From 72674159bab321398987df8a7c2addcb43972b43 Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Mon, 19 Oct 2020 14:09:51 +0500 Subject: [PATCH 01/47] Updated Instruction and screenshots. As requested by user, I have updated the instruction and added a screenshot. --- .../control-usb-devices-using-intune.md | 13 +++++-------- .../create-device-configuration-profile.png | Bin 44895 -> 51871 bytes .../device-control/images/create-profile.png | Bin 19760 -> 15388 bytes 3 files changed, 5 insertions(+), 8 deletions(-) diff --git a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md index e8f58439cb..054620ee11 100644 --- a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md +++ b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md @@ -197,29 +197,26 @@ For more information about controlling USB devices, see the [Microsoft Secure bl ### Block installation and usage of removable storage -1. Sign in to the [Microsoft Azure portal](https://portal.azure.com/). -2. Click **Intune** > **Device configuration** > **Profiles** > **Create profile**. +1. Sign in to the [Microsoft Endpoint Manager](https://endpoint.microsoft.com/). +2. Click **Devices** > **Windows** > **Configuration Policies** > **Create profile**. ![Create device configuration profile](images/create-device-configuration-profile.png) 3. Use the following settings: - - Name: Type a name for the profile - - Description: Type a description - Platform: Windows 10 and later - - Profile type: Device restrictions + - Profile type: Device restrictions ![Create profile](images/create-profile.png) -4. Click **Configure** > **General**. +4. Click **Create**. 5. For **Removable storage** and **USB connection (mobile only)**, choose **Block**. **Removable storage** includes USB drives, where **USB connection (mobile only)** excludes USB charging but includes other USB connections on mobile devices only. ![General settings](images/general-settings.png) -6. Click **OK** to close **General** settings and **Device restrictions**. +6. Click **OK** to close settings and **Device restrictions**. -7. Click **Create** to save the profile. ### Only allow installation and usage of specifically approved peripherals diff --git a/windows/security/threat-protection/device-control/images/create-device-configuration-profile.png b/windows/security/threat-protection/device-control/images/create-device-configuration-profile.png index 1b6d4aa7086610bd1c0c1b4b63a9a6686e6d4294..4b8c80fdd7f99646bb6e6dde30134bb005cc9104 100644 GIT binary patch literal 51871 zcmcF~WmH^2w`BuC6C}ZsV8Pwp6Wrb1HPEXn znfdXi)?#&Y@9L^kr;gseZ@7|zBs$thGynjAE-fXd0stU10swGFDDbc=F8C>vun$xR zDQ#x}0Hg2a4=$M=g8+6B*+p7j9C-%~8-<=drgEJe0Qdxu7W<;+@#A>SQxAJ_8TpKa z>zA5FJ!|wMe~+d9oChCfz2wg~q%Jokgba555&z5uX|wb;M}3 zUUekXP-;@-GIab=VthYGgO>Lyq1|8Z-8&R4y#C!gzx$tw>FmxE=}~7pJL&9H*aOjU zq(N9BD5PTfvXen^<|FB4+=-h+Ha#$-P_= z2_r^}NBuX=v?wXtf9CU|5u^Ig#F+o5$%^zzAv48uJBcO3)TY9OguzHsQA}GCmlI&& z^YI~sx{Sx`eozt}{HZI2^06aAyD|YsxG@AC@JD0q8*+I{1Y(5{%Xp%?kI_H`xjg>g zH|b-dF@9RL*EHPqSp=hi!K`|*W^vIjV8 zxsR_pByhIhR5#c(VmBMA&#$=+%{gK{=Na^Ruk^w-fmaV^SIVDGe00Pav)<23t2^to zp1qtUWXH-s%%|-Z%|pNv%Jai4uf}n9_2g3rMZ@Wuq$<_%Q6dy$G2sa$1_;pa4yCvB z;=MYsN24i4i-EE;(EYn@&Pz5+n%!7#+ZC17l)TOFf48!|%Bulzc-HXqn%fgBDgf|w zMhgERf4{nj7Vv04;SQ|id9~RefSDQ!Au87@3}`>h*bki)j_hLF9VG#^xg!H^c&Sx4 z-sLd6ee9`&H|o#K$q--|6rf}lBEs6m5bVA?1*}@+S z8Dt&?0G>-u36pkZy)O?cXxaVlx%J_X$Ih7}Qy4tdOYb$Dz78g{?FMHXIGpZo2dM zQ0?OnX@*mA#51`3tEDH%>vzqSHNZVxoicfSzHyHtfw@0X?|E^x*c9ZoT$>wbh<*Cx zVw$J+pmF*H8kEfR)xGii^KD2Ag@+Z z3nu#``+95#rloF6^4<)nI~KNw|22>m&ICW0kRk?0XjK@fI%;`2{>Ovz4hJ%KyhETv%-)K8-4OEhpm4tUIt+k%C8@Q&wZph4EsbtAcl*{QVBjBvT`B2EfT_of8MTnQB2_JZTV zaI8*v&#w5 zbQK=7z5UCii^0|!nq(0X8ui?zj=uK1%Tr{@bX1SV(>(b95Ax;M+Yf3 zz~ZYsn&Igt3Vr znNf<*%hO7x=FEkL)_ge3-l)!${i$PXAOTHIVI&BWPh@}QeU+xf94rnOJ@dL zFh-PcL|TXF|5==dVqA;*zV$b=jDZG&p3`pt3t8oY7mHc19ONc=*>bpt2Jy$@ge$Xj z@m*WbJ-A+i1aTrpi#{{REPig$J!}$w;%8}U7Q+r=I)B0KjL~$70%30H=RY(;NDiP@ zs!f8i19ZIy5^NF#EL|d=L7o?dB*+)V`U!jM)BHPpn;@Ait3^~^wfVyVg{1)O! zUe!9<$77@UHb-2EsTTdJLz!?lSM@va82-bIZByB1x5?G3X5UtXnRnyv7v|oPz>ck7 z{Po(Dj6-V7#B_-v?Ht`BNYz`HNR|3aCA$-N6%w z_CAt*T|2VAh=F&JyvSwkKeQklb=OJ8kqU4{!^X~o9z6V)tfn=vL}s5?-s5%hiqx6v z0vWyfWWq$-3he0}IE!E0S}N~_r{C&jNJRGVrW#Q$%P>}9K3z7b;Awf&t!3*6uos>E z?^i=(1*7D4yny;N=@?-ZKW~h3quUT=QD7O9y8`gDmvxntdjWkBH(;`QC(-zdo{_^^ zeAyyNze67pnO%c~gDY*8AYgGOvE+)~NzGbTV=YC==cQtEDa1gHCl!iwHCGFmm7T>i zLOJ^4w*Z%W=h=W`S4n5N@_6$aFGzuC_q6-Mu-dhFHe+dV*@s0`$Ggp-LWE%4K}%k7 zwTIRB_=3hvGO`lIz@3oIoE1rT=(X5%zyzV&Hdm$L=6u^>>As!}6tQLTJ2z631JA^d z`OzZ2t%-v2*;J;8lR{sf5eIvea#$r(ac!;+jTaoOoC8+2F8c_MbBztvq33ECEcply z%$C$=UoMU#vmF_Z0Cy2Wx_GQrv3h(&z~pXZ$xw9c!9iYa0e$Q0lhW!LM@i_!-8Y@ z_Xr`kf0gb|c;B-ar3uHBVlyILA`+_!LcTR;sylTrI0_+q!$LzLdi6ZBk+HcgauVF8 zoFmNonkWJG8-oDkqJF|+*pHmc0S6}u7{DBt*ydYTYS6h~cUE~K@>SyT#N?jlWhY+1c!_mAv~Fot^V2vg{P05dp~?AsxU16~~YzBD0hNkAZj{ zkkSezpJwKa32bVO8M99$zc@VzA@RJy*d`Sz?@BNguK#3bsasW31~YV{(GPlYl~1Mr z>Tksu47B)fG{(>)1yQYLMkr@Xy2%VUp`UpYbS|>(?zN*=X0n8F;B2R%6}ZxHwjJ*b z4IJd{>U0(cHT^9mo-oKJTpj0i{Dh41@D-$Ft+RZva(u2wPqm+9K^1A3J$a#r(=lI` zOGuc#X!QE7!4TtP)LhkC<@dnkI&j8(yUck;*mg8p+SU2(S#MXF;p*5OS?j?mA&)ML zCknVfAgtoY52uuiQ3DM00Z#d>LI0MHSS>VNcSY)40nm^#K-jFE%dB0syRzd)Ila1u zfcMMvrrrJpP5JJv{+VPYwNtP4 zk}nhlnuGMs*Onp&z@!Q_#<1|e`B*4VGQ`W&IYPo6&}H&$*@Zi57wUnrV4pzz4)=kN z$D1i8`fQA@({z4t+A~1FbNz4+=^*o~R;1;FGS9u}fUW2N|E>SKHQ}Po#`e%U_5@Ic z!leJ~+AOWnqJct)78-rb1xwlA4`A;0h%3(KGX=wpfeSZ3Uy$F#5+Q9lkHV>jW+C@| z=x3Pq#!XB+V&)2YH0GkwObX9DdKfRol1M(%v{Hee@=~jE0>DG1t=73oR!619^?&&b z5d@xIb@uW!r@XE6>W^mw%&efrfOe)ZMG-s%OVJdLSKaENX+KhZe4c!e+{@^AYOZE0 zw2_X4oj9IG^j-X?LxscassW=tql=2U(AW*1>z>#ZH%fz+(Zi>NSnxjSEu-?P(fUd$ zp|K;$^|MiD&_|-mW~m&4=7^17hcYCzM1@_EJ?iYx zcLAXI9I*I=D6mpmb{G4T|HVaEBZh+|935UA_M}Nuty-3KU}Ob zwB-KwufHYwDE|M_mH&71{a;%A9YZPg&d>Y8vD0ro4rU4#78bJBXkG$(TnOv|LM&?k;6Ekl zz?7724%%i`lTmh6$4> z3rC+!j0+c4GDLMP$(8*g(8L?q_$q2U&;Jg#LM%$~&<<-lk0V*YuU{0lwnqiBsrD<4 z(Jj_sPZqaht)EI(Uz4KjL0p*Xtk1#P=7ak7qH>dOn~Q%NY}UJRZ@*t5$}~{5!$}}m zUUZ*z#%aF$q))KCUOpW1VR3J|G38}{2x#%c+ZO_o!|WDgR`N;Z#uvZi$B)rHaTS-t zN*vb?hIfq`w6Hfe%6Xh-T_O~w7{P;k2~=)Ip&|!OsC%Zkt;Ek7h;nE&SvjYo98Vxwj?Olot)!*5o->89)p3QxFXIB*US~?`SQCSW#4Qj=QjNc= z-D&u!rrclqEc{DCIH}p!4Zk?>ZAWX{@FLKSe`tVZB;l;JN;$lU%F} z2|y5CgU+FA-H<__GwGneBE7m*2xsbb#xvhvD0gx$b-=}ee_r@NPHd`qta-$mAW#q9 zWpwSsvahI~_`UqArOo!+Eu?JhBE#{dA0KJEdk}`@Rqcfl_$y-C{OvE4a2Bjg2sI;VGnOYK zNfaEx1^A_got)SjZRyttieG}AGkqLQeH@edqyyzNXz&Zd^WqHgj zmGzKDnJ5U)=VF{Y5DES7#a)F>iCAgc?;5LGl}vmg2lMaV)?Nm_gu`(ui{DKvg*)wT zdC0$qWCzM|f5;bY%_oNM(oU?v2%G;>SKr=f%&`#_0!*7{ z*ot)yx=JZbW2xnTIfRm%ZQce4@FZc}D61e{MH-#@8v@|vnOz|Fk%c^0xB87ZRSVqy zb?}|krVT6Q74&X&$PL_vCWu&>I?F8FEzf?^>{|98HxkVs+VM1>wJja*jbFZ-V>0}Z zz9`Q!HH*>H(_74y$$meveJ+eY}AZO7pohXad1bFl!E&xdzy_PvcpI{+W4rl0Nwu2N)U?u z<%uU@ncIsM!`A>cwM9Er!l}3N|MDN{FZKp{F+bm%f^vF)^kXpK)BWP(W9>*Eq9}i{ z@r%f?#wMmQbSTly@SXnMX!1i|W@4mF!J)nJov!2bk+<3)e*4_Flb0vQuyD+3E6e0` z*Rd?^%@khwcm*+9S2~S!l_^jO{u$%%@5#bkc3TCz=juWKpNI9HU*$$dM|B%S?>cn4 zq^8H)ZlGJgonc}W%NgaVlo*-77ekYvlyq1tm&fsqW3!E+OXM~jo_?1{i&b@*|LRtd z!jVLL!HvxmnKll=z18bCjmk6T1^zb-G{~^)fYDHM+H3XyY~cnnCBR zNRk|ibqK?5zH)D0M`onhP&odTIkr3Jd==+riCEzcG&bv5FBInV3wemn27XjRa>3W~|ap-u_44-riX{xTKsX z-iCJp6nko0rdBtzl`3R1s~t8yy4yZ!>;i|;o0vk+q@pvo^7~rms3h&!#5aZ>3Ypl) zEBLN)AaTSyk0>b3T}fn0&U#9dj;sC7>Rr6_yVE}Hx}tMHu7GE7w`rfQGSQu95*Fmr zwm%Bbd*hnrWckW1xN(=ApjSkFXxMj1(mKF*;kW*o1yuP-SO~8*mbk;(LEEO1r=s<{Cm9Wz|59DSdE80 zBNP~dsuh-uaB%l7%5`?7kY-Fqh56$jI$9hyNe2Qe^zQ5AZd#_i`~oI$w4>*n6TgUI z%J580-*_c8^zID)z5-@Izr3_x28D3N+~XX^Ug}_eiO%~v1uZ*a{=GiR~`19cD00;Qma|oWO@?)@rZP&SJ5+ypmdm6YDI=X&YZ<%h>NJB^Y z8;o6=xze(R)-MfsCB&E0uU+Z=S>LGz_y-D+7sZl%7>9Seux@yf@>nM6CpnScu8aCcsLTD-<-ovgNB&cRW;K zIJw7{#qUeB4-^}n0A>_pyCUl&!z#_s=i_|auie?%?{t}GQ${(1`!9Y3^wNG#Z_XtQ z{Cd<>9B3r#tl=8nE~lo%Wf_;{W?Deegau$g%$~5Tdh}GyX!h}o3gSH6zLlSCNx5H< zt7ysJWAN@nFZQe_oDk5)m&HGug=R#^au0s6J*;Rc9< z7&<;xeCcl)bEm8cTsnd3=U zQPxg+SM#@ml{|x1)le%Xv)OwdelLKy7f}^@HGG;xmX)~{kp~~*`G#cgyehwdugx0x z`HkWtt#10qb)y0XYEq|`Jp;ZR)-SJrZ#yk}Q|ntFeoL}J!5hEg;1jB37!G?dgA%}x zGy1~r`z5O##?rDS`iboUl7neigpJT*vmsy1BE&!%OnYmn;RpeLl=gnH){$_qVt;2~ z*Kqdg80=`H{8{{t_igW$3>z5yHz)*{`0c7?h10f@(w~^k=9VRP`oYQd;r$M{;&dB= zvUbDzFP0PkWCdW|REDl!Qpt~RDbc2VlCQSE zwpwYNH<*B~BYj~G;~id%;3f)I0fz3COwaiUqG5K00+ncYb`YkC^(l?HL=-y1V2-!a zQ}x;vFXZu9Ne!u`_%l2=Rh?Egy$oEUDG7l8g`V4H*=%7@T`k^zgSC-+0<777%}-OS59(=|ZvZ~b z*_;6F`{fq;ca&GiRVldUR5w}G0?qn25yOz6mH^C+-XT(d&uMPwjiqGzP|ij7`>&R^ zYEm<*uq;a@8NKG>kl5uL*z@4s5>HAxSpGz zz-GN))6%M4^V#@eXKA3C;>tklHh&N$Y=Xh)U=C;0Hl8ksUy!a$>*dG0Ne&-Qls0>T?optahW40r;35tW2!oIiF*B_B=H;Z}eLe=o7e3=>QK$B&e|ogq#?gT-Idl!qTxLRni2k(5#J)P@!go|Q?GDF_*J6c2t0*tn5lZ$0`;VVGXCgF{k zJ%B#}E%6Tt&OMpXbrEik5;j-6-k^h<-*n<{e_ojCu2~B@8IPUnvfn`2CL=4*Kg-*} zFZwmP)#&3ZXCkZsm>o@1#DbnIvAMKq?1h0Hg)34L# zv^?pEl~rBnAjz(_QO3Cmu4-q43gVu_FAz% z#|@9EY;5fr+Ag?k`+mWG7O(Y7O5Aftbrd~{_Is<<{$3?Rk^BV;`*|0Kb&=`HIRF0g z$oJcIj^&((pb@E=iR2nNWo?R|={qQ%It_f&B0qlz@`<}<{r!@aC*hCNBJtB~L35E7 z=j5p~BQB=LM@O|ZS0$a}S#^5hG8ah?`W6K+goV%MPxM;6gcERUAE*r&9e0KY;6ywR zMnTxH$-51@w?Dexew?h%%8_%f1Do5~9YOXo z3mxT4F+#7eeQ%WW^`2&aRX9=t#_nvp9=ckD^mJ{H3>L0WXN8xZ=QC3PHY$z&hQAg| zE>}&iI>*q%zQKJ1$S~uTb}2B?<0Qj5oZr+VD|zN8@ghDt3SG+u44F7fj%#!MBp;X; zI6jG{)AaE0t|j!dCEMFapUqrWM0viImzC<2#^OXVrLw=biI}L#Dw<43`t(I_Zkfua z)SxVt#qQ+8^={~R-~7PP2#bF6wqVxn`+%czMfm!2RzUaCpg&3+SqjH$hq<^UxoRn? zRs{^^1RPVBKU#(G%H(~_YUqy6gg+YGmTv)0WMX_GT?{Mf7~Oe{)v)<%3IMEFE``o& z(?s*d7idP)1YWH(t=+y)wnlc7HfnO%roP`m(rOzwXc|N3q;(WNDnxFO-r71Db{ah} zJaC;_W;d$@aMBjlrTGsh?*<2SMAj+5YBgluSu8eE#WIc1q3Z>zd?XiFP#WZG+hr5i za96=lS3$FnY`nkh^ak44y{6&54RCGD1usZIh%SvLNvWip;+aOhlqyyC_PSRqKK2!iK zi*S0lT!>Q&N34y)lP+>!No+7pNnncvqk`_xj*1bo?*Ep9p_2Ij_!sCSV zsANxnG?j92Dw#k$L$8ZzlN;HBGw!;Lift-oy|EeLsXI+rMt{{(XeL3Pvi*VDZyz<{ zo^^9TO($pX9KC2+1eKxwVU>n~O;vVjwQFldmlu^#$PW8ZsGkIA#5XZ$ik& z85Dam0|YelNH&o=uS*RQ(-;cB^!NpSEOO?FN*_aputAp7G4;q4=n-s}Z6A@s!5w-6 zu0r1<~GoK3?6~D}RV4#D*|fx#k6nV$K2)yxyx6%O8)*wZV6bWob@Z zrPD6Km9GijNxc>hWaTTg zLN1TEt#O-!VX?wC(En!vVi!E1+4q49jro4r>6^+YSto>Qgz}C@s!x=N;w}Da6Pr5h z+@BQATuSS-9<>og$vfzd>LsAN%3G&~kmQ-q4k7 zZBan?vL8wuGi_qv%3oks#0;4c*5bO+7w<~yIAu>oj5#3K*7SBxUC7FO-+3ETc~-qC zb}@HAkXcr@%ST;A86A*P@j7+%YUkqqC3o8Pp3}=-d?VH450nQBPhn$e?B{Txq5q4%0<=Plk=udY9w;y*{3KHP{??rLa^20a@vL^Kd@*~s1Y9pH@ z;iY)vL-K2}jn3WjjfQn+2ryLSLy=mE8jCU=95#0HJC<*y;pPRU44t51T@1z~lrWaC*V(lOyzc|Kstu5hiacrR`56MEFuN;s(N$EI^b|k8lCob@ z38)}(vPOG&vtSkmE8~zz^HDwozvGong9VA^nxCG>ZU_A$+Pr<{0QioOeWH=&X=;xS z#WU*Kyd?dy1uCgh=Nli7Zcra#M-gUYZECynw{lTfro45owlwO!qxo39Z;TlhLE-fN z{WxQC7~p|8mMjd>$YugQ=()|r=uKT?{t+D?fiC=mI6Z#U%(!(It*z)sHbAx4AGo~V z?*c7P?n%hHJKYDf8u&SHKIY^@ged?}*6O<`=e_Uv`tjX$j%;1Wu_l0H;*-Zm>*-$N zX5Re|a*rC$zlTNcqsi%#J#!jI451$63byu9FrKph==>xAS)&m*>@I>*f9&v2f0-5^~XY zcsP{08Ncy&@M)V%4jD{Hk%BZv~U|3^-aZ5_t zkvC1{X|H30ehlwRJS~b&r2h)wCj;~_CD{3`8hW)@eL@5mMzMIMscD89ETP^{@rUQS zVOm$0Y{F_At2T1d%zN`8=yD*u53>6FYt&eHY30vqZp!X61D$oVg3~=U>E?jDEp#@& z0Ynd{#f1x8y>~a*aFb7BZyA-ATD4t&LP_6;X1P`+>xN2Q|qoe8s&4TZ9kB zMuwSWC$(Zp_EYo+WqXSj)3jC(`BwmA87EqRBJ&f_s={+!2ykW_f<^SSY8|?0AkhO zKm5)<+xqy0S;|CYfHBO*BQQyi>W-6+O&keO$n*_-R~^^L#6YLXy{?*6_*I8M(_+FO zoP%_Fd5E=8C5Krfd3BQmlv#LcR`GJVEBzH>uD|;DEu;BqV=+}NiK<*b)m~5iYvt?L zScTaY8y#%)Yz(#4)A{PhEkXdN=f&R~n1S$k5XSgU<7ucs2Tcoy`GqBGLAmm4giwwK zTY?=4zrveSwFoi|pZM3K2hLQD9Cp&oUE0nqG%Fo89qZB(=BLnP-Js10jB8uqJM2;V zGkvBJx2oj~(%A|T*i(gOCWWWlgb}iMXrdSnr1T-6pu-pJrlE*(K$v9pCEHOZIpTx3 z2CeaL0j9OSGbhP$D>#5r%Tq6jFaj*xif9Uz$=gP0R`#m2J@kw|5GA@z^?Y3c&(h)hK&C z*~?$VTr+Bay+S7mAWQA5Ko8el$qioJLWbnTMYd<&!^=_`<*h| ztljq7pTf7`x=yj9uC{As#EWK}ZGE^xI$CT3*XM>7zBl3XP=VjtqrQK*2nsj2ropA8 z)QoxZfb$=fmj0 zj(j3j2@9wyYghWF1{THgu+jy#ap;oY9j33TjYHLF)Mb)OtE;PPYiIiV`6qvTz4+w56gN^9c-rE5ECboO;igoKcY&jVPW|5TG~2#wDw1l zzvq~&hl}A?nUrQJD&%q^eF4KPAzO)D-R*Ddq(a|PYC_AVKW(K6hFQi&sc`rJA{ulz zkHaBR&k>O$wo{MsD2P=b3zWY?rR)vy8QR@2EHy^LBzt$ z_G&Z6_nO}Hi@qNzv@drpeDYvG+_0oO_y(xfO&;#}y-)v-aE)?Wb z+f@6RE6WME-=z4HtQ#5x8t6@ilh)ynLpUIOtPMHUwANF7LB*oNsEH=da48j$ll3s# zj(cm3BuidIcST8{>Wz5+ux%lJ2#i!pvQPrpsIpWK&ql7IdOq;u5l!qv3 zPu^YWcxufqzo+H8HkshX>-Ds=gy5>k0vW`;JI{<3hQm}`SIBZksPIm@fJd=I6%SqN zsGy)=M|-0-9{tWvx5%Njp2SGN@L27ES3P6xz-3GM%rp+YPW?i^ z&hP5N_DY+7D)rlBC=zzeu6%F`3JMUAF^=06;)>GsYAt(y33fDR`;c(+UyS^Xs^35} zpEruW_jvF&;FyQKW+PAod&&+|hm2svo8lrtjRS^fTD%l|koD_WuPb$Sc6I=4GD5De zT5fJ!0XsWpFiuL-hTj8g(+>fJKiERhu8cpugSBGPHDrL4<1hA5;A9$q3-rS@4E@U% z!y!ww{2@}HLgOkCf90>Cxi6?bQ7FlMQX3o`?AB6Sd(J*El>he{+W#8t?ncgsHoES- zJeV!7Sbn|gtefKNsBOs&!$v>m>%mlArdpa5AcB}Y(ye$px^4J=&(@|8I`HuO`PVYh zYc#YpM5a`J-}_4iE4~+w4yYY-qf3W7@^DkJcQtIuo#q$ zCX_jj7cSNW+^~q*1c5B=*UzTMUtmkmkOnd_=*1Ux0y>YL-=*l@Z)cPbldf8Z0QJtK zM@$);MbdGXE0k=MGK#*^qr&D_yPM^TvUoTe#xm5BM)NV>d?2jC-^?dHKOl|zDHxm9w_G`^PgCi@uL~bGrMg_-WX*ZPufxG+x9)sipJf3E! zLTWT>#s84iER|sf;d0g8l*K1k&7blY#YpCf9-t4*9ij^MjyR?VrzJr-n z?yZ}V-tpD+c_o^SN=U=f@N-tYKzAuX&wuu+Lza;H-ozjn_czWl84KTTn`{iXPVx% zQE%k+Qq4|ZM?@;L!?E1Gv*E8#NB3--D|3O+kGxAQS!CtsqG=KRYE;l;>cuQ;hC#>w zcCUk;)iJ$MYduE7`|S&^9%pF)JMRJ&Yg79z@TMB6zlWj01*n5R7`Mq@*eBPBCK)Xl z=1wJQN;K+)`f_S?$s#{lPXAPP_JAhLh5_l-W-clgu(8*&JflU;?`iU1ktOxwIhy%_ zJBR9W*&#>tU#@fmZ%Ujq9uR{{O;6hc39vd}02cUc0b>d20UiL9PB8o<29|&SHXEk|)ve*4KPCvy z?W&BZ<*B}GNw3Jcs0!if6AYVn?B%sM8JZ8l*y^*>!vD9lCq_M)Sjy-wgKXm4r#Hf) zTYpFp8yXs5hli+cXIFt%+S=L*!~oG10iZ{j|RIRACAOwEsce+E;GZzrx0( zv7;S8Aaa~V&H!U== zVN=3HtD9=DLslhr;+Fr@p$Y%n^- zzxBsOZlwmW!x+Sc=mAt=Mm`xGQv)F?>fm;M&1>QYyh1FS^><|>`+jYX#6sR1f*3ns z0R&$dQ6-zk9Q?z$z~ORs8EWX)dA>30*d5$}_aAV+vZ(gDN}G6S1++3gTqE`8aH>W8 z(}IBW3!fyK!Rs!ihSC-N#C9d51I74-EwU@}&q|0&ar1|8j$hc9u(V4@N-q!h^#!5EyZXNq$yRxJ zrFF;|hJmoc)u@zkd=Spomj0ld&lH`U|qhDT&_3UIhceJx(3?7OVfqigDZSEm-eHfg3*cG2u8g|9oa;+cOc_$kBm zn7G;5XDffXnEg`?Y_4?nq79F2d4*?a)*2Q>FV3I~x*Z#uvxAl16Gg_25^rm3+Xj=M z!B#UOHrfo9`JdW*ekh($wdmQysyZc_debqOYrKWE@99^$tr>q!A%7h1Z~P%$wNpe= z3(@PXZYMSt76T?Vu&5~~FHalTC_ZLgURG9CQ8E8i4VQb~%tpFnJr{x1^4Rl?cKYMc z^8ALhV^E+K2^PXVf7L73x<$icDy+h3c^SOyDdp(#>{S{FXT(NJymr1S))(q&W7|lX z^?YTXifQyWH0$3+`PWfi4TAxkkG<9zwbu`A1}+<hL zZ8$(z&l&;Aq31vp_UNt?ED_S+AVn%Ct&+{}{e&&s)uH5gW8CY!-?=Tbe`XM$$dfh0 zGDF;&;}iAs;b4DwIs$8{RrVR#{pjnG!dI@9`T6-Y{qpj1o%xST;nm@kKhq=i8eUf{ zuf6wdYX_NZ?MU78?>t3KTJQh5b zONhIzE}(Ynr~mtCqhcq&>&8H{xXpTnVq%$<3;d{bKl!Ijc>Lp(HY0`IY+dF-x@XMk zQ(J=;8|c1w+Avk%91US#K->7v6hZD#g2Qb49I@@fLvOK1+DOP)jLZQmO@P*yY_pPMF8m6)Is2wCyr_@S)xHK4iyWvg{ ziyEISL+QL8)jsZcQbG`ou+QnoH4gL&VH9NY{n@nCG<%G0e=fkc=W%YI8r#wQlSOvIf$UyyPIjEAekxZ2|-UV{H& zP8*b7aCy>c)8({rG&OpJ?O-~8aI+^69f+M1gLysfgSc*ak#ZJAAldoC**YKuyeb*Y zCa8#qWj`%8zQ>V5c~GDbM$Gd(E3L^p0zh0-??XLs@7*yZW}y-Xe3nfTi_`|>K?d|> zm_-dFCs_W5`Od_c^Be|2+YPwUEoyuQdl5V1UIM&OqCRRml4jmBvL8npTa@*YJJugB zg_q1^TPrgp+7WH(_TWALssL2`PmZbye#cy=mwlE_Ly-+ljNZb6IB^HC>xqknrCPJf z02db*6%`fSelcNc9}rHuY-eQ(`TVcZyn>YPA6Ikv-=(#!kwu;CB5W~gdV=eoca!zhcgFKBc z|3G0s_|(glU4H~z$0)imXT<(VR!hL5L+PUQPE|P@3wO4%>>M=#oAq%`>!fTG$i(Cf z{)1+Q8aXIs(R5zDOtWN!_0`9RK~_(|-Y#S>d6IgV9|6J50A+uukgEWf)Tv)k`)X~u zwzTZ#VeR>-sw--#e_^4qMBdYKJJ3KIp7{HoBz5P9w^I=2&~_p?O9^TViA(l+iS}M^ zZ4(tU0H81Hi;0DW@aHH-SZkRG|3^u3M>aswT2{Kv}743YP;kwN+k{e0PnqNz(?r(ckU=yi8G1r#tu7i7cdxfZ%bw|Mi$*IV5OEEPaJM)^R14 zzk0Y!M-fl^?_WpTb7@FFkzAlN8JY9c^xK*IWYz1ltgVhH+7CSSlAGVk#_`VYC_F85 z838-?H(IH;GR`E$w+NXL4LL%jtoZBxPWexTc{>X+Bo~W9A&NsturPj2z|+J$TH>#0 zsjItEqFU5gwoDK{?fB(qB;bX)6*-ZBC}&f1;TA(ak*tTzF|!qq`ON+K)Q$S7`nR~Vd#b-?!oWxzt(+mU)=q|&a&>gT?xT z5uAG``g-3}T_-ty`{@lLUXUCZ5Vg>_VaJ=eGc%kIy!UUX-b;r@XOT$IzW~`~&Xe!d zG08J}_%NHrUiupjqqsgjHYuJ!H@19?RB=x@g(du&!Uz+lUuzvmqLNLzqZ&QY?K57nwq%0U+3ACj}%Y{VIIU<0)Y zIOu@<7kiE2b=LK;nI0a$vpr}?wcoC*ynH}wechnGsFaY!weH1g_Sfd>e%z$%NA4Zc zK%N}ywC9yw-5Yei*?47OPBV;Oyd6UcW0RzUY)P$`lO)CDjHwGu*Q1A9RU%f6*tDYP zuG$<+Q_~H08rXWu*PYw<`Q#P?lkKoHlLONFk@|i9Xy? zNv_*^<(#-#4K2h`d_S=jH2`(TC*|ni;GkJ1y@gD025f65rbH)5vcJAJuqm?gCZYvL zB0hiSMPFiUR3rr}wxpqR)6Gd8O)PP7g4q4yK||(E&f0s5G-cVtfiwBR!W8fO8erIk z5VM-(n409&p7JL1-n888RPcx}2#7G4pqRMj7b1jL){SFxSB#}yYgcLYqVCCL&bzk9 z>zF1#be@23FBWku4TyQy=|N15Ol-Iw0wjy%l}rpKVYtC%Munf=<&1HJa(u#&@V-u| ztYqk!R7CdtwQkDKfcR088nPBfFk$Ab+I@0wz)i+wUYs0JALA1ns@0Qwdmra>B7NEY zDUhqLvU24Ci_Wkq#^%ny<##! zx|7uPy_GBDfz+mG=oH)Xw`ChVk%JQSZ^&^|P0bojCMqt0`WQ}|G`B)U4o-t#4DAkR zw^CX^oiyrI)T_|JugkCc>|DL?dV6s$p-8QT4|;fEM9uHlDBP$$(X(5(lWi^pPdjS- zuFVab%6VfV7vDVc4b_B~KYn5N}3e6X&?NZ}=_kS14)`7M%;twH0L$ zH9BC_cBfK^SNnxQQ)AmgbkJl+79W_2%WcOlC<1mChtF7^e;)4pl{l9#u||8H9&Q^I zO{|hooCz^GpP@epjYf9_=S^rr+G{CB;ajE|A0ucCi*O7Zoa0PSekrW9kG8nad^mZ*SjwaSof!Il1C(U(vM56f8iz%9EFT zq|N?A&iio>4-bIhY$RYdD=l!@NM%ViH>5^Ue5&U-$a9OyTmNY?7Yeh6^6`KAe0G~( z;l^DhE#o5Z$$9UMM@^cF7SbYS&uBcyj&>w!rvCj)@)~VM%|!kzVryQMHD@Tt%a8I! zS0ra&3|9&Kxx-UTFSk5JyYHA0Z>6K-n=cVEGc(m`8!!0x{!p$VNl!epAOdIpc09Wt zi(^KeEJ21YAC6Q)Gu5O;@E;KeDgxL^2S1JVgpdef+N_twj4<-1NG?(fs~Y%3D86kcNXQdvpo{mfW^eZ&dw5P7j2!HGB? zDv@R)KTl9@9irIo`_ztTmz#=ZZ|v-w>Of@wT9ywlT71CE#^SA^qK0N_u~Z*|1tkQj zk_c;Fpl6d}i4KQO*4zn~B*UBa2-z$W>>?Y-*WD@{ry-jm&qkZ+p~JcZ_R{0Gve7@o zHhBihatbTulS<6}WK6n=_Zm3fh&M}N?zE>9!c=cIf4R2q-Wgov;?BiFpnXxoj{F#HOM73uFj2R*+u}mTpR(x}JOw*xsPJ1AA4dt zW%JyYae26{0jlR4>iKJupMIe~o?UCVpg~YkwqUkSi=O4|`sN!8heg8lz`gzFGF$B7 zaQ4>gX8R@QgQQ(qD0;n+%Qa`zGbyH`(zw?}y@Ox+G+uuV4JivvCu9W4 zos2yLz1bA?j-_Z?Lk-UdNrRD1sexb zH`d%6?kCsy3lzv#keB;it=+T=C|EDl>XhxAawpeYAF#?tNN26t7XjSz-5b9M+Ml2S0D zlnLh~vbSy!j#m)wjb)tZ3-DHLYC8ruoN7k9RCBH@p=!IDpCsPR6O`mWOl{~5YWEv( zy8lW3?s@o_Ct`6dPX2|nY{lt~!mMj7a!=jMz05+n?Gh#YKA6jb_~OqtW>-kdog>4` zoDD@*-QQeH&fVr$(VpC2EoGZ#Ps2y(PUVMRmR+P@7PQ**f%k_}z8!=`Tq|wi?%Vgy zek?ssKwg{zm?8hlB!_-?Gsd*79D?h3|1N$wAj{a#y(|+`u z%(dSv%lrk*BkEc&Hgrhr&}w>_A6s(&u00OxUKB=0kMJC^>29tKeEUllsqFefnm#v8 zLy^fNU1^SQ2C`OXnAOwK;uTTymUl5~Oqe9Hv#We#%rjky9j+@XyE6+N2q)hDVJ6~S z|IWzZ$5F!{;T$zn@50%~0$2Fw^lci@YCC>MaPy@bsBP;Ibz1tn!ND%-A#D&ew8Pd* zzXU#!f2c23KkJ&hl)|~3p;5cym}v@~?K#><=8sJ$=NyLrDuRD?=ubI%?iN~WJySZA zE_hTkWAL6OF`j(v09T9|TFMuKZ|0R?UMknw^!p+zx74NV(Vie1 zbUe|vCLvcO6yNesczDUl-(}{W+uvi4EzqzM{<_+&;o@*I1|QvznOk)= z`pnBy%oF#6k0exY5HJ%ou*g-uXPmh-OcK7UcPYywAEzG<^>tE`= z%SSoQ?k^Vp`%d8@YWR|En(?GfSvOm|YU&m~k>f2Bn<`S0BttwlyL^isVN5_Q6S+pN=^3=UZTS_~bY;{TK_Sh07+I;$>$zI6_nUr%_+2C3424yC zD7)s&$UXmdH~*`tT4;b!$lBMSQH^INe2HwSUDvGrGRf2%R{vbI6J1Kz02LfVp{iPJ z!`MZ-9{#l}GbBtF8S0`!h*5++fH&`0(nn9oseP3`eDuN3;Nnvtw1&KL`DpKMXLZ&| z;gbI_eB7>VA(fS&r>Z2!=LU;`U2@X+F*1?4dVzM)U{&@lG+I*FjR^z050*6@?#^zk z%!X2!)MYzMn7f2Q<;d8oO2mn~Q|wis6d0-4 z-yaK!i@W3y@wf&BN44Ij^Kxa46D zshhTso4IHyXim!Rg&&?`Ei@SUi7i~|=DcRe*cm#I>ph-b&+RjG3OxIEpXA)Rr07^k zyuijoJ)ygEwvw`s)dOo+5b%3fzH!~Pcrtt;-MlQ>Tz%yv&%6bF(e^1>5!(s8jdgm2}KpgLDq73RVGm`VK11h&RD>bJO=2FwKk)$O-m8Mm zz;2(lPxLZX`o+x?Gvs; z+3I#oZ^ew&=Kt1iFa)ZoX?}WbQS1tf^Sf%ivRi5rp8Fc3L(L@QvDC2H7iDrs6wD2F z6e80NG&Zxb7%a7Zt;0jji<8@H*7Jo+_t@xMmh)b=*M)yL{Ua7=T5jcU1U63qaPF7X zRZFLqS*iP2dBl)6+(a*t4qbi2#?7TIkP3l~I%4L&^VEmR>?Fky`)dH%fK)jfxgJeh zF~`4jxI75&ej-u_4st+>PWU*R&G<+n<#Sq}ie&OY&5}==Q)6t!1ytr=*%vk=>VZNT zxwwugV8nUOZ+ffcnE`M-NMN&kdDZ%O4?IQ`gt;>~_$D zja3-p=WHlQNO)3J$S|NIBb-!JM#CAx?d|Q(+kI?LyH-%@*xKn_V88-k*vF_Q<-QBY7`y-EeT;JbJ4jEtz@1*Vm> z^nnq`xxfyjJgl=V_g5De7gtx9FJE${sj2N+Kd6 zEG(n+=SJWE{|E`V(f+x(yg#`kCvuQN_UNZ8#M@W1&&h*k{PQv2_5>h2S!MSlj zj8){nwq+M0ivp?ypOOTVa`EwXZ8^<-dj_?OC)}tu2G0#8(NyVF0*wp)rt+aTP{lgo zDR;!SuI;c7*bG3cFvQzRyHw_+C(Vkb42AlXFiA3)H8dhHpSB_qfecZ9v?2o6lRFnD zEFfp0RZ%`f`94g{F3Nmyf7cu}mRXs>?6v{;aAWqx3T~U{I{0g?Bp#3?YivvE`^vK+ z+Eo#kzLa;D5@U6M@w@jZ<6sB$uL9Ll$y;xkM2Z3j(P|s%hH}ePvM(@v=0#n0Stp3x z8h^38Deu=J27wOXxHvdCC{aWpq9{B%I=nxn<<01Y-qy7crv+adwSg)D_=4?5a;>mr zw*<`XQzte!;NUw@;ZDciu9SVjBrGS(2up&SiRGVVz~unvDBwh|j1*N{#$rExoPI6| zx_aS2p~rRGyNk@{$vus%rTKv$G^$x9U=w%zu@oE-7oSZ;m+n#bOTv@H+5qpQ^bZPz z+~90|Z2Ya5o;v;;0fN;}y9^*H`CJCZd57Od8;2}Yrnxu+Kg1MM<(~(z_?h;tE4@|a z1L=*4lHZ0E8o9@ttNcrQO7|qw__6!PU#<86)e;t%HX!