index e9ee67796d..de71b3a8ff 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/workflow-processes-enterprise-mode-portal.md +++ b/browsers/internet-explorer/ie11-deploy-guide/workflow-processes-enterprise-mode-portal.md @@ -1,46 +1,47 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: appcompat -description: Use the topics in this section to learn how to perform all of the workflow-related processes in the Enterprise Mode Site List Portal. -author: lomayor -ms.prod: ie11 -title: Workflow-based processes for employees using the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor ---- - - -# Workflow-based processes for employees using the Enterprise Mode Site List Portal - -**Applies to:** - -- Windows 10 -- Windows 8.1 -- Windows 7 -- Windows Server 2012 R2 -- Windows Server 2008 R2 with Service Pack 1 (SP1) - -Use the topics in this section to learn how to perform the available Enterprise Mode Site List Portal processes, based on workflow. - -## In this section -|Topic |Description | -|---------------------------------------------------------------|-----------------------------------------------------------------------------------| -|[Create a change request using the Enterprise Mode Site List Portal](create-change-request-enterprise-mode-portal.md)|Details about how the Requester creates a change request in the Enterprise Mode Site List Portal.| -|[Verify your changes using the Enterprise Mode Site List Portal](verify-changes-preprod-enterprise-mode-portal.md)|Details about how the Requester tests a change request in the pre-production environment of the Enterprise Mode Site List Portal.| -|[Approve a change request using the Enterprise Mode Site List Portal](approve-change-request-enterprise-mode-portal.md)|Details about how the Approver(s) approve a change request in the Enterprise Mode Site List Portal.| -|[Schedule approved change requests for production using the Enterprise Mode Site List Portal](schedule-production-change-enterprise-mode-portal.md)|Details about how the Requester schedules the approved change request update in the Enterprise Mode Site List Portal.| -|[Verify the change request update in the production environment using the Enterprise Mode Site List Portal](verify-changes-production-enterprise-mode-portal.md)|Details about how the Requester tests an update in the production environment of the Enterprise Mode Site List Portal.| -|[View the apps currently on the Enterprise Mode Site List](view-apps-enterprise-mode-site-list.md)|Details about how anyone with access to the portal can review the apps already on the active Enterprise Mode Site List.| -|[View the available Enterprise Mode reports from the Enterprise Mode Site List Portal](view-enterprise-mode-reports-for-portal.md) |Details about how the Administrator can view the view the Microsoft-provided Enterprise Mode reports from the Enterprise Mode Site List Portal. | - - -## Related topics -- [Set up the Enterprise Mode Site List Portal](set-up-enterprise-mode-portal.md) - -- [Enterprise Mode Site List Portal source code](https://github.com/MicrosoftEdge/enterprise-mode-site-list-portal) - -- [Enterprise Mode and the Enterprise Mode Site List](what-is-enterprise-mode.md) +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: appcompat +description: Use the topics in this section to learn how to perform all of the workflow-related processes in the Enterprise Mode Site List Portal. +author: dansimp +ms.prod: ie11 +title: Workflow-based processes for employees using the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +--- + + +# Workflow-based processes for employees using the Enterprise Mode Site List Portal + +**Applies to:** + +- Windows 10 +- Windows 8.1 +- Windows 7 +- Windows Server 2012 R2 +- Windows Server 2008 R2 with Service Pack 1 (SP1) + +Use the topics in this section to learn how to perform the available Enterprise Mode Site List Portal processes, based on workflow. + +## In this section +|Topic |Description | +|---------------------------------------------------------------|-----------------------------------------------------------------------------------| +|[Create a change request using the Enterprise Mode Site List Portal](create-change-request-enterprise-mode-portal.md)|Details about how the Requester creates a change request in the Enterprise Mode Site List Portal.| +|[Verify your changes using the Enterprise Mode Site List Portal](verify-changes-preprod-enterprise-mode-portal.md)|Details about how the Requester tests a change request in the pre-production environment of the Enterprise Mode Site List Portal.| +|[Approve a change request using the Enterprise Mode Site List Portal](approve-change-request-enterprise-mode-portal.md)|Details about how the Approver(s) approve a change request in the Enterprise Mode Site List Portal.| +|[Schedule approved change requests for production using the Enterprise Mode Site List Portal](schedule-production-change-enterprise-mode-portal.md)|Details about how the Requester schedules the approved change request update in the Enterprise Mode Site List Portal.| +|[Verify the change request update in the production environment using the Enterprise Mode Site List Portal](verify-changes-production-enterprise-mode-portal.md)|Details about how the Requester tests an update in the production environment of the Enterprise Mode Site List Portal.| +|[View the apps currently on the Enterprise Mode Site List](view-apps-enterprise-mode-site-list.md)|Details about how anyone with access to the portal can review the apps already on the active Enterprise Mode Site List.| +|[View the available Enterprise Mode reports from the Enterprise Mode Site List Portal](view-enterprise-mode-reports-for-portal.md) |Details about how the Administrator can view the view the Microsoft-provided Enterprise Mode reports from the Enterprise Mode Site List Portal. | + + +## Related topics +- [Set up the Enterprise Mode Site List Portal](set-up-enterprise-mode-portal.md) + +- [Enterprise Mode Site List Portal source code](https://github.com/MicrosoftEdge/enterprise-mode-site-list-portal) + +- [Enterprise Mode and the Enterprise Mode Site List](what-is-enterprise-mode.md) diff --git a/browsers/internet-explorer/ie11-faq/faq-for-it-pros-ie11.md b/browsers/internet-explorer/ie11-faq/faq-for-it-pros-ie11.md index 9230c868d0..8917b1de22 100644 --- a/browsers/internet-explorer/ie11-faq/faq-for-it-pros-ie11.md +++ b/browsers/internet-explorer/ie11-faq/faq-for-it-pros-ie11.md @@ -1,203 +1,204 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: explore -description: Frequently asked questions about Internet Explorer 11 for IT Pros -author: lomayor -ms.prod: ie11 -ms.assetid: 140e7d33-584a-44da-8c68-6c1d568e1de3 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Internet Explorer 11 - FAQ for IT Pros (Internet Explorer 11 for IT Pros) -ms.sitesec: library -ms.date: 10/16/2017 ---- - - -# Internet Explorer 11 - FAQ for IT Pros -Answering frequently asked questions about Internet Explorer 11 (IE11) features, operating system support, integration with the Windows operating system, Group Policy, and general configuration. - -## Frequently Asked Questions - -**Q: What operating system does IE11 run on?** - -- Windows 10 - -- Windows 8.1 - -- Windows Server 2012 R2 - -- Windows 7 with Service Pack 1 (SP1) - -- Windows Server 2008 R2 with Service Pack 1 (SP1) - - -**Q: How do I install IE11 on Windows 10, Windows 8.1, or Windows Server 2012 R2?**
          -IE11 is preinstalled with Windows 8.1 and Windows Server 2012 R2. No additional action is required. - -**Q: How do I install IE11 on Windows 7 with SP1 or Windows Server 2008 R2 with SP1?**
          -You can install IE11 on computers running either Windows 7 with SP1 or Windows Server 2008 R2 with SP1. To download IE11, see the IE11 [home page](https://go.microsoft.com/fwlink/p/?LinkId=290956). - -**Q: How does IE11 integrate with Windows 8.1?**
          -IE11 is the default handler for the HTTP and HTTPS protocols and the default browser for Windows 8.1. There are two experiences in Windows 8.1: Internet Explorer and Internet Explorer for the desktop. IE is the default browser for touch-first, immersive experiences. Internet Explorer for the desktop provides a more traditional window and tab management experience. The underlying platform of IE11 is fully interoperable across both IE and the familiar Internet Explorer for the desktop, letting developers write the same markup for both experiences. - -**Q: What are the new or improved security features?**
          -IE11 offers improvements to Enhanced Protected Mode, password manager, and other security features. IE11 also turns on Transport Layer Security (TLS) 1.2 by default. - -**Q: How is Microsoft supporting modern web standards, such as WebGL?**
          -Microsoft is committed to providing an interoperable web by supporting modern web standards. Doing this lets developers use the same markup across web browsers, helping to reduce development and support costs.

          -Supported web standards include: - -- Web Graphics Library (WebGL) - -- Canvas 2D L2 extensions, including image smoothing using the nearest neighbor, dashed lines, and fill rules - -- Fullscreen API - -- Encrypted media extensions - -- Media source extensions - -- CSS flexible box layout module - -- And mutation observers like DOM4 and 5.3 - -For more information about specific changes and additions, see the [IE11 guide for developers](https://go.microsoft.com/fwlink/p/?LinkId=313188). - -**Q: What test tools exist to test for potential application compatibility issues?**
          -The Compat Inspector tool supports Windows Internet Explorer 9 through IE11. For more information, see [Compat Inspector User Guide](https://go.microsoft.com/fwlink/p/?LinkId=313189). In addition, you can use the new [F12 Developer Tools](https://go.microsoft.com/fwlink/p/?LinkId=313190) that are included with IE11, or the [modern.ie](https://go.microsoft.com/fwlink/p/?linkid=308902) website for Microsoft Edge. - -**Q: Why am I having problems launching my legacy apps with Internet Explorer 11**?
          -It’s most likely because IE no longer starts apps that use managed browser hosting controls, like in the .NET Framework 1.1 and 2.0. You can get IE11 to use managed browser hosting controls again, by: - -- **For x86 systems or for 32-bit processes on x64 systems:** Go to the `HKLM\SOFTWARE\MICROSOFT\.NETFramework` registry key and change the **EnableIEHosting** value to **1**. - -- **For x64 systems or for 64-bit processes on x64 systems:** Go to the `HKLM\SOFTWARE\Wow6432Node\.NETFramework` registry key and change the **EnableIEHosting** value to **1**. - -For more information, see the [Web Applications](https://go.microsoft.com/fwlink/p/?LinkId=308903) section of the Application Compatibility in the .NET Framework 4.5 page. - -**Q: Is there a compatibility list for IE?**
          -Yes. You can review the XML-based [compatibility version list](https://go.microsoft.com/fwlink/p/?LinkId=403864). - -**Q: What is Enterprise Mode?**
          -Enterprise Mode is a compatibility mode designed for Enterprises. This mode lets websites render using a modified browser configuration that’s designed to avoid the common compatibility problems associated with web apps written and tested on older versions of IE, like Windows Internet Explorer 7 or Windows Internet Explorer 8.

          -For more information, see [Turn on Enterprise Mode and use a site list](../ie11-deploy-guide/turn-on-enterprise-mode-and-use-a-site-list.md). - -**Q: What is the Enterprise Mode Site List Manager tool?**
          -Enterprise Mode Site List Manager tool gives you a way to add websites to your Enterprise Mode site list, without having to manually code XML.

          -For more information, see all of the topics in [Use the Enterprise Mode Site List Manager](../ie11-deploy-guide/use-the-enterprise-mode-site-list-manager.md). - -**Q: Are browser plug-ins supported in IE11?**
          -The immersive version of IE11 provides an add-on–free experience, so browser plugins won't load and dependent content won't be displayed. This doesn't apply to Internet Explorer for the desktop. For more information, see [Browsing Without Plug-ins](https://go.microsoft.com/fwlink/p/?LinkId=242587). However, Internet Explorer for the desktop and IE11 on Windows 7 with SP1 do support browser plugins, including ActiveX controls such as Adobe Flash and Microsoft Silverlight. - -**Q: Is Adobe Flash supported on IE11?**
          -Adobe Flash is included as a platform feature and is available out of the box for Windows 8.1, running on both IE and Internet Explorer for the desktop. Users can turn this feature on or off using the **Manage Add-ons** dialog box, while administrators can turn this feature on or off using the Group Policy setting, **Turn off Adobe Flash in IE and prevent applications from using IE technology to instantiate Flash objects**.

          -**Important**
          -The preinstalled version of Adobe Flash isn't supported on IE11 running on either Windows 7 with SP1 or Windows Server 2008 R2 with SP1. However, you can still download and install the separate Adobe Flash plug-in. - -**Q: Can I replace IE11 on Windows 8.1 with an earlier version?**
          -No. Windows 8.1 doesn't support any of the previous versions of IE. - -**Q: Are there any new Group Policy settings in IE11?**
          -IE11 includes all of the previous Group Policy settings you've used to manage and control web browser configuration since Internet Explorer 9. It also includes the following new Group Policy settings, supporting new features: - -- Turn off Page Prediction - -- Turn on the swiping motion for Internet Explorer for the desktop - -- Allow Microsoft services to provide more relevant and personalized search results - -- Turn off phone number detection - -- Allow IE to use the SPDY/3 network protocol - -- Let users turn on and use Enterprise Mode from the **Tools** menu - -- Use the Enterprise Mode IE website list - -For more information, see [New group policy settings for IE11](../ie11-deploy-guide/new-group-policy-settings-for-ie11.md). - - -**Q: Where can I get more information about IE11 for IT pros?**
          -Visit the [Springboard Series for Microsoft Browsers](https://go.microsoft.com/fwlink/p/?LinkId=313191) webpage on TechNet. - - - -**Q: Can I customize settings for IE on Windows 8.1?**
          -Settings can be customized in the following ways: - -- IE11 **Settings** charm. - -- IE11-related Group Policy settings. - -- IEAK 11 for settings shared by both IE and Internet Explorer for the desktop. - -**Q: Can I make Internet Explorer for the desktop my default browsing experience?**
          -Group Policy settings can be set to open either IE or Internet Explorer for the desktop as the default browser experience. Individual users can configure their own settings in the **Programs** tab of **Internet Options**. The following table shows the settings and results:

          - -|Setting |Result | -|--------|-------| -|Let IE decide |Links open in the same type of experience from where they're launched. For example, clicking a link from a Microsoft Store app, opens IE. However, clicking a link from a desktop app, opens Internet Explorer for the desktop. | -|Always in IE11 |Links always open in IE. | -|Always in Internet Explorer for the desktop |Links always open in Internet Explorer for the desktop. | - - -**Q. Can IEAK 11 build custom Internet Explorer 11 packages in languages other than the language of the in-use IEAK 11 version?** -Yes. You can use IEAK 11 to build custom Internet Explorer 11 packages in any of the supported 24 languages. You'll select the language for the custom package on the Language Selection page of the customization wizard. - -IEAK 11 is available in 24 languages but can build customized Internet Explorer 11 packages in all languages of the supported operating systems. Select a language below and download IEAK 11 from the download center: - -| | | | -|---------|---------|---------| -|[English](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/en-us/ieak.msi) |[French](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/fr-fr/ieak.msi) |[Norwegian (Bokmål)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/nb-no/ieak.msi) | -|[Arabic](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ar-sa/ieak.msi) |[Chinese (Simplified)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/zh-cn/ieak.msi) |[Chinese(Traditional)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/zh-tw/ieak.msi) | -|[Czech](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/cs-cz/ieak.msi) |[Danish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/da-dk/ieak.msi) |[Dutch](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/nl-nl/ieak.msi) | -|[Finnish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/fi-fi/ieak.msi) |[German](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/de-de/ieak.msi) |[Greek](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/el-gr/ieak.msi) | -|[Hebrew](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/he-il/ieak.msi) |[Hungarian](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/hu-hu/ieak.msi) |[Italian](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/it-it/ieak.msi) | -|[Japanese](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ja-jp/ieak.msi) |[Korean](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ko-kr/ieak.msi) |[Polish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/pl-pl/ieak.msi) | -|[Portuguese (Brazil)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/pt-br/ieak.msi) |[Portuguese (Portugal)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/pt-pt/ieak.msi) |[Russian](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ru-ru/ieak.msi) | -|[Spanish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/es-es/ieak.msi) |[Swedish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/sv-se/ieak.msi) |[Turkish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/tr-tr/ieak.msi) | - - - - -**Q. What are the different modes available for the Internet Explorer Customization Wizard?** -The IEAK Customization Wizard displays pages based on your licensing mode selection, either **Internal** or **External**. For more information on IEAK Customization Wizard modes, see [Determine the licensing version and features to use in IEAK 11](../ie11-ieak/licensing-version-and-features-ieak11.md). - -The following table displays which pages are available in IEAK 11, based on the licensing mode: - -| **Wizard Pages** | **External** | **Internal** | -|-------------------------------------------|--------------|--------------| -| Welcome to the IEAK | Yes | Yes | -| File Locations | Yes | Yes | -| Platform Selection | Yes | Yes | -| Language Selection | Yes | Yes | -| Package Type Selection | Yes | Yes | -| Feature Selection | Yes | Yes | -| Automatic Version Synchronization | Yes | Yes | -| Custom Components | Yes | Yes | -| Corporate Install | No | Yes | -| User Experience | No | Yes | -| Browser User Interface | Yes | Yes | -| Search Providers | Yes | Yes | -| Important URLs - Home page and Support | Yes | Yes | -| Accelerators | Yes | Yes | -| Favorites, Favorites Bar, and Feeds | Yes | Yes | -| Browsing Options | No | Yes | -| First Run Wizard and Welcome Page Options | Yes | Yes | -| Compatibility View | Yes | Yes | -| Connection Manager | Yes | Yes | -| Connection Settings | Yes | Yes | -| Automatic Configuration | No | Yes | -| Proxy Settings | Yes | Yes | -| Security and Privacy Settings | No | Yes | -| Add a Root Certificate | Yes | No | -| Programs | Yes | Yes | -| Additional Settings | No | Yes | -| Wizard Complete | Yes | Yes | - - -## Related topics -- [Microsoft Edge - Deployment Guide for IT Pros](https://go.microsoft.com/fwlink/p/?LinkId=760643) -- [Internet Explorer 11 (IE11) - Deployment Guide for IT Pros](../ie11-deploy-guide/index.md) -- [Internet Explorer Administration Kit 11 (IEAK 11) - Administrator's Guide](../ie11-ieak/index.md) +--- +ms.localizationpriority: medium +ms.mktglfcycl: explore +description: Frequently asked questions about Internet Explorer 11 for IT Pros +author: dansimp +ms.prod: ie11 +ms.assetid: 140e7d33-584a-44da-8c68-6c1d568e1de3 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Internet Explorer 11 - FAQ for IT Pros (Internet Explorer 11 for IT Pros) +ms.sitesec: library +ms.date: 10/16/2017 +--- + + +# Internet Explorer 11 - FAQ for IT Pros +Answering frequently asked questions about Internet Explorer 11 (IE11) features, operating system support, integration with the Windows operating system, Group Policy, and general configuration. + +## Frequently Asked Questions + +**Q: What operating system does IE11 run on?** + +- Windows 10 + +- Windows 8.1 + +- Windows Server 2012 R2 + +- Windows 7 with Service Pack 1 (SP1) + +- Windows Server 2008 R2 with Service Pack 1 (SP1) + + +**Q: How do I install IE11 on Windows 10, Windows 8.1, or Windows Server 2012 R2?**
          +IE11 is preinstalled with Windows 8.1 and Windows Server 2012 R2. No additional action is required. + +**Q: How do I install IE11 on Windows 7 with SP1 or Windows Server 2008 R2 with SP1?**
          +You can install IE11 on computers running either Windows 7 with SP1 or Windows Server 2008 R2 with SP1. To download IE11, see the IE11 [home page](https://go.microsoft.com/fwlink/p/?LinkId=290956). + +**Q: How does IE11 integrate with Windows 8.1?**
          +IE11 is the default handler for the HTTP and HTTPS protocols and the default browser for Windows 8.1. There are two experiences in Windows 8.1: Internet Explorer and Internet Explorer for the desktop. IE is the default browser for touch-first, immersive experiences. Internet Explorer for the desktop provides a more traditional window and tab management experience. The underlying platform of IE11 is fully interoperable across both IE and the familiar Internet Explorer for the desktop, letting developers write the same markup for both experiences. + +**Q: What are the new or improved security features?**
          +IE11 offers improvements to Enhanced Protected Mode, password manager, and other security features. IE11 also turns on Transport Layer Security (TLS) 1.2 by default. + +**Q: How is Microsoft supporting modern web standards, such as WebGL?**
          +Microsoft is committed to providing an interoperable web by supporting modern web standards. Doing this lets developers use the same markup across web browsers, helping to reduce development and support costs.

          +Supported web standards include: + +- Web Graphics Library (WebGL) + +- Canvas 2D L2 extensions, including image smoothing using the nearest neighbor, dashed lines, and fill rules + +- Fullscreen API + +- Encrypted media extensions + +- Media source extensions + +- CSS flexible box layout module + +- And mutation observers like DOM4 and 5.3 + +For more information about specific changes and additions, see the [IE11 guide for developers](https://go.microsoft.com/fwlink/p/?LinkId=313188). + +**Q: What test tools exist to test for potential application compatibility issues?**
          +The Compat Inspector tool supports Windows Internet Explorer 9 through IE11. For more information, see [Compat Inspector User Guide](https://go.microsoft.com/fwlink/p/?LinkId=313189). In addition, you can use the new [F12 Developer Tools](https://go.microsoft.com/fwlink/p/?LinkId=313190) that are included with IE11, or the [modern.ie](https://go.microsoft.com/fwlink/p/?linkid=308902) website for Microsoft Edge. + +**Q: Why am I having problems launching my legacy apps with Internet Explorer 11**?
          +It’s most likely because IE no longer starts apps that use managed browser hosting controls, like in the .NET Framework 1.1 and 2.0. You can get IE11 to use managed browser hosting controls again, by: + +- **For x86 systems or for 32-bit processes on x64 systems:** Go to the `HKLM\SOFTWARE\MICROSOFT\.NETFramework` registry key and change the **EnableIEHosting** value to **1**. + +- **For x64 systems or for 64-bit processes on x64 systems:** Go to the `HKLM\SOFTWARE\Wow6432Node\.NETFramework` registry key and change the **EnableIEHosting** value to **1**. + +For more information, see the [Web Applications](https://go.microsoft.com/fwlink/p/?LinkId=308903) section of the Application Compatibility in the .NET Framework 4.5 page. + +**Q: Is there a compatibility list for IE?**
          +Yes. You can review the XML-based [compatibility version list](https://go.microsoft.com/fwlink/p/?LinkId=403864). + +**Q: What is Enterprise Mode?**
          +Enterprise Mode is a compatibility mode designed for Enterprises. This mode lets websites render using a modified browser configuration that’s designed to avoid the common compatibility problems associated with web apps written and tested on older versions of IE, like Windows Internet Explorer 7 or Windows Internet Explorer 8.

          +For more information, see [Turn on Enterprise Mode and use a site list](../ie11-deploy-guide/turn-on-enterprise-mode-and-use-a-site-list.md). + +**Q: What is the Enterprise Mode Site List Manager tool?**
          +Enterprise Mode Site List Manager tool gives you a way to add websites to your Enterprise Mode site list, without having to manually code XML.

          +For more information, see all of the topics in [Use the Enterprise Mode Site List Manager](../ie11-deploy-guide/use-the-enterprise-mode-site-list-manager.md). + +**Q: Are browser plug-ins supported in IE11?**
          +The immersive version of IE11 provides an add-on–free experience, so browser plugins won't load and dependent content won't be displayed. This doesn't apply to Internet Explorer for the desktop. For more information, see [Browsing Without Plug-ins](https://go.microsoft.com/fwlink/p/?LinkId=242587). However, Internet Explorer for the desktop and IE11 on Windows 7 with SP1 do support browser plugins, including ActiveX controls such as Adobe Flash and Microsoft Silverlight. + +**Q: Is Adobe Flash supported on IE11?**
          +Adobe Flash is included as a platform feature and is available out of the box for Windows 8.1, running on both IE and Internet Explorer for the desktop. Users can turn this feature on or off using the **Manage Add-ons** dialog box, while administrators can turn this feature on or off using the Group Policy setting, **Turn off Adobe Flash in IE and prevent applications from using IE technology to instantiate Flash objects**.

          +**Important**
          +The preinstalled version of Adobe Flash isn't supported on IE11 running on either Windows 7 with SP1 or Windows Server 2008 R2 with SP1. However, you can still download and install the separate Adobe Flash plug-in. + +**Q: Can I replace IE11 on Windows 8.1 with an earlier version?**
          +No. Windows 8.1 doesn't support any of the previous versions of IE. + +**Q: Are there any new Group Policy settings in IE11?**
          +IE11 includes all of the previous Group Policy settings you've used to manage and control web browser configuration since Internet Explorer 9. It also includes the following new Group Policy settings, supporting new features: + +- Turn off Page Prediction + +- Turn on the swiping motion for Internet Explorer for the desktop + +- Allow Microsoft services to provide more relevant and personalized search results + +- Turn off phone number detection + +- Allow IE to use the SPDY/3 network protocol + +- Let users turn on and use Enterprise Mode from the **Tools** menu + +- Use the Enterprise Mode IE website list + +For more information, see [New group policy settings for IE11](../ie11-deploy-guide/new-group-policy-settings-for-ie11.md). + + +**Q: Where can I get more information about IE11 for IT pros?**
          +Visit the [Springboard Series for Microsoft Browsers](https://go.microsoft.com/fwlink/p/?LinkId=313191) webpage on TechNet. + + + +**Q: Can I customize settings for IE on Windows 8.1?**
          +Settings can be customized in the following ways: + +- IE11 **Settings** charm. + +- IE11-related Group Policy settings. + +- IEAK 11 for settings shared by both IE and Internet Explorer for the desktop. + +**Q: Can I make Internet Explorer for the desktop my default browsing experience?**
          +Group Policy settings can be set to open either IE or Internet Explorer for the desktop as the default browser experience. Individual users can configure their own settings in the **Programs** tab of **Internet Options**. The following table shows the settings and results:

          + +|Setting |Result | +|--------|-------| +|Let IE decide |Links open in the same type of experience from where they're launched. For example, clicking a link from a Microsoft Store app, opens IE. However, clicking a link from a desktop app, opens Internet Explorer for the desktop. | +|Always in IE11 |Links always open in IE. | +|Always in Internet Explorer for the desktop |Links always open in Internet Explorer for the desktop. | + + +**Q. Can IEAK 11 build custom Internet Explorer 11 packages in languages other than the language of the in-use IEAK 11 version?** +Yes. You can use IEAK 11 to build custom Internet Explorer 11 packages in any of the supported 24 languages. You'll select the language for the custom package on the Language Selection page of the customization wizard. + +IEAK 11 is available in 24 languages but can build customized Internet Explorer 11 packages in all languages of the supported operating systems. Select a language below and download IEAK 11 from the download center: + +| | | | +|---------|---------|---------| +|[English](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/en-us/ieak.msi) |[French](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/fr-fr/ieak.msi) |[Norwegian (Bokmål)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/nb-no/ieak.msi) | +|[Arabic](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ar-sa/ieak.msi) |[Chinese (Simplified)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/zh-cn/ieak.msi) |[Chinese(Traditional)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/zh-tw/ieak.msi) | +|[Czech](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/cs-cz/ieak.msi) |[Danish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/da-dk/ieak.msi) |[Dutch](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/nl-nl/ieak.msi) | +|[Finnish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/fi-fi/ieak.msi) |[German](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/de-de/ieak.msi) |[Greek](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/el-gr/ieak.msi) | +|[Hebrew](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/he-il/ieak.msi) |[Hungarian](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/hu-hu/ieak.msi) |[Italian](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/it-it/ieak.msi) | +|[Japanese](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ja-jp/ieak.msi) |[Korean](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ko-kr/ieak.msi) |[Polish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/pl-pl/ieak.msi) | +|[Portuguese (Brazil)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/pt-br/ieak.msi) |[Portuguese (Portugal)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/pt-pt/ieak.msi) |[Russian](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ru-ru/ieak.msi) | +|[Spanish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/es-es/ieak.msi) |[Swedish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/sv-se/ieak.msi) |[Turkish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/tr-tr/ieak.msi) | + + + + +**Q. What are the different modes available for the Internet Explorer Customization Wizard?** +The IEAK Customization Wizard displays pages based on your licensing mode selection, either **Internal** or **External**. For more information on IEAK Customization Wizard modes, see [Determine the licensing version and features to use in IEAK 11](../ie11-ieak/licensing-version-and-features-ieak11.md). + +The following table displays which pages are available in IEAK 11, based on the licensing mode: + +| **Wizard Pages** | **External** | **Internal** | +|-------------------------------------------|--------------|--------------| +| Welcome to the IEAK | Yes | Yes | +| File Locations | Yes | Yes | +| Platform Selection | Yes | Yes | +| Language Selection | Yes | Yes | +| Package Type Selection | Yes | Yes | +| Feature Selection | Yes | Yes | +| Automatic Version Synchronization | Yes | Yes | +| Custom Components | Yes | Yes | +| Corporate Install | No | Yes | +| User Experience | No | Yes | +| Browser User Interface | Yes | Yes | +| Search Providers | Yes | Yes | +| Important URLs - Home page and Support | Yes | Yes | +| Accelerators | Yes | Yes | +| Favorites, Favorites Bar, and Feeds | Yes | Yes | +| Browsing Options | No | Yes | +| First Run Wizard and Welcome Page Options | Yes | Yes | +| Compatibility View | Yes | Yes | +| Connection Manager | Yes | Yes | +| Connection Settings | Yes | Yes | +| Automatic Configuration | No | Yes | +| Proxy Settings | Yes | Yes | +| Security and Privacy Settings | No | Yes | +| Add a Root Certificate | Yes | No | +| Programs | Yes | Yes | +| Additional Settings | No | Yes | +| Wizard Complete | Yes | Yes | + + +## Related topics +- [Microsoft Edge - Deployment Guide for IT Pros](https://go.microsoft.com/fwlink/p/?LinkId=760643) +- [Internet Explorer 11 (IE11) - Deployment Guide for IT Pros](../ie11-deploy-guide/index.md) +- [Internet Explorer Administration Kit 11 (IEAK 11) - Administrator's Guide](../ie11-ieak/index.md) diff --git a/browsers/internet-explorer/ie11-faq/faq-ie11-blocker-toolkit.md b/browsers/internet-explorer/ie11-faq/faq-ie11-blocker-toolkit.md index 392e7cc26e..a4cb639bc5 100644 --- a/browsers/internet-explorer/ie11-faq/faq-ie11-blocker-toolkit.md +++ b/browsers/internet-explorer/ie11-faq/faq-ie11-blocker-toolkit.md @@ -1,120 +1,121 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: explore -description: Get answers to commonly asked questions about the Internet Explorer 11 Blocker Toolkit. -author: lomayor -ms.author: lomayor -ms.prod: ie11 -ms.assetid: -ms.reviewer: -audience: itpro manager: dansimp -title: Internet Explorer 11 Blocker Toolkit - Frequently Asked Questions -ms.sitesec: library -ms.date: 05/10/2018 ---- - -# Internet Explorer 11 Blocker Toolkit - Frequently Asked Questions - -Get answers to commonly asked questions about the Internet Explorer 11 Blocker Toolkit. - ->[!Important] ->If you administer your company’s environment using an update management solution, such as Windows Server Update Services (WSUS) or System Center 2012 Configuration Manager, you don’t need to use the Internet Explorer 11 Blocker Toolkit. Update management solutions let you completely manage your Windows Updates and Microsoft Updates, including your Internet Explorer 11 deployment. - -- [Automatic updates delivery process](#automatic-updates-delivery-process) - -- [How the Internet Explorer 11 Blocker Toolkit works](#how-the-internet-explorer-11-blocker-toolkit-works) - -- [Internet Explorer 11 Blocker Toolkit and other update services](#internet-explorer-11-blocker-toolkit-and-other-update-services) - -## Automatic Updates delivery process - - -**Q. Which users will receive Internet Explorer 11 as an important update?** -A. Users running either Windows 7 with Service Pack 1 (SP1) or the 64-bit version of Windows Server 2008 R2 with Service Pack 1 (SP1) will receive Internet Explorer 11 as an important update, if Automatic Updates are turned on. Windows Update is manually run. Automatic Updates will automatically download and install the Internet Explorer 11 files if it’s turned on. For more information about how Internet Explorer works with Automatic Updates and information about other deployment blocking options, see [Internet Explorer 11 Delivery through automatic updates](../ie11-deploy-guide/ie11-delivery-through-automatic-updates.md). - -**Q. When is the Blocker Toolkit available?** -A. The Blocker Toolkit is currently available from the [Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=40722). - -**Q. What tools can I use to manage Windows Updates and Microsoft Updates in my company?** -A. We encourage anyone who wants full control over their company’s deployment of Windows Updates and Microsoft Updates, to use [Windows Server Update Services (WSUS)](https://docs.microsoft.com/windows-server/administration/windows-server-update-services/get-started/windows-server-update-services-wsus), a free tool for users of Windows Server. You can also use the more advanced configuration management tool, [System Center 2012 Configuration Manager](https://technet.microsoft.com/library/gg682041.aspx). - -**Q. How long does the blocker mechanism work?** -A. The Internet Explorer 11 Blocker Toolkit uses a registry key value to permanently turn off the automatic delivery of Internet Explorer 11. This behavior lasts as long as the registry key value isn’t removed or changed. - -**Q. Why should I use the Internet Explorer 11 Blocker Toolkit to stop delivery of Internet Explorer 11? Why can’t I just disable all of Automatic Updates?** -A. Automatic Updates provide you with ongoing critical security and reliability updates. Turning this feature off can leave your computers more vulnerable. Instead, we suggest that you use an update management solution, such as WSUS, to fully control your environment while leaving this feature running, managing how and when the updates get to your user’s computers. - -The Internet Explorer 11 Blocker Toolkit safely allows Internet Explorer 11 to download and install in companies that can’t use WSUS, Configuration Manager, or -other update management solution. - -**Q. Why don’t we just block URL access to Windows Update or Microsoft Update?** -A. Blocking the Windows Update or Microsoft Update URLs also stops delivery of critical security and reliability updates for all of the supported versions of the Windows operating system; leaving your computers more vulnerable. - -## How the Internet Explorer 11 Blocker Toolkit works - -**Q. How should I test the Internet Explorer 11 Blocker Toolkit in my company?** -A. Because the toolkit only sets a registry key to turn on and off the delivery of Internet Explorer 11, there should be no additional impact or side effects to your environment. No additional testing should be necessary. - -**Q. What’s the registry key used to block delivery of Internet Explorer 11?** -A. HKLM\\SOFTWARE\\Microsoft\\Internet Explorer\\Setup\\11.0 - -**Q. What’s the registry key name and values?** -The registry key name is **DoNotAllowIE11**, where: - -- A value of **1** turns off the automatic delivery of Internet Explorer 11 using Automatic Updates and turns off the Express install option. - -- Not providing a registry key, or using a value of anything other than **1**, lets the user install Internet Explorer 11 through Automatic Updates or a - manual update. - -**Q. Does the Internet Explorer 11 Blocker Toolkit stop users from manually installing Internet Explorer 11?** -A. No. The Internet Explorer 11 Blocker Toolkit only stops computers from automatically installing Internet Explorer 11 through Automatic Updates. Users can still download and install Internet Explorer 11 from the Microsoft Download Center or from external media. - -**Q. Does the Internet Explorer 11 Blocker Toolkit stop users from automatically upgrading to Internet Explorer 11?** -A. Yes. The Internet Explorer 11 Blocker Toolkit also prevents Automatic Updates from automatically upgrading a computer from Internet Explorer 8, Internet Explorer 9, or Internet Explorer 10 to Internet Explorer 11. - -**Q. How does the provided script work?** -A. The script accepts one of two command line options: - -- **Block:** Creates the registry key that stops Internet Explorer 11 from installing through Automatic Updates. - -- **Unblock:** Removes the registry key that stops Internet Explorer 11 from installing through Automatic Updates. - -**Q. What’s the ADM template file used for?** -A. The Administrative Template (.adm file) lets you import the new Group Policy environment and use Group Policy Objects to centrally manage all of the computers in your company. - -**Q. Is the tool localized?** -A. No. The tool isn’t localized, it’s only available in English (en-us). However, it does work, without any modifications, on any language edition of the supported operating systems. - -## Internet Explorer 11 Blocker Toolkit and other update services - -**Q: Is there a version of the Internet Explorer Blocker Toolkit that will prevent automatic installation of IE11?**
          -Yes. The IE11 Blocker Toolkit is available for download. For more information, see [Toolkit to Disable Automatic Delivery of IE11](https://go.microsoft.com/fwlink/p/?LinkId=328195) on the Microsoft Download Center. - -**Q. Does the Internet Explorer 11 blocking mechanism also block delivery of Internet Explorer 11 through update management solutions, like WSUS?** -A. No. You can still deploy Internet Explorer 11 using one of the upgrade management solutions, even if the blocking mechanism is activated. The Internet Explorer 11 Blocker Toolkit is only intended for companies that don’t use upgrade management solutions. - -**Q. If WSUS is set to 'auto-approve' Update Rollup packages (this is not the default configuration), how do I stop Internet Explorer 11 from automatically installing throughout my company?** -A. You only need to change your settings if: - -- You use WSUS to manage updates and allow auto-approvals for Update Rollup installation. - - -and- - -- You have computers running either Windows 7 SP1 or Windows Server 2008 R2 (SP1) with Internet Explorer 8, Internet Explorer 9, or Internet Explorer 10 installed. - - -and- - -- You don’t want to upgrade your older versions of Internet Explorer to Internet Explorer 11 right now. - -If these scenarios apply to your company, see [Internet Explorer 11 delivery through automatic updates](../ie11-deploy-guide/ie11-delivery-through-automatic-updates.md) for more information on how to prevent automatic installation. - - -## Additional resources - -- [Internet Explorer 11 Blocker Toolkit download](https://www.microsoft.com/download/details.aspx?id=40722) - -- [Internet Explorer 11 FAQ for IT pros](https://docs.microsoft.com/internet-explorer/ie11-faq/faq-for-it-pros-ie11) - -- [Internet Explorer 11 delivery through automatic updates](../ie11-deploy-guide/ie11-delivery-through-automatic-updates.md) - -- [Internet Explorer 11 deployment guide](https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/index) +--- +ms.localizationpriority: medium +ms.mktglfcycl: explore +description: Get answers to commonly asked questions about the Internet Explorer 11 Blocker Toolkit. +author: dansimp +ms.author: dansimp +ms.prod: ie11 +ms.assetid: +ms.reviewer: +audience: itpro +manager: dansimp +title: Internet Explorer 11 Blocker Toolkit - Frequently Asked Questions +ms.sitesec: library +ms.date: 05/10/2018 +--- + +# Internet Explorer 11 Blocker Toolkit - Frequently Asked Questions + +Get answers to commonly asked questions about the Internet Explorer 11 Blocker Toolkit. + +>[!Important] +>If you administer your company’s environment using an update management solution, such as Windows Server Update Services (WSUS) or System Center 2012 Configuration Manager, you don’t need to use the Internet Explorer 11 Blocker Toolkit. Update management solutions let you completely manage your Windows Updates and Microsoft Updates, including your Internet Explorer 11 deployment. + +- [Automatic updates delivery process](#automatic-updates-delivery-process) + +- [How the Internet Explorer 11 Blocker Toolkit works](#how-the-internet-explorer-11-blocker-toolkit-works) + +- [Internet Explorer 11 Blocker Toolkit and other update services](#internet-explorer-11-blocker-toolkit-and-other-update-services) + +## Automatic Updates delivery process + + +**Q. Which users will receive Internet Explorer 11 as an important update?** +A. Users running either Windows 7 with Service Pack 1 (SP1) or the 64-bit version of Windows Server 2008 R2 with Service Pack 1 (SP1) will receive Internet Explorer 11 as an important update, if Automatic Updates are turned on. Windows Update is manually run. Automatic Updates will automatically download and install the Internet Explorer 11 files if it’s turned on. For more information about how Internet Explorer works with Automatic Updates and information about other deployment blocking options, see [Internet Explorer 11 Delivery through automatic updates](../ie11-deploy-guide/ie11-delivery-through-automatic-updates.md). + +**Q. When is the Blocker Toolkit available?** +A. The Blocker Toolkit is currently available from the [Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=40722). + +**Q. What tools can I use to manage Windows Updates and Microsoft Updates in my company?** +A. We encourage anyone who wants full control over their company’s deployment of Windows Updates and Microsoft Updates, to use [Windows Server Update Services (WSUS)](https://docs.microsoft.com/windows-server/administration/windows-server-update-services/get-started/windows-server-update-services-wsus), a free tool for users of Windows Server. You can also use the more advanced configuration management tool, [System Center 2012 Configuration Manager](https://technet.microsoft.com/library/gg682041.aspx). + +**Q. How long does the blocker mechanism work?** +A. The Internet Explorer 11 Blocker Toolkit uses a registry key value to permanently turn off the automatic delivery of Internet Explorer 11. This behavior lasts as long as the registry key value isn’t removed or changed. + +**Q. Why should I use the Internet Explorer 11 Blocker Toolkit to stop delivery of Internet Explorer 11? Why can’t I just disable all of Automatic Updates?** +A. Automatic Updates provide you with ongoing critical security and reliability updates. Turning this feature off can leave your computers more vulnerable. Instead, we suggest that you use an update management solution, such as WSUS, to fully control your environment while leaving this feature running, managing how and when the updates get to your user’s computers. + +The Internet Explorer 11 Blocker Toolkit safely allows Internet Explorer 11 to download and install in companies that can’t use WSUS, Configuration Manager, or +other update management solution. + +**Q. Why don’t we just block URL access to Windows Update or Microsoft Update?** +A. Blocking the Windows Update or Microsoft Update URLs also stops delivery of critical security and reliability updates for all of the supported versions of the Windows operating system; leaving your computers more vulnerable. + +## How the Internet Explorer 11 Blocker Toolkit works + +**Q. How should I test the Internet Explorer 11 Blocker Toolkit in my company?** +A. Because the toolkit only sets a registry key to turn on and off the delivery of Internet Explorer 11, there should be no additional impact or side effects to your environment. No additional testing should be necessary. + +**Q. What’s the registry key used to block delivery of Internet Explorer 11?** +A. HKLM\\SOFTWARE\\Microsoft\\Internet Explorer\\Setup\\11.0 + +**Q. What’s the registry key name and values?** +The registry key name is **DoNotAllowIE11**, where: + +- A value of **1** turns off the automatic delivery of Internet Explorer 11 using Automatic Updates and turns off the Express install option. + +- Not providing a registry key, or using a value of anything other than **1**, lets the user install Internet Explorer 11 through Automatic Updates or a + manual update. + +**Q. Does the Internet Explorer 11 Blocker Toolkit stop users from manually installing Internet Explorer 11?** +A. No. The Internet Explorer 11 Blocker Toolkit only stops computers from automatically installing Internet Explorer 11 through Automatic Updates. Users can still download and install Internet Explorer 11 from the Microsoft Download Center or from external media. + +**Q. Does the Internet Explorer 11 Blocker Toolkit stop users from automatically upgrading to Internet Explorer 11?** +A. Yes. The Internet Explorer 11 Blocker Toolkit also prevents Automatic Updates from automatically upgrading a computer from Internet Explorer 8, Internet Explorer 9, or Internet Explorer 10 to Internet Explorer 11. + +**Q. How does the provided script work?** +A. The script accepts one of two command line options: + +- **Block:** Creates the registry key that stops Internet Explorer 11 from installing through Automatic Updates. + +- **Unblock:** Removes the registry key that stops Internet Explorer 11 from installing through Automatic Updates. + +**Q. What’s the ADM template file used for?** +A. The Administrative Template (.adm file) lets you import the new Group Policy environment and use Group Policy Objects to centrally manage all of the computers in your company. + +**Q. Is the tool localized?** +A. No. The tool isn’t localized, it’s only available in English (en-us). However, it does work, without any modifications, on any language edition of the supported operating systems. + +## Internet Explorer 11 Blocker Toolkit and other update services + +**Q: Is there a version of the Internet Explorer Blocker Toolkit that will prevent automatic installation of IE11?**
          +Yes. The IE11 Blocker Toolkit is available for download. For more information, see [Toolkit to Disable Automatic Delivery of IE11](https://go.microsoft.com/fwlink/p/?LinkId=328195) on the Microsoft Download Center. + +**Q. Does the Internet Explorer 11 blocking mechanism also block delivery of Internet Explorer 11 through update management solutions, like WSUS?** +A. No. You can still deploy Internet Explorer 11 using one of the upgrade management solutions, even if the blocking mechanism is activated. The Internet Explorer 11 Blocker Toolkit is only intended for companies that don’t use upgrade management solutions. + +**Q. If WSUS is set to 'auto-approve' Update Rollup packages (this is not the default configuration), how do I stop Internet Explorer 11 from automatically installing throughout my company?** +A. You only need to change your settings if: + +- You use WSUS to manage updates and allow auto-approvals for Update Rollup installation. + + -and- + +- You have computers running either Windows 7 SP1 or Windows Server 2008 R2 (SP1) with Internet Explorer 8, Internet Explorer 9, or Internet Explorer 10 installed. + + -and- + +- You don’t want to upgrade your older versions of Internet Explorer to Internet Explorer 11 right now. + +If these scenarios apply to your company, see [Internet Explorer 11 delivery through automatic updates](../ie11-deploy-guide/ie11-delivery-through-automatic-updates.md) for more information on how to prevent automatic installation. + + +## Additional resources + +- [Internet Explorer 11 Blocker Toolkit download](https://www.microsoft.com/download/details.aspx?id=40722) + +- [Internet Explorer 11 FAQ for IT pros](https://docs.microsoft.com/internet-explorer/ie11-faq/faq-for-it-pros-ie11) + +- [Internet Explorer 11 delivery through automatic updates](../ie11-deploy-guide/ie11-delivery-through-automatic-updates.md) + +- [Internet Explorer 11 deployment guide](https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/index) diff --git a/browsers/internet-explorer/ie11-faq/faq-ieak11.md b/browsers/internet-explorer/ie11-faq/faq-ieak11.md index 3af0ec2d32..8064c74737 100644 --- a/browsers/internet-explorer/ie11-faq/faq-ieak11.md +++ b/browsers/internet-explorer/ie11-faq/faq-ieak11.md @@ -1,120 +1,121 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: support -ms.pagetype: security -description: Internet Explorer Administration Kit (IEAK) helps corporations, Internet service providers (ISPs), Internet content providers (ICPs), and independent software vendors (ISVs) to deploy and manage web-based solutions. -author: lomayor -ms.author: lomayor -ms.manager: elizapo -ms.prod: ie11 -ms.assetid: -ms.reviewer: -audience: itpro manager: dansimp -title: IEAK 11 - Frequently Asked Questions -ms.sitesec: library -ms.date: 05/10/2018 ---- - -# IEAK 11 - Frequently Asked Questions - -Get answers to commonly asked questions about the Internet Explorer Administration Kit 11 (IEAK 11), and find links to additional material you might find helpful. - -**What is IEAK 11?** - -IEAK 11 enables you to customize, brand, and distribute customized Internet Explorer 11 browser packages across an organization. Download the kit from the [Internet Explorer Administration Kit (IEAK) information and downloads](../ie11-ieak/ieak-information-and-downloads.md). - -**What are the supported operating systems?** - -You can customize and install IEAK 11 on the following supported operating systems: - -- Windows 8 - -- Windows Server 2012 - -- Windows 7 Service Pack 1 (SP1) - -- Windows Server 2008 R2 Service Pack 1 (SP1) - ->[!Note] ->IEAK 11 does not support building custom packages for Windows RT. - - -**What can I customize with IEAK 11?** - -The IEAK 11 enables you to customize branding and settings for Internet Explorer 11. For PCs running Windows 7, the custom package also includes the Internet Explorer executable. - ->[!Note] ->Internet Explorer 11 is preinstalled on PCs running Windows 8. Therefore, the executable is not included in the customized package. - -**Can IEAK 11 build custom Internet Explorer 11 packages in languages other than the language of the in-use IEAK 11 version?** -Yes. You can use IEAK 11 to build custom Internet Explorer 11 packages in any of the supported 24 languages. You'll select the language for the custom package on the Language Selection page of the customization wizard. - ->[!Note] ->IEAK 11 is available in 24 languages but can build customized Internet Explorer 11 packages in all languages of the supported operating systems. To download IEAK 11, see [Internet Explorer Administration Kit (IEAK) information and downloads](../ie11-ieak/ieak-information-and-downloads.md). - -**Q: Is there a version of the Internet Explorer Administration Kit (IEAK) supporting IE11?**
          -Yes. The Internet Explorer Administration Kit 11 (IEAK 11) is available for download. IEAK 11 lets you create custom versions of IE11 for use in your organization. For more information, see the following resources: - -- [Internet Explorer Administration Kit Information and Downloads](https://go.microsoft.com/fwlink/p/?LinkId=214250) on the Internet Explorer TechCenter. - -- [Internet Explorer Administration Kit 11 (IEAK 11) - Administrator's Guide](../ie11-ieak/index.md) - -**What are the different modes available for the Internet Explorer Customization Wizard?** -The IEAK Customization Wizard displays pages based on your licensing mode selection, either **Internal** or **External**. For more information on IEAK Customization Wizard modes, see [What IEAK can do for you](../ie11-ieak/what-ieak-can-do-for-you.md). - -The following table displays which pages are available in IEAK 11, based on the licensing mode: - -| **Wizard Pages** | **External** | **Internal** | -|-------------------------------------------|--------------|--------------| -| Welcome to the IEAK | Yes | Yes | -| File Locations | Yes | Yes | -| Platform Selection | Yes | Yes | -| Language Selection | Yes | Yes | -| Package Type Selection | Yes | Yes | -| Feature Selection | Yes | Yes | -| Automatic Version Synchronization | Yes | Yes | -| Custom Components | Yes | Yes | -| Corporate Install | No | Yes | -| User Experience | No | Yes | -| Browser User Interface | Yes | Yes | -| Search Providers | Yes | Yes | -| Important URLs - Home page and Support | Yes | Yes | -| Accelerators | Yes | Yes | -| Favorites, Favorites Bar, and Feeds | Yes | Yes | -| Browsing Options | No | Yes | -| First Run Wizard and Welcome Page Options | Yes | Yes | -| Compatibility View | Yes | Yes | -| Connection Manager | Yes | Yes | -| Connection Settings | Yes | Yes | -| Automatic Configuration | No | Yes | -| Proxy Settings | Yes | Yes | -| Security and Privacy Settings | No | Yes | -| Add a Root Certificate | Yes | No | -| Programs | Yes | Yes | -| Additional Settings | No | Yes | -| Wizard Complete | Yes | Yes | - - -**Q. Can IEAK 11 build custom Internet Explorer 11 packages in languages other than the language of the in-use IEAK 11 version?** -Yes. You can use IEAK 11 to build custom Internet Explorer 11 packages in any of the supported 24 languages. You'll select the language for the custom package on the Language Selection page of the customization wizard. - -IEAK 11 is available in 24 languages but can build customized Internet Explorer 11 packages in all languages of the supported operating systems. Select a language below and download IEAK 11 from the download center: - -| | | | -|---------|---------|---------| -|[English](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/en-us/ieak.msi) |[French](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/fr-fr/ieak.msi) |[Norwegian (Bokmål)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/nb-no/ieak.msi) | -|[Arabic](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ar-sa/ieak.msi) |[Chinese (Simplified)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/zh-cn/ieak.msi) |[Chinese(Traditional)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/zh-tw/ieak.msi) | -|[Czech](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/cs-cz/ieak.msi) |[Danish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/da-dk/ieak.msi) |[Dutch](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/nl-nl/ieak.msi) | -|[Finnish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/fi-fi/ieak.msi) |[German](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/de-de/ieak.msi) |[Greek](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/el-gr/ieak.msi) | -|[Hebrew](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/he-il/ieak.msi) |[Hungarian](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/hu-hu/ieak.msi) |[Italian](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/it-it/ieak.msi) | -|[Japanese](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ja-jp/ieak.msi) |[Korean](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ko-kr/ieak.msi) |[Polish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/pl-pl/ieak.msi) | -|[Portuguese (Brazil)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/pt-br/ieak.msi) |[Portuguese (Portugal)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/pt-pt/ieak.msi) |[Russian](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ru-ru/ieak.msi) | -|[Spanish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/es-es/ieak.msi) |[Swedish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/sv-se/ieak.msi) |[Turkish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/tr-tr/ieak.msi) | - - -## Additional resources - -[Download IEAK 11](https://technet.microsoft.com/microsoft-edge/bb219517) -[IEAK 11 overview](https://technet.microsoft.com/microsoft-edge/dn532244) -[IEAK 11 product documentation](https://docs.microsoft.com/internet-explorer/ie11-ieak/index) -[IEAK 11 licensing guidelines](../ie11-ieak/licensing-version-and-features-ieak11.md) +--- +ms.localizationpriority: medium +ms.mktglfcycl: support +ms.pagetype: security +description: Internet Explorer Administration Kit (IEAK) helps corporations, Internet service providers (ISPs), Internet content providers (ICPs), and independent software vendors (ISVs) to deploy and manage web-based solutions. +author: dansimp +ms.author: dansimp +ms.manager: elizapo +ms.prod: ie11 +ms.assetid: +ms.reviewer: +audience: itpro +manager: dansimp +title: IEAK 11 - Frequently Asked Questions +ms.sitesec: library +ms.date: 05/10/2018 +--- + +# IEAK 11 - Frequently Asked Questions + +Get answers to commonly asked questions about the Internet Explorer Administration Kit 11 (IEAK 11), and find links to additional material you might find helpful. + +**What is IEAK 11?** + +IEAK 11 enables you to customize, brand, and distribute customized Internet Explorer 11 browser packages across an organization. Download the kit from the [Internet Explorer Administration Kit (IEAK) information and downloads](../ie11-ieak/ieak-information-and-downloads.md). + +**What are the supported operating systems?** + +You can customize and install IEAK 11 on the following supported operating systems: + +- Windows 8 + +- Windows Server 2012 + +- Windows 7 Service Pack 1 (SP1) + +- Windows Server 2008 R2 Service Pack 1 (SP1) + +>[!Note] +>IEAK 11 does not support building custom packages for Windows RT. + + +**What can I customize with IEAK 11?** + +The IEAK 11 enables you to customize branding and settings for Internet Explorer 11. For PCs running Windows 7, the custom package also includes the Internet Explorer executable. + +>[!Note] +>Internet Explorer 11 is preinstalled on PCs running Windows 8. Therefore, the executable is not included in the customized package. + +**Can IEAK 11 build custom Internet Explorer 11 packages in languages other than the language of the in-use IEAK 11 version?** +Yes. You can use IEAK 11 to build custom Internet Explorer 11 packages in any of the supported 24 languages. You'll select the language for the custom package on the Language Selection page of the customization wizard. + +>[!Note] +>IEAK 11 is available in 24 languages but can build customized Internet Explorer 11 packages in all languages of the supported operating systems. To download IEAK 11, see [Internet Explorer Administration Kit (IEAK) information and downloads](../ie11-ieak/ieak-information-and-downloads.md). + +**Q: Is there a version of the Internet Explorer Administration Kit (IEAK) supporting IE11?**
          +Yes. The Internet Explorer Administration Kit 11 (IEAK 11) is available for download. IEAK 11 lets you create custom versions of IE11 for use in your organization. For more information, see the following resources: + +- [Internet Explorer Administration Kit Information and Downloads](https://go.microsoft.com/fwlink/p/?LinkId=214250) on the Internet Explorer TechCenter. + +- [Internet Explorer Administration Kit 11 (IEAK 11) - Administrator's Guide](../ie11-ieak/index.md) + +**What are the different modes available for the Internet Explorer Customization Wizard?** +The IEAK Customization Wizard displays pages based on your licensing mode selection, either **Internal** or **External**. For more information on IEAK Customization Wizard modes, see [What IEAK can do for you](../ie11-ieak/what-ieak-can-do-for-you.md). + +The following table displays which pages are available in IEAK 11, based on the licensing mode: + +| **Wizard Pages** | **External** | **Internal** | +|-------------------------------------------|--------------|--------------| +| Welcome to the IEAK | Yes | Yes | +| File Locations | Yes | Yes | +| Platform Selection | Yes | Yes | +| Language Selection | Yes | Yes | +| Package Type Selection | Yes | Yes | +| Feature Selection | Yes | Yes | +| Automatic Version Synchronization | Yes | Yes | +| Custom Components | Yes | Yes | +| Corporate Install | No | Yes | +| User Experience | No | Yes | +| Browser User Interface | Yes | Yes | +| Search Providers | Yes | Yes | +| Important URLs - Home page and Support | Yes | Yes | +| Accelerators | Yes | Yes | +| Favorites, Favorites Bar, and Feeds | Yes | Yes | +| Browsing Options | No | Yes | +| First Run Wizard and Welcome Page Options | Yes | Yes | +| Compatibility View | Yes | Yes | +| Connection Manager | Yes | Yes | +| Connection Settings | Yes | Yes | +| Automatic Configuration | No | Yes | +| Proxy Settings | Yes | Yes | +| Security and Privacy Settings | No | Yes | +| Add a Root Certificate | Yes | No | +| Programs | Yes | Yes | +| Additional Settings | No | Yes | +| Wizard Complete | Yes | Yes | + + +**Q. Can IEAK 11 build custom Internet Explorer 11 packages in languages other than the language of the in-use IEAK 11 version?** +Yes. You can use IEAK 11 to build custom Internet Explorer 11 packages in any of the supported 24 languages. You'll select the language for the custom package on the Language Selection page of the customization wizard. + +IEAK 11 is available in 24 languages but can build customized Internet Explorer 11 packages in all languages of the supported operating systems. Select a language below and download IEAK 11 from the download center: + +| | | | +|---------|---------|---------| +|[English](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/en-us/ieak.msi) |[French](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/fr-fr/ieak.msi) |[Norwegian (Bokmål)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/nb-no/ieak.msi) | +|[Arabic](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ar-sa/ieak.msi) |[Chinese (Simplified)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/zh-cn/ieak.msi) |[Chinese(Traditional)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/zh-tw/ieak.msi) | +|[Czech](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/cs-cz/ieak.msi) |[Danish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/da-dk/ieak.msi) |[Dutch](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/nl-nl/ieak.msi) | +|[Finnish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/fi-fi/ieak.msi) |[German](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/de-de/ieak.msi) |[Greek](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/el-gr/ieak.msi) | +|[Hebrew](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/he-il/ieak.msi) |[Hungarian](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/hu-hu/ieak.msi) |[Italian](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/it-it/ieak.msi) | +|[Japanese](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ja-jp/ieak.msi) |[Korean](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ko-kr/ieak.msi) |[Polish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/pl-pl/ieak.msi) | +|[Portuguese (Brazil)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/pt-br/ieak.msi) |[Portuguese (Portugal)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/pt-pt/ieak.msi) |[Russian](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ru-ru/ieak.msi) | +|[Spanish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/es-es/ieak.msi) |[Swedish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/sv-se/ieak.msi) |[Turkish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/tr-tr/ieak.msi) | + + +## Additional resources + +[Download IEAK 11](https://technet.microsoft.com/microsoft-edge/bb219517) +[IEAK 11 overview](https://technet.microsoft.com/microsoft-edge/dn532244) +[IEAK 11 product documentation](https://docs.microsoft.com/internet-explorer/ie11-ieak/index) +[IEAK 11 licensing guidelines](../ie11-ieak/licensing-version-and-features-ieak11.md) diff --git a/browsers/internet-explorer/ie11-ieak/accelerators-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/accelerators-ieak11-wizard.md index 2927489c83..b211933353 100644 --- a/browsers/internet-explorer/ie11-ieak/accelerators-ieak11-wizard.md +++ b/browsers/internet-explorer/ie11-ieak/accelerators-ieak11-wizard.md @@ -1,45 +1,46 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: How to use the Accelerators page in the IEAK 11 Customization Wizard to add accelerators to employee devices. -author: lomayor -ms.prod: ie11 -ms.assetid: 208305ad-1bcd-42f3-aca3-0ad1dda7048b -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Use the Accelerators page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Use the Accelerators page in the IEAK 11 Wizard -The **Accelerators** page of the Internet Explorer Administration Kit (IEAK 11) Customization Wizard lets you add accelerators to your employee computers. Accelerators are contextual menu options that can quickly get to a web service from any webpage. For example, an accelerator can look up a highlighted word in the dictionary or a selected location on a map. - -**Note**
          -The customizations you make on this page apply only to Internet Explorer for the desktop. - - **To use the Accelerators page** - -1. Click **Import** to automatically import your existing accelerators from your current version of IE into this list. - -2. Click **Add** to add more accelerators.

          -The **Add Accelerator** box appears. - -3. Use the **Browse** button to go to your custom accelerator XML file. - -4. Check the **Set this Accelerator as the default for the category** box if you want this accelerator to be the default value that shows up for the category. - -5. Click **Edit** to change your accelerator information, click **Set Default** to make an accelerator the default value for a category, or **Remove** to delete an accelerator. - -6. Click **Next** to go to the [Favorites, Favorites Bar, and Feeds](favorites-favoritesbar-and-feeds-ieak11-wizard.md) page or **Back** to go to the [Important URLs - Home Page and Support](important-urls-home-page-and-support-ieak11-wizard.md) page. - -  - -  - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: How to use the Accelerators page in the IEAK 11 Customization Wizard to add accelerators to employee devices. +author: dansimp +ms.prod: ie11 +ms.assetid: 208305ad-1bcd-42f3-aca3-0ad1dda7048b +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Use the Accelerators page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Use the Accelerators page in the IEAK 11 Wizard +The **Accelerators** page of the Internet Explorer Administration Kit (IEAK 11) Customization Wizard lets you add accelerators to your employee computers. Accelerators are contextual menu options that can quickly get to a web service from any webpage. For example, an accelerator can look up a highlighted word in the dictionary or a selected location on a map. + +**Note**
          +The customizations you make on this page apply only to Internet Explorer for the desktop. + + **To use the Accelerators page** + +1. Click **Import** to automatically import your existing accelerators from your current version of IE into this list. + +2. Click **Add** to add more accelerators.

          +The **Add Accelerator** box appears. + +3. Use the **Browse** button to go to your custom accelerator XML file. + +4. Check the **Set this Accelerator as the default for the category** box if you want this accelerator to be the default value that shows up for the category. + +5. Click **Edit** to change your accelerator information, click **Set Default** to make an accelerator the default value for a category, or **Remove** to delete an accelerator. + +6. Click **Next** to go to the [Favorites, Favorites Bar, and Feeds](favorites-favoritesbar-and-feeds-ieak11-wizard.md) page or **Back** to go to the [Important URLs - Home Page and Support](important-urls-home-page-and-support-ieak11-wizard.md) page. + +  + +  + + + + + diff --git a/browsers/internet-explorer/ie11-ieak/add-and-approve-activex-controls-ieak11.md b/browsers/internet-explorer/ie11-ieak/add-and-approve-activex-controls-ieak11.md index a0d56ae1d9..7e89dab65d 100644 --- a/browsers/internet-explorer/ie11-ieak/add-and-approve-activex-controls-ieak11.md +++ b/browsers/internet-explorer/ie11-ieak/add-and-approve-activex-controls-ieak11.md @@ -1,52 +1,53 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: How to use IEAK 11 to add and approve ActiveX controls for your organization. -author: lomayor -ms.prod: ie11 -ms.assetid: 33040bd1-f0e4-4541-9fbb-16e0c76752ab -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Add and approve ActiveX controls using IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Add and approve ActiveX controls using IEAK 11 -There are two main approaches to how you can control the use of ActiveX controls in your company. For more info about ActiveX controls, including how to manage the controls using Group Policy, see [Group Policy and ActiveX installation](../ie11-deploy-guide/activex-installation-using-group-policy.md) in the [Internet Explorer 11 (IE11) - Deployment Guide for IT Pros](../ie11-deploy-guide/index.md). - -**Note**
          -ActiveX controls are supported in Internet Explorer for the desktop for Windows 7 and Windows 8.1. They are not supported on the immersive version of Internet Explorer for Windows 8.1. - -## Scenario 1: Limited Internet-only use of ActiveX controls -While you might not care about your employees using ActiveX controls while on your intranet sites, you probably do want to limit ActiveX usage while your employee is on the Internet. By specifying and pre-approving a set of generic controls for use on the Internet, you’re able to let your employees use the Internet, but you can still limit your company’s exposure to potentially hazardous, non-approved ActiveX controls. - -For example, your employees need to access an important Internet site, such as for a business partner or service provider, but there are ActiveX controls on their page. To make sure the site is accessible and functions the way it should, you can visit the site to review the controls, adding them as new entries to your `\Windows\Downloaded Program Files` folder. Then, as part of your browser package, you can enable and approve these ActiveX controls to run on this specific site; while all additional controls are blocked. - -**To add and approve ActiveX controls** - -1. In IE, click **Tools**, and then **Internet Options**. - -2. On the **Security** tab, click the zone that needs to change, and click **Custom Level**. - -3. Go to **Run ActiveX controls and plug-ins**, and then click **Administrator approved**. - -4. Repeat the last two steps until you have configured all the zones you want. - -5. When you run the IEAK 11 Customization Wizard to create a custom package, you'll use the [Additional Settings](additional-settings-ieak11-wizard.md) page, clicking each folder to expand its contents. Then select the check boxes for the controls you want to approve. - -## Scenario 2: Restricted use of ActiveX controls -You can get a higher degree of management over ActiveX controls by listing each of them out and then allowing the browser to use only that set of controls. The biggest challenge to using this method is the extra effort you need to put into figuring out all of the controls, and then actually listing them out. Because of that, we only recommend this approach if your complete set of controls is relatively small. - -After you decide which controls you want to allow, you can specify them as approved by zone, using the process described in the first scenario. - -  - -  - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: How to use IEAK 11 to add and approve ActiveX controls for your organization. +author: dansimp +ms.prod: ie11 +ms.assetid: 33040bd1-f0e4-4541-9fbb-16e0c76752ab +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Add and approve ActiveX controls using IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Add and approve ActiveX controls using IEAK 11 +There are two main approaches to how you can control the use of ActiveX controls in your company. For more info about ActiveX controls, including how to manage the controls using Group Policy, see [Group Policy and ActiveX installation](../ie11-deploy-guide/activex-installation-using-group-policy.md) in the [Internet Explorer 11 (IE11) - Deployment Guide for IT Pros](../ie11-deploy-guide/index.md). + +**Note**
          +ActiveX controls are supported in Internet Explorer for the desktop for Windows 7 and Windows 8.1. They are not supported on the immersive version of Internet Explorer for Windows 8.1. + +## Scenario 1: Limited Internet-only use of ActiveX controls +While you might not care about your employees using ActiveX controls while on your intranet sites, you probably do want to limit ActiveX usage while your employee is on the Internet. By specifying and pre-approving a set of generic controls for use on the Internet, you’re able to let your employees use the Internet, but you can still limit your company’s exposure to potentially hazardous, non-approved ActiveX controls. + +For example, your employees need to access an important Internet site, such as for a business partner or service provider, but there are ActiveX controls on their page. To make sure the site is accessible and functions the way it should, you can visit the site to review the controls, adding them as new entries to your `\Windows\Downloaded Program Files` folder. Then, as part of your browser package, you can enable and approve these ActiveX controls to run on this specific site; while all additional controls are blocked. + +**To add and approve ActiveX controls** + +1. In IE, click **Tools**, and then **Internet Options**. + +2. On the **Security** tab, click the zone that needs to change, and click **Custom Level**. + +3. Go to **Run ActiveX controls and plug-ins**, and then click **Administrator approved**. + +4. Repeat the last two steps until you have configured all the zones you want. + +5. When you run the IEAK 11 Customization Wizard to create a custom package, you'll use the [Additional Settings](additional-settings-ieak11-wizard.md) page, clicking each folder to expand its contents. Then select the check boxes for the controls you want to approve. + +## Scenario 2: Restricted use of ActiveX controls +You can get a higher degree of management over ActiveX controls by listing each of them out and then allowing the browser to use only that set of controls. The biggest challenge to using this method is the extra effort you need to put into figuring out all of the controls, and then actually listing them out. Because of that, we only recommend this approach if your complete set of controls is relatively small. + +After you decide which controls you want to allow, you can specify them as approved by zone, using the process described in the first scenario. + +  + +  + + + + + diff --git a/browsers/internet-explorer/ie11-ieak/add-root-certificate-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/add-root-certificate-ieak11-wizard.md index 72e79f106f..eae4f678e5 100644 --- a/browsers/internet-explorer/ie11-ieak/add-root-certificate-ieak11-wizard.md +++ b/browsers/internet-explorer/ie11-ieak/add-root-certificate-ieak11-wizard.md @@ -1,29 +1,30 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: We’re sorry. While we continue to recommend that you digitally sign your package, we’ve removed all of the functionality that allowed you to add a root certificate using the Internet Explorer Customization Wizard 11. The wizard page itself will be removed in a future version of the IEAK. -author: lomayor -ms.prod: ie11 -ms.assetid: 7ae4e747-49d2-4551-8790-46a61b5fe838 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Use the Add a Root Certificate page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Use the Add a Root Certificate page in the IEAK 11 Wizard -We’re sorry. While we continue to recommend that you digitally sign your package, we’ve removed all of the functionality that allowed you to add a root certificate using the Internet Explorer Customization Wizard 11. The wizard page itself will be removed in a future version of the IEAK. - -Click **Next** to go to the [Programs](programs-ieak11-wizard.md) page or **Back** to go to the [Security and Privacy Settings](security-and-privacy-settings-ieak11-wizard.md) page. - -  - -  - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: We’re sorry. While we continue to recommend that you digitally sign your package, we’ve removed all of the functionality that allowed you to add a root certificate using the Internet Explorer Customization Wizard 11. The wizard page itself will be removed in a future version of the IEAK. +author: dansimp +ms.prod: ie11 +ms.assetid: 7ae4e747-49d2-4551-8790-46a61b5fe838 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Use the Add a Root Certificate page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Use the Add a Root Certificate page in the IEAK 11 Wizard +We’re sorry. While we continue to recommend that you digitally sign your package, we’ve removed all of the functionality that allowed you to add a root certificate using the Internet Explorer Customization Wizard 11. The wizard page itself will be removed in a future version of the IEAK. + +Click **Next** to go to the [Programs](programs-ieak11-wizard.md) page or **Back** to go to the [Security and Privacy Settings](security-and-privacy-settings-ieak11-wizard.md) page. + +  + +  + + + + + diff --git a/browsers/internet-explorer/ie11-ieak/additional-settings-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/additional-settings-ieak11-wizard.md index 2a15fe18e9..60be35bc0d 100644 --- a/browsers/internet-explorer/ie11-ieak/additional-settings-ieak11-wizard.md +++ b/browsers/internet-explorer/ie11-ieak/additional-settings-ieak11-wizard.md @@ -1,41 +1,42 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: How to use the Additional Settings page in IEAK 11 Customization Wizard for additional settings that relate to your employee’s desktop, operating system, and security. -author: lomayor -ms.prod: ie11 -ms.assetid: c90054af-7b7f-4b00-b55b-5e5569f65f25 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Use the Additional Settings page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Use the Additional Settings page in the IEAK 11 Wizard -The **Additional Settings** page of the Internet Explorer Administration Kit (IEAK 11) Customization Wizard lets you pick additional custom, corporate, and Internet settings that relate to your employee’s desktop, operating system, and security. If you don’t change a setting, it’ll be ignored. - -The additional settings appear in administration (.adm) files that are stored in your `:\Program Files\Windows IEAK 11\policies` folder. You can also create your own .adm files with options that can be configured using the wizard. Any edits you make to your own .adm file are stored as .ins files, which are used to build the .inf files for your custom install package. - -You can store your user settings in a central location so your employees that log on from computer to computer can use them. For example if you have an employee that requires low security using a computer that’s typically operated by someone that needs more restrictive permissions. - -You’ll only see this page if you are running the **Internal** version of the IE Customization Wizard 11. - -**To use the Additional Settings page** - -1. Double-click **Custom Settings**, **Corporate Settings**, or **Internet Settings**, and review the included policy or restriction settings. - -2. Pick the setting you want to change, and then update its details. - -3. Click **Next** to go to the [Wizard Complete-Next Steps](wizard-complete-ieak11-wizard.md) page or **Back** to go to the [Programs](programs-ieak11-wizard.md) page. - -  - -  - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: How to use the Additional Settings page in IEAK 11 Customization Wizard for additional settings that relate to your employee’s desktop, operating system, and security. +author: dansimp +ms.prod: ie11 +ms.assetid: c90054af-7b7f-4b00-b55b-5e5569f65f25 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Use the Additional Settings page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Use the Additional Settings page in the IEAK 11 Wizard +The **Additional Settings** page of the Internet Explorer Administration Kit (IEAK 11) Customization Wizard lets you pick additional custom, corporate, and Internet settings that relate to your employee’s desktop, operating system, and security. If you don’t change a setting, it’ll be ignored. + +The additional settings appear in administration (.adm) files that are stored in your `:\Program Files\Windows IEAK 11\policies` folder. You can also create your own .adm files with options that can be configured using the wizard. Any edits you make to your own .adm file are stored as .ins files, which are used to build the .inf files for your custom install package. + +You can store your user settings in a central location so your employees that log on from computer to computer can use them. For example if you have an employee that requires low security using a computer that’s typically operated by someone that needs more restrictive permissions. + +You’ll only see this page if you are running the **Internal** version of the IE Customization Wizard 11. + +**To use the Additional Settings page** + +1. Double-click **Custom Settings**, **Corporate Settings**, or **Internet Settings**, and review the included policy or restriction settings. + +2. Pick the setting you want to change, and then update its details. + +3. Click **Next** to go to the [Wizard Complete-Next Steps](wizard-complete-ieak11-wizard.md) page or **Back** to go to the [Programs](programs-ieak11-wizard.md) page. + +  + +  + + + + + diff --git a/browsers/internet-explorer/ie11-ieak/auto-config-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/auto-config-ieak11-wizard.md index 5c77b9bc67..d3883b39ca 100644 --- a/browsers/internet-explorer/ie11-ieak/auto-config-ieak11-wizard.md +++ b/browsers/internet-explorer/ie11-ieak/auto-config-ieak11-wizard.md @@ -1,59 +1,60 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: How to use the Automatic Configuration page in the IEAK 11 Customization Wizard to add URLs to auto-configure IE. -author: lomayor -ms.prod: ie11 -ms.assetid: de5b1dbf-6e4d-4f86-ae08-932f14e606b0 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Use the Automatic Configuration page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Use the Automatic Configuration page in the IEAK 11 Wizard -The **Automatic Configuration** page of the Internet Explorer Administration Kit (IEAK 11) Customization Wizard lets you provide URLs to the files that’ll automatically configure Internet Explorer 11 for a group of employees or devices. - -**Note**
          -This page only appears if you’re using the **Internal** version of the wizard. - -You can set your proxy settings using Internet setting (.ins) files. You can also configure and maintain your advanced proxy settings using JScript (.js), JavaScript (.jvs), or proxy auto-configuration (.pac) script files. When you provide an auto-proxy script, IE dynamically determines whether to connect directly to a host or to use a proxy server. - -You can use the Domain Name System (DNS) and the Dynamic Host Configuration Protocol (DHCP) naming systems to detect and change a browser’s settings automatically when the employee first starts IE on the network. For more info, see [Set up auto detection for DHCP or DNS servers using IEAK 11](auto-detection-dhcp-or-dns-servers-ieak11.md), or refer to the product documentation for your DNS and DHCP software packages. - -**To check the existing settings on your employee’s devices** - -1. Open IE, click **Tools**, click **Internet Options**, and then click the **Connections** tab. - -2. Click **LAN Settings** and make sure that the **Use automatic configuration script** box is selected, confirming the path and name of the file in the **Address** box. - -**To use the Automatic Configuration page** - -1. Check the **Automatically detect configuration settings** box to automatically detect browser settings. - -2. Check the **Enable Automatic Configuration** box if you plan to automatically change your IE settings after deployment, using configuration files. You can then: - - - Type the length of time (in minutes) for how often settings are to be applied in your company. Putting zero (**0**), or nothing, in this box will cause automatic configuration to only happen when the computer’s restarted. - - - Type the location to your .ins file. You can edit this file directly to make any necessary changes. - - The updates will take effect the next time your employee starts IE, or during your next scheduled update. - - - Type the location to your automatic proxy script file. - - **Note**
          - If you specify URLs for both auto-config and auto-proxy, the auto-proxy URL will be incorporated into the .ins file. The correct form for the URL is `https://share/test.ins`. - -3. Click **Next** to go to the [Proxy Settings](proxy-settings-ieak11-wizard.md) page or **Back** to go to the [Connection Settings](connection-settings-ieak11-wizard.md) page. - -  - -  - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: How to use the Automatic Configuration page in the IEAK 11 Customization Wizard to add URLs to auto-configure IE. +author: dansimp +ms.prod: ie11 +ms.assetid: de5b1dbf-6e4d-4f86-ae08-932f14e606b0 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Use the Automatic Configuration page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Use the Automatic Configuration page in the IEAK 11 Wizard +The **Automatic Configuration** page of the Internet Explorer Administration Kit (IEAK 11) Customization Wizard lets you provide URLs to the files that’ll automatically configure Internet Explorer 11 for a group of employees or devices. + +**Note**
          +This page only appears if you’re using the **Internal** version of the wizard. + +You can set your proxy settings using Internet setting (.ins) files. You can also configure and maintain your advanced proxy settings using JScript (.js), JavaScript (.jvs), or proxy auto-configuration (.pac) script files. When you provide an auto-proxy script, IE dynamically determines whether to connect directly to a host or to use a proxy server. + +You can use the Domain Name System (DNS) and the Dynamic Host Configuration Protocol (DHCP) naming systems to detect and change a browser’s settings automatically when the employee first starts IE on the network. For more info, see [Set up auto detection for DHCP or DNS servers using IEAK 11](auto-detection-dhcp-or-dns-servers-ieak11.md), or refer to the product documentation for your DNS and DHCP software packages. + +**To check the existing settings on your employee’s devices** + +1. Open IE, click **Tools**, click **Internet Options**, and then click the **Connections** tab. + +2. Click **LAN Settings** and make sure that the **Use automatic configuration script** box is selected, confirming the path and name of the file in the **Address** box. + +**To use the Automatic Configuration page** + +1. Check the **Automatically detect configuration settings** box to automatically detect browser settings. + +2. Check the **Enable Automatic Configuration** box if you plan to automatically change your IE settings after deployment, using configuration files. You can then: + + - Type the length of time (in minutes) for how often settings are to be applied in your company. Putting zero (**0**), or nothing, in this box will cause automatic configuration to only happen when the computer’s restarted. + + - Type the location to your .ins file. You can edit this file directly to make any necessary changes. + + The updates will take effect the next time your employee starts IE, or during your next scheduled update. + + - Type the location to your automatic proxy script file. + + **Note**
          + If you specify URLs for both auto-config and auto-proxy, the auto-proxy URL will be incorporated into the .ins file. The correct form for the URL is `https://share/test.ins`. + +3. Click **Next** to go to the [Proxy Settings](proxy-settings-ieak11-wizard.md) page or **Back** to go to the [Connection Settings](connection-settings-ieak11-wizard.md) page. + +  + +  + + + + + diff --git a/browsers/internet-explorer/ie11-ieak/auto-detection-dhcp-or-dns-servers-ieak11.md b/browsers/internet-explorer/ie11-ieak/auto-detection-dhcp-or-dns-servers-ieak11.md index e858e5228b..1a46247c5c 100644 --- a/browsers/internet-explorer/ie11-ieak/auto-detection-dhcp-or-dns-servers-ieak11.md +++ b/browsers/internet-explorer/ie11-ieak/auto-detection-dhcp-or-dns-servers-ieak11.md @@ -1,62 +1,63 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: How to set up automatic detection for DHCP or DNS servers using IEAK 11 in your organization. -author: lomayor -ms.prod: ie11 -ms.assetid: c6bfe7c4-f452-406f-b47e-b7f0d8c44ae1 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Set up auto detection for DHCP or DNS servers using IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Set up auto detection for DHCP or DNS servers using IEAK 11 -Set up your network to automatically detect and customize Internet Explorer 11 when it’s first started. Automatic detection is supported on both Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS), letting your servers detect and set up your employee’s browser settings from a central location, using a configuration URL (.ins file) or a JavaScript proxy configuration file (.js, .jvs, or .pac). - -Before you can set up your environment to use automatic detection, you need to turn the feature on. - -**To turn on the automatic detection feature** - -- Open Internet Explorer Administration Kit 11 (IEAK 11), run the IE Customization Wizard 11 and on the **Automatic Configuration** page, check **Automatically detect configuration settings**. For more information, see [Use the Automatic Configuration page in the IEAK 11 Wizard](auto-config-ieak11-wizard.md). - -## Automatic detection on DHCP and DNS servers -Automatic detection works even if the browser wasn't originally set up or installed by the administrator. - -- **Using DHCP servers:** For local area network (LAN)-based users. This server type lets you specify your global and subnet TCP/IP parameters centrally, defining your users' parameters by using reserved addresses. By doing it this way, a computer can move between subnets, automatically reconfiguring for TCP/IP when it starts. -

          Note
          - Your DHCP servers must support the DHCPINFORM message, to obtain the DHCP options. - -- **Using DNS servers:** For users on dial-up connections. This server type uses a set of protocols and services on a TCP/IP network, which lets users search for other computers by using hierarchical, user-friendly names (hosts), instead of numeric IP addresses. To use this, you have to set up either the host record or the CNAME alias record in the DNS database file. -

          Note
          - DHCP has a higher priority than DNS for automatic configuration. If DHCP provides the URL to a .pac, .jvs, .js, or .ins configuration file, the process stops and the DNS lookup doesn't happen. - -**To set up automatic detection for DHCP servers** - -- Open the [DHCP Administrative Tool](https://go.microsoft.com/fwlink/p/?LinkId=302212), create a new option type, using the code number 252, and then associate it with the URL to your configuration file. For detailed instructions about how to do this, see [Create an option 252 entry in DHCP](https://go.microsoft.com/fwlink/p/?LinkId=294649). - - **Examples:**
          - `https://www.microsoft.com/webproxy.pac`
          - `https://marketing/config.ins`
          - `https://123.4.567.8/account.pac`

          - For more detailed info about how to set up your DHCP server, see your server documentation. - -**To set up automatic detection for DNS servers** - -1. In your DNS database file, the file that’s used to associate your host (computer) names to static IP addresses in a zone, you need to create a host record named, **WPAD**. This record contains entries for all of the hosts that require static mappings, such as workstations, name servers, and mail servers. It also has the IP address to the web server storing your automatic configuration (.js, .jvs, .pac, or .ins) file.

          The syntax is:
          - ` IN A `
          - `corserv IN A 192.55.200.143`
          - `nameserver2 IN A 192.55.200.2`
          - `mailserver1 IN A 192.55.200.51` -

          -OR-

          - Create a canonical name (CNAME) alias record, named WPAD. This record lets you use more than one name to point to a single host, letting you host both an FTP server and a web server on the same computer. It also includes the resolved name (not the IP address) of the server storing your automatic configuration (.pac) file.

          - Note
          For more info about creating a WPAD entry, see Creating a WPAD entry in DNS. - -2. After the database file propagates to the server, the DNS name, `wpad..com` resolves to the server name that includes your automatic configuration file. - -**Note**
          -IE11 creates a default URL template based on the host name,**wpad**. For example, `https://wpad..com/wpad.dat`. Because of this, you need to set up a file or redirection point in your web server **WPAD** record, named **wpad.dat**. The **wpad.dat** record delivers the contents of your automatic configuration file. - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: How to set up automatic detection for DHCP or DNS servers using IEAK 11 in your organization. +author: dansimp +ms.prod: ie11 +ms.assetid: c6bfe7c4-f452-406f-b47e-b7f0d8c44ae1 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Set up auto detection for DHCP or DNS servers using IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Set up auto detection for DHCP or DNS servers using IEAK 11 +Set up your network to automatically detect and customize Internet Explorer 11 when it’s first started. Automatic detection is supported on both Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS), letting your servers detect and set up your employee’s browser settings from a central location, using a configuration URL (.ins file) or a JavaScript proxy configuration file (.js, .jvs, or .pac). + +Before you can set up your environment to use automatic detection, you need to turn the feature on. + +**To turn on the automatic detection feature** + +- Open Internet Explorer Administration Kit 11 (IEAK 11), run the IE Customization Wizard 11 and on the **Automatic Configuration** page, check **Automatically detect configuration settings**. For more information, see [Use the Automatic Configuration page in the IEAK 11 Wizard](auto-config-ieak11-wizard.md). + +## Automatic detection on DHCP and DNS servers +Automatic detection works even if the browser wasn't originally set up or installed by the administrator. + +- **Using DHCP servers:** For local area network (LAN)-based users. This server type lets you specify your global and subnet TCP/IP parameters centrally, defining your users' parameters by using reserved addresses. By doing it this way, a computer can move between subnets, automatically reconfiguring for TCP/IP when it starts. +

          Note
          + Your DHCP servers must support the DHCPINFORM message, to obtain the DHCP options. + +- **Using DNS servers:** For users on dial-up connections. This server type uses a set of protocols and services on a TCP/IP network, which lets users search for other computers by using hierarchical, user-friendly names (hosts), instead of numeric IP addresses. To use this, you have to set up either the host record or the CNAME alias record in the DNS database file. +

          Note
          + DHCP has a higher priority than DNS for automatic configuration. If DHCP provides the URL to a .pac, .jvs, .js, or .ins configuration file, the process stops and the DNS lookup doesn't happen. + +**To set up automatic detection for DHCP servers** + +- Open the [DHCP Administrative Tool](https://go.microsoft.com/fwlink/p/?LinkId=302212), create a new option type, using the code number 252, and then associate it with the URL to your configuration file. For detailed instructions about how to do this, see [Create an option 252 entry in DHCP](https://go.microsoft.com/fwlink/p/?LinkId=294649). + + **Examples:**
          + `https://www.microsoft.com/webproxy.pac`
          + `https://marketing/config.ins`
          + `https://123.4.567.8/account.pac`

          + For more detailed info about how to set up your DHCP server, see your server documentation. + +**To set up automatic detection for DNS servers** + +1. In your DNS database file, the file that’s used to associate your host (computer) names to static IP addresses in a zone, you need to create a host record named, **WPAD**. This record contains entries for all of the hosts that require static mappings, such as workstations, name servers, and mail servers. It also has the IP address to the web server storing your automatic configuration (.js, .jvs, .pac, or .ins) file.

          The syntax is:
          + ` IN A `
          + `corserv IN A 192.55.200.143`
          + `nameserver2 IN A 192.55.200.2`
          + `mailserver1 IN A 192.55.200.51` +

          -OR-

          + Create a canonical name (CNAME) alias record, named WPAD. This record lets you use more than one name to point to a single host, letting you host both an FTP server and a web server on the same computer. It also includes the resolved name (not the IP address) of the server storing your automatic configuration (.pac) file.

          + Note
          For more info about creating a WPAD entry, see Creating a WPAD entry in DNS. + +2. After the database file propagates to the server, the DNS name, `wpad..com` resolves to the server name that includes your automatic configuration file. + +**Note**
          +IE11 creates a default URL template based on the host name,**wpad**. For example, `https://wpad..com/wpad.dat`. Because of this, you need to set up a file or redirection point in your web server **WPAD** record, named **wpad.dat**. The **wpad.dat** record delivers the contents of your automatic configuration file. + diff --git a/browsers/internet-explorer/ie11-ieak/auto-version-sync-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/auto-version-sync-ieak11-wizard.md index 9a3f704cf0..c317a46e0e 100644 --- a/browsers/internet-explorer/ie11-ieak/auto-version-sync-ieak11-wizard.md +++ b/browsers/internet-explorer/ie11-ieak/auto-version-sync-ieak11-wizard.md @@ -1,48 +1,49 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: How to use the Automatic Version Synchronization page in the IEAK 11 Customization Wizard to download the IE11 Setup file each time you run the Wizard. -author: lomayor -ms.prod: ie11 -ms.assetid: bfc7685f-843b-49c3-8b9b-07e69705840c -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Use the Automatic Version Synchronization page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Use the Automatic Version Synchronization page in the IEAK 11 Wizard -The **Automatic Version Synchronization** page of the Internet Explorer Customization Wizard 11 runs the synchronization process every time you run the wizard, downloading the Internet Explorer 11 Setup file to your computer. The Setup file includes the required full and express packages. - -**Important**
          -You must run the **Automatic Version Synchronization** page once for each operating system and language combination of IE. - -The **Automatic Version Synchronization** page tells you: - -- **Version available on your machine**. The version of IE11 that’s running on the computer that’s also running the IE Customization Wizard 11. - -- **Latest version available on web**. The most recently released version of the IE Customization Wizard 11. To get this value, the wizard compares the version of IE on your computer to the latest version of IE on the **Downloads** site. If the versions are different, you’ll be asked to update your version of IE. - -- **Disk space required**. The amount of space on your hard drive needed to update the browser. - -- **Disk space available**. The amount of hard drive space available on the computer that’s running the IE Customization Wizard 11. - - -**To use the Automatic Version Synchronization page** - -1. Click **Synchronize**.

          -You might receive a security warning before downloading your Setup file, asking if you want to continue. Click **Run** to continue. - -2. Click **Next** to go to the [Custom Components](custom-components-ieak11-wizard.md) page or **Back** to go to the [Feature Selection](feature-selection-ieak11-wizard.md) page. - -  - -  - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: How to use the Automatic Version Synchronization page in the IEAK 11 Customization Wizard to download the IE11 Setup file each time you run the Wizard. +author: dansimp +ms.prod: ie11 +ms.assetid: bfc7685f-843b-49c3-8b9b-07e69705840c +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Use the Automatic Version Synchronization page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Use the Automatic Version Synchronization page in the IEAK 11 Wizard +The **Automatic Version Synchronization** page of the Internet Explorer Customization Wizard 11 runs the synchronization process every time you run the wizard, downloading the Internet Explorer 11 Setup file to your computer. The Setup file includes the required full and express packages. + +**Important**
          +You must run the **Automatic Version Synchronization** page once for each operating system and language combination of IE. + +The **Automatic Version Synchronization** page tells you: + +- **Version available on your machine**. The version of IE11 that’s running on the computer that’s also running the IE Customization Wizard 11. + +- **Latest version available on web**. The most recently released version of the IE Customization Wizard 11. To get this value, the wizard compares the version of IE on your computer to the latest version of IE on the **Downloads** site. If the versions are different, you’ll be asked to update your version of IE. + +- **Disk space required**. The amount of space on your hard drive needed to update the browser. + +- **Disk space available**. The amount of hard drive space available on the computer that’s running the IE Customization Wizard 11. + + +**To use the Automatic Version Synchronization page** + +1. Click **Synchronize**.

          +You might receive a security warning before downloading your Setup file, asking if you want to continue. Click **Run** to continue. + +2. Click **Next** to go to the [Custom Components](custom-components-ieak11-wizard.md) page or **Back** to go to the [Feature Selection](feature-selection-ieak11-wizard.md) page. + +  + +  + + + + + diff --git a/browsers/internet-explorer/ie11-ieak/before-you-create-custom-pkgs-ieak11.md b/browsers/internet-explorer/ie11-ieak/before-you-create-custom-pkgs-ieak11.md index 9bea8f5c1c..3508c186af 100644 --- a/browsers/internet-explorer/ie11-ieak/before-you-create-custom-pkgs-ieak11.md +++ b/browsers/internet-explorer/ie11-ieak/before-you-create-custom-pkgs-ieak11.md @@ -1,39 +1,40 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: plan -description: A list of steps to follow before you start to create your custom browser installation packages. -author: lomayor -ms.author: lomayor -ms.manager: elizapo -ms.prod: ie11 -ms.assetid: 6ed182b0-46cb-4865-9563-70825be9a5e4 -ms.reviewer: -audience: itpro manager: dansimp -title: Before you start using IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 04/24/2018 ---- - - -# Before you start using IEAK 11 - -Before you run IEAK 11 and the Customization Wizard, make sure you have met the following requirements: - -- Have you determined which licensing version of the Internet Explorer Administration Kit 11 to install? For info, see [Determine the licensing version and features to use in IEAK 11](licensing-version-and-features-ieak11.md). - -- Do you meet the necessary hardware and software requirements? See [Hardware and software requirements for IEAK 11](hardware-and-software-reqs-ieak11.md). - -- Have you gotten all of the URLs needed to customize your **Home**, **Search**, and **Support** pages? See [Use the Important URLs - Home Page and Support page in the IEAK 11 Wizard](important-urls-home-page-and-support-ieak11-wizard.md). - -- Have you reviewed the security features to determine how to set up and manage them? See [Security features and IEAK 11](security-and-ieak11.md). - -- Have you created a test lab, where you can run the test version of your browser package to make sure it runs properly? - -  - -  - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: plan +description: A list of steps to follow before you start to create your custom browser installation packages. +author: dansimp +ms.author: dansimp +ms.manager: elizapo +ms.prod: ie11 +ms.assetid: 6ed182b0-46cb-4865-9563-70825be9a5e4 +ms.reviewer: +audience: itpro +manager: dansimp +title: Before you start using IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 04/24/2018 +--- + + +# Before you start using IEAK 11 + +Before you run IEAK 11 and the Customization Wizard, make sure you have met the following requirements: + +- Have you determined which licensing version of the Internet Explorer Administration Kit 11 to install? For info, see [Determine the licensing version and features to use in IEAK 11](licensing-version-and-features-ieak11.md). + +- Do you meet the necessary hardware and software requirements? See [Hardware and software requirements for IEAK 11](hardware-and-software-reqs-ieak11.md). + +- Have you gotten all of the URLs needed to customize your **Home**, **Search**, and **Support** pages? See [Use the Important URLs - Home Page and Support page in the IEAK 11 Wizard](important-urls-home-page-and-support-ieak11-wizard.md). + +- Have you reviewed the security features to determine how to set up and manage them? See [Security features and IEAK 11](security-and-ieak11.md). + +- Have you created a test lab, where you can run the test version of your browser package to make sure it runs properly? + +  + +  + + + + + diff --git a/browsers/internet-explorer/ie11-ieak/branding-ins-file-setting.md b/browsers/internet-explorer/ie11-ieak/branding-ins-file-setting.md index 7f9c6d989e..5c9c189f24 100644 --- a/browsers/internet-explorer/ie11-ieak/branding-ins-file-setting.md +++ b/browsers/internet-explorer/ie11-ieak/branding-ins-file-setting.md @@ -1,54 +1,55 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: Use the \[Branding\] .INS file setting to set up your custom branding and setup info in your browser install package. -author: lomayor -ms.prod: ie11 -ms.assetid: cde600c6-29cf-4bd3-afd1-21563d2642df -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Use the Branding .INS file to create custom branding and setup info (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Use the Branding .INS file to create custom branding and setup info -Info about the custom branding and setup information in your browser package. - -|Name |Value | Description | -|-----------|--------------------------------|--------------------------------------------------------------| -|Add on URL | `` |The add-on URL for the product updates command in the browser.| -|BrowserDefault|

          • **0.** Locks down Internet Explorer as the default browser.
          • **1.** Preserves the existing default browser.
          • **2.** Lets the employee decide the default browser.
          | Determines the default browser behavior. | -|CMBitmapName | `` | The file name for the Connection Manager custom bitmap. | -|CMBitmapPath | `` | The full file path to the Connection Manager custom bitmap file. | -|CMProfileName| `` | The name of the Connection Manager profile. | -|CMProfilePath| `` | The full file path to the Connection Manager profile. | -|CMUseCustom |
          • **0.** Don’t use a custom Connection Manager profile.
          • **1.** Use a custom Connection Manager profile.
          | Determines whether to use a custom Connection Manager profile. | -|CompanyName |`` |The name of the company with a valid IEAK 11 license, building this .ins file. | -|EncodeFavs |
          • **0.** Don’t encode the section.
          • **1.** Encode the section.
          |Determines whether to encode the **[Favorites]** section for versions of IE earlier than 5.0. | -|FavoritesDelete |*hexadecimal:* `0x89` |Lets you remove all existing Favorites and Quick Links. | -|FavoritesOnTop |
          • **0.** Don’t put the new item at the top of the **Favorites** menu.
          • **1.** Put the new item at the top of the **Favorites** menu.
          |Determines whether to put new favorite items at the top of the menu. | -|IE4 Welcome Msg |
          • **0.** Don’t go to a **Welcome** page the first time the browser is opened.
          • **1.** Go to a **Welcome** page the first time the browser is opened.
          |Determines whether a **Welcome** page appears. | -|Language ID |`` |Code value for the language used. | -|Language Locale |`` |The locale of the version of IE being customized, as denoted by a four-letter string — for example, EN-us for English. | -|NoIELite |
          • **0.** Don’t optimize the Active Setup Wizard.
          • **1.** Optimize the Active Setup Wizard for download, using existing files, as possible.
          |Determines whether to optimize the Active Setup Wizard for download. | -|SilentInstall |
          • **0.** Run Windows Update Setup interactively.
          • **1.** Run Windows Update Setup non-interactively, but show progress and error messages to the employee.
          |Determines whether Windows Update Setup runs interactively on the employee’s computer.

          **Note**
          This only appears for the **Internal** version of the IEAK 11. | -|StealthInstall |

          • **0.** Run Windows Update Setup showing progress and error messages to the employee.
          • **1.** Run Windows Update Setup without showing error messages to the employee.
          |Determines whether Windows Update Setup shows error messages and dialog boxes.

          **Note**
          This only appears for the **Internal** version of the IEAK 11. | -|Toolbar Bitmap |`` |Full path to the icon bitmap that appears on the browser toolbar. | -|Type |

          • **1.** Internal version. For use on a corporate intranet or network.
          • **2.** External version. For use by ISPs, ICPs, or Developers.
          |The version of IEAK 11 being used. | -|User Agent |`` |String to be appended to the default User Agent string. | -|Version |`` |Version number of the browser. For example, `6,0,0,1`. | -|WebIntegrated |
          • **0.** Don’t include the 4.x integrated shell in your custom package.
          • **1.** Include the 4.x integrated shell in your custom package.
          |Determines whether the IE 4.x integrated shell is included in this package. | -|Win32DownloadSite |`` |URL from where your employees will download the IEsetup.exe file. | -|Window_Title |`` |Customized window title for IE. | -|Window_Title_CN |`` |Company name to be appended to the window title. | -|WizardVersion |`` |Version of the IEAK that created the .ins file. For example, `6.00.0707.2800`. | - -  - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: Use the \[Branding\] .INS file setting to set up your custom branding and setup info in your browser install package. +author: dansimp +ms.prod: ie11 +ms.assetid: cde600c6-29cf-4bd3-afd1-21563d2642df +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Use the Branding .INS file to create custom branding and setup info (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Use the Branding .INS file to create custom branding and setup info +Info about the custom branding and setup information in your browser package. + +|Name |Value | Description | +|-----------|--------------------------------|--------------------------------------------------------------| +|Add on URL | `` |The add-on URL for the product updates command in the browser.| +|BrowserDefault|
          • **0.** Locks down Internet Explorer as the default browser.
          • **1.** Preserves the existing default browser.
          • **2.** Lets the employee decide the default browser.
          | Determines the default browser behavior. | +|CMBitmapName | `` | The file name for the Connection Manager custom bitmap. | +|CMBitmapPath | `` | The full file path to the Connection Manager custom bitmap file. | +|CMProfileName| `` | The name of the Connection Manager profile. | +|CMProfilePath| `` | The full file path to the Connection Manager profile. | +|CMUseCustom |
          • **0.** Don’t use a custom Connection Manager profile.
          • **1.** Use a custom Connection Manager profile.
          | Determines whether to use a custom Connection Manager profile. | +|CompanyName |`` |The name of the company with a valid IEAK 11 license, building this .ins file. | +|EncodeFavs |
          • **0.** Don’t encode the section.
          • **1.** Encode the section.
          |Determines whether to encode the **[Favorites]** section for versions of IE earlier than 5.0. | +|FavoritesDelete |*hexadecimal:* `0x89` |Lets you remove all existing Favorites and Quick Links. | +|FavoritesOnTop |
          • **0.** Don’t put the new item at the top of the **Favorites** menu.
          • **1.** Put the new item at the top of the **Favorites** menu.
          |Determines whether to put new favorite items at the top of the menu. | +|IE4 Welcome Msg |
          • **0.** Don’t go to a **Welcome** page the first time the browser is opened.
          • **1.** Go to a **Welcome** page the first time the browser is opened.
          |Determines whether a **Welcome** page appears. | +|Language ID |`` |Code value for the language used. | +|Language Locale |`` |The locale of the version of IE being customized, as denoted by a four-letter string — for example, EN-us for English. | +|NoIELite |
          • **0.** Don’t optimize the Active Setup Wizard.
          • **1.** Optimize the Active Setup Wizard for download, using existing files, as possible.
          |Determines whether to optimize the Active Setup Wizard for download. | +|SilentInstall |
          • **0.** Run Windows Update Setup interactively.
          • **1.** Run Windows Update Setup non-interactively, but show progress and error messages to the employee.
          |Determines whether Windows Update Setup runs interactively on the employee’s computer.

          **Note**
          This only appears for the **Internal** version of the IEAK 11. | +|StealthInstall |

          • **0.** Run Windows Update Setup showing progress and error messages to the employee.
          • **1.** Run Windows Update Setup without showing error messages to the employee.
          |Determines whether Windows Update Setup shows error messages and dialog boxes.

          **Note**
          This only appears for the **Internal** version of the IEAK 11. | +|Toolbar Bitmap |`` |Full path to the icon bitmap that appears on the browser toolbar. | +|Type |

          • **1.** Internal version. For use on a corporate intranet or network.
          • **2.** External version. For use by ISPs, ICPs, or Developers.
          |The version of IEAK 11 being used. | +|User Agent |`` |String to be appended to the default User Agent string. | +|Version |`` |Version number of the browser. For example, `6,0,0,1`. | +|WebIntegrated |
          • **0.** Don’t include the 4.x integrated shell in your custom package.
          • **1.** Include the 4.x integrated shell in your custom package.
          |Determines whether the IE 4.x integrated shell is included in this package. | +|Win32DownloadSite |`` |URL from where your employees will download the IEsetup.exe file. | +|Window_Title |`` |Customized window title for IE. | +|Window_Title_CN |`` |Company name to be appended to the window title. | +|WizardVersion |`` |Version of the IEAK that created the .ins file. For example, `6.00.0707.2800`. | + +  + + + + + diff --git a/browsers/internet-explorer/ie11-ieak/browser-ui-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/browser-ui-ieak11-wizard.md index ab8937ec4a..c1f3999a3a 100644 --- a/browsers/internet-explorer/ie11-ieak/browser-ui-ieak11-wizard.md +++ b/browsers/internet-explorer/ie11-ieak/browser-ui-ieak11-wizard.md @@ -1,56 +1,57 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: How to use the Browser User Interface page in the IEAK 11 Customization Wizard to change the toolbar buttons and the title bar. -author: lomayor -ms.prod: ie11 -ms.assetid: c4a18dcd-2e9c-4b5b-bcc5-9b9361a79f0d -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Use the Browser User Interface page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Use the Browser User Interface page in the IEAK 11 Wizard -The **Browser User Interface** page of the Internet Explorer Customization Wizard 11 lets you change the toolbar buttons and the title bar text in IE. - -**Note**
          The customizations you make on this page apply only to Internet Explorer for the desktop. - - **To use the Browser User Interface page** - -1. Check the **Customize Title Bars** box so you can add your custom text to the **Title Bar Text** box.

          -The text shows up in the title bar as **IE provided by** <*your_custom_text*>. - -2. Check the **Delete existing toolbar buttons, if present** box so you can delete all of the toolbar buttons in your employee’s browser, except for the standard buttons installed with IE (which can’t be removed). - -**Note**
          Only Administrators can use this option. - -3. Click **Add** to add new toolbar buttons.

          - The **Browser Toolbar Button Information** box appears. - -4. In the **Toolbar caption** box, type the text that shows up when an employee hovers over your custom button. We recommend no more than 10 characters. - -5. In the **Toolbar action** box, browse to your script or executable file that runs when an employee clicks your custom button. - -6. In the **Toolbar icon** box, browse to the icon file that represents your button while active. This icon must be 20x20 pixels. - -7. Check the **This button should be shown on the toolbar by default** box so your custom button shows by default.

          - This box should be cleared if you want to offer a custom set of buttons, but want your employees to choose whether or not to use them. In this situation, your buttons will show up in the **Customize Toolbars** dialog box, under **Available toolbar buttons**. Your employees can get to this dialog box in IE by clicking **Tools** from the **Command Bar**, clicking **Toolbars**, and then clicking **Customize**. - -8. Click **OK.** - -9. Click **Edit** to change your custom toolbar button or **Remove** to delete the button. The removed button will disappear from your employee’s computer after you apply the updated customization. Only custom toolbar buttons can be removed. - -10. Click **Next** to go to the [Search Providers](search-providers-ieak11-wizard.md) page or **Back** to go to the [User Experience](user-experience-ieak11-wizard.md) page. - - - - - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: How to use the Browser User Interface page in the IEAK 11 Customization Wizard to change the toolbar buttons and the title bar. +author: dansimp +ms.prod: ie11 +ms.assetid: c4a18dcd-2e9c-4b5b-bcc5-9b9361a79f0d +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Use the Browser User Interface page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Use the Browser User Interface page in the IEAK 11 Wizard +The **Browser User Interface** page of the Internet Explorer Customization Wizard 11 lets you change the toolbar buttons and the title bar text in IE. + +**Note**
          The customizations you make on this page apply only to Internet Explorer for the desktop. + + **To use the Browser User Interface page** + +1. Check the **Customize Title Bars** box so you can add your custom text to the **Title Bar Text** box.

          +The text shows up in the title bar as **IE provided by** <*your_custom_text*>. + +2. Check the **Delete existing toolbar buttons, if present** box so you can delete all of the toolbar buttons in your employee’s browser, except for the standard buttons installed with IE (which can’t be removed). + +**Note**
          Only Administrators can use this option. + +3. Click **Add** to add new toolbar buttons.

          + The **Browser Toolbar Button Information** box appears. + +4. In the **Toolbar caption** box, type the text that shows up when an employee hovers over your custom button. We recommend no more than 10 characters. + +5. In the **Toolbar action** box, browse to your script or executable file that runs when an employee clicks your custom button. + +6. In the **Toolbar icon** box, browse to the icon file that represents your button while active. This icon must be 20x20 pixels. + +7. Check the **This button should be shown on the toolbar by default** box so your custom button shows by default.

          + This box should be cleared if you want to offer a custom set of buttons, but want your employees to choose whether or not to use them. In this situation, your buttons will show up in the **Customize Toolbars** dialog box, under **Available toolbar buttons**. Your employees can get to this dialog box in IE by clicking **Tools** from the **Command Bar**, clicking **Toolbars**, and then clicking **Customize**. + +8. Click **OK.** + +9. Click **Edit** to change your custom toolbar button or **Remove** to delete the button. The removed button will disappear from your employee’s computer after you apply the updated customization. Only custom toolbar buttons can be removed. + +10. Click **Next** to go to the [Search Providers](search-providers-ieak11-wizard.md) page or **Back** to go to the [User Experience](user-experience-ieak11-wizard.md) page. + + + + + + + + + diff --git a/browsers/internet-explorer/ie11-ieak/browsertoolbars-ins-file-setting.md b/browsers/internet-explorer/ie11-ieak/browsertoolbars-ins-file-setting.md index 56922b0838..b2b123ff69 100644 --- a/browsers/internet-explorer/ie11-ieak/browsertoolbars-ins-file-setting.md +++ b/browsers/internet-explorer/ie11-ieak/browsertoolbars-ins-file-setting.md @@ -1,39 +1,40 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: plan -description: Use the \[BrowserToolbars\] .INS file setting to customize your Internet Explorer toolbar and buttons. -author: lomayor -ms.prod: ie11 -ms.assetid: 83af0558-9df3-4c2e-9350-44f7788efa6d -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Use the BrowserToolbars .INS file to customize the Internet Explorer toolbar and buttons (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Use the BrowserToolbars .INS file to customize the Internet Explorer toolbar and buttons -Info about how to customize the Internet Explorer toolbar. - -|Name |Value |Description | -|-----------|---------------------------|-------------| -|Action0 |`` |Path and file name for the executable (.exe) file that's associated with your custom toolbar button. | -|Caption0 |`` |Text that appears as the caption for your custom toolbar button. | -|DeleteButtons |

          • **0.** Don’t delete the existing custom toolbar buttons.
          • **1.** Delete the existing custom toolbar buttons.
          |Determines whether to delete the existing custom toolbar buttons. | -|HotIcon0 |`` |An icon (.ico) file that appears highlighted on the button when the pointer is moved over it. | -|Icon0 |`` |An icon (.ico) file that appears dimmed on the button when the pointer isn’t moved over it. | -|Show0 |
          • **0.** Don’t show the button by default.
          • **1.** Show the button by default.
          |Determines whether to show the new button on the toolbar by default. | -|ToolTipText0 |`` |Tooltip text for the custom toolbar button. | - -  - -  - -  - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: plan +description: Use the \[BrowserToolbars\] .INS file setting to customize your Internet Explorer toolbar and buttons. +author: dansimp +ms.prod: ie11 +ms.assetid: 83af0558-9df3-4c2e-9350-44f7788efa6d +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Use the BrowserToolbars .INS file to customize the Internet Explorer toolbar and buttons (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Use the BrowserToolbars .INS file to customize the Internet Explorer toolbar and buttons +Info about how to customize the Internet Explorer toolbar. + +|Name |Value |Description | +|-----------|---------------------------|-------------| +|Action0 |`` |Path and file name for the executable (.exe) file that's associated with your custom toolbar button. | +|Caption0 |`` |Text that appears as the caption for your custom toolbar button. | +|DeleteButtons |
          • **0.** Don’t delete the existing custom toolbar buttons.
          • **1.** Delete the existing custom toolbar buttons.
          |Determines whether to delete the existing custom toolbar buttons. | +|HotIcon0 |`` |An icon (.ico) file that appears highlighted on the button when the pointer is moved over it. | +|Icon0 |`` |An icon (.ico) file that appears dimmed on the button when the pointer isn’t moved over it. | +|Show0 |
          • **0.** Don’t show the button by default.
          • **1.** Show the button by default.
          |Determines whether to show the new button on the toolbar by default. | +|ToolTipText0 |`` |Tooltip text for the custom toolbar button. | + +  + +  + +  + + + + + diff --git a/browsers/internet-explorer/ie11-ieak/browsing-options-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/browsing-options-ieak11-wizard.md index d96bb1744c..a39adaff3e 100644 --- a/browsers/internet-explorer/ie11-ieak/browsing-options-ieak11-wizard.md +++ b/browsers/internet-explorer/ie11-ieak/browsing-options-ieak11-wizard.md @@ -2,13 +2,13 @@ ms.localizationpriority: medium ms.mktglfcycl: deploy description: How to use the Browsing Options page in the IEAK 11 Customization Wizard to manage items in the Favorites, Favorites Bar, and Feeds section. -author: lomayor +author: dansimp ms.prod: ie11 ms.assetid: d6bd71ba-5df3-4b8c-8bb5-dcbc50fd974e ms.reviewer: audience: itpro manager: dansimp -ms.author: lomayor +ms.author: dansimp title: Use the Browsing Options page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) ms.sitesec: library ms.date: 07/27/2017 diff --git a/browsers/internet-explorer/ie11-ieak/cabsigning-ins-file-setting.md b/browsers/internet-explorer/ie11-ieak/cabsigning-ins-file-setting.md index 0d0a0bde19..e5bf7ebb40 100644 --- a/browsers/internet-explorer/ie11-ieak/cabsigning-ins-file-setting.md +++ b/browsers/internet-explorer/ie11-ieak/cabsigning-ins-file-setting.md @@ -1,26 +1,27 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: Use the \[CabSigning\] .INS file setting to customize the digital signature info for your apps. -author: lomayor -ms.prod: ie11 -ms.assetid: 098707e9-d712-4297-ac68-7d910ca8f43b -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Use the CabSigning .INS file to customize the digital signature info for your apps (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Use the CabSigning .INS file to customize the digital signature info for your apps -Info about how to customize the digital signature info for your apps. - -|Name |Value |Description | -|-----------|---------------------------|-------------| -|InfoURL |`` |URL that appears on the **Certificate** dialog box. | -|Name |`` |Company name associated with the certificate. | -|pvkFile |`` |File path to the privacy key file. | -|spcFile |`` |File path to the certificate file.| - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: Use the \[CabSigning\] .INS file setting to customize the digital signature info for your apps. +author: dansimp +ms.prod: ie11 +ms.assetid: 098707e9-d712-4297-ac68-7d910ca8f43b +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Use the CabSigning .INS file to customize the digital signature info for your apps (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Use the CabSigning .INS file to customize the digital signature info for your apps +Info about how to customize the digital signature info for your apps. + +|Name |Value |Description | +|-----------|---------------------------|-------------| +|InfoURL |`` |URL that appears on the **Certificate** dialog box. | +|Name |`` |Company name associated with the certificate. | +|pvkFile |`` |File path to the privacy key file. | +|spcFile |`` |File path to the certificate file.| + diff --git a/browsers/internet-explorer/ie11-ieak/compat-view-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/compat-view-ieak11-wizard.md index 7e05be2556..cda9702eb4 100644 --- a/browsers/internet-explorer/ie11-ieak/compat-view-ieak11-wizard.md +++ b/browsers/internet-explorer/ie11-ieak/compat-view-ieak11-wizard.md @@ -1,22 +1,23 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -ms.pagetype: appcompat -description: We’re sorry. We’ve removed all of the functionality included on the **Compatibility View** page of the Internet Explorer Customization Wizard 11. -author: lomayor -ms.prod: ie11 -ms.assetid: 51d8f80e-93a5-41e4-9478-b8321458bc30 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Use the Compatibility View page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Use the Compatibility View page in the IEAK 11 Wizard -We’re sorry. We’ve changed the way Compatibility View works in Internet Explorer 11 and have removed all of the functionality included on the **Compatibility View** page of the Internet Explorer Customization Wizard 11. For more info about the changes we’ve made to the Compatibility View functionality, see [Missing the Compatibility View Button](../ie11-deploy-guide/missing-the-compatibility-view-button.md). - -Click **Next** to go to the [Programs](programs-ieak11-wizard.md) page or **Back** to go to the [Security and Privacy Settings](security-and-privacy-settings-ieak11-wizard.md) page. - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +ms.pagetype: appcompat +description: We’re sorry. We’ve removed all of the functionality included on the **Compatibility View** page of the Internet Explorer Customization Wizard 11. +author: dansimp +ms.prod: ie11 +ms.assetid: 51d8f80e-93a5-41e4-9478-b8321458bc30 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Use the Compatibility View page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Use the Compatibility View page in the IEAK 11 Wizard +We’re sorry. We’ve changed the way Compatibility View works in Internet Explorer 11 and have removed all of the functionality included on the **Compatibility View** page of the Internet Explorer Customization Wizard 11. For more info about the changes we’ve made to the Compatibility View functionality, see [Missing the Compatibility View Button](../ie11-deploy-guide/missing-the-compatibility-view-button.md). + +Click **Next** to go to the [Programs](programs-ieak11-wizard.md) page or **Back** to go to the [Security and Privacy Settings](security-and-privacy-settings-ieak11-wizard.md) page. + diff --git a/browsers/internet-explorer/ie11-ieak/connection-mgr-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/connection-mgr-ieak11-wizard.md index 3fbf4b4276..aaec7b0fa2 100644 --- a/browsers/internet-explorer/ie11-ieak/connection-mgr-ieak11-wizard.md +++ b/browsers/internet-explorer/ie11-ieak/connection-mgr-ieak11-wizard.md @@ -1,21 +1,22 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: We’re sorry. We’ve removed all of the functionality included on the **Connection Manager** page of the Internet Explorer Customization Wizard 11. -author: lomayor -ms.prod: ie11 -ms.assetid: 1edaa7db-cf6b-4f94-b65f-0feff3d4081a -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Use the Connection Manager page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Use the Connection Manager page in the IEAK 11 Wizard -We're sorry. We've removed all of the functionality included on the Connection Manager page of the Internet Explorer Customization Wizard 11. - -Click **Next** to go to the [Connection Settings](connection-settings-ieak11-wizard.md) page or **Back** to go to the [Compatibility View](compat-view-ieak11-wizard.md) page. - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: We’re sorry. We’ve removed all of the functionality included on the **Connection Manager** page of the Internet Explorer Customization Wizard 11. +author: dansimp +ms.prod: ie11 +ms.assetid: 1edaa7db-cf6b-4f94-b65f-0feff3d4081a +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Use the Connection Manager page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Use the Connection Manager page in the IEAK 11 Wizard +We're sorry. We've removed all of the functionality included on the Connection Manager page of the Internet Explorer Customization Wizard 11. + +Click **Next** to go to the [Connection Settings](connection-settings-ieak11-wizard.md) page or **Back** to go to the [Compatibility View](compat-view-ieak11-wizard.md) page. + diff --git a/browsers/internet-explorer/ie11-ieak/connection-settings-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/connection-settings-ieak11-wizard.md index 1d7f645f31..66beabdbca 100644 --- a/browsers/internet-explorer/ie11-ieak/connection-settings-ieak11-wizard.md +++ b/browsers/internet-explorer/ie11-ieak/connection-settings-ieak11-wizard.md @@ -1,41 +1,42 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: How to use the Connection Settings page in IEAK 11 Customization Wizard to import and preset connection settings on your employee’s computers. -author: lomayor -ms.prod: ie11 -ms.assetid: dc93ebf7-37dc-47c7-adc3-067d07de8b78 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Use the Connection Settings page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Use the Connection Settings page in the IEAK 11 Wizard -The **Connection Settings** page of the Internet Explorer Administration Kit (IEAK 11) Customization Wizard lets you import the connection settings from your computer, to preset the connection settings on your employee’s computers. - -**Note**
          Using the options on the **Additional Settings** page of the wizard, you can let your employees change their connection settings. For more information see the [Additional Settings](additional-settings-ieak11-wizard.md) page. You can also customize additional connection settings using the **Automatic Configuration** page in the wizard. For more information see the [Automatic Configuration](auto-config-ieak11-wizard.md) page. - -**To view your current connection settings** - -1. Open IE, click the **Tools** menu, click **Internet Options**, and then click the **Connections** tab. - -2. Click **Settings** to view your dial-up settings and click **LAN Settings** to view your network settings. - -**To use the Connection Settings page** - -1. Decide if you want to customize your connection settings. You can pick: - - - **Do not customize Connection Settings.** Pick this option if you don’t want to preset your employee’s connection settings. - - - **Import the current Connection Settings from this machine.** Pick this option to import your connection settings from your computer and use them as the preset for your employee’s connection settings. - - **Note**
          If you want to change any of your settings later, you can click **Modify Settings** to open the **Internet Properties** box, click the **Connection Settings** tab, and make your changes. - -2. Check the **Delete existing Dial-up Connection Settings** box to clear any existing settings on your employee’s computers. - -3. Click **Next** to go to the [Automatic Configuration](auto-config-ieak11-wizard.md) page or **Back** to go to the [Connection Manager](connection-mgr-ieak11-wizard.md) page. - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: How to use the Connection Settings page in IEAK 11 Customization Wizard to import and preset connection settings on your employee’s computers. +author: dansimp +ms.prod: ie11 +ms.assetid: dc93ebf7-37dc-47c7-adc3-067d07de8b78 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Use the Connection Settings page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Use the Connection Settings page in the IEAK 11 Wizard +The **Connection Settings** page of the Internet Explorer Administration Kit (IEAK 11) Customization Wizard lets you import the connection settings from your computer, to preset the connection settings on your employee’s computers. + +**Note**
          Using the options on the **Additional Settings** page of the wizard, you can let your employees change their connection settings. For more information see the [Additional Settings](additional-settings-ieak11-wizard.md) page. You can also customize additional connection settings using the **Automatic Configuration** page in the wizard. For more information see the [Automatic Configuration](auto-config-ieak11-wizard.md) page. + +**To view your current connection settings** + +1. Open IE, click the **Tools** menu, click **Internet Options**, and then click the **Connections** tab. + +2. Click **Settings** to view your dial-up settings and click **LAN Settings** to view your network settings. + +**To use the Connection Settings page** + +1. Decide if you want to customize your connection settings. You can pick: + + - **Do not customize Connection Settings.** Pick this option if you don’t want to preset your employee’s connection settings. + + - **Import the current Connection Settings from this machine.** Pick this option to import your connection settings from your computer and use them as the preset for your employee’s connection settings. + + **Note**
          If you want to change any of your settings later, you can click **Modify Settings** to open the **Internet Properties** box, click the **Connection Settings** tab, and make your changes. + +2. Check the **Delete existing Dial-up Connection Settings** box to clear any existing settings on your employee’s computers. + +3. Click **Next** to go to the [Automatic Configuration](auto-config-ieak11-wizard.md) page or **Back** to go to the [Connection Manager](connection-mgr-ieak11-wizard.md) page. + diff --git a/browsers/internet-explorer/ie11-ieak/connectionsettings-ins-file-setting.md b/browsers/internet-explorer/ie11-ieak/connectionsettings-ins-file-setting.md index 2f510429c0..779e024e57 100644 --- a/browsers/internet-explorer/ie11-ieak/connectionsettings-ins-file-setting.md +++ b/browsers/internet-explorer/ie11-ieak/connectionsettings-ins-file-setting.md @@ -1,26 +1,27 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: plan -description: Use the \[ConnectionSettings\] .INS file setting to specify the network connection settings needed to install your custom package. -author: lomayor -ms.prod: ie11 -ms.assetid: 41410300-6ddd-43b2-b9e2-0108a2221355 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Use the ConnectionSettings .INS file to review the network connections for install (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Use the ConnectionSettings .INS file to review the network connections for install -Info about the network connection settings used to install your custom package. This section creates a common configuration on all of your employee’s computers. - -|Name |Value |Description | -|-----------|---------------------------|-------------| -|ConnectName0 |`` |Name for the connection. | -|ConnectName1 |`` |Secondary name for the connection. | -|DeleteConnectionSettings |
          • **0.** Don’t remove the connection settings during installation.
          • **1.** Remove the connection settings during installation.

            **Note**
            This only appears for the **Internal** version of the IEAK 11.

          |Determines whether to remove the existing connection settings during installation of your custom package. | -|Option |
          • **0.** Don’t let employees import connection settings.
          • **1.** Let employees import connection settings.
          |Determines whether an employee can import connection settings into the Internet Explorer Customization Wizard. | - +--- +ms.localizationpriority: medium +ms.mktglfcycl: plan +description: Use the \[ConnectionSettings\] .INS file setting to specify the network connection settings needed to install your custom package. +author: dansimp +ms.prod: ie11 +ms.assetid: 41410300-6ddd-43b2-b9e2-0108a2221355 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Use the ConnectionSettings .INS file to review the network connections for install (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Use the ConnectionSettings .INS file to review the network connections for install +Info about the network connection settings used to install your custom package. This section creates a common configuration on all of your employee’s computers. + +|Name |Value |Description | +|-----------|---------------------------|-------------| +|ConnectName0 |`` |Name for the connection. | +|ConnectName1 |`` |Secondary name for the connection. | +|DeleteConnectionSettings |
          • **0.** Don’t remove the connection settings during installation.
          • **1.** Remove the connection settings during installation.

            **Note**
            This only appears for the **Internal** version of the IEAK 11.

          |Determines whether to remove the existing connection settings during installation of your custom package. | +|Option |
          • **0.** Don’t let employees import connection settings.
          • **1.** Let employees import connection settings.
          |Determines whether an employee can import connection settings into the Internet Explorer Customization Wizard. | + diff --git a/browsers/internet-explorer/ie11-ieak/create-build-folder-structure-ieak11.md b/browsers/internet-explorer/ie11-ieak/create-build-folder-structure-ieak11.md index 5dab4acabf..91f26adf5b 100644 --- a/browsers/internet-explorer/ie11-ieak/create-build-folder-structure-ieak11.md +++ b/browsers/internet-explorer/ie11-ieak/create-build-folder-structure-ieak11.md @@ -1,24 +1,25 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: plan -description: How to create your folder structure on the computer that you’ll use to build your custom browser package. -author: lomayor -ms.prod: ie11 -ms.assetid: e0d05a4c-099f-4f79-a069-4aa1c28a1080 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Create the build computer folder structure using IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Create the build computer folder structure using IEAK 11 -Create your build environment on the computer that you’ll use to build your custom browser package. Your license agreement determines your folder structure and which version of Internet Explorer Administration Kit 11 (IEAK 11) you’ll use: **Internal** or **External**. - -|Name |Version |Description | -|-----------------|----------------------|---------------------------------------------------------| -|`\` |Internal and External |The main, placeholder folder used for all files built by IEAK or that you referenced in your custom package.| -|`\\Dist` |Internal only |Destination directory for your files. You’ll only need this folder if you’re creating your browser package on a network drive. | - +--- +ms.localizationpriority: medium +ms.mktglfcycl: plan +description: How to create your folder structure on the computer that you’ll use to build your custom browser package. +author: dansimp +ms.prod: ie11 +ms.assetid: e0d05a4c-099f-4f79-a069-4aa1c28a1080 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Create the build computer folder structure using IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Create the build computer folder structure using IEAK 11 +Create your build environment on the computer that you’ll use to build your custom browser package. Your license agreement determines your folder structure and which version of Internet Explorer Administration Kit 11 (IEAK 11) you’ll use: **Internal** or **External**. + +|Name |Version |Description | +|-----------------|----------------------|---------------------------------------------------------| +|`\` |Internal and External |The main, placeholder folder used for all files built by IEAK or that you referenced in your custom package.| +|`\\Dist` |Internal only |Destination directory for your files. You’ll only need this folder if you’re creating your browser package on a network drive. | + diff --git a/browsers/internet-explorer/ie11-ieak/create-manage-deploy-custom-pkgs-ieak11.md b/browsers/internet-explorer/ie11-ieak/create-manage-deploy-custom-pkgs-ieak11.md index ee5455e665..3e8043c959 100644 --- a/browsers/internet-explorer/ie11-ieak/create-manage-deploy-custom-pkgs-ieak11.md +++ b/browsers/internet-explorer/ie11-ieak/create-manage-deploy-custom-pkgs-ieak11.md @@ -1,27 +1,28 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: plan -description: Review this list of tasks and references before you create and deploy your Internet Explorer 11 custom install packages. -author: lomayor -ms.prod: ie11 -ms.assetid: fe71c603-bf07-41e1-a477-ade5b28c9fb3 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Tasks and references to consider before creating and deploying custom packages using IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Tasks and references to consider before creating and deploying custom packages using IEAK 11 -Review this list of tasks and references to help you use the Internet Explorer Administration Kit 11 (IEAK 11) to set up, deploy, and manage Internet Explorer 11 in your company. - -|Task |References | -|----------------------------------------|--------------------------------------------------------------| -|Review concepts and requirements, including info about the version and features you'll use. |
          • [Hardware and software requirements for IEAK 11](hardware-and-software-reqs-ieak11.md)
          • [Determine the licensing version and features to use in IEAK 11](licensing-version-and-features-ieak11.md)
          • [Before you start using IEAK 11](before-you-create-custom-pkgs-ieak11.md)
          | -|Prep your environment and get all of the info you'll need for running IEAK 11 |
          • [Create the build computer folder structure using IEAK 11](create-build-folder-structure-ieak11.md)
          • [Customize the Toolbar button and Favorites List icons using IEAK 11](guidelines-toolbar-and-favorites-list-ieak11.md)
          • [Before you install your package over your network using IEAK 11](prep-network-install-with-ieak11.md)
          • [Set up auto detection for DHCP or DNS servers using IEAK 11](auto-detection-dhcp-or-dns-servers-ieak11.md)
          • [Register an uninstall app for custom components using IEAK 11](register-uninstall-app-ieak11.md)
          • [Add and approve ActiveX controls using the IEAK 11](add-and-approve-activex-controls-ieak11.md)
          • [Internet Explorer Administration Kit 11 (IEAK 11) Customization Wizard options](ieak11-wizard-custom-options.md)
          • [Security features and IEAK 11](security-and-ieak11.md)
          | -|Run the Internet Explorer Administration Kit 11 (IEAK 11) Customization Wizard |
          • [Use the File Locations page in the IEAK 11 Wizard](file-locations-ieak11-wizard.md)
          • [Use the Platform Selection page in the IEAK 11 Wizard](platform-selection-ieak11-wizard.md)
          • [Use the Language Selection page in the IEAK 11 Wizard](language-selection-ieak11-wizard.md)
          • [Use the Package Type Selection page in the IEAK 11 Wizard](pkg-type-selection-ieak11-wizard.md)
          • [Use the Feature Selection page in the IEAK 11 Wizard](feature-selection-ieak11-wizard.md)
          • [Use the Automatic Version Synchronization page in the IEAK 11 Wizard](auto-version-sync-ieak11-wizard.md)
          • [Use the Custom Components page in the IEAK 11 Wizard](custom-components-ieak11-wizard.md)
          • [Use the Internal Install page in the IEAK 11 Wizard](internal-install-ieak11-wizard.md)
          • [Use the User Experience page in the IEAK 11 Wizard](user-experience-ieak11-wizard.md)
          • [Use the Browser User Interface page in the IEAK 11 Wizard](browser-ui-ieak11-wizard.md)
          • [Use the Search Providers page in the IEAK 11 Wizard](search-providers-ieak11-wizard.md)
          • [Use the Important URLs - Home Page and Support page in the IEAK 11 Wizard](important-urls-home-page-and-support-ieak11-wizard.md)
          • [Use the Accelerators page in the IEAK 11 Wizard](accelerators-ieak11-wizard.md)
          • [Use the Favorites, Favorites Bar, and Feeds page in the IEAK 11 Wizard](favorites-favoritesbar-and-feeds-ieak11-wizard.md)
          • [Use the Browsing Options page in the IEAK 11 Wizard](browsing-options-ieak11-wizard.md)
          • [Use the First Run Wizard and Welcome Page Options page in the IEAK 11 Wizard](first-run-and-welcome-page-ieak11-wizard.md)
          • [Use the Compatibility View page in the IEAK 11 Wizard](compat-view-ieak11-wizard.md)
          • [Use the Connection Manager page in the IEAK 11 Wizard](connection-mgr-ieak11-wizard.md)
          • [Use the Connection Settings page in the IEAK 11 Wizard](connection-settings-ieak11-wizard.md)
          • [Use the Automatic Configuration page in the IEAK 11 Wizard](auto-config-ieak11-wizard.md)
          • [Use the Proxy Settings page in the IEAK 11 Wizard](proxy-settings-ieak11-wizard.md)
          • [Use the Security and Privacy Settings page in the IEAK 11 Wizard](security-and-privacy-settings-ieak11-wizard.md)
          • [Use the Add a Root Certificate page in the IEAK 11 Wizard](add-root-certificate-ieak11-wizard.md)
          • [Use the Programs page in the IEAK 11 Wizard](programs-ieak11-wizard.md)
          • [Use the Additional Settings page in the IEAK 11 Wizard](additional-settings-ieak11-wizard.md)
          • [Use the Wizard Complete - Next Steps page in the IEAK 11 Wizard](wizard-complete-ieak11-wizard.md)
          | -|Review your policy settings and create multiple versions of your install package. |
          • [Create multiple versions of your custom package using IEAK 11](create-multiple-browser-packages-ieak11.md)
          • [Use the RSoP snap-in to review policy settings](rsop-snapin-for-policy-settings-ieak11.md)

            **Note**
            For deployment instructions, additional troubleshooting, and post-installation management, see the [Internet Explorer 11 (IE11) - Deployment Guide for IT Pros](../ie11-deploy-guide/index.md)

          | -|Review the general IEAK Customization Wizard 11 information, which applies throughout the process. |
          • [Troubleshoot custom package and IEAK 11 problems](troubleshooting-custom-browser-pkg-ieak11.md)
          • [File types used or created by IEAK 11](file-types-ieak11.md)
          • [Customize Automatic Search using IEAK 11](customize-automatic-search-for-ie.md)
          • [Use the uninstallation .INF files to uninstall custom components](create-uninstall-inf-files-for-custom-components.md)
          • [Using Internet Settings (.INS) files with IEAK 11](using-internet-settings-ins-files.md)
          • [Use proxy auto-configuration (.pac) files with IEAK 11](proxy-auto-config-examples.md)
          • [IExpress Wizard for Windows Server 2008 R2 with SP1](iexpress-wizard-for-win-server.md)
          | - +--- +ms.localizationpriority: medium +ms.mktglfcycl: plan +description: Review this list of tasks and references before you create and deploy your Internet Explorer 11 custom install packages. +author: dansimp +ms.prod: ie11 +ms.assetid: fe71c603-bf07-41e1-a477-ade5b28c9fb3 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Tasks and references to consider before creating and deploying custom packages using IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Tasks and references to consider before creating and deploying custom packages using IEAK 11 +Review this list of tasks and references to help you use the Internet Explorer Administration Kit 11 (IEAK 11) to set up, deploy, and manage Internet Explorer 11 in your company. + +|Task |References | +|----------------------------------------|--------------------------------------------------------------| +|Review concepts and requirements, including info about the version and features you'll use. |
          • [Hardware and software requirements for IEAK 11](hardware-and-software-reqs-ieak11.md)
          • [Determine the licensing version and features to use in IEAK 11](licensing-version-and-features-ieak11.md)
          • [Before you start using IEAK 11](before-you-create-custom-pkgs-ieak11.md)
          | +|Prep your environment and get all of the info you'll need for running IEAK 11 |
          • [Create the build computer folder structure using IEAK 11](create-build-folder-structure-ieak11.md)
          • [Customize the Toolbar button and Favorites List icons using IEAK 11](guidelines-toolbar-and-favorites-list-ieak11.md)
          • [Before you install your package over your network using IEAK 11](prep-network-install-with-ieak11.md)
          • [Set up auto detection for DHCP or DNS servers using IEAK 11](auto-detection-dhcp-or-dns-servers-ieak11.md)
          • [Register an uninstall app for custom components using IEAK 11](register-uninstall-app-ieak11.md)
          • [Add and approve ActiveX controls using the IEAK 11](add-and-approve-activex-controls-ieak11.md)
          • [Internet Explorer Administration Kit 11 (IEAK 11) Customization Wizard options](ieak11-wizard-custom-options.md)
          • [Security features and IEAK 11](security-and-ieak11.md)
          | +|Run the Internet Explorer Administration Kit 11 (IEAK 11) Customization Wizard |
          • [Use the File Locations page in the IEAK 11 Wizard](file-locations-ieak11-wizard.md)
          • [Use the Platform Selection page in the IEAK 11 Wizard](platform-selection-ieak11-wizard.md)
          • [Use the Language Selection page in the IEAK 11 Wizard](language-selection-ieak11-wizard.md)
          • [Use the Package Type Selection page in the IEAK 11 Wizard](pkg-type-selection-ieak11-wizard.md)
          • [Use the Feature Selection page in the IEAK 11 Wizard](feature-selection-ieak11-wizard.md)
          • [Use the Automatic Version Synchronization page in the IEAK 11 Wizard](auto-version-sync-ieak11-wizard.md)
          • [Use the Custom Components page in the IEAK 11 Wizard](custom-components-ieak11-wizard.md)
          • [Use the Internal Install page in the IEAK 11 Wizard](internal-install-ieak11-wizard.md)
          • [Use the User Experience page in the IEAK 11 Wizard](user-experience-ieak11-wizard.md)
          • [Use the Browser User Interface page in the IEAK 11 Wizard](browser-ui-ieak11-wizard.md)
          • [Use the Search Providers page in the IEAK 11 Wizard](search-providers-ieak11-wizard.md)
          • [Use the Important URLs - Home Page and Support page in the IEAK 11 Wizard](important-urls-home-page-and-support-ieak11-wizard.md)
          • [Use the Accelerators page in the IEAK 11 Wizard](accelerators-ieak11-wizard.md)
          • [Use the Favorites, Favorites Bar, and Feeds page in the IEAK 11 Wizard](favorites-favoritesbar-and-feeds-ieak11-wizard.md)
          • [Use the Browsing Options page in the IEAK 11 Wizard](browsing-options-ieak11-wizard.md)
          • [Use the First Run Wizard and Welcome Page Options page in the IEAK 11 Wizard](first-run-and-welcome-page-ieak11-wizard.md)
          • [Use the Compatibility View page in the IEAK 11 Wizard](compat-view-ieak11-wizard.md)
          • [Use the Connection Manager page in the IEAK 11 Wizard](connection-mgr-ieak11-wizard.md)
          • [Use the Connection Settings page in the IEAK 11 Wizard](connection-settings-ieak11-wizard.md)
          • [Use the Automatic Configuration page in the IEAK 11 Wizard](auto-config-ieak11-wizard.md)
          • [Use the Proxy Settings page in the IEAK 11 Wizard](proxy-settings-ieak11-wizard.md)
          • [Use the Security and Privacy Settings page in the IEAK 11 Wizard](security-and-privacy-settings-ieak11-wizard.md)
          • [Use the Add a Root Certificate page in the IEAK 11 Wizard](add-root-certificate-ieak11-wizard.md)
          • [Use the Programs page in the IEAK 11 Wizard](programs-ieak11-wizard.md)
          • [Use the Additional Settings page in the IEAK 11 Wizard](additional-settings-ieak11-wizard.md)
          • [Use the Wizard Complete - Next Steps page in the IEAK 11 Wizard](wizard-complete-ieak11-wizard.md)
          | +|Review your policy settings and create multiple versions of your install package. |
          • [Create multiple versions of your custom package using IEAK 11](create-multiple-browser-packages-ieak11.md)
          • [Use the RSoP snap-in to review policy settings](rsop-snapin-for-policy-settings-ieak11.md)

            **Note**
            For deployment instructions, additional troubleshooting, and post-installation management, see the [Internet Explorer 11 (IE11) - Deployment Guide for IT Pros](../ie11-deploy-guide/index.md)

          | +|Review the general IEAK Customization Wizard 11 information, which applies throughout the process. |
          • [Troubleshoot custom package and IEAK 11 problems](troubleshooting-custom-browser-pkg-ieak11.md)
          • [File types used or created by IEAK 11](file-types-ieak11.md)
          • [Customize Automatic Search using IEAK 11](customize-automatic-search-for-ie.md)
          • [Use the uninstallation .INF files to uninstall custom components](create-uninstall-inf-files-for-custom-components.md)
          • [Using Internet Settings (.INS) files with IEAK 11](using-internet-settings-ins-files.md)
          • [Use proxy auto-configuration (.pac) files with IEAK 11](proxy-auto-config-examples.md)
          • [IExpress Wizard for Windows Server 2008 R2 with SP1](iexpress-wizard-for-win-server.md)
          | + diff --git a/browsers/internet-explorer/ie11-ieak/create-multiple-browser-packages-ieak11.md b/browsers/internet-explorer/ie11-ieak/create-multiple-browser-packages-ieak11.md index 896d25732d..6196fabf79 100644 --- a/browsers/internet-explorer/ie11-ieak/create-multiple-browser-packages-ieak11.md +++ b/browsers/internet-explorer/ie11-ieak/create-multiple-browser-packages-ieak11.md @@ -1,38 +1,39 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: Steps to create multiple versions of your custom browser if you support more than 1 version of Windows, more than 1 language, or have different features in each package. -author: lomayor -ms.prod: ie11 -ms.assetid: 4c5f3503-8c69-4691-ae97-1523091ab333 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Create multiple versions of your custom package using IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Create multiple versions of your custom package using IEAK 11 -You'll need to create multiple versions of your custom browser package if: - -- You support more than 1 version of the Windows operating system. - -- You support more than 1 language. - -- You have custom installation packages with only minor differences. For example, having a different phone number or a different set of URLs in the **Favorites** folder. - -The Internet Explorer Customization Wizard 11 stores your original settings in the Install.ins file and will show them each time you re-open the wizard. For more info about .ins files, see [Using Internet Settings (.INS) files with IEAK 11](using-internet-settings-ins-files.md). - -**To create multiple versions of your browser package** - -1. Use the Internet Explorer Customization Wizard 11 to create a custom browser package. For more info about how to run the wizard, start with the [Use the File Locations page in the IEAK 11 Wizard](file-locations-ieak11-wizard.md) topic. - -2. Go to the Cie\Custom folder and rename the Install.ins file to a name that reflects the version. Like, if you need a version for your employees in Texas, you could name the file Texas.ins. - -3. Run the wizard again, choosing the newly renamed folder as the destination directory for your output files.

          -**Important**
          Except for the **Title bar** text, **Favorites**, **Links bar**, **Home** page, and **Search bar**, we recommend that you keep all of your wizard settings the same for all of your build computers. - -4. Repeat this process until you’ve created a package for each version of your custom installation package. - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: Steps to create multiple versions of your custom browser if you support more than 1 version of Windows, more than 1 language, or have different features in each package. +author: dansimp +ms.prod: ie11 +ms.assetid: 4c5f3503-8c69-4691-ae97-1523091ab333 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Create multiple versions of your custom package using IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Create multiple versions of your custom package using IEAK 11 +You'll need to create multiple versions of your custom browser package if: + +- You support more than 1 version of the Windows operating system. + +- You support more than 1 language. + +- You have custom installation packages with only minor differences. For example, having a different phone number or a different set of URLs in the **Favorites** folder. + +The Internet Explorer Customization Wizard 11 stores your original settings in the Install.ins file and will show them each time you re-open the wizard. For more info about .ins files, see [Using Internet Settings (.INS) files with IEAK 11](using-internet-settings-ins-files.md). + +**To create multiple versions of your browser package** + +1. Use the Internet Explorer Customization Wizard 11 to create a custom browser package. For more info about how to run the wizard, start with the [Use the File Locations page in the IEAK 11 Wizard](file-locations-ieak11-wizard.md) topic. + +2. Go to the Cie\Custom folder and rename the Install.ins file to a name that reflects the version. Like, if you need a version for your employees in Texas, you could name the file Texas.ins. + +3. Run the wizard again, choosing the newly renamed folder as the destination directory for your output files.

          +**Important**
          Except for the **Title bar** text, **Favorites**, **Links bar**, **Home** page, and **Search bar**, we recommend that you keep all of your wizard settings the same for all of your build computers. + +4. Repeat this process until you’ve created a package for each version of your custom installation package. + diff --git a/browsers/internet-explorer/ie11-ieak/create-uninstall-inf-files-for-custom-components.md b/browsers/internet-explorer/ie11-ieak/create-uninstall-inf-files-for-custom-components.md index a74479dce6..3cf498605c 100644 --- a/browsers/internet-explorer/ie11-ieak/create-uninstall-inf-files-for-custom-components.md +++ b/browsers/internet-explorer/ie11-ieak/create-uninstall-inf-files-for-custom-components.md @@ -1,29 +1,30 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: Use Setup information (.inf) files to uninstall custom components from your custom browser packages. -author: lomayor -ms.prod: ie11 -ms.assetid: 8257aa41-58de-4339-81dd-9f2ffcc10a08 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Use Setup information (.inf) files to uninstall custom components (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Use uninstallation .INF files to uninstall custom components -The Internet Explorer Administration Kit 11 (IEAK 11) uses Setup information (.inf) files to provide installation instructions for your custom browser packages. You can also use this file to uninstall your custom components by removing the files, registry entries, and shortcuts, and adding your custom component to the list of programs that can be uninstalled from **Uninstall or change a program**. - -**To uninstall your custom components** - -1. Open the Registry Editor and add a new key and value to:
          `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\app-name,"DisplayName",,"description"`

          -Where *description* is the string that’s shown in the **Uninstall or change a program** box. - -2. Add another new key and value to:
          `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\app-name,"UninstallString”",,"command-line"`

          -Where *command-line* is the command that’s run when the component is picked from the **Uninstall or change a program** box. - -Your uninstall script must also remove your key from under the **Uninstall** registry key, so that your component no longer appears in the **Uninstall or change a program** after uninstallation. You can also run just a section of an .inf file by using the Setupx.dll InstallHinfSection entry point. To make this work, your installation script must copy the .inf file to the Windows\Inf folder for your custom component. - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: Use Setup information (.inf) files to uninstall custom components from your custom browser packages. +author: dansimp +ms.prod: ie11 +ms.assetid: 8257aa41-58de-4339-81dd-9f2ffcc10a08 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Use Setup information (.inf) files to uninstall custom components (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Use uninstallation .INF files to uninstall custom components +The Internet Explorer Administration Kit 11 (IEAK 11) uses Setup information (.inf) files to provide installation instructions for your custom browser packages. You can also use this file to uninstall your custom components by removing the files, registry entries, and shortcuts, and adding your custom component to the list of programs that can be uninstalled from **Uninstall or change a program**. + +**To uninstall your custom components** + +1. Open the Registry Editor and add a new key and value to:
          `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\app-name,"DisplayName",,"description"`

          +Where *description* is the string that’s shown in the **Uninstall or change a program** box. + +2. Add another new key and value to:
          `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\app-name,"UninstallString”",,"command-line"`

          +Where *command-line* is the command that’s run when the component is picked from the **Uninstall or change a program** box. + +Your uninstall script must also remove your key from under the **Uninstall** registry key, so that your component no longer appears in the **Uninstall or change a program** after uninstallation. You can also run just a section of an .inf file by using the Setupx.dll InstallHinfSection entry point. To make this work, your installation script must copy the .inf file to the Windows\Inf folder for your custom component. + diff --git a/browsers/internet-explorer/ie11-ieak/custom-components-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/custom-components-ieak11-wizard.md index faf527ba94..571b73d327 100644 --- a/browsers/internet-explorer/ie11-ieak/custom-components-ieak11-wizard.md +++ b/browsers/internet-explorer/ie11-ieak/custom-components-ieak11-wizard.md @@ -1,60 +1,61 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: How to use the Custom Components page in the IEAK 11 Customization Wizard to add additional components for your employees to install with IE. -author: lomayor -ms.prod: ie11 -ms.assetid: 38a2b90f-c324-4dc8-ad30-8cd3e3e901d7 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Use the Custom Components page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Use the Custom Components page in the IEAK 11 Wizard -The **Custom Components** page of the Internet Explorer Customization Wizard 11 lets you add up to 10 additional components that your employees can install at the same time they install IE. These components can be created by Microsoft or your organization as either compressed cabinet (.cab) or self-extracting executable (.exe) files. If you’re using Microsoft components, make sure you have the latest version and software patches from the [Microsoft Support](https://go.microsoft.com/fwlink/p/?LinkId=258658) site. To include Microsoft Update components, you must bundle the associated files into a custom component. - -**Important**
          You should sign any custom code that’s being downloaded over the Internet. The default settings of Internet Explorer 11 will automatically reject any unsigned code. For more info about digitally signing custom components, see [Security features and IEAK 11](security-and-ieak11.md). - -**To use the Custom Component page** - -1. Click **Add**.

          -The **Add a Custom Component** box appears. - -2. Type in the name of your component and then browse to the location of your file (either .cab or .exe). - -3. Pick when to install the component. This can be before IE, after IE, or after the computer restarts.

          -**Important**
          You should install your component before IE if you need to run a batch file to configure your employee settings. You should install your component after IE if you plan to install software updates.  - -4. Check the **Only install if IE is installed successfully** box if your component should only install if IE installs successfully. For example, if you’re installing a security update that requires IE. - -5. If your component is a .cab file, you must provide the extraction command into the **Command** box. - -6. If your component has its own globally unique identifier (GUID), replace the value in the **GUID** box. Otherwise, keep the automatically generated GUID. - -7. Describe your component using up to 511 characters in the **Description** box. - -8. Type any command-line options that need to run while installing your component into the **Parameters** box. For example, if you want your component to install silently, without prompts. For more info about using options, see [IExpress command-line options](iexpress-command-line-options.md). - -9. Type the value that Microsoft Update Setup uses to check that the component installed successfully into the **Uninstall Key** box. This check is done by comparing your value to the value in the `HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\ApplicationName` key. - -10. Type a numeric serial number for your component into the **Version** box, using this format: *xxxx*, *xxxxxx*, *xxxx*, *xxxx*. - -11. Click **Add**.

          -The boxes clear and you can add another component. Click **Cancel** to go back to the **Custom Components** page. - -12. Click **Edit** to change your custom component information, **Verify** to make sure the component is digitally signed, or **Remove** to delete the component from your custom installation package. - -13. Click **Next** to go to the [Internal Install](internal-install-ieak11-wizard.md) page or **Back** to go to the [Automatic Version Synchronization](auto-version-sync-ieak11-wizard.md) page. - -  - -  - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: How to use the Custom Components page in the IEAK 11 Customization Wizard to add additional components for your employees to install with IE. +author: dansimp +ms.prod: ie11 +ms.assetid: 38a2b90f-c324-4dc8-ad30-8cd3e3e901d7 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Use the Custom Components page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Use the Custom Components page in the IEAK 11 Wizard +The **Custom Components** page of the Internet Explorer Customization Wizard 11 lets you add up to 10 additional components that your employees can install at the same time they install IE. These components can be created by Microsoft or your organization as either compressed cabinet (.cab) or self-extracting executable (.exe) files. If you’re using Microsoft components, make sure you have the latest version and software patches from the [Microsoft Support](https://go.microsoft.com/fwlink/p/?LinkId=258658) site. To include Microsoft Update components, you must bundle the associated files into a custom component. + +**Important**
          You should sign any custom code that’s being downloaded over the Internet. The default settings of Internet Explorer 11 will automatically reject any unsigned code. For more info about digitally signing custom components, see [Security features and IEAK 11](security-and-ieak11.md). + +**To use the Custom Component page** + +1. Click **Add**.

          +The **Add a Custom Component** box appears. + +2. Type in the name of your component and then browse to the location of your file (either .cab or .exe). + +3. Pick when to install the component. This can be before IE, after IE, or after the computer restarts.

          +**Important**
          You should install your component before IE if you need to run a batch file to configure your employee settings. You should install your component after IE if you plan to install software updates.  + +4. Check the **Only install if IE is installed successfully** box if your component should only install if IE installs successfully. For example, if you’re installing a security update that requires IE. + +5. If your component is a .cab file, you must provide the extraction command into the **Command** box. + +6. If your component has its own globally unique identifier (GUID), replace the value in the **GUID** box. Otherwise, keep the automatically generated GUID. + +7. Describe your component using up to 511 characters in the **Description** box. + +8. Type any command-line options that need to run while installing your component into the **Parameters** box. For example, if you want your component to install silently, without prompts. For more info about using options, see [IExpress command-line options](iexpress-command-line-options.md). + +9. Type the value that Microsoft Update Setup uses to check that the component installed successfully into the **Uninstall Key** box. This check is done by comparing your value to the value in the `HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\ApplicationName` key. + +10. Type a numeric serial number for your component into the **Version** box, using this format: *xxxx*, *xxxxxx*, *xxxx*, *xxxx*. + +11. Click **Add**.

          +The boxes clear and you can add another component. Click **Cancel** to go back to the **Custom Components** page. + +12. Click **Edit** to change your custom component information, **Verify** to make sure the component is digitally signed, or **Remove** to delete the component from your custom installation package. + +13. Click **Next** to go to the [Internal Install](internal-install-ieak11-wizard.md) page or **Back** to go to the [Automatic Version Synchronization](auto-version-sync-ieak11-wizard.md) page. + +  + +  + + + + + diff --git a/browsers/internet-explorer/ie11-ieak/custombranding-ins-file-setting.md b/browsers/internet-explorer/ie11-ieak/custombranding-ins-file-setting.md index b40640dffa..e7469fa864 100644 --- a/browsers/internet-explorer/ie11-ieak/custombranding-ins-file-setting.md +++ b/browsers/internet-explorer/ie11-ieak/custombranding-ins-file-setting.md @@ -1,24 +1,25 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: plan -description: Use the \[CustomBranding\] .INS file setting to specify the location of your branding cabinet (.cab) file. -author: lomayor -ms.prod: ie11 -ms.assetid: 9c74e239-65c5-4aa5-812f-e0ed80c5c2b0 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Use the CustomBranding .INS file to create custom branding and setup info (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Use the CustomBranding .INS file to create custom branding and setup info -Provide the URL to your branding cabinet (.cab) file. - - -| Name | Value | Description | -|----------|------------------|------------------------------------------------------------------------------------------------------------------------| -| Branding | `` | The location of your branding cabinet (.cab) file. For example, https://www.<your_server>.net/cabs/branding.cab. | - +--- +ms.localizationpriority: medium +ms.mktglfcycl: plan +description: Use the \[CustomBranding\] .INS file setting to specify the location of your branding cabinet (.cab) file. +author: dansimp +ms.prod: ie11 +ms.assetid: 9c74e239-65c5-4aa5-812f-e0ed80c5c2b0 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Use the CustomBranding .INS file to create custom branding and setup info (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Use the CustomBranding .INS file to create custom branding and setup info +Provide the URL to your branding cabinet (.cab) file. + + +| Name | Value | Description | +|----------|------------------|------------------------------------------------------------------------------------------------------------------------| +| Branding | `` | The location of your branding cabinet (.cab) file. For example, https://www.<your_server>.net/cabs/branding.cab. | + diff --git a/browsers/internet-explorer/ie11-ieak/customize-automatic-search-for-ie.md b/browsers/internet-explorer/ie11-ieak/customize-automatic-search-for-ie.md index 5f3eac4aaa..3c0af97192 100644 --- a/browsers/internet-explorer/ie11-ieak/customize-automatic-search-for-ie.md +++ b/browsers/internet-explorer/ie11-ieak/customize-automatic-search-for-ie.md @@ -1,103 +1,104 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: manage -description: Customize Automatic Search in Internet Explorer so that your employees can type a single word into the Address box to search for frequently used pages. -author: lomayor -ms.prod: ie11 -ms.assetid: 694e2f92-5e08-49dc-b83f-677d61fa918a -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Customize Automatic Search using IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Customize Automatic Search for Internet Explorer using IEAK 11 -Internet Explorer lets websites advertise any search provider that uses the open search standard described at the A9 website ( [OpenSearch 1.1 Draft 5](https://go.microsoft.com/fwlink/p/?LinkId=208582)). When IE detects new search providers, the **Search** box becomes active and adds the new providers to the drop-down list of providers. - -Using the **Administrative Templates** section of Group Policy, you can prevent the search box from appearing, you can add a list of acceptable search providers, or you can restrict your employee’s ability to add or remove search providers. - -## Automatic Search Configuration -You can customize Automatic Search so that your employees can type a single word into the **Address** box to search for frequently used pages. For example, you can let a commonly used webpage about invoices appear if an employee types *invoice* into the **Address** box, even if the URL doesn’t include the term. If a website can’t be associated with the term, or if there are multiple matches, a webpage appears showing the top search results. - -**To set up Automatic Search** - -1. Create a script (.asp) file that conditionally looks for search terms, and post it to an intranet server here: https://ieautosearch/response.asp?MT=%1&srch=%2.

          - For info about the acceptable values for the *%1* and *%2* parameters, see the [Automatic Search parameters](#automatic-search-parameters). For an example of the script file, see the [Sample Automatic Search script](#sample-automatic-search-script).

          - **Important**
          If you aren’t using IIS in your company, you’ll need to remap this URL to your script file’s location. - -2. On the **Additional Settings** page of the IEAK 11, click **Internet Settings**, and then click **Advanced Settings**. - -3. Go to the section labeled **Searching** and type *intranet* into the **Search Provider Keyword** box. - -**To redirect to a different site than the one provided by the search results** - -- In the **Advanced Settings** section, go to the section labeled **Searching** and change the **When searching from the address bar** setting to **Just go to the most likely site**. - -**To disable Automatic Search** - -- In the **Advanced Settings** section, go to the section labeled **Searching** and change the **When searching from the address bar** setting to **Do not search from the address bar**. - -### Automatic Search parameters -You must replace the Automatic Search script file parameters, *%1* and *%2* so they’re part of the actual URL. - -|Parameter |Value | -|----------|--------------------------------------------------------| -|1% |The text string typed by an employee into the **Address** bar. | -|2% |The type of search chosen by an employee. This can include:

          • **3.** Display the results and go to the most likely site.
          • **2.** Go to the most likely site.
          • **1.** Display the results in the main window.
          • **0.** Don't search from the **Address** box.
          | - -### Sample Automatic Search script -This is a VBScript-based sample of an .asp Automatic Search script. - -``` -<%@ Language=VBScript %> -<% -' search holds the words typed in the Address bar -' by the user, without the "go" or -' "find" or any delimiters like -' "+" for spaces. -' If the user typed -' "Apple pie," search = "Apple pie." -' If the user typed -' "find Apple pie," search = "Apple pie." - -search = Request.QueryString("MT") -search = UCase(search) -searchOption = Request.QueryString("srch") - -' This is a simple if/then/else -' to redirect the browser to the site -' of your choice based on what the -' user typed. -' Example: expense report is an intranet page -' about filling out an expense report - -if (search = "NEW HIRE") then -Response.Redirect("https://admin/hr/newhireforms.htm") -elseif (search = "LIBRARY CATALOG") then -Response.Redirect("https://library/catalog") -elseif (search = "EXPENSE REPORT") then -Response.Redirect("https://expense") -elseif (search = "LUNCH MENU") then -Response.Redirect("https://cafe/menu/") -else - -' If there is not a match, use the -' default IE autosearch server -Response.Redirect("https://auto.search.msn.com/response.asp?MT=" -+ search + "&srch=" + searchOption + -"&prov=&utf8") -end if -%> -``` - - - - - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: manage +description: Customize Automatic Search in Internet Explorer so that your employees can type a single word into the Address box to search for frequently used pages. +author: dansimp +ms.prod: ie11 +ms.assetid: 694e2f92-5e08-49dc-b83f-677d61fa918a +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Customize Automatic Search using IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Customize Automatic Search for Internet Explorer using IEAK 11 +Internet Explorer lets websites advertise any search provider that uses the open search standard described at the A9 website ( [OpenSearch 1.1 Draft 5](https://go.microsoft.com/fwlink/p/?LinkId=208582)). When IE detects new search providers, the **Search** box becomes active and adds the new providers to the drop-down list of providers. + +Using the **Administrative Templates** section of Group Policy, you can prevent the search box from appearing, you can add a list of acceptable search providers, or you can restrict your employee’s ability to add or remove search providers. + +## Automatic Search Configuration +You can customize Automatic Search so that your employees can type a single word into the **Address** box to search for frequently used pages. For example, you can let a commonly used webpage about invoices appear if an employee types *invoice* into the **Address** box, even if the URL doesn’t include the term. If a website can’t be associated with the term, or if there are multiple matches, a webpage appears showing the top search results. + +**To set up Automatic Search** + +1. Create a script (.asp) file that conditionally looks for search terms, and post it to an intranet server here: https://ieautosearch/response.asp?MT=%1&srch=%2.

          + For info about the acceptable values for the *%1* and *%2* parameters, see the [Automatic Search parameters](#automatic-search-parameters). For an example of the script file, see the [Sample Automatic Search script](#sample-automatic-search-script).

          + **Important**
          If you aren’t using IIS in your company, you’ll need to remap this URL to your script file’s location. + +2. On the **Additional Settings** page of the IEAK 11, click **Internet Settings**, and then click **Advanced Settings**. + +3. Go to the section labeled **Searching** and type *intranet* into the **Search Provider Keyword** box. + +**To redirect to a different site than the one provided by the search results** + +- In the **Advanced Settings** section, go to the section labeled **Searching** and change the **When searching from the address bar** setting to **Just go to the most likely site**. + +**To disable Automatic Search** + +- In the **Advanced Settings** section, go to the section labeled **Searching** and change the **When searching from the address bar** setting to **Do not search from the address bar**. + +### Automatic Search parameters +You must replace the Automatic Search script file parameters, *%1* and *%2* so they’re part of the actual URL. + +|Parameter |Value | +|----------|--------------------------------------------------------| +|1% |The text string typed by an employee into the **Address** bar. | +|2% |The type of search chosen by an employee. This can include:

          • **3.** Display the results and go to the most likely site.
          • **2.** Go to the most likely site.
          • **1.** Display the results in the main window.
          • **0.** Don't search from the **Address** box.
          | + +### Sample Automatic Search script +This is a VBScript-based sample of an .asp Automatic Search script. + +``` +<%@ Language=VBScript %> +<% +' search holds the words typed in the Address bar +' by the user, without the "go" or +' "find" or any delimiters like +' "+" for spaces. +' If the user typed +' "Apple pie," search = "Apple pie." +' If the user typed +' "find Apple pie," search = "Apple pie." + +search = Request.QueryString("MT") +search = UCase(search) +searchOption = Request.QueryString("srch") + +' This is a simple if/then/else +' to redirect the browser to the site +' of your choice based on what the +' user typed. +' Example: expense report is an intranet page +' about filling out an expense report + +if (search = "NEW HIRE") then +Response.Redirect("https://admin/hr/newhireforms.htm") +elseif (search = "LIBRARY CATALOG") then +Response.Redirect("https://library/catalog") +elseif (search = "EXPENSE REPORT") then +Response.Redirect("https://expense") +elseif (search = "LUNCH MENU") then +Response.Redirect("https://cafe/menu/") +else + +' If there is not a match, use the +' default IE autosearch server +Response.Redirect("https://auto.search.msn.com/response.asp?MT=" ++ search + "&srch=" + searchOption + +"&prov=&utf8") +end if +%> +``` + + + + + + + + + diff --git a/browsers/internet-explorer/ie11-ieak/extreginf-ins-file-setting.md b/browsers/internet-explorer/ie11-ieak/extreginf-ins-file-setting.md index d3bee115a5..06e8d6c3f3 100644 --- a/browsers/internet-explorer/ie11-ieak/extreginf-ins-file-setting.md +++ b/browsers/internet-explorer/ie11-ieak/extreginf-ins-file-setting.md @@ -1,28 +1,29 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: Use the \[ExtRegInf\] .INS file setting to specify your Setup information (.inf) files and the installation mode for your custom components. -author: lomayor -ms.prod: ie11 -ms.assetid: 53148422-d784-44dc-811d-ef814b86a4c6 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Use the ExtRegInf .INS file to specify your installation files and mode (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Use the ExtRegInf .INS file to specify installation files and mode -Info about how to specify your Setup information (.inf) files and the installation mode for your custom components. - -|Name |Value |Description | -|-----------|---------|------------------------------------------------------------------------------------------------------------------| -|Chat |*string* |The name of the .inf file and the install mode for components. For example, *,chat.inf,DefaultInstall. | -|Conf |*string* |The name of the .inf file and the install mode for components. For example, *,conf.inf,DefaultInstall. | -|Inetres |*string* |The name of the .inf file and the install mode for components. For example, *,inetres.inf,DefaultInstall. | -|Inetset |*string* |The name of the .inf file and the install mode for components. For example, *,inetset.inf,DefaultInstall. | -|Subs |*string* |The name of the .inf file and the install mode for components. For example, *,subs.inf,DefaultInstall. | -|ConnectionSettings |*string* |The name of the .inf file and the install mode for components. For example, *,connect.inf,DefaultInstall. | - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: Use the \[ExtRegInf\] .INS file setting to specify your Setup information (.inf) files and the installation mode for your custom components. +author: dansimp +ms.prod: ie11 +ms.assetid: 53148422-d784-44dc-811d-ef814b86a4c6 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Use the ExtRegInf .INS file to specify your installation files and mode (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Use the ExtRegInf .INS file to specify installation files and mode +Info about how to specify your Setup information (.inf) files and the installation mode for your custom components. + +|Name |Value |Description | +|-----------|---------|------------------------------------------------------------------------------------------------------------------| +|Chat |*string* |The name of the .inf file and the install mode for components. For example, *,chat.inf,DefaultInstall. | +|Conf |*string* |The name of the .inf file and the install mode for components. For example, *,conf.inf,DefaultInstall. | +|Inetres |*string* |The name of the .inf file and the install mode for components. For example, *,inetres.inf,DefaultInstall. | +|Inetset |*string* |The name of the .inf file and the install mode for components. For example, *,inetset.inf,DefaultInstall. | +|Subs |*string* |The name of the .inf file and the install mode for components. For example, *,subs.inf,DefaultInstall. | +|ConnectionSettings |*string* |The name of the .inf file and the install mode for components. For example, *,connect.inf,DefaultInstall. | + diff --git a/browsers/internet-explorer/ie11-ieak/favorites-favoritesbar-and-feeds-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/favorites-favoritesbar-and-feeds-ieak11-wizard.md index e077a6fbed..47bf04d6e2 100644 --- a/browsers/internet-explorer/ie11-ieak/favorites-favoritesbar-and-feeds-ieak11-wizard.md +++ b/browsers/internet-explorer/ie11-ieak/favorites-favoritesbar-and-feeds-ieak11-wizard.md @@ -1,109 +1,110 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: How to use the Favorites, Favorites Bar, and Feeds page in IEAK 11 Customization Wizard to add links, web slices, and feeds to your custom browser package. -author: lomayor -ms.prod: ie11 -ms.assetid: 84afa831-5642-4b8f-b7df-212a53ec8fc7 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Use the Favorites, Favorites Bar, and Feeds page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Use the Favorites, Favorites Bar, and Feeds page in the IEAK 11 Wizard -The **Favorites, Favorites Bar, and Feeds** page of the Internet Explorer Administration Kit (IEAK 11) Customization Wizard lets you add: - -- **Links.** Used so your employees can quickly connect with your important websites. These links can appear in the **Links** folder or on the **Favorites Bar**. - -- **Web Slices.** Used so your employees can subscribe to a section of a webpage, tracking information as it changes, such as for weather reports, stock prices, or the progress of an auction item. - -- **Feeds.** Used so your employees can quickly access your recommended RSS feeds. While you can’t import a folder of RSS feeds, you can add new links. - -Although we provide default items in the **Favorites, Favorites Bar, and Feeds** area, you can remove any of the items, add more items, or add new folders and links as part of your custom package. The customizations you make on this page only apply to Internet Explorer for the desktop. - -**To work with Favorites** - -1. To import your existing folder of links, pick **Favorites**, and then click **Import**. - -2. Go to your existing link folder, most likely in the `\Users\\Favorites` folder, and then click **OK**.

          -The links are imported and added to the **Favorites, Favorites Bar, and Feeds** page, beneath the **Favorites** folder. - -3. To add a new favorite link, pick **Favorites**, and then click **Add URL**.

          -The **Details** box appears. - -4. Type the new link name in the **Name** box. - -5. Type the new URL in the **URL** box. - -6. Optionally, you can add a 16x16 pixel icon to your link by adding the location in the **Icon** box. - -7. Click **OK**. - -8. To add a new **Favorites** folder, pick **Favorites**, and then click **Add Folder**.

          -The **Details** box appears. - -9. Type the folder name into the **Name** box, and then click **OK**. - -10. Click **Edit** to change any of your new information, **Test URL** to test each of your links to make sure they go to the right place, or **Remove** to delete a **Favorites** item. - -11. If you have multiple **Favorites** links, you can update their order in the list. Check the **Add to the top of the list** box, click the link you want to move, and then click **Move Up** or **Move Down**. - -12. Check the **Disable IE Suggested Sites** box to disable the Suggested Sites feature. By turning this on, your employees won’t receive suggested sites based on the sites that they visit. - -13. Continue with the next procedures in this topic to add additional **Favorites Bar** or **RSS Feeds** links, or you can click **Next** to go to the [Browsing Options](browsing-options-ieak11-wizard.md) page or **Back** to go to the [Accelerators](accelerators-ieak11-wizard.md) page. - -**To work with the Favorites Bar** - -1. To import your existing folder of links, pick **Favorites Bar**, and then click **Import**. - -2. Go to your existing link folder, most likely in the `\Users\\Favorites\Favorites Bar` folder, and then click **OK**.

          -The links are imported and added to the **Favorites, Favorites Bar, and Feeds** page, beneath the **Favorites Bar** folder. - -3. To add a new link to the **Favorites Bar**, pick **Favorites Bar**, and then click **Add URL**.

          -The **Details** box appears. - -4. Type the new quick link name in the **Name** box. - -5. Type the new URL in the **URL** box. - -6. Optionally, you can add a 16x16 pixel icon to your link by adding the location in the **Icon** box. - -7. Pick whether your link is a simple **Link**, a **Feed**, or a **Web Slice**, and then click **OK**. - -8. Click **Edit** to change any of your new information, **Test URL** to test each of your links to make sure they go to the right place, or **Remove** to delete a **Favorites Bar** item. - -9. If you have multiple **Favorites Bar** links, you can update their order in the list. Check the **Add to the top of the list** box, click the link you want to move, and then click **Move Up** or **Move Down**. - -10. Check the **Disable IE Suggested Sites** box to disable the Suggested Sites feature. By turning this on, your employees won’t receive suggested sites based on the sites that they visit. - -11. Continue with the next procedures in this topic to add additional **Favorites** or **RSS Feeds** links, or you can click **Next** to go to the [Browsing Options](browsing-options-ieak11-wizard.md) page or **Back** to go to the [Accelerators](accelerators-ieak11-wizard.md) page. - -**To work with RSS Feeds** - -1. To add a new link to the **RSS Feeds**, pick **Favorites Bar**, and then click **Add URL**.

          -The **Details** box appears. - -2. Type the new link name in the **Name** box. - -3. Type the new URL in the **URL** box, and then click **OK**. - -4. Click **Edit** to change any of your new information, **Test URL** to test each of your links to make sure they go to the right place, or **Remove** to delete a **RSS Feeds** item. - -5. If you have multiple **RSS Feeds** links, you can update their order in the list. Check the **Add to the top of the list** box, click the link you want to move, and then click **Move Up** or **Move Down**. - -6. Check the **Disable IE Suggested Sites** box to disable the Suggested Sites feature. By turning this on, your employees won’t receive suggested sites based on the sites that they visit. - -7. Continue with the next procedures in this topic to add additional **Favorites** or **Favorites Bar** links, or you can click **Next** to go to the [Browsing Options](browsing-options-ieak11-wizard.md) page or **Back** to go to the [Accelerators](accelerators-ieak11-wizard.md) page. - -  - -  - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: How to use the Favorites, Favorites Bar, and Feeds page in IEAK 11 Customization Wizard to add links, web slices, and feeds to your custom browser package. +author: dansimp +ms.prod: ie11 +ms.assetid: 84afa831-5642-4b8f-b7df-212a53ec8fc7 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Use the Favorites, Favorites Bar, and Feeds page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Use the Favorites, Favorites Bar, and Feeds page in the IEAK 11 Wizard +The **Favorites, Favorites Bar, and Feeds** page of the Internet Explorer Administration Kit (IEAK 11) Customization Wizard lets you add: + +- **Links.** Used so your employees can quickly connect with your important websites. These links can appear in the **Links** folder or on the **Favorites Bar**. + +- **Web Slices.** Used so your employees can subscribe to a section of a webpage, tracking information as it changes, such as for weather reports, stock prices, or the progress of an auction item. + +- **Feeds.** Used so your employees can quickly access your recommended RSS feeds. While you can’t import a folder of RSS feeds, you can add new links. + +Although we provide default items in the **Favorites, Favorites Bar, and Feeds** area, you can remove any of the items, add more items, or add new folders and links as part of your custom package. The customizations you make on this page only apply to Internet Explorer for the desktop. + +**To work with Favorites** + +1. To import your existing folder of links, pick **Favorites**, and then click **Import**. + +2. Go to your existing link folder, most likely in the `\Users\\Favorites` folder, and then click **OK**.

          +The links are imported and added to the **Favorites, Favorites Bar, and Feeds** page, beneath the **Favorites** folder. + +3. To add a new favorite link, pick **Favorites**, and then click **Add URL**.

          +The **Details** box appears. + +4. Type the new link name in the **Name** box. + +5. Type the new URL in the **URL** box. + +6. Optionally, you can add a 16x16 pixel icon to your link by adding the location in the **Icon** box. + +7. Click **OK**. + +8. To add a new **Favorites** folder, pick **Favorites**, and then click **Add Folder**.

          +The **Details** box appears. + +9. Type the folder name into the **Name** box, and then click **OK**. + +10. Click **Edit** to change any of your new information, **Test URL** to test each of your links to make sure they go to the right place, or **Remove** to delete a **Favorites** item. + +11. If you have multiple **Favorites** links, you can update their order in the list. Check the **Add to the top of the list** box, click the link you want to move, and then click **Move Up** or **Move Down**. + +12. Check the **Disable IE Suggested Sites** box to disable the Suggested Sites feature. By turning this on, your employees won’t receive suggested sites based on the sites that they visit. + +13. Continue with the next procedures in this topic to add additional **Favorites Bar** or **RSS Feeds** links, or you can click **Next** to go to the [Browsing Options](browsing-options-ieak11-wizard.md) page or **Back** to go to the [Accelerators](accelerators-ieak11-wizard.md) page. + +**To work with the Favorites Bar** + +1. To import your existing folder of links, pick **Favorites Bar**, and then click **Import**. + +2. Go to your existing link folder, most likely in the `\Users\\Favorites\Favorites Bar` folder, and then click **OK**.

          +The links are imported and added to the **Favorites, Favorites Bar, and Feeds** page, beneath the **Favorites Bar** folder. + +3. To add a new link to the **Favorites Bar**, pick **Favorites Bar**, and then click **Add URL**.

          +The **Details** box appears. + +4. Type the new quick link name in the **Name** box. + +5. Type the new URL in the **URL** box. + +6. Optionally, you can add a 16x16 pixel icon to your link by adding the location in the **Icon** box. + +7. Pick whether your link is a simple **Link**, a **Feed**, or a **Web Slice**, and then click **OK**. + +8. Click **Edit** to change any of your new information, **Test URL** to test each of your links to make sure they go to the right place, or **Remove** to delete a **Favorites Bar** item. + +9. If you have multiple **Favorites Bar** links, you can update their order in the list. Check the **Add to the top of the list** box, click the link you want to move, and then click **Move Up** or **Move Down**. + +10. Check the **Disable IE Suggested Sites** box to disable the Suggested Sites feature. By turning this on, your employees won’t receive suggested sites based on the sites that they visit. + +11. Continue with the next procedures in this topic to add additional **Favorites** or **RSS Feeds** links, or you can click **Next** to go to the [Browsing Options](browsing-options-ieak11-wizard.md) page or **Back** to go to the [Accelerators](accelerators-ieak11-wizard.md) page. + +**To work with RSS Feeds** + +1. To add a new link to the **RSS Feeds**, pick **Favorites Bar**, and then click **Add URL**.

          +The **Details** box appears. + +2. Type the new link name in the **Name** box. + +3. Type the new URL in the **URL** box, and then click **OK**. + +4. Click **Edit** to change any of your new information, **Test URL** to test each of your links to make sure they go to the right place, or **Remove** to delete a **RSS Feeds** item. + +5. If you have multiple **RSS Feeds** links, you can update their order in the list. Check the **Add to the top of the list** box, click the link you want to move, and then click **Move Up** or **Move Down**. + +6. Check the **Disable IE Suggested Sites** box to disable the Suggested Sites feature. By turning this on, your employees won’t receive suggested sites based on the sites that they visit. + +7. Continue with the next procedures in this topic to add additional **Favorites** or **Favorites Bar** links, or you can click **Next** to go to the [Browsing Options](browsing-options-ieak11-wizard.md) page or **Back** to go to the [Accelerators](accelerators-ieak11-wizard.md) page. + +  + +  + + + + + diff --git a/browsers/internet-explorer/ie11-ieak/favoritesex-ins-file-setting.md b/browsers/internet-explorer/ie11-ieak/favoritesex-ins-file-setting.md index cd9cbf7a91..694b8d994d 100644 --- a/browsers/internet-explorer/ie11-ieak/favoritesex-ins-file-setting.md +++ b/browsers/internet-explorer/ie11-ieak/favoritesex-ins-file-setting.md @@ -1,26 +1,27 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: Use the \[FavoritesEx\] .INS file setting to specify your Favorites icon file, whether Favorites is available offline, and your Favorites URLs. -author: lomayor -ms.prod: ie11 -ms.assetid: 55de376a-d442-478e-8978-3b064407b631 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Use the FavoritesEx .INS file for your Favorites icon and URLs (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Use the FavoritesEx .INS file for your Favorites icon and URLs -Info about where you store your **Favorites** icon file, whether your **Favorites** are available offline, and the URLs for each **Favorites** site. - -|Name |Value |Description | -|----------------|-----------------------|--------------------------------------------------------------------------| -|IconFile1 |`` |An icon (.ico file) that represents the **Favorites** item you’re adding. | -|Offline1 |

          • **0.** Makes the **Favorites** item unavailable for offline browsing.
          • **1.** Makes the **Favorites** item available for offline browsing.
          |Determines if the **Favorites** item is available for offline browsing. | -|Title1 |`` |Title for the **Favorites** item. | -|Url1 |`` |URL to the **Favorites** item. | - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: Use the \[FavoritesEx\] .INS file setting to specify your Favorites icon file, whether Favorites is available offline, and your Favorites URLs. +author: dansimp +ms.prod: ie11 +ms.assetid: 55de376a-d442-478e-8978-3b064407b631 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Use the FavoritesEx .INS file for your Favorites icon and URLs (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Use the FavoritesEx .INS file for your Favorites icon and URLs +Info about where you store your **Favorites** icon file, whether your **Favorites** are available offline, and the URLs for each **Favorites** site. + +|Name |Value |Description | +|----------------|-----------------------|--------------------------------------------------------------------------| +|IconFile1 |`` |An icon (.ico file) that represents the **Favorites** item you’re adding. | +|Offline1 |
          • **0.** Makes the **Favorites** item unavailable for offline browsing.
          • **1.** Makes the **Favorites** item available for offline browsing.
          |Determines if the **Favorites** item is available for offline browsing. | +|Title1 |`` |Title for the **Favorites** item. | +|Url1 |`` |URL to the **Favorites** item. | + diff --git a/browsers/internet-explorer/ie11-ieak/feature-selection-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/feature-selection-ieak11-wizard.md index 0790851097..b27bc3273a 100644 --- a/browsers/internet-explorer/ie11-ieak/feature-selection-ieak11-wizard.md +++ b/browsers/internet-explorer/ie11-ieak/feature-selection-ieak11-wizard.md @@ -2,13 +2,13 @@ ms.localizationpriority: medium ms.mktglfcycl: deploy description: How to use the Feature Selection page in the IEAK 11 Customization Wizard to choose which parts of the setup processes and Internet Explorer 11 to change for your company. -author: lomayor +author: dansimp ms.prod: ie11 ms.assetid: 9cb8324e-d73b-41ba-ade9-3acc796e21d8 ms.reviewer: audience: itpro manager: dansimp -ms.author: lomayor +ms.author: dansimp title: Use the Feature Selection page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) ms.sitesec: library --- diff --git a/browsers/internet-explorer/ie11-ieak/file-locations-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/file-locations-ieak11-wizard.md index 2fa0b58cc8..f3224c2055 100644 --- a/browsers/internet-explorer/ie11-ieak/file-locations-ieak11-wizard.md +++ b/browsers/internet-explorer/ie11-ieak/file-locations-ieak11-wizard.md @@ -1,55 +1,56 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: How to use the File Locations page in the IEAK 11 Customization Wizard to change the location of your install package and IE11 folders. -author: lomayor -ms.prod: ie11 -ms.assetid: bd0620e1-0e07-4560-95ac-11888c2c389e -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Use the File Locations page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Use the File Locations page in the IEAK 11 Wizard -The **File Locations** page of the Internet Explorer Customization Wizard 11 lets you change the location of your folders, including: - -- Where you’ll create and store your custom installation package. - -- Where you’ll download and store Internet Explorer 11. - -**Important**
          -You can create a custom installation package on your hard drive and move it to an Internet or intranet server, or you can create it directly on a server. If you create the package on a web server that’s running from your hard drive, use the path to the web server as the destination folder location. Whatever location you choose, it must be protected by appropriate access control lists (ACLs). If the location is not protected, the custom package may be tampered with. - -**To use the File Locations page** - -1. Browse to the location where you’ll store your finished custom IE installation package and the related subfolders.

          -**Note**
          Subfolders are created for each language version, based on operating system and media type. For example, if your destination folder is `C:\Inetpub\Wwwroot\Cie\Dist`, then the English-language version is created as `C:\Inetpub\Wwwroot\Cie\Dist\Flat\Win32\En` subfolders. - -2. Click **Advanced Options**.

          -The **Advanced Options** box opens and lets you change how the wizard downloads and gets files, and how it imports settings from your .ins file. - -3. Check the box letting IE Customization Wizard 11 look for the latest components, using Automatic Version Synchronization.

          -This option lets the wizard connect to the IE **Downloads** page to look for updated versions of IE since you last ran the wizard.

          -**Important**
          -You must run Automatic Version Synchronization at least once to check for updated components. - -4. Browse to your .ins file location, and then click **Open**.