@cECgBwqu$}gdG(0ot;NT` zeN!gpzi-Ppr9~I_ZmeO7sX&WVK=HV*kD-`Zug}`A?6;Ncnz}$TdZL+mg4s+Fdb;c| zt=y^1S8i1#@abs<(%U@9-QC^tvH>*d$mhrl^l%&^>EiC5u99>lPKVQ1H6kJU>I9od zQNng6Q_ORHdMG`f9LRC1===H_BRo8Kx?TtV4PV^26IjWxt4Bvqld1}&0?2p zwy#3kRY4)ZMhP*o_~ZdDX30%69DSh#xuxxg@q4T|zLvNj3B#n(_rmRDGJvGsOVH;^ z+|N(5T7Cob28@uTeUFpPo+WxxT&41c<4>uu!{rQ09)A5@n4q6&r0Kws1nil^hVM_u zWexB~z4OkYn^~X=kl<9igZhcNt#kzaUsXAF%dTcMXStOr-ut5Md=81v|2i@EiXY^k zhI=49HkMvF?rxcVCp)DRaE^dO(PoHNXVzCl+xbk~KSF89^!B-8UluKmy%GbNwHPov zh z{5!dYC;E8Q3ki}Sojdl4FAZV0Z4K8J^edisw7PMVYdqc*L?yyZp0B)YhhS8oZxGK? zxl{Est{9E)V41f?`Ot%Pri8eeF!j<7JvA~f^mZ|4fsk=A|E#j=bz-_@y{79rQ9^xv zKgAIo*1x{dugl0m0dyj>FGP>O>>o*tB$|XkMliin6a0&?p3*X zApew27cvR&LUB$85ug(MA+fP!Lv9g$6J%1)!L-k`%POiEiN}N!clqb&y*~URlo$S; zJNkS#v9Om#Q4x3HGph>&?~H4XRr|`r!efK+MeRl#*D4R?#rfTNzNF7qqL%!uaxLc} zy03nH4I1=E|B{2)g?7;7X*$(jA?mI-1CQlVONRyG3#jV0E{AH)=VWoPJ}m)UxvtIiDS) zE(beKhnYbWCg~nq|a~dwg7td(l(*2p* zYiJM&mBk?>L|)ySDtgM}WC%M~R#qNL|=4b!$)0^ z{*ruNDGVX$1KYRclD2zHByX8dQDLY!bdfEV#X>SmW9FVeinPoudPy#l=R$(tLrHJ0 z&Om=JyDMsN8+;r+Su%M9Rf#AWBRGL*;GF4feIxM1u|v;1x%0Te$41S|a!CT*9`HJq z)RMigoIrK9$B}HY|3|;M!oYiB^527%sNgTg@3uuIHG%IsB_jRpUq1*UhByY+D+M@b zKya|VD9cz?dhy)Pw%;ZyT`W3}RNQd;1NUHOb91rIapU@ABc7C$I&hJHW8~A!U3zPB zWS|Nn1JX>S3`gYs@-)4|vE0;!jr5$Z7A@{h*--J#8)T4pKFMTiK}D(PpRGiX3b}+t%HPoqmDRTi^8~ie;g@nv)b?gxB%1X)gke$qwV%?#)gdv7MSP&=3)g?gX|ZoP z1}b9G@V2>BoxiqiwUy+OM&(!L;Qw?=o_E4BFGUN{tsY{ZpPvk_)*$y#gyEKi_^)wZ zXlHK<{j_Cfu(BHysMRc~?Rgahsh3;OOLo%Jo8EI_J8+wk>gCJ*ShTUe{w*Lte?Hq| zJv1*buaTsGs)3xR`%SlUjvG~A%*iiBLmqJ54wNBy_sXpg$4j~Z{zt^L1O(uRFcEV9 z0rJnOv*O}-eOor30YbM0;@pAo9U#C!E_Z*C$FqF5=CqjOdB)b+3d4*FNDgMS*BcWhLxg(JyV_M3#n8 zV-TpbVB?L>Rswalh+VW2RqW}kP&U@=aPWgO0)c$!emu-9xXu-pWcx5Xc6W2eso$_^ z98%;eYL=?A?-y2uOF;?TJ^YPUz37;NksaJzTljQhQ40euNOh71(ha*K0zCzRP*Jq+ zf9qm;{l2~BgNc6ek1mw+o_piP5mC9cEZ-G{VcM?@f*$c&UTh)>=KTE-vK@zJGpc^&S)pcrgwbj*Z`VEtv7~ygqH%V{TzEsp)?EB6cu!Gpjlq+~XwbP=VZi^68s?)NALkcscC^3DW0Gg7H(1_37Yeo{CQFjQ zh;^alTvm5B{tdL-1TMaA3^6Q3@@|c@*udvvN~!3_4`C3}P(-M44-WZod3s# zCHL7kO)vEt(!#ow*RnLR?MCm4rlKMR?U%i;mfTz6OGgctS(NdhZj71Ru%`%&aO8s) zb77GIzEzg_K+s5559)`oJr=oL3nl|eyLw@7_qQ{jJ2xPUhZT^-FGR0-LCnPHL}0NBZo-!d1nsOu1+?9L%FIdE%^#utBuTJ zM5Y_ zvirPulBid;v9wNW9|i}ciR|;zGFH(%)?8K zNew_@@3nDhu5X!f7!rf%m_h!uom9Xg1zs$G`!fYWR4Td#YeL^je!tc|EYERkgrAT> zcb@1X#=%Wz$Sz-6*Oz@RE6=LQlCq8R{a*Y_e-`=)+DuELi~F_p^QkWXI7hRLvbU8 zQQbON%}LNK^i8SaRVp_SRaRkKWj}iDmJvQ)Y$ZdI0O;}7L@ZDRJL-lT6#Is6k0UCu za(syMUdihN83txheNvjy|JbdI`_*&Q9#V;8Ijt)M){bX`g!aBaw7vL|@?(!p?UDAM zPW(8lr+-1!c+XmfX;oIu5ID%C8bpAW`jY`RWBvIHFgJUe@q2HsM*H1um?6vc(mD4< zH(wNVXe6Qnw=Fm`$j2e5S$Ag7=_=^hK>&O(mDRE;q2ZCiv$o_y$vj0#T47qf0&0yhbvRmjof^Qu>0!3FLC`rzczX474<|IWx8bj zBONbNNavb^(0=d%BX!_x1g|90@hUB5Q$p&6^5s`sC0EbkqDt}+T~;iDfy+BRwuEK} z-H$OJ5R5{(%tJ$dZiinrp}-831zK4yN1+Ig&wUf=8$oXLVaT>$OSG>Cnmz2g5Qz_x zcEku%FKo7vK?LDJ;R*-#*exwg`JxjaHE5oO*7n#dsz4RejDciM1g`WUr^`E8e(e=oH#^ysYQAE*nNQ$qzTq604@D$q&)HZI z^_Y>IP2HP)AtoU?1;YE2r(#TGL1Nw)7!!JVI>4#s_R?MZ>g0;k@-F4nRJynBru^n) zb#>KDL7HKDb@fM|nTaI!TQ@df25DS6eGp@QD8zo-ce_w`8jZyRyQ#Q2X>0Q@QPkJm z6dHIl5jhdAjKszQS#}J=BK**t2;Yk|2&`2Y|`|#j##bQc}_l{RL!t zz3AC?7HH-dDnWOsxm)`J7GFm6{QzhD>29juIdjophZ1$4kD&JDuXBrfRV=8 zYB3y(3y#muP|?uPUcNM{G82${I8E}b+S9$B$*|KV-yHEgPk(KQdTs^pxIWoIh*BFu zJ#S97_LU=ZayLLSu3+W?zh67u4ccRUa*w5(%oIJz%lbB)>YqJ(W|K6iO6M$;v1;Tm z>fph;V(w?y_JU6Q`y*`8_m;9&!UoPGB;;Yz$v8aA`65DoV|A4ZY`u2Pw)JnXSL)^C zv(e2Rs72rF*RLUX#2~0-3@Opz@LQ3G^9={0U}7Gc6jX2{C1J~A+m9bV8Xv+e_yMLe zVEU=v`rnN?If3OU3J6jk32>^Kv!{=I}JB0U7pQyWdi!a>N02vhPcTJWF+u0A=N>49j0C+@8#S&T9V4K z(sIm&0bFfF8)f)I;5S+%>z&Kfz*Dy!`Oetq0~9wbkOH4p*Oylk@CE33+<#YM!wbQi zGy9ghhIWQ4V^P(2knfJ5z-Y;rdDjIZ(!7}y`T<1oBvTFXai?xT;NDzdV5{i5ph`CU z#x28EfQ)%oyY=voe9qV>miO%JbAKj*4-bvGUXTtf_(Pn)lxao(ZB|T63jC@YSqPzZ zImh(_?UR2TGl7%ISafS|e?Or7GL4&1%l?bx zAq6k!+*S0%fD=z%FnPc3Kmf_w$AJ#E8rA=poEc>?xeoOyBNa#JIXA?Ue;uR%7P|qZ zQyk_&n+QK_JZb^{0Xsge88Is)1&4Wee%f|u<3d9=Y7?>}eH$@mw%u0Qg9wgA<1$dy zbaxk!V>kh=y7ct~;()zw&8hfAglXZjV1sk%4^!P8x^ic|ie1 zCCmiiK7n=<)5Ox`v*_Ip7yHmtk0_nWpq7m-bxuWoApev3#0Nh&zwV@WpnzGl4U^LHqv(J7GF!k+RSFt5Ms&ZQuH(8+j_UfoBkZ zQhRY_NffM4h2ihIfcnJfc6EfMNLP0on*aVj-+zA~`CTk@lHBf%(?IX3u}bEw#28WL{e?KNe7y38*1gQ@wH_)XRsW-I$tJNqDj@E*KZe=t7Qaqx zT=RHJc5FFX7aSW+KBYap!Y_yAB{y``$nOo~fa)cz+lG1D$3$N;XFVRf|C&9k*i}hR z?Ofxs=xG>74B_T&`{Z6$_lqSaL6%}v7U8?1>PnJ+)+Pi=PsQmLf@^PSv}DTh7$*<( zHuIwoq5X7XKkmP?c*oNT(~5feRqmv11Zg^Qlh)jAq;1IHc4oACFPT|@e!uEyB7R*i z@ZRS*;k8NMX2W^pyA91~O%fzf@W{ol3!d9t8bH0vDq!;J|7PR_5muGR0Bjay zJ1xgU$2e2)XVe7J=v}hHmn7{8`VM3#MH|>KT`s}~(R6Yic;KTBdmglpz7!y!ONb@5 zH~f6R-ScV#ARW0P3qs=kP1i!k-Wgn4b6Z@%4z~*v%R053rNvV`Ej%+kY)0?4w^_W% z{>MFPA|Ps(q$}bS0W4Z|Y6XKeH30G0&~rPN)gs6)(oC!rAJF~!F~qi3%Pdmw=}$H_ z!Od!xuZ*nuC%Z{AuIS^3jP5^#;xdF)U9wyVLd&aED{}WcXv-#j@A~DJry%Y{eqMRj z=b2>HNhli|ACGMLM9_3B9_46&ANw&-4R>Izv|eCTB=%+< z)0va>IUocnDT#{{A9$C=0DDXqY`j-R?6=zp*|y?~BD{&6gZ23DW()Q>zCVB2@~7dS zMN&OI)!Q{+gXQ~sAR7P2j%I+!*)GZq`Q&N;6G|a+0U*|8Xw3qme<@puL@p#(ETZJZ zHjoU2R=8M2iXvGm9#yL6lQWbe9e%BmiD#N&=%JM|<0|L9=JugB-IA-`gOZV2`S z2{FwNN{)D*?Q0R#Pf@Zs3DWhHsIuObHy$<7xXYMiaG8ULbYN!Zx%0{9n833(-8cL0 z6?IqS*-Eo$5{+bhn>cg2vxdOVj-v01&bMI3opQ{h$?L$ymZF)+`+(BqL(fn^%X0bI z36g;Z$v#L^u`$d2KKlFhFy}M2q{(k_Liy0*^v?55g}I#oPjzL0ZjwW1@{8m0`q`lC zDNt+s9aCOam7P?m$v@ebcu4$)@w_>2pg8^7vY}__6g7f1p=`VfP zub~X?T2ja27|{u~uO%ht7UL+x&ro!xTUx5`T^UJz4XgL#^}(CyGak_i-g*x&%GWJJ zNF^RZp=kmW^#MGoJbDkJLxxdzmR*#!_)YG8&A7>r_t^)VT1U4RjHP`xD^ju+-Pt6M zPQ}unJs$I0KmV<&E_xj8d7L})gNIGlxbW7cEHU$Ar zia(oH}Y8l4w<{nzT!uV>T^*GF~H+DS(mIFEVKwAY62rhtH{j^H(w1mYG+q> zXjoADc;mvoeiljoHcWeeJnLl8+w^iQ+V}K$XddW)i!m`VAb(OWKZBPu8(XZFu$8|m zgE92-4)sl&3UNQJCq2{NTt>!7zvJgKx9Mop<25Ow2{8m$3}@T{AZA010{%({z;- z3uk>dt-kz^dHbiPKTs42(D{V{B8^9m;TW_r8}r4!mB-eaXHH0)pXP)2!FDp&CY7Tl<IatbnBCAo+fH%Xg8eLnPAZibiN~vCiEX&z^h19p*O8tKVAc?dc4?6r|L6H+a zo0RINIZuRdciSi-`eJsX@~{UskGQZ?W3RXZ>eZ|mPuky2-zH1$0^rIkxV;k{aMxDP z`_A6{qK_UGpl&Be`MUkcnS?va++bwy+{YY@%4*|QyW=g%k9Sq`L#-YoJjOP4U$C)W zyfFCz+mI~!>TqO$V*jD=%|p21oqRbQzS3m5TBy5JW8zH1{!99$G!J;;O7$!JWc5d)>iG zdll_{XDNJ?cVxK}j<~}9`#cEhQWXfUtDasXA1RF+iCbXs&UK=)~@#NS~;dbx&hB3k1 z$7Ur9oc@%5p;(h_&HrB6D)bZ2lK`ManjcmF9frm0r<|?t!{}(t*r)TervgOj`{PCu z5()BZq&ECP083fvZ*PAcYz!cd=LiTps%|#_;@^oN%8Jc%AmgC&D~LJ8|20H+G8n6T2r!say{D=w51i`4|*IkD=XOy z|HY{CTb9Z{LDz72)dfD}#Q=RW$@#^`H4m8sQ5$F5Ai9}%UCVS(7m?kMId}igwObGX z3TUy&RG3fc9K7MP_OE86rS@kK0VMNuQz8aOW@eI?Oj=_pNk~krW5qAGui@q0{SstR zoXKlQ&mNA~9AagH~bJwd?kkJI|iqtjoS6mPnRgg%cHbZxNIM?fg3WETt1#8^gT}o*y zUErdqq)Vj?kZ>y)uKX2rKzb8<)D96sOOiIl*jbTIDfiSSLwX_u{sE*qzFW2P$GCd7Ke787_&yV z3RAA2ZQVWa@4_DW>m!WikSvB?tMYI-Q zJNq+>C$8v|YxTaq&TQks4HQg^_#e243e|h~>Tj^d~5^&g^Vr{6Y z&e*q`D=(iRv|&8~oe5(G7mOW0wCz?uD@cu5_pKL6&yQ03j@`UK60eB`+c>e>@XH3# zbeeb%soM82e4m}YUI!4!{(XT3E}8<0z~PRy(=X_`?!R-qJo#k9e7gI{?^G;YIo9>! z2F`zfM1^cLQ-&3I<2`MCYkd_{5^ebp;r!{5II;%RkrPcX0~J2dq$VJKCk8&Z-J0Xy zO%%3C&WpR6rxzace_d1i0?@;EB0R%s)XM~^(*F0r_Z|S0#)gjGS~D4saLqNgHS0l33uj(v_=rC?wOqzmnWmr^|<`)}U}p&J3*Y*K``DUa(^R$5vB z1fVm4lQxFw#&i%sXGmD8|GhAGKtc>oOKX}gBNUB*6ZFLKFgMWkQL+u(}O!rf@1#sI_t^Ju7-dP*5Bvt@n{@F4CZ4I5+; zz|kHSF2R!fo>P(AyW{IpraVyfs$CV+UhqkviRVxcTsQeJuHPG)j|YS?l`?hVvg%d4 zQ#d>preH$PUnc^IUvyJwMAY81yvhvp=(RE0FD_H(b3<Oc_2|dD+|C}-OzuC15iAod7~S6ltVN!Wr|)W z4jj@i<|Ft|YZ#Y~Lt5<&^>kR#3iSr6R5!FA)hs2eCwd{YOwRhxtD=o4AquI4hK1Jb zuKNWGgtf1i|0IRa#k#`xIp5Zf5CoJCI_WJ0i#uswY9w_-E6N5SIa}tCB$SD;sXxOe znEkp7bQ-?y^*I!-+$D~?*20X?^ zVfl+?A>*FLFECSpuMlM$jo68pn}A0`>ta7G~C>+cUn z^>G)br1Tz)#rw&)_E!M5edjHFW65AiiL6*@VDT zn8ZB&=G+O={pDTwUU78Ses2uW>_FaCm_ZG%4_2Ktj{y5oxX8vdi>)CUH)VwP*;C;& zP#Nj|fYRkk(cV$^f^pSTo@z#{4|Z{YS6u zJ)+={tMEu!O_$<&ddX>@chULtC$^c@w^q`J3`((mD&6?rqUe^S3v7=T=QUO&U%%oG z0m})H^fzu+6Y!O>;`Ce^e!juu@r+#-XxR^#XdT-0^5&p(wcLP;Ql<@aMyn*vek-K! z?jAntvS}~nFI!gxJo=kn&*zmNDp2LrbVUFc-@FpejQP=0%$(Vdpm<0V)(8Sp_3D19 zOGTyf3~mi7#WlmeKe!6`lEhsg^upm!04_s<;4PHaF##NFR6t)}yJm)k z_Z6F1M|H+&$W9Z9{aZf8$maM8!pajY31*Acv+%+H<~`tQ|CH&cJ>ZqjnC5*_Rh&GV zhsm*k)dkbD$AkgOL^-X7Sso%&O@HV|{ZzO5%?JRGc~G1BTOti#R;$qqkm*7y{b3Kz z|G5B|$+>{A(F(xDY7)!QBz=2&PEiyZK3g#3p*TqR2->{E3Gva~ks-bCQ$ z^%_Xb8<$yfUF_AuJa-lA?H(t>hs2|KPkf+awIMGcrDR`T|dW`*}7+%LGY zYL85^*DQ9QXiCvk;kwJEHnilC>T-8^ff-Cl$*6*7dGKLxiJ=Lw!)y$-Nr#(G7PmtH z=c;JJ_vfK=DcbHt1*fg6?qNGG(tt9l1cmgA1@Q#15dJ<#1dje+hoST&Sx+|O(z(wi z^s~B=sN_geK%%LqJ@zKR?`emVWpjET z;TVayzhhv9d2LD^KpFj54c+pDeBAFH%yE0B$88suiDs(}r;bmK3|29P7$)+Zk+amsTFGukzDwG%dK}?!eHJr=Q~^zFVFT>gPa7RtAcJFZy?EKj>c|N17Kc+d>d6Da zuX;XAc*=j0u2yAo7kK4OYz;~K+06Z6U$&{TT8OV0;U8hTb#d}#zX-l^)Ia=H<~X#& zG%Kk>W5BYZm7}$)zQ0Gwj9IGuYP#HduISXfz%0`YX#@IOmT2VeEoO$jUE6J zMyYrX@A~-4@S=(y_3=C3avIwA)l7l4cd>Zb!|oT)kuJt`H*yefFy#UV!?Dc8>O02O zwfx?+^5w5qY&FGrV*jGN-&{+txv;#&sE(H~K?Kh3)u&!&fL#Bgr@?MgD zZ7DLmp!H{*y{!wGQfU2fJcv8saps{+IpmGj&_jSQJl#50&-R!KO%4tUWK+63i5`!j zoX$SU7`)_f(JD!9I_>}Xx(mRJArxwkDpXG&Pfej#j#zc_?2D$8nfb#TL4iqKf%ri= ztg86z#}ioz8cd@melpUgMIP6mM%-?D9g)AwmHWNQx6Sg=b|SbwK_< zY%_biW!d}fMrwtf7VBi_1NIL84qB$|#a*IW9-Z{PpwCr3@6veUK>J%J4`(k~pS8Rx z82KJk1_tK9nh*P<^=LM)38G)@gk#I8x8u);MW{CQYNJ{t7;3ecXaV2Gn_zyHGdx}{l0zc818SWHoFDsCP9q;!Du<+Q~#(>Zg|qLVZfA$Q7@ z`e{W@SM37^w4S|#s@MMG@s`P@pq`)PNIg9u&MpZ}m*d)$EqJzTIK69~cBAkBR^PC@ z(o%*NnPsV^U5q;2oF1)xi}f%^9OAg%ytvq&mS_;q_1+ErR*rSXi=e|5o1zMHY%Iue^%lDGzf32H-qB*55f z^nVHBYS#!SBdB2`iX^5y=<9x>t8`topd_a;<{v0gO!t?wX@#w)^k8h9DSnl_|5NZp?-Gun$ z_hTV4u`)rL4sqq}r4i)kmwZj9$71;aiK4E;R?}5qTcqi=x2upOxyT|MCa<2(Pyx*0 z#-$QxfC0^|&Bmd?#YGn}@xVW9Ifx$G0MwIor>;9|O#a2j9$Onz|8Vrv(l%fRvAqV| zR~vdP)mUwLhgs_s8PUuaP%beSHxYcSO+l}W`^d_W9cm9yXOp4vxDzbhMl@yudr7qh z_BBI|mYNrHh$fymlC)~w_>Xnr)UQNtYLFNDiq010)U&>mfhJNK8Vhtv`&NUz-94D_ z)pELk!}!%O$!)1?f#3aYNUU0Z$?9_(1K;gt%<}?AZ--Xmvv-}=Wz2G~ zDyaR}It7kZx5p$dsp+?PkAp+xtA#4>+X8BTWMfp4!qBf64SbzZ`|>^z2)G4 z*qf=j+gJDqh&f1{yKAzC@LbNKVd7HabIO*5)obxx0AP9Cla?`$T%BL&!^Z!g^4>bC zt)P1sPF;ZFt_|+))|TK}w0M!?QrrR*DTLxsTvCdAarfZX6!+o|#U1Vm@B3Td_wQZz z{&%z5l@`vKnR8}l?`J<-hSADp9wG6(jDx`~GE+SOi%TDsFjO6d-)pHqr!Ozb8SguZ z(jjgxF7jGzXRgnEq&nFtJ1Kn|Ej!|CesRv|godHms+cE@3DgD&hrZt$C@)I;;Lj%q z;(#}^=(H}ZrpfZ4RX4eHzoAPR?;q&%I>xA2gM&+Z!QG^I)WP(yh{Dvj=9**ZqMIt; z%`pUWYrn#H1X}o{tU=*EeKu!niCKKr+{nD!>PPuf#JmS&zg!r+$}DVfbsO|Od`4_1 zW#4^YzJ%&-f|glqp@nug!zIP^)7s6eK-pSoPN130op=STB*5>dIm0W`&5tQ;tP56vvAUomu_cVVjMKXzaeo=Li7^Lh5L;oU^;r9J;Ws!-CKEwp4fGnL@Q|&;y0@ z?N5}pk(iGjUw+goaCrER_I^|=c0>~2X1%R{orIRo&IpnL5jGqFoB{=plH(i7ZLn;u)1o-+J<|G#`71thY`|g}Zd9<5F z&-CG*)nEah+G zTFO=`Pmo*fnV)byl!sMh^QE{{QT}v(YI?q>=8cNk$%;EUsLPx}>Dbro$W!iH3R`nk zTk(ladc=YL=+!gOGa@c8ZtkWW6%D40s+T>GpZ@Y(o$uQo0p_H(iA?l9#^FWRwIEx# z{>=?rY?o7je>ZmUqD))YP?4Oe`9!OrpB=k$j~F^ {pmAZUz#bR@H`?wlgrgU^g z@)63*?rdgx_!DW6u7dCJajw^vRuRO-#4Csd*bP!Q{s$<&K;RXNa6C`ltJT>hyw`t# z&=i7#m#46V|_&oA#s6PbV;vA@(jnpH@y^vFh7LtiM0dXnJ$3BubzuTdQ_dy0`U{MH{CR1f zdV;jOhaxTDx>uwCbzoQ13Mo7B{L!>Pj$iDgSas0xo#O^`m-GCW5L5`_)GMLaL42+g zyOGFwz-@A6>E(LmKYqu(-|n`4(~&?df+B&r&4q-8gDHWSkC;{_0plh+*36hR#A>l# z&6=}0|Cj0-d6n}={R4K+^M1}(pz)#SKqAt85KU!E6X{p>58QK!lz2;7(3b8txEqK zDQ`*?-_mdf7^I?^r)!6A9~)$rm2|tzKGVs^2v8n zG(ER?;K}&kz!ztQtB~a5l~iFKrhBPDoLRNTw$ZEP_%O?|~ zmCQ&n5@O;PKWb2)GuKCrc{PK_By298JAdY;@akZSS;8l$mL>tWOUXS(hbH@wbxR%+ zMcQiZ@i5(^rT5`!w4L_l1K0BpkdgSV=~mJ+AsxiMJi$PCAHb+EG#V{gCT8%uA`To2TU7@@VVDZ`vzn4dHCEy(FB zA9c|6a8>klME|m}5|$IwG=35^Gtbs0gd}HJuTs|oQr$ZCMA^2PkAR#vwOIWjDR;?i zt4HrHqH|fFPy|tX?O4xvP^(w&ErlGarDc9Mz2ECmAv|lk!BFA$#`TOJzp(h^s|Uan z=ros4h9CU{ax>>nxkW_unBrb>hcyuhzRrN2&-g*s^8q@tY)*+rcnnR-Y^3MTh;(vnW?&9l3Z0f#kz2VzWqnbs5RuEzi4OIHw0CVUhqCx;1{?l7}A#$jTt zl4KAJ`3m~!`wu*6=M|+<>$zfbM5Fr$(_a49ylf!7+^z`pAj0(YKZ_?7NL?0Pp4=Uw zfX`ViC-r+v#d=7dPrTG}O4@6w)q@if6W1AceiO#c;dVvxD-NNjTJZvLUIFCe*$dC# zNo+1ZL@k27YKM8Dl{Su}(vfTV6nBtMrT>eTZs_$+RZovhCUSCauIXc&{}VKVS)_n@ z2#|jzZDt81RHBBEq_Eu5Fh3EHsGlFUy9l^v9sv0^nGFrXe0;8`+;gh>slcX9*~x-)oV#%pcW68;LAke{bbelEH=#;OT zknrcA|FYbzImdlI0RquErZ1csKir3Wx$oPrOFUGeXVlH4^?F6ZiRCQdamRyTBO>q8 z&CtTN-dEwM`Ba-o)T*R1CE0gzbhOu2vD zM5-qNjtU^Gj*1y`4JLsudIWy6a3%FB03o3dI=*!HePT=U3-R+vB`yc(L9?bdV>1mW zzrPWZTXXoJun$~gB?@StX?WpLYlJaLygKc%6>09S-NATG^I|W@8E$jA^ zP9{IIZZI(l5KS!CoDr~*&!6G^F+-S;`-jnKuB&VxKVkh;w$%V*$p;erOO#^zRA)9A zrMz=qp{y4(E|VU_FO42R@AmSTl3cMkTI+{1@G=hEya?dZ%1M|gQ|s4=5;XN0!-%p@ z(T(UWV`eRxtZtgo?9@#=iT*G%`_r~$#^Ws?v@fqPxcv`CXJ@tDJqxwY>GG-CV{aNP zHWQ->SDpE3YlozG7oYpkxT+C{y`22K;m@R=rdGV>K+Qk`iYw49w^c5yBS$VW)<^(s zt#hU$l!yCORnOngzb}SO*6%!K1uT5z&F@whYO}r&Lhl$% zSVIn@M*dULhj#`Sh! z4e4ewczf&W8jw&aR@OGoqV`K|`jk_5+sgDMtMD*6U0hJxkAkA;Pu5cdVw$NLB^4CY zN;C=btmLM`l1rE4{;*-@-Q_PpYij4wY~tf;b5%3gMrpyP?iOt~P_liFH*cnZvreNJ z@8=&QDd{!0z?V(8aO49$BDxwUg*2eRO!}YSNY*eM zjJqr##P98Vk6q}BopLa$!b|JFIs-)HXK&5dxJ)*fI2WQ=?ulsT2S4NA3{!MEq<($> z6QFe5WuiqX9Rek~3CMKe4X>Mte*QGUSC#t?yiEmdAd5fA2JkGVq?ttzzWUU&_`1LO zX#ehFeu_|!-yz^Xfa zCt9&wPtaOJkQErrVsf-x<2-W}T;jzU^H)~THCs^sw`L9(6)=+OiD%oW5+O9D^wNb3 zzjpGNXLQoa#+{lcv+XN~MoE;&?a7P;fOMefcV-Q8%2O{`MhEz){FO^`#e}aEf6Ap9RQbiQy-F zBK6nVU!7XsPo;WW=dt(fQ`iSB$ud=*CA=H~>NZ76N_I23gMhX8q{efVZ+NQV*lU$D>)XFuK^ZVlK&-5aV$ z05a9&mG>xFrdp2b5TeMWKpp@)Kv+G@R1x^{y*7;>8SGOyGwXiYcc3 zN*Ui0EPnn);9+qjn`ywh&^EsG*_NzdT`dowb91x~JO}^t84F$?NZP+h-%s*LUmHvq zzDVzq5_yhBp=V@dbmn;eQ#4_p=t)FoPw;9P_o`%77iSwi1^mPsoJ_=1)#;uF^Z&G5 z9)H3sEX+U>I-+HG+51Bbia@LK`Z=$9iMRa#1d@6(0PcW&sw^LK>i&%2G;ZUvnz z%dT`vdu3ka$okhr7$6V`ol*=>N1?Z_PJwtyZ67{b!*3?Ca+L?#*(>|~5cqv7X0ze} z#hqoX@@}2)U3=~+@G}rdVrW=$L5LWi-`Qu(_~3jGJ|kn_82lFK7-*5)7kqeEt=5Ne zdB$D5a1mLWe%+z5ek+ITZA%Mg%D>I28gcS`in`Rj^#aO1mtf|3#@56UK~S1}J#U&{ ze;nkxH+lSI8J2f0CEY(3Pni2meB9No6CwT7s1iiMu{NWh#X;sk#y=_n0)2UpScmDE z=SY7##(WK->HSb}KH?EjQo`xoR_iP3b(L%Kq=P!6rB)G{7Qei1j~Mo@O%Ow`56jw7 zi_ntil6QLgNq@XvubHY*z2d2LbHp2Cmc0vHDVm671Z?LL7Xw z9jaKX;$o)%2MWg7t0wey35CTo=DHtzVN#RRD)D!w!bZ|nc(B@6TLi|2pJ+@nw zbD)1W($fX|piSKEfD;0Nsw}BQJ_jb13r_6_<-o5&o|@@k$-w8h+&<5;FPUS%pSO?P zJ2#@izS%jESPDu2FU2q`=~1gbId)zM zD9dwyDvr0m6p3Su+Egs+9TdUQa@oKz-(~u+dHgZGZXp7-QXL9{pE-T!4H2`+91hP) z#Ztd0^i3rpc>@vlAtDxcdx?$2q+VWEdI2Zf()WEj*C5$DoQsP+W)U0Fm9WM8@@KuC zfxazlmMH1W0;<{KlO9}L`65nabe+4^4zp6W}H ztZtr&LEPMbgj`G-x9MkO0%u`F_lGRkZ?OSu=V^#|WOE8rCM#}g>5lTjpyL49nSuXK z0a&-w92dLObnAH2Xr-smvuwWI#Y)g@M)NAme&uq2R<_&fPp&>AgIurMivHKF3)5SO zzNhJ9?Du_A%G`*Tt2RPDoo}KU)`?EZ)Oz?rJB_)LQm;<5g^4(a-hcLc&Z{73-IumN z2d`3_UB0gGbVP%8fgtHBbp>r&cWufw2M!_eHNF? zNL9pGI#?X3cU8uStoyK#S(XAD%swENz1}M+KqqP@GT}=ZG%h0v*T=4_D%N0mkMD$k zIKuI%h6$t$2sQqHXxlFKN^0Az!BH@h5 zgW7L%`(wqjkyKpY8Dn;89ixE0WUF=_gpN-DWHq(|kk#igwJ3H>JTUnw20F z0)9;#a^~2^(dnQ!L7v3dW>qD$P@c#-4k{cpqwbEO1J*+T0A5a9zq**v- z%-e7s_XURdq!1PU0Q6VvF9|8>jaco{yCbz0(Ou}py01PSxA~tpVFhRucbt8_v*v-F zOr|M=#Ud@Z ziboq?H)jt|W0R1O02P$X6n+6kUF5PeFPOW2+5^wuH>|zFJean*KcS&#;W~FQYOmZq zkd)=kX55wKBNz2x@2e9y+R5Xi%oh99-ySRX3` z>oLO>;p;Hv0z^5}9U7}oyg)F{v(Gf3GYDP6lc!G~1Am`9>0jl_SGU5hjbYCw!=@&| zr7}W1%yw>wbwDt_3#1J68ZzLhMCiQCSEq}XNu>Hvq`$hB=`lnEL}GG_Qy+%Oww;+5 z2pCrwI8iD+>VN}>7WA0{RchE0dRHAoAmH`dl=vSGZ82qUQ(LjIlLWc6Lts-h1WD+T zyA+OGT=7%L+X0%5|3tFRChxF*)EFH3Ze zwIQV6b98OlPm`2<$X4CNiXijsaPX&ku9~k72s?onVAP|&xL$uI^?c}7-FPVOO=_!v z6po)mm~86IXz|?5(dv9$A&yqb^i^kq*Zmh2d{Cv@c9s1V$b?I%kx7&dk{kpqO!?}ZP|N`;qJp14jfqwqBmHujuQqSiQ< z{VK$;L7V5uXkl2?MpUezgaFV)ukdtQWz29BTLlVRZ5~cN#;JMIbwLq5yq;g07uv@s zx;Dw_F-GSlCI(Nab^LnHe%E+2r~9miZco(BwY1jPS{n^Jt>5rsXFFH9<#zTPqG^2t zYOr+rsAgwycy-3BN7ze@-CFvDsRo8fVfJX?kmW}A-j^mH>n4vxW=v1d< zF;7{Md;#=z+G8Sfr>Rr?i*@oe=kV^{CO>arAL1@#@mV`hIYLW(a`iGo29PMJquTEzx+Rwv26=d00X0Cpi_LcJDk;wc*iECEh%=!_;QZWt@QlIHnu zwFt{(|R`c{m4@rP4sl6 zLy|ajL)z(v5HN2g0JMX>~>72ckQm7S4AzZ?IQ8=|Uw`IQ=>DgmrF8*7k zi#dWrXg?qQ@|at??;1%_w&s4glpP6ghGy3I4Ez2Q%7-Ug@4wy+ce%kZMKUW3=q(%<_r5gEPAn!A>}DbOAnZtxK5_Ox zu>k)NW8$~S;M}3Joi6=;KXGW~UUwlP(s@3HGOZaJV6l|B=zO7b)@uf!x+~18`?;%_ zMtGgTU@|}c9=uE`WBt67HMQV*JX`1V`t|Dvj&)kzywEuXC($g^i4BnpWD*=+`*vmC z2GvqsX^FYWmXXgi^Wdi$xcA&G*12Tq@zm&uz}(BP^x{Gl`$jmTA|p;%Zp^=Y+}D22 zi!r-V7HGLDCW(txB&`j}d-+V^E=a~fPC`>d7uPk_CEh9E!G z_2gWHzGT|_Bds-C@AW}*FJ)26;uRKvx1Tpg-KAeca%Co?$We=n<^pxVaEhxceXZH+4>eb zKNaAult__&aV|}dm{}g$^WJ=fDLr2co#ynOIh@MP6|MYSpWxu5V%oA*;bnOFSK2}J zWhlL5H{0dkPu*!y)@Qf>koB}qSKH3OA~{yQRDkd}bY&h7R?Qf^!UDi_D^LSciYr#} z*NY+i=p-JCok_+;w-SD+-eH?V2m~t-RHv7ZewI@x%j`y;-s~oMD0hX6q#Qn9F2oI? zvlBX&GFWnAHlPRV9QR$7UN)o8HddaE>B4oRWgwMGM_u)pN?6e!MjPI-NV;E!iz@p% zw|Ds24^+ZEk@dOcv{ryHmC(`?w;fezpC7CE;p>!n3*)^$lcd!_XJ3TYgL{0;2y)R3E z)(`eX2Q|gi-K7O^npI2{XizrIaGcufNo|UwsUvokN1aJOd)c!^sM!4G;02z2UEj+_^{VrH%Dl z544Bc4Em$T_ly30!G7$=2?Tiq0iRx8Ue?yk04{}YSEOkJ`vdrxbUl{OR!vgqa>zWJ z@`|Mk#yA0HL5l0%oGe#uXL*5*o%u!(Eow4;IOcTM897u z*=5@mri>V1uMt)4F@k;V;tAZIrdG)iBhO5$t4vrz9~C{~<@(}<$B+r{eq6sFE3`mE z;@k3UG}P&Wxj`-*?z8-BKbr(VXdJ(;BYU#b4)3fmjZZr(^SYRXoun_>Gw3vaxfKpP z1Yu(j$}nun3$!>uo#1HTM+Uq zCmqLItjBLZlF^5)dDR86a}uNZx57g1f;=I>AW1HWqf1F`{gHBr)H~|#u)`Cj7vTw~ z6AxNJpVK~7b~9ehQqxfdGrz@3T((9)P|yJ%Ks1lbr@{y#sOcu}X!@`@>98DdW%eA^ z@LIjgX|@w2L?09B!TLd<&kN_;p^Y?wk7K9CEpZg+QjixTHrym8U8ghVY4KXy$$G9l zo1?@+0lpG`@6mm~Qri9l6nyK=qB$fTpGDC_#>%O`n@%^^()&Yejl{2UE_62YXin)o zJ_`NR1%a1?4}gkS7nJ6N%H$JNJ;w``&P0O<27xzy!->bE16bfigQunp@9B3-sK9c) z6ZR4RYIE5V*q;xhFQn;L(p2zByRarGGt+>-O=%WrXVxZEbOhwgP$N>6C(zLMp4-?b z^sHPO-u?lw`Jh>y9#E#>(Zh#8L4b1$(X6~hnIiFOonp;GjcYSv6Pyql1_q03pwv`X zI4(S61NsFpdI^E0N9PN66khi6;LjUp!64>eQ!dP%Sm4Epc7*;`-c}suuc&H^SInRj z4_3=m6e2M!m|zgu&F^0wqdmpaD{C;yG=M7skC6Mm*?@9!o!F>$k&Ff>~6-!)zF5mqY5nTQG2Pr_b#!8n8>f#H3gF{H{ElS|!nzd#25@`}i!6 zYu|t`k0Y|@Y>XhjcB|7xhgx*!C!py3Mb2E35^O z%MDHBhQ6+~z%^X4`9(APW)HV3dNcdQ7L8a+ylMPe9@ckhK6AbpxopQe5e|;uW)(oa zHQ)p=I;NFe>{j5Yx30v*$N+zTAZw!Y@}&X|u#`R?v4R(V{R*gISwW`^OXEwjS9(G7 zb2xcg?`+?C1xMmjM*5uuA1hQ=vcm;z9=CZC^leIca>UlO9(eP-I${!9$++@(vH2r; zvs>>slfB%&@siw-aDC5!lJv z#RMS#VJKuJg90$w!c3bbS1|2$9#`C8P7T3xG01l{-*V{coh=yceB>@p*(vjtw0Wm+ z+E9OTD!U-G3!I?R=v+g0`VCFP<{@oUPUwlTClNkjW?)61KMWy`&@CSS@&$CDd{i?fP zM|b8!4qQdc2$KFeheS&bv>DUI3sF%5uiCqnmygeLLFg1h-Hpu&jv&hPsZnN2<8qe> zMpCh`3@rPslj{TT$?28|+au6{m5s2Y>;o+9J37jk3)WuQmMZ+nhZ{}wMbg{ekY6YF z>7p!{gCR93Bq~grXX4V)f%F0pkWW)EFI=pmShygnb2gRAcxPu$Qym#S-5fHXb>|rZ z_W{YfN4oHm6|`3||B|)QVaB4c&h9wp)5_?N7jIQtfIL|ch#K9@!wBKIoMp6*Oqs8o zjsB-H?s!)r0Q@S9MH>LP%Bdyq&o#! z$j!z&A490IqZhe4yT%Q1sMqMP)Zz!}3kJ2lk9!}D#c7Pi?f;fCpPY01Uag^}nZF(j zwtKRxGskV5K6}Eqn^#a$G@YQ@d~{~){f}62X)#a&xI<&?$@gjB)iQZ6uZ$jI#bY#e z6%BoD4Q~c(0vF1#l*1zEG+l&Vopn`CJf8JJ5t~f*WD#|o#@0ni0^j$}*TCF90$~$N zaY!jxR3OLc*qj%dbziuD(CPqV~eXC-(W4O+W zm*KP?>WviV#v)cC%c0kbs`cJ%4+?x@`g@fyCufR2h>%5@vBgruHrz5Pzuna1OrWMbTasb=0OG|XVo3%r{7vTp6KR=d{} z0S@>najQfgTc?vZ(hUn;{QAUR<+q;V05=RGA^?^Y#3U@SwV!oe*w$PzH8G4B7jeTj zGk@&jIAK-xjVf+FpCHzu$kB7+3TWM+*7S4ESQjqkuy(Vn!^4mnp8k1f!-C9TudAYV zoCfAtRc3ONL|IKa_3K9K^w0g92BV?@?iF7rc!E!{n2!8S1ABASpJgz%C zu}7{=Y^x_)A!IHc6YO!r+9gy!pY*F42&guMeeWOtgQvPD4E)nVvcSLR4PMIFjaZ9; z)9%BQj3QQHaqc3G3yv%wvlzlW=E6~DDcq*)^WP~B5c=&>+zY7ikNfehd+x#E?={k1 zYjT_s0WzeO!(ZE!sP3^}(Rlr<*SXs7Gz)u;t@&njSp3h2EvjS24wV1Vf!%UHq+&I& zk8zq{&qWyXCBLBp`NuPb*54h@$wzhZ4XT6jWm*uoY#A2*> zsyMJ#r}cM+|8xW5TXObW_E&a+eG-Usz5!~Q=oCejB#g;P znE-;*gshu5Z0BQxcM7LeYJW9vEBrRMXpG{=@z{GL1oC|;ulZN-M8^x^94zcX!yJ|c zY4M~bft56QWMQUj2!?1;smLAtyY5fI>DV%pzNw?pU++%L-g>JqwWp1GgPH^~LwtUV%x zP;X=53j1L4DQ4rvTM1DBu7ZesIGg}%4R~z2?%sv=YxdHn(0n&p!2E@=lL$)P11huv zziSouA<$`@A~>H=s;d>%U}_W@=P``<0VoPUcKeBcCHT7g;8|D%K8Q%aM$X4YxOHWn z8hY=Hp;Yt0&{o4km&g1r4)Tw)v&cg;2O2^yR_2 zazD2c1v~#ln#5G0w!c^70mv0e zdw>7y_2FI51I#C^z5+C@W>u~vwrO30ugk;im1%wsE?}mMY05!jyJbd0yN~DJrfIr} z7@)NG-upbh(8%3_kwYu}koa{Emk>V~I<3{bQn9ro*^u>is`u*QG)Z~QKyhJzRSkh# z{Ylie2%u#^pdVVmqf+wq9Zf%+mU!orATVde^|j}dZ*7NxUDaTN<#m6X?y!{7hqKAr z@;mDp&muvdFS??_zaD%9Z6#ehq?*Li0AP_)DJ)`G8bal;q+K|gd!`Zo zKGBs$xpaYrPjlOuWX#3(5As~K>FLo3s_VbB3ue)nE;6@A1QS-3&*_fnS#yHBA4kN= zE7uS`iM=R-;0U?t^(GX@cFEj1HlIXFciK@;;Inr7ss)xJWBSr<`jQHKkq!w201NlMLV)`_wuEXpAKLelN?RLvdgvx&ZAhzT0OH(@@Np{Wa55y^#yBm8 zIX4-U4lAF|ve7}UCPFP2IWe@*(@9S`SVe+h3<}x3nLIVmU!gksO-KnoY%|-QbM+Fd zb|E3%clDW{_1N(&EFNJHa6HPA&MJj($d%zQd=PQQyMP?#FRv=jr&j!2^qdH_#=u|X zZY)mRup&z;nbJl+$F8TZy#bQR%vBME57;k-0`5F<@$8Mnqc7jxJ;T?PvEM7?DB-?^@ap)) z)}EJ}V50hZ1F!Asl44I0b6HB+CMSqkCZdj@?n><5HDrCROEBL3%|4)0<)@O>By2r0 zjKj#NiOm}|Mh+QhqU5cp_->(amrshMGKD|%UTAQrKw&*5t2hWlRO3VkP=-oS?cH9} z@1>Nrp+eR)$gyID!(|o~_;TaOdV$9c2dSUAIyI_oXHMRF(FH8z5c$dA^m#~J}32NZpsD`l5s?JW@0`0t`e0L4{ z4CQK8&6_WRIu+Moz62hT$O6^_x=CrVk+@haS(h>>7MER>Ru*`ex9I4-^R4z7-SF5N zOW3sR3&xVGAqyN#da?olDG8O|yxWpVY(lXb3MkgJ>AS$p38lC>j<~sMO`5Tvqc{Ny zpR6z#m5A2cOUP~YdR~nnG3Z~x)rZuh`c0j7)AOA5Z2{c3@%23tjaPr9I=pjpNqsNg zc*1{UTJ-%Xqk;4?@GWS*b3n*Un8tHttYDl(Q5Fvd6pKR z&JkSMxS2RyzEj*K4!0hj>;9{{vv^H&U=2*cEE>d=Xixy-JEh;4J<_gc**4lp2ItdkYqrpQ{85BgH&^)R!03JCZiVxv1J$ z{<6^lFYlJODMf)*=rLRy5P!)C7BuB1`$f8bAq7J#K(J8ygh zN`D@bua=A%m+<1*%VxVFD%iy@+kL!7xTSZ5F?W6x6)j2KPpA2#&OHHjjkL1Xn?v%1 z&ApY9%T)lq>S)vuU)+$2Ywt}v*_&`|RNG{E13yj|0(8~C2PiVu>yT+(F0=eFLxhtRqC6~<@e`LsW`6Z+H=&Ia78}NWbt;(^&laT`^ps=;ah$u$05F)hH;vMHcGrS#OR>h<+;(fdpKvd znig;8J7n^AL4``wT{*-{weg=p*N?<}JaH>PA9@AC(Es9hE(K1aC7=%xPoZucH?+!{ zRzB@!$~|*g8Py&_Ov=lz7BT9tC-JVE-ndNMZo~B&`CgCtu&pXQi8kI%x!U-eXJP(8 zLOh3ApWAvl+tdElmJ+9Rgo)D-i!yiRQ)$_*L;Y2Xc{=cP!d4!=ENj-KyjW@P`~nd{ z9%ivXaxKTpLL)$GioSz9{WtWzmVR?1gxfg(5jOBne|N*j4C;R!_jbTdy5k z-N<(5SbuOPkQBJg4XkD4(PvEW*G6)p%)4?c%BH{7Hj?{#W@)8{Op$40=6Pp5**YDc za>hSv56lEDvG#8p;xSW3*qrf%DnQD#r4dZ9d#i|lLg`?3fSID}4Gr7Z_Zr?7ok+x0 z-REb3IuZc(yMgLJvXkQkns9HK`&VO!ho7?d%IVG6BMedabRpe>G<0E_elHy!<>@$K z*Il%pa|HuJgHi)wSIg1kYTDj7vHn=9h_FQ#_^_%*KlOT}GP}ZdexW3J4e$7Qc-|yzj z52P!*Z09=wH-G)HXZ$ zLlA;HX_U+rFjyX+xslatZ0t@ma^z{P+V6lTTmFKlYVJaiveQlsBs&Bj=lxc*|LBc0 zxjn*c@c+ZJ4j+%WU+u^klH;@PLCqx==^;Gg%jDV1fB3Ql%%cgj>~dE_(A;tw)qp*@ zdKkjsvLIUYde;Hn^tY{SW%nuof~{|M0b&0IP)rY!#vTyi0nttpqJhXlSLIRNK5ER{ zKUje1O8b8DHxlJK!N$`8wSFG|(8wLy$o>qN$$w7)QsU#}CKK=LpWodI_BV&bfz~LV z7X4n@QQU3|T?2v}hKT6Nqh39D{uS_20xr~R_R4cov`c2Ri_|9}>}Q%Tw`=NG_DU`= z_R`rZjMfd{B7p4>_I=5kEPJ`oeqNe%GZ`>Tv{+I2j6E5)@mF%>RJpc7ar~P-%YH#u zaXPs`RKR~wEc6z#a`sh)lM;ZhW&L4jiFl6Pqf!tz1si*f+({cK)!q{nQSxQ6dmV44 zt#-uLzpiOya@x*no1@w_aaw4f>7h@98Pudp0%%y2OGysG-6d;65slgYWj{cOwY2!C znzpof^TbvnBzgEZ#(BW!ZATBWiG~L#E&XL5+N{4{{pN0(;nPEEFdc_f*yAqPt+miu zR2XcdPk-iY!H(|d+(E|h02&EpkIVMkgf?@y;|y*^v3iAB>x2#023HJ8`b4hurRT@A zc=6LfF;U|m&sK7z`ddg1l9yLiOMDFbe*xAf(AnSHqq^V5{((7(!YzE9bk89)W~=#* zo-%w=HdI5DT2PZI*GAi!gX*rZ;QEsveaJ#so@}lruMOD_4a!~t{iXKp`wCBK4LQN@ z8h@qc6qkZgB*I1vWl<<0Qw*Z>gU&Ze{&f#vQ zox2)auKXTJ*KD3IF-)Q7R*$DNYUxo`0-335k=mZmQR**rQEZABSNZAML>66-_{i}7 zDCOIRx@*j&My%4HwF|9P^LF<3$9h9~eYR3IPUn{RlE^&NUAz%WDlsS{<}WqeJX#pm zAn5vT)~!pwaeVfV9T_DVmY}z>1%tFH4rywW<;_w~94sP70XonR)B7K)dFNu-!0mlm z1C>GUMDTlkHhBD1ppVnz_j8RQxV=wEZ5_XI;z0|)M&m=;G2AgBI94~m} zeA?%0!T;f>0pNyf_&sKSa{ROi@ei<{CT>GuGMVs2RSUpkmF&(}FVzBKxw2jZy#z)d zLFP(UldWqAx#droo&YgZ7wBo3j+x-AIRO3}pyIU@N%={bc~I~EdToZq@tH%ZF8xLz z=gHfQQdZC7Ir^3(Yl92Pf9DI+T}{@cx(DI3E%isil(Td{iI=nH*G#xJ=2_)@<_+RV zu@m%=A2IznXQ~U@cZ4^MoBUu5;5iCW{IVCELu?{dJBq^;Tk|uDNyC#z)oN=X;z z=}ojUO@l4}D8I{oO(Z9SS>PFe!Af|9l}%@|a~b6~D7Y??8ew$TkeMv#=uJn?ZtsXb z(=5Ief@f9B_16s@wZH+UcM!a9iB@k>!C|&2AVizc85x^qS&=lu8dkPUrgiGJ-CbpC z+|TT0yYFiR-Sc{DaH>}s!tU7o0mqK&jBz@DaY(@C-gALfV^V#x(UbkjUgQL;gsiop z-814fR};_MG=%v`i~_qIvT)?kGD5jS5WX9|{R_Wu3ctGqx6ZJq@>cvFNq=4j0wc|r ztoD;bupJo!x`+HxH`*yqiFKR4sZc&0Y?{&^3q3}M@8U3Tt zp?i#-H(`y~)oP;j78m6i<$oV2@FnN+=|aP9f^oQ1OAtEkR+e72HHH+Xi%v6@9mo{ue^NTxXk(PiUsc|!~wq)ja*5j#6o)J#F zGIR$Y*X=*Kv5}Qo4UKJNt5iYIshnCH6jMTrGr)9E5^QYZzDP}X@pCaRm^(Nde5D+5 zwRQV_SGi?=vt{XLesh~3zn)W3US#~zuQa&spw|>0Whnk1)Job*!mQ{qta45cf5<6C zMt^%fSEsaIeSRdbB)0<8%Ehzhxxj$pz*(CWhPF>m%VC2Ti%^`F6qs?0+9lg-mArK2 zHU0z1y($a}FW97Ba#A$nXld#w7VRp%;Ur1kQrfZE-A(^K0&A%v_UL$1O+PsZ?e@@-JMak_^hwk0613^2l_KVK;|#Zgr)>K>+Q8E@gRUx4t4*RtFHBD zDvxHB6D0wN|K(~Jo{Ng31yx7KNBeTlPtrxLMKsn*%|C{c&q`Vg7cHyo; z`@A!}Msx6{+g_9>ssp9eK(&TI^r9`_>5*=E2YF1R@SnT7{%9(WLYH_2tc4rko(sy$ z(gg$2vxEHQr$%|{W2=W-I1*<~ibA}l#SPs`d$#I80fcqb%zb$Vv#;3}#kabG3m>PX zELE0?65kcQKWxZvPY60S)ZoD@N;=b*lvzmI;5y$?v-2_r94+GvP?Fw&?jQX!R_+FH z3IOetX_r!NJ;0!=2}P-AA|qgY890~2jC>~=TOR>;u0RB5{l`pSYYwf1yC$mqJE#Jr zfUM~oEZNygqeIHuGZ0QqNxM}^e6sDN-f=^SS~6dZ5bHB1X3u`#F>ShyO!{M=^1@5r<20B|DX%G%CTzB1KKYtxv zUq57efh*E3K{MBdkv+eE_mX3b)R%b0IPGijd*5bPWo!KUU}M&Am=e};hfJa{F;8D8PWYed|PFMG9@|+gqL@_H7TM3|| znw)X46Ihz98SX=Wv)%xqzbij+U3}0Z$v>E0(oQD^#a^MUG(tHNsPA*6s8?eQ zFA2b{O{~+i_p*#_pLlu?3zJauC3I0L9)3^1+M4VDoZZ!l|MK-4a=&)FC$*zQjTAbZ z`cOZU_o6AeVnXK$X@#~;2AAb^=5j>~K8Z~QM@6R@UxIHj#EoRl z?{RwNaJ9n|wjJDhYaY+0W}ZcNRk(bG22ZWJf}VX|VzK({$Ul)YKrywiFYn?3o6*3K z#Fs}_cf{8kyyeoWc!D91nB0p$FXdGa9Bys$2gbrte@+m+Pf{#C@4L1$*5I#!#quss zLFaf`2AoVnGw5w&95n_`9Pme~JFX7xIr%7yN{K|PM&Bfx_|yP%{4ElL`lVVBygY%2 zNY21TpRdID%*%L)_j{w2{SH77IvVNNA0SOSB_|p}mrUv-cu_DYB6P#Wy;+6jTO=dP zuZ0&AS7=7P2|Z22HS&83tJ(TD{Yze^^iTuMOq@FE+VhZjvy%q+h+z z-2hsJ3eAuNV8z@LqPVGPX3j;)h$%cGwVQ6;rPu=~()n`isP~$#Sw=*1p@u>mO zC^BZ?+LrT46JNN@@MbY+5|FOtcLh-~rG}YQ;47m4VI4Cq*(m|S(Wxf$8Q}e9%#S4_ zOxyR+5UUC8q~S(wOAb8~lgzVXV4k)Q?@l{U#vR%YF@14vn(|E=c+a=04|3t-HM);@Y zx3ON-P5>P0dl2@5vT@@zB`>{_$$(*Jm>U~)jRl1h-0cOU)#7yLDNmjD0& literal 44895 zcmd42WmH^E8!Z?@aEIW~NP^Q4Ab1182?Tey;O;aUBtUR?ch^AU65Im>cWDR?jr;Wb ze&5`=Ywn*rv*ySA=+&prI;T#ZI#o~Yy`Nn_loX_~(84(#51$(1;}PHVz_Eobe#bX}W7uJYA?WE!A$I zU-Nsgi!+J(vJyxza@bcmQh>&sta4+9$mVw(;@>1=vLpq1RC?B;o<{6&5@?zO zxGZ<_c$}_Ds;J->D`bUBQ~9bD?uOcJPsub*%J<=-c@mu#_sou<_b=m1;KG=Wpx_t+5c!Jb-{&d#U&ux%?BfSZMZVIno@Y(D7#64f( zu7nib)Vpgh`^_CK)FGaB+!*u(PBtNOnEp;!fQlfS4wUxZELd;HNSox`wzZHrux$Y? z8{_V-jC#?EbibvqVc%*No`<(;6flpp%e6U)3Ev6SIk@_<%KG3da(k(ixi-y)muaYRNsP3qC} zHRKwl)>RWkyfgaRDw$e8F~+RPJJ=ZB`SnEJz{SIDyq*z(7}h2qNrR?#|E*@rCRL{S zR@rR-itEeEzP=v>PJ0uSan=a_I4wE9+leq04_{b05xwe6ht@?B&i^Dl`sPuvV9I=I z!4x;s?_ozSf_QXa-QzL(4{3te&yth;fIFu7{_F<}92zq}AIg#r8_mIE9R^2kaq}5z z!)x@QNQ zZ|d6b(`81^%YGTyUUdYbf=~>dd_3h+aG04RNY>yF&c zOlo?~pS=F&dkKJuz2-bP8gbrf%w35za761)bVl-kqFDQqebm~kknxcQlt|OA}GoF@ZZr{(#`sMI#c$sP7 zh=OAZ9(GsUJ_rs{b{LqTRjx#^+O2aPU7g3xtM)h$3hvrc-L;ERs8%;m-c<7PZfpCD zH(3N_>Q`T|xqmWG@|o~>7FJn*xc@j_H@j?GIN$cnzo%mcSympKV0~9?~z6h*OSeXw3uZY=T;S604 zz1XF&mV4*Q0K}bHZa2fr zL!o0M@2c#_x2oib+4LCC%y7M|rkefYp3E}zdrk?Af;sr&DFbNNtPsst) zi4{I1^HDls+P{BKlFp|v4{BNY8c~U@74enZ^xx`UD%bxGcV#6bS8C2%(gv1)S27ryF1|l zsH|hhK4=*WJho`_z`s*(i7`Bx56lu@ORrx%^!1KP+4L;WL0NK6e4BReor4rn;Tu~$ zcj0U>{vbTrI&em6eY-N&VK>+8_td&_F9L>rRjXw5KmIv(Zq`2Z`WGTmpu!s25~Ym< z%U@bO>vI4G4xs|8pTWBl>1`7ioFbdG@JG||R##((=DOq-QSrG-S&gw*==8)ub$uIhz-P0?(SX6`1!i`zY@CmxCgZSOaWjEcQE}|`}Wz9T&^v&2W)dTde&!in;1h|WgWu1Zy zlUhreCp@It-7{IbDtG2N`Tbf9BchHxy$Y)oLM?PK<8_rR#z=yR zCe?bl^8G%qUU5w?Udv8v6rP75H0{srr0`#NTbRReA5VEm?JnU;{x4!dkP(=07MtJcY7?#jGe*AT;`&l|h=#Ny-yJ{*DbE6J*atJ?Nx( zQV*tfa@td^Df8iwBT(pUIFL)j4=_`Ea&Uw$%2#&PX)s0_-Mwk4Nc3)W zR^wp9*NF!KPq@D4Zw%6dS(rne3U3lyesEF}=#^cYBr`Bg^O3H%ul32JRYQ zto=#@)DlB)Q&7oQern<(t?~d|71B77>gwv8<=i@_UwZpXawNE&$O>OTs`lSkd=1ie zRpu+I5(+rHenQ#6>d$w}CL0e2+(iX-!s_n{+P-FV&jePGl9n=ha5JC&Mn4(X_RVCB z*>gaw=VIAr@|fbZbteQj@vHiwI|3pdfA9341ZFoj}qD-hZ z1<3p{vwF;E`2NIkqqFz4M1<*Z%&SM+tvm8j|2WC*o_y`LrJyTVQce@YjI9pmFGc55 zyPHgd|85x3&B&G;?+G^Kb=RZ#6K>OO9x%EnZM$rv>g{$WruD!B#;$}ya7CCv9A zw~QtmP7di#-csf~rgsnD-`&pv0cz^i7^zRw-OO7H5uW8;3+~UB1b1XQ^64$o6lva7 zz>cQxj^5*%={L8Gcf~YF%agt#b}T7(CC~Uo@2o$(&oQ-czmc!KG%$wRe`r4`UfsOg zrm{9^M$r^+tjS}?wRwsP+CBVUrv$+2yRPU;PzM_2<>k%6u|bi#dMCZUKE#7*s@1;z zco(94XHwDb5NT+0Y}2n>`SYsyZtzS`OarPYaR;X8@-7R)aO!k<^kH|DvoN0UXc4Xm z;!K+|@4QUoU&o8|Pd?#nzgdhm6taG9+?f9yu}|%O1bwBg(s>K3ht4lKw+x*6D(?+- z*r_^q%^_9Wj5+8UG}$d{e1m@mUH&dX7%lQXRnbROc7XOfh#Cxh$j-w%MsA0yG+xK- ze?PfUG})W4FvCvPSAFK;$no;ExET%6l@;Ly(@1Yf1 z_d$nRAy7KTL9(5fpp{G53K_gHPHx)OTG1850(>)93r9ZlY&9b#6uzXi^4ZDKp7}Z<;hxJ9NN4GBcbAy*7z;cwFC$3e9#^#2ML4&kd7))VNar4~K09GZ ze_!P;c9b+#pz`V&^Gi`tDDLQ=K{f4V*)OOxO`if7XxwA6@(*}@qdP|kDu&eCIAu|3 z+<);*p1%)XK_mj58L3jD)}eQ3qS9P{e%3kqD}&Qc8%$E6-`4bab9=rGGlVNKI|hX% zC8`k&|Hw6{by(;iw11Aml>cfvm+PVmATr0jp? zoIZNSGgf4?_0#~Y<(Ix3fBRp=b`+6*o*|%>ffy?G0aPXfH5?(n1D{(0zn6rrWH}Cr zi-$eVNnBf9u8}j{-Qb0mEgX<^)qvqqVQJjyXJsO)>PHM4sWQT^h(4W6cwPRh#lcxh zFTMHS1hm%kkkWbmDGMN<=Uzfk1vQp;y;YE4uO8N4o;6u}EE4GD&z^493*fYimJZ?! z9WkEDmvlC0>sxz4c~LNeSB#j9^HAsi;@&4QF~|T&k}S@j-MEmKd3>_@3Eof;nDHtV z@mul0#S@p6dZmMJKs*_1C$m!1srmBtboMFC@PY7t7Pw_+f5uOAEfB*2ytP@Rx_EdA z^F?|05rNTLp6Vxr9h|$E+dqR4Gk+SWxC$#fE02*Po_9_Mp>S+pIH961Y1I2M{cb=y zcx)hFUmG)C1_n;hjN)<4r+=%DB@CN|COqtCd8`@N#05PLGbZ=>YK8GLcD-VJ(YujSitbNO zDPi6jaD?~3hK(@?5G523)1fsH7>Gvy6_0W(BnKel*|+XGGqn0iu@dE9t+jJ)rMux7 zlB%M&Ru4E&Gs%DN{pghFs}@Ndy2X~W(%`Y~OHAc^8JDUOs3fefhOqI|YNpoj$*Z}g z#dx~#bE$eoaw;MmP$D8AAXqN_Wa6=1px#Ro={~~8i1f@Yq~fgefWEo3r3&i>(i;zZ z$Lu{JHRZB7^xUK5#}7{e-`gz(i$nSfg}_H>iNJRQ>U6tq9N-#-;|PbCjz9=9^v=n{ z!Jf`|rda%lkgo7+{pXD|7e?f=D`aC6H;fXKMVxc(!w4Ax`<9H@*m&!W?f?=FlQ-F( zTWE3lBm%CCAvjcQ#V6xa1=7$BP8u47)mArgN5|R~*s!jE#YE;0fRLBb=~_oBpA#)7 zXJpsLqR4fgpUb-tzof8M-@xD9Y`QjRoA$I%zuZ8FN7|8b3^a5ZaQfcbMtI?#EZ(NL z8riCDi#WGUuarSdV{(xED%8~K zi0#PaBKe@kqWnz^+UBiqO8hg!LmSYXiJnBCcVGnYOklDIf~IF3YY9!LH=I0!p*z2bQe3);Lk~umj8j{oT2!)^DSCP616X$;(vVa(b!r`V^7DZ}ycvpAhh3S5zG=btb0sL#vmvV4v>Za75 zIygs4yoqC@@cnV5YKH@1v#Y^HP8er#-Ht;`pa)S(6SAwzkXjL%NUq{Mi)MCce0!5o zC;tcB=H73-e|CRnSTJm{-|8~6Jpii$sFSXChMPd^+zt-;4IG|>Q-L7@f`0p{UB+^k*WJ`59UEwZP5bD%}pZ4S` z$Lc-beZ`{Ze-7U~)*aa&*KLv*j4?S^*&rKJXVHRKrLOM35w>2J)id0U`eDN!W>;Sv zDe_@AipcWh1%<8n<$bm4MKHtUgDM%DJ@I^Xhj8nwc_4po<>BCMp%|)pV)WaC>vv+uB!PMV_U@>!HkRol0Qg``^*6e*8v?ln4^5yP+fGi_nXlRK z@zk-btloKNVF7$U@JG+nJ*uJhYy}YF&SkCt?U`T1-kt${uo>=duMug?U*S%mI6pkQ zwq(i)t<2uP#WOKP?;|TXgj`e*jLnKaafoPUDWMc3`=d>vz%eycsSM40O*$J;DGP9pU9kU|6(;xTzCIA)vq-|ei4fuY)Vfw zbR8^do)ygyfH+cbQ9G2T@Pn4#8s0uf)YY7CSFSmhQ~2kMvHxyNa(=vffDF#_{ytnT zx|Qi9pI3RBz-Vk|xa*Q${b1+Lka=4wq%&Oe*~L>)F9O5F8;!}H2Lt5fPUI&uZ`^G$ z8>R4EPvsXfM?AkB!F8mcGf&>-^-9>v7jx!*qPK_qsLw2kfXY5wC}NZrBip&}-Le$T zLHzCjfJiC2ybTNS=~rZm;9K-Aeo{wrZaf&_D}bBw^9~hXp+O|O*_P5YsX^eZ8RPy4 ztu+9wq;fffq2|6+TxS@F}j81)QxD%__I7r{%HofR>QBR!pWjCAuR56;8;{$iX5{v5?&i|{qJ>P_ zN#`reI)4UB7S4#qe)pesHsfy-EO<$B3Vs-RG)IpAW7-{mdw%NfhV3OE$!p6%&I$R_ zm%Bc)RW-c2v!F6Qxn60V-L8EBxcamTV>lno%ecP>T`1xAl~B_3Pq+s#G`RQhBw9T% ztz53p-G+9nEL}~PG+de7ca^?zu@gA>aDS` zY3CgI%ooarT{&h%n3zc|vygB}#oY1NpgjqUMhF08SA2JZi$>0J7EZ`n#q+MPJeR!* z7?vbh$hz#S<+nZNoeg^;s?)(vmTa*{&Y7DN`9~)Z#w^+S^DS3u%kvx8RbR~0sRP8R z$2xs2Bc2nA;N+O&0iP-KG&w}WcITT{8s@2EDc98dU9z>F%v!2!*d|F9;-#p zq*ru3>$Vyk@%Uk83ES^l8ztu(K&((jf7}M3XW5JWk;a8XR*Zslajt3CsrDI=(=jE6 znyu$H7PjqguKV78_g$-zLLE(qoN@v*?-|(h|aQ4P^Y@j2!>2-A$m#bl_+d1nqPs{9S3&Y56-3rpmH`LmR zF)8-bGQNueknIn{h?+-Cgwk0vP;7QDfmuab4Rzr)L8RddI>*kgh5r_vMI|EWi@UzSm~6M%fWX7`x=wKv{9=}hLX z6^0KXs{Ul1WpMjRZ|j|ikm+HH%!doQcy-QF$72c%CssAiNuhvxbwQ)LG&jGqY14oE z-X3tlzVd2>$O%cc%$5k_cb^0ve-2(wMKtTf07ajK;-`xj9+Q!DqYzUZFO;SXOkegqWf ze6;!Ml z5pEsBX9dh15Gq~IaX+%qWArWElqUWFs(KgrUhtk@MH!&3ek3;NSL4Mq85w{_AD&lT zGIrvl zE`fKIlzBn6o*0CDXYX$#%RD{M=#r?Azil`nufJ*wB65hrD&BqEBAZ{1GqW zQg)o9H2V8#DvHO3CzMD@0g3DI?V|HAWJO+v#lhH5+t9V#8~J>6K|oSPIZVizaH1vy z+~mB7V5yctSH900%k*UXq$g^4#p4$1FaPWHSUs;3hj?IMk)?OR9@ z+KcGkagg545~mw7xAcA=>L_pr%=Ftkv83*ms|kDMgl%y4F~(Ust}~7;mFLz+^Xjf| z^a%n8x~#6?v<7!(jn$*z+VA?x+Ai*Du(MC59QGPVjE|nrSghFGo!Q?-6ikNCtQYbO z43`!V0qG~{;X;Q6u(Ynapq%o#WMi}!FWo${k?>(!i{i&1ya%OLecVb0WZ>MXGgUqbi?Iei0j%Kl0~$NB0iPOWGMDqNVVyz4_$ z)G4p|%6snn0;#<<;SILsV1)Q6i~utJ0yiPo3570*@~+65y-gstGgjJBV|;hdGNy(qzOGHo6n%Qh1B8Z{Nm zCs}q*8-m}w?_=xFEipMiKddpmWao`svw`@LhMy#0Z%4%fWuHYnj0TI@H+{WG&7bmo z4YPYZ1YL3~GL4>#X`>1nymD_mJkA679Cr33tMA?b^5gjhD%g>$$^)kk9`$XrY(h56 z8rS#k2tw|Xye}S}J#EeJUtVEv zf1DG`o4pNQEpRoE_WH>D>JN@NqGtwGj!DWlr&Zx!O~mvh{@ESgzn2>v(`$97M0Z)10=$Lm|H&@^5kI|W-N!F$HD2JZN#_oB?o$WEBHP1> z`ITkk_RO^7k8KL7lFHRB$Ive`<2$C`Gv-Q)2NmKEOwGskniq=51GxjjoP-Uk)2_~4 zIf|0Jwduw!*YBEsDATQuU5{FssP%J_)Xc0nXBJ(0cSHE+?_IW+ZJj#OpETg`lUvwt z_c{vxI)tOShQC~k%>gw1OhQ7dM8ND~hG5#8;r`UlyYVbc(6}Y;e&iyjy3{CRP~GD$ z7yZTf?y#vpkiCFYf6hmHcX~X>j7v zKadD+fw!@|gh>u_zh(`-ZKaz|?o;P9g3%K}DJPUF*@=hApW;)X< zQ&9oWU)@$GGHs-zGTvMwLHhmQ3o;VeUlfkPZzU1R?~-?~;xKQ|1d;1;G?-Rv9Q~19Ai95Tmcuda_^}wAj z`0YD#{cX60+jnAFbFPZQ5rHcfj`2U~wf{BZiNa;%f2Civ|M$}G|7TTEEKoytb{JKI zacTPo21fjagoL17!MOQ^1O)G1u3)hE7yS4fl_FWD0EU7>xJvzria9v8eMOGasjj$y zk=9bn5n$_I?#PS{^8KTK=8nt;a?G( zNBn=QEBd`OA7IeYeiE8O#;fCH%}7Ej-L+W-HzXR#(Y3>{{ML%q#l#Lm577Dfe%Q{nf-wk%(V_N$die}`o{G#>dprIgCd+) z#00-r{R&AyKtQU18}su`*URRl$V*?n*{B4Y*idiu0lFA~4bH{51yk1wI33nN z4R>P^{nJJkV{+Jmnq?{@QS7#7mlr__JIxlh4=0Mh%V@fXrNtg{uDN#nDPo@Qrg_+y@mR+(<{D6t+(FHvFmrHK<8!qgNR z9|Qe`J2u+XC|(w|^M%>fvUaQ;6e=MOET+D#`(ZwM013bqlyZZ2!_KCu-6tzH9ICN3 z3CcF4&CZ%%Gd(_xg|5<}wBI~>Q2NeDRIF$S^| z7QVy~Cy3uGlQDZu>P$ovJc91zgo`V&()L;b_P2Q*TCF<8OIh}byjXd{`W#Q)2wzSQ zDs2f)tu3JGhDEJxz1PIt28u531fKK^45L-V>g8&9Oau3q`#~blx8h$2$6A6dk0c51 z*hGXsP9;gxanxw(bw;xgGUt}3j>#P)^XYjUMNHVUdK?h3#t4R%A158}hDj4$ z7eo6rrNr%Tomg8hG7}@g4*aTozW~z^L*CU zlo5IpgQFVw1#Ix~gSuaP6YzGXq3FPPJpIy!N+r zxNoS@w}g6mD+cTyi|kz$1O^ezYbhj_dCoTROY1KkrjDZ>Sb z^}C73yk|0-e(P^4qPsG+PFjVMjKc}pej<6zS)wOR&+SX7wI+#!nNeC|HD8f#1SIzF z#gEswp_<>(W83cE*HO<&9<4LzST|dol&o*0-Rd-=$qQ|@3Dh=3r@3!zXzu}I0_;JQV zlSO%IFRYVt2&Tn-e{*k(zo%mXhL{>QQS8>ej%D53MyzMs$5l&~(`_%0T z)ti_k{fG{}*1WD2K)%U>5tU8?1 zH%-U(>5A-~SUWw1PoG-c4mEyY3GkP*lvYzqPOcrIy7auK`hqBHgQ%7^ffM8{ZB!bw z6g6H%^YO!5>+O7vae?YEtuw@Fu+oq&o}?VD16q~g4VW*{WM*HmmS#$fngyj5<4jy2 zhH#d%52VUU9j%VIwNQkb+&(3nBFN>?7)3JDHYd6EQ;8MzroZAC{MQ0cbnO6`juMe|l%aYKKyg!um9DK0E7&I>HC;>|C{gni<7J4k%g z6gnR_urw4?(vRbXM=fKJjGKh0CvuTd)(x`j%z7pl_FutQ<|ZJb5-Hk3zgqel=XWs{ zBK~}DJk;$cNK+6}kWCNr+xGoJKTzk<=G*Zp6B&TA13)7e*tMM4&f3)xrG zUcx4{bbe`Xb7<*z9uIyRYfFZ|?PAS-vZ19j&@pHHl+6PH%(!+6NsW?nXx}UfP2XR6 zYn6xFMNIt+XSe9*8DUKlJ(3rlV5uroEs^!Tzl{4QbN2Lb+7%ChKrTnwyTV#p?AF?~ z0k#1L=phH_DiX3{luny>DVMz+zxQ3^3knMShK7gnT+nHy4HPIb7k-k=%h_ImclwBOjC(=A*kbK)XL9 zh!mfx|K45fjZSVp95qb-E>~xv5b}C^goqR)d|#S5K$W3FQl|S+-+WJDGjlipfyGCM zl-pTdk9)GlMz&1_QMM+z1>@Sq(8$57;alUXj`}Kv^7f@cL2`%-nr>fK8T}zo2SG9< zQ)`trJ{;KYp=4LAT$J5At2gf(hl1um#KC7) z|DI^+J9O!pe%n7Pmc^sm35pq-8O8Fvi9mY!xugmoEIVODVW89%=3V3kCsB&ow#k=b zZDCDP$v*q)^FMyE?YCPI&gm5uEM8X!bR~@r>i|L)jl>y@0+qXp5H`-c^LMf-s_MMF zf4gg-_!knulbu4u>8+igZ!{VYPNCbY`rPH=C(ILQ0D0!x$|YzLTVwe_zgF?84%h_B z^yDoIwha^1H1O9a-l-Ob;xRoUGS71x90f7nM4_o~&S@W;s4}hwDM(rQ2x@auTpXRg z!+HJOGhM08#joYPn`W_tlN^MC6W($ib%0JdOIUcDxFZm_03ibE4Eck#Ms+_yf8-Ca zNcaV`(d`P$003nR_`ZY+SrIo*K&jiTrhVwt+SjZ{`{g&yOp_?@-PyY?%1itD`iA^Z zp zhJ*h-L0Z_OVd<5>PbAEeSnP=4pG5*!3_x)MJbS#|j-fih!50g2gMZH8Sd>uxmHz^M zfY1MGQ<10>QTTzYatY`gWWo~*pXi10(V2MP-18NgV8Q(^bSXeYMKPISRkZ*HrWV;h zF8}es4E283fghPG!_6`8*{vy+Nur*RBREvzk1_PA2P$Xs#8LjCOuNc(r_3 zDz5SFh~hup4u zH8H4b_My~dR{Ny>f2)H+*oTCTjm?A^Qj+6Grdh3rr@E`(>4(H!F7Sh?dw9G`E2!gN zV0rf_u4{9#*e1R3;fEoHC@PH(DJdyzz18h-#2<}DVl>%J!o-ADPhY=3(QJ5l7-lFf zEqzzRudJ;6cd4;r<+b%h*2SRHMjs)lpdy+NhP3Lg>khu zC7@{RDXF`5-PoxhmQ0?vfPC41OB6!p^YZ^7eQZNATK$M>>w#k5(KQ{P>W2nik6l&>G`FPvoPybV zB?|^r8Fu>QB4-E`Rendw3X#KD64$JI%{&xw;g%gzZ{^#=Bj1ThgJ7Q@ITMQ$&~Iv* zy^54A_bd<*S4XZ6O*w-tHA9z6Sl5Kcl*SEkpq*CCWfMPW8Ncfy)qFaEf3YHE>YU6Jc3FREh<4&b+; zgNToWqEcrxophh+6u*0{GMuYG>tUWeaxcfXbP{wgEQ$nT0EK@d?AYeyDaieZ#P1GD zd>1GCxR~XAebh6O#KPgcBZEoyk#W-IQxqS+sAe3J4{LD(A}^5yb5)=%ZU7+;8}yaJ zK#-idLGWq!be?3%?(So9Ipap^=r-K^ze@WyeN}_I2=^LjAIy*C1gtw%=-jT0nlwnUxQTUMD~4W4Sl>?{i}eYg%rYT`LXZ z)tPbhM7{^R=KfgBopjY*_=v%9#lf+R3~tbBL9+_knC2_p4JdAPz;pMkH(;dR?OCxZJW4-P^ZW0U)t|2P5064>?|+LRJ>zarz1J@gG`4d_ zS5ZkcKAW<4L<e_95> zy@cBhlfvR~AJ*9))e+*Eb~R@I+23Xq9@y&3-a}Q9?GHLAeyb&^5J@z}tW4L+UttL| z_*x${#TCpvZyK7u$47xbmUY)#rw{|(wqS4{t z;D8yjv$NmTbmX=M;yxIS3Iw8jY$u(%{qhxIAlhU1vtT#)~C-= zo#eMqzXUQ=?zESC5dB4IdJ%20_EuGc5BwIz$MAc}FbWYxrc#9gEvG^e&Ce9B*Cuqn zho}x$XUc8!CWxCytnf`S-^KRPwpUFMP_d5tr@f7Lzg+WD&;6$TCDQHVxu*4|)~D_O zlgo^>YV>DY6!Zp7p2e{Oiw1}6UkEC3n1>@^d>2CNZAKhW(jp5xS*3VP0P6$%^T*z` z=&+zKt;M?2qE)-)@U|JjS)PnA0w&2((Ah0tov779r>Izoh5+B$h)5?eK0c8R!gz|6 zid(Gq82>if@{6Ri?0cygK;+uyc^H9rVv{dop+Z&e_8}a(rZSDzC39ha%~Y9#>s_G- za$#$EKHvK6wbAx;l5;*w4fTp;N=lVh!#fhxzB`t7@f$hoaY|}5WpK0ARM?|$nY0ZR zL|Fl16B#ye+ndnWYjqay)EJFlQWTC}N}?iGy_=aW50z-F=jkm<#y;~Q?0DA~D!Sxu z>qr`jaFjrO+(#p`DZa6_g=t}7;hN?5%HJaMt=XN)&?|<-cwK4G=9J*;kv+VZ56(Rs z2uHnP76h!xvum{{3&783fN9cL2rm{xywADyL!kdRd{}N?D_pe_`)NLrc^BK{3bSDm z98ICxaUp0~t&8YRsL+#IOw6P}d(m%A-a|ptEOF-NFfU4X+bH)_BH2t5&i&{}B8+L` zj~)_HjO;<#hCR$AJ1Q<~&8))U-Sd+n`r`6$6l&3{H*M|V*XF{n$5M)_GkiT|)*Ky9 zqbG)Ky%$4uetvgG1(U!-3Vf=Sw*%fN9worz)YE~`XlI=q-^04u%7lua+s^s4?6Opv zbR=(sc~Sje<(HN~^%?;YO!K5GrJN5=ZCkklEHLtvjkki$8 zFWLiq{!a?6%0B0D5cpTYCNAGD?srSCAV0tTZ)R4%vjS=u$BLHG zmpfck#e+zV`_~^~%%d}iSG4g;kfZ__&F%@-`?-Q@F0qfL)f*T80QJN#?a}oSgG^;x zoNPw=Fp&ipfgAB0a*c{GUj1zG!IZH_So^G2f7Pn~S~#`Tl@>CSX6qgFwr(4UH{fX? ze)z^Ba}vgrnrzYOBNm?1A*}HEUk0)BTz|ElC^LL>z3fnNmDgn6_G15ay}z?T)A9C~ zTV|^d#-t{5gn(kQ_zYQ+l7ed)oCKtFpk!0Pm+uu3y1Z!W>+k;jO`~vIyYtIbC^{Vb zs!7KNZUvOA>iv^KfdgNF?f*(E{%805|DzO0|NW?>_st2RX>e@*pTf@s92!2hcNOp9 zi?7O0z)yid5XoN#E;JgV|EnqaIb;8Q!v98+0z@(`wz+-uhJnHD@Auzoeu!?Yud}ka z_Z9vUrlViY9sE?H;XR`sAQSWbIm!g>N9OBo(PZ?T8mUJJn_4Ng)5&(%uV47Y zcX5mv7SO77;*5F7V;j?C>$c9<`^nd&(%Ltg@wOh z?xwb#F8U3(qu(>|!GuI_qjK4acvOziAEh`x$y^x-&SXNIFRkHyrVUK0{R z0mT>w&j4K!G0(j5DYz1m;OKqWIdeF-9m;eD^Kj7KK8cL!pv$WFjf(OJH{G%a9__#F zv&&CNWQQo0g)Be(JMhRwK}_drQ&@$b$<0M!GFNfL2MDxbiG1k;dq0rS5|tyd2x_k{w)n_z0p4rHAvAB%39|gB`ah4L`+s{ZS;Mmt4l)` zDXCeZADTzper4v$7pILcJUagZG1YftGBQ7{EKg-gzvVx>ykJQ;*1b~`3u}YtjqxDG z{HP_&)72J6ALy=`-!X=|X>>XDVTCkt)t?PkXUs44h6d4tf%U*&%hwEv&13nih_V}j zwhXheegtR{E$-?>z`FioyT)**l=^xEz=E7hd7;yie&&D9B`!f*&(Rj0?1ERn^;JgV zyZa|6O=rCOxa9M!R87Ww{!j<^2POB$lPM}iBF^-4l=q^J+vEtqzrDKnD526_S)S&G68{?o`ijg|u?}h|i|% zAd43J_uaR)sW?aR)3v~DBpyw1#rD{Ho+bMzT67+~7e6#I2jQSB%d*JN)EJQ6xY%25 z%DelHY1$2_liktJ9W0Yfu!9vn#Wj2|J(_P#f1qPy(A@y|Lt991`sjPu;4jBHhO9Eg zKIYoKV7@*WJZ#;pWPDV_*w9UJ%frn$bkJYE+}B{=f3Y@d2W(tQ)tB>3)M{qpTF34fK*FRWEo)=w-OSoVF7V6=nw8+093p}u*ZIjICh;_2Ot)6o4 zA!UQ(%3vqBeQe`-4Q*?yA=hQS=+dh#0epvvd+s-tCjes9B(%nJ+@R4d_%tQPE<8_g zr4}@iljKs#Le>&AYpgIO*1ci}Tz`m)^0t=_#1WYP=XO;xLk>+j&9WXlt+@>~#1$SX zBNXd+n-#AM06L|69~1!mmfQfJy|9#f-BMwCtuP$7TrLP zg2gS(24I6?T*nBm=MxR>vK{fzy!Ut{JUOdm>S` z_i*&LWb04+{w$Z*w9-*O5Q>ir;VMBQwH17XU_zQmdKjF;e-)Qx_t-JZ6~e+7!fsnT z45Xj~lCHY!e~;TX+qu)*aq!zw`)*yss%->U1>c9&Qa23|oAvEUiH4b}*SHiUB(*7|JYBjG&hUCOZ=>RT z+*~Iak%IqAq&%dp_Tliai^+r5YC|caWzlXVL`4%rq?d*K;7m_e^eEO^I8g#^A&!f4 zl{SbMf1-E||4_(PpgG#>?TrSBJ%1O}XL~+-#9ta$cl+Y=E4zKevbxW_;b&k=9@6+n ziSM#qY&V4!(K;+7TG2%Gv(v~qQj@gkZpr4ES6B8HVb!4|X*lk3V?iYP z_t%MO5XM4EN%$fQZ2cZhx+%qN*O0Kt}uY#7~)b3~pctGHe|CrNZ4HN>`5!4tZ zxf@jz7o@-Q(ak;vy$ij%3Y8a;Avn#DmNEpx1oO<$f53r-B1CJeZH=$vUB7`o?z#ju zo-Z*$Xj?7Nz4u)&boTmQF@lPt38X&@7xFz!}0RC_>`BTF~0*%cs$0=dk~&{j9*3qoys5h zRpP^$k8bw((6BUU>=pLt7|T#{4@di!GZ|R!F$%$5Tu|!$l8j?W33!ScM$}nF91ge^Z?*3W z+y7o@8vBJu3{N0CFt=Pj=Mb(W2@@>J&4a?)hS=`Z~`d(WJeBymqc z^-6gt8WCQEM9sX*u-J&tG*9T@suBSM*K)WlOZ0}4rAQHAHu&#R!{>5T!Xf68O2p3) zp9n^7z=-xe#zm$+a=Wk;WXS})l})#bdl4X(qY8IRz$~k$Xl#r!Js#5F6h^Z*Ez7r7 z1kFNtFV^D^9xpYM+j#vTu{l*!)r|~RjE7hmldAfcP@FVD%$az&6q2Bdttpq1g-oP_ zcs05#Hz;YAD=`2&JwJi!OW9X5L=T@ZD$2CiJo~);DhTppg7bE6k20DTzom~5Y0J)c zOVR5K?x3Ct6NS1Ty9hf0Jpe-iwc7_zlhVIkmeY*cP=Wa9>p^xoradUN@*$Ob;z61o znu=(%utws#z`j9mj>ymOm4vgPMD#M*j*oA-Yt+_rC;z&Ka(@3(39?+^|8v4}wJ_cd z^(KbZ(`7<)3BtR%vtsAVQO(IZ1$s=xIrKMH|jCLku z)qSG^L6oV+Mmq51=*W<@1sl7Z75IJdaB&j}aBzVTf*nhvm>yoaDgFqy@A(gRV7Ec3)=Bvj+GXxRt_UZ@9Uu2 z^7gG)5d%}CdjD{%w7&@3GLE%yaA$`?&;X{-d_R#6jUw8E4r0s zCU`XtJwcLlv-@gSygjE4OifFrZdcemEU(bA?yVCN(xR5m|Mj)Bc48Gdo@f`ae%fzo4K3a_?##YFQ78s*8D)VoCm zdK{pMX+8tY8&K60{O7`JhBE>>3Ed=$Z#QWuguQA)HFp%X?v}I}o0fV$B6Ysw5s9USsU~)fP#Cc(OJ02Atgx$+C^WJY-)JCDKbfVET zH7|2}8Bxk_p6k#fq-Xh;0*p)e4##P+)u(shyU3N>$ffq5jRYiy@PA1^8mh{BLhwwN z%KqlX*HwZrTTPDMq?;iTRZP^Cv#YH7kof^|PfbC3_I=3eDHCydH|9mmUn4TUG1yPm znH->;)2EK(bZf;xY%3fF(_CMXe}K$G9c@I-P!J*puIL?W%rv}nP(sBSNfI?exx3{aT#Cl zwPe8YS|7#%w78J(}$k-RA2s7D()7UtM2*mt)ngN%5e{kwJEn${=*n4&H)_t z&<2UZC7Bo^FnmGyTmku8Y&BNqDtbS`sOHNskx2J2lhDV$i4Sql{d-m$$C1jsW`sHj zJ(pR#$H6a@)I1nttzz+i#@*fxKWA>tSVN=Xb2Da2i|xy}S)abArL99P8@&*{H`efg zC>dJ*AR2V&@SI_E#7bRlPuFw3Z~Yhx_3W$mYFL_%Yod;GHd?&}wcV~e!