          -By importing settings from an .ins file, you can re-use existing configurations. This saves you time if your packages have the same or similar settings. - -5. Browse to your component download folder.

          -Automatic Version Synchronization automatically checks the component download folder to see if you have the latest version of IE. To keep this folder up-to-date, you shouldn’t change its location. However, if you want to keep both a previous version of IE and the latest version, we recommend you download the components to a different location. - -6. Click **OK** to close the **Advanced Options** box, and then click **Next** to go to the [Platform Selection](platform-selection-ieak11-wizard.md) page. - -  - -  - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: How to use the File Locations page in the IEAK 11 Customization Wizard to change the location of your install package and IE11 folders. +author: dansimp +ms.prod: ie11 +ms.assetid: bd0620e1-0e07-4560-95ac-11888c2c389e +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Use the File Locations page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Use the File Locations page in the IEAK 11 Wizard +The **File Locations** page of the Internet Explorer Customization Wizard 11 lets you change the location of your folders, including: + +- Where you’ll create and store your custom installation package. + +- Where you’ll download and store Internet Explorer 11. + +**Important**
          +You can create a custom installation package on your hard drive and move it to an Internet or intranet server, or you can create it directly on a server. If you create the package on a web server that’s running from your hard drive, use the path to the web server as the destination folder location. Whatever location you choose, it must be protected by appropriate access control lists (ACLs). If the location is not protected, the custom package may be tampered with. + +**To use the File Locations page** + +1. Browse to the location where you’ll store your finished custom IE installation package and the related subfolders.

          +**Note**
          Subfolders are created for each language version, based on operating system and media type. For example, if your destination folder is `C:\Inetpub\Wwwroot\Cie\Dist`, then the English-language version is created as `C:\Inetpub\Wwwroot\Cie\Dist\Flat\Win32\En` subfolders. + +2. Click **Advanced Options**.

          +The **Advanced Options** box opens and lets you change how the wizard downloads and gets files, and how it imports settings from your .ins file. + +3. Check the box letting IE Customization Wizard 11 look for the latest components, using Automatic Version Synchronization.

          +This option lets the wizard connect to the IE **Downloads** page to look for updated versions of IE since you last ran the wizard.

          +**Important**
          +You must run Automatic Version Synchronization at least once to check for updated components. + +4. Browse to your .ins file location, and then click **Open**.

          +By importing settings from an .ins file, you can re-use existing configurations. This saves you time if your packages have the same or similar settings. + +5. Browse to your component download folder.

          +Automatic Version Synchronization automatically checks the component download folder to see if you have the latest version of IE. To keep this folder up-to-date, you shouldn’t change its location. However, if you want to keep both a previous version of IE and the latest version, we recommend you download the components to a different location. + +6. Click **OK** to close the **Advanced Options** box, and then click **Next** to go to the [Platform Selection](platform-selection-ieak11-wizard.md) page. + +  + +  + + + + + diff --git a/browsers/internet-explorer/ie11-ieak/file-types-ieak11.md b/browsers/internet-explorer/ie11-ieak/file-types-ieak11.md index 5dd8eff9da..38703f9131 100644 --- a/browsers/internet-explorer/ie11-ieak/file-types-ieak11.md +++ b/browsers/internet-explorer/ie11-ieak/file-types-ieak11.md @@ -1,37 +1,38 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: plan -description: Review the file types that are created and used by tools in the Internet Explorer Administration Kit 11 (IEAK 11). -author: lomayor -ms.prod: ie11 -ms.assetid: e5735074-3e9b-4a00-b1a7-b8fd8baca327 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: File types used or created by IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# File types used or created by IEAK 11 -A list of the file types used or created by tools in IEAK 11: - -|File type |Description | -|----------|-------------------------| -|.adm | An admin file (located at `:\Program Files\Windows IEAK 11\policies`), used by Group Policy to define the system policies and restrictions for Windows. You can use the IEAK 11 to change these settings. | -|.bat |An ASCII text file that contains a sequence of operating system commands, including the parameters and operators supported by the batch command language. When you run the batch file from a command prompt, the computer processes each command sequentially. | -|.bmp, .gif, .jpeg, and .jpg |Image files you can use to customize your toolbar button and favorites list icons. For info, see the [Customize the Toolbar button and Favorites List icons using IEAK 11](guidelines-toolbar-and-favorites-list-ieak11.md) page. | -|.cab |A compressed cabinet (.cab) file, created by the Internet Explorer Customization Wizard 11 to store your custom component files. We highly recommend that your .cab files be signed for security purposes. For more info, see the [Security features and IEAK 11](security-and-ieak11.md) page. | -|.cif |A component info file (IESetup.cif), identifying the new or updated components you're going to install with Internet Explorer. Each component file has an associated *ComponentID* that's used by Windows Update Setup to determine whether a new component or an update exists. | -|.cmp |Connection profile files that are created by the Connection Manager Administration Kit (CMAK). | -|.cms |Service provider files, created by the CMAK tool to specify the configuration of the phone book and many of the other functions of your service profiles. | -|.exe |Executable files that control the setup process, by installing the .cab files that install the custom browser package on your employee's devices. | -|.inf |Setup information files that provide installation instructions for your custom browser packages. For more info, see the [Use the uninstallation .INF files to uninstall custom components](create-uninstall-inf-files-for-custom-components.md) page. | -|.ins |Internet Settings files that specify how to configure your custom browser and its components. You can create multiple versions of your custom package by customizing copies of this file. For more info, see the [Using Internet Settings (.INS) files with IEAK 11](using-internet-settings-ins-files.md) page. | -|.pac |Proxy auto-configuration script files that determine whether to connect directly to a host or to use a proxy server. For more info, see the [Use the Automatic Configuration page in the IEAK 11 Wizard](auto-config-ieak11-wizard.md) page. | -|.js and .jvs |JScript and JavaScript files that let you configure and maintain your advanced proxy settings. For more info, see the [Use the Automatic Configuration page in the IEAK 11 Wizard](auto-config-ieak11-wizard.md) page. | -|.pvk |A file format used by some certification authorities to store the private key of the digital certificate. The public part of the digital certificate is stored in an SPC file, while the private part is stored in the PVK file. For more info, see the **Understanding certificates** section of the [Security features and IEAK 11](security-and-ieak11.md) page. | -|.sed |Connection profile files, created by the CMAK tool, including the instructions for building the self-extracting executable (.exe) file for your service profiles.

          **Important**
          You must never edit a .sed file. | -|.spc |The software publishing certificate file, which includes:

          • The name and other identifying information of the owner of the certificate.
          • The public key associated with the certificate.
          • The serial number.
          • The length of time the certificate is valid.
          • The digital signature of the certification authority that issued the certificate.
          | - +--- +ms.localizationpriority: medium +ms.mktglfcycl: plan +description: Review the file types that are created and used by tools in the Internet Explorer Administration Kit 11 (IEAK 11). +author: dansimp +ms.prod: ie11 +ms.assetid: e5735074-3e9b-4a00-b1a7-b8fd8baca327 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: File types used or created by IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# File types used or created by IEAK 11 +A list of the file types used or created by tools in IEAK 11: + +|File type |Description | +|----------|-------------------------| +|.adm | An admin file (located at `:\Program Files\Windows IEAK 11\policies`), used by Group Policy to define the system policies and restrictions for Windows. You can use the IEAK 11 to change these settings. | +|.bat |An ASCII text file that contains a sequence of operating system commands, including the parameters and operators supported by the batch command language. When you run the batch file from a command prompt, the computer processes each command sequentially. | +|.bmp, .gif, .jpeg, and .jpg |Image files you can use to customize your toolbar button and favorites list icons. For info, see the [Customize the Toolbar button and Favorites List icons using IEAK 11](guidelines-toolbar-and-favorites-list-ieak11.md) page. | +|.cab |A compressed cabinet (.cab) file, created by the Internet Explorer Customization Wizard 11 to store your custom component files. We highly recommend that your .cab files be signed for security purposes. For more info, see the [Security features and IEAK 11](security-and-ieak11.md) page. | +|.cif |A component info file (IESetup.cif), identifying the new or updated components you're going to install with Internet Explorer. Each component file has an associated *ComponentID* that's used by Windows Update Setup to determine whether a new component or an update exists. | +|.cmp |Connection profile files that are created by the Connection Manager Administration Kit (CMAK). | +|.cms |Service provider files, created by the CMAK tool to specify the configuration of the phone book and many of the other functions of your service profiles. | +|.exe |Executable files that control the setup process, by installing the .cab files that install the custom browser package on your employee's devices. | +|.inf |Setup information files that provide installation instructions for your custom browser packages. For more info, see the [Use the uninstallation .INF files to uninstall custom components](create-uninstall-inf-files-for-custom-components.md) page. | +|.ins |Internet Settings files that specify how to configure your custom browser and its components. You can create multiple versions of your custom package by customizing copies of this file. For more info, see the [Using Internet Settings (.INS) files with IEAK 11](using-internet-settings-ins-files.md) page. | +|.pac |Proxy auto-configuration script files that determine whether to connect directly to a host or to use a proxy server. For more info, see the [Use the Automatic Configuration page in the IEAK 11 Wizard](auto-config-ieak11-wizard.md) page. | +|.js and .jvs |JScript and JavaScript files that let you configure and maintain your advanced proxy settings. For more info, see the [Use the Automatic Configuration page in the IEAK 11 Wizard](auto-config-ieak11-wizard.md) page. | +|.pvk |A file format used by some certification authorities to store the private key of the digital certificate. The public part of the digital certificate is stored in an SPC file, while the private part is stored in the PVK file. For more info, see the **Understanding certificates** section of the [Security features and IEAK 11](security-and-ieak11.md) page. | +|.sed |Connection profile files, created by the CMAK tool, including the instructions for building the self-extracting executable (.exe) file for your service profiles.

          **Important**
          You must never edit a .sed file. | +|.spc |The software publishing certificate file, which includes:

          • The name and other identifying information of the owner of the certificate.
          • The public key associated with the certificate.
          • The serial number.
          • The length of time the certificate is valid.
          • The digital signature of the certification authority that issued the certificate.
          | + diff --git a/browsers/internet-explorer/ie11-ieak/first-run-and-welcome-page-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/first-run-and-welcome-page-ieak11-wizard.md index 68b255a273..507450938d 100644 --- a/browsers/internet-explorer/ie11-ieak/first-run-and-welcome-page-ieak11-wizard.md +++ b/browsers/internet-explorer/ie11-ieak/first-run-and-welcome-page-ieak11-wizard.md @@ -1,44 +1,45 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: How to use the First Run Wizard and Welcome Page Options page in the IEAK 11 Customization Wizard to set what your employee’s see the first time they log on to IE, based on their operating system. -author: lomayor -ms.prod: ie11 -ms.assetid: 85f856a6-b707-48a9-ba99-3a6e898276a9 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Use the First Run Wizard and Welcome Page Options page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Use the First Run Wizard and Welcome Page Options page in the IEAK 11 Wizard -The **First Run Wizard and Welcome Page Options** page of the Internet Explorer Customization Wizard 11 lets you decide what your employee’s see the first time they log on to IE, based on their operating system. - -- **Windows 8.1 Update and newer.** No longer includes a **Welcome** page, so if you pick the **Use Internet Explorer 11 Welcome Page** or the **Use a custom Welcome page** option, IEAK creates an initial **Home** page that loads before all other **Home** pages, as the first tab. This only applies to the Internet Explorer for the desktop. - -- **Windows 7 SP1.** You can disable the first run page for Windows 7 SP1 and then pick a custom **Welcome** page to show instead. If you don’t customize the settings on this page, your employees will see the default IE **Welcome** page. - -**To use the First Run Wizard and Welcome Page Options page** - -1. Check the **Use IE11 First Run wizard (recommended)** box to use the default First Run wizard in IE.

          -Clearing this box lets you use the IE11 **Welcome** page or your custom **Welcome** page. - -2. If you cleared the First Run wizard box, you can decide which **Welcome** page to use: - - - **Use IE11 Welcome Page.** Check this box if you want to use the default IE11 **Welcome** page. - - - **Use a custom Welcome Page.** Check this box if you want to use a custom **Welcome** page. If you choose this option, you need to add the URL to your custom page. - -3. Click **Next** to go to the [Compatibility View](compat-view-ieak11-wizard.md) page or **Back** to go to the [Browsing Options](browsing-options-ieak11-wizard.md) page. - -  - -  - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: How to use the First Run Wizard and Welcome Page Options page in the IEAK 11 Customization Wizard to set what your employee’s see the first time they log on to IE, based on their operating system. +author: dansimp +ms.prod: ie11 +ms.assetid: 85f856a6-b707-48a9-ba99-3a6e898276a9 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Use the First Run Wizard and Welcome Page Options page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Use the First Run Wizard and Welcome Page Options page in the IEAK 11 Wizard +The **First Run Wizard and Welcome Page Options** page of the Internet Explorer Customization Wizard 11 lets you decide what your employee’s see the first time they log on to IE, based on their operating system. + +- **Windows 8.1 Update and newer.** No longer includes a **Welcome** page, so if you pick the **Use Internet Explorer 11 Welcome Page** or the **Use a custom Welcome page** option, IEAK creates an initial **Home** page that loads before all other **Home** pages, as the first tab. This only applies to the Internet Explorer for the desktop. + +- **Windows 7 SP1.** You can disable the first run page for Windows 7 SP1 and then pick a custom **Welcome** page to show instead. If you don’t customize the settings on this page, your employees will see the default IE **Welcome** page. + +**To use the First Run Wizard and Welcome Page Options page** + +1. Check the **Use IE11 First Run wizard (recommended)** box to use the default First Run wizard in IE.

          +Clearing this box lets you use the IE11 **Welcome** page or your custom **Welcome** page. + +2. If you cleared the First Run wizard box, you can decide which **Welcome** page to use: + + - **Use IE11 Welcome Page.** Check this box if you want to use the default IE11 **Welcome** page. + + - **Use a custom Welcome Page.** Check this box if you want to use a custom **Welcome** page. If you choose this option, you need to add the URL to your custom page. + +3. Click **Next** to go to the [Compatibility View](compat-view-ieak11-wizard.md) page or **Back** to go to the [Browsing Options](browsing-options-ieak11-wizard.md) page. + +  + +  + + + + + diff --git a/browsers/internet-explorer/ie11-ieak/guidelines-toolbar-and-favorites-list-ieak11.md b/browsers/internet-explorer/ie11-ieak/guidelines-toolbar-and-favorites-list-ieak11.md index d811730cee..0864538448 100644 --- a/browsers/internet-explorer/ie11-ieak/guidelines-toolbar-and-favorites-list-ieak11.md +++ b/browsers/internet-explorer/ie11-ieak/guidelines-toolbar-and-favorites-list-ieak11.md @@ -1,28 +1,29 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: plan -description: Customization guidelines for your Internet Explorer toolbar button and Favorites List icons. -author: lomayor -ms.prod: ie11 -ms.assetid: bddc8f23-9ac1-449d-ad71-f77f43ae3b5c -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Customize the toolbar button and Favorites List icons using IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Customize the Toolbar button and Favorites List icons using IEAK 11 -Use these customization guidelines to change the browser toolbar button and the **Favorites List** icons, using your own branding and graphics. - -**Important**
          Check your license agreement to make sure this customization is available. - -|Graphic |Type and description | -|-----------------------|----------------------------------------------------------------------| -|Browser toolbar button |2 icon (.ico) files with color images for active and inactive states. | -|Favorites List icons |1 icon (.ico) file for each new URL. | - -Your icons must use the .ico file extension, no other image file extension works. - +--- +ms.localizationpriority: medium +ms.mktglfcycl: plan +description: Customization guidelines for your Internet Explorer toolbar button and Favorites List icons. +author: dansimp +ms.prod: ie11 +ms.assetid: bddc8f23-9ac1-449d-ad71-f77f43ae3b5c +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Customize the toolbar button and Favorites List icons using IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Customize the Toolbar button and Favorites List icons using IEAK 11 +Use these customization guidelines to change the browser toolbar button and the **Favorites List** icons, using your own branding and graphics. + +**Important**
          Check your license agreement to make sure this customization is available. + +|Graphic |Type and description | +|-----------------------|----------------------------------------------------------------------| +|Browser toolbar button |2 icon (.ico) files with color images for active and inactive states. | +|Favorites List icons |1 icon (.ico) file for each new URL. | + +Your icons must use the .ico file extension, no other image file extension works. + diff --git a/browsers/internet-explorer/ie11-ieak/hardware-and-software-reqs-ieak11.md b/browsers/internet-explorer/ie11-ieak/hardware-and-software-reqs-ieak11.md index 59cb1d693e..0ba0f580a8 100644 --- a/browsers/internet-explorer/ie11-ieak/hardware-and-software-reqs-ieak11.md +++ b/browsers/internet-explorer/ie11-ieak/hardware-and-software-reqs-ieak11.md @@ -1,52 +1,53 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: plan -description: List of supported hardware and software requirements for Internet Explorer 11 and the Internet Explorer Administration Kit 11. -author: lomayor -ms.prod: ie11 -ms.assetid: c50b86dc-7184-43d1-8daf-e750eb88dabb -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Hardware and software requirements for Internet Explorer 11 and the IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Hardware and software requirements for Internet Explorer 11 and the IEAK 11 -Before you can use the Internet Explorer Administration Kit 11 and the Internet Explorer Customization Wizard 11, you must first install Internet Explorer 11. For more info about installing IE11, see the [Determine the licensing version and features to use in IEAK 11](licensing-version-and-features-ieak11.md) page. - -## Hardware requirements -Before you start the Internet Explorer Customization Wizard 11, you must check to see how much disk space you have on the drive you're going to use to build the IE11 install package. This drive can be on the same device as the one running the wizard; it just needs to have a secure destination folder. - -Before you start to create your install package, you must meet all of the [Internet Explorer 11 requirements](../ie11-deploy-guide/system-requirements-and-language-support-for-ie11.md), plus: - -- Up to 100 megabytes (MB) of disk space, depending on how many components you include in the installation package. - -- An additional 100 MB of disk space for each custom installation package built. Different media types are considered separate packages. - -## Software requirements -The device you're going to use to build your install packages must be running Internet Explorer 11, on one of these operating systems: - -- Windows 10

          However, you must use the Windows 8.1 target platform and only the "Configuration-only package" is available. - -- Windows 8.1 - -- Windows Server 2012 R2 - -- Windows® 7 Service Pack 1 (SP1) - -- Windows Server 2008 R2 (SP1) - -**Important**
          -The device you're going to use to run IEAK 11 must be running the same version of the operating system as the device where you'll build your install packages. - -  - -  - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: plan +description: List of supported hardware and software requirements for Internet Explorer 11 and the Internet Explorer Administration Kit 11. +author: dansimp +ms.prod: ie11 +ms.assetid: c50b86dc-7184-43d1-8daf-e750eb88dabb +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Hardware and software requirements for Internet Explorer 11 and the IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Hardware and software requirements for Internet Explorer 11 and the IEAK 11 +Before you can use the Internet Explorer Administration Kit 11 and the Internet Explorer Customization Wizard 11, you must first install Internet Explorer 11. For more info about installing IE11, see the [Determine the licensing version and features to use in IEAK 11](licensing-version-and-features-ieak11.md) page. + +## Hardware requirements +Before you start the Internet Explorer Customization Wizard 11, you must check to see how much disk space you have on the drive you're going to use to build the IE11 install package. This drive can be on the same device as the one running the wizard; it just needs to have a secure destination folder. + +Before you start to create your install package, you must meet all of the [Internet Explorer 11 requirements](../ie11-deploy-guide/system-requirements-and-language-support-for-ie11.md), plus: + +- Up to 100 megabytes (MB) of disk space, depending on how many components you include in the installation package. + +- An additional 100 MB of disk space for each custom installation package built. Different media types are considered separate packages. + +## Software requirements +The device you're going to use to build your install packages must be running Internet Explorer 11, on one of these operating systems: + +- Windows 10

          However, you must use the Windows 8.1 target platform and only the "Configuration-only package" is available. + +- Windows 8.1 + +- Windows Server 2012 R2 + +- Windows® 7 Service Pack 1 (SP1) + +- Windows Server 2008 R2 (SP1) + +**Important**
          +The device you're going to use to run IEAK 11 must be running the same version of the operating system as the device where you'll build your install packages. + +  + +  + + + + + diff --git a/browsers/internet-explorer/ie11-ieak/hidecustom-ins-file-setting.md b/browsers/internet-explorer/ie11-ieak/hidecustom-ins-file-setting.md index 26d3c2806d..7d50512355 100644 --- a/browsers/internet-explorer/ie11-ieak/hidecustom-ins-file-setting.md +++ b/browsers/internet-explorer/ie11-ieak/hidecustom-ins-file-setting.md @@ -1,32 +1,33 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: Use the \[HideCustom\] .INS file setting to decide whether to hide the GUID for each custom component. -author: lomayor -ms.prod: ie11 -ms.assetid: e673f7b1-c3aa-4072-92b0-20c6dc3d9277 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Use the HideCustom .INS file to hide the GUID for each custom component (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Use the HideCustom .INS file to hide the GUID for each custom component -Info about whether to hide the globally unique identifier (GUID) for each of your custom components. - -|Name |Value |Description | -|------|-------------------------------------------------------------------------------------|-----------------------------------------------| -|GUID |

          • **0.** Component isn't hidden.
          • **1.** Component is hidden.
          |Determines whether this is a hidden component. | - - - - - - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: Use the \[HideCustom\] .INS file setting to decide whether to hide the GUID for each custom component. +author: dansimp +ms.prod: ie11 +ms.assetid: e673f7b1-c3aa-4072-92b0-20c6dc3d9277 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Use the HideCustom .INS file to hide the GUID for each custom component (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Use the HideCustom .INS file to hide the GUID for each custom component +Info about whether to hide the globally unique identifier (GUID) for each of your custom components. + +|Name |Value |Description | +|------|-------------------------------------------------------------------------------------|-----------------------------------------------| +|GUID |
          • **0.** Component isn't hidden.
          • **1.** Component is hidden.
          |Determines whether this is a hidden component. | + + + + + + + + + + diff --git a/browsers/internet-explorer/ie11-ieak/ie-setup-command-line-options-and-return-codes.md b/browsers/internet-explorer/ie11-ieak/ie-setup-command-line-options-and-return-codes.md index 66973a3a25..51dc959759 100644 --- a/browsers/internet-explorer/ie11-ieak/ie-setup-command-line-options-and-return-codes.md +++ b/browsers/internet-explorer/ie11-ieak/ie-setup-command-line-options-and-return-codes.md @@ -1,68 +1,69 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: Reference about the command-line options and return codes for Internet Explorer Setup. -author: lomayor -ms.prod: ie11 -ms.assetid: 40c23024-cb5d-4902-ad1b-6e8a189a699f -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Internet Explorer Setup command-line options and return codes (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Internet Explorer Setup command-line options and return codes -You can use command-line options along with a tool like IExpress to package your custom version of Internet Explorer and to perform a batch installation across your organization. - -## IE Setup command-line options -These command-line options work with IE Setup: - -`[/help] [/passive | /quiet] [/update-no] [/no-default] [/nobackup] [/ieak-full: | /ieak-branding: ] [/norestart | /forcerestart] [/log: ` - -|Parameter (Setup modes) |Description | -|------------------------|-------------------------------------------------------------------------------------------------| -|`/passive` |Runs the install without requiring input from the employee, showing progress and error messages. | -|`/quiet` |Identical to `/passive`, but doesn't show any of the progress or error messages to the employee. | -

          - -|Parameter (Setup options) |Description | -|--------------------------|-------------------------------------------------------------------------------------------------| -|`/update-no` |Doesn't look for Internet Explorer updates. | -|`/no-default` |Doesn't make Internet Explorer the default browser. | -|`/no-backup` |Doesn't back up the files necessary to uninstall IE. | -|`/ieak-full` |Reserved for use by the IEAK 11. | -|`/ieak-branding` |Reserved for use by the IEAK 11. | -

          - -|Parameter (Restart options) |Description | -|----------------------------|--------------------------------------------| -|`/norestart` |Doesn't restart after installation. | -|`/forcerestart` |Restarts after installation. | -

          - -|Parameter (miscellaneous options) |Description | -|----------------------------------|--------------------------------------------| -|`/help` |Provides help info. Can't be used with any other option. | -|`/log ` |Creates a log file about the installation process, at the specified location. | - - -## Windows Setup return and status codes -Windows Setup needs to tell you whether IE successfully installed. However, because IE11wzd.exe is packaged inside your IE11setup.exe file, the return codes can’t be sent directly back to you. Instead, Setup needs to return the information (both success and failure) to the `HKEY_LOCAL_MACHINE\Software\Microsoft\Active Setup\InstallInfo` registry branch. - -|Subkey |Data type |Value | -|---------|----------|---------------------------------------| -|Complete |String |0 = Success | -|Complete |String |0x80100003 = Files are missing for the requested installation. | -|Complete |String |0x80100001 = Setup partially succeeded. One or more components weren’t downloaded or installed. Check the **FailedComponents** subkey for the list of components. | -|Complete |String |0x80100002 = Setup partially succeeded, but the employee cancelled Setup. One or more components weren’t downloaded or installed. Check the **FailedComponents** subkey for the list of components. | -|FailedComponents |MultiSZ |``Null``Component1 | -|InstallStatus |Binary |0 = Install completed successfully. | -|InstallStatus |Binary |1 = Suspend Setup.
          The employee cancelled Setup and is then asked to confirm:

          • 2 = No, don’t cancel. Resume Setup.
          • 3 = Yes, cancel confirmed. Quit Setup as soon as possible.

          **Important**
          If the cancellation is confirmed, Setup will quit as soon as all of the in-progress tasks are done, like copying or extracting files. | - -## Related topics -- [IExpress Wizard for Windows Server 2008 R2 with SP1](iexpress-wizard-for-win-server.md) -- [Express Wizard command-line options](iexpress-command-line-options.md) - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: Reference about the command-line options and return codes for Internet Explorer Setup. +author: dansimp +ms.prod: ie11 +ms.assetid: 40c23024-cb5d-4902-ad1b-6e8a189a699f +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Internet Explorer Setup command-line options and return codes (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Internet Explorer Setup command-line options and return codes +You can use command-line options along with a tool like IExpress to package your custom version of Internet Explorer and to perform a batch installation across your organization. + +## IE Setup command-line options +These command-line options work with IE Setup: + +`[/help] [/passive | /quiet] [/update-no] [/no-default] [/nobackup] [/ieak-full: | /ieak-branding: ] [/norestart | /forcerestart] [/log: ` + +|Parameter (Setup modes) |Description | +|------------------------|-------------------------------------------------------------------------------------------------| +|`/passive` |Runs the install without requiring input from the employee, showing progress and error messages. | +|`/quiet` |Identical to `/passive`, but doesn't show any of the progress or error messages to the employee. | +

          + +|Parameter (Setup options) |Description | +|--------------------------|-------------------------------------------------------------------------------------------------| +|`/update-no` |Doesn't look for Internet Explorer updates. | +|`/no-default` |Doesn't make Internet Explorer the default browser. | +|`/no-backup` |Doesn't back up the files necessary to uninstall IE. | +|`/ieak-full` |Reserved for use by the IEAK 11. | +|`/ieak-branding` |Reserved for use by the IEAK 11. | +

          + +|Parameter (Restart options) |Description | +|----------------------------|--------------------------------------------| +|`/norestart` |Doesn't restart after installation. | +|`/forcerestart` |Restarts after installation. | +

          + +|Parameter (miscellaneous options) |Description | +|----------------------------------|--------------------------------------------| +|`/help` |Provides help info. Can't be used with any other option. | +|`/log ` |Creates a log file about the installation process, at the specified location. | + + +## Windows Setup return and status codes +Windows Setup needs to tell you whether IE successfully installed. However, because IE11wzd.exe is packaged inside your IE11setup.exe file, the return codes can’t be sent directly back to you. Instead, Setup needs to return the information (both success and failure) to the `HKEY_LOCAL_MACHINE\Software\Microsoft\Active Setup\InstallInfo` registry branch. + +|Subkey |Data type |Value | +|---------|----------|---------------------------------------| +|Complete |String |0 = Success | +|Complete |String |0x80100003 = Files are missing for the requested installation. | +|Complete |String |0x80100001 = Setup partially succeeded. One or more components weren’t downloaded or installed. Check the **FailedComponents** subkey for the list of components. | +|Complete |String |0x80100002 = Setup partially succeeded, but the employee cancelled Setup. One or more components weren’t downloaded or installed. Check the **FailedComponents** subkey for the list of components. | +|FailedComponents |MultiSZ |``Null``Component1 | +|InstallStatus |Binary |0 = Install completed successfully. | +|InstallStatus |Binary |1 = Suspend Setup.
          The employee cancelled Setup and is then asked to confirm:

          • 2 = No, don’t cancel. Resume Setup.
          • 3 = Yes, cancel confirmed. Quit Setup as soon as possible.

          **Important**
          If the cancellation is confirmed, Setup will quit as soon as all of the in-progress tasks are done, like copying or extracting files. | + +## Related topics +- [IExpress Wizard for Windows Server 2008 R2 with SP1](iexpress-wizard-for-win-server.md) +- [Express Wizard command-line options](iexpress-command-line-options.md) + diff --git a/browsers/internet-explorer/ie11-ieak/ieak-information-and-downloads.md b/browsers/internet-explorer/ie11-ieak/ieak-information-and-downloads.md index 956404de2f..b8c3d25c24 100644 --- a/browsers/internet-explorer/ie11-ieak/ieak-information-and-downloads.md +++ b/browsers/internet-explorer/ie11-ieak/ieak-information-and-downloads.md @@ -1,51 +1,52 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: support -ms.pagetype: security -description: The Internet Explorer Administration Kit (IEAK) simplifies the creation, deployment, and management of customized Internet Explorer packages. Use the IEAK to configure the out-of-box Internet Explorer experience or to manage user settings after Internet Explorer deployment. -author: lomayor -ms.author: lomayor -ms.manager: dougkim -ms.prod: ie11 -ms.assetid: -ms.reviewer: -audience: itpro manager: dansimp -title: Internet Explorer Administration Kit (IEAK) information and downloads -ms.sitesec: library -ms.date: 05/10/2018 ---- - -# Internet Explorer Administration Kit (IEAK) information and downloads - ->Applies to: Windows 10 - -The Internet Explorer Administration Kit (IEAK) simplifies the creation, deployment, and management of customized Internet Explorer packages. You can use the IEAK to configure the out-of-box Internet Explorer experience or to manage user settings after Internet Explorer deployment. To find more information on the IEAK, see [What IEAK can do for you](what-ieak-can-do-for-you.md). - - -## Internet Explorer Administration Kit 11 (IEAK 11) - -[IEAK 11 documentation](index.md) - -[IEAK 11 licensing guidelines](licensing-version-and-features-ieak11.md) - -[IEAK 11 - Frequently Asked Questions](../ie11-faq/faq-ieak11.md) - -[Internet Explorer Administration Kit 11 (IEAK 11) - Administrator's Guide](before-you-create-custom-pkgs-ieak11.md) - -## Download IEAK - -To download, choose to **Open** the download or **Save** it to your hard drive first. - - -| | | | -|---------|---------|---------| -|[English](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/en-us/ieak.msi) |[French](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/fr-fr/ieak.msi) |[Norwegian (Bokmål)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/nb-no/ieak.msi) | -|[Arabic](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ar-sa/ieak.msi) |[German](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/de-de/ieak.msi) |[Polish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/pl-pl/ieak.msi) | -|[Chinese (Simplified)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/zh-cn/ieak.msi) |[Greek](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/el-gr/ieak.msi) |[Portuguese (Brazil)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/pt-br/ieak.msi) | -|[Chinese (Traditional)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/zh-tw/ieak.msi) |[Hebrew](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/he-il/ieak.msi) |[Portuguese (Portugal)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/pt-pt/ieak.msi) | -|[Czech](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/cs-cz/ieak.msi) |[Hungarian](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/hu-hu/ieak.msi) |[Russian](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ru-ru/ieak.msi) | -|[Danish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/da-dk/ieak.msi) |[Italian](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/it-it/ieak.msi) |[Spanish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/es-es/ieak.msi) | -|[Dutch](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/nl-nl/ieak.msi) |[Japanese](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ja-jp/ieak.msi) |[Swedish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/sv-se/ieak.msi) | -|[Finnish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/fi-fi/ieak.msi) |[Korean](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ko-kr/ieak.msi) |[Turkish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/tr-tr/ieak.msi) | - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: support +ms.pagetype: security +description: The Internet Explorer Administration Kit (IEAK) simplifies the creation, deployment, and management of customized Internet Explorer packages. Use the IEAK to configure the out-of-box Internet Explorer experience or to manage user settings after Internet Explorer deployment. +author: dansimp +ms.author: dansimp +ms.manager: dougkim +ms.prod: ie11 +ms.assetid: +ms.reviewer: +audience: itpro +manager: dansimp +title: Internet Explorer Administration Kit (IEAK) information and downloads +ms.sitesec: library +ms.date: 05/10/2018 +--- + +# Internet Explorer Administration Kit (IEAK) information and downloads + +>Applies to: Windows 10 + +The Internet Explorer Administration Kit (IEAK) simplifies the creation, deployment, and management of customized Internet Explorer packages. You can use the IEAK to configure the out-of-box Internet Explorer experience or to manage user settings after Internet Explorer deployment. To find more information on the IEAK, see [What IEAK can do for you](what-ieak-can-do-for-you.md). + + +## Internet Explorer Administration Kit 11 (IEAK 11) + +[IEAK 11 documentation](index.md) + +[IEAK 11 licensing guidelines](licensing-version-and-features-ieak11.md) + +[IEAK 11 - Frequently Asked Questions](../ie11-faq/faq-ieak11.md) + +[Internet Explorer Administration Kit 11 (IEAK 11) - Administrator's Guide](before-you-create-custom-pkgs-ieak11.md) + +## Download IEAK + +To download, choose to **Open** the download or **Save** it to your hard drive first. + + +| | | | +|---------|---------|---------| +|[English](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/en-us/ieak.msi) |[French](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/fr-fr/ieak.msi) |[Norwegian (Bokmål)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/nb-no/ieak.msi) | +|[Arabic](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ar-sa/ieak.msi) |[German](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/de-de/ieak.msi) |[Polish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/pl-pl/ieak.msi) | +|[Chinese (Simplified)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/zh-cn/ieak.msi) |[Greek](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/el-gr/ieak.msi) |[Portuguese (Brazil)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/pt-br/ieak.msi) | +|[Chinese (Traditional)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/zh-tw/ieak.msi) |[Hebrew](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/he-il/ieak.msi) |[Portuguese (Portugal)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/pt-pt/ieak.msi) | +|[Czech](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/cs-cz/ieak.msi) |[Hungarian](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/hu-hu/ieak.msi) |[Russian](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ru-ru/ieak.msi) | +|[Danish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/da-dk/ieak.msi) |[Italian](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/it-it/ieak.msi) |[Spanish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/es-es/ieak.msi) | +|[Dutch](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/nl-nl/ieak.msi) |[Japanese](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ja-jp/ieak.msi) |[Swedish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/sv-se/ieak.msi) | +|[Finnish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/fi-fi/ieak.msi) |[Korean](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ko-kr/ieak.msi) |[Turkish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/tr-tr/ieak.msi) | + + diff --git a/browsers/internet-explorer/ie11-ieak/ieak11-wizard-custom-options.md b/browsers/internet-explorer/ie11-ieak/ieak11-wizard-custom-options.md index 8890f6d65b..f27ec8b5b9 100644 --- a/browsers/internet-explorer/ie11-ieak/ieak11-wizard-custom-options.md +++ b/browsers/internet-explorer/ie11-ieak/ieak11-wizard-custom-options.md @@ -1,44 +1,45 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: plan -description: Review the options available to help you customize your browser install packages for deployment to your employee's devices. -author: lomayor -ms.prod: ie11 -ms.assetid: 4b804da3-c3ac-4b60-ab1c-99536ff6e31b -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Internet Explorer Administration Kit 11 (IEAK 11) Customization Wizard options (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Internet Explorer Administration Kit 11 (IEAK 11) Customization Wizard options -Use the Internet Explorer Administration Kit 11 (IEAK 11) and the Internet Explorer Customization Wizard 11 to customize your browser install packages for deployment to your employee's devices. - -## IE Customization Wizard 11 options -IEAK 11 lets you customize a lot of Internet Explorer 11, including the IE and Internet Explorer for the desktop experiences. For more info about the experiences, see [Internet Explorer 11 (IE11) - Deployment Guide for IT Pros](../ie11-deploy-guide/index.md). For info about which pages appear in the **Internal** or **External** version of IE Customization Wizard 11, see [Determine the licensing version and features to use in IEAK 11](licensing-version-and-features-ieak11.md). - -|Internet Explorer Customization Wizard 11 page |Browser experience |Description | -|-----------------------------------------------|------------------------------------|-----------------------------| -|[Custom Components](custom-components-ieak11-wizard.md) |Internet Explorer for the desktop |Add up to 10 additional components that your employees can install at the same time they install IE. | -|[Internal install](internal-install-ieak11-wizard.md) |Internet Explorer for the desktop |Choose to set IE11 as the default browser.

          **Note**
          This only applies to IE11 on Windows 7 SP1 | -|[User Experience](user-experience-ieak11-wizard.md) |Internet Explorer for the desktop |Control the installation and restart experience for your employees.

          This only applies to IE11 on Windows 7 SP1 | -|[Browser user interface](browser-ui-ieak11-wizard.md) |Internet Explorer for the desktop |Customize your title bars and toolbar buttons. | -|[Search Providers](search-providers-ieak11-wizard.md) |Both |Import and add Search providers. | -|[Important URLs – Home page and Support](important-urls-home-page-and-support-ieak11-wizard.md) |The **Support** page is supported by both experiences. The **Home** page is only supported on Internet Explorer for the desktop. |Add URLs for your **Home** and **Support** pages. | -|[Accelerators](accelerators-ieak11-wizard.md) |Internet Explorer for the desktop |Import and add default accelerators. | -|[Favorites, Favorites Bar and Feeds](favorites-favoritesbar-and-feeds-ieak11-wizard.md) |Internet Explorer for the desktop |Import and add items to the **Favorites** folder, the **Favorites Bar**, and the **Feeds** folder.

          **Note**
          You can turn off the entire **Suggested Sites** feature from this page. | -|[Browsing Options](browsing-options-ieak11-wizard.md) |Doesn't apply. The choices that you make on this page affect only the items shown on the **Favorites, Favorites Bar, and Feeds** page. |Choose how to manage items in the **Favorites** folder, the **Favorites Bar**, and the **Feeds** folder. You can also turn off the Microsoft-default Favorites, Web slices, links, feeds, and accelerators. | -|[First Run Wizard and Welcome Page Options](first-run-and-welcome-page-ieak11-wizard.md) |Internet Explorer for the desktop |Decide if the First Run wizard appears the first time an employee starts IE. You can also use the IE11 **Welcome** page, or link to a custom **Welcome** page. | -|[Compatibility View](compat-view-ieak11-wizard.md) |No longer supported |This functionality has been removed for IE11. For more information, see [Missing the Compatibility View Button](../ie11-deploy-guide/missing-the-compatibility-view-button.md). | -|[Connection Manager](connection-mgr-ieak11-wizard.md) |No longer supported |This functionality has been removed for IE11. | -|[Connection Settings](connection-settings-ieak11-wizard.md) |Both |Choose whether to customize your connection settings. You can also choose to delete old dial-up connection settings. | -|[Automatic Configuration](auto-config-ieak11-wizard.md) |Both |Choose whether to automatically detect configuration settings and whether to turn on and customize automatic configuration. | -|[Proxy Settings](proxy-settings-ieak11-wizard.md) |Both |Turn on and set up your proxy servers.

          **Note**
          We don't support Gopher Server anymore. | -|[Add a Root Certification](add-root-certificate-ieak11-wizard.md) |No longer supported |This functionality has been removed for IE11. | -|[Security and Privacy Settings](security-and-privacy-settings-ieak11-wizard.md) |The **Security Zones and Privacy** settings are supported by both experiences. The **Content Ratings** are only supported on Internet Explorer for the desktop. |Decide if you want to:

          • Customize your security zones and privacy settings
          • -OR-

          • Import your current security zones and privacy settings
          • -AND-

          • Customize your content ratings settings
          • -OR-

          • Import your current content ratings settings
          | -|[Programs](programs-ieak11-wizard.md) |Internet Explorer for the desktop |Decide your default programs or import your current settings. | -|[Additional Settings](additional-settings-ieak11-wizard.md) |Both |Decide how to set up multiple IE settings that appear in the **Internet Options** box. | - +--- +ms.localizationpriority: medium +ms.mktglfcycl: plan +description: Review the options available to help you customize your browser install packages for deployment to your employee's devices. +author: dansimp +ms.prod: ie11 +ms.assetid: 4b804da3-c3ac-4b60-ab1c-99536ff6e31b +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Internet Explorer Administration Kit 11 (IEAK 11) Customization Wizard options (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Internet Explorer Administration Kit 11 (IEAK 11) Customization Wizard options +Use the Internet Explorer Administration Kit 11 (IEAK 11) and the Internet Explorer Customization Wizard 11 to customize your browser install packages for deployment to your employee's devices. + +## IE Customization Wizard 11 options +IEAK 11 lets you customize a lot of Internet Explorer 11, including the IE and Internet Explorer for the desktop experiences. For more info about the experiences, see [Internet Explorer 11 (IE11) - Deployment Guide for IT Pros](../ie11-deploy-guide/index.md). For info about which pages appear in the **Internal** or **External** version of IE Customization Wizard 11, see [Determine the licensing version and features to use in IEAK 11](licensing-version-and-features-ieak11.md). + +|Internet Explorer Customization Wizard 11 page |Browser experience |Description | +|-----------------------------------------------|------------------------------------|-----------------------------| +|[Custom Components](custom-components-ieak11-wizard.md) |Internet Explorer for the desktop |Add up to 10 additional components that your employees can install at the same time they install IE. | +|[Internal install](internal-install-ieak11-wizard.md) |Internet Explorer for the desktop |Choose to set IE11 as the default browser.

          **Note**
          This only applies to IE11 on Windows 7 SP1 | +|[User Experience](user-experience-ieak11-wizard.md) |Internet Explorer for the desktop |Control the installation and restart experience for your employees.

          This only applies to IE11 on Windows 7 SP1 | +|[Browser user interface](browser-ui-ieak11-wizard.md) |Internet Explorer for the desktop |Customize your title bars and toolbar buttons. | +|[Search Providers](search-providers-ieak11-wizard.md) |Both |Import and add Search providers. | +|[Important URLs – Home page and Support](important-urls-home-page-and-support-ieak11-wizard.md) |The **Support** page is supported by both experiences. The **Home** page is only supported on Internet Explorer for the desktop. |Add URLs for your **Home** and **Support** pages. | +|[Accelerators](accelerators-ieak11-wizard.md) |Internet Explorer for the desktop |Import and add default accelerators. | +|[Favorites, Favorites Bar and Feeds](favorites-favoritesbar-and-feeds-ieak11-wizard.md) |Internet Explorer for the desktop |Import and add items to the **Favorites** folder, the **Favorites Bar**, and the **Feeds** folder.

          **Note**
          You can turn off the entire **Suggested Sites** feature from this page. | +|[Browsing Options](browsing-options-ieak11-wizard.md) |Doesn't apply. The choices that you make on this page affect only the items shown on the **Favorites, Favorites Bar, and Feeds** page. |Choose how to manage items in the **Favorites** folder, the **Favorites Bar**, and the **Feeds** folder. You can also turn off the Microsoft-default Favorites, Web slices, links, feeds, and accelerators. | +|[First Run Wizard and Welcome Page Options](first-run-and-welcome-page-ieak11-wizard.md) |Internet Explorer for the desktop |Decide if the First Run wizard appears the first time an employee starts IE. You can also use the IE11 **Welcome** page, or link to a custom **Welcome** page. | +|[Compatibility View](compat-view-ieak11-wizard.md) |No longer supported |This functionality has been removed for IE11. For more information, see [Missing the Compatibility View Button](../ie11-deploy-guide/missing-the-compatibility-view-button.md). | +|[Connection Manager](connection-mgr-ieak11-wizard.md) |No longer supported |This functionality has been removed for IE11. | +|[Connection Settings](connection-settings-ieak11-wizard.md) |Both |Choose whether to customize your connection settings. You can also choose to delete old dial-up connection settings. | +|[Automatic Configuration](auto-config-ieak11-wizard.md) |Both |Choose whether to automatically detect configuration settings and whether to turn on and customize automatic configuration. | +|[Proxy Settings](proxy-settings-ieak11-wizard.md) |Both |Turn on and set up your proxy servers.

          **Note**
          We don't support Gopher Server anymore. | +|[Add a Root Certification](add-root-certificate-ieak11-wizard.md) |No longer supported |This functionality has been removed for IE11. | +|[Security and Privacy Settings](security-and-privacy-settings-ieak11-wizard.md) |The **Security Zones and Privacy** settings are supported by both experiences. The **Content Ratings** are only supported on Internet Explorer for the desktop. |Decide if you want to:

          • Customize your security zones and privacy settings
          • -OR-

          • Import your current security zones and privacy settings
          • -AND-

          • Customize your content ratings settings
          • -OR-

          • Import your current content ratings settings
          | +|[Programs](programs-ieak11-wizard.md) |Internet Explorer for the desktop |Decide your default programs or import your current settings. | +|[Additional Settings](additional-settings-ieak11-wizard.md) |Both |Decide how to set up multiple IE settings that appear in the **Internet Options** box. | + diff --git a/browsers/internet-explorer/ie11-ieak/iexpress-command-line-options.md b/browsers/internet-explorer/ie11-ieak/iexpress-command-line-options.md index d36ca26c63..88e151583a 100644 --- a/browsers/internet-explorer/ie11-ieak/iexpress-command-line-options.md +++ b/browsers/internet-explorer/ie11-ieak/iexpress-command-line-options.md @@ -1,43 +1,44 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: Reference about the command-line options for the IExpress Wizard. -author: lomayor -ms.prod: ie11 -ms.assetid: aa16d738-1067-403c-88b3-bada12cf9752 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: IExpress Wizard command-line options (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -**Applies to:** -- Windows Server 2008 R2 with SP1 - -# IExpress Wizard command-line options -Use command-line options with the IExpress Wizard (IExpress.exe) to control your Internet Explorer custom browser package extraction process. - -These command-line options work with IExpress:
          -`Ie11setup /c:"ie11wzd "` - -|Parameter |Action | -|----------|--------------------------------------------------------------------------------------------| -|`/q` |Specifies quiet mode, hiding all of the prompts, while files are being extracted. This option won’t suppress prompts during Setup. | -|`/q:u` |Specifies user-quiet mode, letting some of the progress and error messages appear to the employee. | -|`/q:a` |Specifies administrator-quiet mode, hiding all of the progress and error messages from the employee. | -|`/t:` |Specifies where to store your extracted files. | -|`/c:` |Extracts all of the files without installing them. If `t:/` isn’t used, you’ll be prompted for a storage folder. | -|`/c:` |Specifies the UNC path and name of the Setup .inf or .exe file. | -|`/r:n` |Never restarts the computer after installation. | -|`/r:a` |Always restarts the computer after installation. | -|`/r:s` |Restarts the computer after installation without prompting the employee. | - -For more information, see [Command-line switches for IExpress software update packages](https://go.microsoft.com/fwlink/p/?LinkId=317973). - -## Related topics -- [IExpress Wizard for Windows Server 2008 R2 with SP1](iexpress-wizard-for-win-server.md) -- [Internet Explorer Setup command-line options and return codes](ie-setup-command-line-options-and-return-codes.md) - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: Reference about the command-line options for the IExpress Wizard. +author: dansimp +ms.prod: ie11 +ms.assetid: aa16d738-1067-403c-88b3-bada12cf9752 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: IExpress Wizard command-line options (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +**Applies to:** +- Windows Server 2008 R2 with SP1 + +# IExpress Wizard command-line options +Use command-line options with the IExpress Wizard (IExpress.exe) to control your Internet Explorer custom browser package extraction process. + +These command-line options work with IExpress:
          +`Ie11setup /c:"ie11wzd "` + +|Parameter |Action | +|----------|--------------------------------------------------------------------------------------------| +|`/q` |Specifies quiet mode, hiding all of the prompts, while files are being extracted. This option won’t suppress prompts during Setup. | +|`/q:u` |Specifies user-quiet mode, letting some of the progress and error messages appear to the employee. | +|`/q:a` |Specifies administrator-quiet mode, hiding all of the progress and error messages from the employee. | +|`/t:` |Specifies where to store your extracted files. | +|`/c:` |Extracts all of the files without installing them. If `t:/` isn’t used, you’ll be prompted for a storage folder. | +|`/c:` |Specifies the UNC path and name of the Setup .inf or .exe file. | +|`/r:n` |Never restarts the computer after installation. | +|`/r:a` |Always restarts the computer after installation. | +|`/r:s` |Restarts the computer after installation without prompting the employee. | + +For more information, see [Command-line switches for IExpress software update packages](https://go.microsoft.com/fwlink/p/?LinkId=317973). + +## Related topics +- [IExpress Wizard for Windows Server 2008 R2 with SP1](iexpress-wizard-for-win-server.md) +- [Internet Explorer Setup command-line options and return codes](ie-setup-command-line-options-and-return-codes.md) + diff --git a/browsers/internet-explorer/ie11-ieak/iexpress-wizard-for-win-server.md b/browsers/internet-explorer/ie11-ieak/iexpress-wizard-for-win-server.md index ced5d1a708..35dc9f9cc5 100644 --- a/browsers/internet-explorer/ie11-ieak/iexpress-wizard-for-win-server.md +++ b/browsers/internet-explorer/ie11-ieak/iexpress-wizard-for-win-server.md @@ -1,72 +1,73 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: Use the IExpress Wizard on Windows Server 2008 R2 with SP1 to create self-extracting files to run your custom Internet Explorer Setup program. -author: lomayor -ms.prod: ie11 -ms.assetid: 5100886d-ec88-4c1c-8cd7-be00da874c57 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: IExpress Wizard for Windows Server 2008 R2 with SP1 (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# IExpress Wizard for Windows Server 2008 R2 with SP1 -Use the IExpress Wizard and its associated command-line options to create self-extracting files that automatically run your custom Internet Explorer Setup (.inf or .exe file) program that’s contained inside. - -## IExpress Wizard location -The IExpress Wizard (Iexpress.exe) is included as part of Windows Server 2008 R2 with Service Pack 1 (SP1), in the `:\Windows\System32` folder. The wizard uses a self-extraction directive (.sed) file to store your package’s information. When you run the wizard, you have the option to start with an existing .sed file or to create a new one. - -## IExpress Wizard features -The IExpress Wizard: - -- Performs silent, unattended installations of your custom IE packages. - -- Supports upgrading IE without removing previous installations. - -- Supports repeated updating or performing clean installations of the same IE build. - -## IExpress Wizard settings -The IExpress Wizard lets you: - -- Decide whether the self-installing package is for administrators or for general employees. - -- Set multiple ways to run the installation command, such as in normal or silent mode. - -- Determine whether the IExpress dynamic-link libraries (.dll files) are updated on an employee’s computer. - -- Determine the compatibility of the installation package, based on the operating system version range, the browser version range, or any application version range. - -- Update and add files to the IExpress package, using the UPDFILE tool, without having to rebuild the package. - -- Replace Runonce with RunOnceEx (if the newer version of Iernonce.dll exists); giving you control over the job run order and status display. - -- Let corporate administrators set up support for roaming employees. - -- Let Internet Content Providers (ICPs) and Internet Service Providers (ISPs) generate packages for preconfigured desktops with custom, current content. - -- Save disk space by cleaning up the hard drive when running in Setup, uninstallation, and maintenance modes. - -- Provide support for multiple download sites. - -- Provide support for internal and external development, customization, expandability, and enhanced debugging. - -- Provide support for the extended character set, beyond single-byte characters (SBCS). - -- Provide support for using the .inf file format to download Internet components. For more information, see [Use the uninstallation .INF files to uninstall custom components](create-uninstall-inf-files-for-custom-components.md). - -## Related topics -- [IExpress command-line options](iexpress-command-line-options.md) -- [Internet Explorer Setup command-line options and return codes](ie-setup-command-line-options-and-return-codes.md) - -  - -  - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: Use the IExpress Wizard on Windows Server 2008 R2 with SP1 to create self-extracting files to run your custom Internet Explorer Setup program. +author: dansimp +ms.prod: ie11 +ms.assetid: 5100886d-ec88-4c1c-8cd7-be00da874c57 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: IExpress Wizard for Windows Server 2008 R2 with SP1 (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# IExpress Wizard for Windows Server 2008 R2 with SP1 +Use the IExpress Wizard and its associated command-line options to create self-extracting files that automatically run your custom Internet Explorer Setup (.inf or .exe file) program that’s contained inside. + +## IExpress Wizard location +The IExpress Wizard (Iexpress.exe) is included as part of Windows Server 2008 R2 with Service Pack 1 (SP1), in the `:\Windows\System32` folder. The wizard uses a self-extraction directive (.sed) file to store your package’s information. When you run the wizard, you have the option to start with an existing .sed file or to create a new one. + +## IExpress Wizard features +The IExpress Wizard: + +- Performs silent, unattended installations of your custom IE packages. + +- Supports upgrading IE without removing previous installations. + +- Supports repeated updating or performing clean installations of the same IE build. + +## IExpress Wizard settings +The IExpress Wizard lets you: + +- Decide whether the self-installing package is for administrators or for general employees. + +- Set multiple ways to run the installation command, such as in normal or silent mode. + +- Determine whether the IExpress dynamic-link libraries (.dll files) are updated on an employee’s computer. + +- Determine the compatibility of the installation package, based on the operating system version range, the browser version range, or any application version range. + +- Update and add files to the IExpress package, using the UPDFILE tool, without having to rebuild the package. + +- Replace Runonce with RunOnceEx (if the newer version of Iernonce.dll exists); giving you control over the job run order and status display. + +- Let corporate administrators set up support for roaming employees. + +- Let Internet Content Providers (ICPs) and Internet Service Providers (ISPs) generate packages for preconfigured desktops with custom, current content. + +- Save disk space by cleaning up the hard drive when running in Setup, uninstallation, and maintenance modes. + +- Provide support for multiple download sites. + +- Provide support for internal and external development, customization, expandability, and enhanced debugging. + +- Provide support for the extended character set, beyond single-byte characters (SBCS). + +- Provide support for using the .inf file format to download Internet components. For more information, see [Use the uninstallation .INF files to uninstall custom components](create-uninstall-inf-files-for-custom-components.md). + +## Related topics +- [IExpress command-line options](iexpress-command-line-options.md) +- [Internet Explorer Setup command-line options and return codes](ie-setup-command-line-options-and-return-codes.md) + +  + +  + + + + + diff --git a/browsers/internet-explorer/ie11-ieak/important-urls-home-page-and-support-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/important-urls-home-page-and-support-ieak11-wizard.md index 6e1ac8e67a..022767b179 100644 --- a/browsers/internet-explorer/ie11-ieak/important-urls-home-page-and-support-ieak11-wizard.md +++ b/browsers/internet-explorer/ie11-ieak/important-urls-home-page-and-support-ieak11-wizard.md @@ -1,39 +1,40 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: How to use the Important URLs - Home Page and Support page in the IEAK 11 Customization Wizard to choose one or more **Home** pages and an online support page for your customized version of IE. -author: lomayor -ms.prod: ie11 -ms.assetid: 19e34879-ba9d-41bf-806a-3b9b9b752fc1 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Use the Important URLs - Home Page and Support page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Use the Important URLs - Home Page and Support page in the IEAK 11 Wizard -The **Important URLS – Home Page and Support** page of the Internet Explorer Customization Wizard 11 lets you choose one or more **Home** pages and an online support page for your customized version of IE. - -**To use the Important URLS – Home Page and Support page** - -1. In the **Add a homepage URL** box, type the URL to the page your employees go to when they click the **Home** button, and then click **Add**.

          -If you add multiple **Home** pages, each page appears on a separate tab in the browser. If you don’t add a custom **Home** page, IE uses https://www.msn.com by default. If you want to delete an existing page, click the URL and then click **Remove**. - -2. Check the **Retain previous Home Page (Upgrade)** box if you have employees with previous versions of IE, who need to keep their **Home** page settings when the browser is updated. - -3. Check the **Online support page URL** box to type in the URL to your own support page. Customizing the support page is only supported in Internet Explorer for the desktop. - -4. Click **Next** to go to the [Accelerators](accelerators-ieak11-wizard.md) page or **Back** to go to the [Search Providers](search-providers-ieak11-wizard.md) page. - - -  - -  - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: How to use the Important URLs - Home Page and Support page in the IEAK 11 Customization Wizard to choose one or more **Home** pages and an online support page for your customized version of IE. +author: dansimp +ms.prod: ie11 +ms.assetid: 19e34879-ba9d-41bf-806a-3b9b9b752fc1 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Use the Important URLs - Home Page and Support page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Use the Important URLs - Home Page and Support page in the IEAK 11 Wizard +The **Important URLS – Home Page and Support** page of the Internet Explorer Customization Wizard 11 lets you choose one or more **Home** pages and an online support page for your customized version of IE. + +**To use the Important URLS – Home Page and Support page** + +1. In the **Add a homepage URL** box, type the URL to the page your employees go to when they click the **Home** button, and then click **Add**.

          +If you add multiple **Home** pages, each page appears on a separate tab in the browser. If you don’t add a custom **Home** page, IE uses https://www.msn.com by default. If you want to delete an existing page, click the URL and then click **Remove**. + +2. Check the **Retain previous Home Page (Upgrade)** box if you have employees with previous versions of IE, who need to keep their **Home** page settings when the browser is updated. + +3. Check the **Online support page URL** box to type in the URL to your own support page. Customizing the support page is only supported in Internet Explorer for the desktop. + +4. Click **Next** to go to the [Accelerators](accelerators-ieak11-wizard.md) page or **Back** to go to the [Search Providers](search-providers-ieak11-wizard.md) page. + + +  + +  + + + + + diff --git a/browsers/internet-explorer/ie11-ieak/index.md b/browsers/internet-explorer/ie11-ieak/index.md index 6dc2619b8b..3187f8b507 100644 --- a/browsers/internet-explorer/ie11-ieak/index.md +++ b/browsers/internet-explorer/ie11-ieak/index.md @@ -1,8 +1,8 @@ --- ms.mktglfcycl: plan description: IEAK 11 - Internet Explorer Administration Kit 11 Users Guide -author: lomayor -ms.author: lomayor +author: dansimp +ms.author: dansimp ms.prod: ie11 ms.assetid: 847bd7b4-d5dd-4e10-87b5-4d7d3a99bbac title: Internet Explorer Administration Kit 11 (IEAK 11) - Administrator's Guide (Internet Explorer Administration Kit 11 for IT Pros) diff --git a/browsers/internet-explorer/ie11-ieak/internal-install-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/internal-install-ieak11-wizard.md index 59969fe56f..15db2bc20f 100644 --- a/browsers/internet-explorer/ie11-ieak/internal-install-ieak11-wizard.md +++ b/browsers/internet-explorer/ie11-ieak/internal-install-ieak11-wizard.md @@ -1,39 +1,40 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: How to use the Internal Install page in the IEAK 11 Customization Wizard to customize Setup for the default browser and the latest browser updates. -author: lomayor -ms.prod: ie11 -ms.assetid: 33d078e3-75b8-455b-9126-f0d272ed676f -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Use the Internal Install page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Use the Internal Install page in the IEAK 11 Wizard -The **Internal Install** page of the Internet Explorer Customization Wizard 11 lets you customize Setup for the default browser and the latest browser updates, based on your company’s guidelines. - -**Note**
          The customizations made on this page only apply to Internet Explorer for the desktop on Windows 7. - -**To use the Internal Install page** - -1. Pick either: - - - **Allow user to choose.** Lets your employees pick their own default browser.

          -OR-

          - - - **Do not set IE as the default browser.** Won’t set IE as the default browser. However, your employees can still make IE the default. - -2. Click **Next** to go to the [User Experience](user-experience-ieak11-wizard.md) page or **Back** to go to the [Custom Components](custom-components-ieak11-wizard.md). - -  - -  - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: How to use the Internal Install page in the IEAK 11 Customization Wizard to customize Setup for the default browser and the latest browser updates. +author: dansimp +ms.prod: ie11 +ms.assetid: 33d078e3-75b8-455b-9126-f0d272ed676f +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Use the Internal Install page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Use the Internal Install page in the IEAK 11 Wizard +The **Internal Install** page of the Internet Explorer Customization Wizard 11 lets you customize Setup for the default browser and the latest browser updates, based on your company’s guidelines. + +**Note**
          The customizations made on this page only apply to Internet Explorer for the desktop on Windows 7. + +**To use the Internal Install page** + +1. Pick either: + + - **Allow user to choose.** Lets your employees pick their own default browser.

          -OR-

          + + - **Do not set IE as the default browser.** Won’t set IE as the default browser. However, your employees can still make IE the default. + +2. Click **Next** to go to the [User Experience](user-experience-ieak11-wizard.md) page or **Back** to go to the [Custom Components](custom-components-ieak11-wizard.md). + +  + +  + + + + + diff --git a/browsers/internet-explorer/ie11-ieak/isp-security-ins-file-setting.md b/browsers/internet-explorer/ie11-ieak/isp-security-ins-file-setting.md index 58fd70a9aa..b625916fd1 100644 --- a/browsers/internet-explorer/ie11-ieak/isp-security-ins-file-setting.md +++ b/browsers/internet-explorer/ie11-ieak/isp-security-ins-file-setting.md @@ -1,23 +1,24 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: Use the \[ISP_Security\] .INS file setting to add the root certificate for your custom Internet Explorer package. -author: lomayor -ms.prod: ie11 -ms.assetid: 4eca2de5-7071-45a2-9c99-75115be00d06 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Use the ISP_Security .INS file to add your root certificate (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Use the ISP_Security .INS file to add your root certificate -Info about where you store the root certificate you’re adding to your custom package. - -|Name |Value |Description | -|---------------|-----------------------|------------------------------------------------------------------------------------------| -|RootCertPath |`` |Location and name of the root certificate you want to add to your custom install package. | - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: Use the \[ISP_Security\] .INS file setting to add the root certificate for your custom Internet Explorer package. +author: dansimp +ms.prod: ie11 +ms.assetid: 4eca2de5-7071-45a2-9c99-75115be00d06 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Use the ISP_Security .INS file to add your root certificate (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Use the ISP_Security .INS file to add your root certificate +Info about where you store the root certificate you’re adding to your custom package. + +|Name |Value |Description | +|---------------|-----------------------|------------------------------------------------------------------------------------------| +|RootCertPath |`` |Location and name of the root certificate you want to add to your custom install package. | + diff --git a/browsers/internet-explorer/ie11-ieak/language-selection-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/language-selection-ieak11-wizard.md index a266fcba98..b2f66781b7 100644 --- a/browsers/internet-explorer/ie11-ieak/language-selection-ieak11-wizard.md +++ b/browsers/internet-explorer/ie11-ieak/language-selection-ieak11-wizard.md @@ -1,37 +1,38 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: How to use the Language Selection page in the IEAK 11 Customization Wizard to choose the language for your IEAK 11 custom package. -author: lomayor -ms.prod: ie11 -ms.assetid: f9d4ab57-9b1d-4cbc-9398-63f4938df1f6 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Use the Language Selection page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Use the Language Selection page in the IEAK 11 Wizard -The **Language Selection** page of the Internet Explorer Customization Wizard 11 lets you choose the language for your Internet Explorer Administration Kit 11 (IEAK 11) custom package. You can create custom Internet Explorer 11 packages in any of the languages your operating system version is available in. - -**Important**
          Make sure that the language of your IEAK 11 installation matches the language of your custom IE11 package. If the languages don’t match, IEAK 11 won’t work properly. - -**To use the Language Selection page** - -1. Pick the language you want your custom IE11 installation package to use.

          -You can support as many languages as you want, but each localized version must be in its own install package.

          -**Note**
          To keep your settings across multiple versions of the package, you can pick the same destination folder for all versions. The different language versions are then saved in separate subfolders within that destination folder. Like, for an English version, `C:\Cie\Build1\Flat\Win32_WIN8\en-US\` and for a German version, `C:\Cie\Build1\Flat\Win32_WIN8\de-DE\`. - -2. Click **Next** to go to the [Package Type Selection](pkg-type-selection-ieak11-wizard.md) page or **Back** to go to the [Platform Selection](platform-selection-ieak11-wizard.md) page. - -  - -  - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: How to use the Language Selection page in the IEAK 11 Customization Wizard to choose the language for your IEAK 11 custom package. +author: dansimp +ms.prod: ie11 +ms.assetid: f9d4ab57-9b1d-4cbc-9398-63f4938df1f6 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Use the Language Selection page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Use the Language Selection page in the IEAK 11 Wizard +The **Language Selection** page of the Internet Explorer Customization Wizard 11 lets you choose the language for your Internet Explorer Administration Kit 11 (IEAK 11) custom package. You can create custom Internet Explorer 11 packages in any of the languages your operating system version is available in. + +**Important**
          Make sure that the language of your IEAK 11 installation matches the language of your custom IE11 package. If the languages don’t match, IEAK 11 won’t work properly. + +**To use the Language Selection page** + +1. Pick the language you want your custom IE11 installation package to use.

          +You can support as many languages as you want, but each localized version must be in its own install package.

          +**Note**
          To keep your settings across multiple versions of the package, you can pick the same destination folder for all versions. The different language versions are then saved in separate subfolders within that destination folder. Like, for an English version, `C:\Cie\Build1\Flat\Win32_WIN8\en-US\` and for a German version, `C:\Cie\Build1\Flat\Win32_WIN8\de-DE\`. + +2. Click **Next** to go to the [Package Type Selection](pkg-type-selection-ieak11-wizard.md) page or **Back** to go to the [Platform Selection](platform-selection-ieak11-wizard.md) page. + +  + +  + + + + + diff --git a/browsers/internet-explorer/ie11-ieak/licensing-version-and-features-ieak11.md b/browsers/internet-explorer/ie11-ieak/licensing-version-and-features-ieak11.md index 7a6e3d009f..296dec1688 100644 --- a/browsers/internet-explorer/ie11-ieak/licensing-version-and-features-ieak11.md +++ b/browsers/internet-explorer/ie11-ieak/licensing-version-and-features-ieak11.md @@ -2,8 +2,8 @@ ms.localizationpriority: medium ms.mktglfcycl: plan description: Learn about the version of the IEAK 11 you should run, based on your license agreement. -author: lomayor -ms.author: lomayor +author: dansimp +ms.author: dansimp ms.prod: ie11 ms.assetid: 69d25451-08af-4db0-9daa-44ab272acc15 ms.reviewer: diff --git a/browsers/internet-explorer/ie11-ieak/media-ins-file-setting.md b/browsers/internet-explorer/ie11-ieak/media-ins-file-setting.md index 2aa91f6753..a441fe7be2 100644 --- a/browsers/internet-explorer/ie11-ieak/media-ins-file-setting.md +++ b/browsers/internet-explorer/ie11-ieak/media-ins-file-setting.md @@ -1,23 +1,24 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: Use the \[Media\] .INS file setting to specify the types of media on which your custom install package is available. -author: lomayor -ms.prod: ie11 -ms.assetid: c57bae60-d520-49a9-a77d-da43f7ebe5b8 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Use the Media .INS file to specify your install media (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Use the Media .INS file to specify your install media -The types of media on which your custom install package is available. - -|Name |Value |Description | -|-----|------|-----------------| -|Build_LAN |

          • **0.** Don’t create the LAN-based installation package.
          • **1.** Create the LAN-based installation package.
          |Determines whether you want to create a LAN-based installation package. | - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: Use the \[Media\] .INS file setting to specify the types of media on which your custom install package is available. +author: dansimp +ms.prod: ie11 +ms.assetid: c57bae60-d520-49a9-a77d-da43f7ebe5b8 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Use the Media .INS file to specify your install media (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Use the Media .INS file to specify your install media +The types of media on which your custom install package is available. + +|Name |Value |Description | +|-----|------|-----------------| +|Build_LAN |
          • **0.** Don’t create the LAN-based installation package.
          • **1.** Create the LAN-based installation package.
          |Determines whether you want to create a LAN-based installation package. | + diff --git a/browsers/internet-explorer/ie11-ieak/pkg-type-selection-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/pkg-type-selection-ieak11-wizard.md index 6cd52f789f..ce2517bf60 100644 --- a/browsers/internet-explorer/ie11-ieak/pkg-type-selection-ieak11-wizard.md +++ b/browsers/internet-explorer/ie11-ieak/pkg-type-selection-ieak11-wizard.md @@ -1,39 +1,40 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: How to use the Package Type Selection page in the IEAK 11 Customization Wizard to pick the media type you’ll use to distribute your custom package. -author: lomayor -ms.prod: ie11 -ms.assetid: dd91f788-d05e-4f45-9fd5-d951abf04f2c -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Use the Package Type Selection page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Use the Package Type Selection page in the IEAK 11 Wizard -The **Package Type Selection** page of the Internet Explorer Customization Wizard 11 lets you pick which type of media you’ll use to distribute your custom installation package. You can pick more than one type, if you need it. - -**Important**
          You can't create a full installation package for deployment to Windows 10 computers. That option only works for computers running Windows 7 or Windows 8.1. - -**To use the File Locations page** - -1. Check the **Full Installation Package** box if you’re going to build your package on, or move your package to, a local area network (LAN). This media package includes the Internet Explorer 11 installation files, and is named **IE11-Setup-Full.exe**, in the `\\FLAT\\` folder.

          -OR-

            - -2. Check the **Configuration-only package** box if you want to update an existing installation of IE11. This media package is named **IE11- Setup-Branding.exe**, in the `\\BrndOnly\\` folder.

          -You can distribute this file on any media format or server. It customizes the IE11 features without re-installing IE.

          -**Important**
          You can’t include custom components in a configuration-only package. - -3. Click **Next** to go to the [Feature Selection](feature-selection-ieak11-wizard.md) page or **Back** to go to the [Language Selection](language-selection-ieak11-wizard.md) page. - -  - -  - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: How to use the Package Type Selection page in the IEAK 11 Customization Wizard to pick the media type you’ll use to distribute your custom package. +author: dansimp +ms.prod: ie11 +ms.assetid: dd91f788-d05e-4f45-9fd5-d951abf04f2c +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Use the Package Type Selection page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Use the Package Type Selection page in the IEAK 11 Wizard +The **Package Type Selection** page of the Internet Explorer Customization Wizard 11 lets you pick which type of media you’ll use to distribute your custom installation package. You can pick more than one type, if you need it. + +**Important**
          You can't create a full installation package for deployment to Windows 10 computers. That option only works for computers running Windows 7 or Windows 8.1. + +**To use the File Locations page** + +1. Check the **Full Installation Package** box if you’re going to build your package on, or move your package to, a local area network (LAN). This media package includes the Internet Explorer 11 installation files, and is named **IE11-Setup-Full.exe**, in the `\\FLAT\\` folder.

          -OR-

            + +2. Check the **Configuration-only package** box if you want to update an existing installation of IE11. This media package is named **IE11- Setup-Branding.exe**, in the `\\BrndOnly\\` folder.

          +You can distribute this file on any media format or server. It customizes the IE11 features without re-installing IE.

          +**Important**
          You can’t include custom components in a configuration-only package. + +3. Click **Next** to go to the [Feature Selection](feature-selection-ieak11-wizard.md) page or **Back** to go to the [Language Selection](language-selection-ieak11-wizard.md) page. + +  + +  + + + + + diff --git a/browsers/internet-explorer/ie11-ieak/platform-selection-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/platform-selection-ieak11-wizard.md index a3c0045275..342ac46d58 100644 --- a/browsers/internet-explorer/ie11-ieak/platform-selection-ieak11-wizard.md +++ b/browsers/internet-explorer/ie11-ieak/platform-selection-ieak11-wizard.md @@ -2,12 +2,12 @@ ms.localizationpriority: medium ms.mktglfcycl: deploy description: How to use the Platform Selection page in the IEAK 11 Customization Wizard to pick the specs for your employee devices that will get the install package. -author: lomayor +author: dansimp ms.prod: ie11 ms.assetid: 9cbf5abd-86f7-42b6-9810-0b606bbe8218 ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp title: Use the Platform Selection page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) ms.sitesec: library ms.date: 07/27/2017 diff --git a/browsers/internet-explorer/ie11-ieak/prep-network-install-with-ieak11.md b/browsers/internet-explorer/ie11-ieak/prep-network-install-with-ieak11.md index 56252cfd10..809110fc8b 100644 --- a/browsers/internet-explorer/ie11-ieak/prep-network-install-with-ieak11.md +++ b/browsers/internet-explorer/ie11-ieak/prep-network-install-with-ieak11.md @@ -1,35 +1,36 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: plan -description: Learn about what you need to do before you deploy your custom browser package using IEAK 11 over your network. -author: lomayor -ms.prod: ie11 -ms.assetid: 2c66d22a-4a94-47cc-82ab-7274abe1dfd6 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Before you install your package over your network using IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Before you install your package over your network using IEAK 11 -Employees can install the custom browser package using a network server. However, you must either lower the intranet security level or make the server a trusted site. - -**To lower your intranet security** - -1. In Internet Explorer 11, click **Tools**, **Internet Options**, and then the **Security** tab. - -2. Click **Local intranet**, and then **Sites**. - -3. Uncheck **Automatically detect intranet network**, uncheck **Include all network paths (UNC)**, and then click **OK**. - -**To make your server a trusted site** - -1. From the **Security** tab, click **Trusted sites**, and then **Sites**. - -2. Type the location of the server with the downloadable custom browser package, and then click **Add**. - -3. Repeat this step for every server that will include the custom browser package for download. - +--- +ms.localizationpriority: medium +ms.mktglfcycl: plan +description: Learn about what you need to do before you deploy your custom browser package using IEAK 11 over your network. +author: dansimp +ms.prod: ie11 +ms.assetid: 2c66d22a-4a94-47cc-82ab-7274abe1dfd6 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Before you install your package over your network using IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Before you install your package over your network using IEAK 11 +Employees can install the custom browser package using a network server. However, you must either lower the intranet security level or make the server a trusted site. + +**To lower your intranet security** + +1. In Internet Explorer 11, click **Tools**, **Internet Options**, and then the **Security** tab. + +2. Click **Local intranet**, and then **Sites**. + +3. Uncheck **Automatically detect intranet network**, uncheck **Include all network paths (UNC)**, and then click **OK**. + +**To make your server a trusted site** + +1. From the **Security** tab, click **Trusted sites**, and then **Sites**. + +2. Type the location of the server with the downloadable custom browser package, and then click **Add**. + +3. Repeat this step for every server that will include the custom browser package for download. + diff --git a/browsers/internet-explorer/ie11-ieak/programs-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/programs-ieak11-wizard.md index 8b0ff1ece4..8b46cc1615 100644 --- a/browsers/internet-explorer/ie11-ieak/programs-ieak11-wizard.md +++ b/browsers/internet-explorer/ie11-ieak/programs-ieak11-wizard.md @@ -2,12 +2,12 @@ ms.localizationpriority: medium ms.mktglfcycl: deploy description: How to use the Programs page in the IEAK 11 Customization Wizard to pick the default programs to use for Internet services. -author: lomayor +author: dansimp ms.prod: ie11 ms.assetid: f715668f-a50d-4db0-b578-e6526fbfa1fc ms.reviewer: manager: dansimp -ms.author: lomayor +ms.author: dansimp title: Use the Programs page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) ms.sitesec: library ms.date: 07/27/2017 diff --git a/browsers/internet-explorer/ie11-ieak/proxy-auto-config-examples.md b/browsers/internet-explorer/ie11-ieak/proxy-auto-config-examples.md index 347e753856..06213a78ae 100644 --- a/browsers/internet-explorer/ie11-ieak/proxy-auto-config-examples.md +++ b/browsers/internet-explorer/ie11-ieak/proxy-auto-config-examples.md @@ -1,181 +1,182 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: Learn about how to use a proxy auto-configuration (.pac) file to specify an automatic proxy URL. -author: lomayor -ms.prod: ie11 -ms.assetid: 6c94708d-71bd-44bd-a445-7e6763b374ae -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Use proxy auto-configuration (.pac) files with IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Use proxy auto-configuration (.pac) files with IEAK 11 -These are various ways you can use a proxy auto-configuration (.pac) file to specify an automatic proxy URL. We've included some examples here to help guide you, but you'll need to change the proxy names, port numbers, and IP addresses to match your organization's info. - -Included examples: -- [Example 1: Connect directly if the host is local](#example-1-connect-directly-if-the-host-is-local) -- [Example 2: Connect directly if the host is inside the firewall](#example-2-connect-directly-if-the-host-is-inside-the-firewall) -- [Example 3: Connect directly if the host name is resolvable](#example-3-connect-directly-if-the-host-name-is-resolvable) -- [Example 4: Connect directly if the host is in specified subnet](#example-4-connect-directly-if-the-host-is-in-specified-subnet) -- [Example 5: Determine the connection type based on the host domain](#example-5-determine-the-connection-type-based-on-the-host-domain) -- [Example 6: Determine the connection type based on the protocol](#example-6-determine-the-connection-type-based-on-the-protocol) -- [Example 7: Determine the proxy server based on the host name matching the IP address](#example-7-determine-the-proxy-server-based-on-the-host-name-matching-the-ip-address) -- [Example 8: Connect using a proxy server if the host IP address matches the specified IP address](#example-8-connect-using-a-proxy-server-if-the-host-ip-address-matches-the-specified-ip-address) -- [Example 9: Connect using a proxy server if there are periods in the host name](#example-9-connect-using-a-proxy-server-if-there-are-periods-in-the-host-name) -- [Example 10: Connect using a proxy server based on specific days of the week](#example-10-connect-using-a-proxy-server-based-on-specific-days-of-the-week) - - -## Example 1: Connect directly if the host is local -In this example, if the host is local, it can connect directly. However, if the server isn't local, it must connect through a proxy server. Specifically, the `isPlainHostName` function looks to see if there are any periods (.) in the host name. If the function finds periods, it means the host isn’t local and it returns false. Otherwise, the function returns true. - -``` javascript -function FindProxyForURL(url, host) - { - if (isPlainHostName(host)) - return "DIRECT"; - else - return "PROXY proxy:80"; - } -``` -## Example 2: Connect directly if the host is inside the firewall -In this example, if the host is inside the firewall, it can connect directly. However, if the server is outside the firewall, it must connect through a proxy server. Specifically, the `localHostOrDomainIs` function only runs for URLs in the local domain. If the host domain name matches the provided domain information, the `dnsDomainIs` function returns true. - -``` javascript -function FindProxyForURL(url, host) - { - if ((isPlainHostName(host) || - dnsDomainIs(host, ".company.com")) && - !localHostOrDomainIs(host, "www.company.com") && - !localHostOrDoaminIs(host, "home.company.com")) - return "DIRECT"; - else - return "PROXY proxy:80"; -} -``` -## Example 3: Connect directly if the host name is resolvable -In this example, if the host name can be resolved, it can connect directly. However, if the name can’t be resolved, the server must connect through a proxy server. Specifically, this function requests the DNS server to resolve the host name it's passed. If the name can be resolved, a direct connection is made. If it can't, the connection is made using a proxy. This is particularly useful when an internal DNS server is used to resolve all internal host names. - -**Important**
          The `isResolvable` function queries a Domain Name System (DNS) server. References to Object Model objects, properties, or methods cause the proxy auto-configuration file to fail silently. For example, the references `window.open(...)`, `alert(...)`, and `password(...)` all cause the proxy auto-configuration file to fail. - -``` javascript -function FindProxyForURL(url, host) - { - if (isResolvable(host)) - return "DIRECT"; - else - return "PROXY proxy:80"; - } -``` - -## Example 4: Connect directly if the host is in specified subnet -In this example, if the host is in a specified subnet, it can connect directly. However, if the server is outside of the specified subnet, it must connect through a proxy server. Specifically, the `isInNet` (host, pattern, mask) function returns true if the host IP address matches the specified pattern. The mask indicates which part of the IP address to match (255=match, 0=ignore). - -**Important**
          The `isInNet` function queries a DNS server. References to Object Model objects, properties, or methods cause the proxy auto-configuration file to fail silently. For example, the references `window.open(...)`, `alert(...)`, and `password(...)` all cause the proxy auto-configuration file to fail. - -``` javascript -function FindProxyForURL(url, host) - { - if (isInNet(host, "999.99.9.9", "255.0.255.0")) - return "DIRECT"; - else - return "PROXY proxy:80"; - } -``` -## Example 5: Determine the connection type based on the host domain -In this example, if the host is local, the server can connect directly. However, if the host isn’t local, this function determines which proxy to use based on the host domain. Specifically, the `shExpMatch(str, shexp)` function returns true if `str` matches the `shexp` using shell expression patterns. This is particularly useful when the host domain name is one of the criteria for proxy selection. - -``` javascript -function FindProxyForURL(url, host) - { - if (isPlainHostName(host)) - return "DIRECT"; - else if (shExpMatch(host, "*.com")) - return "PROXY comproxy:80"; - else if (shExpMatch(host, "*.edu")) - return "PROXY eduproxy:80"; - else - return "PROXY proxy"; - } -``` -## Example 6: Determine the connection type based on the protocol -In this example, the in-use protocol is extracted from the server and used to make a proxy selection. If no protocol match occurs, the server is directly connected. Specifically the `substring` function extracts the specified number of characters from a string. This is particularly useful when protocol is one of the criteria for proxy selection. - -``` javascript -function FindProxyForURL(url, host) - { - if (url.substring(0, 5) == "http:") { - return "PROXY proxy:80"; - } - else if (url.substring(0, 4) == "ftp:") { - return "PROXY fproxy:80"; - } - else if (url.substring(0, 6) == "https:") { - return "PROXY secproxy:8080"; - } - else { - return "DIRECT"; - } - } -``` -## Example 7: Determine the proxy server based on the host name matching the IP address -In this example, the proxy server is selected by translating the host name into an IP address and then comparing the address to a specified string. - -**Important** 
          The `dnsResolve` function queries a DNS server. References to Object Model objects, properties, or methods cause the proxy auto-configuration file to fail silently. For example, the references `window.open(...)`, `alert(...)`, and `password(...)` all cause the proxy auto-configuration file to fail. - -``` javascript -function FindProxyForURL(url, host) - { - if (dnsResolve(host) == "999.99.99.999") { // = https://secproxy - return "PROXY secproxy:8080"; - } - else { - return "PROXY proxy:80"; - } - } -``` -## Example 8: Connect using a proxy server if the host IP address matches the specified IP address -In this example, the proxy server is selected by explicitly getting the IP address and then comparing it to a specified string. If no protocol match occurs, the server makes a direct connection. Specifically, the `myIpAddress` function returns the IP address (in integer-period format) for the host that the browser is running on. - -``` javascript -function FindProxyForURL(url, host) - { - if (myIpAddress() == "999.99.999.99") { - return "PROXY proxy:80"; - } - else { - return "DIRECT"; - } - } -``` -## Example 9: Connect using a proxy server if there are periods in the host name -In this example, the function looks to see if there are periods (.) in the host name. If there are any periods, the connection occurs using a proxy server. If there are no periods, a direct connection occurs. Specifically, the `dnsDomainLevels` function returns an integer equal to the number of periods in the host name. - -**Note**
          This is another way to determine connection types based on host name characteristics. - -``` javascript -function FindProxyForURL(url, host) - { - if (dnsDomainLevels(host) > 0) { // if the number of periods in host > 0 - return "PROXY proxy:80"; - } - return "DIRECT"; - } -``` -## Example 10: Connect using a proxy server based on specific days of the week -In this example, the function decides whether to connect to a proxy server, based on the days of the week. Connecting on days that don’t fall between the specified date parameters let the server make a direct connection. Specifically the `weekdayRange(day1 [,day2] [,GMT] )` function returns whether the current system time falls within the range specified by the parameters `day1`, `day2`, and `GMT`. Only the first parameter is required. The GMT parameter presumes time values are in Greenwich Mean Time rather than the local time zone. This function is particularly useful for situations where you want to use a proxy server for heavy traffic times, but allow a direct connection when traffic is light. - -``` javascript -function FindProxyForURL(url, host) - { - if(weekdayRange("WED", "SAT", "GMT")) - return "PROXY proxy:80"; - else - return "DIRECT"; - } -``` - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: Learn about how to use a proxy auto-configuration (.pac) file to specify an automatic proxy URL. +author: dansimp +ms.prod: ie11 +ms.assetid: 6c94708d-71bd-44bd-a445-7e6763b374ae +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Use proxy auto-configuration (.pac) files with IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Use proxy auto-configuration (.pac) files with IEAK 11 +These are various ways you can use a proxy auto-configuration (.pac) file to specify an automatic proxy URL. We've included some examples here to help guide you, but you'll need to change the proxy names, port numbers, and IP addresses to match your organization's info. + +Included examples: +- [Example 1: Connect directly if the host is local](#example-1-connect-directly-if-the-host-is-local) +- [Example 2: Connect directly if the host is inside the firewall](#example-2-connect-directly-if-the-host-is-inside-the-firewall) +- [Example 3: Connect directly if the host name is resolvable](#example-3-connect-directly-if-the-host-name-is-resolvable) +- [Example 4: Connect directly if the host is in specified subnet](#example-4-connect-directly-if-the-host-is-in-specified-subnet) +- [Example 5: Determine the connection type based on the host domain](#example-5-determine-the-connection-type-based-on-the-host-domain) +- [Example 6: Determine the connection type based on the protocol](#example-6-determine-the-connection-type-based-on-the-protocol) +- [Example 7: Determine the proxy server based on the host name matching the IP address](#example-7-determine-the-proxy-server-based-on-the-host-name-matching-the-ip-address) +- [Example 8: Connect using a proxy server if the host IP address matches the specified IP address](#example-8-connect-using-a-proxy-server-if-the-host-ip-address-matches-the-specified-ip-address) +- [Example 9: Connect using a proxy server if there are periods in the host name](#example-9-connect-using-a-proxy-server-if-there-are-periods-in-the-host-name) +- [Example 10: Connect using a proxy server based on specific days of the week](#example-10-connect-using-a-proxy-server-based-on-specific-days-of-the-week) + + +## Example 1: Connect directly if the host is local +In this example, if the host is local, it can connect directly. However, if the server isn't local, it must connect through a proxy server. Specifically, the `isPlainHostName` function looks to see if there are any periods (.) in the host name. If the function finds periods, it means the host isn’t local and it returns false. Otherwise, the function returns true. + +``` javascript +function FindProxyForURL(url, host) + { + if (isPlainHostName(host)) + return "DIRECT"; + else + return "PROXY proxy:80"; + } +``` +## Example 2: Connect directly if the host is inside the firewall +In this example, if the host is inside the firewall, it can connect directly. However, if the server is outside the firewall, it must connect through a proxy server. Specifically, the `localHostOrDomainIs` function only runs for URLs in the local domain. If the host domain name matches the provided domain information, the `dnsDomainIs` function returns true. + +``` javascript +function FindProxyForURL(url, host) + { + if ((isPlainHostName(host) || + dnsDomainIs(host, ".company.com")) && + !localHostOrDomainIs(host, "www.company.com") && + !localHostOrDoaminIs(host, "home.company.com")) + return "DIRECT"; + else + return "PROXY proxy:80"; +} +``` +## Example 3: Connect directly if the host name is resolvable +In this example, if the host name can be resolved, it can connect directly. However, if the name can’t be resolved, the server must connect through a proxy server. Specifically, this function requests the DNS server to resolve the host name it's passed. If the name can be resolved, a direct connection is made. If it can't, the connection is made using a proxy. This is particularly useful when an internal DNS server is used to resolve all internal host names. + +**Important**
          The `isResolvable` function queries a Domain Name System (DNS) server. References to Object Model objects, properties, or methods cause the proxy auto-configuration file to fail silently. For example, the references `window.open(...)`, `alert(...)`, and `password(...)` all cause the proxy auto-configuration file to fail. + +``` javascript +function FindProxyForURL(url, host) + { + if (isResolvable(host)) + return "DIRECT"; + else + return "PROXY proxy:80"; + } +``` + +## Example 4: Connect directly if the host is in specified subnet +In this example, if the host is in a specified subnet, it can connect directly. However, if the server is outside of the specified subnet, it must connect through a proxy server. Specifically, the `isInNet` (host, pattern, mask) function returns true if the host IP address matches the specified pattern. The mask indicates which part of the IP address to match (255=match, 0=ignore). + +**Important**
          The `isInNet` function queries a DNS server. References to Object Model objects, properties, or methods cause the proxy auto-configuration file to fail silently. For example, the references `window.open(...)`, `alert(...)`, and `password(...)` all cause the proxy auto-configuration file to fail. + +``` javascript +function FindProxyForURL(url, host) + { + if (isInNet(host, "999.99.9.9", "255.0.255.0")) + return "DIRECT"; + else + return "PROXY proxy:80"; + } +``` +## Example 5: Determine the connection type based on the host domain +In this example, if the host is local, the server can connect directly. However, if the host isn’t local, this function determines which proxy to use based on the host domain. Specifically, the `shExpMatch(str, shexp)` function returns true if `str` matches the `shexp` using shell expression patterns. This is particularly useful when the host domain name is one of the criteria for proxy selection. + +``` javascript +function FindProxyForURL(url, host) + { + if (isPlainHostName(host)) + return "DIRECT"; + else if (shExpMatch(host, "*.com")) + return "PROXY comproxy:80"; + else if (shExpMatch(host, "*.edu")) + return "PROXY eduproxy:80"; + else + return "PROXY proxy"; + } +``` +## Example 6: Determine the connection type based on the protocol +In this example, the in-use protocol is extracted from the server and used to make a proxy selection. If no protocol match occurs, the server is directly connected. Specifically the `substring` function extracts the specified number of characters from a string. This is particularly useful when protocol is one of the criteria for proxy selection. + +``` javascript +function FindProxyForURL(url, host) + { + if (url.substring(0, 5) == "http:") { + return "PROXY proxy:80"; + } + else if (url.substring(0, 4) == "ftp:") { + return "PROXY fproxy:80"; + } + else if (url.substring(0, 6) == "https:") { + return "PROXY secproxy:8080"; + } + else { + return "DIRECT"; + } + } +``` +## Example 7: Determine the proxy server based on the host name matching the IP address +In this example, the proxy server is selected by translating the host name into an IP address and then comparing the address to a specified string. + +**Important** 
          The `dnsResolve` function queries a DNS server. References to Object Model objects, properties, or methods cause the proxy auto-configuration file to fail silently. For example, the references `window.open(...)`, `alert(...)`, and `password(...)` all cause the proxy auto-configuration file to fail. + +``` javascript +function FindProxyForURL(url, host) + { + if (dnsResolve(host) == "999.99.99.999") { // = https://secproxy + return "PROXY secproxy:8080"; + } + else { + return "PROXY proxy:80"; + } + } +``` +## Example 8: Connect using a proxy server if the host IP address matches the specified IP address +In this example, the proxy server is selected by explicitly getting the IP address and then comparing it to a specified string. If no protocol match occurs, the server makes a direct connection. Specifically, the `myIpAddress` function returns the IP address (in integer-period format) for the host that the browser is running on. + +``` javascript +function FindProxyForURL(url, host) + { + if (myIpAddress() == "999.99.999.99") { + return "PROXY proxy:80"; + } + else { + return "DIRECT"; + } + } +``` +## Example 9: Connect using a proxy server if there are periods in the host name +In this example, the function looks to see if there are periods (.) in the host name. If there are any periods, the connection occurs using a proxy server. If there are no periods, a direct connection occurs. Specifically, the `dnsDomainLevels` function returns an integer equal to the number of periods in the host name. + +**Note**
          This is another way to determine connection types based on host name characteristics. + +``` javascript +function FindProxyForURL(url, host) + { + if (dnsDomainLevels(host) > 0) { // if the number of periods in host > 0 + return "PROXY proxy:80"; + } + return "DIRECT"; + } +``` +## Example 10: Connect using a proxy server based on specific days of the week +In this example, the function decides whether to connect to a proxy server, based on the days of the week. Connecting on days that don’t fall between the specified date parameters let the server make a direct connection. Specifically the `weekdayRange(day1 [,day2] [,GMT] )` function returns whether the current system time falls within the range specified by the parameters `day1`, `day2`, and `GMT`. Only the first parameter is required. The GMT parameter presumes time values are in Greenwich Mean Time rather than the local time zone. This function is particularly useful for situations where you want to use a proxy server for heavy traffic times, but allow a direct connection when traffic is light. + +``` javascript +function FindProxyForURL(url, host) + { + if(weekdayRange("WED", "SAT", "GMT")) + return "PROXY proxy:80"; + else + return "DIRECT"; + } +``` + diff --git a/browsers/internet-explorer/ie11-ieak/proxy-ins-file-setting.md b/browsers/internet-explorer/ie11-ieak/proxy-ins-file-setting.md index 5b10604a11..80e2e5d2c0 100644 --- a/browsers/internet-explorer/ie11-ieak/proxy-ins-file-setting.md +++ b/browsers/internet-explorer/ie11-ieak/proxy-ins-file-setting.md @@ -1,30 +1,31 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: Use the \[Proxy\] .INS file setting to define whether to use a proxy server. -author: lomayor -ms.prod: ie11 -ms.assetid: 30b03c2f-e3e5-48d2-9007-e3fd632f3c18 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Use the Proxy .INS file to specify a proxy server (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Use the Proxy .INS file to specify a proxy server -Info about whether to use a proxy server. If yes, this also includes the host names for the proxy server. - -|Name |Value |Description | -|-----|------|------------| -|FTP_Proxy_Server |`` |The host name for the FTP proxy server. | -|Gopher_Proxy_Server |`` |We no longer support Gopher Server. | -|HTTP_Proxy_Server |`` |The host name for the HTTP proxy server. | -|Proxy_Enable |

          • **0.** Don’t use a proxy server.
          • **1.** Use a proxy server.
          |Determines whether to use a proxy server. | -|Proxy_Override |`` |The host name for the proxy server. For example, ``. | -|Secure_Proxy_Server |`` |The host name for the secure proxy server. | -|Socks_Proxy_Server |`` |The host name for the SOCKS proxy server. | -|Use_Same_Proxy |
          • **0.** Don’t use the same proxy server for all services.
          • **1.** Use the same proxy server for all services.
          |Determines whether to use a single proxy server for all services. | - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: Use the \[Proxy\] .INS file setting to define whether to use a proxy server. +author: dansimp +ms.prod: ie11 +ms.assetid: 30b03c2f-e3e5-48d2-9007-e3fd632f3c18 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Use the Proxy .INS file to specify a proxy server (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Use the Proxy .INS file to specify a proxy server +Info about whether to use a proxy server. If yes, this also includes the host names for the proxy server. + +|Name |Value |Description | +|-----|------|------------| +|FTP_Proxy_Server |`` |The host name for the FTP proxy server. | +|Gopher_Proxy_Server |`` |We no longer support Gopher Server. | +|HTTP_Proxy_Server |`` |The host name for the HTTP proxy server. | +|Proxy_Enable |
          • **0.** Don’t use a proxy server.
          • **1.** Use a proxy server.
          |Determines whether to use a proxy server. | +|Proxy_Override |`` |The host name for the proxy server. For example, ``. | +|Secure_Proxy_Server |`` |The host name for the secure proxy server. | +|Socks_Proxy_Server |`` |The host name for the SOCKS proxy server. | +|Use_Same_Proxy |
          • **0.** Don’t use the same proxy server for all services.
          • **1.** Use the same proxy server for all services.
          |Determines whether to use a single proxy server for all services. | + diff --git a/browsers/internet-explorer/ie11-ieak/proxy-settings-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/proxy-settings-ieak11-wizard.md index 8ee40e8323..a99dc70ae0 100644 --- a/browsers/internet-explorer/ie11-ieak/proxy-settings-ieak11-wizard.md +++ b/browsers/internet-explorer/ie11-ieak/proxy-settings-ieak11-wizard.md @@ -1,55 +1,56 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: How to use the Proxy Settings page in the IEAK 11 Customization Wizard to pick the proxy servers used to connect to required services. -author: lomayor -ms.prod: ie11 -ms.assetid: 1fa1eee3-e97d-41fa-a48c-4a6e0dc8b544 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Use the Proxy Settings page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Use the Proxy Settings page in the IEAK 11 Wizard -The **Proxy Settings** page of the Internet Explorer Customization Wizard 11 lets you pick the proxy servers used by your employees to connect for services required by the custom install package. - -Using a proxy server lets you limit access to the Internet. You can also use the **Additional Settings** page of the wizard to further restrict your employees from changing the proxy settings. - -**To use the Proxy Settings page** - -1. Check the **Enable proxy settings** box if you want to use proxy servers for any of your services. - -2. Type the address of the proxy server you want to use for your services into the **Address of proxy** box. In most cases, a single proxy server is used for all of your services.

          -Proxy locations that don’t begin with a protocol (like, https:// or ftp://) are assumed to be a CERN-type HTTP proxy. For example, the entry *proxy* is treated the same as the entry `https://proxy`. - -3. Type the port for each service. The default value is *80*. - -4. Check the **Use the same proxy server for all addresses** box to use the same proxy server settings for all of your services. - -5. Type any services that shouldn’t use a proxy server into the **Do not use proxy server for addresses beginning with** box.

          -When filling out your exceptions, keep in mind: - - - Proxy bypass entries can begin with a protocol type, such as https://, https://, or ftp://. However, if a protocol type is used, the exception entry applies only to requests for that protocol. - - - Protocol values are not case sensitive and you can use a wildcard character (*) in place of zero or more characters. - - - You must use a semicolon between your entries. - - - This list is limited to **2064** characters. - -6. Check the **Do not use proxy server for local (intranet) addresses** to bypass your proxy servers for all addresses on your intranet. - -7. Click **Next** to go to the [Security and Privacy Settings](security-and-privacy-settings-ieak11-wizard.md) page or **Back** to go to the [Automatic Configuration](auto-config-ieak11-wizard.md) page. - -  - -  - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: How to use the Proxy Settings page in the IEAK 11 Customization Wizard to pick the proxy servers used to connect to required services. +author: dansimp +ms.prod: ie11 +ms.assetid: 1fa1eee3-e97d-41fa-a48c-4a6e0dc8b544 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Use the Proxy Settings page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Use the Proxy Settings page in the IEAK 11 Wizard +The **Proxy Settings** page of the Internet Explorer Customization Wizard 11 lets you pick the proxy servers used by your employees to connect for services required by the custom install package. + +Using a proxy server lets you limit access to the Internet. You can also use the **Additional Settings** page of the wizard to further restrict your employees from changing the proxy settings. + +**To use the Proxy Settings page** + +1. Check the **Enable proxy settings** box if you want to use proxy servers for any of your services. + +2. Type the address of the proxy server you want to use for your services into the **Address of proxy** box. In most cases, a single proxy server is used for all of your services.

          +Proxy locations that don’t begin with a protocol (like, https:// or ftp://) are assumed to be a CERN-type HTTP proxy. For example, the entry *proxy* is treated the same as the entry `https://proxy`. + +3. Type the port for each service. The default value is *80*. + +4. Check the **Use the same proxy server for all addresses** box to use the same proxy server settings for all of your services. + +5. Type any services that shouldn’t use a proxy server into the **Do not use proxy server for addresses beginning with** box.

          +When filling out your exceptions, keep in mind: + + - Proxy bypass entries can begin with a protocol type, such as https://, https://, or ftp://. However, if a protocol type is used, the exception entry applies only to requests for that protocol. + + - Protocol values are not case sensitive and you can use a wildcard character (*) in place of zero or more characters. + + - You must use a semicolon between your entries. + + - This list is limited to **2064** characters. + +6. Check the **Do not use proxy server for local (intranet) addresses** to bypass your proxy servers for all addresses on your intranet. + +7. Click **Next** to go to the [Security and Privacy Settings](security-and-privacy-settings-ieak11-wizard.md) page or **Back** to go to the [Automatic Configuration](auto-config-ieak11-wizard.md) page. + +  + +  + + + + + diff --git a/browsers/internet-explorer/ie11-ieak/register-uninstall-app-ieak11.md b/browsers/internet-explorer/ie11-ieak/register-uninstall-app-ieak11.md index 0a26a051db..c6fb131002 100644 --- a/browsers/internet-explorer/ie11-ieak/register-uninstall-app-ieak11.md +++ b/browsers/internet-explorer/ie11-ieak/register-uninstall-app-ieak11.md @@ -1,28 +1,29 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: Learn how to register an uninstall app for your custom components, using IEAK 11. -author: lomayor -ms.prod: ie11 -ms.assetid: 4da1d408-af4a-4c89-a491-d6f005fd5005 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Register an uninstall app for custom components using IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros) -ms.date: 07/27/2017 ---- - - -# Register an uninstall app for custom components using IEAK 11 -Register the uninstall apps for any custom components you’ve included in your Internet Explorer 11 package. Registering these apps lets your employees remove the components later, using **Uninstall or change a program** in the Control Panel. - -## Register your uninstallation program -While you’re running your custom component setup process, your app can add information to the subkeys in the `HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\ApplicationName` registry key, registering your uninstallation program. - -**Note**
          IE11 also uses this registry key to verify that the component installed successfully during setup. - -|Subkey |Data type |Value | -|-------|----------|-----------| -|DisplayName |*string* |Friendly name for your uninstall app. This name must match your **Uninstall Key** in the **Add a Custom Component** page of the Internet Explorer Customization Wizard 11. For more info, see the [Custom Components](custom-components-ieak11-wizard.md) page. | -|UninstallString |*string* |Full command-line text, including the path, to uninstall your component. You must not use a batch file or a sub-process. | - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: Learn how to register an uninstall app for your custom components, using IEAK 11. +author: dansimp +ms.prod: ie11 +ms.assetid: 4da1d408-af4a-4c89-a491-d6f005fd5005 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Register an uninstall app for custom components using IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros) +ms.date: 07/27/2017 +--- + + +# Register an uninstall app for custom components using IEAK 11 +Register the uninstall apps for any custom components you’ve included in your Internet Explorer 11 package. Registering these apps lets your employees remove the components later, using **Uninstall or change a program** in the Control Panel. + +## Register your uninstallation program +While you’re running your custom component setup process, your app can add information to the subkeys in the `HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\ApplicationName` registry key, registering your uninstallation program. + +**Note**
          IE11 also uses this registry key to verify that the component installed successfully during setup. + +|Subkey |Data type |Value | +|-------|----------|-----------| +|DisplayName |*string* |Friendly name for your uninstall app. This name must match your **Uninstall Key** in the **Add a Custom Component** page of the Internet Explorer Customization Wizard 11. For more info, see the [Custom Components](custom-components-ieak11-wizard.md) page. | +|UninstallString |*string* |Full command-line text, including the path, to uninstall your component. You must not use a batch file or a sub-process. | + diff --git a/browsers/internet-explorer/ie11-ieak/rsop-snapin-for-policy-settings-ieak11.md b/browsers/internet-explorer/ie11-ieak/rsop-snapin-for-policy-settings-ieak11.md index db2bad72cd..8bf7232c7c 100644 --- a/browsers/internet-explorer/ie11-ieak/rsop-snapin-for-policy-settings-ieak11.md +++ b/browsers/internet-explorer/ie11-ieak/rsop-snapin-for-policy-settings-ieak11.md @@ -1,46 +1,47 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: manage -description: Learn how to use the Resultant Set of Policy (RSoP) snap-in to view your policy settings. -author: lomayor -ms.prod: ie11 -ms.assetid: 0f21b320-e879-4a06-8589-aae6fc264666 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Use the RSoP snap-in to review policy settings (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Using the Resultant Set of Policy (RSoP) snap-in to review policy settings -After you’ve deployed your custom Internet Explorer package to your employees, you can use the Resultant Set of Policy (RSoP) snap-in to view your created policy settings. The RSoP snap-in is a two-step process. First, you run the RSoP wizard to determine what information should be viewed. Second, you open the specific items in the console window to view the settings. For complete instructions about how to use RSoP, see [Resultant Set of Policy](https://go.microsoft.com/fwlink/p/?LinkId=259479). - -**To add the RSoP snap-in** - -1. On the **Start** screen, type *MMC*.

          -The Microsoft Management Console opens. - -2. Click **File**, and then click **Add/Remove Snap-in**. - -3. In the **Available snap-ins** window, go down to the **Resultant Set of Policy** snap-in option, click **Add**, and then click **OK**.

          -You’re now ready to use the RSoP snap-in from the console. - -**To use the RSoP snap-in** - -1. Right-click **Resultant Set of Policy** and then click **Generate RSoP Data**.

          -You’ll only need to go through the resulting RSoP Wizard first time you run the snap-in. - -2. Click **Next** on the **Welcome** screen. - -3. Under **Computer Configuration**, click **Administrative Templates**, click **Windows Components**, click **IE**, and then click the feature you want to review the policy settings for. - -  - -  - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: manage +description: Learn how to use the Resultant Set of Policy (RSoP) snap-in to view your policy settings. +author: dansimp +ms.prod: ie11 +ms.assetid: 0f21b320-e879-4a06-8589-aae6fc264666 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Use the RSoP snap-in to review policy settings (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Using the Resultant Set of Policy (RSoP) snap-in to review policy settings +After you’ve deployed your custom Internet Explorer package to your employees, you can use the Resultant Set of Policy (RSoP) snap-in to view your created policy settings. The RSoP snap-in is a two-step process. First, you run the RSoP wizard to determine what information should be viewed. Second, you open the specific items in the console window to view the settings. For complete instructions about how to use RSoP, see [Resultant Set of Policy](https://go.microsoft.com/fwlink/p/?LinkId=259479). + +**To add the RSoP snap-in** + +1. On the **Start** screen, type *MMC*.

          +The Microsoft Management Console opens. + +2. Click **File**, and then click **Add/Remove Snap-in**. + +3. In the **Available snap-ins** window, go down to the **Resultant Set of Policy** snap-in option, click **Add**, and then click **OK**.

          +You’re now ready to use the RSoP snap-in from the console. + +**To use the RSoP snap-in** + +1. Right-click **Resultant Set of Policy** and then click **Generate RSoP Data**.

          +You’ll only need to go through the resulting RSoP Wizard first time you run the snap-in. + +2. Click **Next** on the **Welcome** screen. + +3. Under **Computer Configuration**, click **Administrative Templates**, click **Windows Components**, click **IE**, and then click the feature you want to review the policy settings for. + +  + +  + + + + + diff --git a/browsers/internet-explorer/ie11-ieak/search-providers-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/search-providers-ieak11-wizard.md index 2f2c8052cf..f66425a743 100644 --- a/browsers/internet-explorer/ie11-ieak/search-providers-ieak11-wizard.md +++ b/browsers/internet-explorer/ie11-ieak/search-providers-ieak11-wizard.md @@ -1,56 +1,57 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: How to use the Search Providers page in the IEAK 11 Customization Wizard to add additional providers and set the default. -author: lomayor -ms.prod: ie11 -ms.assetid: 48cfaba5-f4c0-493c-b656-445311b7bc52 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Use the Search Providers page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Use the Search Providers page in the IEAK 11 Wizard -The **Search Providers** page of the Internet Explorer Customization Wizard 11 lets you add a default search provider (typically, Bing®) and additional providers to your custom version of IE. - -**Note**
          The Internet Explorer Customization Wizard 11 offers improved and extended search settings. However, you can still optionally include support for Search Suggestions and Favicons, as well as Accelerator previews by using an .ins file from a previous version of IEAK. - -**To use the Search Providers page** - -1. Click **Import** to automatically import your existing search providers from your current version of IE into this list. - -2. Click **Add** to add more providers.

          -The **Search Provider** box appears. - -3. In the **Display Name** box, type the text that appears in the **Search Options** menu for the search provider. - -4. In the **URL** box, type the full URL to the search provider, including the https:// prefix. - -5. In the **Favicon URL** box, type the full URL to any icon to associate with your provider. - -6. In the **Suggestions URL (XML)** box, type the associated search suggestions in XML format. - -7. In the **Suggestions URL (JSON)** box, type the associated search suggestions in JavaScript Object Notation format. - -8. In the **Accelerator Preview URL** box, type the associated Accelerator preview URL for each provider, if it’s necessary. - -9. Check the **Display Search Suggestions for this provider** box to turn on search suggestions for the provider, and then click **OK**. - -10. Check the **Search Guide URL Customization** box if you’re going to add your search providers to a custom webpage for your employees. Then, type the URL to the custom webpage in the text box. - -11. Click **Edit** to change your search provider information, click **Set Default** to make a search provider the default for your employees, or **Remove** to delete a search provider. - -12. Click **Next** to go to the [Important URLs - Home Page and Support](important-urls-home-page-and-support-ieak11-wizard.md) page or **Back** to go to the [Browser User Interface](browser-ui-ieak11-wizard.md) page. - -  - -  - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: How to use the Search Providers page in the IEAK 11 Customization Wizard to add additional providers and set the default. +author: dansimp +ms.prod: ie11 +ms.assetid: 48cfaba5-f4c0-493c-b656-445311b7bc52 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Use the Search Providers page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Use the Search Providers page in the IEAK 11 Wizard +The **Search Providers** page of the Internet Explorer Customization Wizard 11 lets you add a default search provider (typically, Bing®) and additional providers to your custom version of IE. + +**Note**
          The Internet Explorer Customization Wizard 11 offers improved and extended search settings. However, you can still optionally include support for Search Suggestions and Favicons, as well as Accelerator previews by using an .ins file from a previous version of IEAK. + +**To use the Search Providers page** + +1. Click **Import** to automatically import your existing search providers from your current version of IE into this list. + +2. Click **Add** to add more providers.

          +The **Search Provider** box appears. + +3. In the **Display Name** box, type the text that appears in the **Search Options** menu for the search provider. + +4. In the **URL** box, type the full URL to the search provider, including the https:// prefix. + +5. In the **Favicon URL** box, type the full URL to any icon to associate with your provider. + +6. In the **Suggestions URL (XML)** box, type the associated search suggestions in XML format. + +7. In the **Suggestions URL (JSON)** box, type the associated search suggestions in JavaScript Object Notation format. + +8. In the **Accelerator Preview URL** box, type the associated Accelerator preview URL for each provider, if it’s necessary. + +9. Check the **Display Search Suggestions for this provider** box to turn on search suggestions for the provider, and then click **OK**. + +10. Check the **Search Guide URL Customization** box if you’re going to add your search providers to a custom webpage for your employees. Then, type the URL to the custom webpage in the text box. + +11. Click **Edit** to change your search provider information, click **Set Default** to make a search provider the default for your employees, or **Remove** to delete a search provider. + +12. Click **Next** to go to the [Important URLs - Home Page and Support](important-urls-home-page-and-support-ieak11-wizard.md) page or **Back** to go to the [Browser User Interface](browser-ui-ieak11-wizard.md) page. + +  + +  + + + + + diff --git a/browsers/internet-explorer/ie11-ieak/security-and-ieak11.md b/browsers/internet-explorer/ie11-ieak/security-and-ieak11.md index 9db3006a23..71d99f8b9f 100644 --- a/browsers/internet-explorer/ie11-ieak/security-and-ieak11.md +++ b/browsers/internet-explorer/ie11-ieak/security-and-ieak11.md @@ -1,65 +1,66 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: plan -description: Learn about the security features available in Internet Explorer 11 and IEAK 11. -author: lomayor -ms.prod: ie11 -ms.assetid: 5b64c9cb-f8da-411a-88e4-fa69dea473e2 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Security features and IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Security features and IEAK 11 -Use Internet Explorer in conjunction with your new and existing security measures, to make sure the computers in your company aren’t compromised while on the Internet. - -## Enhanced Protection Mode -Extends Protected Mode to further restrict the ability of an attacker to access sensitive or personal information in personal and corporate environments, including: - -- Restricting access to higher-level processes in the AppContainer. - -- Improving security against memory safety exploits in 64-bit tab processes. - -This feature is turned off by default. For more info, see [Enhanced Protected Mode problems with Internet Explorer](../ie11-deploy-guide/enhanced-protected-mode-problems-with-ie11.md). - -## Certificates and Digital Signatures -Web browsers have security features that help protect users from downloading harmful programs. Depending on the security level and the platform that you are using, the user may be prevented from, or warned against, downloading programs that are not digitally signed. Digital signatures show users where programs come from, verify that the programs have not been altered, and ensure that users do not receive unnecessary warnings when installing the custom browser. - -Because of this, the custom .cab files created by the Internet Explorer Customization Wizard should be signed, unless you pre-configure the Local intranet zone with a Low security setting. Any custom components you distribute with your browser package for these platforms should also be signed. - -### Understanding digital certificates -To sign your package and custom programs digitally, you must first obtain a digital certificate. You can obtain a certificate from a certification authority or a privately-controlled certificate server. For more info about obtaining certificates or setting up a certificate server, see the following: - -- Microsoft-trusted certification authorities ([Windows root certificate program requirements](https://go.microsoft.com/fwlink/p/?LinkId=759697)). - -- Certificates overview documentation ([Certificates](https://go.microsoft.com/fwlink/p/?LinkId=759698)). - -- Microsoft Active Directory Certificate Services ( [Active Directory Certificate Services](https://go.microsoft.com/fwlink/p/?LinkId=259521)). - -- Enterprise public key infrastructure (PKI) snap-in documentation ([Enterprise PKI](https://go.microsoft.com/fwlink/p/?LinkId=259526)). - -After you get a certificate, you should note the public and private keys, which are a matched set of keys that are created by the software publisher for encryption and decryption. They are generated on your device at the time the certificate is requested, and your private key is never sent to the certification authority or any other party. - -### Understanding code signing -Code signing varies, depening on how you plan to distribute your custom install package. - -- **If you plan to distribute custom packages over the Internet**, you must sign all custom components and the CMAK profile package (if used). Before you start the Internet Explorer Customization Wizard, make sure that both are signed. Typically, their respective manufacturers will have signed them. Otherwise, you can sign these using the Sign Tool (SignTool.exe) ( [SignTool.exe (Sign Tool)](https://go.microsoft.com/fwlink/p/?LinkId=71298)) or use the File Signing Tool (Signcode.exe) ([Signcode.exe (File Signing Tool)](https://go.microsoft.com/fwlink/p/?LinkId=71299)). You should read the documentation included with these tools for more info about all of the signing options.

          -In addition, after you run the Internet Explorer Customization Wizard, we highly recommend that you sign the IEAK package and the branding.cab file (if you are using it separately from the package). You can do this also using the tools mentioned above. For more information, download Code-Signing Best Practices ([Code-Signing Best Practices](https://go.microsoft.com/fwlink/p/?LinkId=71300)). - -- **If you plan to distribute your custom packages over an intranet**, sign the custom files or preconfigure the Local intranet zone with a Low security setting, because the default security setting does not allow users to download unsigned programs or code. - -### Understanding your private key -Your device creates two keys during the enrollment process of your digital certificate. One is a public key, which is sent to anyone you want to communicate with, and one is a private key, which is stored on your local device and must be kept secret. You use the private key to encrypt your data and the corresponding public key to decrypt it. - -You must keep your private key, private. To do this, we recommend: - -- **Separate test and release signing.** Set up a parallel code signing infrastructure, using test certificates created by an internal test root certificate authority. This helps to ensure that your certificates aren’t stored on an insecure build system, reducing the likelihood that they will be compromised. - -- **Tamper-proof storage.** Save your private keys on secure, tamper-proof hardware devices. - -- **Security.** Protect your private keys using physical security measures, such as cameras and card readers. - +--- +ms.localizationpriority: medium +ms.mktglfcycl: plan +description: Learn about the security features available in Internet Explorer 11 and IEAK 11. +author: dansimp +ms.prod: ie11 +ms.assetid: 5b64c9cb-f8da-411a-88e4-fa69dea473e2 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Security features and IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Security features and IEAK 11 +Use Internet Explorer in conjunction with your new and existing security measures, to make sure the computers in your company aren’t compromised while on the Internet. + +## Enhanced Protection Mode +Extends Protected Mode to further restrict the ability of an attacker to access sensitive or personal information in personal and corporate environments, including: + +- Restricting access to higher-level processes in the AppContainer. + +- Improving security against memory safety exploits in 64-bit tab processes. + +This feature is turned off by default. For more info, see [Enhanced Protected Mode problems with Internet Explorer](../ie11-deploy-guide/enhanced-protected-mode-problems-with-ie11.md). + +## Certificates and Digital Signatures +Web browsers have security features that help protect users from downloading harmful programs. Depending on the security level and the platform that you are using, the user may be prevented from, or warned against, downloading programs that are not digitally signed. Digital signatures show users where programs come from, verify that the programs have not been altered, and ensure that users do not receive unnecessary warnings when installing the custom browser. + +Because of this, the custom .cab files created by the Internet Explorer Customization Wizard should be signed, unless you pre-configure the Local intranet zone with a Low security setting. Any custom components you distribute with your browser package for these platforms should also be signed. + +### Understanding digital certificates +To sign your package and custom programs digitally, you must first obtain a digital certificate. You can obtain a certificate from a certification authority or a privately-controlled certificate server. For more info about obtaining certificates or setting up a certificate server, see the following: + +- Microsoft-trusted certification authorities ([Windows root certificate program requirements](https://go.microsoft.com/fwlink/p/?LinkId=759697)). + +- Certificates overview documentation ([Certificates](https://go.microsoft.com/fwlink/p/?LinkId=759698)). + +- Microsoft Active Directory Certificate Services ( [Active Directory Certificate Services](https://go.microsoft.com/fwlink/p/?LinkId=259521)). + +- Enterprise public key infrastructure (PKI) snap-in documentation ([Enterprise PKI](https://go.microsoft.com/fwlink/p/?LinkId=259526)). + +After you get a certificate, you should note the public and private keys, which are a matched set of keys that are created by the software publisher for encryption and decryption. They are generated on your device at the time the certificate is requested, and your private key is never sent to the certification authority or any other party. + +### Understanding code signing +Code signing varies, depening on how you plan to distribute your custom install package. + +- **If you plan to distribute custom packages over the Internet**, you must sign all custom components and the CMAK profile package (if used). Before you start the Internet Explorer Customization Wizard, make sure that both are signed. Typically, their respective manufacturers will have signed them. Otherwise, you can sign these using the Sign Tool (SignTool.exe) ( [SignTool.exe (Sign Tool)](https://go.microsoft.com/fwlink/p/?LinkId=71298)) or use the File Signing Tool (Signcode.exe) ([Signcode.exe (File Signing Tool)](https://go.microsoft.com/fwlink/p/?LinkId=71299)). You should read the documentation included with these tools for more info about all of the signing options.

          +In addition, after you run the Internet Explorer Customization Wizard, we highly recommend that you sign the IEAK package and the branding.cab file (if you are using it separately from the package). You can do this also using the tools mentioned above. For more information, download Code-Signing Best Practices ([Code-Signing Best Practices](https://go.microsoft.com/fwlink/p/?LinkId=71300)). + +- **If you plan to distribute your custom packages over an intranet**, sign the custom files or preconfigure the Local intranet zone with a Low security setting, because the default security setting does not allow users to download unsigned programs or code. + +### Understanding your private key +Your device creates two keys during the enrollment process of your digital certificate. One is a public key, which is sent to anyone you want to communicate with, and one is a private key, which is stored on your local device and must be kept secret. You use the private key to encrypt your data and the corresponding public key to decrypt it. + +You must keep your private key, private. To do this, we recommend: + +- **Separate test and release signing.** Set up a parallel code signing infrastructure, using test certificates created by an internal test root certificate authority. This helps to ensure that your certificates aren’t stored on an insecure build system, reducing the likelihood that they will be compromised. + +- **Tamper-proof storage.** Save your private keys on secure, tamper-proof hardware devices. + +- **Security.** Protect your private keys using physical security measures, such as cameras and card readers. + diff --git a/browsers/internet-explorer/ie11-ieak/security-and-privacy-settings-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/security-and-privacy-settings-ieak11-wizard.md index 007b61208d..16ffc69435 100644 --- a/browsers/internet-explorer/ie11-ieak/security-and-privacy-settings-ieak11-wizard.md +++ b/browsers/internet-explorer/ie11-ieak/security-and-privacy-settings-ieak11-wizard.md @@ -1,43 +1,44 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: How to use the Security and Privacy Settings page in the IEAK 11 Customization Wizard to manage your security zones, privacy settings, and content ratings. -author: lomayor -ms.prod: ie11 -ms.assetid: cb7cd1df-6a79-42f6-b3a1-8ae467053f82 -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Use the Security and Privacy Settings page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Use the Security and Privacy Settings page in the IEAK 11 Wizard -The **Security and Privacy Settings** page of the Internet Explorer Customization Wizard 11 lets you manage your security zones, privacy settings, and content ratings. These settings help restrict the types of content your employees can access from the Internet, including any content that might be considered offensive or otherwise inappropriate in a corporate setting. - -**To use the Security and Privacy Settings page** - -1. Decide if you want to customize your security zones and privacy settings. You can pick: - - - **Do not customize security zones and privacy.** Pick this option if you don’t want to customize your security zones and privacy settings. - - - **Import the current security zones and privacy.** Pick this option to import your security zone and privacy settings from your computer and use them as the preset for your employee’s settings.

          **Note**
          To change your settings, click **Modify Settings** to open the **Internet Properties** box, and then click the **Security** and **Privacy** tabs to make your changes. - -2. Decide if you want to customize your content ratings. You can pick: - - - **Do not customize content ratings.** Pick this option if you don’t want to customize content ratings. - - - **Import the current content ratings settings.** Pick this option to import your content rating settings from your computer and use them as the preset for your employee’s settings.

          **Note**
          Not all Internet content is rated. If you choose to allow users to view unrated sites, some of those sites could contain inappropriate material. To change your settings, click **Modify Settings** to open the **Content Advisor** box, where you can make your changes. - -3. Click **Next** to go to the [Add a Root Certificate](add-root-certificate-ieak11-wizard.md) page or **Back** to go to the [Proxy Settings](proxy-settings-ieak11-wizard.md) page. - -  - -  - - - - - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: How to use the Security and Privacy Settings page in the IEAK 11 Customization Wizard to manage your security zones, privacy settings, and content ratings. +author: dansimp +ms.prod: ie11 +ms.assetid: cb7cd1df-6a79-42f6-b3a1-8ae467053f82 +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Use the Security and Privacy Settings page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Use the Security and Privacy Settings page in the IEAK 11 Wizard +The **Security and Privacy Settings** page of the Internet Explorer Customization Wizard 11 lets you manage your security zones, privacy settings, and content ratings. These settings help restrict the types of content your employees can access from the Internet, including any content that might be considered offensive or otherwise inappropriate in a corporate setting. + +**To use the Security and Privacy Settings page** + +1. Decide if you want to customize your security zones and privacy settings. You can pick: + + - **Do not customize security zones and privacy.** Pick this option if you don’t want to customize your security zones and privacy settings. + + - **Import the current security zones and privacy.** Pick this option to import your security zone and privacy settings from your computer and use them as the preset for your employee’s settings.

          **Note**
          To change your settings, click **Modify Settings** to open the **Internet Properties** box, and then click the **Security** and **Privacy** tabs to make your changes. + +2. Decide if you want to customize your content ratings. You can pick: + + - **Do not customize content ratings.** Pick this option if you don’t want to customize content ratings. + + - **Import the current content ratings settings.** Pick this option to import your content rating settings from your computer and use them as the preset for your employee’s settings.

          **Note**
          Not all Internet content is rated. If you choose to allow users to view unrated sites, some of those sites could contain inappropriate material. To change your settings, click **Modify Settings** to open the **Content Advisor** box, where you can make your changes. + +3. Click **Next** to go to the [Add a Root Certificate](add-root-certificate-ieak11-wizard.md) page or **Back** to go to the [Proxy Settings](proxy-settings-ieak11-wizard.md) page. + +  + +  + + + + + diff --git a/browsers/internet-explorer/ie11-ieak/security-imports-ins-file-setting.md b/browsers/internet-explorer/ie11-ieak/security-imports-ins-file-setting.md index 74e61ad2bb..e65b0e2b77 100644 --- a/browsers/internet-explorer/ie11-ieak/security-imports-ins-file-setting.md +++ b/browsers/internet-explorer/ie11-ieak/security-imports-ins-file-setting.md @@ -1,27 +1,28 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: deploy -description: Use the \[Security Imports\] .INS file setting to decide whether to import security info to your custom package. -author: lomayor -ms.prod: ie11 -ms.assetid: 19791c44-aaa7-4f37-9faa-85cbdf29f68e -ms.reviewer: -audience: itpro manager: dansimp -ms.author: lomayor -title: Use the Security Imports .INS file to import security info (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Use the Security Imports .INS file to import security info -Info about how to import security information from your local device to your custom package. - -|Name |Value |Description | -|-----|------|------------| -|ImportAuthCode |

          • **0.** Don’t import the existing settings.
          • **1.** Import the existing settings.
          |Whether to import the existing Authenticode settings. | -|ImportRatings |
          • **0.** Don’t import the existing settings.
          • **1.** Import the existing settings.
          |Whether to import the existing Content Ratings settings. | -|ImportSecZones |
          • **0.** Don’t import the existing settings.
          • **1.** Import the existing settings.
          |Whether to import the existing Security Zone settings. | -|ImportSiteCert |
          • **0.** Don’t import the existing authorities.
          • **1.** Import the existing authorities.
          |Whether to import the existing site certification authorities. | -|Win16SiteCerts |
          • **0.** Don’t use the site certificates.
          • **1.** Use the site certificates.
          |Whether to use site certificates for computers running 16-bit versions of Windows. | - +--- +ms.localizationpriority: medium +ms.mktglfcycl: deploy +description: Use the \[Security Imports\] .INS file setting to decide whether to import security info to your custom package. +author: dansimp +ms.prod: ie11 +ms.assetid: 19791c44-aaa7-4f37-9faa-85cbdf29f68e +ms.reviewer: +audience: itpro +manager: dansimp +ms.author: dansimp +title: Use the Security Imports .INS file to import security info (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Use the Security Imports .INS file to import security info +Info about how to import security information from your local device to your custom package. + +|Name |Value |Description | +|-----|------|------------| +|ImportAuthCode |
          • **0.** Don’t import the existing settings.
          • **1.** Import the existing settings.
          |Whether to import the existing Authenticode settings. | +|ImportRatings |
          • **0.** Don’t import the existing settings.
          • **1.** Import the existing settings.
          |Whether to import the existing Content Ratings settings. | +|ImportSecZones |
          • **0.** Don’t import the existing settings.
          • **1.** Import the existing settings.
          |Whether to import the existing Security Zone settings. | +|ImportSiteCert |
          • **0.** Don’t import the existing authorities.
          • **1.** Import the existing authorities.
          |Whether to import the existing site certification authorities. | +|Win16SiteCerts |
          • **0.** Don’t use the site certificates.
          • **1.** Use the site certificates.
          |Whether to use site certificates for computers running 16-bit versions of Windows. | + diff --git a/browsers/internet-explorer/ie11-ieak/troubleshooting-custom-browser-pkg-ieak11.md b/browsers/internet-explorer/ie11-ieak/troubleshooting-custom-browser-pkg-ieak11.md index 228805f528..7b0db0bbc4 100644 --- a/browsers/internet-explorer/ie11-ieak/troubleshooting-custom-browser-pkg-ieak11.md +++ b/browsers/internet-explorer/ie11-ieak/troubleshooting-custom-browser-pkg-ieak11.md @@ -1,123 +1,124 @@ ---- -ms.localizationpriority: medium -ms.mktglfcycl: support -description: Info about some of the known issues using the Internet Exporer Customization Wizard and a custom Internet Explorer install package. -author: lomayor -ms.author: lomayor -ms.prod: ie11 -ms.assetid: 9e22cc61-6c63-4cab-bfdf-6fe49db945e4 -ms.reviewer: -audience: itpro manager: dansimp -title: Troubleshoot custom package and IEAK 11 problems (Internet Explorer Administration Kit 11 for IT Pros) -ms.sitesec: library -ms.date: 07/27/2017 ---- - - -# Troubleshoot custom package and IEAK 11 problems -While the Internet Explorer Customization Wizard has been around for quite a while, there are still some known issues that you might encounter while deploying or managing your custom IE install package. - -## I am unable to locate some of the wizard pages -The most common reasons you will not see certain pages is because: - -- **Your licensing agreement with Microsoft.** Your licensing agreement determines whether you install the **Internal** or **External** version of the Internet Explorer Customization Wizard, and there are different features available for each version. For info about which features are available for each version, see [Determine the licensing version and features to use in IEAK 11](licensing-version-and-features-ieak11.md). - -- **Your choice of operating system.** Depending on the operating system you picked from the **Platform Selection** page of the wizard, you might not see all of the pages. Some features aren’t available for all operating systems. For more information, see [Use the Platform Selection page in the IEAK 11 Wizard](platform-selection-ieak11-wizard.md). - -- **Your choice of features.** Depending on what you selected from the **Feature Selection** page of the wizard, you might not see all of the pages. You need to make sure that the features you want to customize are all checked. For more information, see [Use the Feature Selection page in the IEAK 11 Wizard](feature-selection-ieak11-wizard.md). - -## Internet Explorer Setup fails on user's devices -Various issues can cause problems during Setup, including missing files, trust issues, or URL monikers. You can troubleshoot these issues by reviewing the Setup log file, located at `IE11\_main.log` from the **Windows** folder (typically, `C:\Windows`). The log file covers the entire Setup process from the moment IE11Setup.exe starts until the last .cab file finishes, providing error codes that you can use to help determine the cause of the failure. - -### Main.log file codes - -|Code |Description | -|-----|------------| -|0 |Initializing, making a temporary folder, and checking disk space. | -|1 |Checking for all dependencies. | -|2 |Downloading files from the server. | -|3 |Copying files from download location to the temporary installation folder. | -|4 |Restarting download and retrying Setup, because of a time-out error or other download error. | -|5 |Checking trust and checking permissions. | -|6 |Extracting files. | -|7 |Running Setup program (an .inf or .exe file). | -|8 |Installation is finished. | -|9 |Download finished, and all files are downloaded. | - -### Main.log error codes - -|Code |Description | -|-----|------------| -|80100003 |Files are missing from the download folder during installation. | -|800bxxxx |An error code starting with 800b is a trust failure. | -|800Cxxxx |An error code starting with 800C is a Urlmon.dll failure. | - - -## Internet Explorer Setup connection times out -Internet Explorer Setup can switch servers during the installation process to maintain maximum throughput or to recover from a non-responsive download site (you receive less than 1 byte in 2 minutes). If the connection times out, but Setup is able to connect to the next download site on the list, your download starts over. If however the connection times out and Setup can’t connect to a different server, it’ll ask if you want to stop the installation or try again. - -To address connection issues (for example, as a result of server problems) where Setup can’t locate another download site by default, we recommend you overwrite your first download server using this workaround: - -``` syntax -\ie11setup.exe /C:"ie11wzd.exe /S:""\ie11setup.exe"" /L:""https://your_Web_server/your_Web_site/ie11sites.dat""" -``` - -Where `` represents the folder location where you stored IE11setup.exe. - -## Users cannot uninstall IE -If you cannot uninstall IE using **Uninstall or change a program** in the Control Panel, it could be because the uninstall information is not on the computer. To fix this issue, you should: - -1. Review the uninstall log file, IE11Uninst.log, located in the `C:\Windows` folder. This log file covers the entire uninstallation process, including every file change, every registry change, and any dialog boxes that are shown. - -2. Try to manually uninstall IE. Go to the backup folder, `:\Windows\$ie11$`, and run the uninstall file, `Spunist.exe`. - -  -## The Internet Explorer Customization Wizard 11 does not work with user names that user double-byte character sets -The customization wizard does not work with user names that use double-byte character sets, such as Chinese or Japanese. To fix this, set the **TEMP** and **TMP** environmental variables to a path that does not use these characters (for example, C:\temp). - -1. Open **System Properties**, click the **Advanced** tab, and then click **Environmental Variables**. -2. Click Edit, and then modify the **TEMP** and **TMP** environmental variables to a non-user profile directory. - -  -## Unicode characters are not supported in IEAK 11 path names -While Unicode characters, such as Emoji, are supported for organization names and other branding items, you must not use Unicode characters in any paths associated with running the Internet Explorer Customization Wizard 11. This includes paths to your IEAK 11 installation and to the storage location for your custom packages after they're built. - -## Internet Explorer branding conflicts when using both Unattend and IEAK 11 to customize Internet Explorer settings -Using both Unattend settings and an IEAK custom package to modify a user's version of Internet Explorer 11 might cause a user to lose personalized settings during an upgrade. For example, many manufacturers configure Internet Explorer using Unattend settings. If a user purchases a laptop, and then signs up for Internet service, their Internet Service Provider (ISP) might provide a version of Internet Explorer that has been branded (for example, with a custom homepage for that ISP) using Internet Explorer Customization Wizard 11. If that user later upgrades to a new version of Internet Explorer, the Unattend settings from the laptop manufacturer will be reapplied, overwriting any settings that the user configured for themselves (such as their homepage). - - -## IEAK 11 does not correctly apply the Delete all existing items under Favorites, Favorites Bar and Feeds option -The Internet Explorer Customization Wizard 11 does not correctly apply the **Delete all existing items under Favorites**, **Favorites Bar and Feeds** option, available on the **Browsing Options** page. - -Selecting to include this feature in your customized Internet Explorer package enables the deletion of existing items in the **Favorites** and **Favorites Bar** areas, but it doesn't enable deletion in the **Feeds** area. In addition, this setting adds a new favorite, titled “Web Slice Gallery” to the **Favorites Bar**. - -## F1 does not activate Help on Automatic Version Synchronization page -Pressing the **F1** button on the **Automatic Version Synchronization** page of the Internet Explorer Customization Wizard 11 does not display the **Help** page. Clicking the **Help** button enables you to open the Help system and view information about this page. - -## Certificate installation does not work on IEAK 11 -IEAK 11 doesn't install certificates added using the Add a Root Certificate page of the Internet Explorer Customization Wizard 11. Administrators can manually install certificates using the Certificates Microsoft Management Console snap-in (Certmgr.msc) or using the command-line tool, Certificate Manager (Certmgr.exe). - ->[!NOTE] ->This applies only when using the External licensing mode of IEAK 11. - -## The Additional Settings page appears in the wrong language when using a localized version of IEAK 11 -When using IEAK 11 in other languages, the settings on the Additional Settings page appear in the language of the target platform, regardless of the IEAK 11 language. - ->[!NOTE] ->This applies only when using the Internal licensing mode of IEAK 11. - -To work around this issue, run the customization wizard following these steps: -1. On the **Language Selection** page, select the language that matches the language of your installed IEAK 11. -2. Click **Next**, and then click **Synchronize** on the Automatic Version Synchronization page. -3. After synchronization is complete, cancel the wizard. -4. Repeat these steps for each platform on the Platform Selection page. - -After performing these steps, you must still do the following each time you synchronize a new language and platform: -1. Open File Explorer to the Program Files\Windows IEAK 11 or Program Files (x86)\Windows IEAK 11 folder. -2. Open the **Policies** folder, and then open the appropriate platform folder. -3. Copy the contents of the matching-language folder into the new language folder. - -After completing these steps, the Additional Settings page matches your wizard’s language. - -## Unable to access feeds stored in a subfolder -Adding feeds using the **Favorites**, **Favorites Bar**, and **Feeds** page of the Internet Explorer 11 Customization Wizard requires that the feeds be stored in a single folder. Creating two levels of folders, and creating the feed in the subfolder, causes the feed to fail. +--- +ms.localizationpriority: medium +ms.mktglfcycl: support +description: Info about some of the known issues using the Internet Exporer Customization Wizard and a custom Internet Explorer install package. +author: dansimp +ms.author: dansimp +ms.prod: ie11 +ms.assetid: 9e22cc61-6c63-4cab-bfdf-6fe49db945e4 +ms.reviewer: +audience: itpro +manager: dansimp +title: Troubleshoot custom package and IEAK 11 problems (Internet Explorer Administration Kit 11 for IT Pros) +ms.sitesec: library +ms.date: 07/27/2017 +--- + + +# Troubleshoot custom package and IEAK 11 problems +While the Internet Explorer Customization Wizard has been around for quite a while, there are still some known issues that you might encounter while deploying or managing your custom IE install package. + +## I am unable to locate some of the wizard pages +The most common reasons you will not see certain pages is because: + +- **Your licensing agreement with Microsoft.** Your licensing agreement determines whether you install the **Internal** or **External** version of the Internet Explorer Customization Wizard, and there are different features available for each version. For info about which features are available for each version, see [Determine the licensing version and features to use in IEAK 11](licensing-version-and-features-ieak11.md). + +- **Your choice of operating system.** Depending on the operating system you picked from the **Platform Selection** page of the wizard, you might not see all of the pages. Some features aren’t available for all operating systems. For more information, see [Use the Platform Selection page in the IEAK 11 Wizard](platform-selection-ieak11-wizard.md). + +- **Your choice of features.** Depending on what you selected from the **Feature Selection** page of the wizard, you might not see all of the pages. You need to make sure that the features you want to customize are all checked. For more information, see [Use the Feature Selection page in the IEAK 11 Wizard](feature-selection-ieak11-wizard.md). + +## Internet Explorer Setup fails on user's devices +Various issues can cause problems during Setup, including missing files, trust issues, or URL monikers. You can troubleshoot these issues by reviewing the Setup log file, located at `IE11\_main.log` from the **Windows** folder (typically, `C:\Windows`). The log file covers the entire Setup process from the moment IE11Setup.exe starts until the last .cab file finishes, providing error codes that you can use to help determine the cause of the failure. + +### Main.log file codes + +|Code |Description | +|-----|------------| +|0 |Initializing, making a temporary folder, and checking disk space. | +|1 |Checking for all dependencies. | +|2 |Downloading files from the server. | +|3 |Copying files from download location to the temporary installation folder. | +|4 |Restarting download and retrying Setup, because of a time-out error or other download error. | +|5 |Checking trust and checking permissions. | +|6 |Extracting files. | +|7 |Running Setup program (an .inf or .exe file). | +|8 |Installation is finished. | +|9 |Download finished, and all files are downloaded. | + +### Main.log error codes + +|Code |Description | +|-----|------------| +|80100003 |Files are missing from the download folder during installation. | +|800bxxxx |An error code starting with 800b is a trust failure. | +|800Cxxxx |An error code starting with 800C is a Urlmon.dll failure. | + + +## Internet Explorer Setup connection times out +Internet Explorer Setup can switch servers during the installation process to maintain maximum throughput or to recover from a non-responsive download site (you receive less than 1 byte in 2 minutes). If the connection times out, but Setup is able to connect to the next download site on the list, your download starts over. If however the connection times out and Setup can’t connect to a different server, it’ll ask if you want to stop the installation or try again. + +To address connection issues (for example, as a result of server problems) where Setup can’t locate another download site by default, we recommend you overwrite your first download server using this workaround: + +``` syntax +\ie11setup.exe /C:"ie11wzd.exe /S:""\ie11setup.exe"" /L:""https://your_Web_server/your_Web_site/ie11sites.dat""" +``` + +Where `` represents the folder location where you stored IE11setup.exe. + +## Users cannot uninstall IE +If you cannot uninstall IE using **Uninstall or change a program** in the Control Panel, it could be because the uninstall information is not on the computer. To fix this issue, you should: + +1. Review the uninstall log file, IE11Uninst.log, located in the `C:\Windows` folder. This log file covers the entire uninstallation process, including every file change, every registry change, and any dialog boxes that are shown. + +2. Try to manually uninstall IE. Go to the backup folder, `:\Windows\$ie11$`, and run the uninstall file, `Spunist.exe`. + +  +## The Internet Explorer Customization Wizard 11 does not work with user names that user double-byte character sets +The customization wizard does not work with user names that use double-byte character sets, such as Chinese or Japanese. To fix this, set the **TEMP** and **TMP** environmental variables to a path that does not use these characters (for example, C:\temp). + +1. Open **System Properties**, click the **Advanced** tab, and then click **Environmental Variables**. +2. Click Edit, and then modify the **TEMP** and **TMP** environmental variables to a non-user profile directory. + +  +## Unicode characters are not supported in IEAK 11 path names +While Unicode characters, such as Emoji, are supported for organization names and other branding items, you must not use Unicode characters in any paths associated with running the Internet Explorer Customization Wizard 11. This includes paths to your IEAK 11 installation and to the storage location for your custom packages after they're built. + +## Internet Explorer branding conflicts when using both Unattend and IEAK 11 to customize Internet Explorer settings +Using both Unattend settings and an IEAK custom package to modify a user's version of Internet Explorer 11 might cause a user to lose personalized settings during an upgrade. For example, many manufacturers configure Internet Explorer using Unattend settings. If a user purchases a laptop, and then signs up for Internet service, their Internet Service Provider (ISP) might provide a version of Internet Explorer that has been branded (for example, with a custom homepage for that ISP) using Internet Explorer Customization Wizard 11. If that user later upgrades to a new version of Internet Explorer, the Unattend settings from the laptop manufacturer will be reapplied, overwriting any settings that the user configured for themselves (such as their homepage). + + +## IEAK 11 does not correctly apply the Delete all existing items under Favorites, Favorites Bar and Feeds option +The Internet Explorer Customization Wizard 11 does not correctly apply the **Delete all existing items under Favorites**, **Favorites Bar and Feeds** option, available on the **Browsing Options** page. + +Selecting to include this feature in your customized Internet Explorer package enables the deletion of existing items in the **Favorites** and **Favorites Bar** areas, but it doesn't enable deletion in the **Feeds** area. In addition, this setting adds a new favorite, titled “Web Slice Gallery” to the **Favorites Bar**. + +## F1 does not activate Help on Automatic Version Synchronization page +Pressing the **F1** button on the **Automatic Version Synchronization** page of the Internet Explorer Customization Wizard 11 does not display the **Help** page. Clicking the **Help** button enables you to open the Help system and view information about this page. + +## Certificate installation does not work on IEAK 11 +IEAK 11 doesn't install certificates added using the Add a Root Certificate page of the Internet Explorer Customization Wizard 11. Administrators can manually install certificates using the Certificates Microsoft Management Console snap-in (Certmgr.msc) or using the command-line tool, Certificate Manager (Certmgr.exe). + +>[!NOTE] +>This applies only when using the External licensing mode of IEAK 11. + +## The Additional Settings page appears in the wrong language when using a localized version of IEAK 11 +When using IEAK 11 in other languages, the settings on the Additional Settings page appear in the language of the target platform, regardless of the IEAK 11 language. + +>[!NOTE] +>This applies only when using the Internal licensing mode of IEAK 11. + +To work around this issue, run the customization wizard following these steps: +1. On the **Language Selection** page, select the language that matches the language of your installed IEAK 11. +2. Click **Next**, and then click **Synchronize** on the Automatic Version Synchronization page. +3. After synchronization is complete, cancel the wizard. +4. Repeat these steps for each platform on the Platform Selection page. + +After performing these steps, you must still do the following each time you synchronize a new language and platform: +1. Open File Explorer to the Program Files\Windows IEAK 11 or Program Files (x86)\Windows IEAK 11 folder. +2. Open the **Policies** folder, and then open the appropriate platform folder. +3. Copy the contents of the matching-language folder into the new language folder. + +After completing these steps, the Additional Settings page matches your wizard’s language. + +## Unable to access feeds stored in a subfolder +Adding feeds using the **Favorites**, **Favorites Bar**, and **Feeds** page of the Internet Explorer 11 Customization Wizard requires that the feeds be stored in a single folder. Creating two levels of folders, and creating the feed in the subfolder, causes the feed to fail. From 34d4f658f5f04245c0df78711efc43f25d68c2b5 Mon Sep 17 00:00:00 2001 From: Mike Edgar <49731348+medgarmedgar@users.noreply.github.com> Date: Tue, 17 Sep 2019 14:05:01 -0700 Subject: [PATCH 258/285] Update manage-connections-from-windows-operating-system-components-to-microsoft-services.md --- ...dows-operating-system-components-to-microsoft-services.md | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md index 01c27df311..6914061b54 100644 --- a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md +++ b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md @@ -14,7 +14,7 @@ ms.author: v-medgar manager: sanashar ms.collection: M365-security-compliance ms.topic: article -ms.date: 9/10/2019 +ms.date: 9/17/2019 --- # Manage connections from Windows 10 operating system components to Microsoft services @@ -271,7 +271,6 @@ Find the Cortana Group Policy objects under **Computer Configuration** > **Ad | Allow search and Cortana to use location | Choose whether Cortana and Search can provide location-aware search results.

          **Disable** this policy to block access to location information for Cortana. | | Do not allow web search | Choose whether to search the web from Windows Desktop Search.

          **Enable** this policy to remove the option to search the Internet from Cortana. | | Don't search the web or display web results in Search| Choose whether to search the web from Cortana.

          **Enable** this policy to stop web queries and results from showing in Search. | -| Set what information is shared in Search | Control what information is shared with Bing in Search.

          If you **enable** this policy and set it to **Anonymous info**, usage information will be shared but not search history, Microsoft Account information, or specific location. | You can also apply the Group Policies using the following registry keys: @@ -281,7 +280,7 @@ You can also apply the Group Policies using the following registry keys: | Allow search and Cortana to use location | HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\Windows Search
          REG_DWORD: AllowSearchToUseLocation
          Value: 0 | | Do not allow web search | HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\Windows Search
          REG_DWORD: DisableWebSearch
          Value: 1 | | Don't search the web or display web results in Search| HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\Windows Search
          REG_DWORD: ConnectedSearchUseWeb
          Value: 0 | -| Set what information is shared in Search | HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\Windows Search
          REG_DWORD: ConnectedSearchPrivacy
          Value: 3 | + >[!IMPORTANT] > Using the Group Policy editor these steps are required for all supported versions of Windows 10, however they are not required for devices running Windows 10, version 1607 or Windows Server 2016. From 14aa5561ba8a6286e2f4c4746eab110bce272ac8 Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Tue, 17 Sep 2019 15:28:50 -0700 Subject: [PATCH 259/285] Update change-history-for-microsoft-edge.md --- browsers/edge/change-history-for-microsoft-edge.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/browsers/edge/change-history-for-microsoft-edge.md b/browsers/edge/change-history-for-microsoft-edge.md index cfbace17ef..e02b6ba010 100644 --- a/browsers/edge/change-history-for-microsoft-edge.md +++ b/browsers/edge/change-history-for-microsoft-edge.md @@ -10,7 +10,7 @@ audience: itpro manager: dansimp author: dansimp ms.date: 10/02/2018 -ms.reviewer: +ms.author: dansimp --- # Change history for Microsoft Edge From beb4bb7d66d26379d8fcf721d6abfcf2db6119e6 Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Tue, 17 Sep 2019 15:31:00 -0700 Subject: [PATCH 260/285] Update use-the-enterprise-mode-portal.md fixing broken metadata --- .../ie11-deploy-guide/use-the-enterprise-mode-portal.md | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/browsers/internet-explorer/ie11-deploy-guide/use-the-enterprise-mode-portal.md b/browsers/internet-explorer/ie11-deploy-guide/use-the-enterprise-mode-portal.md index 3dce53865e..c26e39ddcc 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/use-the-enterprise-mode-portal.md +++ b/browsers/internet-explorer/ie11-deploy-guide/use-the-enterprise-mode-portal.md @@ -7,8 +7,9 @@ ms.prod: ie11 title: Use the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros) ms.sitesec: library ms.date: 07/27/2017 -ms.reviewer: -audience: itproanager: dansimp +ms.reviewer: dansimp +audience: itpro +manager: dansimp ms.author: dansimp author: dansimp --- From 3ad8bb1156a313e3328d20b3be62a15e482b5d97 Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Tue, 17 Sep 2019 15:32:23 -0700 Subject: [PATCH 261/285] Update index.md fixing build warning --- browsers/internet-explorer/index.md | 1 + 1 file changed, 1 insertion(+) diff --git a/browsers/internet-explorer/index.md b/browsers/internet-explorer/index.md index 89d5effbdb..6c3085d888 100644 --- a/browsers/internet-explorer/index.md +++ b/browsers/internet-explorer/index.md @@ -2,6 +2,7 @@ ms.mktglfcycl: deploy description: The landing page for IE11 that lets you access the documentation. author: dansimp +ms.author: dansimp ms.prod: ie11 title: Internet Explorer 11 (IE11) (Internet Explorer 11 for IT Pros) assetid: be3dc32e-80d9-4d9f-a802-c7db6c50dbe0 From bd66f675292197ba0d96fcc1562c843dedb743b7 Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Tue, 17 Sep 2019 15:56:48 -0700 Subject: [PATCH 262/285] updating metadata authors --- devices/surface-hub/monitor-surface-hub.md | 4 ++-- .../on-premises-deployment-surface-hub-device-accounts.md | 4 ++-- .../on-premises-deployment-surface-hub-multi-forest.md | 4 ++-- .../online-deployment-surface-hub-device-accounts.md | 4 ++-- ...password-management-for-surface-hub-device-accounts.md | 4 ++-- .../physically-install-your-surface-hub-device.md | 4 ++-- .../prepare-your-environment-for-surface-hub.md | 4 ++-- .../surface-hub/provisioning-packages-for-surface-hub.md | 6 +++--- devices/surface-hub/remote-surface-hub-management.md | 4 ++-- devices/surface-hub/save-bitlocker-key-surface-hub.md | 4 ++-- devices/surface-hub/set-up-your-surface-hub.md | 4 ++-- devices/surface-hub/setup-worksheet-surface-hub.md | 4 ++-- devices/surface-hub/skype-hybrid-voice.md | 6 +++--- devices/surface-hub/support-solutions-surface-hub.md | 4 ++-- devices/surface-hub/surface-hub-authenticator-app.md | 4 ++-- devices/surface-hub/surface-hub-downloads.md | 4 ++-- devices/surface-hub/surface-hub-qos.md | 6 +++--- devices/surface-hub/surface-hub-recovery-tool.md | 4 ++-- devices/surface-hub/surface-hub-site-readiness-guide.md | 8 ++++---- devices/surface-hub/surface-hub-ssd-replacement.md | 4 ++-- devices/surface-hub/surface-hub-technical-55.md | 6 +++--- devices/surface-hub/surface-hub-technical-84.md | 6 +++--- devices/surface-hub/surface-hub-wifi-direct.md | 4 ++-- devices/surface-hub/surfacehub-whats-new-1703.md | 6 +++--- devices/surface-hub/troubleshoot-surface-hub.md | 4 ++-- .../use-fully-qualified-domain-name-surface-hub.md | 4 ++-- .../use-room-control-system-with-surface-hub.md | 4 ++-- devices/surface-hub/whiteboard-collaboration.md | 6 +++--- .../wireless-network-management-for-surface-hub.md | 4 ++-- 29 files changed, 67 insertions(+), 67 deletions(-) diff --git a/devices/surface-hub/monitor-surface-hub.md b/devices/surface-hub/monitor-surface-hub.md index e90e7d8f95..262c565327 100644 --- a/devices/surface-hub/monitor-surface-hub.md +++ b/devices/surface-hub/monitor-surface-hub.md @@ -7,8 +7,8 @@ manager: dansimp keywords: monitor Surface Hub, Microsoft Operations Management Suite, OMS ms.prod: surface-hub ms.sitesec: library -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.topic: article ms.date: 07/27/2017 ms.localizationpriority: medium diff --git a/devices/surface-hub/on-premises-deployment-surface-hub-device-accounts.md b/devices/surface-hub/on-premises-deployment-surface-hub-device-accounts.md index 2e9e29bded..d3fdb628ab 100644 --- a/devices/surface-hub/on-premises-deployment-surface-hub-device-accounts.md +++ b/devices/surface-hub/on-premises-deployment-surface-hub-device-accounts.md @@ -7,8 +7,8 @@ manager: dansimp keywords: single forest deployment, on prem deployment, device account, Surface Hub ms.prod: surface-hub ms.sitesec: library -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.date: 08/28/2018 ms.localizationpriority: medium --- diff --git a/devices/surface-hub/on-premises-deployment-surface-hub-multi-forest.md b/devices/surface-hub/on-premises-deployment-surface-hub-multi-forest.md index e3754d3e15..f643e4cfe6 100644 --- a/devices/surface-hub/on-premises-deployment-surface-hub-multi-forest.md +++ b/devices/surface-hub/on-premises-deployment-surface-hub-multi-forest.md @@ -4,8 +4,8 @@ description: This topic explains how you add a device account for your Microsoft keywords: multi forest deployment, on prem deployment, device account, Surface Hub ms.prod: surface-hub ms.sitesec: library -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.date: 08/28/2018 ms.reviewer: manager: dansimp diff --git a/devices/surface-hub/online-deployment-surface-hub-device-accounts.md b/devices/surface-hub/online-deployment-surface-hub-device-accounts.md index df1bf821b4..a072d4d7b4 100644 --- a/devices/surface-hub/online-deployment-surface-hub-device-accounts.md +++ b/devices/surface-hub/online-deployment-surface-hub-device-accounts.md @@ -7,8 +7,8 @@ manager: dansimp keywords: device account for Surface Hub, online deployment ms.prod: surface-hub ms.sitesec: library -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.topic: article ms.date: 02/21/2018 ms.localizationpriority: medium diff --git a/devices/surface-hub/password-management-for-surface-hub-device-accounts.md b/devices/surface-hub/password-management-for-surface-hub-device-accounts.md index 283520ee40..22e7e1284c 100644 --- a/devices/surface-hub/password-management-for-surface-hub-device-accounts.md +++ b/devices/surface-hub/password-management-for-surface-hub-device-accounts.md @@ -7,8 +7,8 @@ manager: dansimp keywords: password, password management, password rotation, device account ms.prod: surface-hub ms.sitesec: library -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.topic: article ms.date: 07/27/2017 ms.localizationpriority: medium diff --git a/devices/surface-hub/physically-install-your-surface-hub-device.md b/devices/surface-hub/physically-install-your-surface-hub-device.md index 32a8f0f5ff..6d06a9ac69 100644 --- a/devices/surface-hub/physically-install-your-surface-hub-device.md +++ b/devices/surface-hub/physically-install-your-surface-hub-device.md @@ -7,8 +7,8 @@ manager: dansimp keywords: Surface Hub, readiness guide, installation location, mounting options ms.prod: surface-hub ms.sitesec: library -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.topic: article ms.date: 07/27/2017 ms.localizationpriority: medium diff --git a/devices/surface-hub/prepare-your-environment-for-surface-hub.md b/devices/surface-hub/prepare-your-environment-for-surface-hub.md index d5c4c22cea..a6eb33d8f4 100644 --- a/devices/surface-hub/prepare-your-environment-for-surface-hub.md +++ b/devices/surface-hub/prepare-your-environment-for-surface-hub.md @@ -7,8 +7,8 @@ manager: dansimp keywords: prepare environment, features of Surface Hub, create and test device account, check network availability ms.prod: surface-hub ms.sitesec: library -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.topic: article ms.date: 12/04/2017 ms.localizationpriority: medium diff --git a/devices/surface-hub/provisioning-packages-for-surface-hub.md b/devices/surface-hub/provisioning-packages-for-surface-hub.md index 2f47ffd5f8..607c66829e 100644 --- a/devices/surface-hub/provisioning-packages-for-surface-hub.md +++ b/devices/surface-hub/provisioning-packages-for-surface-hub.md @@ -1,14 +1,14 @@ --- title: Create provisioning packages (Surface Hub) -description: For Windows 10, settings that use the registry or a configuration service provider (CSP) can be configured using provisioning packages. +description: For Windows 10, settings that use the registry or a configuration service provider (CSP) can be configured using provisioning packages. ms.assetid: 8AA25BD4-8A8F-4B95-9268-504A49BA5345 ms.reviewer: manager: dansimp keywords: add certificate, provisioning package ms.prod: surface-hub ms.sitesec: library -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.topic: article ms.date: 03/16/2019 ms.localizationpriority: medium diff --git a/devices/surface-hub/remote-surface-hub-management.md b/devices/surface-hub/remote-surface-hub-management.md index 9d435f4650..7a9acbe0fd 100644 --- a/devices/surface-hub/remote-surface-hub-management.md +++ b/devices/surface-hub/remote-surface-hub-management.md @@ -4,8 +4,8 @@ description: This section lists topics for managing Surface Hub. keywords: remote management, MDM, install apps, monitor Surface Hub, Operations Management Suite, OMS ms.prod: surface-hub ms.sitesec: library -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.topic: article ms.date: 07/27/2017 ms.reviewer: diff --git a/devices/surface-hub/save-bitlocker-key-surface-hub.md b/devices/surface-hub/save-bitlocker-key-surface-hub.md index acd4207515..6bbfd1532a 100644 --- a/devices/surface-hub/save-bitlocker-key-surface-hub.md +++ b/devices/surface-hub/save-bitlocker-key-surface-hub.md @@ -7,8 +7,8 @@ manager: dansimp keywords: Surface Hub, BitLocker, Bitlocker recovery keys ms.prod: surface-hub ms.sitesec: library -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.topic: article ms.date: 07/08/2019 ms.localizationpriority: medium diff --git a/devices/surface-hub/set-up-your-surface-hub.md b/devices/surface-hub/set-up-your-surface-hub.md index d329156bb0..96f42c3df1 100644 --- a/devices/surface-hub/set-up-your-surface-hub.md +++ b/devices/surface-hub/set-up-your-surface-hub.md @@ -7,8 +7,8 @@ manager: dansimp keywords: set up instructions, Surface Hub, setup worksheet, first-run program ms.prod: surface-hub ms.sitesec: library -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.topic: article ms.date: 07/27/2017 ms.localizationpriority: medium diff --git a/devices/surface-hub/setup-worksheet-surface-hub.md b/devices/surface-hub/setup-worksheet-surface-hub.md index 46479063ed..6043d88f1d 100644 --- a/devices/surface-hub/setup-worksheet-surface-hub.md +++ b/devices/surface-hub/setup-worksheet-surface-hub.md @@ -7,8 +7,8 @@ manager: dansimp keywords: Setup worksheet, pre-setup, first-time setup ms.prod: surface-hub ms.sitesec: library -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.topic: article ms.date: 06/20/2019 ms.localizationpriority: medium diff --git a/devices/surface-hub/skype-hybrid-voice.md b/devices/surface-hub/skype-hybrid-voice.md index c60e7826dc..c805fb9005 100644 --- a/devices/surface-hub/skype-hybrid-voice.md +++ b/devices/surface-hub/skype-hybrid-voice.md @@ -1,11 +1,11 @@ --- title: Online or hybrid deployment using Skype Hybrid Voice environment (Surface Hub) description: This topic explains how to enable Skype for Business Cloud PBX with on premises PSTN connectivity via Cloud Connector Edition or Skype for Business 2015 pool. -keywords: hybrid deployment, Skype Hybrid Voice +keywords: hybrid deployment, Skype Hybrid Voice ms.prod: surface-hub ms.sitesec: library -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.topic: article ms.date: 07/27/2017 ms.reviewer: diff --git a/devices/surface-hub/support-solutions-surface-hub.md b/devices/surface-hub/support-solutions-surface-hub.md index 81eba249eb..b683f85daf 100644 --- a/devices/surface-hub/support-solutions-surface-hub.md +++ b/devices/surface-hub/support-solutions-surface-hub.md @@ -7,8 +7,8 @@ manager: dansimp keywords: Troubleshoot common problems, setup issues ms.prod: surface-hub ms.sitesec: library -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.topic: article ms.date: 10/24/2017 ms.localizationpriority: medium diff --git a/devices/surface-hub/surface-hub-authenticator-app.md b/devices/surface-hub/surface-hub-authenticator-app.md index 2ffa84dd12..9ad0606641 100644 --- a/devices/surface-hub/surface-hub-authenticator-app.md +++ b/devices/surface-hub/surface-hub-authenticator-app.md @@ -3,8 +3,8 @@ title: Sign in to Surface Hub with Microsoft Authenticator description: Use Microsoft Authenticator on your mobile device to sign in to Surface Hub. ms.prod: surface-hub ms.sitesec: library -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.topic: article ms.date: 08/28/2017 ms.reviewer: diff --git a/devices/surface-hub/surface-hub-downloads.md b/devices/surface-hub/surface-hub-downloads.md index 8f92a6b3a0..5e5073588a 100644 --- a/devices/surface-hub/surface-hub-downloads.md +++ b/devices/surface-hub/surface-hub-downloads.md @@ -3,8 +3,8 @@ title: Useful downloads for Microsoft Surface Hub description: Downloads related to the Microsoft Surface Hub. ms.prod: surface-hub ms.sitesec: library -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.topic: article ms.date: 08/22/2017 ms.reviewer: diff --git a/devices/surface-hub/surface-hub-qos.md b/devices/surface-hub/surface-hub-qos.md index 589cfcfcdf..105a188ae1 100644 --- a/devices/surface-hub/surface-hub-qos.md +++ b/devices/surface-hub/surface-hub-qos.md @@ -1,12 +1,12 @@ --- -title: Implement Quality of Service on Surface Hub +title: Implement Quality of Service on Surface Hub ms.reviewer: manager: dansimp description: Learn how to configure QoS on Surface Hub. ms.prod: surface-hub ms.sitesec: library -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.topic: article ms.localizationpriority: medium --- diff --git a/devices/surface-hub/surface-hub-recovery-tool.md b/devices/surface-hub/surface-hub-recovery-tool.md index f1f6a52a05..7d21b8c921 100644 --- a/devices/surface-hub/surface-hub-recovery-tool.md +++ b/devices/surface-hub/surface-hub-recovery-tool.md @@ -7,8 +7,8 @@ manager: dansimp keywords: manage Surface Hub ms.prod: surface-hub ms.sitesec: library -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.topic: article ms.date: 05/22/2018 ms.localizationpriority: medium diff --git a/devices/surface-hub/surface-hub-site-readiness-guide.md b/devices/surface-hub/surface-hub-site-readiness-guide.md index 44e8717278..cf21867432 100644 --- a/devices/surface-hub/surface-hub-site-readiness-guide.md +++ b/devices/surface-hub/surface-hub-site-readiness-guide.md @@ -1,12 +1,12 @@ --- -title: Surface Hub Site Readiness Guide +title: Surface Hub Site Readiness Guide ms.reviewer: manager: dansimp -description: Use this Site Readiness Guide to help plan your Surface Hub installation. +description: Use this Site Readiness Guide to help plan your Surface Hub installation. ms.prod: surface-hub ms.sitesec: library -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.topic: article ms.localizationpriority: medium --- diff --git a/devices/surface-hub/surface-hub-ssd-replacement.md b/devices/surface-hub/surface-hub-ssd-replacement.md index 363f1e6e81..7896a7d634 100644 --- a/devices/surface-hub/surface-hub-ssd-replacement.md +++ b/devices/surface-hub/surface-hub-ssd-replacement.md @@ -5,8 +5,8 @@ manager: dansimp description: Learn how to replace the solid state drive in a Surface Hub. ms.prod: surface-hub ms.sitesec: library -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.topic: article ms.localizationpriority: medium --- diff --git a/devices/surface-hub/surface-hub-technical-55.md b/devices/surface-hub/surface-hub-technical-55.md index 353347476f..6abc46e411 100644 --- a/devices/surface-hub/surface-hub-technical-55.md +++ b/devices/surface-hub/surface-hub-technical-55.md @@ -1,12 +1,12 @@ --- -title: Technical information for 55" Surface Hub +title: Technical information for 55" Surface Hub ms.reviewer: manager: dansimp description: Specifications for the 55" Surface Hub ms.prod: surface-hub ms.sitesec: library -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.topic: article ms.localizationpriority: medium --- diff --git a/devices/surface-hub/surface-hub-technical-84.md b/devices/surface-hub/surface-hub-technical-84.md index fb52cf8797..0ba7d45aa1 100644 --- a/devices/surface-hub/surface-hub-technical-84.md +++ b/devices/surface-hub/surface-hub-technical-84.md @@ -1,12 +1,12 @@ --- -title: Technical information for 84" Surface Hub +title: Technical information for 84" Surface Hub ms.reviewer: manager: dansimp description: Specifications for the 84" Surface Hub ms.prod: surface-hub ms.sitesec: library -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.topic: article ms.localizationpriority: medium --- diff --git a/devices/surface-hub/surface-hub-wifi-direct.md b/devices/surface-hub/surface-hub-wifi-direct.md index 5d8fad351d..5120dc9b9c 100644 --- a/devices/surface-hub/surface-hub-wifi-direct.md +++ b/devices/surface-hub/surface-hub-wifi-direct.md @@ -4,8 +4,8 @@ description: This topic provides guidance on Wi-Fi Direct security risks. keywords: change history ms.prod: surface-hub ms.sitesec: library -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.topic: article ms.date: 06/20/2019 ms.reviewer: diff --git a/devices/surface-hub/surfacehub-whats-new-1703.md b/devices/surface-hub/surfacehub-whats-new-1703.md index 1f9447ff87..0626c4a0d7 100644 --- a/devices/surface-hub/surfacehub-whats-new-1703.md +++ b/devices/surface-hub/surfacehub-whats-new-1703.md @@ -1,10 +1,10 @@ --- -title: What's new in Windows 10, version 1703 for Surface Hub +title: What's new in Windows 10, version 1703 for Surface Hub description: Windows 10, version 1703 (Creators Update) brings new features to Microsoft Surface Hub. ms.prod: surface-hub ms.sitesec: library -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.topic: article ms.date: 01/18/2018 ms.reviewer: diff --git a/devices/surface-hub/troubleshoot-surface-hub.md b/devices/surface-hub/troubleshoot-surface-hub.md index c67203853d..af6809a477 100644 --- a/devices/surface-hub/troubleshoot-surface-hub.md +++ b/devices/surface-hub/troubleshoot-surface-hub.md @@ -7,8 +7,8 @@ manager: dansimp keywords: Troubleshoot common problems, setup issues, Exchange ActiveSync errors ms.prod: surface-hub ms.sitesec: library -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.topic: article ms.date: 03/16/2018 ms.localizationpriority: medium diff --git a/devices/surface-hub/use-fully-qualified-domain-name-surface-hub.md b/devices/surface-hub/use-fully-qualified-domain-name-surface-hub.md index 57f4f3faa0..33233a023b 100644 --- a/devices/surface-hub/use-fully-qualified-domain-name-surface-hub.md +++ b/devices/surface-hub/use-fully-qualified-domain-name-surface-hub.md @@ -2,8 +2,8 @@ title: Use fully qualified domain name with Surface Hub description: Troubleshoot common problems, including setup issues, Exchange ActiveSync errors. keywords: ["Troubleshoot common problems", "setup issues", "Exchange ActiveSync errors"] -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.topic: article ms.date: 07/27/2017 ms.reviewer: diff --git a/devices/surface-hub/use-room-control-system-with-surface-hub.md b/devices/surface-hub/use-room-control-system-with-surface-hub.md index e18ca0fcd5..cbc437e783 100644 --- a/devices/surface-hub/use-room-control-system-with-surface-hub.md +++ b/devices/surface-hub/use-room-control-system-with-surface-hub.md @@ -7,8 +7,8 @@ manager: dansimp keywords: room control system, Surface Hub ms.prod: surface-hub ms.sitesec: library -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.topic: article ms.date: 07/27/2017 ms.localizationpriority: medium diff --git a/devices/surface-hub/whiteboard-collaboration.md b/devices/surface-hub/whiteboard-collaboration.md index 1b85feaf12..a6e9524cd2 100644 --- a/devices/surface-hub/whiteboard-collaboration.md +++ b/devices/surface-hub/whiteboard-collaboration.md @@ -1,10 +1,10 @@ --- -title: Set up and use Microsoft Whiteboard +title: Set up and use Microsoft Whiteboard description: Microsoft Whiteboard’s latest update includes the capability for two Surface Hubs to collaborate in real time on the same board. ms.prod: surface-hub ms.sitesec: library -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.topic: article ms.date: 03/18/2019 ms.reviewer: diff --git a/devices/surface-hub/wireless-network-management-for-surface-hub.md b/devices/surface-hub/wireless-network-management-for-surface-hub.md index 5e17e464a9..0a314fe596 100644 --- a/devices/surface-hub/wireless-network-management-for-surface-hub.md +++ b/devices/surface-hub/wireless-network-management-for-surface-hub.md @@ -7,8 +7,8 @@ manager: dansimp keywords: network connectivity, wired connection ms.prod: surface-hub ms.sitesec: library -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.topic: article ms.date: 07/27/2017 ms.localizationpriority: medium From fbb6e3ea76224360ec60114c48e5c8d18449c0e1 Mon Sep 17 00:00:00 2001 From: John Liu <49762389+ShenLanJohn@users.noreply.github.com> Date: Tue, 17 Sep 2019 17:57:39 -0700 Subject: [PATCH 263/285] CAT Auto Pulish for Windows Release Messages - CAT_AutoPublish_20190917172123 (#1133) --- .../resolved-issues-windows-10-1607.yml | 10 ++++++++++ .../resolved-issues-windows-10-1703.yml | 10 ++++++++++ .../status-windows-10-1607-and-windows-server-2016.yml | 4 ++-- windows/release-information/status-windows-10-1703.yml | 4 ++-- 4 files changed, 24 insertions(+), 4 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1607.yml b/windows/release-information/resolved-issues-windows-10-1607.yml index ec69b6c4fc..f2e5cd3bcb 100644 --- a/windows/release-information/resolved-issues-windows-10-1607.yml +++ b/windows/release-information/resolved-issues-windows-10-1607.yml @@ -32,6 +32,7 @@ sections: - type: markdown text: " + @@ -64,6 +65,15 @@ sections:
          " +- title: September 2019 +- items: + - type: markdown + text: " +
          SummaryOriginating updateStatusDate resolved
          IME may become unresponsive or have High CPU usage
          Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.

          See details >
          OS Build 14393.3204

          September 10, 2019
          KB4516044
          Resolved
          September 17, 2019
          04:47 PM PT
          Apps and scripts using the NetQueryDisplayInformation API may fail with error
          Applications and scripts that call the NetQueryDisplayInformation API or the WinNT provider equivalent may fail to return results after the first page of data.

          See details >
          OS Build 14393.3053

          June 18, 2019
          KB4503294
          Resolved
          KB4516044
          September 10, 2019
          10:00 AM PT
          Domain connected devices that use MIT Kerberos realms will not start up
          Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

          See details >
          OS Build 14393.3115

          July 16, 2019
          KB4507459
          Resolved
          KB4512517
          August 13, 2019
          10:00 AM PT
          Devices starting using PXE from a WDS or SCCM servers may fail to start
          Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

          See details >
          OS Build 14393.3025

          June 11, 2019
          KB4503267
          Resolved
          KB4512495
          August 17, 2019
          02:00 PM PT
          + +
          DetailsOriginating updateStatusHistory
          IME may become unresponsive or have High CPU usage
          Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include Chinese Simplified (ChsIME.EXE) and Chinese Traditional (ChtIME.EXE) with Changjie/Quick keyboard.


          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
          • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
          Resolution: After investigation, we have found that this issue does not affect this version of Windows.

          Back to top
          OS Build 14393.3204

          September 10, 2019
          KB4516044
          Resolved
          Resolved:
          September 17, 2019
          04:47 PM PT

          Opened:
          September 13, 2019
          05:25 PM PT
          + " + - title: August 2019 - items: - type: markdown diff --git a/windows/release-information/resolved-issues-windows-10-1703.yml b/windows/release-information/resolved-issues-windows-10-1703.yml index 0a16421180..a15dc08538 100644 --- a/windows/release-information/resolved-issues-windows-10-1703.yml +++ b/windows/release-information/resolved-issues-windows-10-1703.yml @@ -32,6 +32,7 @@ sections: - type: markdown text: " + @@ -55,6 +56,15 @@ sections:
          " +- title: September 2019 +- items: + - type: markdown + text: " +
          SummaryOriginating updateStatusDate resolved
          IME may become unresponsive or have High CPU usage
          Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.

          See details >
          OS Build 15063.2045

          September 10, 2019
          KB4516068
          Resolved
          September 17, 2019
          04:47 PM PT
          Domain connected devices that use MIT Kerberos realms will not start up
          Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

          See details >
          OS Build 15063.1955

          July 16, 2019
          KB4507467
          Resolved
          KB4512507
          August 13, 2019
          10:00 AM PT
          Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
          Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

          See details >
          OS Build 15063.1988

          August 13, 2019
          KB4512507
          Resolved
          KB4512474
          August 17, 2019
          02:00 PM PT
          MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
          You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

          See details >
          OS Build 15063.1868

          June 11, 2019
          KB4503279
          Resolved External
          August 09, 2019
          07:03 PM PT
          + +
          DetailsOriginating updateStatusHistory
          IME may become unresponsive or have High CPU usage
          Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include Chinese Simplified (ChsIME.EXE) and Chinese Traditional (ChtIME.EXE) with Changjie/Quick keyboard.


          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
          • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
          Resolution: After investigation, we have found that this issue does not affect this version of Windows.

          Back to top
          OS Build 15063.2045

          September 10, 2019
          KB4516068
          Resolved
          Resolved:
          September 17, 2019
          04:47 PM PT

          Opened:
          September 13, 2019
          05:25 PM PT
          + " + - title: August 2019 - items: - type: markdown diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index 0ff7c2541d..f2f699cd5b 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -60,7 +60,7 @@ sections: - type: markdown text: "
          This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

          - + @@ -82,7 +82,7 @@ sections: - type: markdown text: "
          SummaryOriginating updateStatusLast updated
          IME may become unresponsive or have High CPU usage
          Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.

          See details >
          OS Build 14393.3204

          September 10, 2019
          KB4516044
          Mitigated
          September 16, 2019
          05:36 PM PT
          IME may become unresponsive or have High CPU usage
          Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.

          See details >
          OS Build 14393.3204

          September 10, 2019
          KB4516044
          Resolved
          September 17, 2019
          04:47 PM PT
          Apps and scripts using the NetQueryDisplayInformation API may fail with error
          Applications and scripts that call the NetQueryDisplayInformation API or the WinNT provider equivalent may fail to return results after the first page of data.

          See details >
          OS Build 14393.3053

          June 18, 2019
          KB4503294
          Resolved
          KB4516044
          September 10, 2019
          10:00 AM PT
          Domain connected devices that use MIT Kerberos realms will not start up
          Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

          See details >
          OS Build 14393.3115

          July 16, 2019
          KB4507459
          Resolved
          KB4512517
          August 13, 2019
          10:00 AM PT
          Devices starting using PXE from a WDS or SCCM servers may fail to start
          Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

          See details >
          OS Build 14393.3025

          June 11, 2019
          KB4503267
          Resolved
          KB4512495
          August 17, 2019
          02:00 PM PT
          - +
          DetailsOriginating updateStatusHistory
          IME may become unresponsive or have High CPU usage
          Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include Chinese Simplified (ChsIME.EXE) and Chinese Traditional (ChtIME.EXE) with Changjie/Quick keyboard.


          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
          • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016

          Workaround: To mitigate the issue, perform the following steps:
          1. Select the Start button and type Services.
          2. Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
          3. Locate Startup type: and change it to Manual
          4. Select Ok
          5. The TabletInputService service is now in the default configuration and IME should work as expected.

          Next steps: We are working on a resolution and will provide an update in an upcoming release.

          Back to top
          OS Build 14393.3204

          September 10, 2019
          KB4516044
          Mitigated
          Last updated:
          September 16, 2019
          05:36 PM PT

          Opened:
          September 13, 2019
          05:25 PM PT
          IME may become unresponsive or have High CPU usage
          Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include Chinese Simplified (ChsIME.EXE) and Chinese Traditional (ChtIME.EXE) with Changjie/Quick keyboard.


          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
          • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
          Resolution: After investigation, we have found that this issue does not affect this version of Windows.

          Back to top
          OS Build 14393.3204

          September 10, 2019
          KB4516044
          Resolved
          Resolved:
          September 17, 2019
          04:47 PM PT

          Opened:
          September 13, 2019
          05:25 PM PT
          " diff --git a/windows/release-information/status-windows-10-1703.yml b/windows/release-information/status-windows-10-1703.yml index 9a00aca54d..c9f01b66d5 100644 --- a/windows/release-information/status-windows-10-1703.yml +++ b/windows/release-information/status-windows-10-1703.yml @@ -66,7 +66,7 @@ sections: - type: markdown text: "
          This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

          - +
          SummaryOriginating updateStatusLast updated
          IME may become unresponsive or have High CPU usage
          Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.

          See details >
          OS Build 15063.2045

          September 10, 2019
          KB4516068
          Mitigated
          September 16, 2019
          05:36 PM PT
          IME may become unresponsive or have High CPU usage
          Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.

          See details >
          OS Build 15063.2045

          September 10, 2019
          KB4516068
          Resolved
          September 17, 2019
          04:47 PM PT
          Domain connected devices that use MIT Kerberos realms will not start up
          Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

          See details >
          OS Build 15063.1955

          July 16, 2019
          KB4507467
          Resolved
          KB4512507
          August 13, 2019
          10:00 AM PT
          Certain operations performed on a Cluster Shared Volume may fail
          Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

          See details >
          OS Build 15063.1563

          January 08, 2019
          KB4480973
          Mitigated
          April 25, 2019
          02:00 PM PT
          @@ -84,7 +84,7 @@ sections: - type: markdown text: " - +
          DetailsOriginating updateStatusHistory
          IME may become unresponsive or have High CPU usage
          Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include Chinese Simplified (ChsIME.EXE) and Chinese Traditional (ChtIME.EXE) with Changjie/Quick keyboard.


          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
          • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016

          Workaround: To mitigate the issue, perform the following steps:
          1. Select the Start button and type Services.
          2. Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
          3. Locate Startup type: and change it to Manual
          4. Select Ok
          5. The TabletInputService service is now in the default configuration and IME should work as expected.

          Next steps: We are working on a resolution and will provide an update in an upcoming release.

          Back to top
          OS Build 15063.2045

          September 10, 2019
          KB4516068
          Mitigated
          Last updated:
          September 16, 2019
          05:36 PM PT

          Opened:
          September 13, 2019
          05:25 PM PT
          IME may become unresponsive or have High CPU usage
          Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include Chinese Simplified (ChsIME.EXE) and Chinese Traditional (ChtIME.EXE) with Changjie/Quick keyboard.


          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
          • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
          Resolution: After investigation, we have found that this issue does not affect this version of Windows.

          Back to top
          OS Build 15063.2045

          September 10, 2019
          KB4516068
          Resolved
          Resolved:
          September 17, 2019
          04:47 PM PT

          Opened:
          September 13, 2019
          05:25 PM PT
          " From 7e334e91868ed77046889a4b1510e06b19813db1 Mon Sep 17 00:00:00 2001 From: John Liu <49762389+ShenLanJohn@users.noreply.github.com> Date: Tue, 17 Sep 2019 18:26:10 -0700 Subject: [PATCH 264/285] CAT Auto Pulish for Windows Release Messages - CAT_AutoPublish_20190917172123 (#1133) (#1134) --- .../resolved-issues-windows-10-1607.yml | 10 ++++++++++ .../resolved-issues-windows-10-1703.yml | 10 ++++++++++ .../status-windows-10-1607-and-windows-server-2016.yml | 4 ++-- windows/release-information/status-windows-10-1703.yml | 4 ++-- 4 files changed, 24 insertions(+), 4 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1607.yml b/windows/release-information/resolved-issues-windows-10-1607.yml index ec69b6c4fc..f2e5cd3bcb 100644 --- a/windows/release-information/resolved-issues-windows-10-1607.yml +++ b/windows/release-information/resolved-issues-windows-10-1607.yml @@ -32,6 +32,7 @@ sections: - type: markdown text: " + @@ -64,6 +65,15 @@ sections:
          " +- title: September 2019 +- items: + - type: markdown + text: " +
          SummaryOriginating updateStatusDate resolved
          IME may become unresponsive or have High CPU usage
          Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.

          See details >
          OS Build 14393.3204

          September 10, 2019
          KB4516044
          Resolved
          September 17, 2019
          04:47 PM PT
          Apps and scripts using the NetQueryDisplayInformation API may fail with error
          Applications and scripts that call the NetQueryDisplayInformation API or the WinNT provider equivalent may fail to return results after the first page of data.