{OAC19h_d zgv6n>XZ*RtKE`}~#YmvpNX7c?VDwp1)x(&TPL>~48eQeN`V-WAxKnkX>g+NXQj|cN z+N%WFB{EpRO}6snbO*Xr$nJ*Y<$0-Y&a0}UQZp5fPjwKEOgc2j(Y_6dNrm_v$-m7T z>LxVLq^b~RsbYBk{-79=RD|Rqw1^roavC%QDE5Cy$H%UF2Xj=3o-z-`H(DP2`-{KR zCh!B^&*>i$Eg$ncfr}Q=RwG!|m9C+*!t-m$SC(iYKBN8Ggx$K7Uh50R$Q;57QgJN~ zppjSV?G5wTIWIKb)US&Eij}V;I83WPAFi5a`uk>Hoo)}AKYJakN>G7t_yc7@0u91< zA%InOH}qW(*TnG?aDH`%3o)DUJI7gb`HHWV@>V1x`Xl9|W?Q-FgLA$f#k%j&z&fMs z{P^Q9JX`KkedzdqU+KIZvqN_65)hJnbf}H3bW>7Ot5;xD!A(k|_t}8hCvp_~(Rvn= zBX}jFBQ)vUm9~3$b@n4>lE1QfpGbRb0T3eqW1o!d?ryg zvDeRga~=a$A@tW9%)q^!oBQ9U6uz73rs`2-8y}d1K39U54E3ZYE~T_ya>)+uIne-j z;|E_IK`*3Rj(`wmD``Jsegi|L~k9_MUjUIoOEds7_!^<9Cx2;qlH4Z#ED%oSOGM5qM zcH*bX!bG@K{k2DAHn+)B{d0raZ#`wZdxB<&3$Xgq{z4}k+iuan>vz;2lT;`Le+M+0 zavAf3bbiQNBh~!xMY<33KES8Ld_@C1__SSa(4X&ZKcV7a{9W>A^}Y^zxG_#^3sqMb zUw2v|f%_7c*zx2ST(e84Yp-2Jp!e{kJVf->5>YVk&e!$a2Ey${1|E(|3Q9~^4+_;w z*vutI-w0|?48n}^ByJxR2p+zzMB9PRuMR9zz+Z*K0(L6|u{Xo|6S-UJq2*v1@#Dj+ z2JBl>y)44@)(ZLghiNG)!oSVRIY+-Mf1i)yg@dK3*cWsIx+6!j5Dy354Wo(9J6rS5 z+Kq)=%g`q&34EnY1(HKLRwE3+0L@PvzE;<0vQjQ`@6{+IQ-#QTSiX22V*=MpL18bg zkv2F(T}uZ9jc}g@0s3V%TE8%~KGCn~B}p4;KRtNQb4j`O`$*w;%{~0Gwl(Jni21$y zBm9gqfVW!MyrnVV!)}aG;7#^{ML9Y(IAmVnOIeYg932`&!;&=}uIHDGA&2756W(w&>CJlE5($Ii!yZ7$W)9zj*Dt zcbZoBpB~SCu$!YMl$%w*f5vq%;B*@vyvAw&K@&1h-CsCF1os1yWpH0qOcJS|A^SrR zfTaF6GK9xu3|ZGU5or$?X^9v+mzo-lNG zZt8A?cwdWFKjG`%T}#|_58=G1#)ons0udLsAQzzV8bLm48$o~c?N~VQ%$uuP*lElC z*TQj}hjb90Xyk{Yl`}mXB zf67qckN@pZn>W#Y0LDmU_dI*p1ND=FhA|lyLDVNpOV}QKk) z)C}B17)x4OzK9&vqn95QzPw}RQ7GS>IdHG`9J?xg=*3e)RmeOPZkFZ{%VSY`Nvof% zNZwwjkYMD?6ENy<9iRej>r55xhYGt%3cGQ(_L?0R?WP&HY11tX zyn5)hSQoLWk=LB=I45G(Z6!V78iFWX$&K>Y_deKM_a2^UG4p(Nej*4z{l(aXA2!Ct z$PC{q$DWd>3n-wN%%t}Z(vRZ-I)dvLa6basz4q>9?4GKy81U|;5lu1IxnR{~-qZL* z81gVdkt(OX?uZZX6nwiCOFdvgl+8k6t+bnMsP%U}E7;Swy zo~G=HBzkDZszJJx2t|t$FBV5pfc$GdpwSAFk75EbtR$s#SyS{yqC*7wBwuvJ^|WUM zVMme>T3m1_W4I^QPvt$gMFjdn>x6W!fhD>f@M+!&i+%ee2R z85Tx%MtryWn+L*Pr%P-AZjofT@B_rFgUEGDzsc7DZ}7}9avm&q&uWGB4?asu4hN{6 zL$|JQ`mK$*YirzixGvy6d9*ejl1QN-FexKoo!*dVVuRW4fau#7f29UjJ1mQ6REhgG z`A<7i_-tFY(O$>WH5W@ko)kPr=fif5!$cR_L;*6>^(GVTXSuc&$h-Nll^n_TNIxz) zJzhP-n1w&Am3rZo>&blDuZj3k%?`sm^jEZS+`>d>Emc*?E>H{>#0tB0r<~rsaV!;0 zc#aB6yA`zX^n*uR=&!Ku(}E2>>!$uJl?%;zeiN>#iaHpM&k0}6Q%J#CjFOH}(kWP! zwZToD{D!E#A!v~9R|PC+A;33gR#e%j(~)vwo*WZd;HG!Ocw6>tn2!oi~}@{kmd_18!vRSu09dkK={N8lBf4(Gn0M0R4Pc zPIv`F+#gIBoS`XAfLn8xxe+lr*GK7VA`S4{z=Lf&h%MK6Rr-k-tsX|8t?HbjrT2rf!6!bChbuXJg8`_I~Cw{f*O)>lD41 zI)zd8DfQS+$ElU00Qsm@n~#4j`)>^Sr_ZMH;K5qO=5+n7{R!9yw=t~w9;k=%C*Zau zjWZ$omAK&qU4H8S=!evrw;FcZ>S&JR8@zjT-Dgp&(kF`S^BxOou?{q4D^RDqW-vHp z(%SKn$ASZAQspsnC8e;F%^(Hl#<>lp7kmD2; zL3Xm+P?~4{RzNmF!GwAW|IsV_iAL@vLeqN33)^=?giRCf0{h$XLtd<(buCV3wO~?S z?uYUD4zTzf(BYxC>*G&}{*q zOV%9kM<%X~_H2e+H2|-$>s~8}oyV`mmZbVN(#t;WxbQmPjA&=_yTU%r!fvdL&*sLw z;$Qz69kQRnE>B(vZA1>}EYd}5aOK9a#VeB{G%V4ub+ZFvEbWzb5oWP2Ht(Vl5pnyW zn)8hIByl4+Zw%q&l`Mn{vGPbQ;jwNNHp-vRB?~$=xDyKQzJxQI5JY8q8#y^5NQ^vU zK2;Ou9N3yy*q@4lT@G=HPxT}Z7r$vSJK{&V+wzFsksGcjo|-#(D+?%vuN3}A$C$ls zP#my1jr7j16-^}~tV5`Ku0yqyjMP?K>(nF@+=}hsot)XS2Y;T#THVb6n>G2nUX&VI zhqRu>grcr>&@LUB40&!%lvNG?1i}2vz$%#&axl|73MMlKr$mYzzq)4(e)SPyq^zqJQ7{00s4mn~sG}8Rpg{pKGirN95n= zANbPaA ztU<~szH)-fN_bn|>0l|&QRQKn><N5ReZV09r+2JYI9lSHS%-ahNnZWu^*oA z)hKTxiw?vvis}Pa;rH8()}zISEnj2M`2E!~`wOWs z0}YpKJU}E~4w3%- z+hI1{D_0D+(%g9wc&pDM=^;+R5+lO|>StAn-bE=8FO;kRGz{UFIUN1?cP(>`Hc=S-z|it%T#Dq28N!@#9*m) zWtOTSTQbhp+3=~h(I|cPf-YqEn~ZRjHjC4W;mwL8Nj`WJmDa?-GeH1dxro5CH(r6V z#+yyCO19&L;U z6R5%5m#YV0h`_0?5>1TqL$QC0?sD_TltH@;dA_@~4G`_PpM#B5Hx~YgG&p>QM=A<_ z0Ef-L${BZSBY+>zC?9h^or&A)WA1!MU3rITTZ|QEYKYM+<=M4pmR}}EfO0H@cQx;U z?Im9`jQ!xhzm69l{ZV;mv9#sfXpxpH`4Co&)Wn0pOJExuEL~RKx5aCbvs`Kg(8=cj zdAlN>Ha%^&!~G|3A1fE${RQ$?}86Rw(|`_DCs zqxmSW)S9fP?k%@vm?mi$+30UH!KmGXOdydFE1X)P8h+rFD{ zIew>knGTV0T1~-xpjY;l+6Lc!Q z=^Gf|)$aX_*Mb#@dX&n1mQV_Qzt)bq;CqvFPX; zhL5e4kx_YpC)c!S1s$?)hzgKRKE3;Pcc^~?$v8mB`eJMG@koi^%@HGp8(~c>O}c!m zJ-|RT?GTgcGt2iV-m{N_(qg*>*%ijOW{r{`14_h>xzT>$LV!+1e+^Z}!PEH-LDC-| zVxTX5H5!}jzDc`aXfa25#bPV$>dQWY{hbhxzB&I0g-|m+m4GWlt*8NLr6Jyc)ps3? zm-lrt?`_6u<8gO`k(dHths#$W=zD*?qL_-$s!d!dTQ-s%9Ok(o4q_qs#yP5LQ{}w? z?o31%L!GZc@pZF;r>Kk^27pA4JS&;mb5s)TYt=)bleQMZ(Y%L1FI)%xDhz$1(8f;! zWy_^C^CsBW-;g0B&UU4URfloqqPVz#%wWif&5GO=8+UEqP3apur2zhuTU0>h9vF zIYh4S+H&7epyagvG>o`uz0QUlKecb0VRXC|Ew^yER7EnAe4c#sv(>=?S6ly0-aTB4G9L5`} z9QQ`_(Lcy0r(7S?Gt06MW;aP3@{@-qV^J#398gK~?Dwqi&x;R|ajH%Y0=;fQQz1Wy zBT~EieOP3Tw|p0n)S?IL&L0G%#eo9S(u2-j7LCL(ZTbaA?nyLu7DsV&&Du@HySxi% z<|~Ix(|*&(IP^ds$5kfu+q_|A zpZU0t=)toza>%a$a#RCPmF(L-bRUR#?IFk9z7lU+@#1IYt)vv^k42l~zDH1uKHrE{ zofmfbGB?Lwu#*lt+9dwFexs}OUUzkHyJgW=)Acm!DmpdCbtZMRpTvi5uVO=wOIW(r zi!{sOSB-W%X3AyytmmSyiJl=XTjL>d?W$T#n9>Yq-gad_!~(@j>bfYY>GKT|v=T2e zw_aH+xMRIKb+C2{1@dhne0t)|i1`Y$G^NI;x2NQbw18`QSM~%s%;%8lM@W2nrre}<@>TL;6aig38XJ7lF2$Y-_>np?6Yz3 zmNS2#@wrHWQ+l?AE9SJ(u2%s)ss6tCpym}@!E1Oj6uad;OY*?q&hXGQmicSHa}t!8 zI4Qbh=6LX2Hj7mv9M`fkx!TH^u(cIeCq&5dC`VcDD#W`(s4k*F)Lo7^r5EK;WIf?2 zobZ<@L2Vv5#lXwT-Tpi@Hm856^$dw3X_UGbE( zJVKxhQ|ny3Nv~)ar>)K9PD13>tOucwa8V)fBq; z9x5Ke92AIFdq_>;m6kair<`V8o9_N~-Pt(QR>m}yLhDkBQD0PkXte41V~+mt=5-)oY2Kz8J4;{ScJz&TF0m5kSH)G5Y7** zL-FfI)CH1v5Yo*%SMMHJo(MOKIY_=w()NuS+e$Jd?!y4fyYWJhx7^FhjWCID*Y{V# zp*gn{7I$OM%Y&=e+McX_q4%Die+(!JJh_*lxTq{y5+KP5Oq$`~B~Qdd1W!)A zmV0I4w;%??qXT~a_ofLbOSbyJvfruf1~cFEwX~0} zV|6xf=-RF28XM_wp?@hkdyu}jHi#n*hqSlsz)W~6r?~m<~6CZAM(DhTC|@~A}ZIls6!buEYbx1swWs?gF|Gpu&f2X8s~>h zr&8Kh0bI(^zh#^VLdt8M+xwiV=N@XkwtO&(h3IFdCpw)uZ#9MZP18#WsLM|fG6Xwm z1s+szxhVWz0EwRTI!Ek%%)9Y0q&L^0*NBBDdK|BGOdK-`M6NuBYhTR@QW6U{r>1zD zwx%Yg5)4I7h5ql>I0WPWIlcS8^UHD-TCkUfoi?Oje<+M@;Y~y8vt{I*$F&AH2h!E> zqG#RQc<`{!_w&br>|R!E(0}@I46o@awpT2O57X&8CGG@AA|9bvPaAx>h7KaTZe~lR zip>ywrP}X-jsa_GP-`T+9jU*n7hs#V0EyWD&e(sukvf6o6-6TWTux|_-JPQCH_??$ zQZ7|)Y9{faYWu(T_90v2Pb_|Z+(B(CMd(g^C$1gi{qQ-ivFzcc_dIQ2el((#SgGfb zcBja1aW=%NxtZya1oLN|Jc~mZ!+1<5f6;+&3`J*iD^{)+VmJ3XF7Ejsh{p_@N<}DWXJL)* z(^J`;yR*ZySFw?xvrR6b%~}2>kLfQm7i$7*ym0*$rb0n~BqYXkVwP6g#O{|n&+SxT zSh){^52}6EwGj~V$d-ea?ENMSYbkAJeh0#5y}RfveqhzaXbQDgW%Qv&axGYY;bx5}S$8iS}3 z&K==ev`{Bm<>ZF+ya))ZdrKC-cWKAO#sV7f`tO2lEOS8en{O|2HdsS?n;92cN!)25 z01n;~rEj1*7o&9muXb8|vRIz0C0C>KtWVF)ixI7LuB5ZWyAh^w_(F6a+(`&n3Lp%U z26kUKvzxwV0#X@&Wc`@*g}Oyw_=+1v3>yuk-sl!i2Hs91Y;67b4r zb0~$lg}F=Kb!$p!eAyV0)>wN+rhTYC^+?J#>WA>|S(Pt$eI|l>pb&*9% zPTOFc=bK38FT57onQ%|Ru*y;~oj9s|yY+0N-}(QvcLC5SS?Dc?OexN+L_?u#!r0=z&#^ zaPnsn*KTS+e&!6dnzBB+wX7W4Fo){Y0gX(C>wJT@wpt&ndLAjNdqSD0ptaRK`2mkI zWHdw2fJrZRoSUhCyu;pcTu=sgVo?2_%#($WY|~v={xpBPd?LikMPt{-d{GP05a|zy zdz*GnezV?yS``IAK&i-AFsiI(KmvBZg?SZlbiv=h_NKw@`4QFhm-+iER^`yCk$i*tia{cv<0E6 zryA{%;O>N*B{9Yh$@E+2*Uv>y{l0pHEmKk)pyYMJ?K$%Y z(xM%m4_ctTIMYUYdesV+xA)HVJkp`lETdU&ZQWpa&sTM&dCa^-M!9MmX*rZEK015$ z)A5N(;!F-|d3mz*^6Z|IoX9%BUedl@)GDosBp_QT2u4u(r+zgJoxVIm{b6bamlI!` zPBU4dBmEAp0?(3p^}-+adHW~GjVmal8_`C1Chwv0*;wbn_rT3tc82BQk6 zJohd^sUYGYSjIf8YEqtcK>go$#dfFaBHUTDH{Kl2b0k%Kh+G!i{&b&A#sklzf_|`{ z^w|1H4v7}KJ5pWc!o}JnCD$p&SSEik<&viH3JVgm9`Tj_SP~2}&)-faees&oS~8KB z2K2J;ZgHj~at=<8J|8l8NIo&gYW}R|ImJHYzLrQ^OWo=}p>^IFVz<+Kfk}|)cs3c1 zaT0nUv0zc^c*x*&ws}I=BE3WLuC<3nND9@RzU6xuW(py_>R^mX-k2FcYVJxg*36i- z`UT&?gzq@zhuC(XCpeV38hnjaz}#3sn4=$y=j?Q$W(NR57xI)zZ8!4lUmQkV>iye? zyZl7Iaw!gb>p%5-Sm$ocq~xWEmh_bx(NCaOyt!V=WTCQOCB9en3#j4iU(+?QW{;Bz zYb`nl_q5>gXDU~% zlGToW*m*CmoqFN1lWHNbW|pp4AxogVwe*L1*lJ0;X;LRC=-S$%@C(hbO&Ux8hv+)l zXL;s-#(>aIdVNY{{J3dNu|An_b%+o@kisK}SEM6#HELdwt`=Geo>JJ$P^fkmE-fI~ z`%-WdETf)Qkd{?fQKC`ykiJv%e@zznpTWWN7|+4|uF0qE_0Hh?om9h~q`)S7VPWCl z>V+`?B}97v|5N!jM^Jlo#gYnP67ZfW~#laY~1;hioc4y2!tpK-hSlZP}}~u z{W%X3^_k-ScyiyD09_W8kY6eD?FNac|&z;SJ~ zGmCijFK7<+KOa+79CdKYzfu-Ul0(GFq3OGuf0apwDKWowVvOPJcpZw16Nmvcne3d9 zXg}J(B=euc@y*+>r)5zNGJ_=LY@lA<2R9MG>KHq%&?}iR80rH9s(W~W+aHx*qGvt~ zofp3YB_?1V>`B-Uzg-MHj|Y+0^(NoDvzs_9E-E=qF)=Q50bOtGVIvRDO37;K$;0_-)x9qq_nb(?A;0F3;n7or%X!)yA?LX@6 z)d*e5j_5Qdq%1#Jm{h)!0vLWDKB;HXQ7^mlYH)e6u|14AQx$#rHVt^&xSOc)c#|K5 z)t(tlscEj{}pfPy1HalrrZmsd#du0H5>=jTsl`;7A29#J>+WoHDVC$=O z{JHB?%}M3DlB`ER+8QKg%n2oKulm!FIU^t;xPyYB$0yGSf?E+^KRmBv%pz~GDW3j{ zF$M0nSK!9ONO*EPif)Tq`sz}_)u!r7O?UaS1@6SM9Zcn%n07R2#?*NS*Iq86rT+sTr{0yEI$g^v>Q zi*#ed8{u_h4C2r-n<+|#-IVgQ7{BODRTn}Uj?xOqMe=zdER(#R>S6yY_6YUKv#hG})qY4}DSH%8W}gw z3nW*eD$LbCl>I1P5H?pUT$2L&Ug?YT`v&;1#NQvH>=3YaUtPO!*tw$HlPYRInsb@k zTs#y!m8VD^ul-k>HAf%_8#|W&q^vj#j(VWVNqrJDoyzXB$8NTVy`m`nul8bK{q&7> zmzKyuSWa=L6lfP(h~O>VLy1;-Pd^V=UWd2v#hNy5TL*7E!@A$~&A$7qC28h!p3<$F z4)=}HrqwTGn}eRb_~jjIg49HWVonYhd0Tj41+^IQnfcW3^<8?}w6PSE`M4t|L1$pI z+-E~cUN+1($dS1j2_SF2B5~Vj+Td}BSe7j#e!GwxS5>|JDG}YWe6=sB!A;>}DhHzA z_Nv{5dQzebZO2->XgVp*IDhX5BAeP-murQV-H7mi84O2{mQDx=sNqFzb2~kkV(SYd z5Q&k|EGGRBoLc!c8Lud%XoT}TMEVR71(gfPq&_O}>6|a*fOQ}m5|xMq@x{QQEmLfo zKA;|R@K4-2z-8r&X<-0=3M2m_k*l;ka{vpA^w3b`LjXl^Ox!vMhaZ;SGT&} z$7j5&H}C4@d1Xe&RlH!mGy9`Yrrs^}i>@#h-YiSU3M1acSu)|g9|snU{|nJs(_e{J z%cLU!@*5CL=m15Sz=Rk<@ig>1oKp}thMCJMy@9l9k)slJqQqD9hM z#%Www%!+XT)xxDY+s0qK$>RsP#?Vuiah#Uge}{A}YeL=>3BNW7s6eCi1^-Ombr zAaiSp(vAM0_Um{1@{K>=m=z0lTgwG!%gEFX?_rkmr~LumiSV_K-9=)3DVF{~A{UL9 z{r7x=&6~NuU$5r~huaHqegY(eL>7Y9MpFMge`9vXXs>Y>CdZ~+v!W_&WTxAT9lLmvM)iJS%x9tmIb;1&9AQ% zS{#gw1IV6gZT;(>yg6g{?(^fjX9kZfq}mhcWRk?1@3iZD{Q`EhTbnKGd&@3FOqz8d zFm{~YTg@?FIk&!d$LhaG2cperfR@j%J6G|S#ghr|`ZW@WFVwvq;7UgUCLeoi)6d0ZQ|@IGfJ`j4!NI8Z79w_wc538=t^-ZUQ(lB>g3< z84zc@RLf&ZG^wwF1k0=&HpJ4tsj_3%gwIHN_q;J-owNU!8s?2!JV_ltKMc`II)k7O zTcGYL1N}I5KDflCmv4%>#BNV(Xf18) z$SrG43{~pCFt7cgs-*jkJyI<(@Qk!xx*lUE9A2XCjaLx4SaOfwk)v}w0l)e}Z1Q0y z=G2BEcJG5U%`Zli)_%^r!w8f{g=F9VZO;hfHPM*ZyMGveb%NPZDV&BKdHF+IO!nqH zBMidr`^e0RY|e0WzOhV)VxO|+a%sn?*Y_Bku~mH}8vazq`)7Fgq(3vp4?|55vAx(j zb#7~GH(NBl5qXVkF$(VJ?C11T`Np>?Kzs7YvFF8LU$SY${L7OKxWb9VZ5r+4z%Vr0 z!d`{>m`pU%QkZ<~tY~4Sp>e3A5TK7i!v-?)Z@yKIWHm(j;Ez|ct1W)7TRxHT`DUY4 zlOBVxvJZBvvp#b;SCqYJ4 zk8KXv>Yvj!_l3xY$yFxW)WOs;r8e7HB)n%l>19rQhV8T#wWgZ7y@_r!Sj)h zTf^B~6~+%%Gs^eKg&#L0diYudkC+5}8wnwkK(#RUL!}+*EP?-f%A5Jardw2GuIOY- z?mfQ~z+Xu?>?+maD0U!%8ydfDms(-@oOZL2S5mB_P|NpI+Hfob1k6x-Cv?sXLV;MF z+P!*@=tsTEvK?`9hem}>lJW_kGnr`jaI6bpbp>-i4_M z7=SPFD&*OGM`-Gw!K<^n`!w02^38n%wEky znQRy|0f4gg_ab6VBYn?5{{?2854LJf{5_wp=PV2bujU3(wi@#RtEpgddj%{+F{JlmU?oVr%;= zAsLr*$BU!%<_g>gFmV0gobvJZ@f|;<7<;{=-}2&}kQBN>$YCc0;!Jj&H0iKbm=_|_ zkE!bLb;Hh!bfh#(CUY1$`TF|27uyP>v_W##>t#O4ia*^%ycD)9Bvu80QNDeDfom=c zG42umGszQx4>}D}#WL&+Et0ReLPJSi|5uqipfnLk{eM&D)_HHv4RsR(MwuYm9N~@J z{}*kpA|(UMz-N@Cmf=gVG-sXBtt{9_qw7Uvc3mxFb$>LQSMUEvX^y4zKOEeDljbHw zgi1k-i%AQyzwfsJjxVl8fx5Qs2l&t4xU*O5BSSl8kaG3hP)L45JZ=GZ$_7=p^XAgO z$9_3*>m)r#);guoK&WP5F@ib1Id0}Brd#qzSXQHc*Z1O%6+yePd<7_0PwCdpg@sm&<&R z{XK&eENmZLljfK^KEpllxs5VLycmcB5nhQhNM1|-kLKRGtBvms`)#q{QYZusTC}(m zq)?nfDHJL04#k5Pr)Vh@C|(+@xVuYmceg-`2X~(E{hep6v(76x`E%CFteM%f_sm@P zb$>2N=}r9gp`U!hm3}X04!)0d_VBF2Rao1+^KdQyQRFz3++QJJexDtn!Bl2iF2O#F z33Ju|p4oaeqh!=L=f5xe#XNA=N+szi`ITKe)@1Vp^o zS$+GA2D%r}Irm-8dUjKmO23(eQq8cvFs6ves}#?>`6dUP{Qp2^-YeDJ5eBwo@$Xj7 zv{V6$+77?M0!#&*?+gt7U6Vq=L=aBj?et!ZLZ%W$j zp8HZyG7;Ygbcjc}5u;Z7`!Ml{yVStK%Y#YCvwFC%Jrv*3x;trHz#fN6SXsrf5kTDhX+0*JznT0*#Mh2}5E1aym#c*N z^!Z@QwO<(fZ4>GMlSDp^FQ(Zx6%&X)ED}7jy1wKXV`Br*po=)}R`U<>pqI zK)7&WhbAv!+E+PtpVJ?n7kZd2GP*hB?yru#l=$n?RvYgG6Q?nI+5uR2U+{QnBz}u@ zl%7eT-A6fru!cdGX4~7LJwhvR&Y&-?$o3KoCi-~cF+($mvR^I(xn!=*S|yMglpuICoFSBefnPnH6U}lah_m*0fjZ6MemL7@%$1cewyc6NVDkX z;gy%3uBjYQj=Tn`>9y*l(e)b~JasU>Df($4QnM(QReHbN5oU32F|bEEXgjE>M_PxG z6O~dnw7EF;aup={KS`U?ddh^7Ze6^}DlJzRV3-FEi-7Y{1$Wj-KS_Vx{)h{fCP?f~4iirN z=0zBIL{E%srI8^{(o>LVbgA(RcCO3k!!yO|CV>4?3oi<5^ECwN!=TI|hf)CU()q+3{`r3!?1klwb{z$QML!`N)Q`4 zh2V9gCxm7B`U3}!L|q@OShw(leUpxHlfh5Vpo7ih;SBDyA9S8Ar*MDc#i6E+N8@X` z@XZ=>Mc}~9C9~KHyPZ5-R5c_M$ttS=oiPwYvzL~Zwnp8XaKL5e%RT4zaD<|JoMW(? zpbX8d?cOq_dpZ(ED{z7Y=h&JgNfLGjizGouen2sR^&BspGJis`vVF@Rt}#Vu#Yzcw zRVyqu$KB)!Q|)e&uJ25$h-=WLy5o3{9XJCC!q-P}JRT%GJHX zEU3yy+{9Dcx!c+`#MB&g4SXZooaQ7NqI z^EgNT_ABhCO3eS(1&{M*ULWysMk7t>G)Qaxl;WopR&M9pIZW$7wyp3xvw8uQvk;&UZlQ{&KJFW)AS!dsuB z&%0@mApC!ynQ?Tj;x=}_BC9kU=yht)oQIc!{z^6n#k19TnT1-!oH2U+lUREGJ%}@z z6Nm}I4%>_DMBe2R@(ygog~HxNaQaO@b^w0pqU+;E9v>~vx8ZF5Hh_OJAIE)pe1;CV zTC7=?t2yQ0N`pVD8zyeA|C-AaGEMWYN!EA(H$k3e+L&k~-C2j(NU|T1tsNxK2a^u7 z9`ME$`cUzVmm|GSdqCr(U6bkL#cGcx)kU#cK(wGj56Ya(Il|Z7B0%-7A@GMeU6I`M zLiLpYt@#gBTjNn%!^#-NFtH-kz6N(o?N^rXWJf* zbffEB@c!ebC-^klg?i_~p>5q-iT=V#JN3d#+s7bTd&_x`X+UV1MW|eueO7G1pxZZ- zVdYK&jceqeW&LwGSHAZL+bexK$=xVz$wO%V4aq;8E^PR)Ty@(;YkvGpi{($fl{YcI z;l8gti4k!J7|%p|>ns@=cwiDz{i<#!{oopKAQ+33P&G>*D#aGg))@habiC5n4{16CuBAZr>UQaRR%h)4t0or(_!*DMtK20`kLp zqR7m8;(lFS9vxh5UNIG6)R2WDJO1u_Brgs&C`O~Ff)&Khgeog5WwAdqoEm{I^*^Tf z^|kn(ULeUw1)(XGFWP!PL=OzrNKwGoOT0}J*J1r**aL{>R9^l;ijxZdVWpVl*|AdX zHUlq?K`Wh9!Bi_RO10v%=~W2h=^poZE@G6XDsh6G7N}m0QV?z^_1j9K-(dQ8 zYc{;K`jJk2e2x9Fc{H@Lgupo}px1J}}v2=$qQZCUZvVHASRKpHsGLYVrg zJ{OB_>rJ=h>OoG=q^OHVDz6fDv}CQ#RXXYo!T4-Y0{2jtBM7cE1ew!A^1>QJZ6@;& zN;t_hKG?UJ4uP>;;xRl9dy!Na3_^^X?ULGXgmeugFEnRXjr=nf!0=rLuG*%Pj#mG& zvZ)cW_{L46LA1VOZZJF$`*jpzY#RbfKhggJSk@a86e)NQi%G#Age$&aF`qV75VZYfD_d~wMI^$Q%I`NSiUs``d_okcAS zgrI!igV!uR$bjj)%A}x*+Ke1w3Vvk6E=ZP!;H9#`a!4ZX9mVL-kcxhj3%SMNO44NM zQe&`&wj((~veWv&fsfbHCyH99&mBbv)N9waPH(Ll)K+$Pp6HDdXtZ+pXBu@uaP82ipXcR#o)N)9pcEjF+GHqImT$ z@3X4Ko~X}qQueqgQwN(CeMRSQX8!>`8+&VO)zY=m7}b3;MD|eRRh~4d!U9nz$A9Dk zy34bttuyG~tsMQ*VGT9I)XQ&Kg?Bt}}CzP&(Zj#BEhcnj1z zMamr%$!}FVz_>a*d;B*|;Qmmfdb&}rL}b#4hu6y!H6X-0+w(1W3Xs{ui5GU-Y|fYu zrDZ}&2m8wUpZ=myQB-L`Wjoc*WcKv#b+V@g=Ez+W66WtnRJt%is=RC?m@14NCGzOM z4o95;f|4t1`uTJ-{|ggBZV3vQ;1-TU&10-MXCWto@tv$WG%M^Z5~ASZkXV!lbcWl% zS%fkQa-p?!kqRAi445bgDDz>{I7 z1}@k^&2wZr)XHX?E;O~`ia1^0UU`{*H~}}q$0+IS0~ln5S}P^lYK=@6mXPurxc*5> zP6Vof5ojwuN8-)fr-Bpgv&4nq=zj5~C?rSn*srFgz7a-@Ovb!Ob=N22nIe;fk~dDc z*X+{q)Kk9dsl?(7)L8f`W4*RYV0f2rKJUxi*70|^@}FyCY)|#`5tg2v2A?j0Yc!mD zv{gbhuO!n`B%?SJZM6e+tvjG`rjYbZer-#=fvGYriZ4B5p4*Md1)qH27!NBbzuA$i zmJ1N?9C?JpE|Y0j3U~{f`4O?^n2^29)MezZ`ybEkN)$dbhMT^{6cxSTo0KAk9A*I7 ze}m1y&W?i&1L#_ZzSV3v&r*18TVd?X+!-Em=pcxz%Ss2%3^nFBnL-w9m@Fu`J9@?h z_Q@IRZoKR*-lWtP=?i=D6LHqy3WfbN6WJP&gd|*#$X71hqo89 z!fVqCJ;FoEAQC@9SePcMrYwuWlnd?OHMF(}^N=%q7-<8Orj5WEu2QdP0J7e_X~gpc z_l>x2ru_7C+u(HFzPV4j7)b^ms67gIqcLM!bQz5acOlQjR5Anv*tg@mZ=O$l-uM>c zU6Y=8-s6BCH9LHi(Cn8w_!44XHrhXH=8b%7Az*uYcVUuiaDk5@Gh^%9X2_Y@T3J3s zB~1(;VgXh%N(eR*Id`o|-}n9zx)ByLE8r)1b3pyAbVay(qEXJrZ1-6Lj2H>neX4nV zO|$OppbT5ZV@LVF*4%Rp<^;+(jUhmqDtg~0YSHTOgN!C)jq zCl<(^f<7hFgNR688;pE^q1XU6De!hBT5RnwO-&}}x~_E4a5>S^nB3GghlPR}yNCUT z=Wm5IP9>6@^!W}0>%AZhc^6JGa(Ci8Q^-#BJKgH-tp98AY?C)g^L*2nHN#<5GN|*& z<5SiKisie3Uzn-N*Dfzq5AGp&7L((0c+T)&8q zNyR({@WQ~?RJB99!K9`85CLy$28Qq7n0B;xF$;xheAL0C2*#~-xlu%OC^BARi!tNbvmOiqe>b^C!6THe6^M zXz67}=bnp>;B{fjKKx4pQSg}8h-*sgod&<^&5Kshk?d*& z9`Hno^{G6NNOhMS#im^v&CK?Zv(|MBXiFrzfj@KFS~`o_(T1DxNNeot z{DOVD$wEC?!USx?&!n~oh_`Kw{#TtUNfz&@Notjt*Ux|wGO}0jfQo)5c!POKv==JRn=J;d#o|O$nOjd6Kv#5NnH?}3Wh7PBt zWu+a$*^bpmU`DmWFCQ-MkT?X1ePl|_w?}N;5nyz@l{}qyJeO_0-KPh~A=&V{|5S6_ z;^f=zCMrOP+ik|;z4BICOl?RRYmn*T~Z3^0EDhNpv2b?8Rt@4XXU&AIfD z3~7=#`C;_&ZNL<+#-DK0%M`5>Ch(JL9w%wZ;rJpwoTd|CMqxUcp7r@m70)e2n84_I zMuz;FH}HSR0*H5;rErZf_3}(q(n`pCl{8@hCEpXrAbT=`6?imD!o1`5Hmk(1T=me) zWO1gGps0zfgR|BV;DHS9;EDba6b8bevZHPxg3}xsJgItg%}wYs_?aQPuwp2R`s@7S>pYeq5=;K!D!s8 z?E6Em3ggLuUL#emOc+-E209s!L(W9e=JDpfVf$!SwrkY|FwZa{Wz+?I6Qgc+z&PN< z#9SFmVNMf&IQ>&60{%(3{@yA5$Ay`ZK6&#@_q(l~j5=DYPY>s$V}uFfH8YIxoN9$?@L2ApHVKt z+JEsn?LSwZ!^H04B9*;`sH6Xh~ynT@9}fE*9qSOIGLG0q&q z2`2`s!I$=1*X;Va>Sb?mXb+tjkEM>}`-t%m<R+D zCN^uIeQP`b+fO(|8JCli`v;j=Z9`Ni-pz5qNvuT_2m1TR2`qCt z*D*aNf89VkiWuj^WiI*iEP+^baN*x|N#?kq-+~Z4~2hG~m zE=mRB9RH-Sy)b2U+rU{h1*{?&DBTJk6yu;Zu{KSN@Wfw4iCD18FZn{Ts)fHSJmru& zX@tS~>k}jcX@ps0ISBHUYl*T;^OyauAf2lUJhL%_4*OF2<&}1{GFW}y9>XtAX+&F` z+rM(UC!+Agv>Hk8h(9PQcT5f;<&3@Nv{G8EGD#|>TbNmh0|hJrX5~aRH|E*y+gfe| zBX=85pFNI6MKrb`bFnQ7*o zEPmv(3h78uj{)%eq0nbC1HekA2D5Zll{0^QMYI(^9u{_fQJj6>q@L;1pqH9)TFs|s zpsmz|FEZLMK5BL&>hR+xk$r*n$?@?d3OnNb&(kd3=gZU5N~{a!KS9B zTU640pMO6V5=!65Tw?O-fRCrTHE+Y4E;oGj)Utl>Wj=F@CXbpd@z4~gtB+Mv6Zl@zFZ-hq~TYy&@?tP&5*B?e~@faz}bmBn497x`Vd?KiecK2 zv+zSA^KyQ^jrpt*8o)xC$QH@dDPfYA@Pi-=W#{der=NT`r?T|J118n=8{M#w2}SXC zcp)z>e^=kO?&(;|ZN9_3_%tjB<)BI2HcR@|X2bYOZnXX-r)=sAUT?{5qIFdin z&>$oeCBL|(=}k*ppH5fe$<&Z**=DBl}F;1-9!4+Zp?TiMd!WGux4cWiY)8NkJlfm#6&FG10(L2w; z>GMzd9qY64YX9v+p^cvsB8v9>;&26BRw+ZgOQ3EzXfy(n-Hf7z_`dt^D%uYPt%zJs z27{wiUEL6d>H3>iwT5yy#${~x*Xz+*^G@TxVl__v{Oz=}27endo~}<{hH_QW!eV3N zxNY03On|`^a5b7IatBQ7aPXH@UfRK@Hs`LbvS)md(kyVjb6QH3N5xy#k5or#o~S^< z8y!+YsNCa%!y8P%P$_|9{AQ!055pYh-7)xa6|F2NR40atB<*Z&ba%^d50!*#I_j~& zmt`snkO8pD;bfPiBCjC@R)kG+MHYOCH`qMS$t9GGoP|4JjuU=D+Rp!t9yH63DZe_z zU0+{czyup{w?sI~grtAhZ(hRi$tQtG>@I$F8u`SSx!6Qq?(Pw_(?tq#%m~@Ar!mS~ zBj6a+Wy7RXcq~WD!}&P|ihe8O!J%4V?79av<-ruU@W99<`&K9!(HCal&30pI0e799 zX5qr56CsG1H{7s#`O4|7j8-}@@kNfnlkw_*_iyUF>c2q5^W(yb`q<2Y<-a%eXcAdT zk$}dgt<;GNrLO+U*JPbr;ah9mSYGEXQE?QMNIG8d)SLn%8Fjb6PPu>(P@Six0@~+I zt$iH{h=7q;14Zue=)d1LF)G9kAt= z8Mw+_GIT~xp+st2B;~d6;@4Roo;5Y*Qd#uIW-@{s;0yIHV>-_^*`;{08ZR|NzY*oY z$D@-j?D`f0Y}+O0R#F_kl*Mg(#xa;{{vuN2)k!5soSmQdgkTYu`dmSjm-ly_>w`vq z6?Qa+te{J=#^M#2JX;Zpm@9MVJy|l~umwG9W6!@4D{)FRhdE zCLeuonoki0U5NF|IB&FbmaL1jSxM|A%m#sK;neZ*@j#@Ki^x2#Ir1y;UQ-+zUyhqr zUrn+*yO|HKDY)6Fgh(Jq))^L6g~^GQLoqF;g$oQA(OV(v8jKqCKL(|7WC4=Pj$co! zOeEPV-MPYFFWw{)<#8qB(z&vM6zs8yrzMlkgp@y`>1DSH{mp**d`itsCMD(!xo+NQaM`IA z10AU7gzxUUD{!-{xOj*U)MX*;*tXZMtu9-i4@cv+oW8arHE$#p__K&yvlO0MsCaFw z>*~yqEF0mh9k4N{fh;7t!Fy>dpK&uSkC6ne9%wC02UtIvbW+wcW10*--)rPW9j797W4t zH>JZh9A~$pfwQG67RFEvn|0>*_|DyqEpHK?a;h@N^e4 z5czji@yg7yP{aX8x0jEy`}wP41vZk~&Ozx3(x!p4yq5}=WSg^-?^1(Om%Jd;oi7Hi z{gBT%lcyC*E~d1UQ}g4;bvFaNUe7y&5o$-$@_OP>R*YGGj{y)G35~hBep|d1U+NX5 zOSsrb(+GOn=nO67yQ*r#*WnlPZx{#w3@Ld?+%JVR(llZ|_4n{lPD6vZ)m{Sd$Z6Aa zQ(i?SZ89OpA2A6(8BYn{i8@g?ehD4#uEZ|a2$RJ5!~pv}(PwQK_)%5QWQ5CnM~2|$ z%IalFV*ZRs5&3nf;)b11kCoaf_Ll!~jxR~2D{H^Jev8hXZrlWac5~-EGx9`q|2q*p zNl8h@SFh+d=662(@Bel=JpP_HZ??{)nk*J4OsbjrmYiVCl#F4RU0WXroh|E~Un6W_ z0$FRe-rEZhW_7!WN9*j;6B7KRxaZ{DaFSFm+4H-dU*hdfwp7#;tEh}w?e775t&iJ! z$nNAfkWyE8U|Ap_em1MK&xl=i-gD+nGMxFiR{SZzH*opa2V9XbxVsY4IWuQz(!#iy zkF5e_EIRMgvlEhmVoP=L{JAFXB#=YDs8)0f(bCk+&TYXt(kokw@&SEUz7Z<$17D+1 z)7TFvl3BDiN5Ev&jl3k`h+lR`sxvv4>CA9DmIYCSa{cbtgDs6PKqu#be>&Tj@tVi{ z%9ss4EONPp26>%tztrBGD<5qfpc9*j-MrF*f_hx_I28Q6qxJL4xbU~>-5rFIs0_RO zhx&hZSz7y@>=WPZ_U8&WR%0IBo3kB?H(;ImS5xz}EyraU^@m90lG=zV%k|Jp`#yb9a4Qg_N?zq z7=s(^mg6gu>p|9>e=;5k6`g)d_>eZUjxpAKosk3EO?u>XcZ1jqVR_e*?T2Wr%PvFF z=`~I!v-2KT;=F)1ovh&F0VV|%6N8-rTkB(=38HG%vpn+z^!=C3Ttg1lsn!f# zO*JqNXP0O+isqqIGJTi%(q;=0U>6HOHpAtdjLU<*0>(MRyM768sYp8#A1pCkVA;8g znsg*#bkJ4f48!e0$QzGvyqM>bH}rp%gE@2|J7o_0VlE$rpNDuziGYt! z2+f1;?F_c)GKz^Zsxr%H*{$afZzwu=8(QdroX@%5`I9zE8Q)UfvAF+&~c@I9)|fd-_{+9}$eKwSx$LmDq}Z&*W|=wCqls z#!r8sEMgsH3y~m;8T0X4?#KMO9xe$l?X*J&j6vWxPKu{f%=uQE+r~j$Z7a@HY}YUN z{A*EMUjf>=Xo06>lst$b3C&OF6#+SvzN2N2o-G1Z3o<>A*bBQv|9vPlpgw;jILSNk Uda-)_?CGZ{tNON7+BoR{08he3;s5{u diff --git a/windows/security/threat-protection/device-control/images/create-profile.png b/windows/security/threat-protection/device-control/images/create-profile.png index ada168228ea08f5eaa533420bcc539f695216f84..b0b7eb7237e00bc620fd3873e34571a0d24026aa 100644 GIT binary patch literal 15388 zcmeIZcUV*1wmus56BGnQ1(d2$K%|NEt^x|uL24)}z4sc5ic+Kr2uMdjkX{pN2uhO@ zKmr5^y|)m0Ac62(eCM9C_u2Q}-@W&_&vX9T>mifLTv=<*HP#qozT+K(2rZ50G*rw~ zAP|T~MOje?1Ujz*d^|6m2Sy?&ZeIm{U3OJA@&JKo+s;1c5_xG^fI&)66?G-b1*+?p z1g>f~LvDaTw?Qh3PhR?_<0hddU#!Td+jL=%+j%@iURJR>8Wg+SyxFeTr<-e$y13Ot1oQKx2hLO_qHMN zpAXvx8c$aahMuR9VUDZujGJ_zScly8QGLuG1ZyhEI}E$_ z{Pn!vk;$}hTW;WmRHdhL*L`T2hkR3Y3}-sjd`fj zJZE4)xh?d2b7@)buBBbOosB~KsOtOaw=B+el?N{^E4|(jHYXc>@Z_)i%BArNc=9}r z_{3-x;)1L8`SazQM3U?2+hP+s|6y&?HK5l(mXo=?wHCT|54**3mF>DN>9Nf&Zx}6` zl&39WAa=wmtN7ttRfESf!x?3bDtY?8rnBqN?`5W11+=D8J{yDe3Z0KLkVtccDniQC zM^|CHLr&$GVsG{O8o4b_VeoEF;m30(Z;r>;q)ZKba=tsUAj=HaL!`Xw*1AD1g5@vb z61aPUJz1r9a_5udtAuU(>KHdYC!>)`S)Q4Eg}Q)5DL(FP9Mu|ChrEB!%(I(_I@r@i zr#5nrd!HJ+CwU=lGSzC?{d0Efsk69qD>XgU9JP|OZ8B2@z`IL=GX8rjBQ^YD*v!b1 zdLH$(FgkH&Qg}ED-r3-0K`p|3+%MaW>x0z=;R_rRuc~pC&J$WMUk**E&p*Nl z9r}1ZbCi>t`e`b4tHEcVAl$|?%5a-BEsCw zgfOVu$gASS*`SlVB`g@I-@XtX#~rYe(sLxyzQ3j*bG+_#h}S$tzo?#pn&ZZYPVUlx z{Y7Ly+?M0iIt8&aoQ#G$+T}A|7_W_uWMR7wP4=1({Ybs+5Zr!87J7i^sGLhow1dcL zXqZ8BYWC9iK}?Se=*o~C-iZR)s>?BDKl8T_wnuyh5;KO9GbQ{Qa(?Z932xDo3UtlL zNU&sK&ONzKR-B-=lMk1#X9d|CqmXw7;f|87 zGc8R=)IOUNW31=S&Nlf`e+uFobgo$PCBM6HL`my7QTKX$uV4uU+1f*+Bg920O_v)^ zHF2Cdcvq`NxYHWb!L|BdnA%pohJ$lX!8|;rB_$BO3`YyW%M)qh!LI?$0Dc_2T5LBg z*yVOs3-WQ}DfKp*X1Ij0o*Jk4Ndxaw$mA0U;+HxD@FvotJAhfEp5=z8-{(j8d^nn- zx5kM>mHXEtKgHP3|E4ZRx}A^+(=Z2{jGvVUnp94o2IuGI*ae7{EBGWM=iGHgyVYs_ zYTzM0MMCQ&jXSN%qRT8!mPebK5LhCKG?G2uiT-XprtD7;&RJcxIPj6o?B^v>4@5i6|6^L4?FPC$Sn-s6VF_h! z3u{R6t#LMycOs%sh|jNZ2?{m7JH^cj;JH#;%|)UcA`e)*)c>5V`$^nyEK7 zBHAec#ZU)wa(Eus(TT-&b~bJX1v5=eO&J_EWI31U-tmZc?YG8SY@qpCKXR>M%1?nu zs>wp0987aK5e*bvu5@!CP)wl=%F z1Ue46x%5KUX6A9>YlGD`9woIYVX-yN6WJ%|*X_K#->ckr@;V**Mpz}ajqNAve#!(a zbQ_o-_;R>P?z;F`orEx)9X1cvV|)4-CFYO!G5Ifl*U>Nu_~B9+NADFH!97(DlFh}; zxB$N^c$gS}N46Y!v?O;9hjrlKmXRwAB)#oQV9%0S-9Er!JEO}|lc{Z|r(lL2)T?7? zK$5HwPUyjg9d=&F=_L4p0moRqaJ3{wOkM9$1GI7^rMp{qu@7CqyOuS0>`&b5(p^+9 z{Orck*9xeuix~4{CbPRiwY<>Dg!$=U0RBa$jN8+Rm9T`7d(+at_`pJym7>yoi~?Uz ze^NN?jEjQfYq%tVm0M5p8{N&b>G#`ZlsOrySsLyBR?25DubCRec)Qd>G=LBNgQY zkDP`D@BVqT@yE?V27&_w0@z50JZnLq8n(*n*N2Em#y+OF%dwh8M%$l)B{sJ^xtou> zi??&op1i2t$D;#*e=$IXOAD7C10; z&x4C3JUU#}lf}qEW@cuIV4J@5qod?_JQbB@rYF&K7NYHzKi8Wgm0SA>U0^C-HAO*) z>X0*S@LV1IKJs=0uuHV2I`qDC4V+gNm>-YSbQ{w#Wn)+?0h`wH5uYe42*SnFLe@7B0?(0Hy`!?3_RcHG&l+~jc1;YPX#q^*2+P-l zxEt1=hTOs}!1%XxelUK9TlIX1NO=0xA8@lJBQ${Rl?3ctVNmY?{j=V^l;)&~B-8hc z?9!%YXA7WY8SEzOf&k+a2h31uA9!!#&W1<_j0XKGVCh@4cfD~FcGbAcfSEY5Z#I0q zwiUipH9xMZ(u6>i55m^n)RVI{*a8BYl=6U0L|!W9#I@$|FrrGB(?)TD%6xhzTjQsx zwCQ*1t8vBq?~s{troKaN6%{{9HilBVUz9$@5WB=gxbEFsu+9~_efxHvjq>-GD3GDJ z^Vh9IMf%H^F8xSJ-zyo4Mcb2I6fVj%Lffse)ebgG?=Dad4#L&a$et%ogr(WL2F*KF z;Tz-ix)E;n+T%(5=zR54l4B1bqfLxFm`m(nJ0d}`%^I7K-sFwxQ=?B2J1MNG5xKa@ zl$@Htd5Wm=@S(Sx4{rCuc&;+%mHU;UIy+UNgj2x4YGf0Dt-ii0P+Cy1@YatbQ@3{5 zq*RuqZc6ZqvR}P!@c=BS*@uN@5H4&I=ry_Q9X7#`s}$LJp`$bp)>X}4t!SBKWXEdBa0(`?daLB_jgOjY_2MW|8On|pVl27PZN2d!kvlbR$;GM(y>rQal6Cy$IfzElPlqt5+iRCoZOw?V&33~{$n_t$O)6+Rt z$k2_#y56z3riQ$l7}Ze96i zBpU$bAFtb9ceNTCh{Jf{-Jks7N(3L^V*}zFW``o?y)?G3fI!(^=~8YJN&90TFQ$e2 zMg*K#Jv(`Iy^01j@QIdT!KM_FR3ppeTP|HPP`Fz27 z5;-PAYTeVhnYE?#ZdkDLNia*0gyDeJxwD&ecWZnJBEfK$Mq_&K*v8>ryA0<sSWyy(3$ny(I_m-Jd&sLVQrcrI)aE*^!^ zjswv`f9*Mtz@4-H%~#Q{1TTXgi(0b$pBpocg5BN}VKSLqI(Z!gl4)(Ms;bJ#$$>SV z1HJ9^&64y8b-V!j(MAHk1h_&woHGbCBQ%wmn0R(K&a)2F)*=wrnNF&k!f4% zD=IqSk74{(Fnfb@Eg=C)ZLRZgs?O$`(h(5{{Y^8H5Iy~6k-fD^Xv@}iY{$)GnXzlk zx?kg6%Q;((cI%(!tyISjzEEt-tntEMe`c}1PXkI#EVl_kRa$8Oih_~4?KxzvrwR3e zS^cGi&YOGejvMJQW7XaPmM})zfY+Nd*-4Iv*R-l|R{W#>Uv1>%Ig8S=kQ&@_7f^To zZJh3J$O<+1IQU!zrN)*o7rAdjWXW-hdI_dMPda|DtTYEgFOnkWwe-nB&}S;D!6$|M zc5U-2;78dm)Zzg=5*0Sp;o*uhkJVn)T!%e8VgA3iTSH?Y*^qUmyU*(=gH2a4YGlqNi;n*&e8+~ znGn2L3K8*XpHmOaQkja&NJz`5?q$8FV+}E3aBOJ4o*ekO;cU(?!~LnyqsT9K$o}X? z%{BTzbeWC7eGX0=&5NyvPVESCKDGtc7%_?_<+D=?qR5@E&r>5q>`>NYINT0aGVL>RTH0ND^a7 zy01e;R(SYk2kCU%>#fFEQ*Fw0}SvkSrTciVNCB^Yo z&v#O$!yRh!$j2E1S_Ra5(&hRSD-T^qkop>I)>lT3BEk<>{Ar*fW#!@F!s`&|b?165 zd18iM!d?FruXj>`vF8$!1f$ovz;Db?;!1P8|2z^x*0>HuH&kPsjlY`Q29xQNe9YP8 zTdwAzFRr~;z-JwGyw}Dl<^}A=6AmK6vox4~piPZLKkPQ@H2P$i>z>-D8>v(a_b84} zB3~UXG*2EYDxQbNR`q_mLEmLaP|s#x=B{Ke2^g$42Z9 zOqHPUh~w@^&34(Xna^<^Rf>uW(;wB1qCN$@`teiLVti7{Q?VjkIYsugK+5X5($wbo zlTL#aG5R>?SdB7a-cjebl5&QM3$7!zVT(C9)C(S_LPG6z+o%;@a20+Rv20d+;jR8+ z+%k4Av>9v!e$y{_%_1QyKIYI=6BA2IGIKh|=l7mx40mz(ZrZP!F-;V_LFP`G@ZLb; z4H3Hn1vJDh*U@EXuahx22!027JES>dQhQ{J6Xvy^Q|yta%N?TpO*!-=JbazQR8d*E zG){lER$5W9ZJ-V+X zUgjL^lW^W_~gte~Q+fw*s2O?f+qR~MWmvJf(x zUTfA@yKclC=528MF5Y_^sTaJfe3FsCzWi+;&VoPPeHBa}R~03xYYkbKzob`%Nv*-L zS~N^gUgZIU*L8%M`>3D4es>U()w6WTW+Y}W-y5b*%n**hg53GfH1;6#?ocMSP&X0b0RAGaRg!9CJN4`!uy)LB#>5ffQ@B^M!Gu^Jb)%9-0 zwujC{S4|oJ{K$Y;o)zI=5aNLo8(w}Nfz{Ewv3rcl*9wq#*8>=6-{zyu3KzXy^V=c9 zh~zd8{0nEB^wg$1zTU^GcAVhFn5LnHrk8{?QRW33R^+R}%;#o(ywkO_?LsVOC0>u@ zj7jC&nS~vBOintPlK6L{e#Ynv)^g(heY+0pFEPBo91WX)3B=cLy&L@qendny=BAE* zVtJx~N8;Oi2|eFu5N*&Ybj+8Ak zROsAa;!h{#cnDJ7W7w%Dc-Gk za4LngGJ~bj!_=Y)4MO%q=1GAM;r_US&J$h?Dw-6c|JdfRb-@55C>&N-T#Cu%HPDDD zS&Qh~3cDHzxP?~1xmERYIia?j3xZ$(%xNe2Os7ApIFWSe)*D@^opN72#wp}CH?3xH zAvN3ZMAC9_-Rsrs3dDm!hvXIiy_l%1ee1Q*6e0Ei({S_hN)^adhVh1#p0dJ{{$p+JfJ~xq$xcI9M_1QFhptrl2qJHNKpn)s@K-B-} zjdEZ9PZ<4=!T;G_0POTbSc-8i2MFZ*LJw}Wya0EW2Z6S3EZsW?D!PLO{SP*F9gfxf zLY(;$sfMF~1lg^rG%LjRfp~;@W&S-{$&}%&xrC~$hnc&~*lXzZ&{EZ~RhXs& z-y>mB4C_L~CI}?plF3|4^ED+k?QaO;wM0J5r^A@se0m9pR=9lwG<00p#ih_@hNNsK zx34@hy*JqNQ94p3m-B^G;_V`6=^&Q8Ra~L%+&$w$dN#$&+^uS}uP=|}tUXBjdQG<^ z66V(fc6c)icF?Q*%Rw8(Y14B7BmiMgNsviyDy@>Spi;JzE~%X z>&epdd5m*Uu@uwm2%kcqz1-G4a1N6H!LR-0-eW0?XP}nF4&8Zpl%#^1hoa&=XD?^H z_>9GdG0T=-kC&n?1N$3cuUbJQ0_|n1dlVqs2bxycw<(1^%%h7d6aTvHsdKZ6HeqEEjn2+SCp z)7S6JbvR*}mZwNN*#hF*)_@UrvYvEo|IEWNB{{K=a{B>SzNZ1r7@0Z`nr}tj?gw(6 zFBRbD{<)dw2X|`f)i`rIs;bSZI;!(+D61%|xrsOgrDl6Uc`527tv$5vp?z${3bnt@<*3y|PKE(oP%V z?q2Ny@0;MzYyjSyP#Vh5&oBDM@17pvG!(lFrV%>Bu+GuYF~6^WIXb4NSFnWm3Y#P% zB_P*oCi=oNASvl}oxY$z$TjRW-8Y|5{~6g!Nozf*;<67Z_{-s&>OPz^zvzjc*K5E) z=ZfT?g^7N%E}5_3x@Q<^vgTIW^vTU$V{`B|jQv_oV1t-*x{)9_M?AJT5v}Jm6tz~w z>zQ}&gJ7kePp{V{Tgb#KG%N#`=PgL<@ZL@>-qJY7)J2z9D=-A!4jAPZC4uLl?0qA? zq-S&L)MAnCbKBkkl1C81)2f3%UMaMVJB_O^I;qFRX8JF$END7`!Ae=*ZDL}mN}*5k ztrBID0VhGSJ_alu{TAM?09VRivR+=Wmgg>qJgSM0`SL-CWaHG;^>@(4Z&9;~N+o_D z5V+80W;mRrNOQ%#kbAj{tM{GM4uS5WXDN9|^xmAKh5^H2Z&~!336wYf1`^i?K*I@s z#+2PAG0OD{uC^Zg($y6w3yj#v8q<+phKa1ynW3zpdfca@k}vh>mtxPRjsNnu_Y!@? z-yqc^yfm6y?cttG+i3ah7f1m5?b|o~;$f#IyPwuDV+DnE&YwySn}PAfcS09xDk=e? zZffLu(nKha+h32ndz7;MXa54%uQx)J5#cxSto)>1HgL=ry{_$fSjaWYOsiYB!C<&3 zW6Du_{Th>>?XlX}fl*v~sk}?EELXSIWK!FeA=QdIIo3m?H$EPyC2Kyp6YB3{6O>bQ zp+ow4mMm+Q$eAw+hP>2cUE)N=839q){;h&CcGFre%!@EtBd_Xjf83n=up@?+OIbDY zk|$|n1#dtgmh!V&fR?Z44)Cyd<8RkO05+^JLcDm`*rUQIMBRAi7U;xDn;uxLs6}@6 zyEyuTWANFt{kl3anrNy3E(&(c&bxDO#ZmeW#%46OZp0D|xJt+?}RQCGVe5fs;?q~{Uu9QLNn%{Ndvp;K41I(fTmliITPmX0X*Er+h(HB1eH z7eUDs{8Q|H3vsnm{;H|+ql!=i_gyOHn>B~qrbl&)URqHlCe z2f?Wm4EbU>w`@Cx{<7{8`AOMW55|)VIOcfo(VGle+KANe>O?)gAIOoYlkQ6P&XGF;FKUFy>S!lafM1xQ*xW{vTfYCxLUpCr&{4p7G%6nDN~Zm#9pF) z$qL5mm)1sXM@)#9XR#HlPb287tc+0O5Kj~9&{>V#a54Md&qX|_)cWR?y|1OZX*-lG zL`$#h&H{hvs(U9m%271V2^~oTicz|{He;Rkr7qF-mI(geGCglNa`$(23yoZa$#zLE z@d+Ywm9YFtDb4wFEda_CsmadHt`AYK!E`no`8*Tqnv?>c$ZQ0eOl*uQq*MqEr_R zd}v4N%IXo!zXq_XFx-s1ZPDtlvi%leV9zkoF?0dw*uOd1|9#U@U!^KD-cTuT+BI8P;P*% zc0_CHRax$8qHciB!SxO z>6?Rc8#y5C<|OTiy~-y#&7z}+En4@UF)p7?_Yw{O%ZA+r@2fDj7vRfScHF57psJ-uJ5N za=L}{m?$!5)_QsjuN`l#jrHvYxYGi7WUf&KfZlc|KF;R=knt}>zZ`Cyh$qkO{{8_J zGF=7=nSTDQq%vCp*tD_EOchzc2# z`pD+T8wF|))yNfx6Bj*}4(gnpop*gMfd<|#O*NVyPc1+)Cp`~#52GnbIAx?R*UcK$q5?{fBzw_1Geg|(FbgOjRM6`EH~;vGpxJ5$0aVyWI8V>kUu%tLuJ69~fM9H1_@yX)M;bGwD`n5ApANH71*_Zx$7i zo5lSO$=}WGEk^bqO>hP>MIH0~GIJehb|}0jN0^H92iyqfhtN>tQvKTP{EKPB_B1p! z`@W5(70G$f*q>l<{b_)HQVeEfs^I{+zFCfx2EX}q6S+!K0BDijvG>~-9F!o$&Yd|A zg6%53*hXeweDwouvnEYmwB%0NPZHhm^qNrM3%#j2-igI=`Iq9Dw?BuI(-Y4wWhrJ{ zkfLiW_<6hgWVyO(@B3N}b)!q+P#av$y!@gehU_zmIBLthPuWJ1QpfU5n@%^=MsqwDLh7_E z+56zU|9KFS#<)p#=l5L~#D0=UaD~b)KA~h8n1M+>EB<~w@6JL8ao6Sbg@V{)KAV8p z*oCrXX$<0U9Ur4?Sn8YBJT;lwK~cx+_@aX8p7Q3S)&)AB^11@ENM|QG*Oz(D-3`@v zt;!F2!+r|`K`l=3V!pjgLZz*}*iZVnvCenLsd9AgOJst!C4%7*<%wsY((<@x{IL=!4c$(|cXd6>62 zz@yxpZi&fA*RXN$0jf@8Uu&GjuhWs`Z-$HXn9KqHy&ugXPd;BZ2L%8@(SMx&mxuWO z@n@r z{PN0GFEgv&UXMt=rny(3LM7gRQ~2)iEL`v)ia`ZS)t&14I?{&)7cx*#uS$ux_9idc3rSg>z&^Qn*|WvlcjWi$$ z?tYXC(Y%m)=;E~R`pjXy3qJ>2(|r2^UqQICQUpKG9q+e5=FfAkXflS1Md~t z-s{xcl^1}h+b8O%U=sIHZ?f!uB|_dpEssZL<6yK>(3k+^iQ3>2yN6z*d^SFNPeL&2{FhUD{-b3sl**kh_uz+l(|_KfQK5`(c%Z%B%J{O_EcV zRbqI!gpW;=U~Z_=s)>N0TFODTl@FeKYBIjrYwV%#SQoC4PT$o>+blE~>JPMj6 z$XXT9S*B?oDJ4Vtx!9O7SJC{rLPH!E5+&%35RWd~&WR%o*ITeyzCNrCZ^zoA(?3H;2i?x;%!-PiFdK;+9vu02BtJd}7dxA4=d5L;D5VHr68?71gq)rFP$ z)*TX6s`Nft>5@l$ zRk04r5*tuj)#+)LK6W>A71N+|#{3_rH?P|0H0eu>#NPq3%|CO^3}2D`+C$=MJIVF_ z`V~K!O^8*&n&0+tR<4jHIFMno8mzVP(l%Yz0CRE|Q&LOyUe*DJf8)11au^tRGRI8I3 zkL(*vb&eC1E1G9%&9#8()o1J7AV=G0d5zO4gx~Oo(Z3wbdnU9emGXRE2DlO(B1=xa zzp(Q1^g!gU`&lW^*@|cjBgOS?5%H zuz8%PEU5ly4=kv2M@`1rY9X!0Jf5cB0J98+NI--n>SA1alGII|FLx)Gx+X7|oLlrx8W@mf!w9xn&N-C|DG=gKGZulQV-g^8|2?jWrp!FIbxHTsVX7_{vHF06 zK2DfndQ;MUzQJ6erp#H=hY~(U!n4S4y`nq^Lf%SNgwr4h#Qj;alSX1eu%7>3O-+3f ziUuc;V{tAh6eI{=yU=2_e(kqdAZA&e>=YzN9$*QZa;wW+IlwbXdGgEcdxVLFqPg?? z1(ai(oKG@vG(lhu8{+cw9354qJs0^gzYkLd(Y4{|qd)KvpRCn`-N|$B!0%?o^+J=8 z+sP-VD`>BiQ*V)rwyi%o@MZ*asKX==C|k+o{JN75#n&cYpT&{O@CWbMn!E$IGB6wO zKh9zTZ=jo7|D4J-tc87)Cn`?;*~d*s{AO^{U=1c`QR1hzA}28}D{sr_f*>-^&&P!5 zNe1#VHJd9`fyw&>@21(I?bTwc`~ZksNMR2)jz2IM^piOO$zI*J;S z!G7GeB80vJuIW!1Sscb+gWo9aM7XrChqALlww6Gk((L`^d-4xTuWqlpC;X-rx6#Zf z8wh%Mkr;j$l@^4qTho2sq_k(ie>mMoXS&R^vOe5lu<&xSr(iWuDFBRbF5KBHy4xAh zlsYc}@VhZ1{bD4azTEtS6PHyn&(7IcW`P4Im5(dIrj;u#HaC%gH+R_ zr#<1?;?d|~g#B!P0h99LbB>Kh=|)K+EvW7WEC{Z$8F#Vv1K*|9ilArMy_3aG#c`A2 zrBL(W=Iv7B?~FmvwffI*!=9OYETFGJA*W%^JEyk8cN8Fk^pcBTTGkt%dta602ZOmE zXhz(8-yrAP+K=DhA&m^(d6eJjewyWzxfi)Hy*czLMAw+ieh$R{V;_T6Os6(j)a;V= z+V~`*+hE@YYwrBCt}bZJnt6Q0^T&Mu_=m$(bE9tXv^kRD=($GWNzHV~DHO$0 z>yLF{59{%Ad{E@*q25``(Y&;er`Z*loT8Kf)7 z2GDXx(bH4?(AA2v(n)Gii=^+&kr+_Fz?0nW3#6ru{$JEyZ1V$$prFft6mtI!6t~F$ zZUp|DDQ#qv0w6nD>;5ZO{tq6(g?@Wy$Nrx#`oEoO`(S5h?iL92_61o!+B!{=K;aY* Q5EUR5B@M;0r?1}sFR>H}q5uE@ literal 19760 zcmcG#1#lcol&)zpGcz+YTC$i~7Pg>;7OMpoSYRYqMA@Pij&cv$cj&GQN`@E3%$ zx{Uaz$_e6Q@Cvl0n3CA1Pc<<}uRs{^I)bCDuJfl)sQv#e5J^m^M4vt>4#-K0X}TMp zWg-}3nLmGY$?3Tm#LT~4loCU#dp7-q3)j&@3=MsT@&q-ALo6cUnBgSOIC*@^b*IqQ zr{|LbsG%~bkCyzrwYTci?VmSTG*z=oH+!EH;*z7a^6Z{L@4bnu`Q>rJcj0v-eDS9} z4~l$xkR5r~^=Q5exsTm2WZeIBt)=d<54;U$@9?k=W{5rVp%)Sy7ymn=iT-7+=}`0z zS|59)wyLh~2rh9S`vwvcI2!)H#WnMRdH1dPn7B3v(R+uiC{hvFCuwP-$;zJlhv)9a zZX>2X_%&Zz07)o>6~R(`6WYteY?%D2wvl&`L3URVz98^v&h{tp=4$jTd-o%ka_Vh6 zrJ4zdaZh3xRpjNJ=rc=XJe9B~P)ynf5OF!4fkDD$?si=?C?YKx<5>g*pozYsyREz8 zxwHnuwf(ruKl{eKo)O)(evPAU>bdoPzCNAVXus}B36#f0O=lT3#TlR2)r|2t^8STj zJ@@(S>Ow-{vaAHxVp^N5Ba8vd(zs+9If5_*$ZARI`wEhjmL8>ad%IgKlR1M2rHlHC zYc@q%O7DIB>QzenrW z2J8D8z;+u|+*L%Otvw^Vd{MA;?}6ac&|I{LU)b{N^ABEL`!#xfCyhcyv6uTZJ1xDj zWEKvq8ETia6`X9}_ZDL9BN>TirLFT+PE@xHxuHPcSE6}ZyyUdi{_*tRB6&Wh_zv5T zSG%c#u8gQ8f`K7qKKNXg6N&3zfh`^PD>k7K5fVUP4zmvq4o+0G?=meqS=s~e#kjq3 z-{2K^65tLLZPAX(OaR|C!afb1d25QSvjxn>*IFVr5l)OYMGL_E9gG+Iof`DIJB|x3 zQt3xR%)n&SK)C5%;mFg*&(M^O!7;SQ?N-s}-jL{5tzTh7GOYb-mfOv)~Bx1jH*|)?8z}LJN)*9 zKKw;Pk)Y=)>o(7Z!V|HXS)Oo`?W=&hf9cnp&QKl$_VF?*3jZ>uP?+p})#+@2!WDfa zZd_D<$)1$1{1CtO;Du|L(-K>ysAIR(gw``EOL#f8ou^CXwC26fQx*2TdU~Y3kUEe!SKZmVwr|M~|_~-%&&}LPn>z7J_*Kfu65pH9mx!T-z)71X73_~;{bZ1Y2vtuz1?)7wxxYxc%Ae9=eZG z>57alg0AF=o||;*DZ6@FyO*x5L$nRa5jGyD_40kxM{kPYqOP35_}xr<^qs+fjWn4CMG6kO`6RmXd;i~g-YoQTP)NQ z;B!#kwcO-ADz#SCc-($e#)Pa$a)Nqyv_qHPKN~c>dlxuuq<*G-G+b1UcD;jg0Nw;^ zJ8n)2q<#j{KTF?BPRcsT*&L^QiQY~ldUs^;m)-|H7!I{Ru!RjObuNmHbcmdQI?%pu zAKJV}eqZqS<&VzHw@0mbmSFJ_+-Bss8lU8Mn{Q|?fB;seq*o2hH%XfIRDND6vYUMO zc3=C5X+B}I77o5*FK_Z+bDsR%D9|*WC$qcN6VSXHEwtAnpxqSP+^YoHM4F9l6w(&I zDn@57X$N_bwmGk&<ng#)T$Zf%Jv{xG*FZ#aW>6H zwdm{N5mJZRI_O~G6y$nW^%y;O(?0h8uB}OC6aq&%@9}w@_L=Dl%4wVE#))8XoPQJ1 zB-0to*(rfeWsol0i*j-#Z1QX+E{ogAuuX1@+Ut5n=CNauxE=d-2r1)b+5dX;_0ky4 zN#E{9HBIUM#eUG$_mSiSLtAs-gEy#=gQB?s1GujKPV`FpS4=BUlh45ewHm_SHsajw zRIezeKXBXjN=7-kn5qo*jfmtKwRhemcRZ{y?>yLH*)vi7`3ARn#+%<`-2mT}E6EOI zk7mbg9|;#9AFqBl!Gf4VZ@le$8E#1JZ{UZ8T__Fqo#8<6 zs6A&hiS(`EZ4O5JMz~bElPB#Ws3>xwEvPf4DX?_Ohptp5e>} zPbCad^-t=4Y6yMVT4QpAENw5&P+Bclm6FQa8x0K^l*0wIs!=;#L+uk%J8d&BB+Lu= z3K$6}JT;=*xE&q+o~H&0U~^+T zcTMnkUQp;ZBEEuKgAkzf<#-9R@vSf7R!zc0@D=Eo81T8ZV z5MjTZ_0pRWGHz0CaIA<2#6#0qI#{};)(NrsP&6wg1dFbV)vh@fn@BsobTClqxcU$rQ>g<1X`TuLQ z$7$ZgWgBupN`b(Q@C*dv7d|;gbkE}^e-U&;P0sf5-yg~*&wN8^Fv1I`d!5Gziyl0( zrgGYA(?7D9^^iv&URe1j*0Q4S$l1yi&BtWACQ4X5xZwT`^x2h#tu=q=um{xPA8>8< zUavnqYCH>}gr;LGC&+BoxVd$kEri>X9;g_GP+3Ie4ucOJwUs5n9{^#w`T9xwF07YF zPQvlN;)(oD9V#=9T-Sb}qG*;wbP~B@P?s6I(8mHl*b2D`KEqML+y52xMr75@>k8>5 z6eM0+q9$Q5`{WmLIo=p!Twgsf$o?m2yA#KIAW5U6v}k40wYa}EWfmxx7TvWM*?Zrm z*jwNH3IDe3@_p<>vg)`7o}IYwd4#L_Dv`i!4#FTI?n)Ee3t48QWBg}x3-Q<|2Oi*7g0p=p~cFO+I+Rb#1n-X9o&OZB-0 zg||x(GYEpr1msB@e<2WRcgke0tsRyr(`CVMYGbEwSs zX@-XZ;nNRKUru#Tz72IMWS_ccQc_{|%4snSqB*WIZU=wqVH9r5p>XAwV8EllP@si|oX@*0syKC^*lD0W7)FNd2Fhh*bqDD5sx zLPq|uGWNM+h~w@#uQ+c+FtTF9_sj@2C&v#UBOTWmeixi0tM-?t8tsjL0SkzOvTY!VkXE z`;WNB3HR`Qk%xWpnlc5skN^5r8-e|iHzsqxF#_570uWX6V<)YG0=W<11K)Sp@^-aB z;W)mG9t>m^P1DDFWCV|CLzMrb<0E7c0O$3N`F2%7%inwEL(6l3vSZW4To%A@I)qNv zF~+}~brOaL>Myx%t8ij`T9DK%=+&D97QWW=aZ|&KiHXUA5bI3-5QbMz84E<$4p4L` z>gM104`&8n_WYvfGRR1ZCpk^=xBIZ^8r^iD_m?s>|Ao)&yLkRuscF0W7c+4jz%4Al zMR`FM`nNsP<+@a2v>7iOCsoy}SC%f%Q&5XUV!QkNDCeQ?vfNAYcps_Hqd{DF$a<_| zSxu4|ZXPXxzGMhm96yU=e6Xi4h<@Xel5uFfAJut1K~6Y;h~J*&8Yw~*08j+I?A|<1 z;F14jj7tEyOJPEKzb_uzCy`}C;K=b`y85X%?PT%SJ=4FZe3fw4{^P%y4p-8lF)hT7 zz;s>oJEf`z1?p?PC46#nnJ6hqFvXaiIoEiQjJI1W?->TbFes0^yC0wHd>wl1w^(fB zc}SdeCVz5z6KVh@B@i8L(Fj(7SV~zW(!ba0XukJTW<{m+-?u-3pn$yT-V|uTEsn^r zk-^GLv#%}aESZM76LK4nNBKq%kc`RYk_G#arp=E4uBOXDLQ; zdh?_N>BxA91tLi?hyJeDW=?gCJ6WObMXBrq;jhQ?2 z5U#V~yWt8Xlucs|3K?zAB(TzwJt=|X(aKczE5h}gGH;tnM>jP#)-}%rwVoO!tTM^K zqu2s^?R6`-6p_y)2mwje@;0m7n@z4pPZ@p;np&aXvWM#?9#~Ge;p-3)F9(0K2P&56 zH~w7-38sI`Kf~hSr8iU_G!7hndlXfsaHr5`GW;?>`EuD;g;RgH5q-t%H|r|7+Kp+u zqAdqy26w#x^IHkdw;qMD=ZaDAj_JXqu7K>E28gaez3dAbI28Y*XFRwk5uzr`n(cFL z?exT4J=INoJ9w7r%}y4yCq2%-XACtG`zk~Ud)OTnYUlwEBh@?Li57enHY{k;TVV&O z_FW!>cz0vc7?FN(0AiR7VzH_4fvcVNO^oQh(-F=VT?4q{yMLzRoZC%Vzeblz&Q0;bn&``&t_!GF% zjFog~rkFqmy!Fm!!Y8d1_Y*`-RihP~qPHA1Gy(GdGlIDZ!O%XZP1`RYle-+dNY84& z*~&XF82!uFJ+3-KeM8DOG)p70PD+!RR-P2EbjqJwRV!^KOPf^9N|St51BuwK8*$GS(o%!JZ~Lt<>k{aRu>E9feR7YNp4VM!vjl^8x>t>PyoeD7AM2^1B51>0YTj7d|1^NkU2Fp{;ngQHWbpA@LIV1!|`&&cp73>g|QM9+!_4p@p?xQdwpY7ir5dnZvEf zB#*%>yn>1z;jWMa^&!s7g9#?c1xtgmskHc9vRnn|!lYJmVslz#&@LAtTi3IVR>@33 zRizt4GZNGMmd|pZA-x_p#cf5dh3_np`hzNZ<~x10B-TPg5QtIgv*KJ#&IiNSvwPMm zc~CrSwdPt{_FcqLBaa}UP-a@;A7pU|;-s1Vjm-_CJq_vh~(T%&BfHF0paZG#Beorz2JrsKWfP7&`4dj z>_DO9$zaiz1X$}bl6gd%UG5l$QtWHUg?*-Ebr1+aUZH3k0`62ZWMNO;@?zpE%osu( zoNIogQP62AZ<6Di!F&uxQN{`5!C~5z2ItC!QFF_UenoeV7ijvx8~I+%_b=fW*|t8k z)HPnEpn*<34v%);1!A_n><^aiFtVF!&W{hXI4u3|SM0BbFJ!`)^`Dvmi$Tv-C7VkF zc{LXcZ$~S?KfmQVtk{Ze{&@RFu2xj+?3_LZIo)X3G|cmvYWP`Sk~LY7!r_lzsB3Q! zhF`@hIK?qS)6m-5q9Y(9zFDbRxk2_2hv8=Om6VwpRnVJF64rJwF^J~KIfg8Z+1udy zHBA&V<Ren znLB1*Z=5-n&r@#s`YU}&`%*}2#=XP7E9z@O+??5=H@^!gZn6TT1U~5^Edo^^NN>Fj zhhsHPOF?f=+7n_N-Z8mmU8|64tsbH+Y2x9LOHD1QopAaQ+_A+eX()Thth0Xbac7iu46u^q`2DK@1IbKuzY!$=oL=-NwwP`u# zcwsk5`IzkP!EAsie0i#-{EkV|;zu&i6mzl$Kv>r7|&74=J79*f03VnVW!QE$GsC84AYN{us?g#9hqTx8vm zD0g8T2){VR4aX*f0E&ySg9g4S^&!a&<|ydE`;$K5PnT(&bkO9ODI@n56MOi-gjxR) zY=#`6VAtf2mJcYmHvNGJX;yK3-L7NK4ncX28&*__iM)E<4QA2Ld*eO0A`?xa9` zZu5}qHPlxi9truBew!b1w*SB;+e=xakLnr|He$^o7_^%E_LtZ~iHR;3mx(oSA}uDB zdf{~isZ8;XcaA+Sinr2xlf$UPTA)R`KWR>Y7N#Kjes6_c2-SR;|30EyAo?>~1G3$^ zBvCP0#S81|)*Rhk(|8REs%sfv%wQLjzNo-$lZNm9_?O4%^G87*LKfL}l3qy>>d(2t zE#4=V1a=)6gZ>q4k_HUjhK;m}0}Df_t}ZpcL27o-FuF#fKaD0bds2VgZ?~4|&8RJY z1`UYVRyF%XL*<`yfH-wkFwZRgc01#>*84NkdC53ZD}ZU-oKC6EfR|3w&XqvdnoM-w zM8Q^O?Enda>w_gW$V2}7_Bqb_U#o%AJ?2Ci&-w3-0*yKLMpnJH9^CH+%X!u>`uYo? za-C*esEekFA;ATSA93RL*&XaWDm<05I@NbUp%<#)o~{EH;~Y1-dYeZNJ*i!u;Uxrp zBW;M#`P_PNd7VAB9LZKbPOdq}!>U*8JKkpinvTICaLyj&q#R7D=XY4ED{48lHlyy0 zSy$`T-5e=!dW-6|dQAzy6Tkn0Af%R_t_Lm-I+gnGqQD{qP!eiBHb_S3_0;7e%?%d! zg9P4OhV)M9|A?4oqL_~96d?YAN%wzSy7K>?0^KQe;cQ0#o2f7RH5~DHTuUL z8vl0u9@Wgwo2Zrr$($90Gm*{Z=)XbUjiUvmD5~HO+4YT!I}CumQDC zLrOzqZ(Re8F_G2WvqBoKg5I-|;r#}4J$ezeMc}sbFf40UnfVoFko#fiaWlS@>O^RB z`VAE#jUD4J*sLv8ju5yrj=}}!nHh{Pg=$zJeXR!zf6WLs2N7x3Ww?aU^47LZHsYY% z^yi&)rF4qB^gxVfW@ZV@!hvVgNq;kJ7#gwB;eKu0(XkUsvJZHM*$=J6=BM2gI_LW zuV?(8Kr3=;2y6e&t)iI)twfg##P?t0OHWVIYZGPnoSesx zWeBy!vbbFLhYI+O-#9F&p<`p?%`I^3F&gvX#S&>VXQ-Q&Bg_9H>a3vk)~Aq(tv1GN z?b96B7N1Z6G-)!?n+6*CsvSYFN!ei|ZrIxmPeMRmjgFC|&kZ0Z=004t4!T{8H(J{< zEUW!|@H1$_`u25B%QuK@V(UeNuI6f94Gb3`sic{EHqsIv7vR^fKlHY{XSieO6j&=w z2ncS_`qrxWa=pB_sQ`wxwf&%)^>sR22$4>9_$!y4a|{)7btSC%BGG(*@p!Gcs(3w> zA(GD;U~th2MU@rl?|@WGYrgmlvF807x@|z1WZ>JnC<4f@^YZRW=5V3{bnuc_`;80P z`M4z?GNtKEL-ykWcOahX!Fey9CR{4H1$(U4aLCxn@@?0GoXQj$c}xblXZjCIh@9R0 znzKLdV=XAt&w&?WZsw=i_jkcmB2;x$1xM8{ql-6lBCV(afXf$rh0Xe_d!%x+q!XX? z6s@C^=6&Uv+(|@4nleY5O_IJh=kE*E_Z7^@zn2L}d{O)zl!78-i2DfE%zyELbsgJ)8CJ+*)^XvaD+ouw9CBsnoKe@NQ6MgSvb zvnoVoPQ(3an`@Yu2U9MsIVx;@T^*yPJBDF@k=Df8_LEnj%E=-^rfc^0SHvFAixR7_3;diA(GSeRz8CzU%i$)#6@Cg0~r2HOrVG%f`ks8gR+p)?CgXg1ygYyfc$2bpu9lOi0 zdSW{FWN8*$%WQ94V+ZcR*rRe%@X8j-nT??n2a7PuYQ^qIFut=ybv?kKLU*7>lw`;p z;Q6aIygtK{UVN`cULPPh%IfIFIUWLskm0^0g1)lE!ohZ;$Y`AH{+||qi*3B zV14NR3AkL?hQyw^dhp*AU%95D4mVu%_~804vg45|p7sm635Zw>oo=iY5+>-z`eN`(8GdRDr|x`{dC3 zaeEPQ#o6J*{V(y_#8(GO$2rx`&WzpTBy49W@69!f zRgAW?|Gp{G(CKM2CNCyfK+s+faJ@-WU-W#go_N?w-ALuZ2Ill!Up3$6S$iBRz`6WT zjcK`>jWbmrjBs7{l8MymEGFK?%r*Y)IHMj$hOoy1|L)X^eJd9C8Pv<}4XW+P@OCs&k3% zt<>xkzRODVs4lwwaTareA@_X91~YRi^v*oK=2PKva0oT$kfuzVR)~ZbJ;j6e(t(&tDN|S1hLsuykp2a_}FYfy9-U=c_#F7pN#ss2Pys2^WL2!Ma67vYc8JMqqPg)!;6NJ5K=B9?x z@DRym%j0lqmy}|3#r0;VjRWvmr?&@Zjd^D0J|p)Y<&z6!^-N(&42Gx^y6rBd7$s|$C>Y? z>=fjhlL6i{twEOSc=*sn55a3&j)N*eX$I|f|MA}~+TjRAMvT&E9IEOHGM-XQbUFYNum_G;887tHXH{hfIAMCBhpmGP&|HC1?WUkjFJ!X`(_{3Lm5 z2C+h6I0k+(XuX{k(-TMHj9mhcp_&&bKdq}dA;1w{E%{ZceKGeDuHm{1N=uz;T+K?M ziZ>HI4v$b!)oa8Z@e7C7ot7%d{auaz`C&aw8K}(Ki6TfY*^?Zt$B1VY_3Z*`Imz{_ z!!AQ2OoIf`Dq7TVpJ80#+}H1ihfTfV5>NEG?iXlSNe`P=QBV?UKqEi}hw?gXVjt?EV;@NGmgoedsf?QSA+K~U~en9tf zW-j$vp^8`w-obc$Sms>&v04Y;Nt4w{I{xK5Rb$Q$hrElh`BPF8Vz5@R||F-g(Z{J%2s^*YQsJ|ba|mzA(z^44En`NeGW zcdqD(_u5ujecwREq%1IBY5&`h%PFy7I#QZf`)Sm*utK?EzB-E`B<{0VOa*V5qQvR< z?hH*clAO-O0H+$K=)g{cW4OTne!u6F^&BG7xygYOlEe^zU7SpfmsDMeD-Lek$OkWU zEY7j%QqcOT+?R|l09`JnNwv>3qGl+b*K8+;4aGtj89$9q0BXf59Mz92Cw%}#@nj`Y z=*u_Z<6CJnCH-K;I?O__m#GA^Mzb^YsDHvhhs=dY4etEz49}-zj{TYcaDE z&c`z}MN|KF=XbVV$FP2-Eg+<}zW@gi9s_GM<`t?#tB8Ch1-65b5q&}CK9CB3GiWDF z?odWVntR|>>I(UDW-oWbdha~EEWpnd&0fmuuxHrOs$ofOw50lQpF3=w-$zzY0L{;N zcZxys*I%Dp3*Ka!IDNVa6Ty-^DyV7^A#@D2IqB))VhVS$58RzT33Os^44kHfmokh5 zd*tdx~%|-;k);GKK0=5`4B4@>(9rR7Jz1_xEyavtqG+5 zwPxkf2aH>2YYR3B%$6Nj=(Dv;U88F%c@WS}5pE4E(6}t3tT_-i{`KvdU;jzJ?vM z2pRrh1U&yy><6BbvM0U11}ig3g7}FZd1r%YCzYg$lkWlrSXO_T;Dj3FbQo8}GgtPB zjlKmsI!h4>7=@d^WN~}&=oGHNrK#^fPIy!I+6`5BjNQ%dnVoVKi8wN9=sOGvy9}pe zM3by{Nn5)hAv&~IMtdZyEsUO!2Z1PFIHv2q3lS@`ZEd}NGngaa#>8UoWodev>gAU*$IWgzI;iqe1EOtu52r% zvA2_4TML3iAl{9le;`48h~^!4fkYE_7~!uYADK`;=4c--0 z-OU5>B(0a;P`LKdzca|56=R8z(f4e6&$CK=UN9p(K}9M+Sj!DZ5Fl|{K2WG*uo_EP zDk5*HFQd5CPMWs9K9@|BTr?qv)VIXbp!0@IqJsY9Fr;~Qy%<&g>%g<4_Ib<_|6qqw znWaR)YNb_0D8B>rZf@hb>=!V=NWw}|5YgE{j;s-ZV5m5DfQq5b3OY_-kdY%Bals& zDRD#(1^KEi(qI=)Yj|RR0#lL1GrnFwS-X|7iYOUAj98tqn}?-8FRsTgUQtFhh6j8% z>THnU>e{cqs2@zRRbzmNHrI_=-HE7Wa5%i%;`Y!z{F~SgsM3}uAmK0}85u zli@G#F#miU^hqbiDu&44W3DZonA7N(VPT!)^25I8 z%FMT2c4TJ`a30kZKe#3IKS$Dk9aaDQ4n=amMnM|)P7l3@83Y@2b{b2rLSXq$?I`Ur z_@}|{1$@hX?}G85Rj`D{A6$3ei0b^uA%ua;9}H~A{qKlPh-(fJDZ5QUW1k|VKKHUC z&w4dWZCN8JkY@_Pjj4$CT<@yHPP_-NR3Qy;_F5wc15+bn^plxCz@!U758~Fh6G7dT zC!fqWSfvPk?KXzFdq^f~0DLX395;ms{#eYBGIsmIQbW>W*#kO1vE*J<$*e^VX9+_Q zsr<@m4=uxa?&8F{f`C1816yEn$(cPVF+~nEFPng8VguDMhNyHbwOzs_NtE{ChkZ$dVfxhZ$EpGJ0aSn^;`NcDEb>o0X&qOo7g z^di~;@O}6pPT`4(Lyo;EOMEj0m&)4$GJ>cNAO=3!K>ZV}y_nNY*}jGntgTfBY;~n5 z!V|*GjW4aT>AsdO)^{kKqKxH=Jk=P?77>j0keG@qaW}I}v|!|+4SNn!gV`A^F`U;p zI~3G3Ssy#DrXK$SHc`2zy&}81(W#Az4hyV!UR~GP9>rY`?A)~NwJ0H@ zjhdpeA(#>pCi|7H+(+5g+_V)jO|ayU>(oX|B{5e(uz5BNHfVwAq96ab+@^34qSaY` z*vtuMg5-HI^_iEEd|Iwav1qmCi=!vHf~EV|ACzB%d+;i1C3uHNT76*Go# zvtFtB)99VHQX%%85&Fl*%Qyq$k7hW>2S3ce$(l{~=OUpfmws%z=1!oB7b*r;^v+I^ zZ*PlQ-|ke&BxfwiBy85!AD5R}JliHuCYW52ebn2-C zb|MG8#XrqgKV$e)OHPX5(HY6p)-=f_ExBo`>(bkWI^I$Bv1dhvAQB&k-cbgOm1QNF zh5d3oHF^bJQe3TS1ViCQ$<9ZR=^DVra)_c?)M2iscHkIo;6%RYHscSTUh4SS;EVR( zcfi4M$p8Z#O>bh0hKRnaCCE{Ruf9(y2i;a*Jq^HmSye;rwY_+6`x0P*Ql8f zHWQ0iUM1gg?