          See details >
          OS Build 14393.3053

          June 18, 2019
          KB4503294
          Resolved
          KB4516044
          September 10, 2019
          10:00 AM PT
          Domain connected devices that use MIT Kerberos realms will not start up
          Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

          See details >
          OS Build 14393.3115

          July 16, 2019
          KB4507459
          Resolved
          KB4512517
          August 13, 2019
          10:00 AM PT
          Devices starting using PXE from a WDS or SCCM servers may fail to start
          Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

          See details >
          OS Build 14393.3025

          June 11, 2019
          KB4503267
          Resolved
          KB4512495
          August 17, 2019
          02:00 PM PT
          + +
          DetailsOriginating updateStatusHistory
          IME may become unresponsive or have High CPU usage
          Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include Chinese Simplified (ChsIME.EXE) and Chinese Traditional (ChtIME.EXE) with Changjie/Quick keyboard.


          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
          • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
          Resolution: After investigation, we have found that this issue does not affect this version of Windows.

          Back to top
          OS Build 14393.3204

          September 10, 2019
          KB4516044
          Resolved
          Resolved:
          September 17, 2019
          04:47 PM PT

          Opened:
          September 13, 2019
          05:25 PM PT
          + " + - title: August 2019 - items: - type: markdown diff --git a/windows/release-information/resolved-issues-windows-10-1703.yml b/windows/release-information/resolved-issues-windows-10-1703.yml index 0a16421180..a15dc08538 100644 --- a/windows/release-information/resolved-issues-windows-10-1703.yml +++ b/windows/release-information/resolved-issues-windows-10-1703.yml @@ -32,6 +32,7 @@ sections: - type: markdown text: " + @@ -55,6 +56,15 @@ sections:
          " +- title: September 2019 +- items: + - type: markdown + text: " +
          SummaryOriginating updateStatusDate resolved
          IME may become unresponsive or have High CPU usage
          Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.

          See details >
          OS Build 15063.2045

          September 10, 2019
          KB4516068
          Resolved
          September 17, 2019
          04:47 PM PT
          Domain connected devices that use MIT Kerberos realms will not start up
          Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

          See details >
          OS Build 15063.1955

          July 16, 2019
          KB4507467
          Resolved
          KB4512507
          August 13, 2019
          10:00 AM PT
          Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
          Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.

          See details >
          OS Build 15063.1988

          August 13, 2019
          KB4512507
          Resolved
          KB4512474
          August 17, 2019
          02:00 PM PT
          MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
          You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on Windows devices that installed updates on June 11, 2019 or later.

          See details >
          OS Build 15063.1868

          June 11, 2019
          KB4503279
          Resolved External
          August 09, 2019
          07:03 PM PT
          + +
          DetailsOriginating updateStatusHistory
          IME may become unresponsive or have High CPU usage
          Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include Chinese Simplified (ChsIME.EXE) and Chinese Traditional (ChtIME.EXE) with Changjie/Quick keyboard.


          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
          • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
          Resolution: After investigation, we have found that this issue does not affect this version of Windows.

          Back to top
          OS Build 15063.2045

          September 10, 2019
          KB4516068
          Resolved
          Resolved:
          September 17, 2019
          04:47 PM PT

          Opened:
          September 13, 2019
          05:25 PM PT
          + " + - title: August 2019 - items: - type: markdown diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index 0ff7c2541d..f2f699cd5b 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -60,7 +60,7 @@ sections: - type: markdown text: "
          This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

          - + @@ -82,7 +82,7 @@ sections: - type: markdown text: "
          SummaryOriginating updateStatusLast updated
          IME may become unresponsive or have High CPU usage
          Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.

          See details >
          OS Build 14393.3204

          September 10, 2019
          KB4516044
          Mitigated
          September 16, 2019
          05:36 PM PT
          IME may become unresponsive or have High CPU usage
          Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.

          See details >
          OS Build 14393.3204

          September 10, 2019
          KB4516044
          Resolved
          September 17, 2019
          04:47 PM PT
          Apps and scripts using the NetQueryDisplayInformation API may fail with error
          Applications and scripts that call the NetQueryDisplayInformation API or the WinNT provider equivalent may fail to return results after the first page of data.

          See details >
          OS Build 14393.3053

          June 18, 2019
          KB4503294
          Resolved
          KB4516044
          September 10, 2019
          10:00 AM PT
          Domain connected devices that use MIT Kerberos realms will not start up
          Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

          See details >
          OS Build 14393.3115

          July 16, 2019
          KB4507459
          Resolved
          KB4512517
          August 13, 2019
          10:00 AM PT
          Devices starting using PXE from a WDS or SCCM servers may fail to start
          Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

          See details >
          OS Build 14393.3025

          June 11, 2019
          KB4503267
          Resolved
          KB4512495
          August 17, 2019
          02:00 PM PT
          - +
          DetailsOriginating updateStatusHistory
          IME may become unresponsive or have High CPU usage
          Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include Chinese Simplified (ChsIME.EXE) and Chinese Traditional (ChtIME.EXE) with Changjie/Quick keyboard.


          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
          • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016

          Workaround: To mitigate the issue, perform the following steps:
          1. Select the Start button and type Services.
          2. Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
          3. Locate Startup type: and change it to Manual
          4. Select Ok
          5. The TabletInputService service is now in the default configuration and IME should work as expected.

          Next steps: We are working on a resolution and will provide an update in an upcoming release.

          Back to top
          OS Build 14393.3204

          September 10, 2019
          KB4516044
          Mitigated
          Last updated:
          September 16, 2019
          05:36 PM PT

          Opened:
          September 13, 2019
          05:25 PM PT
          IME may become unresponsive or have High CPU usage
          Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include Chinese Simplified (ChsIME.EXE) and Chinese Traditional (ChtIME.EXE) with Changjie/Quick keyboard.


          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
          • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
          Resolution: After investigation, we have found that this issue does not affect this version of Windows.

          Back to top
          OS Build 14393.3204

          September 10, 2019
          KB4516044
          Resolved
          Resolved:
          September 17, 2019
          04:47 PM PT

          Opened:
          September 13, 2019
          05:25 PM PT
          " diff --git a/windows/release-information/status-windows-10-1703.yml b/windows/release-information/status-windows-10-1703.yml index 9a00aca54d..c9f01b66d5 100644 --- a/windows/release-information/status-windows-10-1703.yml +++ b/windows/release-information/status-windows-10-1703.yml @@ -66,7 +66,7 @@ sections: - type: markdown text: "
          This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

          - +
          SummaryOriginating updateStatusLast updated
          IME may become unresponsive or have High CPU usage
          Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.

          See details >
          OS Build 15063.2045

          September 10, 2019
          KB4516068
          Mitigated
          September 16, 2019
          05:36 PM PT
          IME may become unresponsive or have High CPU usage
          Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.

          See details >
          OS Build 15063.2045

          September 10, 2019
          KB4516068
          Resolved
          September 17, 2019
          04:47 PM PT
          Domain connected devices that use MIT Kerberos realms will not start up
          Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.

          See details >
          OS Build 15063.1955

          July 16, 2019
          KB4507467
          Resolved
          KB4512507
          August 13, 2019
          10:00 AM PT
          Certain operations performed on a Cluster Shared Volume may fail
          Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

          See details >
          OS Build 15063.1563

          January 08, 2019
          KB4480973
          Mitigated
          April 25, 2019
          02:00 PM PT
          @@ -84,7 +84,7 @@ sections: - type: markdown text: " - +
          DetailsOriginating updateStatusHistory
          IME may become unresponsive or have High CPU usage
          Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include Chinese Simplified (ChsIME.EXE) and Chinese Traditional (ChtIME.EXE) with Changjie/Quick keyboard.


          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
          • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016

          Workaround: To mitigate the issue, perform the following steps:
          1. Select the Start button and type Services.
          2. Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
          3. Locate Startup type: and change it to Manual
          4. Select Ok
          5. The TabletInputService service is now in the default configuration and IME should work as expected.

          Next steps: We are working on a resolution and will provide an update in an upcoming release.

          Back to top
          OS Build 15063.2045

          September 10, 2019
          KB4516068
          Mitigated
          Last updated:
          September 16, 2019
          05:36 PM PT

          Opened:
          September 13, 2019
          05:25 PM PT
          IME may become unresponsive or have High CPU usage
          Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include Chinese Simplified (ChsIME.EXE) and Chinese Traditional (ChtIME.EXE) with Changjie/Quick keyboard.


          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
          • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
          Resolution: After investigation, we have found that this issue does not affect this version of Windows.

          Back to top
          OS Build 15063.2045

          September 10, 2019
          KB4516068
          Resolved
          Resolved:
          September 17, 2019
          04:47 PM PT

          Opened:
          September 13, 2019
          05:25 PM PT
          " From 3f5210413e25fcb251c65cdf08fa67c700d79924 Mon Sep 17 00:00:00 2001 From: Tudor Dobrila Date: Wed, 18 Sep 2019 18:21:07 +0530 Subject: [PATCH 265/285] Add documentation for passive mode --- .../microsoft-defender-atp-mac-preferences.md | 53 +++++++++++++++++++ 1 file changed, 53 insertions(+) diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-preferences.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-preferences.md index 8d22a596c8..f4eb17be06 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-preferences.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-preferences.md @@ -62,6 +62,23 @@ Whether real-time protection (scan files as they are accessed) is enabled or not | **Data type** | Boolean | | **Possible values** | true (default)
          false | +#### Enable / disable passive mode + +Whether the antivirus engine runs in passive more or not. In passive mode: +- Real-time protection is turned off +- On demand scanning is turned on +- Automatic threat remediation is turned off +- Security intelligence updates are turned on +- Status menu icon is hidden + +||| +|:---|:---| +| **Domain** | com.microsoft.wdav | +| **Key** | passiveMode | +| **Data type** | Boolean | +| **Possible values** | false (default)
          true | +| **Comments** | Available in Microsoft Defender ATP version 100.67.60 or higher. | + #### Scan exclusions Entities that have been excluded from the scan. Exclusions can be specified by full paths, extensions, or file names. @@ -213,6 +230,28 @@ Determines whether suspicious samples (that are likely to contain threats) are s | **Data type** | Boolean | | **Possible values** | true (default)
          false | +### User interface preferences + +The *userInterface* section of the configuration profile is used to manage the preferences of the user interface of the product. + +||| +|:---|:---| +| **Domain** | com.microsoft.wdav | +| **Key** | userInterface | +| **Data type** | Dictionary (nested preference) | +| **Comments** | See the following sections for a description of the dictionary contents. | + +#### Show / hide status menu icon + +Whether the status menu icon (shown in the top right corner of the screen) is hidden or not. + +||| +|:---|:---| +| **Domain** | com.microsoft.wdav | +| **Key** | hideStatusMenuIcon | +| **Data type** | Boolean | +| **Possible values** | false (default)
          true | + ## Recommended configuration profile To get started, we recommend the following configuration profile for your enterprise to take advantage of all protection features that Microsoft Defender ATP provides. @@ -357,6 +396,8 @@ The following configuration profile contains entries for all settings described enableRealTimeProtection + passiveMode + exclusions @@ -411,6 +452,11 @@ The following configuration profile contains entries for all settings described automaticSampleSubmission + userInterface + + hideStatusMenuIcon + + ``` @@ -465,6 +511,8 @@ The following configuration profile contains entries for all settings described enableRealTimeProtection + passiveMode + exclusions @@ -519,6 +567,11 @@ The following configuration profile contains entries for all settings described automaticSampleSubmission + userInterface + + hideStatusMenuIcon + + From f9802f23df337931389bea004a8e74230d6c5940 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Wed, 18 Sep 2019 08:19:05 -0700 Subject: [PATCH 266/285] Dock updater --- devices/surface/TOC.md | 2 +- devices/surface/images/regeditDock.png | Bin 0 -> 248230 bytes .../surface/surface-dock-firmware-update.md | 188 ++++++++++++++++++ devices/surface/surface-wireless-connect.md | 2 +- 4 files changed, 190 insertions(+), 2 deletions(-) create mode 100644 devices/surface/images/regeditDock.png create mode 100644 devices/surface/surface-dock-firmware-update.md diff --git a/devices/surface/TOC.md b/devices/surface/TOC.md index 665c1bd9c4..667d9d13b5 100644 --- a/devices/surface/TOC.md +++ b/devices/surface/TOC.md @@ -38,7 +38,7 @@ ### [Surface firmware and driver updates](update.md) ### [Deploy the latest firmware and drivers for Surface devices](deploy-the-latest-firmware-and-drivers-for-surface-devices.md) ### [Manage Surface driver and firmware updates](manage-surface-pro-3-firmware-updates.md) -### [Surface Dock Updater](surface-dock-updater.md) +### [Surface Dock Firmware Update](surface-dock-firmware-update.md) ## Secure diff --git a/devices/surface/images/regeditDock.png b/devices/surface/images/regeditDock.png new file mode 100644 index 0000000000000000000000000000000000000000..e0747126658cf0cb6fa5512a6090b8e523a59a09 GIT binary patch literal 248230 zcmY(pWmKHOwyqo8-QC^Y-6ePe!CitwaCdhN!JQ;H!D*bvEm(qUjM)$!S>ih2N<^^|>VIf~GKfMOOhJ5fjEi8KY z3l3a0J{?K|9AxV?H6Ynh;Y%SpbLrX0fhB4lJAR4Lv%V8cMi9hQy&jTt#&UiEa~4JN zA*VwXm6Eo#bsrx1vR*BKJ*%h%$qFFkdy50=VLe%Uhz4;ZaqEow;j zR-2u#-Pg!rlfhRyQ|N$(_`$gkF}v5F@@}B)HGyOKsRv!U5%e?ZYvdN&$vf+VpDofH z6SryF&qj(#%;ntZ_ODko5kBS0H8W!!4-G2%Xi|(mXw1h>VSL>2$tUaN= zT;4Rk=j4{xi8SJgpfukPC45v43J=p3u4YF9{8u6@oRyV9?>1XPi$G$hcj5&z%z(Rk zcRKl8>)KperrFhTW-*rT9uueFQj@~UESSt2pmC-r#P;Y;7%a1&iYD}jFGYJ{jsbl9 zLHAx?@fJm2Rmq6h7=WoltU^M@j@3O}#Vh5NZC{TNxL z%9fQg$~o0}q*MfrSxDjtRMH_1R%l2fZ(DEG5D*G*&U4b|GU2-2T#zKyy*dRpkVqEk zhKEL8O!8Jrhh(j5c4uQIk*6=a_nx!}BpUkVQ?d??D6II#&bui05^AQ#lw+Xx|C;hB z_7CL{<1Y@@8R?hQ?@7?#|KK~2w08MrZ6L-j3BP3^w#TZhSRxT6VF@{$3QH5G+&16As~MmYp(*xp$mAo#BDxUMw#v}o<_~NPf6$yaZ}V!J z6q)T~{;*C>_6jts40sPG_7?J}r)<-bR7olj3gr)Ll?LN+3kU%$G*v~ZbiQC#2r@iW z+B+YXxShW{TYJeLr`JRJQq&11UiqZB;tWg04N=+%W=IS>$9r;nHBC@@*KPm_!bbg1 zVmSu%g?@hr zN1CWY^R;O_Z@pBa@F?;1YeHd@k*dr zD?NrF|KP;$w!mJ>k40!piR7a;bNHN04Ep3>V@7by->#3Tg7WT=i#%8C%>YM?_rkyF z`~PfH>~#k)s}tpIg!uQ32{0|}dT|eDWfd;B-Yey!mHD`itw4^@n{V4YTS4H_O~37w z64(n!bSE64G%mKubDy={jmpk_tx6-WoVmdnhgJ z&H0U!;4?Nymv*?+^}>T$xOT{~jp>+P+hxcrsk~s`K$2nkc~(qmmlJ{c-3w@c%_eQM z7}A>=jH4du+4h919WQx1aJT~8Yy&S4s*etqd;dEX9`4GY5(^eS zB!`TpkPLd@dz56kie^i;;xB9XiC*zwsTPUzb17Z`bj$IValAVW4SUmpx#6Yf@NtBN zTQ*hB^t#&HV`Zy{7aA*iV$RZ`v$A(jaVa~DwG#>R#=iX2j}Pj9(Bs_PpAdEXl=8$n zTR8+v%>WU5$}VDXY39Ny1Li{iw07Y~#V4RewO^%&)OR7RhQXkZi!vTl{E}V5T{hb|0o#wkik=Bs0*TeEM#pmGcf+6I}<18#Jo-bFx{Z0a{fwG0G$MaR0 zxaA)r@Kg2-&K=Ex`+;v;kw_YRygCkE6VEnx5jwf|Wcm6^1^>IAEahYxD0X|7K~zklL#vJ z{Qb*+=3k{HOo4@c_amnZhmTtiZz9}5z&t*2AD*`p4)*~S=}@?amo%ZZkcZ8yToS6d zB%U5bzebbjyw^r=&vm87Q4n|MyM7CqXcUzizOa*GQBa{bwYFT5> zI07$gn2D^KS$L=WM`(;v60y~)Qfu>r+YN6Blu8sN)HoKqB77b?A3DBF&lok(A$?Eg zVjP5$dnrz``uZlk(X)#$D3H{!~ihb${|&%HyQt$IiXzm+{^9v#>nUR9=fI&{vKss}&%Y{&<*7Cg5>H z<+o$U6GX!R+_`-xeR_|8#2}&Lj`yW#MdJzoGe26YXEv2L%2XXf5-9tDUx-Z2! z&3j2r+Fdf{FQgq`k7mAk{(djAJ7w|4-_U!#?*A9VJlwAzx+(fRE#UcdSOVg&H|rsu z%HC16H~M>@KYx5KdAlXrvXtFr*e9hBaT`G*F%55>lctb)yGj#V zoPGk8r2W>Gq3Q?ReWVPzU07>#BKRys)8cSAnd86pZ7aHUHV|DJl99Hf01l(Oe7$h* z(p)tU;-U_C^wR`BE!9XX9bqa%w56YHgI~{Rj)YGc&FbY>|5q9OE29NL5l~^=fJ$7S zvEWH zcrLC`rRJl&IZ38^MsM~@Q7WThF|UkJQM>i_@i9O6;G8c|orX6m;Yb-t-S z?w!>MUKp0eL#QXF4t=y@L=d8{U`Pe=7Q9cbrDMa>b+Sg!E`Ev^w6U>~E!Z2TdE+&Q zY=L*O^;7M?gw9DljHvYA3r&BYgFlp?$=JW_;Tf6CIrA8QL4DZtqZtDN2kADLpoE)X z0vME_^WhB&d1wqFIGQV*Iiw^bvx=s4+L_Sy?(#JO6fU^S@8O7F8WcVi5=i`N&#joy zA*8C8_$*j|d40aaXWjx<)PV6@wAv^V6%;4~T9lKue(?o0#ag^w z=e-1k?8@J>mGbA}-S@2Vmu<462mhC}3`m?(h220aQOhT`@dxABw6K>x(T9_$M<9r6>`+^b%vl&%i^ZwHfuKA? zS}xlS`EA>#o@9q3_*xngMfr)-M1$&IQ(494JpqOrPzV(}!{zJ$`8WCp%F5C!gX z+z(^XY$no3R8?2AF=DHQs#R>GCn_m;qo{m7Q}l=4HplEd=~Cs0>q znuu9Sd>DP#eUMk`i$@}$;IxX=EreG48DK6Kf#_j2LlcnthEJ?`KV2@y=Dsk^DB!l} zHz%9ydLhwoGm^{LVQdNbq+Blh(YIThlIX!QL@0GTjh6J4BJ1=>@+S>mhwYGN>(NmE zQ%|VntSnW}c{65`uLSOoReS$k4DG>)o{I>DkDS9VqXJF7ui_&M{Dof@)%>s3P%IZR zmDao)iKa7TK0iqtHCrR)QhJHnr(#-{l13Hf516fUYDruOQZ{`-ds=Im)l^C?CyYC9 z#k}e@;}s3#BL?^Jfb*#5-6Z0F4T@G)_u+O4R)tf(Eusam9(EPOz`e zxj?BXKlY=fu2}Pb9~O`D0eP(C<L?-E(IoS&Kr5DUufRO@-|94nSE zh&wEnW~+_5--pLIw6wlcfso69CHHPJSE`yvKz%+ z92+LjpOpu4?Q)A?{HaIlwXzM?aqTh|K;NGzR`GaEN!V>AxfVQUQ4oIdS zTT5i#rD_^wyZbW}P-M>7lS+6-jNC`ZQM|<|SKFiTu6B7*%HZY|qcdL=r^d3{b9b zRULGXh<{OUwqJK)tA3WPjSlQk7m;i|B-=YH#=_xR3uy@{)~M9YfZ_^H3}~ ze0`R#YTj(zU*wr5zSG+aCY>bT*+%n;=UZ8$)N^8oLO|IwCz)_|tpy6Z=D!*Q}G#D6kFqsR;k;`(m{nqIrAPY zg^o=5%$~Jqb}Y6+Ae6^BztVh+^7p&Wg}OT5Wi#wlk1=K~H&_7=$=4VW9GjzDes9oe z_{H}}+8jayx$x{igbna_Gfeh+RKjQT)hjABBM8hK)Bc=NYkk?Wx^RYtW(HjJ$HQN9 zq&Lt$z{$_StCVzYMw_7AipqCH59`Tp4G)$}X5wZxQX`z?uHq{Z{4(Dughr$w2l)3V zK`+Gl1TjunE1o;=ydpA#kVZ^fN#JsTt2H)o$2UmF9PSVz9X%_8tyQUII=4L7u%grj zUMFnVpl<5k78IKaog>B%UC9Pb-Q3|Ndpt?Z;`|3ugqf6!0Rmi%GLoY0trffIM#ND$ zMyiO3d!Wi?Q09{+uuE*2zv6 z0Fz^XNQ)japa(_Pt{&WE?q3FGgpzO~D^=)AF4JXw3%88pQ5B@z4<@8bOs&wk42qVY zY-HkekXbCAoT^Or-Pe8AEKWz|>2KRnB_wC~S7OM&h@XEa-JW5unsH(pLs=@>kLC#2 z`gflz!yj?i7F9|+ivB}R-~NuGSTLR@?=e=GTbD2`<+PCwhn;NMmWSaXnl!W92jN}I z?2r9L)auzwZeR-OKQ_Xl>?RCFr~7n3{R@Ucj{Bdk{x98#Rs5=DWs_L8c>7n3u49(B zT&wmor+Ncd9lQC0!=+bgwP@n(o{UYkXxY5oi)W**-(Ia>wv%cbiHYa{DoDCR$8(X0 z2XJUJ28tRAc&Lfbz0dwyfPoq^o!VK{x$Ofm@bElHfKe^TTrAjIL|6CsUwa;9HTa*J z5nkcf&53R$kIL$v$=~)=wECmXA<^wA>Z6b*z=K5!uRcuqo%qHRrR<7~QRO}P8p@nlTY z2x)7)McXwhT{Juu`y=HpF(rh~-1;#9Aj>~A+)F+G3knY0b*KeU17&NImYT1NLGmOg z+PVAP=D7ywAK1ZZEPuc3gb@Xdvf}_Mex?&k&9R~H_Miy$W4Jn?nCRt~lxA78lx6pe z#gv{mnABo>9t8myP)Jw~|7kC83wE17@gWzbP~%NsDODe{AHxqlQ`NnHHAnf(9(F-F z)J=bB5-ZJ(owv;wQa@o%z#{H0aBh5zC{_mZ+l} z@IRcIRSSnW4Bxl8cpo>mK_}*^5nnjex zPpUl8IFZ9WJ@7Yt;f%O~TA@!$6DTSA@lHC*`Jfu|%dejRI9nKVh{6Mm&=yCtc)8@^ zGf(Qn3IAQoprThv=^B&aw-0N|K3T4sS5L4$zxwiA!`dE(P0AkYM7Nsd4_%)fjw$Iu z{Z5Kx{H=M@Nt55Na9SXoTTmsi48Sh0O8<>NPEzTI3s4ZUb?Cz=GaW+0fDjh;8Q)zR ziqv^@BomogUrh+yJb0Y$kxtU?z01mHEpYsvjDr;{s)ydi1-VNLBclo43~Fw+<5L@u z6tXzwjiD3d8zS>hDL9HF4G=a-GZ+h5w*HaAL*awvc{WqB&-Nc!er-rE0YNn-N!Q?6 z`S~fz4{%c?`g~4uWpd-N(hPfpGH5$v?n&RyE4&l{NYL_zb@wVC6Lbk#*$9~uBeh6l zTwOOOc^ejn0^ z-q&jg_TP43P4-E~=PWh^&PUac{NYirPME{ixC^@UE=gJqIgiSp_gO*)`BG{suuQy) zWdpcyo%TcE<>R%c7QkhQ&qoe^o*JyoZ$RmLKEe3VMdLI>z{{ckMI6tN9LnW~#hmO@ z)44QfJJ~(FkQ+s7KKzzODfZcIKkRQJ?qdfBmDv+Fe(kR7V_(A)gcV@docpzkS~~vE z!JFMawW~f3!Q@d5dlM#a`rin=8o!6b{^wAffQcs1e~SuJ{5`>RB>E$EM4*vpWHBUd z=;xF7r>`1`KKXx}@XoILnr$a=kt^^p^R13u&>e-ZlD1!nzZqj|q)8J^#ABje`4-P;f;5*bApOZmq29iK&O~>w05A^^V z3m0&hf@C)r>QxwaD_^;O35>GAuq2)vi2sxp=iY@RA}tvogF&(v&j4zY7kB7D5S5>1 z_#te~tIp@X3P(HR0Xsr6YB4IyMd=QhTD4gI!#EI^JWZD>Aq@Xqq%||PHI*jUW{GwL zM@pCZvLt%>I^5Xgb*SF<5X6=$Y7NIs(@TZnFgq|__~&Qm_OCysn{N9MCiHJKp|~QO z0Q3M!3X~EL{-asASl}h_K8M3|^OibazyUjVCLj5l&86>w*`;e=%k;Sd3TgQov|IV) z%-aZQe z!DI^e9*VjxBp`JU333IpiDYTVP3O#s(C2fCh+-S0jpYa`%n zg~@#UX(Wd<U_Bl8y@@cu=npT%*(A7+?%7Bs9}B2!yLoC+AQaj^4hy`O@10%vj|8;IyzJs!?ZBsq z>iR#C)mWzL{^O6K10U09q`k26Z1$-Pt-cHgnnK+lhwp&*a z)n3M^=T5^BW!`K|x68>lEd)&ZsZN zjC~dt=PI~^CU)7LlQciVxv`H}h02GJ1G;MAM`f7Q`u>030stOk8m+t}qyGA#-M=n@ z{5hKx@n$8!lA7)M$?fPHq1&wg->uvm9HvG>-1wFM77>&8fA$MCrZDgF9HIHty&~WX zg1r{5dKcEDt3o;Y#^c$U=V%8H@R!UhQIphYsVi-&AJUV7{byw4A_eGRkH@acR$PT4 zWpqu+o#_jd2Nv%Bc59wm3%|0B{>G-?6N`G2y9KrdYVOgs6%h9Wt|dCJzmeE1KW|%2 zChw)tz=X`Ni#a@g&%F`2hh9gJQmsdd!X4F!Epj25LvnHUCbVTJO8Sq3d!c3yaJqw& z5~C&{nnVNz+w%>TV5c92Veuaus~Jj(_v0Ok;6$EKl~)^vc-&uwQbQLf4#*O^eMs4l zEUV$A@6s%W7&=@>z0Ex+%b!2K03X64`yRwFMK(hb#@5;Fx$@&s-rC^4tt9XLwRpjX zQu&qwH_RxQ6Y|})dxN9}=evLh&u#44w;5L*w)blXSW4lCH zZpJj3r2mk{W23b=7jAZ^&1!W>(%?tJsIw?#TbMw>x$qds@YI> zX`I26!M}yAx7ALD2IamKA{!nE4V`=Frf*RkS1InHC?eZ_G~@^j@va0G{y;I0;V7f4 zpCGHvXUy%ljuPwp@~8M)!gMX`v;?%Dzp#Qq4u(4!VKOKchW#`$8`S&7{)hyD#OZU2 zQhut&`-dJCySPNeY~zN5=jm%d{!6neQBy?Z9kW=#o>x5wCgL6~c}9sVof0JJZx;lC&b2FEI zihm;jRAkg2DwWG+!aTFH#xKh+Ej@eJds6+4^b>RO^W&Nz^;!#-%=1DT>8}#2&z<|J z5|7djeK+9f)XFJ!ez5r$(=s?enyh+8CE@5|qW@UCmz)~nt zQBk$a$ZPQ7-4AM=Z_j6Z7hY~GrzGWf=j~tMtcix%;z<6vG8^ssPqY@TpyHtC`!xEJ z`gT^*!R>AzjzqHuOBsY~?NafdRNILHv;Nq{Z?`oz)==Yi{_|#Nng6Q9mKLZONSNra zuwa#0sql%6jBL=5=Z!rV+`&P9kbD;YQ0$!n8r9Z>_^a2{c;3v2w7L&D)fB}-xqB5` zPM@1H{{`hn!736862=xkru}K&M;Y`2J}Rc#rjdqU?H*@!EWOwlI+ae z%9+@8dU%*Z*|W4fsV3YSK88ZYfI|KVb*e$Ha+X^Z-Q7*{wtyEip{@AP|X>$~0lq=Vg1-*DMat!(TFkG9izfYu*nC zS5X$p)c+!s#44E+??+szyvN7jzb42!kR=Y#c$&W2`THv*+Z4)| z7m&_=+&y)-2>0FB3Er20C2GG7t7NzbBGxvJCT%?m7Cwy8SWjd!`46I440^u$mGmH2 zID?12yeYTcxdh*B(+r|WL*SNH%~8I&D~R*O{+-54{)U-kbNcu`z6t5qSCp0x*&YB< z5M>K4N$`vF7v=DTf{i>-|J7mV!`h+$*i)X>VB=f3cZp|bnolFY+jb!i17G>hbtz#R ze`K^o`%on}kl`Ckvx`jkA{{-7sR;6+v8**N7S4`RV~~`V_}$W?_ulhDy@xK9>R-nn zY8#M}{y~8fFVP0GR>bZ8z6dZEMLAwl;3ZXJQG>=mpE5yweesA}$2rDI)@`}^7oSq(xm$rL{s?uhL*Ra9e&h7o~X-iHT4Ra*J+#dw; zajo~r`cc;1_^u%hQYoH5+qo(4l-yhL@TBecmyeP7cqW|kuRz|a?k60Y9Q7DCzBk*VNdlW| z>=rZEA3@N*EZI-|Vj9c`(NIM{eEztzNmkSLM*l$(RzgJSea{-QgPy_6yFBs2dxuo) zLj~=C!eqmkqT9UQZ8DZ?<2!)w_bC*1Mxuy0hR6oYnXV1#%sDf|bF&f-`i;3fse`Oz z+wx0vT8QJmT1@C|z_7&Erm7ITtz5KbyaJXyepSKN2G1=hQkS+Eb`aWhIPzFthaF0uIEVcjenfpuE%pUBhILAtl9Yu}$2{TwWk?o~ zJcZhs#NE|QZ*113S%}Dwxo-A^=I!g7Yk1zMYDnbbTso7iKLmuq?jFwedoQO301AB= zWIS}QfnsTapnWai!mKs>kGHE+3y@byt$Xo9TGrdqAofkayUfY9h_BvHb?PdN9{FHz zElPBP*$G3mwHzD;Sae8w=akctuIpZ>{3rUydKS|ndfb~8MZX3LrIA6{koq8 z$ zWY|>8%qA)*D6nq3i)Tn3Fxk3g4n8R1$>Fi^e?$7<^p0^#l0HV?WOjek8p zX1!kzL0gTZN5L!5I)32;QbrBq$WX@72q&Q+{37{8IApC}_+{^z$EfMuT0Sbs(QLn7`t9E}hDl+YdkUtCzOg-Sy87MR)V{B+Kt@K+kMzE6cG&Z245E6w1ixW> zJ51+%^C9L>0)k=xWfuseC5oSDZUz$Yu^hYm>@tx^c)`0s)H=@;omtsZM-d*j|9OH6 z!%2@ALiJ5Pul9mwiA);A`xz=91(>Ywf5No^fu2yRu#uyS{c)7oPfmp*4)3Zt6r2(& zpGf1XaIv+%B>6fM`n~LablF<7tqQOV#R5_XamIcY+PH>p+iV{3Q8sO(M@IkC^*6i1 z?#it~5n>v|)<30EzFqp~6Rq1||4Dl~8lC_|5Jt4xDRUj zyor3?4VM1t0p@pqH_7%h)D~;o;c^iv_?xl$aBPmV=l-V1HQipcO>yjQ2KhfnIN!d_ zzfsC6d*~F!(5iN2pjT;_bQ?e=^0I4w-VCH(3j#B(wFMBk!8To0*NIbNydOQTcP=_0 z5v~hcD7&Qy56XJECSxgWjb-=0`dC85qd{sE4_iSz#53Cj3db3i z+_wy&nI*K0+WMJRqRZ4}>b|nP@cgHh#*w`-QKgeppqxLx3n{mVCn~+&6^cGsQ;@qN zI#sx@zaw>W$G_1!N8WzHg}hzg(n(0rI+-WaVk(u4mMd;e&e!+NVa=VW#A_&aaw>O> z&JUv>I!uCyAP+dI4o$p|(8})^5n#7*X+}=k%%Zy{61*+E0PyRU1>vCA=7Z~`NilyX z!k#hUlB$DBBRN?@t_fok`uBu;D(d3as-|nG^Rf?|8gG?XHKb&Q>MpA~{OB|V<%dl| zCtl?9En0Y3|ByVNZKgr;(%o4{!U!V39n+m#SAD}!yYj)J>5l6+-MM}AW?C}&Q>t!G zvez3x|4ZN9y4B15ObJ9vX8WcAj|$pHE2+#G+jo|@HE6wD2d?PQraQzSezm;f#Pes< z4k!xl59Y!MqK@$qFyi!Gk(Mw~fy#gt_Mj^jMSYh>=(aDDotVU`4*YCs*RFl7NM$q; zJdHsv7|v^RlXo?9de8o8>wmg+<-lP8#3d^D&_!o>$^QFajdCGxdps@hGSgO%-TcX8 z0~A}264)q@*;wsesK$|vqa&)TVE!ts?RV;E9^lqa4~1+YWq6vt#)2gv$9AyB zA2Rs})&8evK-C+9BMF8sT`?}{)fgE^)gE;+UvzRA)FKabET~tjY>8XmkEv`)t|q_8nrX&S{IQr5(;GcTLJn@E=lg+T-?Wq;-ak?Xy7|(rpb}XbWGjLHqw+EHIodXxh#QXFKT$^G#D1r^Hd4 z#<-h?ils{3qaG+$@uSP@Y^QI>Jchc1BU3q|F404P!(~F{i0<31-J8cxiOUJbg0qv!2IsJ zA)Q_ZD8W;YY32_HkQumB?fjxd0D9^9NHGZUKv-%2`utCQs4aL`HW4n$WTwX-vuUAV zXA6#EQ`Cih6HPGaTzFq$I>6iPXu+)5XRiI|J?WxeBKVVrtE>6^w$6uM!;?a(m~JS2 z^$`CnMD7N^<(q|3xkqSt(dQs^6&=Va8&IF7-J92Db{yMD!mQ52Rx-gB_#w*2;m%jS1SdT#vdHm8N~TvSoUYr%4=F3Zrr8n}kZF43p*6j1d36FTAN1*^O>B zPi~zR&k`K0^(8(VmPy zI+V|u-k05KrDXk@Rl3fHk*h#gP7?p^Vx(Z>bt+=7UBJEjPphajmqz-9-ENqlQZXZi zgAOih|37eL^d*Pm#Ly_Pb55+>Ba@B?ZF$+{<7DG7vP}>E+)2ap1AA&j&t>K7vmMH) z61J2SRLe=}CRG0TFNF4nHd`Q=haIZM%|XPb3Y`l4{ehX9r$IyRLX7r46x=^kcF6%w zr39&f2EZOWf9uL&{*6J<{#!m&l*L6*sbA&gan`~nwwW~60%2Y=7kY3=T$FdG)ed=F z0E;^YaO?KY#OTWRz+Pryb(gR2jt57wp`#y)qr6MIH1T6G2qO48g%XHU{CZ~SIF~v^ zyz;H{r+ZiI9c!C}gprceMdyA*wKm;(Ps70ME%NQHioZ*#MlJxytE8#X=ef0_RK^%8 zv6%}^7&2vVTWmPadkc(7gAxVbW>=7O{#l5l&EAgnmEC@Zk?6(KfQ5H&u;+CqVDHfg z??dU#a%wm5*z_xFnNtvza)(u8=Rd9tC6|%$B81YKc%sl>RBUz?-bZytW7aq~O81qYa4=6upyt3OPf_o?T+;~R7;)i;vOqfZc} z!fpBaj)~|Hz2mhOlk%MPXRj4P>dU44BfIVoieKcJf$#Zq#1FcWFn>Rg7ca}Bc6;oK zc_l4VpX;ZV$o)|$y2uyR+^g7ct9mmg)HIIIpBvez&d>1)3}w99Ju$yc4ip@ZWAmzJ z=zsT};FEmzdAJslv|Og}`43qmIw>A+GL_;90lxTndIPV8^&R2KA`3-psvC#gvkyG$ ze{{AFiP^8?63Zcn)eZH_nAg7RG;NQzrRqY7lT}49IF8yS86Wq$@rbVs0wF!O0_{5F26LZ{H`haBZr>Y-)~Sqaqm4TlAR>vo3?Rv?%rE2_X+Vu>R5srpJeEpbvWRG&4>_;N1az^an>};vr+5LW@c>`^y^(E-992f3WJ~|Ho-%#^h;_~odqu<`!Z}%Nu zA!2|bQC7Gj%iVz6K&fu{#%^ZK?KgtzFpDP*q^-Nq-hN9%qc=RHW`F2_Vi65a7xf*^myxkW>2fgA23 zJt^vN+a?C|^4n-yVfY&(?}A@l-4rGF9Z#wHOKCmDc64f9a0+XFPkG^jZVTr8VC@Ng z^@dK|a%TSfLFNTjMssNwh0}{HZ70F9PiRv*Neq?6OA)aYSGBVBW-F`Rq#67#MhqAD zWZT_%Gde_rOk~?r`=i(&wQsCu?Xjd$+iYZ-oozo%=;wF4(=bqeXLUJ76k?AuB`kz1 zct%=?#1C9&P*oqC#8$&ViFr|^Okb2MqdJt$wF#%6Lq(kX7QoHy{=C~rs;qxHt6!Zt zGPKA}lEME0w8NeJ2~knmmo_fq`bko9B%1=8p2^FZ`PKjMQArm?H^nvzokEVw30KGU#rGNY^~{0 zXeK4x_H#gB+zzu!VgtyRp?+-wYAh*kFn5!DeTasc*Pa|@Ot*q#69UP=y`ZxV&pmUV zCiC|2dZ$-77y&rb_%!nN+Np>hm8Q|CBsU?6<9>|atTM+}pEN>O5*?L)Qk4tw7QYG_ z^7i7&#^@?ruqMx5y%|5S|Pe~hcz}e9hsm6hFn9!KODihDp8rUyMnP8q{ANid5 zkPZxRTp-y=TnmZI`0k!llhVfRjq-hphXTV{PGZ6JjI#ELcrM;H&Y`&cZv2ANW9@l- z=?)6xdY*t0zW5D4Wug3!yHD`)KN}al$euZZsj)FbVVIq9S!Y@E#fQ)A0%q8exP7Cg z9U)V9BA6x#`XsEJG4~SI^muLRQ=gpl&i31Kut-@`B+BSxp12sea;JCLci7p_y$7## z@>aXv>FkDvARH#p-$)Txb0-y_6{Z1?dpa?>&Z|72cKN^g`-S+Qn1~ zeUj8OGX6#K^3e3y`T}WXX;;+AZzHw6y1U>;%_NIe^kH@I7p}d)f%bIA;W(mhzn=o3 z+kf!@VV}Lj@Tb}#H)>S$G0V!{eZLz&^M#o?S^0Qx;c0KF-vGZ3AY~0(qvaB1m z&apk=<|1oSPQGSjUiwnY+FI?2E_^!zq(=1C~`A?{u)fG%5Ou4)WLMk3{HyF zYXwkUXPOwEb#dqTuC!kQ3$HJn|BU>WtE+b@{1xtx5+fh;mhqfTVXk2w2dBG#kE7a_ z`F4_jUBN9xQj5{mk4uwpR4k!Og0!XlQ&M;H1k8AI_nG+(P~8@N>s6^i0Ju!%_~Q8p zgD$3Z#ze7BhANZrZ}XX-C+~BhcP0m|1%l5Y0d?~ey%TYV-E3VAd5b$6={$z0;R*iDYD&4_3)a>X%gDE-H)Ot9y3+mNw1l|@!PEO8OEog`@m}kt?>J3B zXEQ=8FHBoOc6SICYQT}c{L+1*0e6k@J^`YxWI8T#9FgZC(Q<5X8Zk4?+@kkI0_Xef zB-f~I_bGYY3;~NHUEYtPo5UYI#4hUv99hiyKE%+l))&a2Vz&2||KaYHcRm*W6sw3c zSS40I@{O@zQs3Rk=>r-Rkl=>6@d9wHOjV)29-?SGrr7*DWGCF1Rr$ zux~KJ^P4Tf6xa-JC1;2+d|bDuC^wE2<`}^HJewA!Y4;)pZu_ib%Vu2_5CK7<9aYyh z_CGZk780E>VC0jILTJj2LQj5>s;w({_!=L=Y7nYiY$JMul3Bktiw>CO>eqe+8gL)7 zsLH>7C27G|)*0)kVRF4Bsd0eZq_k|X1nlCtOk!R6V3C2G&SxxiMRg_yRXPy7j-dkD zDUB)zIMH>^H*#DPuMssKSjUX=#{L#~;_<(I5Mp5F8dU(UFJ?nS)xo&YqJsyM9Twke zRjbXZdm~3?=eAGqPt-JSsPuuhbd5y%EfDCcGJe;ewKNgKCDIS>`GxBf1>L2qp@8(! zvA8kx`Occi3@|(boTpCh!830^zF3o*#NVN~1#}8)-KCcZe7XJWn=XYQjZW^bMSI73 z`do*g3RY=jD8dh~P^&hjy)XRn7ddG!~{%4qK&i=r6r9oYZ=@P$@2}0erF2 z>T`!Z+;8JF2Jep)##W930Sx-}UV_<&59`cFp6N$`kd(U{CJt*H+xSK`BMXJj<|fF4 zJ7RD9SaUdcc2xOAMEG=LiLLlAkLff2$(sti%WEhR4lVg!rT_9|djO&XQ^#1` z_*1b*w8GCavL?I7k*zf9Z>g=x9)?O+sZn$lDbBP9_qn8;6pLrPZXd-vasF8XXQ{K+ z^%kFch3ajg$-pqo9guIEXiy>|nf5bUYHvc&PzBJtlI-R@-oh(-i_2~LXBRsUyR2RS zxx`}?#dSX$o56x25zzDKJua8{m<5o_71r<5 zfl8(%OgQ}dm=sL`+7jM(a~GHdgp#6mIm*jGQ ziv7Ak0G(f7E3eikBCNxTqp>kxNq)i9goRsb&Mifyr8t)XUNQf62ui9w8b z&~rJ8h?SP6)ayBm{r%i5~eNSE)osLQ)HPY*yrmOw@HE?@gS6a0>4_2{SU<cv(%}C^X~ewz4vAChmuvAOd~~PEAZ9vdkTVZdB5{<~vXQ6OKx@U}MIA5Xv3EZ% zyxG;E2_^O5F-cuUhYRB*QI%J0JJD=H>&iHS&pQy8^G7xg75itzzC2DSTBS3m6Z%9z z-sIpF6~gzA5UN8y_W!6bQ0H z@mw~FeI0y8VM%PQ5u!e-t)SUPX{dY5r1tT&m{!Pz^@rxIN% z>ghM@WW18M3MB^P_VjCy3eV;7+;PsMJuKEzf0axBDe+H9I^PL2Xm;2Sq)YR@G-QzNHoD(68yqCj0!(C!{2`FXKZcMJ$*$A3=hvje9Xe!EV3Tw zH3nEzZ-O1ifeZY>+%grjlc0)-XD+8CdVY}j7y*S?^c*YOt`lXs6HQ4z&rOKl<=e3p zCE}k?)?DoefO9gDCD=iSsD!$VUn}#UyHf$vR0o~Ir)i{-QfI)g5Z*bd4Q0YIDhB}` z+WVJLUr=xbf6%nZ@{Djo->(uT%_hC1xSsK#JV~)b9`qN{{;Zk4Y#x z6ak*9;YVKZ8Pn*ZvZ50@J4E*j<54K4N&;f=-XQC(*X#P6^85B1C}gpUV14am65}X;f$2dxH6L) zDRVm3jJ#5hF!fj)?;Y>_Fyt_fx#v@REzSApE|HT(Ul^>`@kx&d5Fx8H*kpkq;31|- zl2|GM5*G)Jf(JqzID)d7TGfJK!txLgBuxX(6{5hB^Qm7&Ym^*{sWyHgpbVId7|`ie zd-Ff(crhsm)-M7z=3nM0@|4kN+Rk0!5tO*({(D~lTHtuICw@2$SbA2G^8nVeh=lNi zyokDBV&^4^7k}O$i7G;q$%!JCv_1b_Oq)^B=6ZO;bq$MNLew^NJSZr zsh?z$b3~v%=c&@$T^GD?5b{NBpd>O6ugk`76edc%Z>H+vjEi$nL5LMC)46bTnMzeM zki9LKqsB!q<~JhN#`xzLj0>JJ|Y_djKT&59P38RD{05S`Lln#*APW(lu! z6lEB}%saixPMQbBweH6f9Uuz!>G0Gs_Vy|?67jL%){SCs63)D0&4-GJReN!27NyoC z9DXk-BD5H~sEabD$aL%%#DOy0Kogew3Im>Z8xnW&LfavWlEH!u0d?aQhoVTheT_sk z2)=G)k|v)M2nCzk)^#arxy(ko7tL3~K50?UbAvbz1o{G{uVnA;-l0?~?}R~fhswdR z_pM`Rb{g4rh-O~%ruz^MQu}4Vrv^}RICdx_Sw-^9fSOJaU*8;Mj{DN}}cjCpYpTQr^D6Wl5Cb!&ZZKWVT9We*6%cS<)yJAFzVg1atGd zx+hrqx)sBK$OotUfWYw{?gNxcS2*Dh1R@`}9%K}9M!+M`2A7a;*$TwR| z$)BgtvL8u5lzNj`Ktf1nQpx4e$MZ}kC{qu}A{>-J$;@ra!&cmryd^H32?G~go=27? zM({Hr&0%Yi?==d{5UI|AnGdO^4D%SGpFxy6LgKv-nE!wQJDQ9=z9Zt?qPn7Es4y=> z1Tzn~5qDhM4)uxvHY)D`>k~xxtI0gjfdI(s9*rLc1dTtq`*ne~R>y0w4nP?DKp9?% z{k-=b;bdN^z)=?}C-=Yh`B*qwne)C7u)cq+_2kMZ_)fTp%R_Z)#F6;133bMGs8{3@ z!TmsUIZjI7ncTL#rB(SL2F4Tu0MyDks&t2lMS2(e*@XixwKG|EWPJH`pRe%Pfp&60 zf*kHUK0!9ipb3Guwsc0y$nqBajv@&wEPFVy8^|)``!f>DnT)Xz^(*p;9|Lu!5c(i{ z%;jXkNXmU85=UF`*!BBYB>kfV_*2Y6$PmY+rclXah;OU7w4yS5h5Fg^&b41WyF4H0 z#OOjNGbJSFpU_JJ$U^3yA1omPgiNAx<&X`A2RtFp?3gEOnJkiJ*38bXRr2Axg_RJS zm$&w(2-CBp(dVW+PBf?U*SygeUH32b6Bp|0Lou2tD$SRCN>m<|E5&u3m|Sq!V>s57 z?GmECbTw#++69XO{m?>XLz#jj6D?;>tozz4OyQCM%JAanthimuO4Ft2l!fb~7(QCm z3bJIdd9O=v)28!XUJ#{Tw&<-FwRQKnF>G4*e_M+lCD7VVnT)KIQJ+G==&7Is9yles zK__i}VV!K4o&Hv;GnR6pP;onSLtka^dEd0D7OBTfr0sadviPvC1#V+R9@f>iS|(2Ev2OxbZYb^StXu(${$i zrzXyca<72MkW#^Oy{kbSy85k8k?$Vo^u6vj?j8qhbqZ6)hYRXKC%c7}N?AX6j@rQS zle)OhxK&-{qIND7``~mIGXBcE2}RD*uDJ(S&QovEleMcWS;nKSJAH*NpNCR8L-~FG zA$Cxh!}>*Y+=%kdhpn#l#>(33L%+)7%2fBR`|+Lo_95`$xsj}8!M~(?{VUhxI4Z2$smt5c11uHMEoDX(~^-oFPLM#;_12)YUie^?mgHHuApTps_D@3HH zEq2C*M-^qR5@jP7?}~DRl50g@r}eAauLZLE-LlIxRY5B=kpU`*Qsh zG&Jm|-Q%izE%xx$Vfet;3qtW7xbYM>`$?<$Oxq1Pr6w9=)_ob5P~XBkySrb*95WiG1`F z=O<4%00*QuQvMXKBuYRo$yqdL+DG^DAqBUZs~^Vrnul=b)*+}`9Z`)GfD{p-)6EI2 zE{5P@j-3OOIbgd5rgBV;_z-a9MX$MCne8cF{ua~YO-xT@FvEjBT7$}=Y!gVg0;B8k zM>hv~qA(24=bXxNwDTMZp9Xz&o+39eYArCa77wi7fX&;Qm}-q+U|1mIHOr5}O_w!}g8a z@lb0FEn39J6&ke&MM8i@o5!WjCa`Y(1pc&kJGK^enBh8x>;xj0A|Km?)ers=tEW=9 zxPhcr=RPvcNwn6k!o8c(()EnjRYD1)4ab zYTIT^4$eWQYpB`nQ0*~{7c+b`C$koq-iWns4zdWSD<9fgx5hEHawWEIp2WKC6UgVz z6WdS9v_Dp81`pfWGM1B^Wce73Z}47RG^sYTttbYkf%;b#1*0o@mMT)e zMy>0jPu!YJmS>c1x`z_4 zJk51zQ!psI8tt*wm>yWbZB--AcDs#r%{mOVW9BV??2}DxM`h7MsbJ(&GonqFG_rbb zUbB_0cX5MPUr%3&jPSoLTTnT|n9waOJWaCLG6C1h&>pJsePTO}bbKq?joE&^%{Bn7 ztyo>mhDr?T`53foV~cHZ?un^w3WIgBkmiiK7Hc*86Pm^}rpLD8k#*~_ddoC6WpjZ+ zg}Rx9rgd-YHf&$J2CK%#v3;xsGg(71ZO|TOS7XG^K&1|}$WK4C5)W! ziAH8cQ8OO9Ws0El)C?79gUZ7IlM`cDyJ;LlBSUQApp##2qw=uMx)$1eE&GtM1vTRV z&_aPWQq)FsVDlteGlzL^%l6t2d2exS^Rw5-bL7rk8jtwQ>?|z3`OEnCwM#5N8UOV*elQ9tO7j30pQc zv3Wy*En_i~ff`%+X(qLGZyj&bLEQX*?7eq=-Ntwy?nf?COx@V&2dEV#yeb4*% zxzD*JGjo?+)?Rz>Ypr!HxnwX1_-oR5_sHy=

          }hMIDT(BhRq8wy%=)!;#~9R&pz zRN352fDmGk=3zgRRe1wL1~{zn)l|V{Fmt;pT{g&U)hP8Em=K9bugKj>$fY~v zLEup?5e`sryHB`KV^Kp%Bo^dKEDQK%u_K^^qT1c-nyoX^WNyCiQO0u?A`hw8`Fm1@b7MWBO_Tm*dqOC;B_&hkNS9g^#*k|~3g z%pRyD`f&t4)7a+NHYr9y2-&}3L;pGc??)Xd5QuRKy3m|Ie;)XH%_{Nn(hr633+WU- z;rDrjO?ZS;2=U;;pJK+CzM^^KCL*n2Yw`N~t3-{DuCoduY(n@vLU{TAeA>NU;SqF! zTL{04|E1^AqrE;+_a2wWExpb!grA@137kIR_wrr*iT^{7@!Cas?j2E8T_U~5Cw=V* zyf;_?dN-Xn4jvX$`VSH%cCV=A*Vu&5Wf5ZrOc1|p+ROJk>A$sAV(kZSi{Zm23a3Me z86#(lZ$JG(2%k+{xpG1@A2d?@c=Dn+vSo#6q=#tLxTVNQ&k`HI`BuEUbg5YI-b!u> z;ja({Ip@Ua=N5>)$8QNg*T5}&eyQI3H~b(*cIYXJtrfz_Wfa0sKREKmzm~o#GLn)- zW}|G8)P9KAeE7QH#`pPzUsQ;br}m2Hhx8PkQ)5IzdUx@`%I%`cPj$5m;jR#G&z&av zj+-LNxb?h3*j?h2SKbq^jDB8J`&^=y`XkWpPT}WM_}qNXed%Qp7a1>ZJt*Whp)yn5 zJ&!Jnc1b4DdE8u)&;8&Q9*12_n>kBNm@<`$#)sc8gxf8IXM)v6_QX;gXL9-{s)6dQn4@<4W>K5YO z(L*BLtQYA`(?oJcx|s3u8{+G4e-{0^wh>tk6GVtUOf=7IArj(}ME|~n#GRs2sf@Nt zF|un1@!j6vMGc8yb*^}K!8GydS38A+g+5Pw{_gXl)5u98&n<-8C&}}k^;PCMo9DTy; z62kAPlUujP7f=gs;deXg#yJmC;S+A*5;Wq2Ltc2Q#og0~L|TjPqSup?L`g-iD0p;} z%e?0O6=Kqi`J#r}fu+qOK3}#>Y~HYe`;N|!7r!Hh_ZlWD?S8K6iF0SfoR?n_M|bZR z)1MkI9#>cMcoshDYscT^_Wyl)T=W8qm@{dlnD^!;y96!ks+eu zVnujDv}o40r3j5l5y#KnsC$q-puRK&? z-x?Tnb=~&gj(?6zI_b05>;J!A$1>m*!c|o(Zr^{%MY?h3S21-=XL0)O15rg6I%>p$ zpS~Bf-}p*YuzL3J8Pu~RC_azWrreH!a?yx%`W#~FglEO}AAS}NuU(RpKtD)TpaQ!1 z^zi?rW+A!T_ODIi#j(!`i`y<7)CxX}SpC@&@!2<9g@whqRBZfcfoR!lxG3Z?Q6_RP z92QewnSpXgG7C!N~AZ*6utTm5id@9P0XJ7swl8qXaE>xBMb{q-2WtgnDA^ zxJjbc<`zDhe>@)H=Y|jVk5ns#z5H%*{Mcdf)cC2QyxJjz&%tvYw~t>s zrFqiHr@Kzx-F(&x=`1~UQOxQ)LOiUhqFI^chVHw1cCYBxu7OC4?;!g0oFwj67K|6-9?;qpL_4mts9zXY! zQ&fq8y+?>+`%eeveUA{eWn#@oi-kfTE;5>R5RF@O5g)JID1^U8TB`&q==FP~cIQfX zMa8{aVo0ZU;@bT}X&l;X#NugF#Ee&#h$>#bc)4D|vH#D0^$Umai&{}q_E7ZcIZ|A` z^sr992K$?8=keOag9i_U!|wUV{Z8TYOR{Yh4l%C(L~-v-u5kJM!b{Ka*u>gT-WL&C zxoDHsOoS&j6RS7x3Fv>49=mY!Dy>d!N$ZKgLW|a1L2c*$$JmlqVze|1j8$qoUVwRo z-{%Ufi~gP`>dNbMit>jKMR8F%y}qtnNFIDX-#^xO9@d$E&l4U#>puTait9he|L5Tg zD0cdnbd1a85^LA46|@OtMgLzo6eMYtVGmo49=QDDK|fhoOV| z;@<7Y5+Ao;%|SHe=xdX(Kj_>FC>?UZ?qg)W7B0Bt9?9K64%7>Svk2{_-_g%ro4w9BCMxR8=* zMq0CQ96bF9HINVtLTFST86$<{o6O#Ww9~X#!Rbq6)Zb)xA>3buJ5|MaW5qJOIeR_^ zwrzo&a}EsdG!}broWbeaS21bA0F3V43i}V9LJ<`RRoJzC9n3KqXxTAC@?|BgfOhC| zKhzFCbS@>MLoUWLU5w6r|HBb%-gX?jE}X=fJ121Bt;zU#dVl$93A7`x#h$Z&;aq_gapojQL^Lo_2vh=_-|kOjj0R?hDUi?4p&p@ZcJDZdng~`CXtgA9E&+grng=oG5o7 z=gP0huIIq4SKi{(1ipM5IyY>MKhIsn)myi*{ImBkdHfLU`|Bqh*#8}xw;7F{`!6Ct z=MQ8xRAAR{cNqEhmK=n_eF2A#RZ}$~@@k>40P3}Cgh~Q<%BpbtRt`M1CAf6vIAqMz z=|I_CFGlv9g1xtY#_9XN;MmR^xN))!vND0Jm?qeE^AgTK%E8<7Mq&D(EL^>lhuks` z+!`tRIMU%nvK;vH@*O<(22K67aFyS|H|y8Ht&T>16)<(?Y%E*(6*Q_~_=AjNAl04F4VG^7%vn1*2*g z;m*B-m^S?b6qf>-8Oc!jY&dbQM3M);6~_PXAy8r+n07*naRKw*sjvJ3caOoa9iQ>_jGe~I|38P5^ zt49H!+5``*@W299EueKuBm=PuJ=Scyh*OuZ;OLTP@ZIDASoPgyRLjlqSW>a_gWqud z`VH*cza4M9H5i7F`?z}1Dfw%=FT$3;2V>U!ig!=kz@z*;ys>a0^78TnUU-3cga6Vk z%7Fi|T=utb2)nb$fDY~2V&gaKU@&SWRwbqm{;wW@ESjM6(0nyx}bx&jT_ zh2X^TN0Q~wmjhY#WsIG*3G?3n19$WHV%_>zV9U3FY=>SZjF85$BH;e-;oKDpDIUOE ziEqFB5Qex$`19N;WTYlRr689z0pal?n9@w;bwDL^z$pix#G2$$D4}yzL*uAq)YVRC zbcGrE%23Swd^>jCID*RuKf>PiGx65jo5*!PF#e>(ek4{dc=+UT>vpo`LavnPi*3Yo zRvQADJ6syp)F@gzii>Yz^7wf;clrb_T|9!>v&Tz(?7^HK2n6>9(Pufaf!Ue5wpyuU z8#-K87;F|eltwsJfy4qn7q1scAGzwNBpGw&*e4-u@HxUD^F-C@S0%S0T~`T@uM{(< z&BOh>g={>PTmoI3EQ^B2l|C(c4{wBHmp4nXOw?YETDbG`(01(W*md;^Zf^MuhnByF zQ>8^HRm-99%Gl~D0zU8vx_SAe7>1xLr<9#sUgtg|x%CK%WJ3h?xEoH&Kq6N&*@A`w zjJ-~-ca0pVqWXFZuwl`2cxU}?l*^@{TBW}h3WXG0?-GHqEf3x6;&x&_Ft3BxcGAbIcqv%LZVRhs1Q|ERdD%hu=bm^czXWxh>wrQrd3;*I%(YG z$%u|L;oglKT$qC5BJA6@4@1U0i|p*Cs4B0(g$ozZx%&WKU|hU-1v-s@`|4lF$;rX( zufBrKHW5?%)I-jlJ6QY8_sj?~W$G-Xq{QOd>C-4J&xOZdg4V5D>*Ue~D z*O-`?y1)|(xFT9PiP}*zF%u2bvSrKAzI}W2>(iz#a5FSCRPrASDAh*k>FCv~7dCI+ zia8_VaPi_rbeud-GUCe>e`hO%sPkcCuK0i-UQKm1wrtsg6)RRCE;5cya)})}piP@L z`0KB~(5YhzmM&e2xpU{DRrf3@Kt!QLcB^dogpu3lx8Ht4yLRo+Cb=~Z95{du+4b4X z6*Rj9eFgtHsn>lZzI~ewy}S0r;lqc~rAtesnf#pV0=**w&(L$*X+M!!3qY&N1k2)c-B^?G#e+LcoZk9o3}8{9STiECibuWh~K$%>B2xc1YVgxAHR%Vj>iRF4wfQ02+oc8hks@;V8l)< z^h6z^qM}e(Sjg8=yY=hW4_ogS^0im5UPW+wbjp@k zdxU_|Xp~YaDP%C2Ot4z5@Tfgp4vE@LI=b}fgS7{~<334_N|D$IJRYQ`CZgDC#s2-L zku|6tFY1mSJ&FMXI^t+WGzTk z8~N49$jCt7_UYLB>#sO)<|a~8Q!#1MBpCE+RF{-s`}XZPms^d20|#Po&usV|4y<3j zil5)8Q*VqIF&JeRFY-7j)&7Mio_GSPUw*{3YuE6}C!gTu7vDf^Y%ETmJc&+OL%D7V z2??B(g6ebs_HFLp7A;!vGt$!Hxy@$Hn#FB%@xoQK>)082d3o^I3vv7QZJfJRfN|r- zp?RbF{Ji4AQXWskyQH!l5Vae-@_M~kyLK&ZKP=>OO&B=@j~_jP#Z`+Yna$Ys=H#KH zXxgqV^kxn63-dV;I$ELRG5V;a7K4TjMf>(`q?i|(jOBIMuwjsgMd8<9f5nS4r_?z^ z2YpIuLM3^Z5^sRp?v+7Xnk3NE4E6HDYY%Id#;*gi0kJ}IP z(5g)b7_@R6KXDwfp%F++OT+1-M^RW)!@iNEGw$BK3!(&W+qNyTvs+>P`i=Zu%a$!M za^y%nc<_M7BmH~k%o$9cJQ+t{4(`qy=H%#*GKnXxFYKv}%Fk zygY2$c97+3=+L3)&>A|5|}jIBQ%U>!d9+0N+HsS{T2 z*oQ#_o7Kr7)stjkV2^gFms}q)!i?O9g?RMn5jwYP4~^1~(X+^uHTubx_|$E=+q_~ z?$T1MUcDN(-SshI#0d1vH1ZfQ2uZ8z;^O%Cmp(ZKt92qwX5je2gV_DoF{nd~cy8vi zh%if>^^XHg2whQ;0#xJ?bNWq<6Ts(6I zO`0@;LZ`*en>XQd*P?mz<{Yze>)JI$_}z7~!FpdVugh}D>yOi?S!Zqf?gzvsCgaI5 zqhK=XSO@>U|2LdC^A|slWQyr&9p%`(c{A=@bMTmaa!eL>?%c`aiF6>zM28N|aP`Jj z{P4pM@W~qBg%@7H(@#H*mtTGv!=G}%WYX~hJUD;5+(1(E<_HT5ICJ6@tku=9SS%PcbP%r%PG3BatgI}Id1@@z>-3qkh>woJ_H92S zDLw&Dj~$NvyLRE{W9L{$^z77HYIBE!557&~?>^hRm3Ez_v}<398M^I+Oi z#ov_B|BP=^dR4>;E0O!jf)OzkL|B~wt0NJEk~7#J+bIv{ES5^tu>bVEBPa0DyxEY4 zhQY2f;Lx=iY~K7a%5EIM`09>T}Ku1kk;;a)X*r;&div4B+I!`EL#=&mN* z2yt2&cJ11QhMnhva!ka^Zeiu?s}Z)~J1l(e8Ey`PtOijrRapJ?zi{i>FmA**-g*rw zDT#QwzaLw-uEVF>X5q2uiJ^V!fm3Nv!X!xk{p5MZnMc)r)OzLI)&^fL6jk|fDH0=w4+6v4CIuZL{;$sRH(WmD(zVq>N0Uli8>VW9PX^mr!9Eyx#!R=ycCPK ze+7$oE^JCEYpIagnb1+r+#n*reIQYRlJ}%v;YY4713$?*L5z*!TMb6rpe; zQ|H9y-J39JnvpjHW=|1s@NSkWP^%-FETSV+FuFum5|7q}=cmoU2XC)O*PpYYP^;jP zSpbt4h*4qhSD(Ui=PtZvGv0e|Av(niT-H|Lm-AI<-#Q#|Y7geVz8Ie`e+?g>{u)!h z{25W9M%*cG40Y6KG~qRRE&Q?&2%Q-%QuL^}a||uQthjk$KNd}!j3S>NUHXs5glBpo zk?7}yo%0iLQYMcZS@jZeE9Wenp3&HIryjbt8I6X;UqWN)hl4H??#47hrq;q6iXRVG zVfgUz82N+|mo~0K4m8lv1}DOcb<0;HXNnxD>1h}446^iqREx7Zb5X+V=!KUx`V#ki(p-hOu^;j$W(9K#Kx{+v~7*?=Iw(k3@JlkYO%Iy5bS8*?hQM zRE01o&@HPm%FA;YJH6+NhO$vdc+Q-{zh*y!E*E!V_o4N8?VZcKdA42OhjRyi#jk(- z$`i`VFRsA7t2bb>J;3Q>XV9+sSh$tInq^;O%jPc;A7{deU0*|9Yeh=y&Uo#M?O3!Z z1N}@Fu;}HkczXF+3>c7&RX_ZIc(WcxuNQj`9DqC|6)nmnE@QUzc-$=S1r7yPE`1Y| zM~%Y622ByyE)fn2VDn1j9~vj@J`3ckXwHHxb5^5matL;xtH9uXu}F0qQBmYUX6gVK zm2!!`l*n!asCmhO~s8v|YM ziAd@)5c_}Hf-A=lLamO#$v^)>?>?<@;M7jMIR6*)>C*@9dk1mq;2wPY{kJG6b)w2q zfD6};;(kp7^m=+cmTfOYSuJqk=4o{4))9&K?_uZXpQFm*M802#{9~u_VvEMu`1V)0 zpL-QOhPA=rzkGOW<6&N~>vQk3rDWyOt>}=|64PG?HZ56%uZ~_pazZwK*}ELpA{EAs zdjcCjoQ+*oaY#x^LeAM8cyR45RNHNrY69I@)Ms33OWiI%L!G!t4>9azzBxx&9uW1-; z`8HH~fJpsKeDTpwSaYx&Z)6rOn1QD4`e9ejAzUxAp+!P7nChot)zG8ZHoYxQKQ$L~ z=e~maiX1#ReIDPg-;dDf6r8*M80qKlp>^bAESxk5sa<=c)E$N$IWoNUR%Z-Pet^r{ zf50~&&0Xwqp)Pj5;Tguhx5O$ z!G{}*v2R~{B*@FL<@Gs;p7AUO_8*NIGv}gJYC6Jn)p%4cV5xkJqWd{ec;n%%&4Gtn(GoS6V_>(&aMwoRgDp^KWSEj%d5d|wkaq4Cn)~)*-273r+Cfw7{gT!6zF&#jiWJV$|@Ch>A(XiZ4Egqvj#(8X1O+9)rWjt|0DODc+tCg(GX` z;Eh{duz!Cx;vOBrrZ1LZ>gf4UdI``Y7O@aOPBv^ORFp7L0B^taDdb8A!eU(5w&4;E z->$*3WiP<8{}(KqJsY~jc-+5VfIC(nDs^roIVvG4ix8%jVcADZU=Mj44~q=2Sv`1k zFAuf03n(e}VC9NmpfQA@vgSVa{I(6Vp6P)mX^rvIksLfZI17=A8u3_t7P=SnncU>&5zy zmZR7ej_K2f{qPf(AKZ@YtZeL9^%Zh%J%UoD z#MOgafP`c`tPMwbaUOE--GJO;#!nkJqVPclD*PsFI&>9j-8*8(ntx&U?%inIzc;R> zL}2Z@pE;%>UUL)uL?y!H5ghaMUlY{+=lGuw*+0O%;NL_)%M`S<7!9JK(iO5g4mH`o zvByY1`vc(%gmU%l*%QD0@dxj)2nD)up{NddnmKbO{`_+n?}}++UA1{Le*XDq+_-TA zc83&6OS|Yd-gpDQ?cB+z5g~I#R!_)e@V$hl&@pD(H1z1v1Iw2$$5TUl;q>9d`2PE! z`F*r7{QB#!k(-;(=;-w6)A7#R@1Q|y14a=k)2u(hYaM(qJ(rMO`b;}#$r2%zD>_om zB>6S=K$`?2v(*&TqEfNI2iXu3($g7PShsE+X3w4tja(C;bqvrZ1t{aF4gMMFj=BUh zN&=VvW|at_tHJDB(vC}3XEFtX)a`N<=H?Ts3oH%g;&eBpwObOYhx=Kk}z^Es+B~7w~{?)5j4~Gt2U}P-V=biw? ztwaqdvC~LtfWfkT<>mZ09Yy*1Y<(ic0#Q-?{f|HHWwf7@W~im) zCZB))Id5{+?AaleiON9rrEAFgPDmV~s}_ru5ny_MNl6K&Oqs&hpF4LB7cO4lzM+Lj zFj$eEL8vyh?}7yj_&tXX{erb?zhJ8m^?k#JG5Ge|Z_%Q8Lq>sLef3rBK5zh=Hf>^* z`@w?}wu(`o|M0{282{90SaWlE!9f;=pSEqmn{U2}4I4I~VT%@A*2Rk#W9s+;cok$UJo9Wv78c;zv#X9SVs^VylK-KyuJ7>X4v7R zE(QZ?a&p+JNd3I)mml!ri!ZW82eq|aE<4$QX zpjoqKjLMS*jM|2*UnEaKSs~e{cLtN4`2z{Ts84wOE0uLLY{9;y&oo9zzXuatQJI5C zexpW>82u;t3hIQ>bLX;bQ+;O4n8^y9`k$>^Di!OV_3PKOd_+e_azE|-`A2@{zJ2>y zZ_=2hXGBCq@SLa7$hqH09*-V9j2*vzkFLFYvo(>>&>)rE-o1PIq`8#pzxkWb(5iK7 zUhvcSqA?lN`t3)Iz=t1x$X2q66DM+eQ@e$Shf5X;N`j=3p7gX3dQ0n%9`M^0vM0P2sXO`9;;20f3SPwhlv5V|s1Im-Z`r+@b@ZPH4`SZDdHD0#F>Vi9gH<{z**ZcpOywgBWN=+Y zAiodC z1-f-fhSPov-fB6zx9N%c*|dmoqN6GSL*tsWMMMzTf=T{U2+_F`~~E2@Q20L4{6bW%FZt-HdU+5oE;%tVi* zFq8=m!Wy>bjB94dG18oakTa`L;xxgck42R{95WYvgilv2!Z0Y*z12AyQ-PzGqu;-QRx0y5tXlog$pg2DX;Kp1fIW*+ot zh4`pQ#3|0A@b-GxY#73qSY_dpB)^ncQP# zHSkdSYPXmDjkSK_^e46nCG5n2!OSZHO1%v>`y;f?N`m#yJ*@bv2D=|ep?CMzFqNHw z-d_cS0DkylJ2rg$9R~Isi($PcVfC_)abVjvz*GxetPfWn-$u1UN<6{b@#L%JSL3c# zhpay1u;!~z@#Uu<;`1+-;e(IgLgVOgXls3Ns~mual2o|aWdZUG)VP56W<=xBiMcpY zW=Fm{9nk7vDY2l}q}ljr&0?%rIur4sl^pDEsGoq!{F881*8)NZD9p&}F%YY^??pyb zJ?z-H7Eh$-!Bg`yuGaviax>tqfZA1oQ}>lHXLLbPbu7}F55?m3-?61-_UJB1Vg;jt z+oy!rBa=>j6!huM(YT@v55HfB$mVU}suzpaDGhLP_g+|QoM_j!GvKVksUJ7tixo>S zb<&gQHJ}e({P+Xx{&q7{(dS$B=rCv)wtO)gA1xe$-~KoQs|Tp@grHud4p{oHcd>Tk zQVi7W>?MdYDq+@Zar(3i-+p@y1BUcQT!I`vhm6M$ zvkwpri{FfzVmDITbw{lN&)4s%2g-l~8@~f<E+!7FPF4{U)2fs&CDjY|s?trN6n)JDW1 z%9?|UYj*%cIiiyUa!b#m!byIke$>JP4>VBu$#PZ=mBz`IIr5wJ8Dij4gaP&ts8va5 zl%$g^diErwN3=nV{2n6w58&}dpm~eF(4;2d$>+yl`l!M1-oJyvEt{iBC@EHfhAJa$ zUOy_mM%373sH!2i-2_C2)<@5p69_-@B`y>v!e&L1N8XxMd(EsNF! zJi2Iy&gVpw8Ypr$#EgYoutRYu<8@=#8b0z zY1ONU&pU#x+xDTzoQ0USgAvxG4O(^Thy~9-3$v#l;?x;XC%55o@_s)RQVYJtsf#rz z(Kba^d?F&e< z3o9+)L-nXo14cKXv&*2-h9Ej26>!^O_Bc?L?}m;RTU9nJm@x~bwH8D)PerrLWa!mE zX;C8TCk=txq>_A`MG55gN6>|5BdysmBu71gPv%WfdjqA&BwdTKgQ~%@1jrRDD>4oKx@Z2e10+!4^kIkRVN!#PA;V z0|`l1Xo#fDMgRaH07*naRJD--+I}l+ejBtAag-tezR*ZKHGBep-ylqb3@8^!fQ#0Q|p&iUn zTm(VTR zY14MJps;{<&9sA~T_~XroL-%RC*5xLjYGisUP|FDA)>U~BgD)lT#Q^aY}k-@HH2Z*dvletU&PTNgl8nB(}L1hq2Bf0~=sqcxwx~l#3_1h*z7cv!WuR+M|NJxi(-N{m*Acq)_S*~RaR8+{Zu!b z!xl(kBFThg`B4Or4tJejIF+AV-gQYylE3hrSLzUYst@&z%OxRe98DmTu}>*w6DH)T z)@sG2^XK_F)Td;2C7Ed7rw>2p{rA@e%oqamXUt&ajS$|TT-4fY|DA$3kj*n_(O}eH zsbLGjSF6`@{USrb@87d$A0yT2=^>14QJatjfUE&zk$U&tcexDZ7B8bjBu{kR^Upue zDAJ`%1^fLC>yX z-*2gH2!*0CNPS5tZ)GKb@^aQM)J~C+l4XZ{VCjCcl#u^$SeSuPDni2uz01ySfRvOJ z)#%bRWeE|!a#6KQ*kl)Y#t7NGlL_Ik{j_BxUZhx}OEt)eI zW5$ev)}Uboj`h0$456XuGj%Ha^wKzZTrTN(YI~Y5=-v14=d&Il^qucBo4GzzKh8M$ z4@()fAEAzP-_2XO{2f^V2?hP}#~;z5LmNgOsSWo2@(ZJXR4*FyRG(F=q_KYc(k1re zCqzFO2gN8nh35bE8_O;s&Ax!1CbatBazywAqr+5x(u0MTGTgj(j}dJ8j!u$O(z(>` zW5)EtygB2M-9D?XKEXU2J^S|MHYE!L&0Po}-#o7=z-6SiD=Mw2dp*ej$r&M=uPt~9 zlP6Dt*<@yG#N34o*^)#uO-Hj19at9~J9Z3}wGLdocB3v|1C0+^V7{V0XF0H1*?RTQ zm?p%=;`776YDge zl(fz9@FB;UQOpxfKU7E3Hza$cM+l`RYXVu7DfZ{q-N$t~OzFjBH6R3;`t`3<#euBd zJ|4%4Kza@8py>2;t^-*^DAs_y21rlRwe{P$ z%NE5%P`lCJgl3aDn{*)c`P{h^Fm37x7z46G|YU^}kxFMu*X(d48jIICJKf6r3GE;s0B%oc|pE>qG8UTj5evF%t#3 z2oggHVc)gdbm%%fh2K6NgB|Y;Luy7FG-%cfKkhjNk5-TOR!oIYbsP0F+M@TsiI_TJ zDq=&zP@|1Ntsxpp7@6_GpcBw(e2f5ELEPXDsI+d#)fztMJvSTmQ!>!H#}K4~6&qjh>KbRGU2 za%;7SHmMP!b#lZw>)`MNM(U3qz6?r~s5W^Z)HcY40!k4AiW;lZYoYhsV3GmaP!(J% z7hslS@tTiu{?Z@V`qNe|^V&(1)4 zM)bn?J!{8JoFsU8v_S+#QYgUkddUos{M92V>;vd`gthd`w1F0 zZh%HDJK=+s-@_Lk4YxtX{)lRsR(h|H!vrO?DldfB29weYc_^8-Ltrz!MReFwEgt*3x9+$G1=!>$eU(6vo7q_r51rRz_k24R3I1|u3YK=J#JZLYub}9b>~$zr{1K$MwR-HFFT61S<4)_~O;j2RPNW z%*I2mWQp*}5};GdpixqK^>BEgM)MBYsMjbCnUOj~QUI(;i;f*yqDAX;P);9G>ay5a z%vd-Bo%(dZkdfmsX2P@R)g~RM5Bvmuq#QD>7A3kys8yz7+K6oY`uR&JmQ~_b)dP%c z)e3DIHbcJ&b8(gQtvU{It^2}PeGdgWk01;h__blMXu}bfkcECN8e+-w&oJt(_j=$q zdtlWAGNYO~>#MbDy!!bUFrC?fp~g^T^&N`S#WV2!gkI=YuOWW8<-xdRzXGxl zD3xj$l`>{-2uqYBB|(NB9fx7>zN@H}r9o4_2a@Gwcy#<{2)7Z@vCWa*xdlS&MIupU zK$!5MLEEON-?}j}!{{?$Q4nj3iS>v<9ghgD4_crz*A89qOz#-9N>pIR zlC3BR?}oUD`XIuE?H^3UiZ_NJwSG^m{_`%Deee#(XYX&@WGrC3nEl;ne;Fb;|E1`ggD^{^~2$900-i+ z`iptkw&epfsoxCkTK2}Szb-*pzc~;p;3246p@!EK3cE54sg2T+8d-pWouje$&?(qd zk*L>m7`$=m=-Z(sCwH&cI|-xa4#ngaX&BTX9Zd$0!a1uO$w`sWXema-hTnG|K!eN~ z=<~`BJlU}g8b<=s5m3aNFmLfISoCCHv`c7?!-YOf{P-I{WrE8uhfX7Li9a&f zP#GsjJ*OP?0GPrmns5^ zuz0MU-32$dE=1$>A?PxEKBl}e94&gsb7sy8PbC&i8jThiEii5SaV$7=6W!WGBh+t! zFxemvb)eQSF`h_?O1#j8#vs-diL8c8L*)8N3MccGJ^iT(^CNna zCImDlB&IdNk%PBk(&}(_)hFm$FBB02=isoaDaKEqfG0aCX6?7WCl+Q(JLaia>(KgM9 zmYI#PaYrfQT2H`dFLlCmy~7dPx&xZ@AA%yk9h%HEe6?T0J+pYBGnIvtMihG;*q zAC`~L#JU&SV=n=8joTnpT@G4qP*{~yt_Aclh;GyhPG<$0H&2EsqXVuKIM6ZNhW4Rk z@Q%fdw?0F`?r$-ueghV#`B(pc(+I|Fc7QVzpHgCN# z5V;S2hN($=d~@U)j45(xj5U}sAp^PBenhh_{c-4S2^uFigINi*d%}n@liJ|ZZMV_p zg%2^MwGsUj6v%4a7Go#OMp2~(9=RFaQsk(-yc0HMENpSzC6K@im}p7juLblfv>G=8 z4#zHZ?%V)>9Q_q>O;SPTE2mijonA_!)n`~UzG)fPs8bD#tV)a{Nu=u&o$ZFCWUE24;wZ{+9bJh&(*|QE4Cq4^D zN;IDROa9pd@aA3Yl?tu<9xN-g{I(Hp}PLtk1tLRt^ZP}QYMP8m; zl>t^d|9{T^hck%4%f4Lug&_1}!He^yRNh`UWLh;`QXDt5-V(UW%kkI~0l!R(kcdba zbu#E3CCm)+s6qy>R*R^_XkIWIY9(`9O@hSeVJ;1Xgh$&zq;EAg1I%U>_Agq>yTsRa zY=Fh@gFYmIO>*Jl0YCRjWfW9OEmMAlYiVVCpOLR~wTZlYZKf#U&!uHPSe#1uLc`g2 zJ-kxN{w$+ON@fQ<)v!N$gk}437}ai@5=q%%;MGZqHB^2pZ`UgvAp{;mR_2F-(svtN zoV6j(rC>BI0j02)m7&_Bg+peBJhUExM+g@dW;U?7;}}d)%6-g2Qe0Lgp|(mFbZUXr z#CV{h0=EVEhwET6#ULz94YR1?U3~sy8@zHOypfTNK*ta$&eUPmjLFsH*TCa6Ax{%U z?$k(B6~pOpz-N+JfeaoO*CSu$X6r&+tp$FI1qB{GTv{_^Az_Rjs2#LXa|2!rBR2+Z zf|M0a@8)vU$_<=3P2;QLet zms^jJ@K}V00Om?3gvSGCw2AlKT5mC<5Dr%iBQHt|Ehan^UCfDb%Jh*S7hi)&LQ72Q3^74k!DERz-$$(6PBLVTaVNmKq(5MsPZBAGwpcJzW19 zQzBb5^sYxzKdKv$jzzfpA^dhbtf85dz6K!yhre2ngpx$K7!H9o+RWeUX){$`45LX4 zQCW#Hw+^^*x5tk`LMgmS791%K3G_*FClu1@m!{ee1kuafg@!xF9Fz~=~W0i)NqY$?#042XzUGjgmc zFJg47Hna(%qT~pXRq%UiimPC&k;9poiZBxp=5zoy8%lIhFd6`Z^A5pSxaiMDWF!zn zn`j^K;Py2}@+VB51cNaQwMsc$E+32F^W8qP{)KpAIe0QFxhMP{_?OGUg(GT zYv3RYVo016Gg4BD{nPj4|0qRrI;krF_Z*{^ig#+ z9@ruQlNP2(Gql9^whTI7keaU?rMGWm z<>5TGRA%d~sI^#d&zObycsZhpc8}0&w;hG0C8$-$v%htcic@)_GEC3UH;FQ?U!go1 z6y6mUK<3MAPMFO`N$-*swWJ&#bqEwuNigXFlcR{o?M0b1|25auaDSCM6QI`X5EZLn zYn|3#!1MJxTXHyNtVfC)_Q#KLF}xX~qt!@JR6xZpF)maUR>Ezr2W6NM3ZsMLx2#o4 zL>eU8W$J&2FhdGME8)*KYIIPmbO;SKG9VV}d(3k5xPn|?&Co=o!fXJ{HVfP(CAgtY zU}QEk-VeXs32U_#9=Cu;lg9HHjX4!z>!Jky%1RW}8sI<}!jpJAf=G|_-l}RJEG`*5 zA(4oUFtR?NDMO|$h1Ft#M;!sZHi~sN%~M{bWW!N=Yxw>gc^u1QtjETBzFcXB*{EYW zM4rp4>?kcRM`3IO#Lzkdh0u6CnAmd`#~EdG&4$aMLTFShYw}QE3CD}wQ-r~wH^ZRR zAyTP=!kz~GH&X{NojF_{8cpNlQ!ytoh5HbJP7KrbiDRX(Bnpm9;o^Kp(RoGmUo zqXHVG0&c5-UM_<|Z(+H#Ib)fvOonpSXBJI8*0-S^3p{0Ixa$pJG`(JwA4a_qk18dL zQvGN*I|Ew_D^Y6&?nWjdIzo<&a&Q7LMED?lZWI-k!y^lUCM1^ES1P##tjYpRxN_xx z9O3_84zj#|^UXJqtzNZGkO}gY7iY3L+8dxqB_B1F{2zgnG8c0rQ^r2R64btcZ-_$F zrQQb9Gy4Jr#LB-P#DO8oK;}j-2RLqi`*R#Wb{g;R+=ft-3VJEQAKXeQ%{b>&6oFs| zFW}Qkk5dNI@yi0HY)C2K-H_7qs)c0A^UAb*nTkHkWD=SJiIqSZDmCg6Nt5!}j96qYL3MQXuIgP1Q?Ru}B*laOcfCHDa?rI)EI6@l_N zWFB^1Q9A>Ck!s0Z>Ho0z9q@8hRrl-MGUc@-FQgGdAfYCq7Zv_AL8?j@5mfX;RFwKj z5wV~Y6)d0#f*_)wGyw&bA|MLVdnX~CB&3(uX6Cm4Z%g`{fnC6GIN7N8n zP?k?q@LcuK#rt(4DrPpDa7D8X6ty49;T6q@NU021|5vj|Qyn1pq^wI$E=Z%Pz@v=Q z+E?}W0zFJ-R7YEab?H;pE7UaEXg?c^H^9MeXEOnVJ zOBmq$$7q*%1_S(Nsb-G0>BAGveCS*6uT8=4>HAeft{UjV6sMBXKJ--r%xJw1^szyk zgz{Xz8}l`#FNn;V(d$+@UuywDO}UQ6K30~BvNEUlw~Hc!7Ca#r;W{y=>5P>e?wzDC@e6e?QHw+nnjOD#6}rAn;rqs3tj& zkUkk3NvC}v&N@n&r=>`L3#x%ymiqkOJXE79_TKZGIN^j7@ZkftmOf<1Fg+jJI+6>a z>Sa6*gS^e4R6DNUT0f5~5-iSS_#jOZM1fRdAqzwWQ0py<1&@(-2XC_F+2nai4^SwC zG7$wdAto~HVGoOeN=bC!eLGV}($Q@S2TKRGv=%y#mr$eQnh-9#7C>SoyaXR0d*{%QA@Vz;RK^^?BNLYEgBt$Lg1! z7!p<`#|n`rDV$!j?VzFvqs6{6loZZ`CW0S0xgEV;P8eLDkJ4pxdS&8_gqqjB zFMRc@_`)~N<#(^>-%M(iW&%yFpfBtU=ahMHt1MaO7Jf>3?R%=#Z!1Xk)QwJZX_~X^ zJ)P7#J8}8VHv@%sP9{}zlW*+WP7HZHDUlIR#yfG<{7mlY8^5ug`Qob3!kle28myWT zRM7}ITY?sxS|sP9@*H%-E7MA3pCc=g>VUoOtvqVMM8MB707hcu0mxB}aKw7p#pom`vnFmrv%o{%-X zuSf5wZR(E8^dWd+^|U^69megV>vbXHA=i&JD5H_%t7Q8ybmwTZx_&`z7EtG(&HP3r7_ywQclay_cXGgQpAeS zbC9*rj7Xd+FW=g0BC+b_AE(}*b1%^(;#4<4HAzb7=FP03dF^w$x+oN|QpxIaUwKt3 z9(V8?@;N}~G=4`NSB-r^+g;Q8lLa9E)CJu%T*$Ruq4~M8TtBe?=NlQPfsS>1C~ss9 zeCoSVmcMkp&?eDu)Q;o1%c~!mNv50n<9Rv5E~^jDR6D6?Bxj9%T@SNu%EoVC`;-nL zUkqtc#L6u)Zhr94+}yULnKl(&NLAeO^_zPgo`dT4obAYdJuZaizgmJI^tr$B`huMC zu65*Dfpe1|7dAmu-N@oTk=oSx+GM_6^KviYHI7ZKC_XsV)ca^k0_JfN!rWvAozRSD z&4>JD+{N8|qVqb9Z~D$=|7YVpbA!>nV@B(pAFNuiL>q^JAFW3dG|sg^;~D`~NlUe# zW!he@UK~CmF?*!IL<&T9u9Y^>b=UXnb8`N%Qjw2#&qz~FST|Jp60tmoO&Mpgt}Kap zeX}_Xq@OA%Lv~ak&+SaM{JYWbw%r7UaPRKs2pg0KQ}2(t;(pE9NBOnD`SIdy%fGF)c4fJtIuQHVOG_!t+KksTz=_~GICWPd%`J@{d?*rJul1Zl4iLH z0*cJkf1&;o>-UPh8;cNlh;xS)ZQCh;ThpDtZDI>-`8HdfA{9Z?JyV_sQdWbI#kWJA z6R1ys6cp)6FkOKV6rPY%U2J_lFXQ8lcC1v9d@t=~1J8z>iblS#o6(^DEM~xV&D>l1 zh!xsk2SsL)^tyJE{5`j0_uw+o!EKTtNS3>N>?Vs?4buQNV7JJ>)or*~Cl^0w?C1NS zS%UxoAOJ~3K~xq=eQpz%1&y*#uH!q&8y;$K@`Ou>hw<2>K}d|R=$1t&`KBHrPr4B# z&1^DUjNQNqG8}6?D*)k;vP2CbPuo0WeO{Wq+FZN4>L8ajYueL&a+}CZkUXlxfN+Au z)LX}o*mwg^D#k7LHM=jtQZ<%3q#v=TAaVIe#XnO*kcC`Nk$OIyN5!^BA~KhmU)A;u z`KhfZqpIVBa^L0qbz=JT725T>Iz?+gNbEjY-?QFMeR_Z0jOeKIv$FP=KJ70-Zgkn+ z7&t^Z@$GqmK93@E>Nc}-@>YgOiGwVob#LpVJ z^k=r{b7=<9#MEuCP*HhV{p7m++TY3;P_+rEm;B~jA513^JMMJ$inTt%dV6b2>Q8~b z>|AHxKZA}l^-9@sP#^Z9#K03v=B;e;+W93b>q)V;)5-$M;?YyY-cyexT=G-BVOj@P z^3PAu9jlP_>2nonc9KWP>Q791>U`a_SifGb*m*B-_hT`3RQTxvgsv~d4d+=@KK2@G z(03D>dKg`QvdFHyc}<_%Za)$`f7<8P^9uSigRPWWy?yAOP5s>37ybG?JSsEMlb8FH z8|sl%+8pqOdV=4`Jx`$5v`A`h*PZKzZX8Ie(fW9{bz`B{#?#$%)!)NDhI&HX`$OwP z5P8GdZlOrK%vT11tGA*Xzbo`MU3wea|2;iV@0Z#B!rD{fk+aX~<>m!h}W* zh!a>-&yt+^X~TUy1$Q`|HpDXu9_QL`P5ns89xLOikZQYmeYw^M*e=Mgqk(!#Y24ZG)-sDIx}EazRi-iWeN%aknisn3`&vWNe)9ardUTA~ zGsc2v)c&SEAJ}@cO#mIgvDy_55$CzVM~}`^osjt&Zoby_EpFEeO4Zx1$%ULfqJPh| zloa*Y>)#u#%2rubNz*!@W6ii)EoS-AfY1x#(vf-tYkmj5Q@AjMvRE>L*I3oYPTtxbn0~lQ8AGm*Xy@28qw+1+}|boS`dwl5;l-hfJR`$8_f3&DR~gT zojg!65o5UOOE)#@;x%564yYyro?W5={M2W6DtCNSp8_J@O8Y43dc}qr#USX`ohT4| zr&#KlC?@p2wq7bqAqmWKZP_B9?`QOyh}g}T6I{fM#@5heBVi|`_k=}6=< zWD-jy6L3}#ZDv81Gm5U}z87ODLXS2&9ilSiiyDoeCfa{IeUC(S-NhRa6-E6c%nI<+ z09j4?wJG$7?t3QviqI-LzTb!@e~>K_C5EWXk@!JElAtvhpWLoS)5{l8NZYj?r2o=A zc(Z1Dl=>xHsy0b`b%OrW&Sd` ze_GJvbYY3bbsUG%PlBY$fH!iTq8g~x(2hs>y{7jI)ZmQ*`Fj{QBDJxdV00c(I~TDj z=y=xq1n)oKbxl;EIZ#M&Kpo`sK-p(x2W&iQ`CC3&tY-~aIPL~ zJ7>D!@$VG>qVlGhW; zhPRML%y|wHOI520y+{{mUk#cpYZn>eg7gzFEpnfR+UTA>&p<)0-&U3PP1Jz5z=M6i zwnz;vugY`V0K3EjPXF#R@K$N)KdEjsqfj?2X-T$cj!M&`wIbIqDitF$0`k;!Ubcp! zHLL;!7ODyj7jy@lQT@|=Y-Ah;NuvQz)IrplD(Da7`Pyk+;l8RHB~7en4Vxed`5aFN zSmetXi}XT%Qqc9WrqAIlV`)yUk1P|#5t_%@fVYOCj(h0*V-023pY*w0eYy>~U3a9P z+4d@A12D7}LJacMUo2F#G!O$`J#TiMvg5Z@ku0f|q8fNj27Fm5s=cA~`;MBPZ)B~D zwf_Z4y%8Qv*KL_DYpfNb|R_ja6aElehGAUQKD^WGGpn z<^ie7eAlDMy{}k=(fKCLG!Kf7qu3L>Cd_2sjJ5xSi6pbBgmnX+=Np~>xSyLC9W}Wx zk0;|}X+fTANVHU+UkvzI>#ta|=cf=hwT#OUQlD97DP>KNhK}PT8>G+D;=up2V$}<+ zTAr#B8!46Nm{NZ23Y2)gc%v;S%Ch~A}c9()IfKdg!J+YRP;V%fHRLO;!d3=0X!2T zN<|Kn&aY|GA2wJu^>t87IQVC2)W`4Ho{8Z`E*?G(LRTmfFENTxEh!}>E6Kpo2|7#L zxx-q{Yg^P<`Ci~sb*XP%>pIb8@?1sA7F&&6 z;-;RGT&Gx-WJhtDs9U%s3yhJ!2mN$>0aahySq%)oUy?rcmR4|oX!nM4KkAQV0Sdi# z*_@b~QpnmgX;oE%kI{joT0>d6%QYhD(&nNl@_WUK^vg&MXg`w)&>3*LFs&%adxoj@ z>%?w+rBnm;KU*b|7>u5$5@ou;SOe2f8=>XQ_1jdr z!gAkot%xl1nH$X17{5PvQh-Rg3D!`JwVzE`dko8D_9qFthYrRw&%KJr9{Ur@rCyOL z^#Wu`0mVdR`+|PgF8SwA6i`Tv#xkfOQdPsU6v_9sK<@8lvUv*<#m9ow&69qb1JqMn zA99`EKn$ip4HZ{>^-$0P%ZRxL<5 z7voeH`2J98$B*UvAgl7+IH2RfkGq^vBhO{)NeZtc4W6wgtj{E}k+2>>?pHysE$l|o zdc;C806jaNY%q)T?}}g4{t(MX%8qAW4IFDQr#6{fhd!qqn7ECf8jQN(2vh6%(+$0` z8yRgP*TL#kOg>NVZ`XzT{1WoIZ2>2m4;bh$3gDn3>qIKDlD+C8b@PwCo%I0N{^vY0 z(toXo*o}XkHwLVEVEXwP3kp#6>%3jm@kJXfS!d&^j)`0=v-e14h`7Bj?g#ZYu?=X{gtQu)=+8|0j>bjrG zb5*px3(4z|)ZQ!QpKo9+HJWSq)&FPK`h98+%ATE8U<^#0q>I`6sKql z3LLdgo|Me@koe1aLqi5UOH~DiH%3X+hZ058*E-pd?Jx8Q;++kX{$Uo#{Y?pJE#sgk z_H?ufa$bm*OMUtU$!b^;E&0d=b=e%svVp1tpB_qn=rqHZDPr6fmnE1?vrzh8SvOoV zv2|u8q^UtI(5$h3zjXLY8(*iVD9_{9+GT-K10ah-xql`(0BC{~&y#4>o2;GtS2EBm zSy_F9C`}Ogvf*fpq~co!{F^i2qf|Ebi5l|lMCn41L-c!dC#`J2XMTa_g-7nZ8~g0P zKS$nkoMiSOt1P{5`*Gav73S9$oxxxYc4VVRAVvs8G& zV@C0pnd6E}Fqr3DP%?oS9m1J1vW(++HIX;d;r1U);)(lHPF(Vlj~^gMThEFH>bQ=i z3q$6+vvKR6ZpDOk#$(fo6I}qSb={J#xY58D`WdmlhR594mtTAZFVCEYz4qFR4Ow50 zPgU`tVNQ>gUrxbuwHmIw{Z>xt-c~Hjn_8-in+FDzhup}et#gZ;xSY;#4H}MjCuG*8 zYtIYo$L5ZAT=k~tepi37joweSUK0s=Vakf<&JQZXaR0scqHR!!t+(Hf4Q}MP)p9dh z>8F7882yE4hz@h_Z4CipSC2rJjYF0irY%B){f7`D>OUOIKxWZ^;Q#vfSSJQc_3B}Vy3ewV5--pt{Y72-Umhs?-k_1%BK_5?zoz3f z>+ddxKo_`t+)VB{0y{6{R9BF5Jo}c!=M1Dq4z1r*&kdZ@%&WJzzEQ;*co@<6{+73` zK!dxVtLVn(wDX|r4{nlFgMm9ph#(!*sODwTT+B^ANL1@N8`W4pu0oZ|tFaKKY1y$9 z6VH0~>;_W}D@!S3b+f#Jimn~iTs_HnvE#7uy<^9D4jN(u>fn zzae<5zLA0_m6C2NADZS{GEi2?dIMkKhJnMB1SEDy`0@3^$|OJB+2YXK!LLc z*1XU2y+pFebB?kx264WBr;ejv)$w9C40c|2?`KP3V|nzk+y+CGz-rn}M%#H=$Elmg zb5$*+%RRTWaksvg^i@s4d{kaj+9cwt5$*V<|J}$hIMBb*r&mkZAaTj4o9jkqR*!mF{H*BS(&e z*H+Yb%AA@>-gr-m|L3b3jG~Ve0!|smIP>EgUaUGs5O}#dm3Q1^lTF~4Qc>kV))=j? zy`?&L4rhcTgj+c3vcoUelw)ankQM{1K!}aTb)c;vsJh))8#Rz!zk*fq(+yxQDqd7> z3@h!}PDqG~VHKNI^cODu^5I_GXEs!Cz6U;*nQgz>o=}B;iUJ z2)bfbK=gXW9Fhq|U|xA)I(Ey+@b2d`)N@%Q>$1o=M_9ZdluFo zJ640pL}rW)Oj8xL6Tg63Ek#oF_}`RNg4~MFKKU5Nj9MFoK;9?`a%voGA6gx9t&hwi zJW>ep&s@y8xXRF=)}hFN2ItjOW4MrW1rnNKUFU_YQ60oar`zHXRYeAB#v-=?8?+^@ zRxcTVR|ruJ0z5K(1_reS*m2~#3>?rUB2PPtPyg#fF@6q%!+sQoZmI9LlsWQVIv_gb z>N0Dau^4SVLxA>;fr5eWN&RMVktO1MQ*zycBkfaB#>qU{S^9zK3@2F!Bk&^AW?)j0 zPP24`K#>R1E%w=4LVFS8B<{#DnZyaQP#_4S385^aSF}i)Uss4Q9H86F$491vgC>Kx zpU)#|iB%vF(HcQQ3Kk`Dst94d*P6PDgj3_Nh>aZ;X(epXD!`68;3eLk~cz#M1vGmi%c|LH#-7-FGD7RHu! zCax!aF9$H$@v1%)hx98oC~Kr>)Diwh%8FAVvEw-v&s^q!nnn+xMO=$6=($c+X#j6j zc6h*~sE}5OQBR?jI@IgMR-MLitZjQ*-;jEW0^3$qt$(Fr1a(ga8a!)Nop*9=oL7@k zE|7{9=H?RHpc-85UPskmteT9i53Yx#u1=(gQ>+t`+xqK#YSpC^-?pp%ZmD!A>LXV5 zJwmJFD3|fAx|2{(98&GZwaxcnwZyFYm_07lfNil8f(FkQZMZxXi^h4xMdq=eJL0AnOtHn-~MW){E``1r6%W>MkC2tTlU-0$nF{e$f6A8uf4`((g@^2dY&X zi#6Igj#Ozh(COOo|LvkrK=;^m(@ot(`mZpbHri+-4DK#7B1#=I zU4<^GEly_F10(QBdt1XFt)^*SkgiaWggCBC8iUO?+iYb7Zw)LBXfzqcIX&79HrN2| zIWdturHCaIl^03%5l|9}T1^yxN}*($U~Ofe|JKl7@_Oca&FM3yW66>wm@sK`6bnV5 z7NOGDhsm>+VzbR8o9q)$Jb|gRda>JXyJ2ugsjkiJt}C5$#^lL(YVu_C_t&t=h7+*G z7MnBk$)WHRxJ>?;EaiLLcH3p>2N+;Ou__&w&#c@=-V?*WttjleFu?1Jw065@zdef$>8@gFRrjR*7nmUXqJ6pjz`8woh8^jf#d8d(ArW3h!5 z`C>}4>4%8pq$xQH{Y#N|G$LvBVj&6n@p_In-rLiR5LYncr5CW-hT}C*v5uaA_s#bD z7D3WtfT`17#`@X%SgU)4z69rG&NWrv$4_GjaCxUq#bgm zGZsBh(Rg|-`F`?CQ!$qKvqifj4c+zgtXN1AI~`lKl#NkalsQSu-#TgtnJUj za}V5(&z}8v{OM2Ep=-t+`0B?#hAG{L;+FUCi>}T@w&%X+a+_ctKi5+aKZhUx@DjW{ zbsB1D!}#q!h;z=_4C{BxJEq(_Y8>q2Co!)4@m2WE)i8vD-5XP1ei47Z z`2qao$G^fwxBVI0ZPkIHQy1gXGro(v9=H!zmVKQ0^FQN*yKRc=e|0tfaN|v=^c3;j ze*57IKmImM!N;%|4G6|6((<6O!M#;~?MhSsQ4dS8>Cb-iai$U3xBbH*#m%vM`F`w_ zxmVS%8}AcXGO7)_Zhm|lH0@q+)%~%4eEpxSJQN0q`zYGJ9aW|DS=lTKV(;mZU@p%S z8Cu`h%#(yrQ9vo=CzY`i2uC4anx5RB2Mfe0TN=B_3C$Fz4QSp04eqiiiH*g`LIFv&T@5GeGAqvqs{r_ehWfV1ds9XF z4Odxdey*2d!?n>g@7DW;{jRnf;`-LV3mT7KY42Wc{GxdPnWlBa zTlHc7O8*EO&(qp&9=4|Gyh2mOI?wA$1Fq@4&@@imADUwhnlegR%P5sn8 zW_#oHSGr)+e81BCt$9^eI^TLe`gnbIj0x8FPvk=Z*g-uAnXXfd4Z^@U4=4pYn_N%< zd7UMRR8`hr&4?eBG$CecP{;#p&COwdF-`MBQ-5uh)h~HKih)#PnrEB;e6csB9Ry`G zqg?~L$X()}e_rS~Lejgsx^me@^8;Vey4>!>X02;$Ys0W%!x~;Ze_Y)i;WhkDW%%&n z?)x>l)U%T&uD)zkGX?n#88SqZ@G2EVxm9`a($<-+=lt(BNfcc_iL3^3s$*LIv#|x6 zj9mx6{N*pPv`5FV@1tBUbN2o#ue_3jhVQ@s8mv9i^3QW6O)zW9WE_9|@r;B&_{bx8 z^wEb{J!#>>g$;*#O4OM)WeRS;{dPS3+(Y>J&wtMUUb=8TUVZgd_6Cd{JC^TH<&N8L zM{jR09-cfIM<0DOuDRwKyfz>B_{TqvzdiaWe*4?svWH;S!Z~%1e+$Tc)5Z2l`>Cmy zhZUrvh-I@LeDFd3Nyl1sDLd}psJIm2cC1_ZJW?$3y$<6TNi3cz-?aKqtGwe&oUGyr-Tbe=T8xi^(&N06L+VnrxpA0VyO9Ur zP+xRx4z_o}^85CeT%D%MnxSbd41}g?%`odRw_ha5Dq-6Y+U=p)3E)XhvAsh&Z7(+xcaP%vEd#kVxMDALSI?}5uY{~Gz05LkKxZo{pklWdFIm?bHM*#b_v*K4`9Sp8(3U@QKgtgn>cbczn)$3?Dxhs8rEjtzx~7VHgpvB^+y?atyR4us2&+ z(?5|UT-F85vXV)H!Gi}g{po@WF2J34-ibkjG&vT@yQWr!N%lSx8ec_q;5l6Oi<>cju_Aw-90|4 zOp~$t34Ow(9YNZL6cK9a0CQRmTR#CSJW+xcklJL-%8eeo!pljF zavUM31+2^@u|Je=CRAdznD|lZ@ki9aDE=u$mP9UO!p1mpfD(O7x{|`qd$HJ<4w7dj zrL}^M&!X500>RP+c>ccY@x@Pl0tX)WF?{rpBXG~(A7h3)&6Qrz%hI0|TgTbO{eHw| zIVfKph5eCgO^sLyE>U!Xg0GU1K?_EIyUTywN@Y!1Pv|L>@zomftBb(Xc_d(Ojd*LI z`@Y|Rz+3%rYj~5HVpYfesIJwa(>YLu#)@zcA z)Fdf*WU&NitweupMmsZcd0G^nH&-@mobSsP9?B!oHX^<5Q%^k=KmF-XQC+fxzoY&@ zUXr0hhcX&IYSbtWME%1RSKzL@?!xxlZ_iwP=w@u(xN*GXaO`>apeFzTAOJ~3K~$eU z!>F-i@wdPI4cAkhO=JdInT&5*~0(nZr4CJznC(2^(4BJisl zr{laiIi&BYr=G(37oLynuDi|!>5*6F7r*!gUVH5|cW%QzKFb_Z#Tk6H{YmvoAo`5| z9pp5psf$K&roptPJ}$5dgsW9rd8vSLYmL|9;J^7|4F2?|KjE)`{VOZ$Q9R)nzxYM`>en~& zrPItN43Hm`7pGFK;G!R1f>)=_7jGeiUd1xqNhI@KtGpx1e?3YwZ&*`el~9em)kU~z zfD`qGl1_TsU<`;8|%#+bdh}}BttmB@c`CMx_SX3H0mmV346nML)mpo0VxgKaD z4p=e9IGjVMf|ArFK|j)z5+HdD!=xtRgcO?YO|Dan5vM%}vwomDS8FSFvIh}M$f!R3 zKn)v?iE!-xJL5ao{|#GhwkKxy{{v&jj>lfR90>$V@tM6xVAhI%;MA+0z|VjFM{Kv* zD74cxmd`@my9AZAp979V?pqY-x;_)^{`SL<;^Y%fz!9}Q@XKG`gwEkpQC_kFnID>5=@Hmmt559FKp7w|1 zTbG=NHgfOADN;@-mNZknTjk#{I8&Q=&35E))^*#6^Eid zAg%40%&l4KZ@>mgm+2*OB?JU9rUleW;({)vy)1p&&uS}lr;@}CaUzrq1Ktq+zMy#{ zDDe~-^sHK%wWLT}ysn=WBvz#~6#E`{IQFgdVq{Rj*rylZ z2jBRv3qfm(L=CPd5HB_}zq8bF;YIVN2EW$Fx2_hu`A#J-X6j{>g}NRY9v?1G0z@Ip zsadVWfq!ont3t-H3d93cHKVHPy%#G6{_+|=bkw(T>=~cKD1Rol9@&TQT>LBSf7rno zNiOR&!(zXK=b|B$%&})FZn))cynn9)FjOlzNPBt08VEZ1ch18Uw7BeVcX>+?c8Y8<wzY>&DM`xx;_v^JUA*6In z&w>SrZB7A2Up$CTJKc}kfROLQk2r$+!e9RK7v?s{u{_WG`Sbbjqz6vOImID3FI^B| z;>3w~`st_9m#E^5ul!3oX2b|Sj}%GPU02{8+W5Wl$}7AzS+Q&x-=9=xxYOri0(>Y&qQYt8c^#omw6?geyjZ3g*MBv#!671qId)H5S?_= zNo=s6eDcYRkU#tEv)or!*NbOhX?At4E+9JBq&7r~M}#8w)%qOIo>grYF2v`LI074N z`T-np@c&@$!nug56`Xqf@%Z&Geu0fQ*%F`m%oi~A#TW7A&wUO~{UnynnS-x= z?Q3}CkwJiJ57Tha`);1cpqE*x5T zEv0643LQ6T(j=xtG`rf926wb^*R@FVh!G?BT>9M_`<8#7H)^4Z7x}Wq7F+Ow{%$Ci zZe%wub|XZF>CnMru+N?cWBoB3;zN7vhtZ?Q;-eouh*d}u=0R#05@nsF467hyzKVoW zS(`o-dNZ^yUW!t&2P;pJH~@#2El(APB*yM5)Wz;id@qGJxkoGH^V zea1}O_T=C3#JtJ4`08gd`UA(|i<_^7znyyl2E26;Y_KDGr`(LbSDwUGzgvRGr>=|r zKQIbI3BwP15&1pHDgj5xzd!89yxXtE;{Nq;&gK8W&c(UdvicIPy7xu2Py8T)6?3q3 z_B6a|5-jmZEg-08p=^~mRjlEjAH(Ev`|_8+j2(B}kvC@BZMPjxIpq{LCJC|UzHFep zcj3f}uC=ObWGRBoaOPd!=lhxnDhv?yrC2z30Zuq@a}*cci=X}eVa%$IM?x}`y)_g& z$Kb3}&&8cTJO`NmA}+h-F3c>k|n#1bqawf~65L5u+c6k3a5tGw;ShM5YR z+Mp@5DAOf0R*c+R9`T_AAg&^at4Jyd_T1$_JaYdlnDYEmAYFn79=r|vOxys&2P*jf z75AdAG!cuRyb*nmUWaRLy9ZO3Mfmbpe}Y3ldnV5R?l&-V_KUdvZ!ckhv}Py=NUg## zB%v3H8j1;=XaME4piiQCQr`1L>!qAj_(KYCF{{9V*J+yTXhtlPk{nClw<9SH$6D7K9LeLLtZ?q-9{QBaYzf5$aC{Hls6Idy}ciKWk?CBIBpzoD%M|reT*B| zfgzJ7ac1M$vu9(@oH;zMF1h3qoPGA$c>ek4`I`C3HhdT4m}r&vKxvS!lb?1yrJpob z*Iqkx9?XGd%Xqx*@SzW3?%cU}|NGyM&wh4)a&h9|gAc~MdGj!J>Qu~{HH#^6G(H}C z>@gmXmLDHl>gu~72JLMxx_&!vWgs%V1b|Rpo@CiFTz>iG_`(;yfR|r>nb$*F11Z*M z@FlN4 zlP|WTl2Opz-QB=*M{e@TZv^t!v)p(>?*Ant;T>A?G@*Qb(K`yyKj7?RE z&4f5;TYT;Zx8i8+3I~4UX#IP@9QV>XV{y&B_XDXa<7&pctZi*vdF}0tuF4m}(cI~p zi{)2%xZ-zL!%KYzk9OMgU_3wVU=;0Mj9;n^XpeE`mA`Q3qg2M>r<{r-PdQDD^T1$( zt=@;n@BI^_95vr&=*u_+fGeV9!@ucboXnZ#AJB11W6vVpjSY8{0hmOOiM*JNAIO|Bf*1rXM2OE6l+?&w1yc-X_ za33x>?KCW}Ee9ogE(UD~NUK`CdL3TOLDwjdwoD4oFQHZoFl>W~xc(21Y~D-B6`QH7Eo;?so@WY5>4p;$>|5yb4ex&F@*RYVY ztRs!_```Wsy-5cKj~arLzH|YSr9<%8^AF;Or=O1bQG@~1u%f*m9fLiXXez#U%IDD& z?v4kZz7^m6()UnE<|6Z|oDFxSyd~j@zy`3|4FUza5hB)Xyj!Wr{Q1bqEz-5BPoz+TU_t zm(f$*jg$>KQ?X&%2RI#LuhDbBn)rH7s!wff#f;oPlc`9xy#`-Cir8~QF(tJ5Cq<)!4?dE;KIfc! z4(87nH7wFj_FD0Gt+ECco7aPawKGZ0$a5s2xa1k5;joE4G8+o{?kmsA`xtlJ%6xUyWJ-25uEbvb{X2x^RF%nN+l3)Jv9##gUIWEmw z-jR1g@%Q`4{@7;y$ww_nkoYO92pIm9Im>MYF)M@k##8QcA2JicM+si$33`yhDcxkA zdId}%S#ph{Ge%|oj91U(n9(s+)~Y4#T2d@15)Yaa%o)j!=@UwtNoGEJXHU4(DI-pT z(=xhG*Mg7OkC1sPr3Fb0E0L^brR=4x^5*&|%@O&H=IYSwSRl#s@a%IhVdG6VML_Wh z#UfsK{w1C>)*HKyX3X{AayV1FX9gq2j>W|HZzUNH3tiZLw~wG}XeajAWn1jF;aZqF z`AOU|WiEFA_)$1ypB=Dnr;o0*4V!H_9-YHSU{TVBaqAAp2e#fEVKKnsB*T`Q?T!uC z8;K8pU^Je3_!d0=?5kKjkYKAF--p3N2f@&|BB@D=7{7rTPctd`lcL1KI-^J8{aZ{z!OTUrU=EhFZHA8?v@5zyiWi@M8B=D> zLHEePxcQ+c@a6A(7rVdj{TKot`|i2{o_^vEJn`(4=vm%}?Y93AhK(4)!@-ccmr3D~ z4!mEGENe#MSje+V>qN%$cGi;eHBt|K12q)FE))z0`bc~Y=XVKE>Kul})1Swj7oNw< z(GZ+<(XTOaOc|Y~g004PW6IR0@t4UJ?EA@MvHwoHV)GH**r+?kLl68BrOn@u4<7Ov zy!On4c=5^m@R5)2hkZV}H%1O!i?a^5X0NxWkS#}a-v7G)!y3q;BDi_Pdv%OsYjiie z&IuhSWVks?C~`=u)&53KJ~IDrYary&WBXn6v#!a-s`A+Pw{=H5b4JsRI7V4Mtf5IV zl*Wv~*p3cK7f&9Eq#r(|ou-K*%GhuoGGYW^79;Y3ptF+=VZ&y+MfB?upNXG1b(_^K z`DSqcG@8{f$&v9){iv+TwzjBFL*_qwH1!=TPv&_Rau++@&v`Cn3!uD0mnFJY-sy!m z`RZ9x1abSFcEa}m&tOFY6jYsI{KSbkdE#~mJp8Te~Zj?qv9bahUZDzct4+Ms#RL$om~Xl z$m%n9nqvE1cf~e=Bv(TcJ-+?zGZ7X!O@edzcMczpi?6&A zi8qu8Il4Z8RmUWcNNp9#NLuCJDO>KiBd*$ES0FB9x$1HRx|p_)9EtB=d@%-sZl?By zTID1b;Q*2yK! zPz!kgqG?_1*bxYOfpQ5xvxu!JQdAyEq$dqRh(SO?=%$CF5ha=kVVy4S`{+_ZU`Jt0 z%lZ%bk+?}A^c9 z@YtJ@5U;i%Mnjt?o6M>yF?!XWC6cqC(9Zp=Es=(8_+5A5Q~!GvK77ET*zbKCp-9)LCMbFZEUG5xtpcNcnUCQGY^eMGNWPDT z8-X!?N*u~8dxO*zD1kD^>5&1V8jq&T2AwrZO+4K?kpYgEVp|_HsFKjK(Hp;u&w1x3B!yYd>!wQ_!US z4y)@T&oWjEA^J?dSQ>~$m-8C$P;{Rn<4G#f8t(S*%}JXqBApMUqwJsWh9FinasRFH zPIW@<5&8jq`cCaq0@>+TPqC78(IU*9Hw#hGXX;6UNIVrNaeYQLQ3OfTK^VWmws4t^ zR6CfAcdAxGU;ZsXMcX7Lid3E7Rp+_q4y~i}^#D^=(_z^&8=R{=b_*fY?eRLDixUD_ z_pDw>|3v(0jea+c2E}9uYdjP*!hDy z!{t8oeeAd2ei*Ui!Dw&S6YRNOU0}xK)&x7BYKTc|jQod+byO#5Mk=7Pwrkx|(k$Y$ zvvQm-!VlK7%*W9ensLqw0oXh$Ef2}tU)~Z5jpbld5*AXFu?GF>An^2ek~bn_leFNi z0iKsb%=75;nMO(eh@`E?jvdS2*>m$08Y^R$S8Ac}C}9xs_1_H~cw4M7VLcKgZ`V1v zjP4PGq&_I7yr4)o59%&d`|m(G=)>BBHjv<7^h+Hj8nD`tumL}7=3_wLQee;_KuYMP z%;an^dofBp5zvewsxpQUaGu5G_ryrjEXlA(SyD9zpD##vfn2JL;P|31ufRh!jaf;j zXs?$@2D*$k5*}&VNT6b0AREATK9Bw`_f2&K_@oj-2zxq!zz+~2RKqPr8j~MEw1|r) zbV#dgQr7%zy=!uDYBO4#sj)LurvQm)>6HO(N z?(fPr z^IilVd1=-2nk7nM4BS{C?!BiH(V0Gv{aYP*uV)~AFPEBDOd*X>U?4NpdWzI9?Qxt9 zd(VmWiqK*6u$iivH=l5w){Mt-M4Xm7t#7abb#eNd5HAU2-fNlgZ*O@^{2$g}+cvN%tdzfAh^Zci-D{t$uv7tRiwsG}~;m&ASGHZJZ$tRR{RL+GZNqoBZDZeaaP@|V`Ge4 ze`F3y1?Igr4}%5|N2w(5y?n_MOr14_gPw;DAH(RxvK7m)VD3DW(7~Rdpe^7D%xI8p ztGx3Ik8#`X1SsT!=j*Zh8M~fRm96tFN|>K+$QMl;O3#;$snOjOB*r!Y;4+_6n;X-3oNanC4O-skcSds!m65bw5t8_tIc*-Y zl;ePV(+{SL%LYBwIE_JXvhNWGYM zh(yb~>a_1--%Yl_7Z3k1cH4J5Tzbz;yo%8A6a2IcKPdxokqGGQvSsv?xb74=V|oCr zz`~hRan6~i;edno!v3E+2q%2!BD@xR%-K(A5h(~Po0&yGwhTA@;u;*e*U>m~&!ch6 z754+-t60AH3EXkbZP<7F{qc`yUO_*-^P&~F~ehO zphIxzeuv-}7hR4823SawTte{EyJLg5CYO{Igi-`a$RA&9Y(Wr7)rcIysb8l+vG>JC zW~u-w7Ln1A0F}U?;@6{{Yne!7bN{7WhF**`j0FLtv0;@SD2IYC`40;zDZz(G5TasY z#6bd1Slkcx7!i6^@eOK92V?qis)#&M(-1L3HRffump{Y<=9p?_>G1!>iDT_hb_7mw zz~LxaedEmGDs}V6#Rza-#?k97N*XH! zkR&zs)QY!O`fJ6=CxQ2#N8bUdcUmJU#wN*@!1oRI!3s^fLqPBatN>^#HsT$MjH zJ74Ju31a@ha_Y5Y=;8UVhDfesd5npEGCcS)2!F~qSOK}siD=o(or!`P}+Md&-ynx%8|sC~13 zeDgVAt>y?@Y_Y|^lyK^uTJoCvHdX*?#1qe-q%xW3ODZ)4W4n#e>%Y)Sbx1DNB&o~A z86|T%u6rfyz|b(HP>8&fu0qtmT=o` zw{eUFedww0xcO$z95{R7LhQTmzPS48t1*9mioN&V8xKA97;EHG*4NofX6rk*44^fk zyq=I0@!nlAb)A1sQ+$tlrB&)>RXH_iZ6L2Jc~$A}guc73WH-WgOf;|IMgysG(>e+IRA8Ush*TBXbQ!Y; zJM}*OJ&I&LOJyDQEG%!^;Xh;_W%-VwrD2}@rzdAhx2m6KHR|c#Hm?A`J4a%hmHX@( zT;4JcJfYddWgkC&yrXffj)6?aP%ZWUOJJudOjG~cf!wt{3!J&x^hQz?o_M5bMX~HEW zTs8Svb}}omvPP-uv4(tRdYKojs=}Q8O_0S-MCl+PU4mV<*%%{hcVg+&bAb0%G3UAG zaLJXwMQ=O=`+e~oY(B9YBQOK^-g+ypzhfD<-^oYsfD6tz9V50m6i1wPGDs+-lmgp~ zUW_Hvr{mgdU&227?1m8u@V7gEhmE%!hS@WwqrA)iV0xF2o%ia+Lr>4eMRyM169*rQ zy>k4?(ZC}@`lCJdAh!t47s0>Ef@p^?sy3) zff-$ILy1*N63##D;us@nzcL95VZr{>sg@-^Zw1(Zqpz1gt3X!A;LAXLT3Sswqx{+=CPqDpCH%ft|Q1NQqu7ODv0Vwkv;(3%8 z#UqHC1!On|%*xs_CMEMp7I-j05kVpdM4v~%Ku681NZwcqV)Dr|p;YTN+>7&;An?|39yV-PL-6YA=&aK*gp$%?Y7t$l*KUz` zdeQz^glB$sBH3q;_-yl@~h8u3h(+@t1pZ)A-+;*fxOmPr_>iScmWMW*Zk=v{h zNSHt)OrJg-*IjoVmd~Bb3!vqDT68B=RU7)rfTQ+DpB>bS?kiW+qFxy? zhg$jm>WMfwq~Cd##4{yd-O$ak~XG1dQ?kAJhpiq<&~jNaA@S2IRZe|k+xStw_XajJ4M2NRG2 z?PpY?Bx=6g8du)&Bftj0=94qo@@_D&-|kWfLmfLYYxFu-C)e!&BY^B;^Oqq_BSBA$ zAoT3M3TY7ZqZ%#-@EU*)h|q@&jv^yG0fu)C;KJ{njNd%+IG&j`6{nqj3WA})wHH1Q zKb?d>Jp6ljCdIcu^D#`l@mzQlw!*9hMO^x;|HZn))&=@s!NR^pXhRpHpeC&;v^pGZ z>x{sIKRp6xopn0)s_cdz{p=15UvCclzyB3sH3Itxsv&|(fEB6mhEYzC1{Gv!jS&k* zCD`9s!+;rJtcYX=%Y6}kecpMvzQ^FqOTLRPoiPZJOw7d$o0OBHf%*1>d7QuJEdV3*7EX?ssW=Zi!&RN8 zQsnPzZSp<0LlPqkgxboAS;i`Ac?f7;;(4rHHv_^!>4fP2XNsT)PL(Tkv~(&(oo}+H z@Gz6e&MUU6HhMzfD=t`wIS)&y00blKbnBw#ezC~CL*7MQj`MVo5}Xm$xGY$%8;mmh z68JfdZaHiqQDzWj27zD1nqL0v{ohh(Y*1;l63QDDI&RUTMU0x|gGwz5zbXoi{k^ZR z&mpds2X1xWn-S)`hCCg!bm`L7;^@EAOP)ewi>-TlNBa5uKl~oAOqqf|{QmctF?ANM zzxH=dx4OBwfZ-gMzPG1`>#BF@QY1-Mmji{U~=n zLO_{^PMZOE*kg}97*XG4mtF9+uYHX_pZ>z9*}x(6or0312z4%=-mE-+JYS=;vlA00 z$m~JrJM|steWDpOCmH~U0qDoqC$O*5{Hq;=z;66=kHEA} zBx)ei_e_Ve9w9(@H<`!`+G0IKR^`c3c5F_BhOv-aqwINXD>yj6ju4wxh{wu>sWMI9 z>gGPqPd>iV0rNEG+?p;Pb=i;E?`U1Or6GRkKTvEt25P*smor^Wbj+)Je2nJdNOU{F zYjn=e3%ojB9lT4Bx3`2sLxYfLD`db~W8NC}Z&c_wGP*=6u%3j-QbO{{mypvsrw^S& z=OTyJ=QEM!pV4+^qq0lHyM8xNBy13?-Js;@OT_W-Xz#{$+wO=F!$)(F@vz|?*mnC( zc*o18NYch1#2v_DHDFD`k?uAEy|!W=x{AH1^~`|RHxDKw_k9SD(UX3JK@H0*!?63l zpU0O^JRCltQY@`-o7QQH*n5%&mbDRH~g*+eE7qA;@hA23bN__ zxckZ3IO5dr;=JS}md_HcwXC}=0`(Ur`3a0$_4?s8+#qnF= zrTc!3Vqc6u-MtJ?yimqR-nTY}&^xpfkG%#IyBPb~Dp`!Vw_FWWC*tZWp2il{SFnvY z8)yIZaZLLBDcE_PK^TP?%RTT%lulYfRd09kvxq;bNsxI7f+S!frAHZd(@+s<%1qXV zTAE>?ww#f2Z{Rhc=T(@2MZmyfpl>c}f4vUgy;lRvp23ELhhgUln_`z8cIF%ai{>t1 zR2%6$M7`7S^^32?umAD{=KSSmd}#C_Y`*m*tiQz$`0j;wqL+B1RLmgCxD%zOM^?6%WR z7`6Tc9Ch-!SmXsb?!-@G(z-+Nk7MreFT^P6FhMF;Q z)$Nm)?X)_xgnZM+$|C*NLjpxVNri~|K+2*rx_L7m_Wtyzao~XmV&cS!SbzP^vC~dF z;h=+d#N@{w!|vN|i%)*?le`JrYOAd{b_LkGn@3>~UoCqaB3eDFc;7kloxJ^uRFzw)@D zen=`uH{N(7PCW5KsTTqZEUIKt$}D5A(qV@khA)5lvu{{`){Dj5`dXFeLgMjfy}da0 zm}6Y9J%J;1{}lthIZ>xp|7?{vE~W|2ZuY!7^feQBojkY8moH}}v0HDw6}Q}S3$D8A zDjrwVACErzX!cs2efHVx#iVuQe?Rv*{yV9HU3%%I?BVR|mp*D(R#k&N7BA-UapH+5 z@>tq!x7{#h$|8LAt6ya$FuKp@KmU2Y|IRz_+-lvN7uq#pnz}Zmd81mZa$FeA5#z>; zQ6pOa^YWL6SuNM6I5J)LIX>b)fM2om(-Gf2_QG6n)_3r|?_G@5 zR`K>51>vr~Wso13co5%cN;WIhNCs|SCv32k4W2}^o;bZ%}D*4TJm*{-0$RNC=^QK zZjTd@k>qT9hEuRH%`I4lh%{OKb%g^@;pVP zgL!Bt{p#z|E=HK+6@H#Jw3XX%)EPg-M^2Ex4;nHUWf;Nu_vI6k!72T=$@ z3?0&4AL)a-aQ3yoMIq=CwS*x<@TG5m2Zx{VzZldu7;QraVMzCAJa^CSs6;jNqr!c7 z?Qks-PVhaMJKysp%(uBPfmR4Aq%2VLt0)FVEN$;a&|XFbH3WW!fSfH+h>V~b3aDOp zQyg}1faO>H08gFzaqMu>W$5?Y(J^Xsd|=nzaqG8_0eb#{=$Id%Mp;x#5vqO##bt{y z>!JIx^`3_iyB^DX$6(Z$oiTR8wrDH(xb3V%aQf+|3j z)<-sF7Us=ghV{pcL&q?n*!Kb!PMwNpdpE-9(W9~UxkA?GN4C@R~BCcnpf+c-x zp?j?^cKr@6MR@hOXE6QINARm>m*9Z$8{pu>cgGoL+>IOmJP(H)ydef5XqaDZH_bG| zu<@-L&6>{xZIyq&*o~!C8zv%6Ti(I*#0JHgnEBF6n3hdo zKw$i!3QB&8A#njiXuVq+pw_<--Wc&1&Y#*;;lF9=ma#?%@lkYPc>3b`a&%*Y0 zj2tzJwfH1`-4<9}Zqel-%nKF8p!A3swD}#Xl9cqR@ zx*uI*=vr&7q+3f|d*81k7sd8=j9PnbHr{PL4Cx+>kt2s=^vKazYsgyg3clluwgC8d zez6EPJS&JHjrP#3x8m+AudL^#sMYFydc+7;CBljotj0m}0(}UXs?43s9-4jj`H%#a zDlN^o;BU3M9cJ@!}}fBf;d?Y0NmQ}n_M3pg*q-|v47=_0cMCT<*U6ZjJ}ra6{mnbI##8iAsO9A7B6a*V%K|vv48KJ@;IW z^*ZL5W2hmW$Fi*r_`!MK!^tO~jGjslYFQ1R{`9Buzyr^+QT?0W{01kSZ~}X~Z@A$G z&Ik4X+4~MKE2?bkRpF+-opXjJHaSWV5ClX85ikRaS(GuM7!fln2xiOyLD4ZgW>GNV zh>@(Il0!G4bN5XZ{%`Md>UK4QZ6<@yjChofHKGa6#l}r;q zeEvCmfUpi!D^X-+1+a1HNBH6P>oKID8LX6+SXob-vP4vc!w9ea z0+ElNL%66rY7RSzvj}@Qo1xA`7BgImvQ7EO*MJPhuZeeWa#U25wJLR_rDUUhpdO#U z{tTu*y%1xj+>Z(8o`9#GxE57o^lptDa|cXwBmVxvs_A{Q4m-edM3$bN2lx z&ZN}9r2&Dk5BX{a z*1We6kKcJW#{F$1PPlpk9)0y|ELv&t%F3RTuz~XRo6&0Y`B=Se8%E^hV(n8;fzs{H zxb04yb=T|oV8bT7aOF@uF|iMt9X{OhpJep-hob zi075@A3 zc2uAo6(tAlqIb~^orf4_PGlviL*-EU-xnvbDhnLR`LCg&fisoA@#@=n;KAn^;XUr; z<}3?Iu~3gbya1V9TFL>kjr;o^%H;u|I_c(q?b^`Ls)7(>AUCr~>`|rPx^;H(ybvPA; zg-$jmp?*iPWkZG>$=@Wf*D_wL>C#phq4rluxdG4%fQy!4!e-I9Wms{Cti zgM+agR66i(9{2tj|A)%IFS;FuPHHla8iuUmu+qR$+P>gO1X|VuK1F8LYmhT}s$|dB z35(mvg07^&w*A7J!Nl?yXFcQgf=J8EqScljr&uz?$xZ2D?8k5vUQA&j({7mqYiu7B zYaatn8dxH#UV&fg#rjxDfv+Ui2uf|Q2*96dmvZ>psxI~_mK+S6x)X?M2H)4`REX~6 zofCX(uR@&7LmlkTE)fqQDWoYK;=^J!4IQcyg-2_Eh9sQ# z&`YQ*?uE>x1Z3CM;KSn$Ln(1S9oYJE8js}@GEfg(#V^MRL;TG$;6=0AvQFTE7i zI}{#jS=LG<1-=FJ_E@*099tqjRC$5zs)c4G`=D%x*SiZ^My`lTNsQv3H5*~29sxB# zekI3vmqv~u`>`elo(U(l`l0gQTofs}XUCBUkHNOD6{Lx5ca#T!CZbt0* z;)@A@QgrEAraG0`r@iG!@$W)ez(SPG4c`w6wVe~Rk0Ep`s1^o1NiuhFfP722&G~J zvWt#m`+}5iEK(ISGEv&=7`)qiD4x6TK8(HcMZEs{$;i$R;=&6rME?<|^1AM^YVppS z&m%E28I+oU{GzeiO8iWDI!bb&*+PmJQGZ+s=U^_sy8-V6o9>;7)uD9!J44)^i4_t_ zc2IJM@9sv`9hwY%k0RY^hv^RD+}H08((Xq0iGK4}q0l&+A9sDz@3dp}dDS>d4JpN| zsxIWavJ$&@Z$->c1_+TBL!u20!4o%h$(0M$ps=JH6isQO6Ynk}I7(@9Kd0Dn=Dhol zb{v@(nO^t(jv^cEzx*-&!=0VZjqE#FWC?lafv|UgvrCUbajvBt!ZZ)M!jLpL)9UA+ zf6il}MM(~N_v}rfufm+&OS;`da%z^?47$B^{>)591i$-k6^0Dx$aBo>`|rog8&+@- zSBJKPaL+xn0IiGzs9${RHWU}PLdPB*(Yj3wJaYM&d_7XpAOnQ+9b9u2&N%TzeEs#; zIPtok@ae#)QKOh2+O0<^E8e7cox%tjjb}o`kdngBblh>rabAV1`j_zg5%rI3AzQT_ zC)%NMsQjOb#nY?Y2&yXgKamBUEa(Ib88QSH+lB3Pcn>;YYc_&XLNlmxwbu64qM)b+R7D`pnncWXD*#mu zzzE%sNL@Kn0|ihu6_ycVzm}@_L_0)9CB?L>C{IvL_LsekWb7N3f^y)O3%zPN6;A$JCQ zrJOrd{?MXW>Ph zNG@%Iin>~;-T;OkKMLuY)L(L;<>ca-=Wb`2z3P~dX|2!8!Q~GuMrwl-H z;*Ho*ZR5i0ZbV`0=12l?;_1gi4Te##=3?CC#b}qFgY*b+#niKqnwkhCq~L}}pG2?E zS730P0(|rBMi^!qh7W0mMB=VdBwW_{cC=`f%{JOok6eb_v=}@|$Ku+1Kg7r1eZ>a$ zluMJ*u3aMF&%%v&FF=a zF&c#y&~emwJn7HG_uDqY=L^Ef%tLA0j(GF=1ngSB8EO7xyfgpr7&LS+64~U?M4X3; zzk~-}dHC_CY-*@U6VHbOayI3KJ6wnV{gm%;IX7(BfRd7u|5!!o{*Uu^|mK6~^M2g_F1=WO# zx%n2}F(>3TW5o>4+MvkDIF_$58P+b}R*syKjxdrZ2oA3y{AgjBTiJ%l(x;FMmg68q za%M7^g-z~@C$Hi26+xX*Z7t5nH{(DJISM5@%Ba0ABUE))PH=iWN@in9jMc~A^+_LJ z%u~zAzD7Zh6!0fs$D=sc)kV;49B|*e|I3|#^4E|W{j&>gswrm0ou^=bJYYnHq7C#x7!r{$}d>#2F`*}yI= zZHtEbD1Kb_Bl7YJ(XDScy!6sP(7Q_)v}x50&^Dub_fA}J^J4Vv+ZUIg)?0G2sMCA7 zSJG@3uw@s~>-lq2OA_yehIp!P?y-hQ32s|KcKOodS-ici;=e~B<~(myzOa`rXFyf! z_@6PPpuBt!CQUd8!-o&YIhS3?!D|7_3FeUBb36=tb>l+_{eO9hD~0XVG31}aYD{`T zbpdI_gbOpoSycg_CES`(U3}jwKR0w!N>mD&L$56Z1`W=Q&vW^*72jgw8E5j?SG<{w zls^6RlNfkJ@A&#PffD z5x2~qj@+y?_&D*B!t0!e>8f?S0Ggg8`9){lrbC4%COq{qslMn~gWOulYJS3&6p66E_Bid=uCtzy|RsYEC22*VV~uqpWy zeV_WDCBm`A{Avh++|S;a!>T)1%>M!TIVy7Hds&p|?;u7o$R?wl2*11a;h^5+N+B7^ zmNMo2zBJkQRp=a&WTWqq0q;<7e#@|Su1S*u1-}v+!0GdUqqW>Jl5QFfJu5Bfe+2{H z{q9bC(7TevW@>T@axycZX+D|7%@)RpBT==&e#vpP=Eq8(zX`C-g#=?PIWA(RcClT{(6R z`t|FFV=q36hogtH)YH&6L?B|Vh3hYvguWMFf`R?I@$%rONu;3x^JmP!=are5Ir9pn z253!c0IYhfS+WGz-1{}2cw#0B(#7ni%Z0_!C*x^`e-#s9yl4Jq7d>RS9|*;kYD6(r zOyB{l0c1u;^cWvxuu^|Cou;%!T6UkuK>N1EC@#uHLnI7a4;)^f7 zz#D&Ghj2{|5>vbqtjt47W($nyjZ-Z-a6{NUx1IQ~|u%t#nRUV;Zt&YKH=QV_y#MZwxJv8gqk zel9A&l2_5BMQ_LpQ`QDvG99kGBGTW7b&f6sSROvtjBkhxXo?ztUQ=%Txt44Vh9dlp zy3_GgNAXN*blWa>BlTfjDy7A1$db<`4Iue}Cha9dH=J%G+i&0Vkz&i|w;e;usdvY~ za=!0gA1zp__}mAleJxfMGd!9!sHKzC6o8Ib0wbnJK23}wQ+3#CRHW^f8w5-CW6cVo zQ|nfkw_pKmOM|T`LjA2xTlRtaG~wa&nlihn)Qq%MFq zqB?+>xmZ8l;B2b~e=~vKJf=#h zDgJyA={oB%-SEL{9$+x17%3S0X34P&&6%qVsn`<>)(|J9loPHnT5e z&&|_!u0_$z`8uDo1m&srkJ@lg3MD&(bC9Ql6t*jE%JCIt~p z4syD86J}gPoiY<2JA61Ik(f|1kTE!HjKG%hJZh5^fIKc7FXkV}K-UryknZ>J+7xr4 zWBZe+zRi@id`ysmtvAiK@62jVY&To{o91oaw8>1_?vj?A2G}NSOIq!wt5a}nl*z^l zJ(A;lD$65=!Jm2>f56ICbJ^?>kN_g#~~|=gqNcn9x01d{ME9 zUu?1V5>!H4R7ajktU_KTCI*Kc=7D0$0d334mx2Tp+hWnL<|RZyNJiK8y^!I51$E_h z@VBTyXv;P{`S~*R>oXD+eh*@S1SHgLLB+Oh2&H7;#dkkNPTSGw-8&Qcp=u-=A@~$c zpzl?ivG9WrkXPCg8v-$?2_DoLgs^SKn#GH;QPELep(4Sj@!+*|p*q66X~S|nyobs` zS`<0ylgbeto_OAY2p_O06RV1-rEx|{NB^-_Q5h9Vump`%Q*`!1(IoDn90aC_-t+q8 zqHT)nhDEe9{0@?;33VmKqKuU~qSC+#n2Oj~`sKnCld&0lg-qB=Q-qXw#$cp7z9Nb_ zN(K?eO*~aBGL|V^!Ma3>D4xV3G>WdrE^UDfQ)GY^7opMPK6VdzBb82 z`25_1Wq*{P)8>LzK2)K?Wt#?%rLa7YOmOy$LnQKp?ANBSj>S7jd0=L0stM8nbNV-( zObD;eo?J8FcnqTaG`j8OlQroDG2}+TYir;~A&-Ot=wSuA7J#i9jrBmn7plodp(Xsd z@HvuXByDf7K&Q)x9uHA3v|f^SR0~Pmt3I zQ*}*U^cm`xY>dlTH|Zr|dM&jTd3gAHj^|2exod@D@kk0-HJB!**+F3vm}0Irq>bo} zQ_XbuF#FTXA3~vVG>zTKk@lD4O5Y;`+(FR<<^+6A|6E29qaG#=NC#aKfmc@%{J9Fz)yhVAj>~IW4>P z#MeJn{=* zsS*IUZ6QO;F*$Mrw%^``eVw=0xh980wXIevH_tT{?(3Op{LkSZgtQGS3Iri96Qa}Q}v*PEcsRQ29Q zu$w=(o$tr9@j73Y?aG@c@w+PfF&B@VgD4rIWk6HCuv}wMRUIdjXct}DX2N?yiSxYi zwiUuLPTj|yEpb6RZZ?NOAORc!$cr5#Z@8EpEcx{E1*wnls3!U!ZKTOQQj~*Ao#qdt z&`_tR1SxLL`Ti);P=!;%Au<3d$%(t{&nAHGNm0{q8SB_<;i2E1XL0^c-(!l&U!d$u zI+G51$3SudicrAHFzi;eM6#xc6=t->B!q(#AVpxPF@el5`XuEfX>hAvm`a%WXT1AY zgzOl2Q4I0o7YO*VY2yyO^y2%dj97U4+fR6mKRJIjHkD_ia>Hv(i#hVsOHo%}2`!S1 zSY-_9y~beSyb1Vd<_-94-X*|MpP?eH5T?2t>o%;!+(p~*!HRkmVjCu(dMY;5?qRyb zxeqMDlzSK9l%a)q^RdTp=?h<@P6tvb0M_k7JEVmDmnb%SeiTHMAbg4sAuY%UQ(SF} z`DYx)vO7poWSZ=acVXrjI>NO z@S+3T3p;AV@`;TwXFF9j#1vtWDH560bgM}b%#H7N;9NQ6`~9WJLTQ97L$by{3?&C5FXA~-R|h9jZPY@t9X*_cL@H{y(a z#$t$g1#;)5_!LvX_GHwt)k}*pA#b!Wo6_R-$oHol5X@y3&tpnHn<^Lnh$1X&pXma( zIc(8EngzF4aC2qQy_?(ZP@)~fGakz;^F!D^xj+k!wav~J5im!KH@&?|-V_J95P&%4 zfEK=$xQkx|#VhPVAOpz(F&dFjdWNVjf~NiC`s2W&7+Wz>>H1S;FriMWUEBd8Y_;fe zX;$JdCh}_dIp~A9m}}Zj7K|4&_Bi4*UPV<$#{@}-cGY9NDmIptCqsRx<^BNZqsPquyrw=s7`+;YOvUO z#EAYAU(z)RwkTXLbZuR@2w>Y$wsUA)lkrY00nY6rlSk3C#Pb*86NoGa2>D%>KjbN# zj9wJ%Xv)lB`#Uvteh_~`RRobhtWl5d1dThnm#(MQAU@gg}fMRFn)ScbtHuL%<- z@WncG=)k<=SamIbhx!Almh|b<2fVNI`_ZdcF9ZSsgu~$Pl4dPU%AGoO;%u?hm1uHd zti`ep`gT23{(Ygg)+IzleU^ZLyk^Z%kW+x7ydspeXpX`{@q1B05n7bA;C@DOx8$KB zDjmg7SXLvQfDH+yF*T*)Q12j+AV?(sk7CH$c2l}0=gP46uYa@Tt^;fFlGiBB8|Ran zW~1yb0URFT4mTw{O@_Pb=96O|obErVI8UU>|162nSu$>h{&Uas>@lQwF&*t%GyZoj zQYnkjUb{)H@4L9@+l`GyAc{oz9S(6EN1!@3jQzOsA5)w*q-Qh@Bi<*Ru0gNE=%{>t z4{d^^kw{}C-UW=twZw`!=&wVYlIwT8iuSS%Y)Ia9<4t)Cx~vyx3{t;yH74BCyz|We zGB#weq;qmSUx_p5Wgm#gW9jNavwkQpuXq#KIu2h0?qRCP|F|CG=ZVh*#YSAmo$5u< zlihSE4N{ya{>P{hjkllDI1I$Iv2Eh^lsO)~Mtse%jW}{Hf|}%aNl{KJ-q;LII?w7F zK}~>LSG~~OC7+2rG){9nUGG4czy4kMLkxH_+{tJrU01i!ZSBV(p!13Q?gW`S26jB9 zxGTAn`*SLk0Lqb`bhP1}09WVU4ljIfgPu@2hgNg27l-%mY@VF=q9io56z64T!>^>G zD5o_NJW0sSDBvIzFZ|GGA?7W519Ynas$C5Y4UAH$roxkSxMC*~e6^^r`w?ctHYlWI zV>nWi;!0691)FzO0l|&9=(>S;@V*B?;xYN^8vO9?z1U+#@$()VpRZeoJ$@flZ#Bxc zEyL>XKVS^=+0W{+ad#Vdf=NiLsz$_)ASojWE0!)m!}g7UFM?N>e~z-M7-#B>u6Yex zmp%;yym;~ZA5gQSo)rfaX25EK8)qLv-w*yG)jsT)I7|;Ca;j3#2T@rRLZ=LY_Sk+O zDExWJGB3`%axKPRzZ_p|BUvsV9+|TakIXB>>a7Z%erXSKS{{S?PzC<+^7AljDurUI ztuhZ(Y1jkAYEZA}s8xk{6M@`{N9L$76ljLZz$qc!5k=(#k`WqJEksq7kz_C1Z*?-O zu|$svDRv)>-dfJr8BvY%mu29U$w7j|Q`VpvI+U2o$Si~Lnjj&o@fwpw^1x{*#2|Q} z6!W4eq{dJSLsbx?Ig&jOVL+({tP0Nl8sjNbKDR-LyM{dq_|Odxl!%Iu4n9ohJb80n z{uif-+Yvql%a)!u1b9LKad62!y7=9{Oplh1W4=L1fmge9Ws+QV6sGs>C=dk%~+mJok*?X!$a3C5egm9OfZChhke*$~F6hP%Xk>vHp7?ah#9`gf2q@KhJn(@aREAMa z_CioyD0X98I^UPg9PelGW|q(8H7$6}Mr+yTHqZqh+^sPx|4q5AZOVde`=P0R&cq6{ z5{joDwq~F~0cRAB=oK*a-S8VVNQx;?Z69Km4-xi4kP$%bzXyg|gOD$V8mOoyaEIR0 zuvjM5Plml&1tnGi*dau16*V59ikjOD@lmOIP@`+mW0lbC8b(Xm%c9f*Y8|Rn4|a2n zRB^l(MucW*%5Z)F6PB#FtYUWK-yEMRq2Gs{8w1*GsH?_KoGEG65hw^#a@Tk&w zB!g44U|8WlfA%Eux~a!0eop&Stb@*dhy)v{f7ehNXw*RGgGOMC73U~>bv+~6dW?F) z4(^*_H37Bo!6b{=tcEvQ314^*c4|6yQn0&H#RoU8?Ln3tRaDz{p|pI3f&1Ky3)lD4|rz}{b#7t$-IfK=ytZmoCcI__&ZC_5!`qVJlf z`7hUWpHD`-Tcw4rPnz|A6$IWvGo1H?-1O|&v4fLjkvdRbUKToa?uhj4O!V&8S9mFY zJN0Q3^#)RTq0JKF+)&q+-R0S!YZ4MevYySFHN$n+-GPy3oWUErtjq%3dh4y+RgPZ^yFQJ*|{9(!eIGke{2uVBv};Ny=!X6eYvO5mxd zp29cZlyeqH`VP$_)F-9525Pr&$AsgKLz{N(aQNYa@xu?lNKq44>fb+Vf_HI(_Xibj zQe5MeJQa?RLqk;+CX5}6)~$Qvx#!-I**FzE{rKZZPtC!^N!O#YMtpzrq)9leM-O!F zd>D=%c@lovT#iR(-Gdo7-5h_K|M8>?nZ{#*&L~!ktJFslo`v3SL7)tRu|vv#Mk2W8$}7>P zLmPDO-5pb|xl=NvB=yR9)mRMIUvUL`cJ7Q$ojT)~5ohB2AGYvEOF#MuPtRR|x(LJm z*tUK>CQrT=RaJr>Raa4gJMOt3%YIzP54>*KG7Rk77acox#_$uyVf8Ot#XU?D58Qq` z`giNb*<+77dN_Xic@y`NrEkBD!JRs>3SH+Ohhff>uQBC=JtYo2D;v@A>>bF3Jtww_ z%PzYN#rgTT`@Vzx)#I+jqtA;U{9nPd|%2Y+W5Dop~mjm2|?>b6<(q%>1XGLS{+|&OZM#?5q$Q zpB?Mgq5r@m(5r7hEdK0E0k#_kuD|+fbm(wAe)+}1<}I6Wc)!DO^>ueNPNy;kk0_2) zZ=Qj&Jq?)q&_g(^O&g3DeKvmlWe=a$uxS&gKk)HxPT@-$AMACp{}sO#UjxUEdDhpA><7o&-i(C?JU^QaF;F zUg14dEJVrYX;EaqpZ~_eLgZ3so#`6pEi$^KDDY}t=!8x{l?rMqBP3VPxRJkOE2)e) zJ}`3{%F4=stY)}r{s%Z_)iM+n72&RHQ&5nU0c==@B&`UiU3fh%INwD3f=sk;lZF^V zxN`p8NKeQ^zzks8H~VKH001BWNkl8RkJIPPM4CShQ*VC}Ma_@J-_I__^y#-?@X@WY^5>0s{-a;<@u~{k zJ?S#MGxJVNnsPpNuG)wr&b)xBaRIdk9kYUHed0Ir0BIao) zZ-^3oN(zO_I-h~Wk?A*Q$wc%=f z@$?ImaPdsztS`jkj$zVm$9*=LJ$#HSo_?z*vQ+mIf#4jeH`sQYjME^7vTPuEphs( zr(o4G;M9|^L)XC_;7e#g^UN*W*Up>t7=SD+cw!+ct9D`W7mK0Pg`g({8m0ZH!-vbU zdHHAPJ7Egf-{x1Jz{NvL@xTY~BCXRvy!p%n=+etTe#?z8)_;MA-&l_JBX;3${X?)f z{)APlx8kT_iKzSe7fe3;9Q2^B%Yl(2EGU0Lc4ak_@^gxcTuL5LPS%SdE41$;kx%CmZon zWu{R&)+bpfB9o#X3gOx5(^0PEV%~?#anq$!(62);3_7Z(1nmQi(yMAYtH)e5Z4m|? zGXs;;_uz>;uEp{F-@q&HEyQa-SK!rkyD;;tzv0^_UqIH$V{q?%3-HvFQ?O{!BHT9Z zUcB(a!?9y%(Q|NA&$DsDx#z_d$3$RL6wll} z8(oh+5t^|ZN=Z9B{Ev_D<-@Py^-C|q5r3bIWy{_{U4A#*IpuD&NlHMWw*lexYq4#` zcbGK&VW!r0C{WohdFiFw@qN2e^c~nv!~jVk#+HE&j<++OkKq8>TmK=w&q?I;-FM%y z(dZ--+Mhy`{K}OpSxtuMFplxLFEtzYb?LlayLNFRC*rd1eXg?!aBm14sYUvo5;+wV z6fg>WFqggK0^C~gB+r?ckb<1tOg7$)SWNI4C8y2df-xelszMJ}S9oJX2soSQl8)qT zd|2s+!wDsYlm)mnWaMPV`J?pr#Gnt&n>XV@LL04NLx%Cac-aXH^o#C6Mtz%-Yy>$< zKFXF&L4H9zfs8*G#DM+-U`iQ2l7ZrZXIYG*MAmy1A!iQ~4ET2JV6V_s zSG|CdBU>N^1?Xhks4~+8eK`{01af72s`y&D1-X0;@*onDzjOB<_E@!UQG)8KT5R6F z5ji26Gwq*y8(}L#d!hlkMa5#cZo7VAyliQ-Dhzkmbg{n?{6x+9N zM@DG@k`j`{2vmTwO}jY5Wm173d3o8Wt*z!UT3gw`8E5l~Tfpm8uy*ZQeEaRUICjq- zgo9!BQj9zILiFmNhf{w38E?M%ChAR<^J=tgmd4(#xBvbus<&=saAn}YfjGQJNBBtk z(6$iFO^nk&cJHo*>9J8;TZ@*NdF(;6JrSOpi<>uN58V2V!c*F=Sxe@pS2skM#z=*p zKOvAQ6Uza04RuKI>FhnMtgS&>Rt|D<^I5?nvZn@?siHDsqFJ*{G}P2^y);$eJYy|}O~q>?Cm_;&4D%|Xr7ABciTWy9tTXozb3 z?`AnsDA5?c`Q{t;GB!J`J#w-Wxy{LoW19)wx1tplyz!gRts6SFZ^tx2vX7T8UCQ3y zf!nK5Qjmh$sw(!B#;gEJOIvZ3u3o(w-`CjKUVbi0GHujVSHs8jR1J|(i0d&SF^TJW z(~fQYGc!9EnHlME&*^`HE;?H7np7F0m^OO1zI{6*SxH9Eo;~@QXx64SqnM^vy|SQq zXt%Z*&p+}Ax8eQw-;b=!1Xe8>HheJROdq!~q-i`(D4AcUHiZ~^>7|@8nLJ{19+}72 zXW*x$$m~9J#0XxiaYTD8T(}U;o3}-~cKNvf;%iyO?5Ig+bKPbZ{|(EQEyFXg|*eyVy7 zaQmR5g2(nTXHG`fjwLwfoOAH$r=Oy6IZe#r52eFq)MYxLG9zQw!m{*#3<#*Z3> z4ueZ@%7zX2$3Ol7HMNihLE5%VWyLuH3Ko6v0gu69!-fHV57uuruyElLRIXpo^C7L> z#Gs%tKJvKHXx1!U1Vc*~;o7gh;eJ9faD_RAIN^j7h#Up|h+W)Y$df}ckjn5`Wjm9(!&zq;LBoho#%@F0LHwyB(B$macz1tiZ)Fzu=73yle*eLrsM)=+|WJ3~f zFqy+{##J`tJ@m#v837`B8*@MFLU&srdA zOD@6di@t%GT!g`AT#4Inx)fOYEzUpxd?+Ia;<*cxw3)9knK z^DYIgh8&B#?z#-$+&Y^V@ZC9He6;#I96R9#mRo)D@rST-!#Yfza2AH1a~jgym%?gQ z#C+${7P)xvr4Lcuu^);$9S&m71iJ_D%Yx0=U0;KGD~6vw`Vg_oO8C>$(WiR{ynX#_ zUVLwue?4wGZyY`g7qc|)E&Vfa_uY3R?U*z1_|s2e#PK89`2XOs+u0x+cgdp|KK>NU zeDDFBe)?%RzQuOja^`qc_q-Q3-EchCe*Gi9S+oFCFFhCc-*p|9e)}t;N)Xc@nu8ua zy5Z7OFX2Vn+b)17o_GRJ&3=U!=AGUMZkTp0#trU+h(8E;0z#KYCZh8x0VH~X+s0oE zMGIkF`7czW8FCea>h!>vcGuopA#$ zx#SXb?r}K2T=G3$d-Xk3h8nQ^vdNe??`c#ndJ>O5`Y2X648WK%V{l1dFW&n5Cs-A$ z#9j6@yfJ$OrcIfG!!DnXp#w{>a{gzSzub!2GN8`Is_h=6 z6-1D%0&o42fSG4pi7fVZRq!hf?SD9)UR%$3LUMc?vFeMb;Olf1R;=}4#NhTwCnuKK z0NXTC8PkyH(b2tU1$wqxk9WSQ!sro&$W$!ow6NF#)|>yci;bq4SmRk|xh`YaTE7-b zu7TXVW_(Wb?#X!X{ZBFLoK@^GJ7w%CxPH>*7<!S?|=LzvO2awL;FI&Q-^{!S$O{C zf1;pc21+^~BRKMHbFoFM!&}RjBCkhBD2aZa|C)C%#GQ}bhP*F-!lpf&fSJ?TfM2$9 z1#Z3L7DRLX7&&qrq}~W8uEEz2 zPQ&6SuSM74*Wv#Au7RGJjb)p+;@M+Lk)2zL+g^SdZCd7IU|~Am-LM+l>J(%odf}%G z%yzUv>m82n-oD^gBs>l9z%uJH&(6Tp8<{7{{(CbI1f}T$~7hC{o!&l#Kj* z%z5Ssv}m5`P7cemccyd`vy7BXo$ijzbN8=!M!C2elp^_z`<1BjP&vqpBeDXQ5)+j# zzOXQA)TP+Cu@28Y_b$#j<4RDN%~xO5;g(xw;lT%AzJ8b;@1-j`TFax?7A#nRH{N&yH6h^fd+y;e_|q@H@Z3b+%nuhY6DaGZO^jsi-oA;^>=$2rlgAZ3 z2LTbZp&)c^@#3F2Mug_m2OoTpuR-o_dbjD*r(;;3et7%sw;BDSaqXlsr$YB}RIF@? zV$;9r?{tundF7Q?vT^1b)*$9VC@ z7dcl%R+h-3{m*~?6R5A}x+X8|mhE6K0Vmkgbw);SzWHXJ%ienHEgsK=Ad;aw@0odg zU8>jXufLvY9?w4eEVis$$7s7qIwTBuG9YM9qmU=^6w{jV+6NzC-n@B?AXbNfr)JLN zwQI-D9XRj2^Y}h=E&>7G09|+8bv*wOQhd=xXJhoJ(Okz=_q1WU>#n<)hfKygU30~X zRhaYe!^qFi$JnuBF>BT=^zYw?jr;Lq#^a@zo<>FjFmU8Zu2-r*>I<2zTH&(G&d1s3 zoP%edy$xDc7O#zt)-`0D2X%V7&qWtqgzvsxjM1Zyl=EOywV;1jVul1mocUYECXttk z>Xl-U2yq|Se;{H;jO*mF#~$PQCZv_xpZc6g!U(Khxsu<9zO!XZW&G|uk2|9Kdlh;g z8b8#|M5iT>3T+N)JkxdPZ|j#Y=QWA?6^(Zq2Xye&s2@h7d=2sfQ79I9OXkmij#2ve z-+v!>+;OE805X~~1Z4kkye&>9Sx2PiKrfuJTzZ)x?H%$APMtcH6KfL9g%sX~jv2#V zw>YRODSD0#;VTLbv&NV=RD@5-9hKloBqZ$ityswZ}Yr+%rVEXhlS)p1KHX9>@>&zYsBP%TmBFP-kJEx?dBNM z`%9srLX#W~#=Yetv6r4ZTn0IH6q--z|QidAxUg7RH4`EWeeSaHtY<$W&?`nYe*;iD?t3i2<*1&RFHZNvU?I{O<~Lzje+_KnG<~)L2BMj$vstb_@~CfE6Q!-`=p)L@1to1cP0$r5rfzn&&X#jLA6eC=J7pco2v6Y(TrBQrKo9 z6hlR!_g6%>F2pKEYJftE$?W(RQL%F8|@(vphgtp?e-hHw3=iLY!A#9JuaL!e? zAh~%EX?yB1pzRSjqI4h-sYjod9kAiYawJEAilBmtx84Hy18A4q93#5qp?39J{JNtx za!R@a$wi!eWa9CM!M|%I%6!>q-E$y%4Lb@E7&tyX0U29=L3DQ!_C)=7?Yo~4`DPW; zvJ%m=QyRX1+r)?y&PQf(1}~z$yxGXvP=i`43)RsW!p3H#CpEwb`4FMR327FB7LcBj z2um|zH8e2hmsVjTJ1XLfXl{PuwZ-V!tpI*h!-pD_c@5N&{71}#Of?nlx_9Q0yk(D# z9z6%(m=pW6pzAT2-Pr(x5<>IhbYuo~_$y2tov;bDyKC{(qT`S|bUKb$^ccL$7hu_n zUvbJEHzV}pM%*-ICVnj6g53>ONGm8{9(;XfA=>pA3_Y?537fvfmXM8mUVZ~xc5Y(> zIX}yXv_uPe$q53xR8`bPqeuyec`)kD#O2dYXGN1PEekNRO*SgOUWKyEUTA;HC|1en z-K7{^o0lR@2>`!_aOVwoVEHdUqHNC&bU5Y&?9hN3BOOXZ27E>t^iAJkml?q0ufB=0 zvhC>BxjnLrGFUF;w&}Owf(fUi-$mD=<Iv?9=aBD;cS z`k}_WfVUhrN;&oM&hSw%eYF-zv?NKD9}ywKRWCxN41 zyrF#f3>A4jYtW@<4aUveh$Ty22h<;t9tgt!CwQt+*w?vW zV{xe(IQ7gtOU`Jc2;E?!Gr80?92E#!2zWQIiuYsBf&7mUdOpvk77!nHsv3_lcanD< zDu3~^*9=F-CT-{lBqHRpz8*X;5uz6ig3(n%%Aa^*H+uBwfn$yt%CR(zDw#lLhYlQc zc=_em%RZ<7c0J z#&JW0U=as95{+=bednEb7}y|?fv!c@V6AMDru2H@m8c~l{a<|iF5Z0cB@|@k@OrP${=e`7Z&~wmr3FRjaEREgy^XFsa$dP;=A>CA7c;N*;muPr2kI=hWF69)Od-6yqYLEPP!Uw)bSv*cm;>Z`B#nMv?!&YU^?`=W1_ zV)W?I0y#6qe86f~(%VY>?D_NO;GbW-fxGXzmJw@0?x_B_)YPy_6}2e=hJ?@(f1TzE zQcWYopFAbhrgVQIaF=b^!1*%hy`8kEam_U!u+HJrq-N~8Y#ew28oRjG+i^-lFf4v2Fvy_C^-@+wh$RGfzD zTvpS#eF%+Twya(x)v+vI&$;hu3VUtscqUYV+!DCNJ#*tm_U;TFI+RjZ-+lKnLhtj4{!SkH#JoJ5b=Fz9 z@x~kDXeN2s9GhUq^y%zDpfLg0bmC+KJoQa-2N*cZHay|-2!~FaN%Gy#pp2jylKaHEbyd<6nXxz})i`za2 zLHXVHknRkpj(cT)GO#*@8q;yvz~ypr8>Vhvy*mj6eMa|m{_R$wac6?vTSMM4@b{Oa zf1sDW>&SU`T0{*`gUpg=@xV|Cmr{sF91wwXRd=F#=T4+$h+sT36oz6FVx9yKZJbmw zAy?Jb0O_6K4<64uU(OC;tFX-gXL&OmDK>~Gd9Ty+$o-~!`1W)^({>gkKcfkp2#yi+ zC=aWcYO}(EF2^)QiK~iFpdy@mMsfm8DZXJz*-=Hf%`Ht*0F*=g_rFFF4R5HrIFu-> zC0TYN9|D@PSid(GX~5$5K16!%@0Q?NR;2?d#{h+2MxB0iXQ9b%--tgEQzX4yq_bQgG zSd6thx8nE{u0k-~i_0$Qj&sjF7lRI42tBa`&3hb)mc55y>lYtkbF2z!kxT@14K?;I zSfSm3|3r*C`Al3eqz6h`_CR^_mP~Ka(u1h2-H7@~Ol&G54cKjk(X&$&YnLxXn^Pad z+_?|q>2teb=Jm&5PC`4BmUhO}!F|!H%|@*Hkx{DWEOLc zDQ+RH9=jtuNNW!j9v!jTaz@c=6kt0URjNWQf*Q{bRFJxhFMtN!i(NGlRMZ>jSlS%r zH9PTBy&oB!o1-wHJMO;y4h*0AB=5}+8aMgPs$?b+_?{KyLm8Fts3e6 z3M^f?7RN3B62F%1!I%@LAeIDNaz-nRAAdTEdc2Aw4nGm=>NdhkvCyh-Dpo!F14#DMUbKn%6DL!Yd3E zGtTK1KjIYXI0s&!&Vt=S>NXmTXbiQX-H6eo?Te!SfUdZ4);zTCaukBq-(kwQUa&G- zAgy^zTye|IC_Q@$ZrQQ}H=NN1zLMssGZT>0z9-U36A-Zt&h$!`q99z7DcV`R9oLLG z8fh&%VNabOV=kSIb1&+TL`s1g@nBeo9(d{9Pf?WGkv&-HzFgG!QlO_4AcZ4UER3Hx z2;Z-J3xh}ZgFhh)+qXtA@`|f*+XcOVhCQgoZdB946w5@XPQ$Q$`UJf3!Ye55REN7J z&BkZDenM1FLwa5jra!s>nO>QB$P!7bOv)yqSd4D}nZ;=*Q|kOvc3i{_JB4-Fub6ll zzh6@4001BWNkldsa7oCM;2R@74;f|O&a~8Ulq~YuVoiO&q z6R|t$!N6hTke`u(cdZb%TiYqE1Qf+agJGaPMtK~<>}Rm8Y~Drn9-fA^t3QWT-2-2J zvKX%~d==}@+=-o4l_)MQ#!L6y%yhs<9)1#aH8z4>2cz?`C&O5=nB}Oy2`8drcNh;o zFa{Kw{Cy~dodpFb@+b(z2;lSxPruAmtl9rME^q*t5ZZ{5qi!a{=CGbU+)1}w#;ZF5 z@jowaBby9HLM0rdd4CLKI**VJ+7%O$wYMR3jbP)#pGgd#miY_3o*D5)*@h&r7g2Z**k+$|P)B!{@x|N-8Mg)YkswMEFxu;PWQI zpPUSTFad$oR74u;k(inW1UizVP1d6bh^1>$psXs9A5A9gZbEHx28aqtsZpieocOzH z3E3`A!2jSVf@T@l!z&F^n>+H{_f)k9YNfl!=rzV{gYcZG}#>O(*L zxPqw|9?4l{0_&$F%#fygE%1d)`K0@WWxI2=W@!eW$^WT0)kmiYMNf8xir zt9hR3*1k7dwMyifd*!N?$ji&;xl2_dNKQ+`up@^e7)(KKQ3+bN>wu$=KLN=J3c7V@ zg)HLV=C#2|Cym4Lqx1qG>i z|G5Q>kd^l8hCW9gf%7gnn;l81nL7G)?F!qQjrN`U;QUJ`AtedOOYk#iJ*RaW_;jFc zPBZlDe;AVU)6k_`Hr~v5GbpF#_~8%y zKlZ)@%&O{K``z`lnKQjI149{L0O<&bfS@RfhyaB^dcO^OjV&0x_L7*GgcNUbO`^$7 zFws~@F|oIxF_t6>2okX&i1a!zy`Hk$|9szC>&%%E6Z0n*HILh89L||@c3FGvwZ8R! z@Atl8j2t}|wY4RPggY>ub6HuV zsyN0h!DoN{7{-m8fMJs-VA>H!;^Irr00G|>RS_IEejK`^r8xe$({b+EU%-f={V{ZC z9_j`UhG!Mvtn5vASD@Lp(JJs={&asrSUlGCLf2vgG*r>?HDs@63PZoWs2;a(E}L8tgIb{{zHdh z#JF)Nh=wuaunFAH(;*w<4m})~Ty`Bw3k^glJ_yv@1n6!D#t$8eqMD&7>{o-i^A_Ub z3+FN5VtNj=pc^BH48gSdUqoG99wK@QMfv%deey+^K7BgkF^!D}HQUG0M;w7xcqlIE zhlQt}hl?*h7co*hFii{{Jf2bHyuuKo@i->Wn8m2>(UXT`@SrlpDu!d=&{4SZn(I(r zrXiB$d*ZP^gDW)bKWQ0BIdKM>QdY~h{-+a7qH6G945+S#Z`!!w)^DL-WjS)Ke4MlJ zRFu@@VZw+J@X80HyeuD+#|%diIQ5b3n|O9P*51hgh?YfQ+36)w`1D0A&B@% zOqeu@gY${gX5rFBm+<&iTUddqhmA+UfJ#`Jg^@LfW9-=Bh~`PTBBo0M)n$43)dLT3 zcJ9zgQ&2u=2=a@|P&J@GJFrh0RwIoobxfTy1DAc}Ysk+5^12$)+0lVW%?R9h!!0;` z+94eF+72PsR+Au8lGu+RuLR%Ya^7e%U3N z0KT_E%)h7FmQtn5mMvqspMOSyhBiu%P^yQyk_S+*Ine&-ny7GreyGqz1?dNpuso19 zJ*6#=KmPdtC@pwoq49LBWR66X0!lOYHJx$9I0tX-vyMF) z*Z*)St3i}+-GJ*BEyADobzxT`g<<2za1q*z-@l9HuTH-73`XO9SyW^@1`n=jQw0Bp ztdBJev4SSnC)qJa<%AU|TW42xal0o?7kE1J>=?Lj+Jx_a`OBDm(+@FXNHt32I6^CP zO7k)AklW4|PrWLv)`Ty!Cku0pEXrJ<^)To@{X$g-XCrixs1yfUkpI0+hsA;UZy)+K zr|Kh!AR3S0;YT0mfN938sr+qTHmW|(B1S&mTDumT_iPsh@xIR>K~>#AK9{#&`vA4I zwHPy@4v#$YC`OGOfDt1`G6z_2#H5~jph?Ynxo^FK~NU{--SHiKY$jk)|>T7E91T1?8vrj4Fv zHPn1c3=AVJ=pLRW^xI{s&T!10FJu7&luZOVFX~CSP6`*C^bJn$pL)shyl_(cRpeq% zn)ev8T|C7Vm(7%xwKz7Nw=dJ-FeKT65{hNQ0fhx?-%x5at7^6#c6<)n??@r&x7K13~+B@y(D z$cXBY@`K&-@}nPWC-wY&vH)Li5~vR&kn@gge?vVtX^YR*l?fLUzT{IGz4oK}b%37h zR9*;>szgxtzZczBzOVHOBvgCJ_to7Z2#;?~Anrptqv(?m>a&4(t;8k*O;DkH0g~B87UG}Q z#5iHIr8uborkJ91P~r!gAc@OFE8f1k?f+ODxVB~9QIfM;g` z4ixzJ)rP0{X%+WzX+EEYExSfQ{hI=m45f)FFLbj4Mx|98n(cgx?BB8(nalbS_b>>Q z8;#FtE6QjP*X^B6?=!!ac(e4gWXTd#*T!+}S8l?QM=r!4{_rr$HH{T=uD|6rl-7-e zo*PBf(wJ9VJ9HpRed&~X%?zZ1l*np2fyatAEEgI089trK=)J6$5Y%NMyQL$;i|3#` zdx7UTT&+K>wG}{h=DKyQNAF&E+55f3m3xe_KHomcEmK3GOh8muHFb=cGyyf8LwJFj zOG*=Yd2r+m-mhQ?UViyyY}~Q|jg1W`E}j6_bztg!QszPM?{oE)61GC&MeQRz$Y9nC6229J!k{15ww9*f_|9`_x%!qgSpV4}I`OGQxmQ0&!8dHgg zyY9Od3_Z+L+47OYGhb!a?B_%1Kioc~sFoe$P`fL8<-U*cXMiHCY7P7h;w?Q1035$? zAu47^ke^3c5u#%C)V=*PmqwYJU(7xk`SDmL!q*NK^CIiH7OGu6ectDV{@*{3gA%|~ zAWR7S8*jY9X*Oh0JO0r|pCQX!3aqKfih|9)9QD3tMG8%)l+C71n;5wM7Gi zO(bGfw<(RTjz-x1O5rv(!ZS^5Yi-9aj|%as(U0_yy>7s7 z!!|15OZR6k-4HznBb1LwvI865+l?KC<)|z-P~j)Ixwh@tiQNrth~^!Fp+lpHwe5u8 z+KN@~0OaMxQCFN2b2}j-5{;mCGqm2w(dXO$-{z9cjN!x4#g9eEu^wSAw)hdxyFn9x z0VGICfScUm0g{4t8duVpk$eV_U1b8uIFTjLZi$ksktCHh z;L_)m36Q$m3U5^-UpIudu!lkh!|qob2P0GphW&^vFRh5C>L>y^7De z$ktv`! zFtSn|jJ(U&zI-0^O!3vf=??sBn<1~kLvN?&%sL5a1ZaaMQ#e+pN2%+SF;5oaj$TNy z0>~`+zIuWz*;yR6RPO=ZQ?buQ5yN%=*dwq4J^~qDLwD<{&T8;QG8wHzI6XE1u5IT6#0|mvzO+1j~)@kt z?z!ip?&7%z@eY5!_1%PKGd=f`N|A*`QScjN272{e1ercdDH@`fxdE`Zp;J(N3{hlF z=0R-mWF)w+3!@toDTUC>K*Ltl5R*f7gd8g?Q4KhT%!-k4t54Qb7C%dr2s6VWIIhQ% zsevvgws=aMU%MrQ)#$i1=a`-t%GKurns@>;6Ii74~ z%3UNk$YZtvov3A=IDXO=*@BQSd_CN(fQH*!PRJooOz=rrEE#hpbwpDX5OKaKU5wMV zFJ321L5_)}#rIOSY(L4d@pOmVg(xGzIbE`ctORpJrf! z7X%_Zn+}qE9WghL??52UARlzbhj} zpC~CBiPfq0Fxi++-4|19<@2FzOjT8d^av1eE04o0YZrWUWbkR*r0Q5^zLv0Yph6w4 zNs=$*?`&=R&$o}a2_>KGIwGO06!XOrIzb=@WtzN{>~{)OQnhb>uh+=x|KQBCR0EW+ z14)rHB(=@g`vmZr2Srj&G!ejifg?X9?r=&{eyl+5UoHqNNy%~yjnA8$hHc$|?t45= zCiDo$1BNTc2Q6eVD}Xrb>=)!`Q&DI<6m1jo1o6-%stmhq`x$>B7EVF8U~i(-jgR8BC#hwMO6V(KMYdmtT9zp`?)|zWB;wIrBMW3@5=8KK!v3D^|2%+KXty#) zBHD)9K2CusH7Xg85RHb4$g=mRTvPiZ%qmDFnJAJ_A_Tr~fZmrLlf57M8%dZ^w&1f) zqsdkQQoq$k^#QcNDJ!es07vIZQ*=;|hXR8iXnv^K^_1Gjks*&GSN<9-BMsl`1VT+P ze2X>ReN*TRYhFI1H2-z=MX0R~;iXYs$6nnKn$kD-3;7fr z=ssFo8}ZwpKfv6`=`+S+!cTsNP&9&+>yTIhESt!nIfxZi;i~JdWBI+t?>>hQo>>M= zI1|yZ1=r4Hw6LfHC`_b*bUlLfF1+iOEWT=ZWz;f3Yv@S}V0 z$Cn01k>^J7o!|TtL#y&g*pk~bP&F{B7U~o05&v16?Gt}p1Zg~pC?M__pkG_ z7?|?4@AkQ$3USIphA1%fMSu)bB49xe=Tr-N`lTYiA*pBWhqG~Q z;w7m!1XOPjAn>J{6wluc^7Ez$QWe5xNG#uxzbQaqMGbLXI&t;=5PVC`745PaB%c9LFe~n}M0z1SLo`cVZ&(Iso{YmYsvUHnseLRrLsJy! zu8_pBAQr>~sb|(B8fB(LyM+{2S`+PJO3u1+9MvzjdEP>a`5Ulrr_J`L&<>`#;O zVVF7>6Lb7$*(^knN8?{20LA&bZ6TfTpc4?H8}J-Qs@T!OU;I|Xu`kb;GGwmfA!6$A zJ)O@>w=9IE@?jvM??7HlM2_F8wnjZSs? z&rXC>XHI8?vM&NJ+2WZFMFo`vu ze~i2@VBR`SNTgSL#=H}GaG{0Q&!2n=1$iQ!L=J51eu!+qG{DX+Tkw^eu4A3-hK79R z+C$z)$TOky(+Wn~`vhE|_%pUg(y0Ge*1t)mT3KKT;#ND(|=gJy-1 z3Pe8%B~#o-2%)0qW9PPQC=P}2oy%vj3nNL~g`!dTxnVd7hc(t&zugWoik=BbiNXE9D&+NXa6V3{@?&DQDxp z0laiYG;R6Vh~I`puGNH_G{pP1MAp-U^anwv{>3sZF<$D9e0Ig_kVKBtGJv-{Un0u# zxRx|z;{e`)r~4 zT<~bUtN>n@)DV%ek^7MWd?uh^<%|H1^aThRA%twn4hV&M`B;2bPyn8Pq^F0{dsl%v z*AmIhZf4VZigZ8U{=wFV0N*!c38XtJJ?FYEyi_=|}X>O_Sn9Uu53NJHr>AJ_f06P!`h?;}2&= z>Dlp=QKu?e3wj+-72SHS!`?ILv=7@dk*0+WnM)D+&NA6*+||T62U_p__StkjYh?+& zr{+Uf-|ORvL-P;OGt&XIR0mqqjVLOUh7G!b4^edbYzGB_S6b{8e3^3M$<}NCM;oQC zIVkJn!kUfXXWRPHzd6mFPG#hXV~5SxwMtM9AN^p&*xtZsd^?t7()QYplXa?ze> zLn4(%IvKFDT3eG~_y*|W)I6u>gH}dMK&iMu1qE#F2ETb5BGz6sHSa}f$$l6{89WHY z&onyG(%OWsWWa_P5zWNmQ)c0VT|1H1n-Gp`AkZ(AYR9sB@5Ntsci{3Pj|co+NF|ck z+?+&Ro`q6Qr@7FAji~Nd&3Fmx$-9lX|E?dQDHw-GU;ZH$-+TwU+BX8xF@U}sW~2cD zhTxgbM!e_8nG9>W8WLSep#>kb!iJ94;(>@(kA?H>Z(uiEgj8uc5=IX4{17_3d~~)M zauuF{ZZr@V0u5dhF1_qVoVVzFC{@cf_kDmC6v9q-As&wPa3w#~l|I|@q@R|}Am?79 zcLahE!w9ElL#N_pMmbE@nf91Bn+L6+KjPKHktF?zh(J-@L>ivkiGp|@MX(^xxLD;l zytev9eD{&Hxb%Xf&{??`sjZ#R5;{Uwl+hg?_+3o|<+@D88p4z&l#Yr3Sh4VA0PZk! zC}3S0%QYU)9C)EFxHM>|^2FzfGUBD-8$xw}reF@VeTDpram`aQa=Jna6C&7ivpDQD z_t<@q_n<@4e)J4#3Pym%zf!g#!c?bCj1`7BFNekeFMu7S*{RTxJXTVN;ITO^&L?e( zF*xugvK|O4`kwWMq_Su#5Etj?GiYFBxV%Zzg-*|${FX}HD^-i6ofH(JbUvRCWfXW} z;oIW8LoJe?kq6(8!VCl`;ego}zGQ^&E4COIMK*J>6m{Jr3sbZDqrG%R> zaj+>+F-7scZuI8N|Nm|ouJlLfTW5!F;xp0$Kd=O~3rZkB^i#u^)XPkuWFj!kjA)WC zFV{3Ag@Y+>0*z;GGoi-1j;L!3=U3G+l@LLO3oHZ0OovixIg&b+7X6%>$<A=E=u z&5A(_&!C4YZOR3qn;EVxkwuV{4hp7%48Gi>e)NfNn#?o>dQTl2UjStW>!GFYhHZ2T zvMHnTmKZT?CsSZU_gqm+42gvM8A_a_x{$F7Jv$PRpsE_W1*-Ma5?Q9GLC+{R^n}6c*f>NXRw3%$E-oHgd^Zh9-E<}A(L!W!k|7V2zyWd-k=bwKb z6-A;i-233~v3p+&yBp4#b293zt=v!UzWZSe98iE@{U$y?K7Q7?M9AmWS6_#!r(ff1 zy6x%{al{cvV98_m!EOx9DdK(5f|6V? z9ao$rxhK;7zVQ4DvFp{fT>lUsKAK%QuR3ySMx$JpeUZ?5;$3{>8{fb&C*FcPe))40 zRhF=$-v~R*=bh~y_xbk8ZGO-r^{=vY^wZkhiszqS&49v`36oG<6yyGx7pmk;;kwQ5 zV#tso*s*>kesTW`XzDIUI1)kH@5%n9X>2h?R)nzQn`uU=lw%=}x76oVzYiG* z4nhr)YAZEP(YQs=Uf@cZJj2aO*Y#1=l8Qe}mFY?X(TK>YQvgoaNybJ0Xol>AfCf@^ zi;;QOOZ@oP(yO*8E9=Ss%$A`vL=ZxUF+SxuKxXWg*Q4oLrn!W}t0~BuI(qeW3f_YQ z)Es=i{hfx++I-iA=cS<2yk*MVN8ho;{q%D=+2G3(vet$gTbV^cafb(6{@sA^cL6KF z`J!mu|HoMz5i^?bQt3>M2`k9?0W|aDyA}USTRP1(y%eXjpuzz%DIc{R6a-!c@kB+) z-ahU`M-q~x(VV@%105rKqac-nJ!OrnwvW<)N1yW{3e9KT#7S)`YoTaMY9qU9%Z@@1 zEWstD)TV?u#K4+^z(~R+r5EC~>W1i8^i&Zn#A5N?(CsvmP6WPLh@{nqs8$R!FxVT4 zR<4E>#s#OHhT4ij*cZ-YBbR~YH5gdXfyaOOWtNL<^yaaZ^5{eQ^YPQwV{!A{kD;#I zMA(;7kY*Sc-ue{`JL(8@Qo(rGhCO^d23J?(S9%#!fUdjZPNuo|kr-y3btC>KT8C89 z#h}Uo7+hHmL`rb>P2YkRDFXG3?&|)y@mIgb;G!YOMFh8e?VA`gZW8u)c46YsTA-{7 z|Fz^ERMqBzdf?>qjzP^aW04BiVZ_9d`1R6KR`Vg8W@J@=Hm$j}_I6Z-V?yIw^4@zK z^Th9eUBCJB4a}kR;h8=h&Eg+2`eG`D)abV~mxC$|HgYu!x>bt3J7Rd|>5ZuDe;C>m zU3m2A-8kmhv3P4UnUba8SH$uBY6nw|8qApyVT##?U6t_i7I~5A4SB^}CVEi7`r>mI%3_CHeU?iNX>XaHx>cB!oE$-wfFG&nJ_zhyy=J!q*Lv z0w!dUeg{5$FU{%~T!>1BXjB;K=uArpJYi7f5cis%@pLXf=dSNb1UxOc`o3@{327<8 z8K=T5-GW1rlW8KqWh0-jWA@|EJIP%r&hv2FsYkK&>w`@$k0IBOOW=$%reVVeN&I^0 z!+1Iv%ah(De;pQ{c>;zGi-Cl@9(uAFzkhxWI*UpHQhAY!Wua_E!F5yyx*lIAA@zJ6 zsvy*m@{Vo}bkl@u?dIbcejI^kLwBXKa#)9-YC~SS83v*8q5U}j^7)u!nV>r4wlr|p zBkS<=o+NzRg)b34-51mi$4Q~zkRkZS*nk&s4=08*B0RsOp8YYt{=%CGv>bte2POiN z%{5H~x^%F16Wq^;7Gnf1LZN1ych+pAb^^~myAsW22wo@;Zc1FIof7vW0U7ukG`4m_ z3k0{_CCZR4qgg-2fx0O26#ZR|BSw#4*uQ7XtZDk_ooiWAyu7AMqG{(&oPF7M*wCw^ zWeXc&U3&fX+~2-^(=4?|N0p|*wcdkqYhzlgYkp&5%bb` zVDY!`@WT(I1!WB^);4nOwySM6I z7Nu%9>nGY#H&P;QKt!-KDC6&H?4Zt+6h3jEYhNg4@eP4ebI=YEfa`%&W7H+%hnj}m zpdA;MZgQ4EqadAlL^NN}c{5$s;~EyuOolXoXf1}=x2}n2qem}avJkvLwpjqr3j|i+ z$t;_uN+;Z2!Z_KBCdWv?vg1g(xd`mx2xC5csvXMId3VXLiT3eym(L+(M36Kh2M2+N zL@udll9XuF_HhyTZQHi-Z&k#4ARYK@l^OM3dwV+vhva85z-cSdE8*0z%^~CZxf4Q)0jLK5@pf?+LGl zy)vv>lu6x~*HF{G{zj&Je97BM62Pe4+bw16+K zs=~#WT?W^X#Xz2maT6!P)kM8~b#*_vxD)4f#H^W^F=GaQUYDv>Ma6{~S-#J=PktjV zGLtJ3N$&rhog(uzebzWMCyVj?^XrgEjAhQVVHt=-gfbKT5bcYAhgeGt?QV*zl}bmA z!ZmXb!{7e46MuYu9oLcc?>`Oe_a#v85FN*ZW?KC0(47Q4kQ^A=+HlP2lQ75y9(nv#K6dR86PsV!!VBxPQH(u%Ism<& z444hBU(xIck8|{zGHTV;mF#ee6cX*y1p4+m%G^ep8g>K{p;7b=;_osMCDI_93t94(!zX&&Fc zeLKGMo$nwgoM5%C+$hKZlPkd5k?;>IV4SPf4YW zGO#tX^08~j4!r&L+n7CjHk!9>;|%H%$6bpXXB~$ZUtfdkuDcFD`@!`X-+v$8Eh@)mP)mNAJSw)vNhZY0=P*7;gOP|8h;(-QT^e=NZ+I@f!K0H>Ix+D2;Tn zuG9^W`*l%V29B=G*hFle$4$zv6HS;4Ee#$c)VKjn&fk_Wf1+$w;ETXtlUaGq%%X-8 zkU+{WhL8{oI=gB&DrULs2$EYyZ6N?n4$t&)=&Qv%WL#&X^NIN98iq6aRT=`6Tu)<*=B?WIC z=@sMp$P!KJF{^jw^FXydl))pQl6d-5Y#UNpLHRjb*5bHwL7^*^CBO=qNOz^6SvEov zq{fF6dmp(Sv?6K>0?8trC4M9q`{M-fbkmfKB(jW%*gY|ePv4gpPwx?Lo{r1NhUDQZ zBw7uw+0LYjD^8!Gpzc2*c>gH5O=>${pqMsyN*0X><7pDdzEH2yX9ga#w+h^NNzq&%?AlZY#kqKIH;!Zi{s3Kb$`k5+rM+uwS@SQO3=Ej@l(hT1qrsLqeI_|%3%eVyhqGFlN$ z?L$pmLpc&W)@|vigO?6qEorx6uxCKO9lv=w{YDST6*U;HwV{JthPb_tIJ#xYk zbTr49+SL{J81)@ZN=^|Qo7?laPH1{`Bj%O&!~TN3cy&i3R=r-2_cr9B^z;I>Y8ndd zJvemuWPGq2c;fk1Y%tg3#FNHgN_jJ89X<*>_W}?8`W3vLLt+Cti0*3U;iD?I1+LqG z{plKhRt_<{kVrP7!%83=4xP%v{Jcgycx$+T}gBzj+=J_hD|CFoO5><9>4cqtZK`}op;`gp=Dyxw&2X! zyl)m8&~@QliyWZ44TWYYMxAgLhEExZS>tjM+wvrC|LJPnb=P+>L4O7%>(&AN%F(cX z6Xr}m4sWe`4`)t24r^arhpBln9NRx1-@Ep8965V2ZoK(2u0NPNvH;&$^%(A2@;rWc z`*r9i%?OdqnP4B z8r!u`hs3lMs2U9MONy2N>7OCjdJ)}@h_%9g2)ad7kyZ()M+K0er?|k?l=7XFk>eUd z(}9zAafF3fS zMSNLP7KltEEs$-EYk9g-Da5FjfdXqy#B4Sd;aWNe|Ad~ag#lemD5SyZb~#KS6<=Be zc#<;2DmzlLo}N!CR23!?E(h19EqL^Fo~cw)_*y8+I>j%Bjbti?h;1P7J+hn;3lADP zY`UHlbX%9TBczTaVg%RoVDrAcjM*QT_2}}@lG>?xF3hNlmd=w=gv(^{y*NHCQZ!R$ zc%)3QVTw$H;W~(tvEaezWHcbrAWf<0g$ow~S$w~L6vR^yM62pSg9b55qykbEysLd2 zNawx2zMfHL;uf%JcEKmD&}pE~{@!PC%ccjZ>sG%Bp~{WtqpYk%6g|sZ z!7D{ugt6hA9Ck}3NluZS=zzsa7#6#>(E6VyvUIvtta7cM;wnvP`qChvXN9a;?2+un zm#Hhb9lWB==yL}>C_}c^JO$!32B}+QN=;~)P0W0pfi{`KVr3mBIhehcxtZD&PZWP= zBO93=Np%VSnyyL20h#mR>i$eS+nH>{=i4W@8M1TG?V~=giqnS=ujSf|@^~DE8Sq$f z?6JopV%lhKZf81IUS1Adw<)8X1xY*0$pKcadV~8tt7}*$x;i__ub)+nuD)tFOL>MT@4fqT#?0WgLN*-vsWw z{{@6g3US66qjARY(P(W0-rEK&x$jlvmzLtvOKZ`&3z#^F*%aD;dkGzfJjvJ1W7;yI4w&xPUX5`xrr_vfLMZJ5mM?F_&!69j zi!K_2Jbesmih!yx@WB0B5KFdT!f;@iW8$21&cVu;Uj`)%M~oPXz>C1vO{P&EJGl-| zKfM-h`x3b3nnSSqPolk#Id(cctsTpkufWkqABNJ33SKA>1)hxIrq4bN#~o*(!U0}; zEr~ateG_M#QH#U#YeBdC;lDIs&YTjADh77!09HS+2IrhJ5&5magAcC4mDl10+>i#_r zp{hR3w)whM?HV=O2`8L@>wdEaO-%u3Np|nv4YWsj{+d305!X>cW|VXLkKywmPmpha z``bN}nr*Yk$bIX((UlOjR5ZuePU>cPYs#Y1b4}xe0P)1sRXc7ROJCDHn}5uqyeq@d z@sHF&4(cYSN|_)LTSJ2o>X3{AMz_1WIl$$t9dYB8U`MLQa4aJd;t6osm((}9uN+@_ zoU9gLp9Dh%P$i0D6;LW~9ZXwr(|c&VGArl?A_-6XOgLciEkeCR0_=sGX5^pgYJpI_ zODBDv>orv`5%jPo=v)b;31kV16&9*B3fx!mM>_3t&`ZHL{~_&(fL-SERzX@ zq%n=2$G}bTaV;5yI}GIe&@D|YT)4Pg_%rm9G*>Z&EwTZLE+3H?W$S`o&lHU{MFYbe zzz4!pFv~>lqql<+ozhLF34rJ`*|e9Bv(e}4>gqBa`0Qd-WFhi>QD*8$G;mWunSCr} zj*-3fEr6we)4Bd9xUeFtcu!roDIW?-afhkEg*&Ir=}?!jNn@cy1n>nnpd!}=BA(3u zC^223GUGuN`^KRKVb~-a=lO8WfCFXI2y>u9>{gBS;e8H{O?I#eAuxo16!FX~N=eFx zGo%T$Cv8YW91?W(Ox9WDR2B!}o{-T?OG2owu~Q!@8^lbdR*~YATnZrs(y5Q#{d|E0 zxwg;h6Jer9@Q#IA1{hg4;02=4icxps|7l{NVwo#S@3YzyG1^5M4UP>{r{X@B)2ybZ z40FV8Gs~Ean!-Wp0{^j_NhUqM35zBi>SvlMQpg!q4Z&5_wGa|%2WiWKX@~K_n_YO} zh1YP#88fhD{T8g-xD}_IbSkzs11ndohi93b!Rt3Cj+9*hL6G!zto++f-XXOJ57D7r6iaKVn}w;6;FihXW^1t;Sy(f#3aZGwQ|;M02bYsqzjKM}VUS z0UfXG#N6U3c;}tHcxb&N(r9sq1|Hwr69l(g(27Gh+WIVg%O`P+7Hx`_682;yY z8#k?d9kuPlF`%*#NB++Sj2$~1OQ!?dt+jX@Gm)Z*DimY4&{*m%#9X1qNuh@?9buL3 z^uJn4qjvLA89`S98GfL=G+o4^Humh>iHk0}28sGE+<*W5m^HfqE_MQ4>+qBBF2|ny zLKYGD=~qrf|B8MH$||@{XxqC_;i{{y!n-XK@zP5#Ve}9olS=$zHVL!3kcd$K$`i*6 z#gH_^$jy(yj%XM@LBra$FQce+3f{~agIi}>&>QyQ-F@q@F79K>VI|n7C6O*Hgb^^VY{OEh92 zY{!HXLrG{rFKrzgGG+Bfv`?C zLM9yF;ovmn=m@$!0@5YhO^4@u?11d20|a&q$)p1tRLc=?9h|{V$pX2zNp{h7c)Vp^ zc`5-*1*%2>*A89dYVuJ`KoZ(&V6;8D)AH=|mEyt#js{ z_w9NJe1X(EwnW^!DE0u$&(aYhDM!?)#B8Px`P5#Du+H&Gn(6vv(90OOXR%sUh|W75 zAnj7{ZVD;XG%Xr@&O~rVfUH4i3NS)Q>0+_N6>zjj36m3vM`C@#H#lU%^-T85A=N40 zYDb3;EPwkP3>h~W0a6^ZX8Z;?M0cSn-wzpgY4m;e+&Ksvtzrm~AwIe)qVzvTg)n4r zO?*2-fwNKjY${AP0R z+XmT$t3cA=q-HOr;gd~GXxq0B&HL)n)UXfDjg4q)YC>auJ?dNPv9EO>n%bLsIDxt@ z3w*?DuJI7zI|ubz7P3zN(Ez~@spQ^eHmy$;xRwFJ1>&9kw?J@;31PSNo-BYLC`U5^lUjn3DF&8D&(O@1)2=V*{=03B4y!A~TMW5))_az!^iZ z8QeZbWvi>J`FktgZDI6~&}%B|p=Xc!&Xz3#*&$?`&STlKl}y*5&(i0}SAe+q8#jtf z7@hN)H6QQ-gFuFT?R3n|%z53sc`I}I$wPt8rC+~FoN&VNe9knc5fJj$4smQ69~&Em z9|TW+Ogk4&u*`AgY@`^!MZqT_m!>GnWh#)6_$B0$+Jk`tg0Tqg>*(OmsqgBc5HA=M zc0z5ss|nb5?3ALl7krZAtnz1?T}2@Tt?ywb|oPiQM0irRp)?=~{y zI=#NzJ51AQX#r3`uWt1GF`HL^Uh_;k4 z@}hn~uGO11t;B8Ly@s!w>P?8RPTTk+j=&%OAf7QsyQxT9j-RsVirc`+dXMe}(;sXw z4VR1^DVtBv1bM^|&wlCBrJN0-`xmvs++XNkWj2|Sr{_h}#B+bwU3X#m^5uN2o%?sn zjBbxljXFM|qx6jES%t&Sr$l5dK-SzX;bx}dm6s!wmnS?{RN0Ao5i&B)xYWTtrZtPQ z3j*IXqi2^ME4qlnHQnlQ($y`+Skvi=sltdc!8)IA=X+z6L6q$;Au$R=5)igXxzUa@q!8%G>N-i%FAE10^8D9WrbVW_vDjdGHr#6&LtvEf;T2Ylk>_>=Y;@?i?$`;${4p(6eubgf?*y zlSQj?V2Mz_V9P`?pUT2q*2(5KM8R2##po@e+UiPZjQY3aNGi^|S~A*wbc{dOga6ky zm$|?ueBI?A*5hS&MpyjMq#Ov_9o-jJ_K^?}_6)df35GUP$pERg6e31|snct*aq}x^ z-B*JlMFki-sF(wRcuT+)*gx6$}()*oyHV9j9e3{aK{eV< z4V8QUf-$9IP;FHp-jRlr(it6%no*?u6p|?op>RHsZs+^g=m0n0_9Luss75Ltf>|C# zJO>EniK@puTjNYf(jim}C~R*-PUAY{71g3J1$5_DAsu(noL2=Tlla|^Rva~HG^Uxr z152OAmcvG1__P7o+yZQF$U#R@4%X}hmK;K+U9I@<`hYVagzSI&XAfb`78j`yIlmRK zZ$&t4!L}nTp*U0 zMB&DjIQFm_IEBFGdKbqUCi0CCG|xv~AcCWmYauO*2+0XItam~WOfHDmvL|ciII4l< zU(!!a;<=0Qg1$9XhG{xE3tU7u;uGh_q`#8kUYyF@Tzx?@A zn6c;z=2_>5qo`@?z`b|>319#E*I~v2j2b)umtFrj7A;zYL(9gpN5Ksz)#3i{or~eK zRv=_Xpl=Oh@eh{a#9OY15dyZERd~NG7ZdyM!L{d(z^ykuiu>-n8E(*wIHh{RA$Dy3 z>i7SI274-|4AKxoH{c6rV#{=R9x*;)FIGLUVJUSeliMk@>p(V&GI*J_nX^r#T8dzXwh2;x>NYx*H+<-Qx{^` zgd|@2)1UC{(|^IOU;7SHRb`x+F59saOYgf6GcG&}#g#+g`6V2y6nJa#&dV?3<@R#S zpFbZ1gY9_Zjg|QQOB?xquV1m8DOn4zxeCPv#V9~CFV=qY;|Fos<%r_q-1 z5Dgb#*V-WV*4sQ_uO+h!9>JNDXY<1Kn2Rq&W%)q-^v8GOxLHSG%GhE&a^HPO zVLYY|lAwbfV1F6gJOJgb0uMafu;K)d3|GTe(%*XkDcEI1a7&Cjz4(2n} z{(X4v*@1uGMMU=J6nbPI1TEwL%PqT&RWP5ehpm>Kj8rlzZe&n+T^D>bLO7z8{lE~V zT__|25|)&aO0b&D{&%+Vmu#yCrS5^ul{}0*56NHWSwfQ7vwH&fn9PJC5LDsrnpHc2 zo_(1td5O&X1~2-J%SVbf_VUh9CdKl$V~TySzV{`Y?uaat~km;$$3s^kg(>z{3ykK{B~dxD3j%kB&>P zsc@8H<6Cb%1;70HW~^x!sd>{B=Sk1$^5wg5#nDyx)vxY^o&!Ab;tDkF)A8!7N$iUE z!{Wsk}A#ZaKQQg3;jEz9JkqXE1(o&sG8G#9~;r>I1|^_UFI1wI$Kf(SgmI`{9l|uEt;A z1>7j`zYo3!rM5@sF?!4x%%5M4!G1e7Z*P|pQs#x{mPiECr%%V17ca)(!4Gi1JMX;n zkXKXAHDuqs@oJoX{`uIt)xi1ZpO1dE9UKUjlpMoBIxWE|1FNe+HwZYB^o1{cfdj>& zZM#|R=)_CU6Vr!jvU<#Smb}jkENFW(;2t6J48&?W7M^=9bK~dDo5uj4|JDag>ACpw zMGU48+R5HBhQV^7YrlObe)F3(s2e^UmtT1W{?OTkNT?Y3ei?r7gCD>qV>M`*nyyTS z`ct&A2SKKOOLDrk5Dq=`P~3di&v4JrA4Ew(4NgDdBrIOMnA`25i!Q>cr=E)Mmi!2_ zr_SbV-<4NhiKb97XIXBz>Azr`^N6L*sjb!LKfr-?VYz{?U3CrCy}1tQq=qjnc@X8f z1Z67NRb>G>BZr{NZ z%U(cNhl^W&a|=#7@kG3}XB}?6^;V1+Ix=&k$+4ZD&sZ!MOMZ42R=oIU#OyqndJJDa z`&90SD}Vb0PMJR+Z?tUY+MGjX&EheL+SW31FuZm&rc9j*U>7!R+JwTo`69zZnSb9A zl;)4&wrtFszu+4*5KWpm0ZO$8y#l{~ovcgyQZkZMP}(<*{r5JS)aZLO=qn|f1DQY_ z$c%{wN=g&cF|*Gl`+I!@Tt%^=G##bBKkG%TIDlbQwxlMz=6R~fLv|WMn{{D=<8{1% zwCf^d*NPd;4Fl{RMx0+lp<~RyYv^u6eg$bzj~9iW5Y^bsZDh204{o~d65Md*kMXBJ zufn9`=Y!nW!4K>Hiwb87UUf%}%Xyuz|DyYE+jpcazgFIL<16!MbpS;|NcRONeH_EVfM=sX2?8k1+ z#a6!zf7#|?XLA_uY-z^sgpEcsg!*pa{XP4!rap$1J0jTC){LZ<#(S+cRyX>1r!k5R zjpYPZ+vKv#k?b^+I%+z@Bzs&GrN~?2X}#UG3QA+t{NO4w-NJiM1`uSb0*n$#RDPZ4z;GI1Qtlz0)&AueIrVW@;6J@0ZXxw+*Mw8H@_Uk*P(}tJdL~20Tr;^8!5%s-g-{V8c+3n3*Y@a+MAf z8Fh*1QK6pDnb%}s>WR=)6QBh-*P4L|gSghDgKgwM&#S`tF?ASOTMgX|W8}nHsHmvM z@Ih4=H=+i)1u^6ml%rq&{-`~45+Vf!m^HHw1tl7~+oKpcd@`=P=_K?ki$V8@yKQm5 zp-XULC5R0ikLu!lno@jG#KrE9u}T;8L9`>pmz8uz^FydfI5trIvy>7 zhT{Gcalzg4#A*NV-N{dLDNbxY19St#%gbKG zA@k3JgM1W}jmNM_N20Q9Bs9)QO7F!V}<(nV-$v7rwf zfiK?jZH(+c0a3jKhm4wmUG+&!I(i|_z2G`Tqx~>u(j0`^ZB!Kuz_s804)jPIYuE0^ zORKiv(zE7aKuL)x8E1(dQ!o%@A5)6Ey5u&HV&B@g)8(-y?n?t!xgo9SF^*fPlDbgo02JEcyibeYd_rF0CNxd;bYi zlIYV$+59eF89qv0mf~$I%7?$_W-iW(7fq5RIj5H+t0!qk+xBch4H+MWFBZYSq=+y9 z#&Pl0n=WM3W7^a&Ve|ey7&&_?rcSIwF+^=F^X}AyL;Bfdj$%TUyR!~ESUxEsR;SWB zK2Rt<`y&S&@zZ1`*=-!a3+_vf%s|LLq&ji=Wfvn9HkcQ?)g8|5vtaHKsHq4eEC)c* zRxXlj-eiN1;s5nTEWQ6xOgLl~zV-D*c={J##Zyl`g;$yf;Q8mD#^^{2e|+?JxaWa; z@P$h+!PkDcf>VoU&2l-F7AYNoNB*#aC;4A5{XR+$(*6ImZ!|t+P`!U5Lq}vNT4ev` zq2Dq>6VrfbJdQ^meu~G8nKP&H=h*N>H+UgOa@}nP@W3C|;JLS&IprDhfs))9PC0HI znwq-st7T82U%vquQ9A&KzA$3J6&-<^9set&B`J{w z*_R(fBH^&iARQ;IIdHn$P~6_iAk^;oAimycx!Du@z#y9B!pe+B*0|xNox#%U7qNxDhli!o_bRVMfNvn79DWM2PK_aE@HPKcY zfhMGuL2uceqP>s`hYnMPAoHIE1;sJC@b0>Iam6`{;HC{x0GLYQ z_IrMe>C>n7$l=T15jQ1jrYw4fEhssKu)N4-nbpmg-^kP{1!A7+(!&rCm6G9;*K10O zkW?Aa{DeIJ2=9q(bZiQYi7r9=bjA5+e6Bue2Bf_I%6G(66Sq)TMne8G#LmPHx-D4? zhzP=L43^;eF>MGa$wDjtZgulPRtuKwW1813(@wJAxcfzo42ooMDG!_(zx5ucU@yU@ zWV9vixF{-B*(K_KhJ`Mffr}vyLf&sntd8B zIsX(CW?~6XR(uOSz8^${w54n&+Y|k&-4xG%4)t|92VaO9;?;=KlZ)@ys9eue%}~8F#fk+RHb6y0MS3sk$!oWq|F`!!_vI0B{?7bH z9sRt1Pm-7SZaMdybN5+$?X|4B3b?gDB8WV=8AGxw zarVPouzGtOM;|!}9ov^c%>Nk0^h{3Qgk@j8gcc(%MDK|caGqU*RjY2r_93_8kdv-K zy4Z_CUjSGB^9w}w@`e4i{U0{U+R)1};{39Z!WQzBs)B``vu7Q5|ao)IY zm{Gcs4_>7;2TYbwi~lQ0K(q5Cz4^h80RhS#F^; zICC=)54#YdAe=M;CwmEKt3<3BX$(NUhuD*@dykj4AU@B*;J;~)50!7>Dj0ZNJAE%$Ur<2 zffh*N>o$Egu-rIYEe(2lCiCfi{9yIV1&}WaUmyU@byUG!D*V~G*pn^;2I9Ty!2rTk zd!hL_a1s7A>~Wh&Ve!1Ni2_(GiJ^Mx~c0a%x| z3pF%Rk))sQV-%URp34IUY641+-J~T5OKu^6`V1V7jKc>XasE|-ug}oX zx~Ms>xp6KpE}c*YFW}pCY%P!MSPUkaUZia5in1aXCVp6`M;uM$ILawj1*kC+M$l7X zsv@MIrvm22>iZ=(gSxLGs3^zsd2b0xA zCvHAX{vK3R(lAH^-H#Mo6`=)ORv5Ci5GQp~AOmbiWbio6Rw^})=0l8Fu0FYN(H!X{ z9P>-GSm&6aUboq!-fEiEWhX~y!}PJ!FcN;NlEW>P?<}~Eja1#_xILyvIJ03!{oL*> zzX<6pZRjQ?1*NOAA-z3(hLnzU3i2@L)|;`f%;NeBTleU+2CWvsay3-Lp-X8=M@Xub zp!;aZOt=STazTnF7b9tjVL}vRKQ}myqpVZ4Qzl;F`2CyH%bI&c|?|<^vTj*U{%IX6XCmoAz zJ9hGU%{k>1%$zg{r=EH))~wlz$rC4{P3zXU?6S*vsv_kC;y_dI4)uWYr=&2y?U-@n zSfyjlw`;gCYSX4NUJQ~N1#Q$HsXr5UEzqbDpAW5wXxD>{%iZ~HZ?=Qacq^U)X=zDGgg==Y?_9gEIol-b?DF%bLO0h(@r}Pf1fp( z=bzfLGTFbWJ|-fOE4x-^cv!uP0(BA)SBpnG8inO4Sy8r%_$f-AfOMFd%g+v|Aw<)!t~5p*2K;ULsf`=$Lv>*{2|Jsp$O9_aHV@feFG=G<5~%#vx|SR`c_ zN9i=v&)%_lqjRaPg&n5?(-`74H8RkT$5}s`KTGGL_DB7l6=vvnnhVsw@o-o!Sm;_U zMf;$CZCe`0D5VDa3@J*`Sc%fHynU(brmP?RjZj%?t9Vqp=z6?xSGA>AtHkFOjdGTc z<~Y6&bc{N=021^)YIAaXWmi>$&&N@^-*n9px|fQ3p14;;|D-l0U3+zYd>yLYgt{g^ zA1QB=_}x|gf}eM4ea*WwFe(hbSj2U5VdFrG}AI zPfuKJ0@JfF6k{Ft8 z@v&^>jCnwt%A~h^ya;NbAb|P^({}8{`TxZ4LuG3Da)sFMPx5@k{~Z7Q=QdXPAwbJa zs^!!7R{>0Z(sNLoa2<5yTE{C-U~@&O7RUEO)VCoWLjr;7tG3PklLBa}aqtdTZ>sFY z8mjgV9z{g2KPlV$j@*xT&kPl`Cx<9h=R_3iHf>sR{EAzHSmO1%!KB> z_7l~>pWA+Q1U_LF5RbEQ!oSNarwbv&1}d(g8+0H9{XhsjH5L^VQPCR7c6sOGA<+#t zFQE4(Dl%>$nZmTX)_#ZzQx@$S3tvJUT%A;ZwTc@bO@mz`RdgOBu9se1_F@QV-} zmwDwPk&e~biL{0js8*l~2v)-oG1fRG{+7_lf31l1TIVh}5l`NC2acQA3sa{~#buXW zfsa1?3Kv}Y46d5@Bx-@};~JdcIDhc;mTt1{Z52-ne#8PH7)F|OKi8uO2@7sId(olBCm%YYXgNY|CYCPy94~(U z4Ng7n3jC!q`G4OuPnMJrXyJ!T1*^1I^*d2#boLsMnz?Q)B#VpP7=t8&oJ~wZpyXs} z6FN*Z9D_hAhnZT02#rho9!>MM!50iLa^>h!O3`)XWNuht_yalvofLFwkaLw5lx85z zRpk_JMAcRVd7jD8Bxq3XcVQX<1mgzc;cE2D_&@>*oPRRp`Ri2e;lj3~Ql^!HP{+p< z8J{7IS*i@7oC|fn18hYir()S*^B3)oHC2Q4Dy(@Z)2L++i;%9P6>ChV@cg9vqz?y& zv$~l?1yIx%qn=*En@aK9OcgQVcfAUIFF4r$St=6CT<`a|3Y6&FB>GK3y0p7@5=t55 z&q36*pdHw6kA6EUBQ9O4Lpg~!G9=xSwFo~;QiM+$-gulH!$ZQW;WMZg2l+Te-H)r7 z+^-3kY_;sbF%315hxn3N$UvxNkIz&3Bh@s|+l7L7!Tf$H@mJ07S@E=llpoE{aT-_N zsvh=uZ9Zx0B3{_5d34(d2gadesqiOwkdVwBml0d{<4Ar2*;VJjgQGcFy~X}n6x ztv63ev^_|f74~`2p_>Lj4T$Pzs6`5OD4wn~<%lXAuDyyn^2uV@lnJIe!G)`9a7~?` z|3PYU$m|dW_!fJP*rOnq~Znl4b9Q;n=t?YAOJ~3K~zeAZu?DCX!wDWguws1 z9C)I7c>MQdHJW5qnV&=8neV8!WCT9>yGUAScmck5u78FtSvHfdmli^VK9fQOy$IEA z-MT1orL@Yn{{_Mz+e{=rOUNMeUMnl%PZ7X@RDy)Su_v8`Bc~mMV~#ln4?g%H@^V|S z)ZCqS-iaMG-=RatV&>ygU!l)Xwuw;h_dZz6=oFze554md9xW=u*&`eA0*$0eyLHP2 z^bMFic``P>9z}JX)YK;Qo75#bb?Stg#b4mI+n&bRhZga|j1(p)69LhpzS^4}NIoBC zUvv>V4mk?_`w!yG0jjK= z9MfhTkG=!j%1p&yMoz!#rY8j?4rD=eT}2%Su2~=#3uRlUq*uyhsY0yu@pz`aRG<7|`($AnY$CD3XqC zBy}Ut?n9NN^XD~Aq1SI_()oIAW2xT*>hCdi%(&W*-;;e-pZ_^*NKZOvEh%LlPTGI+ z^?2v+eLmKpecT57Hq?7gQoGwppO30zcp0Hyjh0Yr!^ zB{Y|5bKdTf46^H8JCm=)wb^XXFtq(U7?jf{*I1CEn!aBmS#Gge=}t-k8T zk6B~IBJU;i%a<5!PRy$10( z@PwrQyC+EoBy{6E4*Y?XWE!f_&@o7bhQ8aXRjb73k`efZl9b5-J{8VVwjg-{@JHMl zQiQzgq~L^t-|yFbhw{q3Xo+Iz!jOeYYJJ1({w**N~JYjMW(jW~723`|+s5l0_215w{2h}DG= z40Ob2%a@{NR}@*Ksa$6wu4e;o0Xhyo24D3%3isS}6Pizb9>~&#miJHjw0UbmTuf6mlFk=$l{B$+2wG4xrw`Cb9 ze~N~fV=-?sC%YYDdj!^g^c1EX+!>ENxEcliez0pd;`zt#!UK0c3X$qVbpvyhzqbF| zX3)4M8B;w5Lj+(r@})DfOZ6LZ=31`)?g!*#=Obzac+$*pqMUtlLz+T*!!Yy!zWZh^ z&mBh`dla%Wvr*_uYJ}}eQ4_Q@B?~z|nc_F&{Gc<1DjrnDPL4`ldo!LQtRO%SQli-y zChH=%&oSHU&pZ|qOD|bg^^U;?keb1 z(-Qj^!V9t$a;^B`vd+ha$y)0gqRjL4!>^)nN8Kh?%1Y)J#JmV!rrjN(Ozfz*kJIUa z`bgeafBm|;C2-^N{7i*BBg(-}+zrTp)GuR+kg1A5DZAoRh&3bc@;nF-<)0J>+EI?w z2BeCLSF|eBqyJ~8phR)3t*8^S-)odz;)qX0(+chn`4y!=6@}U=^kw9hJUmdZ+(KCh zRyZTnSA=AL*TOsw0zOrItVzVuXUmL*Wk_S6fMrY59zHoAbE#=xrULH0_*!$+1gptD zMdQI>r86G~|DGJArOPul9Jz3hs(~7!MvuD?er4##1;o1SSoAqvUT5%k_VGwK>AGs= zp@yBQ&Wke!LX(+}L~*YVmMa}j{gzsAnF{&!YCbi&MCPJ@cH4+it*Nvsh0NekHeRy{ zQTB5QjluI4^>YOx^g}=e9~VAuB4h7?2JzFm(0TXg$(**rYje*mK3+A?rLfV z2k){^rl<@8QBr8wsZ5+3R8e!B-M4L1W}^JGSkyJdR6h<<5w4@ghar~}+;4P`{-Sdx zDBvypO!iz46lKii1k`XkTTy8VzdQu2%Upz!ol8 z$P}uUP3o8ub>aO_qj|IL_~(L$Fm&j_=sSocy)4{v!3lhhRM4cWg&(KHeLgIDU=en_ z_c9~ilp*QbwJY<_39TK+_M{!YWZ!)iV z?KMo8FaiDh_eUhM7lZqh;;52RoO((Dq zBo0;|RSTuDtuoa~dfQS*&6D{hO>#an*E54u*P|fp1ajyhV2ayJ7e`UVno6{-67!Y>Xr)Zbp5~M8SJPX53Bc zuZgr={mnIb4pBw2ZiD&m0P{y8mhe=7v?M@X{ou8;@Oa~D<(0Tkrb6*Olq&({%kO)` z-Soz1(%ec5K~3A=;LP)$;cOknMV`F*PrFv?F&vZ=L#i zi@&MfV;;RO`?;P3A~ytA8^*H#YWq!e;Jp(g%0jbd&3^I8d7DR-NOng3CEq8S1O;+l zm2dL*k^}vQ`=g(!(9kQK{UdK)hw%O-)R6*d;`mdcZvXxRn4^~Ha6C!VAfShuA5Qff zh{o#>N^Pp7p<;5?%p6Lak+x`MEvJ&4xB-3zBoKZ!MeNB1elrp>GHLo6SY&%Ox9jA@57EsmVrbd>gLkE}*H*s^&C zK3cN@wm%QEjyfE}n>T^x%frxdCm_4J4A`?3@n8W)kDiFU0u4>t7GdCFgV1qMXV_I? zbZyld`Gr1|bZ?JWUtNKj(@w+GX@l9N(n1iXKO0SRshG7TwA3^-?$80nStGNJ+Wu1=cusQbI=)%61|2(;z^9q4 zBC`6s?-5E%L960IR!q`qRT{TZ6Rt)|b_Txq*1-IKY{DC#)}c}B45VZjc=)j&@WX}_ zgfatoZpkim?%5xEH?F|fD_5aQ_fm!a680X2KUN0AsY9JFozYZHVT%-}FwLBJl)3?( z3i4Dyz=~Rpl28;X`gsdqMEW{4J4w(S3nSV;gKz?=> zl3t@SL{?mgmCUIQmpHs_ex}wUcIw(^%v?il?iI`LTEMx$n zJLGN}N3Bj0k0h@rW$R*wsbT=W8?fkMPn>kpU3Mk#%4;Nqi9HQR3-BD7Skn=*NRIQg zz)-3jOsUu8;wokuuyhwbLVTH59fMB%a{9lfBd!~W=_Ue{`4p;O^L0x?5;;_}N1hXh z1S3@{Kq$WoVXJ(L=X@<+LIokZ3Pdc{mDXkb(tgF8>N33af8wzpm-!}55|eaxh@^(~ zahufXQshIRhLuos+hOpQT#xBIYgqyq@LLg?k|ilup`%Wdv?Nmsbnv2?{WX&+zR0JaZde@Ii-OqhI zK=+gS0u>cAHN(%GW#UTPx{Xk*5~dxN91_is8g4Tk0k8H;(NAa$nLk;|{`Ol!2cCG> z6bL#R*SWZgzhP>M=tWYFq@tyzAx4>YcB&>dRfkQ*9of^NX_f4cQmuy&)itDwIv)GF zl6I^j1sa{W-BD<~dJXX0Lhn)X&@bw^kJQljp|ffXObeP;MmcWm)iV*+Or*P2(48Wl`i0u->EfX<1H=9p@U)1tpulu=lg7nQAA#Azdup{_8!r3c?yH8ZBPsneD z1?^tY*W4(-;;tj&ju19o6nDX>5O!3ESX78`9e=-yzhA{KThxe{i1XgK7dTakXevDk?-}WhK9ofBsjm z+KL(xt%->H?|)E~l~stkiW=@SPdxpySo-cK!nM7AV2OCRM(o8UQA^MDYR-AD0 zkK(AaSBQg-e@kqv5n{v<^Tec?kBen1g(&KDrnu{|Eg~L`i97yryI8&EYvBqis<9ukdHvc<`lUM{vo;zC6BiYw=wE=Kh0EBbfs zBZeJ%jQD2DUUBRE`QpZT^F-XX_=@Q|=q2i^g@}a(ogTgDvLiI-s59{1_s(0`7B_^Y ze&vRZ*S8a0llM0#aq{&Onk5oVPqUH`wR^?QS6(PS`F^t;m(e=$+Eb5ah;aBHa=Mq7qvW7sNbz>o*VXT z`%a9TFj_S4&_$eZ_BEo)7WMa*?{8d0g(bow#^(~J|Jn5Y*#0-2zZO;Vq?LG|`c&e& zRcG+pqW-*-_L0<9Uf*#=Ex%~a;#RezV$a5PV$z{Ui+=rwh@viC#5H%^A!4FNSh0O# z-g#$=aeaD=(v}^>w7;D!*6pt5nNZkaam~fEMQNuFqEDY8V)oSw#Xd{T$BE-dg{a#r zuD|dsF={|R(W$hT7&i3`@!{qQA>zBm@;9Fn4?g~^D6g}4e>>K#5tm;*PgK=Kg^1J& zr+lxta?wApX-Rk^U)CpjwOE6O|@U5 z*Q*<-M!D=4(He2Zg{OHTlHpE|KJar=U6M6>){asG7+#ZKzdPObRn^Y=xM?tR6$BPNNpTeivPWVBqIb@CKZ z&~b>k@A>!D0E&y}o?9sL^CA8==Q^>T4i?`hs&{-R#tt7UMvWXJ-ud!N9*>s2M_hIF zxgxb`7cuXSCq&qiV`A}R3&n`uZAC%*LE^eQpAj({PfkQw-h3J^6VE?%m$>Jt=S8_A z#MKv{B1+rmiEabOie)R-i3gs1NWA*i65)!tu-r)fJfmLTeBvg?#{Tnh!}k;O`0upE zVli>|-FJ)M3|=M*1Qnxt8t(2dl)$3Z2=V5rAeB`V4q(KTOs7dMVkKIK$A3@$oG0xC zh5UKww5L)-X*$xY_o~tV=v#7o(KS&4D-~z5iUqusvjlH+UH&53FE#w0pb~Yn8a}fc z!X+K+8ki=@$<+b=TIg;y^hgY;wm^26_@h)|Z81U;6okeF5I6H+>v>3ZflNl&NJlvf zwm%n^mJXe?Rf(&t3)rO9Dm=cJEmNB$FfY>Nxlw_-u8QCE95~2Cs!$doZitme5Qu4z^V!f+rJr%hAnO5)vMS&w6Ch=d=uRwIbREv0|0K4?6l8A2Bu|3qPUP^!Y=;PI z&NGnA+9WnH)74Y2rj#9E>1sb2KMgz9 zBK?k{J~v&%1aE)50u@n#>Kz+!^3t&l^?e*ixIp^V&E6&E<*IkPnFTNETIS#9K;O23n zoQe6pH=#KGRI@>^I4kFXJBCaS?ZzXwU4}3B7`W=*SMc-$cVOlFpFw(h((}zh(5^-R z-KiP0>}%Zd^cvJGdk?Q&cO4)y zaM@+^(Rbo#bRX3d*IzIXzH;EDyO(483Jb5?c{Y|mbrlxBzY2SVi6x(Wf$pQm;HG)A zF?v{6_#+Mit{-Mx>g}xfb|aox@(!j9ZH|hsm*CxXwK(jIYjDX0v(U3;5&AZ6gf}0& z2OrlO*sKLPhR~vRy>z?sIQ5b&-ZcGl?`sNu|LJ&9{o`lePY571c>h1$ezPK0N{_Ex zxe_f}w2%fT{|1GI3Q9@mn`kr*_1}}#WEvK+lETTlb?bNm;GIiD8OdbsQL>CAabHP( z^3P)AU|GelC3uazkTN8%)>AleH~}qwQsAlSk~?asK_nV5yAqT(A$=Is zg~Mg5a8+>Y){Dn7XU#C`$54a*NNYEiel-*a&Lg3cRGqF-eUs#;CNCV5q$c*`Rx+)E z+Cd~Zw^C=A+WxOf)?a;7{Barw`}XbQ#p{hX_Q73ueU6wL!ELwAL8nega2Tm>o#vX% z%zB4nIX3`e#~wD{m^STNOrJUwnX1ThYdDBdNG^V>%FAI1S+|jyk~tM5#I!1YpOmGzE=xC1SyPF+h|T+@f_9SOUA}xdKR-H+YKxFhhaIs{ zT~p5Tqq(_RsM)!beI%~B@gHc{rUe(p(F{q?$nU=U5mi+&O5p!$=GJw=TYCRWO)AuLV|I9{wV#AYW zRr{p&B`|L6*s;h-sl{ury~dQxBM%$JpxMz!AC1<1TB*{8ZFu_Ohp=VK7A#n>0L3lS z;lynm7CfE-8ZB9JNU)?Ax9h~olQE!YH{=g&i?XsZ9&-zBf1KNx=&fj_bNdY(I+WuB z4C}~>Y6RGI>sEw?mtBpKBS+%&YvwUIB(;BkoHKno?zrO)+wK4U{o8gKO3_U(Jh>!OuEtHzm# zgu_e=CY8ESULLl8@dfwK88c>}NtzG77|^kQfAszOYutP9y|{eVDRLiw0+qpE9f9}I zU%J`!;7m4h`la8eLPd{{o{YdBsGv0&fiEa1Kxt{|FEVoSg!Vmk26}k?8H!kwE1DZ- z8tB31)YZUnEeI#Z?%iC_XA6W;jW9h(3ob@+ms^nE{tD!mT!kiGuR}r4`DohfCKU9$ z1sQ!8AamgD$m#zGGJ8D?q!q(K3WwoQ(p+Y)tOL`v;3M9yn()Zd+%`1k!m`_*E2(;h z?Ss!T8TlfOU*d(v>BPvH&m_697+f>X-;ZcEqmPCr623RWuvt-q@q6Ke&q{$2H<;rZ z^XXE)!*JQUn-D?D2&5{lIhU0M?1XL{%g<>xqk2xjM2y;vEW)YAU$@{QjyMd&*d5Sh zP|Nm72T)f2ApWsQ;_wzn`<5eB6FkuAK!uKfZU5dT;BldCeu32%VhPDZ*L4yoi%asT zS`2=ljR{8pb1v+Sdv6|sgZls#mB39mPQ-N=4@asE{PXssar8kXRuDi6LWue!h-wzT z{7zu&-W(h^v7eMk6sgHy8#4d^AOJ~3K~zlSE=;LJu2zOM%Rk1%gT`WTkA66E{NZ@z z%U#&3>A30aGjRFzV{pky$70Cf?zrK>cW~itFQ8wSrWn?{J(jMnMkNBc{MfT_%Q>?! zZQ^kB8&-mA9(V)$$d1t3i5t$Hf+1at(Ys%F{Qc&~LAkJ9%iqL_qxxd@)mNZJw?XJL zVHQ?x2h8YR?E3IkOh4>Uj6C>I95eSWY|wzmue=859WoIo%{T<@`*+1@^B%-!yENRg z;5w}Q?n@kY=v1uwZWl5ew?VVkU0JUt4xa_uT(X?x4 zoHpltJpS?$oIZXq#&>Fk+wXc4-|q1>E}S(96Nev)aU&1GvTs+T+yG8JViry~WepU?c8&*VE)yt;{W^; zk73;KvFJMZINbTzhsbQ#9Id*v!{ay3NBIxyK%wF4k3Yt94?ci*-+K**o;V9X)Btb1 zbtjITREm)!X5g+xOR#6vO1%8i>-gY}H*n01IS`vxhcvp40|hX4BJ0Tl1X_@)F6se8BgUejRr{h? zw{APORHULRwGGDiZHpAE5~1i8tpDOw{P=Ypc9S%IwI5%+_5}+1mcrLM9jIM}y+1C& z-hJ{&VT~3w)hyz}ylt}pF)I_{GFdu_con7|b}+uH1a?|cOl-af89zRO+R85Y@Vh)r zEp3MQCrbdgHCC*3P@Eb=whg?vOkm*H>sc)+6;*(*5@SYnL$o@MSR5!$31iEOxAFZ3 z7wa~rV^p7FE z&`P_YyeJRI+J}}sGx5@UZ==r2M5itzcs?!emxJ~0W-Q*k4%tHv;u@NQ;#?FoNy9VG zKZjuJHt=`p2>9yIsdrl}|MU}-*Tm4W-zZjI%j=qr+SCXZzyCRkJN80OKtrbKqHU+f zc(w7epG@$!8bQIe0TQ!d7K(&+U?(7bJ9)T~^O0_x$U1f{g=<^MdOHwy_m_O1R@ggt?o0&T2O|D^ zL3*+cEg|r$SFcWd-V0>uZ{A`c8Nv6^c{)cz;FF!_{-~Q5tRJY-dD*gMd`~<#G)Fmq znWn~7+gx_0Ton0x$~BNyyks9-TV0L1XdP-IHHeTiB+0vI^`MT)r6b~ir9M*P?f_js zxmyU4q$(gGMJ=hyI~nCp?h>BVU7|u|zdzR7w6W~jzY?@oiWs&^m72=Tfz33%Dtc9r zXvJmrB5~}bs);)!=KZQ9w~O}_m$ zf=e!$kA(~WiTm&WqFx0fNe-9je8HeHvsWl4_2q~a!TIN(&#$%X*W;+8j=~jJT!GrS zM4n%HD zuf3L4mPo^&<91lK?0ps%DBHbFK!q^2>4k_1E+7&p-b>e~!@FAwz~R()QeQ&*84S z?!tA~UB~VH)KgDk_xkmG4(#2aI$nLDzZ5%kkFRZ(-iNd3+A!1pVr(uVUS* zRap4ogX||kN>~p*^dJTf7>E;3JQ0&dO~MP$-ie%aVC;km{M|ziIRpJm=7&KpWD}a?s2x199>P5uYsJT*M9Rk#*ZJf-!S_HCg_Qc+BFe)SQa}+ z5~4nB+B6nIIP%CNaoB{z_~X>isE^Y%-EzzAoXRBdj#S+!oXw#+*cK)!A?;#^Zl`am*jCv**I#ObI(1O zvqb;6^;Q%Y7vrFD<5;B)-m}zmBz7Ebe;Q+siYKVwCxAe>iP(u=)OH>?n+&ujJOtEx zwz|(~;8R2U{P8@Vt0Pht)BD`EZQIbevCNQk@7)`p zfAtmCZ`{bodF-)g`2JHLr2bi6t`s88KR!VFo8=HZ4*Y*&hZSZK%UOgJJ&zMmfUX16rw{9J(TsVg|Y!=n`8x8rs`QT)~&vjC+k44v6Ap2 zOL43IJ{m#}G%JL{lF_i!he9WpJyNxBHBRShN-crqqjVX>1{6l>ux6#o_p@7L9GW51 z<$@j9q*ei`ZLsXMWpE&zDl8>4WhgCHH=+AX`Tz{P8d7w*p6;^)ik-b`B;T42&LdE1H)?(5iVMH0}p6G%>zMZ0j4??gFG7 z-Pq7!SVZ@*5!=2UyZznJxYu!jvjtO!cg3eWcOqU}1AAXCW}h%0P1+a0sMw7`9ZNB| zQ+L4Lg;BlQ;Ms31grdN{)HIxR<+VUcDu$PINB{1hVE4u~_!Z8y`3H;Pyz?e9(zDT}=}c_cn}bQ? zW+AUI2L*6K+S;*_v9C`jM1or{MGj<|UvjIxqJV_PT zYoP^Vs0wDF!Vg5^&2iRwQ=sRX7*N_4BRYMEU8~lhD%1x9#~lR2Ov9j(uISgc1sYMt zXMG5Zu6-1*E_)jr%FEDZ=)tHoeW-Ozq{dU=k8VQFwpG|#<;S&;JdbUAcd#sJu(&he zPs8;$&c^A}4#wbF*Q02_aAY?rguQ7UGV9hMD>Vy`-Ty7_{l~+ot|~{n_N{onh^Ay9 z2PRSpwq`Y!I8wAUzW)J#44Mcd=H{c%z=?S0<%MYE+lju1oR7R5axc|cQN%R7`A1EX zYI7Ta3q^g;{hCY8 zW8GGuW)I4@kS7SxdC(+0{n`K=JL4L5!S<7`xDc$rZnJZxCUx=sw#<;k(owdl7WsAy z(1?AilQJo_TzU#$e1Hb#r0TIA;K!Cj9(1G7mX+LaVT_eZdA>t_g8ehb6t24SQ@ zv;5foV+?62P1r?ryVV>wEPNJ&hvl+V@RwCU(_BjQhTz%(1fl_iQt7$W5u5kqVMvEC z2TP`MDRWKPBKrRbhelJOT*7uitu`!QI>MkVN(3>H0aq`A;Tq`JT}R*cVI2AB7x>_# z#ejbenwVSRi)0X34HzM$x#&@xjH zwWPi}4X!jtN01$#sT|E_Q#79~_+{pVP$j}JtW@^hAX;4@Q|iyx)K;>>eoCr|Mp`3; z!a#Lq7BWzcqXszG`so^c`t2SJ=-C|UT2#5Sh9src&g3}5*2ufSz;TDP!`fBv1JRL4 zPborHAPrQ)ChHf3%#tf#4(tE(4>8PxkwQB`fKnsboF{Y+`qP8z0=F47cL`7gm^-A9h#5m zc|)irnKsd%2u)nE;u}2jNG;Rvh7KK!s;a8Q?utrF8L^r@`@;S5M`fEf@%^U7Y+aqS zYa%}9`t|D>!LwEN3P}hQBc&?ihlCNZkNp|wya`nz#F>sq3ucvpqjGW9lnf+P84V${lzAlt zyi1oZ7&K@QXA6lRT~GkbpFf|E`QEBk%yp&AgEuX3mPNTC(|#5&ei&bU`7Z9i?;dE4 z8gaW&_K`mxjq=ar&P>1`eU~yFv~AqDk&%Dm;L`Jej0kC~+O>=O4&AqBo_rE()~vy@ z)vGak_H4dKwn7zY-t^9=q@)DTKmQoMUhys-dGI#=do@9UL`!Jhn!PxPn@sN$@I-xP z?T>32#iur>35!W|AOC{+ z$D8VszvgAJs5{TT_+oAg$|`uMY(nmt4(9V=;J|^L4Oz2Bo-cidkl;k0QPO(48kn>n zukEmTGah;55pF*!VaP8mDDz6sUK-m3{!+i9xsT?X^goe$ z#IFu9Ckxe6LnphS;uoOs-uLJs)369N;U?Iipf!1G=%kv=dG|Iib(3u5lzgs#hOJ>+ z)wjJD{OXCC9HG459X7UbV3PxDBm=NRa+GLFHh>ZMboK>z$sy7tZPy?JI<9g)({!IK zl#Ok{y|>o;6zqVA4j(}T%4J%gRqcs{PPd*4M zpZ%04kD`7xc;?=Fv1HXQY%e#^vD;9bfBuR5FbObDu!kK9pI-D3mcF?h>oW^5Wy%!H z9NZ4eUwsw3(uQLA@a9N2$;Hi9PFX?~4C_)cg5^dmWpGh%!cNz-@2$m5G5B5wYC}zN z#F=w3utz>x2uod`A&Y=(cjNXOZa|yy$74{xuG~5SQO}W-V%8Rf?ipwVR3C^)lM7P$ z0hDgCtGunv#FN|65Q_vd@%yGBN#mVfhKTdarou;dcGUSrwFxXDWJVBmYVgq~ zucK*RGX$+5?!BcgO4~;ea8uE?X-{-*3M@F+zzZ+zWID^fvqaP3QjWyDYy-40vq1N0Qs*aCHxTiE@tFtPzF7r%kO?OTm+e%OTpgQg-QJssyx z?S)fLIR!_LU4vL^6IcbEP%?ZX_P+HNcH6`|X9ald(5m6kJQhmFgi(j$#35tRXV5ro z&B!iCD&{d~^WYb#MjiIrhIG!dgFPsIt-r=slLG5B~>3|U!2@X&=rkO~VK=J)vU)n#~h#|PN3VFN}EJ{_4E zew;j^38qg!0o^yeh)x{_V{PSj)C61`|AX=z%dfvRyl*jT?`~jT__Y!@J?m`|rn(J7U-qGf`%wW8v+SvG37qam^KX z4hQFTnu9i_opIf)n_!5oxa-=}F>=bWxbW1m=-+2FK3%>M zjq*ApB94CvJXXI-}lxm|`Jt!6DQnm!U~ZQCQ*xGBz_b1}M~KM$wunv5$>C_;Yg zekhNcNN-+@oHqH0>R^>Gs&}GU9sVlpifzMH(+)+u(&5;$s}lVVI~SMEIt-bpWd*dp z9h%|M_r5~oMkTBQl_Lx-({R!3 zQAkG}DkIxa=5_@FX=pQKIM&{L4wfz+jP@lK&OZBQe2VSR^c+NDz;$;&g68D7OszpR zR@8Q`GAjI?V|cFn@lHdS3BN3x#nEFhjciOiY9Fn}&#caxm{GH!bg&o^<6Od28tOg`X^T1RUao z2!oYhJYfRmuntl47Pn(CrC9Mo-2F;7Y{%yP)YaA^Ju4RobW>)MlF}knfc@w{uEQH| zyn(juhoR23keZ*1mPG{!P(ZHNTeY#-6!B|KX-wlP!%E?LnHyEeoUmQf_;^H#ArxGA zE|o%6wQ2?jE2ihnr$rzf8yB8`1MjC-udXosg5~gDf9WMGdgxUgbIj4WW8MNrJxh9K zVfI;P!3yS~LzljIciE@-=RcptghMAFGldFpYw`DUXW^UG-=b-g7N}0m;(m2duMSvv z(@j{hF^b{C`y$0p^d48Htl2Ef(EC}^3-=yTAYiKwN+%`afo?BF)7 z(7r5BYj0wpb*VQst!efso3oAem>fo4rQqjRTD2>F1VW_jq; zsWsmIU>Rmza2pOfs3Ss7E!q|pp`h1DWTqHMm6A)y&uWUE-Mgb{t9%qUZj9FbMj$IQ zfJT0u(bVRprK}EBoL#`K%8iRtks1sjr$sMx?%WQUzACh7(ga<`pN94=GttOzp-piy zdLA+bW&r5fIv?pNDcDmZaQsQ9VD$L$ywGV;*b2S6mLe_1MM`!iMh+Up+1r{xJ}=0J z_ilw&t=png`;OSQbtjs2=*7JK*3ENaxiP%=`15>U^uk>9?Aa6NoqaAVel}^IfnFWj z;p?(0j30Ltjy`HSx_9k}&Yg0Q86L{}`Nf z(n)AloX+j1hw>TJ8qmEptETL!iNa^3VcghB>`dLfxrXn*{T92+{Ak&(4W^zjl^v-4 zEO1L%X175dng`@0I0AB9>PTSCQW>loseu4mm5e}1Ng;xw0^J7;fR@{wGev`1wUW=! z)HGz~7oc-#cQndK#n=(OVG4n5d+JcsssqkG|1uObmV`sob897$10#x}++3LH%@DRs z3?4QL7hEuv=@2FvU%3(VC@DdwVN=kpTLIFHDm2N>MbCq#aP3281{Lbs+(*U?8-{Op z>_IFlFnaW1xb)I<5Ms`wgBJO1`99}1_9G)J3!Qr(#LvYEr7e)2ZlWS32k9C4xb(6s z(Yi$%g2HoTmAL|~KDGNhZ~Id`yxS*@oJh?nj&@zTAU!n`>$mT~RX5*^;^HQVl|^vE z@7v??mb$Dgghc~{+x{=JHk zVn#8vPaiD(at%g}7>_egn@Nu_bn4!o<($`t{kZz-t5MV_gxvgGbn4KKvxeuKe$f8m%)%Mh--sSvnjpP;4_8G5O2;ldpsd$Ov{|ssK&|XSiy!YOFEIs7~;lH$ym5Qw> zy+ge8WCT9>JR9=dX`_@UrN*hC=s?sPZ?jpltX^ZD+JlZsGE`nc#UFV~M&BtICuvPe zzjK;WcUVSJV`oMrth;Spu#Swo^#)l;lGhmy1=h+^SyRO;tjJ;**s*avnzn8YWS_uu zzr+0|1`|6`8?M6WUh_D`e8|lHta4LPR*t5PbD_D_Jdol8w0*n)R3Zx0J7~0em`brabRR9XErk$<3O~=@8dZw!;bNBYJ5Td{o*m_a$0`k zWk<2(OfX)K=kLECH@~1p9Ucldf^`h(X?6WW6q3=J2-v}XSE0=38 z(WHiJnF1GbPzKkr5j7g~b*EY~Z5{Q=F9c(4J_$@*vp9k03ZNKL_t)#{8qxoTaFu_Tmq4Er&?gjtqP7E$MF-cmhyI|j$|r8 z&@t zI+W9n|9MhD=^>J60 zooJ5IWS0Fx7yDRm|CrHpF=^5y9C}h;3GR@G1fg(od2?;jp@#z#Y1}TJ*`h&(eN?mK z73Q%MtzcgZ{yiR({6D^ydi2{BwxZg3^0q>{MN*d2brI2Jv2-vVmh*)k;4bKD5+DgE zN}#Q3drT2i<0s%Xv3y?**NAShtfJpl3-g~)commW{oOI@RH1$v%Yb_QKjyP!KcM;9 zdu}LTpA~zB1(P~mTxM8fAyvrlnhFBgiEV4X!_29(VMRlz358JOy14n?JJG*S2c#pW z#!U#8Bao^qpaU|qYU|P+6IT5*i$9=8B+z6io`gy`aOW~KSfp;I)OWNbZctpW6HThg7*I--NNYP9c!zqN?iK>jS4U;(SREI`&b;66uRDaUq z@_R;*DTBHpGs3!3g)|c-VXDSWISSj3%SET$_u;}%DoRoZ7A|F9%eLdfIdjlxVSB@%iVg@bq)f$lWV|@{dYlC2)X>+J6%j8hTM6+^$`_L?PwBBhg5K zJ5^459Bz*W^RI$;3R(&2@Q&%xZ;*t%dt6LUm)`pvBd;YTKcV0J5jStaL;upX(n5;3 zxumo}h!9O?grY-nPoXF@$to`gGR{hVK}mDUKgw}OJaQ;q_q3FB4u*(77Y@7d`!wX| z=khb`y(LS~v!n!t#oh42OYie2o_FDexZ#Ey(4$We3>$6e>sZdlzfe$|TfYlfpH>#iHie_YI6S25frTtsaJ%_