`Tc@qfaYX%Xob~jMQ(`dTBheCQfR3RlzrhRp9(bydU@tG~Rq62MZqZ z3ZMR~l}i6$YoS~h3W?2Wggp`q0RdrZ@nz}YBY2gSv)r(Q5Cj5^FZ}Do3f#sbBik&8 zJmejSn@{B1aNkv0UxP^3{C{>?l2SST4{~R*x=#Hs-zGw2aJy-l9T()e$b}?+tFe$ znulNDD1{v8nBzTZ2_JUqAhE(#@CQuKMr%q<>4}#}KHvJ_XC=ijba)Mn?j8C;N3<}E zF&YqKV~mO2_0htK;p|*TTJfTivPxbBsnTr!(##7XdA?{7XuF0230Crg+6KTT6p1amk) z_VY;<_V)Vd=`(^2S&*xZaQOb$+<D(WqtSt6;XlGDIPEM|8 zra*zH9pw9Tz3+ZpkRmL;Cv1s2aUmic$g<>+j}<;qT)K<-j6xFpE_lj8rJM|tV_;Jw z9Oq~hVri^qISJ`bpZ!!!W&I zpdYN>WhYy39~@epXjk0u{CkCWpkVi#MtRkLV92pB2~UDM8=8HtZ@7qv8{J?zuBi4h zn4{e2gtI8h^%){3=Su!r8p)hh1{N9r=fkFNmth>%4zI(8aR1<-XMfaN7L{Xb^fw|M zf29}3Z>jnBl`Pv}O?9k9`TRyXfC&Q5L_;2xEm2K1Ix9^8g>N&zFm2mh;u z6F}-Jn$$uo0zBG>(84|*WknNPbQOO1NTD|NV%kopC4S5=A#CkM6T^^6W(Iy2cN%Hv zXZLp3aR9#C8VFA0aSQ5CwrE%Munl@QwA)-vUQGf#lMltW=}yP9fb1( zbi;ADZ08uFw4NTv?i4y;>yR3^5H47D533^$%$Aj^nWa-j^`uJf?+Y{AZ$zM1fXm$K zqKB;p&a!@-U!@LlewN)TzVVc%w0N^GUwR|>bEY?zX_c9--|5T(D}DRZPr12uYUJC$ zcApD{f9yWAalgFOaP!fw!IQ(c*&Hz8{w_An7y&+`5`_BVd$CszTXDykZA0HSM zzs!KeHhXvpub^mFJ=|e%a|O=dGY)%pDhX-9Y;(QJwnqh z>0WB%v_A-vW{Kx3zZQPz>dIqx$f&^kyjG&BK&vIV+^OJ(h9_)9`D&bORXBsmNgvCoQ@N1k4=LT|95>SNhG2?CG z$_=ZUurK{W1Ke-_@+ayvFxHr(<^5j-qyD>!xtv69d$i6qG!)yUP-1fUli=0aow_{) zf^?|kyrT1^QzHNJz6p_-j_>ScZye|d6W9MYm@nO0JMm>6UJAzkkn4Q{yH3Q#mB;hU zD0tO>R??}LC^_h@a@P<}Lzzi5K;*LT!F=8bM@yMiEN>=(h__aFc9jq%xik6~3+?<1 zZWgi|!P0Fm_R6!IvdMf5HwK%}4}a+T()N5mKCP8G{JIz4^}T4r)I>eKoZ!iPVr6my zxKQszc@@Rqo*|tISozVDm?BXoS`Q8O?@k-ksSB_5-qehR^|OX5HY6lFn4=(!7;DQHAN)elgbW@l zG-$#-V~?>idpAt|A$5n6fv)1dt{Y?|S7tvKr?;K|z0pxJ8>5a09J?j1Oq(bI_P78)YjL5JYEyf@p(o_CiC@o zx#yenF`!Sz&@u(r)BwEJYR#TvIH=^N5PyH%D8-hRQM^5Jc?kw>75bV%h=^D-|0C5x zUN%OIdGqd7A>O&jG1z}O?q0)u!|?X~ykjAGzelj-K8hRxD9}3k7**_t!~ZS1`JjPc z_pegn+zg5v5i~n^g-IwJpfH|3PY@&329D0#C)vUpZE7m>;pojngSK}jXB zyf|@RCPE~YibDJpyOA0fnYAL~!MSCahvs5P(Ei-BzxMx0p8ZX>zV9*$Rg>b&x!_B$ z);$T4;~J*KIzNc_W*<2*b+dHy<;RS8(CkAV-OVyH3rsRmlndQSK7aZo2h$_#%P9X{ zEy%UeEL#q@TITM}5PJmptFHar)O&YQ-3h-F>jAt>D`(u;SZ|n5KbO zj*pFd!r{?y`ZIaJsb4(XMk%n%Ao+yP3UDC^F2Q@~1LQQSi}XcHOiNyW-XW6nbU!O zgy&1}KR*vx`b72^zwdh6#<<3@BPaRPNUosRTnBRBI)|cPR_e{uV3i-Ptb7$4S&ozU z(l+l+A;^mpc7m3UOpW#>7L9i3QVSdlAC^c@sWi28krqLW#8w%VxJq%O@E_Hy#p9vtf(hbJ9QdbHN&=>m=UGLa zjgy%q!jMIlc@90tsrMEe9*FL2b5co2D=D+?fQ_N1p>?3nJT}_9l%<)aAf`F(Dhb%s zqNgYKSkVofMY|J2gF?u_q({n(2h7RrzPr(AyUW2QQLQu}>sFy@v3Y`739)-|cO174 z8z(pUCm+71Ucbnv;W|SgkA>-JiW>#EG+T$Ti0VHpaCT1Tud!_^fb<`vIp1_ufBx-d z3=DD0=U$LB%5hK0Z*BHix-SV-2Kr1jv=UUH9c=BICN8Y-rlWKI(@=Rg4~#*7!vA!a zgzZffl6)Ed*DWGj0wR#I|Wx9u29b4n}fMLB`u zzAQrJu!!~*9R;LD{~wK-u@TgIseUj&hx#` z^98Y|a(R)qu;o;9Edc^I&7sse)NCEaAM3B7ua9S^^Bsd7kv{SB%~aq|qd92Z=K*ix z4>$H_;dPy`HGDJ-8I%=0@T?%+s+Tivf8hP`>9=-AWc6Y|Luxga=43M<_!;QV8`l|q zv0cY1iQUpxvj`O}&JqT{ycE9BJtOPG{wb-jmq}gY1GXqTOsaU9xNhWay;e* zRphp}EHFDB4^G3_Zn$d>#|yD-n})y`w_`Cy z?rhSx<4qxeadIY7j&bhBL`N4MdHT?j6%?AdA$m?2_&84W)Bu5Mrxf=Tl{CY+#igY} z_l4O?T6p-3#}D6S>yix496*J z50{ks7OllYoujwp^ztRRSrschaWu00u;{HSHM6tj5TX}@Wto57-#%0a3UBHMz1rAK zJ$Pz;43%C1!*J*&fTQx1_8`o-r=ajoDjUrqy%LIS8AU)d$xEn7qu>3(UzWS zx|*HTK%;xPwkQsdd`kX&nxyx4FT>|uC6>sC*Z-LkdTshnxPt^N6o;o-Pror7I&{=< z-&Xtgc(%GWCt|)e7MGE+O;Y;CW#kv+xKlms%0KXYAGp~*{e*#I(KSI$FVch#KZVC3 zS#F5?R)~w55PPt>_V`$VW{$3ny@X?4ll!FYb7#@)%5ZA-6*6w10uG&(rIh#RtMor1 zE{-~!lvPFdjv4AkVoIZHEAvMSa!=p6lGg>dAjVgjap-kVgml&FuVlWeNEC=l7VAfR z1w@om+CZ>ndGhDLYrZCwQn+58Ut2UyzMaumdIn`o2Y4kY!cx#UPH8=sha@MR8;#j?6%i}LbL z&H<0njLx&~7e=*Ra902+m);=u$~*Zh?W|WvwbDfDQKlMZPxJ{RRrG3>h;}AVdQRgY z|L#XkahyJtUASO@HU3Kl$v|!(P4|_h2~)sHE=cH7Kb$mSjt2q7hB`ldfuDw92+9Y0 zClY(5AkpG}JMgY*REkc43V!H)kPMtv<>_9wmMqiUyn!PyMM?Ce(Hp*4ja}Z#xy6?; z>769bWhO|nmVyDBpULQ6SUVzr-S3Q(_e0lLj4esg%P~eMBtkZk5-GsnC8q_pHXQR) z>{pk2gNs$tWg|)stSG1)O9I5I^_`EQAN>-UqGw9n^5%Rh(Kv1C&DKAh;(qTGCRrr3 zy&=>iBDY%qklbXh9{+_tZ|1uIIQ);snkr`L1o@<9DTNZ67cyA~f}TQX3KRTcHUK_? zHX1fM1XH^>oO-}W)9ZV(!H|z5JwOQKbhA&KpXJ=83ks7b=8~hQe+Gf=*KEDQ(RL<* z^LuN&l|WlN^sx!89RF?mGE~YMbIU1O%oXW2>6)hL=>$FL8l%j86!G4Md%-(OC&7pm z{wd`|dcODI_!QBV`0Z*Y#nMf08x`QZ(NZth^&2dB=;x4ZCDS|l^H{#YF8~MGh(BZe zV+Tl`uGq8!1ALTPyddySg?aA;nu& zH{j#C3Gd^Z50Lk?gK|0Fst=R7c-fknezc{y*~mzNfyR%bqdqEGw(sOhEk~IGW)bY++dP+NLnR_nPjqh ztnbj)k3Q#?T?QDh9+?t#D<>JY95rFmOCNHU;fedayzM)nhT)DBq@fTu%z|Tlw@;Kh z-sBpo9`Ia`Cj99&$I|WP%xpDMclEZ(`zmHHf-5oARcmrZnt0l|gkF|$-YK;2C~77R zWihcHl8TQ1VOdH0OA(Nm!0OH7iI2B|xWHXgWc<>Ymdv96aJNy-Hch#gi!sRjs>85f zz4tP5E*GWv6TyWS{HpR?ZQVGf3Z7L!bS1T#O|8!<HeP sx;KAd7~{X;)^D}s)4;{DLdSPuLc@j$f#~-Lc;#%L9n8t97V4k)PxRn+l>h($ From 8e585bb9451accb7410be18e05b9a8e0933f05ca Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Thu, 22 Oct 2020 10:38:27 +0500 Subject: [PATCH 02/47] Create pin-reset-option.png --- .../images/pinreset/pin-reset-option.png | Bin 0 -> 83633 bytes 1 file changed, 0 insertions(+), 0 deletions(-) create mode 100644 windows/security/identity-protection/hello-for-business/images/pinreset/pin-reset-option.png diff --git a/windows/security/identity-protection/hello-for-business/images/pinreset/pin-reset-option.png b/windows/security/identity-protection/hello-for-business/images/pinreset/pin-reset-option.png new file mode 100644 index 0000000000000000000000000000000000000000..7415de9616afe073ff1ed7380086dbec46a5630b GIT binary patch literal 83633 zcmcG$WmH^C&^C%BI01rtfZ*;9!9(z%!QI`04;Ea4%isiecXxLNcXxOBhMaTW@5-OM z?z*?vVrI?E-o2~4tE!)>dYWK)SqWqWJOl^`2xQ5xqTeAP-Yq~tKpVipfWPtB|LF>T zgLL>VAq-JEO0W<9@Xka?MhF6;A`+c4yzSQ?4iFF@y5IgF<7hwNLqNRdNQw$6 zxo96PBYsgbS`j>BOwOk&W$?wWG^+MAqL+7I$0+m0GNZF0PYRV%-?1(rpQ%kMt;d_G zH7lq&G{=*ScfPMG&L#iN89O8Wi^YSJa8O=BGDcL4;q@}*G9`(%3u(ALpUX?IsgL`X z+rjwL?%}B`Q97@9&$M^Ye+@4u$>THWzb#8#cU)Zb-?jybwD8|mL44jq_-OyODA>E$ z*jQVpcUiP_R8(I_|NFX5SM2|A4U;L^f8Aa{z*zm)t0+->M)-f-_Cw=T|JN&;D}*1% ze|M0g{67-}{1Eeu>qAg>aj|qNcBFpNzde`gfMv(~f->{;{5u!AH-agr$N!V+@4ZXyzyJH3q6fZ~{6jIrmv5uE4TjeuqmZIy z0u%|!@iIV;_5LU_`vGLi(BBu9kXhkVzNAl|IGcv1Zof8T%Uq{%2D!DNe0uz&d6NMH zfI*smTn@Tz8@NBfUmUAtX}OGBntkWGyqo$abv_z+E*gZCD&ey#Wt1v{%{dfia#2FQ zoZxcXf3|mUz{jbs?%lxd{9Ph9KyufxWM6ZQSEf03$6#L|(04X!giygp!Ss%r@k-b+ zqjqmVx6&>hvS)y_n12N?Mn0lN=AKBs{>}^bVbgQSWRdt)#zu2)r{T8v=DO+DmGW)g zFRa0Hw$xodQq>!d530}jRq7gkkMtxj|KVysXinhE0R>}8Ap%mzRn*A&YV-nT(cj6O zu6|R7>3&yIdq22^?yuPo{n;9I);0dN*YF4k(GF>3$u=d&OUTp;$J=<}`G&ae&3>61 zTS%4I1VV*5q&eKi6pJdf!Oz&67`d21>{<3l#*SEroXQ1{NVsN?dSFoZiWZ5|6_INXC#}c_p22b%jUr`c?)+f~FTinW_9zHm`WsT0 zji31{@8VdH$1|B{RHG!f3P0r*|NbuqAi~zJFe`NhJ`ceDUEitvsAs4qb(w`m`a*hN zWBoO*eDE$eg0%bze~Jgi(MiR56|I+XaaoV8&hZIw#M9|)-ofSd<8wK^7C_t88hh2| znbly)`1wA-%_j2pybr)hy<3?g!dLd0HE+SdnuC|(rQupNj0gWdF!dJ})Mx0uJRa>UuZOF5>yI57Lwmdp@+=>;ih*N6Ba z#G9g=Kj2+jpSHo}H}*N2K2$rKna6Q7ku3^#QQvER55N}k0?c)*vgv7HqfAp-#Dk!t zYy%)2V(NM`?(jQ+LesU4P(izI!FLDeqj5_*?aja?zHsep#Izvd#jgB~hUz0fy2*Hi zP*!bQJ!jjJGfy3{fEO=tmP2L!!ghX)3#U1MV7$Lo9XT~_GX0lhX#dUJP(yz zOO;-{*Pw*{-P3!v6(3=as*5g9rPF_X@JG8vgBE}%9HX&7rBh97EB!3&1>=6JtT#zG z%eW*MdEhPiem5mh)`^OdvG3=qCuPC`S)pNZ*;KAQ%{cMY^>#bzXaA1Lqm%ZR%R$cr z(-ODnkqgV-DsKZ~nM-FAexs zzz~FWD}`KYx!RR3@hcxxxDRmG|SEN`?o+VZGqB{keKr`iM5!GxL@q zdBl*>n-|Km!1d$EIvfc8W{KF`QCeBR-$+H90wXBIsr$9Wz;V}3^ZuflbXoleRtX0# z>pKw!^$Pv>ZZ}5-9E8mtqicy5Rxb&u#U$Pq)$V`H`}r-A6vSeW0<93MA1w;h&_Q~t zGkF|8m7odFTiGN`#_Hsqvk)Hwl+8%O@mf1eGGupGOxAF2u;x_k3TJ@v?PU?S3+wJw zT-@SMNSgbfsK%LaeDyvdNO(~dK=9O67cp3bkNPNcc?mNtC`2*`xL&+i@s@f7q^zVr zuy3iq=|)g9{M&dW34MGX*JD1lei<@03^=HK@P%~GvMFu#eAM3gEn`a%L?~#z>NuT- z)t=Aig`)MTljFKI#H++`E*B=Fmq}dK+@Y10*fMBPqUK;|E@cYY8USOs9s7KUJ%U;T zmhx_ zp81~F$hnx+;yMXHOuXP7H&dn8Z*H)6q=pS2d45`3PxYnDO3RLFD9wlI-iwSX{1N7; zy1e5r4z#zH!UW=F4E(Sor0OCK^b8y@j@=LN+KdGy(T}3feQfj3Oe(7MQYaBP!280M zF2;>jLes?F(h$_j(|=#mhoI`&Vh!D%Ve_J{V7!Y1?UMTL?tlD@#<6 z)6j^02Ex61I{&Xt^BKM4TiYW6Q%sARhzerzM(nxPF%yH5xAkVAyE~`zgJIO zhs#I=mqKw6lE2v^7!wE-|NjKz+Bbz32jxP}XY+dOgZ~-|_+{^5Z6d=;K^$%6(NJ(@ zxt=(bwKdM-e|~OGmy?u~3{SC%rPLnl0|mB9Brq&bZyWSQWPnDN%g-j5oRWfyeSLkm z2>wNtu85IJ)%zsCfh)m1Cn@5mLRI3###fXN9uDtVSEzow|9csDM$5$CTjiKAt_O2g z|2|f2I|xUedd+BTgkfiAhl9T-c1nd?>=yWE_Q09%jcELU8I9%Lmxjd|ga3vX)U4p=%fWB>xUb3WHP1@mlj>Vzi_AV~ zP=i;wKjb6SaUh_tV<-Krr$NnP@|oN+`I#UUuWE$$ zI&}5#67eG4Dt}AoA;LIMYxp)TesO}KK`@jyU!eKjb_9vkT*3$=5aqK$)6iHzJ<#sB zjhANd zYl0V+;fm#-q0rDC4D+3Nqk;{MxE-`AmvWW+;}+;Og3Y;~`63GUgZdq4${)+n_I_&U zSh*QP4{l*K@?Ge}+&0d#Vce1n{Q8x2Pi0joG^wl@bkv4TldiIj-o%dIBxhz(=9$x< zxU*M<>Z5>iRwbVojqJix2o}Da;C{nT=uO})??s`-sF@vaimkbB zULZcSW)&P5>K5?H?bupI7@#X>4dv=%+pjcHVPgPSx&p}T(^874dON}`&L(4S*G4?; zwX)+nJU-#?Q%mBoJ2Tiv49=(uE58pxv20(!PV4j>DxLJ^c3PQ|U%K9cxXUJoI%!6H z<{g~T7ID?$7n!I^NO7wbn-_YnDu=k=wy!&s?wQc)cd^1t(-=b#db2oloI1bSMG-*2 z3+H18Mn1Bet)#yh`>cFPsgYtvq+2nU#IkdKM`De-jC4$ex-}-I>FF@6u>gJ`L<39< zAT((%OjC+|!9|)N+X@+niNNnD;U|{RvuwjF;U5}_m)g2Uc({=6GaoUgs>1N*b~$W< zgj~(S!YGGp2j_?YnxTPqb?&l(zJO+ZZn@D|YY((dlh&Y`^dvi#QioLtzRMF8%h7>O zSlajv;(~$tDibLyMFp6&v_=BhG9~t@g2?ml8`8~JUL3=!)YAozX%AVuHVOKd*sgbM z>{uNm+va5x#F4EJ3@Uj;`^$7k!y18No6>_OdYHMxW33FdGD8A7zg*206?XP^GZg8x zN9RLRPX)qkbs8exY^Yz>4@LylJoa=yfkrG*<@mxNoU5PQkBL=LCGkhD5e{RWxv(xm zbX6flqTA7z3Fd~qh|~fcEBGsMGA9%0F_Gza#f#U_S?Tohd8@HtD*DJ#*t7_4lb&Ndl20?+HH!ythDvRUz5+ z=8#fVyVPA`Kk;g?MQeaHhb?m?G_w|V`IB$I6j3(+2l#hFt&mX`VhbuOzadX_Z;m~g z+nUTF*RyISZEcRJTj-@U>cr)nPDNNXGlhL!(%UnU$>e|}jQ9$q;l#co@;Tp+sW5HR zqyXCt*QtSNi=Ei!OBBUbvjbG;%(ng$ZJm6oLt!D(PD#<(QZ|b2wC=pm;~GvFz#h_G zYD++z{J!7im^!S@BtNI?cKuem!{O9|aA}c>mF)Hz`}_);`G6`$f7Pb~Wo;jOR=3X2 zA;DO-D#anw?`1N@dbO^-Qk#&xvJj(b%2;2&n1idkeeQE}><`l^OBq2>e(bS5@^1l2 zUWvBFT#~K{i=Qzz_!hkN8!XQ!TLziUvtCmy@-(GR^K8c}C|(Ho;WM&>wNJyKxZ52f zBv52C+%#v6?f1{ zf!(JdeOshF+vK?~rWFwB9QnX2%YyoJ}vKdY?QmzwdBSCrKj zM0dk5hk(HMc5<;}SEt9Po(s;2gslv&a$C<-y!DWX>C=J|XgKU<6qA=n0_ft-f+7d} zDJ_Mg=^7Gc>-bG$qSoKSoCS<3y(p~8YOwBqv@m|-m3>0udtQLaJI%XMM{XONPETUz z>d*QP_A6Ny>YFqRg|U(WruvntMsr>Tg@fU_+1H4`+{u~O63W_Z@!y*F(6 zFk!O+R$TvS75~Pq`gRABk8(xAHS+5A3H&Xuht87gDSj7vI2_D&WAaedPH6}MgK#N_FMw3-DQuxhDTp&By4<$Nc?5INM98Fpa?qp^75X>Ry&fOi zz1LMAXzp%-ZRr-6S6&eT$@ziyba@%2*;~`qa$_&8{ne_yQ^LS@)#8JI$VJudBgkHU zi5ww#BN45GsZ7Uvb@dTqh0fLP{ud&uY7q-P($r-xEkHfEd}MNI3a9dY zkDia6PC|TYN@x(@X1nu~)N}OmNBCEKWctx_2}9{(p1=#FEsyoJP`fx>i`U=&oG9ix zdopCv6?@rqmZS3_BlrTHf@$Fr8JXD+AxqeHtCsUoO*&j36(@gF-zet}Un%jqRUJL) za3%ZX5xHvN>rF6XoR1wm8n64Q5{m%XO{qjikIV)yLtV$_TXcD}d3ZZ6)LC>=z0bhFL6i(n)sx&u5C9 zzNWM0`kSAx{x1u7x=Z@^ZnYctyxTUb(a7<)y>(+3~9JDqqHjt*j6+T znx3clo^t%>4fBtrxv$rB6wME40+@X-7R(>%p%v-+3JK)Ie64vNm}i^I_yT&!SVT39 z9IyPg=THS;i|T^Ld|2osKrimD6!;E3{6btrGK$(`5`ZpNfD2OO%etJ)J=yk4UT@c* zqsx>kNX}uK%^XL-)4qrT$P;&$t2Dv+KmFj%>FXIuG~i{kT9((igl zbOEiX5ZsHzk=JCuuNWKQ+%~)(3}Byv?Rlb_ez{I{d`bL~{f8EoqA;<+14N9+N z*R|lKIhKGHkC5lGgAOYagF*%2KJ}u)#I;`WQf$C(dhD$v($|W0=BxNN*f)LKTbRxd z;Xq3Z4q-o6Q&xVoshY`}l(EK+Oan(0Sr$?+x!dxG?oS_47gyCuHU#O2;195eLe+o` zBM(MOG>ca}+BD-kGLmL$&x7wo1KzdkI3BDH_`ewJeo~MdiDO(X(pJk>ZoQ+{aRcS* ziEDEC&Okyup)Jv3q3{#Y`duL$$pX+C%$-s$j65arj3Z}mk-g3Kz)KY(IFMUn+#Izt zuYg0lK&d+s-A7kO?qbT4_9~LUlpOx7GcZ1(+H@1)HS4~!D62t9u__)G@Iyg8C@l6f zUyFhYxtM?@ZboN-edLCY+k5yHOX$Fj>#|Q;$n)x?EZbU71{b=CJOl2_yI#Xymp1XY z&YKn%8OE|Bp4&Bb{@a)}mL{(JF9+YYTO@%+Eu3Drn>OHN&Z_dsvH%7=wF7DngQcnj zl5)f43glpe@(Zyo4 zx1C1rboz-fthSywF~-IsB;=Zo_SYm3D-;?i6{_ObGRqe_l+IGeHj?bFl<@xPV3x^0H=GmkqrgBsSB=&}W zR3-fUY9n4o#&@wf*8n`6eT=;95*d|G%LOz*$)jwW)5}n-0~R!`KpJPgu1EDm^b|+z z&Tt(DPuNe|9@JPI)?Z3TAo6nhm0L3kpHBK%0dREztPuqLz4r5L^iSu4B&|gpr)nh5 zCWGE)e=dybBmGzd)qu77n_d_^h23TuYwjn)fTlsrDf)OkMvMeEmf0z*zGk&~;#d}B zf_sP^qrnWC&qR!Zv_&!Il3$ekpP#A4gi0+Dmag^qI2MHHHaX`WR*06v%MMLBOoz@^ zo@_8kk7+#?0?EFw6#8XRS0vgUw%8z{cv?61ZZe3h6*o52)eN5QQAffw)y#WgJ&1L$ zwNh&LorK7LX3!46jnGcWG7)BTn?)cUnM)_j%6>#6-likJ5PMaCA56!NssITA!n`Vi zoG(&ZpR;4-GA=AWuNJ>o%K!4Riyzz9aW?`7iblx-`#&Xaz>wVcVsKpl50&8#`I zyE&^?223_}OWHZVw5?li!`BPO!s|`!Zw^d@z0)%H=B0oSk!jwz=8B6ynaL*YmT0a{ z*Qw@cL@G>Y=ZD_4oQ-EPEYEzZ*chH)m~r#;BUBkLNUobCLcth1t3aZhk)L6pW0Qu? zD^a+0>^`?JrMh1jQq|K3^nvVGb&h>|b}|#sK!PNNEx5SUD7ts$IMM)m==%?_68~qx3)2u3YG(kFXDTrv8n7ET#l^ z$jKDgYDy@F#S!oKzT%5GtTo;}G}fl`3(g0oigBI9LSu0O2|gIggDgz*OZ~RjP)74s z0-h#scOK6#a!c;kW(=3+v!NQy97x1vQ|miB^85d;t;}1wN{oh<_Izk`CecpEn-1_L0P)M6j}vDxJP1)qwDHq(HIKj0R>?_2$`z+rYyndU6W_NtR+B zw@u^J(|~QmVY9_!LRRVQm_bxQtIa%uFn~%F>1141gM-Ht&1Bn>o;)zqE5vJAOQnT+ zEbj%bw(Ivht9B?8#TIB>wq%cE6JfN&wfk_z*yr8020>{N%C-CIlDP(1qz7BHdnuxB zsdTO0F~+xqkCrpI(A69SH_&*enysTsY;~~Vmr<)+?>HcYx8*-qXTiJZ@UGU5v6z)+ z<%-CDx*;Bi+16X8-yr1yB{V@N>oTfU(#G6K_*9SO3wI+ySy@@r?8t5WN@a}4r``0S zY6X&1vlrT{R>e^p^?;gQG-M|+VuKlRt69!c!K+M!Ctg?$8he376A)c-Au6{8;g!&~ zlka)aV#(>qBGCNy*RPA?el?QSs`3svhZWL^_=}aNZ>O6_&ym~h&`u6uKNBYIVco1s z1@kKIfi?T7Yu~g0vwt-@`w2H}Rg|lq3|64m+DSKjVL1I+aEm5#J!-uYMQGwQ3CCKW zx00R=Nt1pVjX}JFe${(9LI9EB;+O|#jE`3+sVOMTgFl7huTGSRzf%Bigdc@7C($z5}Ixu z&+SH{*{cMQ9-P22xXTqCd6g8Ydk_CeVI6K#ob_laQtOtQ^T_e(mgeSg`jY6-y~=LK zkT12CaOdN*c3DSrU|O{2WzyNWqI0&|!@b5M=i(K!eYd-MbYytL#QSr!niaZyLN81k z4@iI{ZNTYxA3>yL(Ne`PfWnGglgN-WWBU|9`6PGs*=3GtP5i8XwIIDE<({?TCd041 z#1MO>+PzH+%{Jy{^n`(LOCMcU=jwH&Yj8Ic$7a}VV%;R~NEc?O#o+!A)Zl6GvV=u? z%SQ7JPiIqO@>g`Qek&+;gUeAvPqqaO7u%EAdFJXFN=aVDj%`+J`%;{05!jI?u?`&l z9mun&mRAt|vrfr7>p?`c(1qDU=N069p}i>pfdE_Fy{$G@Y;*uCMpt$$^$n4xig>VR9JTeN<{to=L>PvfKv+&FWkw#?Pgj9S#c0&Lx8=eh z%Xs*;IRR+(3q(N1QA=?Yvfb!HHhZx)QCIo(!S>`w(N+@anCUI#=(;qk5eY<0e5;BM5)HMmI~xX@ z5;bgyZNv^u_9KdCOSBuwH6Wg&V5ComP{v$%9SMJ3yx)^S|2VIS4wJmKg{XHBnYbYJ<`$(wh2%aEsXaAD z5$#pb{?|Akjsi9D`V^+aZ!S^{$cF@nHi#<%JHfR3WmF*J1LPp~(+qL0p7VD$H}z3^ zaYLoi=R0uFM1qWRUFf-;TM=5p;{=s;We|HA7@6ufV>W=J-y%AuAX38pbr1d1X_S4q zr!bl&5^*V1jp8j};5IkU%W9(qUQB6{;Mx<&KdE557McI!RR3nqcF28ek(wY==mFPb z!r?offF~y=N;nZj4Big>f@zY1!K=R*u}pyJ7t{3}_tixAh4Ha)&dcM=#O*Xk{x(93 z1o}SUsii~`H3CXbYpC4Rb^8(;04XUsU+6y`mdQe$c=&}N@isungmJB7Wp*ns zs}iQ7sx4OPOI>@s3+;TO66DZLde=OJ;N9I_Ms6;QkjWtPx(W!G{&52Hd$iAfg@aEl z9bHHh7LZ`aVBJdcYh;R_+;%(G8%PiZv4AN9uDEDn!6CH=h2|xdB|ex|0vls6gi?Qh z7yXAJVRbpYWW|n2LvYHT(Gduu;-Uf(=2owh|n$+1O6#G zp+(Vx%Z#qLEmk~{N)Uj$-)6P?r)9TV(gvhMR) zY!a$dpU+|W&{s!UWbjt-1fS0QmI@92w?Ov1ro7rO=n?5QPokm;lE~E*+4@%#2j)@D z1IWqoC5u_*x#30+2l}+tW>ezUGZm5lJ?iH@m>yGqEyHvCdQ+g&DwY#U8+okpxITP; zp?*kwG_RT#wfBIIf$@2l@3h9MPhqKe^5W9?!puhy>ELr6)Gp)9+9~DMSazjHW-$~i zVCMTG75yUMg9-Fgb-7HE?`W(+XUUD;fAuch2CWH-))d;+m2HFLZ4JN14HW2r_1%)^ z>200&&b^*>H$^pqXj()YCel|E6yR0Mt`xSe_zw8clg)A;L_Dlsy!damt)KnmcET8L zrn}Bop(58yCSfRbq1F#Dq++^K-0&2C;+Mhk5`P@OSyt{#j`mesl_tS5u2f3AI~uCN z@z=4A<8>OaIr{E?^1*aUoY?8=GFQUF{8zz^pSi@Mh~;0t5qQ-=^~BZGItw$y()ZRY znNIk87l$PEn>*SEm8f&M^xBI_;nC@%=CoT0E<-;(U7Hd|~I70?yfD~ZI8US?L7~yZY1A!jT<=Z-N%pb@Rj$4k|w zNSW}Bw)&3Nmz3^?CPu+O3QR5hq9c1B;HHKeOj>Y~R%&nU%q9@c^9DGG9=hBHm*+H~YM?xfU0bgcgO&JfkZvbAhjvp+ zo1rG?oLS11(kN}-2>>hAPrm-^J;448TqP?!ph@BTiDh#-@8hI%s+v$_QF#8^`UC|S zTMP@0OPDs|w?w~uup_lEihtx31^pJXXMnI%+>8}u*AwX-;x>}1LtXnl|6SRb&2-iw z2yt>}#vtsGoT2M##a@8w13G=CHsneY%CN`mgU8;p#&EasR-uq4POcoXqH5@2NZ4$d z!nYJtSJ@)~Y{6hu+f2FyLDRI`@qZ#Z9^1ENl@#I;s^4c;79v=w-(^`W-t0}@nCu-e z5-t9SU#zkGRXF&qCR%2kxG1hKK)D)HBGmcQA7EHhw`r;yy0n3^+UdR;aSLwtakAa) zB>6k%s6=Fod`kcJKY>R7)VQK%zs=_29`4=qR>zHAG5vt%eRGCy?E=pl)(R67vmR0a z?vNntY?PD76XQ{<(NPj{#@u|`^<3@8kAjh=Ls1Hq+{ivS1!M~0+B#t*8E&hhPN-fw zc~Fs$1~jaEIsCQ!yDAxgbq*6Tp8szK^?r^<(=1DbLcZPN#tq(IS~XhxQKZ}w|Bd?Z z!hAzZQ&!n%Bkzmd&!6hsIrEWoVrNj+7EZfw+q7vOlz;v|j9FLWy2t-b&d6H$pC7<%hW~d|+J7_$ ztULcFzV6#Jeka=v-b46H=mblHtPm1rM%`ZA6Lk7n75)(`V->i3zQ5t}u3wpIp#AE; zouFd0oG@wXj3Y~L<&TwOf{l6@uIEL?S*;P1Re4&I64+}|t6`{WT4=mjct-JCmf5G& z9wn~3WopVD>G3^@v2<>$Sh*t&qu`E`l{!fw-SAm2OBvL+8r+nDZd!vZG^_`|mujpa zH$9SRgQzYIyBvZXOi0ulYIPs2HUwrHt=(&HOIvq2D_0DxLb;qtC#!es8n8!ovcc6- z^OL29L{^gs%}GOJ4T$#4UH)srO3QKL25{Q5E#~v z5P?qyOpS8xDNA*bO-$n~Z8dZlw;z}XHZgWe?#>>q7kHR;_98PYJkh8)HRc5Z<8Xn3 zbpATAb}e?R3ya~Pz$y0%0Ti51=~Io!gWQ$!L~g_Z8Vq$ehkRbydQIy!({3d-+Q4hg zTpNp3>`hNHQWhSE9VF+IC7+d+#|#TlseOslbGwhP4x0k7dDW!92JS~#?{o)_PFYbWqhkYd3L9ty~+S?N3 zg?Yl#3Y}G=t?93B%SZQEQZfA4_V-X_&trAoe8pNU>Av)(~WaS3+EOf`~giyyPQUu#7mI*Bj`Ot|=$@gKBK+rKa2WUgMKNr3)43lCQn4bBofCv>G-LJTquHg?n z9GpBQS;bg}kl$7`CyU;lm6h#h8=I2b2jL{G2j^TQ?1kE&@*O+<+$m0|D>K>v7!$yS z=vQOn+2C@yQ4Udg!6o-oPmUOEWD|hSx1rGiZqlp;(L@f%J*K18HewxsXFIJhhtFSv zepH=2?d*=ebuK$rKfs28$v%j@9DxHl;C{r2321o5Vd-0IIWK{@NzuCVZA1kkAdDdF zN^%yVY;qXMs1;{NQzS=YfMaV9(@H$6Q>vsKeb)yMs{vCx7zB*>|Mj?4352qagu(lc zY}{}{ktN5XvciXru2?&Si7>HL?W3n_X!!Z&WI2>fBBGxiY!v(592Jpvsj4iqR27?Nn#jsS^j?M3x*wm|6FR>+tWEOs!bo(O7%%rdW=DQ__sJQzfcH1}^GLYWONu_?Ejp>wU_%3Y6D7Cfn|RUpz?ukG-iFdKO_hfwuCnRI4=RKu6)V|%T1oJ9M& zF2@+B^s~Myrbm2(m_akyu6*zMo;$W4I-t@`Prl5Ta&4m=oz^1$J_e4=g((e(I_U%F`hdWQ15xzvhjM{gB06Ca2R;ru zYCyS#D<5M72~N`yTEh3=Geu4myLemfw^fbQ$y1))cAuLYD9h!FM_hlBU@RlqXy~TP zv-3@951~1>mXx;o%ivgFF2tGnA)R-7qG5V-+j|m?X9pIIXaw)MQFPYK%{4WX8lrRI zKusvOcc8vOUPqMr^*B%35Tsrk3JZg=?ztLc9{;hi)w zLZ&wDwaB7J6-5y92A~M2g%(T^C0KyDL5t;C;X(aP>^T|Xek7=_kO~96zr*wOy2m~g z3H^;}`q9A~=(iyhz1v$_+q=LKd*r|SuENyz<|f(hTMukCtLN67gv)o^h+K~Lyw;|( zAMIW*dF<`&x3ECVE}P*v9F~ciq>V2wjr)5#I&P2vkDVV4qM|1oW2k6RKbsu)KhiL0 zf003UA0Z*VpddB8w3{h+871Y$I>gr3a7Hjub zTADQNb@m$#!x)l-nhW$eE>*vGM8iqX8 z!SOzyWZ?;wZV33nAY}%_mm{mUK3QmyvyWlzxcK9fW9v7qlP3oqKAv2}gg*;(Rqov+s{isOMiXp zJKjGmYl}B2>UtR~=dpX2i-H?Dvxu9iRdorztgwo;!M-GJy0l9gv~ zG~DMh+Bl70P;}9cp}E-{i#LqXyAHOpp3fh<4sD&SL=zO$Rp4K^Zp0l=)@VTxoIlNe z{YjK{F<549$o*ix#s-OUptu0pkXgVT40ttyGPdTSPQbhYy(G{PD07-VGQ51(I^#QU z1`M?G-hf234@>G+I+IvUz^Iri{_l9eL{#VTo6UJ*+mk*70>N{_(Nx~R)3(=@Rsj=<&4QR+0FM zj)?^g`J4@R)$0b%%2ddd(JEyi;|s=O0$g7P5Wj5v_!EJogdJ&}9143} z`ds23a;|64#cn5e0FNJeGV&fqe4`HFg{3tqXsn!)FeOrRbG!&XBZ4l+=W}=G;zan@ z2wVlh`su?-Nz%y%U!gaashB5Q4?b|SoCbqJL^rn69V}feO&p2V(j)wD+;<)5P}@jq zxb^{K9&Ec}9d){MlGUqgMet9U=~T-f#lxCB4zJpB>!q z!!A)<)z70lcMCxbb+sjU)9Oow5}zM%8%>TlS;X(z4nOEtqRXLJ$P?F3o zNpGN*;vKDAaUp8@R>e3~ylaPNo7&wbI4Ioa)l%J~_(Lt4$k)uw!M3i#Vn8E?=~(4l zbKvgmw>>?hMp?(X6MHwLM?T+ei}@M|(J!m=jHGCxIi9GJ|8C7M{_p89Wf9K5*3~Fb z|6J1K31q;*aT9cN#Qg+v(cUi|nbXTBK$J>^$Dtk4{0QdC40%(lUk;1)daX=SY5*O? zrF+dWI*!WqW&J%WBe~FC2$O?X3)j;X{$ul1SE&oM@yPr@CSakJn6?8euw-Ou$#fxy zgyundiGdB0XmSh!!^G3Y`!%y4^f%u=I|~%tnmI%8o)s5=*6?)q$5M4ModA$nXORp!7S9-O)t4V zm*|V&dCCF1sbyJ_PwP@Rf57euh!I92lEw5=9O<7-z}L6%L;Hrj7VwDID$t;^G0TOkiKZWsgB?+41X>=7Itf3tgRh0R>u8nJ5kf|9-N}%jluALbFxo9ZX;R@fSDh1>y(>#RdThK9G zm1xW@hjcQ#i)O$d>GonH@2II!oFl;$Hvbb;s*e8s=bUB&q13OH7&ES9veQ78`I}1$ zn!^y=Q`6@fS{~T!!#bJj2Kv9+kH(%1W)-*Ey#DeG6zG_Rw#m9PWuBaxT22#qJYsd_ zfW2w+QyQ+mvdEP?G(k4M%YX~WO@@RHfWA!s$v^k~G3XKL6a%sgmMdf)3Kh3Ra}i?` z0xoH=Sq)dqgq3DHY76LH85IU7f(AJhdMFC#MU{a9RA9z7xM>lC_rHajyZ56B z${V|_nR}BBh}Lb-&UJY@FBb_HmNmgIqcGh01n7|SpXy-5P|5rUL+XPj<_KDdro^ho zGPvl}@O-DaJb^5@63``L76OeA1Kxs*I#=~pIu`m zEhrAQz-Eq)R{4B?O!~C_lf-;`!B?U&yRHCP{QA%vAp1&A>RuD$-dL&=Z3>ed%I|h5 zBeG_QlqTBGak-~9)Hp4=7{cKm{-H;7CNTxG@g`gpl(MYqfeK}X>c4_)0{+(ZpG^j)n7^?EXXdH4EmiN5>yU& zT5t*Mo|yySl3}*aD5A3rC3|0lmqGq_-e7*-RMl#;%*1uRyvj2h*xh1K zroLK;C~xoD3Kes?&x%Qk;j0_pAQzmkPk!yAm}-EHwlvD3Xnk&=6)rCB0ncAgbm0Zg z-}s&)d)Y?>C9_D7X!tF=VG9dP0t0BKVj6JnLIk2s7^U6G;rqJ#Qy-k?i>q}etM;PP z=s;~gSvu3;#0WD?LGLBin9ry^u*mWua4IM_tsq#8BRff;KCjL405_=VG`IrSY1(MR zjsAHIcMjP%W3h^|Na(p|qDIW$>fsaIh62j!-*ig<<69Pcnw!svz%% z$={&`WjzcQ&I{$F_7xsCVt0a*dyWQ-%G3(tR9 zm#m^l@Nt=cx(WKf9FYbWN5D5l&z5S@g0UsIE%p6>d+zz4F~22iB4Mqzu`Q2BP%P#&IX^}J@ z!xXr6$+&Q;OYA8~3Ch=sY+Z5rhxZQ77j2E;VOC?N7I%YIRr6!=_1)d2l9r&Hw2PUbFaCOp zDhA`l*9)#JCQz3W_?;YL8!S$X4?q08ui~6L)F3vnLM+rGlc3|o8f;dknXIZhcktqN z-MwBu9D;MrUo?L&Mg1K(_@z1d?Ld*A1OuwF1z?CTTcu)VJGUMGOi9!IU9ANJXjYGEeYWqh3uZK6?M2*#{isgn+dq z)ZhOdSTk2PCUd0n>s=t(*$Jw_@eB}L-D|HiqOCTa5H4+aNM^Tzsb}FP^{qi11g;7?j^EtqITV-h9s!!u%HzNcd#@U_JQk1pO>-a`S?N zV8?Wm4%Rpt)k!$~;Rte9i?z}UwA z9Xw1(1FZZZbH!<%(fvIlhej_78`WAH}5io+L z)825--+o&4en9FRmd3TDCoC)00*5l8C3-kfa7T&hg~hm$XqD6^bErn?sRb?)%My0N zhnq6TZ8D|b!5rr-x2H=Y{N^u*yb*hYG|MdrZ>9bA#fPj_D-pZZ7{u~(AT9CF)P**f zqLt-v{RZiOQnHTxXJ5xvyeeSaKWHiKQX<`|QVJELFXEL!oDPG4{)5WqmkPSq912qu zBJ4tJ^fNoLp1DOnDLJktnlwxn{8(WH%kJuP(?;qJ)7UATVD6dyNst&7s%Le<<$^q45tnWkuhh}{lbSkeX0@G|A5jSXFo;ED@Y#V+faW+zv(f~`>(hvKBf-2KVB#4VP8 zoa@AOhJqi-UM&GvWMmsvAMwc@t}v91JSbQ}{PkrZvff5l1(<5;`Y=4)fT+FA>ym+mGSGZ6bXNC?zX&z8^#jT^ zoru?iG+&J+?>Dj4K*@qcRx=2wWa#^{>z-~K3SIHMWtZpd2$!Af6}59U7%#Gj!<^K? zrxoaWMt;1a*J~yQ2DHbqj=a##nS+Uqa7O)E9nh!OFu~3~ip{aezAi^$f!n5yhPc!Z z3=&JwWd_}oEr}C4KUV4>pedEtY+M1tf41L)F^x6>l21SHvy!t4_}@@Oahe~l%8qJz z5*3(E!HSKGa0r2ODpu+b{p_NS^8|AdHQUg?xn@x-;Ya-JK=qG4zQO6SSu?YL^2tk_bhr$@>NFkzY*;b|wISR>OY^>sc25627(CoII}-njj9+i?GSl;lXtN ziDj0-z&IQHW0N!CoJxu5cUOF1va*=I470NhmFS%fOqaihVHp$IMaMwU(E;MB>_iYD z{MPP{2JriBBk}q3b%%^FS{zQuM#?klSQuGT`T7^G4YFhW(0J0H&oH`2hM%u4{ugV1 z85Y(1#*d;P2q+!WA)p}LUD8ql(jnd5-Hnupgfv5Ur<8Pu#J~(8-5{LVJY=d-#I$)u)UFzwO!5E8p*PI95R$5|i zj}s*o^-cClcQJr?Tn_bj0rr|)U~^^z;j}JWUpwtUlGD{f+e!DKmNBgnxd@j8hcCzaLy#&3|qYvaVJsQS|p6%koD;u$6N%?}3 z_5FzQ^YcA!b_&_d$4Fbxe#-5(qRdPDqPaLGH?OkpM!s_B)=U3t?PB*-YO@?;+)*n7 zfHP@>9ERI2SC%MgLNF%DBO|tli~(%~x|lchl0Css@SXx+euqdTABS;at=SFD^$i&>9_x{p@DyNwC9ac9mp_^!!qd`XmZ}>=;NGF>iXkQFUH#yIksSa$LhAAV3xoIc9Mq zW@DLE$l!m$pkDUbx=oU#u8VTN1;4cF?k?k@EheHUa<17Kc`V)Wz`blvao@lEcmQ}X z*2#fwDjO>|b}6}rB&P$0OCG!bTz{i-fak>9_yW=!0ZvOK*9wm8xF$pymhMMx zSltkie4-I}2R{7K!vtgVzE_oSKkuCfq2Y061qgK4S;4LSLTXvPOu%ZyKw&}Yf${lw zXB^a@_rY>>!9^XJz2g3Iy&)5BMZC3S&~}o5tDIGNvoeKNWFnMMx}7W!zdVtX2lBw3 zqubS0`y>N%gc5iF_rwH&Y>DJazAhhStka9CT8|=c7Ijo^2s416jVls%_V z>uHyHmuy|Wr4(TulL$7Q?}$C;w(7WtfS;SlNBs~yka)hK%McKmWX-7?m#{T`sLW~R z&!NE=*C4D}hC4Ga_93-z&s=#wZa5>xC`i zP-iKs*5$+1(sYwrdsEnqQO0`KdY3==eHY^-c#&vBr8E`kDrRDmck>3|&!}F$>@@qR zvJNpo0lqmc7WSu;bg?VRUZc0jwoyeE(9l4_Md^Fftuwu{alQ~#2#)r7gmPmftbv@L z7W@RhaWQ-a+w6ZFzJ|{9?9O{<+PY+u}!EePluWT_uS9HqxOKwVog3iEIy9@H(O+% zyc24VRcK+J3fp8aqJxq7LHc#*|h&AqN{ zYu}O|Mly@E)t=+BQsER<%aZ=4dxxB}@YVE$bk$4U5Y&HTkNTJKI=bHM0%10!q!2de z?abE}@)Je+y6rbzl%VgLb^V4ye!a`A-OMtx8RHA#23Fl$Qf1WJ7|VkZHEr~*L6+u% zciIWT8|+LvXnL4UKYuB-_qfrey5eD%_JH@iwGm!_o>NpPoI11<&edB4F?}vqm{xvh zxf0}+omjiYXO-h#8e&X=%;q;^*?>M=6@*6Dpct*Dti@=0 z_H`I0RDqIVtJd<$<@;PxxT410GvyP_`br|{2jZmzzXQ1$xoYlU{JH(*1&S3J|88Wy z)mHE7>)Z~?>O$AgUo#VC>GsMWaE?f>X zOE;?hW0sB_lh#&x%wNJJA+Av+V1DiFB^{i&6h_#!fY6xonDu=|^?L&hiFl>Dz?a-i-*Mbra5EOuLu6mR|D3KwDg- zP1?XJIwrE8fFr(}25yE*MY7V4C`;r5tl=9!~(H$|=$XQG{KCz3pO`zB`pT{!q?$-0K>^i%B>ZejZE;s~t!oQHvq%|k2CQ5myy3?%0MR4yyET3fcgJE1p zngX5dC#EgNK@YRsgz3zXzG6b&#l6M(6cGW^Ti)`8N^T2t_ohBSU++3=Z;XxiHFa?Q z8scT#zfafQXHLZD=%skn3K>c18ug6JZ^b0mL&zKc$6Sw*{Kw)>a`ih(62_8A9gZ$$ zXs{-dhVj*W5B_1z*}Hkbx|l~%&Q+<>49|5lV#JY-`(zOv%!CZl8VMK8|#B*e5 zD`xc|tpBD~Zh7qMiWu}_)~b%*@`XYDe5FWmt%xVpt6I!Gi8)$x60tLM+O(YA1ii&S zg!G)t*NAjnL&!uj8UqLF>C)6*g={>V ze+55I{p$!h9kcQvNFyBX6wOO*+g+kqi{x9J1Tg!c_KI5Sx114z?sV%S7l!#TQaQ=A zcrH$~CLzc~Tw3Wu^DKn;BK;E*H+7qh3GUCxo44pe+X9t=hS}TR3TIPhuaJbW65{8~ zC$dGI22lrT^7M&rh*9q(&Fg;NN~;WRe&d-{V=2K^5FVdDd-zK{S8`45qp9S6>VYtb z1luZUTL@J`dQ`?xLF{9Y{h8>|u)r5qY_7Ez=;qSjSwd%@cTRab7R9PyV?XnnQ&&}8 ze?gh{H{foY7!RvalVqWDVtq3Giz$ay5hOX4PR=gwM{C*?8nrh47f|5!$(4-R$dbW< zIbdRA9J%kC%loPAYNn_=Tu5g&pI5^oWs7tCt*qu}n#-67T0%ZZA-bSAiwB91dc(C; zfdjoiVlWi0yu$hg?5C)0EM4&1dX^To-TLTmY3U4PQn?cxWuj0;P#N4Lb1PT?FYkAk)&>TO0OXNRGX z74FK9-_GDk{tx3E>|2K&k1ElGPvV`d5n>bcH_U|=#PI4(QRa#ufL{?SglG*LKz=n5 zri|bxNh5e8py#T}3yK-&Z zz*PQEZvZOR;%^@aSWO?{FOarGz{S~=;v{v{=3`vg zHSy(Lw%$s_(=n7J*psGRpSVG#0RTuT;c{IKih1WQq*0dv$bWRueMf#&hD)dB;b3#U zRwxF=03k$b|CW5na0*Z(AN3XF{sjntPra}|x(ooX;G&?QcofPl6%@l_&8L(>rJYj> z(wF=50QtOawGFP!N~fj*6>R?x0J_^12lARE1~#EJFSP3{D8ahE04BV}teUI9&>!ls z`gHb^qSDILnd3ef=i}C#^uO@M_)A9y3jrOynBrkY$|7;pjd!M@ydQ)cPR@S}EZti` zTZl05^?L}y$DuX^arfnExf%9cW($jYTB0s6KzIH3KL^xi6&AOPtGJps(+@=}-z<=< z`82;-9;yV>Uu8GfD5ZqhaO-`51XLQ8<4o|)0couEH1QXD$T zx1w;>6U_Xs1pEZot;C~e?#~4%n*lBCWV+Diep^7Jh)}p|^9Jwl<U}8 z-214D;n5f@ZZ1qf0J#27&kkSzp(c$bQluHwp*G z>F4A^MSvJAllt4o1CL$7FrfC8Fqs{yzaj74&ZW{Vg>7fD%8%=W9q%y2dx}+v!Q*Su zFMVO!lRTYRcg=?c$?iA4yRN-x_~|-0ThdJQZKAPAL4L!l@RsB3zu!s~jC3)%DLYVb zK+Dc09e0S@9nnKJ*D8mo5AxgrqHM}MhDl>b9ko;Nx&JcGVjTMqXr;K)Z=|6(IrH25 zE1E2&n@N&7V8uRmEty90?pkTF`$!?9pycMzL4 zFYS$<4pEJsmhdM@YzFKvmY1Yf{&rc0As!gbeUy&(jbc@PIrUVr17xD27%EFrTCgnk zeRln-`}7~k-Chl14!0!Jwnkb9rpoi=3+;TF?YY6c`>86aeCWB{l511F$9LC%pDYkf zZ}}(ghuP7p?VMPTwfIi2LYe@#LUj+kjJ?s9SOKgGk2dB z50nOlsKDzS02P(C!+qg!8pvn$B9&Jf=jRN1Fq@7@@*M32E9k>WN^%WZz|j)P|BhCn@ksup#G25*Id+X2Ot~hRg`TeDOWAB6Yt_dWO<<&dCN+_L<0h=Kv+jTL3D14bKpr=zwal z=={RzGsrHDOg+BT`mNj`g{rDr0{=QbI&1DR0seiMjkA_53_`1 zQ)~BX*Fz`(xiCp1=FYs-;wC#F+Gw`P<7SxYW|;I*EhR6Vk>H>k<&OwTXY_5J#~n{j z3iaV4bpC0ghW+h}sr&o+qcp#}>TcFZ>+NYWn&vVt)Bhp_8375VUN$(UoUP7WM=qs6 zBvp=iwexbzy1e6fi;1;WL%_4HwCnggo`K#zrwL&$huL@yhVIMMI3pF}nivJn znO_WpF_SWqr;};}e&e331;UE5pAOD7BR0#-82zWvR0ygW#|oKB6}0}bpn}n&B=N~9 zyi`~n+uKnkR+A=mQU`GdqvP*an=fNElO$Dssx$epp2xnonEDB$cmTAXbG2O|p4DC| z3Z@^VPwPk`Rc(b^p6~FG+^PW>2fDLCrU|b)n(oU+eh@c>LMb)j9$uW}1^6^oxHU*! zE7`gz43)x6tYWDr@h`hL(Cs5DD?8^&Joy6uuf1zD9rx;Tt8irvVehJaC|a{UKaHZG z-%V;_oOnV6s5xB?4j}dK-o5+$*MoQXhi%p!%U0lZuO{|<&EL z5~MvS1gI9V|0-Ok2?6P4MbI!A5U8!({g-_P^%?xn!6xzl_u%dS%CZxSp+%=^}mh4;mVfcQ}t}!+2U#{rmliz*GyLV{bngW&M2}FF#Uc%&xQuwzUlkK z4OC~5Ky|;g^S9g%W@-{gx0@~uAV$0aXMeQTOgcX}&<4LO z%5c?Me*dR#ami-|cB>OTg#&k=;GhP5L^z(O)4vGF>ige|Ao$HfT1crV{AY<#tdNIm z+85RG_r73bSED?2`u5+KEh@HBqOcvWXv@2(r}-d0Nj^J`y-hxirlqe|JUoQt>g`f# z#+p_3V+D7H`?iDi0?D(W1xfk<&@{xm-xTkc0j&p> z{q$@{M*8;~V%14?t&hR7lLTo#c)5{Q)KONzH?OX!fwYv_yAS@~b(}WVkZIY**H7PQ z;sCxpTkSf1J5_`h6O+SniJAp`wnzOysevG~XNDu{pBwggkau%3TBwNETBZG#S1lz< z?!B-w)sw%t{SGpKT18XfApJ>}dn}LbCh`^g%*9WD!dm_thcf5u`Kob@y!NMpv<-Aq zHRQ#FZ4#(^67P73hU?b8TK-6Za~1mEA2H^%nVu}MQdJ-NT~;Got_yUA?Pc}^D}bbR z|FRPNPtR!OJo%Vx7dZNTpMD%CSt~682_S<5z2RiJv30;&JM~$air}O2WA(zM6npkzchC7Wlhd)exj99^y@Frp zbcAEqSX~`|Xn1&o+@=1}PeS2WBo7^dw4Qj>KQ@(nml^TEOAii5dTQ$)vKS!HmAIpR z;Q02^tf^Ur19%SF!fWi_UT)T3R4P8o5#xEE7&>VonhuPWbCB*4v%eeT!!i+zNSFNQ z7bD}Od)$3n%!(+1?0~64ui&aMRDU0q3qf+`Z{J%Dm^`$H==`#IpEJwa^AhWccec@*j z4uc)8wMC`*z5K@h|{8Dk>`D0u7V8e^) zkrUzGOUDt_$q@b7rtg7d@d>5qYX|D6*8UsKgh22oi*@a)Ez*G=>2$qs;A?#Z$cV(-w*jLq1zj20=-4@L#_2-zRT+_7CK{%n zM@v*CI-?NOy{_BMdFpJ`Q64@vSpT-u_R_E^xQjgvcITxj#y7cs${^P<1roD;BR1p7 z!R=q9J7t^Uc!GM}DhjJB;lkecH9VNm7Bt^F66vJ$x7M`qX;&Azq5Q3xbHZN_rp-LP ziV54p+q!K}^Rhc{su|n9n4%=516NAx4wG-Fysi`F>GrK@W*ORR$scwkeMD!Fs048h z(@@5DpF;tj%6&AB--_sW_7Fc@5JWo7P)l%j;C>$1;i3o;4V7F>$~!ob&oCdL0Mm*!o7)YNqjzM5@|ybDdUXY&&83gdW7!kqtzfw#4%EKxwL1i9(l1dFkr z_D`JK0fW>~-HBOu`z^k~bb*CWiM{xjd@T@h4N+r^ssU?y+R&BUiO4IAU8ew+ZZyP@O4}8%@=qD*Ja6bzV&fz)zDfMwz;!l0+Khv3;BsCmF zac(TZNROiu!G*eCPzEjr-paM!N4`tAHKnvtiB?D$S@_x=fe*#+N8r9aEGMhsGx5>? z`8g$NJ$ul+8?h(f;DRSpAS-@5n2Cl)irMlp75=@HQ5Kni+d#hcw`bk<*1^=CW2yeB z)qGo6kOeo2!xsu%0Qvo^n$dr&+gHhZ~IxBi_o3hZv(7bbMBSdf+4sSI=;NxxvFNQ>fvE%?v z*MLyKJtUWZ&16h{BRZ&wr5~H{b)zI)I9d)hcKk~*4j>;7OCiKEwuz*Miwm99weI4x?w3N=EW8Vn5lVD&dY=w@Pn zJ@~;8-yz}I)n--Mu4Ce{?=xu^9GkHtRT-pBdN980_uRc%x~xboXM=`k)UJ@Ne99Rc zei0F9g}y|#8AVB?Z>yOSA`qzj^8(9_Z#(&5y$dgW(@BFXjh#m4V1gxm<5dEAp%)O{a0F2C4z zD_m`+5SMI4c44w_G0H~EEr-5jK?=be>C~mH%Kk!buw%X%I&x=VYxN*P?kkGpi4i8| z&!d2lLLxsVWe=Amc4X4X9Ka@b3ptq40vxoPrEMq14jp1(Hy0M*3(}zs6HEB}iZD&v zUt5DmB^%*YYSDHj@3nY8*tPX(Uxr2uJQK3Hy*pjJx`0x-X7GgAhykVSMh9lkZhtW2 z)V?=#Z7G7Ad#~r!>}Y#s@Mz11f7KnyAHS97+p9ILlo%Tu=h=|jb=Hyi#T?0x0AgWp zRIHeE4;|svHRn*W*4Kwr51qEmktI)c4$)z!M+z^WZOPV_T5yz@>nAgeOX%C)@U5>` zVR9+FT`+Q`;Bq+iXfkcZ2P3C6=_PhJfjkj&ovl3( zmY$#vubu|G;o!YZpcP}kt$H8g>(oFgvFuPoR3f}H<9l(LUl$Dsdk6Ti3((2<(QYq~ zG?0aUhkaJCP?~V7FCG=ih{Yog+lfv6@(2%mM){)J1mjH#{w%1m5!h@iL>2*3%tZ(Y z`4HiU9>Ss#H%Hx717D}I)AtiKM8?b8UgE0R2OECzm7Vd^>j(UlQhC)PHDAz7rU?)u z9k9Zl3ryarj?I1mw}Xf*4|PWpVH1%`%-!tvuk;>Dkko>?%7}J0Ks=OO>Tp(S5$Nd4 z63f=0EN*JH?ZA}i9^qi584>mcE=g`m*w6%6^A`($ZsL+isx0?->!c>nZnVXT=UBl* zW0$W{`-NBeH#74TVzpPZde@$|!9T_JJZES!o%FC09cRrd&1|^Q%9Nst)9USc1^(X* zmLb;ce@K>=igTHu9fkR_3B#$bA1Ss&U!caUN1L2-<}lE6IWkgF5%q6pa8jI-Ty|*| z4fak%u|y2=vzv*hnBD8Lk~)C-81k}nP5Y z4@Pyijjw85YmS>VIX+K90EC;#Gj*8MIWyNJ0WKD8eqKt z#=5Xs&yXN&5ZuH9dcrDQF^=F>1%$vj1)_kBjE_zLMZ#}7I=bTcQwf()#HXGu>mRI# zsBZ?J`MZ&+$JQSp7g8NbqItWZ(^GBznkqPx1SWJbBeW6a?~S5I?o$7MW5BHbKQLe? z?AMkg4pp+uMMIxYA7)=xl`>=~Jpw^9G*9XZv;2t5bsGDISvsOcU^|LH$HJ`V4|A=5 zwgZ%%sWt;r4bK}7L@kwg!fb%x8(@|Rl|B1~-z(COv2m#DH4f{>W%GD3nT>=3ITf8h zF3pXMY(gOGrUv_*c@#wx+=(UzEj4y4((@j4mPIu}Pu8}~b2TxKWE+fE5-tsZqTK8a zO}oLIx>|HP!Ix=U1Y>imwKjr8U$jxXp_BM~2{fdkEgxt1sqN7)p#9yYEt!*wB`prK zVrjnu-Ms1IvA1E~Rd|00HL%?*me+?(BZ!AL{mcT=aJUd3|I<|-Lglr9`mDpC=uv~Q z(YGs2h&}F!463HQd+r4HceCpI3-{P&3$0|R4_Dk6L*-qN@qNuMR32SMciy-D(`H5aM0a zTMB*!w>}swQUo7Y(hX`_9~_1P?f|hfnLe{zi9BrIy7_3F-9SIUS~0-)h>hiw-Nbnk z1|F45#uE0m0g-?^rXC(6a97p>@8GvZyjbNkd{*|%#m)wPbWYYby=i>@tfP%WNZ^{< zqvs=G4r7|!x~3YBGmAGo8;dB{jzNG$tm#n>n!7a(2s@t#_!lZ|kUra`EJ2vp z)Z-+KlnKV(FC{I_RI|8=uyCycgd&sz{Fs7v$^!d{ZYl zInxJjjUwVl3XrW{E{b~n=0KPVp}I!Q=I&PhPWTvpfgmx&#kSn3%Lp$C0p?AZN<}!P zY{e|`v_VI@s2T^Nz6fP-ZI3(12W>Eg`f*~ENtix>e=>R z^kX~dnt=gnJ+l^qS+xY-?N#riR(X*C2^Am{ZfDYA1Cpyw#8%zEUy&_;{cmVli`e71 zko3Z@RL0t9n~UjTLUG{;rt= z$i`zuw6%^4NDp`?)kKI!>BcP2aA71x;dto7h&N*{v%1hp5}Z(V>`!34A>QUl`QR#e z-$U%8FxUm+)nCtx?wQJxUb)uDk~A5Hd8{2B#73%P-;$${*L*7ygko;d4g%Z|??tXRNAh|wNs9ASPjq0ht}FBcXq zz#Sb6AF>?o%*J3SSfYz5(p9TQZ_3u9uc>$A><#-yzq4wjyU#MC`I!VQ6#Pc-kM1Z0 zJ-EyLHrQ7}qeut|mG;GE%axyeg)n+wy zb?dmHJQfXblN#s$l5$)|k1ZzLic4hC=a?e{%C!ZphG%9p=q#WeDA;n(*TtyQAN|qn z?1}>$)=Gf)Mq*?@qWF*h;m;o!KXH)Mi6O4hVu03}UeZHk}RGLO2J<1)*wP1x^_Sfv-#?C?Nz~7rcGlK23`m^zPfFre zqb0EMeJsNcOn2;f!uTmAdS>^|gHh+X{1W$LoDL~z>3%gQ=9IVfsTg2yALc&4YTZG> ztp)8^=wj2946pL3Q<>~I*kpeBL}ui@%D(43q5&@2AFuo{{yMJooD^fWG`dnQvoWgX z0kzYaTg~dmHv!DcfLMI0@#qNhz!)#B6tSnb84C^MIF^l5^&zYwNA25oED&7UT>3)m z=`}qm8RPpY1Ne(4BZlKSlI<+G!tO<- zB08j}X0ffN!>pPSLAFIO)w?d~E0FK_R(d?__|Kxbm^Q&&JKTA)L+v@rwTcLTXMYf; zAC?kFxTJ1{Q7-(v7r2_%?K)iiK2uy&^zKkOne1Im?ZsqL>)6Da)+#$u9-Y1f5?X)u zqwxp-kFB-GeuMiZ+Ej9E^68fq&B-H3&mTEK`gg#@0t}Y1M(Ou@Q0If1t@D$@8Gbfg z1^`pUPq9ru8FVy4&=vwgkAlOGjX0&awA$T`OVq4OCoRG%2pns!{aSj)AHQ15JFvas z5YGCG?moihf3E>DK+DpIq(NQvQEr|T zyVf4$jzaP#-+z8a>7+i>ZGt|eI|0ZJ(s9KMYUo~~1QbgjD2-r4Pp4nQIie=RtJJ|w znz06*4bJ|ckl-TzWFQRxm7K0C`*Vd;;jm;#XzB4cFQKPbjJ|?WO?aDs_b*@vs}Mz> z>%;gh3TGZ%7`bQP+h`?r`B-3ywG2qcJ?nPidW#pR!_L0p{K;>cF<7K1q26;Rma1)b|Kyom zN+ihkX-$w_h*RQ!@8Wta&{Hn@=>;!iSjBML0_lE;wyVnS=35_8Y&@khj+PsfZ{|vq zFW!hXjHdCFo|5Nt`#zMK{=fI zq{cPD*j9=@wbSVSbk>?fDXqUiu|d5fQW(Ue#hmU^v&mf*%Z`V7&wWTe!|K}FjOUik ztwmIXX2_G~-ey4Qk{(Gl&&WZw$`M^OBMo)<^|aYn7Te5BTlxa+&)ks@Y})?s3lWH? z#Sfqg0&xmcN{NJdZ!<-VIJu=O!8dxSpSpwcDH|$1BYk>}(vDqwZIPzwzq8)C;WPFN z#zm&^DG7Bwg^%!d5LAzH9-HXyg_DpXFg(v0CSv|ix#P(KY+v=43XzygV{H*fu^E!4 zYUqBG=jI*;1`O#UHx%Ir6cIFeu-nUIz@2tbl(r7oJI2@ewtQFP`yHm0sY+0#{~k3h z+*~(%_oEqBzfEl9&`=H{L>m!TkCmBbtQr9YSy4`Ekpb=#1caH*Tt7d*U3M-mP_Zov z4f}uGG?f)r-1N*{nJYSZOc?*u`l;vZkHsu7<6~z^`Xhc^Gp4#o4wryVrYnBd zp-9{ zpJRR>S;Qk}D{8Zt)R>sU|Jlo40BW~^VNUB!>Mg+oPHtg$WT_Z-`Qi2?Xazf$<}EG8 zfTT++?x{#dxPZXWzvB?Z0Gz(@$riI+$d*$G)%%$6O`01X(YV#Zw%XY(6vTJ~=xfZ_0jfk6$NMjsv+Ay0sdAzg^9zmzvN#Kr&Kc`LNXVqI*y zN=;2I2N;>8vl61cx4D)pvHh~E{20{{2t#2{asidhTuhXltAEgWoaCVozMi7?$a;^3Wnqma`j^=>tS1B;$o($?~%=wYt2A2ara zP@qQrIY!(+8r_NP@g7hH)ylm{R`M+Vprag~O03vpqra9lNU_=;*zsk!Gk~@ql$fSOa!3Io>?A&VCYnBbn>Lm6ZJ!#`4X1k`HR8807nDg1ES)3i=_uaPxg z%s)1>66?8JL)^rbsI2<;sohR}OuM$8E*h0$V9{cLcp*0SL%<73qu>zXepRAZ_)!;&U>A$^^ii%~bDEr`) z-9W|>{pUqy@6o+>gh<7`p4}vAJ6!sgYv^p7w8Np#;{O73u_x(_c|B)Fqbp>vx*dTwqRPEIIea{=u?-qeSLm*06#2%C(`Dg3&j9*yL9mx>T z$jJ2EBsynfU_jm2*l@z60`Kdb5^mblB?6?bY8Dc*?ea%B{sy?4`lo)gB}9j03)ndY z_;X46AiD?ed&@IxH~4s-o3&ty)Rn^1e|l8H0-|q25Qa(v8N@H(V-fnt z6FEi=VBKH^rXIhJT&^`ebRP9*1eGt3i3`lR4?0N5`J510I_}tI<>Zb5)wA(fI-kc* ze)6;@c1>ib!oGOy*VP0K^6u&4u$@FEhYb?6?xL`ths_&HiFQAHhGF_qH~u4-M$N~t zpR_RFTE1mtO}!#=6UrqX-?RAfP~QHZr0>;}*j zSvyS3%JQA)zEENc|4>v`(g*gw%yC9G%?GXS^Z7Jv3G73R`yM(MbJUUlHXC)8T5+m^ zP$C;hC*1^StjbGhF5A7G=z;C4p_gvbZh;7%O?U_anp4FJ&|CgT5=g z&6iHiqT6kES@(5}(2FGAHjqwjI8IGo!$hoe)GdN;7WQDMg>?Le_MyK@u2$QriAKB1%{|g%=dw0xS17DURzxt+e^- zjE?)L+QlPFlpE5QnSHHOx|oDFQ1A6rJ1~ce83(e{g%4zbqXrW6 z&`PNnb6lqS#E+tpQQ*L50e%b2kk`w&V zJJRQrc5BtvFo3r~{${VYo{`7$l-Lt})yt4KYlYu77W-%|Z7~tN<9D8Aflr?rLCi4! zK7&7B7|0`3_QjLH{R!6h|G0SRb*wV4#iv1lEme+4?lXjQu`N-=_2A2KBk%hW-ErDf zdGHm(l7vNd#i_oDY0`qZ;PQ-NyTOO9{sL%g|M58FnzEJ$xyvWv=M)Qh$x}cPPS!iXu}OUEBT?-=_H3$G?#4JB;p+K74JMV z1T!sQK>=DeUb&x~$w_pau|H=13}J(9)2Mlxx9_vUT(xodqYah!O%R9Kop)@mEJZJt zc>Z)bY;s^jNBU_Ftvy~9W5&7GPuW_=x=jXX=2Q*&ew}d5b7)m6 z`eNK}92qp}Zg|lWSI`l=r#1X?u7A!<@*wr3Z(CHevwYj0om>FTm^AbqzX~l8;*6P|*2=2iBhUf0RIMxe5UhO(k>M){d*wuQ; z{`t6osMegQyYiW)WidYL+dFZ$oP>B{;X%*pqqW)7h+l(T*B$~-8^9B^&uZgiY#~>= zpMHcLtVFzjGP2Bf?X7F#jyOF3bHtSWWdg%=wo{d^(wR(ydVBGu^w?#jsL`R}cD2?$ zKFs%77@gCj+~AxWu&S=}gxBBZr8gS-&NqjPrg1d**72c>?xLu2x&^ zHvHl?va!oDo(QL~Z>)bUl}VEtri~!r>QqdZi86m5W0zEA@3r{CRwERpQ+^x&4S^(w z_;>K`2NlJ%=j<`IbJX;GXyYn{!B;*|*1ML9Ep&y>Zt-Z!Y}=Wo<1a@6B#Y<_2V#=g zvqU9l(Gt!ILUZizD=va(J?A7`t3n~Zi+m4d=Q~332kwVg$=?I@m#vyA!u*6I2VMZT z+P^86>|U@TxV!jf;qvOFv~pTzL;xZ!-$8Q7GQRnVRbC%Rqa$EX)Zc-Rhz?74x9Pug zU+;W6J_N2!#f3UYfnBHKZvYUeje(u-Z2cmc3m_12SmhLq`ncYf{Hg)=p2y|&6 z>!_uWY5sr!vdOziEqya94mA$5IJv%~4*{M>LKHymRr#|gXWzFlM&OmAY57Yss*QxPljV$A)Zzbc7S?8L8fD{ ztBYw>n9mF5Hu^3mFb{>y_9o^3qV2t-n&{fMQ7nLph!q5+*eKFeI!IFi=^dm7rI!Fo zlNtrVLhnMP_Yyh@Jt7LydrKe@fk0@Xg_?2(pXYtQ-&yBd=bUxcI{P1zFlEo|nc4ST z*L7dFr{(|Fo|=PoN}^aa`j%OW{DZS^UyKgP?@^Uu^3@rg!Fk%eJ3JwWue$fX0_7RH zxYb&d7wXx4(UP8CPZq1vHyWA?4hUG=>$cgvoEZXue4*v#Yq9u}+jWPY2L0kho*wbi zQ?g4&#yPjCG9fpITx&fYR^D=@(Rj(YyBFpU7JxygHN`JDZ`}2P+WqFI zlk(V2dzv&I^Sv$hO35|4+Gk;hsMMc= ztmu8|)94*Nl`&73B+Cvx)m%U`#7oaOsQTxsbBs($pG)obQlH3`1Rib<)R~fdm*hX; z^2#G+O4f7tUh!Bpt+m4UI)1gujb)ltashfY^yxd_&nL`2CyKj$hBqanaud(}Ih1>_ zT*UqVAYnjS)k`e%S-uL7yT5WP&9Z!DXLNzF>imywQx!#{@>juXwd_d_Prby&^7T~N zIck$g9-NQ>5fCHl#w8`R!QA&D{32{2t>*)P9vs&m0tiXH(1!Lmlk$U2$sc1iBGa7D z(y;gYWjPF}T|}L^W!Tf#XQaw52cbMNL%6}{+;SS0h-O_KS+L@JKY1%0ldStg1*>!< zWaLsk><&w>%wjM9p1q6OUNhg8O#E@ZWaeX$+E!y0Z2m)|tmWE{rviWt(gASM$6qUN zo($TT4VFrBmqwJ%rWR(zEFZhk|7!9x0x*qrz`X}Z3hopLfp?5Rt9Tm4&IwxbAFtR9 zfSfrifKm4GT_OM+2av|>qOJs0{TF>chBz9nfWk$`A8u9P{-~G%t z4+wnexPsDUK<5Mq;oVjuJ`q@Yyp6BZ+YNNc)zaW#+u4%; zDo=v{QJ(M}&M?2*+^*3RJk?B^*jbj+Q)2;29&~rt-l@xRo0SJ={(&*vmy>vGDM`vG z+`zfH2&MawPUa0jXim99!y_*@{HGIaxT-AJ(o0Vgas*bHmlq`ywDUyZOOp3fFWLh} zl~F0{;}UD+!c zELDNsw#|OJvg%1q9K3{mUZ3Eq>znEG{}_h?kJvAOff#9veWOAYwlVV)cac`aNc>xz zMqiv?>s^S04l71fFRo5>@ZaoO@4`* z3C|OnMWA+nU-EtNzS>n-x)^+agUIy0qT=C5H3tcO)Q<4ue?8%@_;b>>_c~iy8H3`$ ztC-o@a(j{hLRa?LlDER2Becb}e<-&haoCWOxoHxUynxHu(U19TqlN+oTH+<8KMcdZ zj`VHVUGiJ>ku^;ub`L7Bz+T$qSYd*IV@-Nf`q z`9Pt~Zx>Ln+iB-ap1hl(?@Pv&ep5?K%Qo)(=g2Pkm8#H#3q=gGw_eiT6L!o_W3HZ( z&uG=<-{Z*|}SyKd*8{%WITqKedOO>%oLq0Rr#&H)oV zufcIPqj24|khM9#%{P}|qZ#OrOP@EnLiS$?&B_X&&|6!O$;D;Aah%eBG#$uT@Z-YI z4SIdu8%2nQsoA!ic!Do**6MuB=e9(~wl_GK zi3cye+`rlUBDmu!c11qvcNa@HI#TS4iifmw74C^TBf;X`R8B_sm~yb&;P^x-O~ftZ zTX#H9{0W)AcZ_6#Xfn*Nf1qjjykvImsx8UmU%^S7q@x!g3LNiyAhkrNA*u(9??btI zdGLZHAOA}V9fuMIxuFuXCYHhBm^OuW#-ijGXl1d|^2Y?XwFgTq3JC#z#>cver%xS6 z04IR)gTud-%2GZlza&R$eyqCkQzi&I?_C~Q@ZYjh^Urfb;1Of;`x{;Yf%{JczU~q} zD#TpqoVy*sKO*$((@H28n)by4zk;ifCvu`tW)1ZI*f&#Ngvsw^8XL}o{7@5qcF?C+ z)!?hBe_x`Jv`v1yl_)8pV^W+e35jQhgtPV6614o9-&~^CNpFu~xi^OY-IeJK#`=>k3mbMNNR3^) zdCE6y>5IiEhrst}PM(#Ixh;h*ee%k`?ay`tqLYI0tD_Ic9;iEg`$D@c@BG_-Y2ZIX zfsel|fi!=gO(h0*Nvh18Gb zI!a1PfV1<*w99%!$+5BA|M>Av&-o~$@!Lrk`xNWmT`22&JY&kd_+P_}Egr@aNAv2r zfE$OiC!G_i2Ygh|#Rp}c=8tw(gts)GPVnlO)UHj{sP|=?!5%S(%1NhQvh;WV8>VSopyco->Kow@fwonJ68YZ_Xnw; z;;CW-F2yCYr2oCImC+0HtHM?39{PNxeI-@6<9K3wM z1JiHS>ix-Qmu?*9(5$_3aAQqieCiQMjjn*bya(scDs%bLSPmtlnFpfqnQHu;YHm+3 zTR;5$EAIBO%Z;9y+2><}v^Lf81C@%%x(IG0dSuq0J81EY2Zw-0JK195IoHP&Q z#BZ{&3^j`#Ly4GUDAAZ<e!5{xi`QXfvoIx{A`)sB@IcpVJp11 zw2X)U<^Z+Zm%@+Me&*EEocGptr}yal4k~(h2p85vZ|+~FYE@F6d?L{^)3<#&)5|t|EkwYQ>!arcG3JR$PXM9i z!>hTDo5I2u013xyp;5mox8>2|=T$GmECS>n%&s?7*mPZ%mXki8zQEjg{#?x_fxXaX zypqOlmOFW1DvGj28DKl&NN&3B^*!;e>0tnTo`3qLcHzYnQ?E5sRtj^sk09fZVY+sZ z1rop(ss6(jEgVoonvkIRDcv#K@0)kek9}-b1LmRTOtY-tfec_iBd#pKHzLMJet+MK z!Q#&u)YFM5>k(_PJ;2?(xDZ_U!5}@H``&P5d(P!7o%5GHnR1__Lr6lUu~KEmz2RW! z+o_sAH>ttzH>4h9#vrH)0n}3u#TPNz`kdHgx(uc9$ddI5#Smj)tpDyd? z&g9LZcPhH504@dUqn%o$^hn$jDXIQcwAG`>0|a?9L9y>U{zX>&p$k^$ukxNAVx?SH z*?9fF?-K3Ff_tYg9_*QC*0s72>U?*#ec~CXZdN#Om6}qiYe{#H5(XBJU^_U4tL31g z>LVV$-4`Q}`K!UOXNSKPdq5JZ3h8HZ4i@np<}SZ=lT^wX6c-Wx#N`Vd)hQPJ$UpEf zvo9Y`r1yyUbCrlwLqFS}G{0iFEHt2el#`yC6oCmoT4Q@?`w@Djx8|m850HQ#kMp(* zRvCd%A-AXWUW^;Y#t~meA^Iz*36ctz?yEu77S2{Na@;C6*go$ps}_AE(XE2?#S z*LsWWTUWX&@<*xq#2zI~rIVse;NcL6nj^}{yirVh>llh5o8U#dXDHrH1wl>EnlOwH zhv`V0nd(T)TdR191_vKLjBoR!_d2x=v#89}W2|WZSKrSvYPxccOj^ zbU4u}z`Qsqc0QhuxxsX&0A z_7Fdif-5V7JgN6y-%U}nS88A$bJJV>C{)>tNJ2SM?-hY^Srk5=p8q3nTn2ykUrA6_)=lrY-?1Tv>0^eQeQ~rwpWdLDfPUNsc_%s-W6NIiKS-y z{;yNBPs|Te+vE0fK;?K$>X2YLce}GzP9O%v%wMR}wckA!90|U%E+9R5O=vMD(b=rH zbRHlE6*Eo_ z*uLBuiTN;3^_i4!22Tj@rpQ$}Cqc+VobS)J3}$*O|sK zEhTY{oeJOZDdS-U^6*L1u)}TY26o3WRqQvKI%O_lusZ;q*DRryDUeN4)D~`#y;~?h zlJmR1$R4^AH_OU1<$WrA#8cK1cfVF&8d2bA5q%v=jo}QClt~Zl%|%jp@v|FWTMHm& z7ljctn9KMF2-n%nWze6VUg#l9-)4%O{|D$b=Y2`C#;O(h6BJTQdBS+z!}I=Zlj)Ps zFJ-)@wIn*5m|k4G_bO9iD0^~ZRDrYtb5NvKsBv*HuItTmt>{F^C+?M^BI(8;hIu!G zX7cc8(5aV1CxWN`CnsA+{!?z>T0BXb4Fzq#-clb0UF|{zXihmCov8nVy5U&!zAik$ zA>=oTm9WU76uYJ&8T4n>PpDKr8*=cwj15^|)Ch>9g5k4ID<8Zq{XpASV(;?$x>)J6 zL~!_%FVgm)lO`>uh2aQE^}QrNs+d-%-8bYV;R(Y%o3w;oBop3s zC7b#DYdcIERLK`;m`=O|kDl^HhG)7^b<9jJr(YxgdWgjdx?ho4WRF z+KBL`>NR94-qb+6c$6I1z4#D0$BF^72(gGW>uNBTOvzYQ7`*>NaZ(DWQJcE5X&qocChpRlMV!9MRwC1oB%8nN#cOtOLu#9KQAz11Uu5{CnzOGa-?q z_<5Sqx9$UcI%+Jl6R`y4QpBu3oprxBW3jNXWG(1ZT zE)87AAJ(QvXpLsJcRcR!xn#bp{z2UvsFdwiO}Qpr zClg=0JQ@$Xr=mdu`3~O|6B!!iF7vnRbomIt%FbZWlp~->t8Q9mDOu{8QCvKk)nCjN zThm}qA6P?N+DUHB3t!$LO?zowxg+q^3ZL=?{`IB<&(k!qXP%a=j~QEpW=MwR{O_M# zIm>35eSj)T+b8;W_KX^akoVLRjOk|(+ zuS|!j6gmQAo9Zsk{g1@^EE%J}f=ElH{fB zT135@v)`39lfEA;x^ptc@Q;{@*`?sKo5)}96LPHW$=ZkV(#8ORSQa0Dc?=FhiNVB znp{mqhDc{TwnQM=_2IKM@# z^0rH#__kn7%1d$LDTSbx*itU3tMX$YCcu&O4Z!Y~Z~wotM00f2Hi4 zjKU<*f08q8<=ah+^y6xHN_6=5%fpU5xpF#H^SgVbc*{LjnqRWu3$<&~BTodPiKD6$ z*s?-uU?QbGQDIngWPNnwlJX&Ov4vO~I4Z*KeF#2`-FxwW5^}J2TfNFC&&&n zoDbjZ`5unRT`@upXgSmx4RDYeGuPm6()Pmrd_S#2c8!G?M1PNKkK*uMZFTmrv_foB z7@G2o9!WUq4aY`ZA^O*2J5^{`PSMcJGo}=;q+rY&vg5lq&^#tbuX5gfvy2eu1)f#; z_VmKJl>o0L_$wXP{YTy=8s?-I@u4uyLBek_+(a_4k`_t=|?jSe4 zm3r=kreqc(%VEUmY#8wP84ID}$)JR^uR*gTyUYQ^z<@ zUvThYgeLwZxUyFo(kgBc%M*%9S(m>v`HH1vI6Z;5f_fK1!RrOBegOJm7hDp^7x@g?d379iGom4wY5au2B=QX7CAl9Pc7Nt|S-$^lC% znYTnF#f_@+q@*ar(3HK(n&Wa zj~hC5r1#oAPi>vl*t$J#Kh}XZ=@~cX&~$pbyU_+~^nQlMB&(q@2Tye+4n>_X1}-fo zax^qROd?ihS@67Bbz-_I3l+3CQ%K9eyo4mBQ2$U#vrLdl+8*VhSLcX})a-nTUf1*+ zbW^X(#WjwU#;1emduSCHOYz^oTokK!>PA{sk;g=bJx6lWS!?rj^AkE(Ot3MvT|TZbR_cxK zCmihcT(*(G<<9Mt4``M1%|>%rnWA>L%RsN|UCUOzG(QzIKQLvmP!p!1`Q;81=73GV zHUxb|E)`U7w+u!ZI=_U*U~v+v%BM;L7~uXgbp6L5FrB{q9F|3z-?F zJ++!ji}as{hdvz+Q5JWm&EenQkol&4y_%K+vpD!TXo3B`2L8M)H7|6_U7M0*!tWIh z9Dr*YR8SUB*VMwr#GMhYJ;K6nEM&NDh|WU$Gz#cr`Hhoc8V~Q4(RXmsMd78~fq};2 zRZkZrTaVALX-4d z#%Vq3_Q|o3#g5~SyszLqxhj+YuXj_81DemmCJtt@*Jnh!|a_k`0d%?_50G7r+#pBd+Sq|A_ zUjUkjW)<}H5sLnr0KA1SzJe9|*8Dw8M=ya4@d%{nr#R}c9jOWlZ#bd^tgSO`5d8AtH0iBs5wUrr)&m-7N z0z_x6Xq=?)G`{sig3+DpSs5Y_ZroRwWpU^&TJvz^T-P`;CPklz;rMhbiUMJqtT&#G zyi3w5k;bYLtd$ejY;;qCq`xg zid;=yilO7Am-+T`@n>FN!^)c1RsAr_PrCN{X2VrPQIS`~OVw#x(Q}0W!t^;xctTJT zB@@Qx550O+sbCks-%+u53Cn!P?4@G8098|GaSTQDb&4b|{mgL|O3mP(0C?PNBg_}O zd|D2+yp`YFRaV>w`$OI^FR!_lIPlt6te`LJn@`(9FxT~Fn)w>9^qUsz;qJg_#DZl0 zVBdrL9gnv3C4)S+Li#ggaz%M{@DUv&GINX|v5cXE3air2f|(-fb}{9UX~ccBFR1Yd zy+aK4>ElMb39%x698t%s*E*cKn%t^c8CNpK>kG%1)p4`Ofos%}(@Mp;bffUq>f7{& z0qDV}YPh9B%YykwLek2q#fKT z7J{&o>iu#&`8sh@0vzC)2>m`*p=-CNHCO_ADl1qtvh8W&Jl^7TPGQb251wATG$qEt zQL8R$mq(<(Y7iG5p6b(7ayu2QHKRXo*$Iv7XCj?%HcX5=c|7oDg?;bfRx|k_p3K&= zb0IEDDp1-PfB)^H9S;G2!36O89@_w?Z8f+l|u_W3d|(HS59mSB6^ROeZV1(X-)P1)nV zH$P+^ZQ#tuEvT$!x~wB#J!T}YbvbI7PT({%3r&r#xgp2Wnge|*OAuatb8cLi`>IBX z(SN&JJzg$>+70s27NN#miN`)N&xwMkw!07h`u>zD52sM>JV<>MjNziTx618+?CUlb zh?D=sM6LmkU-Ty?sbZ+BZ)dRn(@?1uLsg%zE9EsqiMo~0Q95>nrNgW*~_j-NV$ z6dtZQR5f@{2#@as1951RB>m!