          d)(;J=-j+H&KWTl2^(1b#TU3@_%8q|+bJ3@d-;+7Dh_J?&ummWP>i5?@_5EaYijAJ3?`kmm;WD zs~!Y3F$lk3@zBlWbWT3Z)qU~%{2D)lf2s(qi!<>ai@-N{$;p<-cU@)^DgA`zd3Y*B+Ji)%BWXNqQxix|y82x}5L)Jdwq} z^fT25spJOwxY7)9UBC7(QWRrS72Nprx+tJUILzaSIQPk}Rd4lu*7bknkw=oB{k<~g zfA-@Kky)YOj;JhDoJ9pe|LXDMk3Vv83Kj0u<*%m(=c&j(1+7$gL})W{osqIwsy|cd zF{!~nq105AK`B>N^meEoscl8~OKnJ|3{>1f#Zffi1+B>z?ZMAxH@QPk2JgPX!3G(Q z5IUqo{M|tnSCMN*LO!Hy=9`oVN`?)`jw;lKf`U%wUo2j9%-BvsRE9tAW8f>s!&7m<_2L;d>o zkoC(}#P_){3kD#qa1ir1EmZ-mYf0I?n4196?M9w?I@-5rhIyY>V9}E=CKyB=4V{jh55yn zqoj3B+<4D|AGa9rrS;!q$j27_!w;Px3i7hp5t!7F3{#<4IvNzT#qi;+u&=V1sR~(< zbZ(D?oj}kG@c1TGBGS_4U`fW&y8JvNs6h=T5w;D1eAACDa%5$IGsMB3LQ+G1J_kF~ zUz;eXf{b9PK-xiqvj{E+U?EDk_zLb9AcMz1gu(jM^Z-uS;@=t+(4XMWlH!+eAS7R< zmeKHV> zDX@UYn+e17YbXHxJGllWf}#-=gzN_d2&9W5bITELjR$R3n<7`zfE7THEqRHr?MO8# zUWVYX;DwHW9+GaAa%bRXF&%IED|a9e4#Cnz=1-SuRx0Bp6nf-?Q(+c{sJUQ?L0`0U zLPUMgJY8llTp8ed&U z^0;CR87;`|;IrPl&vgYt2E^v^YUpV~@GGby9C;I-3q~CZt^>;mB%QKR z!{mXM+)%oro$NHRX(Kfqnr?jk6lA9fK#8*l8rOyRyf*th#*>LecKx;x=Q%}=x3UI^ z+L0t&JfV)Jd*rgM!PYf+nvP&H5h$lk-!9#IjpqRr|YIF^gVkLFhXILw`AVpNrQl3iC${Hu0 zcp~!Jwd1iv1u$#YtU*>di`#=xwh7}VFs+MTRDC~r@~xbjB6S4{qLey_QtOa6&#DWw z5z5au7zrl@45gc`-a`#Q<6cRTu3WyHk#I_TDFqPPAksbW-(LihKp~Wueoi{yin^u7 zu5CM_^1!x}%0SfSl-U?Eq;=A1ls240hYscYjl~3wjI^4q%uH@OszV@d;r#jYxhkJF ztHkvkI&>h^Xjcf$Ujc#V2fspplzXB?c0Gk&J1ThhRpmAx)b{zg`K>S5 z1Erc$UB#sozX3>{YbOOEPery<5zf5)d>*?{;FISikyi@dJvQM{aIMtnmTRnV;uI7& z%QBMg#8Aj{$`90)sUgd?FA@dkcH-g_sSrY$fz%9wLdaC6Aq9dK~e+1(LXik;cMrpRos@MT&PS1Uo*qTKz{ukWM+!F z$H=;*hNP|mwX!*yqKwE()r1qPCu@L`O+)jOJWw?KAJJRAM)^veSFN8$sx`LjCchTS zNK&EOo)isGG*C|lR>JaGjMusoR*G>1c`)rZQN`0Zr{J=YW?4;AKpp=8Y@srI>Ol+t*X+CfQyxwZwu7 z@;`MCjxE3HKTMzbJ%=uZE@hHEMG;NLLMh=`GB!(5p;PT7-XQ;^xX4!&6bT48%HdZN z&aP^d>NS0%)|Z<40Xb)t9y_xlJX!PR@j7Hkg(9THjVv;yK-iQ3JgNGfI)<2brYHZ3 z_(Lc(G%zSopp>-w_wPMuLKBKk!5&fq($t_kmHv`yi5G~?WlO5}r%9#Mlt8t*hM8e5Jv$oA} z?g>X@(b6?2uFk>Xef#3=4`0X9HD6=VXCEOww=oj?D-pDWc2s7l6o#`OTkIyddh*-& z>hUx1#*Mu(`pzd%oYn!lS&B^7o(*H;&LWgk!CsIk!zOI9iPl@<@Dt9(zJ(JJ`SKxj zJ@Rb)tfeE7-xN+kA;P(tNXt!!=GbT(PJ@FOb7ae-2jPT$AW#WC7pR{pv6dnY@6B6= z?EH=}(t%OOdYJ#>nb=*fqg*o?@u?;qTg`)QY6ut`P+nY$EARaR&(7J7x$i!Y2I&sU zsvF|gn_tG)FO9|vHx9z7x4a9j%kfw}cO1GppP=(e!>}xx05LZ*GHjTE81p|LpSu$~ zqK6?ZoR4tXK4c)qd_VYMh8Opu4NH8E9#()y#*e^92Rt-6a|~I$K&#k`D<66WpM3Wb zwlDbzlg=E5(z0sCArv2wX*axC5LmDNUo8@KQtAJxqsEC)=NIXT(>6mZBnd5c`Vv;$THNOC6?>qpxehjhjq` zj_N57AlX2g7lT2)PaIsm3WNR0OE9wUNu5S9J)_7GHntdj4`>!V!-Y?d!sPfXJcFTYKAeDsC{3yu5{RH`IOFtN$! zrn(hRDj(}|Ph;qWWyN88CT!n?V`+jzP3=i;w62d3W$APWuH}n8QBa4Yn}`vd#etZ| zXt2**6AN10fM?o>GfrmnD{jOQ)uUXy5q5x}3k10Tf_!a`5reCfmU$4K9fEIpe4m`R zFaxj!(2SsF!mxeT<94ZiC=l>j_!`vczU9C*5<)$NTH6o-x~2)*jK-o?mf*mXzCCee z>D~}$>oy-GiEA?}m{h6)q&?{C@ElUJ3J9*ZF4UcL&10u&)0Z1F)8v^GpdxS|h)Mpu zrW0OG_u|3UWEp^n`eA4h0BJHSBQ&-cY^Oe>KG8KemL-EukHk9O(r`{SS#WxDIbk42Usq1_kz>@O~TM`Xdk3Pa&>fvAIq71zidl zyPSHW{WA>(^2sp0bogeF52kJ(UP^aa z=Zw3JknZq!b!lRlX>$7t(GfI{2#HTvsD_TXQaaKNp8J+f8Ai$u1Q>A9sJ?(Y)KTg> zl$0{~z9^6nnG!eR5L~PGr2)il`kS&bf_PHh>WBv5G5q^ zU*Wz(2B7r0q%Leq0Iq`a-!gKdgEWKbvvpm->b|coEr*bIG8Z}2=`-r6TQ5NULC7y@ z!%~d^@qd-0s6s3$%_&r56osZXqL>1W@P>yFYu34TU0Fn=i;XW89L3|9@#aiM`VY^p z#QX2Rk8>Y<3ay&=!qf*|!l+T#;kY54Q7@3d`NL1-)3OVkbf%<@6!po+Uwn?rWpf$1 z&S=qssZpdbM8&bkcgZP}mZ%;4)I#Riferh-X2w@^$JMP)+6 zyNW+U?WOLAs940GBi-RW^JX&*?8@se;rEd%BO(7IM_$YY+VRT0Xcz%5yWq5>E;zkt z3_kVL%P86Kl`zH%2Jy*fi&4DleZG%q%a+)6db{)Fw@ zc4NdjXCacFAvl_rsNvJq_}8=~sIBpsH)=?yDWD)NKOF4TaRKI-*AO))dMfeMsl75Q z>mrL{|)!qsrrfcRH+7*DM zYQJQ^rLLnX#uCX4vX?@E_k`YKOZ19;&<|^*&M$+qGdCR_!)tHisvWd3k?onk3yj>t?^0i|zdb zxS&c1EF)!N)+)!)l88J%_mX3>=03Q{QjTfLc$oSh!a)8XA2c3)r-p{a&-XeBv1Bca zCi&*cbs|N^Bn6GvALAyHW+$04_#fF45BPEcn`~JF$7xY=;-BUr$UqK5#^}Z=kBYrm!6J_4Xd$e_S=}ZFC9l;cmpmv^%OMB3gY(_(r0+E6&^y}3I^Jl$=*JiDS7ixlQ$6kiEjq-3(j~1B!!3@0g_w6`&>KAJGWyK2I_tGM)+GXR?^UuY=POVUVupAw_wnxk64H!9tmWAp> z7XJGvOlaOr^r_%wl3UJ&R7vk3y zUtz^(3-JB+YV;j)D!L!u21S)|6to+FZoLjeb8QcnEP5Ro%{$=y(W7yA^L#9Re>R?Z zdj+b|0QX*ZCemYjaR1ZqVClMYoIda*oIbD%9J?G__iV@V?{}hTUpXFo?qM`-U&sh$ zwH87~qil5R(*?=W4NgVaE>cfnX>V(Kk=t*@051uBFY(p1(qr4r>Gqe$iCr8cVJhb(}o#`&Y3`gz*An6^-~<1 z6>h4jKPYH&Wx(T#mu*V%Avr8!)Su)i?K$kEN}PDE{m=x)N@vyCT-xK`CkQ+sOrEn* zblFQtfK|saK8!8z2k~; zsB0qY!s$%PjJcxu5~A`D2C7+oC{9W*ByX#WAkOfrpjkc~dTvmxriu3Q5QCw4au*E)97d{cJhp)-8t&3U+9?O)uqk1o0Oi5}F zK|@Kfii@C@80==M|3jtlAAhJ@5N%TPO5PgHZ%^5exS|F?*HEQP=UX{mM3K4A+VLKF zzi1)$S|KkH%Cxg^vnLAC1vQJ%ewWt*(jxLb;kc?faWOA^p%UfEdITECI;-U*U}>_@ z#nY0@p2=Ayhch+wL)W6uYA}g*#vw_7S5#LMSq5El|0z3UNTnvXRP=O;n^_VI_wNFrHv@3E^Lxw7Fmg69A3AWkp^;lzRdEyWpiKJ};C z6l~kJjnPv=U6B$H5K>9VV_h>TCAUb|N^W3;xSHmny-Q1_4k;Hua`hwRniM#Kp^%h~ zszI=ryC~5Gd)uvyL}%CQ1c#7h$~QV5>_iM!fF1zV*t>HJ(sKhSt|~`vs|S!7E`&z> zSR;s-CMHlYA><;9gIPSHvN`2V=Mr*?G2*FkU?F6}qOv43$j?)v$W-xU^z0lFEO2tf zf#C|5%rYa7$8H2R(|oC4`GO)vBT=|LCe>#DSbJY<-t0iKgYfy>Mc z{&{9x$b-cL0=*5%@_k<+Wy$@!;x_-^%!hwhMv?+}nxn7HdK0IfdJ@tN8|fLDc>CRt zIcsts1#clETwW*^jR1 z=PF$UY^vDJO^~5dfN2*(S;vv6t|jJ?;uyOE+KtKX4>%Ha);zhM24p)6v|E!3HH`M@ zKuk+;AQVt?cWS(|9<#x8H@Xj^#%NN8P-nw7`SqMCH@N+E&y+!nl(}STh0r%=8V?`h zLR~G+vUfVtMKP%x<$iNCX=KK1tm;YSkdGT;%!VKoSd^S+NcKDP!leHN2PnR@ zdG|#IG-in+;!u($kdT=e6RuC=OcPR^GUU@_?Sh{~m6cquC{?W~nt-I_IDB7mU&x3C zl$sJ<2kk+KZb_1hUQnR4vLhWqpN54hSt1$a+g8Q0K|dz0))(1tu2*nvUT3*!I0Z%u zVq$Dlrcfd0OeOPlR@l)(QeKe>-SQa%Mb)CNj*IKEW#&v*3O_-Sj4=d|Pe3!zZB4a1 z)xC&5^W5ZP@;`Uf3D1(twfecL8c$|5M0-@q>yEI?omZ2_&_(9kma@jCD<6YWMpG5- zQ@iWDdDOVJC#cKktsy(w7e)Af3jQgI-<_K4keg3I->fZPn$Uzlj6t2j3tK?QQ)|Lm z*KnmyvdnUcng}u>w8ebmjAW4MYO07=tUChXPsk=YRI42SFd0b|P*ZSB#ww{>zrEnJmDm3Emy4^r4PaK0Cdr5Rhmz3Vl}Jr-Jv?071zus`LF7 z3RqExZUkwYP6e#AsUeCGV=S6bW`KOrfcMB$gBWYRA!w9V1HiV*3aXCqK@ z9-)1fcsYdDuuO>!SW(Fl1zgKyo*?uLUgqclNE?oH(!lj4Hf03ik?H~QSB)SqfV4e{ zP}^x?zzy=_iJS(jt!%{8>nBrrZopz*pAi0`mf|~>_atI?hwg#KVK^*M3Qasrm;-CY z0j&z@E|Bh!-Z*Jg6W`kBhbZ%Utq5;4*pZb{+%&`pF*DPV<&!o(U7`WoB6Wp?2o5}< zqT#CrkEesfR0L-D%Achuu>FS*Pr}TW;H(m7+Yj<1-Dg})@oVGIEDvevVH6kn7&m4a zHt!gW&o=eO=tuQK_ThrJB-K@r?i@NoNPD= zfeh6Y+S=k_YC@o~u0T?CH^C!?@7FOIIW<{<#NlAW^>uzJrUX%Y=;g46wT>`_p47*@ zK``M2Lx_^%NtH$(I*1bcUJF3?wj)-w5~FW>1*>bIcp4l++Bs&AD@M3cRz`!?jWw&f*LY>R4iJZ^i_ zvsi&B8DITFLd}qRR3-;#s)hvEjnaKT;G*-#;iv(pp-e&rP9eE6xPI;LA_Hyjk>4_HS7ta$zQiW)7+PwoeoIDIi4ZRSbf3pQTx!*bm@Zw94 zqo8R%COo|Wn`sOuim`9mC+IP#GtRkW6xMFHQ9d4C!$3U0?FH=N1#KVf?JIHGDgAK5=_lfw)dx{d@rS(&&rP}tO*;0#qc6UN za#|<@0j&G>WAtiWhzl;ChAqV=;)YlsdCx)jAKQ&DX1{{xW`2MQ1o8AUkD+PPTs-jH zJP^e9?kg|i>qYYs(>26s!>QTK?myIzKct9N1&@S?t3&a7f6qa@RVqk@3`AAnU01&y zDQ>FtA_~o}UAvM&x%xgwsu`%yr8=;xO#l_m{yT~}f5tqhe!<>dyRd8LPVCvb6}z`?#ole(aA5s4x~PHQfI%~%%-%#UqmWba3rN9DpB!>%18AdBSsY9m}6S764UP8 z;0zxr0p;X~8VM3r3Iu~(M+4;_0T1ietik!`pU-s)S6_WKh7TW(jT<+LT7;A}ga4Y8 zW0HTQ?0Q&ZT$Jt!zIPHe(~|w6)K=7Kh_{(k-Y`Vei3`f$vq$UtT+WH|1JWR5X%?ezKn- zALvGnN`+FvNV5IoaW?5Al_vFJq7*J%xKPk)rN@n0#_$^(RT@Y1eliJ6s(HxFoG*=Y z?!IFZzW(alq~5$b538xrXR51l^UXJNyIpe0C1}u~0ZI}FYTgSo+Z@&2^Hg7HEwVs~sQ>RYFH{S^LvVD8^@>nEwt?H5z z_U9lPEa}VByr#KIbyzfyssG5#aO~KzjAmYa^*BBUDUwl~qH3E+v1`hd*Tk}@7Sj|u z>Yx5_9L#+2MINi9xlfYA-+sGK4wIVN5{ilF^~jVdT>nQt7^IqpXcV6;Sip0J)Z%8& zoQV%USi}AF@WT(|yz|auP>@_(3CMrx(MM5MR)#TS#^AvRALRC4xpD>f+w|$vnb|OP z>KojaQ>IK|w`i)vyY<#vdH#L;)?3Wfm^^thX3Us@Z@&4KeNgDT$T6AXj63dlD5;92 z$&Kfhb?flL3ooz&+k%A)@#&|Z@@J@iY|e**E=flQ~i< zrQ`P+I(6*WktbU!Jw}-^r8=l8qbC*QlfF5j%&F=$N{QvS4mBz1J+!bM>hu}Zp(3aS zNAddE#7YnXIVGwYI#;99`=gq8Xom~$M6295qFNPmbqU2}xjN!RQd@@z9dZz{^F`Zb zgvG-e;;BYBJU>kJO2N03db>_QIU0r}8YcpefXYou?uKuP>$l{8>^#Y6u*s3TnXCp3 z2=GbCUvUD(7RnAnqXPyz$_4mA=$S(5jqK-LPEiZ#xPT_)*c?|AMK1CQ8k5{V)|V#a zD^SIc9@2k?WgV#aJAr%Tdsflbdf}ZB70!zU+CsdH-(Ht2x$_;_1 zrls%w=05*FO#Q5VFu~U5mnM;A)`6Fz^@c8Z%vwT2dBsK?Ik+kAn0^W#d-55$ZUtsM zITD8-4)}=`C`3M*8AqZpdoyxEMX1)oh`NLvS3)QH#P$-rdFKP@b;)>~dC@s2kk9a< ziZXA7bmUzOjHL%P#36*v79AQCn{VI)sYY*gZV_gqNp;OK!Vs*^>RhZI9AE? zC83#!`Wkf0gr!+1UB3>i7cIn&`=_8DfF1(}pw(fWkhuN}G>H@XSc+BO%}1ikD6~5B zB0QL#hR_#-Jq~Y*bS9TLK%cg9Ctb+{K5k{9tO7{SIDioCxQUBn zThP-3a^6>oqVx0|zJ15AD7gpIIlwb0s;6=MWa$!d(+_eG5sftivn|ZHV5}ru5ENgQ zX>q|}y1R?tR}pN*?G<#>5J3ddfDQtDvl13E+z`?->N8l$*UQE4xrkEVW{9{sq?Itw zI+}3cyJ3XFjbLi^*g=56u`5W35)u4I|rl6nOQSV2U$ zZO8hJn{fA(nP}M}135NrC=O!r_lxoUiftGajBwVXefb7%zmlv@ymr)!Zb8M$d6;*w zH_idj!LH)*5(`DRAUhltPxT;;Ro_LzrZJd?s3{b$1BfF;ixHvryiTb?)Y^Jenp^-J zxz{sUVW^s~(W%~zw#|Fu{IkzTMrbd7{bU}#TDcWR4GSSRr#(iE8jmJjTL?qEsy+B_ z#`BoF!@wiYE<&FsqFQncIcpj~np?xM5cKRkq-8e8piy_@sQztm;mK`q`G|SA@#!Bi zZQ3p9nD`R)ep&-GYJ$B#ufxEjPQi-RTX5RIBe8t(S`2F11jn>(hR5!ijjr7;z>QPy z;yQ$jj_r)=&pj89J-HYYCyqkIZilna8jK?@?uEuZ8{*sH^AtoPQc1~;!qlTE-M=4ilw@+?JtX&MJW#a=?=JcnYc>|4VBi?^ zJ^gGv;+0~}$|vx;bq=;>cfv!LjmDPs>+#UESFvo#QoO%Eh|@+-!X<+;(WGJtW`Fnw zs)LPTwKxy`&%6*1r~CNmqj{LOvK`jA4e-pE3H%(I^zZ{%{MCn8w822DQ*XnVQ#zwz zNnfn^>OJh(-ygf09FHDjugA;17ja;|c-;l)-l+f$wQ^2ReXy(uT~D|IEi)_e(!A%; zbjY>nfA((mzO68I#vbR@((r4(iNTJ>+q&<~OpX%0nLYNXR8U$F)rN<}(qcFbChMmbTYWIu^MP0`Pmr%Ud$>0XGN zPw7QRa8^bC*QhZFvk9$sg}R^Orl|s4PZ)VH>PLxY&8&sgu@_b-CJ zLyj%xD+dBem(!C^ZjPI8z6?{RPQZ{MjZt0>Jn+Enxc&CAux%gDKYuq)J~>~EQ^QEE zDO=XA<#lDmh;t;3OMC|*g#pvVFRNGMxWR)NtT^VF6Y$e|feuc&`DWa9%{7eb5pqvR zHlc^4s5EHM(OCWCkNjQNj2(;nCQif&#~sJ$)Qs1JJ1zyGx7=_8qg93;p}|$Mx4w=J!86eLBWod@;^F_gp>~ z`7dnQu?6?ve?M0Kyc)+HcLtWN+mC`KP0_w%#~K;hiV9YC>eHtW4@tTP%D9myf-3s| zWm_4x@7~U;ERQ_=IBvV{HV%fzU3MAHIAb)%jk}qVv2#a^z@ra7h=Tg{aou$j@X05O zF=WUP_Uw4>`4_N#`)=HG&lId)y`F>D8!o>bk3aqz&zse&H{-F#o<^d)9M@cP4f^)& zk7JHG2|xV&1LBBd%(>^{!gJ5XC6|onK7aG+r_sMh4|MN-3_ksIEst>;2Np{*B01&- z#S^%R5ar2}F>KhW-2Sh>JzK;_wvAh^zn=T+mRoM&wqRqy@^VHh`}RE&Lx!Ay?d#X$ zg{Pjvci(--i06F|Jk8(p(QB{a_#=-*yLMgh)~xxc-?1Z~>+#1Q$Ie}G<^}%v)mM1p zi6^k=t3^0x#EmG60pBfLh|`7+Mep9n;;pw9Aol(Dc;SVQv2y-=oPYl9sNTOH*Nq;H zufP3)$K#^+=i=hC&f<2TJ#!|z3zMhG`yYP9a0X{Il=%1Wc>H>PN^(a&M~Ie6_rGHY zZC=W_J;_UgDM#@*KRY*X-i4x~a&9;BoS?pK)yzO;c{yj)>DgKrALA(|Ju;GR#HPte zK8aD#k6N{A#h<79qj-Y)h%#z4PDt#6u7xZ#mMmFYJXb#DJw>P zC|6&7Ena)=15{T>IV&=E&KwjK74g01qU49WaNviD zC|z?mD%RYN${+4P(N8x5l?xDanv+yL>MXUNn;Lr*cV(s z0wkErX^CRZ0I5!J<-Oq2vK}o95|~`6%IdkUWY4f#h0cf!ESoiyH7ygmpMj8{!ESQ_ zU%2$q?|d^3&CKM|Q4a16Evd6iwFMNY#dRAFp;~qVmZypD=Ps(`S0HGyAVmf7q**#I z#v0sI&1PzrbVDRH5>lElS)11-0xhAyRJccOjN}~XYRnN%qdy(tPDrSlZ3LO`Oc;E+ zF3@|*zUVTrA=L^`DpMp=08HxjYN$JZg7wd5#Q~vP?JYFxbCLcklkPiN_QoDuJR}rrSo}D}k zTUVCgi&ZPI;JbyGGw&5FUG)uu)sX5f|AK7$o%f!l7s3w;jji_ho1grhpuN1QWP z5!hxGEGsTuKLfA~b{&9gR>3hUkFfad6u& z$Y|UdkG^m}db$SIzq0_v?ONlTSSgk-S&f$-eF^j4e-=+aemkCc`2z%U8=}g~!BR*u3}|+%|O<{&v@Mc;wET@$uZ5ShCr}ln=i|tBP-M-BG!i zJaa2DhMa|QqbK5=V~1nG3pb%dD2{%^hU1<`rs1MvPr#g~o<*qhK%74AQVc%r1ibg= zJqSl!lg{q#2fFy zktdA6#D`u2(mc3%Av7**%qz(56?5>n6FZ|vx6`m`ql36n3D+oRXHy|76hj)R!njhu z$;m}#xH&?hYKCHZ_VTg4Y#CPU%)=(FE5;59VrcW7*iyO?n=)Or=+_J-^!%yU7*Op78d5PmiwWF$P~xw*)+)3|nt)YSs% z1`-e+5bS?o{P}`ER{>S7($zPGzegei0WSyfP&L^Ae68WWGY}9Y%2%48Aa6J3(vAd;b$NWR}Y}-U>uQPHgB9Lz^D3?19luP zm*)7K4K*zvUOWURYQRl%xP22r50zRBy6qz1Yp6gqY>Rv@G}xs+qLu?ao4hSinI2<&&AylxWQ~xIB~undRCTK@5a7uF%;(1PXfF__C){=hGW>H*(l4(hTo_S zf(LfNI6%eVI@gaJ>c=0(5ut`vGLkBQ|2-5MdN1v^2t}sdn)+GY&(;06;%?JtX;-L% z*3|darSd5BlKxKDN(jlJE+d(0Y^4sBu^=vEFce0E2KkJn^P%fC{B3q7k8=@mM&p)X zi&HZptHpy-i#5iDmb*6X<$sfwui#qN*826Nq*bkD?>E*!#fVW3Yr2$pPSSbJ8q|~2 zBYdgCpnlDE+`3t#xh+MeYw_=E9a4SPPvPduH&TjMdG-ihY1J;`KGbJe!`rXXu|_K2 zIF-~+r?!N7JJD8HZ`xGV`|@7Zbt@-EsY|S~5=p@fPjLWi^Y&G~A<6mmYjnvWwQ}7Q zL_W3NK%F}Y;{StA_@Q?&6NyY_NEpQP1hU7P|BxE}HFP|pMUNf(63#gNT%2%x2qzu? zFb1^j$!a!S^ z=zz2`fpoDtmcN^oxn5X%fB{b83{RLa0qKQ>{QFLw_G8PI?aU=5AfsVHL+(G~5z}=v zw+!^@(~Y^GVTn8u;)H_-8A)9C-g_ur@FhwcbYLWo_^BgDjzqH-El@uoc>lY1??qlD z!gNDL8zj`yBUv_5D2h`7u*KI_Qe7>kpR6aKgAg%NL^%4$-pQnq@>8I;rt=OMI+Q<0 z$ZfA)op2VR#1f@z+pGoBva)};CJ{~G?~4~>@ZiDNvpNSGHf+Q4<;!vZ zEmy+dzn_us#Y@*?M|m8B&pMaKEeR!%x)u#|x>xc%c?eNZqh;hL8v8hh)c?UMU%Fz_*q76b;pxW;-Y2C(C7B2xbJAJZTeN` zzM^$>{_NS9Hf<<^yWW;2!ln*%h!?xO*P=0>L1GT(0wTokW|#H@4jPRdqF_~|4HMI`jk*s zY6s%M)AL``GNdM|i30}?a6c=b5XyG6>o*)%-ZCB~{srz@efKocAuI79y@}5eoK}vAjqD70pga*9IHq>n+`WbCd3JdB9 z1~#G1j^u}EDQQ!K5a$FC%LV*Gz@}He2;d2&)AQiDnUd?hgF`}t9WaINGjDPUJx>&2 z@#|0Fwrd~8wCOXkiws;<^Rg_P4k^STEwC+CcHnrHso)MH)}+ee8mA2#KC$a3;DwujHw2Gbh^o{3m=Vce*`H$9Nmo8+RrC+x+ zjtH?vyHa(~*eTNz8xP(i2}eIuD42^IHd9m}^en*0<`BwY44>HUbfTcp&Q#|$bbclI z@%&>`>PUw8tN0Pk_ahxN(b_)OrQjFVsr@PALp0t4?qj}s>|hc0?plGY4B+Gwx?}yC zCHP?WF0^i4fL{GNBNi=3Fd9YJchIbdj;5_EaQ)rWiS16_mq@_HulusFPiqG~Z43Ow zYQWFN`i(`{zJ3p~%mAwWFe*Kv%Vv5Ga!86a9%Ef`*CCYK5Dy?{KXz|h4>%dvyr&Y& zmTp5~K~sc+TM?^X&sisuQvB}gUy&7QgG9hXwVr?#cey_cD_mH#Hf9=d8)x8wx4yvA zzyBSZK6n`?HP6JpqWy?g8>kACN`-?^%s~BE2%5bMIq6j}taQ1bQd*rf001BWNklgROlc#y%gX5eR;B|{FBvdV716ZMH+4L4q)q!P5g@;yLRHU6~Cf>>o&mNUr_e* zDwc}fdY}}$E4HFiE5)nNEXSs`aV%Z40XN@#4PuoQoS;g$#mH+w9bSkMCl77Ab;JiB z&BV8BR^pvmGtt4XKz30vfO?2@Jpw%r&&Cfc=O9Dhi^f?Vg5Ck_+P)3fPx}lne!2&9 z=e&*PBpc<#;KwSFlNmxDW7UkSansc2 zu|BS0{+CNRak*pN&-mfX&w$uL{PgvwShlT_)mAuDMPW6q`389fq(gJVN!d0V?5X3j;oRy~m)1Pb#)$g&UOwRaYwORr;q zTn)|JH^BW5ehc?t2lUEsi57kw*AHof*$-WgD!T$PLqo-GVCu7T(XeepPR>@l1t>4e zLaR1$j61svCf@l3FF}dm7DNimV25p%GM@JQD(p{m#$kEnb0y)fq;c6R>B=d<3>{ zN36U)7A#zgOHaBO)|O&y`1pO)_kj;*{fGu>T`{zEKGrXKk>?N5=T@#N$3^E{4g2H2 zBlP!GfZG;t&02+H`}IaWV;{bs_bSMW^RrpokzUjemkjEGUp{&dE;(Qq7h%cA+i>w| z*C4WLJ*q!m2%tHheSZZSwe5gbjq73kym!&u1J*3win3pUp@%hxhzNtw{WNH43C=J? za`I8OuLSFt%wehO_g`9pmbrb98}^Ynun9$W7*3?7ogDdcAyc%Z%EK>3m2&u%fX6RR z>AGGr0qwGot6kF(>g9`h7S00LK6FcP(CI;9@%6h%R8`^e$&+~jDGfKp z{)C3y!p6AlZ>OhX(2xTH>y|IaefQnR{rmQqG0a1*-%;Z#{X5=U!aMZA1KvcY34HO^ zTa4=b80o}F#mBR6#laoBxC)35+i9|m}T3fa>kx2AKT5c}#@_-2wy5gO;T3k24}j^M(+jdGqFB8)FSlne>8dx?tz@#Fs?f86ukP{%P6WW z!M5^ZY;(hmw3k2oBqPkbCgo$~xnme%zUG?iVHEE~*^Xa%EK~O8`n%uezI=Y%QLKVQ zZq$_d`RS9dl9`leUU&jUUwy{+L>y#t-@fhIYtiSUkNG=3Uid!dFP@8g?zsmALodP2 z<1bCF?KN~$sY1hg;IgL2aky`}^e8LLnWAyG-;QR@UgQ2G^`gQKt(n3)e(XqGasBn! z@N1lvUAp&3=ds_QK@T)-nt^}7@C<{|bIL+dAIE-K!aVmIZWtvpgP{=DmpnXmDQ8ol z7jtZ&Xu4tA)woeyaM@*8Hfj{BMbUNaS+S0<^U5o)1FztcOK!xDO&jsZefOf* zVGZ&2%oj1{yz{Va*G_afdIGw4ua7N*260`@oDbeaMP)H=x%Vcl+x{!wUGM_NjJ+AV zSN@0_FTVz@d-vvS3DpGAb+l-3EPD5Eit3%mVcPU5ShZ;dwiNBbl&2m?c2)zt`_>{{ zaKY86{P|ZN@2#6Pk~gUHnn`0~_3CvfJR+Nwu&#dUQ&!$Nuys48PP~KHe^M6T!Ygd6kJs1hWPrWA< zyr&kw)hW;0idlj!?Khe3#@m z6rXs%J<;v21r06;OvL)S0iCWAbdZG`|dz@_ON?jOc#bmfyA$Pb?O~>bsO;Tthu=I zf)g=j+4zod~VzXgu}i)3A2_h}}PZi#C0FU~}<7 zG~8*TIU+di%%-R?4&by&pJ4b6Q}FVggR%9Scd)_jgvQ;D!VzZ;!^M|gjmX-~s93WK z{e~X}-O!U%nbb|>zhYMQ|M%nHbz)^lP1D5cpMFBS_MO;%Bp9@??#JCo3)e%-7L7!j zS7t+E2M$8FqXLb0dGe#cW3A@)W!M@5$L?VSaZ^Wg@&kSO4-!3RSP>gl^3>-ClBrYF& z0z$rvth@+1_3D9!joWhlM1J!Obnej{kx(Yg+(zhgSaWn~-5LwtnuS))+o3oof|i}S z;kH{ZM^+$!+$J5-vSk;n{be`OBk8!~uJLG)Ph&iQMr}KxSNrbBB!|mP6CL^KH<>MSbku=Hken zy-|>z4MWdHZf*#Nb#8+6jC^Diwny965qvc7b&R^{IvjoWF`TK%Y|t3pI@3bV z(Q?xuEf?(%>xjl(JHRbyfWtd>M8kU72nKRczhw*b?A{ic#81n~LFYleP}r~qd_4Q&x@dAmptq*-vy^$C-mw&5GN1pi2d8wp{Oi?oJa$l zaz=0LE8mB8n~ITNzX@)<`U-St+!#$e<^fqIw(f0)(@#DPeGj*=_2(t%&~6|uy>cA# z+Z3W%*B;0YWFl6&7lV!&iq@U`pkmiX7*)kM>clf~#)z}gu|*EP|86P1*;_&xDal<8s&B+(!*gK)^z~#>NUVI$Mr>Z ztQbFTJ&1y)opAS6qtK?H9^h38H(r>q9TR?fCj7=NkY2I}#)19lGUNnYd*iLhGHmwo zAo#RxhXLp|urK=eX@@i;h;UwG^y=RYM-T0e23gshC9yL!^f~!h{IGI0O7@rG@Z(Rx zg!}GAe!xMnv}ha?AG`~VTGvBF zr#crKt`~qNU3G-i2)1wp7v||(O z-B*UwFZmmqcS%QnBNOpJBQ$N%6hn^ch;83pf6{6hVk016{;MRwxqG4eZG%P4Ym-bos zaMm-paKfz^I`TMJrjNcy9f|edZ$*>(EpXMe8{h^sbnFyCAO~2mVmEG|{0RDW?u49l z3;nvc#G-}oV8EGYHNB2YL4z1Y@R%eG^p=#wbE!Gggp=KoGUEw^db6XOH(xuumdcl+O z&^qVSec2JNCfvD&37$|PV_t)Fj#brUzWj>->oxIypvE~-sc~ppQtDqN`h{19gEfDY z6DuS#M0|9TXH0Cz0@_rL}$8Q8qbkI(pUi6*n=c$yLx=yYtD?sO_ zYGwM|Um<{3CRKH_71SSrfXN#iO_8pBnZYq>;Kkr6W>jX z@VRzx--c$bTLYOF2s2SlY>sqn;u8)(<|*cVzVg~cSRsQq2tTY@gJp|9XWr-7JMPA$ zNs}+@v-F5h(tbjSL#}4kq_RBkd{G3slueNE7Y+ZIl0WQ7tQd~Ln2ec^2M14y6 zQvgKcm^S(@zU~o|E@$LN z|BV3t{~f>o_;;OHslTcHXT19+Bd+NPATuM3cV;c({uy#q_u9^~35TnNtL^>x>f3Kn zS}gn_EK~4sn>TCAoBm&Z{R#bg^+t#G9Wdv;_t36m2XtuPS*U8-F7$xlcqiD|QMfl+ z%rGcn{-{G#CprIt3~-4zN*) z%^MNV)Rmbc9|7V+BogpLLY`GidJPN3OnyhER9K1`reu-1T$HXSWKB)TVTDo$LZvCKTAB?9t7MHu zMARrKr%XqDPBSX`OB1@dzJR(fwd5!Ea62cA{N%Dl4`MPqV>25^)~`tC(n?E{#5Hk> zfP0YpqskIg4IRZuhk@&ky&A($It_!aIU@;O2~pNkepj4Jmn{SpjzI=joP5vYZWOAn z^vV6)U{zW^pFhJD<0Y!4b2|pv5YK?`<#78*byoyQPEsSYnZ|s+pk5^JH(yX2%`&#~ zPq-0b0_RnW44~A?k9uMLdBCsc`->V8=?q*cP9r~O_^GLWph`-{XDEkW8JuctgQl^G zm6(pz!ns)&vb#ZbUg7D9P)uZ%`~Yf^I+XKi3>F)8MSS3wA2(vm*mH#nkdcR~SQOKq zo`Sx8`XXR!>~0+k3ekZy_BxQIn%r+6&t!*kXJ+x)@(3&q{HX4y%INJg58= zH($?op#>$6+O80eyn)Q*wQ~Z`sFHtA7j;j65(<10UQPZ*IVVdsG3gs&IpRjjLlzI) z996MwmGfCDAl9o4zk)YvWk}~==g@c{7gkFspxMY0wHDF@iG-q^6cb?!MI6#rAx}6y zbMYIw0GIKmryRL**4rZDpmo9kifBzh6b0N&bp_p=6z<+M+JniJYBl^_w!rRp(K<&3av0mOPLAmmz;0^({U6REIi#PjE~RRg!xm6jlzX3^8Km7d+G+F zu9iFn@Wk0a)B|{RKalsXvJCX|ojZ3T63IlPM$I4$AW2Tr7fztOFATx+RavIsscS-0 zkyi}er3JEFaKFvC6lty!nzW=b%@2XLa2yYF-x!PACQLx@uB~v-{ZlaP^y5)cy#u4~ zB4qvwymQ}`xbx1jc&_iIIOnnl(fs|{c<#pYapICW*tmNu#!j4zt^=>Zy_e^qf5*d6 zR2D@zyC+(OE#|t}2*Ec=DJkL!c6=luiwcf4=XWGk11l5`X_BCg#aJ&wbcs z@0~j{r+w%B-tT?0Q+<5jTHM0XM1Y+(TSWGtbjubjFAHPN`4eH7zFK}rKaU#rzvG|O zzom*kDfsZqpa6$b-C=%la0F?kNq)CJDTQY=#>oCtap34-R98h2ihvE9^mK!{*iG9u z!RMcUj-4BJ;?Vvg^y%6SnjMEmj*JvY(?V{FQfpe^gSwRR4CIK+R9u+o#w;p|^8r4| zft1~XJxJM^%MUA&fZ_kfL#HL?bz-uu^eGCZIAjkGW^ZSI2 z5fyM7CYzWMB~DzNa5PPmGrwbNY^QHCBQ^n3S;QxDIWSArr3)1Mmh-C0djO3#^lX9_ zgrQTVhbSHwydZEu%Uxc%P6cEQxn}XTx;|+sLcz#Lq{?|jv`0e9srsbxQdCRhpf=>L zXH|kHuceFc3FL8MxnC{9@;r+Bn^X`p$cZ0mo&}QTz-p>9VV!u1XzA&wOhi!R*RU7W z7+@t_DOn-b%9SVx&;}z8L_Nm|n* zX_xTj^Uv&&P1hXF6UtovIHC@jdZq9e`(>===t0H;b!iG8QteFdGsLEnjLhJqa0B=a zn`J)9D1&{OAU1|6t{1)5T7%Kprl9UHpsvg^A@1GDh4Z*%JiGYP1-`U{UVSdFjV$wE@NSH4ogh1zsmpCQStXdoqn6>U~D-4VojIx&P$>yh7V)uq)kA6-=v&ihq?gr?)=!qZ?TJ}bQ<5g4hGL+O4G0cAQ+rw(qv;|>h^dMj>U zatAW90~BqcY3tUQIdd9%)Z2xwufL8x`T00)Y(F$;QGj#LUx7$@IXkH7dJqd2Uc}=# zC1Im<+b-r6GmlX&D)Q=()3hn`cxPR96$V~@7X}Tg2fJu9|CR1jWtnJ^XN_;!Ke#Gh z690APCR_YFy+_3ZdseUJ%)sp1KEaRyP5$OH`d<+L?>}s()+KmVc{HG5gZliV5tDzn z#N1dfyBDU1Yywfb4|XA0B|vt~c0bzAvv7_Naw z&ChWyRjq)?_0xckI$2qmbo%Ms*fAsNX6wpWQhXrSA*E77#jaFe#la)R0CFt2j@;tn zYWQo2XOry9)K7f@U$V(OUBTP1n)Dmdla0h}XvvPG?&ClCaPLn!bJK=eH`Ej$#3uj(*#d@vy!?FR2GYd{vulc^bZXm4{9x6-mR~m+{$JkvRIpAI8nROM z7LWcMr&D?leNLGxDD@c?nA)zKUJ`*<(n(ZkL<0X_g&8`Z3f9%Rye3cTJE?H-zro1K zyI8qFs{EO<48_L}@t{kIedvQ zd~q8(4JJE`>Z(HM=3X2xTLoCj$Q>@(_sel5Y;tQJ0g{CIyQ3a?nlRlhw$9H zpR*c>pOf?^PB?y)n<3<8gb=RS&ziDP9Y{}U3@et7JsW@EU3tmsVzl!WppLH`DbkLK zZZjOLi`1rFQMukwc2EG@l(ao|2zIQ z2O;A0q7)>l&M=ZV&l537;HNG>A!}4EZof#Dw(t3H7rK=Kaz-m7vd) z7l09fS&#{UJcJZZ%P7jD!LK*VV8mN5RM~1OA!#w5w_*-e8MIW^-D)zR>0AD(?aM!D;Sv;94msDmO#Q3 zR12HjgNbUV#h}>+w+}fiQ*tkAM;ZOHwHODNjw4-iJ&H&4qo2tZ5k{Q!pdU6#hiD<8 z0urOlgpZ#EX+w}|RKgcTT%+Ip{5PEjbKK^Q3!z(%9)a$Qvhy&#QXCs8vAA@7wpl%j z(gs-tsW5Ua27paAv=AN;jFoYK5`)U=2-=RH+m?JUqJ+}X!?sOU(9$Hy)yF9eKjJZN z0g!(Qtf{(J6Grp_5y< za*h@Kg&blvMA@)9A_G0zl-i798bVFSv|vPR7zv$K%$xw-Pn1!1PS)8%O@!{m3E1)i zNZuy^pXHrThg;bQm~QW=TBKYVXDYk_(U8THjrwI z_#kGJ&b=6ME=433f|f|(IfVKd^+SHXw&=HPwL;lI>PPe}wE(QRkVK~E8At>Wiidc; zrnxwh@FAfGkYXkHWmp0BX(7)SM-%;llP-=1Eg?MGEyK@LESfswS~V;!0?RM-=q-7F zLCc0eVIgez5ecMod+N+RCyHQ{`<|`G;iqefhfr--GOdMjE*kd}lfTQ+6Z}&BKML`3 zATn!UWh);vC(8ZJJ$OPA{nqa&b(lE!Epk0p?V~w0{S_=8H3?7eQL;C>6a!F|hDw#j zPEHg&@96ycMG$xjoC(b)o!i=I_uo5|;Sd$D9j1@{001BWNkl^Vjj2c(s<3tO)%Z%FFXY65McO&;-& zxtU@ySG|Jtv|sx8LHz#rFJMfsE@)N9Mx$04OpWPt<5E`P7}cc#s~1>lL6#1EYVl$` z`sky$^0k$mO_|a=gSr0Cu3X8^l&}2hPdIbRc;sf~y7$R?*P4dh>|EBlUA}xdGOGhv zy?QlnTyz1Jz4;#34eZ#l4__ZxkAnL7=+dDxrp37C zA5Bwk;vs&g7@fvQMP)Voz7%Apra_nBqlF}T?|99H83~pMtDV%-ho|kmC_SY6Z}M-3 zaLD!eBiEB*a;ZAKbb9-iLAfu zH^CxrMw4Tk)AqK-*%kMj)CA?FWAgSS`Rol3LT)pn?sFGebsi3iWCkG#Bzc~ZJe|)^ z9B@fJlHL#M-fa0yW7Ic11#Di7*HCgWlqHrFpQM;W^7=JsHIQUT%8V;gp}tTS$Z;m6 zwvUPjQ5DZv=)n_a!>k9}HO`Pa@$&QP#^vud^wPEDH71|C=<|lACp|Evnwk4tYIJ~F zhm#yP?sFmy^W^EpVVdrL(7oxpYuq8_ezm_u)Q#l%lU+s9Y_(q(wN_-v1Rc&$-Xkgr z#8eay(4DB+R+=0|-X_phdQ55ebCyQU8{X<#SB9Uvp_%Nc^139I*+t~-8ip} zLDGyWbuMbOGZ1siU<4g5k|GpP*8~~PvLYg=pdy!O0wG^e3?X_`oYKgu#5xt}bwX%( ztO!e&F2&7tn_<$Vi*eb=iTH8D2AtZjBYb2Im6D14fkRQZVFRx7i)A)J+d<<{7HW)^ z1r6}{%!6!U{^TD`mbseM>KrsZr6)db*qaSN!L+_jal`%3V!({4Jb(kX1Amijv>(bH3}V;v}gR#yV?6|5~cq;{`p7Tj5AtC zNOMg0v0HC|&>$vZ2N+ma%@D4v!v1~x8BC}O33oGcz^nk9<3Y)u(0$xXB&)DTR`wTuv6Pmn^|%R(*=VDh87moAYUq94HuJH4&tP< zuWRCdGzpXwq8y3eA#g1HiNr`M_;V`u&$WXao zjysF9GSoL@*31$cB!{%;J(Op^BkDP#)RU?9f_D`Oe&`(VBPiP|Abs`{qEg!UH`8nt z_gYca+;Jh<1d{U~lNm?9+O)_W55J2IX9c%CEIms?vOoFcn+-K#8Pd^Rez~PdQFSxH zeSqmqK7%>oJoAKQ4UM1ZyAJm!9(H;{PAEFJM?x2y1)sv7x!yxcTT|7uFNJA^K26Mb z?gm1W{U0$&J+qna6_#!*0ac4H{ml$HFY{2fJ+-RTcc^II5dAh_hebArW@OzIlp~_- zTk1rWP*0vqUo}zh;fo8kCdZUEh`Okyu$-XFN~G~)Xck{9e;eOJlJ=%~n4TUs(oZ-4 zFQr05C@i^~5}NKcPWm}P&c=-!S<6+(9VQR85vYAG^*g!Wk;X9T$*TWX0c>proZ1@! zqR^1*+t1x-{3jo^?^QiFqR^PW5Sle>0>_RgYXZ1f%oG~z`>*3?ShrzUQJo(z703+r zLQ?by`cSfa2Qsq#tRj-u>=p#l8hKzyh($b7%>&|aD2+R0o)s47GgJ622K`P|@_sQP zWJHBJM?@Cy1tX%UraTzpKAPglifru|zb}q#sR9v}Dh^`84LYJg#AbOkqDu%{*Gf$| zA<{lQNRv}U4C<<&$UUUn#lp=IqR(ZbNZbp%K%|Sn!WLHk0pq_TQ}gdU{(n_yEW?0l z1n~SzFA5bJ%|Uub23~ySJyxL^HnfL0A4f$t3is_rC31FO$?bblR7XWnQ`Qb$9&O7jvRA(SF?84R=VnI)hq z$MhwUHA@C9JpRS^u&RwN{$GUWmOxdxAT8hqrZE|S`rTqHg~*D4K0?$+BfvBo$RJES zZ&fHNe)p?lGMTz2@g5EYNd-l?#EZZj!mZPi%bTeXS6vm~36&JXEm9Skhad&WmIFs# zsHOPkq$AFXJ+`RnkvwuEE;>lW6h(Ec3&g4mM19)}R7P(Lk z%8>V;a06;n2Jp7xv&d$x8K@-#czGSQ)MQiupZs36QBxAbH3Rsh`h~0=vjiw(xc3s4 z8KMwbCRq)>vaAt36OC@K}#5su3GLM_I?2Pw^n{u|?(D5geH9B$Ygumv0m;p#rV z;uviNbfUgUx+#j49aUH; zYZe^8JFXcdrVWf?{6|PhqDJ?s6~HG%Q_{xQVbvCk1tugPNbJfCK`9bNp?*F?$W665 z{9H6$-KXqVj!>Di995%`kQ+IhpMR9IVj4nnT8tP`t_LEznO_yJbM1A(`sr+%70dQn7v{*NE(KyhIsBE`@ z$e6mEeUUXyCP8d5!>JpV<2xF+e>oKzTAb-$Wv`uZE7<@3L5mwL>Ug2EKX;6TXI8*l)XDFc|8QI7)*{#+sg!wm9{Tw$S_XXE%k3e7Kfm`;or zXIjt=UT_2_(J?CF=zYq#D3-~d0Y6|M*1n};g`;n2J zkM?a0tXy#j{rZf@h7HT{=Bw}E^s}bGZ-{a>gOgB|0&F((xSxh4Q=0p%PU;RqmBuGk zP#m8i_mXR?W6-A2&u?a4HSyIYwS{EY45sk~7zK6W39(VoWcu4yg<+!VFJc%X;E>(S zucYy8L(Y#vm)%c}fE09VVm@Qa2h|E$qR&Rn2yBxUix3wHn$|I1;VOJtBDL%5dBsa^?OUNQtvoE8LG+WHK%+ZBQl!j&M z&`nYosSv>!@#`HOWe! zLG#pn!iRztJ9OwW)`RZ^Pl~~Kj$n;YCc+TTioEbr0X?5eZa&Qr*VF1Q^(HJA-H`l` zxcq+waLAf2xe+wrRih9a6{R>K{#y~|B}K(kGz_l{o(kMi<8+=4gI?=*&&J8~FRul3 zTZS%_XjqGjo_97p@wb%GC9-pr5mkDgoQ$Qf@tX+HhSRc;;uisV1tI4ED~Jg(qo7PE z9TXHII}@6ohU1cLloyGK0LO2$FQzFsh`xkWTcLo|At`>p05kSnK^-DadbS)~F9dNvQw4^{xq@9ije7t<8X>p-s#57`?+l!8XRmAsyLaWQqFO%mF3O0oaXQh;P zOw&Xxr)z?S5_3$%9Gdq^fp|G8{JDHlJ}D>^qzxDWhlb8Q+;k4}->ZF%YCJgIIu4yO zj>zV*8uv>TAzN(B%X9(oWyT|Xot9kqP1;adir*DOAd$wKFru!z?W9xPLz&2&qCN-l ze$6A(YKX8#sORnF|4yKQ|Ml}e-bU0^8HiLKTR!I)*Dq;iHmWTkogO32iSc9nY%BCU zF%MF1ls8O%9?O+76GiGjq}d-cQ{37WpC-mV3$B=c5npJ@4ZUdagsk297augKQBf%c zGeo2D7OyJ4`QJKd&=NOQ6`U&bC9i>#H=tL+JKa2eP8Dr>ok$fATpjBFAq!aPy|mf* zZ$RJiSLy`RJqoAAn(&aF5Wh1ez;U>M_|T3WIJj>g4({HK!W}zsXzyMW@7|5l-NFg7 zZ_g(Ny&Ea4|QsNzZ1;=QSlsavJsy+(nl zGV85-YMC_82=I&x zcqoc$14+`7imPthp5k`NFSZmn+wJ@Ys!B_7%WZdH|Dj^u6w_S#_Uo^sWz(j(p)w>^_dip8ee9|2H;GK8koblt?b#}&#Stu%& zF1xW9?!D_S4C>Pdqfa>n_ul{XU(D@}RGxWy=~9e4UP9L5vNUc$CL2l-?r2M%EB8E2s1fPR=c`&t}48b%}{ zYAD`({Bc|`b}UXEI2adSd8T~qT#H(+7EdF0^99>Y9X&x35u^48YcOFKKn}#pf?2zp*(pcr?rMU0@ zC$W8}5ER+Abql-y&X{o-ii@iRpha<4WhHL<-6HHfw42{2N`#WsT{SE|ed7(BI%Yg3 zo-qYK?%av$ST(E1_37Ocr;IoS6DOXHi!Z$zWfcxKuUm)i9XjChIXB~2nXGAGW{0{_ z3!i=V8J>9ZaoqR&d(ppdUyM3s62^@?9~WMD4GIqxvsA@H_ur51ojYUk;)lg&Eeq?v z{1TJKPR8WZreW{iV!pmaSs510nuXSFd*H>F-xbda4!+;?J$`%FZxKs~LiTOne~+`q zk4Nvm!?1GYSMHd1!eQLKcrn_x>xJJx@HEFV@n{qmo_j9FjTnjb8#bc&=rKIJbSVz( z-Aj*+Uz#Tl`Z*x?FA||D$_CM3yoxYCCqSn65p{;_lD!VBsKsA*7pg?URh!Ao%yhrg z>$-|sL9IG3Z4#6^4Hdxtw*>I;WES92@}YaotCI?ov{~&qtXQ=`LjoEis79C+405kS zezV(=)?hwT8_z?a(R>7&U57xy4KSKrkFu86Bhu|2_)mHmzK%~KJJ1AvI{@48aaA`Z zvrH!<0vki1UWO?sI?OyJ{dgmaun}kenMTL~>21e-@LK^!3HU|IA{HqYXs|p5fVLii zqf_x|lqIdm|AWy=a#K$T$26PZG(ikzafG-|$Y>lsq77LBCNcLmKV;~zWBL{PkF%oD=Q>IMpKOi0opO^B%ohXY7W zt&6X}TaVAb{tlDR?Tk?q2H@r8pJM+(pnj8+ke;89NII~qY%sPS>xi681NF0f$TWNi z5@HkGg_7^yz$xe7iD2__xNPR>7~HQlzFS|6(ke18i6Y26@wiZ;fzX539FtSah7`CH zj){N~66s)8@2~~6#No8H3>0EaY-dFUN^_GZ0rjdlNe1dV0*LZU$xc`--!4?3Y=%G+ zoG&(ss^<9EfX&bZf^1naR+1okOzFzaczWIv6vnDh3IlKc`C-hMF&@u7^cJEe0R*f< zZ2x*We*esum~-=Z1xY&7D>zsKzPe?TF{Zq-$I z;L15zd!!O4jh&3LuU28{+$+#}P(Rc?sXZK$M5LlnR^^d;)qase<|Q(65Z}D{B=&{t zV(_FZFlFQ^=#ZBN=n-MD?D$~Ce2BA11hu!tw27~_7vq^XR`TQXX>lC<@D&{R@Oi|{ zII4A_h(iiF4ykX%HTd-e(@r$X4C)3`n@D-bw$qW{^d$5e)P-rPtOjYBFnPZ4v=c(G z?GRHqL=A(;5GD}f7xxFw7Wnuj`bJ!k;prZjZ!RmNNqNf=FVT<6`Q-u{^86OWi-2uI7CMs72~ie{4z9-s@2|nh11I6a zQT_4YZ|32#Pd8w{8NzGteTs~FO)zP~X&63e7z#pF2*i)$jzy1R#mAd*<~ir0*YIKZ zZtd5otdyQ3R9vj8%p-BUzw8A#%{pW1>?_f-bU$WvZiL;(cA~s#5cfR37T@j&z_9ng z-u)S7-}e@tTUQ1+hfsNF9bSCzQ|zM6W9b3RnK}lE+(wu@V-DI@Z^jd|Mq__8j1oWa z;s@X3xRZy|&KZEChu7hP%br9feAxK*2Ppb_9R^P9gEP(FYTAvL!Iqufejbu0V-xqFnbO z=p#M(IJRs$fF~Y%8ST4tM8|F?;nWFJG5X9&XpvV32iLDgsB#~cKl}hb+Es}WGjB%k zJ}r=n7!I!8gk=vrhBia`q2GkjXj0cfwCn)p-?kj(zAl(~*#&6Zz9IDRemr}}0xX#J zd%XSUZ8&aKp$rKeI9Q1e?RsJQh?DT>qM7)%j_Virqq=nG1VM9jx4Da)FtFD4bZP-unv05) zbTWpB^3FDe7AdL}Q5jsXxGN*vvbfw5#UhkeW$kKBR{2A4CPk%3ve3rMCw3J;JVhQ# z@0ZO*bV0kJ)R<}1Lg>^7y)m^S#c4@YMP0j6T@Zv!r7N5iGa%ZHp&K=j!~X^B|9OX_ zB)q7;&gVm6Q4xj??t_I3d*I%CSHp62+^qTNH zJo@Nz{BCA1HjJA!?|z&-xFZg{{3+|KFTDLG> zgi9~I02x^)xVG)fFTcdeC--L1Y}Tw<=-9KXKqH;w`1q~2@Xa^h;GTQ$VKD#-e@|2g zd7RZ2m7s$Zz@}VyA%^triL5bWFzvK)?3#V+(tDAbx*7)$76DC#2t%*_{jq7&CSXuL zR<2yhMv?t{w!>pLT*kF;7yt2(2pJ|a&K$zX@{%P>aMvA+d7P2c_UN-Zu;Se0>pwv_ zCTjIYjvR@LXU~SIrJ_kj4|WJYcjg($$qFV@H9!p&l>gWx7UOX{V(d&zpEd=-sLcj- zUHZ2aeVhs57SA0g4j;ykKmLfj?z#(Y8Ul+KEy7!GeT=gv4hN+rX@0ENzCD6LKfYPL zn&*Pcue%Pzc5KFtzgvSfYbr3XUq1$1_gudz>9^yVnB2885Ww_{E&|e0uwlan+<5cb zICcyeGp0WfN~g_S;z{Z{50exb^NQkeitSvRR`*;koCYW1o+K7hcIjI~A4q;KTQs zRdDz3??r%1^eiBLgndE$IX*o9?i(V0g^l53$71-Hk$_!}Z@>MP*$OnTlWFPw_ur4S zjBLJ+vfX=G80Ct)Zbd=c_E>Q3Z~1zzyz)vcT(}VLyt5W##`KU`R$Zog{{HccK+MWC zhbGmZvi1L42fdF5BDt`#>5fF;6)nf@7#>=UIyWKAR5a^F;FS}px-NC709OTJ?YW}{ z|L*nuryt(uO!rHRv8qex)vFg;w(khX7eK<1QI6Eb4ch4lkt<#0-6+{I2gkQ9M&<5% zP`3Sclx|*(@~wBE;)h!iS${JU>u<%0Ex!lCUm{_Y!7`%E{d6R^-A)8xm=fuscH<3% z4ny}Lt_29^hu=vc;8=`uusyxbCG@cMDB=u33R4FH=ozHf;>?9)6$nBWs{+vC#2h2) zQ#Bh<#!1;gYD~u^J&^VxK3hcX2~$VJun?6yUm?<=GjK~;1k>`tF#_bA4kzgT7-f!@EBmM$@)K(WT31)Iktwgp`I$ zVTVi6V$^BauLJD|`VbE8#n)fQ@cs81re8dXpJA1j1v51p*Poh(7G>{Z>79%5!q?y8 zh8wQKl6#)S%{M=T&(;-U+Vq*&d(?(rz8{OvpNJkUJ7Ub(2`C92#)q5U!}y_>;*9>6 zVC5Stk<*|ZPHfskv{D?as>Y_0!*ne$=94&(Lb9>B>b&%v;vv+>1O z%W&WQSE5Ddq3AjEbQBk^#cQuD#pT4mpa1|M07*naRCzO&;3%c;kL}0Y$z#x}ARirj z4Zxp1-H0Oq);|6y7LFT-X_rq$s96Rsy!uHLhQU4orbq8tlLg7De_U8>bvbtOAAG_hR=^pqOaOu>{^+_B@&l zJQa1j<^yH>VD8%l)-IrIsFrZ~z5GwY4?AX}x>N*U2pz(-i%-Rtl4?{ZQZcScF*5hQ z0;{SXR&E8Rb*YQ0uU-YLx>&!x0*!+au3LKis{{tmcog+)6B#kFo1HLp2%=$~=Y+;~ z5vsSY!11zlY&{S_-xdKh@&gg4Ar2k)A!cW@V$K=EHH_+5jQ7?S@_4h%AQF}a-LaDO z2LHw*CSMAXjgh0X5RyS4VdCJb10VL4?u3!k5$$`7MI$YUjEWcnRy6|gN^DrQ0;lxukBmkgF>lfDQI<-X&c;Ce z5X=+X5wZQqZ3tF>B3tKO2TD+$k%m6GHd2p#fo20vMv)HWbOq4l7*=gNLTq~gM-i^t zi?7!m#wnvOhUR3zN6xSD{ixddDT?(5Nb4{RTS|6eN6}7Pb6S54Y@CaSo_`f3nvP9Q zHg0@!Ir?;Mk1MB70LqIHKC}z#w;aIWp%c-zV=JusdKJRH2FO0?WQ=Rq0L_mdfE6Y^ zB0pf4z&Wu8@9fiIbvqs7>y#pQ!<*Q)N5kMzm!od0o_OK?_i?~3M0(pyq~&G9uldlg z+faP_>Gw#ln~kirAhv8jkenr0@E}%W-2Sy_;$I%Xs~t8WSY)c?4c>oFkVEgI9roeF zhxvC^s0t5SRr~$Qu&AV@gcWSOyL>M<)LZps+`#@imM4k05WgAo&j zUc0(Qo+D9F!5f+E`t=z(qtDdI$w5X=4$`x-kdc?iFXGeN>~bpfbcNKDmlIl3ih+3d zicjizNQG{5DlV8pxV`$ZZsCqZ-|4#jk~<6C<-K|V67{oYqDGcLA?rW6mvs599>~AO zpS>LXn*H#9X#9W1;kK(`xb-m9;A_{~xZ;W%xt*SU_9IN4ItS_LKuHO3?X?f$p@*Kw zE3a&W&rDMDL`KL)g9Z(d7EE*RPf^l{#5i~ET%3LO+1R*wGX@VHjBBsG77s3U#<>b3iL+!NAH==uvUynrX3 zc!INx3l=Oux7OY8^2;xyU+4PL&CqsTts#LCo;zg!rgPG`C$%3shX$pWZZYMNkh9sd zXJgo~zL+;}9=+V{W%4?KYUTpho?<{G}|d+)uMul30%pJeX`LUrj`4IV$9 z?~$Izz=6Xse*Acr2Btab(@#HT5-g!!guYf(fIS=NI_tM;#lR0KZ4tsp08sbtZ7^rf z9JFfH3cvmBZ~2;6u2{hcKV>8DyYD{siumM{PZ&L0@!9LBm*1Gz5y~P^MrPss`8*F2 zdPc}Bp_OITU{w0`x8KHj=bguGMCVwy?%03NIMO8I>^OY?)XxaH?AEP2CQqJ>DW^?g z{xtb`P+Jo?bjvMw@n;E9r!hmv)-`Kz>ZzxqW2Zsbdq7C>soD_Hfs)xwOXxpxJF($V zEXKeZ)vi#RP(K+qY#7T#AKAa3`w4lQP_is1Cr7xjt7%zg@CjKZEe%@7Zn^bVR+{_p z!w>Pq6Zi4klsmj-CF{7TuW{d(qAkh{^4Dn6$HCQWi> z_Yw6#lyxJwc_I)TJ9docBbrB+En9|AY0~6s20I3opEovpMv9P`^HZp0X9MzWO2_eDFcM_10VX;DZnN z{E9U~=V7Bz+vd56;#-$Luf*?vMiI>~V&tSc0;M>-2>8z#1oT-Nv^4nO3BdoF!iTpQ zl@=B+YVQr&y`T4H0u&X8ko*4@BPXwHrZ>=}pW~Xez>YgYwMDGe?7T)#$FGM(Dqd?2 zhZH5a+Fv>tnvNia5+7XO4P7q;tPDO!jBx=9pd57bfmbXM);+szskLQsf&Xg-D`fmabGXWZ#kh{@a%^J0zS}nPL)^+;gAHEmksu zlwGoQ15v5*ee9TyqM}wPiuq6!%|>ZuYwSJ%OrQP%CQZ5=locH};vQtTEJf4C&0sjG ztO=Rz+kwiWPf#4zP$wi+fLW0tjAJDSuo+pnYTPs+r5tBX9E|TOS0G$bfv^?CMKgbc zHoZC`_h^0e$nS#T9fly3Qh|xRdf>H9F$AipJ?dlb6%){+c>(f60j%t{69;$i!Nx-& zH19bTdCj^bPfK9h=mNwJeT=d|Gqh;m2g6Q38)<eV)xNHIBo1qH13j*0>eO;v;z3HmBP%)LNFr@jWeo{PKq6r^)lk{`%+O& zTIfL&F+aJ?hPmz2qd}xw0o2Vof}_PNP!_(2NiB78m$liL;!Mb&a@b&RqdC{D6;UuJ&CeWZm8?+eK28iwkjuc_mt@mKw zyzxl$kp_De?Db!wuy8v*Uegv$2hYKfRbQa$ix2SaH=A(IIp+X50pzspfxTarASd5I zL7fQld{J!Nm%yqYHo^DFVjkxgPw0)p3JVOA(S?I^AG>#+WE7c_DWlOnkT4LZ3dJc~)oR0k;KZfYYJ7J>^41ae#`KO!E zVa5lQF`#+ZL9C^7uc26dEQJuNk0U*)@ z$B)!O|K>t9#3yALc^%X=kDJ>+c6hTX+_vtfM#*`qBP#zcBwPcE{wejz{haBxM25!% zssaI2`u)(V9LBgx0v%AQ1u=ZIiSmtGar&cMucjz&^nG-yb4NSH7hNI(l=hk z)1SSG7CpP;ldpfk>g``4dqXa6ojnrQ&Aky9oj)J>4O*jFmrkfQDp>T?^4SOnVn_rN zocUb8>Rptk_eICi6Oco31$)O-;mF>-n7i~F3>k7Q&N-tKXW6_;{@_!5`{mbY*JC&aO*$QQ(<(8!e-}LQ#!58nIS#$1*29SqaQev|uSiW?EB*B5;!wneBuFg`60-+x$* zqJ1gI%FBfw6-6_VfR1n~*<6QE5Nd$UB~cg^Kp-NB-bcyF;PeTF{k{Tt-&$E#igPvEW;T8P8+ z-#~*<_pCA>wN-l*T24Ddq0CT21S9#3JkP1dLCB;xo8kycofqAvUbcDVN=9Y~vAXTH z+wk3Y+xhKD99=iVPkXiV9hubYhe@{p7F(PfYV3L(^V4pj?O zTS}J*`GhhO3bkhSYOMY01GH^jpV4kQ{D!~Ae5z=Pd>!hM8U~-A-xCP%-wCOr?#KTc z2D*0b%G`1qOA%$&*3Pf#JH z(vJLma_VsyIi-6cG>vMN2n{CwE`7Ff<9u$b?%lgHGDs*RU8j21G_KaJ`y6Y&U4fGZ z59V4ah3c7UX?T3uGUnW0cG+e4e#Ht#a_PLmpjbNyWu}Ar4e_w)ISW@`QA5QB?W9yC z+xH(HML%H*_e(BKT%Y9mK122kQX!%_nb1#aKe}hm)@El5lN<=emp*;^aMnmI#dI$; zCg_=|IafCfcP*iQM$eq@_|PHFHc{4u0CgIZ)CPpm_Uzdc!HhcmH=1YZ|0xqi*GuYA zq$m}wkP~xB31^$~^YghrO7-jfcI_DbrMebFjsuz_xGiDhm8YNPwl64XA|E`|P5g2V z@DCg`2Gu-52dzZ}C{g1PBArvO9yV`2!Q+&kExqr=iAt7?X0CjfF8oXgt^dt$e#6WJ z%HW+iejMW`O~Tqun|KYROkBr~9fX>Vr^b=aOUOKV$y8K$T#^$BZZjJDQzwr|-k{@P z?N?v%XPPw0{pza;lA_c!Hh}eJ}k>{e!NbGIEYIyHo-o$x=K~M@fQ4rKDC!eYasluBD*&QvX$| zWpsX;r>L)zw-Ak$h!x@IN#lYJ$^uZvlKQt>O!G6x_b*n&syOL%<8+g%kn-mo)R>gE zQ=NhapW<@EvnV7NLJ@S*L_&+6cac*ZeDAfvvk_2ydAipBhU2FkXuUs&k`{|@2Nkqo zLSUmwRRcW=OOM0WdVujci!m%PaZ^0XwIrAx8a!C(V zmzH90(FvqW1C)d#cD7(W*Hm#4WT6(X2EsPJUj8ARMy>JT$B&|E-~^zRa=8g1t>ppH zg)_)8hcs0Q`8Nr-N+Xd7q{NT06}JPC!6Brg`e-#~-}XGNzIrOMs@LPZDN}IuoD}@| z&vzl6G;gDn3JAb(3{=Sekxumh;VK|-j3JV8EgKY))Q#0a11m=$Gh9)ZhJ(keF=X;= zJo@N;sP9Nf#iyLxG?6h#gxIx?@ov&Awh~CC;yJ@F_AW6W>L3+q8TFZWAB~VrVUVd*W29?MfXGpnKMCtO^7#})_xbRMLRIuAFjc?Sh;yQ8GqMw@|yFnRI_%246 zmHq@1G*pF;pcqJQ75>-YC%8es{-2#2PPsArnZoy+$ZN!Hws&VbLH^azjfO9Um6z^VoEf!p`4UHSr zXF5ysvAuEXf-yj(5XYj&V8;(}{|f8nD2-Ml5>7)Me=cU8HvrdMb2&cVu#xB7QRBLy znkbi6iBMfJ({MCyz_AJum+CZRrq;Y$9->P(;?*7XF!%nUXt!$xPCtDv>dyQf?7CpY zx>aWi+JBGo;)CcoU??nK0H>YO1GA@(M!T_RbD(x36*^>vP+fIMWEu|^bG0cSxEsAY8WX7fNR90E5zNF&i@jG(nN;ruOjR}^Z2U>o}v#* zte>%hxDCw+pemsw5vzcYRKv2<(6UVdF1zlJc=5%7NJPHH%{Pumdi#@*Q8x$EFS-ze z7Tkpi+t0$y)4QW__pT_ZGGN#BBc*weHNqJhp$iEHplMau9o~;Ew_J=>?FM7V&O<2Z zc{&y@yg)dICJtkGi%dLy|7x_nxrw0k_;YbM#lWG=AR59?xs17=aYK9D5`CK|LS7x@gyTG~U1G0*oAWG8(ms;-MQKz|qSbXm#r1 z+g-bH>qE=Xl42^_@Ja(V%N8-sKa7CNdDN&qk7_^lciUCA;@qFCpP(!$Y1kX?+AaN6 zEJ2VzyZ_H&*AmU zN8-_}euz6Q@W{P)<6O!JqXLm=1XIqrgXtn!fhb*95Wn{*;(8+>vk%kHde+Us z>o2W_-Kqofxa-wHo1Ukj-t$-B-ub)n)pyl6`Q#ZG(4-D$6p+Y3owNevchAJiZL2V; zZdV=?Z$C}INh8z`fh*ufxA0+2o`Gps%*WRKN6@6%Nfo;|vIjr}}3{(o$x zRzWj;2kl0hG-;A_{QQ|lH?%XN9f}I#>7@epq-uliewX^0P&L{a(t@q7p|<&x_d2~4 z8@g6PzP!Qyuk}#RinyS(qog)~hfDV3=FK>;YcCqqttWPWx>_JCplr233{&e$xi3rF zo?AlQgRPNml$IW4ZajS5Scc7#U52bzG~33q=hyIaA3eMS{Ap>(tJ@GecI?6H%il!1 zcI{yraYnKa7gZrYzcF51_7pa(`5I3wy$^4``6gCwK7dHf!kB&?ux`y7%%6WFUVddc z0yz!PvRM-ZEE|V*{)pe)bR(ABdl!P~`RLfbHMAoKasAx6xc%Wbkgx*i)vh7Fc=ugY zWHiUXf!&Z2s6fw-9r5gP()=Ee+zbmVKKuw*UpW`AzW6foJ9a|D`t^hwP@EIH!r*v86k)Hu$vB4V$!6MB0#q-eDK*jh$rI6%gMvm zA2#B{_g3JfPABn>``eYDBHd>(ve9w)8EDcd2cc*czW@AlY$^s$KYch>yz?sJkqB;I zd=K7!<88F=(*uA zUVi?0JpSkl_+kBKRQLnv*|if6{;(dGU33xtui$s-lch-?)~7=FOX< zS&Mu$Z{7gCySByJwFj|d=N?98`VH!jR;@DFFm>n7JxI&WM7_KmUJU9rXn+YLMq>5q zuTWG{#+#Zmr%y*-mLG$AcEy1mJMjI^!#H`wC|o}Kd>&Hu{F&&`u{G+qsSnL>A|t&e zx_0f1jI=VO8U`A+9g0@1nqk$lm-)I1b+3Yui2O~Z!xY|SP_96x?{ z_flkM>&Ud@9QYRW>c?hg>AoO3w`-54EgN9a(4i*MjKpTyM*?#KA? z-QY9B2&SZ9(2$Y%=%bHtaQ{Ax9Xl5D7B6DTSO`(18wQ&89)@~3b&wlR@VuJeuQ&Xf zi4JWWqj|l$_;Rc8k!aQ;kCCa&?B?j)xiwM~7063VLxY|tqgj47hpT?V3Ct2S&dfyp z0cWFYrzXhDFp*0%&B>P_H{FjqBwgnK4f7ge(7>U{@7#gWs-b;*B2it9t%pzW+R(Li zBj(E2E$EK+?VBJ}QOtbR?MG~WE~iZ##M!N8E&8EVt0rjQArB$T!Z$w@qjAf2xaIC^ z*|aIkGSQ+{Bedw&76B~))6V4ks8csxO3=zfTC_S^O)rbT?CH`emCU>VDHZvbZ`AS6 zS)a7p%e?!0(m79z$0!%{XXUp?r%tUA@>QUB*RH5e$!7$&LvAM5B zWo2XBh#@#$T#RqGY(^*}5A&|O9nBgA8HTZ)WSx{|mm<|Paj-0g;-Yf&?A0F&7tZ4` zKpQM0aU3T#Yleb;XP{@#wn+C?p?*#d^1GhOeE0_08W-sjSTS+bD7>?3HMZ?OfI&k> z;r82qgA6~|1gdUkQ*QTq4byquYSy6}_lF5RTA{4$7!FrzI8s)LTkpObZCchtswQI@ znXxvcGTA>3zxaz2)oKv6vvUJ@0f5>vu-Du<*^zIRPODl4+V$vxva&Ef`*JOAUvekf zw`+xcy9zPm>~qnqeLm`CW}+yVfffagFs6TZY+SbvC-i!_W62%J$`Jd25P^1vj!%+Jlci;ZPuV`K1@T0esB> zSLN6L|M!}7K3bfq=xEfaQ7(n$=jyD}=V)@EhWAokeu~fTEij-CLjfzL#l3;JO7YY_ zl*A&Pj|y8z8tvEa#HyYRr2&avL7N&XzEUaWeS7xe%2~6Kkx_>WE>bho1l@u)ixbdy z-N&Cz$?YIq6G-KQwup}4W>UpFS*q{fdjQSabOzGL3A~6cm32gT_$LtgVGS3`Z9d|| z{SW>DJ^Hr5dmnv(IXAtGci;UpTKV>2!IUW|>p2{Y7v6?3-6o=4{U#XNKa~gOhdcaS z)OX3OHYnbA5MO@u1@`PZf|tHKhWFop4mrElaEfoA(U3PNXN~H?fyb>kJt;pl07*naRLsq|X3`97*t7~0rk;v5TQ}mU-3ITx^9c66_71LD za5>rz>w&b!_3-p#NAS!u&)}3ng)HB8ydnknKC}#jPrnGgd-uleXI_9#om=Dbd1E=f zI&aZq=-jOP@LOcZ4|l{Hc;VG|xdvv~kj`!ZFK$GjiHWK>_p7ReFnA)(?|3|dMvdzu9I3#L zL%aBSbtq_!S6+DyojdhI>(V6zdZOkEflofH~X~rVkTV@(J|}bb-joUx{sCn#pFc*nwJ0a++PPuDF1h z7wH(%3f(fLpSgHHAN4MC}GUC$g6V0RyJ&b+)u9mk6;F zll{go(&*ChG-%0rUVcC66LA1$g=!ecMKvMS86*c=maL9*5ExZRG$rNS=PA@On0iPy zyG%C|G(*cZr6M-44%h3S^uzhO#3&L zpOhM=V3&1(m9wqjd`d%Cn2xy5m?mUN1CA-g$($%tC8+<=eNaCV*8l(D;oghdpn18V zX7cYzBt<-bIWH$$KPLY_z@Jm|0M|0GL#ZZ!IS8Ku^+5t89GO$6&*`#>S!GSpG|4HH zD7HM$k&lEf8dLM3N^{uTA}A-igf5DY1A0Q3o#{c*UF8MYT0(%R>I!*dXdvQ|*9CW< zD*5*Srx_wX!|n3Ys#83BYB(FHIe}=w~=#y5u)Ygr2?U|ZK z9H$IE;_fC=`8?!^;P(?Pr6-YmKOI#!<{r)-O#Z32Fpi`jBsT(`Jj(LbxL2%FXY z%PBM}pr#igOGi%dWa>*r^Fz1_;F-Y}-D!YkeO%>W#U3E3mGBbE!(}Jy;+Fukzxrf&cRid?w z<`bbfUGj}R#Xa8?}f5pla4?Xc)e%{2H)MYQH3`>-Gy?KW6z!)n0w1BC@KP@o)acaz^uC#;^2v5 zy#Ln2LOn^U3_bGX3%rSKe&7JEx#j|%EH1rlI(iImiBFd=XOtllkD)qNhMoKNVEFiH z$jxfRJbPEW|JU6Ap*95KccrgxrucB`xRE$;u!Q-U{-6&nTNY3}3)_jI;CORx@7)`> zF;}#APti}~wz8FXYT$2boYA6A6S$#jG^A{_M?Tv1D{v287Olw)A@$>g(h*O@WTam6 zzLXzLJj`~j_)*0DqxAv z!Sr}p@CxckSw`h33O6uxB+ZS!TlEiJszs>U7hbYx+9L->!!s{>o}(=+Zr$sm8XCiW zI3nnF@%Ch@JK0aYZTuG*VkCDD$%gwyC;*2*c)x7C4mvfzPi-K@&v9s`XCtqB)^_J7 z_89yuOm;<{GGz*Mq@z;H!ihwfvoq@6$eYBmf1*y*6M#~Grat6)m{_8d*RcGs#b(-u zFukGxloZo+7NWP6L5cicdOPn-U}~nQ(Q;7J*FlbR+F+a7uV8}Y_OlqVR&*uRixkl2 zJ+xYVlNG$kV}YNC&Kqyl#|>`>{D16y37A|}we`AlRdw||cjkFc2nj=gFvS1@Dh7BG zK#&J2Pah&GC;}=nIpFZ4fC~5k0hK{`$Q)(}V_{)0; z3cojBeVwkZy2H8Wp0m%|YpjTd&*WGDC-qX;^dbk=l z3~`i5S+{6qwR7@kMN11Vx#SWo3&xd#T6U5zFQ$v}7h|ERnS-7wTT-Mbc&7!3VOXW- zj+BWg!^>SkwV8Y-G&$yS{fn+7$p_b9u}P?GA4q=@ip3}s#NdcF;4ctEw$tAzl78O< zcom>ifJX%oTtHD~ob+xsDn208lLEJL{&qPPNBv)+>omDgp#l{XPynZb`|@L#FCJ83 z4!uwRC%Oqq5PjG;g=EsTlC&2Un^EBr1<^!H>g&(o$N%SNrGg4lR*!iy<3uE4(}imk zks@xm?jtlLCrfrnE6%~~&!RHwKymjkxbHVl!lLVj{XqZJiXTJeo0iAN6*V5JYJu5PN8$dPu0nClRCuQF zV&1U)MeN#Ift1yN_P!?Q=}P2KfC&?mCfTTnx4`d=(41&QZL*FLfLbEQ6kJ%Efi(LhC?pZ|M3}tSLVWhb&!9R*;GYX@TZUy$4p%+bfS#(8@#_QEV#lhVDNqjzHk%&)W|`KdQqls=^$CjvYu;HL?N@HO}yc z;i#_Hs-(7dufq^FW;Ptsf$pS%=|` z)tET03P$WACPdk=OUU(r`b;1Vi3Y#_kJ^~ZMgL;qa2c{gCn;KJ{E9-02i!;#n*BvC zK_IOnlLM^Q(N$k%~3(5o+a(jS722w>7 zO+m$Q{2~`11gwHVlTd<@N>4Xrp_Rs1C`&pS(zTPNA9HdtF!`>9OwEX4L;?}>Ww5H5 zj&N|)Tn>kgILQlo8X3s=DJDfLR{XILk{-4pCPU#A3$cGf%hmdrT^Omz+F-Zi(D0xe zw$L_@2-Pl%U?6a0@s>~xqq-1bG-b+wA(ZH?LbNpQi>8wBG?e;Oo~1ttVGCoa5<;@V zn(!gDx&9=8XRD=-_&y_*u|&KKrNQna8HxKB&^^^m7`9$E-D~3fVnWshLd&V{vSRhv z8eGV#$tgF~3i8>pbdE87eh$qpkOCMj2iY9%CG^!&)>@l!V~M)S=$Dj8>myw7S>w$$P?U!E?| zStf7`+t--On=R#)C7LtzFi$_N0OZ(Kz))hK|%fxgEtK%MN7F#X9;r zbX%AXhGrlZXpt!{n%9f;9OY%epAg8aP*{K-$$lAVF#jItMycJ^0z%3Rs@PfGBW=*_ zDvisL%0a~fK~}X%np#|yPEpt?S@f(@c97?BdYGh}nh}WLnc6{(Nuey$r&=vd02`!a z7KsstPdQ-*{Cs*cmf~=icpi}$1Ib~O_G?%&t3wMX!+;x@f)=Holeh?5H+lKa;tp{| zY4JorlB3pVx_C~EP&|8lYq*azqH%Hqj*fK}$fP%-L(1NLp{Dhz-#cUX-lnXpvWL^{E;CvnY2uQscgHT8s;0Sx+g^U1)Z9Ol> zJ3mA^QG+Ar&*cjU<>CZ-K?wWBNxAs-#dxGL$g&?efz7WE)X0fAn5Am}cNx6XcgYoy z&{32v2o#z=G}T_NFHb3S`mS2_l}k*P@4x&UAr}EuHT+RR;MM)E9pMDz4mMvrVH!8-ZMJI9O`!{dqB0)lpCr@tU_9LZ{oy0GE@B#Kr zpnFU0Lgz7J;za(P+CZs*P}Mt~C$%57F}3+Y2hHc>8b<7ylw6ySj&h%$cEP5!q0sLHnCkEGz(BJQIeS+_K{5k5YZms~2-g8|P z^Lga+Ink%RJPLk+)srGxOyx*jCS>{${hj&rmgNXDr*_k6a(d zLeb^@((&nY9{+Sp$K>o&p}@za@6vVBJ_`j>uJM_#Oy8$A4t<~dF}I=T@^R>xw2xwe zs98mLK_HHm&9Yv(7kbDRvM2_kU8$Yv<+}lLSr^${mX90KeaPi_zjVxeA_js=eV*gl{yzew=w=g6+|ngzCIk|V^ns-!mvz{ERy=V64DlE zbzBlQ<4xB~_lyHuP04?&zspRCipfyc4`llqWk7XlpX`_~-;?)+`b#KP*2F@s41ky6 zn!2ZvTvQAK|1m(R=J-316h@hS;RspX!_w&w&O$`u|WzSNiOV6)QwQ^C1u7htiZ(5Km?@G{Mc;XCLm{x)!qmOR3@^)_FBw zWObN4BeukSCUlm$ZlMR0Qjnpj&abSb39}nErGE?^o_um`m}qEd#-=s5;@qpRMpwl+ zmiYSBDd!<+xcK~GZ8+oK#$)Qj7_oY?+({O75kM&LO3;srm!nWz67Zu`YqEJ1nY zH5YQq_768-iLr+riT}Fbhgkf?oj~hI{OCu2!XbN4K!P~nUt5U&=oNf?-xH8(s>Anx z@?Esfnh8Dhapt8L;d7^*i7U@7;E0nxiy!~^a-?U?LCxH`_~pEj%$@%w)}dk298B8! z3Ku>JRLDkb)?(!0pTf+Qf5H*7rvP=`@al%+phOY}G*Cm;6o4!jBrm;U0{$T+|W=Y9&$ZG8;G4_biJPx}hn)sL^y zalp}Y@X+1YV8$VzXKU-@KYbwTUEr8gC*X%a{0dg#a$I!bnfT+mefZ|_Gw`3)Q(2Dh zy6b+8QLUAtSWxwuSh_$CFb`o$U2ACn*cuTna-f9{>ub|1B5pM+cKG~aKLE*y``t%?rzoy&m_+{+>>xE0c&K5nxg+O4qI~ zv^0)jDou5B#QUwcYIr|=k;ljF?h*z{9qn8A{&scyyuj2g5nQ*{H}j&cwY8bgqdq01 z5QDTpxbvA94K=ms>fX(Z&&`=#Oj~pN1iqGXA}%Ves~>^(U0rBwZsGH3swp5WQb3*L zg~pctPF{?6Zrjb{b7#=SnY}1yLW^QlrjopvZEB(7#vN#Es^#-(s1l1JFDh`mboS)Y z*wBLZojcLeJRI9{U2yCQBn^kJzoE(Db{*F+jAb^fTSR+T8fj7EiG9$(&p>wFBG{w=XBo1>Or=y#&K1g@b{@b`5$kgsI|}(jVYE+u_}7e z6gN8(KyE2o5)n=m>XH(ui@FKTL!?u!l(6=3;4^JXC+V%&glh^HT00VRbr6ZnIqTz7 zPgSKHrPy9%Gy+qcheH{WFh*c$vWCM#M0Fh{)7wbu42!vpWpTKj<+#S&V|Uwe7QD~{vE{G*2_8b`T%kcIqz`01f?Shs9xiC)wC+H zZ$li^l^KAPIx$rvAkT~H+|=(hri$7Sau2rn6l`5^)?F$~)}%hYszK02#)*$$n7lAD zN&&q(Uz4-`<&^&tYfP#xG0lyCF#nE|Wu<^wwVz0x37$SBnoW6tglGp*l4F)K7_l~> z_B7zV0Fl9D&c2|~7;65rEqU5P^@saQtd}w-jyic=oxIqu1nL!!NO1c#QENf{(uu^R z6ce(qiJBZu`ZyTsHmgRVzndPv-uEI_6&zC_NkyeZXHk@ncf*0F?~^7c@t|oSMHx*- zp~mF~MdblG4X`~uJsg;n?@xWE{Ac;!)wxpP?EggW@}GHAZ9SB_RFX88MPYskebBk? zE4%aS@cZ+qt)C@}Sc~EdmJUCkhm~-!bHh5+Rtl6YHTowoYKEgI*OCq!kqo4KdyFJ^ z$Rs~P1%N04hJk*)ia&30nlI+^dU038gEU|yl$9&kDwdyA54h>(<*GJDsO!j3x*kA- zo8bq>wS;q~L*^o!I!trQyiYz@Nm-6a#t~v`L_r@YhN=t|b;#j!%Uj~WsX!I$NkpE9 zr)qxSbg4@#p1@v&QGlY}z#mVAT|7FwW`o!(Es%7Xf{r6}YNF<&20bvn0AD=n%dGD4 zi7%f5*JO(n-cJMC`R?_ho+r}kNX#)X#rb4SA)jgSF=+Q&xIHrZaK7$pPh4-tt}pco zL%wWPFURft{s!>>+agw)%1y(;ZGXI-wf#*ekE(PP{&>g39N;cEXm2TrsiP+o;OBQe zEj$mjVriU6S~lW9;{~mk5+K0Vx3_W;^|_xrgvZ-k{&YWXzW)*IsF;I*_>porCUpju zsnzR+uDVea<4P#{o38cnvuBxN9ML_O$E$v`O0+c<>mfiGO2<>^NSaBwdHKAW9sK>u zSWK<`5E8s$AOaaJ7SCfCRq%72ce|N_122;GDdKrIJYNLvwr~mcPOB5n{@hV_=UU2t?0aZt_eS4`@B{S}hJ(x+wkdx^M;19(GH?P9KK z4WSz%6RP<_);Bf+k(D)4GF5KDb0fI4TBkt67xc&=>f!51dgA_MLm@a|xVo$x=@G}# z9S$}Mo|t0{GeYF~unp1PUYHT>W(#vWEh-?U#Z@vTbjewQHbxLt@}J(JI8) zX}iL$Q?`euN8F#xg6OM(ZJ^-02qZ<5=~aFR+q1=-CyQw*pr!ke(o7EMNtsBSSK zNE4LLe;>Avi}Q5Dk>j??JpZLO{QqkED-;^FX#?1npduJLXFw8;2#8~%{29hT#3?Bb zk)pN{m4XKmDSsL0C3Kx*I#*rv?jtscA7=WEvsq)DEa4m)-)(cu$ z&?K*;sC$gmrikjMiE*5f{a7H$T-q25s+fpj9Z7osz8_8hXHUke~JKJXvF^I`Ih%XEgBNQb20aTENeW- zI9~oe9IT-pnuD`fdMSWc$CCkk*-A_V%%VL!8F$ziC_)vRFFq%)Q0XfY~Sy~jY&sFw>CF(Aj97?8;!l_chBWSuax4K*FR0t+2R z1)DjUVT6X#?QG^gUty9uh|g}Lae~gjjsvu`90UV(>bj5+O-Fey%<|28zP>8TvOs9R z8;Zj%ItYJ1ECuf3-B1SZ|M2`2-8Wruh?z&s1Ea%On|Kwu7@Jfy3_V0x*$k(t4Z3Y2 z;iP%S$YsgaIzVNm!wVqlZ(3y+o>=w-;(J%(#6`2QE^ft6Z4_RwnkOC>H-u?foR-!T zG=OKJ5y}?`H5V%od}ohgegklY{Ec2+6vgvF9dp<9q>G3SXr#pgl)fKDaFSvy3!NDP zu_=iC>b8Z5XlltatcuR37yx#P)t1OC3aJ9Ca@elH^c1VoMi56F0PuN4j-Vl0qQcgq zfY;WAV=*Dkp~gNBx)t%X6&N`fj*UFV13oR3E4bgc z24E_^bLIFexu>Bk0&hsdGfmW08tkGlner_URx$ypQzwG3x9%A`l3L9tI80QXuDW1)q5kfj4v2wSmCM z)ca(SWm>A@2!%U~6hMftF98T6C_pnr?MFaim@H`Icu;qkD^Ecf8TOOmU8w7lHsNqI zrDzG);Knl9#Hc+&7J9fx?r3CEc-fRp>4QM76*$ zE|^(Bc}AWhki)iI*YUL2==oz~tBa9>A-jQ+g31R!)I=wk_v@+fsaq>hJI{t!?R-$WZswQK=#g?zX z{K?|1PB?&6NmsX!A4jPzELBR%9c;z9iAes~V~@p@8Pj1|hQw=xlOU}J2mvGkKI5GV z+T>}wzR&0;H$Thv$zes*^uaKts(?PYeLw7*R>rkeKmsGUxg3^0`yzDB!JIw!K`P~7 z#fmkkb&~w-Z``tusb;HIy&yQqnjx}r^dh}_LdQw|$PmSHsE7tlhzt}2@}^22CVk)a z`=#NmE~5YdAOJ~3K~%a%1d9}xNHFG2gH$0AeP6Z^QRz|0;`flj|^f< zV2c)VZGrBjL@_PZ#aI@fA3s{uKDts$iI|oX=f!(eD?ks3UR5QshqgW7keWz}B0U;E z`uh?2R2ZxYAb^TS=~`nSM#_|PjfU8D8Bu4s;e_xN5E4TJa~jtG(K#h61<*wIDe#5V zPAn{dDZNjNEV^zQm+1Pq07vq(0~z?!_0t^2^P7B>^+8$F_kSy|ITPcxR_fnMK?G9q zqZIx}Wt?Gt4#b;=p_j=d4NzLu{?uSh^#l}V5P(8SUepwyt8hgC@5%r^mI1sa19*k7>oR~3$^&@*oH)Ot z<;net_Rl%0U3Cu3b=i)Q4B%r{wrNLDGamJ|Q&4XA5SB}q{gv$l;lTfE`^RnXM4Q1N zbsA~(L>1 z4>p3(5{2lpp2e0c(1IxnflReXSLrOv=gG_T9FcM}33Kr{g-v0u5m+26lNK}Sq{fy| zu`r~%flHO%y3UjaQ79rWlq$(t8c)zuLPLjcX;Qa4g0JP+pdyqUOj~jPw1|^^ksP3e zM4iDC2g|f7h1gI`O1k(ug23Tt&NVXvp(G4RBjpH3#Kgq=3_P~77cwF)FImKsXq2k! z0|_P|uI2rn^5stq6bBLEDR%hYDS10WC`2GG7sWw<(yT_*1j*eq!+t(gD3@A*+DDRc zrBD;XeN;Md6$FC z3Hl10_1Q%j*O=sZ?N<-Jg{5zIpue#}sGQKvNt)38NEFbUglxqDHx25yeQgo5`06Qo_=m0&v6iN zP;4V2RGs1#uK=6WCt#sS!Ka-ugl=gV$2rXOAD> zjnj@h1Z!68#=ZAEj7L*5xN(~^>u|;=55%6M>o{(|>O7vTzI&ni<2*7GU>=%wf0e z0EaE!3&++9&Uv4w;f@EF;jUda2iird?QtprwIH!mTMQg&&{7r$P(@!U`UuHEFV4b_O;jiPu=tqy2zLtm`E}L9U?x%s!mN-9 zjgqX{uZq}cY%&rFE;?r9*wnekz+}`SLS$64f(7+oUSrc3$vCha;EeZ1VH-@P_)AJd zs0AFbTDqi|L>ct&+=&Z+dOIt;dA*x))>&ua;1f>d&p+_9OY!8BPhwRufr&Gw;rxp) zKy!5!8r)vo@{^z8mIoe!mu|*>$DM`K|NU@`38earMS*t?hPxXNUVAO>czP|i_v@&g zHW%Oe*0-=%^ESNt?6X)E&%z-G&ccXrJBsb?_~FA_aO$bYU_dfUyfL-!;O$B^XpfQZ3ijt}+lT6F_QY4L) z&=Wa+eiAYjq9{hXa_&{rzD%t9G9I*5CR|>EF99xF`a|$E$cjvoE3S}c#q=@6-!+*z zP{&mPe1+0km#KA?h%V&~6~G>q?N4p7J^&<1ggsONybSR5KydF%3jhN9Xxf(nJ;%|p zj-pKAP#duzUaSlWr86?uaVRb<>DSA{C{Z9oi8{Dt*DbGy6mR4LNS6(o4uvv~a!hTA z1}Hpq%|+SHNmZC`3RSdX?r{LeL#z2YQ>Z)$s-+Uk3T0n26zSjS=hp{Dp`jNQ`@ECk z(%;&M$4&)3Lm9!ikyloF5RL8np}Hf{nCr{&Ikbne{FgY;30jujksQ%Z2r;065% ztp>PyOfiV4E65iZf%J7-a!L(;ph#|soYH(#aOlEfLKxyW-LjzALQLi=1)aIQ{h{FO z#sN(#WU($fdXZAhL2w?&2~Q3j ziW?`ZZD`-Noq`uc+`qh_!23k0vVa4O3`Uhce?b2t7BIk^lwXB2B=R z{INdZ2_xaI@=VFQHdFd1-UNM0C?%+Vzhz51HoWx~&N%bq$Yy}s@4N@I_8!j9LL!;u zen$73IQgSSHDPzhct+$yi4NDdwBYNXJqb<+uxi!YT%R*-+C;q73-r?jXiGYTM8G+) z7Sc-4q){A4{jy-5pUc2wlpUOP8en!(@J<@np(|wch%1e<@h+0+z9toQV%agu$2Qup zP78rt4zVc$f;g0pjfSA4kRs8%d1G+zGaI>>a>k5FJeF?Qwhc!fc>r$g+QH{}#1XUb z(o0)#z}_Q)=#zN#!M9LRSBEct`WTF>1m0ZzHn-ozi4(AHn~P08xgZ*d{DR0NP(2DE z6MAnfQa)lUVIDx)$BOubV$y1H&!Adnni5W$itKaFEFhpEh- z$Q~*)Ck)D5zMoquv&RU5#8GyuQ3>@uD+7A#nZ?FF698Bad>aLFq-BtmcU976lhT4v(NBag*BFRf;ui?w&2 z&kM5OT=g4_7;yQnrcPZ@-<3k@x%9LOi-`1-}0E^YCBS{fL#mo_XdO9Cyyy=(noz^{;=O{Zqbw z){$bdWeNvY{qGRGzpG7VWi&%%PF1|`W-^1Evj4SxI5!$X0-3=>nb#4U*}aP@=?{cL zLjx}bJ){9&?!x+Ri&*J_B!z^bTJP^v#7f6e|EKSi2j*&j<)8m+MXYqLJNFYf>%6gdd2>->@_}ILHEEO8b(8k{Lp;N@2?EW&~j)WNjYYNXN$B zt?18@Zn1}!;+-)1HgJ(0p}tPS7m{ce>Gj5lf{>F*tY4jOK%e&Sd|ZdrMEnpG&xc{a z6ayN#jmSb@Zx*2?0^vXx#g`_Mh&>ZpnBe!bPKNtOA`ty0@3?%uPC?^qcm1`ph%qJl zKM+bbcysH2m?(NDREyUWrh%rP9Zj#_#}lxoF>RNf!5D833eoq z0SXvmB6Nnf;JQ;mViY2+3r;`boTirGlp)s)$l^(-RK713Dy}X#<9-;yHgwk4HjKf~ zrdB>+l&c^71Gmr!cyiMw_$VxS;sNMJ z0Y@D*1taTHSefa9L%hU77t-NwRK=a>3u}-ILJUhbU~6XqqmwV;i;GS|-%jA_Up$P> z#G_8+P+w2|#6*?f38%jgH9?o)g6q@a86gUV?Jz7CjeQvo=n8rx_rof88wYEtR@UE^dX8musi9q zxl%J4INgAdTIr*q8Cn81!hla#oc$mfJQBYAQzz8&+zfK8soWua)P^& z$FpojBe!33ZWsT3V_h@udh98rj5G`*ft1k+*YCm9Oh5OBb=EZT_&DpJg+7KA#C^!8 zTTvjT93u(MGGRm-XHMdp1_66Ug2p94e+{l~3w4&i*Q57W5O}J`p+JJv!~{a%!q0SJ z`mDY2wR69ThU9j1tbYm1Uwj>hA9^(Ok%!<*-?;=cW;b%(5sKUK_8kx5>K8Kj*|ksM z(8+?@mGKHl#5pQ%;!!2f<>*N`UJZs-jmN>?yB7QJH6GvSeHDw3J{n)X{0aQx7vIHj z<2l4{t^h_%#?GxFlRPaJ^BO=9Bbi->D9REC%0ha*oC;@x}P9nX{hX2 zhcAEjv-rUeZpZh&cLq}COq}@nLvi@2vvJhYr8w?e_oBB4i1JN1_NX&)+WD6t?If_E z=_Xup#d%o!g-@c|G0{q#MFI&8;Q;zxBdDR74^64vu=oQ+4Vhx+F+HXSh+lx?y~^)- zQZv4!lA?>Owyu>?(#nQwO}-x*z7S9$It-O=D5O|XMfmeV(MwQs#QTbJUgDNRxP~fZ z-%!<;3XxY7d_!j2V~h8#X@x<@i{$>;*_blrRy62%n&i}Lid$|JL>+95Qb8(iqm(TDH&<)%oR4hpfd*sb`Z4fCMs0rd(skj%Jk$T{E?S9EDORSS%zQ+Y$H9*O?ERkHkVi zWm$;RVcB-6C@+@p+qzxiJM(^|zB#4Y1p+4)kd&&{Lm@K=Rxgk#NZk^4=8-ZC6B!#n zrv4#NcEz`&eKSvz7l*_nH<{bcpN~Xp--`{wRgYr+Jf+EPiN@;sK!zkPtE(^ZNXx-= z^~g$&dOXAtG-iPyLreggFmz|fKndfQObk^3uPN(H@n72*=p!G6tprjU;y%(iRO2|9 zHESx%#G00i=DG&X;*--YVvqaQamO8pblPFvcdi5J?BoD))MWA>0Df`9Qla)jd=Z$O zv2(l#Bifp9)+zg8LM_-K_?qA6vFx>1aqLM8P~QlQb%5q(;NfS*xe*B2-w#}RdjTt! zEyI~#Iu6MYm|9Oh7QkIk0k=Q!Ec8?gix$nr>3hv(!{fVF0Js0?84MdX9LF3p8g}nI z%-d5#`)=U+U%!S885a%1hvVEuGeG8+ue}QV?5c;c;DiO3G{wTi02n?Tc=`q4(MR9H z@yG9rMhE!Tw~og3*Kfm$w|2o!Bv4^jutPnem5pOZW7DRXYXnH5m(~U3oH>1Z1s=QW zP5zA4Ft+3-8|Hd())$WgB|&d`bQLOETk(~}({SUBOEG=QWPI|I^=Ng;O*jKB%_p^roI%30h{G{FZv{;)<3`w@UQKC z-NGPd$=}(N11YGXz3UpZ4`i06;Dmw|8kEDbwBx%e5~a^fojSE-v8)2Jp+-*SDPPlsVR_O$4qYBQk#UC}DypSn0BeGlr_cX9W*( zAe6efW^AINvH>$^PUpP|kBgAiP7^@{C(w`xb=X=5B1-F9t$;%_?nodp8ivybn9YDQ z9I!{A#&A%T&oDnZK^pQb;l=)jNXA7Nx$WrQvU zh6rpIzEwm-P(f@7$5_39YTrbQv~M<`n2Ma8~Eo+VDa zmX8=`vDpM8BMbsHxk%v9-(n<2N1~+Z=*T((8%cigBtk{Juvse>;_LJciQxz}77F+s zhN#8glj`rf(#tYgr`{=jL%jYrbw>Y(qwkQ&1idJO;Bq0CKvc{q=9i>MCTh-tBu zLKG#jZF?RMJopUKS`A)bwH|ley#!IpK@Tc%=cB9f!V9ls!)qN#dp7JKM)im)L}_vZ z_0ZV|>~a&>ovar%BLpv56>w8&TyxY&)V;nHC;aS9+_44t!J-uQDz3ova3_wR20XM1 zxaLnWE;|TV5Wa>}FI$c^9`Mb1Nlffoj(zkloID4(?%@ose+2l#9N<8GJ-)a%aO^(7 zw}0DvwhqVA@YRLQ(0A;{ z+Rhwyq=8;TL!TKT@20um)|hz^n6|yY2JML!1ZDw&PBMszG>y+`0s~_k}mGxHgNuySs4dZ5vQAV>+%rq#lLeJ%p!kx(|o#TZjEd z7BHh4m{Sk@_L9fZzM%)F{o7XPZW_)B}h z>DYiht7GijxD(Toc^uFN95&Iw3~Lh>jdrnz{wAJ!%fj{u*sG!)M~?-bU7thsRbJ+{61 zJPw|>ABNBTDh@g62AsKg78^~+ z)PbWhYX4*K;&zWbP`N6VoN$>&>;x#*N9CR zkHrUe;-K-bVsrNvtgTF7#2ypTOY4m4$*^jtvA0JOy?ox4wRP}veW3D-=2RDcaKV3K z+{EK>>yx{2+wZ>1%M_0?tY(tu2yU0uE+nfuf&Q4QhC-g148aN4-+TL$JR(aZD!Gwp z09&DYqkP9oL`708fSsBH&g9XxL{^N@u;Iqi zg)EM^cs696B$r=GrK}{nBM(gHs7t_-UfiCcDw@^HJ|}AtJ!o*qMs zlt*?XvT3oHfc4OX;o5lmnSIgcj}mG=ba+EYq{U^%P@>jLNjw|u$rHT)Gq6I;3B{rn zvkE2^I{LRZ`V2W%(kdBc4y@(Dcloi(={bY~ku#-ImQmX~Ios)ycc?h2bgutM2fV-M zrg;BqQ#?#+SJJyzH38*|9OYcg1!HB48~Pg|0A#ME_NnfP$HjI-7DY;)MgCvyS1D1b zHZDJ=Lf6SC=8ZSrz$ZU>49-6LY@B@Z$?R0B5O{T8nNunkUMka|s8X!iEI+Hxzl7e) zKBH(;>ez~+ML*Sd=%;dZC5cg`WTm&t^w zx|)r6$U!%=YZsO--OT7SWdP~3E7t?hJ-3RH-QByvNbHVn+puO0Ktd@blS})5^2xUu zOdiXu+Ut4>C=bwL*$H-S--N*()WUfT#Idy6S zjy-k(#*GtB$&~$By9@m6lOu0mADF{WVpL{$}xj=@#Pp2`a*}E_Q5qUj)RREVC~vB`7?AsXsqsPZ%0i{5^b#} z_TGDMeCkt2vp|b@zUex<*kzcE_9*#5*PqRjQ!_Z@%C4<0aOa&X@Xc>tjccxX2HUm? zni5^-tXZ?Ld^wqD>CBz3u68(^NJuvc&rnvTt*wqT40KHm4F=}VpU;lSb#)qF3!TU6 z)dhA@rgNb#aPYwg$m%)+im;>R_63~lad++=6mXo zx|r0sk5e{YB`X;){D3l)svfD7Wi9l4Wa5&)%O-_5sI!nb0EsU^s^`61xBvHbQ}s3q zRflx*Eja?m=wj(gKmvG36qp`9)%jFV^=`gT_V$FPV~7K*`o0R@ z1{H4UItPF>(3DGIsUQz!fv0+36&=ydC#(LC0s^nDQEBIwFMudJQSMT!ip0tbepRqr zUUxu)pvr7OYHSmAEtyCoAk~eqjC;@WaUs;dQoyVUxuzna)sD%0E_!K30a~0zPAed1 zXvnUQvCrs(asP{d!qdxc#pah@!t?jsgF3qj^)(~V*g6&?$4x?wlZHt&t5l3(4N25A zkAQDipsLcwu(onV-08njzzp=Qsu9O*R8{gJ%oCQUBwRQRWVu{s?fD-JKo;314eBcl_M%RfErmf z43%LDFYKMr2QBZpz1_CLeex(?NuotRqhqcvCutCB!c8>!wcn4a*Ur-9wsepDD9 zsx!SXObSdiWObmQ>3Vfy5Ozrcp&N!4!mKc1<~CtejgJW*35|jblb>lL8@$8>s->=<^>tD(JIw}AFAOJ~3 zK~xXW)-W8E8LFwMK_RZM)0&AJc;R)i2;XKYRkKv*WNW3b8E$ zX4L@UmKSkAa{;50z_ab+@W@8s?2iEl=u1%9xg9l`Etp-M!)RkCy8KGy%_h`j*I*Wkq=j!eoYdIf0bKT@U*XVi-i_nGcOTYl>xY*HGQ~O= z7{S>u8d}Khn2^78t`AP{W>i@kNwH&Rt`)t(baWVX*d0`0$<}_-CSjuoywY2P9mOP;ZUWAl;^8y(op@?}8awo9*p>mlbLF-8o#<; zMt{b%;H7JD_ggxS|K?K|pI?nXUa&vrjH-dr1Ju#n+m~ax{<=g8hPwqLDupI}KAU7! zNuA^+6LoOy8j#F=G0a2L(g@tJBqusLkwk(EI9#5s>0T2etA`fX1-;kJkO;eiGzk%B zR9r%RMOg6Rz(xd{YM|l*G`}C+aW%3U@S98aM!4hGxc#~9*lLV}pQ=aI=myl`ALi$ zJ_8jdFuWy+WM(UF{qs|pHt%qtz6Q->N8+mQJcdNqSWFo{9aWl-CMX-gE1%YP2UBvG4pOPCI@auDtj`mM*lkPBhjAFcU7vQop_PHLUL+ zj;SLOjKIgtI~N&=@b6GWOuGId%8+Nh01X93Z_QX|XH+Zj-~=Hw5?F99LxuAq43|vK z6oMQvH`@p$aI8hlJvV{@G@pMbzBY+7Xh8|VR*17_fnTKl$geP9H(a0Op%pEhWe|OS zY0|)nvNH5{g{Z6ABLb|;U!f84E0Qm@v2u(i$M((TmW1D=f=2=_2zGYwz!iC8FsV2>JhE9Lc(~fMulJcqW#< zei$M>L@GU?{zrIy90ek?z@Lu>z0`TX?-4|)>OKsab4@GcaxM42wNda$D`eV;(^$Ik zWd*SBr0Y%_t(=LEM@6s-Sx1>tO*toAy-%Mbgh{!^{!^^t-ovKazr2_ga?wL=Lx>3> zQz}rmq*i!&ps&zm)wX2GPUs==5!J@ZF|J!O+Ol*DZocprXi*7$he!*Rqx+EelC@Fg zf`bcBU6<|Gr%sxR*|TRe0!}CpAwN$%`y3;rCm(k#CQcfQr=Pu#k(afb^Z3}uK8BU+ zUt@VVzitHcn&(WLfJgrP-)OF@;5vu(9R-|z`ssLM`OB=HSv}h6LPac6^{NfjQbM0J`*ylP)HhnXdl$qY0R2EcMLxN z`7zA3-@YB(-`#o}r|h*5-}uI7m|Nf4N+|Pk#3LI~r94PXQGY_mq345;{WH#(i^-EG zV@Guw4?M7%5#5Osn@d0j4GHx5o}LY;Ndlk!?EZM+*_{|Zypi88R5?Hs@Yw4+@Y-uT zaOVDPtmZLsk48McYz?+AYd1!c@P*_2SSaR>noXK3gcwd~E_&1^< z^NX%u)TM~=iO^O0ot_hfIlTV*Hu!rE$9KQ`Z47@+cw9aBbJLY+p1&4QnHZ{`^8^B4Ek0uYM$6yhZ7dh#*Mda661d&f#u7$q3!fGM%H_J zJYKl@{xDp0(bv$r3P_}Zd+vRLhqTH{llubAXM6A6f_i%gwr%rxY$O~gCDqe5Y{=r& zQ;&nW+sEuZEUbAn=8QlhaRA?c^46t$LD>?n&&fq%5d)!Alt;dF4FZ`{+UOt9{P7ML zADu5Dh9Qm94Go;hAc;oG)KLFD|NQeYdG1V9q!T#fF+;FMJKa$NAome~X0+7c!dv>tFvG z?NeG1M>aM*wVKbRwk8Ep5*4wWCwr275I2D`$(-ejfP#yj{vPuAF6rO@f4@Hqs0-uLJ3ZCC(-*Pyp=)r{5|8T~avSf)#^v{; za?Al(-wyoodq0I+v~lTI4#q84{SXhmxEtw~;do+Y2MW%1XuWyp{he61emN4!qj2{P z*J15*&mvvXhBsb%23wCFkLT7tf$x3uLF~2v{+K#(4etEoBY3s11yxlx4kkIxz-NJm z!Q!|7+Wt2i>HmkMo@7S+(x`fnOo?=#Uz%hb5XzX;JsdTs5|&fMrcEzlSG$Xf>H{!$ z)F>Q*QA`O~*R>0ytE;g8?CD6RJruGz6M~TF}!|!2wgIFON@LzX7M6JQn+m6|9y&HP67^FOZR)hnY@( zZhN8+FYh*CzYSD)z{^n^UU_&67N0m33rAR3u_TKhKDh;$bO3H#lYmDG8CEybmo8bF z#jfR$Cxct)3ptTv215ZZ9F>G5ySTPlco^~;u#~#Pq58jDM2Oo|LFZ?#D zAx$jJ;rPU7&%>`KuEor8)qs}7)ai%d%0Jd%#*7)Pk#ADWQCE*^Z@mrQIQM+KylfR_ zE;tO|`OXEXw0%TD9;csl0#n-%wPMtm7F_wWB8uK~*#EeXVeT8xWBoH5p(Slxe*IM# zJ#rZAl6#iUK^W@RHZ(X95NBhfRFA+3P=wllxJ+?ocW&rR$U#eWi+`WM&{8r={k* zAsyQbY+z=Vgx`~)P@hrRX9dQq^NLD~BFQsHQGTFOc1vLl6~{@Dp|Lg2IwpI>@%pPO zQ79HrVX;0V?66YqPRLXj4RPIxP#7)+A3%&(PVFuSFj@7^TZA{;AIC|HX7RI3Ndi_A zBM%c+ty2xJoUEm>mB@)fyXH4H#1uGv>5HE)X+jT{R{Z%WuKCrvnnVp03>z#@%uy1R4e>h0nCQKQ|$!sD&YBiL;*pwyry zoF#;-U&zWW`Hr3F?(T-)`U6I^^r&5EMMEsy-n#u^eC_LBLCyY?uxk4TOqg;CF2DS8 z%&p(WNX{>R^-DbU((~v`OvnBA{~3Sy+)0eqpY!O$qStPGh!OIKpYnJS`0St0$2sSm zgGbiXIP9>)@SUsf!Y7V75@&z)JB-pU{q0wA?4m_j+uwpId(Ff0*VeEe z@uJ2m+;r1Txa6saxKDrK!1;o5HRAxRdTlihK7KCJt&O<$muv9oqxZn+cmhWseKbz{ z-tTexsh>oqdl&Luy-1>hk)~l|+xR*^3YzQhWus?~)Q!q(6W&#O=z`|;hu`0YV~#ln zwi%+bstSL&^KKq9C~Lwh7erSu40I45o_M(-aP6-i$1}V88CXbUv#=~3haG+>^L3wi zZWU(E-UDqTo3LW#^Dr{q+~=P$Kh3)AMqwlD>~1s_yZJP>51YZ>K$c;%!qBkZEqwkv zMos3whke@_A^w~?cisxCshqEpJzXWHqF9i|1pCR+TZ=*IrQm`$kmTTfzFsx z+M@!x{W?ZK)dWg(cOdU zxXAzSq#``uN5ZUyX(o`B7)Ev125yh6GeH19VJCt@JBIac7xf0sb5P9ZdF-l8I>;Ax zBF?+0^kcri9X0hR=6zJhwve^eJ@|zT#$>keem4!9FTjz`x4E4Q)vW@!=-a_yN-;fx zomt5cC*cF%YP_9Mad1fB3b|QpQr<9TY8pSE zp$I5k^6Q|$D9UkrduHXJP&CX7K?|%}!)5A>#Ml{KmQ$dCz!gz;Zl?DW&Q_w(JPTTog$EJanCUFW-KkQq1 zKvW)x)BT`8oPt`Fc_{zP(1PId_hVTQL<_RszD{n>wzg(2IIXQ~W$KZUt3gyK0=@%1 zvS9NA6$}gn0TFH^#Qp1$id^&-UxDs4AP5ZvmX3lR!Aw%%?;=r|MBAJrF?Rn1PX5fN zF=LpI?w8)ik1oF)^>Zd;^z^CNnQde~Z$7L;)2MpXcC5y0J2v4v-@g@;Ce6h`W7i^# zGl;_~1BgQ0hzV0BpnBps95HJaPFgSwci(+C#*ChXToy>wjKIYgUx62v zT#GN<@GUI7=y$xJOnV!Ff9PRg6WE%(>hcnwdgx^DqIe`2qBF8lj%T)=UO{ zwMk_1}iv zK)%)z6DL9GJ0BxY1*w&7(5f`n zYwn?7((gqwkwPI(z^fjMtra7o>jo>N_`ZucDSQWZJGEjAkrPnlHE^+JV2I-OplKv> zo(m()!wh4jt$M^Yb=c-)#iSS7&}>Usqf_9Wu7;ir5t8M)VWO*f4)50^>+=dArwjXg zOA`{QUNMAOU5{R;U-Siv=xiOnkwB4*nPNdz$v2J`0klZ~N^FIb1HRHvCfs`Ps zs+pPEP3>1PiU_xG*)%qW6_InYhd#SU7(lVJZZ)>njAyhlE*99eIcyvSk9h5*Izu%= zwG)viWSy#U$xYcJtSyIJcM+N&!g6F!CzT3KXPI5Gy|(~F?Zqesi~?#N9N5Ru44vr4 zh;@+(u#x5a7VFYif=!+zSIrcnwQN8oGp|L|GFRD_2%-@MXsXh&@bE){IKj@{^qizC zhVlQIRl~PVYK3??-ft{@ERt+Y7a}ABKEy~%!4nlY7LByf*fx9wVF8XrwzWvsxtTeb zx(ST}BMDp*J;pUENNnvWjIjIj_did*(6?1n$x}P=#a)ktQ`9Lf{P_ znoT3wOhoZ?Xxd@&yc6<%NhDqV3}k?8${QT$qUOwye~gMx@p2W1k1Ql`N(E98ECd7fHH{Z3rJFVDh)@TMzshJ{(`r=iqo zS4uKQQvrJ)u?8D+CS1&hsr8e_3qbcXD${kB?Q3d77Caxs7RRL`bXph_J?@0hzs!`d zge+Lr&5+IJV!@sl3UhIJA5&Qloois;_W-_J!jU-BDi~Dn|1Fe_{!Yj{(LKtkAn%0K zl`EOhF^Dr?9<-Ko=7)Z-Jh-Rdi8uODq0sy_RGr#YWf+DoYRd1+P#!%YMWoh1TFZ^a zTK-Hb<#1&`w8S7~8TlXn!6_j{;G}|D$w4F@{q^|; z&hBpJa1we+FE*J9M6Cw>P76ljM_079;oIN-3erZ1nnH}{ZvF4lwNd{fRFgQMUp?eb&?l)SxJ!^aH{3WHkdSAom0pl#tvZV;Kjl zL^mWfS*bzM`6&gYFk;mhXz7wF0-uvFmAmA7aV*AOD!n4)nw($D6~?$Klh4&e5CUVkwBCeUTBHxVd8A zQQ$$7K+peW?>fMwDzff*sng^<%#d>q0s>+H6-CSu)0)$|Yghy78WvPkRLpTvWX+0T z&H)SvVgdyTA|N?VVrIJg^$Y)ZZ&h`_8PRorcX4qozWIik>3;oQy?Rx*&OP@WrfjNy z4+-@v%D-zwzoOrHqS%ap9tz&m_e3|+{l}ZMPzVW#{?dpusQQzADoDGXu1P9Vg+g#i zRzeR!*DUGAs!2L$O5T270&=?OQ>jj&={_7g3Cs6+j^*ruQl;3zS-PgO%c7oyf91Mq zUOo?TCi^;KtSjXdO;A6AYpvr-6C_OTy9bOr%Lv0)II73w>g*9mIFzo&oyS<^H%ZD~@O zL;`L9!`a&HHqS%*o;^`%L_xLIp|o}Je^Cp@REELe>4Bs6<)77eKa*S=Nk{GM zMXb&HO8rdVDZr)RndHmVbz?gwK0!1d(p-cnMpVR^?-!&e&&n1Cs%vZ5S(IEveY1u& z#wmU0`wlOtw1~4oQdozbsArC<8I7Q^aT~JD6ii2h>1s$dcqj;kk;utKJUa)q>$bqJ z&xMs}L`ZW{+P4!zZA;K=k5S0YEkN(iT@g!GBbi&x3$f$mW7kf5p+nva*tc&5LOFxc zv*#hGGg2_4779u8Ce;8toQ-5C3;8gSMMhFq5@yW9YA1?wue$@6opnA&O}+;;g)MRZ z`RC)PL)u{4YqM~`!53lT#EH0f;`uoH?6Yy-bCdajyyEX9|Vs-FWufj1W zT#66Bx0rKz?d}5*Yg~tzVa6Ng2LpiDG-hX6yJ$*F|Zx)v3&Jf;>Ic_R30Y)BxlFc0f%w(@yw-ns>a#iiKLP{$i<;_9a23FH)n z`8>)C%6Oxjm!HMd7ea1`>Oq+^+JLUAsYO|7C8}0$Vk*}*SEQ)33$vNpR$P{cwHr5} zv~^dWPb*?sNF*BIX|+6eY^m~4QdWY^Th^kayaa1Dr;t~i2gh3nH)$g`T*l|0RUYGP zXxqGEK5kB~*yvL}gU-j<)X3+vxM35DTNI;iE07hAz|#|aJq0CssM@>*B_+AydP?$< zYD}=sKLxl|wKYtcT2obpqQWxN*EaCxI+2JYY+8s~I-h@WemOR6szQsR3O-J5K?I3p zJu49rMQH2RI9imqz{ag>c)h9Gx()e-`Dm=$CgfiuG0yB3=Vzm?iWEzte4L`9GQ=BG zNSIVtQGl&g^(bjkf~qYW8GPEhZ5v{-9M1mGW+0X$`nS9wf`*zp6c-hUeksV2j@2Ib zZ;h>?$_b&!BDZK7z%qm38-l+03tJj_S6bjw*~XPWyAY;PA=~E{o0`p0e8R|+&s|EG z*YOTgkgzqH-(|)>#j&u)I`52F>skDb6+m9x>{LRke@qc4 z*qQ^~&>{Z$zg)&oPVv5+w{&?vnsNkXWZsp?0<8-cyR3Q&iEU1`k<=D5$bhB|7S&Zy z5rZ#^U(+VrzP#_0wbTU%o`T7UYo--j#Q6zeGwhJ2s}DQu@mYoB`*m`EWuQI^&8G~W z*a!<}Q4P|LCETFDToU8 z7hONmglO@jKp?16v%Py0q$g3I(qc^9d4ZUVxpdvS4XAHy;NNB2)8X6IsBBe1`Ep^9 z#05a~aBDpC#A`RfZCJ+(_}qqlQC8dyPNRTf%&^c;H)`Yj+10rf(&@DtQNv+M4x!xN z$4yvP1i5(yyufBxZx%>oZh=rsh;QV;C8hV`&&kVQ%tzmVKm8xfINf);Js@YrtN@BeE7{Qs8&?8(3UGzD&%Zs(6J50kQ!!A~zvI@lWK}BIH7b)97ST|wBL@vL9s=-VRNlkDk zv&;|@2?vg5@|x(%lz$$D9(D?mP*`xqvqYepE!`g*ARKrTaT}3v6iHhkY20rG9#eLY(h#R#I(0_QyjnxX=4#MC7d`1 z^eMhSTxu!$F>LbvAf761P@`&V5f?wo9r7hpCVOxSQrYH)>%K zXTjlDaM;Vj?K1G!!~CN{!VNDFM-U@Mju%U6y>kW!CTuTb4yehzm`3+jL~3wYVTA69 zq>2z~PWu`>*C`ofrZ^C_Sk_pFZpvCV-52tPoS6et-}tzO6l|akj1z!1wWi-~ zh|LCt?>sKGe-FTyi6#G8057O*s;JcX!TnP|%h*O0-ztiXd_7TfINtLdnQaiXLm`pr zAj=EEcRXm8E|@~9+B7L5OxqNJemEtvE@Ujl2`&?|pjLgJEE-TJEWbIL$gnAt*>!c! zie_{#CB0N~zs0jd$h62rY6Q?o$wmIz7r`riBWjhQ2iOFveu7w(s%V#tm2~V_3e9#} zx`M!$|4VO}L< z*hj&>=E~`9+c-nPRs5`ZZZW~L=`M5=?8u%$6+h_sPO~hRbp@LF$EX)=1m8J_fnSh^@%e=7$ zTBvm&xj9A1%hgcrkv(=CNw*x4FfHIoL^KbHNEliqj6&Vy1vyz9<hXdff;Gfx-JSL60ME&jTc;In}htLAfH*1*{y4Uv?O za3~9P&T1G2Em{T#PD{U?!9~(X9(58-%S6l)D+?)NLr%QWn91Bu8m|ty0$VyvQf&x_ z5jV+lJ}Qb1Egeo+8r?{4Xf!5@u%f19sgUn(C<@&bf)tML!Uzd@JuX({qDa6Di2$8Yhy4v1xm6}4bWNHCU-L!WU_fpHXl@bjPiRrTZ&49C zz>J9E$YL!dgWQxXmb4_5CnaD-TA_7;n~IMV^HPosRKkWZ?@DuAO(|1r5OqV(1TJB* zV5U41A=)3w6T_A(j=(Al|f*(llh{#Q0SOnv7lyu>m7)FbA-nEC$r0Kl*I^ ztd=g4Y+9^nq*X6Odf#IgV?*fC8wTIE6b~D*MmT;WOs+EtivgQ(VMS>^Pcd!A@Wgq> zdH9h#s<>}1)kM%nT5g=IG-JvT9D33Q*Tj=2c3hI<=8M8h-h^xN{Ark2js)f`5%kf| zmR!T+hJf|VWjz-8n`-R*oyzR6_|b5A>`=hRSpdh9;HL+RT~NhP{N+t%0Azm~ezTB_ zojJ|4zqTd=aYNoOS7rzeIo@1dYr+-x%@iEZ;f;x=nMeqhTN;2ibU6VTNq9_e%3^nK zW-C$fPDr{T1AJG9CNnFBG{~b2I!kIwCYdX*9Sj4JNL^k+Gd7w-ctgr4hNYA>hEEnCRbe z3x7c~mG!PG@4KloPmnVs0zW%~M#aOJi?aUn0lY%KDYzjjOAz(`xkgDuyCL*ly*Ic4 zPyu@oVOK~7X}UHqT2&lq6*Q?pNfo*(be_(Yb%}oiEm(l6`2X}p#iq1DQ9rAGK{H9s zVBaZ&EXq!Z%nJQoOaEP%KN)b7E*cx^kxjnV4)I3yG{2pZIn72qSr0p9b3v@q*oI7v zu^VJ8j06?9InEDURMmZTJv;3)kd_Pe9C(J7-iXj^bwfC(GKJPqPLe4OD44#Y2~X^G zzrWEqbseF^QrWsSl57)hiWIr4D~1gtx15o+x^nlw6~0&uzGzHd0<^q1!Qp@7egro z?#I%^s{TT0;z|CxTG0&o{HMpHDL#V`ImZ(`bdO_tS+f!d05yK(ohCeEO>ubTg#N;gm!huB^!Ij$GhPs}n-4IN|GP3Hal)Hd}o4-Cy z=?~TmLDUrJat!$Dn$)e4G!g{+>T{rLkp!x`m+IoU4>E4ze5))SJEAEk zV?KY+Pj{G0cKn8x9$rK{6Z{rUP&UE_3&Bt^u4TyUbVbI4?SN8AUUSnr^Ri>r=cUan z;mPqK#bHz}02j?hGGjpjc!sK9(0PoBK9!0&Tze(okVgFjjr&>lyCH%?HEtn6DqV6< zXngCs{)?CiJF0Q9u6#I@Vl;=>6c2crhd|W0hzymbZl|8nQ`giyqw3-$(Syf-I&-4N zzAvdxnK?*o1Vp`w=XkJ;%>7W$83p7@ZklT#bU86QO$pzs1cU1!JXcVLINfG8neqZ9 zIDEUwV`fLW=b2q;zX9z@^O-zZokt|FoE%3c|P zg)wdNAzScVSpIF@I^H@t!F1m4YMB8l2Tn-t14{1^v2$ctBIOGH7T;6_tBSpKyG z*NY>b3?b#3(BcD-a5`eiN}JQ`DN22l>z+gkND|Gn30KL3L+SE7;sKK@qX^DzQ)3mI zsFPqwFJVPQ0KKhRjHhr6DVq}b4j03vvP4mvWoJRxJtTAwDLan1DblxDae;(U^}6lY zNa=DDC=pt%(S}A3x8@>jS*W8_I0bV~HV5oc3oug&=*dQyDHl#yq>w4)m~u2Yme1Fg z8_(g1Bo(Da%0(6;B47_!!*(5bb_kXg15))OHT)ZJ`~5W=N$r`EszF}{1n+_=6rAEF znnwzrl|m8@svV$2i(%1P;N5p?IS?8(A_t|#z^wPHkQFKfO&4#^i=xB8)3NExr}6qr zt8vJY$8umn3m${Ib`1v&+rkA*kBG>HB55XhY-f42;gpCTkyL_#yb31xQIj%q%r*Ad zjZiF%A%T4AnoQXX**jOMNSKyHzQq*YU^eoC8S|rQWeskYpsr|gV{E2#voR>q9$sT3 zNlw#iB+o|wHCFQlHRzQb2vIz55nAddnYUb}TTJQ5BP5y&cB$qd3w2>J9ptO)A<6{@ zOk(rv$i+I%EtV7*pXe*JX?7%vZ;5%AxzL(KXthiMA%oJg|2S-xnFLb?T%IZnV}vdg z&^s4MD^(@1nTpfEKPRkgK?zZ5d?&=KBgLgD4rFBiNeW5I&q~WUQUIZuzSuM{Wk(it z@{P5jGZ%;~A;WM?k#`_Ra^WpqP|lKCm^GubxmxF2oS9WHgfT{WtNH88!k*e z2|cB#6b*cSNvdVhC{M9P+)qD?>tCv*jAXW9Bji)SrwIipqBl|9h`~=2!un=exLm~R zPD&NH>!gt6!g9p@qcN4)ZT>r&+5k(cj4C4Fj1}Dv@toTbL9nGM1v5*&SFEdglaP+W z@kSX?XLFrAB-KwhHD2pT1*cGyz?20V8`MPeyl5&o;qBWC5U-qGeitm&I(NQK8wFK%EVTTD0{w(lvW^vZ=JzDBO2$k z+2-bn`NN0{IZ!7IlK=>k|Rk-}+Gzsu`)}}T#s?U`Q2K5j1siFw|m@!tc&sAU2cX}`1SKm-G z92cRPu`nOIf>vlPE=Z7MARz;IM=orHT9Vbh=4A2WwvEg}+z{+WiLhsbH+_`QqoP

          7Yk|;Id%+z{AU}v z9Kh40M*(|&EQFL#cE#CZ^F!B~vJo*In7+oZ;V~4p5GM)0km&2|L>6Cv9fUfGnUv~C zrp-KEHeX=wr{K=gId8Atp!tUC_xAs9zJ%3iyb=gd-{4~0xHtIc#&|ux{iYMHyka13 zy6GmgD({4|&ps2^Uw=I=yW&C|Jaj0#?|$>mV)X3MRid+iw`B_^OqhUIzpLkQf7`e# z(Yj3wiA1JvWQL0>5o9f0|C4@^__I{YF*Kx+`t&m>dA>hDtr0-CAOd|6;Oc3BommGG zEl+=@ABYzu7%6}*U(^|zz{Vv@F@F4be3xp2F=NJH_krE`^&h?YCOd78`qOxva>~)j zb5nR`$`rgm^JCQ2xNtgjWrxgZuRjSpp1`^1oSjzTQEU(ermN2nj{D#>F{43~nG3)9 zYcoHq{tP}hYO`eODtjo=aNB0b<=uwuhn6iX`JBG^-~%kGjpK;Jj}&}g$dz$B=Li|F zKk>vH>}k@qa|r_gcB+vB?M$j92=B`ScybZ;1TmK~bLU?%2H$c>FN8e zIA9?oB*%rII%E*%?VQ+uqBXA-BMITED%?Kt9`?&v9k0P3|M*87eegkiPR~62Fh2O; z11xTAMAt5TaMcx8AzTpV>;3z^_u`GWK7nTBV((F-amE>ki)YEDjfp1Fco$DjnuHJD zpM~0*B%HoIS%IuYmWM_2=cB42f&oJYas9`pEt@d&e$4-VB$qY(;o{yq?!ZegyotYDIu;{G4v_>G zk=`2KsGI_65WZPNkQ zTzxf4@^W~5+&X?drq5l)?z|(0^x)@l){OVK|Mxs&9L_oC1b#N`>S~;O$rxyn7%sYI zEZVdzMbb{-$tR!0?f1UH_x;er#ks!!-n*DIX%bdewZLhoorYsa_Yom~TBXXx%$YN> zwZ0GsA3Pin+;Ioqe*0}CvRdNC8*jv_C10VUv<$nD#{kt7c|I&t`>zwK`B&Qx8G$NL zC$v`uia|%JpK26zHL=B(L1i#_4?SbgXf`W67-ony8;aY(wZuW z4^n05egw7jn@Wadka#ph;ORJ|oWb{i))m8N)Po91E6XD&D>i|gWk}V(4!7=UI5kt@ zZGIj8#@AqMd=u8XH(;!L8rr6(kg9qFh`a+UuMm;K0u;5(Mp0!h3Uc#NQcwb|I2+;e zT*UHCw5Z5Ov^Wc~!Ys5XEJkU5E^^EB5GjnIyr>d6(R}0<#ZXw1kCr+4D39i&B)1S{ z#bt<;#*kB0#J<2)0gz zlR5_juFokT)^K;ZSd5m|2!9d6W^ln)n7>?RM_OELWu|n55=of0BU0gnv(alAjupXR z%-50ak@KPtTgxEp3~zB%N=9l)em#|=xVrRi(H!QTE}y#)4_D^uh7TWkjO8!?@$e+f_Y7G5`=V2;N@S%R zv@B_h(!!Q-NmdpX9MjV#Cs#)5FGfW*R>UAR3zJZ6&w}p=It3}K>)Tdi+U6GL=0nDy#2xMRvp zY_w%U!;}`0bS|7(Oh^YrD%@QU-Q9@C?|lfX7krzB!oo(3?;#o1HEMNu@PU``$;T^U z``K`i&Bj+G!I5wzYF@t%cVBQS8XH}7?$Q(MYgb}TRXvu!G!t*%{xCM{ji@tR9&-fx zQ_;0UeC~z@eD?Sgxb@MOu=(E*znfep=cS8DJoa9-(%0qa246Y*J`zR2{vKPFzK`1< zegU~H`(Su^DQ-XO3_SMH5-it4xci|;u&%leUApw)c{XN#15;mtdnUe!e?0Oby0!0$ z)+PCP?v=-}rC#v(bxmwO9l~L&7UPvk*JGCLBf8g6MCZ)KWrGG{OLYoswJUavtuO_9_dVz{P~~Y-m_0e zbwe1{UKmeLc@y8xUx9(`8}RK%58%X$@5Uwo^Pc?xvmSXJ#l6Z<*tq}~oqY`^-}4F@ z5kWOVa416&_M{Kdzr(7(84ZUrA6~{8J?(EnpR1=Bb>?iHZ}FGmOZk1Zr&D5FnwS@8 z+)jVuQM~c?TjKNd(_Q*jbH;w-z^F{}^hwWT7PC;noY!hmoqr zJ2PIz9aCPzE_)w~$F98+3txE$h(~baxQXaeo`pr9zm2Oexsx|G&)o6`7QMd;!%H>% z{et7MsdgpieY+6jZ+jlYhMj|%w@ktZ6QAYG*-aC!MIx$U&DPDh_`LHt`!?^X`FQ_< z4{+Rw_Lwm4c+8!<1&yf~CO!KY);Ct8Q;!yi<$H+5v!RiZi{1bSwOG2i0e9Uo4ISGU zShi?39(w5oXeDjYwQFBQBKgQ~T#F}ezZwewd~bqXxlJ#bQQG;nzC_-F=WJV3wKHz| z`O}!j<%r^PkE@0Fi>gTIYll&2DEK2M!+!nx{Yx^E>;kx9Lz?Q*yjbnEO|!jfnv+ZaBzKi*k$SM=UFOrh3~x@CR@%YFAfG1mqSM30%^;mx zfC#7*3}lD?z&I<|=f9)x|AwZD4rL={n7#JukH7q-KW@2Y9#U>2uD^Z^dh`I(=GwO^ z=W#$87DKwxuzCr(1kRJW-;BO}kHA$|U5tFKmdD3;n+lkMNkA#ff(Mpmbsr5? z<)sI>ysG(1y!uBra!okbKhl0eJ2)sg$P5AXu}rVgcy50A<(Dz)FK2MZ^T;EQMA7jl zL2vN!r?bvt$=O-6X0f#H`0*EF*KVEg$&A-==%`&-kK{+K*P;-ISUySD+p#tm_M(ZtPf74ATD(FlKgs+Jqvue z{9Hohr%jv2;sCp79f1I4GbD5Njmwwg(@#Ie*yrCzrw$#_5C^iNz~q@T8QC82=i?Bu zBAEgR6)d_g--q{;Q5<*NA;5o_;n`%Iauv17YEk|B_s7_=SEDpsg}ReY!aMK0gWY%U z&1>{^*IkD;{rm8{B3Ol)GvC1rFT8+z?zsp326kqL;O}h*v6!qeliYSDK83@a(V{HQ z(0)BodGe_^^q`R#J9aF_-*X2dkvUkoas$vp$EsDU(6Lu9mNZ7M*6guCYkkk2<#_y# z34AUSr#y;C7|7dlJdQv9cubgZ3&xGRl%Hurghw1d01IZ#!v2@f0PQE}xj*KZV{rQ4 z{>E;;kF|N5&-;+m_CsDQBn#sG9hU+5r7dOSrI%j9p@$xYv(NY=CR{g#?^XAK$4MT$ zyt|}iwRto5A!Q=lw{MNBF24xxz4snwefkNo~U;1ktu)2f`tok z~-vJn0V!toaJzAgQcp+kG}+O_8EY;-g*nWeo>AUD^}p9hbOZc z)s>fDg;}#c$CtBaVc&iC#fjG(g;;4Je||~HXr^A%c|~(O3n|J*S@*zMHWMFy_#ww5 zeR}uB>umYB(9^i^tYhWi-uXeZ|2P7#f@!+pbQAtn z1fE_)22eB^s^bOG;O)^56upKDU+KL;jq@PY20s$KQ=@bJEguW_JA{of?@(LN0 z3Y00Wol9I%w#`Px7u`>q&he%vJMh z6QE0nY9m;XNXV%XOaC5*BB<$1q%{dmg@p*$`0Il6W(0$(-%er8j%>OYg6>9zY%`&_ zOx2K5D8ylvNV7)cz|&xFtASyp@aM~b%dhE+>u%_Y(@p@2T;QH@XJhOohoWms;Em^x z!I>v=bsiU(lH(&OATIj?SU69|pDsI3DDL@rfS!j|Evk?gtwCbxavZzcp4hc@E{;BY zD85~1qt4eb7BV=(oW zyKwA?Vc2zWPfVJz6lt@^hc=Efa*^_!uZopz;)MM2D4QT z_B-o#ET|{2ZWZF+zK>%^j6lZ@190+R@4+U7@%Akf@W44|;hYl=M`fqhxar9k@MTRL zcaFIPi|5WkpF_^an~M`D$t{IWmZpgme8)$HRf|OZQuG*kEY@qlkP$7B@K#~P>b0y$ z)9~Fk#5`eqUatX9PMCzrm)!`XZX@ph^O-o}%xiJvIpgu=J5OW$MW^DyyYEI}No)M| zhCA`WmrHTL-n(L8@Amk|D<5LvhBz+0^#ROXT?ND!L^HLq0|L#zxXmdF>xXe88sYz26e~Ox4uV}Z^E)y;i12tfr{cbxMJ+1 z*pSG9pVtv+T!t(Ed<5Ec>5O6fkHGr1tMTwX_hIhGvvJ{{&%@O>-$ve)cz61%=-0j* zy0+OJFF!jQv2H!!lviN-NK!`T`R!JP~hwu@2;O{^gT%Fz$qN0A~?ie&Z5>MJQ5OZ?@ zFAvF7HflE4i+QwUD=xU;KzzQ@!$n-E&k ze#x!C*3G2sRKVAL&gdeHXuAv_e6fOK#uPcD5~!pboOS-?O(5{;bwf`pZAz6yU9LL< zDNnyHEwhz^D1p~Fb3$^qs^FH^xQ)x^pjEzu@<9h$1xFol zGQRt!3U&-|BQ67hPVENF{&EpU9(F83)+iT!u1{F-x z&i0EhzGzY?`g0IQCFw|LF*Q~yX{M~w{PR>mPRKpIH%K8tAgEP*cLX*9iiShysy=IH zZ^6D6NTTRFlGvn71Eez;x3rF|maaY*N(x@O|43hd{`~pdx!HmLD+gZbbSPv%+@}Ax zg{F3JLj|d5pnm1q3EX<~&Fse7x^;Uz{`m9aIvSI#ZUeRXLQ~2Qy`M4#eBQE9Rk>se zC(7T%t^K|Ilg4A$&rrt<>CyiA=fG80-M|#P>C@-n_~UOtn>OP0mt1lS9(m*my!z@A zK6nOn5XJF?IA?`Jnc?n=LO$EKnGZ||(u^51*v)bS)C#RMN)74?m1PefprRtc>Rl@SUTJO5+ELcRM(iHamefRNazx(dH+#lqj!Oqi>2rjtb0`60~wma{< zlkeNEyY7m={N*pW@WKl*`?JsZICL+sx#k*171ym^jc1;D21}MKLBD>3@!pJ?*nRii zamXQuVAyVZ@i`Y|1H<>>6fm?359#&x?OZrlu(0w6O zDe_yPF-gZKB$7UFZE5@)vBq73&J$4`0 zpRke`(@8U@M6cz0Et6zwZE|;lMTF+Pbhb&VyHOp`@ZrNbEAqlK&v5o_|NZypdq;DU zkcIZSFX(qPUX+-Jk_1<>+mLeso3h2@X-cSSY7Gu%xajpHMNP+4PR{f_A)VQ2j)7Eb zqxTmSSa|Tk2l4smpP^T;UhHUIw@noP(|x7+lj4|m?b`Cq=|6lp&li-bTC`{prcRx~ zFQqw>giUH{b_(&JpVf8<0#A)@78RGMrUK}H*68Nbgh^>N$O1|PQj*)_YSVzApDEo- z?+pg$%932^qN7RBC(R)ohf_ws6$Kgu`djrM{hm~IC>Y_GnjFxi(uMdt86AX#u{3L{ zyZq(CMt)HUeFyYqeyA^%Uo%ubk5kNW6C@S}_>F+pDAYByI9xpe*GR%P>tP$)xIk57 zZR5>C^VcU;hA<4*=YsryJn#{|m|Kr!E0$x<=WnBBOB1zqYjOJ77vbZN7jjiT8K;CA z9fWK$hzNmoKcd9h^)KtNRSPl0l6I^V!#gRd)Ni;VD zW)&+hn5=XWMq^4tf*>kAjQZ8Us`+Kuwnf91tuZXEDZ%X3z_2r3hSuRi9DV8uxc2H< zcbIpF_LyiJDhdymFTf+ z51euIp%~H0g12l1K3%M#W546kYQSFTJ7fTkIHWDMu6z~AMjJi4_P`#eos05{zPPAU zD^z?w3rN`bV&!t&{L=Hd?2el;=c5_08*5SJm1Ecur=ZKgjyQC`UC`BP2Yi=A%QkzU zxJ3^P>|mjUlq-^}aKnT@;p?P_W3IZK4WSB>1{$|H{MaOnMtGzx@0o~2ig48(H(=Jh zPw@1Vn^8{mI4=bw6lL8&H$NW-?t2hQ^MGiBk6qh$#K`kcMRCWr7*^RG`?l$gPTgAL z;KTPpv73)@4KTdWL&2&q@b=tVbUENcwAWT*{l_!#?fk_UHexggPJZ|wQ*hZCr(o@@ zxzM5^){(Y~yJ6&hry|?<7LoODVaB43xb&{aaofFjV9AoNk+iB|6{HZ&2?=_SMrtM= z{0N!5QIOgm=bUjR2KFC-Ge?ZVklxu?zhn&-uIq~34xET?y;|b9qk5xP+kE7p2G~}P zSDyL+*Pnh8R=oEnHbyGYklzwz(Q*KuKw-c1ZP5ee#!|#qy^D7je}~H-n1r$SUx&Hh ze~t#dH6q#V@#N&OxZ|2r@W*ktU{RHee(n0AT~P_T6mLW!w&J6YH{;?fr{MK_?m$7+ zCcx~Df);zBM_w-aQBvATA!O*#a>JbcaEvnBohc0+)sVUDP&iLz`~h@#W|9aY*knte^b?Gcaq45N+dk-?=PS*yFI#g?ZI@Xc->d1 zvlnvhK!WCarwsKQ3}l7dfTYB~i|63Hn{L5#lO~{k*+*E_z&a_gjRYD|16#92h9ceq zjmb)MXi>t|DH=hc&KD7f|Pa>gZqrrsZwCxRiv3eV}(h;e)hB)nB9-9<h6nY=+$`&qMnEt)efLE&D#LhaQ^3$MmIYh*Mpi-Xw3^7Uv8U%~^zqvV$-w5}9TizEj2W zDuX0UEi%;Ih zpaGp3Ii^0Kzh!(I1jnCHMnYNX`MG}FI1C;~|4jF9>Jv{e!u{_2`MCDlYq{@} z5;`X2mM(^lLw)(`t1n~zXCLC#SEuv1N+moVQ-mV-?Aeo%V7fPiKvF%=inS|*qR+Hx zc>ek4`5Y-7K<6g}As89spEYS%L;XN~O!xA(TW@33pE3axCQN4cSH;@%o5&LVc;gZh zS!Bvz687CGNY>rxs=rk+_$|P5l z?E2;S5Ra0fC0FC#* zxzW9#XP&ZPbpABP$is!k5zTp_q9QC^x|suUdM%Cjty`0v!Tb2*k8#jJ2k{(6&%Nz~ zx#omq(|9F>o9@@rB}+J)PuU)d@hGmK=a0DZ0|yS|`$@;5@ken3^)ZckIu@b!)z#IQ zGiMHtI_fB%^XN4+Zb(Ij?mOA>Xj18pvITT+l%zP9`6^EsIj?KNH;SJJ%0|%~Mdw4G zL)R>g&yjL=eul*kGjgIYDliF3IQ|?bR(d`0*y)A^1MucSU-O`l8cmW)T}8bnSg_gL z$u;;Ing|qHy)!qpkSgVwVAg>Kb~uvFK|wIkVVz|+^PLPkf|c3~B8+SL7c_e}mlJxRy(|*vT#FlRsoWJhC`fMm3sH%Q)q*e)!_O zM{wAQ$Fi)|(4Kwp(F-%Maoq|$JM~Evb!dS)vqcE{m|?~eU)=6+;9yV03VSR4SwOWcT8{fm-4?NA( zh&i(sW8=CcmaIsjCfSHXk2(yk1|E%?8!pGocYcSbr?12x{xAkvr7>)-{svyslL(;D zS*~&FQSEF7LM|HXtDw2Hyx3GBhP81GrY{h~`gk3-HP*7iwdJL-Eg8qwZE^J3y%X-d z@ol`;xC<`4Wl!|Xsm7_No{9nIJctGpC@3w*qL*LAlTSZ``(Az?`y6=~?J-cNZNX+^ zGZ5~E!H1lHyB|9he?9s{wBKtV4yaE*d3W?4c>r#?@JwVcx&&{pT8SlgCGI)r?#n;13N!s6kEDBK+eY zuVKRUkI->If2NODWPgc=?jMZ-3Q~6Lk~dDLr>$tabz!@=|jF5!J4f$ z<}azi_=$&L!($g<#wU-%n|u-np}EB#?znF(mab{Q*UOi}iEct^rx0$t{S9<`tQ#&p zsV4@H9D&ELACGnWkH9m}Jq^cO3ElQC-pl>KYqZj<=*V7o92!asJo`F?sSJ#A+7diCZqhOI?Q|r=k=G zA9WB8yYX(kfArqC{EtI0?7%~@U{x)gk}$N2FdQSvYD^lk1;5)^jxF`;@bb0SVZ*)$ z;=}p#ptm1{yRSPAI%)E{)fm`1iiaNl43}Rq5lC)EaVQ_(8#(wss|4i3orQXgIei3E zpsv0gXwjw@W_&aUPTPKX^rGERX4Ik1--=DN(GKNe(C`Cr(J_C-!F%tD&h2bm|HM5= z-qsqXo{Jgpet@edOhUVu6ee&b5t*`n{|)*UGHK!%!YRv?%KjnF7tpyDVV@x*@#2#g z!CSL8=6*a6*NvNqu@BC`TBjH0jO&g|&*+UluP;TLu3fQr(L;D+!bx~KyAL+kw8hnj z?1#GKR6I0!EMCi6g2$g<#2e;gdfNE9;Tw#Za3j9?dJS5X_QR0f2IJsYp1{XTtsimjjlAt=03ORaT%n0?_RYnLB@cXB>F&p<^kS8#ti9 zpa;u8XiduN@&D!<1Uc$dEl$C>Di-~@I`D*shh=s8_LNeZ8x^Vd(axE;a=ZfzY$k#Q zt3mXg&=VE#)47sU>CUb~ql$i;tM$f>Jj3VxrNc!(hC=f%`pLx;HdURQPLJ#)&PG z7r~(;Mqt|evl(UST2YD9&pHe9=Y4})Z@V1_9XTQVCB3o z@R!NcFmkU>nET|zm@wfk9DDZZh!s`fvFB%E=$;3mWB%{OqyG(!o<*gtuiDS5k)aYV z-Ne@m7c&2qHj<&Rfdz|}u$oG{)~)z;zD^n!Hdd_omQmJ*hGL=P-6;=Uy0pPwd+dUF z^EP13x)r>6A3kCzx_6HvtO4IHUV{AmJQSCe0!9jzZQEl1eMjK&C!fJrUoApIqk|*= za5_qgLm0JJf6Sdd8*hL31%~Xt55|o7qwpiB_RyneN3`it4o~x7$4fC_K!4=r*zmS( zLt&R)(Wg%*eDc)O%+;N<>>ET&OK{Egw;~b)I(8^WyW(Oz@%*dUSQE$ii4UTp+(d4p zK(xE=vpX!!f?M5yo?W`3UGJ9IckjKiaN$bK`1ms{ud74fz5_6@tQ0LO3emY&XXuuN z#)e#`HnwWzAV*7K%A6JKJlip5F*3by>2iF(b`9EfY>$y6_CrZQlodhFID0HkIb~m1 z*ak0|M5kT%M{!XW8v^l+*g6^nOfevDCv z9fd?1$60D0n)R0@U_>l`|kT;=+IFZI&=sI zbuGY#RjcsUti>3z&ptTf_~X&KA|Hb*^BGm#5-Z03dyl|DgNHB&|APhJF_M4MVM95S z`0{ISP*>rcD{e%$_J!!%!obG0%Q0hxi6f8P2i;3zoM|kr?0`S~;ScE9wV3lG zfdPHn3Kd616QxXn;Yo#_Us>ov87k{S21!rTpwxNU=r?d6maklasV}^Q>u$Uiojdiw zS6_aO6Gk74etj#UISy7Pv(U3kTO7IHo|rauDppqcTsu=%=%IVB-tb%xH{Ns`uK3&C zIPk!pOpO`by*sYD{~q+}IRIB*buGdXV2|Af;9II$nf)!-ee~*7fbtgQsHkX(E3UX2 zC!TRB&N$;h#JpPUyT=~*`_yOAnACCmZTBHN8`!09XVh)pj9Vv9W3Kz~q5aWNQ;SJ= z-HXpY{Q`qV9f2`p&SRe!7TEM`L}FQ3yE)0v*C8VZW5t4nc=(}*xCZB(@%LfG@LtG` zZ^4VC4AplO2KH{l!N0}hZs%P836!N6RlD!+5Bv1Pxo4l54&a*xdul-ZvJ0g&9~D^b zx#yn$vOFFYJ5dm>(zPleMZl;C+o94Bg@(R{3>osHPNS+de=nI)3>`Z3H-W-8*MV0W z`c$Z!70u>=MKc8b#UUjah88?oyd>VEtG^~@_87+Rq>ZMq(Gmq+wRN>z6iV+e$}iwj4NB)`mlU!w z*T$;FTmag-Wgk2{bvnBA?uwpWx=TdTL6mAW2+>p_rs)`U)o93Y((jymjW9Cq}PIPT<8d<@Hx26L8>+A|%IwojNkQ+GmM3O-R0 zw1||w^6Y zF#>ZXLfC?ss9*GH4-tUwy`Zui;uGF(+0j4iuWUV<)rwTQ7502-+ z)I(xp=81J8t_vsXunP1g_+u~=U*iH#UPru82Il8+WwVAq1;MKqEyfiW-N3G^cGSd% zL>yP#b|?DxXopfqW?{+Kfn|UVu8*>5{h~~+Ez-tGU0g@l6W5WV?5>dssx^5bv`wH# zC!)EEk0I5_gesY9Y4ScOr%T~<9PAg?UeM%qdI;J9|B6lA4_nS_dQ;Wh^w89a@6Fe1 zigVWEQt4Rd5fkExOh-yLq(iZIy=_|3Lm|n|;kqy8GDlZ^Ec(mzPy#~rh%o6g z#fY>$lgDhxaWfnjO*ol@S^Q?EujzitZZ++MpyX*5A70_9jwU2tS*6DV8o!&vMeSYB zx*bOyJO~wZ&6bBGe}ad9JU9u{roF&(zV8`4SL6Q;OaJ$lR>h9~H%sw+KYGN{o- zMLk#l%LzTB|Er}{2$YSlIv#O^DHTouJfUjT*VN~HjJVDB+;ioUMVS+-TVUH`{y_N2 zq}1CsP`_~_vhxcvE|i*vWJ3eK+q{-Jlck==Tt~}V%Um`(HjN9axFNNL{QTay@4icL z}`>03s6oag1{Ve~Ph@!j%ov31jC zWasB_QMZ*F=0$qx$^zzXF3jD;yv+W)4PeeTV}+WTW`-#_Xtf|HDq4C@2`HQ}Kw`*@ zmKiYbQrhscR*1Os#Lu(>DPG5QL|`J(({$|#{ogb*W7!v$t;%IlImf1>H+mRoBd`0? zW5Ep^E2Eq42al&NlI9J=;(kbLuR>(Z)UVixG+^znoMDxEhoO$yZ0Qt1rjzES8!|AW z;GO=j!fx7h7|Mas^Q6y0P&zLY&?0@=n&dZgb|gMx40@o z#A!UJV8##nRHzS?pD#8?9^WH16mhKZMr#1CAzGjhS)w-s z1k#*L9BDi0A{jBzR@a!@pKj8Xm|cch@yJZ~v$}XKus*S8gACr&_uu!@_nBpa)n5xmoV@YNa@1T1~A8tQVGyJ{ToBt9LP`Zi4j@2;QrqG-}IE%RF0KRRb#0Lzfi zi=TO}5PXW&c&2`21VhPTDo5nNIi%m>!PC8_uF`U1O^?rX%oec1;QASICzi2_1H@Xl z#^3(-H_Y_PL|u}ho(nPWQ+AeAz&JM1&GdY*vsV5x=+CmdCA$nBwKnrt_``sMnqeWA3#8p8A@wP<3xbq|M*pA*kWWVNTM}-BvZi$IL zy=FVmb%A;qJlY#z5Q^^r#d&!s?zJl)!z+^$qyx05EEf|)DgpS}@ZzLXO6a>-el;rp zCj^jQZ}~{rap;jKKk(Jzg~-<0Lr1Z&gx9Hp-9l>70vx*cUZ^c?fi2ZG#@}=c_Uc@M zuZz~<%#*s|i0f{`E+<@u+fU_v001BWNkl>+OeE9Y2=-wh9ZMzRdSqGA8y9Heef3n+tZ~x^j?Mx?YCNfi+t{ju(PhvyI z3keBS>tX&|hqj&2v0W#4nm|w;8PIlX-5Hg+rC77N4*ffKL1j^?;0^1(ECAGb@;5zE zFiK9VyioZ9L3On#KS!1fWHsqJn&hY|jIbk-cQXl_QN#lHAp_UldTq!(Uo4c&&aOE{}WouRyy7x=Te7dY1tiB2I3()XC3LNHY@`HN8=fSmBvLbz~l&3 zDKxu=EB`LsL8Ix&LFX@9UVlj5Ki^REwGbfCy{z>4*^ICXWieCg6WCUg7j+#mM#rza z{W=aTv$RG&pGG0ZjF>XolAoW@H3=dn#hL*rsb{7un`P7?fg(?AVth?(ZA=mI5+jR` zZ;-}11?e;{35`@c7FlD&z7;gyG)Y;cvC_c8&~^#CY=L z*2wVH&a-L8T|Cziwu^>n&KJ^FTzwRTlvRH_f~#i$N>w%qM#<$GMQL-R;g zMoCMGni!4eKnc2%qp+MP4A180#*$8C8Yw!_pX_`-At#`PPxqP>?R=Ff@?3@0)|do$>jL zB}1W|e&%%wT28-T{j4?fM%YeM^Z-X@yt;Sq%1D#*&)@p*Yet6h!=4EN=gp>%t#~F? zcCLxLDi^A|tVByFsMp+S_P?MBRJiGU#4?Ez^`?IB+_{xN`m{Ksx4yRh>(JBpP9Wo+ zC#W61FEc)}#)naKBZKs50pz*~1w+YasOAOcRO(mF%mlS*#PUB6AyU7j+!QP$+%%Ju zz6Jtj43-yW)S3sc11%uI%*RN%2$@FuTA5;FgatB>OveNZLz#-f3Q2$^my&b_CjI#$ zn0MIJMvg|3rnGILZsTUoH;Afp!o|&~@+iuW%J@LuUxnbOox3^6^f`mJQ#85pRAVNc z0aDW1GO?7toWPQ;3;2z%-iOux-=<>+2D8wx+*#Q2Y&wI89#!@A9}ibK4;*G>{xuk_Vy! zoPYKGB!NUJ5TZ;d^N?V09YmECRfc{?sZc6Np+NPADbEa#UcC=8TR^WRemLpK@9gcz ztorGCsc*8aY?PF=%uI5ITHAc_@HuK1ACV8D;IN5@Q5QG`=`Wi;Kd_v-r){zwgKNvg zFjoLct5zh$!bUtvs~#E}8K94)ilF&X!6{~Ccw0Q2g_Y>BcO^ROnTMM1S6ORxC~E~R z5#h~3(Jn2~87%?7kb{t6Vfo)}3KQ1E zc9W1}E#R0r#^fZ6Z`Qp^%2yfDhSQ`z%NgqhGy zLQl;!P%3>MG!agRm0FZU;$3CJL&x`}ZocNg(WIIeA*_Z7Lp{%dM+==seBm%t4h;Fc z+tTYHWXsKqDY&UF^PM%=bPS@2I7wD_&|RIg0xD)xpC>NeVK%!sFKIF(39y>0H@U8~ z)OPcny{?YsrH>jo44?^QEv1W$3Xc+U9ChWfLK^#9Fo#}pReU!EgShBK{|yn?VOEI0u)`fV0bLr8bG3q?o=Xb4Ysh}`>qYQxMv!uR=qAa7n(3UM$AO?BxL31XB&XbHJeQt9J$)Gkm0(^SalzCJW1bHWJiXw!- z=7p}eUAuP34d+5_Y&i%ql?1!TX~iZpyxcJdIhPsWU9wFzxuup_l4NZyJU=dq)O6Yn z3%4~_6SOKlkq}vsm>VF;{y4fMDZWqzEHIium9)V#jV7ifjuSu_B>7!&9)EBD8%>iG zn&savXP#}!kX{m=kB}8bqboMMIS_7w^A{{+&EO-BJxa_MokBbq1JpZnwbu~RFK{r+4a-) zQ=(sgz?oLH3etao%mB5t#F?7cji4N!sM(<4FT;W0^YT7%`jy z6>~&Ab54LLMvx>D1u-Ft1W|Gl1O-WwBri+Yyt6wq-Ch6BdsQ_vyQg>fyVDc@S9dMD zvppRuysG-X@B2PV1VU0{M5EDxt-qu{AFtA)&)KqN3nw<w3yiVsNg zCLkj-Lwc{20)GXS}Jj(Cr>GV?oX=?VI@F2UIhuBxq`X36wpT;N{)c1KtrnWKtV~ z{49PhQyKlV%=FK?HckI1_DjRg7 zt&lvAM=fB8q!f|kol#$}LI8tmagq=VJTc>|q4lWpvn}d?8GAi9x88 zY>JeD!b%;-GUdDb9r-3Y}7_$vK_YkOfIC=248izh^01q9)C=l)JL{Ld7KQ7w6kFq z6X8vf9xC;^?4j~Vj}+TsinOsv{VR#r_I|ZMcbFq@MAd?PwC=F1D1qOHh}s~Z-0QpF zefgr32vH-FuDYhJXde5&8U%D6QCTXf^jY!L7riKr=XL80Z}b`I`D#@e#PRVfF8mn@ zsIaL2D=gmQi$>t%)o3VKE;Ue|2rg96il&$Ges zUG3$HnnHxSuTiS5R+E3VRZ^*_X1_-D^d;ijhz6ixDjstj@+0N?Y>9$JLNG`TNAq0C zeWsHBo#Yb#|0^e0h|?-r4jPdGj^vhN$&w|gB7Er8t0xjtNUnAr0!gW8+O#oi?2?S^ zhVQqt^w#UPIgotP{i~9E#ABng6(CexI}B&WW;YQ{tHEmV;HKfEJ*$}0R)<- zj<`7@%2`)26Y=_sLaVosm)D6%#2#@nAC6r7nWk=k6-m{C8!p<)Nw4#ctnL>vLH744*4$ZIX4%mq`aF~vOt0dhXS zif7aLc;qlJ6xd!a%!8WEQpQCM)ac)J8&ohIHVYBNJTV?69^ln3c2~z8D=AZgZH1XgRHQVCIFb5;Q3bA1 z9WbiH5!E4#>M&3h0+}$3%7Bpx+pP-2s0qVOgdvF9V=KNTQLGH54NVBTi3oA+T{##- z!ca;V(o~R2u|=o|Er=Xa!SG3gOx!@jjZQ?Kh$-LE^WR%k{IC3D`M)M|vV(H!u6L<{^et!TPf7*z|WG`yhtI2(Y(Co4j7dC0QCnn+cyLRG-pVIL4_Xd90Qw3ey zdvM?Vv+?bweAI5-5(Dr00W}((iSDNwSi5>T($W%9BeSv`7pGEI4nA&Uh}$0b@pQZ|~6aHXCzR z??SWoXJGk^nfQL~N;E&UFv7%vJSXPh2~_KoEeiyxTGiT6~xUp;gZTlB*Kff2~% zA+{}FirHI_qDGUt5w%1^th~V~!89~Fa%ZceLC`R(9 zow)E%^B4*X4`IYBlQD7J6pWod9SP~_sF_s@VIzWhW5;3g=usH=@d7MbzX@5VoCYh= zLPFVL%pUy)UU+3FX3klPqv6VE(yA^JwPXnQZ4(}QAHIHnEM9qc6vlr1A=YopMzgk^ zP}P@>pVlwKilaXGt5-$3bsR+{hcRXTPpFnv52@B6pzJ6nezO-&LS@uT+yflli3gt^ zjJGGw#M+%XXn9H}SYCtmhStxVh%v*S!$&iwt2=osd~S8OfyMZ>rci+mJ~IVf@$Ukg)O`8mx5hN{HJvln{jtE1VC6ityg}ckuAg zr(o9YiHy4GU^rCBs9`~4iums$0yB67uReG$#?9V|hD|%8W-5KZ0E@nyg*)!O7vYqS zsN1v_QrujW9@>RV?!E)xZ`p-b?aqdo6o9YfD5ed49`}s+47D1!MWgBl=a~6^^+H^G z)y2pQH(()(B;zQoq9eHDp+T6la3vZv?}?-|9|FN6SoGd#T>bnABxcq^R-@XiSe5(Z zO5A*tF~$%-?nZ^_n!q!f9jh$i26tv}RXiHm-(M z^JbwmScKH-wb|p~fuZ7-PVPibf5_A8g*q+bD=w7(RnZG>O0rTh5L5qKF|kuT-<<(n15v>ydNdH$(^1@tM)fs#~4}0~FiRIj+6- zRJ{AnJD~1MiQ>pBm6QaOl$7AmA)rCM2B==Wy7XYFK6*Gi8v_RnD7VQc&3N)2x$zzE z1Sa>W@=`?vU;HrsKA2kZWaFDsc(BAQ5CS%ivpWwvBK~QjX)Vw+lUV7pQ zmMfkp3 zdTwU|@MwGv8uTb4wp6GYH*Or(tXad)NFKI_9va5i`26$FF=fi<+?VOy?!NnOjGM4B zI+0PJvi7|E5%vFX7a_1{=1f*;t68%q9(m*uY~C*CX&ns8uVzVjeEh4ga=jisdKCBF zcORqbo7b$t+i$XG_mSLPP+V3M%Ic8b$Twk=U+twzGAR% z{QG(oJZQRsSbz@6r&*FbSBaEbQ`3-Kxtrv-Fd}42H5n?7jCyt4ZE(!(0DAFE$%z*D z?@BLQ?r1R!#Hnj&g=?jE4A$|LhQ)6>tQt||k=)T_p)y&jokCb8d+{4; zBVZ~vJ)>xZlIhtwB)dJ`#Ppy@@%ht~H4Yh$l9p4cmMMIl60Il-sE*2qldER7WJH7? zMXK)75th7PKF<^5ADeOlE>SwvNs8kM#lbD{CUCtZIub>r%#BQC65bdUfp;;bN}?<2 zm;KQHpB2(aA&-sa_+dGT5PEW@%zcKJ1D~vjln8X3AoB8#;+#Hb;r0g;F!Js9ST*Iv zr+VYm4#2A~uSOuTHXP9du2=`lb2<#s02U#>p#4HSWXxTkgJlgH$`Ld+`)W~>gUmnCaS*)mE?%knSg}Sfb2U7K#-AOKWkQ3BAsNW z|D-T_U!Ww8Q^M-H)K@5J&MA{_!0fFn`)4 zG#NAqq^r^P$_H`b03T2m#=|${KAN5=xj6T!3V65LM0Q zNTIL#OXZ{(N#J@b49NCMHS$#gnE-^9hy+wcrl&ScH-~RjDr!g$E{?O*$Ml&WBBMra z)IFuC{Jxtf>)puUMSSkgJy^18EuNjV6%A`8AhYlQOz$zgwQw$WY&(utH{S$G5?#YR z!rv?K*W&7|Ty_-Ozy27roTfPK+AEQzRB?o<097ToVOa&L-sx=;Sq6})M8eN#yUP|j z0;1xpYXt2M!+?48Qt5#_*$61W99Xn)#;cwyMvNKZL}yKlGwpM13(t-JJs zuVx24_2P?Y)wT{`mH^InY+1Mj&&}G3SH~?uuXc4gHfc}Z0b~Zs05_mG``{P_Z^VOI ziIp+%l~2*RLmgB*xDglk?u|QM`Ub;>J%B22eG6yvUZ9pAg?oNL)8^-5&38v}QTwLY zy=)7**Q<;3S~kJ>F>k|6Zii_T#-mbd60GcXxUqkKJU65 zw|WJx8?*vW5l~Rt5*JKQNow_6sF!p);yml>~7&RH& zcI?N{4XDJQzPO7=c0e+>Y#BKjOtHb1>-E z%Te1k%d@}!VH*9l-C0~LK>XK*j(#`G#hO^Z_IdRB|K29z57~kc;!9`_B@Uv-a-0*A zXW&8$PTE&^h&|5# z$_W;oWD`pHN~6m6-rEI(2Hk|e|NRbJcU?>V?1dMe$9?zRikdZnPd^=j{{0*C_b3*I z`?>)3ZrQ@Jwog9!h)P~AZAjfZwHb9RK6D8E`}9Ghrj2mLRaYYWa4v5iMhqT|DI-VX zmVpCtde^R4y?i;wjT(hIb(-Vy{x@O&;r+ZZd-d_h@!5Nmao)M-qeqXk@%5tBQbEaa z@YXA@phcrbXw#xSX3ko`_dc|BD^Ikqz4#(3SFVQJ?*2RSN+hu?Hzx;|^}P@+vRdMi zM_%B*N=wkj001BWNkl_4=hk*aUM{{iQncRqgH z{xhmp$pHL*piFMmsSe1~)}u!co_fwW;|#VRJ9qBnaZgB^5lsps@ZN}V82Rd3JXT(K z;tAYx%e}birn|6o@nXF2)Ki!;W(?|8tAO+476+55RIF5#hNucB^n=9#*p=@Rne$^UU}&yOc^&0mtW8iJx@Oyi2o!*k7r}Vs1f+~+iy9w`;b@0@T9$P?p(Gx zb?S7(?AaSoBP)yRl(IDzBHcI;Tpm^A}eT{Q^Di-5VGe1g;4w@0Vbdt?5> z)hO7w5fdhSjIXCp$AAG3;K<>_c;?9`v1ZMB?(0kEEy82>J+(pXUN=P@&la%AdZ-G76)EAF{wFClq&NCA+_C6`>na^APz`2ZF#Tg!dng{Pm!=O2E^8K+yd zYK3amylgak_wJ49)2H*;=+dPNw+DSjYpQkY)^Usw^^FER2e!e;ks}%PW~p%3#RV5! zfW?a!vp4hXv(M&wC$B&CG3xiHopu_JA&OO`cAPwUGPgsgPMvrS(zkD4Zuf25wxN6X z?)>~6J9Xl7=>EEt78GFZ+O@dy$}17c&E@B%48MkYU!rc4{U#5<#*G`b2ol7};6eEp z<#%7eYs8lZ3=O^$$)Z}ZkZ~aQPet0yFD=UB)o2Jsr_Q9$*ME1E(WdXk^WpVD6LHg~ zP0OcsK1oX~5GN)V=SC?ik~=Cis?IBRY0z1QiN8{&j(or<;M|0U8{({#bc9KFo3c#W zejt*f^p>UOGOI5eM-g)NRpNo-q4op_-o<4Glg z&^tE=OFkWgH$M9r&y87&^E2^NbCt^Xvyg9-wwc1HAOaFx1Pe%NQeT?30Jy zmx4Q=7=rW9JQWE-Yts`p<^f@WC9aCR=MAfaVkDpxNit*n|L5pCSlz|L2l1?3voxxA zO{fwdRG$Wuk5L-2nchIyC29lP%U&W2`yj*)Tz}tqH0yF3mQQ~j?Wz>xru&`; zIs8iwhcV=-r*Ub&({RQ0z0h~SV>oWq!q!h;gV-_$gNLs|iAcoeEr&7e^&uGi=ry>e zM`H|o@ePDafthbl$D$9u#^|wQFnr9L7%}`+Y}&9L$j`yY?~X=xH9tOC`z^kow+YMN zT?nHv7th{t6S|$z8c)4599xY_`10ovjDrRy4|@|g4mcN&47(do51)+^Pd(f?@BuVw z*bZ;JG#u@lG(duz4LFA|Cz1?Y6MZQ@JD!3gFN02XC&j8VZ!qH5sVb!=4&rO z)23~4&K1|;5Db*;%fX(NtANrR>|Zq>J5Uw33>%61WkJjs{5pOpEySeN%P?`;Gz@<7 zIgEbdF5Gu%PmCHi4Td)Z2XbtD@zru5{5|$;n1)Zj*o)(3z|z$};HLvW0#&@Y^PyX? zVDeyij_t&hF;fsO^I`7lgYYCY!Q_|vW5evX@Z7s!;_;E6;>kzu$LtTM;dpi)>`K*m zOtVi;c;UAa5ER8MD6?&45F>_7z=IE6ip#EOiNP;C%R(@pkN65pr>(;5$?u^<+q&3x zU>}Z%FyKkTeYf9-Ig_485{~1sp(}9F^{=2~v!1xS|802b#%?&g;uE|w3+cp8Sk zd@~j<9gFXCEW9;$1H|HyxVcqj%-VAVsb}>?ziwCKoYrUH)xr0nMhb9Vw{CcM*f8AE z`)do@bpx$*(!~lww9aq=QZ`tU?Gp9JxfU(+DF49-ViCRdA$cjl)sR39tfb*tKOT zI-lAD&AL8{Ue}DlW7l><4SO4mlI^(T>Z?$#ZXeup{|rFXKt^gaRH@vE&DD>~-$k#} zQqivGwfOOXK#<~-d=$fEQc_~TNJJz=TzHxF7rqEQsTRDxVuZprPR$A-@5nOj$Zm*z zr5$kFnGtlZv=+xoO0X@-i;OcXVW0mPP`Nuil}=|HVF0~ALccg=yjrVWyB3W6B9Jqs zeo6tJx%(P4Z*Vm}pO=qMKYA2N9!f%51goqRhL8LKF5t~YVoeLV1!X*|_(TAf>*Xw_ z#-CsfZz;7W%CkU+<*GwS^w(38i*z%BAZ@zHV-?9lT0%?Q*ggy2z56=GPhX4m`_s^` zS9>_QJK*su(pyRyj`|B=6q)drdXbct&VArmY9$=^B_dLkjdYq6{Q;CF29RfmQEZpO z_Ld@$ZUJ6D3OznV!Y1;Ii(sTg`1`r37V?rz7)52s@FXDQao~6jpoIR&v2pNrIQbg8H|qXS_PxA-TNj-HkH zR44l)zM_|ccB0FdFK6y9CCBo3Wpp_$x1#}Ddf{)xeg9X;?1s{bj&g*5p-_ENJJ8OW zHb%5dFED&4vw_mQe59u)!t!}gkedtBn}p=#1Qg`w!wnWADRPhz18Rp39clw^7=`)y z$jLd(*R9d8IZ{&+`SHp^AspGai_x1pb(^4SW+qBSgi%7L)Ij~p)loTBZeUusZjJWs ztD!^2UAXqzYq4j~F*I*n1%-u0*t=^tZ#YRO-$?W`@|Y1x;GKM+W*X|$sUfooIu2U4 zY>6&ivQQ`C21a}+E+8SZ3V#0SCq||cYBoY+jQeSi9yM{@buS{T`nlXb8o4LiLWo@?;v(SF z2&UvrQNTQ*Sj5+?*Ypqu3>bioV>jXWaf$3v=HT=C^+U&k;}}1ECr&^8bX08=#Kjk1 zj440;%$FhXVBo-kXy3g%0~hNLeUAP6^Elv~;#JP*)eDa4!Fj9KWB2aesGbx?n>HB};GnM--#?vD#lC$R32WyQ7&Cf1jvXuGdy!4( z(4jd~H>eCBJQz7nbw->KT*>bqR$OfD)g*i3_xqXSdPdJ)93VytiF6+EW9g-6?9x4J zX9C3~C1~EfHos$y^lFUwwWwJSjoY_JwQAKc{fl=PY0b*YLSbPpe*SJhqy4+Kc=7%B zdE90X+}R%pmf*`Tzr?iZ3$Sxn4tidE86(F;wY=z}i(pns;$-L~c%W&%Hr=zt9WAxZvQ6Plm zMn{jIgdcb1pntmykeCPtoLGLeQYA(#SFc`;&|3lp#e3mRNyM#`b0Ec!x28}_)#DUIGzX9^Ci0o7Jh?PJQ&Ljdu|yt( zr=NTpDILzj>!U~V_;vzLbWK6O2mA>#iCH+zYltXsKq(2G3>0e4c|q@{yeE3?)BDOR z***{_p5k4Qx-|~uL(~;aZ9&(dx)gEBfAREUsvkY3sPH1%DF1zW1})7>g=_|WMtzX% zF`XAr^QF#4*P~~mdy!{HuR!$r&W*c2l!6_7hptV1%T&*+*%j13$UacFNK7v;rgXBF zKjiVLvZ-Qe(ezs>G*rmQ(_%V4V6~z=q;B~5fLRJYBezLBQcur9f774EBk=kh>M&$T zsUw{1MSB|bJ5pz-fkQ4RT96WJ(=uoQtT^LpYe}jRv@ka#iLmS>5UJE8VkxP(5b$j~ zFdb4qh;X(+OY5T%;OV$3;fTW=@#MrBxTkkhEFJeGrp;P{0^5f);~=&yo``cVyC2yl zKA<=kLvFqvFOD9AV*su^_i7Bf@e%aBU;rjgnvFec=Hc-NAAwVP7~3|jz(Wt-hI{Y0 z3%5S8N}At^Z^slIMyltq$}0UwGE?ZS|u_h8WdSD;V-NAVqn1{ChW^%r%)@gtkD za`|j@IPF?o{efr~_Q#X3<#-X!zxWnB_3-PsvCkFgcgmUgV)-GEqxZn~ z-(q0@o_OTS)9}Z4>k6}yxN#8yH?c%a-v&ESp=`dMsg=NWQwo*zwk{LHPX1d=Pm# z5f=Q!yvcq>)T&3kNTh(6#0W|&xhV05Ic@&s z_1B@s{xP_Fb}E8rjK*!P4X1C#^+ zGsVxrkfEX?bnA8@zW8D$R5%x@yQqKuyXwpjCtl(c*qWh zfP|uBNb%>91}+XcrKsPn7v7)y1(vMeh($|Qqj8dh%62}Gl8Mfj{0*HNcE;*2S0c%O z2+4tLR5h}Zlk+_;dv-3K`fxWEe)a(xX1ajC0D0acAZk9x0(cAIcnXkVn*2UF!h?N5 zKXR-r3>p48K7Xz+hFnn}e;+jwI}BjmuH)<(wGZau=$5U_Y0ufc2{}cSgvyj+?Us+x zTg#0gLdlFwncT}qqS_?QXGc)#&xAk2gAayug|qW@%-T?bJw{`gqB$Bi>WF5IfNE8W zfdmV+Pi=$mm(E3y!WMj0QKeA_qus+jPW-Y9TKs6#?zoB zd_K)>rKy-Qb0xf0Qd#nUkDCdrZd;t!w-&CytONe^K zgo+W41X072fRclU5%$!Ek<|>JWaxU@_d16s%jl5B+-g0&@1^(8i6NX(jv1ZD{GK zg>G5R@#C`jfCwWm`yjG^Jcet}xe~`VZ$jR-t$>q=Z zB<7~!>fWbe+sfInf`ur}&B5kXJ8|8)*TB2uFmk{C4lt83XWmlOZ|FtgLpu3>^y(xJYYOo{nQIooO=y*dhx7h~6kWo+ZO&)bWpDeVxbV&KT}EyxYq zNU8=#=WRp8WMa!9?TGulLivaDbuoVtq5t*I|1;%xN8mNOO=u+T_y~d5*-}qbMv|hG zIcsQYY8+oNhPKBe@bTL2wDTtp6(bjMXmosr)rtr_?+8`WDMC?Bb}e|VvZL#XR3Zp{ zqsVdEdDBvxP>XHpFAhvGI(65^q@2!_MFlcwkG*RLNgyLk*gpEL=t%-f7HV_t?8IF3$Tx-c(t^@<-c zX5RP6%Lg`p`~lv3?>*++)vi{XVUmMK4&vd5AI7!U4nR`%W*ou3Vc9b7OOwC(h69{e zd^M5zeW~^8vHAlkCA{?NJJ?oGhIik67rm-o#E27pXZ)B6`1>R8F{ktTZjW)_Ag(37 z`-(5-qF1k8s9ZS}rsc=uk3Y_QyZeT3!s5kC(f#}?(Ja7({?NM<=dW4aW0*8)QWV9Y z=>JxiwZfYt_u-zKZ^eWO6L7}qPvEh~9>dKy-;7J{xB(;H9F7H35B^hypZ^tA;<%24 z3=wK=8A&KEuE|Jk&6)<=q%+T?+z-HuFZRN?G5fH7{T4j??5$|k1emk&M`=TZ6gy18K?NbNniMAoX)X6&cl6 zn`*L;tOM>im@{V%kYHoQ#&xJ(y%{QJfH|Z?hYrOXLx;jnN@sMrOP5Y4{B{Aq7hRJ! zBV-dfcE{u4Y|^9zLCAZWu@CoLHGumV+fc)UU?|Av(mm5tQ<-Z@W3xqzHoUP; zjvd33&)me@Jp3L%|9phoH)qN= zR$giJ#TRJUwk4yN6DCYXVCz~5xP(INDOvu}a(wtc z!Qurd`*AjV3GI{=Y~Hd5kKK41md^SDpNt!a#Y^Vn!#SVe{`>Do*4bC%!9h1E^X@{p zb}R{2yq!^AT8BrnYIvSUUVG;g+;h)8w8Cdk zPhNf=_nqW`M22s<i- zIAu~7K=`p>#zMBe$;pySuk#?pXE*;-m$WqIr&FJfgk^HNA6ss}q zizoQq$=gVMsamx>Zl~v-djUm-VZ8Ct*9?fRo<1G7-aY_rJGaOC)5l`u8*eaMAt|Xn zdiCmnZi5ZS-iY-*o_!KA*}fJ^)KM4R^Qd5n;Etf(}If`S10 z^y!A|oqO=r?765@?I1q;>@(atbQr2vZGkBh7Gvz#IoLIC96w{bHZpFBRv6U&ts(5mL#7joT^SUc?;5G70hJwBu|M!XkuoV$_`k5vI>HvQQDaneP96HE7Oh)*J z^;?jdoQ|rM)1{gLDQ;LY9XMrc3>U3J$Z?REnuZ9%aJ?mPtunZj3eYTthj`m%c_<9+ zf;XuEZl%tQ;<&6PV@h-->_8;?QKwxS+Y2Lqk!uN)l?U+l;)m z^U?R}eptBl8_Zm_2H81>Q8TMPUK;WY{9+%n*Dk}A4}XA#tM?&zcn_}Yc_vym%ETw1 zeu8tZz8KqfZ^i!o4z9oPLL`~_STOy4q_pdZh7H?c={M`}^nFhtDJd66zF&m{d53XP z&x^49hdi8n`F+T&oR8`N=Bzz{D=)tY8Gn&nWB*qjc;Yrv(x44nHlkVc#_$_9d;u@E zZrX#S#7d~&ppJ}#X5D5F_U_z{ob3Gwq-@8TXZg{tZaO-&tc2d(8({C&%?M;~LHDc@ zTz+vabZwIe63W=Sc`K^cNJn~RWrVF-sM4f6u4`Wx^T)rAuQqPR&O`aQ=9*hkt41}P z*SQ&%FPo3|XRb#3Gta>b&pwENX(B(j5cQg7p>dmLu*(3eEP}H-w?=YOA_^P}wQ2;= z{nS(N<%ctoo?ab`wrxk)pNiMtd9 zt3&5=kmj?HSD1%-ts0?8`(`-3cVFyVJ`Wq`&BD3^VKiua8k*Lvgp_I?v}n>2DS-^+ z73ZSWsZCI)T_qeb3i1A&U1-&|E1FnESi5KeHf%VA4O{l2O50O$N}mf+-w5K_`)|eh z_uY=a-FYh#Yy(BX2)eg#hgz8#ti0oxew3C4QL{l!v~1rFMWqomZr2v|YgVO*GkBBy zIQ7ilTrZ*G5b8B9^4Lv}6QAh4^~LY-FZY#hgt$keFN>ufP5j z0s#w6JJvygD8taHU!YUhi*f!br{IDP9nqz229EC8inkVQL;K!WcC3c^ACAPrl|SOxkvt5%`~s|9wFcuqpO1q_T|98d-_f;gZB%ap zY&r51=Bzew*`>FleU%(6{A@Iet2ag88*fLGb`4OkNlWb9x(++HEl1Zr7oq9t=U~yy z(b%v=(6Q<2YL9v5pp1upMThxLj6B%%r zieY$R2Y{W0#n`v*N35B*5S3bXz~HgtP}KkuStZCp&Bo18y;>9WJ-ag!tq>~vDENq%e#C9OCGcmqxf1)F1u} zg>?T-!MPFmNlc+Kr5j3#){j%W_Qbwz>oMuwH(7_jRfp!7y=pBk8+bE1b*hZw;_WyX ztbxYO+u(}cEiiTJYgoO%5JN_cL)9vYXxpI`%;0_ued-=u@yz4sdDVreTq%S$ZJOfA z=iflx#;4%Lp|8O380g)z0oJdZhskrd;*lXE(X?etG^(G4`Wg9n^zJKg@huPI+PiK- zf>)q>_cJhJ%w!YEPszYl%~=k@4=>KSQh(;$Fn9vz4} zeJ;Y?gNLA+0R#+}0Z6|$86|m#@YS4I=zQT7$m-Gy{+#W2Yu1M>iEAEeXUR^B$h8<9=!&AUj9D6URJGI zCHC#xC!fZNJxl!0zjUoVd-jOct5^TS=M~Sb_$>7E(xpp9Bog^QzxSV|{L;JXx?8bg zg?RIg(PI6&&9d=bA)JWI?Hv(eVT&?RviEs$Y};c(=lQE5MMs~t{Bw)0wIoNi--PpiFj+$2O{5<*Wjwl-zElK+ErY4$8(}s2yyf6 z&xwg|&l1kwUE=C9P8A1^Z4#4bjuc(bxp=jVyyf@9Q};-e2{iN)WnjGC_qe@Z1HToD!r^RmT+8I#1P zGu{`=7Jelbe6>hSd;deRYW`O26>RwK+ypLTZL?kQ@3n7jO^*1}Bp0_ScuXfU&Q8DbY%VLiV8*eD2zT|kdH$B z{1IKDMe+y>;qo(vgmA)w%oUrgND2R;OrP!?6T&_ky-q}^`OB6ES+5Aaqg}v9sVzjv z)sIyoMEE!#Ir=@sF(FD0iaXD_QhYP|Lq0F)N*hqdf0s3otIv0ofhf!4gPy+7mFK$j zG}H$~9=CQrKi6?S%G5K6P_Yn^pePkCe}_NkhS<(Ww7%^eA)F&zcSS<>A37p@7gzPa zQoa`*c9{@vI98wB{~XouPEbC#t@;TcVQy3XT&{40!*yp1n@-jX16Oq$x0sKhwvUkl zAxe+)&)omR)Zb)_(7Q$7!#%=vOxLD+ghfQ`+`CH*yz&|`;L>ZvO;_D0F2Cps@%_dn z@*5G^p-T0A9Nke53*jD=ZOK#BVLnRY&!aJ->VsagOg%$>Ts!ihbJHC3fnD`eT<(aBnRw&y(k0c>H*+zyG893JtrMJsLG=Kxs>0DzI&XHT=kQ1 z@`Z2JZ_hLWE?0r}IL(!kr>Ma#gGHD?2m-iiIr-#onFUME{E}6O-qBqu!&KZJ)N2Gv0bt zT-BqS*eQhA&-G%aCC-m5gJ3b@oiGGhmXKVylf8pYS? z(xpqWb?a7~d3GnXZj}W==mKRjWl?I1+NO4L;TI0Vkq{8cgO_%!ZdfX;L`>$lk~B+M zIE2i~)!0RqSeOelEd#>PeyUO=r+YE+?=ND(R||2dUI%uOPMG){>ei})Q|btGYL$j_ zFTDmcw-n>fa|Mz-4$8v0D2Y(?Uu}e4k}b>UAgbhQ$!OW49&Q@=FnpQm*mv|WO2S3B z;lZ}pxMLK~s9zcN+nj-Z10TS(*PM-8`^?69EmDxu=|cA4d^G$)c&pSv&aNOQr=&O~ z7o~u=GAW3mT0yk95e6!pL2-n%rBhL2139H&j{n0~)x=|WcErRf-QXD2kZz{KUv^S=&HqS|I_9p-a4IAp zUaIVR`OsNVT}=fL5ym`frd7fXSM%Fe{9O3G zj4~Onys}3q6w0Z?zo%)rZ(lP1t8uARJEZa+co;Ow(D@t4toUT0zr{h0DhA0X6C9c9 z4U(aPU%ejA2Ae_|bxaRpGmvy8NgZnsJho3}%lAlXo@E9&d4yk|FJu&23Z%l2%NiF3 zgvux3;l@aiHj1vUpf8*A1`y9Xk*}YrfKu^60%Apy~d14uv=uX2D{I2m9BO*DHV%SDTQhJIeV;uRF+6&RXMou zyDIUBlPcSk5+%Df{1ICv{*(Q-*jtHXx)MYPUc=<9zLHidvzCU{m=92%kv~BuKwDWL zk6|kHI2np;Mf0opxGf#l)Nvv8gybONzQg_6MY@hjH7fCYQ9cKDFc`_|bFek2Y-p-% zy3BDxf%k^g@Ml7;TZP*zpe0L9oA2x;2D|`LR5CoL=}JqP@@IG~t+*3L-A48C@MHI4Pmy0{k}#4uUco>a+o8l3ZE;JRE~u~XRq!yB3ju=I4UaEuZ8?%hHKYW0lh9~K6cbxS%R4rteO5LDAmyZz#gajd(@vHMySXJg!3` zqDnajm7v9CjpM7Xx(b<9YhXu}rmQ58)u;{+QsNhqqCsl)2Dt3ntI?o&6TZ$Xue^fR z^&0|aF6+tG={k_r9Y{8ZR6aiZdOt7Vo3?8$m4X6^%)@NcaU*g{{d`U8Ew?M~{hFdg z4oar%dc>W~3AdBk6IBuz8enNvsxarA_=20vro4d9s9c$||2b`1aQ%_4Z0FP3QFuS| zi-T2K@c?#}o0;C5IL8U8^>Org8ScF2VSbi?uaMt~_^ZT~&#Hem>kd=8eR}Rt!T^6E zR(v5l>GfFuhJ*Dt6jOCxu9H}X$!IDAJ%w3nysHI#v=ZpqT_LG=X3X9gaZk?XAeuEr zO_V1n;UU!jXd?tO?%AN8U38u;c(ZD%6k@gN z)x+T7!&N^@<~$gB!zolgK8*u$n+YSjxQc;ox*M3$zRR~1ZggA`Z(T2Nqp63Z0AO4S zT@mXa<<<HAv6hU$X?C}`pMS5Trs+@^(i@2gg=Vo4>E zoQw8nNFH6Zxh>l1hT#1C7JsKw^%`)>%3ygToTvqcUv^r*gQL5*pmM5=aR@XW0&j9% z-fh}K_F|dQkBnm6&eqhBp_1(~)kGlGnc)fhWoKkc8p+;7V7MY`FdQR+4YSD_#<566 zq4uN%Y|#SC7nar`;w@rBViB_ES_ml#Kuf4ytR7S%W>F*pQL64I2bLZMWxRLyK?7cn zTCjP^L&1r&Jg}^oSIAWcz(YH7@+zq@;EgzH1~L^=0!|xNy_xqp3 z`r-u4m^z#z`~M0>2gd!HC+*jYX-F^G)DOO3ImUn|gp|}&O#f&B%Wd{J>lE3)++qYw zuY@3DX@FT{-$5wajug1&$n*ko-e!bO$Shix2}ekK5Mx9JmByY#p@k(E3`R8aPsz6l z1#wjfEsD}G4VlqZs6~fmTT+=LI(e$|)c~~=V(6$0!xlZ408}DQ_|#@ZFNiGI>YmY6 zDE~L4Y`#zROZr$)P`VsdD)TU4J7FaitB^iRCjz#4vUE%z|L%<&-yG;?$_T}fAp_by z!pj_G=p<=o{KQFWLhAid!9J*klcnrK*!9cb!*Y=)EQz$iQFgmF5 zsiz9@g2KxgStVi}PXUjZC0t*QtRaO0OSLkv7ub~j+_Y6Kc%qwXBMwPa>ze4oo!iB* z;iy!jRzyB$*ejo#w3j3pAK`?6hM{DiEva^ADvu0#lsQRbG^1>U5q9BdAq=-%Jviz) z5%I*<@4T3kZco?s|LR)gk1R1gzmU|;cm1l}BdXn1eW|m2At6_t(TwGm^o+1)%790? zXk1TNwWCJsW%4hwpE1)WAbf`0AnBa2T4qH=6x%{(me%9MRsGFJ{h7k!R6YC1BN&dQ zmJNDsejYE?IRPQAl1kO~!VoH;*ekIIp+E?)YNxR3&tB!GHUe@%ER=GM-dqSrEu7VR ztN6(H1fO~lE#F5ku9ZNDs}oJDJUW)lB@zC2p*Q={J*WMi6Js^ z;>15jg+?bwA{7Ig1j;26I)U#Kf=NjFZ$aRxvI)r|bhe^Kyq2-7NWsyX^|T8j8Ogsw z0IP`0JZQ4^a0+KrWK<;*f$6arsfg}H4V}nI?bKbD7v`0e+-9Vd0$1gNnNc)16itYw zB{`w$(Xh-Y=poNlzv*4Q-VVF*6NW}~$|IWmnQ26!8DR)k18{`$2BRSjZ!4J{58Pf3!m#fXpUGp1JYQGG5d;uHTqKs1O( zC{&m<`8_{LQbqmJRTJL7n%<@IjI{gQ-tl_ee*nnK z2s1(&B&`Q=PI%Zyx@<5n}V|;$0mO#I#&K!(PKv6 zOCzfqfHOS$c@?_oiWn?r7)pCufpl>;Urzqgeb0%Nqc5!xOJ!s9Gm=&{dnls@?Ib{7 z|3gJ*ZLK(8$2*sFpB1WtqFvXBU+}2U*q+MiK!f>F&OYKMLMm3ebsTSga&>(nmP@M z=m?9sxS=Q_P-+&lHBN8>{BKC_)M@8x5;wF|5j&IE3WWWN`|4P7p-$+WL-N+POfY53 zl;0NAJHRI?c}A&PI3-H-P)*7ngH>Y@B5cv?NaRc6-D^+`730E7FH-2Cu5W5D$=#;zVhJA`@34aK z8Nj7^%W@P4T$UJ;spS?GZ=5nw^0mDRiPW5FwX)a1gv>g`i%!|>nv1G!na!)&=>05- z>}mvo9sn7j!4h9i7R~zcR!-l?&BiBiq<^!1!$2R4CJqp@1qI~_3 zTof4Pk#C~ zoaKXKIvAvhB=Ex3RfxRjUvANV-(p2&O|(6b?W{dKUfOt)uh>-xF}0V+h%PqSLeU1- z@XE!zkf@gF%EV^2SN12L>Q7~c>}$-bRb9?&d03*7(P@v=@270F+yKfG?sz4D=BK`8 z8&MagpOARlh44rC(K(Yg?Z1@kkp7|mVVMp~jFLl?Y>dZ{$eYl3oU(J2VVK^BJT{h3 z#0E}8n#gb<1j}bBJ7mayZ%C|PgLP68Nnh8?gH*21$yPg(GOHweJ*3z~J59BqckBp! zmMQZnXuHeae21&u%Sb)hE3e$!Q~;yne?Ack%^!-ulSZ6ro}#!2<@|;ACriU&r^(qUjw7qNry?3&qxfJ}43!gzacQ|I{yqQQGGIqkevv3Y z(uLmGNgBR}_sg3V$Uau9KeM!GRkc5OlLLAnm6LkG$y6Epx zgmV6pD>!1??2)V6uoenErJS)bF-mQ5%Nfk1Kmz8@S%8%*zekrY?W0H$w^u9;LX7*U zIi;Q$m-a+TMLQ_;#1Qr7{Qk*eOs&C9)0lE4M^(#Brr( zMIwBfibC}-jTXO|N*ZWzpezvZ$~MvC`?sYeJV}d&#I<9nBFPzX-89aIX=exn9D1V} z51y&9W2sJIha&I<^gYz+MmY#vHL3}(WmJd}(WzqPLX1FopI+UVD&jZd!b~)yeUXPR zi8bgIDQ#pOX~!MCH8uXngwZJJ{#99Kw+UB!4Jy1z|efY;*1 zdmP{&wab#O9-G7EbGfnn0+6;j+Mk?g=hPQcAwBXl>K7XMH`OLv21SdgcfeBa2nIA2 z2+#C9H;yc?ie*~mT}^SG1HB%O2cvO<43$4DN|Wds#7U>Xz~8DuLkTSCUmeK$ODZzI zguqjRkv)6%Fn>P&ynlwk)Ab3Rrlcl>z@O|in)qZ_@tYgkNbTFV4+)80)TmuWp~h}> zO=>a176!`p0A)pT`${}uLvi4R(!uZ+!;VDYv6=!YO%V1L!ax8f1(O&8!W(9tkVFLF zhFyewaz~n=0E4h8co!?lYbt7t5N?gL*|c0G*9^F%^uiKi7$$b{vj?>rs>#!(?RE zFr-`7RO_AyQD6+xqA;b^GE>-21S2kd6!5ENeA`>bhQ%uqejD_Uv zQ^rC`%nnI@zwn!d**OVV zwhFKkfNtG^y28YkEhd6~pmAeh`4$gapLHX4ZuglM-v7M@zgax{Vdl))wenl<_kQnZ#o)92q67Lg zMp-S1kQowbR~8Rv1Ed8eri6iySALV4HwCcA@1K1T~8qH zlH=`?>Ep2$V2-;$`J=HQBwbyc9N5Nx53_EADTO<#U`oz?IZ~uer!!t_Izm+`Y}JNf znmBCqga~1cY4Lc|XemQzRT_^FHjDgvO{xVMB-jU`PvLh;#?5EVgY6k9;F8FICdiK$`= zn3U}}2pAG^mh)xAFWT3qj0u+n?}<_15|CcU>YQ{H`vV!v;Fs-ZX<~C?xORp_-qj{j zlHt{g7?FSX@vKYV(>?t|)w9k>y6PzoBZ|KGb@|#7k=NZfg6@!qtBQ?hgwsT9k(kcm zn3dvN9Mcoveok#(#YUuwWS)?T6BC7P1W+lvW3uEf+qMal6q2+8@f=8E<(xuOY?A6k z1ywTUH<^kNAZyZwYf)N80FEI!#-tgqmk9%$f?N`dyMO@n%~tg+^lg{YgcOdY&V0&Z(y&U$Pa8z~FV!M!vM? zGj%_B<#HmzQ0021p!;$@uhdB4@6`$iWspoEOr6Z^+FS(z91t5FD?=q<=M2$)$+j;w zlKJxx8MT^?fK}mMm-6GK>fMcJ>%uC55%5m7Uh4gR2pUl{Ii`S$osUy%eFKt!a{1-p4@vgGI3N-*>NbBCOy1RN?qT#~T1&PjS>gI;p z$T-zhMFc>hxkv$f2b}8X5qjWAC|y)-d9qph2{WT?_c;gPJ->b~Zk3PBtd-L|A(kjKOAKKuF;oWin{iBfD zxGt`{?mEtjNoqyCyB~oWAAW)@TehNAvu09dsS2^eLe8`~cWVicqq~RQgeFb01d3!R zHK#)aDJ0j{@=)zr(1^*T|6`2To%6)6O4K25^Jad(Ri#aE(+9xguK)lb07*naR82Rb zN89?`?^iBb#41oHTs#sNUU-U&c$Mwnk0+jZ0^15hXy3ULt{rwEQi4K)jzEORAAgqT z@LPsmg7qs`V$}FaoYD5^9vy%C`E(tN7A(N$^X8!-zYIZtZB}{e*{8EW+1&B1$?>3} zvZ4&%eYqHIT6aKp^M<^^C#vt9IbY(aBRZpgR&6A}w_bDyG4z(9$V^Y=Ir)RhlQH+}ui#IqjV{Lw!1+T4iyP>Ae5g1UKAk=tOBb!f{(a?0 z@7kXGNgclr>z6GCeFCy4jk33m#e6yNe{3ix#m_h z!kMIhuJU2{@ZqSH-N>~GtjbEvSU3lrI(0(J`a$I9?!%q`x(7{KHpdM&UyoqO|FHiH+`}xpOgf>QwBs>T;Icla6XD7y+78c`{8zDk|{$gg5ZrcPkLc zs)bN6g@p))4I75MeOqzwz4xN|(F6JX48?zUqx)^FS+xqgc5mgxpC8U&h)^&Usp;t~ z*m2!;*P?DlIzE4IDras!;`B>!>7_$>tW!UJ`Q=G$?~T0UCg{3@7hie-Yu2p6Rae}? znRcV#4oFI2d!&Bm%<<3Rztkj{!0?;WPAR+HGsag4eQ-D$vjK%NB~+Fr@32xqM6tG^D7qx|Yx7 zOCO?rcvu%hE8&A67EAN7f(l&jqEI@BNu>dwnT+(*dYCtRIo^KtYutF#={WDgi}C!^ z-(cxRpmy_a@Ta$cS;xSSd-`GBjuvR$pd}jQwBQ&BAq27oMSGUus@uk4_ILS6jh3Kn z$B&r1csWW5foD#z8RtIhg2QPN!Wc6VfzHartV%>)9JhzkX4XMek07SS$lEUo(z3ms z7$1tGExKD24#k$}~pz9{L!&BPLLuhqvy!0Z&i*6bF*(!rt&T9=iH;e7~^-RlX*O zFrp=pS$aP9JToM$2|KBz5TB15gXiD-2>Y#M6ooaEmeVG~f@VcL!EWGsqYBr`qIh@K zBD^+zHlpO6LpgSQI|Z{|y9fJ_VRh1;F=+~9?x8J8}^z&A+0^(&G_uq`*8Nzqp*5=25=yP$8Nd{ zTK-ndobopQ@vj$A20vEMcm(2G&nwt?RTj@j*i4>!vA{TY?_9B1b9K87URIJ{z8&5p&CbZHld@*J`-o5V;6zM>b zZm_OBt@b;1?89SEK8H$2Lxl~L7KGtMH0)in0Utj-0mj}{`1Yfh@yv{mu*on{7AYa~ z1Erf5;f*IoV&nFGD2*8~lPa)t&w8v`wUjsXw~l-fUoYCr-c`enLfiTyZa%Iro_cLQ z%1nd%b5(vJ((^YWchPh_Ie9X^FD%3IMH>)6CSJbpZOnLWG0gA|6t0+s`(AqaYroQi3$jtBXj3Yp0%+@mb8;CjNMGC~N#bL-gf$4ox{FbWMVp!xav2j#2( zR-x|{7Z)?i^;_j&$(l&IlFmIC3JuQzzdu00IbP`?c<%Xki84Qw;-%84Qc_aF!Nrgi z4vxsTs&DIvPDBT}KWV+v)J8|TWMh^Ce=sPnqjrr7MYe@>B)O+QeCsWwrKO?okaL(X zw`0dnOrHEMuDIbEq^F7iQ^i+f?t45c%Pkf>kTa=ba1gCn1ov;=jFBTpV&%>-8a3^J zF=Jjtg9d3LYMps!@|kD>wqv;K_L2B%!8f>i^jMsI%5eVXLpo`G&ed0cJSS&51YAebrvItg3GJt->rj<}A7>fS^Zf1*JvZA4TKN%|-RH&N9>_Lk*ZMbiuM;iAtqUiSQ z*#c8v`X{e>pMU;2(o&LP?AeTqF1iS#M~}g%`)=WTKlIQ;7;r&1tXjMXXO4UuWtF$_ zyIpnZl^FWU^9X1u82{vSJpTCOIOF0s5%f!fzUJXj|J6$@hH2BLasHB_*WQdrM~>&V zYTo{AUWaL;$FX3B$sUbavu5GB=bl5uR&_Ca_%O_y_dNy=>;aUPG6mXSHyfc)5UUn` z&UV48lPBYcRcmqMGgGj2TLf*IG+~vyuXk3tc2{X>Df;#6hwHAn1+`P^v(e6!Hx=UJ z6XVgBoQ#`qznwjPTFk&J4?c*q23?4}ygarYCrz7x#q;Om#TQ@1<{kUcym37@KIf~i zzCx2GO;}2pJP8+EbQSm67w&xqH(q}O)2~1INEX7-oJcysmESx*+UwHfR@hJVV9C>?YV#Lk;@xmih zv288!IrkA`5X0|%8|{w10w=c5#MnD7L!P7Kn;kn*uV)WjH)<4Ko$w02oWIn=YoiYSLCkUqG9 z){Vocms$Y-o=v#^#ADH_btZ;fdnPuOI>-kw`GIFJ>-lkb=;}*x#}z?-)}f~Bv$g9}dXjpGJ(#%JH;qr}jmRcyrjqpwHD<{9X4WH-D! zXAAORqIk(lynM?Yc=FM^k=DEphKzUvKUR_wHn{q}mr!UVW5J7W zVA6dLW9YDpkaJ`UjGy^6mKB8Y=shE_V);@WG5B`O-w0&nw17itPc8C@m7zh>K4_)O zQ2(4Ou+9hcyrLsYQ}*E7W##x{K`w5-YZxQU>If6fj98wl3lp?>f7(Qy+Q8<0@b;z@Fv2@cS+<3(kxbo!t z@YNR|BDsDo#0txiEMwGm4lR|JO_EZf5O7~pJK#46Hpo@N_!qgT{{Hr+qK8hgD%3HO&0cP0c@G{5}Qn$E|cU4C^I@=y|8s))>PV*~;$$4VJaTv3OoX*Q*#-rsK=b&!?UVxSdA9B&CetiT?)71|* zNeRd)1xRHmkdFNAg3WK%%f+2{pNqNsDzVSb#043ZXt;I`P?3gjzT1HtdNoJ>tapKm z=2-g80pw&BA=3|x`7j?B-SP=?Ldi(6VhCk9xbT#oD9YW9?_ zD+`$c@{nX>w>^wSGuJ|^wDIETQJ6mcEvzcpfXY*P z;KxqcKwt;X9MBYtR({9lJ^#@b)aiF4E*snzdf^UiDc5nt$;Si1{b?r{DrR6Slt&=1rK2qZ&2B)x(~`-eOY6*^Oxv9!9V34bc6#P8j>y zGVIktg1hcZM{aQ$HWrnmSFKV6b}U5g)6T%gAkg)g#>i@_W684ZLO#Qa!YV4nqLsTa z=72Da;h1@mU2I2^_{yFDJ6unZ?1 zdouoc(_JV*U6h+S@COYDv86VY#thh%;ya^X2{ZXRQe-){Lg0)g=`aw!dxLq&OcZ%>aU$oJ3o?y^cvns zP@_>a8TA?6WB>mBShsFnoL?*zXuS7UvXNfop1wopG4gyE6!lJt$~z>nxpU`EslTh_ z>on(VqHJlRoiCZAoDuE*i&+KybW>kF4SvteDMxBpkMwCF644 zqftbwWD*vOJc41ARg}f4;oG+Hj+}VQx7~a$F1+wU+;Z!!=->ZXj+s(pjF3l01S%?6 zB6P@*A-Mkf3ovNVAVwYPG-!Z3@4S#ygXGHvQ+%$R`_`kjE0 zw~xf77hZ}kUAk~TvsE;?SIOsZq*ida7H@t7)x`;^U9+Zw`%R-p>6kU^NBrX-&!RyC z6Y1%|Lk~^FTW`IE6)W~}HzZFUA$HU+DC00~e924WhK1@t*bbvAR)w3czn&2sLbIuV z6OW#rfY8DbBStV1HF)q~&P+_m6!9_Fu3gKhK8*yLBPkmwokz$JA?fXh zB5uF^c1AX74AQu1)371myF=T!xAVQX-$wiP?U{>8^+4~f3SE;tmGn14<_+cMH8lP# zH#Zjp2M$EnuI+fd(LLyBn$r+B+;9V$*4Oar0}rs+0KFGwhNh%_gt&e5(MSCL$DVm6 z&p-eA*T2xYb9W3laUdhERG)L_&SkWU64O!Qz2XvJ*|KHWvSkamLA!SCc#ivi`S3&ySaRq}uREIR)$>T=zg77{p<@sdHJ@;@OKL7ml zoam3*iE`u6yFU2D%gkpTKYlzPD}OjV)(=;!TM~IGwv70}J$m%QQAhRXHXU}|FdiS| z)jjvzbJ4WvF}U;2u{=0v-lv!{zX2@!>MI=EvnK|ea5;AFau{q>h1VIm9&1v=pJ06D zeJ5#M;|1n}8KMcf}rZaOBxJ5sI_FCg4H4H`7ybIQwYeutZHz8M|c zcEmT|e1o^%dPM}?R#nMU;*&S^Wg4rtCpIY_EA`hdRF`DO(71Kvdy$8O#>V^azmFLo zeuxz-R`6J(wxe}95D*!~={(|fuU)r|73*lNq`%W#L!K5wsVho~I9Vp4)I2vN})qek(4rhfDZ zZ%jwreml=0WDg8Etq;$qv|jY=*^}oI$UFsVZ~MwCui)sTk4EFhIV^QK_W9@0vPCn# z_N_Ob&K?AkQKz|w=5(sFk3U-m$n5as8TM4%A@{961c9eQGLrQ2EV*M@zl+n}p+g5A zd|sp+2?48KnhYcYPi_v9gY+Ws>i)_LK%F%4x+;;=;gW?F@}0c#1XS9zX@f?M8@Q>> zSxQy2C0Rx4BC;fsICPeItYocSP5y2}WU92Z3g~75{IvUZO!#7cRs|9K&k#~=6Tz?p zlkQE%x|R&fNJSl|6d8!%vrpegkM14OphI`O_QB`Ch84KytdsHR%TFS!WpkW&={5Lf z@haSS*&uXjmWmtheF^&ke7QV={74&|b!H!-hCm$TSOps3CrrNY61@1xXp~m~x83^+ z9v}Z1^2@d(vtbAgTl8jjS*Lz2@ZF{vh@k_r>zsggsYyu5&x0?VhsY0$fR61^P|rXh z*+R!QIhegs$8ORywsPSw{~3Gt8(n2}?iC!0tTY=Uqkk<|hrS3xM-)`vE1X z=c4cFm*e`IrsAt5xoB9oIZVpzS5*#QpaA>!uR>uogc6l2#K}jJ<{+B44~q)2(C@m( z(d)>b7=7VoNC}jo_&_{JpzNfUx1F?n&Ij*`=NAw8Imdh ze_AJ8c-37v_LPCR>gvnUu3Z=fdAXRoxHg(~yb}Y?xDsca)*q)I9Yn?E_fc6HM!R-x z(D(AoaYXmN7~ZiBQkE})Q&xgSKdr$tAJ4(v&yB~t1v9a0?^fvHdN}js%Q5K8-WYoE zK(q{G!ndykt=b)hta|NmR=0*Al1X}`6wls&FJ|Nw;mlFb!skmzz)VL{xeX$`WfYeq z!?utSC_`2LejF$hYAyrHA;<|p6dwb!1) zpnlykD5o}(ep-tSKOR8SW6wdoKpu9l{}BtnUWQJ6hd^uG5Dh!F$L??TqG0_V!nxV$U!GzaP2hsSAK^o z-R6Tc_}XzUJMsME%0PeJ;xO4uia8LZZfhv5ilSlbCYbrfr|4cM1BEMABLE-DViuyA zO>oz9V=?pd_c3zBl}x>G_Uu8yez7ih@6{PkJoOMFC6x#lR}fPGj#S2ho&v-wVMNLi z^O-`=q|%3IK@{~utr3c7Xnk^5EZn^uFR$5&y*cf0WXBj9*4=~GCVhlRt-5H`q7f{k z0(RkUL`(M~LODlBIUt&jvb|B5srBJY(NR>Mj2lPXhiC7*16zKW4@wWf0?9rDQKJg6 zKoKgbFNa&8qM{{QH&12*GD!1{t-*4%KT^c+R|_fc(4k^}s#q&ZM-?fwQOH71{~j)VdM;8!F*GmOhfqZpbP|-(^AO66pk(DI`24LW zklrjEl@@1kzKYy^`+LUl>2f?<`yj|x~;G8{b< zO}ibBrrrDF{_`3`|M4vx*dN1=!XQRH{T5!H@HwJY!b=*mwg9E8v8|*Q>i0Ms&`ObH zl*6eIz0en{M8FQi4#@st=0i^^M$pP&`dTa^H2j_N0QM9(=+(IeQVpQe$V8vx2VwA8 zC*ZP6PeI!TjWB!Ox5(^#6b4*-Gmbwl88@BV1fML+C4C({e9PllH2r(5e&sRDe)4Hd z|6nn;?$OXGr!{ideTQx3B`D&+w)H@GH8z*DLQa>fKw?xOJBkY~zZEm)uR_tHi5PR^ zF!*AP(Z1~|xM1iA^gFc|PCMaPtoiCoAnZruT1`-(6{3(fkQ@VJAYf~h>4uZhbuFH$SD;Y`U1@P+9t3tcG zRjXFz~iIZ^Uc|zBey%ipPQ;yTJ z1!BR9D>Cyd@$RV3)h3Ei$|=*PFz;^iAMGj0}Dt`a7X6 z3=l|qp_rEh0!XnU^f@77j}yA2DzT)^wYUH`g=pNIL;GO>!H zQMPQMp?Txx+<2rMLU9TcCr)Hl4C3t5Tu*gIC>PCR1pE-XNa#F)6(YlK3}eQO!8hN0 zi8X6h;)K&r=edF2oyM=fc5QqxV+LQJ)J-<5TE+FH`iGiJRlCvslH@y5yHR}x5oExM z!IHnZ8?M^(oAFH3^nTgdb(tSd=;pE&%iMLHRAM@G$U$~?3eUsTKM0}an36z%dFnK; zs=iijIgdv9+Vpp!>Sr;JoyHt(zzCG1zC=83@_rhUCQBX>I*$<75JKz;p*|UtYY-w4 z_MTE(8FGA(M|I$N=dnj@?AQrX+uRc4!wfJ_dHJ{B@*1g6P-qj#qHn&uFC23z(&p8s{7?NnNqScV_EC(pva?^u7x7E&d0 zq6I-MR)?A{R+E#pSAx=OY$pb$s{hr3N$0BK4O)fg_e8;bT0CgNr^WnmDc&Sls*cDF zmY$i0ty{OCPF4=~@7;&GS!uk;x9Qj=L7P-?>^MiM`w>NfhhUY(kQu1}a`ys_gCclO zCw*auCqbVRM8sc&^!jyBE_H*$J_CAM3hGq=8|N%SPM0Cb>2xH5h#_D_5soDxyTuW> zXxQC|`ZS!8+7=z_`=B+g%la+da~dM~r`-rfe?-;pg~+oxdp1kUnIQSP6!>d3#l@$u z#?YY`;>AVfFq4IJ78GTQ5fwi|tlA;6uSHA?m4xCV46RlYoC*sjQ>)8i#7fXSHHHiT z_m7@}f&xG8efS2DT}HupK2vAMDh0`!Mo7fYy0VaRbK`bhr5AYEbg@6FNd6~9MroF- z5+RWIO0H$f66gzrP*oAb#tp0C_c_q~F$_AV3~AY=XxJ)@(|QHbvp(>_v#s##v#(%%E4n@6&kRP*9Zk4iTc7}fk z=1*S+U)>7KTd@Qg>D^Gfb`l2ntK`LQ(%2A6&AM2+Ed@jSoCoK-x!6%qgvzoo(ldY( z;{c49jZj8?v}@P_uiteCiY^(3+_Y>A9^41zDLQhi3K5HvLWBuD8i5uGqgLwA*tc^g zrp#H&hS9va%TZJmMI<|$uVg>!mPdK9iRodKh0CEIsD+Ho08Tr(4PJTWA(Yq7 zWNK39BZz~lAzEGzAB`2Cg(A~JMa6!ZYcmyyl%wmBwJ_4$lAA5FDBPDbsRl z4SWJAb#%l~3!RP}fU;e$WB1lw=rjH~7GOE5M;(lLayYgWKFG%0kU>2FGaXK>fOVk} z&BdJAvr(|84m!3v3gJkM1NHN&l2Pmc7oCuX`5%nL0cR98?c9Y}WeS?sZ-gb~r6{T@ zM#v^TX$vJ*9!l+e&VYexdi}aoc2N=1f9@J{5XIhVMdU!0|0tMR^P?h4l-NpCRh6Sr za}zCVm0`r_F>Kf+Mb_iP33ub`?gNojD;<3Y9E$-DJ%{P%4Z_{mo`KWOIvZPd=AtSo z1xB4zt_NBtG$$xFr$GxPC3`V*;=_pUJ_`%KUV^<^bG&-rb?o^eu6(CjsTle8JPg17 zEMkiO*{#X9>T=QALHiHPoq(a4nL_tMNOHPikKu9s~h$=->%)2Co- zZV9&jv>G8=Xe*lHt_tCwmtBZ@ z4~@jS=ZE8|jpyNuFE(S$jmM*M)=a#yX+1KUHNdOi{)E#`I}J}?c{&0V3y55N@&5aG z_0tmk%ctTIR=xm;aHXoXq6WuH=-|q;=)2`(Gu2i^<@ndbR6Aw(P+nVu=B?)SiO1;x}Dq~ zNr309v_KG_e)1YhON$Z9>Wm}0 zwm_paoB3&}jgLad_Koqvb7Rr9Lu+*J)|F{O%jT@*-Fd$u?O{Zt81>o$oO$NysFk;l z^??UmHWHtFHW#%F2ct&a&1soMk{XAzMe6Q`&^Tz=z%M?kG2po~tFTU_9zMQ`RKmD{BL$10K^|RA( zdjH<6V?Alw7wFWr7an-%pWF|s@~W7l*}6+6t3DJI)k431y^)bzfvTb+__MpBXU{hH zcFG4xN)BSylCM#v*%{116)t-Pa1%L z?nl{(!rXa_@$u(#v1sEKbnA9BI;W*0vvv~N^={4ewr59-sf~?W zr68KWALHh)<$A0W4P(KA`S@zdw^+Y^J(@IVgp*D^6{atOVZ(30kPB|d4L6*LpkX7k zP95|-su!Mq`e}Un>2%%zJo(}Tq$lY}s;pvua@}K2MovyLGAqit9Xg(HGH1%{*`qz8 zB_()m+B`=0v+4!~Y8J~vzkWv`$qb`p?_OkeABdLCvysLLg)ElNOs09M{fX$`zXP(< z9OQ1>h90NiiUtjW2vIPfVIo-%qIIjb=yCD@Zp%T(^}w2yD>3D>h3sYR*t#Ka9JHiH z=-IP9D)N71gzbx&s~P;ca_D&|%*%r>r6qdz?tmV>TVdOpHF#~>H*gFSFTOOElK|Oy z2aukTigw5Lx9ypUrO=6t^vo45Up?!9`TQFb=2IPVNBSg-&S z-h2x?_vGTHe?Ez>oidQj2?M2+F>jy>P_$zQ=B?R`IkUb-vt}(ZZrrm-NfnAihLw-D zO`0HFuP07Cu_v;8B}h$9LPed*g2 z##-}bdn*~OZ`?W+wQFT^`xDZB#*r=ATQGgaPgu5mHJ%;w9QyQZ#fh;D+lH&bsaLPI zKd)5xh&!%6y2A&oFnaXuixnGw!1FJ>gi#MZjqcr!z`QwM;?nakMDIQwk-KXbeztUU zY1;zl_3g#{@TEWIGC#dZ<5b2+46TfFwiHy`3|b~;)#Z_4o|9lH+1Bahw-av<{koG1dJ5O(C1vntl00sUY` zqA1$7Ur>a*wc#2Hgd*tIs}~-4WDE{eS-9zr`_QaGCVC&y5kIY1ftRMwW?lAk&Nvmh zJ9gmFryj>gGd{x^=UssrKH= zkdAxER6Rjvk&wT7b31r1ATz3}c4ZY$ZU?vFW#(HM)St+E|I-aX*EJyib7Q`%*9+YK zB{Fr!AcC1qmE=b$fx7J^RjZw_kll>=MNSLlA+z?PaLX1v{P+Zfqe-k_R;F9H;XVlq*H=Ju;Ux2X59WIOrXc2Yr}Mz!Q*YFs;}sx~#gReQ@s1oGXZ@;rY;o-b2P zsL|>7){_%&hbl8HpC=$QVas+@H+FR%5t>tr4GD?KwoBGTe3u z$l*`dWhFBy=gZzEo=i$O;oL>n+|NO=-4t@D+NiYkeTof0|lieIg`r(O;8UrXwAFlox)n>F^YSPrJt1Hi*S z6kK;#Xhw0{CBIK_KjYV69Yaj$$yg)a>!1N` z_Hvdd~*!uO{&cG-RsVdNW5aRUkBabl0l6al> z+;byyILS3j=ndUV1x9=OP5kG-efK$RimN~)=b?Ia>fwq@uW-54#FwPDKVjfNoO#BX ztcXIK*#+~yVvaBM2kP z+;P>=cQPQ=q~S&8)ph9a6u3dDa%o}zyB8IBr3_7FypyXl7)r*GM|S08OPWk=4Bnx} zcy}J#_7t~YdY$@=#3v<1pv7$1mIzqV0!7H(wHxWaRFoXB5bS<0lFWMCNqvq#?%~sf z>W^he#L|{|Fqrsgph9-qpe>SQL`}`LUko`Gb$6$42~dG|*K(_?5J$>NN$x`{MT}o= zX4^&dsyM@}5B{h;H9!e&DxvvA5*_v`P%1mA(QHYjOh>B_eHJ2vVpucdo>YE?s7Uex z>Gn!Mv{ca&M`ewT#^pao;B^rcJ!R5VM&Rk^w6qjV{BW8;;CuJw?+7XYpmTzrDp(Lm zqUqG;|1G;zj1Na}mPraMKfefjc5P*@GzD4FwN1a=oJI{86x62>Z$}~C3VBr>Um@rT z^Qi0TlG&*lGuE-_TS47x+Oz?0is6r+&j?UV_DfUrO@)LdN2}jXljFkjV9lJ-lb*x& z%;j1FbSV?GITEq5<#h~&%BlCY#QQo%;{71MuP6MjYUSYTh~~}{QF)$t5ry!&oQ7FcuZkrmK6(`&P;C2h=SRpxl@|%Zyj2xW9@wQ%Sev z_ci$(mS!frzfk$oTx>5c%lYRN*g}V;^P{rA#F5kL5}KMN6nGSZ zN?ETXu?YNT5+%HZ(tC^O0TGzb&5F z(v=5Pd1@S4Eh1aF;d<0e2vHaDyU7`o6B>}@fR)EVA^gh2>N?b7(v#}QQ`Gz{5qec| zhU_O+GCx-UbLS6r)Xz*c4_KdWxOXoi~5-sa#}>an#X_VLUo}O zCRBYvCUWx26rzUADrd(;21iGV6j5Drl(wcZI$~Ls?D(e7nO-Edu^lsoe`kdWGoBUE zmYr02G%S_GPSvOK(5Oj3X1G&IA&yj*;pcOMXKiS7E!*P2G@;EaRd00Ly*JGvF-xd> zFm*ysZd|OmSIv|e0m);)$%%E{oso18fTVd=ZH|SNW6p4m0{PCikTI-5kp2S25UHuf zhA+M`Q2l_E3#k1l6QQ@z6j85UCUWXk&j9V%(x5f}JJcuYb7Zh6M88j;9`4_$UmhMx z;x*;}a^d;;AeOG*6ht!9@Gz)kQDCA~({pOdZxoup-F%4z2I|6f^OwTKJP+e$=9c}Q zAxJXRRU%E2(UBBf;l288FYg~>z|*2hu3-vVBw>3bpyt0-XtAXrDnj4Mh*w5;BA4B( z|E`c`;7Iv+7W~29nWW&7QUa)(oxz`RVr9b=sFLOr za!O`9>@C=e((+14l}QqEVX=VF(l<2NdJk+Z(l~0rg%g5FMmQlLI$wt8<``ob4*XVB ze8@VJWUNjYYcEE@+mB-~U zODYm+1nat)0L{cX@Qy^}et~e+l>ew`igT>$m^q({`zckcYzvxCdFv?OK>!9JahjM! zsSRUVNT%?&nBnSJQQpW}(y%s_DPfEAVq|#h1~kG39WO#DJufb|v-;$d4wFKvuhmv(0(WDIsa42ke(R3CO#P*i~OjVxAZnfq+YyS3_LSbV#Z!G_enmPGiBfM^p<)MHRd0y-vFk?oFOU9y6e+L2!EX-#=Q#}lg{muGo) z0>@r)^W(0PzeGv&6goU>BJQnm)wC4yF56xH=2qVEtFSZ7m}JjTLkwzwk{Ih zd3e*5UqsiUtYo57-fcqWRlUmZm@0NdQJQ6}LcF=8hd@)k>45a8WW+z0{oi0U57o~c z(Z5B&2Dgu;#WxUsmwqZhJxlj^rvA*L5ZuIADwPXEmWbq%t9}}=t8>EDcyizy&=YC}mifKeg2Fchd{ zfVCPOc>&9Df7FFei$u2_If<%zkMEcj^3M~tPax;&Z?q##L?ks=r&~-W3TYP~Qrwg# zuj!FkqVJKHrrL%^s^%y?dlzh%{fjaj`y^+9yg0fDaMLAOjqgE|gP~WOsA|feUo@Y= z1_^m=$bh0|cd1OSPP{_>q({gQ(MPtX`jbpd&vH(RwbsEJQt#Iu`HY@z>9iNH1G|7>wwwH8@qjt0%}{Uy52L7zd72iVgW zD6Gl|#O*Uz_rlQr?Ev^g40x4-oa70K4x`GUpzvg*Qz9p#-;j)?GN{xBAW_jqB|M>P zQ+irL;7LZ(YrrZ#cp{HpU5}_BO8MsRUc3^SY6GN#dr3YrDJcb+>7=pmummFWIBk}A z2T%%=I9Xa5K*$x*V+@I$b9l86g34(E{!EHSmFR^b=q08mcW1BA?27Ggd{ z4+^rprD+TDeas07stqHV4r@?bG1_no!``Raup?1K<%Y+!Wq$&sPOCteG)8{4gaE{Y z^l_&;vQ<<5!=ee*5rM>erZcGvuXdum5oB1$7U-V@+DJu20I~k+&0!1giqBM>_W+n> zV@46PVvIzql-=A9U4&A!tHQpmIC)Z_=5}?CHmP9HEleNzs3NGM`Al;Vq!_cJ8Io>UE* z(%C~IzGw@?P@YNCmbkX!)`~pnrbHscavh@gr+U|20J%CR*Y9#_#UkvWdW=Kd<09VA zR!TVX^SFw}-`@jA_38F=>d*QwHG`CM$|vhFrb+c0sz;KJHT=8`m_~%x6`z$VJRo`$ zQOAN`3krb5RZUS`Z%O@>H!<8zuTLVDimRXD;mUgeW`&e;yPF&rrP&^PNf#}rJUo7{ zC*rTvWQudHVpbHl+*M#voN=jIRt8A$TGnA)M&KtIb{tYJp$FkXj5VnCNLri>SJn~HhsWGrGgU@i7eQ3_t(4an{fxQ(8u8qfhtn6Y567$C7gAG?cndkt+kPpuqC6pbNQ#C; zL@bq)%(y7MFRcSUzet`5JD8w$r0OfeaYz4i1Kw+JQ}!$`Vt%MxcrxBeVdU3}7b#bU zI(i<=XR|Ux19`rkHZ2bNpOj9t>)$T8z4?u&J zmxry}*CLb=VuQ$vMuZYgjKVkk&@7wXrFpRcT6RiCC^=i+Pu3;P>ylqjjy1m~sR7gm zmWon|XZ&OHSl8nVB4qU8uOO2yh%SR+75dJ+d9M-eIFc;qNR&R#`-e>4>Ns%=PF_w@ z5yS_&RM_D-a_LQv^QsXy=xVI;zgF=qCT^f{wV^FIhu*A{PMj?vJXU7hEk*j`!i)4@ zXlGBKBUC@kLX1>7Jgh=6E+K(iR-x8U((k{F_4d0`CT(^GSNvFWZPpF@5BdJbH>Eo}ITVSd4Ylxs%?WgSsg*PLdd<6GVzv3qwVK}iE z{B|-U_Td1b1QCQHQeIMWleMZ4G$j!&6Nf+|nlVRGF%6;MKoU$r%P&5ZNW5bP`0-3f zxX>tTCh>5I?M#oVsemb~0H$b3p&0-G2n9(*K~&?Q*bMRz;p}NnC2O-%6@}@Y$$e`I zWRQ0F1pic+0sek+Y!`oCZZ?FbXrIuKY)RvtHj9pjlHsZ{#E}M6i^BiET@w4|p-9VC z>)XUKb~IR|c%=K_=waBJAHJ9me#`H2I~7+|0k!cGaNET@3u-R3K^uOrx5TGDu2z1n z9e=@*)vF`)aX?CNyOR|1q*YH5@XPD#Zon1}=1Nt_yZ7?)2QBe>o~a?;6xH7|eto^# zf0{RwsOEXD#M>U^MKp!HCtTY5OW+q7i+@!fBjNLd)Qjgm&4lZ?_c0Q`Dv@{h8s@>@ zE1_Q0HH?Hm$FK8O*`%qMoP&R!SkKz8{1VSfDv{A&TrZ{i=ZW>GCAp_-Qa{|ip@;ow z94vFKmiR3AWqyrcRQEwtWD@!x{VhrTn$X~XI`>@_z52QmulMTh@rz;PzH4GTp!)BL z{X_oX_G5Tr1hrp&FMgGS2mSwYdCcbNZ542t`E^*kDh zqdu{|s%7P^_G98mknfi;pQ&_1J~z5a+BJyVsou5HaWp=v<4_4}=kHxi4_1_+P5&!N z#@~Z%lOY}og_z4uNLV6r|7*`k-yzhWlw`adcclxTXwZ5yw9?;6OZ;#sUXMp&##!1F z5naez6{>Dk%nnOG5*$t1`%+&Yo`VBfEg=y}-*LU?5H29*9h)X*fBGf9p1auP!^iUS z@Wp%YA!l$as;P!1#np;y=8uW5jqQd4S5 zO{pn=&*GIoPs~!Tdp%fMB5n7-h{P*{nGA7dm>uf%=^@FOCM2BIPdrJT4z@t6Bu?O6 zjgRlCWF_Hwaj#*kuBD!hJ}1NfaG}s7CeBiINbg7oQ>|nWr{f4Wk1jdnu2JN~VAH{z zTVc@Cp-X*su3z2aow-jL&*aLIeD`USreM~mpCb|z`i(m_Z^H}Ej>V4hVg%~fg^`nn zGNRNI_ndUQSqZ{{K^(G(&6&*tF#{n-6WP=9sxW!X>saR;KrYi?Dxqs(Sj2&+_LYHw zQ9}gMQYvUOR*qS3e}zvbEy92%S$OKM>#<~e9=1jTc;e2xao5mcm_6fbL@EIz8pTVG zJ%RPPdr=4-H{EhGDBsS~pLSr={!$F?+7xd*bT7V``ITT>x-l4zoGtO^-#QYrE7z2oQd4S5O{pn|L-B%AUioyjHvZ3T2!)u_&4|w8U2qe#qW)Uh zxpOBD95~>idzdD~bR-{Zs=MU;X2$x)Z zE=!=Yl8j?BGVk8T^tk1TEGFAJJw5#weTcdS@!wezlii?-R7o3w2)_8@3rg#ZynA$^GwvK-2^w@`#1_64gUPyxb@6I zII?LrP9E4BTZ?nCynGLKHS7R?ztaGH7p^*?BfkH+07W{`t>1Cz*{%aBievl^TQ~lI zuI*YNt3hK{r0Cwe4}SPzEh3>DXrWp_xB$N5O=#Y{rBsD7SmTvmFA|9{58l<=*1Vex zp$t$H>MBa&eDiw`FIw*+_Ky8uo4;yGO{pn0rKZ%BKcoB_0?zTiRQ-}16FrYYyLar^fpzOj zQBeWRdFK_ZUcDNxzWOT1Otfp)4$GFUz_SlNh@nG=V$?C`GNsC?itsh5Uw!u3XUNIP z!TkBpBAlAVM)X~`-Nu`~4?g$+AJ3hM8*jW3w?A+X-;qN=Q>fpn+#2 z&Gj6OR`ZA*3W82T6>8JTR5@7Hyh7oKOc`Ed%h!~eQd4S5P5B!YFZ%AKK(jq&S@?e; WmIDV>P|$n;0000 [!NOTE] +>Microsoft Surface Dock Firmware Update supersedes the earlier Microsoft Surface Dock Updater tool, previously available for download as part of Surface Tools for IT. It was named Surface_Dock_Updater_vx.xx.xxx.x.msi (where x indicates the version of the tool). The earlier tool has been retired, is no longer available for download, and should not be used. + +## To run Surface Dock Firmware Update + +1. Download and install [Microsoft Surface Dock Firmware Update](https://www.microsoft.com/download/details.aspx?id=46703). + - The file is released in the following naming format: **Surface_Dock_FwUpdate_X.XX.XXX_Win10_XXXXX_XX.XXX.XXXXX_X.MSI** and installs by default to C:\Program Files\SurfaceUpdate. + +2. Click **Start > All Apps > Microsoft Surface Dock Updater.** After you connect Surface Dock to your Surface device, the tool checks the firmware status while running in the background. + +4. After several seconds, disconnect your Surface Dock from your device and then wait for 5 seconds before reconnecting. The Surface Dock Firmware Update will normally update the dock silently in background after you disconnect from the dock and reconnect. The process can take a few minutes to complete and will continue even if interrupted. + +### Manual installation +If preferred, you can manually complete the update as follows: + +- Reconnect your Surface Dock for 2 minutes and then disconnect it from your device. The DisplayPort firmware update will be installed while the hardware is disconnected. The LED in the Ethernet port of the dock will blink while the update is in progress. Please wait until the LED stops blinking before you unplug your Surface Dock from power. + +> [!NOTE] +> +> - Manually installing the MSI file may prompt you to restart Surface.; however, restarting >is optional and not required. +>- You will need to disconnect and reconnect the dock twice before the update fully completes. + +## Network deployment + +You can use Windows Installer commands (Msiexec.exe) to deploy Surface Dock Firmware Update to multiple devices across your network. When using System Center Configuration Manager or other deployment tool, enter the following syntax to ensure the installation is silent: + +- **Msiexec.exe /i /quiet /norestart** + +For more information, refer to [Command line options](https://docs.microsoft.com/en-us/windows/win32/msi/command-line-options) documentation. + +## How to verify completion of firmware update + +Surface dock firmware consists of two components: + +- **Component10:** Micro controller unit (MCU) firmware +- **Component20:** Display port (DP) firmware. + +Successful completion of Surface Dock Firmware Update results in new registry key values for these firmware components. + +**To verify updates:** + +1. Open Regedit and navigate to the following registry path: + +- **HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WUDF\Services\SurfaceDockFwUpdate\Parameters** + +2. Look for the registry keys: **Component10CurrentFwVersion and Component20CurrentFwVersion**, which refer to the firmware that is currently on the device. + + ![Surface Dock Firmware Update installation process](images/regeditDock.png) + +3. Verify the new registry key values match the updated registry key values listed below in the [Versions reference](#Surface-Dock-Firmware-Update-versions-reference). If the values match, the firmware was updated successfully. + +4. If unable to verify, review Event logging and Troubleshooting tips in the next section. + +## Event logging + +**Table 1. Event logging for Surface Dock Firmware Update** + +| Log | Location | Notes | +| -------------------------------- | -------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| Surface Dock Firmware Update log | /l*v %windir%\logs\ SurfaceDockFWI.log | Earlier versions of this tool wrote events to Applications and Services Logs\Microsoft Surface Dock Updater. | +| Windows Device Install log | %windir%\inf\ setupapi.dev.log | For more information about using Device Install Log, refer [to SetupAPI Logging](https://docs.microsoft.com/en-us/windows-hardware/drivers/install/setupapi-logging--windows-vista-and-later-) documentation. | + + +**Table 2. Event log IDs for Surface Dock Firmware Update** + +| Event ID | Event type | +| -------- | -------------------------------------------------------------------- | +| 2001 | Dock firmware update has started. | +| 2002 | Dock firmware update skipped because dock is known to be up to date. | +| 2003 | Dock firmware update failed to get firmware version. | +| 2004 | Querying the firmware version. | +| 2005 | Dock firmware failed to start update. | + +## Troubleshooting tips + +- Completely disconnect power for Surface dock from the AC power to reset the Surface Dock. +- Disconnect all peripherals except for the Surface Dock. +- Uninstall any current Surface Dock Firmware Update and then install the latest version. +- Ensure that the Surface Dock is disconnected, and then allow enough time for the update to complete as monitored via an LED in the Ethernet port of the dock. Wait until the LED stops blinking before you unplug Surface Dock from power. +- Connect the Surface Dock to a different device to see if it is able to update the dock. + +## Changes and updates + +Microsoft periodically releases new versions of Surface Dock Firmware Update. To update a Surface Dock to the latest firmware, you must use the latest version of Surface Dock Firmware Update. + +## Versions reference +### Version 1.42.139 +*Release Date: September 18 2019* + +This version, contained in Surface_Dock_FwUpdate_1.42.139_Win10_17134_19.084.31680_0.MSI, automatically updates firmware in the background. +**Updated registry key values:**
          + +- Component10CurrentFwVersion updated to **4ac3970**. +- Component20CurrentFwVersion updated to **4a1d570**. + +> [!NOTE] +>You can verify successful completion of Surface Dock Firmware Update by looking for these values in the Windows Registry, as described earlier in [How to verify completion of firmware update.](#How-to-verify-completion-of-firmware-update). + +## Legacy versions + +### Version 2.23.139.0 +*Release Date: 10 October 2018* + +This version of Surface Dock Updater adds support for the following: + +- Add support for Surface Pro 6 +- Add support for Surface Laptop 2 + + +### Version 2.22.139.0 +*Release Date: 26 July 2018* + +This version of Surface Dock Updater adds support for the following: + +- Increase update reliability +- Add support for Surface Go + +### Version 2.12.136.0 +*Release Date: 29 January 2018* + +This version of Surface Dock Updater adds support for the following: +* Update for Surface Dock Main Chipset Firmware +* Update for Surface Dock DisplayPort Firmware +* Improved display stability for external displays when used with Surface Book or Surface Book 2 + +Additionally, installation of this version of Surface Dock Updater on Surface Book devices includes the following: +* Update for Surface Book Base Firmware +* Added support for Surface Dock firmware updates with improvements targeted to Surface Book devices + + +### Version 2.9.136.0 +*Release date: November 3, 2017* + +This version of Surface Dock Updater adds support for the following: + +* Update for Surface Dock DisplayPort Firmware +* Resolves an issue with audio over passive display port adapters + +### Version 2.1.15.0 +*Release date: June 19, 2017* + +This version of Surface Dock Updater adds support for the following: + +* Surface Laptop +* Surface Pro + +### Version 2.1.6.0 +*Release date: April 7, 2017* + +This version of Surface Dock Updater adds support for the following: + +* Update for Surface Dock DisplayPort firmware +* Requires Windows 10 + +### Version 2.0.22.0 +*Release date: October 21, 2016* + +This version of Surface Dock Updater adds support for the following: + +* Update for Surface Dock USB firmware +* Improved reliability of Ethernet, audio, and USB ports + +### Version 1.0.8.0 +*Release date: April 26, 2016* + +This version of Surface Dock Updater adds support for the following: + +* Update for Surface Dock Main Chipset firmware +* Update for Surface Dock DisplayPort firmware + diff --git a/devices/surface/surface-wireless-connect.md b/devices/surface/surface-wireless-connect.md index fe1ff34fe6..eb53754fd6 100644 --- a/devices/surface/surface-wireless-connect.md +++ b/devices/surface/surface-wireless-connect.md @@ -75,7 +75,7 @@ Leave the roaming aggressiveness setting in the default state unless you’re en 1. Go to **Start > Control Panel** > **Network and Internet** > **Network and Sharing Center.** 2. Under **Connections** select **Wi-Fi** and then select **Properties.** 3. Select **Client for Microsoft Networks** and then select **Configure** -4. Select **Advanced** > **Roaming Aggressiveness** and choose ****your preferred value from the drop-down menu. +4. Select **Advanced** > **Roaming Aggressiveness** and choose your preferred value from the drop-down menu. ![* Roaming aggressiveness settings *](images/wifi-roaming.png)
          From f89ebf1c145123f100b011164a78378a72b0b60d Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Wed, 18 Sep 2019 08:31:22 -0700 Subject: [PATCH 267/285] Update change-history-for-surface.md --- devices/surface/change-history-for-surface.md | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/devices/surface/change-history-for-surface.md b/devices/surface/change-history-for-surface.md index ea290fea58..1a31102059 100644 --- a/devices/surface/change-history-for-surface.md +++ b/devices/surface/change-history-for-surface.md @@ -15,6 +15,13 @@ ms.topic: article This topic lists new and updated topics in the Surface documentation library. +## September 2019 + +| **New or changed topic** | **Description** | +| ------------------------ | --------------- | +| [Surface Dock Firmware Update](surface-dock-firmware-update.md)| New document for Microsoft Surface Dock Firmware Update, newly redesigned to automatically update Surface Dock firmware while running in the background on your Surface device.| + + ## August 2019 | **New or changed topic** | **Description** | From 32e8d73830c6ff502e61ba6d087b33f967ae2be4 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Wed, 18 Sep 2019 08:54:37 -0700 Subject: [PATCH 268/285] Update surface-dock-firmware-update.md --- devices/surface/surface-dock-firmware-update.md | 5 +---- 1 file changed, 1 insertion(+), 4 deletions(-) diff --git a/devices/surface/surface-dock-firmware-update.md b/devices/surface/surface-dock-firmware-update.md index 79808728a0..8302e15324 100644 --- a/devices/surface/surface-dock-firmware-update.md +++ b/devices/surface/surface-dock-firmware-update.md @@ -65,7 +65,7 @@ Successful completion of Surface Dock Firmware Update results in new registry ke ![Surface Dock Firmware Update installation process](images/regeditDock.png) -3. Verify the new registry key values match the updated registry key values listed below in the [Versions reference](#Surface-Dock-Firmware-Update-versions-reference). If the values match, the firmware was updated successfully. +3. Verify the new registry key values match the updated registry key values listed in the Versions reference at the end of this document. If the values match, the firmware was updated successfully. 4. If unable to verify, review Event logging and Troubleshooting tips in the next section. @@ -111,9 +111,6 @@ This version, contained in Surface_Dock_FwUpdate_1.42.139_Win10_17134_19.084.316 - Component10CurrentFwVersion updated to **4ac3970**. - Component20CurrentFwVersion updated to **4a1d570**. -> [!NOTE] ->You can verify successful completion of Surface Dock Firmware Update by looking for these values in the Windows Registry, as described earlier in [How to verify completion of firmware update.](#How-to-verify-completion-of-firmware-update). - ## Legacy versions ### Version 2.23.139.0 From d5695494b7477a02e639c17d458bd19820c52c71 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Wed, 18 Sep 2019 10:04:35 -0700 Subject: [PATCH 269/285] Moved the note to Description tags --- windows/client-management/mdm/policy-csp-bitlocker.md | 10 ++++------ 1 file changed, 4 insertions(+), 6 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-bitlocker.md b/windows/client-management/mdm/policy-csp-bitlocker.md index f160212054..04ca72d0c4 100644 --- a/windows/client-management/mdm/policy-csp-bitlocker.md +++ b/windows/client-management/mdm/policy-csp-bitlocker.md @@ -68,8 +68,10 @@ manager: dansimp Specifies the BitLocker Drive Encryption method and cipher strength. > [!NOTE] -> XTS-AES 128-bit and XTS-AES 256-bit values are only supported on Windows 10 for desktop. +> XTS-AES 128-bit and XTS-AES 256-bit values are supported only on Windows 10 for desktop. +> [!NOTE] +> To manage encryption of PCs and devices, use [BitLocker CSP](https://docs.microsoft.com/windows/client-management/mdm/bitlocker-csp). The following list shows the supported values: @@ -83,9 +85,6 @@ The following list shows the supported values:


          -> [!NOTE] -> To manage encryption of PCs and devices, use [BitLocker CSP](https://docs.microsoft.com/windows/client-management/mdm/bitlocker-csp) - Footnotes: - 1 - Added in Windows 10, version 1607. @@ -95,5 +94,4 @@ Footnotes: - 5 - Added in Windows 10, version 1809. - 6 - Added in Windows 10, version 1903. - - + \ No newline at end of file From 5ab8eb81c2081b809cb7fce4ea7127b007379785 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Wed, 18 Sep 2019 10:32:27 -0700 Subject: [PATCH 270/285] minor update --- windows/client-management/mdm/policy-csp-bitlocker.md | 2 -- 1 file changed, 2 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-bitlocker.md b/windows/client-management/mdm/policy-csp-bitlocker.md index 04ca72d0c4..74918de17c 100644 --- a/windows/client-management/mdm/policy-csp-bitlocker.md +++ b/windows/client-management/mdm/policy-csp-bitlocker.md @@ -13,8 +13,6 @@ manager: dansimp # Policy CSP - Bitlocker - -
          From c92ec8b5a90481ddc69dc3ce545255833e729926 Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Wed, 18 Sep 2019 10:43:05 -0700 Subject: [PATCH 271/285] updating metadata values in Edu topics --- .../change-history-ms-edu-get-started.md | 4 ++-- ...configure-microsoft-store-for-education.md | 4 ++-- .../get-started/enable-microsoft-teams.md | 4 ++-- .../finish-setup-and-other-tasks.md | 4 ++-- .../get-started-with-microsoft-education.md | 4 ++-- .../inclusive-classroom-it-admin.md | 4 ++-- .../set-up-office365-edu-tenant.md | 4 ++-- .../set-up-windows-10-education-devices.md | 4 ++-- .../set-up-windows-education-devices.md | 4 ++-- .../get-started/use-intune-for-education.md | 4 ++-- education/get-started/use-school-data-sync.md | 4 ++-- education/index.md | 6 ++--- .../educator-tib-get-started.md | 4 ++-- education/trial-in-a-box/index.md | 6 ++--- .../trial-in-a-box/itadmin-tib-get-started.md | 4 ++-- education/trial-in-a-box/support-options.md | 6 ++--- education/windows/autopilot-reset.md | 4 ++-- education/windows/change-history-edu.md | 4 ++-- education/windows/change-to-pro-education.md | 4 ++-- .../windows/chromebook-migration-guide.md | 4 ++-- .../configure-windows-for-education.md | 4 ++-- .../deploy-windows-10-in-a-school-district.md | 4 ++-- .../windows/deploy-windows-10-in-a-school.md | 4 ++-- .../windows/edu-deployment-recommendations.md | 4 ++-- .../education-scenarios-store-for-business.md | 6 ++--- .../enable-s-mode-on-surface-go-devices.md | 4 ++-- .../windows/get-minecraft-device-promotion.md | 6 ++--- .../windows/get-minecraft-for-education.md | 6 ++--- education/windows/index.md | 4 ++-- education/windows/s-mode-switch-to-edu.md | 6 ++--- education/windows/school-get-minecraft.md | 6 ++--- .../set-up-school-pcs-azure-ad-join.md | 22 ++++++++--------- .../set-up-school-pcs-provisioning-package.md | 24 +++++++++---------- .../set-up-school-pcs-shared-pc-mode.md | 24 +++++++++---------- .../windows/set-up-school-pcs-technical.md | 4 ++-- .../windows/set-up-school-pcs-whats-new.md | 24 +++++++++---------- .../set-up-students-pcs-to-join-domain.md | 4 ++-- .../windows/set-up-students-pcs-with-apps.md | 4 ++-- education/windows/set-up-windows-10.md | 4 ++-- .../windows/take-a-test-app-technical.md | 4 ++-- education/windows/take-a-test-multiple-pcs.md | 4 ++-- education/windows/take-a-test-single-pc.md | 4 ++-- education/windows/take-tests-in-windows-10.md | 4 ++-- education/windows/teacher-get-minecraft.md | 6 ++--- education/windows/test-windows10s-for-edu.md | 4 ++-- .../windows/use-set-up-school-pcs-app.md | 4 ++-- ...indows-editions-for-education-customers.md | 4 ++-- 47 files changed, 142 insertions(+), 142 deletions(-) diff --git a/education/get-started/change-history-ms-edu-get-started.md b/education/get-started/change-history-ms-edu-get-started.md index 5273dbe9ce..8524f4cf8b 100644 --- a/education/get-started/change-history-ms-edu-get-started.md +++ b/education/get-started/change-history-ms-edu-get-started.md @@ -6,8 +6,8 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: edu -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.date: 07/07/2017 ms.reviewer: manager: dansimp diff --git a/education/get-started/configure-microsoft-store-for-education.md b/education/get-started/configure-microsoft-store-for-education.md index 3047fe8d8d..3aedd8379c 100644 --- a/education/get-started/configure-microsoft-store-for-education.md +++ b/education/get-started/configure-microsoft-store-for-education.md @@ -8,8 +8,8 @@ ms.sitesec: library ms.topic: quickstart ms.localizationpriority: medium ms.pagetype: edu -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.date: 08/29/2017 ms.reviewer: manager: dansimp diff --git a/education/get-started/enable-microsoft-teams.md b/education/get-started/enable-microsoft-teams.md index 986a6c4af0..76b967ae75 100644 --- a/education/get-started/enable-microsoft-teams.md +++ b/education/get-started/enable-microsoft-teams.md @@ -8,8 +8,8 @@ ms.sitesec: library ms.topic: quickstart ms.localizationpriority: medium ms.pagetype: edu -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.date: 07/28/2017 ms.reviewer: manager: dansimp diff --git a/education/get-started/finish-setup-and-other-tasks.md b/education/get-started/finish-setup-and-other-tasks.md index 8633a400ed..f0bd720e51 100644 --- a/education/get-started/finish-setup-and-other-tasks.md +++ b/education/get-started/finish-setup-and-other-tasks.md @@ -8,8 +8,8 @@ ms.sitesec: library ms.topic: quickstart ms.localizationpriority: medium ms.pagetype: edu -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.date: 10/09/2017 ms.reviewer: manager: dansimp diff --git a/education/get-started/get-started-with-microsoft-education.md b/education/get-started/get-started-with-microsoft-education.md index 64cf56759a..e5347813d5 100644 --- a/education/get-started/get-started-with-microsoft-education.md +++ b/education/get-started/get-started-with-microsoft-education.md @@ -8,8 +8,8 @@ ms.sitesec: library ms.topic: article ms.localizationpriority: medium ms.pagetype: edu -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.date: 10/09/2017 ms.reviewer: manager: dansimp diff --git a/education/get-started/inclusive-classroom-it-admin.md b/education/get-started/inclusive-classroom-it-admin.md index d8c3f7273d..0cd250e3ff 100644 --- a/education/get-started/inclusive-classroom-it-admin.md +++ b/education/get-started/inclusive-classroom-it-admin.md @@ -9,8 +9,8 @@ ms.topic: article ms.localizationpriority: medium ms.pagetype: edu ROBOTS: noindex,nofollow -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.date: 06/12/2018 ms.reviewer: manager: dansimp diff --git a/education/get-started/set-up-office365-edu-tenant.md b/education/get-started/set-up-office365-edu-tenant.md index f0887073f7..64499de75e 100644 --- a/education/get-started/set-up-office365-edu-tenant.md +++ b/education/get-started/set-up-office365-edu-tenant.md @@ -8,8 +8,8 @@ ms.sitesec: library ms.topic: quickstart ms.localizationpriority: medium ms.pagetype: edu -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.date: 10/09/2017 ms.reviewer: manager: dansimp diff --git a/education/get-started/set-up-windows-10-education-devices.md b/education/get-started/set-up-windows-10-education-devices.md index 7bd5123140..2bcc88089c 100644 --- a/education/get-started/set-up-windows-10-education-devices.md +++ b/education/get-started/set-up-windows-10-education-devices.md @@ -8,8 +8,8 @@ ms.sitesec: library ms.topic: quickstart ms.localizationpriority: medium ms.pagetype: edu -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.date: 10/09/2017 ms.reviewer: manager: dansimp diff --git a/education/get-started/set-up-windows-education-devices.md b/education/get-started/set-up-windows-education-devices.md index cb83590354..a3175b1d1b 100644 --- a/education/get-started/set-up-windows-education-devices.md +++ b/education/get-started/set-up-windows-education-devices.md @@ -8,8 +8,8 @@ ms.sitesec: library ms.topic: quickstart ms.localizationpriority: medium ms.pagetype: edu -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.date: 07/28/2017 ms.reviewer: manager: dansimp diff --git a/education/get-started/use-intune-for-education.md b/education/get-started/use-intune-for-education.md index 1e6eac8cf8..e3e3be043a 100644 --- a/education/get-started/use-intune-for-education.md +++ b/education/get-started/use-intune-for-education.md @@ -8,8 +8,8 @@ ms.sitesec: library ms.topic: quickstart ms.localizationpriority: medium ms.pagetype: edu -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.date: 08/29/2017 ms.reviewer: manager: dansimp diff --git a/education/get-started/use-school-data-sync.md b/education/get-started/use-school-data-sync.md index 14a34bcda5..6ab9b54cba 100644 --- a/education/get-started/use-school-data-sync.md +++ b/education/get-started/use-school-data-sync.md @@ -8,8 +8,8 @@ ms.sitesec: library ms.topic: quickstart ms.localizationpriority: medium ms.pagetype: edu -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.date: 07/10/2017 ms.reviewer: manager: dansimp diff --git a/education/index.md b/education/index.md index 2bd9d1a152..c36a33ee36 100644 --- a/education/index.md +++ b/education/index.md @@ -1,11 +1,11 @@ ---- +--- layout: HubPage hide_bc: true title: Microsoft 365 Education documentation and resources | Microsoft Docs description: Learn about product documentation and resources available for school IT administrators, teachers, students, and education app developers. -author: CelesteDG +author: dansimp ms.topic: hub-page -ms.author: celested +ms.author: dansimp ms.collection: ITAdminEDU ms.date: 10/30/2017 ms.prod: w10 diff --git a/education/trial-in-a-box/educator-tib-get-started.md b/education/trial-in-a-box/educator-tib-get-started.md index 7c079f414b..aff8c085b5 100644 --- a/education/trial-in-a-box/educator-tib-get-started.md +++ b/education/trial-in-a-box/educator-tib-get-started.md @@ -9,8 +9,8 @@ ms.topic: article ms.localizationpriority: medium ms.pagetype: edu ROBOTS: noindex,nofollow -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.date: 03/18/2018 ms.reviewer: manager: dansimp diff --git a/education/trial-in-a-box/index.md b/education/trial-in-a-box/index.md index c91f1c0264..f21a0ddcf4 100644 --- a/education/trial-in-a-box/index.md +++ b/education/trial-in-a-box/index.md @@ -1,6 +1,6 @@ --- title: Microsoft Education Trial in a Box -description: For IT admins, educators, and students, discover what you can do with Microsoft 365 Education. Try it out with our Trial in a Box program. +description: For IT admins, educators, and students, discover what you can do with Microsoft 365 Education. Try it out with our Trial in a Box program. keywords: education, Microsoft 365 Education, trial, full cloud IT solution, school, deploy, setup, IT admin, educator, student, explore, Trial in a Box ms.prod: w10 ms.mktglfcycl: deploy @@ -9,8 +9,8 @@ ms.topic: article ms.localizationpriority: medium ms.pagetype: edu ROBOTS: noindex,nofollow -author: CelesteDG -ms.author: celested +author: dansimp +ms.author: dansimp ms.date: 12/11/2017 --- diff --git a/education/trial-in-a-box/itadmin-tib-get-started.md b/education/trial-in-a-box/itadmin-tib-get-started.md index 04b239b53b..1965c6abf7 100644 --- a/education/trial-in-a-box/itadmin-tib-get-started.md +++ b/education/trial-in-a-box/itadmin-tib-get-started.md @@ -9,8 +9,8 @@ ms.topic: quickstart ms.localizationpriority: medium ms.pagetype: edu ROBOTS: noindex,nofollow -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.date: 03/18/2018 ms.reviewer: manager: dansimp diff --git a/education/trial-in-a-box/support-options.md b/education/trial-in-a-box/support-options.md index b377719a91..9cb32351de 100644 --- a/education/trial-in-a-box/support-options.md +++ b/education/trial-in-a-box/support-options.md @@ -1,6 +1,6 @@ --- title: Microsoft Education Trial in a Box Support -description: Need help or have a question about using Microsoft Education Trial in a Box? Start here. +description: Need help or have a question about using Microsoft Education Trial in a Box? Start here. keywords: support, troubleshooting, education, Microsoft 365 Education, full cloud IT solution, school, deploy, setup, manage, Windows 10, Intune for Education, Office 365 for Education, Microsoft Store for Education, Set up School PCs ms.prod: w10 ms.mktglfcycl: deploy @@ -9,8 +9,8 @@ ms.topic: article ms.localizationpriority: medium ms.pagetype: edu ROBOTS: noindex,nofollow -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.date: 03/18/2018 ms.reviewer: manager: dansimp diff --git a/education/windows/autopilot-reset.md b/education/windows/autopilot-reset.md index 2c11c122c4..ecc1f3f77c 100644 --- a/education/windows/autopilot-reset.md +++ b/education/windows/autopilot-reset.md @@ -7,8 +7,8 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: edu ms.localizationpriority: medium -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.date: 06/27/2018 ms.reviewer: manager: dansimp diff --git a/education/windows/change-history-edu.md b/education/windows/change-history-edu.md index b3dd38357b..9302c8fdb4 100644 --- a/education/windows/change-history-edu.md +++ b/education/windows/change-history-edu.md @@ -6,8 +6,8 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: edu -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.date: 05/21/2019 ms.reviewer: manager: dansimp diff --git a/education/windows/change-to-pro-education.md b/education/windows/change-to-pro-education.md index af1534d6a3..e40ce61ea7 100644 --- a/education/windows/change-to-pro-education.md +++ b/education/windows/change-to-pro-education.md @@ -7,8 +7,8 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: edu ms.localizationpriority: medium -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.date: 05/21/2019 ms.reviewer: manager: dansimp diff --git a/education/windows/chromebook-migration-guide.md b/education/windows/chromebook-migration-guide.md index 9769d7a3bf..051954b11f 100644 --- a/education/windows/chromebook-migration-guide.md +++ b/education/windows/chromebook-migration-guide.md @@ -10,8 +10,8 @@ ms.mktglfcycl: plan ms.sitesec: library ms.pagetype: edu, devices ms.localizationpriority: medium -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.date: 10/13/2017 --- diff --git a/education/windows/configure-windows-for-education.md b/education/windows/configure-windows-for-education.md index 1cb747217a..688b66c92b 100644 --- a/education/windows/configure-windows-for-education.md +++ b/education/windows/configure-windows-for-education.md @@ -7,8 +7,8 @@ ms.sitesec: library ms.prod: w10 ms.pagetype: edu ms.localizationpriority: medium -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.date: 08/31/2017 ms.reviewer: manager: dansimp diff --git a/education/windows/deploy-windows-10-in-a-school-district.md b/education/windows/deploy-windows-10-in-a-school-district.md index 027127211f..43b68e46ad 100644 --- a/education/windows/deploy-windows-10-in-a-school-district.md +++ b/education/windows/deploy-windows-10-in-a-school-district.md @@ -7,8 +7,8 @@ ms.mktglfcycl: plan ms.pagetype: edu ms.sitesec: library ms.localizationpriority: medium -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.reviewer: manager: dansimp --- diff --git a/education/windows/deploy-windows-10-in-a-school.md b/education/windows/deploy-windows-10-in-a-school.md index ed3de28f37..3cfeafb6d3 100644 --- a/education/windows/deploy-windows-10-in-a-school.md +++ b/education/windows/deploy-windows-10-in-a-school.md @@ -7,8 +7,8 @@ ms.mktglfcycl: plan ms.pagetype: edu ms.sitesec: library ms.localizationpriority: medium -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.reviewer: manager: dansimp --- diff --git a/education/windows/edu-deployment-recommendations.md b/education/windows/edu-deployment-recommendations.md index cb30050aa8..1f3bcffff3 100644 --- a/education/windows/edu-deployment-recommendations.md +++ b/education/windows/edu-deployment-recommendations.md @@ -5,8 +5,8 @@ keywords: Windows 10 deployment, recommendations, privacy settings, school ms.mktglfcycl: plan ms.sitesec: library ms.localizationpriority: medium -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.date: 10/13/2017 ms.reviewer: manager: dansimp diff --git a/education/windows/education-scenarios-store-for-business.md b/education/windows/education-scenarios-store-for-business.md index 5598256e19..3149237ba1 100644 --- a/education/windows/education-scenarios-store-for-business.md +++ b/education/windows/education-scenarios-store-for-business.md @@ -6,10 +6,10 @@ ms.prod: w10 ms.mktglfcycl: plan ms.sitesec: library ms.localizationpriority: medium -searchScope: +searchScope: - Store -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.date: 03/30/2018 ms.reviewer: manager: dansimp diff --git a/education/windows/enable-s-mode-on-surface-go-devices.md b/education/windows/enable-s-mode-on-surface-go-devices.md index 0862548ea6..0b7fc8c617 100644 --- a/education/windows/enable-s-mode-on-surface-go-devices.md +++ b/education/windows/enable-s-mode-on-surface-go-devices.md @@ -7,8 +7,8 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: edu ms.localizationpriority: medium -author: levinec -ms.author: ellevin +author: dansimp +ms.author: dansimp ms.date: 07/30/2018 ms.reviewer: manager: dansimp diff --git a/education/windows/get-minecraft-device-promotion.md b/education/windows/get-minecraft-device-promotion.md index 4864b6d4a0..bafc4ed6ae 100644 --- a/education/windows/get-minecraft-device-promotion.md +++ b/education/windows/get-minecraft-device-promotion.md @@ -6,10 +6,10 @@ ms.prod: w10 ms.mktglfcycl: plan ms.sitesec: library ms.localizationpriority: medium -author: levinec -searchScope: +author: dansimp +searchScope: - Store -ms.author: ellevin +ms.author: dansimp ms.date: 06/05/2018 ms.reviewer: manager: dansimp diff --git a/education/windows/get-minecraft-for-education.md b/education/windows/get-minecraft-for-education.md index 0908c78b04..7037b5ce14 100644 --- a/education/windows/get-minecraft-for-education.md +++ b/education/windows/get-minecraft-for-education.md @@ -6,10 +6,10 @@ ms.prod: w10 ms.mktglfcycl: plan ms.sitesec: library ms.localizationpriority: medium -author: levinec -searchScope: +author: dansimp +searchScope: - Store -ms.author: ellevin +ms.author: dansimp ms.date: 01/29/2019 ms.reviewer: manager: dansimp diff --git a/education/windows/index.md b/education/windows/index.md index 80684834ef..b40b009575 100644 --- a/education/windows/index.md +++ b/education/windows/index.md @@ -7,8 +7,8 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: edu ms.localizationpriority: medium -author: CelesteDG -ms.author: celested +author: dansimp +ms.author: dansimp ms.date: 10/13/2017 --- diff --git a/education/windows/s-mode-switch-to-edu.md b/education/windows/s-mode-switch-to-edu.md index 845f97f0c9..4860249e19 100644 --- a/education/windows/s-mode-switch-to-edu.md +++ b/education/windows/s-mode-switch-to-edu.md @@ -1,6 +1,6 @@ --- title: Switch to Windows 10 Pro Education in S mode from Windows 10 Pro in S mode -description: Switching out of Windows 10 Pro in S mode to Windows 10 Pro Education in S mode. The S mode switch documentation describes the requirements and process for Switching to Windows 10 Pro Education in S mode. +description: Switching out of Windows 10 Pro in S mode to Windows 10 Pro Education in S mode. The S mode switch documentation describes the requirements and process for Switching to Windows 10 Pro Education in S mode. keywords: Windows 10 S switch, S mode Switch, switch in S mode, Switch S mode, Windows 10 Pro Education in S mode, S mode, system requirements, Overview, Windows 10 Pro in S mode, Education, EDU ms.mktglfcycl: deploy ms.localizationpriority: medium @@ -10,8 +10,8 @@ ms.pagetype: edu ms.date: 12/03/2018 ms.reviewer: manager: dansimp -ms.author: macapara -author: mjcaparas +ms.author: dansimp +author: dansimp --- # Switch to Windows 10 Pro Education in S mode from Windows 10 Pro in S mode diff --git a/education/windows/school-get-minecraft.md b/education/windows/school-get-minecraft.md index 00a5baee8a..515bfff44f 100644 --- a/education/windows/school-get-minecraft.md +++ b/education/windows/school-get-minecraft.md @@ -6,10 +6,10 @@ ms.prod: w10 ms.mktglfcycl: plan ms.sitesec: library ms.localizationpriority: medium -author: levinec -searchScope: +author: dansimp +searchScope: - Store -ms.author: ellevin +ms.author: dansimp ms.date: 01/30/2019 ms.reviewer: manager: dansimp diff --git a/education/windows/set-up-school-pcs-azure-ad-join.md b/education/windows/set-up-school-pcs-azure-ad-join.md index 7b8f55bb14..6d62b6bb55 100644 --- a/education/windows/set-up-school-pcs-azure-ad-join.md +++ b/education/windows/set-up-school-pcs-azure-ad-join.md @@ -1,14 +1,14 @@ ---- -title: Azure AD Join with Set up School PCs app -description: Describes how Azure AD Join is configured in the Set up School PCs app. -keywords: shared cart, shared PC, school, set up school pcs -ms.prod: w10 -ms.mktglfcycl: plan -ms.sitesec: library -ms.pagetype: edu -ms.localizationpriority: medium -author: levinec -ms.author: ellevin +--- +title: Azure AD Join with Set up School PCs app +description: Describes how Azure AD Join is configured in the Set up School PCs app. +keywords: shared cart, shared PC, school, set up school pcs +ms.prod: w10 +ms.mktglfcycl: plan +ms.sitesec: library +ms.pagetype: edu +ms.localizationpriority: medium +author: dansimp +ms.author: dansimp ms.date: 01/11/2019 ms.reviewer: manager: dansimp diff --git a/education/windows/set-up-school-pcs-provisioning-package.md b/education/windows/set-up-school-pcs-provisioning-package.md index 48a2aa9549..12bbf4fc89 100644 --- a/education/windows/set-up-school-pcs-provisioning-package.md +++ b/education/windows/set-up-school-pcs-provisioning-package.md @@ -1,15 +1,15 @@ ---- -title: What's in Set up School PCs provisioning package -description: Lists the provisioning package settings that are configured in the Set up School PCs app. -keywords: shared cart, shared PC, school, set up school pcs -ms.prod: w10 -ms.mktglfcycl: plan -ms.sitesec: library -ms.pagetype: edu -ms.localizationpriority: medium -author: mjcaparas -ms.author: macapara -ms.date: 10/17/2018 +--- +title: What's in Set up School PCs provisioning package +description: Lists the provisioning package settings that are configured in the Set up School PCs app. +keywords: shared cart, shared PC, school, set up school pcs +ms.prod: w10 +ms.mktglfcycl: plan +ms.sitesec: library +ms.pagetype: edu +ms.localizationpriority: medium +author: dansimp +ms.author: dansimp +ms.date: 10/17/2018 ms.reviewer: manager: dansimp --- diff --git a/education/windows/set-up-school-pcs-shared-pc-mode.md b/education/windows/set-up-school-pcs-shared-pc-mode.md index 50b01da4f3..2ac3eb11d0 100644 --- a/education/windows/set-up-school-pcs-shared-pc-mode.md +++ b/education/windows/set-up-school-pcs-shared-pc-mode.md @@ -1,15 +1,15 @@ ---- -title: Shared PC mode for school devices -description: Describes how shared PC mode is set for devices set up with the Set up School PCs app. -keywords: shared cart, shared PC, school, set up school pcs -ms.prod: w10 -ms.mktglfcycl: plan -ms.sitesec: library -ms.pagetype: edu -ms.localizationpriority: medium -author: mjcaparas -ms.author: macapara -ms.date: 07/13/2018 +--- +title: Shared PC mode for school devices +description: Describes how shared PC mode is set for devices set up with the Set up School PCs app. +keywords: shared cart, shared PC, school, set up school pcs +ms.prod: w10 +ms.mktglfcycl: plan +ms.sitesec: library +ms.pagetype: edu +ms.localizationpriority: medium +author: dansimp +ms.author: dansimp +ms.date: 07/13/2018 ms.reviewer: manager: dansimp --- diff --git a/education/windows/set-up-school-pcs-technical.md b/education/windows/set-up-school-pcs-technical.md index ab45a9f0a7..67c378fb9f 100644 --- a/education/windows/set-up-school-pcs-technical.md +++ b/education/windows/set-up-school-pcs-technical.md @@ -7,8 +7,8 @@ ms.mktglfcycl: plan ms.sitesec: library ms.pagetype: edu ms.localizationpriority: medium -author: mjcaparas -ms.author: macapara +author: dansimp +ms.author: dansimp ms.date: 07/11/2018 ms.reviewer: manager: dansimp diff --git a/education/windows/set-up-school-pcs-whats-new.md b/education/windows/set-up-school-pcs-whats-new.md index 546e8c7831..fa888ab81c 100644 --- a/education/windows/set-up-school-pcs-whats-new.md +++ b/education/windows/set-up-school-pcs-whats-new.md @@ -1,15 +1,15 @@ ---- -title: What's new in the Windows Set up School PCs app -description: Find out about app updates and new features in Set up School PCs. -keywords: shared cart, shared PC, school, set up school pcs -ms.prod: w10 -ms.mktglfcycl: plan -ms.sitesec: library -ms.pagetype: edu -ms.localizationpriority: medium -author: mjcaparas -ms.author: macapara -ms.date: 08/15/2019 +--- +title: What's new in the Windows Set up School PCs app +description: Find out about app updates and new features in Set up School PCs. +keywords: shared cart, shared PC, school, set up school pcs +ms.prod: w10 +ms.mktglfcycl: plan +ms.sitesec: library +ms.pagetype: edu +ms.localizationpriority: medium +author: dansimp +ms.author: dansimp +ms.date: 08/15/2019 ms.reviewer: manager: dansimp --- diff --git a/education/windows/set-up-students-pcs-to-join-domain.md b/education/windows/set-up-students-pcs-to-join-domain.md index 3842e9d435..0ebe308f14 100644 --- a/education/windows/set-up-students-pcs-to-join-domain.md +++ b/education/windows/set-up-students-pcs-to-join-domain.md @@ -6,8 +6,8 @@ ms.prod: w10 ms.mktglfcycl: plan ms.sitesec: library ms.localizationpriority: medium -author: mjcaparas -ms.author: macapara +author: dansimp +ms.author: dansimp ms.date: 07/27/2017 ms.reviewer: manager: dansimp diff --git a/education/windows/set-up-students-pcs-with-apps.md b/education/windows/set-up-students-pcs-with-apps.md index 8f09eb0561..c711403393 100644 --- a/education/windows/set-up-students-pcs-with-apps.md +++ b/education/windows/set-up-students-pcs-with-apps.md @@ -7,8 +7,8 @@ ms.pagetype: edu ms.mktglfcycl: plan ms.sitesec: library ms.localizationpriority: medium -author: mjcaparas -ms.author: macapara +author: dansimp +ms.author: dansimp ms.date: 10/13/2017 ms.reviewer: manager: dansimp diff --git a/education/windows/set-up-windows-10.md b/education/windows/set-up-windows-10.md index 1f8eb4eb0f..b401df97ef 100644 --- a/education/windows/set-up-windows-10.md +++ b/education/windows/set-up-windows-10.md @@ -7,8 +7,8 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: edu ms.localizationpriority: medium -author: mjcaparas -ms.author: macapara +author: dansimp +ms.author: dansimp ms.date: 07/27/2017 ms.reviewer: manager: dansimp diff --git a/education/windows/take-a-test-app-technical.md b/education/windows/take-a-test-app-technical.md index 7106de6cfd..9f006e7a88 100644 --- a/education/windows/take-a-test-app-technical.md +++ b/education/windows/take-a-test-app-technical.md @@ -7,8 +7,8 @@ ms.mktglfcycl: plan ms.sitesec: library ms.pagetype: edu ms.localizationpriority: medium -author: mjcaparas -ms.author: macapara +author: dansimp +ms.author: dansimp ms.date: 11/28/2017 ms.reviewer: manager: dansimp diff --git a/education/windows/take-a-test-multiple-pcs.md b/education/windows/take-a-test-multiple-pcs.md index ac67906e9b..c49e6ea21f 100644 --- a/education/windows/take-a-test-multiple-pcs.md +++ b/education/windows/take-a-test-multiple-pcs.md @@ -7,8 +7,8 @@ ms.mktglfcycl: plan ms.sitesec: library ms.pagetype: edu ms.localizationpriority: medium -author: mjcaparas -ms.author: macapara +author: dansimp +ms.author: dansimp ms.date: 11/08/2017 ms.reviewer: manager: dansimp diff --git a/education/windows/take-a-test-single-pc.md b/education/windows/take-a-test-single-pc.md index bb20a3760e..41fbb7b7fd 100644 --- a/education/windows/take-a-test-single-pc.md +++ b/education/windows/take-a-test-single-pc.md @@ -7,8 +7,8 @@ ms.mktglfcycl: plan ms.sitesec: library ms.pagetype: edu ms.localizationpriority: medium -author: mjcaparas -ms.author: macapara +author: dansimp +ms.author: dansimp ms.date: 11/08/2017 ms.reviewer: manager: dansimp diff --git a/education/windows/take-tests-in-windows-10.md b/education/windows/take-tests-in-windows-10.md index cad3303266..4ff027e388 100644 --- a/education/windows/take-tests-in-windows-10.md +++ b/education/windows/take-tests-in-windows-10.md @@ -7,8 +7,8 @@ ms.mktglfcycl: plan ms.sitesec: library ms.pagetype: edu ms.localizationpriority: medium -author: mjcaparas -ms.author: macapara +author: dansimp +ms.author: dansimp ms.date: 10/16/2017 ms.reviewer: manager: dansimp diff --git a/education/windows/teacher-get-minecraft.md b/education/windows/teacher-get-minecraft.md index 838aa85226..501e3f3249 100644 --- a/education/windows/teacher-get-minecraft.md +++ b/education/windows/teacher-get-minecraft.md @@ -6,10 +6,10 @@ ms.prod: w10 ms.mktglfcycl: plan ms.sitesec: library ms.localizationpriority: medium -author: mjcaparas -searchScope: +author: dansimp +searchScope: - Store -ms.author: macapara +ms.author: dansimp ms.date: 01/05/2018 ms.reviewer: manager: dansimp diff --git a/education/windows/test-windows10s-for-edu.md b/education/windows/test-windows10s-for-edu.md index 1ec8ad81a4..2b64a32bd1 100644 --- a/education/windows/test-windows10s-for-edu.md +++ b/education/windows/test-windows10s-for-edu.md @@ -7,8 +7,8 @@ ms.prod: w10 ms.pagetype: edu ms.sitesec: library ms.localizationpriority: medium -author: mjcaparas -ms.author: macapara +author: dansimp +ms.author: dansimp ms.date: 07/30/2019 ms.reviewer: manager: dansimp diff --git a/education/windows/use-set-up-school-pcs-app.md b/education/windows/use-set-up-school-pcs-app.md index 1af547f463..3f31119391 100644 --- a/education/windows/use-set-up-school-pcs-app.md +++ b/education/windows/use-set-up-school-pcs-app.md @@ -7,8 +7,8 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: edu ms.localizationpriority: medium -author: mjcaparas -ms.author: macapara +author: dansimp +ms.author: dansimp ms.date: 10/23/2018 ms.reviewer: manager: dansimp diff --git a/education/windows/windows-editions-for-education-customers.md b/education/windows/windows-editions-for-education-customers.md index 52a4aa6bb6..80555a4b90 100644 --- a/education/windows/windows-editions-for-education-customers.md +++ b/education/windows/windows-editions-for-education-customers.md @@ -7,8 +7,8 @@ ms.mktglfcycl: plan ms.sitesec: library ms.pagetype: edu ms.localizationpriority: medium -author: mjcaparas -ms.author: macapara +author: dansimp +ms.author: dansimp ms.date: 05/21/2019 ms.reviewer: manager: dansimp From 60802a0dbfb8333ad7853d2e4085c44168fc4168 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Wed, 18 Sep 2019 11:03:15 -0700 Subject: [PATCH 272/285] updates --- devices/surface/index.md | 2 +- .../surface/surface-dock-firmware-update.md | 3 +- devices/surface/surface-dock-updater.md | 199 ------------------ 3 files changed, 3 insertions(+), 201 deletions(-) delete mode 100644 devices/surface/surface-dock-updater.md diff --git a/devices/surface/index.md b/devices/surface/index.md index 954ff4b4b6..8a40146adb 100644 --- a/devices/surface/index.md +++ b/devices/surface/index.md @@ -116,7 +116,7 @@ description: Learn about Microsoft Surface and Surface Hub devices.

          Learn

          Surface training on Microsoft Learn

          Microsoft Mechanics Surface videos

          -

          Surface Hub 2S adoption and training

          +

          Surface Hub 2S adoption and training

          diff --git a/devices/surface/surface-dock-firmware-update.md b/devices/surface/surface-dock-firmware-update.md index 8302e15324..9bd53be6c1 100644 --- a/devices/surface/surface-dock-firmware-update.md +++ b/devices/surface/surface-dock-firmware-update.md @@ -1,7 +1,7 @@ --- title: Microsoft Surface Dock Firmware Update description: This article explains how to use Microsoft Surface Dock Firmware Update, newly redesigned to automatically update Surface Dock firmware while running in the background on your Surface device. -ms.localizationpriority: medium +ms.localizationpriority: normal ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library @@ -11,6 +11,7 @@ ms.topic: article ms.date: 09/18/2019 ms.reviewer: scottmca manager: dansimp +ms.audience: itpro --- # Microsoft Surface Dock Firmware Update diff --git a/devices/surface/surface-dock-updater.md b/devices/surface/surface-dock-updater.md deleted file mode 100644 index 89e26f6db0..0000000000 --- a/devices/surface/surface-dock-updater.md +++ /dev/null @@ -1,199 +0,0 @@ ---- -title: Microsoft Surface Dock Updater (Surface) -description: This article provides a detailed walkthrough of Microsoft Surface Dock Updater. -ms.assetid: 1FEFF277-F7D1-4CB4-8898-FDFE8CBE1D5C -ms.reviewer: -manager: dansimp -keywords: install, update, firmware -ms.localizationpriority: medium -ms.prod: w10 -ms.mktglfcycl: manage -ms.pagetype: surface, devices -ms.sitesec: library -author: dansimp -ms.date: 02/23/2018 -ms.author: dansimp -ms.topic: article ---- - -# Microsoft Surface Dock Updater - - -This article provides a detailed walkthrough of Microsoft Surface Dock Updater. - -The [Microsoft Surface Dock Updater](https://www.microsoft.com/download/details.aspx?id=46703) tool allows you to check the firmware status of a Surface Dock and to manually update the firmware of Surface Dock devices. It is most often used to update Surface Docks prior to deployment of those Surface Docks to end users or as a troubleshooting tool. Microsoft Surface Dock Updater walks you through the process of updating the firmware on one or more Surface Docks, including the required connect and disconnect steps to perform the complete firmware installation. - -When you run the Microsoft Surface Dock Updater installer you will be prompted to accept an End User License Agreement (EULA). - ->[!NOTE] ->Updating Surface Dock firmware requires connectivity to the Surface Dock via the Surface Connect™ port. Installation of the Microsoft Surface Dock Updater is only supported on devices that feature the Surface Connect™ port. - ->[!NOTE] ->The Surface Dock Updater tool is unable to run on Windows 10 S. To manually update a Surface Dock for use with Surface Laptop and Windows 10 S, connect the Surface Dock to another Surface device with a Windows 10 Pro or Windows 10 Enterprise environment. - -## Update a Surface Dock with Microsoft Surface Dock Updater - - -After you install the [Microsoft Surface Dock Updater](https://www.microsoft.com/download/details.aspx?id=46703) tool, you can find Microsoft Surface Dock Updater under **All Apps** in your Start menu. Click **Microsoft Surface Dock Updater** to start the application. - -To update a Surface Dock with Microsoft Surface Dock Updater, follow these steps: - -1. Click Start to begin the firmware update process. If you do not have a Surface Dock connected, you will be prompted to connect a Surface Dock. - -2. Microsoft Surface Dock Updater checks the status of your Surface Dock firmware. - - - If the tool determines that the firmware of your Surface Dock is up to date, a **You have the latest firmware for this Surface Dock** message is displayed, as shown in Figure 1. - - ![Screen that shows your Surface Dock firmware is up to date](images/surfacedockupdater-fig1-uptodate-568pix.png "Screen that shows your Surface Dock firmware is up to date") - - *Figure 1. Your Surface Dock firmware is up to date* - - - If Microsoft Surface Dock Updater determines that the firmware of your Surface Dock is not up to date, a **This Surface Dock is not running the latest firmware** message is displayed, as shown in Figure 2. - - ![Screen that shows your Surface Dock firmware needs to be updated](images/surfacedockupdater-fig2a-needsupdating.png "Screen that shows your Surface Dock firmware needs to be updated") - - *Figure 2. Your Surface Dock firmware needs to be updated* - -3. To begin the firmware update process, click **Update** on the **Surface Dock Firmware** page. - -4. Before the firmware update process begins, you will be prompted for confirmation. Click **OK** to proceed or **Cancel** to return to the **Surface Dock Firmware** page displaying the status of your Surface Dock firmware. - -5. As the firmware update is uploaded to the Surface Dock, a **Progress** page is displayed, as shown in Figure 3. Do not disconnect the Surface Dock while firmware is being uploaded. - - ![Progress of firmware update upload](images/surfacedockupdater-fig3-progress.png "Progress of firmware update upload") - - *Figure 3. Progress of firmware update upload to Surface Dock* - -6. After the firmware update has successfully uploaded to the Surface Dock, you are prompted to disconnect and then reconnect the Surface Dock from the Surface device, as shown in Figure 4. The main chipset firmware update will be applied while the Surface Dock is disconnected. - - ![Disconnect and reconnect Surface Dock when prompted](images/surfacedockupdater-fig4-disconnect.png "Disconnect and reconnect Surface Dock when prompted") - - *Figure 4. Disconnect and reconnect Surface Dock when prompted* - -7. When the main chipset firmware update is verified, the DisplayPort chipset firmware update will be uploaded to the Surface Dock. Upon completion, a **Success** page is displayed and you will again be prompted to disconnect the Surface Dock, as shown in Figure 5. - - ![Screen showing successful upload](images/surfacedockupdater-fig5-success.png "Screen showing successful upload") - - *Figure 5. Successful upload of Surface Dock firmware* - -8. After you disconnect the Surface Dock the DisplayPort firmware update will be installed. This process occurs on the Surface Dock hardware while it is disconnected. The Surface Dock must remain powered for up to 3 minutes after it has been disconnected for the firmware update to successfully install. An **Update in Progress** page is displayed (as shown in Figure 6), with a countdown timer to show the estimated time remaining to complete the firmware update installation. - - ![Countdown timer to complete firmware installation](images/surfacedockupdater-fig6-countdown.png "Countdown timer to complete firmware installation") - - *Figure 6. Countdown timer to complete firmware installation on Surface Dock* - -9. If you want to update multiple Surface Docks in one sitting, you can click the **Update another Surface Dock** button to begin the process on the next Surface Dock. - - >[!NOTE] - >The LED in the Ethernet port of the dock will blink while the update is in progress. Please wait until the LED stops blinking before you unplug your Surface Dock from power. - -   - -## Troubleshooting Microsoft Surface Dock Updater - - -If the Surface Dock firmware update process encounters an installation error with either firmware update, the **Encountered an unexpected error** page may be displayed, as shown in Figure 7. - -![Firmware update installation error](images/surfacedockupdater-fig7-error.png "Firmware update installation error") - -*Figure 7. Firmware update installation has encountered an error* - -Microsoft Surface Dock Updater logs its progress into the Event Log, as shown in Figure 8. If you need to troubleshoot an update through this tool, you will find Surface Dock events recorded with the following event IDs: - -| Event ID | Event type | -|----------|----------------------------------------------------------| -| 12100 | Up-to-date confirmation | -| 12101 | Event in the main chipset firmware update process | -| 12102 | Event in the DisplayPort chipset firmware update process | -| 12105 | Error | - - -![Surface Dock Updater events in Event Viewer](images/surfacedockupdater-fig8-737test.png "Surface Dock Updater events in Event Viewer") - -*Figure 8. Surface Dock Updater events in Event Viewer* - -## Changes and updates - -Microsoft periodically updates Surface Dock Updater. - ->[!Note] ->Each update to Surface Dock firmware is included in a new version of Surface Dock Updater. To update a Surface Dock to the latest firmware, you must use the latest version of Surface Dock Updater. - -### Version 2.23.139.0 -*Release Date: 10 October 2018* - -This version of Surface Dock Updater adds support for the following: - -- Add support for Surface Pro 6 -- Add support for Surface Laptop 2 - - -### Version 2.22.139.0 -*Release Date: 26 July 2018* - -This version of Surface Dock Updater adds support for the following: - -- Increase update reliability -- Add support for Surface Go - -### Version 2.12.136.0 -*Release Date: 29 January 2018* - -This version of Surface Dock Updater adds support for the following: -* Update for Surface Dock Main Chipset Firmware -* Update for Surface Dock DisplayPort Firmware -* Improved display stability for external displays when used with Surface Book or Surface Book 2 - -Additionally, installation of this version of Surface Dock Updater on Surface Book devices includes the following: -* Update for Surface Book Base Firmware -* Added support for Surface Dock firmware updates with improvements targeted to Surface Book devices - ->[!Note] ->Before the Surface Dock firmware update applied by Surface Dock Updater v2.12.136.0 will take effect on a Surface Book device, a firmware update for the Surface Book Base is required. If you install Surface Dock Updater v2.12.136.0 on a Surface Book and update an attached Surface Dock from that same device, the firmware of the Surface Book Base will automatically be updated when installing the Surface Dock Updater. However, if you update a Surface Dock using Surface Dock Updater v2.12.136.0 on different device, and then connect that Surface Dock to a Surface Book where Surface Dock Updater v2.12.136.0 has not been installed, the benefits of the updated Surface Dock will not be enabled. To enable the benefits of the updated Surface Dock on a Surface Book device, Surface Book Base firmware must also be updated by installing Surface Dock Updater v2.12.136.0 on the Surface Book device. Surface Book Base firmware update is not required on a Surface Book 2 device. - - -### Version 2.9.136.0 -*Release date: November 3, 2017* - -This version of Surface Dock Updater adds support for the following: - -* Update for Surface Dock DisplayPort Firmware -* Resolves an issue with audio over passive display port adapters - -### Version 2.1.15.0 -*Release date: June 19, 2017* - -This version of Surface Dock Updater adds support for the following: - -* Surface Laptop -* Surface Pro - -### Version 2.1.6.0 -*Release date: April 7, 2017* - -This version of Surface Dock Updater adds support for the following: - -* Update for Surface Dock DisplayPort firmware -* Requires Windows 10 - -### Version 2.0.22.0 -*Release date: October 21, 2016* - -This version of Surface Dock Updater adds support for the following: - -* Update for Surface Dock USB firmware -* Improved reliability of Ethernet, audio, and USB ports - -### Version 1.0.8.0 -*Release date: April 26, 2016* - -This version of Surface Dock Updater adds support for the following: - -* Update for Surface Dock Main Chipset firmware -* Update for Surface Dock DisplayPort firmware - - - - - - From fa988984825568f8ac5f1b5a5ae7c3fb0dd00b38 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Wed, 18 Sep 2019 11:23:32 -0700 Subject: [PATCH 273/285] Updates --- devices/surface/change-history-for-surface.md | 8 -------- devices/surface/update.md | 2 +- 2 files changed, 1 insertion(+), 9 deletions(-) diff --git a/devices/surface/change-history-for-surface.md b/devices/surface/change-history-for-surface.md index 1a31102059..5e115df5df 100644 --- a/devices/surface/change-history-for-surface.md +++ b/devices/surface/change-history-for-surface.md @@ -96,7 +96,6 @@ New or changed topic | Description |New or changed topic | Description | | --- | --- | -|[Surface Dock Updater](surface-dock-updater.md) | Added version 2.12.136.0 information | |[Microsoft Surface Data Eraser](microsoft-surface-data-eraser.md) | Added version 3.2.46.0 information | ## January 2018 @@ -114,12 +113,6 @@ New or changed topic | Description | --- | --- | |[Download the latest firmware and drivers for Surface devices](deploy-the-latest-firmware-and-drivers-for-surface-devices.md) | Added Surface Book 2, Surface Laptop, Surface Pro, and Surface Pro with LTE Advanced information | -## November 2017 - -|New or changed topic | Description | -| --- | --- | -|[Surface Dock Updater](surface-dock-updater.md) | Added version 2.7.136.0 information | - ## October 2017 New or changed topics | Description @@ -138,7 +131,6 @@ New or changed topic | Description | --- | --- | |[Surface Data Eraser](microsoft-surface-data-eraser.md) | Update compatible devices, added version 3.2.36 information | |[Surface Deployment Accelerator](microsoft-surface-deployment-accelerator.md) | Added version 2.0.8.0 information | -|[Surface Dock Updater](surface-dock-updater.md) | Added version 2.1.15.0 information | ## April 2017 diff --git a/devices/surface/update.md b/devices/surface/update.md index d68bf71ed8..121bf7a6e7 100644 --- a/devices/surface/update.md +++ b/devices/surface/update.md @@ -23,5 +23,5 @@ Find out how to download and manage the latest firmware and driver updates for y | --- | --- | | [Manage Surface driver and firmware updates](manage-surface-pro-3-firmware-updates.md)| Explore the available options to manage firmware and driver updates for Surface devices.| | [Deploy the latest firmware and drivers for Surface devices](deploy-the-latest-firmware-and-drivers-for-surface-devices.md)| Find links to manually deploy firmware and drivers, outside of Windows Update. | -| [Surface Dock Updater](surface-dock-updater.md)| Get a detailed walkthrough of Microsoft Surface Dock Updater.| +| [Surface Dock Firmware Update](surface-dock-firmware-update.md)| See how you can update Surface Dock firmware automatically.| |[Wake On LAN for Surface devices](wake-on-lan-for-surface-devices.md) | See how you can use Wake On LAN to remotely wake up devices to perform management or maintenance tasks, or to enable management solutions automatically. | From b9e972d4c8bc493534050b3d401588f02c1ee310 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Wed, 18 Sep 2019 11:53:12 -0700 Subject: [PATCH 274/285] Moved the generic note to the top --- windows/client-management/mdm/policy-csp-bitlocker.md | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-bitlocker.md b/windows/client-management/mdm/policy-csp-bitlocker.md index 74918de17c..70106adeb4 100644 --- a/windows/client-management/mdm/policy-csp-bitlocker.md +++ b/windows/client-management/mdm/policy-csp-bitlocker.md @@ -13,6 +13,9 @@ manager: dansimp # Policy CSP - Bitlocker +> [!NOTE] +> To manage encryption of PCs and devices, use [BitLocker CSP](https://docs.microsoft.com/windows/client-management/mdm/bitlocker-csp). +
          @@ -68,8 +71,6 @@ Specifies the BitLocker Drive Encryption method and cipher strength. > [!NOTE] > XTS-AES 128-bit and XTS-AES 256-bit values are supported only on Windows 10 for desktop. -> [!NOTE] -> To manage encryption of PCs and devices, use [BitLocker CSP](https://docs.microsoft.com/windows/client-management/mdm/bitlocker-csp). The following list shows the supported values: From 00e16aa024d7dd6844fec40167836e801e630c89 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Wed, 18 Sep 2019 12:31:16 -0700 Subject: [PATCH 275/285] Update surface-dock-firmware-update.md --- devices/surface/surface-dock-firmware-update.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/devices/surface/surface-dock-firmware-update.md b/devices/surface/surface-dock-firmware-update.md index 9bd53be6c1..92e3f65adf 100644 --- a/devices/surface/surface-dock-firmware-update.md +++ b/devices/surface/surface-dock-firmware-update.md @@ -45,7 +45,7 @@ You can use Windows Installer commands (Msiexec.exe) to deploy Surface Dock Firm - **Msiexec.exe /i /quiet /norestart** -For more information, refer to [Command line options](https://docs.microsoft.com/en-us/windows/win32/msi/command-line-options) documentation. +For more information, refer to [Command line options](https://docs.microsoft.com/windows/win32/msi/command-line-options) documentation. ## How to verify completion of firmware update @@ -77,7 +77,7 @@ Successful completion of Surface Dock Firmware Update results in new registry ke | Log | Location | Notes | | -------------------------------- | -------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | | Surface Dock Firmware Update log | /l*v %windir%\logs\ SurfaceDockFWI.log | Earlier versions of this tool wrote events to Applications and Services Logs\Microsoft Surface Dock Updater. | -| Windows Device Install log | %windir%\inf\ setupapi.dev.log | For more information about using Device Install Log, refer [to SetupAPI Logging](https://docs.microsoft.com/en-us/windows-hardware/drivers/install/setupapi-logging--windows-vista-and-later-) documentation. | +| Windows Device Install log | %windir%\inf\ setupapi.dev.log | For more information about using Device Install Log, refer [to SetupAPI Logging](https://docs.microsoft.com/windows-hardware/drivers/install/setupapi-logging--windows-vista-and-later-) documentation. | **Table 2. Event log IDs for Surface Dock Firmware Update** From caf616f159c77d7bea69fa99bf711622f74a0582 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Wed, 18 Sep 2019 12:36:09 -0700 Subject: [PATCH 276/285] Update surface-dock-firmware-update.md --- devices/surface/surface-dock-firmware-update.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/surface/surface-dock-firmware-update.md b/devices/surface/surface-dock-firmware-update.md index 92e3f65adf..f8dfd0c0a3 100644 --- a/devices/surface/surface-dock-firmware-update.md +++ b/devices/surface/surface-dock-firmware-update.md @@ -1,7 +1,7 @@ --- title: Microsoft Surface Dock Firmware Update description: This article explains how to use Microsoft Surface Dock Firmware Update, newly redesigned to automatically update Surface Dock firmware while running in the background on your Surface device. -ms.localizationpriority: normal +ms.localization_priority: normal ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library From 5efeb0c86b952f86e6eff8c2b81fcd3239156112 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 18 Sep 2019 12:55:53 -0700 Subject: [PATCH 277/285] add api explorer and connected applications --- .../microsoft-defender-atp/api-explorer.md | 28 +++++++++---------- .../microsoft-defender-atp/preview.md | 4 +++ 2 files changed, 18 insertions(+), 14 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md b/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md index 9163909719..010fb7a43b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md @@ -1,7 +1,7 @@ --- -title: API explorer in Microsoft Defender ATP +title: API Explorer in Microsoft Defender ATP ms.reviewer: -description: Use the API explorer to construct and perform API queries, test and send requests for any available API +description: Use the API Explorer to construct and perform API queries, test and send requests for any available API keywords: api, explorer, send, request, get, post, search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -18,44 +18,44 @@ ms.collection: M365-security-compliance ms.topic: conceptual --- -# API explorer +# API Explorer **Applies to:** - [Microsoft Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [!include[Prerelease information](prerelease.md)] -The Microsoft Defender ATP API explorer is a tool that helps you explore various Microsoft Defender ATP APIs interactively. +The Microsoft Defender ATP API Explorer is a tool that helps you explore various Microsoft Defender ATP APIs interactively. -The API explorer makes it easy to construct and perform API queries, test and send requests for any available Microsoft Defender ATP API endpoint. You can also use the API explorer to perform actions or find data that might not yet be available through the user interface. +The API Explorer makes it easy to construct and perform API queries, test and send requests for any available Microsoft Defender ATP API endpoint. You can also use the API Explorer to perform actions or find data that might not yet be available through the user interface. The tool is useful during app development because it allows you to perform API queries that respect your user access settings, reducing the need to generate access tokens. You can also use the tool to explore the gallery of sample queries, copy result code samples, and generate debug information. -With the API explorer, you can: +With the API Explorer, you can: - Run requests for any method and see responses in real-time - Quickly browse through the API samples and learn what parameters they support - Make API calls with ease; no need to authenticate beyond the management portal sign-in -## Access API explorer -From the left navigation menu, select **Partners & APIs** > **API explorer**. +## Access API Explorer +From the left navigation menu, select **Partners & APIs** > **API Explorer**. ## Supported APIs -API explorer supports all the APIs offered by Microsoft Defender ATP. +API Explorer supports all the APIs offered by Microsoft Defender ATP. -The list of supported APIs is available in the [APIs documentation](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/apis-intro). +The list of supported APIs is available in the [APIs documentation](apis-intro.md). -## Get started with the API explorer +## Get started with the API Explorer 1. In the left pane, there is a list of sample requests that you can use. 2. Follow the links and click **Run query**. Some of the samples may require specifying a parameter in the URL, for example, {machine- id}. ## FAQ -**Do I need to have an API token to use the API explorer?**
          -Credentials to access an API are not needed since the API explorer uses the Microsoft Defender ATP management portal token whenever it makes a request. +**Do I need to have an API token to use the API Explorer?**
          +Credentials to access an API are not needed since the API Explorer uses the Microsoft Defender ATP management portal token whenever it makes a request. -The logged-in user authentication credential is used to verify that the API explorer is authorized to access data on your behalf. +The logged-in user authentication credential is used to verify that the API Explorer is authorized to access data on your behalf. Specific API requests are limited based on your RBAC privileges; for example, a request to "Submit indicator" is limited to the security admin role. diff --git a/windows/security/threat-protection/microsoft-defender-atp/preview.md b/windows/security/threat-protection/microsoft-defender-atp/preview.md index 5d0cf9a4f2..0760f00150 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/preview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/preview.md @@ -42,6 +42,10 @@ Turn on the preview experience setting to be among the first to try upcoming fea ## Preview features The following features are included in the preview release: +- [Connected Azure AD applications](connected-applications.md)
          The Connected applications page provides information about the Azure AD applications connected to Microsoft Defender ATP in your organization. + +- [API Explorer](api-explorer.md)
          The API explorer makes it easy to construct and perform API queries, test and send requests for any available Microsoft Defender ATP API endpoint. + - [Tamper Protection settings in Intune](../windows-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md#turn-tamper-protection-on-or-off-for-your-organization-with-intune)
          You can now turn Tamper Protection on (or off) for your organization in the Microsoft 365 Device Management portal (Intune). - [Microsoft Threat Experts - Experts on Demand](microsoft-threat-experts.md)
          You now have the option to consult with Microsoft Threat Experts from several places in the portal to help you in the context of your investigation. From 11b58ffa2c9f21524682393305ae708ff0ac710a Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Wed, 18 Sep 2019 13:41:00 -0700 Subject: [PATCH 278/285] Update surface-dock-firmware-update.md Fixing loc pri metadata tag --- devices/surface/surface-dock-firmware-update.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/surface/surface-dock-firmware-update.md b/devices/surface/surface-dock-firmware-update.md index f8dfd0c0a3..92e3f65adf 100644 --- a/devices/surface/surface-dock-firmware-update.md +++ b/devices/surface/surface-dock-firmware-update.md @@ -1,7 +1,7 @@ --- title: Microsoft Surface Dock Firmware Update description: This article explains how to use Microsoft Surface Dock Firmware Update, newly redesigned to automatically update Surface Dock firmware while running in the background on your Surface device. -ms.localization_priority: normal +ms.localizationpriority: normal ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library From 2cf333bc9cefe54cd6afb65f5b9a997e196e5643 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 18 Sep 2019 15:11:50 -0700 Subject: [PATCH 279/285] Update TOC.md --- windows/security/threat-protection/TOC.md | 3 --- 1 file changed, 3 deletions(-) diff --git a/windows/security/threat-protection/TOC.md b/windows/security/threat-protection/TOC.md index eaab9f1c9b..9ed84238d0 100644 --- a/windows/security/threat-protection/TOC.md +++ b/windows/security/threat-protection/TOC.md @@ -459,9 +459,6 @@ ##### [Partner applications](microsoft-defender-atp/partner-applications.md) ##### [Connected applications](microsoft-defender-atp/connected-applications.md) ##### [API explorer](microsoft-defender-atp/api-explorer.md) -##### [API usage overview](microsoft-defender-atp/) - - #### [Manage machine configuration]() From b7ba37d8712e41942b681917326002c5c395d621 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 18 Sep 2019 15:53:30 -0700 Subject: [PATCH 280/285] add settings-win.data.microsoft.com --- .../microsoft-defender-atp/configure-proxy-internet.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet.md b/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet.md index 3ba4e51fda..5830eaa9af 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet.md @@ -109,7 +109,7 @@ If a proxy or firewall is blocking all traffic by default and allowing only spec Service location | Microsoft.com DNS record -|- -Common URLs for all locations | ```*.blob.core.windows.net```
          ```crl.microsoft.com```
          ```ctldl.windowsupdate.com```
          ```events.data.microsoft.com```
          ```notify.windows.com``` +Common URLs for all locations | ```*.blob.core.windows.net```
          ```crl.microsoft.com```
          ```ctldl.windowsupdate.com```
          ```events.data.microsoft.com```
          ```notify.windows.com```
          ```settings-win.data.microsoft.com ``` European Union | ```eu.vortex-win.data.microsoft.com```
          ```eu-v20.events.data.microsoft.com```
          ```winatp-gw-neu.microsoft.com```
          ```winatp-gw-weu.microsoft.com``` United Kingdom | ```uk.vortex-win.data.microsoft.com```
          ```uk-v20.events.data.microsoft.com```
          ```winatp-gw-uks.microsoft.com```
          ```winatp-gw-ukw.microsoft.com``` United States | ```us.vortex-win.data.microsoft.com```
          ```us-v20.events.data.microsoft.com```
          ```winatp-gw-cus.microsoft.com```
          ```winatp-gw-eus.microsoft.com``` From 15d6700492ef9900814162db6692914790003ec0 Mon Sep 17 00:00:00 2001 From: Tudor Dobrila Date: Thu, 19 Sep 2019 13:45:52 +0530 Subject: [PATCH 281/285] Update privacy with latest fields --- .../microsoft-defender-atp-mac-privacy.md | 72 +++++++++++-------- 1 file changed, 41 insertions(+), 31 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-privacy.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-privacy.md index 7cf18820f8..ab8df0eee5 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-privacy.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-privacy.md @@ -116,6 +116,7 @@ The following fields are collected: | Field | Description | | --------------------------------------------------- | ----------- | | antivirus_engine.enable_real_time_protection | Whether real-time protection is enabled on the device or not. | +| antivirus_engine.passive_mode | Whether passive mode is enabled on the device or not. | | cloud_service.enabled | Whether cloud delivered protection is enabled on the device or not. | | cloud_service.timeout | Time out when the application communicates with the Microsoft Defender ATP cloud. | | cloud_service.heartbeat_interval | Interval between consecutive heartbeats sent by the product to the cloud. | @@ -123,6 +124,8 @@ The following fields are collected: | cloud_service.diagnostic_level | Diagnostic level of the device (required, optional). | | cloud_service.automatic_sample_submission | Whether automatic sample submission is turned on or not. | | edr.early_preview | Whether the machine should run EDR early preview features. | +| edr.group_id | Group identifier used by the detection and response component. | +| edr.tags | User defined tags. | | features.\[optional feature name\] | List of preview features, along with whether they are enabled or not. | #### Product and service performance data events @@ -230,37 +233,44 @@ The following fields are collected: | Field | Description | | ------------------------------ | ----------- | | pkt_ack_timeout | The following properties are aggregated numerical values, representing count of events that happened since kernel extension startup. | -| pkt_ack_conn_timeout | | -| ipc.ack_pkts | | -| ipc.nack_pkts | | -| ipc.send.ack_no_conn | | -| ipc.send.nack_no_conn | | -| ipc.send.ack_no_qsq | | -| ipc.send.nack_no_qsq | | -| ipc.ack.no_space | | -| ipc.ack.timeout | | -| ipc.ack.ackd_fast | | -| ipc.ack.ackd | | -| ipc.recv.bad_pkt_len | | -| ipc.recv.bad_reply_len | | -| ipc.recv.no_waiter | | -| ipc.recv.copy_failed | | -| ipc.kauth.vnode.mask | | -| ipc.kauth.vnode.read | | -| ipc.kauth.vnode.write | | -| ipc.kauth.vnode.exec | | -| ipc.kauth.vnode.del | | -| ipc.kauth.vnode.read_attr | | -| ipc.kauth.vnode.write_attr | | -| ipc.kauth.vnode.read_ex_attr | | -| ipc.kauth.vnode.write_ex_attr | | -| ipc.kauth.vnode.read_sec | | -| ipc.kauth.vnode.write_sec | | -| ipc.kauth.vnode.take_own | | -| ipc.kauth.vnode.denied | | -| ipc.kauth.file_op.mask | | -| ipc.kauth_file_op.open | | -| ipc.kauth.file_op.close | | +| pkt_ack_conn_timeout | | +| ipc.ack_pkts | | +| ipc.nack_pkts | | +| ipc.send.ack_no_conn | | +| ipc.send.nack_no_conn | | +| ipc.send.ack_no_qsq | | +| ipc.send.nack_no_qsq | | +| ipc.ack.no_space | | +| ipc.ack.timeout | | +| ipc.ack.ackd_fast | | +| ipc.ack.ackd | | +| ipc.recv.bad_pkt_len | | +| ipc.recv.bad_reply_len | | +| ipc.recv.no_waiter | | +| ipc.recv.copy_failed | | +| ipc.kauth.vnode.mask | | +| ipc.kauth.vnode.read | | +| ipc.kauth.vnode.write | | +| ipc.kauth.vnode.exec | | +| ipc.kauth.vnode.del | | +| ipc.kauth.vnode.read_attr | | +| ipc.kauth.vnode.write_attr | | +| ipc.kauth.vnode.read_ex_attr | | +| ipc.kauth.vnode.write_ex_attr | | +| ipc.kauth.vnode.read_sec | | +| ipc.kauth.vnode.write_sec | | +| ipc.kauth.vnode.take_own | | +| ipc.kauth.vnode.denied | | +| ipc.kauth.file_op.mask | | +| ipc.kauth_file_op.open | | +| ipc.kauth.file_op.close | | +| ipc.kauth.file_op.close_modified | | +| ipc.kauth.file_op.move | | +| ipc.kauth.file_op.link | | +| ipc.kauth.file_op.exec | | +| ipc.kauth.file_op.remove | | +| ipc.kauth.file_op.fork | | +| ipc.kauth.file_op.create | | ## Resources From eab27446533f1064ab46c717de9b21c0f2810cac Mon Sep 17 00:00:00 2001 From: Tudor Dobrila Date: Thu, 19 Sep 2019 17:31:26 +0530 Subject: [PATCH 282/285] Styling --- .../microsoft-defender-atp-mac-privacy.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-privacy.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-privacy.md index ab8df0eee5..0c56970e6f 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-privacy.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-privacy.md @@ -125,7 +125,7 @@ The following fields are collected: | cloud_service.automatic_sample_submission | Whether automatic sample submission is turned on or not. | | edr.early_preview | Whether the machine should run EDR early preview features. | | edr.group_id | Group identifier used by the detection and response component. | -| edr.tags | User defined tags. | +| edr.tags | User-defined tags. | | features.\[optional feature name\] | List of preview features, along with whether they are enabled or not. | #### Product and service performance data events From ebba9f630bd2cb3b4a29ae3789aa82183306926e Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Thu, 19 Sep 2019 08:36:50 -0700 Subject: [PATCH 283/285] General updates to Surface pages --- devices/surface/TOC.md | 6 +++--- devices/surface/get-started.md | 11 +++++++---- devices/surface/surface-dock-firmware-update.md | 2 +- devices/surface/surface-wireless-connect.md | 11 ++++++----- 4 files changed, 17 insertions(+), 13 deletions(-) diff --git a/devices/surface/TOC.md b/devices/surface/TOC.md index 667d9d13b5..8330f2a9f5 100644 --- a/devices/surface/TOC.md +++ b/devices/surface/TOC.md @@ -21,6 +21,7 @@ ## Deploy ### [Deploy Surface devices](deploy.md) +### [Deploy the latest firmware and drivers for Surface devices](deploy-the-latest-firmware-and-drivers-for-surface-devices.md) ### [Surface Deployment Accelerator](microsoft-surface-deployment-accelerator.md) ### [Step by step: Surface Deployment Accelerator](step-by-step-surface-deployment-accelerator.md) ### [Deploy Windows 10 to Surface devices with MDT](deploy-windows-10-to-surface-devices-with-mdt.md) @@ -30,15 +31,14 @@ ### [Surface System SKU reference](surface-system-sku-reference.md) ## Manage -### [Optimizing wireless connectivity for Surface devices](surface-wireless-connect.md) +### [Optimize Wi-Fi connectivity for Surface devices](surface-wireless-connect.md) ### [Best practice power settings for Surface devices](maintain-optimal-power-settings-on-Surface-devices.md) +### [Surface Dock Firmware Update](surface-dock-firmware-update.md) ### [Battery Limit setting](battery-limit.md) ### [Surface Brightness Control](microsoft-surface-brightness-control.md) ### [Surface Asset Tag](assettag.md) ### [Surface firmware and driver updates](update.md) -### [Deploy the latest firmware and drivers for Surface devices](deploy-the-latest-firmware-and-drivers-for-surface-devices.md) ### [Manage Surface driver and firmware updates](manage-surface-pro-3-firmware-updates.md) -### [Surface Dock Firmware Update](surface-dock-firmware-update.md) ## Secure diff --git a/devices/surface/get-started.md b/devices/surface/get-started.md index 07342f0005..658d59d971 100644 --- a/devices/surface/get-started.md +++ b/devices/surface/get-started.md @@ -5,6 +5,7 @@ ms.author: robmazz manager: laurawi layout: LandingPage ms.assetid: +ms.audience: itpro ms.tgt_pltfrm: na ms.devlang: na ms.topic: landing-page @@ -29,6 +30,7 @@ Harness the power of Surface, Windows, and Office connected together through the

          Plan

          Autopilot and Surface devices

          Surface and SCCM considerations

          +

          Deploy Surface app with Microsoft Store for Business

          @@ -45,7 +47,7 @@ Harness the power of Surface, Windows, and Office connected together through the @@ -64,9 +66,9 @@ Harness the power of Surface, Windows, and Office connected together through the @@ -122,7 +124,7 @@ Harness the power of Surface, Windows, and Office connected together through the

          Technical specifications

          -

          Surface Pro

          +

          Surface Pro

          Surface Book

          Surface Studio

          Surface Go

          @@ -138,11 +140,12 @@ Harness the power of Surface, Windows, and Office connected together through the
          diff --git a/devices/surface/surface-dock-firmware-update.md b/devices/surface/surface-dock-firmware-update.md index f8dfd0c0a3..b35a23642a 100644 --- a/devices/surface/surface-dock-firmware-update.md +++ b/devices/surface/surface-dock-firmware-update.md @@ -36,7 +36,7 @@ If preferred, you can manually complete the update as follows: > [!NOTE] > -> - Manually installing the MSI file may prompt you to restart Surface.; however, restarting >is optional and not required. +> - Manually installing the MSI file may prompt you to restart Surface; however, restarting is optional and not required. >- You will need to disconnect and reconnect the dock twice before the update fully completes. ## Network deployment diff --git a/devices/surface/surface-wireless-connect.md b/devices/surface/surface-wireless-connect.md index eb53754fd6..cad2a6924f 100644 --- a/devices/surface/surface-wireless-connect.md +++ b/devices/surface/surface-wireless-connect.md @@ -1,18 +1,19 @@ --- -title: Optimizing wireless connectivity for Surface devices -description: This topic provides guidance around recommended wireless connectivity settings for network admins and users. +title: Optimize Wi-Fi connectivity for Surface devices +description: This topic describes recommended Wi-Fi settings to ensure Surface devices stay connected in congested network environments and mobile scenarios. ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library author: dansimp -ms.localizationpriority: medium +ms.audience: itpro +ms.localization_priority: normal ms.author: dansimp ms.topic: article ms.date: 08/15/2019 -ms.reviewer: +ms.reviewer: tokatz manager: dansimp --- -# Optimizing wireless connectivity for Surface devices +# Optimize Wi-Fi connectivity for Surface devices ## Introduction From f32f137d1c3575633deba8ece5fce682b875b678 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Thu, 19 Sep 2019 10:04:11 -0700 Subject: [PATCH 284/285] Update .openpublishing.redirection.json Adds a redirect from old Surface Dock Updater page to new Surface Dock Firmware Update page --- .openpublishing.redirection.json | 30702 +++++++++++++++-------------- 1 file changed, 15354 insertions(+), 15348 deletions(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 72efa7e858..63c4203814 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -1,15353 +1,15359 @@ { -"redirections": [ -{ -"source_path": "windows/application-management/msix-app-packaging-tool-walkthrough.md", -"redirect_url": "https://docs.microsoft.com/windows/msix/mpt-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/information-protection/windows-information-protection/create-wip-policy-using-mam-intune-azure.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/information-protection/windows-information-protection/deploy-wip-policy-using-intune.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/deploy-wip-policy-using-intune-azure", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/information-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune-azure", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/how-hardware-based-containers-help-protect-windows.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-system-guard/how-hardware-based-containers-help-protect-windows", -"redirect_document_id": true -}, -{ -"source_path": "browsers/edge/enterprise-guidance-using-microsoft-edge-and-ie11.md", -"redirect_url": "https://docs.microsoft.com/microsoft-edge/deploy/emie-to-improve-compatibility", -"redirect_document_id": true -}, -{ -"source_path": "windows/deployment/update/windows-update-sources.md", -"redirect_url": "/windows/deployment/update/how-windows-update-works", -"redirect_document_id": true -}, -{ -"source_path": "browsers/edge/hardware-and-software-requirements.md", -"redirect_url": "https://docs.microsoft.com/microsoft-edge/deploy/about-microsoft-edge", -"redirect_document_id": true -}, -{ -"source_path": "browsers/edge/security-enhancements-microsoft-edge.md", -"redirect_url": "https://docs.microsoft.com/microsoft-edge/deploy/group-policies/security-privacy-management-gp", -"redirect_document_id": true -}, -{ -"source_path": "browsers/edge/new-policies.md", -"redirect_url": "https://docs.microsoft.com/microsoft-edge/deploy/change-history-for-microsoft-edge", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/intelligence/av-tests.md", -"redirect_url": "/windows/security/threat-protection/intelligence/top-scoring-industry-antivirus-tests", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/information-protection/bitlocker/protect-bitlocker-from-pre-boot-attacks.md", -"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-countermeasures", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/information-protection/bitlocker/types-of-attacks-for-volume-encryption-keys.md", -"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-countermeasures", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/information-protection/bitlocker/choose-the-right-bitlocker-countermeasure.md", -"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-countermeasures", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/intelligence/transparency-report.md", -"redirect_url": "/windows/security/threat-protection/intelligence/av-tests", -"redirect_document_id": true -}, -{ -"source_path": "windows/deployment/update/waas-windows-insider-for-business-aad.md", -"redirect_url": "https://docs.microsoft.com/windows-insider/at-work-pro/wip-4-biz-add", -"redirect_document_id": true -}, -{ -"source_path": "windows/deployment/update/waas-windows-insider-for-business-faq.md", -"redirect_url": "https://docs.microsoft.com/windows-insider/at-work-pro/wip-4-biz-get-started", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/identity-protection/how-hardware-based-containers-help-protect-windows.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/how-hardware-based-containers-help-protect-windows", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/hardware-protection/how-hardware-based-containers-help-protect-windows.md", -"redirect_url": "/windows/security/identity-protection/how-hardware-based-containers-help-protect-windows", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/hardware-protection/encrypted-hard-drive.md", -"redirect_url": "/windows/security/information-protection/encrypted-hard-drive", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/hardware-protection/secure-the-windows-10-boot-process.md", -"redirect_url": "/windows/security/information-protection/secure-the-windows-10-boot-process", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/hardware-protection/tpm/backup-tpm-recovery-information-to-ad-ds.md", -"redirect_url": "/windows/security/information-protection/tpm/backup-tpm-recovery-information-to-ad-ds", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/hardware-protection/tpm/change-the-tpm-owner-password.md", -"redirect_url": "/windows/security/information-protection/tpm/change-the-tpm-owner-password", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/hardware-protection/tpm/how-windows-uses-the-tpm.md", -"redirect_url": "/windows/security/information-protection/tpm/how-windows-uses-the-tpm", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/hardware-protection/tpm/initialize-and-configure-ownership-of-the-tpm.md", -"redirect_url": "/windows/security/information-protection/tpm/initialize-and-configure-ownership-of-the-tpm", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/hardware-protection/tpm/manage-tpm-commands.md", -"redirect_url": "/windows/security/information-protection/tpm/manage-tpm-commands", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/hardware-protection/tpm/manage-tpm-lockout.md", -"redirect_url": "/windows/security/information-protection/tpm/manage-tpm-lockout", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/hardware-protection/tpm/switch-pcr-banks-on-tpm-2-0-devices.md", -"redirect_url": "/windows/security/information-protection/tpm/switch-pcr-banks-on-tpm-2-0-devices", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/hardware-protection/tpm/tpm-fundamentals.md", -"redirect_url": "/windows/security/information-protection/tpm/tpm-fundamentals", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/hardware-protection/tpm/tpm-recommendations.md", -"redirect_url": "/windows/security/information-protection/tpm/tpm-recommendations", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/hardware-protection/tpm/trusted-platform-module-overview.md", -"redirect_url": "/windows/security/information-protection/tpm/trusted-platform-module-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/hardware-protection/tpm/trusted-platform-module-services-group-policy-settings.md", -"redirect_url": "/windows/security/information-protection/tpm/trusted-platform-module-services-group-policy-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/hardware-protection/tpm/trusted-platform-module-top-node.md", -"redirect_url": "/windows/security/information-protection/tpm/trusted-platform-module-top-node", -"redirect_document_id": true -}, -{ -"source_path": "windows/deployment/update/waas-windows-insider-for-business.md", -"redirect_url": "/windows-insider/at-work-pro/wip-4-biz-get-started", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/device-guard/device-guard-deployment-guide.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-deployment-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/security-policy-settings/microsoft-network-client-digitally-sign-communications-if-server-agrees.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-client-digitally-sign-communications-if-server-agrees", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/security-policy-settings/microsoft-network-server-digitally-sign-communications-if-client-agress.md", -"redirect_url": "/windows/security/threat-protectionsecurity-policy-settings/smbv1-microsoft-network-server-digitally-sign-communications-if-client-agrees", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-application-control.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/administer-applocker-using-mdm.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/administer-applocker-using-mdm", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/administer-applocker.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/administer-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/applocker-architecture-and-components.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-architecture-and-components", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/applocker-functions.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-functions", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/applocker-overview.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/applocker-policies-deployment-guide.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policies-deployment-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/applocker-policies-design-guide.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policies-design-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/applocker-policy-use-scenarios.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policy-use-scenarios", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/applocker-processes-and-interactions.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-processes-and-interactions", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/applocker-settings.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/applocker-technical-reference.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-technical-reference", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/configure-an-applocker-policy-for-audit-only.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/configure-an-applocker-policy-for-audit-only", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/configure-an-applocker-policy-for-enforce-rules.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/configure-an-applocker-policy-for-enforce-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/configure-exceptions-for-an-applocker-rule.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/configure-exceptions-for-an-applocker-rule", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/configure-the-application-identity-service.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/configure-the-application-identity-service", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/configure-the-appLocker-reference-device.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/configure-the-appLocker-reference-device", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/create-a-rule-for-packaged-apps.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-for-packaged-apps", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/create-a-rule-that-uses-a-file-hash-condition.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-file-hash-condition", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/create-a-rule-that-uses-a-path-condition.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-path-condition", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/create-a-rule-that-uses-a-publisher-condition.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-publisher-condition", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/create-applocker-default-rules.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-applocker-default-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/create-list-of-applications-deployed-to-each-business-group.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-list-of-applications-deployed-to-each-business-group", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/create-your-applocker-policies.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-your-applocker-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/create-your-applocker-rules.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-your-applocker-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/delete-an-applocker-rule.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/delete-an-applocker-rule", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/deploy-the-applocker-policy-into-production.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/deploy-the-applocker-policy-into-production", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/determine-group-policy-structure-and-rule-enforcement.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/determine-group-policy-structure-and-rule-enforcement", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/determine-your-application-control-objectives.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/determine-your-application-control-objectives", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/dll-rules-in-applocker.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/dll-rules-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/document-group-policy-structure-and-applocker-rule-enforcement.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/document-group-policy-structure-and-applocker-rule-enforcement", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/document-your-application-list.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/document-your-application-list", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/document-your-applocker-rules.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/document-your-applocker-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/edit-an-applocker-policy.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/edit-an-applocker-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/edit-applocker-rules.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/edit-applocker-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/enable-the-dll-rule-collection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/enable-the-dll-rule-collection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/enforce-applocker-rules.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/enforce-applocker-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/executable-rules-in-applocker.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/executable-rules-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/export-an-applocker-policy-from-a-gpo.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/export-an-applocker-policy-from-a-gpo", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/export-an-applocker-policy-to-an-xml-file.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/export-an-applocker-policy-to-an-xml-file", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/how-applocker-works-techref.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/how-applocker-works-techref", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/import-an-applocker-policy-from-another-computer.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/import-an-applocker-policy-from-another-computer", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/import-an-applocker-policy-into-a-gpo.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/import-an-applocker-policy-into-a-gpo", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/maintain-applocker-policies.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/maintain-applocker-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/manage-packaged-apps-with-applocker.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/manage-packaged-apps-with-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/merge-applocker-policies-by-using-set-applockerpolicy.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/merge-applocker-policies-by-using-set-applockerpolicy", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/merge-applocker-policies-manually.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/merge-applocker-policies-manually", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/monitor-application-usage-with-applocker.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/monitor-application-usage-with-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/optimize-applocker-performance.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/optimize-applocker-performance", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/plan-for-applocker-policy-management.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/plan-for-applocker-policy-management", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/refresh-an-applocker-policy.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/refresh-an-applocker-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/requirements-for-deploying-applocker-policies.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/requirements-for-deploying-applocker-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/requirements-to-use-applocker.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/requirements-to-use-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/run-the-automatically-generate-rules-wizard.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/run-the-automatically-generate-rules-wizard", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/script-rules-in-applocker.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/script-rules-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/security-considerations-for-applocker.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/security-considerations-for-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/select-types-of-rules-to-create.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/select-types-of-rules-to-create", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/test-an-applocker-policy-by-using-test-applockerpolicy.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/test-an-applocker-policy-by-using-test-applockerpolicy", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/test-and-update-an-applocker-policy.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/test-and-update-an-applocker-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/tools-to-use-with-applocker.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/tools-to-use-with-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/understand-applocker-enforcement-settings.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-enforcement-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/understand-applocker-policy-design-decisions.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-policy-design-decisions", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/understand-the-applocker-policy-deployment-process.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understand-the-applocker-policy-deployment-process", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/understanding-applocker-allow-and-deny-actions-on-rules.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-allow-and-deny-actions-on-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/understanding-applocker-default-rules.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-default-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/understanding-applocker-rule-behavior.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-behavior", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/understanding-applocker-rule-collections.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-collections", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/understanding-applocker-rule-condition-types.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-condition-types", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/understanding-applocker-rule-exceptions.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-exceptions", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/understanding-the-file-hash-rule-condition-in-applocker.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-file-hash-rule-condition-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/understanding-the-path-rule-condition-in-applocker.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-path-rule-condition-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/understanding-the-publisher-rule-condition-in-applocker.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-publisher-rule-condition-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/use-the-applocker-windows-powershell-cmdlets.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/use-the-applocker-windows-powershell-cmdlets", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/using-event-viewer-with-applocker.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/using-event-viewer-with-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/using-software-restriction-policies-and-applocker-policies.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/using-software-restriction-policies-and-applocker-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/what-is-applocker.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/what-is-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/windows-installer-rules-in-applocker.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/windows-installer-rules-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/working-with-applocker-policies.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/working-with-applocker-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/working-with-applocker-rules.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/working-with-applocker-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/oldtoc.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-rules-in-windows-10-enterprise-e3.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction-rules-in-windows-10-enterprise-e3", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/microsoft-defender-atp/manage-automation-allowed-blocked-list.md", -"redirect_url": "windows/security/threat-protection/microsoft-defender-atp/manage-indicators", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/device-guard/optional-create-a-code-signing-certificate-for-windows-defender-application-control.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/create-code-signing-cert-for-windows-defender-application-control", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/device-guard/deploy-windows-defender-application-control-policy-rules-and-file-rules.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/device-guard/steps-to-deploy-windows-defender-application-control.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/create-initial-default-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/device-guard/deploy-catalog-files-to-support-windows-defender-application-control.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/deploy-catalog-files-to-support-windows-defender-application-control", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/device-guard/deploy-managed-installer-for-device-guard.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-managed-installer", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/device-guard/device-guard-deployment-enable-virtualization-based-security.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/enable-virtualization-based-security", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-set-individual-device.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-set-individual-device", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-security-center/wdsc-app-browser-control.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-security-center/wdsc-app-browser-control", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-security-center/wdsc-customize-contact-information.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-security-center/wdsc-customize-contact-information", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-security-center/wdsc-device-performance-health.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-security-center/wdsc-device-performance-health", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-security-center/wdsc-family-options.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-security-center/wdsc-family-options", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-security-center/wdsc-firewall-network-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-security-center/wdsc-firewall-network-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-security-center/wdsc-hide-notifications.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-security-center/wdsc-hide-notifications", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-security-center/wdsc-virus-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-security-center/wdsc-virus-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-security-center/windows-defender-security-center.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-security-center/windows-defender-security-center", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/audit-windows-defender", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/collect-cab-files-exploit-guard-submission.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/collect-cab-files-exploit-guard-submission", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/collect-cab-files-exploit-guard-submission.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-np", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/controlled-folders", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/customize-attack-surface-reduction", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/customize-controlled-folders", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/customize-exploit-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/customize-exploit-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/emet-exploit-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/enable-attack-surface-reduction", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/enable-controlled-folders", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/enable-exploit-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/enable-exploit-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/enable-exploit-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/enable-exploit-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/enable-network-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/enable-network-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/evaluate-attack-surface-reduction", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/evaluate-controlled-folder-access", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/evaluate-exploit-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-network-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/evaluate-network-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/evaluate-windows-defender-exploit-guard.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-windows-defender-exploit-guard", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/evaluate-windows-defender-exploit-guard.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/evaluate-atp", -"redirect_document_id": false -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/event-views", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/exploit-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/graphics.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/graphics", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/import-export-exploit-protection-emet-xml", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/network-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/prerelease.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/prerelease", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-asr", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-asr", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-exploit-protection-mitigations", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection", -"redirect_document_id": false -}, -{ -"source_path": "windows/keep-secure/advanced-features-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/advanced-features", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/advanced-hunting-best-practices-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-best-practices", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/advanced-hunting-reference-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-reference", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/alerts-queue", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/alerts-queue-endpoint-detection-response.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/alerts-queue-endpoint-detection-response", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/apis-intro.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/apis-intro", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/api-hello-world.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/api-hello-world", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/assign-portal-access-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/assign-portal-access", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/attack-simulations-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/attack-simulations", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/automated-investigations", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/basic-permissions-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/basic-permissions", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/check-sensor-status", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/community-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/community-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/community-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/community", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/conditional-access", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-arcsight-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-arcsight", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/configure-and-manage-tvm.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-and-manage-tvm", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/tvm-dashboard-insights.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/tvm-dashboard-insights", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/configure-attack-surface-reduction.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-attack-surface-reduction", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/configuration-score.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configuration-score", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/configure-conditional-access-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-conditional-access", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-email-notifications", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/additional-configuration-windows-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/monitor-onboarding-windows-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection", -"redirect_document_id": false -}, -{ -"source_path": "windows/keep-secure/configure-endpoints-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-non-windows", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-script", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-vdi-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-vdi-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-vdi-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/configure-mssp-support-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-siem", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-splunk", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/custom-ti-api", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/custom-detection-rules.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/custom-detection-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/general-settings-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/data-retention-settings-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/data-retention-settings-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/data-retention-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/data-storage-privacy", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/defender-compatibility", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/deprecate.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/deprecate", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/enable-custom-ti", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/microsoft-defender-atp/enable-custom-ti.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-indicators", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/enable-security-analytics-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/enable-secure-score-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/enable-secure-score-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/enable-secure-score", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-aad-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/enable-siem-integration-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/evaluate-atp.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/evaluate-atp", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/event-error-codes", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/experiment-custom-ti", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/fix-unhealthy-sensors", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/fix-unhealthy-sensors.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/fix-unhealthy-sensors", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-cvekbmap-collection-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/get-cvekbmap-collection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-cvekbmap-collection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-cvekbmap-collection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-kbinfo-collection-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/get-kbinfo-collection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-kbinfo-collection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-kbinfo-collection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-machinegroups-collection-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/get-machinegroups-collection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-machinegroups-collection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machinegroups-collection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-machinesecuritystates-collection-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/get-machinesecuritystates-collection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-machinesecuritystates-collection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machinesecuritystates-collection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-config.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-config", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-overview.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-alerts", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-domain", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-files", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/investigate-incidents-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-incidents", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-ip", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-machines", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-user", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/licensing-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/licensing-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/licensing-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/licensing", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/machine-groups-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machine-groups", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/machine-reports-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machine-reports", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machines-view-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/machine-tags-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machine-tags", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-alerts", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/manage-auto-investigation-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-automation-allowed-blocked-list", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/manage-automation-file-uploads-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-automation-file-uploads", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/manage-automation-folder-exclusions-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-automation-folder-exclusions", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/manage-edr.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-edr", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/management-apis.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/management-apis", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/manage-incidents-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-incidents", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/manage-suppression-rules-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-suppression-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/mssp-support-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/mssp-support", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/next-gen-threat-and-vuln-mgt.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/offboard-machines-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/offboard-machines", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/onboard-configure-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/onboard-configure", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/onboard-downlevel", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/onboard.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/onboard", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/onboard-offline-machines.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/onboard-offline-machines", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/overview.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/overview-attack-surface-reduction.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/overview-attack-surface-reduction", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/overview-endpoint-detection-response.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/overview-endpoint-detection-response", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/overview-hardware-based-isolation.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/overview-hardware-based-isolation", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/overview-hunting-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/overview-hunting", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/overview-secure-score-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/partner-applications.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/partner-applications", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/portal-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/powerbi-reports", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/powershell-example-code", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/preferences-setup-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/use-apis", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/microsoft-defender-atp/use-apis.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/preferences-setup", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/prerelease.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/prerelease", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/prerelease.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/prerelease", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/preview", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/preview-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/python-example-code", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/rbac-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/rbac", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/microsoft-defender-atp/response-actions.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts", -"redirect_document_id": false -}, -{ -"source_path": "windows/keep-secure/response-actions-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/response-actions", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/run-detection-test-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/run-detection-test-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/run-detection-test-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-detection-test", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/security-analytics-dashboard-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/secure-score-dashboard", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/dashboard-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/security-operations-dashboard-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/security-operations-dashboard-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/service-status", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/supported-response-apis-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/supported-response-apis-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/supported-response-apis-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/supported-response-apis", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/threat-indicator-concepts", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/threat-protection-integration.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/threat-protection-integration", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/threat-protection-reports-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/threat-protection-reports", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/settings-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/time-settings-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/time-settings-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/time-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/troubleshoot-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus", - "redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/troubleshoot-windows-defender-in-windows-10.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/troubleshoot-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/troubleshoot-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/troubleshoot-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/troubleshoot-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/troubleshoot-overview.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-custom-ti", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-siem", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/use-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/use-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/use", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/use-custom-ti", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/user-roles-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/user-roles", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/whats-new-in-microsoft-defender-atp", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-config.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-config", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-integration.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-integration", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/windows-defender-security-center-atp.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-security-center", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-threat-experts", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-application-guard/install-wd-app-guard.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-guard/install-wd-app-guard", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-application-guard/test-scenarios-wd-app-guard.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-guard/test-scenarios-wd-app-guard", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-application-guard/wd-app-guard-overview.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-guard/wd-app-guard-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/collect-diagnostic-data-update-compliance.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/collect-diagnostic-data-update-compliance", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/configure-cloud-block-timeout-period-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-cloud-block-timeout-period-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/configure-end-user-interaction-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-end-user-interaction-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/configure-exclusions-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-exclusions-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/configure-local-policy-overrides-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-local-policy-overrides-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/configure-protection-features-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-protection-features-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/configure-remediation-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-remediation-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/deploy-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/deploy-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/evaluate-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/evaluate-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/limited-periodic-scanning-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/limited-periodic-scanning-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/manage-event-based-updates-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/manage-event-based-updates-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/manage-outdated-endpoints-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/manage-outdated-endpoints-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/manage-protection-update-schedule-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/manage-protection-update-schedule-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/manage-updates-mobile-devices-vms-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/manage-updates-mobile-devices-vms-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/prevent-end-user-interaction-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/prevent-end-user-interaction-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/report-monitor-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/report-monitor-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/review-scan-results-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/review-scan-results-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/run-scan-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/run-scan-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/troubleshoot-reporting.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-reporting", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/use-group-policy-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/use-group-policy-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/use-wmi-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/use-wmi-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/windows-defender-offline.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/windows-defender-offline", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/block-untrusted-fonts-in-enterprise.md", -"redirect_url": "/windows/security/threat-protection/block-untrusted-fonts-in-enterprise", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/change-history-for-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/change-history-for-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/override-mitigation-options-for-app-related-security-policies.md", -"redirect_url": "/windows/security/threat-protection/override-mitigation-options-for-app-related-security-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/overview-of-threat-mitigations-in-windows-10.md", -"redirect_url": "/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection.md", -"redirect_url": "/windows/security/threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/wannacrypt-ransomware-worm-targets-out-of-date-systems-wdsi.md", -"redirect_url": "/windows/security/threat-protection/wannacrypt-ransomware-worm-targets-out-of-date-systems-wdsi", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-application-control.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/access-credential-manager-as-a-trusted-caller.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/access-credential-manager-as-a-trusted-caller", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/access-this-computer-from-the-network.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/account-lockout-duration.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/account-lockout-duration", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/account-lockout-policy.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/account-lockout-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/account-lockout-threshold.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/account-lockout-threshold", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/account-policies.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/account-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/accounts-administrator-account-status.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/accounts-administrator-account-status", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/accounts-block-microsoft-accounts.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/accounts-block-microsoft-accounts", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/accounts-guest-account-status.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/accounts-guest-account-status", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/accounts-rename-administrator-account.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/accounts-rename-administrator-account", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/accounts-rename-guest-account.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/accounts-rename-guest-account", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/act-as-part-of-the-operating-system.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/act-as-part-of-the-operating-system", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/add-workstations-to-domain.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/add-workstations-to-domain", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/adjust-memory-quotas-for-a-process.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/adjust-memory-quotas-for-a-process", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/administer-security-policy-settings.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/administer-security-policy-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/allow-log-on-locally.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/allow-log-on-locally", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/allow-log-on-through-remote-desktop-services.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/allow-log-on-through-remote-desktop-services", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/audit-audit-the-access-of-global-system-objects.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/audit-audit-the-access-of-global-system-objects", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/audit-audit-the-use-of-backup-and-restore-privilege.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/audit-audit-the-use-of-backup-and-restore-privilege", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/audit-force-audit-policy-subcategory-settings-to-override.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/audit-force-audit-policy-subcategory-settings-to-override", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/audit-policy.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/audit-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/audit-shut-down-system-immediately-if-unable-to-log-security-audits.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/audit-shut-down-system-immediately-if-unable-to-log-security-audits", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/back-up-files-and-directories.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/back-up-files-and-directories", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/bypass-traverse-checking.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/bypass-traverse-checking", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/change-the-system-time.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/change-the-system-time", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/change-the-time-zone.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/change-the-time-zone", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/create-a-pagefile.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/create-a-pagefile", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/create-a-token-object.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/create-a-token-object", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/create-global-objects.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/create-global-objects", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/create-permanent-shared-objects.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/create-permanent-shared-objects", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/create-symbolic-links.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/create-symbolic-links", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/debug-programs.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/debug-programs", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/deny-access-to-this-computer-from-the-network.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/deny-access-to-this-computer-from-the-network", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/deny-log-on-as-a-batch-job.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-batch-job", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/deny-log-on-as-a-service.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-service", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/deny-log-on-locally.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/deny-log-on-locally", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/deny-log-on-through-remote-desktop-services.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/deny-log-on-through-remote-desktop-services", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/devices-allow-undock-without-having-to-log-on.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/devices-allow-undock-without-having-to-log-on", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/devices-allowed-to-format-and-eject-removable-media.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/devices-allowed-to-format-and-eject-removable-media", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/devices-prevent-users-from-installing-printer-drivers.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/devices-prevent-users-from-installing-printer-drivers", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/devices-restrict-cd-rom-access-to-locally-logged-on-user-only.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/devices-restrict-cd-rom-access-to-locally-logged-on-user-only", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/devices-restrict-floppy-access-to-locally-logged-on-user-only.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/devices-restrict-floppy-access-to-locally-logged-on-user-only", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/domain-controller-ldap-server-signing-requirements.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-controller-ldap-server-signing-requirements", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/domain-controller-refuse-machine-account-password-changes.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-controller-refuse-machine-account-password-changes", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-or-sign-secure-channel-data-always", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/domain-member-digitally-encrypt-secure-channel-data-when-possible.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-secure-channel-data-when-possible", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/domain-member-digitally-sign-secure-channel-data-when-possible.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-member-digitally-sign-secure-channel-data-when-possible", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/domain-member-disable-machine-account-password-changes.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-member-disable-machine-account-password-changes", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/domain-member-maximum-machine-account-password-age.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-member-maximum-machine-account-password-age", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/domain-member-require-strong-windows-2000-or-later-session-key.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-member-require-strong-windows-2000-or-later-session-key", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/enforce-password-history.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/enforce-password-history", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/enforce-user-logon-restrictions.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/enforce-user-logon-restrictions", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/force-shutdown-from-a-remote-system.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/force-shutdown-from-a-remote-system", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/generate-security-audits.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/generate-security-audits", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/how-to-configure-security-policy-settings.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/how-to-configure-security-policy-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/impersonate-a-client-after-authentication.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/increase-a-process-working-set.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/increase-a-process-working-set", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/increase-scheduling-priority.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/increase-scheduling-priority", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/interactive-logon-display-user-information-when-the-session-is-locked.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-display-user-information-when-the-session-is-locked", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/interactive-logon-do-not-display-last-user-name.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-display-last-user-name", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/interactive-logon-do-not-require-ctrl-alt-del.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-require-ctrl-alt-del", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/interactive-logon-dont-display-username-at-sign-in.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-dont-display-username-at-sign-in", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/interactive-logon-machine-account-lockout-threshold.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-account-lockout-threshold", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/interactive-logon-machine-inactivity-limit.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-inactivity-limit", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/interactive-logon-message-text-for-users-attempting-to-log-on.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-message-text-for-users-attempting-to-log-on", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/interactive-logon-message-title-for-users-attempting-to-log-on.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-message-title-for-users-attempting-to-log-on", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/interactive-logon-prompt-user-to-change-password-before-expiration.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-prompt-user-to-change-password-before-expiration", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/interactive-logon-require-domain-controller-authentication-to-unlock-workstation.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-require-domain-controller-authentication-to-unlock-workstation", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/interactive-logon-require-smart-card.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-require-smart-card", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/interactive-logon-smart-card-removal-behavior.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-smart-card-removal-behavior", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/kerberos-policy.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/kerberos-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/load-and-unload-device-drivers.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/load-and-unload-device-drivers", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/lock-pages-in-memory.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/lock-pages-in-memory", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/log-on-as-a-batch-job.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/log-on-as-a-batch-job", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/log-on-as-a-service.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/log-on-as-a-service", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/manage-auditing-and-security-log.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/manage-auditing-and-security-log", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/maximum-lifetime-for-service-ticket.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-service-ticket", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/maximum-lifetime-for-user-ticket-renewal.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket-renewal", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/maximum-lifetime-for-user-ticket.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/maximum-password-age.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/maximum-password-age", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/maximum-tolerance-for-computer-clock-synchronization.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/maximum-tolerance-for-computer-clock-synchronization", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/microsoft-network-client-digitally-sign-communications-always.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-client-digitally-sign-communications-always", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/microsoft-network-client-digitally-sign-communications-if-server-agrees.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-client-digitally-sign-communications-if-server-agrees", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/microsoft-network-server-digitally-sign-communications-always.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-server-digitally-sign-communications-always", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/microsoft-network-server-digitally-sign-communications-if-client-agrees.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-server-digitally-sign-communications-if-client-agrees", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/minimum-password-age.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/minimum-password-age", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/minimum-password-length.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/minimum-password-length", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/modify-an-object-label.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/modify-an-object-label", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/modify-firmware-environment-values.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/modify-firmware-environment-values", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-access-allow-anonymous-sidname-translation.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-allow-anonymous-sidname-translation", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-access-remotely-accessible-registry-paths.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-access-restrict-anonymous-access-to-named-pipes-and-shares.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-restrict-anonymous-access-to-named-pipes-and-shares", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-list-manager-policies.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-list-manager-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-security-allow-localsystem-null-session-fallback.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-allow-localsystem-null-session-fallback", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-security-force-logoff-when-logon-hours-expire.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-force-logoff-when-logon-hours-expire", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-security-lan-manager-authentication-level.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-security-ldap-client-signing-requirements.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-ldap-client-signing-requirements", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/password-must-meet-complexity-requirements.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/password-must-meet-complexity-requirements", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/password-policy.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/password-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/perform-volume-maintenance-tasks.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/perform-volume-maintenance-tasks", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/profile-single-process.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/profile-single-process", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/profile-system-performance.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/profile-system-performance", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/recovery-console-allow-automatic-administrative-logon.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/recovery-console-allow-automatic-administrative-logon", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/remove-computer-from-docking-station.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/remove-computer-from-docking-station", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/replace-a-process-level-token.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/replace-a-process-level-token", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/reset-account-lockout-counter-after.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/reset-account-lockout-counter-after", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/restore-files-and-directories.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/restore-files-and-directories", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/secpol-advanced-security-audit-policy-settings.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/secpol-advanced-security-audit-policy-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/security-options.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/security-options", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/security-policy-settings-reference.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/security-policy-settings-reference", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/security-policy-settings.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/security-policy-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/shut-down-the-system.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/shut-down-the-system", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/shutdown-clear-virtual-memory-pagefile.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/shutdown-clear-virtual-memory-pagefile", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/store-passwords-using-reversible-encryption.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/store-passwords-using-reversible-encryption", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/synchronize-directory-service-data.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/synchronize-directory-service-data", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/system-settings-optional-subsystems.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/system-settings-optional-subsystems", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/take-ownership-of-files-or-other-objects.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/take-ownership-of-files-or-other-objects", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-standard-users.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-standard-users", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/user-rights-assignment.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/user-rights-assignment", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/device-guard/deploy-catalog-files-to-support-windows-defender-application-control.md", -"redirect_url": "/windows/security/threat-protection/device-guard/deploy-catalog-files-to-support-windows-defender-application-control", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/device-guard/deploy-managed-installer-for-device-guard.md", -"redirect_url": "/windows/security/threat-protection/device-guard/deploy-managed-installer-for-device-guard", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/device-guard/deploy-windows-defender-application-control-policy-rules-and-file-rules.md", -"redirect_url": "/windows/security/threat-protection/device-guard/deploy-windows-defender-application-control-policy-rules-and-file-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/device-guard/deploy-windows-defender-application-control.md", -"redirect_url": "/windows/security/threat-protection/device-guard/deploy-windows-defender-application-control", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/device-guard/device-guard-deployment-guide.md", -"redirect_url": "/windows/security/threat-protection/device-guard/device-guard-deployment-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md", -"redirect_url": "/windows/security/threat-protection/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/device-guard/optional-create-a-code-signing-certificate-for-windows-defender-application-control.md", -"redirect_url": "/windows/security/threat-protection/device-guard/optional-create-a-code-signing-certificate-for-windows-defender-application-control", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/device-guard/planning-and-getting-started-on-the-device-guard-deployment-process.md", -"redirect_url": "/windows/security/threat-protection/device-guard/planning-and-getting-started-on-the-device-guard-deployment-process", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/device-guard/requirements-and-deployment-planning-guidelines-for-device-guard.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/memory-integrity.md", -"redirect_url": "/windows/security/threat-protection/device-guard/memory-integrity", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/device-guard/steps-to-deploy-windows-defender-application-control.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/create-initial-default-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/advanced-security-audit-policy-settings.md", -"redirect_url": "/windows/security/threat-protection/auditing/advanced-security-audit-policy-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/advanced-security-auditing-faq.md", -"redirect_url": "/windows/security/threat-protection/auditing/advanced-security-auditing.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/appendix-a-security-monitoring-recommendations-for-many-audit-events.md", -"redirect_url": "/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-account-lockout.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-application-generated.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-application-group-management.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-audit-policy-change.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-authentication-policy-change.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-authorization-policy-change.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-central-access-policy-staging.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-certification-services.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-computer-account-management.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-credential-validation.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-detailed-directory-service-replication.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-detailed-file-share.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-directory-service-access.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-directory-service-changes.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-directory-service-replication.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-distribution-group-management.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-dpapi-activity.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-file-share.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-file-system.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-filtering-platform-connection.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-filtering-platform-packet-drop.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-filtering-platform-policy-change.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-group-membership.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-handle-manipulation.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-ipsec-driver.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-ipsec-extended-mode.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-ipsec-main-mode.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-ipsec-quick-mode.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-kerberos-authentication-service.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-kerberos-service-ticket-operations.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-kernel-object.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-logoff.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-logon.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-mpssvc-rule-level-policy-change.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-network-policy-server.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-non-sensitive-privilege-use.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-other-account-logon-events.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-other-account-management-events.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-other-logonlogoff-events.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-other-object-access-events.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-other-policy-change-events.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-other-privilege-use-events.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-other-system-events.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-pnp-activity.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-process-creation.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-process-termination.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-registry.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-removable-storage.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-rpc-events.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-sam.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-security-group-management.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-security-state-change.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-security-system-extension.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-sensitive-privilege-use.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-special-logon.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-system-integrity.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-user-account-management.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-user-device-claims.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/basic-audit-account-logon-events.md", -"redirect_url": "/windows/security/threat-protection/auditing/basic-audit-account-management.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/basic-audit-directory-service-access.md", -"redirect_url": "/windows/security/threat-protection/auditing/basic-audit-logon-events.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/basic-audit-object-access.md", -"redirect_url": "/windows/security/threat-protection/auditing/basic-audit-policy-change.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/basic-audit-privilege-use.md", -"redirect_url": "/windows/security/threat-protection/auditing/basic-audit-process-tracking.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/basic-audit-system-events.md", -"redirect_url": "/windows/security/threat-protection/auditing/basic-security-audit-policies.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/basic-security-audit-policy-settings.md", -"redirect_url": "/windows/security/threat-protection/auditing/create-a-basic-audit-policy-settings-for-an-event-category.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-1100.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-1102.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-1104.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-1105.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-1108.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4608.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4610.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4611.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4612.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4614.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4615.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4616.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4618.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4621.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4622.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4624.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4625.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4626.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4627.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4634.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4647.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4648.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4649.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4656.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4657.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4658.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4660.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4661.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4662.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4663.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4664.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4670.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4671.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4672.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4673.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4674.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4675.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4688.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4689.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4690.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4691.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4692.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4693.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4694.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4695.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4696.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4697.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4698.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4699.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4700.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4701.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4702.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4703.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4704.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4705.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4706.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4707.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4713.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4714.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4715.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4716.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4717.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4718.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4719.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4720.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4722.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4723.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4724.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4725.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4726.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4731.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4732.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4733.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4734.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4735.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4738.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4739.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4740.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4741.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4742.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4743.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4749.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4750.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4751.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4752.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4753.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4764.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4765.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4766.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4767.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4768.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4769.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4770.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4771.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4772.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4773.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4774.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4775.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4776.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4777.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4778.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4779.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4780.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4781.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4782.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4793.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4794.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4798.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4799.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4800.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4801.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4802.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4803.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4816.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4817.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4818.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4819.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4826.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4864.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4865.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4866.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4867.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4902.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4904.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4905.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4906.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4907.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4908.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4909.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4910.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4911.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4912.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4913.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4928.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4929.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4930.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4931.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4932.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4933.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4934.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4935.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4936.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4937.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4944.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4945.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4946.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4947.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4948.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4949.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4950.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4951.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4952.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4953.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4954.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4956.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4957.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4958.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4964.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4985.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5024.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5025.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5027.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5028.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5029.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5030.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5031.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5032.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5033.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5034.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5035.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5037.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5038.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5039.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5051.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5056.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5057.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5058.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5059.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5060.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5061.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5062.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5063.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5064.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5065.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5066.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5067.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5068.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5069.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5070.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5136.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5137.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5138.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5139.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5140.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5141.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5142.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5143.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5144.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5145.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5148.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5149.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5150.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5151.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5152.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5153.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5154.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5155.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5156.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5157.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5158.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5159.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5168.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5376.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5377.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5378.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5447.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5632.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5633.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5712.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5888.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5889.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5890.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-6144.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-6145.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-6281.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-6400.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-6401.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-6402.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-6403.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-6404.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-6405.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-6406.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-6407.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-6408.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-6409.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-6410.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-6416.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-6419.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-6420.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-6421.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-6422.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-6423.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-6424.md", -"redirect_url": "/windows/security/threat-protection/auditing/file-system-global-object-access-auditing.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/monitor-central-access-policy-and-rule-definitions.md", -"redirect_url": "/windows/security/threat-protection/auditing/monitor-claim-types.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/monitor-resource-attribute-definitions.md", -"redirect_url": "/windows/security/threat-protection/auditing/monitor-the-central-access-policies-associated-with-files-and-folders.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/monitor-the-central-access-policies-that-apply-on-a-file-server.md", -"redirect_url": "/windows/security/threat-protection/auditing/monitor-the-resource-attributes-on-files-and-folders.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/monitor-the-use-of-removable-storage-devices.md", -"redirect_url": "/windows/security/threat-protection/auditing/monitor-user-and-device-claims-during-sign-in.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/other-events.md", -"redirect_url": "/windows/security/threat-protection/auditing/planning-and-deploying-advanced-security-audit-policies.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/registry-global-object-access-auditing.md", -"redirect_url": "/windows/security/threat-protection/auditing/security-auditing-overview.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/using-advanced-security-auditing-options-to-monitor-dynamic-access-control-objects.md", -"redirect_url": "/windows/security/threat-protection/auditing/view-the-security-event-log.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/which-editions-of-windows-support-advanced-audit-policy-configuration.md", -"redirect_url": "/windows/security/threat-protection/auditing/which-editions-of-windows-support-advanced-audit-policy-configuration", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set.md", -"redirect_url": "/windows/security/threat-protection/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/administer-applocker.md", -"redirect_url": "/windows/security/threat-protection/applocker/administer-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/applocker-architecture-and-components.md", -"redirect_url": "/windows/security/threat-protection/applocker/applocker-architecture-and-components", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/applocker-functions.md", -"redirect_url": "/windows/security/threat-protection/applocker/applocker-functions", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/applocker-overview.md", -"redirect_url": "/windows/security/threat-protection/applocker/applocker-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/applocker-policies-deployment-guide.md", -"redirect_url": "/windows/security/threat-protection/applocker/applocker-policies-deployment-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/applocker-policies-design-guide.md", -"redirect_url": "/windows/security/threat-protection/applocker/applocker-policies-design-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/applocker-policy-use-scenarios.md", -"redirect_url": "/windows/security/threat-protection/applocker/applocker-policy-use-scenarios", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/applocker-processes-and-interactions.md", -"redirect_url": "/windows/security/threat-protection/applocker/applocker-processes-and-interactions", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/applocker-settings.md", -"redirect_url": "/windows/security/threat-protection/applocker/applocker-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/applocker-technical-reference.md", -"redirect_url": "/windows/security/threat-protection/applocker/applocker-technical-reference", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/configure-an-applocker-policy-for-audit-only.md", -"redirect_url": "/windows/security/threat-protection/applocker/configure-an-applocker-policy-for-audit-only", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/configure-an-applocker-policy-for-enforce-rules.md", -"redirect_url": "/windows/security/threat-protection/applocker/configure-an-applocker-policy-for-enforce-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/configure-exceptions-for-an-applocker-rule.md", -"redirect_url": "/windows/security/threat-protection/applocker/configure-exceptions-for-an-applocker-rule", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/configure-the-application-identity-service.md", -"redirect_url": "/windows/security/threat-protection/applocker/configure-the-application-identity-service", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/configure-the-appLocker-reference-device.md", -"redirect_url": "/windows/security/threat-protection/applocker/configure-the-appLocker-reference-device", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/create-a-rule-for-packaged-apps.md", -"redirect_url": "/windows/security/threat-protection/applocker/create-a-rule-for-packaged-apps", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/create-a-rule-that-uses-a-file-hash-condition.md", -"redirect_url": "/windows/security/threat-protection/applocker/create-a-rule-that-uses-a-file-hash-condition", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/create-a-rule-that-uses-a-path-condition.md", -"redirect_url": "/windows/security/threat-protection/applocker/create-a-rule-that-uses-a-path-condition", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/create-a-rule-that-uses-a-publisher-condition.md", -"redirect_url": "/windows/security/threat-protection/applocker/create-a-rule-that-uses-a-publisher-condition", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/create-applocker-default-rules.md", -"redirect_url": "/windows/security/threat-protection/applocker/create-applocker-default-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/create-list-of-applications-deployed-to-each-business-group.md", -"redirect_url": "/windows/security/threat-protection/applocker/create-list-of-applications-deployed-to-each-business-group", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/create-your-applocker-planning-document.md", -"redirect_url": "/windows/security/threat-protection/applocker/create-your-applocker-planning-document", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/create-your-applocker-policies.md", -"redirect_url": "/windows/security/threat-protection/applocker/create-your-applocker-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/create-your-applocker-rules.md", -"redirect_url": "/windows/security/threat-protection/applocker/create-your-applocker-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/delete-an-applocker-rule.md", -"redirect_url": "/windows/security/threat-protection/applocker/delete-an-applocker-rule", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting.md", -"redirect_url": "/windows/security/threat-protection/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/deploy-the-applocker-policy-into-production.md", -"redirect_url": "/windows/security/threat-protection/applocker/deploy-the-applocker-policy-into-production", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/determine-group-policy-structure-and-rule-enforcement.md", -"redirect_url": "/windows/security/threat-protection/applocker/determine-group-policy-structure-and-rule-enforcement", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer.md", -"redirect_url": "/windows/security/threat-protection/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/determine-your-application-control-objectives.md", -"redirect_url": "/windows/security/threat-protection/applocker/determine-your-application-control-objectives", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application.md", -"redirect_url": "/windows/security/threat-protection/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/dll-rules-in-applocker.md", -"redirect_url": "/windows/security/threat-protection/applocker/dll-rules-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/document-group-policy-structure-and-applocker-rule-enforcement.md", -"redirect_url": "/windows/security/threat-protection/applocker/document-group-policy-structure-and-applocker-rule-enforcement", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/document-your-application-control-management-processes.md", -"redirect_url": "/windows/security/threat-protection/applocker/document-your-application-control-management-processes", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/document-your-application-list.md", -"redirect_url": "/windows/security/threat-protection/applocker/document-your-application-list", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/document-your-applocker-rules.md", -"redirect_url": "/windows/security/threat-protection/applocker/document-your-applocker-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/edit-an-applocker-policy.md", -"redirect_url": "/windows/security/threat-protection/applocker/edit-an-applocker-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/edit-applocker-rules.md", -"redirect_url": "/windows/security/threat-protection/applocker/edit-applocker-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/enable-the-dll-rule-collection.md", -"redirect_url": "/windows/security/threat-protection/applocker/enable-the-dll-rule-collection", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/enforce-applocker-rules.md", -"redirect_url": "/windows/security/threat-protection/applocker/enforce-applocker-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/executable-rules-in-applocker.md", -"redirect_url": "/windows/security/threat-protection/applocker/executable-rules-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/export-an-applocker-policy-from-a-gpo.md", -"redirect_url": "/windows/security/threat-protection/applocker/export-an-applocker-policy-from-a-gpo", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/export-an-applocker-policy-to-an-xml-file.md", -"redirect_url": "/windows/security/threat-protection/applocker/export-an-applocker-policy-to-an-xml-file", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/how-applocker-works-techref.md", -"redirect_url": "/windows/security/threat-protection/applocker/how-applocker-works-techref", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/import-an-applocker-policy-from-another-computer.md", -"redirect_url": "/windows/security/threat-protection/applocker/import-an-applocker-policy-from-another-computer", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/import-an-applocker-policy-into-a-gpo.md", -"redirect_url": "/windows/security/threat-protection/applocker/import-an-applocker-policy-into-a-gpo", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/maintain-applocker-policies.md", -"redirect_url": "/windows/security/threat-protection/applocker/maintain-applocker-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/manage-packaged-apps-with-applocker.md", -"redirect_url": "/windows/security/threat-protection/applocker/manage-packaged-apps-with-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/merge-applocker-policies-by-using-set-applockerpolicy.md", -"redirect_url": "/windows/security/threat-protection/applocker/merge-applocker-policies-by-using-set-applockerpolicy", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/merge-applocker-policies-manually.md", -"redirect_url": "/windows/security/threat-protection/applocker/merge-applocker-policies-manually", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/monitor-application-usage-with-applocker.md", -"redirect_url": "/windows/security/threat-protection/applocker/monitor-application-usage-with-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/optimize-applocker-performance.md", -"redirect_url": "/windows/security/threat-protection/applocker/optimize-applocker-performance", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker.md", -"redirect_url": "/windows/security/threat-protection/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/plan-for-applocker-policy-management.md", -"redirect_url": "/windows/security/threat-protection/applocker/plan-for-applocker-policy-management", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/refresh-an-applocker-policy.md", -"redirect_url": "/windows/security/threat-protection/applocker/refresh-an-applocker-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/requirements-for-deploying-applocker-policies.md", -"redirect_url": "/windows/security/threat-protection/applocker/requirements-for-deploying-applocker-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/requirements-to-use-applocker.md", -"redirect_url": "/windows/security/threat-protection/applocker/requirements-to-use-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/run-the-automatically-generate-rules-wizard.md", -"redirect_url": "/windows/security/threat-protection/applocker/run-the-automatically-generate-rules-wizard", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/script-rules-in-applocker.md", -"redirect_url": "/windows/security/threat-protection/applocker/script-rules-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/security-considerations-for-applocker.md", -"redirect_url": "/windows/security/threat-protection/applocker/security-considerations-for-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/select-types-of-rules-to-create.md", -"redirect_url": "/windows/security/threat-protection/applocker/select-types-of-rules-to-create", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/test-an-applocker-policy-by-using-test-applockerpolicy.md", -"redirect_url": "/windows/security/threat-protection/applocker/test-an-applocker-policy-by-using-test-applockerpolicy", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/test-and-update-an-applocker-policy.md", -"redirect_url": "/windows/security/threat-protection/applocker/test-and-update-an-applocker-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/tools-to-use-with-applocker.md", -"redirect_url": "/windows/security/threat-protection/applocker/tools-to-use-with-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/understand-applocker-enforcement-settings.md", -"redirect_url": "/windows/security/threat-protection/applocker/understand-applocker-enforcement-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/understand-applocker-policy-design-decisions.md", -"redirect_url": "/windows/security/threat-protection/applocker/understand-applocker-policy-design-decisions", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy.md", -"redirect_url": "/windows/security/threat-protection/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/understand-the-applocker-policy-deployment-process.md", -"redirect_url": "/windows/security/threat-protection/applocker/understand-the-applocker-policy-deployment-process", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/understanding-applocker-allow-and-deny-actions-on-rules.md", -"redirect_url": "/windows/security/threat-protection/applocker/understanding-applocker-allow-and-deny-actions-on-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/understanding-applocker-default-rules.md", -"redirect_url": "/windows/security/threat-protection/applocker/understanding-applocker-default-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/understanding-applocker-rule-behavior.md", -"redirect_url": "/windows/security/threat-protection/applocker/understanding-applocker-rule-behavior", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/understanding-applocker-rule-collections.md", -"redirect_url": "/windows/security/threat-protection/applocker/understanding-applocker-rule-collections", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/understanding-applocker-rule-condition-types.md", -"redirect_url": "/windows/security/threat-protection/applocker/understanding-applocker-rule-condition-types", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/understanding-applocker-rule-exceptions.md", -"redirect_url": "/windows/security/threat-protection/applocker/understanding-applocker-rule-exceptions", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/understanding-the-file-hash-rule-condition-in-applocker.md", -"redirect_url": "/windows/security/threat-protection/applocker/understanding-the-file-hash-rule-condition-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/understanding-the-path-rule-condition-in-applocker.md", -"redirect_url": "/windows/security/threat-protection/applocker/understanding-the-path-rule-condition-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/understanding-the-publisher-rule-condition-in-applocker.md", -"redirect_url": "/windows/security/threat-protection/applocker/understanding-the-publisher-rule-condition-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies.md", -"redirect_url": "/windows/security/threat-protection/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain.md", -"redirect_url": "/windows/security/threat-protection/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/use-the-applocker-windows-powershell-cmdlets.md", -"redirect_url": "/windows/security/threat-protection/applocker/use-the-applocker-windows-powershell-cmdlets", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/using-event-viewer-with-applocker.md", -"redirect_url": "/windows/security/threat-protection/applocker/using-event-viewer-with-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/using-software-restriction-policies-and-applocker-policies.md", -"redirect_url": "/windows/security/threat-protection/applocker/using-software-restriction-policies-and-applocker-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/what-is-applocker.md", -"redirect_url": "/windows/security/threat-protection/applocker/what-is-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/windows-installer-rules-in-applocker.md", -"redirect_url": "/windows/security/threat-protection/applocker/windows-installer-rules-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/working-with-applocker-policies.md", -"redirect_url": "/windows/security/threat-protection/applocker/working-with-applocker-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/working-with-applocker-rules.md", -"redirect_url": "/windows/security/threat-protection/applocker/working-with-applocker-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/change-history-for-device-security.md", -"redirect_url": "/windows/security/threat-protection/change-history-for-device-security", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/enable-virtualization-based-protection-of-code-integrity.md", -"redirect_url": "/windows/security/threat-protection/enable-virtualization-based-protection-of-code-integrity", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity.md", -"redirect_url": "/windows/security/threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/get-support-for-security-baselines.md", -"redirect_url": "/windows/security/threat-protection/get-support-for-security-baselines", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices.md", -"redirect_url": "/windows/security/threat-protection/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-compliance-toolkit-10.md", -"redirect_url": "/windows/security/threat-protection/security-compliance-toolkit-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/windows-10-mobile-security-guide.md", -"redirect_url": "/windows/security/threat-protection/windows-10-mobile-security-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/windows-security-baselines.md", -"redirect_url": "/windows/security/threat-protection/windows-security-baselines", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-information-protection/app-behavior-with-wip.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/app-behavior-with-wip", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-information-protection/collect-wip-audit-event-logs.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/collect-wip-audit-event-logs", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune-azure.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune-azure", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-information-protection/create-wip-policy-using-intune-azure.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-information-protection/create-wip-policy-using-intune.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-information-protection/create-wip-policy-using-mam-intune-azure.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/create-wip-policy-using-mam-intune-azure", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-information-protection/create-wip-policy-using-sccm.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/create-wip-policy-using-sccm", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-information-protection/deploy-wip-policy-using-intune-azure.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/deploy-wip-policy-using-intune-azure", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-information-protection/deploy-wip-policy-using-intune.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/deploy-wip-policy-using-intune", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-information-protection/enlightened-microsoft-apps-and-wip.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/enlightened-microsoft-apps-and-wip", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-information-protection/guidance-and-best-practices-wip.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/guidance-and-best-practices-wip", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-information-protection/limitations-with-wip.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/limitations-with-wip", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-information-protection/mandatory-settings-for-wip.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/mandatory-settings-for-wip", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-information-protection/overview-create-wip-policy-sccm.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/overview-create-wip-policy-sccm", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-information-protection/overview-create-wip-policy.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/overview-create-wip-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-information-protection/protect-enterprise-data-using-wip.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/protect-enterprise-data-using-wip", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-information-protection/recommended-network-definitions-for-wip.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/recommended-network-definitions-for-wip", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-information-protection/testing-scenarios-for-wip.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/testing-scenarios-for-wip", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-information-protection/using-owa-with-wip.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/using-owa-with-wip", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-information-protection/wip-app-enterprise-context.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/wip-app-enterprise-context", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/encrypted-hard-drive.md", -"redirect_url": "/windows/security/hardware-protection/encrypted-hard-drive", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/how-hardware-based-containers-help-protect-windows.md", -"redirect_url": "/windows/security/hardware-protection/how-hardware-based-containers-help-protect-windows", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/secure-the-windows-10-boot-process.md", -"redirect_url": "/windows/security/hardware-protection/secure-the-windows-10-boot-process", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/tpm/backup-tpm-recovery-information-to-ad-ds.md", -"redirect_url": "/windows/security/hardware-protection/tpm/backup-tpm-recovery-information-to-ad-ds", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/tpm/change-the-tpm-owner-password.md", -"redirect_url": "/windows/securityhardware-protection/tpm/change-the-tpm-owner-password", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/tpm/how-windows-uses-the-tpm.md", -"redirect_url": "/windows/securityhardware-protection/tpm/how-windows-uses-the-tpm", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/tpm/initialize-and-configure-ownership-of-the-tpm.md", -"redirect_url": "/windows/security/hardware-protection/tpm/initialize-and-configure-ownership-of-the-tpm", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/tpm/manage-tpm-commands.md", -"redirect_url": "/windows/security/hardware-protection/tpm/manage-tpm-commands", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/tpm/manage-tpm-lockout.md", -"redirect_url": "/windows/security/hardware-protection/tpm/manage-tpm-lockout", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/tpm/switch-pcr-banks-on-tpm-2-0-devices.md", -"redirect_url": "/windows/security/hardware-protection/tpm/switch-pcr-banks-on-tpm-2-0-devices", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/tpm/tpm-fundamentals.md", -"redirect_url": "/windows/security/hardware-protection/tpm/tpm-fundamentals", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/tpm/tpm-recommendations.md", -"redirect_url": "/windows/security/hardware-protection/tpm/tpm-recommendations", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/tpm/trusted-platform-module-overview.md", -"redirect_url": "/windows/security/hardware-protection/tpm/trusted-platform-module-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/tpm/trusted-platform-module-services-group-policy-settings.md", -"redirect_url": "/windows/security/hardware-protection/tpm/trusted-platform-module-services-group-policy-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/tpm/trusted-platform-module-top-node.md", -"redirect_url": "/windows/security/hardware-protection/tpm/trusted-platform-module-top-node", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/bitlocker/bcd-settings-and-bitlocker.md", -"redirect_url": "/windows/security/information-protection/bitlocker/bcd-settings-and-bitlocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/bitlocker/bitlocker-basic-deployment.md", -"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-basic-deployment", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/bitlocker/bitlocker-countermeasures.md", -"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-countermeasures", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/bitlocker/bitlocker-device-encryption-overview-windows-10.md", -"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/bitlocker/bitlocker-frequently-asked-questions.md", -"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-frequently-asked-questions", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/bitlocker/bitlocker-group-policy-settings.md", -"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/bitlocker/bitlocker-how-to-deploy-on-windows-server.md", -"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-how-to-deploy-on-windows-server", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/bitlocker/bitlocker-how-to-enable-network-unlock.md", -"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/bitlocker/bitlocker-management-for-enterprises.md", -"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-management-for-enterprises", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/bitlocker/bitlocker-overview.md", -"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/bitlocker/bitlocker-recovery-guide-plan.md", -"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-recovery-guide-plan", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/bitlocker/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md", -"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/bitlocker/bitlocker-use-bitlocker-recovery-password-viewer.md", -"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-use-bitlocker-recovery-password-viewer", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/bitlocker/choose-the-right-bitlocker-countermeasure.md", -"redirect_url": "/windows/security/information-protection/bitlocker/choose-the-right-bitlocker-countermeasure", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md", -"redirect_url": "/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/bitlocker/protect-bitlocker-from-pre-boot-attacks.md", -"redirect_url": "/windows/security/information-protection/bitlocker/protect-bitlocker-from-pre-boot-attacks", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md", -"redirect_url": "/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/bitlocker/types-of-attacks-for-volume-encryption-keys.md", -"redirect_url": "/windows/security/information-protection/bitlocker/types-of-attacks-for-volume-encryption-keys", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-credential-theft-mitigation-guide-abstract.md", -"redirect_url": "/windows/security/identity-protection/windows-credential-theft-mitigation-guide-abstract", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/change-history-for-access-protection.md", -"redirect_url": "/windows/security/identity-protection/change-history-for-access-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/configure-s-mime.md", -"redirect_url": "/windows/security/identity-protection/configure-s-mime", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/enterprise-certificate-pinning.md", -"redirect_url": "/windows/security/identity-protection/enterprise-certificate-pinning", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/installing-digital-certificates-on-windows-10-mobile.md", -"redirect_url": "/windows/security/identity-protection/installing-digital-certificates-on-windows-10-mobile", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/remote-credential-guard.md", -"redirect_url": "/windows/security/identity-protection/remote-credential-guard", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/add-production-devices-to-the-membership-group-for-a-zone.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/add-production-devices-to-the-membership-group-for-a-zone", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/add-test-devices-to-the-membership-group-for-a-zone.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/add-test-devices-to-the-membership-group-for-a-zone", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/assign-security-group-filters-to-the-gpo.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/assign-security-group-filters-to-the-gpo", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/basic-firewall-policy-design.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/basic-firewall-policy-design", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/boundary-zone-gpos.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/boundary-zone-gpos", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/boundary-zone.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/boundary-zone", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/certificate-based-isolation-policy-design-example.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/certificate-based-isolation-policy-design-example", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/certificate-based-isolation-policy-design.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/certificate-based-isolation-policy-design", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/change-rules-from-request-to-require-mode.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/change-rules-from-request-to-require-mode", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/checklist-configuring-basic-firewall-settings.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-configuring-basic-firewall-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/checklist-configuring-rules-for-an-isolated-server-zone.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-configuring-rules-for-an-isolated-server-zone", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/checklist-configuring-rules-for-the-boundary-zone.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-configuring-rules-for-the-boundary-zone", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/checklist-configuring-rules-for-the-encryption-zone.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-configuring-rules-for-the-encryption-zone", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/checklist-configuring-rules-for-the-isolated-domain.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-configuring-rules-for-the-isolated-domain", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/checklist-creating-group-policy-objects.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-creating-group-policy-objects", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/checklist-creating-inbound-firewall-rules.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-creating-inbound-firewall-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/checklist-creating-outbound-firewall-rules.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-creating-outbound-firewall-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/checklist-implementing-a-basic-firewall-policy-design.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-implementing-a-basic-firewall-policy-design", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/checklist-implementing-a-certificate-based-isolation-policy-design.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-implementing-a-certificate-based-isolation-policy-design", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/checklist-implementing-a-domain-isolation-policy-design.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-implementing-a-domain-isolation-policy-design", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/checklist-implementing-a-standalone-server-isolation-policy-design.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-implementing-a-standalone-server-isolation-policy-design", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/configure-authentication-methods.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/configure-authentication-methods", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/configure-data-protection-quick-mode-settings.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/configure-data-protection-quick-mode-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/configure-group-policy-to-autoenroll-and-deploy-certificates.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/configure-group-policy-to-autoenroll-and-deploy-certificates", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/configure-key-exchange-main-mode-settings.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/configure-key-exchange-main-mode-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/configure-the-rules-to-require-encryption.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/configure-the-rules-to-require-encryption", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/configure-the-windows-firewall-log.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/configure-the-windows-firewall-log", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/configure-the-workstation-authentication-certificate-template.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/configure-the-workstation-authentication-certificate-template", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/confirm-that-certificates-are-deployed-correctly.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/confirm-that-certificates-are-deployed-correctly", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/copy-a-gpo-to-create-a-new-gpo.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/copy-a-gpo-to-create-a-new-gpo", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/create-a-group-account-in-active-directory.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/create-a-group-account-in-active-directory", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/create-a-group-policy-object.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/create-a-group-policy-object", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/create-an-authentication-exemption-list-rule.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/create-an-authentication-exemption-list-rule", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/create-an-authentication-request-rule.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/create-an-authentication-request-rule", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/create-an-inbound-icmp-rule.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/create-an-inbound-icmp-rule", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/create-an-inbound-port-rule.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/create-an-inbound-port-rule", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/create-an-inbound-program-or-service-rule.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/create-an-inbound-program-or-service-rule", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/create-an-outbound-port-rule.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/create-an-outbound-port-rule", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/create-an-outbound-program-or-service-rule.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/create-an-outbound-program-or-service-rule", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/create-inbound-rules-to-support-rpc.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/create-inbound-rules-to-support-rpc", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/create-wmi-filters-for-the-gpo.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/create-wmi-filters-for-the-gpo", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/determining-the-trusted-state-of-your-devices.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/determining-the-trusted-state-of-your-devices", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/documenting-the-zones.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/documenting-the-zones", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/domain-isolation-policy-design-example.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/domain-isolation-policy-design-example", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/domain-isolation-policy-design.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/domain-isolation-policy-design", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/enable-predefined-inbound-rules.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/enable-predefined-inbound-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/enable-predefined-outbound-rules.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/enable-predefined-outbound-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/encryption-zone-gpos.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/encryption-zone-gpos", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/encryption-zone.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/encryption-zone", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/evaluating-windows-firewall-with-advanced-security-design-examples.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/evaluating-windows-firewall-with-advanced-security-design-examples", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/exempt-icmp-from-authentication.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/exempt-icmp-from-authentication", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/exemption-list.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/exemption-list", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/firewall-gpos.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/firewall-gpos", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/firewall-policy-design-example.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/firewall-policy-design-example", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/gathering-information-about-your-active-directory-deployment.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/gathering-information-about-your-active-directory-deployment", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/gathering-information-about-your-current-network-infrastructure.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/gathering-information-about-your-current-network-infrastructure", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/gathering-information-about-your-devices.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/gathering-information-about-your-devices", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/gathering-other-relevant-information.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/gathering-other-relevant-information", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/gathering-the-information-you-need.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/gathering-the-information-you-need", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/gpo-domiso-boundary.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/gpo-domiso-boundary", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/gpo-domiso-encryption.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/gpo-domiso-encryption", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/gpo-domiso-firewall.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/gpo-domiso-firewall", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/gpo-domiso-isolateddomain-clients.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/gpo-domiso-isolateddomain-clients", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/gpo-domiso-isolateddomain-servers.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/gpo-domiso-isolateddomain-servers", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/implementing-your-windows-firewall-with-advanced-security-design-plan.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/implementing-your-windows-firewall-with-advanced-security-design-plan", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/isolated-domain-gpos.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/isolated-domain-gpos", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/isolated-domain.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/isolated-domain", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/isolating-apps-on-your-network.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/isolating-apps-on-your-network", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/link-the-gpo-to-the-domain.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/link-the-gpo-to-the-domain", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/open-the-group-policy-management-console-to-ip-security-policies.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/open-the-group-policy-management-console-to-ip-security-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/open-windows-firewall-with-advanced-security.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/open-windows-firewall-with-advanced-security", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/planning-certificate-based-authentication.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/planning-certificate-based-authentication", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/planning-domain-isolation-zones.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/planning-domain-isolation-zones", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/planning-gpo-deployment.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/planning-gpo-deployment", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/planning-group-policy-deployment-for-your-isolation-zones.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/planning-group-policy-deployment-for-your-isolation-zones", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/planning-isolation-groups-for-the-zones.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/planning-isolation-groups-for-the-zones", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/planning-network-access-groups.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/planning-network-access-groups", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/planning-server-isolation-zones.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/planning-server-isolation-zones", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/planning-settings-for-a-basic-firewall-policy.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/planning-settings-for-a-basic-firewall-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/planning-the-gpos.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/planning-the-gpos", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/planning-your-windows-firewall-with-advanced-security-design.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/planning-your-windows-firewall-with-advanced-security-design", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/procedures-used-in-this-guide.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/procedures-used-in-this-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/protect-devices-from-unwanted-network-traffic.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/protect-devices-from-unwanted-network-traffic", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/require-encryption-when-accessing-sensitive-network-resources.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/require-encryption-when-accessing-sensitive-network-resources", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/restrict-access-to-only-specified-users-or-devices.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/restrict-access-to-only-specified-users-or-devices", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/restrict-access-to-only-trusted-devices.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/restrict-access-to-only-trusted-devices", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/restrict-server-access-to-members-of-a-group-only.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/restrict-server-access-to-members-of-a-group-only", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/securing-end-to-end-ipsec-connections-by-using-ikev2.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/securing-end-to-end-ipsec-connections-by-using-ikev2", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/server-isolation-gpos.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/server-isolation-gpos", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/server-isolation-policy-design-example.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/server-isolation-policy-design-example", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/server-isolation-policy-design.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/server-isolation-policy-design", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/turn-on-windows-firewall-and-configure-default-behavior.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/turn-on-windows-firewall-and-configure-default-behavior", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/understanding-the-windows-firewall-with-advanced-security-design-process.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/understanding-the-windows-firewall-with-advanced-security-design-process", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/verify-that-network-traffic-is-authenticated.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/verify-that-network-traffic-is-authenticated", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/windows-firewall-with-advanced-security-deployment-guide.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/windows-firewall-with-advanced-security-deployment-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/windows-firewall-with-advanced-security-design-guide.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/windows-firewall-with-advanced-security-design-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/windows-firewall-with-advanced-security.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/windows-firewall-with-advanced-security", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/vpn/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections.md", -"redirect_url": "/windows/security/identity-protection/vpn/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/vpn/vpn-authentication.md", -"redirect_url": "/windows/security/identity-protection/vpn/vpn-authentication", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/vpn/vpn-auto-trigger-profile.md", -"redirect_url": "/windows/security/identity-protection/vpn/vpn-auto-trigger-profile", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/vpn/vpn-conditional-access.md", -"redirect_url": "/windows/security/identity-protection/vpn/vpn-conditional-access", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/vpn/vpn-connection-type.md", -"redirect_url": "/windows/security/identity-protection/vpn/vpn-connection-type", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/vpn/vpn-guide.md", -"redirect_url": "/windows/security/identity-protection/vpn/vpn-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/vpn/vpn-name-resolution.md", -"redirect_url": "/windows/security/identity-protection/vpn/vpn-name-resolution", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/vpn/vpn-profile-options.md", -"redirect_url": "/windows/security/identity-protection/vpn/vpn-profile-options", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/vpn/vpn-routing.md", -"redirect_url": "/windows/security/identity-protection/vpn/vpn-routing", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/vpn/vpn-security-features.md", -"redirect_url": "/windows/security/identity-protection/vpn/vpn-security-features", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/virtual-smart-cards/virtual-smart-card-deploy-virtual-smart-cards.md", -"redirect_url": "/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-deploy-virtual-smart-cards", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/virtual-smart-cards/virtual-smart-card-evaluate-security.md", -"redirect_url": "/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-evaluate-security", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/virtual-smart-cards/virtual-smart-card-get-started.md", -"redirect_url": "/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-get-started", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/virtual-smart-cards/virtual-smart-card-overview.md", -"redirect_url": "/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/virtual-smart-cards/virtual-smart-card-tpmvscmgr.md", -"redirect_url": "/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-tpmvscmgr", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/virtual-smart-cards/virtual-smart-card-understanding-and-evaluating.md", -"redirect_url": "/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-understanding-and-evaluating", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards.md", -"redirect_url": "/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/user-account-control/how-user-account-control-works.md", -"redirect_url": "/windows/security/identity-protection/user-account-control/how-user-account-control-works", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/user-account-control/user-account-control-group-policy-and-registry-key-settings.md", -"redirect_url": "/windows/security/identity-protection/user-account-control/user-account-control-group-policy-and-registry-key-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/user-account-control/user-account-control-overview.md", -"redirect_url": "/windows/security/identity-protection/user-account-control/user-account-control-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/user-account-control/user-account-control-security-policy-settings.md", -"redirect_url": "/windows/security/identity-protection/user-account-control/user-account-control-security-policy-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/smart-cards/smart-card-certificate-requirements-and-enumeration.md", -"redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-certificate-requirements-and-enumeration", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/smart-cards/smart-card-debugging-information.md", -"redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-debugging-information", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/smart-cards/smart-card-events.md", -"redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-events", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/smart-cards/smart-card-group-policy-and-registry-settings.md", -"redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-group-policy-and-registry-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/smart-cards/smart-card-how-smart-card-sign-in-works-in-windows.md", -"redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-how-smart-card-sign-in-works-in-windows", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/smart-cards/smart-card-removal-policy-service.md", -"redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-removal-policy-service", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/smart-cards/smart-card-smart-cards-for-windows-service.md", -"redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-smart-cards-for-windows-service", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/smart-cards/smart-card-tools-and-settings.md", -"redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-tools-and-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/smart-cards/smart-card-windows-smart-card-technical-reference.md", -"redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-windows-smart-card-technical-reference", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/smart-cards/smart-card-and-remote-desktop-services.md", -"redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-and-remote-desktop-services", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/smart-cards/smart-card-architecture.md", -"redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-architecture", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/smart-cards/smart-card-certificate-propagation-service.md", -"redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-certificate-propagation-service", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-and-password-changes.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-and-password-changes", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-biometrics-in-enterprise.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-biometrics-in-enterprise", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-cert-trust-adfs.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-cert-trust-adfs", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-cert-trust-deploy-mfa.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-cert-trust-deploy-mfa", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-cert-trust-policy-settings.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-cert-trust-policy-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-cert-trust-validate-ad-prereq.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-cert-trust-validate-ad-prereq", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-cert-trust-validate-deploy-mfa.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-cert-trust-validate-deploy-mfa", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-cert-trust-validate-pki.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-cert-trust-validate-pki", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-deployment-cert-trust.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-deployment-cert-trust", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-deployment-guide.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-deployment-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-deployment-key-trust.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-deployment-key-trust", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-errors-during-pin-creation.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-errors-during-pin-creation", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-event-300.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-event-300", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-features.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-features", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-how-it-works.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-how-it-works", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-new-install.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-new-install", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-trust.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-trust-devreg.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-devreg", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-trust-prereqs.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-prereqs", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-provision.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-provision", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-settings.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-settings-ad.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-ad", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-settings-adfs.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-adfs", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-settings-dir-sync.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-dir-sync", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-settings-pki.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-pki", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-settings-policy.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-new-install.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-new-install", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-trust.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-trust-devreg.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-devreg", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-trust-dirsync.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-dirsync", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-whfb-provision.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-provision", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-whfb-settings.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-whfb-settings-ad.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings-ad", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-whfb-settings-dir-sync.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings-dir-sync", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-whfb-settings-pki.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings-pki", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-whfb-settings-policy.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-identity-verification.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-identity-verification", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-key-trust-adfs.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-key-trust-adfs", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-key-trust-deploy-mfa.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-key-trust-deploy-mfa", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-key-trust-policy-settings.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-key-trust-policy-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-key-trust-validate-ad-prereq.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-key-trust-validate-ad-prereq", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-key-trust-validate-deploy-mfa.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-key-trust-validate-deploy-mfa", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-key-trust-validate-pki.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-key-trust-validate-pki", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-manage-in-organization.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-manage-in-organization", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-overview.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-planning-guide.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-planning-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-prepare-people-to-use.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-prepare-people-to-use", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-why-pin-is-better-than-password.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-why-pin-is-better-than-password", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/credential-guard/additional-mitigations.md", -"redirect_url": "/windows/security/identity-protection/credential-guard/additional-mitigations", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/credential-guard/credential-guard.md", -"redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/credential-guard/credential-guard-considerations.md", -"redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-considerations", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/credential-guard/credential-guard-how-it-works.md", -"redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-how-it-works", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/credential-guard/credential-guard-known-issues.md", -"redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-known-issues", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/credential-guard/credential-guard-manage.md", -"redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-manage", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/credential-guard/credential-guard-not-protected-scenarios.md", -"redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-not-protected-scenarios", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/credential-guard/credential-guard-protection-limits.md", -"redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-protection-limits", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/credential-guard/credential-guard-requirements.md", -"redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-requirements", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/credential-guard/credential-guard-scripts.md", -"redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-scripts", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/access-control/access-control.md", -"redirect_url": "/windows/security/identity-protection/access-control/access-control", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/access-control/active-directory-accounts.md", -"redirect_url": "/windows/security/identity-protection/access-control/active-directory-accounts", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/access-control/active-directory-security-groups.md", -"redirect_url": "/windows/security/identity-protection/access-control/active-directory-security-groups", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/access-control/dynamic-access-control.md", -"redirect_url": "/windows/security/identity-protection/access-control/dynamic-access-control", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/access-control/local-accounts.md", -"redirect_url": "/windows/security/identity-protection/access-control/local-accounts", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/access-control/microsoft-accounts.md", -"redirect_url": "/windows/security/identity-protection/access-control/microsoft-accounts", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/access-control/security-identifiers.md", -"redirect_url": "/windows/security/identity-protection/access-control/security-identifiers", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/access-control/security-principals.md", -"redirect_url": "/windows/security/identity-protection/access-control/security-principals", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/access-control/service-accounts.md", -"redirect_url": "/windows/security/identity-protection/access-control/service-accounts", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/access-control/special-identities.md", -"redirect_url": "/windows/security/identity-protection/access-control/special-identities", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/device-guard/deploy-code-integrity-policies-steps.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/create-initial-default-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/device-guard/optional-create-a-code-signing-certificate-for-code-integrity-policies.md", -"redirect_url": "/windows/device-security/device-guard/optional-create-a-code-signing-certificate-for-windows-defender-application-control", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/device-guard/introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies.md", -"redirect_url": "/windows/device-security/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/device-guard/deploy-code-integrity-policies-policy-rules-and-file-rules.md", -"redirect_url": "/windows/device-security/device-guard/deploy-windows-defender-application-control-policy-rules-and-file-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/device-guard/deploy-device-guard-deploy-code-integrity-policies.md", -"redirect_url": "/windows/device-security/device-guard/deploy-windows-defender-application-control", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/device-guard/deploy-catalog-files-to-support-code-integrity-policies.md", -"redirect_url": "/windows/device-security/device-guard/deploy-catalog-files-to-support-windows-defender-application-control", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/use-windows-event-forwarding-to-assist-in-instrusion-detection.md", -"redirect_url": "/windows/threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection", -"redirect_document_id": true -}, -{ -"source_path": "devices/surface/surface-device-compatibility-with-windows-10-ltsb.md", -"redirect_url": "/devices/surface/surface-device-compatibility-with-windows-10-ltsc", -"redirect_document_id": true -}, -{ -"source_path": "windows/configuration/windows-diagnostic-data-1709.md", -"redirect_url": "/windows/configuration/windows-diagnostic-data", -"redirect_document_id": true -}, -{ -"source_path": "windows/configuration/EventName.md", -"redirect_url": "/windows/configuration/enhanced-telemetry-windows-analytics-events-and-fields", -"redirect_document_id": true -}, -{ -"source_path": "education/windows/windows-10-pro-to-pro-edu-upgrade.md", -"redirect_url": "/education/windows/switch-to-pro-education", -"redirect_document_id": false -}, -{ -"source_path": "education/windows/switch-to-pro-education.md", -"redirect_url": "/education/windows/change-to-pro-education", -"redirect_document_id": true -}, -{ - "source_path": "education/windows/swithc-to-pro-de.md", + "redirections": [ + { + "source_path": "windows/application-management/msix-app-packaging-tool-walkthrough.md", + "redirect_url": "https://docs.microsoft.com/windows/msix/mpt-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/security/information-protection/windows-information-protection/create-wip-policy-using-mam-intune-azure.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure", + "redirect_document_id": true + }, + { + "source_path": "windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure", + "redirect_document_id": false + }, + { + "source_path": "windows/security/information-protection/windows-information-protection/deploy-wip-policy-using-intune.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/deploy-wip-policy-using-intune-azure", + "redirect_document_id": true + }, + { + "source_path": "windows/security/information-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune-azure", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/how-hardware-based-containers-help-protect-windows.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-system-guard/how-hardware-based-containers-help-protect-windows", + "redirect_document_id": true + }, + { + "source_path": "browsers/edge/enterprise-guidance-using-microsoft-edge-and-ie11.md", + "redirect_url": "https://docs.microsoft.com/microsoft-edge/deploy/emie-to-improve-compatibility", + "redirect_document_id": true + }, + { + "source_path": "windows/deployment/update/windows-update-sources.md", + "redirect_url": "/windows/deployment/update/how-windows-update-works", + "redirect_document_id": true + }, + { + "source_path": "browsers/edge/hardware-and-software-requirements.md", + "redirect_url": "https://docs.microsoft.com/microsoft-edge/deploy/about-microsoft-edge", + "redirect_document_id": true + }, + { + "source_path": "browsers/edge/security-enhancements-microsoft-edge.md", + "redirect_url": "https://docs.microsoft.com/microsoft-edge/deploy/group-policies/security-privacy-management-gp", + "redirect_document_id": true + }, + { + "source_path": "browsers/edge/new-policies.md", + "redirect_url": "https://docs.microsoft.com/microsoft-edge/deploy/change-history-for-microsoft-edge", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/intelligence/av-tests.md", + "redirect_url": "/windows/security/threat-protection/intelligence/top-scoring-industry-antivirus-tests", + "redirect_document_id": true + }, + { + "source_path": "windows/security/information-protection/bitlocker/protect-bitlocker-from-pre-boot-attacks.md", + "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-countermeasures", + "redirect_document_id": true + }, + { + "source_path": "windows/security/information-protection/bitlocker/types-of-attacks-for-volume-encryption-keys.md", + "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-countermeasures", + "redirect_document_id": false + }, + { + "source_path": "windows/security/information-protection/bitlocker/choose-the-right-bitlocker-countermeasure.md", + "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-countermeasures", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/intelligence/transparency-report.md", + "redirect_url": "/windows/security/threat-protection/intelligence/av-tests", + "redirect_document_id": true + }, + { + "source_path": "windows/deployment/update/waas-windows-insider-for-business-aad.md", + "redirect_url": "https://docs.microsoft.com/windows-insider/at-work-pro/wip-4-biz-add", + "redirect_document_id": true + }, + { + "source_path": "windows/deployment/update/waas-windows-insider-for-business-faq.md", + "redirect_url": "https://docs.microsoft.com/windows-insider/at-work-pro/wip-4-biz-get-started", + "redirect_document_id": true + }, + { + "source_path": "windows/security/identity-protection/how-hardware-based-containers-help-protect-windows.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/how-hardware-based-containers-help-protect-windows", + "redirect_document_id": true + }, + { + "source_path": "windows/security/hardware-protection/how-hardware-based-containers-help-protect-windows.md", + "redirect_url": "/windows/security/identity-protection/how-hardware-based-containers-help-protect-windows", + "redirect_document_id": true + }, + { + "source_path": "windows/security/hardware-protection/encrypted-hard-drive.md", + "redirect_url": "/windows/security/information-protection/encrypted-hard-drive", + "redirect_document_id": true + }, + { + "source_path": "windows/security/hardware-protection/secure-the-windows-10-boot-process.md", + "redirect_url": "/windows/security/information-protection/secure-the-windows-10-boot-process", + "redirect_document_id": true + }, + { + "source_path": "windows/security/hardware-protection/tpm/backup-tpm-recovery-information-to-ad-ds.md", + "redirect_url": "/windows/security/information-protection/tpm/backup-tpm-recovery-information-to-ad-ds", + "redirect_document_id": true + }, + { + "source_path": "windows/security/hardware-protection/tpm/change-the-tpm-owner-password.md", + "redirect_url": "/windows/security/information-protection/tpm/change-the-tpm-owner-password", + "redirect_document_id": true + }, + { + "source_path": "windows/security/hardware-protection/tpm/how-windows-uses-the-tpm.md", + "redirect_url": "/windows/security/information-protection/tpm/how-windows-uses-the-tpm", + "redirect_document_id": true + }, + { + "source_path": "windows/security/hardware-protection/tpm/initialize-and-configure-ownership-of-the-tpm.md", + "redirect_url": "/windows/security/information-protection/tpm/initialize-and-configure-ownership-of-the-tpm", + "redirect_document_id": true + }, + { + "source_path": "windows/security/hardware-protection/tpm/manage-tpm-commands.md", + "redirect_url": "/windows/security/information-protection/tpm/manage-tpm-commands", + "redirect_document_id": true + }, + { + "source_path": "windows/security/hardware-protection/tpm/manage-tpm-lockout.md", + "redirect_url": "/windows/security/information-protection/tpm/manage-tpm-lockout", + "redirect_document_id": true + }, + { + "source_path": "windows/security/hardware-protection/tpm/switch-pcr-banks-on-tpm-2-0-devices.md", + "redirect_url": "/windows/security/information-protection/tpm/switch-pcr-banks-on-tpm-2-0-devices", + "redirect_document_id": true + }, + { + "source_path": "windows/security/hardware-protection/tpm/tpm-fundamentals.md", + "redirect_url": "/windows/security/information-protection/tpm/tpm-fundamentals", + "redirect_document_id": true + }, + { + "source_path": "windows/security/hardware-protection/tpm/tpm-recommendations.md", + "redirect_url": "/windows/security/information-protection/tpm/tpm-recommendations", + "redirect_document_id": true + }, + { + "source_path": "windows/security/hardware-protection/tpm/trusted-platform-module-overview.md", + "redirect_url": "/windows/security/information-protection/tpm/trusted-platform-module-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/security/hardware-protection/tpm/trusted-platform-module-services-group-policy-settings.md", + "redirect_url": "/windows/security/information-protection/tpm/trusted-platform-module-services-group-policy-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/security/hardware-protection/tpm/trusted-platform-module-top-node.md", + "redirect_url": "/windows/security/information-protection/tpm/trusted-platform-module-top-node", + "redirect_document_id": true + }, + { + "source_path": "windows/deployment/update/waas-windows-insider-for-business.md", + "redirect_url": "/windows-insider/at-work-pro/wip-4-biz-get-started", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/device-guard/device-guard-deployment-guide.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-deployment-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/microsoft-network-client-digitally-sign-communications-if-server-agrees.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-client-digitally-sign-communications-if-server-agrees", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/microsoft-network-server-digitally-sign-communications-if-client-agress.md", + "redirect_url": "/windows/security/threat-protectionsecurity-policy-settings/smbv1-microsoft-network-server-digitally-sign-communications-if-client-agrees", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-application-control.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/administer-applocker-using-mdm.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/administer-applocker-using-mdm", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/administer-applocker.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/administer-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/applocker-architecture-and-components.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-architecture-and-components", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/applocker-functions.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-functions", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/applocker-overview.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/applocker-policies-deployment-guide.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policies-deployment-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/applocker-policies-design-guide.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policies-design-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/applocker-policy-use-scenarios.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policy-use-scenarios", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/applocker-processes-and-interactions.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-processes-and-interactions", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/applocker-settings.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/applocker-technical-reference.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-technical-reference", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/configure-an-applocker-policy-for-audit-only.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/configure-an-applocker-policy-for-audit-only", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/configure-an-applocker-policy-for-enforce-rules.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/configure-an-applocker-policy-for-enforce-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/configure-exceptions-for-an-applocker-rule.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/configure-exceptions-for-an-applocker-rule", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/configure-the-application-identity-service.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/configure-the-application-identity-service", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/configure-the-appLocker-reference-device.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/configure-the-appLocker-reference-device", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/create-a-rule-for-packaged-apps.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-for-packaged-apps", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/create-a-rule-that-uses-a-file-hash-condition.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-file-hash-condition", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/create-a-rule-that-uses-a-path-condition.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-path-condition", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/create-a-rule-that-uses-a-publisher-condition.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-publisher-condition", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/create-applocker-default-rules.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-applocker-default-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/create-list-of-applications-deployed-to-each-business-group.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-list-of-applications-deployed-to-each-business-group", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/create-your-applocker-policies.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-your-applocker-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/create-your-applocker-rules.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-your-applocker-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/delete-an-applocker-rule.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/delete-an-applocker-rule", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/deploy-the-applocker-policy-into-production.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/deploy-the-applocker-policy-into-production", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/determine-group-policy-structure-and-rule-enforcement.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/determine-group-policy-structure-and-rule-enforcement", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/determine-your-application-control-objectives.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/determine-your-application-control-objectives", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/dll-rules-in-applocker.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/dll-rules-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/document-group-policy-structure-and-applocker-rule-enforcement.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/document-group-policy-structure-and-applocker-rule-enforcement", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/document-your-application-list.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/document-your-application-list", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/document-your-applocker-rules.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/document-your-applocker-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/edit-an-applocker-policy.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/edit-an-applocker-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/edit-applocker-rules.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/edit-applocker-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/enable-the-dll-rule-collection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/enable-the-dll-rule-collection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/enforce-applocker-rules.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/enforce-applocker-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/executable-rules-in-applocker.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/executable-rules-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/export-an-applocker-policy-from-a-gpo.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/export-an-applocker-policy-from-a-gpo", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/export-an-applocker-policy-to-an-xml-file.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/export-an-applocker-policy-to-an-xml-file", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/how-applocker-works-techref.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/how-applocker-works-techref", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/import-an-applocker-policy-from-another-computer.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/import-an-applocker-policy-from-another-computer", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/import-an-applocker-policy-into-a-gpo.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/import-an-applocker-policy-into-a-gpo", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/maintain-applocker-policies.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/maintain-applocker-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/manage-packaged-apps-with-applocker.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/manage-packaged-apps-with-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/merge-applocker-policies-by-using-set-applockerpolicy.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/merge-applocker-policies-by-using-set-applockerpolicy", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/merge-applocker-policies-manually.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/merge-applocker-policies-manually", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/monitor-application-usage-with-applocker.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/monitor-application-usage-with-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/optimize-applocker-performance.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/optimize-applocker-performance", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/plan-for-applocker-policy-management.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/plan-for-applocker-policy-management", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/refresh-an-applocker-policy.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/refresh-an-applocker-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/requirements-for-deploying-applocker-policies.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/requirements-for-deploying-applocker-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/requirements-to-use-applocker.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/requirements-to-use-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/run-the-automatically-generate-rules-wizard.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/run-the-automatically-generate-rules-wizard", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/script-rules-in-applocker.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/script-rules-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/security-considerations-for-applocker.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/security-considerations-for-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/select-types-of-rules-to-create.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/select-types-of-rules-to-create", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/test-an-applocker-policy-by-using-test-applockerpolicy.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/test-an-applocker-policy-by-using-test-applockerpolicy", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/test-and-update-an-applocker-policy.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/test-and-update-an-applocker-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/tools-to-use-with-applocker.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/tools-to-use-with-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/understand-applocker-enforcement-settings.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-enforcement-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/understand-applocker-policy-design-decisions.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-policy-design-decisions", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/understand-the-applocker-policy-deployment-process.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understand-the-applocker-policy-deployment-process", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/understanding-applocker-allow-and-deny-actions-on-rules.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-allow-and-deny-actions-on-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/understanding-applocker-default-rules.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-default-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/understanding-applocker-rule-behavior.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-behavior", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/understanding-applocker-rule-collections.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-collections", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/understanding-applocker-rule-condition-types.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-condition-types", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/understanding-applocker-rule-exceptions.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-exceptions", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/understanding-the-file-hash-rule-condition-in-applocker.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-file-hash-rule-condition-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/understanding-the-path-rule-condition-in-applocker.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-path-rule-condition-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/understanding-the-publisher-rule-condition-in-applocker.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-publisher-rule-condition-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/use-the-applocker-windows-powershell-cmdlets.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/use-the-applocker-windows-powershell-cmdlets", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/using-event-viewer-with-applocker.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/using-event-viewer-with-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/using-software-restriction-policies-and-applocker-policies.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/using-software-restriction-policies-and-applocker-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/what-is-applocker.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/what-is-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/windows-installer-rules-in-applocker.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/windows-installer-rules-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/working-with-applocker-policies.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/working-with-applocker-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/working-with-applocker-rules.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/working-with-applocker-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/oldtoc.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-rules-in-windows-10-enterprise-e3.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction-rules-in-windows-10-enterprise-e3", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/microsoft-defender-atp/manage-automation-allowed-blocked-list.md", + "redirect_url": "windows/security/threat-protection/microsoft-defender-atp/manage-indicators", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/device-guard/optional-create-a-code-signing-certificate-for-windows-defender-application-control.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/create-code-signing-cert-for-windows-defender-application-control", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/device-guard/deploy-windows-defender-application-control-policy-rules-and-file-rules.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/device-guard/steps-to-deploy-windows-defender-application-control.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/create-initial-default-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/device-guard/deploy-catalog-files-to-support-windows-defender-application-control.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/deploy-catalog-files-to-support-windows-defender-application-control", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/device-guard/deploy-managed-installer-for-device-guard.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-managed-installer", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/device-guard/device-guard-deployment-enable-virtualization-based-security.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/enable-virtualization-based-security", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-set-individual-device.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-set-individual-device", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-security-center/wdsc-app-browser-control.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-security-center/wdsc-app-browser-control", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-security-center/wdsc-customize-contact-information.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-security-center/wdsc-customize-contact-information", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-security-center/wdsc-device-performance-health.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-security-center/wdsc-device-performance-health", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-security-center/wdsc-family-options.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-security-center/wdsc-family-options", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-security-center/wdsc-firewall-network-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-security-center/wdsc-firewall-network-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-security-center/wdsc-hide-notifications.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-security-center/wdsc-hide-notifications", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-security-center/wdsc-virus-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-security-center/wdsc-virus-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-security-center/windows-defender-security-center.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-security-center/windows-defender-security-center", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/audit-windows-defender", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/collect-cab-files-exploit-guard-submission.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/collect-cab-files-exploit-guard-submission", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/collect-cab-files-exploit-guard-submission.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-np", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/controlled-folders", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/customize-attack-surface-reduction", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/customize-controlled-folders", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/customize-exploit-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/customize-exploit-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/emet-exploit-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/enable-attack-surface-reduction", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/enable-controlled-folders", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/enable-exploit-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/enable-exploit-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/enable-exploit-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/enable-exploit-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/enable-network-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/enable-network-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/evaluate-attack-surface-reduction", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/evaluate-controlled-folder-access", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/evaluate-exploit-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-network-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/evaluate-network-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/evaluate-windows-defender-exploit-guard.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-windows-defender-exploit-guard", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/evaluate-windows-defender-exploit-guard.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/evaluate-atp", + "redirect_document_id": false + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/event-views", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/exploit-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/graphics.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/graphics", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/import-export-exploit-protection-emet-xml", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/network-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/prerelease.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/prerelease", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-asr", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-asr", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-exploit-protection-mitigations", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection", + "redirect_document_id": false + }, + { + "source_path": "windows/keep-secure/advanced-features-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/advanced-features", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/advanced-hunting-best-practices-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-best-practices", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/advanced-hunting-reference-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-reference", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/alerts-queue", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/alerts-queue-endpoint-detection-response.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/alerts-queue-endpoint-detection-response", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/apis-intro.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/apis-intro", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/api-hello-world.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/api-hello-world", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/assign-portal-access-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/assign-portal-access", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/attack-simulations-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/attack-simulations", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/automated-investigations", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/basic-permissions-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/basic-permissions", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/check-sensor-status", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/community-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/community-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/community-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/community", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/conditional-access", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-arcsight-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-arcsight", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/configure-and-manage-tvm.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-and-manage-tvm", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/tvm-dashboard-insights.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/tvm-dashboard-insights", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/configure-attack-surface-reduction.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-attack-surface-reduction", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/configuration-score.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configuration-score", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/configure-conditional-access-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-conditional-access", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-email-notifications", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/additional-configuration-windows-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/monitor-onboarding-windows-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection", + "redirect_document_id": false + }, + { + "source_path": "windows/keep-secure/configure-endpoints-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-non-windows", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-script", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-vdi-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-vdi-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-vdi-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/configure-mssp-support-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-siem", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-splunk", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/custom-ti-api", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/custom-detection-rules.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/custom-detection-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/general-settings-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/data-retention-settings-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/data-retention-settings-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/data-retention-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/data-storage-privacy", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/defender-compatibility", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/deprecate.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/deprecate", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/enable-custom-ti", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/microsoft-defender-atp/enable-custom-ti.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-indicators", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/enable-security-analytics-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/enable-secure-score-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/enable-secure-score-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/enable-secure-score", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-aad-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/enable-siem-integration-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/evaluate-atp.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/evaluate-atp", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/event-error-codes", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/experiment-custom-ti", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/fix-unhealthy-sensors", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/fix-unhealthy-sensors.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/fix-unhealthy-sensors", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-cvekbmap-collection-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/get-cvekbmap-collection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-cvekbmap-collection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-cvekbmap-collection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-kbinfo-collection-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/get-kbinfo-collection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-kbinfo-collection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-kbinfo-collection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-machinegroups-collection-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/get-machinegroups-collection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-machinegroups-collection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machinegroups-collection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-machinesecuritystates-collection-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/get-machinesecuritystates-collection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-machinesecuritystates-collection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machinesecuritystates-collection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-config.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-config", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-overview.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-alerts", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-domain", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-files", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/investigate-incidents-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-incidents", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-ip", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-machines", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-user", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/licensing-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/licensing-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/licensing-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/licensing", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/machine-groups-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machine-groups", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/machine-reports-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machine-reports", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machines-view-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/machine-tags-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machine-tags", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-alerts", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/manage-auto-investigation-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-automation-allowed-blocked-list", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/manage-automation-file-uploads-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-automation-file-uploads", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/manage-automation-folder-exclusions-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-automation-folder-exclusions", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/manage-edr.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-edr", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/management-apis.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/management-apis", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/manage-incidents-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-incidents", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/manage-suppression-rules-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-suppression-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/mssp-support-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/mssp-support", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/next-gen-threat-and-vuln-mgt.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/offboard-machines-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/offboard-machines", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/onboard-configure-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/onboard-configure", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/onboard-downlevel", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/onboard.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/onboard", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/onboard-offline-machines.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/onboard-offline-machines", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/overview.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/overview", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/overview-attack-surface-reduction.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/overview-attack-surface-reduction", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/overview-endpoint-detection-response.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/overview-endpoint-detection-response", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/overview-hardware-based-isolation.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/overview-hardware-based-isolation", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/overview-hunting-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/overview-hunting", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/overview-secure-score-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/partner-applications.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/partner-applications", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/portal-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/powerbi-reports", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/powershell-example-code", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/preferences-setup-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/use-apis", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/microsoft-defender-atp/use-apis.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/preferences-setup", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/prerelease.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/prerelease", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/prerelease.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/prerelease", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/preview", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/preview-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/python-example-code", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/rbac-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/rbac", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/microsoft-defender-atp/response-actions.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts", + "redirect_document_id": false + }, + { + "source_path": "windows/keep-secure/response-actions-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/response-actions", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/run-detection-test-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/run-detection-test-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/run-detection-test-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-detection-test", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/security-analytics-dashboard-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/secure-score-dashboard", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/dashboard-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/security-operations-dashboard-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/security-operations-dashboard-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/service-status", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/supported-response-apis-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/supported-response-apis-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/supported-response-apis-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/supported-response-apis", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/threat-indicator-concepts", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/threat-protection-integration.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/threat-protection-integration", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/threat-protection-reports-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/threat-protection-reports", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/settings-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/time-settings-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/time-settings-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/time-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/troubleshoot-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/troubleshoot-windows-defender-in-windows-10.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/troubleshoot-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/troubleshoot-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/troubleshoot-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/troubleshoot-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/troubleshoot-overview.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-custom-ti", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-siem", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/use-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/use-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/use", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/use-custom-ti", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/user-roles-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/user-roles", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/whats-new-in-microsoft-defender-atp", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-config.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-config", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-integration.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-integration", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/windows-defender-security-center-atp.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-security-center", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-threat-experts", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-application-guard/install-wd-app-guard.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-guard/install-wd-app-guard", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-application-guard/test-scenarios-wd-app-guard.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-guard/test-scenarios-wd-app-guard", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-application-guard/wd-app-guard-overview.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-guard/wd-app-guard-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/collect-diagnostic-data-update-compliance.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/collect-diagnostic-data-update-compliance", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/configure-cloud-block-timeout-period-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-cloud-block-timeout-period-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/configure-end-user-interaction-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-end-user-interaction-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/configure-exclusions-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-exclusions-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/configure-local-policy-overrides-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-local-policy-overrides-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/configure-protection-features-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-protection-features-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/configure-remediation-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-remediation-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/deploy-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/deploy-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/evaluate-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/evaluate-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/limited-periodic-scanning-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/limited-periodic-scanning-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/manage-event-based-updates-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/manage-event-based-updates-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/manage-outdated-endpoints-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/manage-outdated-endpoints-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/manage-protection-update-schedule-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/manage-protection-update-schedule-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/manage-updates-mobile-devices-vms-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/manage-updates-mobile-devices-vms-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/prevent-end-user-interaction-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/prevent-end-user-interaction-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/report-monitor-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/report-monitor-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/review-scan-results-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/review-scan-results-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/run-scan-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/run-scan-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/troubleshoot-reporting.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-reporting", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/use-group-policy-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/use-group-policy-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/use-wmi-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/use-wmi-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/windows-defender-offline.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/windows-defender-offline", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/block-untrusted-fonts-in-enterprise.md", + "redirect_url": "/windows/security/threat-protection/block-untrusted-fonts-in-enterprise", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/change-history-for-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/change-history-for-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/override-mitigation-options-for-app-related-security-policies.md", + "redirect_url": "/windows/security/threat-protection/override-mitigation-options-for-app-related-security-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/overview-of-threat-mitigations-in-windows-10.md", + "redirect_url": "/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection.md", + "redirect_url": "/windows/security/threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/wannacrypt-ransomware-worm-targets-out-of-date-systems-wdsi.md", + "redirect_url": "/windows/security/threat-protection/wannacrypt-ransomware-worm-targets-out-of-date-systems-wdsi", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-application-control.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/access-credential-manager-as-a-trusted-caller.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/access-credential-manager-as-a-trusted-caller", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/access-this-computer-from-the-network.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/account-lockout-duration.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/account-lockout-duration", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/account-lockout-policy.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/account-lockout-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/account-lockout-threshold.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/account-lockout-threshold", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/account-policies.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/account-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/accounts-administrator-account-status.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/accounts-administrator-account-status", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/accounts-block-microsoft-accounts.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/accounts-block-microsoft-accounts", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/accounts-guest-account-status.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/accounts-guest-account-status", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/accounts-rename-administrator-account.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/accounts-rename-administrator-account", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/accounts-rename-guest-account.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/accounts-rename-guest-account", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/act-as-part-of-the-operating-system.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/act-as-part-of-the-operating-system", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/add-workstations-to-domain.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/add-workstations-to-domain", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/adjust-memory-quotas-for-a-process.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/adjust-memory-quotas-for-a-process", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/administer-security-policy-settings.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/administer-security-policy-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/allow-log-on-locally.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/allow-log-on-locally", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/allow-log-on-through-remote-desktop-services.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/allow-log-on-through-remote-desktop-services", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/audit-audit-the-access-of-global-system-objects.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/audit-audit-the-access-of-global-system-objects", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/audit-audit-the-use-of-backup-and-restore-privilege.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/audit-audit-the-use-of-backup-and-restore-privilege", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/audit-force-audit-policy-subcategory-settings-to-override.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/audit-force-audit-policy-subcategory-settings-to-override", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/audit-policy.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/audit-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/audit-shut-down-system-immediately-if-unable-to-log-security-audits.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/audit-shut-down-system-immediately-if-unable-to-log-security-audits", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/back-up-files-and-directories.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/back-up-files-and-directories", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/bypass-traverse-checking.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/bypass-traverse-checking", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/change-the-system-time.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/change-the-system-time", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/change-the-time-zone.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/change-the-time-zone", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/create-a-pagefile.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/create-a-pagefile", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/create-a-token-object.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/create-a-token-object", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/create-global-objects.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/create-global-objects", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/create-permanent-shared-objects.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/create-permanent-shared-objects", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/create-symbolic-links.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/create-symbolic-links", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/debug-programs.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/debug-programs", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/deny-access-to-this-computer-from-the-network.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/deny-access-to-this-computer-from-the-network", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/deny-log-on-as-a-batch-job.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-batch-job", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/deny-log-on-as-a-service.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-service", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/deny-log-on-locally.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/deny-log-on-locally", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/deny-log-on-through-remote-desktop-services.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/deny-log-on-through-remote-desktop-services", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/devices-allow-undock-without-having-to-log-on.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/devices-allow-undock-without-having-to-log-on", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/devices-allowed-to-format-and-eject-removable-media.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/devices-allowed-to-format-and-eject-removable-media", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/devices-prevent-users-from-installing-printer-drivers.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/devices-prevent-users-from-installing-printer-drivers", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/devices-restrict-cd-rom-access-to-locally-logged-on-user-only.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/devices-restrict-cd-rom-access-to-locally-logged-on-user-only", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/devices-restrict-floppy-access-to-locally-logged-on-user-only.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/devices-restrict-floppy-access-to-locally-logged-on-user-only", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/domain-controller-ldap-server-signing-requirements.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-controller-ldap-server-signing-requirements", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/domain-controller-refuse-machine-account-password-changes.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-controller-refuse-machine-account-password-changes", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-or-sign-secure-channel-data-always", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/domain-member-digitally-encrypt-secure-channel-data-when-possible.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-secure-channel-data-when-possible", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/domain-member-digitally-sign-secure-channel-data-when-possible.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-member-digitally-sign-secure-channel-data-when-possible", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/domain-member-disable-machine-account-password-changes.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-member-disable-machine-account-password-changes", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/domain-member-maximum-machine-account-password-age.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-member-maximum-machine-account-password-age", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/domain-member-require-strong-windows-2000-or-later-session-key.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-member-require-strong-windows-2000-or-later-session-key", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/enforce-password-history.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/enforce-password-history", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/enforce-user-logon-restrictions.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/enforce-user-logon-restrictions", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/force-shutdown-from-a-remote-system.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/force-shutdown-from-a-remote-system", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/generate-security-audits.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/generate-security-audits", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/how-to-configure-security-policy-settings.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/how-to-configure-security-policy-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/impersonate-a-client-after-authentication.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/increase-a-process-working-set.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/increase-a-process-working-set", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/increase-scheduling-priority.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/increase-scheduling-priority", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/interactive-logon-display-user-information-when-the-session-is-locked.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-display-user-information-when-the-session-is-locked", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/interactive-logon-do-not-display-last-user-name.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-display-last-user-name", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/interactive-logon-do-not-require-ctrl-alt-del.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-require-ctrl-alt-del", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/interactive-logon-dont-display-username-at-sign-in.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-dont-display-username-at-sign-in", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/interactive-logon-machine-account-lockout-threshold.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-account-lockout-threshold", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/interactive-logon-machine-inactivity-limit.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-inactivity-limit", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/interactive-logon-message-text-for-users-attempting-to-log-on.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-message-text-for-users-attempting-to-log-on", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/interactive-logon-message-title-for-users-attempting-to-log-on.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-message-title-for-users-attempting-to-log-on", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/interactive-logon-prompt-user-to-change-password-before-expiration.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-prompt-user-to-change-password-before-expiration", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/interactive-logon-require-domain-controller-authentication-to-unlock-workstation.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-require-domain-controller-authentication-to-unlock-workstation", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/interactive-logon-require-smart-card.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-require-smart-card", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/interactive-logon-smart-card-removal-behavior.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-smart-card-removal-behavior", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/kerberos-policy.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/kerberos-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/load-and-unload-device-drivers.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/load-and-unload-device-drivers", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/lock-pages-in-memory.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/lock-pages-in-memory", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/log-on-as-a-batch-job.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/log-on-as-a-batch-job", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/log-on-as-a-service.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/log-on-as-a-service", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/manage-auditing-and-security-log.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/manage-auditing-and-security-log", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/maximum-lifetime-for-service-ticket.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-service-ticket", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/maximum-lifetime-for-user-ticket-renewal.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket-renewal", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/maximum-lifetime-for-user-ticket.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/maximum-password-age.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/maximum-password-age", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/maximum-tolerance-for-computer-clock-synchronization.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/maximum-tolerance-for-computer-clock-synchronization", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/microsoft-network-client-digitally-sign-communications-always.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-client-digitally-sign-communications-always", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/microsoft-network-client-digitally-sign-communications-if-server-agrees.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-client-digitally-sign-communications-if-server-agrees", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/microsoft-network-server-digitally-sign-communications-always.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-server-digitally-sign-communications-always", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/microsoft-network-server-digitally-sign-communications-if-client-agrees.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-server-digitally-sign-communications-if-client-agrees", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/minimum-password-age.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/minimum-password-age", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/minimum-password-length.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/minimum-password-length", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/modify-an-object-label.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/modify-an-object-label", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/modify-firmware-environment-values.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/modify-firmware-environment-values", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-access-allow-anonymous-sidname-translation.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-allow-anonymous-sidname-translation", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-access-remotely-accessible-registry-paths.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-access-restrict-anonymous-access-to-named-pipes-and-shares.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-restrict-anonymous-access-to-named-pipes-and-shares", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-list-manager-policies.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-list-manager-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-security-allow-localsystem-null-session-fallback.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-allow-localsystem-null-session-fallback", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-security-force-logoff-when-logon-hours-expire.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-force-logoff-when-logon-hours-expire", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-security-lan-manager-authentication-level.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-security-ldap-client-signing-requirements.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-ldap-client-signing-requirements", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/password-must-meet-complexity-requirements.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/password-must-meet-complexity-requirements", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/password-policy.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/password-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/perform-volume-maintenance-tasks.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/perform-volume-maintenance-tasks", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/profile-single-process.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/profile-single-process", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/profile-system-performance.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/profile-system-performance", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/recovery-console-allow-automatic-administrative-logon.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/recovery-console-allow-automatic-administrative-logon", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/remove-computer-from-docking-station.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/remove-computer-from-docking-station", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/replace-a-process-level-token.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/replace-a-process-level-token", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/reset-account-lockout-counter-after.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/reset-account-lockout-counter-after", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/restore-files-and-directories.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/restore-files-and-directories", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/secpol-advanced-security-audit-policy-settings.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/secpol-advanced-security-audit-policy-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/security-options.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/security-options", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/security-policy-settings-reference.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/security-policy-settings-reference", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/security-policy-settings.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/security-policy-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/shut-down-the-system.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/shut-down-the-system", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/shutdown-clear-virtual-memory-pagefile.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/shutdown-clear-virtual-memory-pagefile", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/store-passwords-using-reversible-encryption.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/store-passwords-using-reversible-encryption", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/synchronize-directory-service-data.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/synchronize-directory-service-data", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/system-settings-optional-subsystems.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/system-settings-optional-subsystems", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/take-ownership-of-files-or-other-objects.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/take-ownership-of-files-or-other-objects", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-standard-users.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-standard-users", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/user-rights-assignment.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/user-rights-assignment", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/device-guard/deploy-catalog-files-to-support-windows-defender-application-control.md", + "redirect_url": "/windows/security/threat-protection/device-guard/deploy-catalog-files-to-support-windows-defender-application-control", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/device-guard/deploy-managed-installer-for-device-guard.md", + "redirect_url": "/windows/security/threat-protection/device-guard/deploy-managed-installer-for-device-guard", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/device-guard/deploy-windows-defender-application-control-policy-rules-and-file-rules.md", + "redirect_url": "/windows/security/threat-protection/device-guard/deploy-windows-defender-application-control-policy-rules-and-file-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/device-guard/deploy-windows-defender-application-control.md", + "redirect_url": "/windows/security/threat-protection/device-guard/deploy-windows-defender-application-control", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/device-guard/device-guard-deployment-guide.md", + "redirect_url": "/windows/security/threat-protection/device-guard/device-guard-deployment-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md", + "redirect_url": "/windows/security/threat-protection/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/device-guard/optional-create-a-code-signing-certificate-for-windows-defender-application-control.md", + "redirect_url": "/windows/security/threat-protection/device-guard/optional-create-a-code-signing-certificate-for-windows-defender-application-control", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/device-guard/planning-and-getting-started-on-the-device-guard-deployment-process.md", + "redirect_url": "/windows/security/threat-protection/device-guard/planning-and-getting-started-on-the-device-guard-deployment-process", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/device-guard/requirements-and-deployment-planning-guidelines-for-device-guard.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/memory-integrity.md", + "redirect_url": "/windows/security/threat-protection/device-guard/memory-integrity", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/device-guard/steps-to-deploy-windows-defender-application-control.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/create-initial-default-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/advanced-security-audit-policy-settings.md", + "redirect_url": "/windows/security/threat-protection/auditing/advanced-security-audit-policy-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/advanced-security-auditing-faq.md", + "redirect_url": "/windows/security/threat-protection/auditing/advanced-security-auditing.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/appendix-a-security-monitoring-recommendations-for-many-audit-events.md", + "redirect_url": "/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-account-lockout.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-application-generated.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-application-group-management.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-audit-policy-change.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-authentication-policy-change.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-authorization-policy-change.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-central-access-policy-staging.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-certification-services.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-computer-account-management.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-credential-validation.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-detailed-directory-service-replication.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-detailed-file-share.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-directory-service-access.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-directory-service-changes.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-directory-service-replication.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-distribution-group-management.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-dpapi-activity.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-file-share.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-file-system.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-filtering-platform-connection.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-filtering-platform-packet-drop.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-filtering-platform-policy-change.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-group-membership.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-handle-manipulation.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-ipsec-driver.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-ipsec-extended-mode.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-ipsec-main-mode.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-ipsec-quick-mode.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-kerberos-authentication-service.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-kerberos-service-ticket-operations.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-kernel-object.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-logoff.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-logon.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-mpssvc-rule-level-policy-change.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-network-policy-server.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-non-sensitive-privilege-use.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-other-account-logon-events.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-other-account-management-events.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-other-logonlogoff-events.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-other-object-access-events.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-other-policy-change-events.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-other-privilege-use-events.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-other-system-events.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-pnp-activity.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-process-creation.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-process-termination.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-registry.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-removable-storage.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-rpc-events.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-sam.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-security-group-management.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-security-state-change.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-security-system-extension.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-sensitive-privilege-use.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-special-logon.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-system-integrity.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-user-account-management.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-user-device-claims.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/basic-audit-account-logon-events.md", + "redirect_url": "/windows/security/threat-protection/auditing/basic-audit-account-management.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/basic-audit-directory-service-access.md", + "redirect_url": "/windows/security/threat-protection/auditing/basic-audit-logon-events.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/basic-audit-object-access.md", + "redirect_url": "/windows/security/threat-protection/auditing/basic-audit-policy-change.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/basic-audit-privilege-use.md", + "redirect_url": "/windows/security/threat-protection/auditing/basic-audit-process-tracking.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/basic-audit-system-events.md", + "redirect_url": "/windows/security/threat-protection/auditing/basic-security-audit-policies.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/basic-security-audit-policy-settings.md", + "redirect_url": "/windows/security/threat-protection/auditing/create-a-basic-audit-policy-settings-for-an-event-category.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-1100.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-1102.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-1104.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-1105.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-1108.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4608.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4610.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4611.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4612.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4614.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4615.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4616.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4618.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4621.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4622.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4624.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4625.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4626.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4627.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4634.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4647.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4648.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4649.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4656.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4657.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4658.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4660.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4661.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4662.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4663.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4664.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4670.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4671.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4672.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4673.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4674.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4675.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4688.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4689.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4690.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4691.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4692.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4693.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4694.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4695.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4696.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4697.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4698.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4699.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4700.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4701.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4702.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4703.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4704.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4705.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4706.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4707.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4713.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4714.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4715.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4716.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4717.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4718.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4719.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4720.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4722.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4723.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4724.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4725.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4726.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4731.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4732.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4733.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4734.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4735.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4738.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4739.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4740.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4741.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4742.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4743.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4749.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4750.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4751.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4752.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4753.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4764.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4765.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4766.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4767.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4768.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4769.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4770.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4771.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4772.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4773.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4774.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4775.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4776.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4777.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4778.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4779.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4780.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4781.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4782.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4793.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4794.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4798.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4799.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4800.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4801.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4802.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4803.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4816.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4817.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4818.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4819.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4826.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4864.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4865.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4866.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4867.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4902.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4904.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4905.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4906.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4907.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4908.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4909.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4910.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4911.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4912.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4913.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4928.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4929.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4930.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4931.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4932.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4933.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4934.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4935.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4936.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4937.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4944.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4945.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4946.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4947.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4948.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4949.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4950.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4951.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4952.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4953.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4954.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4956.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4957.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4958.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4964.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4985.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5024.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5025.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5027.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5028.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5029.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5030.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5031.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5032.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5033.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5034.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5035.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5037.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5038.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5039.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5051.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5056.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5057.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5058.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5059.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5060.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5061.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5062.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5063.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5064.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5065.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5066.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5067.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5068.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5069.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5070.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5136.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5137.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5138.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5139.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5140.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5141.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5142.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5143.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5144.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5145.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5148.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5149.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5150.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5151.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5152.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5153.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5154.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5155.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5156.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5157.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5158.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5159.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5168.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5376.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5377.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5378.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5447.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5632.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5633.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5712.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5888.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5889.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5890.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-6144.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-6145.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-6281.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-6400.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-6401.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-6402.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-6403.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-6404.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-6405.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-6406.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-6407.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-6408.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-6409.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-6410.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-6416.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-6419.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-6420.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-6421.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-6422.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-6423.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-6424.md", + "redirect_url": "/windows/security/threat-protection/auditing/file-system-global-object-access-auditing.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/monitor-central-access-policy-and-rule-definitions.md", + "redirect_url": "/windows/security/threat-protection/auditing/monitor-claim-types.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/monitor-resource-attribute-definitions.md", + "redirect_url": "/windows/security/threat-protection/auditing/monitor-the-central-access-policies-associated-with-files-and-folders.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/monitor-the-central-access-policies-that-apply-on-a-file-server.md", + "redirect_url": "/windows/security/threat-protection/auditing/monitor-the-resource-attributes-on-files-and-folders.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/monitor-the-use-of-removable-storage-devices.md", + "redirect_url": "/windows/security/threat-protection/auditing/monitor-user-and-device-claims-during-sign-in.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/other-events.md", + "redirect_url": "/windows/security/threat-protection/auditing/planning-and-deploying-advanced-security-audit-policies.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/registry-global-object-access-auditing.md", + "redirect_url": "/windows/security/threat-protection/auditing/security-auditing-overview.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/using-advanced-security-auditing-options-to-monitor-dynamic-access-control-objects.md", + "redirect_url": "/windows/security/threat-protection/auditing/view-the-security-event-log.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/which-editions-of-windows-support-advanced-audit-policy-configuration.md", + "redirect_url": "/windows/security/threat-protection/auditing/which-editions-of-windows-support-advanced-audit-policy-configuration", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set.md", + "redirect_url": "/windows/security/threat-protection/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/administer-applocker.md", + "redirect_url": "/windows/security/threat-protection/applocker/administer-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/applocker-architecture-and-components.md", + "redirect_url": "/windows/security/threat-protection/applocker/applocker-architecture-and-components", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/applocker-functions.md", + "redirect_url": "/windows/security/threat-protection/applocker/applocker-functions", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/applocker-overview.md", + "redirect_url": "/windows/security/threat-protection/applocker/applocker-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/applocker-policies-deployment-guide.md", + "redirect_url": "/windows/security/threat-protection/applocker/applocker-policies-deployment-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/applocker-policies-design-guide.md", + "redirect_url": "/windows/security/threat-protection/applocker/applocker-policies-design-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/applocker-policy-use-scenarios.md", + "redirect_url": "/windows/security/threat-protection/applocker/applocker-policy-use-scenarios", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/applocker-processes-and-interactions.md", + "redirect_url": "/windows/security/threat-protection/applocker/applocker-processes-and-interactions", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/applocker-settings.md", + "redirect_url": "/windows/security/threat-protection/applocker/applocker-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/applocker-technical-reference.md", + "redirect_url": "/windows/security/threat-protection/applocker/applocker-technical-reference", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/configure-an-applocker-policy-for-audit-only.md", + "redirect_url": "/windows/security/threat-protection/applocker/configure-an-applocker-policy-for-audit-only", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/configure-an-applocker-policy-for-enforce-rules.md", + "redirect_url": "/windows/security/threat-protection/applocker/configure-an-applocker-policy-for-enforce-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/configure-exceptions-for-an-applocker-rule.md", + "redirect_url": "/windows/security/threat-protection/applocker/configure-exceptions-for-an-applocker-rule", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/configure-the-application-identity-service.md", + "redirect_url": "/windows/security/threat-protection/applocker/configure-the-application-identity-service", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/configure-the-appLocker-reference-device.md", + "redirect_url": "/windows/security/threat-protection/applocker/configure-the-appLocker-reference-device", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/create-a-rule-for-packaged-apps.md", + "redirect_url": "/windows/security/threat-protection/applocker/create-a-rule-for-packaged-apps", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/create-a-rule-that-uses-a-file-hash-condition.md", + "redirect_url": "/windows/security/threat-protection/applocker/create-a-rule-that-uses-a-file-hash-condition", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/create-a-rule-that-uses-a-path-condition.md", + "redirect_url": "/windows/security/threat-protection/applocker/create-a-rule-that-uses-a-path-condition", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/create-a-rule-that-uses-a-publisher-condition.md", + "redirect_url": "/windows/security/threat-protection/applocker/create-a-rule-that-uses-a-publisher-condition", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/create-applocker-default-rules.md", + "redirect_url": "/windows/security/threat-protection/applocker/create-applocker-default-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/create-list-of-applications-deployed-to-each-business-group.md", + "redirect_url": "/windows/security/threat-protection/applocker/create-list-of-applications-deployed-to-each-business-group", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/create-your-applocker-planning-document.md", + "redirect_url": "/windows/security/threat-protection/applocker/create-your-applocker-planning-document", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/create-your-applocker-policies.md", + "redirect_url": "/windows/security/threat-protection/applocker/create-your-applocker-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/create-your-applocker-rules.md", + "redirect_url": "/windows/security/threat-protection/applocker/create-your-applocker-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/delete-an-applocker-rule.md", + "redirect_url": "/windows/security/threat-protection/applocker/delete-an-applocker-rule", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting.md", + "redirect_url": "/windows/security/threat-protection/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/deploy-the-applocker-policy-into-production.md", + "redirect_url": "/windows/security/threat-protection/applocker/deploy-the-applocker-policy-into-production", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/determine-group-policy-structure-and-rule-enforcement.md", + "redirect_url": "/windows/security/threat-protection/applocker/determine-group-policy-structure-and-rule-enforcement", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer.md", + "redirect_url": "/windows/security/threat-protection/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/determine-your-application-control-objectives.md", + "redirect_url": "/windows/security/threat-protection/applocker/determine-your-application-control-objectives", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application.md", + "redirect_url": "/windows/security/threat-protection/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/dll-rules-in-applocker.md", + "redirect_url": "/windows/security/threat-protection/applocker/dll-rules-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/document-group-policy-structure-and-applocker-rule-enforcement.md", + "redirect_url": "/windows/security/threat-protection/applocker/document-group-policy-structure-and-applocker-rule-enforcement", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/document-your-application-control-management-processes.md", + "redirect_url": "/windows/security/threat-protection/applocker/document-your-application-control-management-processes", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/document-your-application-list.md", + "redirect_url": "/windows/security/threat-protection/applocker/document-your-application-list", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/document-your-applocker-rules.md", + "redirect_url": "/windows/security/threat-protection/applocker/document-your-applocker-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/edit-an-applocker-policy.md", + "redirect_url": "/windows/security/threat-protection/applocker/edit-an-applocker-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/edit-applocker-rules.md", + "redirect_url": "/windows/security/threat-protection/applocker/edit-applocker-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/enable-the-dll-rule-collection.md", + "redirect_url": "/windows/security/threat-protection/applocker/enable-the-dll-rule-collection", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/enforce-applocker-rules.md", + "redirect_url": "/windows/security/threat-protection/applocker/enforce-applocker-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/executable-rules-in-applocker.md", + "redirect_url": "/windows/security/threat-protection/applocker/executable-rules-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/export-an-applocker-policy-from-a-gpo.md", + "redirect_url": "/windows/security/threat-protection/applocker/export-an-applocker-policy-from-a-gpo", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/export-an-applocker-policy-to-an-xml-file.md", + "redirect_url": "/windows/security/threat-protection/applocker/export-an-applocker-policy-to-an-xml-file", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/how-applocker-works-techref.md", + "redirect_url": "/windows/security/threat-protection/applocker/how-applocker-works-techref", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/import-an-applocker-policy-from-another-computer.md", + "redirect_url": "/windows/security/threat-protection/applocker/import-an-applocker-policy-from-another-computer", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/import-an-applocker-policy-into-a-gpo.md", + "redirect_url": "/windows/security/threat-protection/applocker/import-an-applocker-policy-into-a-gpo", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/maintain-applocker-policies.md", + "redirect_url": "/windows/security/threat-protection/applocker/maintain-applocker-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/manage-packaged-apps-with-applocker.md", + "redirect_url": "/windows/security/threat-protection/applocker/manage-packaged-apps-with-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/merge-applocker-policies-by-using-set-applockerpolicy.md", + "redirect_url": "/windows/security/threat-protection/applocker/merge-applocker-policies-by-using-set-applockerpolicy", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/merge-applocker-policies-manually.md", + "redirect_url": "/windows/security/threat-protection/applocker/merge-applocker-policies-manually", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/monitor-application-usage-with-applocker.md", + "redirect_url": "/windows/security/threat-protection/applocker/monitor-application-usage-with-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/optimize-applocker-performance.md", + "redirect_url": "/windows/security/threat-protection/applocker/optimize-applocker-performance", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker.md", + "redirect_url": "/windows/security/threat-protection/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/plan-for-applocker-policy-management.md", + "redirect_url": "/windows/security/threat-protection/applocker/plan-for-applocker-policy-management", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/refresh-an-applocker-policy.md", + "redirect_url": "/windows/security/threat-protection/applocker/refresh-an-applocker-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/requirements-for-deploying-applocker-policies.md", + "redirect_url": "/windows/security/threat-protection/applocker/requirements-for-deploying-applocker-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/requirements-to-use-applocker.md", + "redirect_url": "/windows/security/threat-protection/applocker/requirements-to-use-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/run-the-automatically-generate-rules-wizard.md", + "redirect_url": "/windows/security/threat-protection/applocker/run-the-automatically-generate-rules-wizard", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/script-rules-in-applocker.md", + "redirect_url": "/windows/security/threat-protection/applocker/script-rules-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/security-considerations-for-applocker.md", + "redirect_url": "/windows/security/threat-protection/applocker/security-considerations-for-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/select-types-of-rules-to-create.md", + "redirect_url": "/windows/security/threat-protection/applocker/select-types-of-rules-to-create", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/test-an-applocker-policy-by-using-test-applockerpolicy.md", + "redirect_url": "/windows/security/threat-protection/applocker/test-an-applocker-policy-by-using-test-applockerpolicy", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/test-and-update-an-applocker-policy.md", + "redirect_url": "/windows/security/threat-protection/applocker/test-and-update-an-applocker-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/tools-to-use-with-applocker.md", + "redirect_url": "/windows/security/threat-protection/applocker/tools-to-use-with-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/understand-applocker-enforcement-settings.md", + "redirect_url": "/windows/security/threat-protection/applocker/understand-applocker-enforcement-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/understand-applocker-policy-design-decisions.md", + "redirect_url": "/windows/security/threat-protection/applocker/understand-applocker-policy-design-decisions", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy.md", + "redirect_url": "/windows/security/threat-protection/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/understand-the-applocker-policy-deployment-process.md", + "redirect_url": "/windows/security/threat-protection/applocker/understand-the-applocker-policy-deployment-process", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/understanding-applocker-allow-and-deny-actions-on-rules.md", + "redirect_url": "/windows/security/threat-protection/applocker/understanding-applocker-allow-and-deny-actions-on-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/understanding-applocker-default-rules.md", + "redirect_url": "/windows/security/threat-protection/applocker/understanding-applocker-default-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/understanding-applocker-rule-behavior.md", + "redirect_url": "/windows/security/threat-protection/applocker/understanding-applocker-rule-behavior", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/understanding-applocker-rule-collections.md", + "redirect_url": "/windows/security/threat-protection/applocker/understanding-applocker-rule-collections", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/understanding-applocker-rule-condition-types.md", + "redirect_url": "/windows/security/threat-protection/applocker/understanding-applocker-rule-condition-types", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/understanding-applocker-rule-exceptions.md", + "redirect_url": "/windows/security/threat-protection/applocker/understanding-applocker-rule-exceptions", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/understanding-the-file-hash-rule-condition-in-applocker.md", + "redirect_url": "/windows/security/threat-protection/applocker/understanding-the-file-hash-rule-condition-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/understanding-the-path-rule-condition-in-applocker.md", + "redirect_url": "/windows/security/threat-protection/applocker/understanding-the-path-rule-condition-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/understanding-the-publisher-rule-condition-in-applocker.md", + "redirect_url": "/windows/security/threat-protection/applocker/understanding-the-publisher-rule-condition-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies.md", + "redirect_url": "/windows/security/threat-protection/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain.md", + "redirect_url": "/windows/security/threat-protection/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/use-the-applocker-windows-powershell-cmdlets.md", + "redirect_url": "/windows/security/threat-protection/applocker/use-the-applocker-windows-powershell-cmdlets", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/using-event-viewer-with-applocker.md", + "redirect_url": "/windows/security/threat-protection/applocker/using-event-viewer-with-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/using-software-restriction-policies-and-applocker-policies.md", + "redirect_url": "/windows/security/threat-protection/applocker/using-software-restriction-policies-and-applocker-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/what-is-applocker.md", + "redirect_url": "/windows/security/threat-protection/applocker/what-is-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/windows-installer-rules-in-applocker.md", + "redirect_url": "/windows/security/threat-protection/applocker/windows-installer-rules-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/working-with-applocker-policies.md", + "redirect_url": "/windows/security/threat-protection/applocker/working-with-applocker-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/working-with-applocker-rules.md", + "redirect_url": "/windows/security/threat-protection/applocker/working-with-applocker-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/change-history-for-device-security.md", + "redirect_url": "/windows/security/threat-protection/change-history-for-device-security", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/enable-virtualization-based-protection-of-code-integrity.md", + "redirect_url": "/windows/security/threat-protection/enable-virtualization-based-protection-of-code-integrity", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity.md", + "redirect_url": "/windows/security/threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/get-support-for-security-baselines.md", + "redirect_url": "/windows/security/threat-protection/get-support-for-security-baselines", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices.md", + "redirect_url": "/windows/security/threat-protection/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-compliance-toolkit-10.md", + "redirect_url": "/windows/security/threat-protection/security-compliance-toolkit-10", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/windows-10-mobile-security-guide.md", + "redirect_url": "/windows/security/threat-protection/windows-10-mobile-security-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/windows-security-baselines.md", + "redirect_url": "/windows/security/threat-protection/windows-security-baselines", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-information-protection/app-behavior-with-wip.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/app-behavior-with-wip", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-information-protection/collect-wip-audit-event-logs.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/collect-wip-audit-event-logs", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune-azure.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune-azure", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-information-protection/create-wip-policy-using-intune-azure.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-information-protection/create-wip-policy-using-intune.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-information-protection/create-wip-policy-using-mam-intune-azure.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/create-wip-policy-using-mam-intune-azure", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-information-protection/create-wip-policy-using-sccm.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/create-wip-policy-using-sccm", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-information-protection/deploy-wip-policy-using-intune-azure.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/deploy-wip-policy-using-intune-azure", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-information-protection/deploy-wip-policy-using-intune.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/deploy-wip-policy-using-intune", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-information-protection/enlightened-microsoft-apps-and-wip.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/enlightened-microsoft-apps-and-wip", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-information-protection/guidance-and-best-practices-wip.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/guidance-and-best-practices-wip", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-information-protection/limitations-with-wip.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/limitations-with-wip", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-information-protection/mandatory-settings-for-wip.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/mandatory-settings-for-wip", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-information-protection/overview-create-wip-policy-sccm.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/overview-create-wip-policy-sccm", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-information-protection/overview-create-wip-policy.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/overview-create-wip-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-information-protection/protect-enterprise-data-using-wip.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/protect-enterprise-data-using-wip", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-information-protection/recommended-network-definitions-for-wip.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/recommended-network-definitions-for-wip", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-information-protection/testing-scenarios-for-wip.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/testing-scenarios-for-wip", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-information-protection/using-owa-with-wip.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/using-owa-with-wip", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-information-protection/wip-app-enterprise-context.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/wip-app-enterprise-context", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/encrypted-hard-drive.md", + "redirect_url": "/windows/security/hardware-protection/encrypted-hard-drive", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/how-hardware-based-containers-help-protect-windows.md", + "redirect_url": "/windows/security/hardware-protection/how-hardware-based-containers-help-protect-windows", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/secure-the-windows-10-boot-process.md", + "redirect_url": "/windows/security/hardware-protection/secure-the-windows-10-boot-process", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/tpm/backup-tpm-recovery-information-to-ad-ds.md", + "redirect_url": "/windows/security/hardware-protection/tpm/backup-tpm-recovery-information-to-ad-ds", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/tpm/change-the-tpm-owner-password.md", + "redirect_url": "/windows/securityhardware-protection/tpm/change-the-tpm-owner-password", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/tpm/how-windows-uses-the-tpm.md", + "redirect_url": "/windows/securityhardware-protection/tpm/how-windows-uses-the-tpm", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/tpm/initialize-and-configure-ownership-of-the-tpm.md", + "redirect_url": "/windows/security/hardware-protection/tpm/initialize-and-configure-ownership-of-the-tpm", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/tpm/manage-tpm-commands.md", + "redirect_url": "/windows/security/hardware-protection/tpm/manage-tpm-commands", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/tpm/manage-tpm-lockout.md", + "redirect_url": "/windows/security/hardware-protection/tpm/manage-tpm-lockout", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/tpm/switch-pcr-banks-on-tpm-2-0-devices.md", + "redirect_url": "/windows/security/hardware-protection/tpm/switch-pcr-banks-on-tpm-2-0-devices", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/tpm/tpm-fundamentals.md", + "redirect_url": "/windows/security/hardware-protection/tpm/tpm-fundamentals", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/tpm/tpm-recommendations.md", + "redirect_url": "/windows/security/hardware-protection/tpm/tpm-recommendations", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/tpm/trusted-platform-module-overview.md", + "redirect_url": "/windows/security/hardware-protection/tpm/trusted-platform-module-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/tpm/trusted-platform-module-services-group-policy-settings.md", + "redirect_url": "/windows/security/hardware-protection/tpm/trusted-platform-module-services-group-policy-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/tpm/trusted-platform-module-top-node.md", + "redirect_url": "/windows/security/hardware-protection/tpm/trusted-platform-module-top-node", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/bitlocker/bcd-settings-and-bitlocker.md", + "redirect_url": "/windows/security/information-protection/bitlocker/bcd-settings-and-bitlocker", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/bitlocker/bitlocker-basic-deployment.md", + "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-basic-deployment", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/bitlocker/bitlocker-countermeasures.md", + "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-countermeasures", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/bitlocker/bitlocker-device-encryption-overview-windows-10.md", + "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/bitlocker/bitlocker-frequently-asked-questions.md", + "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-frequently-asked-questions", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/bitlocker/bitlocker-group-policy-settings.md", + "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/bitlocker/bitlocker-how-to-deploy-on-windows-server.md", + "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-how-to-deploy-on-windows-server", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/bitlocker/bitlocker-how-to-enable-network-unlock.md", + "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/bitlocker/bitlocker-management-for-enterprises.md", + "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-management-for-enterprises", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/bitlocker/bitlocker-overview.md", + "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/bitlocker/bitlocker-recovery-guide-plan.md", + "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-recovery-guide-plan", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/bitlocker/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md", + "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/bitlocker/bitlocker-use-bitlocker-recovery-password-viewer.md", + "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-use-bitlocker-recovery-password-viewer", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/bitlocker/choose-the-right-bitlocker-countermeasure.md", + "redirect_url": "/windows/security/information-protection/bitlocker/choose-the-right-bitlocker-countermeasure", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md", + "redirect_url": "/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/bitlocker/protect-bitlocker-from-pre-boot-attacks.md", + "redirect_url": "/windows/security/information-protection/bitlocker/protect-bitlocker-from-pre-boot-attacks", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md", + "redirect_url": "/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/bitlocker/types-of-attacks-for-volume-encryption-keys.md", + "redirect_url": "/windows/security/information-protection/bitlocker/types-of-attacks-for-volume-encryption-keys", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-credential-theft-mitigation-guide-abstract.md", + "redirect_url": "/windows/security/identity-protection/windows-credential-theft-mitigation-guide-abstract", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/change-history-for-access-protection.md", + "redirect_url": "/windows/security/identity-protection/change-history-for-access-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/configure-s-mime.md", + "redirect_url": "/windows/security/identity-protection/configure-s-mime", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/enterprise-certificate-pinning.md", + "redirect_url": "/windows/security/identity-protection/enterprise-certificate-pinning", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/installing-digital-certificates-on-windows-10-mobile.md", + "redirect_url": "/windows/security/identity-protection/installing-digital-certificates-on-windows-10-mobile", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/remote-credential-guard.md", + "redirect_url": "/windows/security/identity-protection/remote-credential-guard", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/add-production-devices-to-the-membership-group-for-a-zone.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/add-production-devices-to-the-membership-group-for-a-zone", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/add-test-devices-to-the-membership-group-for-a-zone.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/add-test-devices-to-the-membership-group-for-a-zone", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/assign-security-group-filters-to-the-gpo.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/assign-security-group-filters-to-the-gpo", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/basic-firewall-policy-design.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/basic-firewall-policy-design", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/boundary-zone-gpos.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/boundary-zone-gpos", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/boundary-zone.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/boundary-zone", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/certificate-based-isolation-policy-design-example.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/certificate-based-isolation-policy-design-example", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/certificate-based-isolation-policy-design.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/certificate-based-isolation-policy-design", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/change-rules-from-request-to-require-mode.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/change-rules-from-request-to-require-mode", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/checklist-configuring-basic-firewall-settings.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-configuring-basic-firewall-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/checklist-configuring-rules-for-an-isolated-server-zone.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-configuring-rules-for-an-isolated-server-zone", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/checklist-configuring-rules-for-the-boundary-zone.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-configuring-rules-for-the-boundary-zone", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/checklist-configuring-rules-for-the-encryption-zone.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-configuring-rules-for-the-encryption-zone", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/checklist-configuring-rules-for-the-isolated-domain.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-configuring-rules-for-the-isolated-domain", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/checklist-creating-group-policy-objects.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-creating-group-policy-objects", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/checklist-creating-inbound-firewall-rules.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-creating-inbound-firewall-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/checklist-creating-outbound-firewall-rules.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-creating-outbound-firewall-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/checklist-implementing-a-basic-firewall-policy-design.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-implementing-a-basic-firewall-policy-design", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/checklist-implementing-a-certificate-based-isolation-policy-design.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-implementing-a-certificate-based-isolation-policy-design", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/checklist-implementing-a-domain-isolation-policy-design.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-implementing-a-domain-isolation-policy-design", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/checklist-implementing-a-standalone-server-isolation-policy-design.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-implementing-a-standalone-server-isolation-policy-design", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/configure-authentication-methods.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/configure-authentication-methods", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/configure-data-protection-quick-mode-settings.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/configure-data-protection-quick-mode-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/configure-group-policy-to-autoenroll-and-deploy-certificates.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/configure-group-policy-to-autoenroll-and-deploy-certificates", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/configure-key-exchange-main-mode-settings.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/configure-key-exchange-main-mode-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/configure-the-rules-to-require-encryption.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/configure-the-rules-to-require-encryption", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/configure-the-windows-firewall-log.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/configure-the-windows-firewall-log", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/configure-the-workstation-authentication-certificate-template.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/configure-the-workstation-authentication-certificate-template", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/confirm-that-certificates-are-deployed-correctly.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/confirm-that-certificates-are-deployed-correctly", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/copy-a-gpo-to-create-a-new-gpo.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/copy-a-gpo-to-create-a-new-gpo", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/create-a-group-account-in-active-directory.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/create-a-group-account-in-active-directory", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/create-a-group-policy-object.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/create-a-group-policy-object", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/create-an-authentication-exemption-list-rule.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/create-an-authentication-exemption-list-rule", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/create-an-authentication-request-rule.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/create-an-authentication-request-rule", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/create-an-inbound-icmp-rule.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/create-an-inbound-icmp-rule", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/create-an-inbound-port-rule.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/create-an-inbound-port-rule", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/create-an-inbound-program-or-service-rule.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/create-an-inbound-program-or-service-rule", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/create-an-outbound-port-rule.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/create-an-outbound-port-rule", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/create-an-outbound-program-or-service-rule.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/create-an-outbound-program-or-service-rule", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/create-inbound-rules-to-support-rpc.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/create-inbound-rules-to-support-rpc", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/create-wmi-filters-for-the-gpo.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/create-wmi-filters-for-the-gpo", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/determining-the-trusted-state-of-your-devices.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/determining-the-trusted-state-of-your-devices", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/documenting-the-zones.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/documenting-the-zones", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/domain-isolation-policy-design-example.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/domain-isolation-policy-design-example", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/domain-isolation-policy-design.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/domain-isolation-policy-design", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/enable-predefined-inbound-rules.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/enable-predefined-inbound-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/enable-predefined-outbound-rules.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/enable-predefined-outbound-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/encryption-zone-gpos.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/encryption-zone-gpos", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/encryption-zone.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/encryption-zone", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/evaluating-windows-firewall-with-advanced-security-design-examples.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/evaluating-windows-firewall-with-advanced-security-design-examples", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/exempt-icmp-from-authentication.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/exempt-icmp-from-authentication", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/exemption-list.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/exemption-list", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/firewall-gpos.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/firewall-gpos", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/firewall-policy-design-example.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/firewall-policy-design-example", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/gathering-information-about-your-active-directory-deployment.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/gathering-information-about-your-active-directory-deployment", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/gathering-information-about-your-current-network-infrastructure.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/gathering-information-about-your-current-network-infrastructure", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/gathering-information-about-your-devices.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/gathering-information-about-your-devices", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/gathering-other-relevant-information.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/gathering-other-relevant-information", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/gathering-the-information-you-need.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/gathering-the-information-you-need", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/gpo-domiso-boundary.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/gpo-domiso-boundary", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/gpo-domiso-encryption.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/gpo-domiso-encryption", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/gpo-domiso-firewall.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/gpo-domiso-firewall", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/gpo-domiso-isolateddomain-clients.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/gpo-domiso-isolateddomain-clients", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/gpo-domiso-isolateddomain-servers.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/gpo-domiso-isolateddomain-servers", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/implementing-your-windows-firewall-with-advanced-security-design-plan.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/implementing-your-windows-firewall-with-advanced-security-design-plan", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/isolated-domain-gpos.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/isolated-domain-gpos", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/isolated-domain.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/isolated-domain", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/isolating-apps-on-your-network.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/isolating-apps-on-your-network", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/link-the-gpo-to-the-domain.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/link-the-gpo-to-the-domain", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/open-the-group-policy-management-console-to-ip-security-policies.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/open-the-group-policy-management-console-to-ip-security-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/open-windows-firewall-with-advanced-security.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/open-windows-firewall-with-advanced-security", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/planning-certificate-based-authentication.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/planning-certificate-based-authentication", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/planning-domain-isolation-zones.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/planning-domain-isolation-zones", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/planning-gpo-deployment.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/planning-gpo-deployment", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/planning-group-policy-deployment-for-your-isolation-zones.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/planning-group-policy-deployment-for-your-isolation-zones", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/planning-isolation-groups-for-the-zones.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/planning-isolation-groups-for-the-zones", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/planning-network-access-groups.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/planning-network-access-groups", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/planning-server-isolation-zones.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/planning-server-isolation-zones", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/planning-settings-for-a-basic-firewall-policy.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/planning-settings-for-a-basic-firewall-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/planning-the-gpos.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/planning-the-gpos", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/planning-your-windows-firewall-with-advanced-security-design.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/planning-your-windows-firewall-with-advanced-security-design", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/procedures-used-in-this-guide.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/procedures-used-in-this-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/protect-devices-from-unwanted-network-traffic.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/protect-devices-from-unwanted-network-traffic", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/require-encryption-when-accessing-sensitive-network-resources.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/require-encryption-when-accessing-sensitive-network-resources", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/restrict-access-to-only-specified-users-or-devices.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/restrict-access-to-only-specified-users-or-devices", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/restrict-access-to-only-trusted-devices.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/restrict-access-to-only-trusted-devices", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/restrict-server-access-to-members-of-a-group-only.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/restrict-server-access-to-members-of-a-group-only", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/securing-end-to-end-ipsec-connections-by-using-ikev2.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/securing-end-to-end-ipsec-connections-by-using-ikev2", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/server-isolation-gpos.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/server-isolation-gpos", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/server-isolation-policy-design-example.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/server-isolation-policy-design-example", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/server-isolation-policy-design.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/server-isolation-policy-design", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/turn-on-windows-firewall-and-configure-default-behavior.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/turn-on-windows-firewall-and-configure-default-behavior", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/understanding-the-windows-firewall-with-advanced-security-design-process.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/understanding-the-windows-firewall-with-advanced-security-design-process", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/verify-that-network-traffic-is-authenticated.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/verify-that-network-traffic-is-authenticated", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/windows-firewall-with-advanced-security-deployment-guide.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/windows-firewall-with-advanced-security-deployment-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/windows-firewall-with-advanced-security-design-guide.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/windows-firewall-with-advanced-security-design-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/windows-firewall-with-advanced-security.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/windows-firewall-with-advanced-security", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/vpn/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections.md", + "redirect_url": "/windows/security/identity-protection/vpn/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/vpn/vpn-authentication.md", + "redirect_url": "/windows/security/identity-protection/vpn/vpn-authentication", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/vpn/vpn-auto-trigger-profile.md", + "redirect_url": "/windows/security/identity-protection/vpn/vpn-auto-trigger-profile", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/vpn/vpn-conditional-access.md", + "redirect_url": "/windows/security/identity-protection/vpn/vpn-conditional-access", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/vpn/vpn-connection-type.md", + "redirect_url": "/windows/security/identity-protection/vpn/vpn-connection-type", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/vpn/vpn-guide.md", + "redirect_url": "/windows/security/identity-protection/vpn/vpn-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/vpn/vpn-name-resolution.md", + "redirect_url": "/windows/security/identity-protection/vpn/vpn-name-resolution", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/vpn/vpn-profile-options.md", + "redirect_url": "/windows/security/identity-protection/vpn/vpn-profile-options", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/vpn/vpn-routing.md", + "redirect_url": "/windows/security/identity-protection/vpn/vpn-routing", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/vpn/vpn-security-features.md", + "redirect_url": "/windows/security/identity-protection/vpn/vpn-security-features", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/virtual-smart-cards/virtual-smart-card-deploy-virtual-smart-cards.md", + "redirect_url": "/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-deploy-virtual-smart-cards", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/virtual-smart-cards/virtual-smart-card-evaluate-security.md", + "redirect_url": "/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-evaluate-security", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/virtual-smart-cards/virtual-smart-card-get-started.md", + "redirect_url": "/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-get-started", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/virtual-smart-cards/virtual-smart-card-overview.md", + "redirect_url": "/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/virtual-smart-cards/virtual-smart-card-tpmvscmgr.md", + "redirect_url": "/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-tpmvscmgr", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/virtual-smart-cards/virtual-smart-card-understanding-and-evaluating.md", + "redirect_url": "/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-understanding-and-evaluating", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards.md", + "redirect_url": "/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/user-account-control/how-user-account-control-works.md", + "redirect_url": "/windows/security/identity-protection/user-account-control/how-user-account-control-works", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/user-account-control/user-account-control-group-policy-and-registry-key-settings.md", + "redirect_url": "/windows/security/identity-protection/user-account-control/user-account-control-group-policy-and-registry-key-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/user-account-control/user-account-control-overview.md", + "redirect_url": "/windows/security/identity-protection/user-account-control/user-account-control-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/user-account-control/user-account-control-security-policy-settings.md", + "redirect_url": "/windows/security/identity-protection/user-account-control/user-account-control-security-policy-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/smart-cards/smart-card-certificate-requirements-and-enumeration.md", + "redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-certificate-requirements-and-enumeration", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/smart-cards/smart-card-debugging-information.md", + "redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-debugging-information", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/smart-cards/smart-card-events.md", + "redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-events", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/smart-cards/smart-card-group-policy-and-registry-settings.md", + "redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-group-policy-and-registry-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/smart-cards/smart-card-how-smart-card-sign-in-works-in-windows.md", + "redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-how-smart-card-sign-in-works-in-windows", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/smart-cards/smart-card-removal-policy-service.md", + "redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-removal-policy-service", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/smart-cards/smart-card-smart-cards-for-windows-service.md", + "redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-smart-cards-for-windows-service", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/smart-cards/smart-card-tools-and-settings.md", + "redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-tools-and-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/smart-cards/smart-card-windows-smart-card-technical-reference.md", + "redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-windows-smart-card-technical-reference", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/smart-cards/smart-card-and-remote-desktop-services.md", + "redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-and-remote-desktop-services", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/smart-cards/smart-card-architecture.md", + "redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-architecture", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/smart-cards/smart-card-certificate-propagation-service.md", + "redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-certificate-propagation-service", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-and-password-changes.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-and-password-changes", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-biometrics-in-enterprise.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-biometrics-in-enterprise", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-cert-trust-adfs.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-cert-trust-adfs", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-cert-trust-deploy-mfa.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-cert-trust-deploy-mfa", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-cert-trust-policy-settings.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-cert-trust-policy-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-cert-trust-validate-ad-prereq.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-cert-trust-validate-ad-prereq", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-cert-trust-validate-deploy-mfa.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-cert-trust-validate-deploy-mfa", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-cert-trust-validate-pki.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-cert-trust-validate-pki", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-deployment-cert-trust.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-deployment-cert-trust", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-deployment-guide.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-deployment-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-deployment-key-trust.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-deployment-key-trust", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-errors-during-pin-creation.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-errors-during-pin-creation", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-event-300.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-event-300", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-features.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-features", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-how-it-works.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-how-it-works", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-new-install.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-new-install", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-trust.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-trust-devreg.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-devreg", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-trust-prereqs.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-prereqs", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-provision.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-provision", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-settings.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-settings-ad.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-ad", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-settings-adfs.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-adfs", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-settings-dir-sync.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-dir-sync", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-settings-pki.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-pki", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-settings-policy.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-new-install.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-new-install", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-trust.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-trust-devreg.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-devreg", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-trust-dirsync.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-dirsync", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-whfb-provision.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-provision", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-whfb-settings.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-whfb-settings-ad.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings-ad", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-whfb-settings-dir-sync.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings-dir-sync", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-whfb-settings-pki.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings-pki", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-whfb-settings-policy.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-identity-verification.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-identity-verification", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-key-trust-adfs.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-key-trust-adfs", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-key-trust-deploy-mfa.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-key-trust-deploy-mfa", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-key-trust-policy-settings.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-key-trust-policy-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-key-trust-validate-ad-prereq.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-key-trust-validate-ad-prereq", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-key-trust-validate-deploy-mfa.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-key-trust-validate-deploy-mfa", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-key-trust-validate-pki.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-key-trust-validate-pki", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-manage-in-organization.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-manage-in-organization", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-overview.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-planning-guide.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-planning-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-prepare-people-to-use.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-prepare-people-to-use", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-why-pin-is-better-than-password.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-why-pin-is-better-than-password", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/credential-guard/additional-mitigations.md", + "redirect_url": "/windows/security/identity-protection/credential-guard/additional-mitigations", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/credential-guard/credential-guard.md", + "redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/credential-guard/credential-guard-considerations.md", + "redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-considerations", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/credential-guard/credential-guard-how-it-works.md", + "redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-how-it-works", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/credential-guard/credential-guard-known-issues.md", + "redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-known-issues", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/credential-guard/credential-guard-manage.md", + "redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-manage", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/credential-guard/credential-guard-not-protected-scenarios.md", + "redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-not-protected-scenarios", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/credential-guard/credential-guard-protection-limits.md", + "redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-protection-limits", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/credential-guard/credential-guard-requirements.md", + "redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-requirements", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/credential-guard/credential-guard-scripts.md", + "redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-scripts", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/access-control/access-control.md", + "redirect_url": "/windows/security/identity-protection/access-control/access-control", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/access-control/active-directory-accounts.md", + "redirect_url": "/windows/security/identity-protection/access-control/active-directory-accounts", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/access-control/active-directory-security-groups.md", + "redirect_url": "/windows/security/identity-protection/access-control/active-directory-security-groups", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/access-control/dynamic-access-control.md", + "redirect_url": "/windows/security/identity-protection/access-control/dynamic-access-control", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/access-control/local-accounts.md", + "redirect_url": "/windows/security/identity-protection/access-control/local-accounts", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/access-control/microsoft-accounts.md", + "redirect_url": "/windows/security/identity-protection/access-control/microsoft-accounts", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/access-control/security-identifiers.md", + "redirect_url": "/windows/security/identity-protection/access-control/security-identifiers", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/access-control/security-principals.md", + "redirect_url": "/windows/security/identity-protection/access-control/security-principals", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/access-control/service-accounts.md", + "redirect_url": "/windows/security/identity-protection/access-control/service-accounts", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/access-control/special-identities.md", + "redirect_url": "/windows/security/identity-protection/access-control/special-identities", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/device-guard/deploy-code-integrity-policies-steps.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/create-initial-default-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/device-guard/optional-create-a-code-signing-certificate-for-code-integrity-policies.md", + "redirect_url": "/windows/device-security/device-guard/optional-create-a-code-signing-certificate-for-windows-defender-application-control", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/device-guard/introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies.md", + "redirect_url": "/windows/device-security/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/device-guard/deploy-code-integrity-policies-policy-rules-and-file-rules.md", + "redirect_url": "/windows/device-security/device-guard/deploy-windows-defender-application-control-policy-rules-and-file-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/device-guard/deploy-device-guard-deploy-code-integrity-policies.md", + "redirect_url": "/windows/device-security/device-guard/deploy-windows-defender-application-control", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/device-guard/deploy-catalog-files-to-support-code-integrity-policies.md", + "redirect_url": "/windows/device-security/device-guard/deploy-catalog-files-to-support-windows-defender-application-control", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/use-windows-event-forwarding-to-assist-in-instrusion-detection.md", + "redirect_url": "/windows/threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection", + "redirect_document_id": true + }, + { + "source_path": "devices/surface/surface-device-compatibility-with-windows-10-ltsb.md", + "redirect_url": "/devices/surface/surface-device-compatibility-with-windows-10-ltsc", + "redirect_document_id": true + }, + { + "source_path": "windows/configuration/windows-diagnostic-data-1709.md", + "redirect_url": "/windows/configuration/windows-diagnostic-data", + "redirect_document_id": true + }, + { + "source_path": "windows/configuration/EventName.md", + "redirect_url": "/windows/configuration/enhanced-telemetry-windows-analytics-events-and-fields", + "redirect_document_id": true + }, + { + "source_path": "education/windows/windows-10-pro-to-pro-edu-upgrade.md", "redirect_url": "/education/windows/switch-to-pro-education", "redirect_document_id": false }, -{ -"source_path": "windows/client-management/mdm/policy-admx-backed.md", -"redirect_url": "/windows/client-management/mdm/policy-configuration-service-provider", -"redirect_document_id": true -}, -{ -"source_path": "windows/client-management/mdm/policy-csp-location.md", -"redirect_url": "/windows/client-management/mdm/policy-configuration-service-provider", -"redirect_document_id": false -}, -{ -"source_path": "windows/keep-secure/add-apps-to-protected-list-using-custom-uri.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/create-wip-policy-using-intune", -"redirect_document_id": false -}, -{ -"source_path": "windows/keep-secure/configure-windows-defender-in-windows-10.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/enable-pua-windows-defender-for-windows-10.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/get-started-with-windows-defender-for-windows-10.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus", -"redirect_document_id": false -}, -{ -"source_path": "windows/keep-secure/run-cmd-scan-windows-defender-for-windows-10.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/use-powershell-cmdlets-windows-defender-for-windows-10.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/windows-defender-block-at-first-sight.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/windows-defender-in-windows-10.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/windows-defender-enhanced-notifications.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/cortana-at-work-scenario-7.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-7", -"redirect_document_id": true -}, -{ -"source_path": "devices/surface/surface-diagnostic-toolkit.md", -"redirect_url": "/surface/index", -"redirect_document_id": true -}, -{ -"source_path": "devices/surface/manage-surface-dock-firmware-updates.md", -"redirect_url": "devices/surface/update", -"redirect_document_id": true -}, -{ -"source_path": "devices/surface-hub/i-am-done-finishing-your-surface-hub-meeting.md", -"redirect_url": "/surface-hub/finishing-your-surface-hub-meeting", -"redirect_document_id": true -}, -{ -"source_path": "devices/hololens/hololens-microsoft-layout-app.md", -"redirect_url": "/hololens/hololens-microsoft-dynamics-365-layout-app", -"redirect_document_id": true -}, -{ -"source_path": "devices/hololens/hololens-microsoft-dynamics-365-layout-app.md", -"redirect_url": "https://docs.microsoft.com/dynamics365/mixed-reality/layout/", -"redirect_document_id": true -}, -{ -"source_path": "devices/hololens/hololens-microsoft-remote-assist-app.md", -"redirect_url": "https://docs.microsoft.com/dynamics365/mixed-reality/remote-assist/", -"redirect_document_id": true -}, -{ -"source_path": "devices/hololens/hololens-public-preview-apps.md", -"redirect_url": "https://docs.microsoft.com/dynamics365/#pivot=mixed-reality-apps", -"redirect_document_id": true -}, -{ -"source_path": "devices/surface-hub/provisioning-packages-for-certificates-surface-hub.md", -"redirect_url": "/surface-hub/provisioning-packages-for-surface-hub", -"redirect_document_id": true -}, -{ -"source_path": "devices/surface-hub/manage-settings-with-local-admin-account-surface-hub.md", -"redirect_url": "/surface-hub/admin-group-management-for-surface-hub", -"redirect_document_id": true -}, -{ -"source_path": "devices/surface-hub/surface-hub-administrators-guide.md", -"redirect_url": "/surface-hub/index", -"redirect_document_id": true -}, -{ -"source_path": "devices/surface-hub/intro-to-surface-hub.md", -"redirect_url": "/surface-hub/index", -"redirect_document_id": false -}, -{ -"source_path": "windows/manage/waas-quick-start.md", -"redirect_url": "/windows/deployment/update/waas-quick-start", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/waas-overview.md", -"redirect_url": "/windows/deployment/update/waas-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/waas-servicing-strategy-windows-10-updates.md", -"redirect_url": "/windows/deployment/update/waas-servicing-strategy-windows-10-updates", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/waas-deployment-rings-windows-10-updates.md", -"redirect_url": "/windows/deployment/update/waas-deployment-rings-windows-10-updates", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/waas-servicing-branches-windows-10-updates.md", -"redirect_url": "/windows/deployment/update/waas-servicing-branches-windows-10-updates", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/update-compliance-monitor.md", -"redirect_url": "/windows/deployment/update/update-compliance-monitor", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/update-compliance-get-started.md", -"redirect_url": "/windows/deployment/update/update-compliance-get-started", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/update-compliance-using.md", -"redirect_url": "/windows/deployment/update/update-compliance-using", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/waas-optimize-windows-10-updates.md", -"redirect_url": "/windows/deployment/update/waas-optimize-windows-10-updates", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/waas-delivery-optimization.md", -"redirect_url": "/windows/deployment/update/waas-delivery-optimization", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/waas-branchcache.md", -"redirect_url": "/windows/deployment/update/waas-branchcache", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/waas-mobile-updates.md", -"redirect_url": "/windows/deployment/update/waas-mobile-updates", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/waas-manage-updates-wufb.md", -"redirect_url": "/windows/deployment/update/waas-manage-updates-wufb", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/waas-configure-wufb.md", -"redirect_url": "/windows/deployment/update/waas-configure-wufb", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/waas-integrate-wufb.md", -"redirect_url": "/windows/deployment/update/waas-integrate-wufb", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/waas-wufb-group-policy.md", -"redirect_url": "/windows/deployment/update/waas-wufb-group-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/waas-wufb-intune.md", -"redirect_url": "/windows/deployment/update/waas-wufb-intune.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/waas-manage-updates-wsus.md", -"redirect_url": "/windows/deployment/update/waas-manage-updates-wsus", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/waas-manage-updates-configuration-manager.md", -"redirect_url": "/windows/deployment/update/waas-manage-updates-configuration-manager", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/waas-restart.md", -"redirect_url": "/windows/deployment/update/waas-restart", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/waas-update-windows-10.md", -"redirect_url": "/windows/deployment/update/index", -"redirect_document_id": false -}, -{ -"source_path": "windows/manage/configure-windows-telemetry-in-your-organization.md", -"redirect_url": "/windows/configuration/configure-windows-diagnostic-data-in-your-organization", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/lockdown-features-windows-10.md", -"redirect_url": "/windows/configuration/lockdown-features-windows-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/set-up-shared-or-guest-pc.md", -"redirect_url": "/windows/configuration/set-up-shared-or-guest-pc", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/manage-connections-from-windows-operating-system-components-to-microsoft-services.md", -"redirect_url": "/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services", -"redirect_document_id": false -}, -{ -"source_path": "windows/manage/set-up-a-device-for-anyone-to-use.md", -"redirect_url": "/windows/configuration/kiosk-shared-pc", -"redirect_document_id": false -}, -{ -"source_path": "windows/configuration/set-up-a-device-for-anyone-to-use.md", -"redirect_url": "/windows/configuration/kiosk-shared-pc", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/set-up-a-kiosk-for-windows-10-for-desktop-editions.md", -"redirect_url": "/windows/configuration/set-up-a-kiosk-for-windows-10-for-desktop-editions", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/guidelines-for-assigned-access-app.md", -"redirect_url": "/windows/configuration/guidelines-for-assigned-access-app", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/lock-down-windows-10-to-specific-apps.md", -"redirect_url": "/windows/configuration/lock-down-windows-10-to-specific-apps", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/set-up-a-kiosk-for-windows-10-for-mobile-edition.md", -"redirect_url": "/windows/configuration/mobile-devices/set-up-a-kiosk-for-windows-10-for-mobile-edition", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/lockdown-xml.md", -"redirect_url": "/windows/configuration/mobile-devices/lockdown-xml", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/settings-that-can-be-locked-down.md", -"redirect_url": "/windows/configuration/mobile-devices/settings-that-can-be-locked-down", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/product-ids-in-windows-10-mobile.md", -"redirect_url": "/windows/configuration/mobile-devices/product-ids-in-windows-10-mobile", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/manage-tips-and-suggestions.md", -"redirect_url": "/windows/configuration/manage-tips-and-suggestions", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/windows-10-start-layout-options-and-policies.md", -"redirect_url": "/windows/configuration/windows-10-start-layout-options-and-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/configure-windows-10-taskbar.md", -"redirect_url": "/windows/configuration//configure-windows-10-taskbar", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/customize-and-export-start-layout.md", -"redirect_url": "/windows/configuration//customize-and-export-start-layout", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/start-layout-xml-desktop.md", -"redirect_url": "/windows/configuration/start-layout-xml-desktop", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/start-layout-xml-mobile.md", -"redirect_url": "/windows/configuration/mobile-devices/start-layout-xml-mobile", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/customize-windows-10-start-screens-by-using-group-policy.md", -"redirect_url": "/windows/configuration/customize-windows-10-start-screens-by-using-group-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/customize-windows-10-start-screens-by-using-provisioning-packages-and-icd.md", -"redirect_url": "/windows/configuration/customize-windows-10-start-screens-by-using-provisioning-packages-and-icd", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/customize-windows-10-start-screens-by-using-mobile-device-management.md", -"redirect_url": "/windows/configuration/customize-windows-10-start-screens-by-using-mobile-device-management", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/cortana-at-work-testing-scenarios.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-testing-scenarios", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/cortana-at-work-scenario-1.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-1", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/cortana-at-work-scenario-2.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-2", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/cortana-at-work-scenario-3.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-3", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/cortana-at-work-scenario-4.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-4", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/cortana-at-work-scenario-5.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-5", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/cortana-at-work-scenario-6.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-6", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/cortana-at-work-o365.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-o365", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/cortana-at-work-crm.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-crm", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/cortana-at-work-powerbi.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-powerbi", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/cortana-at-work-voice-commands.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-voice-commands", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/cortana-at-work-policy-settings.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-policy-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/cortana-at-work-feedback.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-feedback", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/stop-employees-from-using-the-windows-store.md", -"redirect_url": "/windows/configuration/stop-employees-from-using-the-windows-store", -"redirect_document_id": true -}, -{ -"source_path": "windows/configuration/stop-employees-from-using-the-windows-store.md", -"redirect_url": "/windows/configuration/stop-employees-from-using-microsoft-store", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/configure-devices-without-mdm.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-packages", -"redirect_document_id": false -}, -{ -"source_path": "windows/manage/changes-to-start-policies-in-windows-10.md", -"redirect_url": "/windows/configuration/changes-to-start-policies-in-windows-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/how-it-pros-can-use-configuration-service-providers.md", -"redirect_url": "/windows/configuration/provisioning-packages/how-it-pros-can-use-configuration-service-providers", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/lock-down-windows-10.md", -"redirect_url": "/windows/configuration/index", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/manage-wifi-sense-in-enterprise.md", -"redirect_url": "/windows/configuration/manage-wifi-sense-in-enterprise", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/provisioning-packages.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-packages", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/provisioning-how-it-works.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-how-it-works", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/provisioning-install-icd.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-install-icd", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/provisioning-create-package.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-create-package", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/provisioning-apply-package.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-apply-package", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/provisioning-uninstall-package.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-uninstall-package", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/provision-pcs-for-initial-deployment.md", -"redirect_url": "/windows/configuration/provisioning-packages/provision-pcs-for-initial-deployment", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/provision-pcs-with-apps-and-certificates.md", -"redirect_url": "/windows/configuration/provisioning-packages/provision-pcs-with-apps", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/provisioning-script-to-install-app.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-script-to-install-app", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/provisioning-nfc.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-nfc", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/provisioning-command-line.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-command-line", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/provisioning-multivariant.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-multivariant", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-edp-policy-using-intune.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/create-wip-policy-using-intune", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-edp-policy-using-sccm.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/create-wip-policy-using-sccm", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-vpn-and-edp-policy-using-intune.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/hello-enable-phone-signin.md", -"redirect_url": "/windows/access-protection/hello-for-business/hello-identity-verification", -"redirect_document_id": false -}, -{ -"source_path": "windows/keep-secure/deploy-edp-policy-using-intune.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/deploy-wip-policy-using-intune", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/guidance-and-best-practices-edp.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/guidance-and-best-practices-wip", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/overview-create-edp-policy.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/overview-create-wip-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/protect-enterprise-data-using-edp.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/protect-enterprise-data-using-wip", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/testing-scenarios-for-edp.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/testing-scenarios-for-wip", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/wip-enterprise-overview.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/protect-enterprise-data-using-wip", -"redirect_document_id": false -}, -{ -"source_path": "windows/keep-secure/enlightened-microsoft-apps-and-edp.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/enlightened-microsoft-apps-and-wip", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/update-windows-10-images-with-provisioning-packages.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-packages", -"redirect_document_id": false -}, -{ -"source_path": "windows/deploy/upgrade-analytics-prepare-your-environment.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-identify-apps", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-analytics-release-notes.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-requirements", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-analytics-review-site-discovery.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-additional-insights", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/ad-ds-schema-extensions-to-support-tpm-backup.md", -"redirect_url": "https://technet.microsoft.com/library/jj635854.aspx", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/creating-a-device-guard-policy-for-signed-apps.md", -"redirect_url": "/windows/device-security/device-guard/device-guard-deployment-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/device-guard-certification-and-compliance.md", -"redirect_url": "/windows/device-security/device-guard/device-guard-deployment-guide", -"redirect_document_id": false -}, -{ -"source_path": "windows/keep-secure/enable-phone-signin-to-pc-and-vpn.md", -"redirect_url": "/windows/access-protection/hello-for-business/hello-enable-phone-signin", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/getting-apps-to-run-on-device-guard-protected-devices.md", -"redirect_url": "/windows/device-security/device-guard/device-guard-deployment-guide", -"redirect_document_id": false -}, -{ -"source_path": "windows/keep-secure/implement-microsoft-passport-in-your-organization.md", -"redirect_url": "/windows/access-protection/hello-for-business/hello-manage-in-organization", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/manage-identity-verification-using-microsoft-passport.md", -"redirect_url": "/windows/access-protection/hello-for-business/hello-identity-verification", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/microsoft-passport-and-password-changes.md", -"redirect_url": "/windows/access-protection/hello-for-business/hello-and-password-changes", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/microsoft-passport-errors-during-pin-creation.md", -"redirect_url": "/windows/access-protection/hello-for-business/hello-errors-during-pin-creation", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/microsoft-passport-guide.md", -"redirect_url": "/windows/access-protection/hello-for-business/hello-identity-verification", -"redirect_document_id": false -}, -{ -"source_path": "windows/keep-secure/passport-event-300.md", -"redirect_url": "/windows/access-protection/hello-for-business/hello-event-300", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/prepare-people-to-use-microsoft-passport.md", -"redirect_url": "/windows/access-protection/hello-for-business/hello-prepare-people-to-use", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/why-a-pin-is-better-than-a-password.md", -"redirect_url": "/windows/access-protection/hello-for-business/hello-why-pin-is-better-than-password", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/windows-hello-in-enterprise.md", -"redirect_url": "/windows/access-protection/hello-for-business/hello-biometrics-in-enterprise", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/app-inventory-managemement-windows-store-for-business.md", -"redirect_url": "/microsoft-store/app-inventory-management-windows-store-for-business#manage-apps-in-your-inventory", -"redirect_document_id": true -}, -{ -"source_path": "store-for-business/app-inventory-management-windows-store-for-business.md", -"redirect_url": "/microsoft-store/app-inventory-management-microsoft-store-for-business", -"redirect_document_id": false -}, -{ -"source_path": "windows/manage/application-development-for-windows-as-a-service.md", -"redirect_url": "https://msdn.microsoft.com/windows/uwp/get-started/application-development-for-windows-as-a-service", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-accessibility.md", -"redirect_url": "/windows/application-management/app-v/appv-getting-started", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-accessing-the-client-management-console.md", -"redirect_url": "/windows/application-management/app-v/appv-using-the-client-management-console", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-install-the-appv-client-for-shared-content-store-mode.md", -"redirect_url": "/windows/application-management/app-v/appv-deploying-the-appv-sequencer-and-client", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-modify-client-configuration-with-the-admx-template-and-group-policy.md", -"redirect_url": "/windows/application-management/app-v/appv-deploying-the-appv-sequencer-and-client", -"redirect_document_id": false -}, -{ -"source_path": "windows/manage/appv-planning-for-migrating-from-a-previous-version-of-appv.md", -"redirect_url": "/windows/application-management/app-v/appv-migrating-to-appv-from-a-previous-version", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/configure-windows-10-devices-to-stop-data-flow-to-microsoft.md", -"redirect_url": "/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/disconnect-your-organization-from-microsoft.md", -"redirect_url": "/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services", -"redirect_document_id": false -}, -{ -"source_path": "windows/manage/introduction-to-windows-10-servicing.md", -"redirect_url": "/windows/deployment/update/index", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/manage-cortana-in-enterprise.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/cortana-at-work-overview.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-overview", -"redirect_document_id": false -}, -{ -"source_path": "windows/manage/manage-inventory-windows-store-for-business.md", -"redirect_url": "/microsoft-store/app-inventory-management-windows-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "store-for-business/app-inventory-managemement-windows-store-for-business.md", -"redirect_url": "/microsoft-store/app-inventory-management-microsoft-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-accessibility.md", -"redirect_url": "/windows/configuration/ue-v/uev-for-windows", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-privacy-statement.md", -"redirect_url": "/windows/configuration/ue-v/uev-security-considerations", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/act-community-ratings-and-process.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/act-database-configuration.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/act-database-migration.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/act-deployment-options.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/act-glossary.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/activating-and-closing-windows-in-acm.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/act-lps-share-permissions.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/act-operatingsystem-application-report.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/act-operatingsystem-computer-report.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/act-operatingsystem-device-report.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/act-product-and-documentation-resources.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/act-settings-dialog-box-preferences-tab.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/act-settings-dialog-box-settings-tab.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/act-toolbar-icons-in-acm.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/act-tools-packages-and-services.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/act-user-interface-reference.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/adding-or-editing-an-issue.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/adding-or-editing-a-solution.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/analyzing-your-compatibility-data.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/application-dialog-box.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/categorizing-your-compatibility-data.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/chromebook-migration-guide.md", -"redirect_url": "edu/windows/chromebook-migration-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/common-compatibility-issues.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/compatibility-monitor-users-guide.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/computer-dialog-box.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/configuring-act.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/creating-and-editing-issues-and-solutions.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/creating-an-enterprise-environment-for-compatibility-testing.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/creating-an-inventory-collector-package.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/creating-a-runtime-analysis-package.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/customizing-your-report-views.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/data-sent-through-the-microsoft-compatibility-exchange.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/deciding-whether-to-fix-an-application-or-deploy-a-workaround.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/deciding-which-applications-to-test.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/deleting-a-data-collection-package.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/deploying-an-inventory-collector-package.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/deploying-a-runtime-analysis-package.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/deploy-windows-10-in-a-school.md", -"redirect_url": "/edu/windows/deploy-windows-10-in-a-school", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/example-filter-queries.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/exporting-a-data-collection-package.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/filtering-your-compatibility-data.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/fixing-compatibility-issues.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/identifying-computers-for-inventory-collection.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/integration-with-management-solutions-.md", -"redirect_url": "/windows/deployment/update/waas-manage-updates-wufb", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/internet-explorer-web-site-report.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/labeling-data-in-acm.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/log-file-locations-for-data-collection-packages.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/managing-your-data-collection-packages.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/organizational-tasks-for-each-report-type.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/organizing-your-compatibility-data.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/prioritizing-your-compatibility-data.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/ratings-icons-in-acm.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/resolving-an-issue.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/saving-opening-and-exporting-reports.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/selecting-the-send-and-receive-status-for-an-application.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/selecting-your-compatibility-rating.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/selecting-your-deployment-status.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/sending-and-receiving-compatibility-data.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/settings-for-acm.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/setup-and-deployment.md", -"redirect_url": "/windows/deployment/update/waas-manage-updates-wufb", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/software-requirements-for-act.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/software-requirements-for-rap.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/taking-inventory-of-your-organization.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/testing-compatibility-on-the-target-platform.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/troubleshooting-act.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/troubleshooting-act-database-issues.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/troubleshooting-the-act-configuration-wizard.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/troubleshooting-the-act-log-processing-service.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/using-act.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/using-compatibility-monitor-to-send-feedback.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/viewing-your-compatibility-reports.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/websiteurl-dialog-box.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/welcome-to-act.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/whats-new-in-act-60.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/windows-10-guidance-for-education-environments.md", -"redirect_url": "/edu/windows/index", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/windows-10-servicing-options.md", -"redirect_url": "/windows/deployment/update/waas-overview", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/windows-update-for-business.md", -"redirect_url": "/windows/deployment/update/waas-manage-updates-wufb", -"redirect_document_id": false -}, -{ -"source_path": "windows/whats-new/applocker.md", -"redirect_url": "/windows/whats-new/whats-new-windows-10-version-1507-and-1511", -"redirect_document_id": true -}, -{ -"source_path": "windows/whats-new/bitlocker.md", -"redirect_url": "/windows/whats-new/whats-new-windows-10-version-1507-and-1511", -"redirect_document_id": false -}, -{ -"source_path": "windows/whats-new/change-history-for-what-s-new-in-windows-10.md", -"redirect_url": "/windows/whats-new/index", -"redirect_document_id": true -}, -{ -"source_path": "windows/whats-new/credential-guard.md", -"redirect_url": "/windows/whats-new/whats-new-windows-10-version-1507-and-1511", -"redirect_document_id": false -}, -{ -"source_path": "windows/whats-new/device-guard-overview.md", -"redirect_url": "/windows/security/threat-protection/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control", -"redirect_document_id": false -}, -{ -"source_path": "windows/whats-new/device-management.md", -"redirect_url": "/windows/client-management/index", -"redirect_document_id": false -}, -{ -"source_path": "windows/whats-new/edge-ie11-whats-new-overview.md", -"redirect_url": "/microsoft-edge/deploy/enterprise-guidance-using-microsoft-edge-and-ie11", -"redirect_document_id": true -}, -{ -"source_path": "windows/whats-new/edp-whats-new-overview.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/protect-enterprise-data-using-wip", -"redirect_document_id": false -}, -{ -"source_path": "windows/whats-new/lockdown-features-windows-10.md", -"redirect_url": "/windows/configuration/lockdown-features-windows-10", -"redirect_document_id": false -}, -{ -"source_path": "windows/whats-new/microsoft-passport.md", -"redirect_url": "/windows/access-protection/hello-for-business/hello-identity-verification", -"redirect_document_id": false -}, -{ -"source_path": "windows/whats-new/new-provisioning-packages.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-packages", -"redirect_document_id": false -}, -{ -"source_path": "windows/whats-new/security-auditing.md", -"redirect_url": "/windows/whats-new/whats-new-windows-10-version-1507-and-1511", -"redirect_document_id": false -}, -{ -"source_path": "windows/whats-new/trusted-platform-module.md", -"redirect_url": "/windows/device-security/tpm/trusted-platform-module-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/whats-new/user-account-control.md", -"redirect_url": "/windows/whats-new/whats-new-windows-10-version-1507-and-1511", -"redirect_document_id": false -}, -{ -"source_path": "windows/whats-new/windows-spotlight.md", -"redirect_url": "/windows/configuration/windows-spotlight", -"redirect_document_id": true -}, -{ -"source_path": "windows/whats-new/windows-store-for-business-overview.md", -"redirect_url": "/microsoft-store/windows-store-for-business-overview", -"redirect_document_id": true -}, -{ -"source_path": "store-for-business/windows-store-for-business-overview.md", -"redirect_url": "/microsoft-store/microsoft-store-for-business-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/whats-new/windows-update-for-business.md", -"redirect_url": "/windows/whats-new/whats-new-windows-10-version-1507-and-1511", -"redirect_document_id": false -}, -{ -"source_path": "windows/keep-secure/windows-10-security-guide.md", -"redirect_url": "/windows/threat-protection/overview-of-threat-mitigations-in-windows-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/whats-new/security.md", -"redirect_url": "/windows/threat-protection/overview-of-threat-mitigations-in-windows-10", -"redirect_document_id": false -}, -{ -"source_path": "windows/configure/basic-level-windows-diagnostic-events-and-fields-1703.md", -"redirect_url": "/windows/configuration/basic-level-windows-diagnostic-events-and-fields", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/change-history-for-configure-windows-10.md", -"redirect_url": "/windows/configuration/change-history-for-configure-windows-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/changes-to-start-policies-in-windows-10.md", -"redirect_url": "/windows/configuration/changes-to-start-policies-in-windows-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/configure-devices-without-mdm.md", -"redirect_url": "/windows/configuration/configure-devices-without-mdm", -"redirect_document_id": true -}, -{ -"source_path": "windows/configuration/configure-devices-without-mdm.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-packages", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/configure-mobile.md", -"redirect_url": "/windows/configuration/mobile-devices/configure-mobile", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/configure-windows-10-taskbar.md", -"redirect_url": "/windows/configuration/configure-windows-10-taskbar", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/configure-windows-telemetry-in-your-organization.md", -"redirect_url": "/windows/configuration/configure-windows-diagnostic-data-in-your-organization", -"redirect_document_id": true -}, -{ -"source_path": "windows/configuration/configure-windows-telemetry-in-your-organization.md", -"redirect_url": "/windows/configuration/configure-windows-diagnostic-data-in-your-organization", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/cortana-at-work-crm.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-crm", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/cortana-at-work-feedback.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-feedback", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/cortana-at-work-o365.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-o365", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/cortana-at-work-overview.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/cortana-at-work-policy-settings.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-policy-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/cortana-at-work-powerbi.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-powerbi", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/cortana-at-work-scenario-1.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-1", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/cortana-at-work-scenario-2.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-2", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/cortana-at-work-scenario-3.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-3", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/cortana-at-work-scenario-4.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-4", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/cortana-at-work-scenario-5.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-5", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/cortana-at-work-scenario-6.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-6", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/cortana-at-work-scenario-7.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-7", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/cortana-at-work-testing-scenarios.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-testing-scenarios", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/cortana-at-work-voice-commands.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-voice-commands", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/customize-and-export-start-layout.md", -"redirect_url": "/windows/configuration/customize-and-export-start-layout", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/customize-windows-10-start-screens-by-using-group-policy.md", -"redirect_url": "/windows/configuration/customize-windows-10-start-screens-by-using-group-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/customize-windows-10-start-screens-by-using-mobile-device-management.md", -"redirect_url": "/windows/configuration/customize-windows-10-start-screens-by-using-mobile-device-management", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/customize-windows-10-start-screens-by-using-provisioning-packages-and-icd.md", -"redirect_url": "/windows/configuration/customize-windows-10-start-screens-by-using-provisioning-packages-and-icd", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/guidelines-for-assigned-access-app.md", -"redirect_url": "/windows/configuration/guidelines-for-assigned-access-app", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/how-it-pros-can-use-configuration-service-providers.md", -"redirect_url": "/windows/configuration/provisioning-packages/how-it-pros-can-use-configuration-service-providers", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/kiosk-shared-pc.md", -"redirect_url": "/windows/configuration/kiosk-shared-pc", -"redirect_document_id": true -}, -{ -"source_path": "windows/configuration/kiosk-shared-pc.md", -"redirect_url": "/windows/configuration/kiosk-methods", -"redirect_document_id": true -}, -{ -"source_path": "windows/configuration/setup-kiosk-digital-signage.md", -"redirect_url": "/windows/configuration/kiosk-single-app", -"redirect_document_id": true -}, -{ -"source_path": "windows/configuration/multi-app-kiosk-xml.md", -"redirect_url": "/windows/configuration/kiosk-xml", -"redirect_document_id": true -}, -{ -"source_path": "windows/configuration/multi-app-kiosk-troubleshoot.md", -"redirect_url": "/windows/configuration/kiosk-troubleshoot", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/lock-down-windows-10-to-specific-apps.md", -"redirect_url": "/windows/configuration/lock-down-windows-10-to-specific-apps", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/lock-down-windows-10.md", -"redirect_url": "/windows/configuration/lock-down-windows-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/lockdown-features-windows-10.md", -"redirect_url": "/windows/configuration/lockdown-features-windows-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/lockdown-xml.md", -"redirect_url": "/windows/configuration/mobile-devices/lockdown-xml", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/manage-connections-from-windows-operating-system-components-to-microsoft-services.md", -"redirect_url": "/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/manage-tips-and-suggestions.md", -"redirect_url": "/windows/configuration/manage-tips-and-suggestions", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/manage-wifi-sense-in-enterprise.md", -"redirect_url": "/windows/configuration/manage-wifi-sense-in-enterprise", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/mobile-lockdown-designer.md", -"redirect_url": "/windows/configuration/mobile-devices/mobile-lockdown-designer", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/product-ids-in-windows-10-mobile.md", -"redirect_url": "/windows/configuration/mobile-devices/product-ids-in-windows-10-mobile", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/provision-pcs-for-initial-deployment.md", -"redirect_url": "/windows/configuration/provisioning-packages/provision-pcs-for-initial-deployment", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/provision-pcs-with-apps-and-certificates.md", -"redirect_url": "/windows/configuration/provisioning-packages/provision-pcs-with-apps-and-certificates", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/provision-pcs-with-apps.md", -"redirect_url": "/windows/configuration/provisioning-packages/provision-pcs-with-apps", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/provisioning-apply-package.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-apply-package", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/provisioning-command-line.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-command-line", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/provisioning-configure-mobile.md", -"redirect_url": "/windows/configuration/mobile-devices/provisioning-configure-mobile", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/provisioning-create-package.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-create-package", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/provisioning-how-it-works.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-how-it-works", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/provisioning-install-icd.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-install-icd", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/provisioning-multivariant.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-multivariant", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/provisioning-nfc.md", -"redirect_url": "/windows/configuration/mobile-devices/provisioning-nfc", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/provisioning-package-splitter.md", -"redirect_url": "/windows/configuration/mobile-devices/provisioning-package-splitter", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/provisioning-packages.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-packages", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/provisioning-powershell.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-powershell", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/provisioning-script-to-install-app.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-script-to-install-app", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/provisioning-uninstall-package.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-uninstall-package", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/set-up-a-device-for-anyone-to-use.md", -"redirect_url": "/windows/configuration/set-up-a-device-for-anyone-to-use", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/set-up-a-kiosk-for-windows-10-for-desktop-editions.md", -"redirect_url": "/windows/configuration/set-up-a-kiosk-for-windows-10-for-desktop-editions", -"redirect_document_id": true -}, -{ - "source_path": "windows/configuration/set-up-a-kiosk-for-windows-10-for-desktop-editions.md", - "redirect_url": "/windows/configuration/setup-kiosk-digital-signage", + { + "source_path": "education/windows/switch-to-pro-education.md", + "redirect_url": "/education/windows/change-to-pro-education", "redirect_document_id": true -}, -{ -"source_path": "windows/configure/set-up-a-kiosk-for-windows-10-for-mobile-edition.md", -"redirect_url": "/windows/configuration/mobile-devices/set-up-a-kiosk-for-windows-10-for-mobile-edition", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/set-up-shared-or-guest-pc.md", -"redirect_url": "/windows/configuration/set-up-shared-or-guest-pc", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/settings-that-can-be-locked-down.md", -"redirect_url": "/windows/configuration/mobile-devices/settings-that-can-be-locked-down", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/start-layout-xml-desktop.md", -"redirect_url": "/windows/configuration/start-layout-xml-desktop", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/start-layout-xml-mobile.md", -"redirect_url": "/windows/configuration/mobile-devices/start-layout-xml-mobile", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/start-secondary-tiles.md", -"redirect_url": "/windows/configuration/start-secondary-tiles", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/start-taskbar-lockscreen.md", -"redirect_url": "/windows/configuration/start-taskbar-lockscreen", -"redirect_document_id": true -}, -{ -"source_path": "windows/configuration/start-taskbar-lockscreen.md", -"redirect_url": "/windows/configuration/windows-10-start-layout-options-and-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/stop-employees-from-using-the-windows-store.md", -"redirect_url": "/windows/configuration/stop-employees-from-using-the-windows-store", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/windows-10-start-layout-options-and-policies.md", -"redirect_url": "/windows/configuration/windows-10-start-layout-options-and-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/windows-diagnostic-data-1703.md", -"redirect_url": "/windows/configuration/windows-diagnostic-data", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/windows-spotlight.md", -"redirect_url": "/windows/configuration/windows-spotlight", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/windows-spotlight.md", -"redirect_url": "/windows/configuration/windows-spotlight", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/activate-forest-by-proxy-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/activate-forest-by-proxy-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/activate-forest-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/activate-forest-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/activate-using-active-directory-based-activation-client.md", -"redirect_url": "/windows/deployment/volume-activation/activate-using-active-directory-based-activation-client", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/activate-using-key-management-service-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/activate-using-key-management-service-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/activate-windows-10-clients-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/activate-windows-10-clients-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/active-directory-based-activation-overview.md", -"redirect_url": "/windows/deployment/volume-activation/active-directory-based-activation-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/add-a-windows-10-operating-system-image-using-configuration-manager.md", -"redirect_url": "/windows/deployment/deploy-windows-sccm/add-a-windows-10-operating-system-image-using-configuration-manager", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager.md", -"redirect_url": "/windows/deployment/deploy-windows-sccm/add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/add-manage-products-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/add-manage-products-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/add-remove-computers-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/add-remove-computers-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/add-remove-product-key-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/add-remove-product-key-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/appendix-information-sent-to-microsoft-during-activation-client.md", -"redirect_url": "/windows/deployment/volume-activation/appendix-information-sent-to-microsoft-during-activation-client", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/assign-applications-using-roles-in-mdt-2013.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/assign-applications-using-roles-in-mdt-2013", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/assign-applications-using-roles-in-mdt.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/assign-applications-using-roles-in-mdt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/build-a-distributed-environment-for-windows-10-deployment.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/build-a-distributed-environment-for-windows-10-deployment", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/change-history-for-deploy-windows-10.md", -"redirect_url": "/windows/deployment/change-history-for-deploy-windows-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/configure-a-pxe-server-to-load-windows-pe.md", -"redirect_url": "/windows/deployment/configure-a-pxe-server-to-load-windows-pe", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/configure-client-computers-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/configure-client-computers-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/configure-mdt-2013-for-userexit-scripts.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/configure-mdt-2013-for-userexit-scripts", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/configure-mdt-2013-settings.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/configure-mdt-2013-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/configure-mdt-deployment-share-rules.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/configure-mdt-deployment-share-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/configure-mdt-for-userexit-scripts.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/configure-mdt-for-userexit-scripts", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/configure-mdt-settings.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/configure-mdt-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/create-a-custom-windows-pe-boot-image-with-configuration-manager.md", -"redirect_url": "/windows/deployment/deploy-windows-sccm/create-a-custom-windows-pe-boot-image-with-configuration-manager", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/create-a-task-sequence-with-configuration-manager-and-mdt.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/create-a-task-sequence-with-configuration-manager-and-mdt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/create-a-windows-10-reference-image.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/create-a-windows-10-reference-image", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/create-an-application-to-deploy-with-windows-10-using-configuration-manager.md", -"redirect_url": "/windows/deployment/deploy-windows-sccm/create-an-application-to-deploy-with-windows-10-using-configuration-manager", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/deploy-a-windows-10-image-using-mdt.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/deploy-a-windows-10-image-using-mdt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/deploy-whats-new.md", -"redirect_url": "/windows/deployment/deploy-whats-new", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/deploy-windows-10-using-pxe-and-configuration-manager.md", -"redirect_url": "/windows/deployment/deploy-windows-sccm/deploy-windows-10-using-pxe-and-configuration-manager", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/deploy-windows-10-with-system-center-2012-r2-configuration-manager.md", -"redirect_url": "/windows/deployment/deploy-windows-sccm/deploy-windows-10-with-system-center-2012-r2-configuration-manager", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/deploy-windows-10-with-the-microsoft-deployment-toolkit.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/deploy-windows-10-with-the-microsoft-deployment-toolkit", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/deploy-windows-to-go.md", -"redirect_url": "/windows/deployment/deploy-windows-to-go", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/finalize-the-os-configuration-for-windows-10-deployment-with-configuration-manager.md", -"redirect_url": "/windows/deployment/deploy-windows-sccm/finalize-the-os-configuration-for-windows-10-deployment-with-configuration-manager", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/get-started-with-the-microsoft-deployment-toolkit.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/get-started-with-the-microsoft-deployment-toolkit", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/getting-started-with-the-user-state-migration-tool.md", -"redirect_url": "/windows/deployment/usmt/getting-started-with-the-user-state-migration-tool", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/import-export-vamt-data.md", -"redirect_url": "/windows/deployment/volume-activation/import-export-vamt-data", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/install-configure-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/install-configure-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/install-kms-client-key-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/install-kms-client-key-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/install-product-key-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/install-product-key-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/install-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/install-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/integrate-configuration-manager-with-mdt-2013.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/integrate-configuration-manager-with-mdt-2013", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/integrate-configuration-manager-with-mdt.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/integrate-configuration-manager-with-mdt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/introduction-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/introduction-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/key-features-in-mdt-2013.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/key-features-in-mdt-2013", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/key-features-in-mdt.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/key-features-in-mdt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/kms-activation-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/kms-activation-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/local-reactivation-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/local-reactivation-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/manage-activations-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/manage-activations-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/manage-product-keys-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/manage-product-keys-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/manage-vamt-data.md", -"redirect_url": "/windows/deployment/volume-activation/manage-vamt-data", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/manage-windows-upgrades-with-upgrade-analytics.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/manage-windows-upgrades-with-upgrade-readiness.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/mbr-to-gpt.md", -"redirect_url": "/windows/deployment/mbr-to-gpt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/mdt-2013-lite-touch-components.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/mdt-2013-lite-touch-components", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/mdt-lite-touch-components.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/mdt-lite-touch-components", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/migrate-application-settings.md", -"redirect_url": "/windows/deployment/usmt/migrate-application-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/migration-store-types-overview.md", -"redirect_url": "/windows/deployment/usmt/migration-store-types-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/monitor-activation-client.md", -"redirect_url": "/windows/deployment/volume-activation/monitor-activation-client", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/monitor-windows-10-deployment-with-configuration-manager.md", -"redirect_url": "/windows/deployment/deploy-windows-sccm/monitor-windows-10-deployment-with-configuration-manager", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/offline-migration-reference.md", -"redirect_url": "/windows/deployment/usmt/offline-migration-reference", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/online-activation-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/online-activation-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/plan-for-volume-activation-client.md", -"redirect_url": "/windows/deployment/volume-activation/plan-for-volume-activation-client", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/prepare-for-windows-deployment-with-mdt-2013.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/prepare-for-windows-deployment-with-mdt-2013", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/prepare-for-windows-deployment-with-mdt.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/prepare-for-windows-deployment-with-mdt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md", -"redirect_url": "/windows/deployment/deploy-windows-sccm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/proxy-activation-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/proxy-activation-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md", -"redirect_url": "/windows/deployment/deploy-windows-sccm/refresh-a-windows-7-client-with-windows-10-using-configuration-manager", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/refresh-a-windows-7-computer-with-windows-10.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/refresh-a-windows-7-computer-with-windows-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/remove-products-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/remove-products-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/replace-a-windows-7-client-with-windows-10-using-configuration-manager.md", -"redirect_url": "/windows/deployment/deploy-windows-sccm/replace-a-windows-7-client-with-windows-10-using-configuration-manager", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/replace-a-windows-7-computer-with-a-windows-10-computer.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/replace-a-windows-7-computer-with-a-windows-10-computer", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/resolve-windows-10-upgrade-errors.md", -"redirect_url": "/windows/deployment/upgrade/resolve-windows-10-upgrade-errors", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/scenario-kms-activation-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/scenario-kms-activation-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/scenario-online-activation-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/scenario-online-activation-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/scenario-proxy-activation-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/scenario-proxy-activation-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/set-up-mdt-2013-for-bitlocker.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/set-up-mdt-2013-for-bitlocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/set-up-mdt-for-bitlocker.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/set-up-mdt-for-bitlocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/sideload-apps-in-windows-10.md", -"redirect_url": "/windows/application-management/sideload-apps-in-windows-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/simulate-a-windows-10-deployment-in-a-test-environment.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/simulate-a-windows-10-deployment-in-a-test-environment", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/troubleshoot-upgrade-analytics.md", -"redirect_url": "/windows/deployment/upgrade/troubleshoot-upgrade-readiness", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/troubleshoot-upgrade-readiness.md", -"redirect_url": "/windows/deployment/upgrade/troubleshoot-upgrade-readiness", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/understanding-migration-xml-files.md", -"redirect_url": "/windows/deployment/usmt/understanding-migration-xml-files", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/update-product-status-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/update-product-status-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-analytics-additional-insights.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-additional-insights", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-analytics-architecture.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-architecture", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-analytics-deploy-windows.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-deploy-windows", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-analytics-deployment-script.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-deployment-script", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-analytics-get-started.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-get-started", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-analytics-identify-apps.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-identify-apps", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-analytics-requirements.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-requirements", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-analytics-resolve-issues.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-resolve-issues", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-analytics-upgrade-overview.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-upgrade-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-readiness-additional-insights.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-additional-insights", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-readiness-architecture.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-architecture", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-readiness-deploy-windows.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-deploy-windows", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-readiness-deployment-script.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-deployment-script", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-readiness-get-started.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-get-started", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-readiness-identify-apps.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-identify-apps", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-readiness-release-notes.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-release-notes", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-readiness-requirements.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-requirements", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-readiness-resolve-issues.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-resolve-issues", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-readiness-upgrade-overview.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-upgrade-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-to-windows-10-with-system-center-configuraton-manager.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-to-windows-10-with-system-center-configuraton-manager", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-to-windows-10-with-the-microsoft-deployment-toolkit.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-to-windows-10-with-the-microsoft-deployment-toolkit", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-windows-phone-8-1-to-10.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-windows-phone-8-1-to-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/use-orchestrator-runbooks-with-mdt-2013.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/use-orchestrator-runbooks-with-mdt-2013", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/use-orchestrator-runbooks-with-mdt.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/use-orchestrator-runbooks-with-mdt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/use-the-mdt-database-to-stage-windows-10-deployment-information.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/use-the-mdt-database-to-stage-windows-10-deployment-information", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/use-the-volume-activation-management-tool-client.md", -"redirect_url": "/windows/deployment/volume-activation/use-the-volume-activation-management-tool-client", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/use-upgrade-analytics-to-manage-windows-upgrades.md", -"redirect_url": "/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/use-upgrade-readiness-to-manage-windows-upgrades.md", -"redirect_url": "/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/use-vamt-in-windows-powershell.md", -"redirect_url": "/windows/deployment/volume-activation/use-vamt-in-windows-powershell", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/use-web-services-in-mdt-2013.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/use-web-services-in-mdt-2013", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/use-web-services-in-mdt.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/use-web-services-in-mdt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-best-practices.md", -"redirect_url": "/windows/deployment/usmt/usmt-best-practices", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-choose-migration-store-type.md", -"redirect_url": "/windows/deployment/usmt/usmt-choose-migration-store-type", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-command-line-syntax.md", -"redirect_url": "/windows/deployment/usmt/usmt-command-line-syntax", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-common-issues.md", -"redirect_url": "/windows/deployment/usmt/usmt-common-issues", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-common-migration-scenarios.md", -"redirect_url": "/windows/deployment/usmt/usmt-common-migration-scenarios", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-configxml-file.md", -"redirect_url": "/windows/deployment/usmt/usmt-configxml-file", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-conflicts-and-precedence.md", -"redirect_url": "/windows/deployment/usmt/usmt-conflicts-and-precedence", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-custom-xml-examples.md", -"redirect_url": "/windows/deployment/usmt/usmt-custom-xml-examples", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-customize-xml-files.md", -"redirect_url": "/windows/deployment/usmt/usmt-customize-xml-files", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-determine-what-to-migrate.md", -"redirect_url": "/windows/deployment/usmt/usmt-determine-what-to-migrate", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-estimate-migration-store-size.md", -"redirect_url": "/windows/deployment/usmt/usmt-estimate-migration-store-size", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-exclude-files-and-settings.md", -"redirect_url": "/windows/deployment/usmt/usmt-exclude-files-and-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-extract-files-from-a-compressed-migration-store.md", -"redirect_url": "/windows/deployment/usmt/usmt-extract-files-from-a-compressed-migration-store", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-faq.md", -"redirect_url": "/windows/deployment/usmt/usmt-faq", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-general-conventions.md", -"redirect_url": "/windows/deployment/usmt/usmt-general-conventions", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-hard-link-migration-store.md", -"redirect_url": "/windows/deployment/usmt/usmt-hard-link-migration-store", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-how-it-works.md", -"redirect_url": "/windows/deployment/usmt/usmt-how-it-works", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-how-to.md", -"redirect_url": "/windows/deployment/usmt/usmt-how-to", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-identify-application-settings.md", -"redirect_url": "/windows/deployment/usmt/usmt-identify-application-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-identify-file-types-files-and-folders.md", -"redirect_url": "/windows/deployment/usmt/usmt-identify-file-types-files-and-folders", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-identify-operating-system-settings.md", -"redirect_url": "/windows/deployment/usmt/usmt-identify-operating-system-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-identify-users.md", -"redirect_url": "/windows/deployment/usmt/usmt-identify-users", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-include-files-and-settings.md", -"redirect_url": "/windows/deployment/usmt/usmt-include-files-and-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-loadstate-syntax.md", -"redirect_url": "/windows/deployment/usmt/usmt-loadstate-syntax", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-log-files.md", -"redirect_url": "/windows/deployment/usmt/usmt-log-files", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-migrate-efs-files-and-certificates.md", -"redirect_url": "/windows/deployment/usmt/usmt-migrate-efs-files-and-certificates", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-migrate-user-accounts.md", -"redirect_url": "/windows/deployment/usmt/usmt-migrate-user-accounts", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-migration-store-encryption.md", -"redirect_url": "/windows/deployment/usmt/usmt-migration-store-encryption", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-overview.md", -"redirect_url": "/windows/deployment/usmt/usmt-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-plan-your-migration.md", -"redirect_url": "/windows/deployment/usmt/usmt-plan-your-migration", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-recognized-environment-variables.md", -"redirect_url": "/windows/deployment/usmt/usmt-recognized-environment-variables", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-reference.md", -"redirect_url": "/windows/deployment/usmt/usmt-reference", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-requirements.md", -"redirect_url": "/windows/deployment/usmt/usmt-requirements", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-reroute-files-and-settings.md", -"redirect_url": "/windows/deployment/usmt/usmt-reroute-files-and-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-resources.md", -"redirect_url": "/windows/deployment/usmt/usmt-resources", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-return-codes.md", -"redirect_url": "/windows/deployment/usmt/usmt-return-codes", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-scanstate-syntax.md", -"redirect_url": "/windows/deployment/usmt/usmt-scanstate-syntax", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-technical-reference.md", -"redirect_url": "/windows/deployment/usmt/usmt-technical-reference", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-test-your-migration.md", -"redirect_url": "/windows/deployment/usmt/usmt-test-your-migration", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-topics.md", -"redirect_url": "/windows/deployment/usmt/usmt-topics", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-troubleshooting.md", -"redirect_url": "/windows/deployment/usmt/usmt-troubleshooting", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-utilities.md", -"redirect_url": "/windows/deployment/usmt/usmt-utilities", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-what-does-usmt-migrate.md", -"redirect_url": "/windows/deployment/usmt/usmt-what-does-usmt-migrate", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-xml-elements-library.md", -"redirect_url": "/windows/deployment/usmt/usmt-xml-elements-library", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-xml-reference.md", -"redirect_url": "/windows/deployment/usmt/usmt-xml-reference", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/vamt-known-issues.md", -"redirect_url": "/windows/deployment/volume-activation/vamt-known-issues", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/vamt-requirements.md", -"redirect_url": "/windows/deployment/volume-activation/vamt-requirements", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/vamt-step-by-step.md", -"redirect_url": "/windows/deployment/volume-activation/vamt-step-by-step", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/verify-the-condition-of-a-compressed-migration-store.md", -"redirect_url": "/windows/deployment/usmt/verify-the-condition-of-a-compressed-migration-store", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/volume-activation-management-tool.md", -"redirect_url": "/windows/deployment/volume-activation/volume-activation-management-tool", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/volume-activation-windows-10.md", -"redirect_url": "/windows/deployment/volume-activation/volume-activation-windows-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/windows-10-deployment-scenarios.md", -"redirect_url": "/windows/deployment/windows-10-deployment-scenarios", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/windows-10-deployment-tools-reference.md", -"redirect_url": "/windows/deployment/windows-10-deployment-tools-reference", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/windows-10-edition-upgrades.md", -"redirect_url": "/windows/deployment/upgrade/windows-10-edition-upgrades", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/windows-10-enterprise-e3-overview.md", -"redirect_url": "/windows/deployment/windows-10-enterprise-e3-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/windows-10-poc-mdt.md", -"redirect_url": "/windows/deployment/windows-10-poc-mdt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/windows-10-poc-sc-config-mgr.md", -"redirect_url": "/windows/deployment/windows-10-poc-sc-config-mgr", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/windows-10-poc.md", -"redirect_url": "/windows/deployment/windows-10-poc", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/windows-10-upgrade-paths.md", -"redirect_url": "/windows/deployment/upgrade/windows-10-upgrade-paths", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/windows-adk-scenarios-for-it-pros.md", -"redirect_url": "/windows/deployment/windows-adk-scenarios-for-it-pros", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/windows-deployment-scenarios-and-tools.md", -"redirect_url": "/windows/deployment/windows-deployment-scenarios-and-tools", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/windows-upgrade-and-migration-considerations.md", -"redirect_url": "/windows/deployment/upgrade/windows-upgrade-and-migration-considerations", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/xml-file-requirements.md", -"redirect_url": "/windows/deployment/usmt/xml-file-requirements", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/access-control.md", -"redirect_url": "/windows/access-protection/access-control/access-control", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/access-credential-manager-as-a-trusted-caller.md", -"redirect_url": "/windows/device-security/security-policy-settings/access-credential-manager-as-a-trusted-caller", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/access-this-computer-from-the-network.md", -"redirect_url": "/windows/device-security/security-policy-settings/access-this-computer-from-the-network", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/account-lockout-duration.md", -"redirect_url": "/windows/device-security/security-policy-settings/account-lockout-duration", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/account-lockout-policy.md", -"redirect_url": "/windows/device-security/security-policy-settings/account-lockout-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/account-lockout-threshold.md", -"redirect_url": "/windows/device-security/security-policy-settings/account-lockout-threshold", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/account-policies.md", -"redirect_url": "/windows/device-security/security-policy-settings/account-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/accounts-administrator-account-status.md", -"redirect_url": "/windows/device-security/security-policy-settings/accounts-administrator-account-status", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/accounts-block-microsoft-accounts.md", -"redirect_url": "/windows/device-security/security-policy-settings/accounts-block-microsoft-accounts", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/accounts-guest-account-status.md", -"redirect_url": "/windows/device-security/security-policy-settings/accounts-guest-account-status", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only.md", -"redirect_url": "/windows/device-security/security-policy-settings/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/accounts-rename-administrator-account.md", -"redirect_url": "/windows/device-security/security-policy-settings/accounts-rename-administrator-account", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/accounts-rename-guest-account.md", -"redirect_url": "/windows/device-security/security-policy-settings/accounts-rename-guest-account", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/act-as-part-of-the-operating-system.md", -"redirect_url": "/windows/device-security/security-policy-settings/act-as-part-of-the-operating-system", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/active-directory-accounts.md", -"redirect_url": "/windows/access-protection/access-control/active-directory-accounts", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/active-directory-security-groups.md", -"redirect_url": "/windows/access-protection/access-control/active-directory-security-groups", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/add-production-devices-to-the-membership-group-for-a-zone.md", -"redirect_url": "/windows/access-protection/windows-firewall/add-production-devices-to-the-membership-group-for-a-zone", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/add-rules-for-packaged-apps-to-existing-applocker-rule-set.md", -"redirect_url": "/windows/device-security/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/add-test-devices-to-the-membership-group-for-a-zone.md", -"redirect_url": "/windows/access-protection/windows-firewall/add-test-devices-to-the-membership-group-for-a-zone", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/add-workstations-to-domain.md", -"redirect_url": "/windows/device-security/security-policy-settings/add-workstations-to-domain", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/additional-mitigations.md", -"redirect_url": "/windows/access-protection/credential-guard/additional-mitigations", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/adjust-memory-quotas-for-a-process.md", -"redirect_url": "/windows/device-security/security-policy-settings/adjust-memory-quotas-for-a-process", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/administer-applocker.md", -"redirect_url": "/windows/device-security/applocker/administer-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/administer-security-policy-settings.md", -"redirect_url": "/windows/device-security/security-policy-settings/administer-security-policy-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/advanced-security-audit-policy-settings.md", -"redirect_url": "/windows/device-security/auditing/advanced-security-audit-policy-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/advanced-security-auditing-faq.md", -"redirect_url": "/windows/device-security/auditing/advanced-security-auditing-faq", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/advanced-security-auditing.md", -"redirect_url": "/windows/device-security/auditing/advanced-security-auditing", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/alerts-queue-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/allow-log-on-locally.md", -"redirect_url": "/windows/device-security/security-policy-settings/allow-log-on-locally", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/allow-log-on-through-remote-desktop-services.md", -"redirect_url": "/windows/device-security/security-policy-settings/allow-log-on-through-remote-desktop-services", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/api-portal-mapping-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/app-behavior-with-wip.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/app-behavior-with-wip", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md", -"redirect_url": "/windows/access-protection/windows-firewall/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/appendix-a-security-monitoring-recommendations-for-many-audit-events.md", -"redirect_url": "/windows/device-security/auditing/appendix-a-security-monitoring-recommendations-for-many-audit-events", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/applocker-architecture-and-components.md", -"redirect_url": "/windows/device-security/applocker/applocker-architecture-and-components", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/applocker-functions.md", -"redirect_url": "/windows/device-security/applocker/applocker-functions", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/applocker-overview.md", -"redirect_url": "/windows/device-security/applocker/applocker-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/applocker-policies-deployment-guide.md", -"redirect_url": "/windows/device-security/applocker/applocker-policies-deployment-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/applocker-policies-design-guide.md", -"redirect_url": "/windows/device-security/applocker/applocker-policies-design-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/applocker-policy-use-scenarios.md", -"redirect_url": "/windows/device-security/applocker/applocker-policy-use-scenarios", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/applocker-processes-and-interactions.md", -"redirect_url": "/windows/device-security/applocker/applocker-processes-and-interactions", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/applocker-settings.md", -"redirect_url": "/windows/device-security/applocker/applocker-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/applocker-technical-reference.md", -"redirect_url": "/windows/device-security/applocker/applocker-technical-reference", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/apply-a-basic-audit-policy-on-a-file-or-folder.md", -"redirect_url": "/windows/device-security/auditing/apply-a-basic-audit-policy-on-a-file-or-folder", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/assign-security-group-filters-to-the-gpo.md", -"redirect_url": "/windows/access-protection/windows-firewall/assign-security-group-filters-to-the-gpo", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-account-lockout.md", -"redirect_url": "/windows/device-security/auditing/audit-account-lockout", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-application-generated.md", -"redirect_url": "/windows/device-security/auditing/audit-application-generated", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-application-group-management.md", -"redirect_url": "/windows/device-security/auditing/audit-application-group-management", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-audit-policy-change.md", -"redirect_url": "/windows/device-security/auditing/audit-audit-policy-change", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-audit-the-access-of-global-system-objects.md", -"redirect_url": "/windows/device-security/security-policy-settings/audit-audit-the-access-of-global-system-objects", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-audit-the-use-of-backup-and-restore-privilege.md", -"redirect_url": "/windows/device-security/security-policy-settings/audit-audit-the-use-of-backup-and-restore-privilege", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-authentication-policy-change.md", -"redirect_url": "/windows/device-security/auditing/audit-authentication-policy-change", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-authorization-policy-change.md", -"redirect_url": "/windows/device-security/auditing/audit-authorization-policy-change", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-central-access-policy-staging.md", -"redirect_url": "/windows/device-security/auditing/audit-central-access-policy-staging", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-certification-services.md", -"redirect_url": "/windows/device-security/auditing/audit-certification-services", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-computer-account-management.md", -"redirect_url": "/windows/device-security/auditing/audit-computer-account-management", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-credential-validation.md", -"redirect_url": "/windows/device-security/auditing/audit-credential-validation", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-detailed-directory-service-replication.md", -"redirect_url": "/windows/device-security/auditing/audit-detailed-directory-service-replication", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-detailed-file-share.md", -"redirect_url": "/windows/device-security/auditing/audit-detailed-file-share", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-directory-service-access.md", -"redirect_url": "/windows/device-security/auditing/audit-directory-service-access", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-directory-service-changes.md", -"redirect_url": "/windows/device-security/auditing/audit-directory-service-changes", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-directory-service-replication.md", -"redirect_url": "/windows/device-security/auditing/audit-directory-service-replication", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-distribution-group-management.md", -"redirect_url": "/windows/device-security/auditing/audit-distribution-group-management", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-dpapi-activity.md", -"redirect_url": "/windows/device-security/auditing/audit-dpapi-activity", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-file-share.md", -"redirect_url": "/windows/device-security/auditing/audit-file-share", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-file-system.md", -"redirect_url": "/windows/device-security/auditing/audit-file-system", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-filtering-platform-connection.md", -"redirect_url": "/windows/device-security/auditing/audit-filtering-platform-connection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-filtering-platform-packet-drop.md", -"redirect_url": "/windows/device-security/auditing/audit-filtering-platform-packet-drop", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-filtering-platform-policy-change.md", -"redirect_url": "/windows/device-security/auditing/audit-filtering-platform-policy-change", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-force-audit-policy-subcategory-settings-to-override.md", -"redirect_url": "/windows/device-security/security-policy-settings/audit-force-audit-policy-subcategory-settings-to-override", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-group-membership.md", -"redirect_url": "/windows/device-security/auditing/audit-group-membership", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-handle-manipulation.md", -"redirect_url": "/windows/device-security/auditing/audit-handle-manipulation", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-ipsec-driver.md", -"redirect_url": "/windows/device-security/auditing/audit-ipsec-driver", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-ipsec-extended-mode.md", -"redirect_url": "/windows/device-security/auditing/audit-ipsec-extended-mode", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-ipsec-main-mode.md", -"redirect_url": "/windows/device-security/auditing/audit-ipsec-main-mode", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-ipsec-quick-mode.md", -"redirect_url": "/windows/device-security/auditing/audit-ipsec-quick-mode", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-kerberos-authentication-service.md", -"redirect_url": "/windows/device-security/auditing/audit-kerberos-authentication-service", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-kerberos-service-ticket-operations.md", -"redirect_url": "/windows/device-security/auditing/audit-kerberos-service-ticket-operations", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-kernel-object.md", -"redirect_url": "/windows/device-security/auditing/audit-kernel-object", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-logoff.md", -"redirect_url": "/windows/device-security/auditing/audit-logoff", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-logon.md", -"redirect_url": "/windows/device-security/auditing/audit-logon", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-mpssvc-rule-level-policy-change.md", -"redirect_url": "/windows/device-security/auditing/audit-mpssvc-rule-level-policy-change", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-network-policy-server.md", -"redirect_url": "/windows/device-security/auditing/audit-network-policy-server", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-non-sensitive-privilege-use.md", -"redirect_url": "/windows/device-security/auditing/audit-non-sensitive-privilege-use", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-other-account-logon-events.md", -"redirect_url": "/windows/device-security/auditing/audit-other-account-logon-events", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-other-account-management-events.md", -"redirect_url": "/windows/device-security/auditing/audit-other-account-management-events", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-other-logonlogoff-events.md", -"redirect_url": "/windows/device-security/auditing/audit-other-logonlogoff-events", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-other-object-access-events.md", -"redirect_url": "/windows/device-security/auditing/audit-other-object-access-events", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-other-policy-change-events.md", -"redirect_url": "/windows/device-security/auditing/audit-other-policy-change-events", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-other-privilege-use-events.md", -"redirect_url": "/windows/device-security/auditing/audit-other-privilege-use-events", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-other-system-events.md", -"redirect_url": "/windows/device-security/auditing/audit-other-system-events", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-pnp-activity.md", -"redirect_url": "/windows/device-security/auditing/audit-pnp-activity", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-policy.md", -"redirect_url": "/windows/device-security/security-policy-settings/audit-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-process-creation.md", -"redirect_url": "/windows/device-security/auditing/audit-process-creation", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-process-termination.md", -"redirect_url": "/windows/device-security/auditing/audit-process-termination", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-registry.md", -"redirect_url": "/windows/device-security/auditing/audit-registry", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-removable-storage.md", -"redirect_url": "/windows/device-security/auditing/audit-removable-storage", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-rpc-events.md", -"redirect_url": "/windows/device-security/auditing/audit-rpc-events", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-sam.md", -"redirect_url": "/windows/device-security/auditing/audit-sam", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-security-group-management.md", -"redirect_url": "/windows/device-security/auditing/audit-security-group-management", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-security-state-change.md", -"redirect_url": "/windows/device-security/auditing/audit-security-state-change", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-security-system-extension.md", -"redirect_url": "/windows/device-security/auditing/audit-security-system-extension", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-sensitive-privilege-use.md", -"redirect_url": "/windows/device-security/auditing/audit-sensitive-privilege-use", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-shut-down-system-immediately-if-unable-to-log-security-audits.md", -"redirect_url": "/windows/device-security/security-policy-settings/audit-shut-down-system-immediately-if-unable-to-log-security-audits", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-special-logon.md", -"redirect_url": "/windows/device-security/auditing/audit-special-logon", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-system-integrity.md", -"redirect_url": "/windows/device-security/auditing/audit-system-integrity", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-user-account-management.md", -"redirect_url": "/windows/device-security/auditing/audit-user-account-management", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-user-device-claims.md", -"redirect_url": "/windows/device-security/auditing/audit-user-device-claims", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/back-up-files-and-directories.md", -"redirect_url": "/windows/device-security/security-policy-settings/back-up-files-and-directories", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/backup-tpm-recovery-information-to-ad-ds.md", -"redirect_url": "/windows/device-security/tpm/backup-tpm-recovery-information-to-ad-ds", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/basic-audit-account-logon-events.md", -"redirect_url": "/windows/device-security/auditing/basic-audit-account-logon-events", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/basic-audit-account-management.md", -"redirect_url": "/windows/device-security/auditing/basic-audit-account-management", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/basic-audit-directory-service-access.md", -"redirect_url": "/windows/device-security/auditing/basic-audit-directory-service-access", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/basic-audit-logon-events.md", -"redirect_url": "/windows/device-security/auditing/basic-audit-logon-events", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/basic-audit-object-access.md", -"redirect_url": "/windows/device-security/auditing/basic-audit-object-access", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/basic-audit-policy-change.md", -"redirect_url": "/windows/device-security/auditing/basic-audit-policy-change", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/basic-audit-privilege-use.md", -"redirect_url": "/windows/device-security/auditing/basic-audit-privilege-use", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/basic-audit-process-tracking.md", -"redirect_url": "/windows/device-security/auditing/basic-audit-process-tracking", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/basic-audit-system-events.md", -"redirect_url": "/windows/device-security/auditing/basic-audit-system-events", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/basic-firewall-policy-design.md", -"redirect_url": "/windows/access-protection/windows-firewall/basic-firewall-policy-design", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/basic-security-audit-policies.md", -"redirect_url": "/windows/device-security/auditing/basic-security-audit-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/basic-security-audit-policy-settings.md", -"redirect_url": "/windows/device-security/auditing/basic-security-audit-policy-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/bcd-settings-and-bitlocker.md", -"redirect_url": "/windows/device-security/bitlocker/bcd-settings-and-bitlocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/bitlocker-basic-deployment.md", -"redirect_url": "/windows/device-security/bitlocker/bitlocker-basic-deployment", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/bitlocker-countermeasures.md", -"redirect_url": "/windows/device-security/bitlocker/bitlocker-countermeasures", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/bitlocker-device-encryption-overview-windows-10.md", -"redirect_url": "/windows/device-security/bitlocker/bitlocker-device-encryption-overview-windows-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/bitlocker-frequently-asked-questions.md", -"redirect_url": "/windows/device-security/bitlocker/bitlocker-frequently-asked-questions", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/bitlocker-group-policy-settings.md", -"redirect_url": "/windows/device-security/bitlocker/bitlocker-group-policy-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/bitlocker-how-to-deploy-on-windows-server.md", -"redirect_url": "/windows/device-security/bitlocker/bitlocker-how-to-deploy-on-windows-server", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/bitlocker-how-to-enable-network-unlock.md", -"redirect_url": "/windows/device-security/bitlocker/bitlocker-how-to-enable-network-unlock", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/bitlocker-overview.md", -"redirect_url": "/windows/device-security/bitlocker/bitlocker-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/bitlocker-recovery-guide-plan.md", -"redirect_url": "/windows/device-security/bitlocker/bitlocker-recovery-guide-plan", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md", -"redirect_url": "/windows/device-security/bitlocker/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/bitlocker-use-bitlocker-recovery-password-viewer.md", -"redirect_url": "/windows/device-security/bitlocker/bitlocker-use-bitlocker-recovery-password-viewer", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/block-untrusted-fonts-in-enterprise.md", -"redirect_url": "/windows/threat-protection/block-untrusted-fonts-in-enterprise", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/boundary-zone-gpos.md", -"redirect_url": "/windows/access-protection/windows-firewall/boundary-zone-gpos", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/boundary-zone.md", -"redirect_url": "/windows/access-protection/windows-firewall/boundary-zone", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/bypass-traverse-checking.md", -"redirect_url": "/windows/device-security/security-policy-settings/bypass-traverse-checking", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/certificate-based-isolation-policy-design-example.md", -"redirect_url": "/windows/access-protection/windows-firewall/certificate-based-isolation-policy-design-example", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/certificate-based-isolation-policy-design.md", -"redirect_url": "/windows/access-protection/windows-firewall/certificate-based-isolation-policy-design", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/change-rules-from-request-to-require-mode.md", -"redirect_url": "/windows/access-protection/windows-firewall/change-rules-from-request-to-require-mode", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/change-the-system-time.md", -"redirect_url": "/windows/device-security/security-policy-settings/change-the-system-time", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/change-the-time-zone.md", -"redirect_url": "/windows/device-security/security-policy-settings/change-the-time-zone", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/change-the-tpm-owner-password.md", -"redirect_url": "/windows/device-security/tpm/change-the-tpm-owner-password", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/check-sensor-status-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/checklist-configuring-basic-firewall-settings.md", -"redirect_url": "/windows/access-protection/windows-firewall/checklist-configuring-basic-firewall-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/checklist-configuring-rules-for-an-isolated-server-zone.md", -"redirect_url": "/windows/access-protection/windows-firewall/checklist-configuring-rules-for-an-isolated-server-zone", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone.md", -"redirect_url": "/windows/access-protection/windows-firewall/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/checklist-configuring-rules-for-the-boundary-zone.md", -"redirect_url": "/windows/access-protection/windows-firewall/checklist-configuring-rules-for-the-boundary-zone", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/checklist-configuring-rules-for-the-encryption-zone.md", -"redirect_url": "/windows/access-protection/windows-firewall/checklist-configuring-rules-for-the-encryption-zone", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/checklist-configuring-rules-for-the-isolated-domain.md", -"redirect_url": "/windows/access-protection/windows-firewall/checklist-configuring-rules-for-the-isolated-domain", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/checklist-creating-group-policy-objects.md", -"redirect_url": "/windows/access-protection/windows-firewall/checklist-creating-group-policy-objects", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/checklist-creating-inbound-firewall-rules.md", -"redirect_url": "/windows/access-protection/windows-firewall/checklist-creating-inbound-firewall-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/checklist-creating-outbound-firewall-rules.md", -"redirect_url": "/windows/access-protection/windows-firewall/checklist-creating-outbound-firewall-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md", -"redirect_url": "/windows/access-protection/windows-firewall/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/checklist-implementing-a-basic-firewall-policy-design.md", -"redirect_url": "/windows/access-protection/windows-firewall/checklist-implementing-a-basic-firewall-policy-design", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/checklist-implementing-a-certificate-based-isolation-policy-design.md", -"redirect_url": "/windows/access-protection/windows-firewall/checklist-implementing-a-certificate-based-isolation-policy-design", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/checklist-implementing-a-domain-isolation-policy-design.md", -"redirect_url": "/windows/access-protection/windows-firewall/checklist-implementing-a-domain-isolation-policy-design", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/checklist-implementing-a-standalone-server-isolation-policy-design.md", -"redirect_url": "/windows/access-protection/windows-firewall/checklist-implementing-a-standalone-server-isolation-policy-design", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/choose-the-right-bitlocker-countermeasure.md", -"redirect_url": "/windows/device-security/bitlocker/choose-the-right-bitlocker-countermeasure", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/command-line-arguments-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configuration-management-reference-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-advanced-scan-types-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-an-applocker-policy-for-audit-only.md", -"redirect_url": "/windows/device-security/applocker/configure-an-applocker-policy-for-audit-only", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-an-applocker-policy-for-enforce-rules.md", -"redirect_url": "/windows/device-security/applocker/configure-an-applocker-policy-for-enforce-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-authentication-methods.md", -"redirect_url": "/windows/access-protection/windows-firewall/configure-authentication-methods", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-block-at-first-sight-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-cloud-block-timeout-period-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-cloud-block-timeout-period-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-data-protection-quick-mode-settings.md", -"redirect_url": "/windows/access-protection/windows-firewall/configure-data-protection-quick-mode-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-email-notifications-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-end-user-interaction-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-end-user-interaction-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-endpoints-gp-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-endpoints-script-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-exceptions-for-an-applocker-rule.md", -"redirect_url": "/windows/device-security/applocker/configure-exceptions-for-an-applocker-rule", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-exclusions-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-exclusions-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-extension-file-exclusions-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-group-policy-to-autoenroll-and-deploy-certificates.md", -"redirect_url": "/windows/access-protection/windows-firewall/configure-group-policy-to-autoenroll-and-deploy-certificates", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-key-exchange-main-mode-settings.md", -"redirect_url": "/windows/access-protection/windows-firewall/configure-key-exchange-main-mode-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-local-policy-overrides-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-local-policy-overrides-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-network-connections-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-notifications-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-process-opened-file-exclusions-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-protection-features-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-protection-features-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-proxy-internet-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-real-time-protection-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-remediation-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-remediation-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-s-mime.md", -"redirect_url": "/windows/access-protection/configure-s-mime", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-server-exclusions-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-siem-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-splunk-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-the-application-identity-service.md", -"redirect_url": "/windows/device-security/applocker/configure-the-application-identity-service", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-the-appLocker-reference-device.md", -"redirect_url": "/windows/device-security/applocker/configure-the-appLocker-reference-device", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-the-rules-to-require-encryption.md", -"redirect_url": "/windows/access-protection/windows-firewall/configure-the-rules-to-require-encryption", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-the-windows-firewall-log.md", -"redirect_url": "/windows/access-protection/windows-firewall/configure-the-windows-firewall-log", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-the-workstation-authentication-certificate-template.md", -"redirect_url": "/windows/access-protection/windows-firewall/configure-the-workstation-authentication-certificate-template", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-windows-defender-antivirus-features.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md", -"redirect_url": "/windows/access-protection/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/confirm-that-certificates-are-deployed-correctly.md", -"redirect_url": "/windows/access-protection/windows-firewall/confirm-that-certificates-are-deployed-correctly", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/copy-a-gpo-to-create-a-new-gpo.md", -"redirect_url": "/windows/access-protection/windows-firewall/copy-a-gpo-to-create-a-new-gpo", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-a-basic-audit-policy-settings-for-an-event-category.md", -"redirect_url": "/windows/device-security/auditing/create-a-basic-audit-policy-settings-for-an-event-category", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-a-group-account-in-active-directory.md", -"redirect_url": "/windows/access-protection/windows-firewall/create-a-group-account-in-active-directory", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-a-group-policy-object.md", -"redirect_url": "/windows/access-protection/windows-firewall/create-a-group-policy-object", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-a-pagefile.md", -"redirect_url": "/windows/device-security/security-policy-settings/create-a-pagefile", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-a-rule-for-packaged-apps.md", -"redirect_url": "/windows/device-security/applocker/create-a-rule-for-packaged-apps", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-a-rule-that-uses-a-file-hash-condition.md", -"redirect_url": "/windows/device-security/applocker/create-a-rule-that-uses-a-file-hash-condition", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-a-rule-that-uses-a-path-condition.md", -"redirect_url": "/windows/device-security/applocker/create-a-rule-that-uses-a-path-condition", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-a-rule-that-uses-a-publisher-condition.md", -"redirect_url": "/windows/device-security/applocker/create-a-rule-that-uses-a-publisher-condition", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-a-token-object.md", -"redirect_url": "/windows/device-security/security-policy-settings/create-a-token-object", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-an-authentication-exemption-list-rule.md", -"redirect_url": "/windows/access-protection/windows-firewall/create-an-authentication-exemption-list-rule", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-an-authentication-request-rule.md", -"redirect_url": "/windows/access-protection/windows-firewall/create-an-authentication-request-rule", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-an-inbound-icmp-rule.md", -"redirect_url": "/windows/access-protection/windows-firewall/create-an-inbound-icmp-rule", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-an-inbound-port-rule.md", -"redirect_url": "/windows/access-protection/windows-firewall/create-an-inbound-port-rule", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-an-inbound-program-or-service-rule.md", -"redirect_url": "/windows/access-protection/windows-firewall/create-an-inbound-program-or-service-rule", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-an-outbound-port-rule.md", -"redirect_url": "/windows/access-protection/windows-firewall/create-an-outbound-port-rule", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-an-outbound-program-or-service-rule.md", -"redirect_url": "/windows/access-protection/windows-firewall/create-an-outbound-program-or-service-rule", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-and-verify-an-efs-dra-certificate.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-applocker-default-rules.md", -"redirect_url": "/windows/device-security/applocker/create-applocker-default-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-global-objects.md", -"redirect_url": "/windows/device-security/security-policy-settings/create-global-objects", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-inbound-rules-to-support-rpc.md", -"redirect_url": "/windows/access-protection/windows-firewall/create-inbound-rules-to-support-rpc", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-list-of-applications-deployed-to-each-business-group.md", -"redirect_url": "/windows/device-security/applocker/create-list-of-applications-deployed-to-each-business-group", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-permanent-shared-objects.md", -"redirect_url": "/windows/device-security/security-policy-settings/create-permanent-shared-objects", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-symbolic-links.md", -"redirect_url": "/windows/device-security/security-policy-settings/create-symbolic-links", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-vpn-and-wip-policy-using-intune.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-wip-policy-using-intune.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/create-wip-policy-using-intune", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-wip-policy-using-sccm.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/create-wip-policy-using-sccm", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-wmi-filters-for-the-gpo.md", -"redirect_url": "/windows/access-protection/windows-firewall/create-wmi-filters-for-the-gpo", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-your-applocker-planning-document.md", -"redirect_url": "/windows/device-security/applocker/create-your-applocker-planning-document", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-your-applocker-policies.md", -"redirect_url": "/windows/device-security/applocker/create-your-applocker-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-your-applocker-rules.md", -"redirect_url": "/windows/device-security/applocker/create-your-applocker-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/credential-guard-considerations.md", -"redirect_url": "/windows/access-protection/credential-guard/credential-guard-considerations", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/credential-guard-how-it-works.md", -"redirect_url": "/windows/access-protection/credential-guard/credential-guard-how-it-works", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/credential-guard-manage.md", -"redirect_url": "/windows/access-protection/credential-guard/credential-guard-manage", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/credential-guard-not-protected-scenarios.md", -"redirect_url": "/windows/access-protection/credential-guard/credential-guard-not-protected-scenarios", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/credential-guard-protection-limits.md", -"redirect_url": "/windows/access-protection/credential-guard/credential-guard-protection-limits", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/credential-guard-requirements.md", -"redirect_url": "/windows/access-protection/credential-guard/credential-guard-requirements", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/credential-guard-scripts.md", -"redirect_url": "/windows/access-protection/credential-guard/credential-guard-scripts", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/credential-guard.md", -"redirect_url": "/windows/access-protection/credential-guard/credential-guard", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/custom-ti-api-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/customize-run-review-remediate-scans-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/dashboard-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/dashboard-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/data-storage-privacy-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax.md", -"redirect_url": "/windows/device-security/security-policy-settings/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax.md", -"redirect_url": "/windows/device-security/security-policy-settings/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/debug-programs.md", -"redirect_url": "/windows/device-security/security-policy-settings/debug-programs", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/defender-compatibility-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/delete-an-applocker-rule.md", -"redirect_url": "/windows/device-security/applocker/delete-an-applocker-rule", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/deny-access-to-this-computer-from-the-network.md", -"redirect_url": "/windows/device-security/security-policy-settings/deny-access-to-this-computer-from-the-network", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/deny-log-on-as-a-batch-job.md", -"redirect_url": "/windows/device-security/security-policy-settings/deny-log-on-as-a-batch-job", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/deny-log-on-as-a-service.md", -"redirect_url": "/windows/device-security/security-policy-settings/deny-log-on-as-a-service", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/deny-log-on-locally.md", -"redirect_url": "/windows/device-security/security-policy-settings/deny-log-on-locally", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/deny-log-on-through-remote-desktop-services.md", -"redirect_url": "/windows/device-security/security-policy-settings/deny-log-on-through-remote-desktop-services", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/deploy-applocker-policies-by-using-the-enforce-rules-setting.md", -"redirect_url": "/windows/device-security/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/deploy-catalog-files-to-support-code-integrity-policies.md", -"redirect_url": "/windows/device-security/device-guard/deploy-catalog-files-to-support-code-integrity-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/deploy-code-integrity-policies-policy-rules-and-file-rules.md", -"redirect_url": "/windows/device-security/device-guard/deploy-code-integrity-policies-policy-rules-and-file-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/deploy-code-integrity-policies-steps.md", -"redirect_url": "/windows/device-security/device-guard/deploy-code-integrity-policies-steps", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/deploy-device-guard-deploy-code-integrity-policies.md", -"redirect_url": "/windows/device-security/device-guard/deploy-device-guard-deploy-code-integrity-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/deploy-device-guard-enable-virtualization-based-security.md", -"redirect_url": "/windows/device-security/device-guard/deploy-device-guard-enable-virtualization-based-security", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/device-guard/deploy-device-guard-enable-virtualization-based-security.md", -"redirect_url": "/windows/security/threat-protection/device-guard/deploy-device-guard-enable-virtualization-based-security", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/deploy-manage-report-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/deploy-the-applocker-policy-into-production.md", -"redirect_url": "/windows/device-security/applocker/deploy-the-applocker-policy-into-production", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/deploy-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/deploy-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/deploy-wip-policy-using-intune.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/deploy-wip-policy-using-intune", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/deployment-vdi-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/designing-a-windows-firewall-with-advanced-security-strategy.md", -"redirect_url": "/windows/access-protection/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/determine-group-policy-structure-and-rule-enforcement.md", -"redirect_url": "/windows/device-security/applocker/determine-group-policy-structure-and-rule-enforcement", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/determine-which-applications-are-digitally-signed-on-a-reference-computer.md", -"redirect_url": "/windows/device-security/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/determine-your-application-control-objectives.md", -"redirect_url": "/windows/device-security/applocker/determine-your-application-control-objectives", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/determining-the-trusted-state-of-your-devices.md", -"redirect_url": "/windows/access-protection/windows-firewall/determining-the-trusted-state-of-your-devices", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/device-guard-deployment-guide.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-deployment-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/devices-allow-undock-without-having-to-log-on.md", -"redirect_url": "/windows/device-security/security-policy-settings/devices-allow-undock-without-having-to-log-on", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/devices-allowed-to-format-and-eject-removable-media.md", -"redirect_url": "/windows/device-security/security-policy-settings/devices-allowed-to-format-and-eject-removable-media", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/devices-prevent-users-from-installing-printer-drivers.md", -"redirect_url": "/windows/device-security/security-policy-settings/devices-prevent-users-from-installing-printer-drivers", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/devices-restrict-cd-rom-access-to-locally-logged-on-user-only.md", -"redirect_url": "/windows/device-security/security-policy-settings/devices-restrict-cd-rom-access-to-locally-logged-on-user-only", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/devices-restrict-floppy-access-to-locally-logged-on-user-only.md", -"redirect_url": "/windows/device-security/security-policy-settings/devices-restrict-floppy-access-to-locally-logged-on-user-only", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/display-a-custom-url-message-when-users-try-to-run-a-blocked-application.md", -"redirect_url": "/windows/device-security/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/dll-rules-in-applocker.md", -"redirect_url": "/windows/device-security/applocker/dll-rules-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/document-group-policy-structure-and-applocker-rule-enforcement.md", -"redirect_url": "/windows/device-security/applocker/document-group-policy-structure-and-applocker-rule-enforcement", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/document-your-application-control-management-processes.md", -"redirect_url": "/windows/device-security/applocker/document-your-application-control-management-processes", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/document-your-application-list.md", -"redirect_url": "/windows/device-security/applocker/document-your-application-list", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/document-your-applocker-rules.md", -"redirect_url": "/windows/device-security/applocker/document-your-applocker-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/documenting-the-zones.md", -"redirect_url": "/windows/access-protection/windows-firewall/documenting-the-zones", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/domain-controller-allow-server-operators-to-schedule-tasks.md", -"redirect_url": "/windows/device-security/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/domain-controller-ldap-server-signing-requirements.md", -"redirect_url": "/windows/device-security/security-policy-settings/domain-controller-ldap-server-signing-requirements", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/domain-controller-refuse-machine-account-password-changes.md", -"redirect_url": "/windows/device-security/security-policy-settings/domain-controller-refuse-machine-account-password-changes", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/domain-isolation-policy-design-example.md", -"redirect_url": "/windows/access-protection/windows-firewall/domain-isolation-policy-design-example", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/domain-isolation-policy-design.md", -"redirect_url": "/windows/access-protection/windows-firewall/domain-isolation-policy-design", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md", -"redirect_url": "/windows/device-security/security-policy-settings/domain-member-digitally-encrypt-or-sign-secure-channel-data-always", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/domain-member-digitally-encrypt-secure-channel-data-when-possible.md", -"redirect_url": "/windows/device-security/security-policy-settings/domain-member-digitally-encrypt-secure-channel-data-when-possible", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/domain-member-digitally-sign-secure-channel-data-when-possible.md", -"redirect_url": "/windows/device-security/security-policy-settings/domain-member-digitally-sign-secure-channel-data-when-possible", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/domain-member-disable-machine-account-password-changes.md", -"redirect_url": "/windows/device-security/security-policy-settings/domain-member-disable-machine-account-password-changes", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/domain-member-maximum-machine-account-password-age.md", -"redirect_url": "/windows/device-security/security-policy-settings/domain-member-maximum-machine-account-password-age", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/domain-member-require-strong-windows-2000-or-later-session-key.md", -"redirect_url": "/windows/device-security/security-policy-settings/domain-member-require-strong-windows-2000-or-later-session-key", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/dynamic-access-control.md", -"redirect_url": "/windows/access-protection/access-control/dynamic-access-control", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/edit-an-applocker-policy.md", -"redirect_url": "/windows/device-security/applocker/edit-an-applocker-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/edit-applocker-rules.md", -"redirect_url": "/windows/device-security/applocker/edit-applocker-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/enable-cloud-protection-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/enable-computer-and-user-accounts-to-be-trusted-for-delegation.md", -"redirect_url": "/windows/device-security/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/enable-custom-ti-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/enable-predefined-inbound-rules.md", -"redirect_url": "/windows/access-protection/windows-firewall/enable-predefined-inbound-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/enable-predefined-outbound-rules.md", -"redirect_url": "/windows/access-protection/windows-firewall/enable-predefined-outbound-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/enable-the-dll-rule-collection.md", -"redirect_url": "/windows/device-security/applocker/enable-the-dll-rule-collection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/encrypted-hard-drive.md", -"redirect_url": "/windows/device-security/encrypted-hard-drive", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/encryption-zone-gpos.md", -"redirect_url": "/windows/access-protection/windows-firewall/encryption-zone-gpos", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/encryption-zone.md", -"redirect_url": "/windows/access-protection/windows-firewall/encryption-zone", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/enforce-applocker-rules.md", -"redirect_url": "/windows/device-security/applocker/enforce-applocker-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/enforce-password-history.md", -"redirect_url": "/windows/device-security/security-policy-settings/enforce-password-history", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/enforce-user-logon-restrictions.md", -"redirect_url": "/windows/device-security/security-policy-settings/enforce-user-logon-restrictions", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/enlightened-microsoft-apps-and-wip.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/enlightened-microsoft-apps-and-wip", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/enterprise-certificate-pinning.md", -"redirect_url": "/windows/access-protection/enterprise-certificate-pinning", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/evaluate-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/evaluate-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/evaluating-windows-firewall-with-advanced-security-design-examples.md", -"redirect_url": "/windows/access-protection/windows-firewall/evaluating-windows-firewall-with-advanced-security-design-examples", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-1100.md", -"redirect_url": "/windows/device-security/auditing/event-1100", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-1102.md", -"redirect_url": "/windows/device-security/auditing/event-1102", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-1104.md", -"redirect_url": "/windows/device-security/auditing/event-1104", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-1105.md", -"redirect_url": "/windows/device-security/auditing/event-1105", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-1108.md", -"redirect_url": "/windows/device-security/auditing/event-1108", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4608.md", -"redirect_url": "/windows/device-security/auditing/event-4608", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4610.md", -"redirect_url": "/windows/device-security/auditing/event-4610", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4611.md", -"redirect_url": "/windows/device-security/auditing/event-4611", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4612.md", -"redirect_url": "/windows/device-security/auditing/event-4612", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4614.md", -"redirect_url": "/windows/device-security/auditing/event-4614", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4615.md", -"redirect_url": "/windows/device-security/auditing/event-4615", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4616.md", -"redirect_url": "/windows/device-security/auditing/event-4616", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4618.md", -"redirect_url": "/windows/device-security/auditing/event-4618", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4621.md", -"redirect_url": "/windows/device-security/auditing/event-4621", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4622.md", -"redirect_url": "/windows/device-security/auditing/event-4622", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4624.md", -"redirect_url": "/windows/device-security/auditing/event-4624", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4625.md", -"redirect_url": "/windows/device-security/auditing/event-4625", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4626.md", -"redirect_url": "/windows/device-security/auditing/event-4626", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4627.md", -"redirect_url": "/windows/device-security/auditing/event-4627", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4634.md", -"redirect_url": "/windows/device-security/auditing/event-4634", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4647.md", -"redirect_url": "/windows/device-security/auditing/event-4647", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4648.md", -"redirect_url": "/windows/device-security/auditing/event-4648", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4649.md", -"redirect_url": "/windows/device-security/auditing/event-4649", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4656.md", -"redirect_url": "/windows/device-security/auditing/event-4656", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4657.md", -"redirect_url": "/windows/device-security/auditing/event-4657", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4658.md", -"redirect_url": "/windows/device-security/auditing/event-4658", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4660.md", -"redirect_url": "/windows/device-security/auditing/event-4660", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4661.md", -"redirect_url": "/windows/device-security/auditing/event-4661", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4662.md", -"redirect_url": "/windows/device-security/auditing/event-4662", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4663.md", -"redirect_url": "/windows/device-security/auditing/event-4663", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4664.md", -"redirect_url": "/windows/device-security/auditing/event-4664", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4670.md", -"redirect_url": "/windows/device-security/auditing/event-4670", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4671.md", -"redirect_url": "/windows/device-security/auditing/event-4671", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4672.md", -"redirect_url": "/windows/device-security/auditing/event-4672", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4673.md", -"redirect_url": "/windows/device-security/auditing/event-4673", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4674.md", -"redirect_url": "/windows/device-security/auditing/event-4674", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4675.md", -"redirect_url": "/windows/device-security/auditing/event-4675", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4688.md", -"redirect_url": "/windows/device-security/auditing/event-4688", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4689.md", -"redirect_url": "/windows/device-security/auditing/event-4689", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4690.md", -"redirect_url": "/windows/device-security/auditing/event-4690", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4691.md", -"redirect_url": "/windows/device-security/auditing/event-4691", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4692.md", -"redirect_url": "/windows/device-security/auditing/event-4692", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4693.md", -"redirect_url": "/windows/device-security/auditing/event-4693", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4694.md", -"redirect_url": "/windows/device-security/auditing/event-4694", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4695.md", -"redirect_url": "/windows/device-security/auditing/event-4695", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4696.md", -"redirect_url": "/windows/device-security/auditing/event-4696", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4697.md", -"redirect_url": "/windows/device-security/auditing/event-4697", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4698.md", -"redirect_url": "/windows/device-security/auditing/event-4698", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4699.md", -"redirect_url": "/windows/device-security/auditing/event-4699", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4700.md", -"redirect_url": "/windows/device-security/auditing/event-4700", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4701.md", -"redirect_url": "/windows/device-security/auditing/event-4701", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4702.md", -"redirect_url": "/windows/device-security/auditing/event-4702", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4703.md", -"redirect_url": "/windows/device-security/auditing/event-4703", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4704.md", -"redirect_url": "/windows/device-security/auditing/event-4704", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4705.md", -"redirect_url": "/windows/device-security/auditing/event-4705", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4706.md", -"redirect_url": "/windows/device-security/auditing/event-4706", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4707.md", -"redirect_url": "/windows/device-security/auditing/event-4707", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4713.md", -"redirect_url": "/windows/device-security/auditing/event-4713", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4714.md", -"redirect_url": "/windows/device-security/auditing/event-4714", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4715.md", -"redirect_url": "/windows/device-security/auditing/event-4715", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4716.md", -"redirect_url": "/windows/device-security/auditing/event-4716", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4717.md", -"redirect_url": "/windows/device-security/auditing/event-4717", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4718.md", -"redirect_url": "/windows/device-security/auditing/event-4718", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4719.md", -"redirect_url": "/windows/device-security/auditing/event-4719", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4720.md", -"redirect_url": "/windows/device-security/auditing/event-4720", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4722.md", -"redirect_url": "/windows/device-security/auditing/event-4722", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4723.md", -"redirect_url": "/windows/device-security/auditing/event-4723", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4724.md", -"redirect_url": "/windows/device-security/auditing/event-4724", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4725.md", -"redirect_url": "/windows/device-security/auditing/event-4725", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4726.md", -"redirect_url": "/windows/device-security/auditing/event-4726", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4731.md", -"redirect_url": "/windows/device-security/auditing/event-4731", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4732.md", -"redirect_url": "/windows/device-security/auditing/event-4732", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4733.md", -"redirect_url": "/windows/device-security/auditing/event-4733", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4734.md", -"redirect_url": "/windows/device-security/auditing/event-4734", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4735.md", -"redirect_url": "/windows/device-security/auditing/event-4735", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4738.md", -"redirect_url": "/windows/device-security/auditing/event-4738", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4739.md", -"redirect_url": "/windows/device-security/auditing/event-4739", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4740.md", -"redirect_url": "/windows/device-security/auditing/event-4740", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4741.md", -"redirect_url": "/windows/device-security/auditing/event-4741", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4742.md", -"redirect_url": "/windows/device-security/auditing/event-4742", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4743.md", -"redirect_url": "/windows/device-security/auditing/event-4743", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4749.md", -"redirect_url": "/windows/device-security/auditing/event-4749", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4750.md", -"redirect_url": "/windows/device-security/auditing/event-4750", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4751.md", -"redirect_url": "/windows/device-security/auditing/event-4751", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4752.md", -"redirect_url": "/windows/device-security/auditing/event-4752", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4753.md", -"redirect_url": "/windows/device-security/auditing/event-4753", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4764.md", -"redirect_url": "/windows/device-security/auditing/event-4764", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4765.md", -"redirect_url": "/windows/device-security/auditing/event-4765", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4766.md", -"redirect_url": "/windows/device-security/auditing/event-4766", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4767.md", -"redirect_url": "/windows/device-security/auditing/event-4767", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4768.md", -"redirect_url": "/windows/device-security/auditing/event-4768", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4769.md", -"redirect_url": "/windows/device-security/auditing/event-4769", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4770.md", -"redirect_url": "/windows/device-security/auditing/event-4770", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4771.md", -"redirect_url": "/windows/device-security/auditing/event-4771", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4772.md", -"redirect_url": "/windows/device-security/auditing/event-4772", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4773.md", -"redirect_url": "/windows/device-security/auditing/event-4773", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4774.md", -"redirect_url": "/windows/device-security/auditing/event-4774", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4775.md", -"redirect_url": "/windows/device-security/auditing/event-4775", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4776.md", -"redirect_url": "/windows/device-security/auditing/event-4776", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4777.md", -"redirect_url": "/windows/device-security/auditing/event-4777", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4778.md", -"redirect_url": "/windows/device-security/auditing/event-4778", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4779.md", -"redirect_url": "/windows/device-security/auditing/event-4779", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4780.md", -"redirect_url": "/windows/device-security/auditing/event-4780", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4781.md", -"redirect_url": "/windows/device-security/auditing/event-4781", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4782.md", -"redirect_url": "/windows/device-security/auditing/event-4782", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4793.md", -"redirect_url": "/windows/device-security/auditing/event-4793", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4794.md", -"redirect_url": "/windows/device-security/auditing/event-4794", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4798.md", -"redirect_url": "/windows/device-security/auditing/event-4798", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4799.md", -"redirect_url": "/windows/device-security/auditing/event-4799", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4800.md", -"redirect_url": "/windows/device-security/auditing/event-4800", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4801.md", -"redirect_url": "/windows/device-security/auditing/event-4801", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4802.md", -"redirect_url": "/windows/device-security/auditing/event-4802", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4803.md", -"redirect_url": "/windows/device-security/auditing/event-4803", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4816.md", -"redirect_url": "/windows/device-security/auditing/event-4816", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4817.md", -"redirect_url": "/windows/device-security/auditing/event-4817", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4818.md", -"redirect_url": "/windows/device-security/auditing/event-4818", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4819.md", -"redirect_url": "/windows/device-security/auditing/event-4819", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4826.md", -"redirect_url": "/windows/device-security/auditing/event-4826", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4864.md", -"redirect_url": "/windows/device-security/auditing/event-4864", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4865.md", -"redirect_url": "/windows/device-security/auditing/event-4865", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4866.md", -"redirect_url": "/windows/device-security/auditing/event-4866", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4867.md", -"redirect_url": "/windows/device-security/auditing/event-4867", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4902.md", -"redirect_url": "/windows/device-security/auditing/event-4902", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4904.md", -"redirect_url": "/windows/device-security/auditing/event-4904", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4905.md", -"redirect_url": "/windows/device-security/auditing/event-4905", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4906.md", -"redirect_url": "/windows/device-security/auditing/event-4906", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4907.md", -"redirect_url": "/windows/device-security/auditing/event-4907", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4908.md", -"redirect_url": "/windows/device-security/auditing/event-4908", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4909.md", -"redirect_url": "/windows/device-security/auditing/event-4909", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4910.md", -"redirect_url": "/windows/device-security/auditing/event-4910", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4911.md", -"redirect_url": "/windows/device-security/auditing/event-4911", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4912.md", -"redirect_url": "/windows/device-security/auditing/event-4912", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4913.md", -"redirect_url": "/windows/device-security/auditing/event-4913", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4928.md", -"redirect_url": "/windows/device-security/auditing/event-4928", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4929.md", -"redirect_url": "/windows/device-security/auditing/event-4929", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4930.md", -"redirect_url": "/windows/device-security/auditing/event-4930", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4931.md", -"redirect_url": "/windows/device-security/auditing/event-4931", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4932.md", -"redirect_url": "/windows/device-security/auditing/event-4932", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4933.md", -"redirect_url": "/windows/device-security/auditing/event-4933", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4934.md", -"redirect_url": "/windows/device-security/auditing/event-4934", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4935.md", -"redirect_url": "/windows/device-security/auditing/event-4935", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4936.md", -"redirect_url": "/windows/device-security/auditing/event-4936", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4937.md", -"redirect_url": "/windows/device-security/auditing/event-4937", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4944.md", -"redirect_url": "/windows/device-security/auditing/event-4944", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4945.md", -"redirect_url": "/windows/device-security/auditing/event-4945", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4946.md", -"redirect_url": "/windows/device-security/auditing/event-4946", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4947.md", -"redirect_url": "/windows/device-security/auditing/event-4947", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4948.md", -"redirect_url": "/windows/device-security/auditing/event-4948", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4949.md", -"redirect_url": "/windows/device-security/auditing/event-4949", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4950.md", -"redirect_url": "/windows/device-security/auditing/event-4950", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4951.md", -"redirect_url": "/windows/device-security/auditing/event-4951", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4952.md", -"redirect_url": "/windows/device-security/auditing/event-4952", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4953.md", -"redirect_url": "/windows/device-security/auditing/event-4953", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4954.md", -"redirect_url": "/windows/device-security/auditing/event-4954", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4956.md", -"redirect_url": "/windows/device-security/auditing/event-4956", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4957.md", -"redirect_url": "/windows/device-security/auditing/event-4957", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4958.md", -"redirect_url": "/windows/device-security/auditing/event-4958", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4964.md", -"redirect_url": "/windows/device-security/auditing/event-4964", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4985.md", -"redirect_url": "/windows/device-security/auditing/event-4985", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5024.md", -"redirect_url": "/windows/device-security/auditing/event-5024", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5025.md", -"redirect_url": "/windows/device-security/auditing/event-5025", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5027.md", -"redirect_url": "/windows/device-security/auditing/event-5027", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5028.md", -"redirect_url": "/windows/device-security/auditing/event-5028", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5029.md", -"redirect_url": "/windows/device-security/auditing/event-5029", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5030.md", -"redirect_url": "/windows/device-security/auditing/event-5030", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5031.md", -"redirect_url": "/windows/device-security/auditing/event-5031", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5032.md", -"redirect_url": "/windows/device-security/auditing/event-5032", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5033.md", -"redirect_url": "/windows/device-security/auditing/event-5033", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5034.md", -"redirect_url": "/windows/device-security/auditing/event-5034", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5035.md", -"redirect_url": "/windows/device-security/auditing/event-5035", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5037.md", -"redirect_url": "/windows/device-security/auditing/event-5037", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5038.md", -"redirect_url": "/windows/device-security/auditing/event-5038", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5039.md", -"redirect_url": "/windows/device-security/auditing/event-5039", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5051.md", -"redirect_url": "/windows/device-security/auditing/event-5051", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5056.md", -"redirect_url": "/windows/device-security/auditing/event-5056", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5057.md", -"redirect_url": "/windows/device-security/auditing/event-5057", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5058.md", -"redirect_url": "/windows/device-security/auditing/event-5058", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5059.md", -"redirect_url": "/windows/device-security/auditing/event-5059", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5060.md", -"redirect_url": "/windows/device-security/auditing/event-5060", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5061.md", -"redirect_url": "/windows/device-security/auditing/event-5061", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5062.md", -"redirect_url": "/windows/device-security/auditing/event-5062", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5063.md", -"redirect_url": "/windows/device-security/auditing/event-5063", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5064.md", -"redirect_url": "/windows/device-security/auditing/event-5064", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5065.md", -"redirect_url": "/windows/device-security/auditing/event-5065", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5066.md", -"redirect_url": "/windows/device-security/auditing/event-5066", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5067.md", -"redirect_url": "/windows/device-security/auditing/event-5067", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5068.md", -"redirect_url": "/windows/device-security/auditing/event-5068", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5069.md", -"redirect_url": "/windows/device-security/auditing/event-5069", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5070.md", -"redirect_url": "/windows/device-security/auditing/event-5070", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5136.md", -"redirect_url": "/windows/device-security/auditing/event-5136", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5137.md", -"redirect_url": "/windows/device-security/auditing/event-5137", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5138.md", -"redirect_url": "/windows/device-security/auditing/event-5138", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5139.md", -"redirect_url": "/windows/device-security/auditing/event-5139", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5140.md", -"redirect_url": "/windows/device-security/auditing/event-5140", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5141.md", -"redirect_url": "/windows/device-security/auditing/event-5141", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5142.md", -"redirect_url": "/windows/device-security/auditing/event-5142", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5143.md", -"redirect_url": "/windows/device-security/auditing/event-5143", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5144.md", -"redirect_url": "/windows/device-security/auditing/event-5144", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5145.md", -"redirect_url": "/windows/device-security/auditing/event-5145", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5148.md", -"redirect_url": "/windows/device-security/auditing/event-5148", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5149.md", -"redirect_url": "/windows/device-security/auditing/event-5149", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5150.md", -"redirect_url": "/windows/device-security/auditing/event-5150", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5151.md", -"redirect_url": "/windows/device-security/auditing/event-5151", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5152.md", -"redirect_url": "/windows/device-security/auditing/event-5152", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5153.md", -"redirect_url": "/windows/device-security/auditing/event-5153", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5154.md", -"redirect_url": "/windows/device-security/auditing/event-5154", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5155.md", -"redirect_url": "/windows/device-security/auditing/event-5155", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5156.md", -"redirect_url": "/windows/device-security/auditing/event-5156", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5157.md", -"redirect_url": "/windows/device-security/auditing/event-5157", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5158.md", -"redirect_url": "/windows/device-security/auditing/event-5158", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5159.md", -"redirect_url": "/windows/device-security/auditing/event-5159", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5168.md", -"redirect_url": "/windows/device-security/auditing/event-5168", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5376.md", -"redirect_url": "/windows/device-security/auditing/event-5376", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5377.md", -"redirect_url": "/windows/device-security/auditing/event-5377", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5378.md", -"redirect_url": "/windows/device-security/auditing/event-5378", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5447.md", -"redirect_url": "/windows/device-security/auditing/event-5447", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5632.md", -"redirect_url": "/windows/device-security/auditing/event-5632", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5633.md", -"redirect_url": "/windows/device-security/auditing/event-5633", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5712.md", -"redirect_url": "/windows/device-security/auditing/event-5712", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5888.md", -"redirect_url": "/windows/device-security/auditing/event-5888", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5889.md", -"redirect_url": "/windows/device-security/auditing/event-5889", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5890.md", -"redirect_url": "/windows/device-security/auditing/event-5890", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-6144.md", -"redirect_url": "/windows/device-security/auditing/event-6144", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-6145.md", -"redirect_url": "/windows/device-security/auditing/event-6145", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-6281.md", -"redirect_url": "/windows/device-security/auditing/event-6281", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-6400.md", -"redirect_url": "/windows/device-security/auditing/event-6400", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-6401.md", -"redirect_url": "/windows/device-security/auditing/event-6401", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-6402.md", -"redirect_url": "/windows/device-security/auditing/event-6402", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-6403.md", -"redirect_url": "/windows/device-security/auditing/event-6403", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-6404.md", -"redirect_url": "/windows/device-security/auditing/event-6404", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-6405.md", -"redirect_url": "/windows/device-security/auditing/event-6405", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-6406.md", -"redirect_url": "/windows/device-security/auditing/event-6406", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-6407.md", -"redirect_url": "/windows/device-security/auditing/event-6407", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-6408.md", -"redirect_url": "/windows/device-security/auditing/event-6408", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-6409.md", -"redirect_url": "/windows/device-security/auditing/event-6409", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-6410.md", -"redirect_url": "/windows/device-security/auditing/event-6410", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-6416.md", -"redirect_url": "/windows/device-security/auditing/event-6416", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-6419.md", -"redirect_url": "/windows/device-security/auditing/event-6419", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-6420.md", -"redirect_url": "/windows/device-security/auditing/event-6420", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-6421.md", -"redirect_url": "/windows/device-security/auditing/event-6421", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-6422.md", -"redirect_url": "/windows/device-security/auditing/event-6422", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-6423.md", -"redirect_url": "/windows/device-security/auditing/event-6423", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-6424.md", -"redirect_url": "/windows/device-security/auditing/event-6424", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-error-codes-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/executable-rules-in-applocker.md", -"redirect_url": "/windows/device-security/applocker/executable-rules-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/exempt-icmp-from-authentication.md", -"redirect_url": "/windows/access-protection/windows-firewall/exempt-icmp-from-authentication", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/exemption-list.md", -"redirect_url": "/windows/access-protection/windows-firewall/exemption-list", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/experiment-custom-ti-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/export-an-applocker-policy-from-a-gpo.md", -"redirect_url": "/windows/device-security/applocker/export-an-applocker-policy-from-a-gpo", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/export-an-applocker-policy-to-an-xml-file.md", -"redirect_url": "/windows/device-security/applocker/export-an-applocker-policy-to-an-xml-file", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/file-system-global-object-access-auditing.md", -"redirect_url": "/windows/device-security/auditing/file-system-global-object-access-auditing", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/firewall-gpos.md", -"redirect_url": "/windows/access-protection/windows-firewall/firewall-gpos", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/firewall-policy-design-example.md", -"redirect_url": "/windows/access-protection/windows-firewall/firewall-policy-design-example", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/force-shutdown-from-a-remote-system.md", -"redirect_url": "/windows/device-security/security-policy-settings/force-shutdown-from-a-remote-system", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/gathering-information-about-your-active-directory-deployment.md", -"redirect_url": "/windows/access-protection/windows-firewall/gathering-information-about-your-active-directory-deployment", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/gathering-information-about-your-current-network-infrastructure.md", -"redirect_url": "/windows/access-protection/windows-firewall/gathering-information-about-your-current-network-infrastructure", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/gathering-information-about-your-devices.md", -"redirect_url": "/windows/access-protection/windows-firewall/gathering-information-about-your-devices", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/gathering-other-relevant-information.md", -"redirect_url": "/windows/access-protection/windows-firewall/gathering-other-relevant-information", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/gathering-the-information-you-need.md", -"redirect_url": "/windows/access-protection/windows-firewall/gathering-the-information-you-need", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/general-settings-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/general-settings-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/generate-security-audits.md", -"redirect_url": "/windows/device-security/security-policy-settings/generate-security-audits", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/gpo-domiso-boundary.md", -"redirect_url": "/windows/access-protection/windows-firewall/gpo-domiso-boundary", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/gpo-domiso-encryption.md", -"redirect_url": "/windows/access-protection/windows-firewall/gpo-domiso-encryption", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/gpo-domiso-firewall.md", -"redirect_url": "/windows/access-protection/windows-firewall/gpo-domiso-firewall", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/gpo-domiso-isolateddomain-clients.md", -"redirect_url": "/windows/access-protection/windows-firewall/gpo-domiso-isolateddomain-clients", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/gpo-domiso-isolateddomain-servers.md", -"redirect_url": "/windows/access-protection/windows-firewall/gpo-domiso-isolateddomain-servers", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/guidance-and-best-practices-wip.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/guidance-and-best-practices-wip", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/hello-and-password-changes.md", -"redirect_url": "/windows/access-protection/hello-for-business/hello-and-password-changes", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/hello-biometrics-in-enterprise.md", -"redirect_url": "/windows/access-protection/hello-for-business/hello-biometrics-in-enterprise", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/hello-errors-during-pin-creation.md", -"redirect_url": "/windows/access-protection/hello-for-business/hello-errors-during-pin-creation", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/hello-event-300.md", -"redirect_url": "/windows/access-protection/hello-for-business/hello-event-300", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/hello-how-it-works.md", -"redirect_url": "/windows/access-protection/hello-for-business/hello-how-it-works", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/hello-identity-verification.md", -"redirect_url": "/windows/access-protection/hello-for-business/hello-identity-verification", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/hello-manage-in-organization.md", -"redirect_url": "/windows/access-protection/hello-for-business/hello-manage-in-organization", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/hello-prepare-people-to-use.md", -"redirect_url": "/windows/access-protection/hello-for-business/hello-prepare-people-to-use", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/hello-why-pin-is-better-than-password.md", -"redirect_url": "/windows/access-protection/hello-for-business/hello-why-pin-is-better-than-password", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/how-applocker-works-techref.md", -"redirect_url": "/windows/device-security/applocker/how-applocker-works-techref", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/how-to-configure-security-policy-settings.md", -"redirect_url": "/windows/device-security/security-policy-settings/how-to-configure-security-policy-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections.md", -"redirect_url": "/windows/access-protection/vpn/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/how-user-account-control-works.md", -"redirect_url": "/windows/access-protection/user-account-control/how-user-account-control-works", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/identifying-your-windows-firewall-with-advanced-security-deployment-goals.md", -"redirect_url": "/windows/access-protection/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/impersonate-a-client-after-authentication.md", -"redirect_url": "/windows/device-security/security-policy-settings/impersonate-a-client-after-authentication", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/implementing-your-windows-firewall-with-advanced-security-design-plan.md", -"redirect_url": "/windows/access-protection/windows-firewall/implementing-your-windows-firewall-with-advanced-security-design-plan", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/import-an-applocker-policy-from-another-computer.md", -"redirect_url": "/windows/device-security/applocker/import-an-applocker-policy-from-another-computer", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/import-an-applocker-policy-into-a-gpo.md", -"redirect_url": "/windows/device-security/applocker/import-an-applocker-policy-into-a-gpo", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/increase-a-process-working-set.md", -"redirect_url": "/windows/device-security/security-policy-settings/increase-a-process-working-set", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/increase-scheduling-priority.md", -"redirect_url": "/windows/device-security/security-policy-settings/increase-scheduling-priority", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/initialize-and-configure-ownership-of-the-tpm.md", -"redirect_url": "/windows/device-security/tpm/initialize-and-configure-ownership-of-the-tpm", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/installing-digital-certificates-on-windows-10-mobile.md", -"redirect_url": "/windows/access-protection/installing-digital-certificates-on-windows-10-mobile", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/interactive-logon-display-user-information-when-the-session-is-locked.md", -"redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-display-user-information-when-the-session-is-locked", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/interactive-logon-do-not-display-last-user-name.md", -"redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-do-not-display-last-user-name", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/interactive-logon-do-not-require-ctrl-alt-del.md", -"redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-do-not-require-ctrl-alt-del", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/interactive-logon-dont-display-username-at-sign-in.md", -"redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-dont-display-username-at-sign-in", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/interactive-logon-machine-account-lockout-threshold.md", -"redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-machine-account-lockout-threshold", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/interactive-logon-machine-inactivity-limit.md", -"redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-machine-inactivity-limit", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/interactive-logon-message-text-for-users-attempting-to-log-on.md", -"redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-message-text-for-users-attempting-to-log-on", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/interactive-logon-message-title-for-users-attempting-to-log-on.md", -"redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-message-title-for-users-attempting-to-log-on", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md", -"redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/interactive-logon-prompt-user-to-change-password-before-expiration.md", -"redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-prompt-user-to-change-password-before-expiration", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/interactive-logon-require-domain-controller-authentication-to-unlock-workstation.md", -"redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-require-domain-controller-authentication-to-unlock-workstation", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/interactive-logon-require-smart-card.md", -"redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-require-smart-card", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/interactive-logon-smart-card-removal-behavior.md", -"redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-smart-card-removal-behavior", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies.md", -"redirect_url": "/windows/device-security/device-guard/introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/investigate-alerts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/investigate-domain-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/investigate-files-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/investigate-ip-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/investigate-machines-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/investigate-user-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/isolated-domain-gpos.md", -"redirect_url": "/windows/access-protection/windows-firewall/isolated-domain-gpos", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/isolated-domain.md", -"redirect_url": "/windows/access-protection/windows-firewall/isolated-domain", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/isolating-apps-on-your-network.md", -"redirect_url": "/windows/access-protection/windows-firewall/isolating-apps-on-your-network", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/kerberos-policy.md", -"redirect_url": "/windows/device-security/security-policy-settings/kerberos-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/limitations-with-wip.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/limitations-with-wip", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/link-the-gpo-to-the-domain.md", -"redirect_url": "/windows/access-protection/windows-firewall/link-the-gpo-to-the-domain", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/load-and-unload-device-drivers.md", -"redirect_url": "/windows/device-security/security-policy-settings/load-and-unload-device-drivers", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/local-accounts.md", -"redirect_url": "/windows/access-protection/access-control/local-accounts", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/lock-pages-in-memory.md", -"redirect_url": "/windows/device-security/security-policy-settings/lock-pages-in-memory", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/log-on-as-a-batch-job.md", -"redirect_url": "/windows/device-security/security-policy-settings/log-on-as-a-batch-job", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/log-on-as-a-service.md", -"redirect_url": "/windows/device-security/security-policy-settings/log-on-as-a-service", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/machines-view-overview-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/maintain-applocker-policies.md", -"redirect_url": "/windows/device-security/applocker/maintain-applocker-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/manage-alerts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/manage-auditing-and-security-log.md", -"redirect_url": "/windows/device-security/security-policy-settings/manage-auditing-and-security-log", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/manage-event-based-updates-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/manage-event-based-updates-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/manage-outdated-endpoints-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/manage-outdated-endpoints-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/manage-packaged-apps-with-applocker.md", -"redirect_url": "/windows/device-security/applocker/manage-packaged-apps-with-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/manage-protection-update-schedule-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/manage-protection-update-schedule-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/manage-protection-updates-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/manage-tpm-commands.md", -"redirect_url": "/windows/device-security/tpm/manage-tpm-commands", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/manage-tpm-lockout.md", -"redirect_url": "/windows/device-security/tpm/manage-tpm-lockout", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/manage-updates-baselines-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/manage-updates-mobile-devices-vms-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/manage-updates-mobile-devices-vms-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/mandatory-settings-for-wip.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/mandatory-settings-for-wip", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md", -"redirect_url": "/windows/access-protection/windows-firewall/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/maximum-lifetime-for-service-ticket.md", -"redirect_url": "/windows/device-security/security-policy-settings/maximum-lifetime-for-service-ticket", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/maximum-lifetime-for-user-ticket-renewal.md", -"redirect_url": "/windows/device-security/security-policy-settings/maximum-lifetime-for-user-ticket-renewal", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/maximum-lifetime-for-user-ticket.md", -"redirect_url": "/windows/device-security/security-policy-settings/maximum-lifetime-for-user-ticket", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/maximum-password-age.md", -"redirect_url": "/windows/device-security/security-policy-settings/maximum-password-age", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/maximum-tolerance-for-computer-clock-synchronization.md", -"redirect_url": "/windows/device-security/security-policy-settings/maximum-tolerance-for-computer-clock-synchronization", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/merge-applocker-policies-by-using-set-applockerpolicy.md", -"redirect_url": "/windows/device-security/applocker/merge-applocker-policies-by-using-set-applockerpolicy", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/merge-applocker-policies-manually.md", -"redirect_url": "/windows/device-security/applocker/merge-applocker-policies-manually", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/microsoft-accounts.md", -"redirect_url": "/windows/access-protection/access-control/microsoft-accounts", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/microsoft-network-client-digitally-sign-communications-always.md", -"redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-client-digitally-sign-communications-always", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/microsoft-network-client-digitally-sign-communications-if-server-agrees.md", -"redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-client-digitally-sign-communications-if-server-agrees", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers.md", -"redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/microsoft-network-server-amount-of-idle-time-required-before-suspending-session.md", -"redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information.md", -"redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/microsoft-network-server-digitally-sign-communications-always.md", -"redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-server-digitally-sign-communications-always", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/microsoft-network-server-digitally-sign-communications-if-client-agrees.md", -"redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-server-digitally-sign-communications-if-client-agrees", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/microsoft-network-server-disconnect-clients-when-logon-hours-expire.md", -"redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/microsoft-network-server-server-spn-target-name-validation-level.md", -"redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/minimum-password-age.md", -"redirect_url": "/windows/device-security/security-policy-settings/minimum-password-age", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/minimum-password-length.md", -"redirect_url": "/windows/device-security/security-policy-settings/minimum-password-length", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/minimum-requirements-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/modify-an-object-label.md", -"redirect_url": "/windows/device-security/security-policy-settings/modify-an-object-label", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/modify-firmware-environment-values.md", -"redirect_url": "/windows/device-security/security-policy-settings/modify-firmware-environment-values", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md", -"redirect_url": "/windows/access-protection/windows-firewall/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/monitor-application-usage-with-applocker.md", -"redirect_url": "/windows/device-security/applocker/monitor-application-usage-with-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/monitor-central-access-policy-and-rule-definitions.md", -"redirect_url": "/windows/device-security/auditing/monitor-central-access-policy-and-rule-definitions", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/monitor-claim-types.md", -"redirect_url": "/windows/device-security/auditing/monitor-claim-types", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/monitor-resource-attribute-definitions.md", -"redirect_url": "/windows/device-security/auditing/monitor-resource-attribute-definitions", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/monitor-the-central-access-policies-associated-with-files-and-folders.md", -"redirect_url": "/windows/device-security/auditing/monitor-the-central-access-policies-associated-with-files-and-folders", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/monitor-the-central-access-policies-that-apply-on-a-file-server.md", -"redirect_url": "/windows/device-security/auditing/monitor-the-central-access-policies-that-apply-on-a-file-server", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/monitor-the-resource-attributes-on-files-and-folders.md", -"redirect_url": "/windows/device-security/auditing/monitor-the-resource-attributes-on-files-and-folders", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/monitor-the-use-of-removable-storage-devices.md", -"redirect_url": "/windows/device-security/auditing/monitor-the-use-of-removable-storage-devices", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/monitor-user-and-device-claims-during-sign-in.md", -"redirect_url": "/windows/device-security/auditing/monitor-user-and-device-claims-during-sign-in", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-access-allow-anonymous-sidname-translation.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-access-allow-anonymous-sidname-translation", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-access-let-everyone-permissions-apply-to-anonymous-users.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-access-named-pipes-that-can-be-accessed-anonymously.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-access-remotely-accessible-registry-paths-and-subpaths.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-access-remotely-accessible-registry-paths.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-access-remotely-accessible-registry-paths", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-access-restrict-anonymous-access-to-named-pipes-and-shares.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-access-restrict-anonymous-access-to-named-pipes-and-shares", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-access-shares-that-can-be-accessed-anonymously.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-access-sharing-and-security-model-for-local-accounts.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-list-manager-policies.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-list-manager-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-security-allow-local-system-to-use-computer-identity-for-ntlm.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-security-allow-localsystem-null-session-fallback.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-security-allow-localsystem-null-session-fallback", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-security-configure-encryption-types-allowed-for-kerberos.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-security-do-not-store-lan-manager-hash-value-on-next-password-change.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-security-force-logoff-when-logon-hours-expire.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-security-force-logoff-when-logon-hours-expire", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-security-lan-manager-authentication-level.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-security-lan-manager-authentication-level", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-security-ldap-client-signing-requirements.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-security-ldap-client-signing-requirements", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-security-restrict-ntlm-incoming-ntlm-traffic.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/open-the-group-policy-management-console-to-ip-security-policies.md", -"redirect_url": "/windows/access-protection/windows-firewall/open-the-group-policy-management-console-to-ip-security-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md", -"redirect_url": "/windows/access-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/open-the-group-policy-management-console-to-windows-firewall.md", -"redirect_url": "/windows/access-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/open-windows-firewall-with-advanced-security.md", -"redirect_url": "/windows/access-protection/windows-firewall/open-windows-firewall-with-advanced-security", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/optimize-applocker-performance.md", -"redirect_url": "/windows/device-security/applocker/optimize-applocker-performance", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/optional-create-a-code-signing-certificate-for-code-integrity-policies.md", -"redirect_url": "/windows/device-security/device-guard/optional-create-a-code-signing-certificate-for-code-integrity-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/other-events.md", -"redirect_url": "/windows/device-security/auditing/other-events", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/override-mitigation-options-for-app-related-security-policies.md", -"redirect_url": "/windows/threat-protection/override-mitigation-options-for-app-related-security-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/overview-create-wip-policy.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/overview-create-wip-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/overview-of-threat-mitigations-in-windows-10.md", -"redirect_url": "/windows/threat-protection/overview-of-threat-mitigations-in-windows-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/packaged-apps-and-packaged-app-installer-rules-in-applocker.md", -"redirect_url": "/windows/device-security/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/password-must-meet-complexity-requirements.md", -"redirect_url": "/windows/device-security/security-policy-settings/password-must-meet-complexity-requirements", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/password-policy.md", -"redirect_url": "/windows/device-security/security-policy-settings/password-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/perform-volume-maintenance-tasks.md", -"redirect_url": "/windows/device-security/security-policy-settings/perform-volume-maintenance-tasks", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/plan-for-applocker-policy-management.md", -"redirect_url": "/windows/device-security/applocker/plan-for-applocker-policy-management", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/planning-and-deploying-advanced-security-audit-policies.md", -"redirect_url": "/windows/device-security/auditing/planning-and-deploying-advanced-security-audit-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/planning-and-getting-started-on-the-device-guard-deployment-process.md", -"redirect_url": "/windows/device-security/device-guard/planning-and-getting-started-on-the-device-guard-deployment-process", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/planning-certificate-based-authentication.md", -"redirect_url": "/windows/access-protection/windows-firewall/planning-certificate-based-authentication", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/planning-domain-isolation-zones.md", -"redirect_url": "/windows/access-protection/windows-firewall/planning-domain-isolation-zones", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/planning-gpo-deployment.md", -"redirect_url": "/windows/access-protection/windows-firewall/planning-gpo-deployment", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/planning-group-policy-deployment-for-your-isolation-zones.md", -"redirect_url": "/windows/access-protection/windows-firewall/planning-group-policy-deployment-for-your-isolation-zones", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/planning-isolation-groups-for-the-zones.md", -"redirect_url": "/windows/access-protection/windows-firewall/planning-isolation-groups-for-the-zones", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/planning-network-access-groups.md", -"redirect_url": "/windows/access-protection/windows-firewall/planning-network-access-groups", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/planning-server-isolation-zones.md", -"redirect_url": "/windows/access-protection/windows-firewall/planning-server-isolation-zones", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/planning-settings-for-a-basic-firewall-policy.md", -"redirect_url": "/windows/access-protection/windows-firewall/planning-settings-for-a-basic-firewall-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/planning-the-gpos.md", -"redirect_url": "/windows/access-protection/windows-firewall/planning-the-gpos", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/planning-to-deploy-windows-firewall-with-advanced-security.md", -"redirect_url": "/windows/access-protection/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/planning-your-windows-firewall-with-advanced-security-design.md", -"redirect_url": "/windows/access-protection/windows-firewall/planning-your-windows-firewall-with-advanced-security-design", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/portal-overview-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/prepare-your-organization-for-bitlocker-planning-and-policies.md", -"redirect_url": "/windows/device-security/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/prevent-end-user-interaction-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/prevent-end-user-interaction-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/preview-settings-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/preview-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/procedures-used-in-this-guide.md", -"redirect_url": "/windows/access-protection/windows-firewall/procedures-used-in-this-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/profile-single-process.md", -"redirect_url": "/windows/device-security/security-policy-settings/profile-single-process", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/profile-system-performance.md", -"redirect_url": "/windows/device-security/security-policy-settings/profile-system-performance", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/protect-bitlocker-from-pre-boot-attacks.md", -"redirect_url": "/windows/device-security/bitlocker/protect-bitlocker-from-pre-boot-attacks", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/protect-devices-from-unwanted-network-traffic.md", -"redirect_url": "/windows/access-protection/windows-firewall/protect-devices-from-unwanted-network-traffic", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/protect-enterprise-data-using-wip.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/protect-enterprise-data-using-wip", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices.md", -"redirect_url": "/windows/device-security/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md", -"redirect_url": "/windows/device-security/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/python-example-code-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/recommended-network-definitions-for-wip.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/recommended-network-definitions-for-wip", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/recovery-console-allow-automatic-administrative-logon.md", -"redirect_url": "/windows/device-security/security-policy-settings/recovery-console-allow-automatic-administrative-logon", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders.md", -"redirect_url": "/windows/device-security/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/refresh-an-applocker-policy.md", -"redirect_url": "/windows/device-security/applocker/refresh-an-applocker-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/registry-global-object-access-auditing.md", -"redirect_url": "/windows/device-security/auditing/registry-global-object-access-auditing", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/remote-credential-guard.md", -"redirect_url": "/windows/access-protection/remote-credential-guard", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/remove-computer-from-docking-station.md", -"redirect_url": "/windows/device-security/security-policy-settings/remove-computer-from-docking-station", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/replace-a-process-level-token.md", -"redirect_url": "/windows/device-security/security-policy-settings/replace-a-process-level-token", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/report-monitor-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/report-monitor-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/require-encryption-when-accessing-sensitive-network-resources.md", -"redirect_url": "/windows/access-protection/windows-firewall/require-encryption-when-accessing-sensitive-network-resources", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/requirements-for-deploying-applocker-policies.md", -"redirect_url": "/windows/device-security/applocker/requirements-for-deploying-applocker-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/requirements-to-use-applocker.md", -"redirect_url": "/windows/device-security/applocker/requirements-to-use-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/reset-account-lockout-counter-after.md", -"redirect_url": "/windows/device-security/security-policy-settings/reset-account-lockout-counter-after", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/respond-file-alerts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/respond-machine-alerts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/restore-files-and-directories.md", -"redirect_url": "/windows/device-security/security-policy-settings/restore-files-and-directories", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/restrict-access-to-only-specified-users-or-devices.md", -"redirect_url": "/windows/access-protection/windows-firewall/restrict-access-to-only-specified-users-or-devices", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/restrict-access-to-only-trusted-devices.md", -"redirect_url": "/windows/access-protection/windows-firewall/restrict-access-to-only-trusted-devices", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/restrict-server-access-to-members-of-a-group-only.md", -"redirect_url": "/windows/access-protection/windows-firewall/restrict-server-access-to-members-of-a-group-only", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/review-scan-results-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/review-scan-results-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/run-scan-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/run-scan-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/run-the-automatically-generate-rules-wizard.md", -"redirect_url": "/windows/device-security/applocker/run-the-automatically-generate-rules-wizard", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/scheduled-catch-up-scans-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/script-rules-in-applocker.md", -"redirect_url": "/windows/device-security/applocker/script-rules-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/secpol-advanced-security-audit-policy-settings.md", -"redirect_url": "/windows/device-security/security-policy-settings/secpol-advanced-security-audit-policy-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/securing-end-to-end-ipsec-connections-by-using-ikev2.md", -"redirect_url": "/windows/access-protection/windows-firewall/securing-end-to-end-ipsec-connections-by-using-ikev2", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/security-auditing-overview.md", -"redirect_url": "/windows/device-security/auditing/security-auditing-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/security-considerations-for-applocker.md", -"redirect_url": "/windows/device-security/applocker/security-considerations-for-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/security-identifiers.md", -"redirect_url": "/windows/access-protection/access-control/security-identifiers", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/security-options.md", -"redirect_url": "/windows/device-security/security-policy-settings/security-options", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/security-policy-settings-reference.md", -"redirect_url": "/windows/device-security/security-policy-settings/security-policy-settings-reference", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/security-policy-settings.md", -"redirect_url": "/windows/device-security/security-policy-settings/security-policy-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/security-principals.md", -"redirect_url": "/windows/access-protection/access-control/security-principals", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/select-types-of-rules-to-create.md", -"redirect_url": "/windows/device-security/applocker/select-types-of-rules-to-create", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/server-isolation-gpos.md", -"redirect_url": "/windows/access-protection/windows-firewall/server-isolation-gpos", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/server-isolation-policy-design-example.md", -"redirect_url": "/windows/access-protection/windows-firewall/server-isolation-policy-design-example", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/server-isolation-policy-design.md", -"redirect_url": "/windows/access-protection/windows-firewall/server-isolation-policy-design", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/service-accounts.md", -"redirect_url": "/windows/access-protection/access-control/service-accounts", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/service-status-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/settings-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/settings-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/shut-down-the-system.md", -"redirect_url": "/windows/device-security/security-policy-settings/shut-down-the-system", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/shutdown-allow-system-to-be-shut-down-without-having-to-log-on.md", -"redirect_url": "/windows/device-security/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/shutdown-clear-virtual-memory-pagefile.md", -"redirect_url": "/windows/device-security/security-policy-settings/shutdown-clear-virtual-memory-pagefile", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/smart-card-and-remote-desktop-services.md", -"redirect_url": "/windows/access-protection/smart-cards/smart-card-and-remote-desktop-services", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/smart-card-architecture.md", -"redirect_url": "/windows/access-protection/smart-cards/smart-card-architecture", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/smart-card-certificate-propagation-service.md", -"redirect_url": "/windows/access-protection/smart-cards/smart-card-certificate-propagation-service", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/smart-card-certificate-requirements-and-enumeration.md", -"redirect_url": "/windows/access-protection/smart-cards/smart-card-certificate-requirements-and-enumeration", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/smart-card-debugging-information.md", -"redirect_url": "/windows/access-protection/smart-cards/smart-card-debugging-information", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/smart-card-events.md", -"redirect_url": "/windows/access-protection/smart-cards/smart-card-events", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/smart-card-group-policy-and-registry-settings.md", -"redirect_url": "/windows/access-protection/smart-cards/smart-card-group-policy-and-registry-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/smart-card-how-smart-card-sign-in-works-in-windows.md", -"redirect_url": "/windows/access-protection/smart-cards/smart-card-how-smart-card-sign-in-works-in-windows", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/smart-card-removal-policy-service.md", -"redirect_url": "/windows/access-protection/smart-cards/smart-card-removal-policy-service", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/smart-card-smart-cards-for-windows-service.md", -"redirect_url": "/windows/access-protection/smart-cards/smart-card-smart-cards-for-windows-service", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/smart-card-tools-and-settings.md", -"redirect_url": "/windows/access-protection/smart-cards/smart-card-tools-and-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/smart-card-windows-smart-card-technical-reference.md", -"redirect_url": "/windows/access-protection/smart-cards/smart-card-windows-smart-card-technical-reference", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/special-identities.md", -"redirect_url": "/windows/access-protection/access-control/special-identities", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/specify-cloud-protection-level-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/store-passwords-using-reversible-encryption.md", -"redirect_url": "/windows/device-security/security-policy-settings/store-passwords-using-reversible-encryption", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/switch-pcr-banks-on-tpm-2-0-devices.md", -"redirect_url": "/windows/device-security/tpm/switch-pcr-banks-on-tpm-2-0-devices", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/synchronize-directory-service-data.md", -"redirect_url": "/windows/device-security/security-policy-settings/synchronize-directory-service-data", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer.md", -"redirect_url": "/windows/device-security/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md", -"redirect_url": "/windows/device-security/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/system-objects-require-case-insensitivity-for-non-windows-subsystems.md", -"redirect_url": "/windows/device-security/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/system-objects-strengthen-default-permissions-of-internal-system-objects.md", -"redirect_url": "/windows/device-security/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/system-settings-optional-subsystems.md", -"redirect_url": "/windows/device-security/security-policy-settings/system-settings-optional-subsystems", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies.md", -"redirect_url": "/windows/device-security/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/take-ownership-of-files-or-other-objects.md", -"redirect_url": "/windows/device-security/security-policy-settings/take-ownership-of-files-or-other-objects", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/test-an-applocker-policy-by-using-test-applockerpolicy.md", -"redirect_url": "/windows/device-security/applocker/test-an-applocker-policy-by-using-test-applockerpolicy", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/test-and-update-an-applocker-policy.md", -"redirect_url": "/windows/device-security/applocker/test-and-update-an-applocker-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/testing-scenarios-for-wip.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/testing-scenarios-for-wip", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/threat-indicator-concepts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/tools-to-use-with-applocker.md", -"redirect_url": "/windows/device-security/applocker/tools-to-use-with-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/tpm-fundamentals.md", -"redirect_url": "/windows/device-security/tpm/tpm-fundamentals", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/tpm-recommendations.md", -"redirect_url": "/windows/device-security/tpm/tpm-recommendations", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/troubleshoot-siem-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/trusted-platform-module-overview.md", -"redirect_url": "/windows/device-security/tpm/trusted-platform-module-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/trusted-platform-module-services-group-policy-settings.md", -"redirect_url": "/windows/device-security/tpm/trusted-platform-module-services-group-policy-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/trusted-platform-module-top-node.md", -"redirect_url": "/windows/device-security/tpm/trusted-platform-module-top-node", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/turn-on-windows-firewall-and-configure-default-behavior.md", -"redirect_url": "/windows/access-protection/windows-firewall/turn-on-windows-firewall-and-configure-default-behavior", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/types-of-attacks-for-volume-encryption-keys.md", -"redirect_url": "/windows/device-security/bitlocker/types-of-attacks-for-volume-encryption-keys", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/understand-applocker-enforcement-settings.md", -"redirect_url": "/windows/device-security/applocker/understand-applocker-enforcement-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/understand-applocker-policy-design-decisions.md", -"redirect_url": "/windows/device-security/applocker/understand-applocker-policy-design-decisions", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy.md", -"redirect_url": "/windows/device-security/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/understand-the-applocker-policy-deployment-process.md", -"redirect_url": "/windows/device-security/applocker/understand-the-applocker-policy-deployment-process", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/understanding-applocker-allow-and-deny-actions-on-rules.md", -"redirect_url": "/windows/device-security/applocker/understanding-applocker-allow-and-deny-actions-on-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/understanding-applocker-default-rules.md", -"redirect_url": "/windows/device-security/applocker/understanding-applocker-default-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/understanding-applocker-rule-behavior.md", -"redirect_url": "/windows/device-security/applocker/understanding-applocker-rule-behavior", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/understanding-applocker-rule-collections.md", -"redirect_url": "/windows/device-security/applocker/understanding-applocker-rule-collections", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/understanding-applocker-rule-condition-types.md", -"redirect_url": "/windows/device-security/applocker/understanding-applocker-rule-condition-types", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/understanding-applocker-rule-exceptions.md", -"redirect_url": "/windows/device-security/applocker/understanding-applocker-rule-exceptions", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/understanding-the-file-hash-rule-condition-in-applocker.md", -"redirect_url": "/windows/device-security/applocker/understanding-the-file-hash-rule-condition-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/understanding-the-path-rule-condition-in-applocker.md", -"redirect_url": "/windows/device-security/applocker/understanding-the-path-rule-condition-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/understanding-the-publisher-rule-condition-in-applocker.md", -"redirect_url": "/windows/device-security/applocker/understanding-the-publisher-rule-condition-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/understanding-the-windows-firewall-with-advanced-security-design-process.md", -"redirect_url": "/windows/access-protection/windows-firewall/understanding-the-windows-firewall-with-advanced-security-design-process", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/use-a-reference-computer-to-create-and-maintain-applocker-policies.md", -"redirect_url": "/windows/device-security/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/use-applocker-and-software-restriction-policies-in-the-same-domain.md", -"redirect_url": "/windows/device-security/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/use-custom-ti-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/use-group-policy-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/use-group-policy-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/use-intune-config-manager-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/use-powershell-cmdlets-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/use-the-applocker-windows-powershell-cmdlets.md", -"redirect_url": "/windows/device-security/applocker/use-the-applocker-windows-powershell-cmdlets", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/use-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/use-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/use-windows-event-forwarding-to-assist-in-instrusion-detection.md", -"redirect_url": "/windows/threat-protection/use-windows-event-forwarding-to-assist-in-instrusion-detection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/use-wmi-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/use-wmi-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md", -"redirect_url": "/windows/device-security/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop.md", -"redirect_url": "/windows/device-security/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode.md", -"redirect_url": "/windows/device-security/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/user-account-control-behavior-of-the-elevation-prompt-for-standard-users.md", -"redirect_url": "/windows/device-security/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-standard-users", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/user-account-control-detect-application-installations-and-prompt-for-elevation.md", -"redirect_url": "/windows/device-security/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/user-account-control-group-policy-and-registry-key-settings.md", -"redirect_url": "/windows/access-protection/user-account-control/user-account-control-group-policy-and-registry-key-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/user-account-control-only-elevate-executables-that-are-signed-and-validated.md", -"redirect_url": "/windows/device-security/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md", -"redirect_url": "/windows/device-security/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/user-account-control-overview.md", -"redirect_url": "/windows/access-protection/user-account-control/user-account-control-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/user-account-control-run-all-administrators-in-admin-approval-mode.md", -"redirect_url": "/windows/device-security/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/user-account-control-security-policy-settings.md", -"redirect_url": "/windows/access-protection/user-account-control/user-account-control-security-policy-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md", -"redirect_url": "/windows/device-security/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations.md", -"redirect_url": "/windows/device-security/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/user-rights-assignment.md", -"redirect_url": "/windows/device-security/security-policy-settings/user-rights-assignment", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/using-advanced-security-auditing-options-to-monitor-dynamic-access-control-objects.md", -"redirect_url": "/windows/device-security/auditing/using-advanced-security-auditing-options-to-monitor-dynamic-access-control-objects", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/using-event-viewer-with-applocker.md", -"redirect_url": "/windows/device-security/applocker/using-event-viewer-with-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/using-owa-with-wip.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/using-owa-with-wip", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/using-software-restriction-policies-and-applocker-policies.md", -"redirect_url": "/windows/device-security/applocker/using-software-restriction-policies-and-applocker-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/utilize-microsoft-cloud-protection-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/verify-that-network-traffic-is-authenticated.md", -"redirect_url": "/windows/access-protection/windows-firewall/verify-that-network-traffic-is-authenticated", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/view-the-security-event-log.md", -"redirect_url": "/windows/device-security/auditing/view-the-security-event-log", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/virtual-smart-card-deploy-virtual-smart-cards.md", -"redirect_url": "/windows/access-protection/virtual-smart-cards/virtual-smart-card-deploy-virtual-smart-cards", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/virtual-smart-card-evaluate-security.md", -"redirect_url": "/windows/access-protection/virtual-smart-cards/virtual-smart-card-evaluate-security", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/virtual-smart-card-get-started.md", -"redirect_url": "/windows/access-protection/virtual-smart-cards/virtual-smart-card-get-started", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/virtual-smart-card-overview.md", -"redirect_url": "/windows/access-protection/virtual-smart-cards/virtual-smart-card-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/virtual-smart-card-tpmvscmgr.md", -"redirect_url": "/windows/access-protection/virtual-smart-cards/virtual-smart-card-tpmvscmgr", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/virtual-smart-card-understanding-and-evaluating.md", -"redirect_url": "/windows/access-protection/virtual-smart-cards/virtual-smart-card-understanding-and-evaluating", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/virtual-smart-card-use-virtual-smart-cards.md", -"redirect_url": "/windows/access-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/vpn-authentication.md", -"redirect_url": "/windows/access-protection/vpn/vpn-authentication", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/vpn-auto-trigger-profile.md", -"redirect_url": "/windows/access-protection/vpn/vpn-auto-trigger-profile", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/vpn-conditional-access.md", -"redirect_url": "/windows/access-protection/vpn/vpn-conditional-access", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/vpn-connection-type.md", -"redirect_url": "/windows/access-protection/vpn/vpn-connection-type", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/vpn-guide.md", -"redirect_url": "/windows/access-protection/vpn/vpn-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/vpn-name-resolution.md", -"redirect_url": "/windows/access-protection/vpn/vpn-name-resolution", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/vpn-profile-options.md", -"redirect_url": "/windows/access-protection/vpn/vpn-profile-options", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/vpn-routing.md", -"redirect_url": "/windows/access-protection/vpn/vpn-routing", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/vpn-security-features.md", -"redirect_url": "/windows/access-protection/vpn/vpn-security-features", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/what-is-applocker.md", -"redirect_url": "/windows/device-security/applocker/what-is-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/which-editions-of-windows-support-advanced-audit-policy-configuration.md", -"redirect_url": "/windows/device-security/auditing/which-editions-of-windows-support-advanced-audit-policy-configuration", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/windows-10-mobile-security-guide.md", -"redirect_url": "/windows/device-security/windows-10-mobile-security-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/windows-credential-theft-mitigation-guide-abstract.md", -"redirect_url": "/windows/access-protection/windows-credential-theft-mitigation-guide-abstract", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/windows-defender-antivirus-compatibility.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/windows-defender-antivirus-in-windows-10.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/windows-defender-antivirus-on-windows-server-2016.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/windows-defender-offline.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/windows-defender-offline", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/windows-defender-security-center-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/windows-defender-smartscreen-available-settings.md", -"redirect_url": "/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/windows-defender-smartscreen-overview.md", -"redirect_url": "/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/windows-defender-smartscreen-set-individual-device.md", -"redirect_url": "/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-set-individual-device", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/windows-firewall-with-advanced-security-administration-with-windows-powershell.md", -"redirect_url": "/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/windows-firewall-with-advanced-security-deployment-guide.md", -"redirect_url": "/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security-deployment-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/windows-firewall-with-advanced-security-design-guide.md", -"redirect_url": "/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security-design-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/windows-firewall-with-advanced-security.md", -"redirect_url": "/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/windows-installer-rules-in-applocker.md", -"redirect_url": "/windows/device-security/applocker/windows-installer-rules-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/windows-security-baselines.md", -"redirect_url": "/windows/device-security/windows-security-baselines", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/wip-app-enterprise-context.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/wip-app-enterprise-context", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/working-with-applocker-policies.md", -"redirect_url": "/windows/device-security/applocker/working-with-applocker-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/working-with-applocker-rules.md", -"redirect_url": "/windows/device-security/applocker/working-with-applocker-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/acquire-apps-windows-store-for-business.md", -"redirect_url": "/microsoft-store/acquire-apps-windows-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "store-for-business/acquire-apps-windows-store-for-business.md", -"redirect_url": "/microsoft-store/acquire-apps-microsoft-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/add-unsigned-app-to-code-integrity-policy.md", -"redirect_url": "/microsoft-store/add-unsigned-app-to-code-integrity-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/administrative-tools-in-windows-10.md", -"redirect_url": "/windows/client-management/administrative-tools-in-windows-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/app-inventory-management-windows-store-for-business.md", -"redirect_url": "/microsoft-store/app-inventory-management-windows-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/apps-in-windows-store-for-business.md", -"redirect_url": "/microsoft-store/apps-in-windows-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "store-for-business/apps-in-windows-store-for-business.md", -"redirect_url": "/microsoft-store/apps-in-microsoft-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-about-appv.md", -"redirect_url": "/windows/application-management/app-v/appv-about-appv", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-add-or-remove-an-administrator-with-the-management-console.md", -"redirect_url": "/windows/application-management/app-v/appv-add-or-remove-an-administrator-with-the-management-console", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-add-or-upgrade-packages-with-the-management-console.md", -"redirect_url": "/windows/application-management/app-v/appv-add-or-upgrade-packages-with-the-management-console", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-administering-appv-with-powershell.md", -"redirect_url": "/windows/application-management/app-v/appv-administering-appv-with-powershell", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-administering-virtual-applications-with-the-management-console.md", -"redirect_url": "/windows/application-management/app-v/appv-administering-virtual-applications-with-the-management-console", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-allow-administrators-to-enable-connection-groups.md", -"redirect_url": "/windows/application-management/app-v/appv-allow-administrators-to-enable-connection-groups", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-application-publishing-and-client-interaction.md", -"redirect_url": "/windows/application-management/app-v/appv-application-publishing-and-client-interaction", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-apply-the-deployment-configuration-file-with-powershell.md", -"redirect_url": "/windows/application-management/app-v/appv-apply-the-deployment-configuration-file-with-powershell", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-apply-the-user-configuration-file-with-powershell.md", -"redirect_url": "/windows/application-management/app-v/appv-apply-the-user-configuration-file-with-powershell", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-auto-batch-sequencing.md", -"redirect_url": "/windows/application-management/app-v/appv-auto-batch-sequencing", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-auto-batch-updating.md", -"redirect_url": "/windows/application-management/app-v/appv-auto-batch-updating", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-auto-clean-unpublished-packages.md", -"redirect_url": "/windows/application-management/app-v/appv-auto-clean-unpublished-packages", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-auto-provision-a-vm.md", -"redirect_url": "/windows/application-management/app-v/appv-auto-provision-a-vm", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-available-mdm-settings.md", -"redirect_url": "/windows/application-management/app-v/appv-available-mdm-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-capacity-planning.md", -"redirect_url": "/windows/application-management/app-v/appv-capacity-planning", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-client-configuration-settings.md", -"redirect_url": "/windows/application-management/app-v/appv-client-configuration-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-configure-access-to-packages-with-the-management-console.md", -"redirect_url": "/windows/application-management/app-v/appv-configure-access-to-packages-with-the-management-console", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-configure-connection-groups-to-ignore-the-package-version.md", -"redirect_url": "/windows/application-management/app-v/appv-configure-connection-groups-to-ignore-the-package-version", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-configure-the-client-to-receive-updates-from-the-publishing-server.md", -"redirect_url": "/windows/application-management/app-v/appv-configure-the-client-to-receive-updates-from-the-publishing-server", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-connect-to-the-management-console.md", -"redirect_url": "/windows/application-management/app-v/appv-connect-to-the-management-console", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-connection-group-file.md", -"redirect_url": "/windows/application-management/app-v/appv-connection-group-file", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-connection-group-virtual-environment.md", -"redirect_url": "/windows/application-management/app-v/appv-connection-group-virtual-environment", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-convert-a-package-created-in-a-previous-version-of-appv.md", -"redirect_url": "/windows/application-management/app-v/appv-convert-a-package-created-in-a-previous-version-of-appv", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-create-a-connection-group-with-user-published-and-globally-published-packages.md", -"redirect_url": "/windows/application-management/app-v/appv-create-a-connection-group-with-user-published-and-globally-published-packages", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-create-a-connection-group.md", -"redirect_url": "/windows/application-management/app-v/appv-create-a-connection-group", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-create-a-custom-configuration-file-with-the-management-console.md", -"redirect_url": "/windows/application-management/app-v/appv-create-a-custom-configuration-file-with-the-management-console", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-create-a-package-accelerator-with-powershell.md", -"redirect_url": "/windows/application-management/app-v/appv-create-a-package-accelerator-with-powershell", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-create-a-package-accelerator.md", -"redirect_url": "/windows/application-management/app-v/appv-create-a-package-accelerator", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-create-a-virtual-application-package-package-accelerator.md", -"redirect_url": "/windows/application-management/app-v/appv-create-a-virtual-application-package-package-accelerator", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-create-and-use-a-project-template.md", -"redirect_url": "/windows/application-management/app-v/appv-create-and-use-a-project-template", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-creating-and-managing-virtualized-applications.md", -"redirect_url": "/windows/application-management/app-v/appv-creating-and-managing-virtualized-applications", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-customize-virtual-application-extensions-with-the-management-console.md", -"redirect_url": "/windows/application-management/app-v/appv-customize-virtual-application-extensions-with-the-management-console", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-delete-a-connection-group.md", -"redirect_url": "/windows/application-management/app-v/appv-delete-a-connection-group", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-delete-a-package-with-the-management-console.md", -"redirect_url": "/windows/application-management/app-v/appv-delete-a-package-with-the-management-console", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-deploy-appv-databases-with-sql-scripts.md", -"redirect_url": "/windows/application-management/app-v/appv-deploy-appv-databases-with-sql-scripts", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-deploy-appv-packages-with-electronic-software-distribution-solutions.md", -"redirect_url": "/windows/application-management/app-v/appv-deploy-appv-packages-with-electronic-software-distribution-solutions", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-deploy-the-appv-server-with-a-script.md", -"redirect_url": "/windows/application-management/app-v/appv-deploy-the-appv-server-with-a-script", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-deploy-the-appv-server.md", -"redirect_url": "/windows/application-management/app-v/appv-deploy-the-appv-server", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-deploying-appv.md", -"redirect_url": "/windows/application-management/app-v/appv-deploying-appv", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-deploying-microsoft-office-2010-wth-appv.md", -"redirect_url": "/windows/application-management/app-v/appv-deploying-microsoft-office-2010-wth-appv", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-deploying-microsoft-office-2013-with-appv.md", -"redirect_url": "/windows/application-management/app-v/appv-deploying-microsoft-office-2013-with-appv", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-deploying-microsoft-office-2016-with-appv.md", -"redirect_url": "/windows/application-management/app-v/appv-deploying-microsoft-office-2016-with-appv", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-deploying-packages-with-electronic-software-distribution-solutions.md", -"redirect_url": "/windows/application-management/app-v/appv-deploying-packages-with-electronic-software-distribution-solutions", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-deploying-the-appv-sequencer-and-client.md", -"redirect_url": "/windows/application-management/app-v/appv-deploying-the-appv-sequencer-and-client", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-deploying-the-appv-server.md", -"redirect_url": "/windows/application-management/app-v/appv-deploying-the-appv-server", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-deployment-checklist.md", -"redirect_url": "/windows/application-management/app-v/appv-deployment-checklist", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-dynamic-configuration.md", -"redirect_url": "/windows/application-management/app-v/appv-dynamic-configuration", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-enable-administrators-to-publish-packages-with-electronic-software-distribution-solutions.md", -"redirect_url": "/windows/application-management/app-v/appv-enable-administrators-to-publish-packages-with-electronic-software-distribution-solutions", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-enable-reporting-on-the-appv-client-with-powershell.md", -"redirect_url": "/windows/application-management/app-v/appv-enable-reporting-on-the-appv-client-with-powershell", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-enable-the-app-v-desktop-client.md", -"redirect_url": "/windows/application-management/app-v/appv-enable-the-app-v-desktop-client", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-evaluating-appv.md", -"redirect_url": "/windows/application-management/app-v/appv-evaluating-appv", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-for-windows.md", -"redirect_url": "/windows/application-management/app-v/appv-for-windows", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-getting-started.md", -"redirect_url": "/windows/application-management/app-v/appv-getting-started", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-high-level-architecture.md", -"redirect_url": "/windows/application-management/app-v/appv-high-level-architecture", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-install-the-appv-databases-and-convert-the-associated-security-identifiers-with-powershell.md", -"redirect_url": "/windows/application-management/app-v/appv-install-the-appv-databases-and-convert-the-associated-security-identifiers-with-powershell", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-install-the-management-and-reporting-databases-on-separate-computers.md", -"redirect_url": "/windows/application-management/app-v/appv-install-the-management-and-reporting-databases-on-separate-computers", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-install-the-management-server-on-a-standalone-computer.md", -"redirect_url": "/windows/application-management/app-v/appv-install-the-management-server-on-a-standalone-computer", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-install-the-publishing-server-on-a-remote-computer.md", -"redirect_url": "/windows/application-management/app-v/appv-install-the-publishing-server-on-a-remote-computer", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-install-the-reporting-server-on-a-standalone-computer.md", -"redirect_url": "/windows/application-management/app-v/appv-install-the-reporting-server-on-a-standalone-computer", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-install-the-sequencer.md", -"redirect_url": "/windows/application-management/app-v/appv-install-the-sequencer", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-load-the-powershell-cmdlets-and-get-cmdlet-help.md", -"redirect_url": "/windows/application-management/app-v/appv-load-the-powershell-cmdlets-and-get-cmdlet-help", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-maintaining-appv.md", -"redirect_url": "/windows/application-management/app-v/appv-maintaining-appv", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-manage-appv-packages-running-on-a-stand-alone-computer-with-powershell.md", -"redirect_url": "/windows/application-management/app-v/appv-manage-appv-packages-running-on-a-stand-alone-computer-with-powershell", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-manage-connection-groups-on-a-stand-alone-computer-with-powershell.md", -"redirect_url": "/windows/application-management/app-v/appv-manage-connection-groups-on-a-stand-alone-computer-with-powershell", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-managing-connection-groups.md", -"redirect_url": "/windows/application-management/app-v/appv-managing-connection-groups", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-migrating-to-appv-from-a-previous-version.md", -"redirect_url": "/windows/application-management/app-v/appv-migrating-to-appv-from-a-previous-version", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-modify-an-existing-virtual-application-package.md", -"redirect_url": "/windows/application-management/app-v/appv-modify-an-existing-virtual-application-package", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-modify-client-configuration-with-powershell.md", -"redirect_url": "/windows/application-management/app-v/appv-modify-client-configuration-with-powershell", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-move-the-appv-server-to-another-computer.md", -"redirect_url": "/windows/application-management/app-v/appv-move-the-appv-server-to-another-computer", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-operations.md", -"redirect_url": "/windows/application-management/app-v/appv-operations", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-performance-guidance.md", -"redirect_url": "/windows/application-management/app-v/appv-performance-guidance", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-planning-checklist.md", -"redirect_url": "/windows/application-management/app-v/appv-planning-checklist", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-planning-folder-redirection-with-appv.md", -"redirect_url": "/windows/application-management/app-v/appv-planning-folder-redirection-with-appv", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-planning-for-appv-server-deployment.md", -"redirect_url": "/windows/application-management/app-v/appv-planning-for-appv-server-deployment", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-planning-for-appv.md", -"redirect_url": "/windows/application-management/app-v/appv-planning-for-appv", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-planning-for-high-availability-with-appv.md", -"redirect_url": "/windows/application-management/app-v/appv-planning-for-high-availability-with-appv", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-planning-for-sequencer-and-client-deployment.md", -"redirect_url": "/windows/application-management/app-v/appv-planning-for-sequencer-and-client-deployment", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-planning-for-using-appv-with-office.md", -"redirect_url": "/windows/application-management/app-v/appv-planning-for-using-appv-with-office", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-planning-to-deploy-appv-with-electronic-software-distribution-solutions.md", -"redirect_url": "/windows/application-management/app-v/appv-planning-to-deploy-appv-with-electronic-software-distribution-solutions", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-planning-to-deploy-appv.md", -"redirect_url": "/windows/application-management/app-v/appv-planning-to-deploy-appv", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-preparing-your-environment.md", -"redirect_url": "/windows/application-management/app-v/appv-preparing-your-environment", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-prerequisites.md", -"redirect_url": "/windows/application-management/app-v/appv-prerequisites", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-publish-a-connection-group.md", -"redirect_url": "/windows/application-management/app-v/appv-publish-a-connection-group", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-publish-a-packages-with-the-management-console.md", -"redirect_url": "/windows/application-management/app-v/appv-publish-a-packages-with-the-management-console", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-register-and-unregister-a-publishing-server-with-the-management-console.md", -"redirect_url": "/windows/application-management/app-v/appv-register-and-unregister-a-publishing-server-with-the-management-console", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-release-notes-for-appv-for-windows-1703.md", -"redirect_url": "/windows/application-management/app-v/appv-release-notes-for-appv-for-windows-1703", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-release-notes-for-appv-for-windows.md", -"redirect_url": "/windows/application-management/app-v/appv-release-notes-for-appv-for-windows", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-reporting.md", -"redirect_url": "/windows/application-management/app-v/appv-reporting", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-running-locally-installed-applications-inside-a-virtual-environment.md", -"redirect_url": "/windows/application-management/app-v/appv-running-locally-installed-applications-inside-a-virtual-environment", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-security-considerations.md", -"redirect_url": "/windows/application-management/app-v/appv-security-considerations", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-sequence-a-new-application.md", -"redirect_url": "/windows/application-management/app-v/appv-sequence-a-new-application", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-sequence-a-package-with-powershell.md", -"redirect_url": "/windows/application-management/app-v/appv-sequence-a-package-with-powershell", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-supported-configurations.md", -"redirect_url": "/windows/application-management/app-v/appv-supported-configurations", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-technical-reference.md", -"redirect_url": "/windows/application-management/app-v/appv-technical-reference", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-transfer-access-and-configurations-to-another-version-of-a-package-with-the-management-console.md", -"redirect_url": "/windows/application-management/app-v/appv-transfer-access-and-configurations-to-another-version-of-a-package-with-the-management-console", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-troubleshooting.md", -"redirect_url": "/windows/application-management/app-v/appv-troubleshooting", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-upgrading-to-app-v-for-windows-10-from-an-existing-installation.md", -"redirect_url": "/windows/application-management/app-v/appv-upgrading-to-app-v-for-windows-10-from-an-existing-installation", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-using-the-client-management-console.md", -"redirect_url": "/windows/application-management/app-v/appv-using-the-client-management-console", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-view-and-configure-applications-and-default-virtual-application-extensions-with-the-management-console.md", -"redirect_url": "/windows/application-management/app-v/appv-view-and-configure-applications-and-default-virtual-application-extensions-with-the-management-console", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-viewing-appv-server-publishing-metadata.md", -"redirect_url": "/windows/application-management/app-v/appv-viewing-appv-server-publishing-metadata", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/assign-apps-to-employees.md", -"redirect_url": "/microsoft-store/assign-apps-to-employees", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/configure-mdm-provider-windows-store-for-business.md", -"redirect_url": "/microsoft-store/configure-mdm-provider-windows-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "store-for-business/configure-mdm-provider-windows-store-for-business.md", -"redirect_url": "/microsoft-store/configure-mdm-provider-microsoft-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/connect-to-remote-aadj-pc.md", -"redirect_url": "/windows/client-management/connect-to-remote-aadj-pc", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/device-guard-signing-portal.md", -"redirect_url": "/microsoft-store/device-guard-signing-portal", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/distribute-apps-from-your-private-store.md", -"redirect_url": "/microsoft-store/distribute-apps-from-your-private-store", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/distribute-apps-to-your-employees-windows-store-for-business.md", -"redirect_url": "/microsoft-store/distribute-apps-to-your-employees-windows-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "store-for-business/distribute-apps-to-your-employees-windows-store-for-business.md", -"redirect_url": "/microsoft-store/distribute-apps-to-your-employees-microsoft-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/distribute-apps-with-management-tool.md", -"redirect_url": "/microsoft-store/distribute-apps-with-management-tool", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/distribute-offline-apps.md", -"redirect_url": "/microsoft-store/distribute-offline-apps", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/find-and-acquire-apps-overview.md", -"redirect_url": "/microsoft-store/find-and-acquire-apps-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/group-policies-for-enterprise-and-education-editions.md", -"redirect_url": "/windows/client-management/group-policies-for-enterprise-and-education-editions", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/join-windows-10-mobile-to-azure-active-directory.md", -"redirect_url": "/windows/client-management/join-windows-10-mobile-to-azure-active-directory", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/manage-access-to-private-store.md", -"redirect_url": "/microsoft-store/manage-access-to-private-store", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/manage-apps-windows-store-for-business-overview.md", -"redirect_url": "/microsoft-store/manage-apps-windows-store-for-business-overview", -"redirect_document_id": true -}, -{ -"source_path": "store-for-business/manage-apps-windows-store-for-business-overview.md", -"redirect_url": "/microsoft-store/manage-apps-microsoft-store-for-business-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/manage-corporate-devices.md", -"redirect_url": "/windows/client-management/index", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/manage-orders-windows-store-for-business.md", -"redirect_url": "/microsoft-store/manage-orders-windows-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "store-for-business/manage-orders-windows-store-for-business.md", -"redirect_url": "/microsoft-store/manage-orders-microsoft-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/manage-private-store-settings.md", -"redirect_url": "/microsoft-store/manage-private-store-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/manage-settings-windows-store-for-business.md", -"redirect_url": "/microsoft-store/manage-settings-windows-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "store-for-business/manage-settings-windows-store-for-business.md", -"redirect_url": "/microsoft-store/manage-settings-microsoft-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/manage-users-and-groups-windows-store-for-business.md", -"redirect_url": "/microsoft-store/manage-users-and-groups-windows-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "store-for-business/manage-users-and-groups-windows-store-for-business.md", -"redirect_url": "/microsoft-store/manage-users-and-groups-microsoft-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/manage-windows-10-in-your-organization-modern-management.md", -"redirect_url": "/windows/client-management/manage-windows-10-in-your-organization-modern-management", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/mandatory-user-profile.md", -"redirect_url": "/windows/client-management/mandatory-user-profile", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/new-policies-for-windows-10.md", -"redirect_url": "/windows/client-management/new-policies-for-windows-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/prerequisites-windows-store-for-business.md", -"redirect_url": "/microsoft-store/prerequisites-windows-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "store-for-business/prerequisites-windows-store-for-business.md", -"redirect_url": "/microsoft-store/prerequisites-microsoft-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/reset-a-windows-10-mobile-device.md", -"redirect_url": "/windows/client-management/reset-a-windows-10-mobile-device", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/roles-and-permissions-windows-store-for-business.md", -"redirect_url": "/microsoft-store/roles-and-permissions-windows-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "store-for-business/roles-and-permissions-windows-store-for-business.md", -"redirect_url": "/microsoft-store/roles-and-permissions-microsoft-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/settings-reference-windows-store-for-business.md", -"redirect_url": "/microsoft-store/settings-reference-windows-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "store-for-business/settings-reference-windows-store-for-business.md", -"redirect_url": "/microsoft-store/settings-reference-microsoft-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/sign-code-integrity-policy-with-device-guard-signing.md", -"redirect_url": "/microsoft-store/sign-code-integrity-policy-with-device-guard-signing", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/sign-up-windows-store-for-business-overview.md", -"redirect_url": "/microsoft-store/sign-up-windows-store-for-business-overview", -"redirect_document_id": true -}, -{ -"source_path": "store-for-business/sign-up-windows-store-for-business-overview.md", -"redirect_url": "/microsoft-store/sign-up-microsoft-store-for-business-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/sign-up-windows-store-for-business.md", -"redirect_url": "/microsoft-store/sign-up-windows-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "store-for-business/sign-up-windows-store-for-business.md", -"redirect_url": "/microsoft-store/sign-up-microsoft-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/troubleshoot-windows-store-for-business.md", -"redirect_url": "/microsoft-store/troubleshoot-windows-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "store-for-business/troubleshoot-windows-store-for-business.md", -"redirect_url": "/microsoft-store/troubleshoot-microsoft-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-administering-uev-with-windows-powershell-and-wmi.md", -"redirect_url": "/windows/configuration/ue-v/uev-administering-uev-with-windows-powershell-and-wmi", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-administering-uev.md", -"redirect_url": "/windows/configuration/ue-v/uev-administering-uev", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-application-template-schema-reference.md", -"redirect_url": "/windows/configuration/ue-v/uev-application-template-schema-reference", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-changing-the-frequency-of-scheduled-tasks.md", -"redirect_url": "/windows/configuration/ue-v/uev-changing-the-frequency-of-scheduled-tasks", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-configuring-uev-with-group-policy-objects.md", -"redirect_url": "/windows/configuration/ue-v/uev-configuring-uev-with-group-policy-objects", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-configuring-uev-with-system-center-configuration-manager.md", -"redirect_url": "/windows/configuration/ue-v/uev-configuring-uev-with-system-center-configuration-manager", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-deploy-required-features.md", -"redirect_url": "/windows/configuration/ue-v/uev-deploy-required-features", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-deploy-uev-for-custom-applications.md", -"redirect_url": "/windows/configuration/ue-v/uev-deploy-uev-for-custom-applications", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-for-windows.md", -"redirect_url": "/windows/configuration/ue-v/uev-for-windows", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-getting-started.md", -"redirect_url": "/windows/configuration/ue-v/uev-getting-started", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-manage-administrative-backup-and-restore.md", -"redirect_url": "/windows/configuration/ue-v/uev-manage-administrative-backup-and-restore", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-manage-configurations.md", -"redirect_url": "/windows/configuration/ue-v/uev-manage-configurations", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-managing-settings-location-templates-using-windows-powershell-and-wmi.md", -"redirect_url": "/windows/configuration/ue-v/uev-managing-settings-location-templates-using-windows-powershell-and-wmi", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-managing-uev-agent-and-packages-with-windows-powershell-and-wmi.md", -"redirect_url": "/windows/configuration/ue-v/uev-managing-uev-agent-and-packages-with-windows-powershell-and-wmi", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-migrating-settings-packages.md", -"redirect_url": "/windows/configuration/ue-v/uev-migrating-settings-packages", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-prepare-for-deployment.md", -"redirect_url": "/windows/configuration/ue-v/uev-prepare-for-deployment", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-release-notes-1607.md", -"redirect_url": "/windows/configuration/ue-v/uev-release-notes-1607", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-security-considerations.md", -"redirect_url": "/windows/configuration/ue-v/uev-security-considerations", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-sync-methods.md", -"redirect_url": "/windows/configuration/ue-v/uev-sync-methods", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-sync-trigger-events.md", -"redirect_url": "/windows/configuration/ue-v/uev-sync-trigger-events", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-synchronizing-microsoft-office-with-uev.md", -"redirect_url": "/windows/configuration/ue-v/uev-synchronizing-microsoft-office-with-uev", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-technical-reference.md", -"redirect_url": "/windows/configuration/ue-v/uev-technical-reference", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-troubleshooting.md", -"redirect_url": "/windows/configuration/ue-v/uev-troubleshooting", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-upgrade-uev-from-previous-releases.md", -"redirect_url": "/windows/configuration/ue-v/uev-upgrade-uev-from-previous-releases", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-using-uev-with-application-virtualization-applications.md", -"redirect_url": "/windows/configuration/ue-v/uev-using-uev-with-application-virtualization-applications", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-whats-new-in-uev-for-windows.md", -"redirect_url": "/windows/configuration/ue-v/uev-whats-new-in-uev-for-windows", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-working-with-custom-templates-and-the-uev-generator.md", -"redirect_url": "/windows/configuration/ue-v/uev-working-with-custom-templates-and-the-uev-generator", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/update-windows-store-for-business-account-settings.md", -"redirect_url": "/microsoft-store/update-windows-store-for-business-account-settings", -"redirect_document_id": true -}, -{ -"source_path": "store-for-business/update-windows-store-for-business-account-settings.md", -"redirect_url": "/microsoft-store/update-microsoft-store-for-business-account-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/windows-10-mobile-and-mdm.md", -"redirect_url": "/windows/client-management/windows-10-mobile-and-mdm", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/windows-libraries.md", -"redirect_url": "/windows/client-management/windows-libraries", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/windows-store-for-business-overview.md", -"redirect_url": "/microsoft-store/windows-store-for-business-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/working-with-line-of-business-apps.md", -"redirect_url": "/microsoft-store/working-with-line-of-business-apps", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/act-technical-reference.md", -"redirect_url": "/windows/deployment/planning/act-technical-reference", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/applying-filters-to-data-in-the-sua-tool.md", -"redirect_url": "/windows/deployment/planning/applying-filters-to-data-in-the-sua-tool", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/available-data-types-and-operators-in-compatibility-administrator.md", -"redirect_url": "/windows/deployment/planning/available-data-types-and-operators-in-compatibility-administrator", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/best-practice-recommendations-for-windows-to-go.md", -"redirect_url": "/windows/deployment/planning/best-practice-recommendations-for-windows-to-go", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/change-history-for-plan-for-windows-10-deployment.md", -"redirect_url": "/windows/deployment/planning/change-history-for-plan-for-windows-10-deployment", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/compatibility-administrator-users-guide.md", -"redirect_url": "/windows/deployment/planning/compatibility-administrator-users-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/compatibility-fix-database-management-strategies-and-deployment.md", -"redirect_url": "/windows/deployment/planning/compatibility-fix-database-management-strategies-and-deployment", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/compatibility-fixes-for-windows-8-windows-7-and-windows-vista.md", -"redirect_url": "/windows/deployment/planning/compatibility-fixes-for-windows-8-windows-7-and-windows-vista", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/creating-a-custom-compatibility-fix-in-compatibility-administrator.md", -"redirect_url": "/windows/deployment/planning/creating-a-custom-compatibility-fix-in-compatibility-administrator", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/creating-a-custom-compatibility-mode-in-compatibility-administrator.md", -"redirect_url": "/windows/deployment/planning/creating-a-custom-compatibility-mode-in-compatibility-administrator", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/creating-an-apphelp-message-in-compatibility-administrator.md", -"redirect_url": "/windows/deployment/planning/creating-an-apphelp-message-in-compatibility-administrator", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/deployment-considerations-for-windows-to-go.md", -"redirect_url": "/windows/deployment/planning/deployment-considerations-for-windows-to-go", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/device-dialog-box.md", -"redirect_url": "/windows/deployment/planning/device-dialog-box", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/enabling-and-disabling-compatibility-fixes-in-compatibility-administrator.md", -"redirect_url": "/windows/deployment/planning/enabling-and-disabling-compatibility-fixes-in-compatibility-administrator", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/fixing-applications-by-using-the-sua-tool.md", -"redirect_url": "/windows/deployment/planning/fixing-applications-by-using-the-sua-tool", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/installing-and-uninstalling-custom-compatibility-databases-in-compatibility-administrator.md", -"redirect_url": "/windows/deployment/planning/installing-and-uninstalling-custom-compatibility-databases-in-compatibility-administrator", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/managing-application-compatibility-fixes-and-custom-fix-databases.md", -"redirect_url": "/windows/deployment/planning/managing-application-compatibility-fixes-and-custom-fix-databases", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/prepare-your-organization-for-windows-to-go.md", -"redirect_url": "/windows/deployment/planning/prepare-your-organization-for-windows-to-go", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/searching-for-fixed-applications-in-compatibility-administrator.md", -"redirect_url": "/windows/deployment/planning/searching-for-fixed-applications-in-compatibility-administrator", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/searching-for-installed-compatibility-fixes-with-the-query-tool-in-compatibility-administrator.md", -"redirect_url": "/windows/deployment/planning/searching-for-installed-compatibility-fixes-with-the-query-tool-in-compatibility-administrator", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/security-and-data-protection-considerations-for-windows-to-go.md", -"redirect_url": "/windows/deployment/planning/security-and-data-protection-considerations-for-windows-to-go", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/showing-messages-generated-by-the-sua-tool.md", -"redirect_url": "/windows/deployment/planning/showing-messages-generated-by-the-sua-tool", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/sua-users-guide.md", -"redirect_url": "/windows/deployment/planning/sua-users-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/tabs-on-the-sua-tool-interface.md", -"redirect_url": "/windows/deployment/planning/tabs-on-the-sua-tool-interface", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/testing-your-application-mitigation-packages.md", -"redirect_url": "/windows/deployment/planning/testing-your-application-mitigation-packages", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/understanding-and-using-compatibility-fixes.md", -"redirect_url": "/windows/deployment/planning/understanding-and-using-compatibility-fixes", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/using-the-compatibility-administrator-tool.md", -"redirect_url": "/windows/deployment/planning/using-the-compatibility-administrator-tool", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/using-the-sdbinstexe-command-line-tool.md", -"redirect_url": "/windows/deployment/planning/using-the-sdbinstexe-command-line-tool", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/using-the-sua-tool.md", -"redirect_url": "/windows/deployment/planning/using-the-sua-tool", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/using-the-sua-wizard.md", -"redirect_url": "/windows/deployment/planning/using-the-sua-wizard", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/viewing-the-events-screen-in-compatibility-administrator.md", -"redirect_url": "/windows/deployment/planning/viewing-the-events-screen-in-compatibility-administrator", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/windows-10-compatibility.md", -"redirect_url": "/windows/deployment/planning/windows-10-compatibility", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/windows-10-deployment-considerations.md", -"redirect_url": "/windows/deployment/planning/windows-10-deployment-considerations", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/windows-10-enterprise-faq-itpro.md", -"redirect_url": "/windows/deployment/planning/windows-10-enterprise-faq-itpro", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/windows-10-infrastructure-requirements.md", -"redirect_url": "/windows/deployment/planning/windows-10-infrastructure-requirements", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/windows-to-go-frequently-asked-questions.md", -"redirect_url": "/windows/deployment/planning/windows-to-go-frequently-asked-questions", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/windows-to-go-overview.md", -"redirect_url": "/windows/deployment/planning/windows-to-go-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/change-history-for-update-windows-10.md", -"redirect_url": "/windows/deployment/update/change-history-for-update-windows-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/update-compliance-get-started.md", -"redirect_url": "/windows/deployment/update/update-compliance-get-started", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/update-compliance-monitor.md", -"redirect_url": "/windows/deployment/update/update-compliance-monitor", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/update-compliance-using.md", -"redirect_url": "/windows/deployment/update/update-compliance-using", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/waas-branchcache.md", -"redirect_url": "/windows/deployment/update/waas-branchcache", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/waas-configure-wufb.md", -"redirect_url": "/windows/deployment/update/waas-configure-wufb", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/waas-delivery-optimization.md", -"redirect_url": "/windows/deployment/update/waas-delivery-optimization", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/waas-deployment-rings-windows-10-updates.md", -"redirect_url": "/windows/deployment/update/waas-deployment-rings-windows-10-updates", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/waas-integrate-wufb.md", -"redirect_url": "/windows/deployment/update/waas-integrate-wufb", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/waas-manage-updates-configuration-manager.md", -"redirect_url": "/windows/deployment/update/waas-manage-updates-configuration-manager", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/waas-manage-updates-wsus.md", -"redirect_url": "/windows/deployment/update/waas-manage-updates-wsus", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/waas-manage-updates-wufb.md", -"redirect_url": "/windows/deployment/update/waas-manage-updates-wufb", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/waas-mobile-updates.md", -"redirect_url": "/windows/deployment/update/waas-mobile-updates", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/waas-optimize-windows-10-updates.md", -"redirect_url": "/windows/deployment/update/waas-optimize-windows-10-updates", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/waas-overview.md", -"redirect_url": "/windows/deployment/update/waas-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/waas-quick-start.md", -"redirect_url": "/windows/deployment/update/waas-quick-start", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/waas-restart.md", -"redirect_url": "/windows/deployment/update/waas-restart", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/waas-servicing-branches-windows-10-updates.md", -"redirect_url": "/windows/deployment/update/waas-servicing-branches-windows-10-updates", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/waas-servicing-strategy-windows-10-updates.md", -"redirect_url": "/windows/deployment/update/waas-servicing-strategy-windows-10-updates", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/waas-windows-insider-for-business-aad.md", -"redirect_url": "/windows/deployment/update/waas-windows-insider-for-business-aad", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/waas-windows-insider-for-business.md", -"redirect_url": "/windows/deployment/update/waas-windows-insider-for-business", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/waas-wufb-group-policy.md", -"redirect_url": "/windows/deployment/update/waas-wufb-group-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/waas-wufb-intune.md", -"redirect_url": "/windows/deployment/update/waas-wufb-intune", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/manage-settings-app-with-group-policy.md", -"redirect_url": "/windows/client-management/manage-settings-app-with-group-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/client-management/mdm/create-a-custom-configuration-service-provider.md", -"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference", -"redirect_document_id": true -}, -{ -"source_path": "windows/client-management/mdm/design-a-custom-windows-csp.md", -"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference", -"redirect_document_id": false -}, -{ -"source_path": "windows/client-management/mdm/iconfigserviceprovider2.md", -"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference", -"redirect_document_id": false -}, -{ -"source_path": "windows/client-management/mdm/iconfigserviceprovider2configmanagernotification.md", -"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference", -"redirect_document_id": false -}, -{ -"source_path": "windows/client-management/mdm/iconfigserviceprovider2getnode.md", -"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference", -"redirect_document_id": false -}, -{ -"source_path": "windows/client-management/mdm/icspnode.md", -"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference", -"redirect_document_id": false -}, -{ -"source_path": "windows/client-management/mdm/icspnodeadd.md", -"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference", -"redirect_document_id": false -}, -{ -"source_path": "windows/client-management/mdm/icspnodeclear.md", -"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference", -"redirect_document_id": false -}, -{ -"source_path": "windows/client-management/mdm/icspnodecopy.md", -"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference", -"redirect_document_id": false -}, -{ -"source_path": "windows/client-management/mdm/icspnodedeletechild.md", -"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference", -"redirect_document_id": false -}, -{ -"source_path": "windows/client-management/mdm/icspnodedeleteproperty.md", -"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference", -"redirect_document_id": false -}, -{ -"source_path": "windows/client-management/mdm/icspnodeexecute.md", -"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference", -"redirect_document_id": false -}, -{ -"source_path": "windows/client-management/mdm/icspnodegetchildnodenames.md", -"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference", -"redirect_document_id": false -}, -{ -"source_path": "windows/client-management/mdm/icspnodegetproperty.md", -"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference", -"redirect_document_id": false -}, -{ -"source_path": "windows/client-management/mdm/icspnodegetpropertyidentifiers.md", -"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference", -"redirect_document_id": false -}, -{ -"source_path": "windows/client-management/mdm/icspnodegetvalue.md", -"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference", -"redirect_document_id": false -}, -{ -"source_path": "windows/client-management/mdm/icspnodemove.md", -"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference", -"redirect_document_id": false -}, -{ -"source_path": "windows/client-management/mdm/icspnodesetproperty.md", -"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference", -"redirect_document_id": false -}, -{ -"source_path": "windows/client-management/mdm/icspnodesetvalue.md", -"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference", -"redirect_document_id": false -}, -{ -"source_path": "windows/client-management/mdm/icspnodetransactioning.md", -"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference", -"redirect_document_id": false -}, -{ -"source_path": "windows/client-management/mdm/icspvalidate.md", -"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference", -"redirect_document_id": false -}, -{ -"source_path": "windows/client-management/mdm/samples-for-writing-a-custom-configuration-service-provider.md", -"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference", -"redirect_document_id": false -}, -{ -"source_path": "windows/keep-secure/collect-wip-audit-event-logs.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/collect-wip-audit-event-logs", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/deploy-managed-installer-for-device-guard.md", -"redirect_url": "/windows/device-security/device-guard/deploy-managed-installer-for-device-guard", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-readiness-data-sharing.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-data-sharing", -"redirect_document_id": true -}, -{ -"source_path": "windows/index.md", -"redirect_url": "/windows/windows-10/index", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/index.md", -"redirect_url": "/windows/windows-10/index", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/index.md", -"redirect_url": "/windows/deployment/index", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/index.md", -"redirect_url": "/windows/deployment/planning/index", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/index.md", -"redirect_url": "/windows/windows-10/index", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/windows-store-for-business.md", -"redirect_url": "/microsoft-store/index", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/index.md", -"redirect_url": "/windows/deployment/update/index", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/index.md", -"redirect_url": "/windows/configuration/index", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/security-technologies.md", -"redirect_url": "/windows/windows-10/index", -"redirect_document_id": true -}, -{ -"source_path": "education/get-started/index.md", -"redirect_url": "/education/get-started/get-started-with-microsoft-education", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/windows-10-enterprise-security-guides.md", -"redirect_url": "/windows/windows-10/index", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/change-history-for-keep-windows-10-secure.md", -"redirect_url": "/windows/windows-10/index", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/change-history-for-manage-and-update-windows-10.md", -"redirect_url": "/windows/windows-10/index", -"redirect_document_id": true -}, -{ -"source_path": "windows/deployment/update/waas-servicing-branches-windows-10-updates.md", -"redirect_url": "/windows/deployment/update/waas-servicing-channels-windows-10-updates", -"redirect_document_id": true -}, -{ -"source_path": "windows/deployment/windows-10-enterprise-activation-subscription.md", -"redirect_url": "/windows/deployment/windows-10-enterprise-subscription-activation", -"redirect_document_id": true -}, -{ -"source_path": "windows/deployment/windows-10-auto-pilot.md", -"redirect_url": "/windows/deployment/windows-autopilot/windows-10-autopilot", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/threat-analytics-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/threat-analytics-dashboard-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/privacy/basic-level-windows-diagnostic-events-and-fields.md", -"redirect_url": "/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903", -"redirect_document_id": true -}, -{ -"source_path": "windows/configuration/basic-level-windows-diagnostic-events-and-fields-1703.md", -"redirect_url": "/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703", -"redirect_document_id": true -}, -{ -"source_path": "windows/configuration/basic-level-windows-diagnostic-events-and-fields-1709.md", -"redirect_url": "/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709", -"redirect_document_id": true -}, -{ -"source_path": "windows/configuration/basic-level-windows-diagnostic-events-and-fields.md", -"redirect_url": "/windows/privacy/basic-level-windows-diagnostic-events-and-fields", -"redirect_document_id": true -}, -{ -"source_path": "windows/configuration/configure-windows-diagnostic-data-in-your-organization.md", -"redirect_url": "/windows/privacy/configure-windows-diagnostic-data-in-your-organization", -"redirect_document_id": true -}, -{ -"source_path": "windows/configuration/diagnostic-data-viewer-overview.md", -"redirect_url": "/windows/privacy/diagnostic-data-viewer-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/configuration/enhanced-diagnostic-data-windows-analytics-events-and-fields.md", -"redirect_url": "/windows/privacy/enhanced-diagnostic-data-windows-analytics-events-and-fields", -"redirect_document_id": true -}, -{ -"source_path": "windows/configuration/gdpr-win10-whitepaper.md", -"redirect_url": "/windows/privacy/gdpr-win10-whitepaper", -"redirect_document_id": true -}, -{ -"source_path": "windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services.md", -"redirect_url": "/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services", -"redirect_document_id": true -}, -{ -"source_path": "windows/configuration/manage-windows-endpoints-version-1709.md", -"redirect_url": "/windows/privacy/manage-windows-endpoints", -"redirect_document_id": true -}, -{ -"source_path": "windows/configuration/windows-diagnostic-data-1703.md", -"redirect_url": "/windows/privacy/windows-diagnostic-data-1703", -"redirect_document_id": true -}, -{ -"source_path": "windows/configuration/windows-diagnostic-data.md", -"redirect_url": "/windows/privacy/windows-diagnostic-data", -"redirect_document_id": true -}, -{ -"source_path": "windows/deployment/upgrade/windows-10-edition-downgrades.md", -"redirect_url": "/windows/deployment/upgrade/windows-10-edition-upgrades", -"redirect_document_id": true -}, -{ -"source_path": "education/windows/windows-automatic-redeployment.md", -"redirect_url": "/education/windows/autopilot-reset", -"redirect_document_id": true -}, -{ -"source_path": "windows/deployment/windows-autopilot/windows-10-autopilot.md", -"redirect_url": "/windows/deployment/windows-autopilot/windows-autopilot", -"redirect_document_id": true -}, -{ -"source_path": "windows/privacy/manage-windows-endpoints.md", -"redirect_url": "/windows/privacy/manage-windows-1809-endpoints", -"redirect_document_id": true -}, -{ -"source_path":"windows/security/threat-protection/windows-defender-atp/exposed-apis-create-app-nativeapp.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-nativeapp", -"redirect_document_id": false -}, -{ -"source_path":"windows/security/threat-protection/windows-defender-atp/exposed-apis-create-app-webapp.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-webapp", -"redirect_document_id": false - }, -{ -"source_path":"windows/security/threat-protection/windows-defender-atp/exposed-apis-full-sample-powershell.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-full-sample-powershell", -"redirect_document_id": false -}, -{ -"source_path":"windows/security/threat-protection/windows-defender-atp/exposed-apis-list.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-list", -"redirect_document_id": false -}, -{ -"source_path":"windows/security/threat-protection/windows-defender-atp/exposed-apis-odata-samples.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-odata-samples", -"redirect_document_id": false -}, -{ -"source_path":"windows/security/threat-protection/windows-defender-atp/exposed-apis-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/supported-apis-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-actor-information-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-actor-related-alerts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-alerts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-alerts-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alerts", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-info-by-id", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-actor-info-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-domain-info", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-files-info", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-ip-info", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-machine-info", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-domain-statistics-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-domain-statistics", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/is-domain-seen-in-org", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/block-file-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-file-information", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-file-related-alerts", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-file-related-machines", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-file-statistics", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-fileactions-collection-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/unblock-file-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-machines", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-ip-statistics", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/is-ip-seen-org", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/find-machine-info-by-ip", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-filemachineaction-object", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-filemachineactions-collection-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-filemachineactions-collection-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-filemachineactions-collection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/get-machineaction-object", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-machineaction-object.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machineaction-object", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/get-machineactions-collection", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-machineactions-collection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machineactions-collection", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-machines-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-machines-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machines", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-started.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-started", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/microsoft-defender-atp/get-started.md", -"redirect_url": "/windows/security/threat-protection/index.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-package-sas-uri", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/machine-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machine", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/isolate-machine", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/unisolate-machine", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/unrestrict-code-execution", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/request-sample-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/restrict-code-execution", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/run-advanced-query-api.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-api", -"redirect_document_id": true -}, -{ - "source_path": "windows/security/threat-protection/windows-defender-atp/api-microsoft-flow.md", - "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow", - "redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/run-advanced-query-sample-power-bi-app-token.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-power-bi-app-token", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-power-bi-app-token.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/api-power-bi", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/run-advanced-query-sample-powershell.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-powershell", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/run-advanced-query-sample-python.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-python", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-av-scan", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/stop-and-quarantine-file-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/stop-and-quarantine-file-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/stop-and-quarantine-file", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-user-info", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-ti-indicators-collection-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-ti-indicators-collection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-user-information-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-user-information-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-user-information", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-user-related-alerts", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/initiate-autoir-investigation-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-ti-indicator-by-id-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/threat-analytics-dashboard-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/threat-analytics", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/threat-analytics.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/threat-analytics", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/threat-and-vuln-mgt-scenarios.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/add-or-remove-machine-tags-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/alerts-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/alerts", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/create-alert-by-reference-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/delete-ti-indicator-by-id-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/files-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/files", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/find-machines-by-ip-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/find-machines-by-ip", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/microsoft-defender-atp/is-domain-seen-in-org.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/microsoft-defender-atp/get-ip-related-machines.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp/is-ip-seen-org.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp/exposed-apis-list", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/machineaction-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machineaction", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/machineactionsnote.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machineactionsnote", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/offboard-machine-api-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/offboard-machine-api", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/post-ti-indicator-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/post-ti-indicator", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/ti-indicator-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/ti-indicator", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/update-alert-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/update-alert", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/incidents-queue.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/incidents-queue", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/microsoft-defender-atp/incidents-queue.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/view-incidents-queue", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/troubleshoot-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-mdatp", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/microsoft-defender-atp/troubleshoot-overview.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-mdatp", -"redirect_document_id": true -}, -{ -"source_path":"windows/security/threat-protection/windows-defender-atp/use-apis.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/user-alert-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/user", -"source_path": "windows/deployment/planning/windows-10-fall-creators-deprecation.md", -"redirect_url": "/windows/deployment/planning/windows-10-1709-removed-features", -"redirect_document_id": true -}, -{ -"source_path": "windows/deployment/planning/windows-10-creators-update-deprecation.md", -"redirect_url": "/windows/deployment/planning/windows-10-1703-removed-features", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/manage-allowed-blocked-list-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/manage-allowed-blocked-list", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/manage-allowed-blocked-list.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-allowed-blocked-list", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/microsoft-defender-atp/manage-allowed-blocked-list.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-indicators", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/manage-indicators-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/manage-indicators", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/manage-indicators.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-allowed-blocked-list", -"redirect_document_id": false -}, -{ -"source_path": "windows/deployment/windows-10-enterprise-subscription-activation.md", -"redirect_url": "/windows/deployment/windows-10-subscription-activation", -"redirect_document_id": true -}, -{ -"source_path": "windows/hub/windows-10-landing.yml", -"redirect_url": "/windows/windows-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/improverequestperformance-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/improve-request-performance", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts", -"redirect_document_id": true -}, -{ -"source_path": "windows/deployment/windows-autopilot/windows-autopilot-requirements-network.md", -"redirect_url": "/windows/deployment/windows-autopilot/windows-autopilot-requirements#networking-requirements", -"redirect_document_id": true -}, -{ -"source_path": "windows/deployment/windows-autopilot/windows-autopilot-requirements-licensing.md", -"redirect_url": "/windows/deployment/windows-autopilot/windows-autopilot-requirements#licensing-requirements", -"redirect_document_id": true -}, -{ -"source_path": "windows/deployment/windows-autopilot/windows-autopilot-requirements-configuration.md", -"redirect_url": "/windows/deployment/windows-autopilot/windows-autopilot-requirements#configuration-requirements", -"redirect_document_id": true -}, -{ -"source_path": "windows/deployment/windows-autopilot/user-driven-aad.md", -"redirect_url": "/windows/deployment/windows-autopilot/user-driven#user-driven-mode-for-azure-active-directory-join", -"redirect_document_id": true -}, -{ -"source_path": "windows/deployment/windows-autopilot/user-driven-hybrid.md", -"redirect_url": "/windows/deployment/windows-autopilot/user-driven#user-driven-mode-for-hybrid-azure-active-directory-join", -"redirect_document_id": true -}, -{ -"source_path": "windows/deployment/windows-autopilot/intune-connector.md", -"redirect_url": "https://docs.microsoft.com/intune/windows-autopilot-hybrid", -"redirect_document_id": true -}, -{ -"source_path": "windows/deployment/windows-autopilot/windows-autopilot-reset-remote.md", -"redirect_url": "/windows/deployment/windows-autopilot/windows-autopilot-reset#reset-devices-with-remote-windows-autopilot-reset", -"redirect_document_id": true -}, -{ -"source_path": "windows/deployment/windows-autopilot/windows-autopilot-reset-local.md", -"redirect_url": "/windows/deployment/windows-autopilot/windows-autopilot-reset#reset-devices-with-local-windows-autopilot-reset", -"redirect_document_id": true -}, -{ -"source_path": "windows/deployment/windows-autopilot/configure-autopilot.md", -"redirect_url": "/windows/deployment/windows-autopilot/add-devices", -"redirect_document_id": true -}, -{ -"source_path": "windows/deployment/windows-autopilot/administer.md", -"redirect_url": "/windows/deployment/windows-autopilot/add-devices#registering-devices", -"redirect_document_id": true -}, -{ -"source_path": "windows/hub/release-information.md", -"redirect_url": "/windows/release-information", -"redirect_document_id": true -}, -{ -"source_path": "windows/deployment/windows-10-architecture-posters.md", -"redirect_url": "/windows/deployment/windows-10-deployment-scenarios", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/index.md", -"redirect_url": "/windows/security/threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "browsers/internet-explorer/ie11-deploy-guide/group-policy-compatability-with-ie11.md", -"redirect_url": "/browsers/internet-explorer/ie11-deploy-guide/group-policy-compatibility-with-ie11", -"redirect_document_id": true -}, -{ -"source_path": "devices/surface/surface.yml", -"redirect_url": "/surface/get-started", -"redirect_document_id": true -} -] -} - - + }, + { + "source_path": "education/windows/swithc-to-pro-de.md", + "redirect_url": "/education/windows/switch-to-pro-education", + "redirect_document_id": false + }, + { + "source_path": "windows/client-management/mdm/policy-admx-backed.md", + "redirect_url": "/windows/client-management/mdm/policy-configuration-service-provider", + "redirect_document_id": true + }, + { + "source_path": "windows/client-management/mdm/policy-csp-location.md", + "redirect_url": "/windows/client-management/mdm/policy-configuration-service-provider", + "redirect_document_id": false + }, + { + "source_path": "windows/keep-secure/add-apps-to-protected-list-using-custom-uri.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/create-wip-policy-using-intune", + "redirect_document_id": false + }, + { + "source_path": "windows/keep-secure/configure-windows-defender-in-windows-10.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/enable-pua-windows-defender-for-windows-10.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/get-started-with-windows-defender-for-windows-10.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus", + "redirect_document_id": false + }, + { + "source_path": "windows/keep-secure/run-cmd-scan-windows-defender-for-windows-10.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/use-powershell-cmdlets-windows-defender-for-windows-10.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/windows-defender-block-at-first-sight.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/windows-defender-in-windows-10.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/windows-defender-enhanced-notifications.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/cortana-at-work-scenario-7.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-7", + "redirect_document_id": true + }, + { + "source_path": "devices/surface/surface-diagnostic-toolkit.md", + "redirect_url": "/surface/index", + "redirect_document_id": true + }, + { + "source_path": "devices/surface/manage-surface-dock-firmware-updates.md", + "redirect_url": "devices/surface/update", + "redirect_document_id": true + }, + { + "source_path": "devices/surface-hub/i-am-done-finishing-your-surface-hub-meeting.md", + "redirect_url": "/surface-hub/finishing-your-surface-hub-meeting", + "redirect_document_id": true + }, + { + "source_path": "devices/hololens/hololens-microsoft-layout-app.md", + "redirect_url": "/hololens/hololens-microsoft-dynamics-365-layout-app", + "redirect_document_id": true + }, + { + "source_path": "devices/hololens/hololens-microsoft-dynamics-365-layout-app.md", + "redirect_url": "https://docs.microsoft.com/dynamics365/mixed-reality/layout/", + "redirect_document_id": true + }, + { + "source_path": "devices/hololens/hololens-microsoft-remote-assist-app.md", + "redirect_url": "https://docs.microsoft.com/dynamics365/mixed-reality/remote-assist/", + "redirect_document_id": true + }, + { + "source_path": "devices/hololens/hololens-public-preview-apps.md", + "redirect_url": "https://docs.microsoft.com/dynamics365/#pivot=mixed-reality-apps", + "redirect_document_id": true + }, + { + "source_path": "devices/surface-hub/provisioning-packages-for-certificates-surface-hub.md", + "redirect_url": "/surface-hub/provisioning-packages-for-surface-hub", + "redirect_document_id": true + }, + { + "source_path": "devices/surface-hub/manage-settings-with-local-admin-account-surface-hub.md", + "redirect_url": "/surface-hub/admin-group-management-for-surface-hub", + "redirect_document_id": true + }, + { + "source_path": "devices/surface-hub/surface-hub-administrators-guide.md", + "redirect_url": "/surface-hub/index", + "redirect_document_id": true + }, + { + "source_path": "devices/surface-hub/intro-to-surface-hub.md", + "redirect_url": "/surface-hub/index", + "redirect_document_id": false + }, + { + "source_path": "windows/manage/waas-quick-start.md", + "redirect_url": "/windows/deployment/update/waas-quick-start", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/waas-overview.md", + "redirect_url": "/windows/deployment/update/waas-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/waas-servicing-strategy-windows-10-updates.md", + "redirect_url": "/windows/deployment/update/waas-servicing-strategy-windows-10-updates", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/waas-deployment-rings-windows-10-updates.md", + "redirect_url": "/windows/deployment/update/waas-deployment-rings-windows-10-updates", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/waas-servicing-branches-windows-10-updates.md", + "redirect_url": "/windows/deployment/update/waas-servicing-branches-windows-10-updates", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/update-compliance-monitor.md", + "redirect_url": "/windows/deployment/update/update-compliance-monitor", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/update-compliance-get-started.md", + "redirect_url": "/windows/deployment/update/update-compliance-get-started", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/update-compliance-using.md", + "redirect_url": "/windows/deployment/update/update-compliance-using", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/waas-optimize-windows-10-updates.md", + "redirect_url": "/windows/deployment/update/waas-optimize-windows-10-updates", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/waas-delivery-optimization.md", + "redirect_url": "/windows/deployment/update/waas-delivery-optimization", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/waas-branchcache.md", + "redirect_url": "/windows/deployment/update/waas-branchcache", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/waas-mobile-updates.md", + "redirect_url": "/windows/deployment/update/waas-mobile-updates", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/waas-manage-updates-wufb.md", + "redirect_url": "/windows/deployment/update/waas-manage-updates-wufb", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/waas-configure-wufb.md", + "redirect_url": "/windows/deployment/update/waas-configure-wufb", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/waas-integrate-wufb.md", + "redirect_url": "/windows/deployment/update/waas-integrate-wufb", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/waas-wufb-group-policy.md", + "redirect_url": "/windows/deployment/update/waas-wufb-group-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/waas-wufb-intune.md", + "redirect_url": "/windows/deployment/update/waas-wufb-intune.md", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/waas-manage-updates-wsus.md", + "redirect_url": "/windows/deployment/update/waas-manage-updates-wsus", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/waas-manage-updates-configuration-manager.md", + "redirect_url": "/windows/deployment/update/waas-manage-updates-configuration-manager", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/waas-restart.md", + "redirect_url": "/windows/deployment/update/waas-restart", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/waas-update-windows-10.md", + "redirect_url": "/windows/deployment/update/index", + "redirect_document_id": false + }, + { + "source_path": "windows/manage/configure-windows-telemetry-in-your-organization.md", + "redirect_url": "/windows/configuration/configure-windows-diagnostic-data-in-your-organization", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/lockdown-features-windows-10.md", + "redirect_url": "/windows/configuration/lockdown-features-windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/set-up-shared-or-guest-pc.md", + "redirect_url": "/windows/configuration/set-up-shared-or-guest-pc", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/manage-connections-from-windows-operating-system-components-to-microsoft-services.md", + "redirect_url": "/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services", + "redirect_document_id": false + }, + { + "source_path": "windows/manage/set-up-a-device-for-anyone-to-use.md", + "redirect_url": "/windows/configuration/kiosk-shared-pc", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/set-up-a-device-for-anyone-to-use.md", + "redirect_url": "/windows/configuration/kiosk-shared-pc", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/set-up-a-kiosk-for-windows-10-for-desktop-editions.md", + "redirect_url": "/windows/configuration/set-up-a-kiosk-for-windows-10-for-desktop-editions", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/guidelines-for-assigned-access-app.md", + "redirect_url": "/windows/configuration/guidelines-for-assigned-access-app", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/lock-down-windows-10-to-specific-apps.md", + "redirect_url": "/windows/configuration/lock-down-windows-10-to-specific-apps", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/set-up-a-kiosk-for-windows-10-for-mobile-edition.md", + "redirect_url": "/windows/configuration/mobile-devices/set-up-a-kiosk-for-windows-10-for-mobile-edition", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/lockdown-xml.md", + "redirect_url": "/windows/configuration/mobile-devices/lockdown-xml", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/settings-that-can-be-locked-down.md", + "redirect_url": "/windows/configuration/mobile-devices/settings-that-can-be-locked-down", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/product-ids-in-windows-10-mobile.md", + "redirect_url": "/windows/configuration/mobile-devices/product-ids-in-windows-10-mobile", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/manage-tips-and-suggestions.md", + "redirect_url": "/windows/configuration/manage-tips-and-suggestions", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/windows-10-start-layout-options-and-policies.md", + "redirect_url": "/windows/configuration/windows-10-start-layout-options-and-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/configure-windows-10-taskbar.md", + "redirect_url": "/windows/configuration//configure-windows-10-taskbar", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/customize-and-export-start-layout.md", + "redirect_url": "/windows/configuration//customize-and-export-start-layout", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/start-layout-xml-desktop.md", + "redirect_url": "/windows/configuration/start-layout-xml-desktop", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/start-layout-xml-mobile.md", + "redirect_url": "/windows/configuration/mobile-devices/start-layout-xml-mobile", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/customize-windows-10-start-screens-by-using-group-policy.md", + "redirect_url": "/windows/configuration/customize-windows-10-start-screens-by-using-group-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/customize-windows-10-start-screens-by-using-provisioning-packages-and-icd.md", + "redirect_url": "/windows/configuration/customize-windows-10-start-screens-by-using-provisioning-packages-and-icd", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/customize-windows-10-start-screens-by-using-mobile-device-management.md", + "redirect_url": "/windows/configuration/customize-windows-10-start-screens-by-using-mobile-device-management", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/cortana-at-work-testing-scenarios.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-testing-scenarios", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/cortana-at-work-scenario-1.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-1", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/cortana-at-work-scenario-2.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-2", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/cortana-at-work-scenario-3.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-3", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/cortana-at-work-scenario-4.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-4", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/cortana-at-work-scenario-5.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-5", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/cortana-at-work-scenario-6.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-6", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/cortana-at-work-o365.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-o365", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/cortana-at-work-crm.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-crm", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/cortana-at-work-powerbi.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-powerbi", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/cortana-at-work-voice-commands.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-voice-commands", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/cortana-at-work-policy-settings.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-policy-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/cortana-at-work-feedback.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-feedback", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/stop-employees-from-using-the-windows-store.md", + "redirect_url": "/windows/configuration/stop-employees-from-using-the-windows-store", + "redirect_document_id": true + }, + { + "source_path": "windows/configuration/stop-employees-from-using-the-windows-store.md", + "redirect_url": "/windows/configuration/stop-employees-from-using-microsoft-store", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/configure-devices-without-mdm.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-packages", + "redirect_document_id": false + }, + { + "source_path": "windows/manage/changes-to-start-policies-in-windows-10.md", + "redirect_url": "/windows/configuration/changes-to-start-policies-in-windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/how-it-pros-can-use-configuration-service-providers.md", + "redirect_url": "/windows/configuration/provisioning-packages/how-it-pros-can-use-configuration-service-providers", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/lock-down-windows-10.md", + "redirect_url": "/windows/configuration/index", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/manage-wifi-sense-in-enterprise.md", + "redirect_url": "/windows/configuration/manage-wifi-sense-in-enterprise", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/provisioning-packages.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-packages", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/provisioning-how-it-works.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-how-it-works", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/provisioning-install-icd.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-install-icd", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/provisioning-create-package.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-create-package", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/provisioning-apply-package.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-apply-package", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/provisioning-uninstall-package.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-uninstall-package", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/provision-pcs-for-initial-deployment.md", + "redirect_url": "/windows/configuration/provisioning-packages/provision-pcs-for-initial-deployment", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/provision-pcs-with-apps-and-certificates.md", + "redirect_url": "/windows/configuration/provisioning-packages/provision-pcs-with-apps", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/provisioning-script-to-install-app.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-script-to-install-app", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/provisioning-nfc.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-nfc", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/provisioning-command-line.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-command-line", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/provisioning-multivariant.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-multivariant", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-edp-policy-using-intune.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/create-wip-policy-using-intune", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-edp-policy-using-sccm.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/create-wip-policy-using-sccm", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-vpn-and-edp-policy-using-intune.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/hello-enable-phone-signin.md", + "redirect_url": "/windows/access-protection/hello-for-business/hello-identity-verification", + "redirect_document_id": false + }, + { + "source_path": "windows/keep-secure/deploy-edp-policy-using-intune.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/deploy-wip-policy-using-intune", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/guidance-and-best-practices-edp.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/guidance-and-best-practices-wip", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/overview-create-edp-policy.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/overview-create-wip-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/protect-enterprise-data-using-edp.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/protect-enterprise-data-using-wip", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/testing-scenarios-for-edp.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/testing-scenarios-for-wip", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/wip-enterprise-overview.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/protect-enterprise-data-using-wip", + "redirect_document_id": false + }, + { + "source_path": "windows/keep-secure/enlightened-microsoft-apps-and-edp.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/enlightened-microsoft-apps-and-wip", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/update-windows-10-images-with-provisioning-packages.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-packages", + "redirect_document_id": false + }, + { + "source_path": "windows/deploy/upgrade-analytics-prepare-your-environment.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-identify-apps", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-analytics-release-notes.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-requirements", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-analytics-review-site-discovery.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-additional-insights", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/ad-ds-schema-extensions-to-support-tpm-backup.md", + "redirect_url": "https://technet.microsoft.com/library/jj635854.aspx", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/creating-a-device-guard-policy-for-signed-apps.md", + "redirect_url": "/windows/device-security/device-guard/device-guard-deployment-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/device-guard-certification-and-compliance.md", + "redirect_url": "/windows/device-security/device-guard/device-guard-deployment-guide", + "redirect_document_id": false + }, + { + "source_path": "windows/keep-secure/enable-phone-signin-to-pc-and-vpn.md", + "redirect_url": "/windows/access-protection/hello-for-business/hello-enable-phone-signin", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/getting-apps-to-run-on-device-guard-protected-devices.md", + "redirect_url": "/windows/device-security/device-guard/device-guard-deployment-guide", + "redirect_document_id": false + }, + { + "source_path": "windows/keep-secure/implement-microsoft-passport-in-your-organization.md", + "redirect_url": "/windows/access-protection/hello-for-business/hello-manage-in-organization", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/manage-identity-verification-using-microsoft-passport.md", + "redirect_url": "/windows/access-protection/hello-for-business/hello-identity-verification", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/microsoft-passport-and-password-changes.md", + "redirect_url": "/windows/access-protection/hello-for-business/hello-and-password-changes", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/microsoft-passport-errors-during-pin-creation.md", + "redirect_url": "/windows/access-protection/hello-for-business/hello-errors-during-pin-creation", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/microsoft-passport-guide.md", + "redirect_url": "/windows/access-protection/hello-for-business/hello-identity-verification", + "redirect_document_id": false + }, + { + "source_path": "windows/keep-secure/passport-event-300.md", + "redirect_url": "/windows/access-protection/hello-for-business/hello-event-300", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/prepare-people-to-use-microsoft-passport.md", + "redirect_url": "/windows/access-protection/hello-for-business/hello-prepare-people-to-use", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/why-a-pin-is-better-than-a-password.md", + "redirect_url": "/windows/access-protection/hello-for-business/hello-why-pin-is-better-than-password", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/windows-hello-in-enterprise.md", + "redirect_url": "/windows/access-protection/hello-for-business/hello-biometrics-in-enterprise", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/app-inventory-managemement-windows-store-for-business.md", + "redirect_url": "/microsoft-store/app-inventory-management-windows-store-for-business#manage-apps-in-your-inventory", + "redirect_document_id": true + }, + { + "source_path": "store-for-business/app-inventory-management-windows-store-for-business.md", + "redirect_url": "/microsoft-store/app-inventory-management-microsoft-store-for-business", + "redirect_document_id": false + }, + { + "source_path": "windows/manage/application-development-for-windows-as-a-service.md", + "redirect_url": "https://msdn.microsoft.com/windows/uwp/get-started/application-development-for-windows-as-a-service", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-accessibility.md", + "redirect_url": "/windows/application-management/app-v/appv-getting-started", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-accessing-the-client-management-console.md", + "redirect_url": "/windows/application-management/app-v/appv-using-the-client-management-console", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-install-the-appv-client-for-shared-content-store-mode.md", + "redirect_url": "/windows/application-management/app-v/appv-deploying-the-appv-sequencer-and-client", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-modify-client-configuration-with-the-admx-template-and-group-policy.md", + "redirect_url": "/windows/application-management/app-v/appv-deploying-the-appv-sequencer-and-client", + "redirect_document_id": false + }, + { + "source_path": "windows/manage/appv-planning-for-migrating-from-a-previous-version-of-appv.md", + "redirect_url": "/windows/application-management/app-v/appv-migrating-to-appv-from-a-previous-version", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/configure-windows-10-devices-to-stop-data-flow-to-microsoft.md", + "redirect_url": "/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/disconnect-your-organization-from-microsoft.md", + "redirect_url": "/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services", + "redirect_document_id": false + }, + { + "source_path": "windows/manage/introduction-to-windows-10-servicing.md", + "redirect_url": "/windows/deployment/update/index", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/manage-cortana-in-enterprise.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/cortana-at-work-overview.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-overview", + "redirect_document_id": false + }, + { + "source_path": "windows/manage/manage-inventory-windows-store-for-business.md", + "redirect_url": "/microsoft-store/app-inventory-management-windows-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "store-for-business/app-inventory-managemement-windows-store-for-business.md", + "redirect_url": "/microsoft-store/app-inventory-management-microsoft-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-accessibility.md", + "redirect_url": "/windows/configuration/ue-v/uev-for-windows", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-privacy-statement.md", + "redirect_url": "/windows/configuration/ue-v/uev-security-considerations", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/act-community-ratings-and-process.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/act-database-configuration.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/act-database-migration.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/act-deployment-options.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/act-glossary.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/activating-and-closing-windows-in-acm.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/act-lps-share-permissions.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/act-operatingsystem-application-report.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/act-operatingsystem-computer-report.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/act-operatingsystem-device-report.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/act-product-and-documentation-resources.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/act-settings-dialog-box-preferences-tab.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/act-settings-dialog-box-settings-tab.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/act-toolbar-icons-in-acm.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/act-tools-packages-and-services.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/act-user-interface-reference.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/adding-or-editing-an-issue.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/adding-or-editing-a-solution.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/analyzing-your-compatibility-data.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/application-dialog-box.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/categorizing-your-compatibility-data.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/chromebook-migration-guide.md", + "redirect_url": "edu/windows/chromebook-migration-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/common-compatibility-issues.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/compatibility-monitor-users-guide.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/computer-dialog-box.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/configuring-act.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/creating-and-editing-issues-and-solutions.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/creating-an-enterprise-environment-for-compatibility-testing.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/creating-an-inventory-collector-package.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/creating-a-runtime-analysis-package.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/customizing-your-report-views.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/data-sent-through-the-microsoft-compatibility-exchange.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/deciding-whether-to-fix-an-application-or-deploy-a-workaround.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/deciding-which-applications-to-test.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/deleting-a-data-collection-package.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/deploying-an-inventory-collector-package.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/deploying-a-runtime-analysis-package.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/deploy-windows-10-in-a-school.md", + "redirect_url": "/edu/windows/deploy-windows-10-in-a-school", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/example-filter-queries.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/exporting-a-data-collection-package.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/filtering-your-compatibility-data.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/fixing-compatibility-issues.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/identifying-computers-for-inventory-collection.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/integration-with-management-solutions-.md", + "redirect_url": "/windows/deployment/update/waas-manage-updates-wufb", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/internet-explorer-web-site-report.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/labeling-data-in-acm.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/log-file-locations-for-data-collection-packages.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/managing-your-data-collection-packages.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/organizational-tasks-for-each-report-type.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/organizing-your-compatibility-data.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/prioritizing-your-compatibility-data.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/ratings-icons-in-acm.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/resolving-an-issue.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/saving-opening-and-exporting-reports.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/selecting-the-send-and-receive-status-for-an-application.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/selecting-your-compatibility-rating.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/selecting-your-deployment-status.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/sending-and-receiving-compatibility-data.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/settings-for-acm.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/setup-and-deployment.md", + "redirect_url": "/windows/deployment/update/waas-manage-updates-wufb", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/software-requirements-for-act.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/software-requirements-for-rap.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/taking-inventory-of-your-organization.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/testing-compatibility-on-the-target-platform.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/troubleshooting-act.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/troubleshooting-act-database-issues.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/troubleshooting-the-act-configuration-wizard.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/troubleshooting-the-act-log-processing-service.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/using-act.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/using-compatibility-monitor-to-send-feedback.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/viewing-your-compatibility-reports.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/websiteurl-dialog-box.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/welcome-to-act.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/whats-new-in-act-60.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/windows-10-guidance-for-education-environments.md", + "redirect_url": "/edu/windows/index", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/windows-10-servicing-options.md", + "redirect_url": "/windows/deployment/update/waas-overview", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/windows-update-for-business.md", + "redirect_url": "/windows/deployment/update/waas-manage-updates-wufb", + "redirect_document_id": false + }, + { + "source_path": "windows/whats-new/applocker.md", + "redirect_url": "/windows/whats-new/whats-new-windows-10-version-1507-and-1511", + "redirect_document_id": true + }, + { + "source_path": "windows/whats-new/bitlocker.md", + "redirect_url": "/windows/whats-new/whats-new-windows-10-version-1507-and-1511", + "redirect_document_id": false + }, + { + "source_path": "windows/whats-new/change-history-for-what-s-new-in-windows-10.md", + "redirect_url": "/windows/whats-new/index", + "redirect_document_id": true + }, + { + "source_path": "windows/whats-new/credential-guard.md", + "redirect_url": "/windows/whats-new/whats-new-windows-10-version-1507-and-1511", + "redirect_document_id": false + }, + { + "source_path": "windows/whats-new/device-guard-overview.md", + "redirect_url": "/windows/security/threat-protection/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control", + "redirect_document_id": false + }, + { + "source_path": "windows/whats-new/device-management.md", + "redirect_url": "/windows/client-management/index", + "redirect_document_id": false + }, + { + "source_path": "windows/whats-new/edge-ie11-whats-new-overview.md", + "redirect_url": "/microsoft-edge/deploy/enterprise-guidance-using-microsoft-edge-and-ie11", + "redirect_document_id": true + }, + { + "source_path": "windows/whats-new/edp-whats-new-overview.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/protect-enterprise-data-using-wip", + "redirect_document_id": false + }, + { + "source_path": "windows/whats-new/lockdown-features-windows-10.md", + "redirect_url": "/windows/configuration/lockdown-features-windows-10", + "redirect_document_id": false + }, + { + "source_path": "windows/whats-new/microsoft-passport.md", + "redirect_url": "/windows/access-protection/hello-for-business/hello-identity-verification", + "redirect_document_id": false + }, + { + "source_path": "windows/whats-new/new-provisioning-packages.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-packages", + "redirect_document_id": false + }, + { + "source_path": "windows/whats-new/security-auditing.md", + "redirect_url": "/windows/whats-new/whats-new-windows-10-version-1507-and-1511", + "redirect_document_id": false + }, + { + "source_path": "windows/whats-new/trusted-platform-module.md", + "redirect_url": "/windows/device-security/tpm/trusted-platform-module-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/whats-new/user-account-control.md", + "redirect_url": "/windows/whats-new/whats-new-windows-10-version-1507-and-1511", + "redirect_document_id": false + }, + { + "source_path": "windows/whats-new/windows-spotlight.md", + "redirect_url": "/windows/configuration/windows-spotlight", + "redirect_document_id": true + }, + { + "source_path": "windows/whats-new/windows-store-for-business-overview.md", + "redirect_url": "/microsoft-store/windows-store-for-business-overview", + "redirect_document_id": true + }, + { + "source_path": "store-for-business/windows-store-for-business-overview.md", + "redirect_url": "/microsoft-store/microsoft-store-for-business-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/whats-new/windows-update-for-business.md", + "redirect_url": "/windows/whats-new/whats-new-windows-10-version-1507-and-1511", + "redirect_document_id": false + }, + { + "source_path": "windows/keep-secure/windows-10-security-guide.md", + "redirect_url": "/windows/threat-protection/overview-of-threat-mitigations-in-windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/whats-new/security.md", + "redirect_url": "/windows/threat-protection/overview-of-threat-mitigations-in-windows-10", + "redirect_document_id": false + }, + { + "source_path": "windows/configure/basic-level-windows-diagnostic-events-and-fields-1703.md", + "redirect_url": "/windows/configuration/basic-level-windows-diagnostic-events-and-fields", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/change-history-for-configure-windows-10.md", + "redirect_url": "/windows/configuration/change-history-for-configure-windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/changes-to-start-policies-in-windows-10.md", + "redirect_url": "/windows/configuration/changes-to-start-policies-in-windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/configure-devices-without-mdm.md", + "redirect_url": "/windows/configuration/configure-devices-without-mdm", + "redirect_document_id": true + }, + { + "source_path": "windows/configuration/configure-devices-without-mdm.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-packages", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/configure-mobile.md", + "redirect_url": "/windows/configuration/mobile-devices/configure-mobile", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/configure-windows-10-taskbar.md", + "redirect_url": "/windows/configuration/configure-windows-10-taskbar", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/configure-windows-telemetry-in-your-organization.md", + "redirect_url": "/windows/configuration/configure-windows-diagnostic-data-in-your-organization", + "redirect_document_id": true + }, + { + "source_path": "windows/configuration/configure-windows-telemetry-in-your-organization.md", + "redirect_url": "/windows/configuration/configure-windows-diagnostic-data-in-your-organization", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/cortana-at-work-crm.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-crm", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/cortana-at-work-feedback.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-feedback", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/cortana-at-work-o365.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-o365", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/cortana-at-work-overview.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/cortana-at-work-policy-settings.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-policy-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/cortana-at-work-powerbi.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-powerbi", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/cortana-at-work-scenario-1.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-1", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/cortana-at-work-scenario-2.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-2", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/cortana-at-work-scenario-3.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-3", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/cortana-at-work-scenario-4.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-4", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/cortana-at-work-scenario-5.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-5", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/cortana-at-work-scenario-6.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-6", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/cortana-at-work-scenario-7.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-7", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/cortana-at-work-testing-scenarios.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-testing-scenarios", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/cortana-at-work-voice-commands.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-voice-commands", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/customize-and-export-start-layout.md", + "redirect_url": "/windows/configuration/customize-and-export-start-layout", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/customize-windows-10-start-screens-by-using-group-policy.md", + "redirect_url": "/windows/configuration/customize-windows-10-start-screens-by-using-group-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/customize-windows-10-start-screens-by-using-mobile-device-management.md", + "redirect_url": "/windows/configuration/customize-windows-10-start-screens-by-using-mobile-device-management", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/customize-windows-10-start-screens-by-using-provisioning-packages-and-icd.md", + "redirect_url": "/windows/configuration/customize-windows-10-start-screens-by-using-provisioning-packages-and-icd", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/guidelines-for-assigned-access-app.md", + "redirect_url": "/windows/configuration/guidelines-for-assigned-access-app", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/how-it-pros-can-use-configuration-service-providers.md", + "redirect_url": "/windows/configuration/provisioning-packages/how-it-pros-can-use-configuration-service-providers", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/kiosk-shared-pc.md", + "redirect_url": "/windows/configuration/kiosk-shared-pc", + "redirect_document_id": true + }, + { + "source_path": "windows/configuration/kiosk-shared-pc.md", + "redirect_url": "/windows/configuration/kiosk-methods", + "redirect_document_id": true + }, + { + "source_path": "windows/configuration/setup-kiosk-digital-signage.md", + "redirect_url": "/windows/configuration/kiosk-single-app", + "redirect_document_id": true + }, + { + "source_path": "windows/configuration/multi-app-kiosk-xml.md", + "redirect_url": "/windows/configuration/kiosk-xml", + "redirect_document_id": true + }, + { + "source_path": "windows/configuration/multi-app-kiosk-troubleshoot.md", + "redirect_url": "/windows/configuration/kiosk-troubleshoot", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/lock-down-windows-10-to-specific-apps.md", + "redirect_url": "/windows/configuration/lock-down-windows-10-to-specific-apps", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/lock-down-windows-10.md", + "redirect_url": "/windows/configuration/lock-down-windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/lockdown-features-windows-10.md", + "redirect_url": "/windows/configuration/lockdown-features-windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/lockdown-xml.md", + "redirect_url": "/windows/configuration/mobile-devices/lockdown-xml", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/manage-connections-from-windows-operating-system-components-to-microsoft-services.md", + "redirect_url": "/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/manage-tips-and-suggestions.md", + "redirect_url": "/windows/configuration/manage-tips-and-suggestions", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/manage-wifi-sense-in-enterprise.md", + "redirect_url": "/windows/configuration/manage-wifi-sense-in-enterprise", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/mobile-lockdown-designer.md", + "redirect_url": "/windows/configuration/mobile-devices/mobile-lockdown-designer", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/product-ids-in-windows-10-mobile.md", + "redirect_url": "/windows/configuration/mobile-devices/product-ids-in-windows-10-mobile", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/provision-pcs-for-initial-deployment.md", + "redirect_url": "/windows/configuration/provisioning-packages/provision-pcs-for-initial-deployment", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/provision-pcs-with-apps-and-certificates.md", + "redirect_url": "/windows/configuration/provisioning-packages/provision-pcs-with-apps-and-certificates", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/provision-pcs-with-apps.md", + "redirect_url": "/windows/configuration/provisioning-packages/provision-pcs-with-apps", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/provisioning-apply-package.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-apply-package", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/provisioning-command-line.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-command-line", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/provisioning-configure-mobile.md", + "redirect_url": "/windows/configuration/mobile-devices/provisioning-configure-mobile", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/provisioning-create-package.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-create-package", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/provisioning-how-it-works.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-how-it-works", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/provisioning-install-icd.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-install-icd", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/provisioning-multivariant.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-multivariant", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/provisioning-nfc.md", + "redirect_url": "/windows/configuration/mobile-devices/provisioning-nfc", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/provisioning-package-splitter.md", + "redirect_url": "/windows/configuration/mobile-devices/provisioning-package-splitter", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/provisioning-packages.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-packages", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/provisioning-powershell.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-powershell", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/provisioning-script-to-install-app.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-script-to-install-app", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/provisioning-uninstall-package.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-uninstall-package", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/set-up-a-device-for-anyone-to-use.md", + "redirect_url": "/windows/configuration/set-up-a-device-for-anyone-to-use", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/set-up-a-kiosk-for-windows-10-for-desktop-editions.md", + "redirect_url": "/windows/configuration/set-up-a-kiosk-for-windows-10-for-desktop-editions", + "redirect_document_id": true + }, + { + "source_path": "windows/configuration/set-up-a-kiosk-for-windows-10-for-desktop-editions.md", + "redirect_url": "/windows/configuration/setup-kiosk-digital-signage", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/set-up-a-kiosk-for-windows-10-for-mobile-edition.md", + "redirect_url": "/windows/configuration/mobile-devices/set-up-a-kiosk-for-windows-10-for-mobile-edition", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/set-up-shared-or-guest-pc.md", + "redirect_url": "/windows/configuration/set-up-shared-or-guest-pc", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/settings-that-can-be-locked-down.md", + "redirect_url": "/windows/configuration/mobile-devices/settings-that-can-be-locked-down", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/start-layout-xml-desktop.md", + "redirect_url": "/windows/configuration/start-layout-xml-desktop", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/start-layout-xml-mobile.md", + "redirect_url": "/windows/configuration/mobile-devices/start-layout-xml-mobile", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/start-secondary-tiles.md", + "redirect_url": "/windows/configuration/start-secondary-tiles", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/start-taskbar-lockscreen.md", + "redirect_url": "/windows/configuration/start-taskbar-lockscreen", + "redirect_document_id": true + }, + { + "source_path": "windows/configuration/start-taskbar-lockscreen.md", + "redirect_url": "/windows/configuration/windows-10-start-layout-options-and-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/stop-employees-from-using-the-windows-store.md", + "redirect_url": "/windows/configuration/stop-employees-from-using-the-windows-store", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/windows-10-start-layout-options-and-policies.md", + "redirect_url": "/windows/configuration/windows-10-start-layout-options-and-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/windows-diagnostic-data-1703.md", + "redirect_url": "/windows/configuration/windows-diagnostic-data", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/windows-spotlight.md", + "redirect_url": "/windows/configuration/windows-spotlight", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/windows-spotlight.md", + "redirect_url": "/windows/configuration/windows-spotlight", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/activate-forest-by-proxy-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/activate-forest-by-proxy-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/activate-forest-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/activate-forest-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/activate-using-active-directory-based-activation-client.md", + "redirect_url": "/windows/deployment/volume-activation/activate-using-active-directory-based-activation-client", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/activate-using-key-management-service-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/activate-using-key-management-service-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/activate-windows-10-clients-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/activate-windows-10-clients-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/active-directory-based-activation-overview.md", + "redirect_url": "/windows/deployment/volume-activation/active-directory-based-activation-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/add-a-windows-10-operating-system-image-using-configuration-manager.md", + "redirect_url": "/windows/deployment/deploy-windows-sccm/add-a-windows-10-operating-system-image-using-configuration-manager", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager.md", + "redirect_url": "/windows/deployment/deploy-windows-sccm/add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/add-manage-products-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/add-manage-products-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/add-remove-computers-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/add-remove-computers-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/add-remove-product-key-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/add-remove-product-key-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/appendix-information-sent-to-microsoft-during-activation-client.md", + "redirect_url": "/windows/deployment/volume-activation/appendix-information-sent-to-microsoft-during-activation-client", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/assign-applications-using-roles-in-mdt-2013.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/assign-applications-using-roles-in-mdt-2013", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/assign-applications-using-roles-in-mdt.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/assign-applications-using-roles-in-mdt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/build-a-distributed-environment-for-windows-10-deployment.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/build-a-distributed-environment-for-windows-10-deployment", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/change-history-for-deploy-windows-10.md", + "redirect_url": "/windows/deployment/change-history-for-deploy-windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/configure-a-pxe-server-to-load-windows-pe.md", + "redirect_url": "/windows/deployment/configure-a-pxe-server-to-load-windows-pe", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/configure-client-computers-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/configure-client-computers-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/configure-mdt-2013-for-userexit-scripts.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/configure-mdt-2013-for-userexit-scripts", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/configure-mdt-2013-settings.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/configure-mdt-2013-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/configure-mdt-deployment-share-rules.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/configure-mdt-deployment-share-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/configure-mdt-for-userexit-scripts.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/configure-mdt-for-userexit-scripts", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/configure-mdt-settings.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/configure-mdt-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/create-a-custom-windows-pe-boot-image-with-configuration-manager.md", + "redirect_url": "/windows/deployment/deploy-windows-sccm/create-a-custom-windows-pe-boot-image-with-configuration-manager", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/create-a-task-sequence-with-configuration-manager-and-mdt.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/create-a-task-sequence-with-configuration-manager-and-mdt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/create-a-windows-10-reference-image.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/create-a-windows-10-reference-image", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/create-an-application-to-deploy-with-windows-10-using-configuration-manager.md", + "redirect_url": "/windows/deployment/deploy-windows-sccm/create-an-application-to-deploy-with-windows-10-using-configuration-manager", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/deploy-a-windows-10-image-using-mdt.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/deploy-a-windows-10-image-using-mdt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/deploy-whats-new.md", + "redirect_url": "/windows/deployment/deploy-whats-new", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/deploy-windows-10-using-pxe-and-configuration-manager.md", + "redirect_url": "/windows/deployment/deploy-windows-sccm/deploy-windows-10-using-pxe-and-configuration-manager", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/deploy-windows-10-with-system-center-2012-r2-configuration-manager.md", + "redirect_url": "/windows/deployment/deploy-windows-sccm/deploy-windows-10-with-system-center-2012-r2-configuration-manager", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/deploy-windows-10-with-the-microsoft-deployment-toolkit.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/deploy-windows-10-with-the-microsoft-deployment-toolkit", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/deploy-windows-to-go.md", + "redirect_url": "/windows/deployment/deploy-windows-to-go", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/finalize-the-os-configuration-for-windows-10-deployment-with-configuration-manager.md", + "redirect_url": "/windows/deployment/deploy-windows-sccm/finalize-the-os-configuration-for-windows-10-deployment-with-configuration-manager", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/get-started-with-the-microsoft-deployment-toolkit.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/get-started-with-the-microsoft-deployment-toolkit", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/getting-started-with-the-user-state-migration-tool.md", + "redirect_url": "/windows/deployment/usmt/getting-started-with-the-user-state-migration-tool", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/import-export-vamt-data.md", + "redirect_url": "/windows/deployment/volume-activation/import-export-vamt-data", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/install-configure-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/install-configure-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/install-kms-client-key-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/install-kms-client-key-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/install-product-key-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/install-product-key-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/install-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/install-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/integrate-configuration-manager-with-mdt-2013.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/integrate-configuration-manager-with-mdt-2013", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/integrate-configuration-manager-with-mdt.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/integrate-configuration-manager-with-mdt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/introduction-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/introduction-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/key-features-in-mdt-2013.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/key-features-in-mdt-2013", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/key-features-in-mdt.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/key-features-in-mdt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/kms-activation-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/kms-activation-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/local-reactivation-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/local-reactivation-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/manage-activations-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/manage-activations-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/manage-product-keys-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/manage-product-keys-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/manage-vamt-data.md", + "redirect_url": "/windows/deployment/volume-activation/manage-vamt-data", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/manage-windows-upgrades-with-upgrade-analytics.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/manage-windows-upgrades-with-upgrade-readiness.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/mbr-to-gpt.md", + "redirect_url": "/windows/deployment/mbr-to-gpt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/mdt-2013-lite-touch-components.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/mdt-2013-lite-touch-components", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/mdt-lite-touch-components.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/mdt-lite-touch-components", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/migrate-application-settings.md", + "redirect_url": "/windows/deployment/usmt/migrate-application-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/migration-store-types-overview.md", + "redirect_url": "/windows/deployment/usmt/migration-store-types-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/monitor-activation-client.md", + "redirect_url": "/windows/deployment/volume-activation/monitor-activation-client", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/monitor-windows-10-deployment-with-configuration-manager.md", + "redirect_url": "/windows/deployment/deploy-windows-sccm/monitor-windows-10-deployment-with-configuration-manager", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/offline-migration-reference.md", + "redirect_url": "/windows/deployment/usmt/offline-migration-reference", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/online-activation-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/online-activation-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/plan-for-volume-activation-client.md", + "redirect_url": "/windows/deployment/volume-activation/plan-for-volume-activation-client", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/prepare-for-windows-deployment-with-mdt-2013.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/prepare-for-windows-deployment-with-mdt-2013", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/prepare-for-windows-deployment-with-mdt.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/prepare-for-windows-deployment-with-mdt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md", + "redirect_url": "/windows/deployment/deploy-windows-sccm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/proxy-activation-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/proxy-activation-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md", + "redirect_url": "/windows/deployment/deploy-windows-sccm/refresh-a-windows-7-client-with-windows-10-using-configuration-manager", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/refresh-a-windows-7-computer-with-windows-10.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/refresh-a-windows-7-computer-with-windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/remove-products-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/remove-products-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/replace-a-windows-7-client-with-windows-10-using-configuration-manager.md", + "redirect_url": "/windows/deployment/deploy-windows-sccm/replace-a-windows-7-client-with-windows-10-using-configuration-manager", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/replace-a-windows-7-computer-with-a-windows-10-computer.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/replace-a-windows-7-computer-with-a-windows-10-computer", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/resolve-windows-10-upgrade-errors.md", + "redirect_url": "/windows/deployment/upgrade/resolve-windows-10-upgrade-errors", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/scenario-kms-activation-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/scenario-kms-activation-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/scenario-online-activation-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/scenario-online-activation-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/scenario-proxy-activation-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/scenario-proxy-activation-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/set-up-mdt-2013-for-bitlocker.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/set-up-mdt-2013-for-bitlocker", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/set-up-mdt-for-bitlocker.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/set-up-mdt-for-bitlocker", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/sideload-apps-in-windows-10.md", + "redirect_url": "/windows/application-management/sideload-apps-in-windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/simulate-a-windows-10-deployment-in-a-test-environment.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/simulate-a-windows-10-deployment-in-a-test-environment", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/troubleshoot-upgrade-analytics.md", + "redirect_url": "/windows/deployment/upgrade/troubleshoot-upgrade-readiness", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/troubleshoot-upgrade-readiness.md", + "redirect_url": "/windows/deployment/upgrade/troubleshoot-upgrade-readiness", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/understanding-migration-xml-files.md", + "redirect_url": "/windows/deployment/usmt/understanding-migration-xml-files", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/update-product-status-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/update-product-status-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-analytics-additional-insights.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-additional-insights", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-analytics-architecture.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-architecture", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-analytics-deploy-windows.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-deploy-windows", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-analytics-deployment-script.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-deployment-script", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-analytics-get-started.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-get-started", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-analytics-identify-apps.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-identify-apps", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-analytics-requirements.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-requirements", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-analytics-resolve-issues.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-resolve-issues", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-analytics-upgrade-overview.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-upgrade-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-readiness-additional-insights.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-additional-insights", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-readiness-architecture.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-architecture", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-readiness-deploy-windows.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-deploy-windows", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-readiness-deployment-script.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-deployment-script", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-readiness-get-started.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-get-started", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-readiness-identify-apps.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-identify-apps", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-readiness-release-notes.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-release-notes", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-readiness-requirements.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-requirements", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-readiness-resolve-issues.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-resolve-issues", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-readiness-upgrade-overview.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-upgrade-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-to-windows-10-with-system-center-configuraton-manager.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-to-windows-10-with-system-center-configuraton-manager", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-to-windows-10-with-the-microsoft-deployment-toolkit.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-to-windows-10-with-the-microsoft-deployment-toolkit", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-windows-phone-8-1-to-10.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-windows-phone-8-1-to-10", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/use-orchestrator-runbooks-with-mdt-2013.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/use-orchestrator-runbooks-with-mdt-2013", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/use-orchestrator-runbooks-with-mdt.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/use-orchestrator-runbooks-with-mdt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/use-the-mdt-database-to-stage-windows-10-deployment-information.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/use-the-mdt-database-to-stage-windows-10-deployment-information", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/use-the-volume-activation-management-tool-client.md", + "redirect_url": "/windows/deployment/volume-activation/use-the-volume-activation-management-tool-client", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/use-upgrade-analytics-to-manage-windows-upgrades.md", + "redirect_url": "/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/use-upgrade-readiness-to-manage-windows-upgrades.md", + "redirect_url": "/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/use-vamt-in-windows-powershell.md", + "redirect_url": "/windows/deployment/volume-activation/use-vamt-in-windows-powershell", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/use-web-services-in-mdt-2013.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/use-web-services-in-mdt-2013", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/use-web-services-in-mdt.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/use-web-services-in-mdt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-best-practices.md", + "redirect_url": "/windows/deployment/usmt/usmt-best-practices", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-choose-migration-store-type.md", + "redirect_url": "/windows/deployment/usmt/usmt-choose-migration-store-type", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-command-line-syntax.md", + "redirect_url": "/windows/deployment/usmt/usmt-command-line-syntax", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-common-issues.md", + "redirect_url": "/windows/deployment/usmt/usmt-common-issues", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-common-migration-scenarios.md", + "redirect_url": "/windows/deployment/usmt/usmt-common-migration-scenarios", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-configxml-file.md", + "redirect_url": "/windows/deployment/usmt/usmt-configxml-file", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-conflicts-and-precedence.md", + "redirect_url": "/windows/deployment/usmt/usmt-conflicts-and-precedence", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-custom-xml-examples.md", + "redirect_url": "/windows/deployment/usmt/usmt-custom-xml-examples", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-customize-xml-files.md", + "redirect_url": "/windows/deployment/usmt/usmt-customize-xml-files", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-determine-what-to-migrate.md", + "redirect_url": "/windows/deployment/usmt/usmt-determine-what-to-migrate", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-estimate-migration-store-size.md", + "redirect_url": "/windows/deployment/usmt/usmt-estimate-migration-store-size", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-exclude-files-and-settings.md", + "redirect_url": "/windows/deployment/usmt/usmt-exclude-files-and-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-extract-files-from-a-compressed-migration-store.md", + "redirect_url": "/windows/deployment/usmt/usmt-extract-files-from-a-compressed-migration-store", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-faq.md", + "redirect_url": "/windows/deployment/usmt/usmt-faq", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-general-conventions.md", + "redirect_url": "/windows/deployment/usmt/usmt-general-conventions", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-hard-link-migration-store.md", + "redirect_url": "/windows/deployment/usmt/usmt-hard-link-migration-store", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-how-it-works.md", + "redirect_url": "/windows/deployment/usmt/usmt-how-it-works", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-how-to.md", + "redirect_url": "/windows/deployment/usmt/usmt-how-to", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-identify-application-settings.md", + "redirect_url": "/windows/deployment/usmt/usmt-identify-application-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-identify-file-types-files-and-folders.md", + "redirect_url": "/windows/deployment/usmt/usmt-identify-file-types-files-and-folders", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-identify-operating-system-settings.md", + "redirect_url": "/windows/deployment/usmt/usmt-identify-operating-system-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-identify-users.md", + "redirect_url": "/windows/deployment/usmt/usmt-identify-users", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-include-files-and-settings.md", + "redirect_url": "/windows/deployment/usmt/usmt-include-files-and-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-loadstate-syntax.md", + "redirect_url": "/windows/deployment/usmt/usmt-loadstate-syntax", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-log-files.md", + "redirect_url": "/windows/deployment/usmt/usmt-log-files", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-migrate-efs-files-and-certificates.md", + "redirect_url": "/windows/deployment/usmt/usmt-migrate-efs-files-and-certificates", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-migrate-user-accounts.md", + "redirect_url": "/windows/deployment/usmt/usmt-migrate-user-accounts", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-migration-store-encryption.md", + "redirect_url": "/windows/deployment/usmt/usmt-migration-store-encryption", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-overview.md", + "redirect_url": "/windows/deployment/usmt/usmt-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-plan-your-migration.md", + "redirect_url": "/windows/deployment/usmt/usmt-plan-your-migration", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-recognized-environment-variables.md", + "redirect_url": "/windows/deployment/usmt/usmt-recognized-environment-variables", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-reference.md", + "redirect_url": "/windows/deployment/usmt/usmt-reference", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-requirements.md", + "redirect_url": "/windows/deployment/usmt/usmt-requirements", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-reroute-files-and-settings.md", + "redirect_url": "/windows/deployment/usmt/usmt-reroute-files-and-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-resources.md", + "redirect_url": "/windows/deployment/usmt/usmt-resources", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-return-codes.md", + "redirect_url": "/windows/deployment/usmt/usmt-return-codes", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-scanstate-syntax.md", + "redirect_url": "/windows/deployment/usmt/usmt-scanstate-syntax", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-technical-reference.md", + "redirect_url": "/windows/deployment/usmt/usmt-technical-reference", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-test-your-migration.md", + "redirect_url": "/windows/deployment/usmt/usmt-test-your-migration", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-topics.md", + "redirect_url": "/windows/deployment/usmt/usmt-topics", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-troubleshooting.md", + "redirect_url": "/windows/deployment/usmt/usmt-troubleshooting", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-utilities.md", + "redirect_url": "/windows/deployment/usmt/usmt-utilities", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-what-does-usmt-migrate.md", + "redirect_url": "/windows/deployment/usmt/usmt-what-does-usmt-migrate", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-xml-elements-library.md", + "redirect_url": "/windows/deployment/usmt/usmt-xml-elements-library", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-xml-reference.md", + "redirect_url": "/windows/deployment/usmt/usmt-xml-reference", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/vamt-known-issues.md", + "redirect_url": "/windows/deployment/volume-activation/vamt-known-issues", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/vamt-requirements.md", + "redirect_url": "/windows/deployment/volume-activation/vamt-requirements", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/vamt-step-by-step.md", + "redirect_url": "/windows/deployment/volume-activation/vamt-step-by-step", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/verify-the-condition-of-a-compressed-migration-store.md", + "redirect_url": "/windows/deployment/usmt/verify-the-condition-of-a-compressed-migration-store", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/volume-activation-management-tool.md", + "redirect_url": "/windows/deployment/volume-activation/volume-activation-management-tool", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/volume-activation-windows-10.md", + "redirect_url": "/windows/deployment/volume-activation/volume-activation-windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/windows-10-deployment-scenarios.md", + "redirect_url": "/windows/deployment/windows-10-deployment-scenarios", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/windows-10-deployment-tools-reference.md", + "redirect_url": "/windows/deployment/windows-10-deployment-tools-reference", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/windows-10-edition-upgrades.md", + "redirect_url": "/windows/deployment/upgrade/windows-10-edition-upgrades", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/windows-10-enterprise-e3-overview.md", + "redirect_url": "/windows/deployment/windows-10-enterprise-e3-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/windows-10-poc-mdt.md", + "redirect_url": "/windows/deployment/windows-10-poc-mdt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/windows-10-poc-sc-config-mgr.md", + "redirect_url": "/windows/deployment/windows-10-poc-sc-config-mgr", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/windows-10-poc.md", + "redirect_url": "/windows/deployment/windows-10-poc", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/windows-10-upgrade-paths.md", + "redirect_url": "/windows/deployment/upgrade/windows-10-upgrade-paths", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/windows-adk-scenarios-for-it-pros.md", + "redirect_url": "/windows/deployment/windows-adk-scenarios-for-it-pros", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/windows-deployment-scenarios-and-tools.md", + "redirect_url": "/windows/deployment/windows-deployment-scenarios-and-tools", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/windows-upgrade-and-migration-considerations.md", + "redirect_url": "/windows/deployment/upgrade/windows-upgrade-and-migration-considerations", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/xml-file-requirements.md", + "redirect_url": "/windows/deployment/usmt/xml-file-requirements", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/access-control.md", + "redirect_url": "/windows/access-protection/access-control/access-control", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/access-credential-manager-as-a-trusted-caller.md", + "redirect_url": "/windows/device-security/security-policy-settings/access-credential-manager-as-a-trusted-caller", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/access-this-computer-from-the-network.md", + "redirect_url": "/windows/device-security/security-policy-settings/access-this-computer-from-the-network", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/account-lockout-duration.md", + "redirect_url": "/windows/device-security/security-policy-settings/account-lockout-duration", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/account-lockout-policy.md", + "redirect_url": "/windows/device-security/security-policy-settings/account-lockout-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/account-lockout-threshold.md", + "redirect_url": "/windows/device-security/security-policy-settings/account-lockout-threshold", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/account-policies.md", + "redirect_url": "/windows/device-security/security-policy-settings/account-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/accounts-administrator-account-status.md", + "redirect_url": "/windows/device-security/security-policy-settings/accounts-administrator-account-status", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/accounts-block-microsoft-accounts.md", + "redirect_url": "/windows/device-security/security-policy-settings/accounts-block-microsoft-accounts", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/accounts-guest-account-status.md", + "redirect_url": "/windows/device-security/security-policy-settings/accounts-guest-account-status", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only.md", + "redirect_url": "/windows/device-security/security-policy-settings/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/accounts-rename-administrator-account.md", + "redirect_url": "/windows/device-security/security-policy-settings/accounts-rename-administrator-account", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/accounts-rename-guest-account.md", + "redirect_url": "/windows/device-security/security-policy-settings/accounts-rename-guest-account", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/act-as-part-of-the-operating-system.md", + "redirect_url": "/windows/device-security/security-policy-settings/act-as-part-of-the-operating-system", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/active-directory-accounts.md", + "redirect_url": "/windows/access-protection/access-control/active-directory-accounts", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/active-directory-security-groups.md", + "redirect_url": "/windows/access-protection/access-control/active-directory-security-groups", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/add-production-devices-to-the-membership-group-for-a-zone.md", + "redirect_url": "/windows/access-protection/windows-firewall/add-production-devices-to-the-membership-group-for-a-zone", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/add-rules-for-packaged-apps-to-existing-applocker-rule-set.md", + "redirect_url": "/windows/device-security/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/add-test-devices-to-the-membership-group-for-a-zone.md", + "redirect_url": "/windows/access-protection/windows-firewall/add-test-devices-to-the-membership-group-for-a-zone", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/add-workstations-to-domain.md", + "redirect_url": "/windows/device-security/security-policy-settings/add-workstations-to-domain", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/additional-mitigations.md", + "redirect_url": "/windows/access-protection/credential-guard/additional-mitigations", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/adjust-memory-quotas-for-a-process.md", + "redirect_url": "/windows/device-security/security-policy-settings/adjust-memory-quotas-for-a-process", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/administer-applocker.md", + "redirect_url": "/windows/device-security/applocker/administer-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/administer-security-policy-settings.md", + "redirect_url": "/windows/device-security/security-policy-settings/administer-security-policy-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/advanced-security-audit-policy-settings.md", + "redirect_url": "/windows/device-security/auditing/advanced-security-audit-policy-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/advanced-security-auditing-faq.md", + "redirect_url": "/windows/device-security/auditing/advanced-security-auditing-faq", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/advanced-security-auditing.md", + "redirect_url": "/windows/device-security/auditing/advanced-security-auditing", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/alerts-queue-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/allow-log-on-locally.md", + "redirect_url": "/windows/device-security/security-policy-settings/allow-log-on-locally", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/allow-log-on-through-remote-desktop-services.md", + "redirect_url": "/windows/device-security/security-policy-settings/allow-log-on-through-remote-desktop-services", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/api-portal-mapping-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/app-behavior-with-wip.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/app-behavior-with-wip", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md", + "redirect_url": "/windows/access-protection/windows-firewall/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/appendix-a-security-monitoring-recommendations-for-many-audit-events.md", + "redirect_url": "/windows/device-security/auditing/appendix-a-security-monitoring-recommendations-for-many-audit-events", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/applocker-architecture-and-components.md", + "redirect_url": "/windows/device-security/applocker/applocker-architecture-and-components", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/applocker-functions.md", + "redirect_url": "/windows/device-security/applocker/applocker-functions", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/applocker-overview.md", + "redirect_url": "/windows/device-security/applocker/applocker-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/applocker-policies-deployment-guide.md", + "redirect_url": "/windows/device-security/applocker/applocker-policies-deployment-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/applocker-policies-design-guide.md", + "redirect_url": "/windows/device-security/applocker/applocker-policies-design-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/applocker-policy-use-scenarios.md", + "redirect_url": "/windows/device-security/applocker/applocker-policy-use-scenarios", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/applocker-processes-and-interactions.md", + "redirect_url": "/windows/device-security/applocker/applocker-processes-and-interactions", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/applocker-settings.md", + "redirect_url": "/windows/device-security/applocker/applocker-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/applocker-technical-reference.md", + "redirect_url": "/windows/device-security/applocker/applocker-technical-reference", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/apply-a-basic-audit-policy-on-a-file-or-folder.md", + "redirect_url": "/windows/device-security/auditing/apply-a-basic-audit-policy-on-a-file-or-folder", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/assign-security-group-filters-to-the-gpo.md", + "redirect_url": "/windows/access-protection/windows-firewall/assign-security-group-filters-to-the-gpo", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-account-lockout.md", + "redirect_url": "/windows/device-security/auditing/audit-account-lockout", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-application-generated.md", + "redirect_url": "/windows/device-security/auditing/audit-application-generated", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-application-group-management.md", + "redirect_url": "/windows/device-security/auditing/audit-application-group-management", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-audit-policy-change.md", + "redirect_url": "/windows/device-security/auditing/audit-audit-policy-change", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-audit-the-access-of-global-system-objects.md", + "redirect_url": "/windows/device-security/security-policy-settings/audit-audit-the-access-of-global-system-objects", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-audit-the-use-of-backup-and-restore-privilege.md", + "redirect_url": "/windows/device-security/security-policy-settings/audit-audit-the-use-of-backup-and-restore-privilege", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-authentication-policy-change.md", + "redirect_url": "/windows/device-security/auditing/audit-authentication-policy-change", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-authorization-policy-change.md", + "redirect_url": "/windows/device-security/auditing/audit-authorization-policy-change", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-central-access-policy-staging.md", + "redirect_url": "/windows/device-security/auditing/audit-central-access-policy-staging", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-certification-services.md", + "redirect_url": "/windows/device-security/auditing/audit-certification-services", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-computer-account-management.md", + "redirect_url": "/windows/device-security/auditing/audit-computer-account-management", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-credential-validation.md", + "redirect_url": "/windows/device-security/auditing/audit-credential-validation", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-detailed-directory-service-replication.md", + "redirect_url": "/windows/device-security/auditing/audit-detailed-directory-service-replication", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-detailed-file-share.md", + "redirect_url": "/windows/device-security/auditing/audit-detailed-file-share", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-directory-service-access.md", + "redirect_url": "/windows/device-security/auditing/audit-directory-service-access", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-directory-service-changes.md", + "redirect_url": "/windows/device-security/auditing/audit-directory-service-changes", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-directory-service-replication.md", + "redirect_url": "/windows/device-security/auditing/audit-directory-service-replication", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-distribution-group-management.md", + "redirect_url": "/windows/device-security/auditing/audit-distribution-group-management", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-dpapi-activity.md", + "redirect_url": "/windows/device-security/auditing/audit-dpapi-activity", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-file-share.md", + "redirect_url": "/windows/device-security/auditing/audit-file-share", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-file-system.md", + "redirect_url": "/windows/device-security/auditing/audit-file-system", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-filtering-platform-connection.md", + "redirect_url": "/windows/device-security/auditing/audit-filtering-platform-connection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-filtering-platform-packet-drop.md", + "redirect_url": "/windows/device-security/auditing/audit-filtering-platform-packet-drop", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-filtering-platform-policy-change.md", + "redirect_url": "/windows/device-security/auditing/audit-filtering-platform-policy-change", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-force-audit-policy-subcategory-settings-to-override.md", + "redirect_url": "/windows/device-security/security-policy-settings/audit-force-audit-policy-subcategory-settings-to-override", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-group-membership.md", + "redirect_url": "/windows/device-security/auditing/audit-group-membership", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-handle-manipulation.md", + "redirect_url": "/windows/device-security/auditing/audit-handle-manipulation", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-ipsec-driver.md", + "redirect_url": "/windows/device-security/auditing/audit-ipsec-driver", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-ipsec-extended-mode.md", + "redirect_url": "/windows/device-security/auditing/audit-ipsec-extended-mode", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-ipsec-main-mode.md", + "redirect_url": "/windows/device-security/auditing/audit-ipsec-main-mode", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-ipsec-quick-mode.md", + "redirect_url": "/windows/device-security/auditing/audit-ipsec-quick-mode", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-kerberos-authentication-service.md", + "redirect_url": "/windows/device-security/auditing/audit-kerberos-authentication-service", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-kerberos-service-ticket-operations.md", + "redirect_url": "/windows/device-security/auditing/audit-kerberos-service-ticket-operations", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-kernel-object.md", + "redirect_url": "/windows/device-security/auditing/audit-kernel-object", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-logoff.md", + "redirect_url": "/windows/device-security/auditing/audit-logoff", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-logon.md", + "redirect_url": "/windows/device-security/auditing/audit-logon", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-mpssvc-rule-level-policy-change.md", + "redirect_url": "/windows/device-security/auditing/audit-mpssvc-rule-level-policy-change", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-network-policy-server.md", + "redirect_url": "/windows/device-security/auditing/audit-network-policy-server", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-non-sensitive-privilege-use.md", + "redirect_url": "/windows/device-security/auditing/audit-non-sensitive-privilege-use", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-other-account-logon-events.md", + "redirect_url": "/windows/device-security/auditing/audit-other-account-logon-events", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-other-account-management-events.md", + "redirect_url": "/windows/device-security/auditing/audit-other-account-management-events", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-other-logonlogoff-events.md", + "redirect_url": "/windows/device-security/auditing/audit-other-logonlogoff-events", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-other-object-access-events.md", + "redirect_url": "/windows/device-security/auditing/audit-other-object-access-events", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-other-policy-change-events.md", + "redirect_url": "/windows/device-security/auditing/audit-other-policy-change-events", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-other-privilege-use-events.md", + "redirect_url": "/windows/device-security/auditing/audit-other-privilege-use-events", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-other-system-events.md", + "redirect_url": "/windows/device-security/auditing/audit-other-system-events", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-pnp-activity.md", + "redirect_url": "/windows/device-security/auditing/audit-pnp-activity", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-policy.md", + "redirect_url": "/windows/device-security/security-policy-settings/audit-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-process-creation.md", + "redirect_url": "/windows/device-security/auditing/audit-process-creation", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-process-termination.md", + "redirect_url": "/windows/device-security/auditing/audit-process-termination", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-registry.md", + "redirect_url": "/windows/device-security/auditing/audit-registry", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-removable-storage.md", + "redirect_url": "/windows/device-security/auditing/audit-removable-storage", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-rpc-events.md", + "redirect_url": "/windows/device-security/auditing/audit-rpc-events", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-sam.md", + "redirect_url": "/windows/device-security/auditing/audit-sam", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-security-group-management.md", + "redirect_url": "/windows/device-security/auditing/audit-security-group-management", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-security-state-change.md", + "redirect_url": "/windows/device-security/auditing/audit-security-state-change", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-security-system-extension.md", + "redirect_url": "/windows/device-security/auditing/audit-security-system-extension", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-sensitive-privilege-use.md", + "redirect_url": "/windows/device-security/auditing/audit-sensitive-privilege-use", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-shut-down-system-immediately-if-unable-to-log-security-audits.md", + "redirect_url": "/windows/device-security/security-policy-settings/audit-shut-down-system-immediately-if-unable-to-log-security-audits", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-special-logon.md", + "redirect_url": "/windows/device-security/auditing/audit-special-logon", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-system-integrity.md", + "redirect_url": "/windows/device-security/auditing/audit-system-integrity", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-user-account-management.md", + "redirect_url": "/windows/device-security/auditing/audit-user-account-management", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-user-device-claims.md", + "redirect_url": "/windows/device-security/auditing/audit-user-device-claims", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/back-up-files-and-directories.md", + "redirect_url": "/windows/device-security/security-policy-settings/back-up-files-and-directories", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/backup-tpm-recovery-information-to-ad-ds.md", + "redirect_url": "/windows/device-security/tpm/backup-tpm-recovery-information-to-ad-ds", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/basic-audit-account-logon-events.md", + "redirect_url": "/windows/device-security/auditing/basic-audit-account-logon-events", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/basic-audit-account-management.md", + "redirect_url": "/windows/device-security/auditing/basic-audit-account-management", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/basic-audit-directory-service-access.md", + "redirect_url": "/windows/device-security/auditing/basic-audit-directory-service-access", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/basic-audit-logon-events.md", + "redirect_url": "/windows/device-security/auditing/basic-audit-logon-events", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/basic-audit-object-access.md", + "redirect_url": "/windows/device-security/auditing/basic-audit-object-access", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/basic-audit-policy-change.md", + "redirect_url": "/windows/device-security/auditing/basic-audit-policy-change", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/basic-audit-privilege-use.md", + "redirect_url": "/windows/device-security/auditing/basic-audit-privilege-use", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/basic-audit-process-tracking.md", + "redirect_url": "/windows/device-security/auditing/basic-audit-process-tracking", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/basic-audit-system-events.md", + "redirect_url": "/windows/device-security/auditing/basic-audit-system-events", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/basic-firewall-policy-design.md", + "redirect_url": "/windows/access-protection/windows-firewall/basic-firewall-policy-design", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/basic-security-audit-policies.md", + "redirect_url": "/windows/device-security/auditing/basic-security-audit-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/basic-security-audit-policy-settings.md", + "redirect_url": "/windows/device-security/auditing/basic-security-audit-policy-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/bcd-settings-and-bitlocker.md", + "redirect_url": "/windows/device-security/bitlocker/bcd-settings-and-bitlocker", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/bitlocker-basic-deployment.md", + "redirect_url": "/windows/device-security/bitlocker/bitlocker-basic-deployment", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/bitlocker-countermeasures.md", + "redirect_url": "/windows/device-security/bitlocker/bitlocker-countermeasures", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/bitlocker-device-encryption-overview-windows-10.md", + "redirect_url": "/windows/device-security/bitlocker/bitlocker-device-encryption-overview-windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/bitlocker-frequently-asked-questions.md", + "redirect_url": "/windows/device-security/bitlocker/bitlocker-frequently-asked-questions", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/bitlocker-group-policy-settings.md", + "redirect_url": "/windows/device-security/bitlocker/bitlocker-group-policy-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/bitlocker-how-to-deploy-on-windows-server.md", + "redirect_url": "/windows/device-security/bitlocker/bitlocker-how-to-deploy-on-windows-server", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/bitlocker-how-to-enable-network-unlock.md", + "redirect_url": "/windows/device-security/bitlocker/bitlocker-how-to-enable-network-unlock", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/bitlocker-overview.md", + "redirect_url": "/windows/device-security/bitlocker/bitlocker-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/bitlocker-recovery-guide-plan.md", + "redirect_url": "/windows/device-security/bitlocker/bitlocker-recovery-guide-plan", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md", + "redirect_url": "/windows/device-security/bitlocker/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/bitlocker-use-bitlocker-recovery-password-viewer.md", + "redirect_url": "/windows/device-security/bitlocker/bitlocker-use-bitlocker-recovery-password-viewer", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/block-untrusted-fonts-in-enterprise.md", + "redirect_url": "/windows/threat-protection/block-untrusted-fonts-in-enterprise", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/boundary-zone-gpos.md", + "redirect_url": "/windows/access-protection/windows-firewall/boundary-zone-gpos", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/boundary-zone.md", + "redirect_url": "/windows/access-protection/windows-firewall/boundary-zone", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/bypass-traverse-checking.md", + "redirect_url": "/windows/device-security/security-policy-settings/bypass-traverse-checking", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/certificate-based-isolation-policy-design-example.md", + "redirect_url": "/windows/access-protection/windows-firewall/certificate-based-isolation-policy-design-example", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/certificate-based-isolation-policy-design.md", + "redirect_url": "/windows/access-protection/windows-firewall/certificate-based-isolation-policy-design", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/change-rules-from-request-to-require-mode.md", + "redirect_url": "/windows/access-protection/windows-firewall/change-rules-from-request-to-require-mode", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/change-the-system-time.md", + "redirect_url": "/windows/device-security/security-policy-settings/change-the-system-time", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/change-the-time-zone.md", + "redirect_url": "/windows/device-security/security-policy-settings/change-the-time-zone", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/change-the-tpm-owner-password.md", + "redirect_url": "/windows/device-security/tpm/change-the-tpm-owner-password", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/check-sensor-status-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/checklist-configuring-basic-firewall-settings.md", + "redirect_url": "/windows/access-protection/windows-firewall/checklist-configuring-basic-firewall-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/checklist-configuring-rules-for-an-isolated-server-zone.md", + "redirect_url": "/windows/access-protection/windows-firewall/checklist-configuring-rules-for-an-isolated-server-zone", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone.md", + "redirect_url": "/windows/access-protection/windows-firewall/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/checklist-configuring-rules-for-the-boundary-zone.md", + "redirect_url": "/windows/access-protection/windows-firewall/checklist-configuring-rules-for-the-boundary-zone", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/checklist-configuring-rules-for-the-encryption-zone.md", + "redirect_url": "/windows/access-protection/windows-firewall/checklist-configuring-rules-for-the-encryption-zone", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/checklist-configuring-rules-for-the-isolated-domain.md", + "redirect_url": "/windows/access-protection/windows-firewall/checklist-configuring-rules-for-the-isolated-domain", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/checklist-creating-group-policy-objects.md", + "redirect_url": "/windows/access-protection/windows-firewall/checklist-creating-group-policy-objects", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/checklist-creating-inbound-firewall-rules.md", + "redirect_url": "/windows/access-protection/windows-firewall/checklist-creating-inbound-firewall-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/checklist-creating-outbound-firewall-rules.md", + "redirect_url": "/windows/access-protection/windows-firewall/checklist-creating-outbound-firewall-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md", + "redirect_url": "/windows/access-protection/windows-firewall/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/checklist-implementing-a-basic-firewall-policy-design.md", + "redirect_url": "/windows/access-protection/windows-firewall/checklist-implementing-a-basic-firewall-policy-design", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/checklist-implementing-a-certificate-based-isolation-policy-design.md", + "redirect_url": "/windows/access-protection/windows-firewall/checklist-implementing-a-certificate-based-isolation-policy-design", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/checklist-implementing-a-domain-isolation-policy-design.md", + "redirect_url": "/windows/access-protection/windows-firewall/checklist-implementing-a-domain-isolation-policy-design", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/checklist-implementing-a-standalone-server-isolation-policy-design.md", + "redirect_url": "/windows/access-protection/windows-firewall/checklist-implementing-a-standalone-server-isolation-policy-design", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/choose-the-right-bitlocker-countermeasure.md", + "redirect_url": "/windows/device-security/bitlocker/choose-the-right-bitlocker-countermeasure", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/command-line-arguments-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configuration-management-reference-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-advanced-scan-types-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-an-applocker-policy-for-audit-only.md", + "redirect_url": "/windows/device-security/applocker/configure-an-applocker-policy-for-audit-only", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-an-applocker-policy-for-enforce-rules.md", + "redirect_url": "/windows/device-security/applocker/configure-an-applocker-policy-for-enforce-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-authentication-methods.md", + "redirect_url": "/windows/access-protection/windows-firewall/configure-authentication-methods", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-block-at-first-sight-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-cloud-block-timeout-period-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-cloud-block-timeout-period-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-data-protection-quick-mode-settings.md", + "redirect_url": "/windows/access-protection/windows-firewall/configure-data-protection-quick-mode-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-email-notifications-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-end-user-interaction-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-end-user-interaction-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-endpoints-gp-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-endpoints-script-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-exceptions-for-an-applocker-rule.md", + "redirect_url": "/windows/device-security/applocker/configure-exceptions-for-an-applocker-rule", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-exclusions-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-exclusions-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-extension-file-exclusions-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-group-policy-to-autoenroll-and-deploy-certificates.md", + "redirect_url": "/windows/access-protection/windows-firewall/configure-group-policy-to-autoenroll-and-deploy-certificates", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-key-exchange-main-mode-settings.md", + "redirect_url": "/windows/access-protection/windows-firewall/configure-key-exchange-main-mode-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-local-policy-overrides-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-local-policy-overrides-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-network-connections-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-notifications-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-process-opened-file-exclusions-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-protection-features-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-protection-features-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-proxy-internet-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-real-time-protection-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-remediation-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-remediation-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-s-mime.md", + "redirect_url": "/windows/access-protection/configure-s-mime", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-server-exclusions-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-siem-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-splunk-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-the-application-identity-service.md", + "redirect_url": "/windows/device-security/applocker/configure-the-application-identity-service", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-the-appLocker-reference-device.md", + "redirect_url": "/windows/device-security/applocker/configure-the-appLocker-reference-device", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-the-rules-to-require-encryption.md", + "redirect_url": "/windows/access-protection/windows-firewall/configure-the-rules-to-require-encryption", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-the-windows-firewall-log.md", + "redirect_url": "/windows/access-protection/windows-firewall/configure-the-windows-firewall-log", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-the-workstation-authentication-certificate-template.md", + "redirect_url": "/windows/access-protection/windows-firewall/configure-the-workstation-authentication-certificate-template", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-windows-defender-antivirus-features.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md", + "redirect_url": "/windows/access-protection/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/confirm-that-certificates-are-deployed-correctly.md", + "redirect_url": "/windows/access-protection/windows-firewall/confirm-that-certificates-are-deployed-correctly", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/copy-a-gpo-to-create-a-new-gpo.md", + "redirect_url": "/windows/access-protection/windows-firewall/copy-a-gpo-to-create-a-new-gpo", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-a-basic-audit-policy-settings-for-an-event-category.md", + "redirect_url": "/windows/device-security/auditing/create-a-basic-audit-policy-settings-for-an-event-category", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-a-group-account-in-active-directory.md", + "redirect_url": "/windows/access-protection/windows-firewall/create-a-group-account-in-active-directory", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-a-group-policy-object.md", + "redirect_url": "/windows/access-protection/windows-firewall/create-a-group-policy-object", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-a-pagefile.md", + "redirect_url": "/windows/device-security/security-policy-settings/create-a-pagefile", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-a-rule-for-packaged-apps.md", + "redirect_url": "/windows/device-security/applocker/create-a-rule-for-packaged-apps", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-a-rule-that-uses-a-file-hash-condition.md", + "redirect_url": "/windows/device-security/applocker/create-a-rule-that-uses-a-file-hash-condition", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-a-rule-that-uses-a-path-condition.md", + "redirect_url": "/windows/device-security/applocker/create-a-rule-that-uses-a-path-condition", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-a-rule-that-uses-a-publisher-condition.md", + "redirect_url": "/windows/device-security/applocker/create-a-rule-that-uses-a-publisher-condition", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-a-token-object.md", + "redirect_url": "/windows/device-security/security-policy-settings/create-a-token-object", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-an-authentication-exemption-list-rule.md", + "redirect_url": "/windows/access-protection/windows-firewall/create-an-authentication-exemption-list-rule", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-an-authentication-request-rule.md", + "redirect_url": "/windows/access-protection/windows-firewall/create-an-authentication-request-rule", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-an-inbound-icmp-rule.md", + "redirect_url": "/windows/access-protection/windows-firewall/create-an-inbound-icmp-rule", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-an-inbound-port-rule.md", + "redirect_url": "/windows/access-protection/windows-firewall/create-an-inbound-port-rule", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-an-inbound-program-or-service-rule.md", + "redirect_url": "/windows/access-protection/windows-firewall/create-an-inbound-program-or-service-rule", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-an-outbound-port-rule.md", + "redirect_url": "/windows/access-protection/windows-firewall/create-an-outbound-port-rule", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-an-outbound-program-or-service-rule.md", + "redirect_url": "/windows/access-protection/windows-firewall/create-an-outbound-program-or-service-rule", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-and-verify-an-efs-dra-certificate.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-applocker-default-rules.md", + "redirect_url": "/windows/device-security/applocker/create-applocker-default-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-global-objects.md", + "redirect_url": "/windows/device-security/security-policy-settings/create-global-objects", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-inbound-rules-to-support-rpc.md", + "redirect_url": "/windows/access-protection/windows-firewall/create-inbound-rules-to-support-rpc", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-list-of-applications-deployed-to-each-business-group.md", + "redirect_url": "/windows/device-security/applocker/create-list-of-applications-deployed-to-each-business-group", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-permanent-shared-objects.md", + "redirect_url": "/windows/device-security/security-policy-settings/create-permanent-shared-objects", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-symbolic-links.md", + "redirect_url": "/windows/device-security/security-policy-settings/create-symbolic-links", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-vpn-and-wip-policy-using-intune.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-wip-policy-using-intune.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/create-wip-policy-using-intune", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-wip-policy-using-sccm.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/create-wip-policy-using-sccm", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-wmi-filters-for-the-gpo.md", + "redirect_url": "/windows/access-protection/windows-firewall/create-wmi-filters-for-the-gpo", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-your-applocker-planning-document.md", + "redirect_url": "/windows/device-security/applocker/create-your-applocker-planning-document", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-your-applocker-policies.md", + "redirect_url": "/windows/device-security/applocker/create-your-applocker-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-your-applocker-rules.md", + "redirect_url": "/windows/device-security/applocker/create-your-applocker-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/credential-guard-considerations.md", + "redirect_url": "/windows/access-protection/credential-guard/credential-guard-considerations", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/credential-guard-how-it-works.md", + "redirect_url": "/windows/access-protection/credential-guard/credential-guard-how-it-works", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/credential-guard-manage.md", + "redirect_url": "/windows/access-protection/credential-guard/credential-guard-manage", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/credential-guard-not-protected-scenarios.md", + "redirect_url": "/windows/access-protection/credential-guard/credential-guard-not-protected-scenarios", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/credential-guard-protection-limits.md", + "redirect_url": "/windows/access-protection/credential-guard/credential-guard-protection-limits", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/credential-guard-requirements.md", + "redirect_url": "/windows/access-protection/credential-guard/credential-guard-requirements", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/credential-guard-scripts.md", + "redirect_url": "/windows/access-protection/credential-guard/credential-guard-scripts", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/credential-guard.md", + "redirect_url": "/windows/access-protection/credential-guard/credential-guard", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/custom-ti-api-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/customize-run-review-remediate-scans-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/dashboard-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/dashboard-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/data-storage-privacy-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax.md", + "redirect_url": "/windows/device-security/security-policy-settings/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax.md", + "redirect_url": "/windows/device-security/security-policy-settings/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/debug-programs.md", + "redirect_url": "/windows/device-security/security-policy-settings/debug-programs", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/defender-compatibility-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/delete-an-applocker-rule.md", + "redirect_url": "/windows/device-security/applocker/delete-an-applocker-rule", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/deny-access-to-this-computer-from-the-network.md", + "redirect_url": "/windows/device-security/security-policy-settings/deny-access-to-this-computer-from-the-network", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/deny-log-on-as-a-batch-job.md", + "redirect_url": "/windows/device-security/security-policy-settings/deny-log-on-as-a-batch-job", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/deny-log-on-as-a-service.md", + "redirect_url": "/windows/device-security/security-policy-settings/deny-log-on-as-a-service", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/deny-log-on-locally.md", + "redirect_url": "/windows/device-security/security-policy-settings/deny-log-on-locally", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/deny-log-on-through-remote-desktop-services.md", + "redirect_url": "/windows/device-security/security-policy-settings/deny-log-on-through-remote-desktop-services", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/deploy-applocker-policies-by-using-the-enforce-rules-setting.md", + "redirect_url": "/windows/device-security/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/deploy-catalog-files-to-support-code-integrity-policies.md", + "redirect_url": "/windows/device-security/device-guard/deploy-catalog-files-to-support-code-integrity-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/deploy-code-integrity-policies-policy-rules-and-file-rules.md", + "redirect_url": "/windows/device-security/device-guard/deploy-code-integrity-policies-policy-rules-and-file-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/deploy-code-integrity-policies-steps.md", + "redirect_url": "/windows/device-security/device-guard/deploy-code-integrity-policies-steps", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/deploy-device-guard-deploy-code-integrity-policies.md", + "redirect_url": "/windows/device-security/device-guard/deploy-device-guard-deploy-code-integrity-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/deploy-device-guard-enable-virtualization-based-security.md", + "redirect_url": "/windows/device-security/device-guard/deploy-device-guard-enable-virtualization-based-security", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/device-guard/deploy-device-guard-enable-virtualization-based-security.md", + "redirect_url": "/windows/security/threat-protection/device-guard/deploy-device-guard-enable-virtualization-based-security", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/deploy-manage-report-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/deploy-the-applocker-policy-into-production.md", + "redirect_url": "/windows/device-security/applocker/deploy-the-applocker-policy-into-production", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/deploy-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/deploy-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/deploy-wip-policy-using-intune.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/deploy-wip-policy-using-intune", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/deployment-vdi-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/designing-a-windows-firewall-with-advanced-security-strategy.md", + "redirect_url": "/windows/access-protection/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/determine-group-policy-structure-and-rule-enforcement.md", + "redirect_url": "/windows/device-security/applocker/determine-group-policy-structure-and-rule-enforcement", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/determine-which-applications-are-digitally-signed-on-a-reference-computer.md", + "redirect_url": "/windows/device-security/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/determine-your-application-control-objectives.md", + "redirect_url": "/windows/device-security/applocker/determine-your-application-control-objectives", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/determining-the-trusted-state-of-your-devices.md", + "redirect_url": "/windows/access-protection/windows-firewall/determining-the-trusted-state-of-your-devices", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/device-guard-deployment-guide.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-deployment-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/devices-allow-undock-without-having-to-log-on.md", + "redirect_url": "/windows/device-security/security-policy-settings/devices-allow-undock-without-having-to-log-on", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/devices-allowed-to-format-and-eject-removable-media.md", + "redirect_url": "/windows/device-security/security-policy-settings/devices-allowed-to-format-and-eject-removable-media", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/devices-prevent-users-from-installing-printer-drivers.md", + "redirect_url": "/windows/device-security/security-policy-settings/devices-prevent-users-from-installing-printer-drivers", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/devices-restrict-cd-rom-access-to-locally-logged-on-user-only.md", + "redirect_url": "/windows/device-security/security-policy-settings/devices-restrict-cd-rom-access-to-locally-logged-on-user-only", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/devices-restrict-floppy-access-to-locally-logged-on-user-only.md", + "redirect_url": "/windows/device-security/security-policy-settings/devices-restrict-floppy-access-to-locally-logged-on-user-only", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/display-a-custom-url-message-when-users-try-to-run-a-blocked-application.md", + "redirect_url": "/windows/device-security/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/dll-rules-in-applocker.md", + "redirect_url": "/windows/device-security/applocker/dll-rules-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/document-group-policy-structure-and-applocker-rule-enforcement.md", + "redirect_url": "/windows/device-security/applocker/document-group-policy-structure-and-applocker-rule-enforcement", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/document-your-application-control-management-processes.md", + "redirect_url": "/windows/device-security/applocker/document-your-application-control-management-processes", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/document-your-application-list.md", + "redirect_url": "/windows/device-security/applocker/document-your-application-list", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/document-your-applocker-rules.md", + "redirect_url": "/windows/device-security/applocker/document-your-applocker-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/documenting-the-zones.md", + "redirect_url": "/windows/access-protection/windows-firewall/documenting-the-zones", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/domain-controller-allow-server-operators-to-schedule-tasks.md", + "redirect_url": "/windows/device-security/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/domain-controller-ldap-server-signing-requirements.md", + "redirect_url": "/windows/device-security/security-policy-settings/domain-controller-ldap-server-signing-requirements", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/domain-controller-refuse-machine-account-password-changes.md", + "redirect_url": "/windows/device-security/security-policy-settings/domain-controller-refuse-machine-account-password-changes", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/domain-isolation-policy-design-example.md", + "redirect_url": "/windows/access-protection/windows-firewall/domain-isolation-policy-design-example", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/domain-isolation-policy-design.md", + "redirect_url": "/windows/access-protection/windows-firewall/domain-isolation-policy-design", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md", + "redirect_url": "/windows/device-security/security-policy-settings/domain-member-digitally-encrypt-or-sign-secure-channel-data-always", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/domain-member-digitally-encrypt-secure-channel-data-when-possible.md", + "redirect_url": "/windows/device-security/security-policy-settings/domain-member-digitally-encrypt-secure-channel-data-when-possible", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/domain-member-digitally-sign-secure-channel-data-when-possible.md", + "redirect_url": "/windows/device-security/security-policy-settings/domain-member-digitally-sign-secure-channel-data-when-possible", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/domain-member-disable-machine-account-password-changes.md", + "redirect_url": "/windows/device-security/security-policy-settings/domain-member-disable-machine-account-password-changes", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/domain-member-maximum-machine-account-password-age.md", + "redirect_url": "/windows/device-security/security-policy-settings/domain-member-maximum-machine-account-password-age", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/domain-member-require-strong-windows-2000-or-later-session-key.md", + "redirect_url": "/windows/device-security/security-policy-settings/domain-member-require-strong-windows-2000-or-later-session-key", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/dynamic-access-control.md", + "redirect_url": "/windows/access-protection/access-control/dynamic-access-control", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/edit-an-applocker-policy.md", + "redirect_url": "/windows/device-security/applocker/edit-an-applocker-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/edit-applocker-rules.md", + "redirect_url": "/windows/device-security/applocker/edit-applocker-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/enable-cloud-protection-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/enable-computer-and-user-accounts-to-be-trusted-for-delegation.md", + "redirect_url": "/windows/device-security/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/enable-custom-ti-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/enable-predefined-inbound-rules.md", + "redirect_url": "/windows/access-protection/windows-firewall/enable-predefined-inbound-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/enable-predefined-outbound-rules.md", + "redirect_url": "/windows/access-protection/windows-firewall/enable-predefined-outbound-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/enable-the-dll-rule-collection.md", + "redirect_url": "/windows/device-security/applocker/enable-the-dll-rule-collection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/encrypted-hard-drive.md", + "redirect_url": "/windows/device-security/encrypted-hard-drive", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/encryption-zone-gpos.md", + "redirect_url": "/windows/access-protection/windows-firewall/encryption-zone-gpos", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/encryption-zone.md", + "redirect_url": "/windows/access-protection/windows-firewall/encryption-zone", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/enforce-applocker-rules.md", + "redirect_url": "/windows/device-security/applocker/enforce-applocker-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/enforce-password-history.md", + "redirect_url": "/windows/device-security/security-policy-settings/enforce-password-history", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/enforce-user-logon-restrictions.md", + "redirect_url": "/windows/device-security/security-policy-settings/enforce-user-logon-restrictions", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/enlightened-microsoft-apps-and-wip.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/enlightened-microsoft-apps-and-wip", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/enterprise-certificate-pinning.md", + "redirect_url": "/windows/access-protection/enterprise-certificate-pinning", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/evaluate-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/evaluate-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/evaluating-windows-firewall-with-advanced-security-design-examples.md", + "redirect_url": "/windows/access-protection/windows-firewall/evaluating-windows-firewall-with-advanced-security-design-examples", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-1100.md", + "redirect_url": "/windows/device-security/auditing/event-1100", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-1102.md", + "redirect_url": "/windows/device-security/auditing/event-1102", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-1104.md", + "redirect_url": "/windows/device-security/auditing/event-1104", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-1105.md", + "redirect_url": "/windows/device-security/auditing/event-1105", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-1108.md", + "redirect_url": "/windows/device-security/auditing/event-1108", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4608.md", + "redirect_url": "/windows/device-security/auditing/event-4608", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4610.md", + "redirect_url": "/windows/device-security/auditing/event-4610", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4611.md", + "redirect_url": "/windows/device-security/auditing/event-4611", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4612.md", + "redirect_url": "/windows/device-security/auditing/event-4612", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4614.md", + "redirect_url": "/windows/device-security/auditing/event-4614", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4615.md", + "redirect_url": "/windows/device-security/auditing/event-4615", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4616.md", + "redirect_url": "/windows/device-security/auditing/event-4616", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4618.md", + "redirect_url": "/windows/device-security/auditing/event-4618", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4621.md", + "redirect_url": "/windows/device-security/auditing/event-4621", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4622.md", + "redirect_url": "/windows/device-security/auditing/event-4622", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4624.md", + "redirect_url": "/windows/device-security/auditing/event-4624", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4625.md", + "redirect_url": "/windows/device-security/auditing/event-4625", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4626.md", + "redirect_url": "/windows/device-security/auditing/event-4626", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4627.md", + "redirect_url": "/windows/device-security/auditing/event-4627", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4634.md", + "redirect_url": "/windows/device-security/auditing/event-4634", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4647.md", + "redirect_url": "/windows/device-security/auditing/event-4647", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4648.md", + "redirect_url": "/windows/device-security/auditing/event-4648", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4649.md", + "redirect_url": "/windows/device-security/auditing/event-4649", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4656.md", + "redirect_url": "/windows/device-security/auditing/event-4656", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4657.md", + "redirect_url": "/windows/device-security/auditing/event-4657", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4658.md", + "redirect_url": "/windows/device-security/auditing/event-4658", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4660.md", + "redirect_url": "/windows/device-security/auditing/event-4660", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4661.md", + "redirect_url": "/windows/device-security/auditing/event-4661", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4662.md", + "redirect_url": "/windows/device-security/auditing/event-4662", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4663.md", + "redirect_url": "/windows/device-security/auditing/event-4663", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4664.md", + "redirect_url": "/windows/device-security/auditing/event-4664", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4670.md", + "redirect_url": "/windows/device-security/auditing/event-4670", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4671.md", + "redirect_url": "/windows/device-security/auditing/event-4671", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4672.md", + "redirect_url": "/windows/device-security/auditing/event-4672", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4673.md", + "redirect_url": "/windows/device-security/auditing/event-4673", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4674.md", + "redirect_url": "/windows/device-security/auditing/event-4674", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4675.md", + "redirect_url": "/windows/device-security/auditing/event-4675", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4688.md", + "redirect_url": "/windows/device-security/auditing/event-4688", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4689.md", + "redirect_url": "/windows/device-security/auditing/event-4689", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4690.md", + "redirect_url": "/windows/device-security/auditing/event-4690", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4691.md", + "redirect_url": "/windows/device-security/auditing/event-4691", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4692.md", + "redirect_url": "/windows/device-security/auditing/event-4692", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4693.md", + "redirect_url": "/windows/device-security/auditing/event-4693", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4694.md", + "redirect_url": "/windows/device-security/auditing/event-4694", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4695.md", + "redirect_url": "/windows/device-security/auditing/event-4695", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4696.md", + "redirect_url": "/windows/device-security/auditing/event-4696", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4697.md", + "redirect_url": "/windows/device-security/auditing/event-4697", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4698.md", + "redirect_url": "/windows/device-security/auditing/event-4698", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4699.md", + "redirect_url": "/windows/device-security/auditing/event-4699", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4700.md", + "redirect_url": "/windows/device-security/auditing/event-4700", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4701.md", + "redirect_url": "/windows/device-security/auditing/event-4701", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4702.md", + "redirect_url": "/windows/device-security/auditing/event-4702", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4703.md", + "redirect_url": "/windows/device-security/auditing/event-4703", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4704.md", + "redirect_url": "/windows/device-security/auditing/event-4704", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4705.md", + "redirect_url": "/windows/device-security/auditing/event-4705", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4706.md", + "redirect_url": "/windows/device-security/auditing/event-4706", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4707.md", + "redirect_url": "/windows/device-security/auditing/event-4707", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4713.md", + "redirect_url": "/windows/device-security/auditing/event-4713", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4714.md", + "redirect_url": "/windows/device-security/auditing/event-4714", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4715.md", + "redirect_url": "/windows/device-security/auditing/event-4715", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4716.md", + "redirect_url": "/windows/device-security/auditing/event-4716", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4717.md", + "redirect_url": "/windows/device-security/auditing/event-4717", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4718.md", + "redirect_url": "/windows/device-security/auditing/event-4718", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4719.md", + "redirect_url": "/windows/device-security/auditing/event-4719", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4720.md", + "redirect_url": "/windows/device-security/auditing/event-4720", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4722.md", + "redirect_url": "/windows/device-security/auditing/event-4722", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4723.md", + "redirect_url": "/windows/device-security/auditing/event-4723", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4724.md", + "redirect_url": "/windows/device-security/auditing/event-4724", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4725.md", + "redirect_url": "/windows/device-security/auditing/event-4725", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4726.md", + "redirect_url": "/windows/device-security/auditing/event-4726", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4731.md", + "redirect_url": "/windows/device-security/auditing/event-4731", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4732.md", + "redirect_url": "/windows/device-security/auditing/event-4732", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4733.md", + "redirect_url": "/windows/device-security/auditing/event-4733", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4734.md", + "redirect_url": "/windows/device-security/auditing/event-4734", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4735.md", + "redirect_url": "/windows/device-security/auditing/event-4735", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4738.md", + "redirect_url": "/windows/device-security/auditing/event-4738", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4739.md", + "redirect_url": "/windows/device-security/auditing/event-4739", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4740.md", + "redirect_url": "/windows/device-security/auditing/event-4740", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4741.md", + "redirect_url": "/windows/device-security/auditing/event-4741", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4742.md", + "redirect_url": "/windows/device-security/auditing/event-4742", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4743.md", + "redirect_url": "/windows/device-security/auditing/event-4743", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4749.md", + "redirect_url": "/windows/device-security/auditing/event-4749", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4750.md", + "redirect_url": "/windows/device-security/auditing/event-4750", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4751.md", + "redirect_url": "/windows/device-security/auditing/event-4751", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4752.md", + "redirect_url": "/windows/device-security/auditing/event-4752", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4753.md", + "redirect_url": "/windows/device-security/auditing/event-4753", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4764.md", + "redirect_url": "/windows/device-security/auditing/event-4764", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4765.md", + "redirect_url": "/windows/device-security/auditing/event-4765", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4766.md", + "redirect_url": "/windows/device-security/auditing/event-4766", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4767.md", + "redirect_url": "/windows/device-security/auditing/event-4767", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4768.md", + "redirect_url": "/windows/device-security/auditing/event-4768", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4769.md", + "redirect_url": "/windows/device-security/auditing/event-4769", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4770.md", + "redirect_url": "/windows/device-security/auditing/event-4770", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4771.md", + "redirect_url": "/windows/device-security/auditing/event-4771", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4772.md", + "redirect_url": "/windows/device-security/auditing/event-4772", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4773.md", + "redirect_url": "/windows/device-security/auditing/event-4773", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4774.md", + "redirect_url": "/windows/device-security/auditing/event-4774", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4775.md", + "redirect_url": "/windows/device-security/auditing/event-4775", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4776.md", + "redirect_url": "/windows/device-security/auditing/event-4776", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4777.md", + "redirect_url": "/windows/device-security/auditing/event-4777", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4778.md", + "redirect_url": "/windows/device-security/auditing/event-4778", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4779.md", + "redirect_url": "/windows/device-security/auditing/event-4779", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4780.md", + "redirect_url": "/windows/device-security/auditing/event-4780", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4781.md", + "redirect_url": "/windows/device-security/auditing/event-4781", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4782.md", + "redirect_url": "/windows/device-security/auditing/event-4782", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4793.md", + "redirect_url": "/windows/device-security/auditing/event-4793", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4794.md", + "redirect_url": "/windows/device-security/auditing/event-4794", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4798.md", + "redirect_url": "/windows/device-security/auditing/event-4798", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4799.md", + "redirect_url": "/windows/device-security/auditing/event-4799", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4800.md", + "redirect_url": "/windows/device-security/auditing/event-4800", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4801.md", + "redirect_url": "/windows/device-security/auditing/event-4801", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4802.md", + "redirect_url": "/windows/device-security/auditing/event-4802", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4803.md", + "redirect_url": "/windows/device-security/auditing/event-4803", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4816.md", + "redirect_url": "/windows/device-security/auditing/event-4816", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4817.md", + "redirect_url": "/windows/device-security/auditing/event-4817", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4818.md", + "redirect_url": "/windows/device-security/auditing/event-4818", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4819.md", + "redirect_url": "/windows/device-security/auditing/event-4819", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4826.md", + "redirect_url": "/windows/device-security/auditing/event-4826", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4864.md", + "redirect_url": "/windows/device-security/auditing/event-4864", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4865.md", + "redirect_url": "/windows/device-security/auditing/event-4865", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4866.md", + "redirect_url": "/windows/device-security/auditing/event-4866", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4867.md", + "redirect_url": "/windows/device-security/auditing/event-4867", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4902.md", + "redirect_url": "/windows/device-security/auditing/event-4902", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4904.md", + "redirect_url": "/windows/device-security/auditing/event-4904", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4905.md", + "redirect_url": "/windows/device-security/auditing/event-4905", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4906.md", + "redirect_url": "/windows/device-security/auditing/event-4906", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4907.md", + "redirect_url": "/windows/device-security/auditing/event-4907", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4908.md", + "redirect_url": "/windows/device-security/auditing/event-4908", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4909.md", + "redirect_url": "/windows/device-security/auditing/event-4909", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4910.md", + "redirect_url": "/windows/device-security/auditing/event-4910", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4911.md", + "redirect_url": "/windows/device-security/auditing/event-4911", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4912.md", + "redirect_url": "/windows/device-security/auditing/event-4912", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4913.md", + "redirect_url": "/windows/device-security/auditing/event-4913", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4928.md", + "redirect_url": "/windows/device-security/auditing/event-4928", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4929.md", + "redirect_url": "/windows/device-security/auditing/event-4929", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4930.md", + "redirect_url": "/windows/device-security/auditing/event-4930", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4931.md", + "redirect_url": "/windows/device-security/auditing/event-4931", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4932.md", + "redirect_url": "/windows/device-security/auditing/event-4932", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4933.md", + "redirect_url": "/windows/device-security/auditing/event-4933", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4934.md", + "redirect_url": "/windows/device-security/auditing/event-4934", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4935.md", + "redirect_url": "/windows/device-security/auditing/event-4935", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4936.md", + "redirect_url": "/windows/device-security/auditing/event-4936", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4937.md", + "redirect_url": "/windows/device-security/auditing/event-4937", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4944.md", + "redirect_url": "/windows/device-security/auditing/event-4944", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4945.md", + "redirect_url": "/windows/device-security/auditing/event-4945", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4946.md", + "redirect_url": "/windows/device-security/auditing/event-4946", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4947.md", + "redirect_url": "/windows/device-security/auditing/event-4947", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4948.md", + "redirect_url": "/windows/device-security/auditing/event-4948", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4949.md", + "redirect_url": "/windows/device-security/auditing/event-4949", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4950.md", + "redirect_url": "/windows/device-security/auditing/event-4950", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4951.md", + "redirect_url": "/windows/device-security/auditing/event-4951", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4952.md", + "redirect_url": "/windows/device-security/auditing/event-4952", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4953.md", + "redirect_url": "/windows/device-security/auditing/event-4953", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4954.md", + "redirect_url": "/windows/device-security/auditing/event-4954", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4956.md", + "redirect_url": "/windows/device-security/auditing/event-4956", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4957.md", + "redirect_url": "/windows/device-security/auditing/event-4957", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4958.md", + "redirect_url": "/windows/device-security/auditing/event-4958", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4964.md", + "redirect_url": "/windows/device-security/auditing/event-4964", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4985.md", + "redirect_url": "/windows/device-security/auditing/event-4985", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5024.md", + "redirect_url": "/windows/device-security/auditing/event-5024", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5025.md", + "redirect_url": "/windows/device-security/auditing/event-5025", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5027.md", + "redirect_url": "/windows/device-security/auditing/event-5027", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5028.md", + "redirect_url": "/windows/device-security/auditing/event-5028", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5029.md", + "redirect_url": "/windows/device-security/auditing/event-5029", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5030.md", + "redirect_url": "/windows/device-security/auditing/event-5030", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5031.md", + "redirect_url": "/windows/device-security/auditing/event-5031", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5032.md", + "redirect_url": "/windows/device-security/auditing/event-5032", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5033.md", + "redirect_url": "/windows/device-security/auditing/event-5033", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5034.md", + "redirect_url": "/windows/device-security/auditing/event-5034", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5035.md", + "redirect_url": "/windows/device-security/auditing/event-5035", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5037.md", + "redirect_url": "/windows/device-security/auditing/event-5037", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5038.md", + "redirect_url": "/windows/device-security/auditing/event-5038", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5039.md", + "redirect_url": "/windows/device-security/auditing/event-5039", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5051.md", + "redirect_url": "/windows/device-security/auditing/event-5051", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5056.md", + "redirect_url": "/windows/device-security/auditing/event-5056", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5057.md", + "redirect_url": "/windows/device-security/auditing/event-5057", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5058.md", + "redirect_url": "/windows/device-security/auditing/event-5058", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5059.md", + "redirect_url": "/windows/device-security/auditing/event-5059", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5060.md", + "redirect_url": "/windows/device-security/auditing/event-5060", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5061.md", + "redirect_url": "/windows/device-security/auditing/event-5061", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5062.md", + "redirect_url": "/windows/device-security/auditing/event-5062", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5063.md", + "redirect_url": "/windows/device-security/auditing/event-5063", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5064.md", + "redirect_url": "/windows/device-security/auditing/event-5064", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5065.md", + "redirect_url": "/windows/device-security/auditing/event-5065", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5066.md", + "redirect_url": "/windows/device-security/auditing/event-5066", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5067.md", + "redirect_url": "/windows/device-security/auditing/event-5067", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5068.md", + "redirect_url": "/windows/device-security/auditing/event-5068", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5069.md", + "redirect_url": "/windows/device-security/auditing/event-5069", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5070.md", + "redirect_url": "/windows/device-security/auditing/event-5070", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5136.md", + "redirect_url": "/windows/device-security/auditing/event-5136", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5137.md", + "redirect_url": "/windows/device-security/auditing/event-5137", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5138.md", + "redirect_url": "/windows/device-security/auditing/event-5138", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5139.md", + "redirect_url": "/windows/device-security/auditing/event-5139", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5140.md", + "redirect_url": "/windows/device-security/auditing/event-5140", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5141.md", + "redirect_url": "/windows/device-security/auditing/event-5141", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5142.md", + "redirect_url": "/windows/device-security/auditing/event-5142", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5143.md", + "redirect_url": "/windows/device-security/auditing/event-5143", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5144.md", + "redirect_url": "/windows/device-security/auditing/event-5144", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5145.md", + "redirect_url": "/windows/device-security/auditing/event-5145", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5148.md", + "redirect_url": "/windows/device-security/auditing/event-5148", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5149.md", + "redirect_url": "/windows/device-security/auditing/event-5149", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5150.md", + "redirect_url": "/windows/device-security/auditing/event-5150", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5151.md", + "redirect_url": "/windows/device-security/auditing/event-5151", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5152.md", + "redirect_url": "/windows/device-security/auditing/event-5152", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5153.md", + "redirect_url": "/windows/device-security/auditing/event-5153", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5154.md", + "redirect_url": "/windows/device-security/auditing/event-5154", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5155.md", + "redirect_url": "/windows/device-security/auditing/event-5155", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5156.md", + "redirect_url": "/windows/device-security/auditing/event-5156", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5157.md", + "redirect_url": "/windows/device-security/auditing/event-5157", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5158.md", + "redirect_url": "/windows/device-security/auditing/event-5158", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5159.md", + "redirect_url": "/windows/device-security/auditing/event-5159", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5168.md", + "redirect_url": "/windows/device-security/auditing/event-5168", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5376.md", + "redirect_url": "/windows/device-security/auditing/event-5376", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5377.md", + "redirect_url": "/windows/device-security/auditing/event-5377", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5378.md", + "redirect_url": "/windows/device-security/auditing/event-5378", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5447.md", + "redirect_url": "/windows/device-security/auditing/event-5447", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5632.md", + "redirect_url": "/windows/device-security/auditing/event-5632", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5633.md", + "redirect_url": "/windows/device-security/auditing/event-5633", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5712.md", + "redirect_url": "/windows/device-security/auditing/event-5712", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5888.md", + "redirect_url": "/windows/device-security/auditing/event-5888", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5889.md", + "redirect_url": "/windows/device-security/auditing/event-5889", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5890.md", + "redirect_url": "/windows/device-security/auditing/event-5890", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-6144.md", + "redirect_url": "/windows/device-security/auditing/event-6144", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-6145.md", + "redirect_url": "/windows/device-security/auditing/event-6145", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-6281.md", + "redirect_url": "/windows/device-security/auditing/event-6281", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-6400.md", + "redirect_url": "/windows/device-security/auditing/event-6400", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-6401.md", + "redirect_url": "/windows/device-security/auditing/event-6401", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-6402.md", + "redirect_url": "/windows/device-security/auditing/event-6402", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-6403.md", + "redirect_url": "/windows/device-security/auditing/event-6403", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-6404.md", + "redirect_url": "/windows/device-security/auditing/event-6404", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-6405.md", + "redirect_url": "/windows/device-security/auditing/event-6405", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-6406.md", + "redirect_url": "/windows/device-security/auditing/event-6406", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-6407.md", + "redirect_url": "/windows/device-security/auditing/event-6407", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-6408.md", + "redirect_url": "/windows/device-security/auditing/event-6408", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-6409.md", + "redirect_url": "/windows/device-security/auditing/event-6409", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-6410.md", + "redirect_url": "/windows/device-security/auditing/event-6410", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-6416.md", + "redirect_url": "/windows/device-security/auditing/event-6416", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-6419.md", + "redirect_url": "/windows/device-security/auditing/event-6419", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-6420.md", + "redirect_url": "/windows/device-security/auditing/event-6420", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-6421.md", + "redirect_url": "/windows/device-security/auditing/event-6421", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-6422.md", + "redirect_url": "/windows/device-security/auditing/event-6422", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-6423.md", + "redirect_url": "/windows/device-security/auditing/event-6423", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-6424.md", + "redirect_url": "/windows/device-security/auditing/event-6424", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-error-codes-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/executable-rules-in-applocker.md", + "redirect_url": "/windows/device-security/applocker/executable-rules-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/exempt-icmp-from-authentication.md", + "redirect_url": "/windows/access-protection/windows-firewall/exempt-icmp-from-authentication", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/exemption-list.md", + "redirect_url": "/windows/access-protection/windows-firewall/exemption-list", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/experiment-custom-ti-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/export-an-applocker-policy-from-a-gpo.md", + "redirect_url": "/windows/device-security/applocker/export-an-applocker-policy-from-a-gpo", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/export-an-applocker-policy-to-an-xml-file.md", + "redirect_url": "/windows/device-security/applocker/export-an-applocker-policy-to-an-xml-file", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/file-system-global-object-access-auditing.md", + "redirect_url": "/windows/device-security/auditing/file-system-global-object-access-auditing", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/firewall-gpos.md", + "redirect_url": "/windows/access-protection/windows-firewall/firewall-gpos", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/firewall-policy-design-example.md", + "redirect_url": "/windows/access-protection/windows-firewall/firewall-policy-design-example", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/force-shutdown-from-a-remote-system.md", + "redirect_url": "/windows/device-security/security-policy-settings/force-shutdown-from-a-remote-system", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/gathering-information-about-your-active-directory-deployment.md", + "redirect_url": "/windows/access-protection/windows-firewall/gathering-information-about-your-active-directory-deployment", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/gathering-information-about-your-current-network-infrastructure.md", + "redirect_url": "/windows/access-protection/windows-firewall/gathering-information-about-your-current-network-infrastructure", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/gathering-information-about-your-devices.md", + "redirect_url": "/windows/access-protection/windows-firewall/gathering-information-about-your-devices", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/gathering-other-relevant-information.md", + "redirect_url": "/windows/access-protection/windows-firewall/gathering-other-relevant-information", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/gathering-the-information-you-need.md", + "redirect_url": "/windows/access-protection/windows-firewall/gathering-the-information-you-need", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/general-settings-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/general-settings-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/generate-security-audits.md", + "redirect_url": "/windows/device-security/security-policy-settings/generate-security-audits", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/gpo-domiso-boundary.md", + "redirect_url": "/windows/access-protection/windows-firewall/gpo-domiso-boundary", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/gpo-domiso-encryption.md", + "redirect_url": "/windows/access-protection/windows-firewall/gpo-domiso-encryption", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/gpo-domiso-firewall.md", + "redirect_url": "/windows/access-protection/windows-firewall/gpo-domiso-firewall", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/gpo-domiso-isolateddomain-clients.md", + "redirect_url": "/windows/access-protection/windows-firewall/gpo-domiso-isolateddomain-clients", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/gpo-domiso-isolateddomain-servers.md", + "redirect_url": "/windows/access-protection/windows-firewall/gpo-domiso-isolateddomain-servers", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/guidance-and-best-practices-wip.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/guidance-and-best-practices-wip", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/hello-and-password-changes.md", + "redirect_url": "/windows/access-protection/hello-for-business/hello-and-password-changes", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/hello-biometrics-in-enterprise.md", + "redirect_url": "/windows/access-protection/hello-for-business/hello-biometrics-in-enterprise", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/hello-errors-during-pin-creation.md", + "redirect_url": "/windows/access-protection/hello-for-business/hello-errors-during-pin-creation", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/hello-event-300.md", + "redirect_url": "/windows/access-protection/hello-for-business/hello-event-300", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/hello-how-it-works.md", + "redirect_url": "/windows/access-protection/hello-for-business/hello-how-it-works", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/hello-identity-verification.md", + "redirect_url": "/windows/access-protection/hello-for-business/hello-identity-verification", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/hello-manage-in-organization.md", + "redirect_url": "/windows/access-protection/hello-for-business/hello-manage-in-organization", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/hello-prepare-people-to-use.md", + "redirect_url": "/windows/access-protection/hello-for-business/hello-prepare-people-to-use", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/hello-why-pin-is-better-than-password.md", + "redirect_url": "/windows/access-protection/hello-for-business/hello-why-pin-is-better-than-password", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/how-applocker-works-techref.md", + "redirect_url": "/windows/device-security/applocker/how-applocker-works-techref", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/how-to-configure-security-policy-settings.md", + "redirect_url": "/windows/device-security/security-policy-settings/how-to-configure-security-policy-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections.md", + "redirect_url": "/windows/access-protection/vpn/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/how-user-account-control-works.md", + "redirect_url": "/windows/access-protection/user-account-control/how-user-account-control-works", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/identifying-your-windows-firewall-with-advanced-security-deployment-goals.md", + "redirect_url": "/windows/access-protection/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/impersonate-a-client-after-authentication.md", + "redirect_url": "/windows/device-security/security-policy-settings/impersonate-a-client-after-authentication", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/implementing-your-windows-firewall-with-advanced-security-design-plan.md", + "redirect_url": "/windows/access-protection/windows-firewall/implementing-your-windows-firewall-with-advanced-security-design-plan", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/import-an-applocker-policy-from-another-computer.md", + "redirect_url": "/windows/device-security/applocker/import-an-applocker-policy-from-another-computer", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/import-an-applocker-policy-into-a-gpo.md", + "redirect_url": "/windows/device-security/applocker/import-an-applocker-policy-into-a-gpo", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/increase-a-process-working-set.md", + "redirect_url": "/windows/device-security/security-policy-settings/increase-a-process-working-set", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/increase-scheduling-priority.md", + "redirect_url": "/windows/device-security/security-policy-settings/increase-scheduling-priority", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/initialize-and-configure-ownership-of-the-tpm.md", + "redirect_url": "/windows/device-security/tpm/initialize-and-configure-ownership-of-the-tpm", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/installing-digital-certificates-on-windows-10-mobile.md", + "redirect_url": "/windows/access-protection/installing-digital-certificates-on-windows-10-mobile", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/interactive-logon-display-user-information-when-the-session-is-locked.md", + "redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-display-user-information-when-the-session-is-locked", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/interactive-logon-do-not-display-last-user-name.md", + "redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-do-not-display-last-user-name", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/interactive-logon-do-not-require-ctrl-alt-del.md", + "redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-do-not-require-ctrl-alt-del", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/interactive-logon-dont-display-username-at-sign-in.md", + "redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-dont-display-username-at-sign-in", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/interactive-logon-machine-account-lockout-threshold.md", + "redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-machine-account-lockout-threshold", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/interactive-logon-machine-inactivity-limit.md", + "redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-machine-inactivity-limit", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/interactive-logon-message-text-for-users-attempting-to-log-on.md", + "redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-message-text-for-users-attempting-to-log-on", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/interactive-logon-message-title-for-users-attempting-to-log-on.md", + "redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-message-title-for-users-attempting-to-log-on", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md", + "redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/interactive-logon-prompt-user-to-change-password-before-expiration.md", + "redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-prompt-user-to-change-password-before-expiration", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/interactive-logon-require-domain-controller-authentication-to-unlock-workstation.md", + "redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-require-domain-controller-authentication-to-unlock-workstation", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/interactive-logon-require-smart-card.md", + "redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-require-smart-card", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/interactive-logon-smart-card-removal-behavior.md", + "redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-smart-card-removal-behavior", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies.md", + "redirect_url": "/windows/device-security/device-guard/introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/investigate-alerts-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/investigate-domain-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/investigate-files-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/investigate-ip-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/investigate-machines-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/investigate-user-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/isolated-domain-gpos.md", + "redirect_url": "/windows/access-protection/windows-firewall/isolated-domain-gpos", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/isolated-domain.md", + "redirect_url": "/windows/access-protection/windows-firewall/isolated-domain", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/isolating-apps-on-your-network.md", + "redirect_url": "/windows/access-protection/windows-firewall/isolating-apps-on-your-network", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/kerberos-policy.md", + "redirect_url": "/windows/device-security/security-policy-settings/kerberos-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/limitations-with-wip.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/limitations-with-wip", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/link-the-gpo-to-the-domain.md", + "redirect_url": "/windows/access-protection/windows-firewall/link-the-gpo-to-the-domain", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/load-and-unload-device-drivers.md", + "redirect_url": "/windows/device-security/security-policy-settings/load-and-unload-device-drivers", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/local-accounts.md", + "redirect_url": "/windows/access-protection/access-control/local-accounts", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/lock-pages-in-memory.md", + "redirect_url": "/windows/device-security/security-policy-settings/lock-pages-in-memory", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/log-on-as-a-batch-job.md", + "redirect_url": "/windows/device-security/security-policy-settings/log-on-as-a-batch-job", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/log-on-as-a-service.md", + "redirect_url": "/windows/device-security/security-policy-settings/log-on-as-a-service", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/machines-view-overview-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/maintain-applocker-policies.md", + "redirect_url": "/windows/device-security/applocker/maintain-applocker-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/manage-alerts-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/manage-auditing-and-security-log.md", + "redirect_url": "/windows/device-security/security-policy-settings/manage-auditing-and-security-log", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/manage-event-based-updates-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/manage-event-based-updates-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/manage-outdated-endpoints-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/manage-outdated-endpoints-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/manage-packaged-apps-with-applocker.md", + "redirect_url": "/windows/device-security/applocker/manage-packaged-apps-with-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/manage-protection-update-schedule-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/manage-protection-update-schedule-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/manage-protection-updates-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/manage-tpm-commands.md", + "redirect_url": "/windows/device-security/tpm/manage-tpm-commands", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/manage-tpm-lockout.md", + "redirect_url": "/windows/device-security/tpm/manage-tpm-lockout", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/manage-updates-baselines-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/manage-updates-mobile-devices-vms-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/manage-updates-mobile-devices-vms-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/mandatory-settings-for-wip.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/mandatory-settings-for-wip", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md", + "redirect_url": "/windows/access-protection/windows-firewall/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/maximum-lifetime-for-service-ticket.md", + "redirect_url": "/windows/device-security/security-policy-settings/maximum-lifetime-for-service-ticket", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/maximum-lifetime-for-user-ticket-renewal.md", + "redirect_url": "/windows/device-security/security-policy-settings/maximum-lifetime-for-user-ticket-renewal", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/maximum-lifetime-for-user-ticket.md", + "redirect_url": "/windows/device-security/security-policy-settings/maximum-lifetime-for-user-ticket", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/maximum-password-age.md", + "redirect_url": "/windows/device-security/security-policy-settings/maximum-password-age", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/maximum-tolerance-for-computer-clock-synchronization.md", + "redirect_url": "/windows/device-security/security-policy-settings/maximum-tolerance-for-computer-clock-synchronization", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/merge-applocker-policies-by-using-set-applockerpolicy.md", + "redirect_url": "/windows/device-security/applocker/merge-applocker-policies-by-using-set-applockerpolicy", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/merge-applocker-policies-manually.md", + "redirect_url": "/windows/device-security/applocker/merge-applocker-policies-manually", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/microsoft-accounts.md", + "redirect_url": "/windows/access-protection/access-control/microsoft-accounts", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/microsoft-network-client-digitally-sign-communications-always.md", + "redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-client-digitally-sign-communications-always", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/microsoft-network-client-digitally-sign-communications-if-server-agrees.md", + "redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-client-digitally-sign-communications-if-server-agrees", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers.md", + "redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/microsoft-network-server-amount-of-idle-time-required-before-suspending-session.md", + "redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information.md", + "redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/microsoft-network-server-digitally-sign-communications-always.md", + "redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-server-digitally-sign-communications-always", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/microsoft-network-server-digitally-sign-communications-if-client-agrees.md", + "redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-server-digitally-sign-communications-if-client-agrees", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/microsoft-network-server-disconnect-clients-when-logon-hours-expire.md", + "redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/microsoft-network-server-server-spn-target-name-validation-level.md", + "redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/minimum-password-age.md", + "redirect_url": "/windows/device-security/security-policy-settings/minimum-password-age", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/minimum-password-length.md", + "redirect_url": "/windows/device-security/security-policy-settings/minimum-password-length", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/minimum-requirements-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/modify-an-object-label.md", + "redirect_url": "/windows/device-security/security-policy-settings/modify-an-object-label", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/modify-firmware-environment-values.md", + "redirect_url": "/windows/device-security/security-policy-settings/modify-firmware-environment-values", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md", + "redirect_url": "/windows/access-protection/windows-firewall/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/monitor-application-usage-with-applocker.md", + "redirect_url": "/windows/device-security/applocker/monitor-application-usage-with-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/monitor-central-access-policy-and-rule-definitions.md", + "redirect_url": "/windows/device-security/auditing/monitor-central-access-policy-and-rule-definitions", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/monitor-claim-types.md", + "redirect_url": "/windows/device-security/auditing/monitor-claim-types", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/monitor-resource-attribute-definitions.md", + "redirect_url": "/windows/device-security/auditing/monitor-resource-attribute-definitions", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/monitor-the-central-access-policies-associated-with-files-and-folders.md", + "redirect_url": "/windows/device-security/auditing/monitor-the-central-access-policies-associated-with-files-and-folders", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/monitor-the-central-access-policies-that-apply-on-a-file-server.md", + "redirect_url": "/windows/device-security/auditing/monitor-the-central-access-policies-that-apply-on-a-file-server", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/monitor-the-resource-attributes-on-files-and-folders.md", + "redirect_url": "/windows/device-security/auditing/monitor-the-resource-attributes-on-files-and-folders", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/monitor-the-use-of-removable-storage-devices.md", + "redirect_url": "/windows/device-security/auditing/monitor-the-use-of-removable-storage-devices", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/monitor-user-and-device-claims-during-sign-in.md", + "redirect_url": "/windows/device-security/auditing/monitor-user-and-device-claims-during-sign-in", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-access-allow-anonymous-sidname-translation.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-access-allow-anonymous-sidname-translation", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-access-let-everyone-permissions-apply-to-anonymous-users.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-access-named-pipes-that-can-be-accessed-anonymously.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-access-remotely-accessible-registry-paths-and-subpaths.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-access-remotely-accessible-registry-paths.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-access-remotely-accessible-registry-paths", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-access-restrict-anonymous-access-to-named-pipes-and-shares.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-access-restrict-anonymous-access-to-named-pipes-and-shares", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-access-shares-that-can-be-accessed-anonymously.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-access-sharing-and-security-model-for-local-accounts.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-list-manager-policies.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-list-manager-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-security-allow-local-system-to-use-computer-identity-for-ntlm.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-security-allow-localsystem-null-session-fallback.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-security-allow-localsystem-null-session-fallback", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-security-configure-encryption-types-allowed-for-kerberos.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-security-do-not-store-lan-manager-hash-value-on-next-password-change.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-security-force-logoff-when-logon-hours-expire.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-security-force-logoff-when-logon-hours-expire", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-security-lan-manager-authentication-level.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-security-lan-manager-authentication-level", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-security-ldap-client-signing-requirements.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-security-ldap-client-signing-requirements", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-security-restrict-ntlm-incoming-ntlm-traffic.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/open-the-group-policy-management-console-to-ip-security-policies.md", + "redirect_url": "/windows/access-protection/windows-firewall/open-the-group-policy-management-console-to-ip-security-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md", + "redirect_url": "/windows/access-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/open-the-group-policy-management-console-to-windows-firewall.md", + "redirect_url": "/windows/access-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/open-windows-firewall-with-advanced-security.md", + "redirect_url": "/windows/access-protection/windows-firewall/open-windows-firewall-with-advanced-security", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/optimize-applocker-performance.md", + "redirect_url": "/windows/device-security/applocker/optimize-applocker-performance", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/optional-create-a-code-signing-certificate-for-code-integrity-policies.md", + "redirect_url": "/windows/device-security/device-guard/optional-create-a-code-signing-certificate-for-code-integrity-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/other-events.md", + "redirect_url": "/windows/device-security/auditing/other-events", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/override-mitigation-options-for-app-related-security-policies.md", + "redirect_url": "/windows/threat-protection/override-mitigation-options-for-app-related-security-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/overview-create-wip-policy.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/overview-create-wip-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/overview-of-threat-mitigations-in-windows-10.md", + "redirect_url": "/windows/threat-protection/overview-of-threat-mitigations-in-windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/packaged-apps-and-packaged-app-installer-rules-in-applocker.md", + "redirect_url": "/windows/device-security/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/password-must-meet-complexity-requirements.md", + "redirect_url": "/windows/device-security/security-policy-settings/password-must-meet-complexity-requirements", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/password-policy.md", + "redirect_url": "/windows/device-security/security-policy-settings/password-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/perform-volume-maintenance-tasks.md", + "redirect_url": "/windows/device-security/security-policy-settings/perform-volume-maintenance-tasks", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/plan-for-applocker-policy-management.md", + "redirect_url": "/windows/device-security/applocker/plan-for-applocker-policy-management", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/planning-and-deploying-advanced-security-audit-policies.md", + "redirect_url": "/windows/device-security/auditing/planning-and-deploying-advanced-security-audit-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/planning-and-getting-started-on-the-device-guard-deployment-process.md", + "redirect_url": "/windows/device-security/device-guard/planning-and-getting-started-on-the-device-guard-deployment-process", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/planning-certificate-based-authentication.md", + "redirect_url": "/windows/access-protection/windows-firewall/planning-certificate-based-authentication", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/planning-domain-isolation-zones.md", + "redirect_url": "/windows/access-protection/windows-firewall/planning-domain-isolation-zones", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/planning-gpo-deployment.md", + "redirect_url": "/windows/access-protection/windows-firewall/planning-gpo-deployment", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/planning-group-policy-deployment-for-your-isolation-zones.md", + "redirect_url": "/windows/access-protection/windows-firewall/planning-group-policy-deployment-for-your-isolation-zones", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/planning-isolation-groups-for-the-zones.md", + "redirect_url": "/windows/access-protection/windows-firewall/planning-isolation-groups-for-the-zones", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/planning-network-access-groups.md", + "redirect_url": "/windows/access-protection/windows-firewall/planning-network-access-groups", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/planning-server-isolation-zones.md", + "redirect_url": "/windows/access-protection/windows-firewall/planning-server-isolation-zones", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/planning-settings-for-a-basic-firewall-policy.md", + "redirect_url": "/windows/access-protection/windows-firewall/planning-settings-for-a-basic-firewall-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/planning-the-gpos.md", + "redirect_url": "/windows/access-protection/windows-firewall/planning-the-gpos", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/planning-to-deploy-windows-firewall-with-advanced-security.md", + "redirect_url": "/windows/access-protection/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/planning-your-windows-firewall-with-advanced-security-design.md", + "redirect_url": "/windows/access-protection/windows-firewall/planning-your-windows-firewall-with-advanced-security-design", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/portal-overview-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/prepare-your-organization-for-bitlocker-planning-and-policies.md", + "redirect_url": "/windows/device-security/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/prevent-end-user-interaction-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/prevent-end-user-interaction-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/preview-settings-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/preview-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/procedures-used-in-this-guide.md", + "redirect_url": "/windows/access-protection/windows-firewall/procedures-used-in-this-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/profile-single-process.md", + "redirect_url": "/windows/device-security/security-policy-settings/profile-single-process", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/profile-system-performance.md", + "redirect_url": "/windows/device-security/security-policy-settings/profile-system-performance", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/protect-bitlocker-from-pre-boot-attacks.md", + "redirect_url": "/windows/device-security/bitlocker/protect-bitlocker-from-pre-boot-attacks", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/protect-devices-from-unwanted-network-traffic.md", + "redirect_url": "/windows/access-protection/windows-firewall/protect-devices-from-unwanted-network-traffic", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/protect-enterprise-data-using-wip.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/protect-enterprise-data-using-wip", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices.md", + "redirect_url": "/windows/device-security/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md", + "redirect_url": "/windows/device-security/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/python-example-code-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/recommended-network-definitions-for-wip.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/recommended-network-definitions-for-wip", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/recovery-console-allow-automatic-administrative-logon.md", + "redirect_url": "/windows/device-security/security-policy-settings/recovery-console-allow-automatic-administrative-logon", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders.md", + "redirect_url": "/windows/device-security/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/refresh-an-applocker-policy.md", + "redirect_url": "/windows/device-security/applocker/refresh-an-applocker-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/registry-global-object-access-auditing.md", + "redirect_url": "/windows/device-security/auditing/registry-global-object-access-auditing", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/remote-credential-guard.md", + "redirect_url": "/windows/access-protection/remote-credential-guard", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/remove-computer-from-docking-station.md", + "redirect_url": "/windows/device-security/security-policy-settings/remove-computer-from-docking-station", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/replace-a-process-level-token.md", + "redirect_url": "/windows/device-security/security-policy-settings/replace-a-process-level-token", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/report-monitor-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/report-monitor-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/require-encryption-when-accessing-sensitive-network-resources.md", + "redirect_url": "/windows/access-protection/windows-firewall/require-encryption-when-accessing-sensitive-network-resources", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/requirements-for-deploying-applocker-policies.md", + "redirect_url": "/windows/device-security/applocker/requirements-for-deploying-applocker-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/requirements-to-use-applocker.md", + "redirect_url": "/windows/device-security/applocker/requirements-to-use-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/reset-account-lockout-counter-after.md", + "redirect_url": "/windows/device-security/security-policy-settings/reset-account-lockout-counter-after", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/respond-file-alerts-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/respond-machine-alerts-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/restore-files-and-directories.md", + "redirect_url": "/windows/device-security/security-policy-settings/restore-files-and-directories", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/restrict-access-to-only-specified-users-or-devices.md", + "redirect_url": "/windows/access-protection/windows-firewall/restrict-access-to-only-specified-users-or-devices", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/restrict-access-to-only-trusted-devices.md", + "redirect_url": "/windows/access-protection/windows-firewall/restrict-access-to-only-trusted-devices", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/restrict-server-access-to-members-of-a-group-only.md", + "redirect_url": "/windows/access-protection/windows-firewall/restrict-server-access-to-members-of-a-group-only", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/review-scan-results-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/review-scan-results-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/run-scan-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/run-scan-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/run-the-automatically-generate-rules-wizard.md", + "redirect_url": "/windows/device-security/applocker/run-the-automatically-generate-rules-wizard", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/scheduled-catch-up-scans-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/script-rules-in-applocker.md", + "redirect_url": "/windows/device-security/applocker/script-rules-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/secpol-advanced-security-audit-policy-settings.md", + "redirect_url": "/windows/device-security/security-policy-settings/secpol-advanced-security-audit-policy-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/securing-end-to-end-ipsec-connections-by-using-ikev2.md", + "redirect_url": "/windows/access-protection/windows-firewall/securing-end-to-end-ipsec-connections-by-using-ikev2", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/security-auditing-overview.md", + "redirect_url": "/windows/device-security/auditing/security-auditing-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/security-considerations-for-applocker.md", + "redirect_url": "/windows/device-security/applocker/security-considerations-for-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/security-identifiers.md", + "redirect_url": "/windows/access-protection/access-control/security-identifiers", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/security-options.md", + "redirect_url": "/windows/device-security/security-policy-settings/security-options", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/security-policy-settings-reference.md", + "redirect_url": "/windows/device-security/security-policy-settings/security-policy-settings-reference", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/security-policy-settings.md", + "redirect_url": "/windows/device-security/security-policy-settings/security-policy-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/security-principals.md", + "redirect_url": "/windows/access-protection/access-control/security-principals", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/select-types-of-rules-to-create.md", + "redirect_url": "/windows/device-security/applocker/select-types-of-rules-to-create", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/server-isolation-gpos.md", + "redirect_url": "/windows/access-protection/windows-firewall/server-isolation-gpos", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/server-isolation-policy-design-example.md", + "redirect_url": "/windows/access-protection/windows-firewall/server-isolation-policy-design-example", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/server-isolation-policy-design.md", + "redirect_url": "/windows/access-protection/windows-firewall/server-isolation-policy-design", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/service-accounts.md", + "redirect_url": "/windows/access-protection/access-control/service-accounts", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/service-status-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/settings-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/settings-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/shut-down-the-system.md", + "redirect_url": "/windows/device-security/security-policy-settings/shut-down-the-system", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/shutdown-allow-system-to-be-shut-down-without-having-to-log-on.md", + "redirect_url": "/windows/device-security/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/shutdown-clear-virtual-memory-pagefile.md", + "redirect_url": "/windows/device-security/security-policy-settings/shutdown-clear-virtual-memory-pagefile", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/smart-card-and-remote-desktop-services.md", + "redirect_url": "/windows/access-protection/smart-cards/smart-card-and-remote-desktop-services", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/smart-card-architecture.md", + "redirect_url": "/windows/access-protection/smart-cards/smart-card-architecture", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/smart-card-certificate-propagation-service.md", + "redirect_url": "/windows/access-protection/smart-cards/smart-card-certificate-propagation-service", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/smart-card-certificate-requirements-and-enumeration.md", + "redirect_url": "/windows/access-protection/smart-cards/smart-card-certificate-requirements-and-enumeration", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/smart-card-debugging-information.md", + "redirect_url": "/windows/access-protection/smart-cards/smart-card-debugging-information", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/smart-card-events.md", + "redirect_url": "/windows/access-protection/smart-cards/smart-card-events", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/smart-card-group-policy-and-registry-settings.md", + "redirect_url": "/windows/access-protection/smart-cards/smart-card-group-policy-and-registry-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/smart-card-how-smart-card-sign-in-works-in-windows.md", + "redirect_url": "/windows/access-protection/smart-cards/smart-card-how-smart-card-sign-in-works-in-windows", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/smart-card-removal-policy-service.md", + "redirect_url": "/windows/access-protection/smart-cards/smart-card-removal-policy-service", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/smart-card-smart-cards-for-windows-service.md", + "redirect_url": "/windows/access-protection/smart-cards/smart-card-smart-cards-for-windows-service", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/smart-card-tools-and-settings.md", + "redirect_url": "/windows/access-protection/smart-cards/smart-card-tools-and-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/smart-card-windows-smart-card-technical-reference.md", + "redirect_url": "/windows/access-protection/smart-cards/smart-card-windows-smart-card-technical-reference", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/special-identities.md", + "redirect_url": "/windows/access-protection/access-control/special-identities", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/specify-cloud-protection-level-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/store-passwords-using-reversible-encryption.md", + "redirect_url": "/windows/device-security/security-policy-settings/store-passwords-using-reversible-encryption", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/switch-pcr-banks-on-tpm-2-0-devices.md", + "redirect_url": "/windows/device-security/tpm/switch-pcr-banks-on-tpm-2-0-devices", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/synchronize-directory-service-data.md", + "redirect_url": "/windows/device-security/security-policy-settings/synchronize-directory-service-data", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer.md", + "redirect_url": "/windows/device-security/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md", + "redirect_url": "/windows/device-security/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/system-objects-require-case-insensitivity-for-non-windows-subsystems.md", + "redirect_url": "/windows/device-security/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/system-objects-strengthen-default-permissions-of-internal-system-objects.md", + "redirect_url": "/windows/device-security/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/system-settings-optional-subsystems.md", + "redirect_url": "/windows/device-security/security-policy-settings/system-settings-optional-subsystems", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies.md", + "redirect_url": "/windows/device-security/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/take-ownership-of-files-or-other-objects.md", + "redirect_url": "/windows/device-security/security-policy-settings/take-ownership-of-files-or-other-objects", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/test-an-applocker-policy-by-using-test-applockerpolicy.md", + "redirect_url": "/windows/device-security/applocker/test-an-applocker-policy-by-using-test-applockerpolicy", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/test-and-update-an-applocker-policy.md", + "redirect_url": "/windows/device-security/applocker/test-and-update-an-applocker-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/testing-scenarios-for-wip.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/testing-scenarios-for-wip", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/threat-indicator-concepts-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/tools-to-use-with-applocker.md", + "redirect_url": "/windows/device-security/applocker/tools-to-use-with-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/tpm-fundamentals.md", + "redirect_url": "/windows/device-security/tpm/tpm-fundamentals", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/tpm-recommendations.md", + "redirect_url": "/windows/device-security/tpm/tpm-recommendations", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/troubleshoot-siem-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/trusted-platform-module-overview.md", + "redirect_url": "/windows/device-security/tpm/trusted-platform-module-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/trusted-platform-module-services-group-policy-settings.md", + "redirect_url": "/windows/device-security/tpm/trusted-platform-module-services-group-policy-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/trusted-platform-module-top-node.md", + "redirect_url": "/windows/device-security/tpm/trusted-platform-module-top-node", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/turn-on-windows-firewall-and-configure-default-behavior.md", + "redirect_url": "/windows/access-protection/windows-firewall/turn-on-windows-firewall-and-configure-default-behavior", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/types-of-attacks-for-volume-encryption-keys.md", + "redirect_url": "/windows/device-security/bitlocker/types-of-attacks-for-volume-encryption-keys", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/understand-applocker-enforcement-settings.md", + "redirect_url": "/windows/device-security/applocker/understand-applocker-enforcement-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/understand-applocker-policy-design-decisions.md", + "redirect_url": "/windows/device-security/applocker/understand-applocker-policy-design-decisions", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy.md", + "redirect_url": "/windows/device-security/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/understand-the-applocker-policy-deployment-process.md", + "redirect_url": "/windows/device-security/applocker/understand-the-applocker-policy-deployment-process", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/understanding-applocker-allow-and-deny-actions-on-rules.md", + "redirect_url": "/windows/device-security/applocker/understanding-applocker-allow-and-deny-actions-on-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/understanding-applocker-default-rules.md", + "redirect_url": "/windows/device-security/applocker/understanding-applocker-default-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/understanding-applocker-rule-behavior.md", + "redirect_url": "/windows/device-security/applocker/understanding-applocker-rule-behavior", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/understanding-applocker-rule-collections.md", + "redirect_url": "/windows/device-security/applocker/understanding-applocker-rule-collections", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/understanding-applocker-rule-condition-types.md", + "redirect_url": "/windows/device-security/applocker/understanding-applocker-rule-condition-types", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/understanding-applocker-rule-exceptions.md", + "redirect_url": "/windows/device-security/applocker/understanding-applocker-rule-exceptions", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/understanding-the-file-hash-rule-condition-in-applocker.md", + "redirect_url": "/windows/device-security/applocker/understanding-the-file-hash-rule-condition-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/understanding-the-path-rule-condition-in-applocker.md", + "redirect_url": "/windows/device-security/applocker/understanding-the-path-rule-condition-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/understanding-the-publisher-rule-condition-in-applocker.md", + "redirect_url": "/windows/device-security/applocker/understanding-the-publisher-rule-condition-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/understanding-the-windows-firewall-with-advanced-security-design-process.md", + "redirect_url": "/windows/access-protection/windows-firewall/understanding-the-windows-firewall-with-advanced-security-design-process", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/use-a-reference-computer-to-create-and-maintain-applocker-policies.md", + "redirect_url": "/windows/device-security/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/use-applocker-and-software-restriction-policies-in-the-same-domain.md", + "redirect_url": "/windows/device-security/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/use-custom-ti-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/use-group-policy-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/use-group-policy-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/use-intune-config-manager-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/use-powershell-cmdlets-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/use-the-applocker-windows-powershell-cmdlets.md", + "redirect_url": "/windows/device-security/applocker/use-the-applocker-windows-powershell-cmdlets", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/use-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/use-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/use-windows-event-forwarding-to-assist-in-instrusion-detection.md", + "redirect_url": "/windows/threat-protection/use-windows-event-forwarding-to-assist-in-instrusion-detection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/use-wmi-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/use-wmi-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md", + "redirect_url": "/windows/device-security/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop.md", + "redirect_url": "/windows/device-security/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode.md", + "redirect_url": "/windows/device-security/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/user-account-control-behavior-of-the-elevation-prompt-for-standard-users.md", + "redirect_url": "/windows/device-security/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-standard-users", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/user-account-control-detect-application-installations-and-prompt-for-elevation.md", + "redirect_url": "/windows/device-security/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/user-account-control-group-policy-and-registry-key-settings.md", + "redirect_url": "/windows/access-protection/user-account-control/user-account-control-group-policy-and-registry-key-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/user-account-control-only-elevate-executables-that-are-signed-and-validated.md", + "redirect_url": "/windows/device-security/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md", + "redirect_url": "/windows/device-security/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/user-account-control-overview.md", + "redirect_url": "/windows/access-protection/user-account-control/user-account-control-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/user-account-control-run-all-administrators-in-admin-approval-mode.md", + "redirect_url": "/windows/device-security/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/user-account-control-security-policy-settings.md", + "redirect_url": "/windows/access-protection/user-account-control/user-account-control-security-policy-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md", + "redirect_url": "/windows/device-security/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations.md", + "redirect_url": "/windows/device-security/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/user-rights-assignment.md", + "redirect_url": "/windows/device-security/security-policy-settings/user-rights-assignment", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/using-advanced-security-auditing-options-to-monitor-dynamic-access-control-objects.md", + "redirect_url": "/windows/device-security/auditing/using-advanced-security-auditing-options-to-monitor-dynamic-access-control-objects", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/using-event-viewer-with-applocker.md", + "redirect_url": "/windows/device-security/applocker/using-event-viewer-with-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/using-owa-with-wip.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/using-owa-with-wip", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/using-software-restriction-policies-and-applocker-policies.md", + "redirect_url": "/windows/device-security/applocker/using-software-restriction-policies-and-applocker-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/utilize-microsoft-cloud-protection-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/verify-that-network-traffic-is-authenticated.md", + "redirect_url": "/windows/access-protection/windows-firewall/verify-that-network-traffic-is-authenticated", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/view-the-security-event-log.md", + "redirect_url": "/windows/device-security/auditing/view-the-security-event-log", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/virtual-smart-card-deploy-virtual-smart-cards.md", + "redirect_url": "/windows/access-protection/virtual-smart-cards/virtual-smart-card-deploy-virtual-smart-cards", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/virtual-smart-card-evaluate-security.md", + "redirect_url": "/windows/access-protection/virtual-smart-cards/virtual-smart-card-evaluate-security", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/virtual-smart-card-get-started.md", + "redirect_url": "/windows/access-protection/virtual-smart-cards/virtual-smart-card-get-started", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/virtual-smart-card-overview.md", + "redirect_url": "/windows/access-protection/virtual-smart-cards/virtual-smart-card-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/virtual-smart-card-tpmvscmgr.md", + "redirect_url": "/windows/access-protection/virtual-smart-cards/virtual-smart-card-tpmvscmgr", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/virtual-smart-card-understanding-and-evaluating.md", + "redirect_url": "/windows/access-protection/virtual-smart-cards/virtual-smart-card-understanding-and-evaluating", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/virtual-smart-card-use-virtual-smart-cards.md", + "redirect_url": "/windows/access-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/vpn-authentication.md", + "redirect_url": "/windows/access-protection/vpn/vpn-authentication", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/vpn-auto-trigger-profile.md", + "redirect_url": "/windows/access-protection/vpn/vpn-auto-trigger-profile", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/vpn-conditional-access.md", + "redirect_url": "/windows/access-protection/vpn/vpn-conditional-access", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/vpn-connection-type.md", + "redirect_url": "/windows/access-protection/vpn/vpn-connection-type", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/vpn-guide.md", + "redirect_url": "/windows/access-protection/vpn/vpn-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/vpn-name-resolution.md", + "redirect_url": "/windows/access-protection/vpn/vpn-name-resolution", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/vpn-profile-options.md", + "redirect_url": "/windows/access-protection/vpn/vpn-profile-options", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/vpn-routing.md", + "redirect_url": "/windows/access-protection/vpn/vpn-routing", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/vpn-security-features.md", + "redirect_url": "/windows/access-protection/vpn/vpn-security-features", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/what-is-applocker.md", + "redirect_url": "/windows/device-security/applocker/what-is-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/which-editions-of-windows-support-advanced-audit-policy-configuration.md", + "redirect_url": "/windows/device-security/auditing/which-editions-of-windows-support-advanced-audit-policy-configuration", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/windows-10-mobile-security-guide.md", + "redirect_url": "/windows/device-security/windows-10-mobile-security-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/windows-credential-theft-mitigation-guide-abstract.md", + "redirect_url": "/windows/access-protection/windows-credential-theft-mitigation-guide-abstract", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/windows-defender-antivirus-compatibility.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/windows-defender-antivirus-in-windows-10.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/windows-defender-antivirus-on-windows-server-2016.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/windows-defender-offline.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/windows-defender-offline", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/windows-defender-security-center-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/windows-defender-smartscreen-available-settings.md", + "redirect_url": "/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/windows-defender-smartscreen-overview.md", + "redirect_url": "/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/windows-defender-smartscreen-set-individual-device.md", + "redirect_url": "/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-set-individual-device", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/windows-firewall-with-advanced-security-administration-with-windows-powershell.md", + "redirect_url": "/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/windows-firewall-with-advanced-security-deployment-guide.md", + "redirect_url": "/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security-deployment-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/windows-firewall-with-advanced-security-design-guide.md", + "redirect_url": "/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security-design-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/windows-firewall-with-advanced-security.md", + "redirect_url": "/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/windows-installer-rules-in-applocker.md", + "redirect_url": "/windows/device-security/applocker/windows-installer-rules-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/windows-security-baselines.md", + "redirect_url": "/windows/device-security/windows-security-baselines", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/wip-app-enterprise-context.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/wip-app-enterprise-context", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/working-with-applocker-policies.md", + "redirect_url": "/windows/device-security/applocker/working-with-applocker-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/working-with-applocker-rules.md", + "redirect_url": "/windows/device-security/applocker/working-with-applocker-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/acquire-apps-windows-store-for-business.md", + "redirect_url": "/microsoft-store/acquire-apps-windows-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "store-for-business/acquire-apps-windows-store-for-business.md", + "redirect_url": "/microsoft-store/acquire-apps-microsoft-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/add-unsigned-app-to-code-integrity-policy.md", + "redirect_url": "/microsoft-store/add-unsigned-app-to-code-integrity-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/administrative-tools-in-windows-10.md", + "redirect_url": "/windows/client-management/administrative-tools-in-windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/app-inventory-management-windows-store-for-business.md", + "redirect_url": "/microsoft-store/app-inventory-management-windows-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/apps-in-windows-store-for-business.md", + "redirect_url": "/microsoft-store/apps-in-windows-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "store-for-business/apps-in-windows-store-for-business.md", + "redirect_url": "/microsoft-store/apps-in-microsoft-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-about-appv.md", + "redirect_url": "/windows/application-management/app-v/appv-about-appv", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-add-or-remove-an-administrator-with-the-management-console.md", + "redirect_url": "/windows/application-management/app-v/appv-add-or-remove-an-administrator-with-the-management-console", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-add-or-upgrade-packages-with-the-management-console.md", + "redirect_url": "/windows/application-management/app-v/appv-add-or-upgrade-packages-with-the-management-console", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-administering-appv-with-powershell.md", + "redirect_url": "/windows/application-management/app-v/appv-administering-appv-with-powershell", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-administering-virtual-applications-with-the-management-console.md", + "redirect_url": "/windows/application-management/app-v/appv-administering-virtual-applications-with-the-management-console", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-allow-administrators-to-enable-connection-groups.md", + "redirect_url": "/windows/application-management/app-v/appv-allow-administrators-to-enable-connection-groups", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-application-publishing-and-client-interaction.md", + "redirect_url": "/windows/application-management/app-v/appv-application-publishing-and-client-interaction", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-apply-the-deployment-configuration-file-with-powershell.md", + "redirect_url": "/windows/application-management/app-v/appv-apply-the-deployment-configuration-file-with-powershell", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-apply-the-user-configuration-file-with-powershell.md", + "redirect_url": "/windows/application-management/app-v/appv-apply-the-user-configuration-file-with-powershell", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-auto-batch-sequencing.md", + "redirect_url": "/windows/application-management/app-v/appv-auto-batch-sequencing", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-auto-batch-updating.md", + "redirect_url": "/windows/application-management/app-v/appv-auto-batch-updating", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-auto-clean-unpublished-packages.md", + "redirect_url": "/windows/application-management/app-v/appv-auto-clean-unpublished-packages", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-auto-provision-a-vm.md", + "redirect_url": "/windows/application-management/app-v/appv-auto-provision-a-vm", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-available-mdm-settings.md", + "redirect_url": "/windows/application-management/app-v/appv-available-mdm-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-capacity-planning.md", + "redirect_url": "/windows/application-management/app-v/appv-capacity-planning", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-client-configuration-settings.md", + "redirect_url": "/windows/application-management/app-v/appv-client-configuration-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-configure-access-to-packages-with-the-management-console.md", + "redirect_url": "/windows/application-management/app-v/appv-configure-access-to-packages-with-the-management-console", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-configure-connection-groups-to-ignore-the-package-version.md", + "redirect_url": "/windows/application-management/app-v/appv-configure-connection-groups-to-ignore-the-package-version", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-configure-the-client-to-receive-updates-from-the-publishing-server.md", + "redirect_url": "/windows/application-management/app-v/appv-configure-the-client-to-receive-updates-from-the-publishing-server", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-connect-to-the-management-console.md", + "redirect_url": "/windows/application-management/app-v/appv-connect-to-the-management-console", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-connection-group-file.md", + "redirect_url": "/windows/application-management/app-v/appv-connection-group-file", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-connection-group-virtual-environment.md", + "redirect_url": "/windows/application-management/app-v/appv-connection-group-virtual-environment", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-convert-a-package-created-in-a-previous-version-of-appv.md", + "redirect_url": "/windows/application-management/app-v/appv-convert-a-package-created-in-a-previous-version-of-appv", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-create-a-connection-group-with-user-published-and-globally-published-packages.md", + "redirect_url": "/windows/application-management/app-v/appv-create-a-connection-group-with-user-published-and-globally-published-packages", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-create-a-connection-group.md", + "redirect_url": "/windows/application-management/app-v/appv-create-a-connection-group", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-create-a-custom-configuration-file-with-the-management-console.md", + "redirect_url": "/windows/application-management/app-v/appv-create-a-custom-configuration-file-with-the-management-console", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-create-a-package-accelerator-with-powershell.md", + "redirect_url": "/windows/application-management/app-v/appv-create-a-package-accelerator-with-powershell", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-create-a-package-accelerator.md", + "redirect_url": "/windows/application-management/app-v/appv-create-a-package-accelerator", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-create-a-virtual-application-package-package-accelerator.md", + "redirect_url": "/windows/application-management/app-v/appv-create-a-virtual-application-package-package-accelerator", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-create-and-use-a-project-template.md", + "redirect_url": "/windows/application-management/app-v/appv-create-and-use-a-project-template", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-creating-and-managing-virtualized-applications.md", + "redirect_url": "/windows/application-management/app-v/appv-creating-and-managing-virtualized-applications", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-customize-virtual-application-extensions-with-the-management-console.md", + "redirect_url": "/windows/application-management/app-v/appv-customize-virtual-application-extensions-with-the-management-console", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-delete-a-connection-group.md", + "redirect_url": "/windows/application-management/app-v/appv-delete-a-connection-group", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-delete-a-package-with-the-management-console.md", + "redirect_url": "/windows/application-management/app-v/appv-delete-a-package-with-the-management-console", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-deploy-appv-databases-with-sql-scripts.md", + "redirect_url": "/windows/application-management/app-v/appv-deploy-appv-databases-with-sql-scripts", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-deploy-appv-packages-with-electronic-software-distribution-solutions.md", + "redirect_url": "/windows/application-management/app-v/appv-deploy-appv-packages-with-electronic-software-distribution-solutions", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-deploy-the-appv-server-with-a-script.md", + "redirect_url": "/windows/application-management/app-v/appv-deploy-the-appv-server-with-a-script", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-deploy-the-appv-server.md", + "redirect_url": "/windows/application-management/app-v/appv-deploy-the-appv-server", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-deploying-appv.md", + "redirect_url": "/windows/application-management/app-v/appv-deploying-appv", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-deploying-microsoft-office-2010-wth-appv.md", + "redirect_url": "/windows/application-management/app-v/appv-deploying-microsoft-office-2010-wth-appv", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-deploying-microsoft-office-2013-with-appv.md", + "redirect_url": "/windows/application-management/app-v/appv-deploying-microsoft-office-2013-with-appv", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-deploying-microsoft-office-2016-with-appv.md", + "redirect_url": "/windows/application-management/app-v/appv-deploying-microsoft-office-2016-with-appv", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-deploying-packages-with-electronic-software-distribution-solutions.md", + "redirect_url": "/windows/application-management/app-v/appv-deploying-packages-with-electronic-software-distribution-solutions", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-deploying-the-appv-sequencer-and-client.md", + "redirect_url": "/windows/application-management/app-v/appv-deploying-the-appv-sequencer-and-client", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-deploying-the-appv-server.md", + "redirect_url": "/windows/application-management/app-v/appv-deploying-the-appv-server", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-deployment-checklist.md", + "redirect_url": "/windows/application-management/app-v/appv-deployment-checklist", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-dynamic-configuration.md", + "redirect_url": "/windows/application-management/app-v/appv-dynamic-configuration", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-enable-administrators-to-publish-packages-with-electronic-software-distribution-solutions.md", + "redirect_url": "/windows/application-management/app-v/appv-enable-administrators-to-publish-packages-with-electronic-software-distribution-solutions", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-enable-reporting-on-the-appv-client-with-powershell.md", + "redirect_url": "/windows/application-management/app-v/appv-enable-reporting-on-the-appv-client-with-powershell", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-enable-the-app-v-desktop-client.md", + "redirect_url": "/windows/application-management/app-v/appv-enable-the-app-v-desktop-client", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-evaluating-appv.md", + "redirect_url": "/windows/application-management/app-v/appv-evaluating-appv", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-for-windows.md", + "redirect_url": "/windows/application-management/app-v/appv-for-windows", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-getting-started.md", + "redirect_url": "/windows/application-management/app-v/appv-getting-started", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-high-level-architecture.md", + "redirect_url": "/windows/application-management/app-v/appv-high-level-architecture", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-install-the-appv-databases-and-convert-the-associated-security-identifiers-with-powershell.md", + "redirect_url": "/windows/application-management/app-v/appv-install-the-appv-databases-and-convert-the-associated-security-identifiers-with-powershell", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-install-the-management-and-reporting-databases-on-separate-computers.md", + "redirect_url": "/windows/application-management/app-v/appv-install-the-management-and-reporting-databases-on-separate-computers", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-install-the-management-server-on-a-standalone-computer.md", + "redirect_url": "/windows/application-management/app-v/appv-install-the-management-server-on-a-standalone-computer", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-install-the-publishing-server-on-a-remote-computer.md", + "redirect_url": "/windows/application-management/app-v/appv-install-the-publishing-server-on-a-remote-computer", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-install-the-reporting-server-on-a-standalone-computer.md", + "redirect_url": "/windows/application-management/app-v/appv-install-the-reporting-server-on-a-standalone-computer", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-install-the-sequencer.md", + "redirect_url": "/windows/application-management/app-v/appv-install-the-sequencer", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-load-the-powershell-cmdlets-and-get-cmdlet-help.md", + "redirect_url": "/windows/application-management/app-v/appv-load-the-powershell-cmdlets-and-get-cmdlet-help", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-maintaining-appv.md", + "redirect_url": "/windows/application-management/app-v/appv-maintaining-appv", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-manage-appv-packages-running-on-a-stand-alone-computer-with-powershell.md", + "redirect_url": "/windows/application-management/app-v/appv-manage-appv-packages-running-on-a-stand-alone-computer-with-powershell", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-manage-connection-groups-on-a-stand-alone-computer-with-powershell.md", + "redirect_url": "/windows/application-management/app-v/appv-manage-connection-groups-on-a-stand-alone-computer-with-powershell", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-managing-connection-groups.md", + "redirect_url": "/windows/application-management/app-v/appv-managing-connection-groups", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-migrating-to-appv-from-a-previous-version.md", + "redirect_url": "/windows/application-management/app-v/appv-migrating-to-appv-from-a-previous-version", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-modify-an-existing-virtual-application-package.md", + "redirect_url": "/windows/application-management/app-v/appv-modify-an-existing-virtual-application-package", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-modify-client-configuration-with-powershell.md", + "redirect_url": "/windows/application-management/app-v/appv-modify-client-configuration-with-powershell", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-move-the-appv-server-to-another-computer.md", + "redirect_url": "/windows/application-management/app-v/appv-move-the-appv-server-to-another-computer", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-operations.md", + "redirect_url": "/windows/application-management/app-v/appv-operations", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-performance-guidance.md", + "redirect_url": "/windows/application-management/app-v/appv-performance-guidance", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-planning-checklist.md", + "redirect_url": "/windows/application-management/app-v/appv-planning-checklist", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-planning-folder-redirection-with-appv.md", + "redirect_url": "/windows/application-management/app-v/appv-planning-folder-redirection-with-appv", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-planning-for-appv-server-deployment.md", + "redirect_url": "/windows/application-management/app-v/appv-planning-for-appv-server-deployment", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-planning-for-appv.md", + "redirect_url": "/windows/application-management/app-v/appv-planning-for-appv", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-planning-for-high-availability-with-appv.md", + "redirect_url": "/windows/application-management/app-v/appv-planning-for-high-availability-with-appv", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-planning-for-sequencer-and-client-deployment.md", + "redirect_url": "/windows/application-management/app-v/appv-planning-for-sequencer-and-client-deployment", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-planning-for-using-appv-with-office.md", + "redirect_url": "/windows/application-management/app-v/appv-planning-for-using-appv-with-office", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-planning-to-deploy-appv-with-electronic-software-distribution-solutions.md", + "redirect_url": "/windows/application-management/app-v/appv-planning-to-deploy-appv-with-electronic-software-distribution-solutions", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-planning-to-deploy-appv.md", + "redirect_url": "/windows/application-management/app-v/appv-planning-to-deploy-appv", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-preparing-your-environment.md", + "redirect_url": "/windows/application-management/app-v/appv-preparing-your-environment", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-prerequisites.md", + "redirect_url": "/windows/application-management/app-v/appv-prerequisites", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-publish-a-connection-group.md", + "redirect_url": "/windows/application-management/app-v/appv-publish-a-connection-group", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-publish-a-packages-with-the-management-console.md", + "redirect_url": "/windows/application-management/app-v/appv-publish-a-packages-with-the-management-console", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-register-and-unregister-a-publishing-server-with-the-management-console.md", + "redirect_url": "/windows/application-management/app-v/appv-register-and-unregister-a-publishing-server-with-the-management-console", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-release-notes-for-appv-for-windows-1703.md", + "redirect_url": "/windows/application-management/app-v/appv-release-notes-for-appv-for-windows-1703", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-release-notes-for-appv-for-windows.md", + "redirect_url": "/windows/application-management/app-v/appv-release-notes-for-appv-for-windows", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-reporting.md", + "redirect_url": "/windows/application-management/app-v/appv-reporting", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-running-locally-installed-applications-inside-a-virtual-environment.md", + "redirect_url": "/windows/application-management/app-v/appv-running-locally-installed-applications-inside-a-virtual-environment", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-security-considerations.md", + "redirect_url": "/windows/application-management/app-v/appv-security-considerations", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-sequence-a-new-application.md", + "redirect_url": "/windows/application-management/app-v/appv-sequence-a-new-application", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-sequence-a-package-with-powershell.md", + "redirect_url": "/windows/application-management/app-v/appv-sequence-a-package-with-powershell", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-supported-configurations.md", + "redirect_url": "/windows/application-management/app-v/appv-supported-configurations", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-technical-reference.md", + "redirect_url": "/windows/application-management/app-v/appv-technical-reference", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-transfer-access-and-configurations-to-another-version-of-a-package-with-the-management-console.md", + "redirect_url": "/windows/application-management/app-v/appv-transfer-access-and-configurations-to-another-version-of-a-package-with-the-management-console", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-troubleshooting.md", + "redirect_url": "/windows/application-management/app-v/appv-troubleshooting", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-upgrading-to-app-v-for-windows-10-from-an-existing-installation.md", + "redirect_url": "/windows/application-management/app-v/appv-upgrading-to-app-v-for-windows-10-from-an-existing-installation", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-using-the-client-management-console.md", + "redirect_url": "/windows/application-management/app-v/appv-using-the-client-management-console", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-view-and-configure-applications-and-default-virtual-application-extensions-with-the-management-console.md", + "redirect_url": "/windows/application-management/app-v/appv-view-and-configure-applications-and-default-virtual-application-extensions-with-the-management-console", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-viewing-appv-server-publishing-metadata.md", + "redirect_url": "/windows/application-management/app-v/appv-viewing-appv-server-publishing-metadata", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/assign-apps-to-employees.md", + "redirect_url": "/microsoft-store/assign-apps-to-employees", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/configure-mdm-provider-windows-store-for-business.md", + "redirect_url": "/microsoft-store/configure-mdm-provider-windows-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "store-for-business/configure-mdm-provider-windows-store-for-business.md", + "redirect_url": "/microsoft-store/configure-mdm-provider-microsoft-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/connect-to-remote-aadj-pc.md", + "redirect_url": "/windows/client-management/connect-to-remote-aadj-pc", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/device-guard-signing-portal.md", + "redirect_url": "/microsoft-store/device-guard-signing-portal", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/distribute-apps-from-your-private-store.md", + "redirect_url": "/microsoft-store/distribute-apps-from-your-private-store", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/distribute-apps-to-your-employees-windows-store-for-business.md", + "redirect_url": "/microsoft-store/distribute-apps-to-your-employees-windows-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "store-for-business/distribute-apps-to-your-employees-windows-store-for-business.md", + "redirect_url": "/microsoft-store/distribute-apps-to-your-employees-microsoft-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/distribute-apps-with-management-tool.md", + "redirect_url": "/microsoft-store/distribute-apps-with-management-tool", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/distribute-offline-apps.md", + "redirect_url": "/microsoft-store/distribute-offline-apps", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/find-and-acquire-apps-overview.md", + "redirect_url": "/microsoft-store/find-and-acquire-apps-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/group-policies-for-enterprise-and-education-editions.md", + "redirect_url": "/windows/client-management/group-policies-for-enterprise-and-education-editions", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/join-windows-10-mobile-to-azure-active-directory.md", + "redirect_url": "/windows/client-management/join-windows-10-mobile-to-azure-active-directory", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/manage-access-to-private-store.md", + "redirect_url": "/microsoft-store/manage-access-to-private-store", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/manage-apps-windows-store-for-business-overview.md", + "redirect_url": "/microsoft-store/manage-apps-windows-store-for-business-overview", + "redirect_document_id": true + }, + { + "source_path": "store-for-business/manage-apps-windows-store-for-business-overview.md", + "redirect_url": "/microsoft-store/manage-apps-microsoft-store-for-business-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/manage-corporate-devices.md", + "redirect_url": "/windows/client-management/index", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/manage-orders-windows-store-for-business.md", + "redirect_url": "/microsoft-store/manage-orders-windows-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "store-for-business/manage-orders-windows-store-for-business.md", + "redirect_url": "/microsoft-store/manage-orders-microsoft-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/manage-private-store-settings.md", + "redirect_url": "/microsoft-store/manage-private-store-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/manage-settings-windows-store-for-business.md", + "redirect_url": "/microsoft-store/manage-settings-windows-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "store-for-business/manage-settings-windows-store-for-business.md", + "redirect_url": "/microsoft-store/manage-settings-microsoft-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/manage-users-and-groups-windows-store-for-business.md", + "redirect_url": "/microsoft-store/manage-users-and-groups-windows-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "store-for-business/manage-users-and-groups-windows-store-for-business.md", + "redirect_url": "/microsoft-store/manage-users-and-groups-microsoft-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/manage-windows-10-in-your-organization-modern-management.md", + "redirect_url": "/windows/client-management/manage-windows-10-in-your-organization-modern-management", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/mandatory-user-profile.md", + "redirect_url": "/windows/client-management/mandatory-user-profile", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/new-policies-for-windows-10.md", + "redirect_url": "/windows/client-management/new-policies-for-windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/prerequisites-windows-store-for-business.md", + "redirect_url": "/microsoft-store/prerequisites-windows-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "store-for-business/prerequisites-windows-store-for-business.md", + "redirect_url": "/microsoft-store/prerequisites-microsoft-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/reset-a-windows-10-mobile-device.md", + "redirect_url": "/windows/client-management/reset-a-windows-10-mobile-device", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/roles-and-permissions-windows-store-for-business.md", + "redirect_url": "/microsoft-store/roles-and-permissions-windows-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "store-for-business/roles-and-permissions-windows-store-for-business.md", + "redirect_url": "/microsoft-store/roles-and-permissions-microsoft-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/settings-reference-windows-store-for-business.md", + "redirect_url": "/microsoft-store/settings-reference-windows-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "store-for-business/settings-reference-windows-store-for-business.md", + "redirect_url": "/microsoft-store/settings-reference-microsoft-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/sign-code-integrity-policy-with-device-guard-signing.md", + "redirect_url": "/microsoft-store/sign-code-integrity-policy-with-device-guard-signing", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/sign-up-windows-store-for-business-overview.md", + "redirect_url": "/microsoft-store/sign-up-windows-store-for-business-overview", + "redirect_document_id": true + }, + { + "source_path": "store-for-business/sign-up-windows-store-for-business-overview.md", + "redirect_url": "/microsoft-store/sign-up-microsoft-store-for-business-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/sign-up-windows-store-for-business.md", + "redirect_url": "/microsoft-store/sign-up-windows-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "store-for-business/sign-up-windows-store-for-business.md", + "redirect_url": "/microsoft-store/sign-up-microsoft-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/troubleshoot-windows-store-for-business.md", + "redirect_url": "/microsoft-store/troubleshoot-windows-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "store-for-business/troubleshoot-windows-store-for-business.md", + "redirect_url": "/microsoft-store/troubleshoot-microsoft-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-administering-uev-with-windows-powershell-and-wmi.md", + "redirect_url": "/windows/configuration/ue-v/uev-administering-uev-with-windows-powershell-and-wmi", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-administering-uev.md", + "redirect_url": "/windows/configuration/ue-v/uev-administering-uev", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-application-template-schema-reference.md", + "redirect_url": "/windows/configuration/ue-v/uev-application-template-schema-reference", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-changing-the-frequency-of-scheduled-tasks.md", + "redirect_url": "/windows/configuration/ue-v/uev-changing-the-frequency-of-scheduled-tasks", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-configuring-uev-with-group-policy-objects.md", + "redirect_url": "/windows/configuration/ue-v/uev-configuring-uev-with-group-policy-objects", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-configuring-uev-with-system-center-configuration-manager.md", + "redirect_url": "/windows/configuration/ue-v/uev-configuring-uev-with-system-center-configuration-manager", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-deploy-required-features.md", + "redirect_url": "/windows/configuration/ue-v/uev-deploy-required-features", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-deploy-uev-for-custom-applications.md", + "redirect_url": "/windows/configuration/ue-v/uev-deploy-uev-for-custom-applications", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-for-windows.md", + "redirect_url": "/windows/configuration/ue-v/uev-for-windows", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-getting-started.md", + "redirect_url": "/windows/configuration/ue-v/uev-getting-started", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-manage-administrative-backup-and-restore.md", + "redirect_url": "/windows/configuration/ue-v/uev-manage-administrative-backup-and-restore", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-manage-configurations.md", + "redirect_url": "/windows/configuration/ue-v/uev-manage-configurations", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-managing-settings-location-templates-using-windows-powershell-and-wmi.md", + "redirect_url": "/windows/configuration/ue-v/uev-managing-settings-location-templates-using-windows-powershell-and-wmi", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-managing-uev-agent-and-packages-with-windows-powershell-and-wmi.md", + "redirect_url": "/windows/configuration/ue-v/uev-managing-uev-agent-and-packages-with-windows-powershell-and-wmi", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-migrating-settings-packages.md", + "redirect_url": "/windows/configuration/ue-v/uev-migrating-settings-packages", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-prepare-for-deployment.md", + "redirect_url": "/windows/configuration/ue-v/uev-prepare-for-deployment", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-release-notes-1607.md", + "redirect_url": "/windows/configuration/ue-v/uev-release-notes-1607", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-security-considerations.md", + "redirect_url": "/windows/configuration/ue-v/uev-security-considerations", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-sync-methods.md", + "redirect_url": "/windows/configuration/ue-v/uev-sync-methods", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-sync-trigger-events.md", + "redirect_url": "/windows/configuration/ue-v/uev-sync-trigger-events", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-synchronizing-microsoft-office-with-uev.md", + "redirect_url": "/windows/configuration/ue-v/uev-synchronizing-microsoft-office-with-uev", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-technical-reference.md", + "redirect_url": "/windows/configuration/ue-v/uev-technical-reference", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-troubleshooting.md", + "redirect_url": "/windows/configuration/ue-v/uev-troubleshooting", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-upgrade-uev-from-previous-releases.md", + "redirect_url": "/windows/configuration/ue-v/uev-upgrade-uev-from-previous-releases", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-using-uev-with-application-virtualization-applications.md", + "redirect_url": "/windows/configuration/ue-v/uev-using-uev-with-application-virtualization-applications", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-whats-new-in-uev-for-windows.md", + "redirect_url": "/windows/configuration/ue-v/uev-whats-new-in-uev-for-windows", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-working-with-custom-templates-and-the-uev-generator.md", + "redirect_url": "/windows/configuration/ue-v/uev-working-with-custom-templates-and-the-uev-generator", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/update-windows-store-for-business-account-settings.md", + "redirect_url": "/microsoft-store/update-windows-store-for-business-account-settings", + "redirect_document_id": true + }, + { + "source_path": "store-for-business/update-windows-store-for-business-account-settings.md", + "redirect_url": "/microsoft-store/update-microsoft-store-for-business-account-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/windows-10-mobile-and-mdm.md", + "redirect_url": "/windows/client-management/windows-10-mobile-and-mdm", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/windows-libraries.md", + "redirect_url": "/windows/client-management/windows-libraries", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/windows-store-for-business-overview.md", + "redirect_url": "/microsoft-store/windows-store-for-business-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/working-with-line-of-business-apps.md", + "redirect_url": "/microsoft-store/working-with-line-of-business-apps", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/act-technical-reference.md", + "redirect_url": "/windows/deployment/planning/act-technical-reference", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/applying-filters-to-data-in-the-sua-tool.md", + "redirect_url": "/windows/deployment/planning/applying-filters-to-data-in-the-sua-tool", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/available-data-types-and-operators-in-compatibility-administrator.md", + "redirect_url": "/windows/deployment/planning/available-data-types-and-operators-in-compatibility-administrator", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/best-practice-recommendations-for-windows-to-go.md", + "redirect_url": "/windows/deployment/planning/best-practice-recommendations-for-windows-to-go", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/change-history-for-plan-for-windows-10-deployment.md", + "redirect_url": "/windows/deployment/planning/change-history-for-plan-for-windows-10-deployment", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/compatibility-administrator-users-guide.md", + "redirect_url": "/windows/deployment/planning/compatibility-administrator-users-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/compatibility-fix-database-management-strategies-and-deployment.md", + "redirect_url": "/windows/deployment/planning/compatibility-fix-database-management-strategies-and-deployment", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/compatibility-fixes-for-windows-8-windows-7-and-windows-vista.md", + "redirect_url": "/windows/deployment/planning/compatibility-fixes-for-windows-8-windows-7-and-windows-vista", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/creating-a-custom-compatibility-fix-in-compatibility-administrator.md", + "redirect_url": "/windows/deployment/planning/creating-a-custom-compatibility-fix-in-compatibility-administrator", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/creating-a-custom-compatibility-mode-in-compatibility-administrator.md", + "redirect_url": "/windows/deployment/planning/creating-a-custom-compatibility-mode-in-compatibility-administrator", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/creating-an-apphelp-message-in-compatibility-administrator.md", + "redirect_url": "/windows/deployment/planning/creating-an-apphelp-message-in-compatibility-administrator", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/deployment-considerations-for-windows-to-go.md", + "redirect_url": "/windows/deployment/planning/deployment-considerations-for-windows-to-go", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/device-dialog-box.md", + "redirect_url": "/windows/deployment/planning/device-dialog-box", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/enabling-and-disabling-compatibility-fixes-in-compatibility-administrator.md", + "redirect_url": "/windows/deployment/planning/enabling-and-disabling-compatibility-fixes-in-compatibility-administrator", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/fixing-applications-by-using-the-sua-tool.md", + "redirect_url": "/windows/deployment/planning/fixing-applications-by-using-the-sua-tool", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/installing-and-uninstalling-custom-compatibility-databases-in-compatibility-administrator.md", + "redirect_url": "/windows/deployment/planning/installing-and-uninstalling-custom-compatibility-databases-in-compatibility-administrator", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/managing-application-compatibility-fixes-and-custom-fix-databases.md", + "redirect_url": "/windows/deployment/planning/managing-application-compatibility-fixes-and-custom-fix-databases", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/prepare-your-organization-for-windows-to-go.md", + "redirect_url": "/windows/deployment/planning/prepare-your-organization-for-windows-to-go", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/searching-for-fixed-applications-in-compatibility-administrator.md", + "redirect_url": "/windows/deployment/planning/searching-for-fixed-applications-in-compatibility-administrator", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/searching-for-installed-compatibility-fixes-with-the-query-tool-in-compatibility-administrator.md", + "redirect_url": "/windows/deployment/planning/searching-for-installed-compatibility-fixes-with-the-query-tool-in-compatibility-administrator", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/security-and-data-protection-considerations-for-windows-to-go.md", + "redirect_url": "/windows/deployment/planning/security-and-data-protection-considerations-for-windows-to-go", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/showing-messages-generated-by-the-sua-tool.md", + "redirect_url": "/windows/deployment/planning/showing-messages-generated-by-the-sua-tool", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/sua-users-guide.md", + "redirect_url": "/windows/deployment/planning/sua-users-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/tabs-on-the-sua-tool-interface.md", + "redirect_url": "/windows/deployment/planning/tabs-on-the-sua-tool-interface", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/testing-your-application-mitigation-packages.md", + "redirect_url": "/windows/deployment/planning/testing-your-application-mitigation-packages", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/understanding-and-using-compatibility-fixes.md", + "redirect_url": "/windows/deployment/planning/understanding-and-using-compatibility-fixes", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/using-the-compatibility-administrator-tool.md", + "redirect_url": "/windows/deployment/planning/using-the-compatibility-administrator-tool", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/using-the-sdbinstexe-command-line-tool.md", + "redirect_url": "/windows/deployment/planning/using-the-sdbinstexe-command-line-tool", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/using-the-sua-tool.md", + "redirect_url": "/windows/deployment/planning/using-the-sua-tool", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/using-the-sua-wizard.md", + "redirect_url": "/windows/deployment/planning/using-the-sua-wizard", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/viewing-the-events-screen-in-compatibility-administrator.md", + "redirect_url": "/windows/deployment/planning/viewing-the-events-screen-in-compatibility-administrator", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/windows-10-compatibility.md", + "redirect_url": "/windows/deployment/planning/windows-10-compatibility", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/windows-10-deployment-considerations.md", + "redirect_url": "/windows/deployment/planning/windows-10-deployment-considerations", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/windows-10-enterprise-faq-itpro.md", + "redirect_url": "/windows/deployment/planning/windows-10-enterprise-faq-itpro", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/windows-10-infrastructure-requirements.md", + "redirect_url": "/windows/deployment/planning/windows-10-infrastructure-requirements", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/windows-to-go-frequently-asked-questions.md", + "redirect_url": "/windows/deployment/planning/windows-to-go-frequently-asked-questions", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/windows-to-go-overview.md", + "redirect_url": "/windows/deployment/planning/windows-to-go-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/update/change-history-for-update-windows-10.md", + "redirect_url": "/windows/deployment/update/change-history-for-update-windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/update/update-compliance-get-started.md", + "redirect_url": "/windows/deployment/update/update-compliance-get-started", + "redirect_document_id": true + }, + { + "source_path": "windows/update/update-compliance-monitor.md", + "redirect_url": "/windows/deployment/update/update-compliance-monitor", + "redirect_document_id": true + }, + { + "source_path": "windows/update/update-compliance-using.md", + "redirect_url": "/windows/deployment/update/update-compliance-using", + "redirect_document_id": true + }, + { + "source_path": "windows/update/waas-branchcache.md", + "redirect_url": "/windows/deployment/update/waas-branchcache", + "redirect_document_id": true + }, + { + "source_path": "windows/update/waas-configure-wufb.md", + "redirect_url": "/windows/deployment/update/waas-configure-wufb", + "redirect_document_id": true + }, + { + "source_path": "windows/update/waas-delivery-optimization.md", + "redirect_url": "/windows/deployment/update/waas-delivery-optimization", + "redirect_document_id": true + }, + { + "source_path": "windows/update/waas-deployment-rings-windows-10-updates.md", + "redirect_url": "/windows/deployment/update/waas-deployment-rings-windows-10-updates", + "redirect_document_id": true + }, + { + "source_path": "windows/update/waas-integrate-wufb.md", + "redirect_url": "/windows/deployment/update/waas-integrate-wufb", + "redirect_document_id": true + }, + { + "source_path": "windows/update/waas-manage-updates-configuration-manager.md", + "redirect_url": "/windows/deployment/update/waas-manage-updates-configuration-manager", + "redirect_document_id": true + }, + { + "source_path": "windows/update/waas-manage-updates-wsus.md", + "redirect_url": "/windows/deployment/update/waas-manage-updates-wsus", + "redirect_document_id": true + }, + { + "source_path": "windows/update/waas-manage-updates-wufb.md", + "redirect_url": "/windows/deployment/update/waas-manage-updates-wufb", + "redirect_document_id": true + }, + { + "source_path": "windows/update/waas-mobile-updates.md", + "redirect_url": "/windows/deployment/update/waas-mobile-updates", + "redirect_document_id": true + }, + { + "source_path": "windows/update/waas-optimize-windows-10-updates.md", + "redirect_url": "/windows/deployment/update/waas-optimize-windows-10-updates", + "redirect_document_id": true + }, + { + "source_path": "windows/update/waas-overview.md", + "redirect_url": "/windows/deployment/update/waas-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/update/waas-quick-start.md", + "redirect_url": "/windows/deployment/update/waas-quick-start", + "redirect_document_id": true + }, + { + "source_path": "windows/update/waas-restart.md", + "redirect_url": "/windows/deployment/update/waas-restart", + "redirect_document_id": true + }, + { + "source_path": "windows/update/waas-servicing-branches-windows-10-updates.md", + "redirect_url": "/windows/deployment/update/waas-servicing-branches-windows-10-updates", + "redirect_document_id": true + }, + { + "source_path": "windows/update/waas-servicing-strategy-windows-10-updates.md", + "redirect_url": "/windows/deployment/update/waas-servicing-strategy-windows-10-updates", + "redirect_document_id": true + }, + { + "source_path": "windows/update/waas-windows-insider-for-business-aad.md", + "redirect_url": "/windows/deployment/update/waas-windows-insider-for-business-aad", + "redirect_document_id": true + }, + { + "source_path": "windows/update/waas-windows-insider-for-business.md", + "redirect_url": "/windows/deployment/update/waas-windows-insider-for-business", + "redirect_document_id": true + }, + { + "source_path": "windows/update/waas-wufb-group-policy.md", + "redirect_url": "/windows/deployment/update/waas-wufb-group-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/update/waas-wufb-intune.md", + "redirect_url": "/windows/deployment/update/waas-wufb-intune", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/manage-settings-app-with-group-policy.md", + "redirect_url": "/windows/client-management/manage-settings-app-with-group-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/client-management/mdm/create-a-custom-configuration-service-provider.md", + "redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference", + "redirect_document_id": true + }, + { + "source_path": "windows/client-management/mdm/design-a-custom-windows-csp.md", + "redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference", + "redirect_document_id": false + }, + { + "source_path": "windows/client-management/mdm/iconfigserviceprovider2.md", + "redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference", + "redirect_document_id": false + }, + { + "source_path": "windows/client-management/mdm/iconfigserviceprovider2configmanagernotification.md", + "redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference", + "redirect_document_id": false + }, + { + "source_path": "windows/client-management/mdm/iconfigserviceprovider2getnode.md", + "redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference", + "redirect_document_id": false + }, + { + "source_path": "windows/client-management/mdm/icspnode.md", + "redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference", + "redirect_document_id": false + }, + { + "source_path": "windows/client-management/mdm/icspnodeadd.md", + "redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference", + "redirect_document_id": false + }, + { + "source_path": "windows/client-management/mdm/icspnodeclear.md", + "redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference", + "redirect_document_id": false + }, + { + "source_path": "windows/client-management/mdm/icspnodecopy.md", + "redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference", + "redirect_document_id": false + }, + { + "source_path": "windows/client-management/mdm/icspnodedeletechild.md", + "redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference", + "redirect_document_id": false + }, + { + "source_path": "windows/client-management/mdm/icspnodedeleteproperty.md", + "redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference", + "redirect_document_id": false + }, + { + "source_path": "windows/client-management/mdm/icspnodeexecute.md", + "redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference", + "redirect_document_id": false + }, + { + "source_path": "windows/client-management/mdm/icspnodegetchildnodenames.md", + "redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference", + "redirect_document_id": false + }, + { + "source_path": "windows/client-management/mdm/icspnodegetproperty.md", + "redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference", + "redirect_document_id": false + }, + { + "source_path": "windows/client-management/mdm/icspnodegetpropertyidentifiers.md", + "redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference", + "redirect_document_id": false + }, + { + "source_path": "windows/client-management/mdm/icspnodegetvalue.md", + "redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference", + "redirect_document_id": false + }, + { + "source_path": "windows/client-management/mdm/icspnodemove.md", + "redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference", + "redirect_document_id": false + }, + { + "source_path": "windows/client-management/mdm/icspnodesetproperty.md", + "redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference", + "redirect_document_id": false + }, + { + "source_path": "windows/client-management/mdm/icspnodesetvalue.md", + "redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference", + "redirect_document_id": false + }, + { + "source_path": "windows/client-management/mdm/icspnodetransactioning.md", + "redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference", + "redirect_document_id": false + }, + { + "source_path": "windows/client-management/mdm/icspvalidate.md", + "redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference", + "redirect_document_id": false + }, + { + "source_path": "windows/client-management/mdm/samples-for-writing-a-custom-configuration-service-provider.md", + "redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference", + "redirect_document_id": false + }, + { + "source_path": "windows/keep-secure/collect-wip-audit-event-logs.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/collect-wip-audit-event-logs", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/deploy-managed-installer-for-device-guard.md", + "redirect_url": "/windows/device-security/device-guard/deploy-managed-installer-for-device-guard", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-readiness-data-sharing.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-data-sharing", + "redirect_document_id": true + }, + { + "source_path": "windows/index.md", + "redirect_url": "/windows/windows-10/index", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/index.md", + "redirect_url": "/windows/windows-10/index", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/index.md", + "redirect_url": "/windows/deployment/index", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/index.md", + "redirect_url": "/windows/deployment/planning/index", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/index.md", + "redirect_url": "/windows/windows-10/index", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/windows-store-for-business.md", + "redirect_url": "/microsoft-store/index", + "redirect_document_id": true + }, + { + "source_path": "windows/update/index.md", + "redirect_url": "/windows/deployment/update/index", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/index.md", + "redirect_url": "/windows/configuration/index", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/security-technologies.md", + "redirect_url": "/windows/windows-10/index", + "redirect_document_id": true + }, + { + "source_path": "education/get-started/index.md", + "redirect_url": "/education/get-started/get-started-with-microsoft-education", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/windows-10-enterprise-security-guides.md", + "redirect_url": "/windows/windows-10/index", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/change-history-for-keep-windows-10-secure.md", + "redirect_url": "/windows/windows-10/index", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/change-history-for-manage-and-update-windows-10.md", + "redirect_url": "/windows/windows-10/index", + "redirect_document_id": true + }, + { + "source_path": "windows/deployment/update/waas-servicing-branches-windows-10-updates.md", + "redirect_url": "/windows/deployment/update/waas-servicing-channels-windows-10-updates", + "redirect_document_id": true + }, + { + "source_path": "windows/deployment/windows-10-enterprise-activation-subscription.md", + "redirect_url": "/windows/deployment/windows-10-enterprise-subscription-activation", + "redirect_document_id": true + }, + { + "source_path": "windows/deployment/windows-10-auto-pilot.md", + "redirect_url": "/windows/deployment/windows-autopilot/windows-10-autopilot", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/threat-analytics-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/threat-analytics-dashboard-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/privacy/basic-level-windows-diagnostic-events-and-fields.md", + "redirect_url": "/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903", + "redirect_document_id": true + }, + { + "source_path": "windows/configuration/basic-level-windows-diagnostic-events-and-fields-1703.md", + "redirect_url": "/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703", + "redirect_document_id": true + }, + { + "source_path": "windows/configuration/basic-level-windows-diagnostic-events-and-fields-1709.md", + "redirect_url": "/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709", + "redirect_document_id": true + }, + { + "source_path": "windows/configuration/basic-level-windows-diagnostic-events-and-fields.md", + "redirect_url": "/windows/privacy/basic-level-windows-diagnostic-events-and-fields", + "redirect_document_id": true + }, + { + "source_path": "windows/configuration/configure-windows-diagnostic-data-in-your-organization.md", + "redirect_url": "/windows/privacy/configure-windows-diagnostic-data-in-your-organization", + "redirect_document_id": true + }, + { + "source_path": "windows/configuration/diagnostic-data-viewer-overview.md", + "redirect_url": "/windows/privacy/diagnostic-data-viewer-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/configuration/enhanced-diagnostic-data-windows-analytics-events-and-fields.md", + "redirect_url": "/windows/privacy/enhanced-diagnostic-data-windows-analytics-events-and-fields", + "redirect_document_id": true + }, + { + "source_path": "windows/configuration/gdpr-win10-whitepaper.md", + "redirect_url": "/windows/privacy/gdpr-win10-whitepaper", + "redirect_document_id": true + }, + { + "source_path": "windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services.md", + "redirect_url": "/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services", + "redirect_document_id": true + }, + { + "source_path": "windows/configuration/manage-windows-endpoints-version-1709.md", + "redirect_url": "/windows/privacy/manage-windows-endpoints", + "redirect_document_id": true + }, + { + "source_path": "windows/configuration/windows-diagnostic-data-1703.md", + "redirect_url": "/windows/privacy/windows-diagnostic-data-1703", + "redirect_document_id": true + }, + { + "source_path": "windows/configuration/windows-diagnostic-data.md", + "redirect_url": "/windows/privacy/windows-diagnostic-data", + "redirect_document_id": true + }, + { + "source_path": "windows/deployment/upgrade/windows-10-edition-downgrades.md", + "redirect_url": "/windows/deployment/upgrade/windows-10-edition-upgrades", + "redirect_document_id": true + }, + { + "source_path": "education/windows/windows-automatic-redeployment.md", + "redirect_url": "/education/windows/autopilot-reset", + "redirect_document_id": true + }, + { + "source_path": "windows/deployment/windows-autopilot/windows-10-autopilot.md", + "redirect_url": "/windows/deployment/windows-autopilot/windows-autopilot", + "redirect_document_id": true + }, + { + "source_path": "windows/privacy/manage-windows-endpoints.md", + "redirect_url": "/windows/privacy/manage-windows-1809-endpoints", + "redirect_document_id": true + }, + { + "source_path":"windows/security/threat-protection/windows-defender-atp/exposed-apis-create-app-nativeapp.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-nativeapp", + "redirect_document_id": false + }, + { + "source_path":"windows/security/threat-protection/windows-defender-atp/exposed-apis-create-app-webapp.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-webapp", + "redirect_document_id": false + }, + { + "source_path":"windows/security/threat-protection/windows-defender-atp/exposed-apis-full-sample-powershell.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-full-sample-powershell", + "redirect_document_id": false + }, + { + "source_path":"windows/security/threat-protection/windows-defender-atp/exposed-apis-list.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-list", + "redirect_document_id": false + }, + { + "source_path":"windows/security/threat-protection/windows-defender-atp/exposed-apis-odata-samples.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-odata-samples", + "redirect_document_id": false + }, + { + "source_path":"windows/security/threat-protection/windows-defender-atp/exposed-apis-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/supported-apis-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-actor-information-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-actor-related-alerts-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-alerts-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-alerts-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alerts", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-info-by-id", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-actor-info-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-domain-info", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-files-info", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-ip-info", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-machine-info", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-domain-statistics-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-domain-statistics", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/is-domain-seen-in-org", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/block-file-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-file-information", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-file-related-alerts", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-file-related-machines", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-file-statistics", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-fileactions-collection-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/unblock-file-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-machines", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-ip-statistics", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/is-ip-seen-org", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/find-machine-info-by-ip", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-filemachineaction-object", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-filemachineactions-collection-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-filemachineactions-collection-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-filemachineactions-collection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/get-machineaction-object", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-machineaction-object.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machineaction-object", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/get-machineactions-collection", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-machineactions-collection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machineactions-collection", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-machines-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-machines-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machines", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-started.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-started", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/microsoft-defender-atp/get-started.md", + "redirect_url": "/windows/security/threat-protection/index.md", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-package-sas-uri", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/machine-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machine", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/isolate-machine", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/unisolate-machine", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/unrestrict-code-execution", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/request-sample-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/restrict-code-execution", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/run-advanced-query-api.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-api", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/api-microsoft-flow.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/run-advanced-query-sample-power-bi-app-token.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-power-bi-app-token", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-power-bi-app-token.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/api-power-bi", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/run-advanced-query-sample-powershell.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-powershell", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/run-advanced-query-sample-python.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-python", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-av-scan", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/stop-and-quarantine-file-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/stop-and-quarantine-file-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/stop-and-quarantine-file", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-user-info", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-ti-indicators-collection-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-ti-indicators-collection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-user-information-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-user-information-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-user-information", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-user-related-alerts", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/initiate-autoir-investigation-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-ti-indicator-by-id-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/threat-analytics-dashboard-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/threat-analytics", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/threat-analytics.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/threat-analytics", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/threat-and-vuln-mgt-scenarios.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/add-or-remove-machine-tags-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/alerts-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/alerts", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/create-alert-by-reference-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/delete-ti-indicator-by-id-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/files-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/files", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/find-machines-by-ip-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/find-machines-by-ip", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/microsoft-defender-atp/is-domain-seen-in-org.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/microsoft-defender-atp/get-ip-related-machines.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp/is-ip-seen-org.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp/exposed-apis-list", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/machineaction-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machineaction", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/machineactionsnote.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machineactionsnote", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/offboard-machine-api-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/offboard-machine-api", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/post-ti-indicator-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/post-ti-indicator", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/ti-indicator-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/ti-indicator", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/update-alert-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/update-alert", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/incidents-queue.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/incidents-queue", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/microsoft-defender-atp/incidents-queue.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/view-incidents-queue", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/troubleshoot-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-mdatp", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/microsoft-defender-atp/troubleshoot-overview.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-mdatp", + "redirect_document_id": true + }, + { + "source_path":"windows/security/threat-protection/windows-defender-atp/use-apis.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/user-alert-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/user", + "source_path": "windows/deployment/planning/windows-10-fall-creators-deprecation.md", + "redirect_url": "/windows/deployment/planning/windows-10-1709-removed-features", + "redirect_document_id": true + }, + { + "source_path": "windows/deployment/planning/windows-10-creators-update-deprecation.md", + "redirect_url": "/windows/deployment/planning/windows-10-1703-removed-features", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/manage-allowed-blocked-list-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/manage-allowed-blocked-list", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/manage-allowed-blocked-list.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-allowed-blocked-list", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/microsoft-defender-atp/manage-allowed-blocked-list.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-indicators", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/manage-indicators-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/manage-indicators", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/manage-indicators.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-allowed-blocked-list", + "redirect_document_id": false + }, + { + "source_path": "windows/deployment/windows-10-enterprise-subscription-activation.md", + "redirect_url": "/windows/deployment/windows-10-subscription-activation", + "redirect_document_id": true + }, + { + "source_path": "windows/hub/windows-10-landing.yml", + "redirect_url": "/windows/windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/improverequestperformance-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/improve-request-performance", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts", + "redirect_document_id": true + }, + { + "source_path": "windows/deployment/windows-autopilot/windows-autopilot-requirements-network.md", + "redirect_url": "/windows/deployment/windows-autopilot/windows-autopilot-requirements#networking-requirements", + "redirect_document_id": true + }, + { + "source_path": "windows/deployment/windows-autopilot/windows-autopilot-requirements-licensing.md", + "redirect_url": "/windows/deployment/windows-autopilot/windows-autopilot-requirements#licensing-requirements", + "redirect_document_id": true + }, + { + "source_path": "windows/deployment/windows-autopilot/windows-autopilot-requirements-configuration.md", + "redirect_url": "/windows/deployment/windows-autopilot/windows-autopilot-requirements#configuration-requirements", + "redirect_document_id": true + }, + { + "source_path": "windows/deployment/windows-autopilot/user-driven-aad.md", + "redirect_url": "/windows/deployment/windows-autopilot/user-driven#user-driven-mode-for-azure-active-directory-join", + "redirect_document_id": true + }, + { + "source_path": "windows/deployment/windows-autopilot/user-driven-hybrid.md", + "redirect_url": "/windows/deployment/windows-autopilot/user-driven#user-driven-mode-for-hybrid-azure-active-directory-join", + "redirect_document_id": true + }, + { + "source_path": "windows/deployment/windows-autopilot/intune-connector.md", + "redirect_url": "https://docs.microsoft.com/intune/windows-autopilot-hybrid", + "redirect_document_id": true + }, + { + "source_path": "windows/deployment/windows-autopilot/windows-autopilot-reset-remote.md", + "redirect_url": "/windows/deployment/windows-autopilot/windows-autopilot-reset#reset-devices-with-remote-windows-autopilot-reset", + "redirect_document_id": true + }, + { + "source_path": "windows/deployment/windows-autopilot/windows-autopilot-reset-local.md", + "redirect_url": "/windows/deployment/windows-autopilot/windows-autopilot-reset#reset-devices-with-local-windows-autopilot-reset", + "redirect_document_id": true + }, + { + "source_path": "windows/deployment/windows-autopilot/configure-autopilot.md", + "redirect_url": "/windows/deployment/windows-autopilot/add-devices", + "redirect_document_id": true + }, + { + "source_path": "windows/deployment/windows-autopilot/administer.md", + "redirect_url": "/windows/deployment/windows-autopilot/add-devices#registering-devices", + "redirect_document_id": true + }, + { + "source_path": "windows/hub/release-information.md", + "redirect_url": "/windows/release-information", + "redirect_document_id": true + }, + { + "source_path": "windows/deployment/windows-10-architecture-posters.md", + "redirect_url": "/windows/deployment/windows-10-deployment-scenarios", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/index.md", + "redirect_url": "/windows/security/threat-protection", + "redirect_document_id": true + }, + { + "source_path": "browsers/internet-explorer/ie11-deploy-guide/group-policy-compatability-with-ie11.md", + "redirect_url": "/browsers/internet-explorer/ie11-deploy-guide/group-policy-compatibility-with-ie11", + "redirect_document_id": true + }, + { + "source_path": "devices/surface/surface-dock-updater.md", + "redirect_url": "surface/surface-dock-firmware-update", + "redirect_document_id": true + }, + { + "source_path": "devices/surface/surface.yml", + "redirect_url": "/surface/get-started", + "redirect_document_id": true + } + ] + } + + + \ No newline at end of file From f3b96587d9a1c3b06d04423136d659642233aa24 Mon Sep 17 00:00:00 2001 From: Tami Fosmark Date: Thu, 19 Sep 2019 10:57:20 -0700 Subject: [PATCH 285/285] typo fix --- .../microsoft-defender-atp-mac-preferences.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-preferences.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-preferences.md index f4eb17be06..ffa0df06d3 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-preferences.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-preferences.md @@ -64,7 +64,7 @@ Whether real-time protection (scan files as they are accessed) is enabled or not #### Enable / disable passive mode -Whether the antivirus engine runs in passive more or not. In passive mode: +Whether the antivirus engine runs in passive mode or not. In passive mode: - Real-time protection is turned off - On demand scanning is turned on - Automatic threat remediation is turned off