@nS_n~xlBJxNGVcdS~dm}`L0baW4~94U;$Ub$rXC^ z{k9m!#iq5X z%QMJVIaa=`Zarcm#b3QvY6S9-uX^ms>f3+7AJ)bR&2?nK25`lSs=qd5;*XDUH69kA zbJ0;96rbvcWZp?*0l~FE6`xKQ2bvS7+bZaLAiEso<)b;VavquV2029UL~5*mAjA8E z{CrF+nLAZdL@)YK06dO8T$ySP_r2i!2W8##qoFoXfn>AJw9DZt(5G?FfLMNzGK@X! zNx{pO;=Daffhiqmif(oMgZ4^rMi3^;a&t?#;KgS9?VUFwn;bfBH(*fy z<%$9Fhr{j(YYNoEJ&KR`&;HNqc%PBYtkn(CX-4bNv8Jaco>_FhCI^j%)`*iJ-pCoQ{{J4_X0{kmp`?$ zF4%6_KHDPiSF?`rbn#xKH^$-DU)5UFDi=>!6y>}y_r7o0PRvk3z;W7tLk608q%l28 zUS5EMMAATZ>LC$&?vt-}5``_Bi_(cvN*ilCER?N^X^eTO`+7FjPMu3msyxMQeZ&&6 z+cdsbT-ULp`a;b{Do+TnY2S7qx%Lpzw=yu#^KFC_Z18Y6`e(DWNiyi3^P(Mqi7w>h z!@%Fe_N2tGR7e+_zG3{l##LcX->CM_$tkrcJq7kgDsY{ivbevtiWilknC4=R=4<7h zrSLkcDLUzs=6e)9ouHMBlR`oBIEmzFGpB-`X)HoQRzoJxqqGAn^Gi#-$j3&M6%32@ zLmD$T7!AO*Pa}LPw7rBq^6N?>N14v3JRHH0Et6Tn>uI@}15MPTMKQg6lUp@Re|y2r zR4X&MJLHhuwHwyz=*0@A42bOL5IEG*E~G#Lab@W0Ai*atQyCxFI^46c*Owcya0K-#^FyO}q8K;==q~ zMfxnSt2DwQ>Z&Ki3bV770(MvR1er&wY&yM`NBNOYBxw{oE2G5&h|3EQ6XARJh5<6x z==t-dWVoejV)SLlQ!>ZFWqmUcS3c`J=?ax}AE%Iy#GOa^7}+H>Ptl#%RZ@Ca-Vpwh zi)M+BMa0U`#wItKQ*IfV>r23_A#-`PzfP9FWd{P^h~s!Qg$3AJG29(n4wN==8qQO@ zCnR*Yl8(l&_oRDWT^*{{DWO0MS^#vf@h%K_M_alD?D*RP5FRTUYH39+FE8(WJH_M( z)W@MTGb|3QkPbXC9vRhod3O1(a{fCT;Vxq{M^ik&8Dvm7QOn&&=$UQ*Km?-i;`;jM zc6N4dZo4wK20Joe9iJ(SI>Cg#5Z4-qf!$D77GaCQ)R97OT(48QtZy_o`@?F7_KZsb z#;d7S4uxZ9s!vR5Y#+TOfCC`tfN9KP`iZ|mch;4f;j}OYmcw=sl?XagC@n4ZKHPCa zs7%;_t4)vJj)83X&ViS*o`;FT7E*+9nrfSYNb2gFfs1bidN9~sPQ+eA%fvRvzgv^> zT8a%O&2b%pWP zpnhWJcI6R!{;jwF4!+l8AfK|D(|_rvR;IiqkbBeu6@X0R70NMAjH zy*@<3=PBy=qQb zydWPEJ#Fg0vW?4^^Sf(~hv$p_fJnS6&;RG9MnzewLGZzJ_Wix;6c}hozW!?t@5^zu>88=T-m&r$QY{PvOG7EEbfvZ z@CL0Nvq^H;;%pOUlR!2M|&sQ(guFhy>hXXtOz_ zq~p6x)H))DA*~e1L!poYS<>bg31p+CQm~!~W2%^u@65c8m(wxaQW1h_doO23lKW=E z3O*8lgNpKp%s4d8%@$*t9$A|@bIqjvx-7f3TT%Cd&}IF&McfO8F!HHMQm3fUv(30N z8mifHo$Xp7-q_UYYerM*+&i)HXYQDXqptdX)4>co%NA}9_rp|4rn5diZn8{AHIICH zUmPx_5K0gb?Y8M9nV?RcSh)WLJ`>u6J3rw(N5I~HOdGJb{HE=U*1@Hr7{XA@MSDNP&U#nMYu`us%3@v-Fz%;rxgxa;?bYs5!y%|@N3g@ zm_19_cbOIsTSQMcD2txR?TLR#XkL2)4;~KMSYNn;X{PhV=Ae}cp2L1*)Di1c$D}lB zvpqA#z+^3GXSCSh9v|OE=h^D898<6`bS;Mb5h~#>Q_`BynorNQ6aHX0AXvJX76;d` znI_Q#i^XRY_Z$gKA4~_vbgPItJEUFK$F>qtl?cVVOanv>ae)HH@i_057Aohpl2vn0 zqlbKFLX5<&*vdZqk&NEGB6eRM62V4Z3n3>vYN(%GzO?oTC?X>deqZaGfTfsjCN`u! z%<=88G23t{1c)1UIkl{~1J^q$pCl4;^w zNP^74k@drxAXI}1n+(s8wfSb^S=hb0b?HCl&pOiTXnh@SJpu3ECxS_uo$W{Zu5I;i zAxxpjYgq|SzFBKYSjbPV-LLprob7H$fNGu3gsR&)#YN*H)|g&n@amj(HGt}TbZ8RV zZFM|d7U;Rk;LW zi;P(U5f0XVPxOrqm37mc&JmJ9(X45k^LGi1oPq+a6V$kiQ`%$^yq>#%0&TK>vmt*U zC5F}5MI{hue(vqLn?z){I3BJhT znIs8bsQQUn974UeumM+?%7XR6!onzk^dgc=0i)$D)Z$Onx3P)6@X{{$OhXymrqfVr zvU=*P4Vt)IT2bGouB?OqQ8>(Dx3C&_YX7;21} zw;-2Q(px2WjOPkXNhhd#nRw02?{DtkQ(GoM8H|3@R}J%zG6qdMMx66{BCH|FqVG!LCPJF`)7&Pm@E9G>4J&w)w1p^r9cW-KH{ zLe1kPG~tfUud^!PsXm|PR{YSKW(0eQPT9rrhkg)vaPZ8@;X zp)Q_Uc!wd&Pl4nr#?bAz(!YT_X!b6MRJ+kb`FNSBAipxp{tK(gBKd0)+q`T3@UZ^c zbc4Z%3mmUKL;NJ(yQadfq)#M0ht{jca1uKMb{wVovoxwA#fc+te-ZXg!jqb|21g$b z0fB%a^ukFuEq|f4ocIj>KlOM!!JFVTH6PM;!oB+91IV?`bjOdj#mag8)I6mqT1i}1 zZp{6QxXIudNAuHnOUk`QxxPzG>Jv0Vwe@Aveg_Y%wqy{%83@@ypBeEKFL#0ndFhWi zum95O&jR;UNy^$sjKb^3Of%#UjSatLBw2tvwQvyt=vw)%mcCef2rK!La)t)L{mM|M z+E}h$v9w43tf~241~WG_Y|QUUNnqYXn_V;V@3!N-ijgzTpKbLqa*AWVQ+-+RIy?~0 zu9HNufZiL8SJN+j3BGM9{NO!f&UqA4NRH7m-ioN^=E(iXvKZJo;s4 z_AXuM^UAqsDZ-iOtYohK>_R6v$ymLM!kY3lG{%V zQxH4-g>EWliE%2Mns&T`H?_PZbc@j8JL8*<1!!J(Jh}apxRhRcYAVRN!9;u$KCw$X zr-ch3pg98aZ?=y(Anm~QbWAeEr(`d;Jx03^#=YY=B!oPhT4^Q5xqzL2SGH}!XX6`= z^cPVs+xvC}Za2>U6F9mUWPw#}d^r?S_B(%N*GvHA3xVozoBG3n21g3fD^YvVOCJnW zOLnkveRN)K$7-_ccNnV6zJE)yiwJ8IHHWKLy4({`U>uOM3AgC^oLM%WCs}q!qM?SK#!<)xDVWw`_b&Gi zWn#bKM*fx@JmJaF=|9B^_?%o+(2+dNH9|qpFQes4koxa+u^&l zfnc3UNB14_5nszAyuu6GTQ^ zz%9r!qA>s9r!3r9M@OMZ8l5r7Cs`_PmP#{LfMz7}xj(rS%QpOs)q zbOo23&&YP=oS{o~Qm~ogD$A3)oBAE8Gk(1N-YV3@ZMB&~Eu`uCZi@eUoM)99bj~s& zsR4ktS_>x5bGJk&h zD`FDW`~|tMCKnZODtOQ6?o1ZDa*el|^AVe)Xz5`j(Pp^ec++BhqFrA)G+pO`tR?Uo-RLnJ(*L!ekg+@{z0=&9(&$TAFBn`1+)6ffPwpmJJ$-d|Y;<%9a5V7W zXrrI`n(X}pc@~{GBmv)3wv>WcAz>+$g^>su&-EPP3}jXWi}3Qo?KaT7ysK0`2rM_b z%#HqENc*opl_FCJE2uYKe$KxI+0LuW1vhd-yRO=b4sk=(MFkgF!Tdj@+ z*V;)!QehRFFD0k)`dNX;~1@}{+^t6QsNuU^t#SmfSK8ZQ-Z5e?;- zNeJzkGE08r$Fg9QSj#TTMdsC?_n>ta+uM4(AI7U3Iv_rLtZT2AC7yOaf*i1OEQ#La zy<7Y%qXoGp=SJ8b#nf%U`4P2!Ob`b) z2iHnGAFuWDLL^5*3qc2Sal}VMb1@JeJ{GVKwgXG`L@o2QuRX?B@cUoL2nf!bXmOEU zvJ9`?bPRp2(mqmS?Ne(vQ`yo%VB=Dm+z~U-zNa%VnXvqSh3$;!tmz)p1g2dzT83DP;(-LISSt z){*mH+Tkps#b`halr!UI8bZ5-Q&aF)n}r?a2F%m5BJ9pxg{3XhSG%GoGUGCijy8fPUrDDBFU|7hq6_B7)hQ7}lL@!=5mX$X%mB`G+suS5=4V1A#H ziqty&-W44XoR7_i&l1-amZjY*Al`-0b(4}$dp8VwWmRTl&GX4sweMP%T2+&Rcw4R7 z8?POXmDvSn-PZ*$YKSVbr0SyHQH5Gu5DP|J50F;ytyoG)t$+PN+=Z4SgY283j@>7N zm5$zQ@021kM#z2eBolx_7;bwq6)trpje5R=cP2tl6q2`D8oW4@PX{9}RP3Z@-hH^R z3dmm6DWndCZIe$6iZwY4S%9oE`*X77+73YKdRf_YMvvLV$l)aO$j7kL%0$IPYtRuX z{?5^3dYUDvT~7F3RZGem*_GfF073_#G1zpqCUsSvbh!#DX{+fohitK%@Xo%ZC}A{t zApdZLg?!aj10jSzqCebgH=7axJ0IAiUiZ&eKfNNNbz=#JeTfIsAN%&pUxj^=8dos#)%Q3U`}@=tujE&1DdhgByOSBfS2Yc{%r?)>uh=A$lU~LRJiOYH zQE=quPmsBspG)K6rzdkROPZ095mn<5^Rns-Re2qNXA)yhD$-X^>H&Z~iO{XAtjs3; z+EyE7v+@yg1ui}4vmCKqLK+kPxvbMDtzWU?U$l&W7W~0x?Ay@_TK$ISpGm(bdj>2~8j}@Fvt7~=#AeTX- zzw!~qLZ@5+t6(s3Y136LfgAnAeq$xpdA*#;-Y;2=H^R6k?z%XdslE?HIJD zSxQ4)bqsh#rj|0v%goYG3DmLNu#?9iXbyDqN<@tRr-{Guz&fm&UOTWK6|kc-Rqf_Yt_t3WCeR zHGn(s+Q}A-LDPl&4?SI}-4Wd(QY z@K4~NJ(>&|1!1qNOez|Xw;}Nle%aGu_pizM5n#)~vtP?w-YDhL!K)2UTW|)m^5!T1?Fdc7aDgHeKelZ~ zcBl4OvdI+1Koh27q2&_{5Yrs$VM;Ffl^4y*Gj73}+Swy|Vs2eulG$I%pC(HjHNC?3 z7M}Yb`iX{S&b-aD$Peck&7 zQBV=F0ZS0Dfzm{!Ne5|4?=3W?mjKdhP*|d%fPe%c(tGcr21KP3LPrt^2vS0o-r@cN zuD$j?=iIaRefK(d-1m;xKO8!SGtPvWIiKhIe7@i3-OoO$gD)Y5OlJQoUG==<-1D;% zmM2NxC1@8I<;Cz=RN^}Lf^wB5q*D+l#pe3sN(MW1=?QkGL^4zD`Yt07zQLsme zbow+sJw3=pWNLVN53Cha%utR4`$K(Xjy(_U&VvZ7&GfY$;0-i2Q^Cra?83rMF0|iq zEI4z(jxApVL%Z2R65J#jQRa653!&$e{}M>m^PH4SQ&lz5Hb3bn1&L5=!yCH3Z{IRg z^9;Pq}D}gKTL#}gin9p{lyb>_TS-@lXi{x@3cTXptu!b3*WfsdF zF!EMvXlP*P;BaheeSECVn2=Hw-Egc`{UH+hcl!+!wA$@|&4q0!44E z=YHcc#VF^THzO;Kp4@1_HgLL>?$GI|pE!XSk=?u*nmA`lM#D?YGj#GK2_s?REuT;PyF&qTF2>@FAKBb~QS zk34O&f@l7Wk66sUcLU(k_lB|EvwwGFe!2xk!!|ANo*~{T!I!zQxstsS9*FwI3S))40 zfV{5xquU?poW0#iI_-LiWI1w82-{UWyViS*H>#VblG07r#6sRK9x1LjH+d5b)#%=2 zgWfy|5lJPCacW>1%*v3h){Bce5eK`c$pG(AwOx={!Fu}5eZ+IB?8FRCRjNiUVcHIS zMn23X)ah^Lj&~cBh*B^t&if=x5zWWIRcl?bk+wBQXSpjoUoAqJjT(XY@s~;a?p>z! z@m8Q0Adb&467YP~y1wB?RJ{FZQp!?PPNRP$`)%d3ntDIyQXnOiMuSz0BR|1VOxWE4 z55MBMGmzbt%Hh=x*OSGuT8|NjXowT@xN;R7658Wlw__-9OB{S>4u|d%J7#A~Uy_#4 zWOsgKNAO6l4BYBpiPo_{#mWoea1-I8Eax3ojx7^8ulks(bkL>3$lAP$TA!UGH(O@p1>IJcvs?*?$6{gavx01r8KW>xRkewSdCLXROe1=Yyp{!6 zZ0bsRL|Yc6)+~3?j!}My^`eUN6tk$M19MxNpdLBa9~!Vy%>t^BeX*P3x7Il|bEfGg z^e-7mjQK?7b8Pt_hEgn3UusZWshcal+4ZHsSPbI67eyrW8Em(xz>*hz7rkLOuo?6! z-PM_xW43)@=vU5L)Ql+ogp-q6HHi^eA}FJ3t?O!k4$NkVd;P??yb@>XnbaxwcDUN3 zAjNwAJth0CCit%!OD4&In466 zd#?y7#kQNa=*Vc5DKgJAaQe%v9vn8D`9*{^{w-b$1F zWM9oJT}<-i<YpZs-pfO@;c$h&p>Wt=!i{Cyn_+0_mYMM~JbrmD8hm(hT5 z6C>J=xjn@ID1@?D&%}OMj{X7HH=UO!_KiH-gn7b-qoo4)8W=Ma7iIlJPx=8J-+pn! z=g={bsDT}$VEfEp5#g^zqqW3Y___L4PU-q{v9syC<1NyvnVa}Q`}QEajD4O}s|H%A zO*g-CoKg0BU>}F={j5DREFf7#U2-yPF1!0WSEs)RJj(qnHP<_QrnReM+D}`VZVC#p zoVKAd1SaH^XC8a0G<<{|5W&{9n`zE(g5}F^)816(O^I1?-&m;rE(l5NIQ9grjZ1o% z!`_MjTQ3)+zF^JqVmB~vMUBJS`?Ccu*5lGQtdLBu33Uf{>B>zBS_bE38t9Yvyb98l zU!7j~NoLvPjw%R*)q4PXjV4}k>q{7jA|oG z;m`Zg8`GhZa;s|m&+=HIeyM@08g$2^i&Nwem|!j;2`=0Y2L6It*?1MVxS* z9*G#ssR8(C>yh(2_UY8SUK2m$l*Q$z-@U>kn%h1X*Jr0z)-S~_?k2{psG!`rGV?gY z7Mm~;3Xo)6?T)Ix%Nqt~^0Qjjkt9}4vwbe=x>x$$e9&Tv>K7|ML>_(0jQmG%O?d1#SWpu-mNH(rnw^K0(x(7%`^`C*$ZIO?pH zd<829%rnK^PJEP>`vrP(h_m97%foZI7vDP?8ELcIG!;LGY)1@9@JuB*Ez*lA&fmWu zQx@HC#{3xT#~ge7Uf2~?CN60>Yt6z!sZh$ z5)0<(>${&6Z=O`&u#lI9^c72!SPeWyXT|2VEERuJEn>|;&cpM%CStX!RVi7Z=lzQKumy}fAD9QSKIVZ8+Tbm)T{j7#=8)7ou9qP zV`uYJ^vAktckYIg@44-~U3!wZ(nYb&w0JF=@G~g#ysZX#bd^9`;w+6OD44 zFN4_wX)oUc$LFO7T&R^SL^!Q^s+x$#;3n#wkgP#&q%9@rI zlhOJMT1quR0lxJfkz05M=O!cT=AWyB4tfmv^#RH=pF*VzJJ%Up%uG)ARbN$KuX6DH zp^u<{VCPr^tuR}t?X6tLiojyB807p9C&CVg6{d@P3rnDB6Q{C9L}ad`SK6eX>iH3i z6m^^xf>U&MT|gjxYxbh3l`M_8UR-HHk?DPNt4jXrT(fTO#nRk-b{ZLZ`V`TaboP&8 zDka&U!OX(xCK*PE>NT@pe(7gEWWsQz-j0P#(9XsjDNUJh3YSwJ5+l&I7fN=lza#@8 zo=y~(-R5J{@ClP0Bf^$-0l|*2V!%cP7>~@ZE=v_{N$2E&+0!%ae7^L7ta($5~QEhu>fJ*eK^~xIg@Px#c~R{2sDz zeZLU`&!2Ots9pMboMy8vpt~&+#%eI*Gds^S7gFjQoZ-_$O&hoa+HfldD1MEGx_2pW zLI3R86=CP*=}B*1XCDw_;s3w;^O;;6^@dY%2UQFuG2nVMk5NK9dg&0b`k?MhJb=Oj61m^ z0yH!(bKmZXZjJ`nEAJm!WPTCc%#kzyO;uld^<>IK;FPbJ@^ z$unPk=AD4^7G(z5rwhsbL(@_XC>?D<=@={Ojoe-(j9VgoJ=b$LR%#$*Rv=wuzutA= zyxFY(3_quey*sq?xRzo|x}@NbR?wl9I!(xjFbF6Eeb3c-h4OFCr0L(Z?f-1KPEg(c zv*oIC2`Z4Y%7&EN!xoeKmn0E5vl6*CMvq_2rEd8aDI$NhTreJzt>9m698eIiwAq0p z;#iepQ^9QB(3y&BhD4&aIF#DP)^^XS%ep6h0?G<`{pSI>fq~>ue2pGhV>^(kmcncI z?Jm`CcO^i1aU4&QNTz3!S5%}%9OjR7^;c)2Qu36LpFgi}FnL#=|5Z7YJl{1TEeEU9 zZqvTm68#2>li+1Fl4%L;?BN_8?gMXUFp>tVj0V|`*hIs265>by+`Z#aX81+}*d6%R>X|;zUfFpVhfr3llU4bB zXQ?R#ha5?gdbK*veDDqPdK-B8GKtnc=Kb%?yU!>qxC|;fje$7i!g%Qa5=uM8-uDn? zCYgGP$~M|MiU9+u&MuusvU9~4rDwR!^|~>@F>s=}2LZDwg_I|=>n;>%q{?W}ah%s* zS@=TH)=l0CI=M`Jf&6`*(yvHgK`GUIDkIpIx#()ARIHe8v2 zNhEX*9c77;u`VNad0sqxj+z~DDMocs}P25veZF2iHzEm#u2-xnw2>?m$bevxM~ z{KNGEz$2MPR2mg|+AMa6chK^*&%L~|I#w`iMT)T(W!D$Q9wG3`E%=rEjRtC3E7(f} ze+tN!F(}$vdWvL8|hMKvS z)7_sFFS~us>1Wc(8e$EKWQuOs7c=H6A(xk(1ZWCBA*j@l9sPNb;Y*;e$AXIvJfKQX zYq=#{pLj==?I{&|pz4&ad(J0E{{2%g9NOb%dtk|#iXTwG0CaN-#EV9!tv8=>SbQ<& zZJEQrUWAZW6VfcN=<2u9g=ERZ<`(bUgVb~@jA zjI6ldZ#lq=Hc`k}e}4Z`6f!0%J3kiky<9Dt4KY9djh4oj>*VLM44&h*-e|1#8+K04 z)mOJ6mb;rv_JG+pm_K@Yy1~&}NvZ2y5gu*PxyFgQHMu1QMRIP9I6DqlvHptqqxY8f zH3C>!ge`_^XdUg8_j>)uWi`+%X%8V)HHKhzk8r})2ltiaX9RiWc9|aEGHaiq#M&bg zlV5;q=fAYjGl8q8ipVqky?96BqE=12BUwGKVpI?Bb@EZ9Oyx4JHDF<3fdxWzuiH!{ z!&`vIrqX%Jrup49;3gz-TmxFF3kmVFvOh>u!KB%2kJl60>9Avh4#t$eXk;3_!$_5T%R_J2U^{a=2`PkJb? zG6rz5lIVy1^`6{+{j{q31_q3s#!2$u!S=Q*?~zD|5l;*xSrO7nTu%Hsxe5jSibjSq z@S)URCzX&RfLSpJC!6qd_`+)9cs=2wV49ynr0resN#a(16gp-!%7l(}#<8{MRw5}h>`)ZbL`+UY&zt>@i zy0jkjsFb)T{=w;lKR*;uAfRy2NE!Y?(*;yv0p=l&kF}b(=nmB+L~X7cSM7aC)cf($ z9eNGm!#cw?SVT066O_#`@uKv6Htzv~5VfOrXFCS3cM#0qG-P&r9pmM?r_AUcX%!=? z@cv!;xW5)dtZe2CzZr8yv8zs7n&`e zGuRgV>^cl1Fg!CmOVFpN_zYI-5{>Lu6m1W@N(^v|d1ql_dULeLW9&7auIzetJxhop zQ8vuPn#hA>F8%w%JL=~bFnLoB8;xdAM?E!ulxkFc)p>29?Wbx{tSGf4nSJG3R{Ps` zS6bxdqO)#WS3S(J>($gu`#3OFPZGzT8wlJZ%9JTUVv56-;BHt9LJqN1JtQ~H{ z(YOOul-ZQ3-j8|rG(Qw&&FrJ9TWmPAempBB_e3pAe-Si?Z%`ceX`!Xj+kK{*IdF>U zXZhvd45m_mNb9UaPMN%MjbH#4x-F=J zESk=`tJh^BSG!v;N!PqgcwJfiT;xzKP9CbBR%a)bRK1rJJgO)2eYG*c`{Pdo0NY=a0-o>yNoD1)=zt59}kE8puE4iZQ zwkHtyDi}!{?#}rdNR}XNuS*k0h##z8RQ_X|8C1S1x&@b2+&yw<<=MlS{32xrEt>X{ zoyp<(mw<_1-Y?$d%wgX(N#Ro1pUbZS&ylRe#81q(nrVYA$|~)Uf0eGA{?ByX#X8a! zmQ1|12;N!}t`NqQs_1Ds0I@znKS?dPsXM`{-_NU@L6T(mhBavFP7LjSU^Kuo< zVngyfcQ;|z4`FO8$(x;8yPd}fA+e80EPxE#M!6WD+ucjRUj0dD&{WfWuZ^#bOToc^ zQoMK7Hr7GMby<`kF2xgj9M1V+&1HFM$O_lqAAGkb*Dr=O%3iI#*09ohb$GM#Tk(gp zUjs5PBW)iy+Jce5(p!PWH}k$1hdd~Yw>WP!y@9z&LL7ANAgIu{+56AU4|wyr3TZmN zVtyc8JL}80O4%6T8kqTW_3@%JO3n9lsz!p}BrVAx5L9kbDM21$6Jx7x%m|BJ=&age z8ooFETC6pFXf@JTDEU15n*&lSkGr*tjEs+B7f}g~Z{M9A+)jGIeu`(vo+TB5yJAXA?vZccMSM!7?@%wz(=7*(^fA?iWnizbldsRPj zy7ScG-G2IadOSW88@#+J{tZE%d!K`=sv$)1sC~gBB@TA(` zZgU?_Q^<)W{S)s;@b4|WH3vw=D@l!c@GN+CxtCubSi9gbo!6*RvRN>=DBcqz_HxNY zGop7(fG+zJ_0u$sOor`>E?S!DKm)iv6Mk&Np8gD+aUc`37cYar(@9s1@EpR=BS#;Q zOYU1|1*gOo?AaU;AXz+pDTyC`;k2NWMA;pyr!jK0g*iK&Q9);~%%q!2#@J}nyNm{$ zVwc~TZ=#-->19^Ub;&F~<(yW$-txJ)!Q^%6NWZ+&!sCmyW+lkU&!$>sJSlmX`}_5} zUDG&*?NBZQzai6TnJlHufeD-SRl>xC#r!yvs8=uZA{f0NTnshO%}OAb9R0z?)e# z+IYof^*s6KE4Ts%=$l08zNpY`sc+l$o z#Br9ym@O6`EgDILT`kaOU)s*1H}xJftc@{rt5WLgc_!OcHAiKo>p=8qFq)vdCd3)X z-q)zB;jtp))ZAEpNT@CT(VoeJFf5)PeHMCJK@OGFs6LR(^ZVDD4PNbyu-bdy(kV+UTjJTwZrr{$ zPe^b7R9%fz@#ID_O0yg5C1&Cl#iF!>c4DA zul^(_VQfBT8xj&CH)yd_H4mM ziAQ4?^I{m8Va$mkBEh1|Ik{ot4iXVsG9R{;cMcDhus?igRLGlOlqhjk z=NSS2pp*Zw^UHtOzaCrGLraW%pazQO=F&J((ImkJ9R07ErKOs}?hCy@mLB?O5>Isv zVlgW{1x6l;^Z!wPAi2Z*PjxDiQtCg337`2lgJ zVPCHxeTI>?2Y@`5?P;r~8Iq&8_lEs+dhh9p03 z&AOJRm=DZmohW2avxM8o`U&L3acWrqNf|zGdm{q`AQay<+P{YkYF4`eDro;P(Azi`1AEr!&|BM9l8D_wtyyX)^bRCEsV^^2 zeWu|$ptOI+i~w?K`dp0(g!FTT61Zv`&IeikV?QLKPGH2U_^L;v@^<#AMta+;3x+*^b!<<$lwZ2#+6j8e~yjUf;_2Q4AD)yFhBG;J@d8#ib zH3vVQimekXim$72Qn;HmsQ>+#tWtTT1((Y4W_7YV{EYcJ`Z0ITX=F?_X&!-u(4Ra> z>XSN}d<;W44~LtN%594pYxS6n#d`!xee7SPdY=~z8`aO@C4`*j$}STO+POqs3QXti zhStszNVJPz4>a1xUQ+e`10xr`RTzsOyk3m1b>wSx9mfJLlaA*&R^QJ^UMRs40U2_R zAn>&5h;Oy1tfCfuF%Hr@n&XeX=+?l@S089Oa8_E+NLr5_tJh4NE39I}Spx#|19bad zd#iHP`!NeYn@q90Gj5C4d?;SC3zC98M8cVUno;pvip*j%6XicDP>lxF2UJNH55=diHAHiHv{NroI?i zV@>)OnczbK!7Vv-*zl#Mg_yt-SOgS*Zk(> zhDtqq)YjrwxkNV;1>T0^SK1zP-7PnyAD&o@#ZQvbWvhVa8M4dV9Z$g7UJ{WqYXac!+oa!xRBw5z4+N6#J z8=>y+B`r*SmJ+VQaBY70N4cN2h1wIbV2*Lrco)mtQcsVY$n(T2mKJFFEZPZx{AZ1W%U-2V-|+KUGh`@pYss%L zpRR*>7zZvOz~oo&c-tS6(s=e}(ur;cKKwv(KijT;_-g%&_w&V~IB+`T?bjNp%Fz~-++}yw=Y}&83y-_+3F?CS7Z=D z0_A=J@B~^7HPUW~4NtDjkE5*WWlJ^sCX(n~`y1!D*#CPmY2`nONuot8O4W8$*;&HL zwc|HP^AL+&i~*t3DRx-L9kYZ`tKVD4SmM6~Ecq@@OLY4zq692{cWLgY28lu+zPqhB zQh|G5WF0jt4=y9lJ1xod0$)Lc25Uw4?A+>=XF9w30m#t>MYBvQ=JeW-1cHZ$aWL0! zbUzoL{477_a_nfn!NPIFWl$0SE=xpx?^Ual=2-6T{WGDzr-fY}Qh(3p7>fB>6u+M@Kn~$&B3|L)cVlG#?@~m5 zU+_DK=~!iZOOXJ^XPV8#! z)z5qXaAoQ|sfQb%35h;uZyX;x_rEaNaHQ~ z>v}flvsT2dRZZ(d@><0dxX=79h%^?!(n{YJ=sZkCM;q6&f0vh)bW6%&!z*ws1&% zSd$sR)yikkKOeYyiAk|)C%@&zIhRCqTj5+QyTMxDP7|{wWDM zd-SMjq34hKCReJ0FVWCgAMEe#dxS9!Y>S5*jfh{lI`5~j=rd!HDs$QT5=PSvWIIS( zlD({gK5}3Tv#9c2hU3LWR0A&d#l&o-!M(LEI*geZ-^H8NZs2i6I`sENeAglUfwn&r zBZUfYoaZdvBWJw);o;hy*Y8ma5a!DMbn>$dR~#7b#8h*;=A-z-j4fsw!%Ys8%8pRc zICZC>AK&ghxv>>Pqg>FtOU*upv(uEf&}c9t=#|%1-a{KF)ROLw-O7nv=W$cqR=zmb z_W7-x1qDki%rnFFooZTg>+&YDD_&6pz$H@@vHq?(e1Z`{QN3c{46I+a$+oQzaWdF9 zK)Z_DBUa;BOCP@35J>6WQBV4i@OT=%A)NN;qiKyI^3ad|-h(_oiV58*3&CO9gvo5B zFyaO9gaRM_|APV^HoE@@1^lZ~z)n3qZAn+xGI1D)Wi<5LTZ3tT14_r z74Je}*O^NbDI}dQay6@g?7zP;3FO?6D}ule`R#8~ROe;BTwenX_VPz*l&d3)xXd~q z(_((kxTMhCi~>L9B2VnTSrH;~k(i`@+ImY_ln>h&on^JBj-Fnm&Cmd(pW;!U;G*N1 zwop&R{g&IfXV-BKI-Z`MBAFKT{FF6%Bnw4NOg-XoG)TL;TP za>pg%(z)0C+~VuFr`|jjE&JkcXJ34==qgT%S~Qi=lX1&Df3N~wauv5c(Kc*ALQ=(g zs1r4-hX?XUd%nzpo9F1ULU3pu_EOtAZL(tPdy!(#xENp&_OCa|-~3{Zzvm8u z!4N_79M2YrROAnzUBVAjvzp0NTX_SAwy7&Lq6c3+zafL1?<3=dWm{2-A0zX?3iiw8 z&*o}hwjrwhF6UPgwk$CJh3e%Zdh}37fJG(^SUFsg1`hffiPq9e3fZXII#jpM_ZE$I zf25|piG3VoA(_q)cF<9_7H$-*bHkKyckS!^ zsuWSsC$s~NSe|gVK0s8~@@J>x{TgdA~)G_yO|VBL%zD2J#ceWTDibT^%ewAP5ZXFbY#hjGgfAp z$7;?rYOL#QOcEjZlU}sSenMLn_N9Vo2ObE=7-`>V$>Y<@f@nkMrO3yq9lr4Pcg}BX^)LD@rPi2d7}>^< zNkNIa$ld4KiWDD0+`!_HCN)(^5;tr)aw;9noC=wdBKO=`EYKDU@nwWtNyTh!4s z?X9eMoR;-yQxR8qqNdHKG)W4v4*=S$*M#cEUKRpFHR!2`H2G8gd_KQ9o1)n?2YtKK z%V%9aMFrv2f250l03L+r+AH!LIfj+y4>*;~yv;$Py3}# zaVOg0S+_YyR@>|$-L25rEjz3qT1gLQ+pi4KeDWko97wz4O=0dp+Wq4qFX_GCooyZz zxb9A@T<+dBAJl@6n6U)9DkCbKfyD@WUBTmY0&wr5-?kkTIQ8JyEA_?+@w# zP-xCIV&-h;ptN_wDnqTG(0PyS55RH&M~7I$%wo#A%D@uL*bDYMZ<4Tuy=8+I6Pd87 zQ}%-&uD;>uvVcHnX0uZFv~8VIL-;B8c?pI*KPU*u%-d&f>j`EdA7!!R$8547W%POZ zM34fdoj7Za{&WK~X5vaP^($<*nGM$@Q=Q2dE5LTW{L%piyk^^FD3?7Cu6kYGosk%7 zpK)O42>{=C}S{RjpM$CsYQ4pe!1wR)Ol03QpeyPd->^mhAW89U` zNOT_6!S+Bfz}195)BUUbfop-d%eqKcu_=_XCrcy4g>b<*oFp;DWwu`lzKVFFQ6Vh|V0!)yNf!5hw_~Z+($tMz;OP8i&ZEx?AJ`Z&Q zvGaWV{4>*CDf_}+U`h&p2d!aXSdpKx1#3!o)iIxyBl8fcFjsV#4sa#SCrjkz( z!2a?>v8ljqVLkV)$o?_WUVk`dd6xj5{5o~9vGjd?eS{YjOdwl3VAqqbBVk}`Wvb@8 zhk41KHIZB}#K$Gqi7ySxLr@M1OfjJzF+lr19)oQEO}K(9rIe1bgE3 z;d1JbQXVX^+>u05(%qSEC-ew8PnLGX3Cq2sx;$9&1oK*yW4--bNsrC(!RK>nz(2Bq z{1pb}bF>WSlNJVRR^p`AW;WZC5th*4Ho3|M3^w>YQnRM`%Lju?@z+Rn;77;&X`m;` z_v&AIQPx6>F%x#i9=d3f_|1`|R&;+GmmVUWy~K4izDXTQd|De1gTPLh1V2IGVigrn zm&PnQMKV<*i|``VFu$6Z9Y;OlSJ{oplnKad0@Q*}^r-ut<6M1AYDK*J4^EZRVY>UQ z5@0)R6WPmwBMX#`e$^PRnY+LVFfow5^;PM!-=S@%1bb9s5uG9xlxJUl8Mm#e++uxz zu~MB4UJ1~76Lm5U+zT0n*Ltl42wZ+eHb`xc6<~1B9lI5f0PTx^ZZ_OTnbr!n)E}ak zG0j21;bPUBsRrCQ+6!`()0SSAdmPv+&XGyq#Ao}~gk6V}lFipS)gH!%Qffo3=##Q> z?|esF`wjQjqxK4L;pHQJOOh8gmwp=fnr=G!emNk}UU&FLoGBCe$W@`!E+k%HklvCPb33P*8}?utW{ki6JszHDHos$kVcq*vr2+t*F?K@H#pmZ zr#YfSpf*ggsoa+v7)ZitwemFyLk>A^TLl48BK2O(6tmw%1&eh}r}AAC0%qfOE#wpJ zbX?+o!dQ%@3XQiU8)VAtEoM+u1=r@+$Vpp3_>t?jcn9!lA(UsWTEoRPDq{0;r z_N@|S*jax}iF_nJ)3HgZE-a@(1-5(+LL>IwXR z9|k_`{Zt8rflI4)9Nwl*dr@3mx9Y0SY&!OjIp9kh3O0%8V-SY*_%p1%5UC8kyDi5Q z>cG-%0SKAag+aN8%U+^#ze@@V@580t(#A=n;L1Zf({s-cd3{ZwvA3K;t`v&5 znKoTX4})#xd+khJY7fcpao;^|o#P(2Us-9};g~1c>G=EU^@YAA|MRiSdEUI8;?XFf z@q##?kglC>=dZ`9L{{&-K)%}%6$Sxwu>F;USqkw@$-CkzszOBgqAV->Cr=7;@mm&E zRCluFmtyrr%Exxa{JJq9d^1xwOR#Ib`8p12TqjXfNx+>hA?diHbz&Cmd`cB)?Ro!7 zKgfbeSCZz=!=ASvlLzI4zGtd1g_ap-*(#ZggLKD6?bqG*rjcZs!&SUZuph>9SAtr4Q{LRRA>f)A>{`K-Cr%Z$~*C5}ZkAt_Cw%10MDi0hhN_Ffh?n`1+ zd049LBX3j?^x{S~(8@uF^78>TSMMJI3Vh6NV zOXAg&+Fgq8=9|w!>~SicpEh^7Y*x!D*CAtj<<}~Yuf29-x(OeU zbh%4-{2te4nTDiZ7F7VXtiPw;gOUv%DkPMv+2Tc|E3@@zsfjTS?WXqx*J8VfoAFty z{!8v3@1qz_30>b6EjjdAQXN7J%GPgamAHb+yWp2AK-%eA*r-x;T3nzxjxkEx=W{T`a>?ewB5)l1;F{B>XA zm-d#rROA*kVpvbi&t?E9zV7Gx(xYY3f{+slvd;AVcY3m?r@qfWX}nQVHiLe2H}|Pg zVD}UEq2@}8geiIG+v77t2_CnD`Ak8vi>W^rvo*ZV?3A9VD^+T|*w;%?t!IRd&TZyz z^mTIoM%{lo`E$=L)YPc#8rwT%-~AW}iJ9f-a3t^QS2*u{vFGB}e?l^;%2n10uVphi zjm88;ejC{cJ$n8icHKOZFr>~~ACe}2c3IE! zDS!Qq5vbI-21?r zFXcFwD8gUz<9VjI+2tCW3nC(*?aX@7`ZhM+dlIuUWBG3@=~{n*k}eSvCCi$n54Vbh z{xaWZ&BL>FBXQXHfoUf+AZlNR-yf)orURSS(@rrBK0``_h1&gww&U{;U^&NGvT`O_ zv3#~aLye~_u`|hY}mVadxZ+9$M2{Y`a<9ly@YLM?Q zmDESV{>}L4+M`~VjU`$olreIs(^u$a4+q~tK=39%LljmP_ji&yUF$zc>i#47AEK1E zp}u+)r?l9!Il~+fyy=kB=V5?7=_lCV;jfdK>_p0i~f?1ili$>4_bC1F+{+DSfcvaIZ z+y2WBpW?mgb9UrLezWU&Iap$bxm0}q{kwG+4U5s?k^W0VK<1iTzgAb&C8#A4Lb^TF+S2 z_6!L5tOuBIar}Q9$h@(M()kEGLR1K_uDzK_l;ZJ{mf@9W==gjz7G6B%RMV zOQ3&tey(V~(o8avtyUqiOu*W;$z&)Y;N>xYI^Ib-i-_TH|7F*C&V%gvS+f^qjg7L5 z0QUBigDfVmha$m_bxPcb_uRxEJtqmta=`ynf-e`S~?mbu3 z#B0`k&QA;+!2IU{%fLymOD(#p+9(lwVhql0oDcl;6@mbeGwy7?MI6f$5f_nszUuzz zpnELzwxA#D9ffD(C%OA$%ffcr;zwxOk;N*0h7KN2p%qBn0JdSte1E%IJ)IFJ=L0!- z@Li0~+uP|rTIKwlZHT*%1M254kG<{G<&F&yc#c+%U8Lfc4z<_`#?v|2p~t@?TLu{G z(wkl7!bV0H%(14a`3^gegzVQjA?W*q$&&mCOQ~jf)cf~0(Lf3!qC3CP0oXOJZ$Rco zJt5vESm;T*4=qA-SzVHe%?=Q>aUBuu2s_?c^VzUMIvqJ_ab@@E@&c+TserzkEe-sKTq>o|Z~{|lTvVWbrPccrc)Qodu1Ndg znRIZ{wMQm#Hl@y8OU?&0w_#Q<=z0vjJ2+VA!mGO(4V_EfO%Z{(>p zzF>?PZL1wg0In9E=7)bQKTYi^bc@l}YIlBdHw zl#1e)H_YqPrK_#e!qq!WPAZ5(;GPgln?V=(!5rqF!B$IRytkCxVu5+6sZDD597b2c zj~aV}xVa`Wb_*!7#C5|!JS3LTs4KL={8s1^%Cw!HNBNoZs^}XV^%#3xCVhEbU|E#DCc|3+n)f}jxD;F6>P9dG z2MrcvX6UNAEEa5u&z{2J2$IPQ^i;aZ8_(s|G`1ZjvC}+f_6yS6$QCX~O-Gd+B;`B2pf;{`Pq#X0$ zO4?u$otWAiNQd%{sGx4xwoe<|fn<8d8qd(C5uNz_nvJ|o^R}%Fv|^N#J8?=CTl~i_ zyIx+96n+nf+e~%D5qGO0F1D9kGi$Spn-&45$NZl_X6)x>o9RX?C#{tD|mXH|{WQ_Vvn`xl|B?J+zvgC!ZvjzGY= zKM3wj#(&(II>inrI?KTOdno@A<+9NkDG(KU`0Iao>+}DtKzjJjz}xuWTCo04mjsDR z>i?>?3kIvYv?jP3&l0c!r2xca68Fy0-!*v-z&95(-=%#L3Asw(cA;lra0TgF2aG6C zq#ZDdJ{$Y0eBSYIxeg?ZmOJb7`hTYA9J3{P*Tne~?5)pHLhxII=pdqP0}?^ha{sVx zWM*akSzYipC%FHuy3pVcF3o+P2O@Ovj(Jty;<&F&dG__UpVNXEA3;zT{i-f;5p$u*>_aU zMzJGw-VV4O9C0xr2G~D{S2r-kEAeyCl_?^{e786C>@1ZNx?fTf%_(kkF-r-IiwWDH+OgwBEFMhk}LZbigc*1tup{?Pr;*{L*0 zjVvO$3?B2qDX#=_O{+J$$oDIwt>(;yk%l@!@gozg&h37U%*H7kYnLE5z5%g%^;O;e zY~8w_wvNv1Dq+sw{NKu0ogSkvoqR^=Asxu^n?$pbV|+A+V>jCxaRN7kwrul=*^3bQPg(qBBWqdnwFs&M*8wMgtY=eM0wJ|2w-D z_vyBpaf>sXiKntXJo0Pr`Bcq|e3c=0%?tl&r;?}e?*yPTpD(C#teq(yj%eH6omf(= zXprZkRk9oKN!M~gt+J$Plk4WolyzrU;=PvMRws(w9YUr#^`$z0D|=wQr#RKQTp2U% zDZQwczQwvVwC7yn)S7Dd5ah($Sxzl~#q!m=A>)l<)*GVey`ou#7R572j0@F^QLl>$ z=G~T8@CBRCE+$WWMvs(SU9nfzYPGz~%>u15EL`Nfvr5!oq9rO$B%fd@XX)PF?`Fx zx@_KIWSbSIM?MU)Qg1Ys?%j;G!wP+OleD(>u|Av!C&v(Y<1vHVDI9SzwC+xbQeMsVa{*S1l<=}0qdzq5TJ7_CIb zdxG=PJvpsAi2Oqu`QrPM`=4yk+))->8~y)RdFLI~)S9kwjumMhj$)x&K}tZnf`EW@ zq)I5EO0NN_(jp>KEvWP+(yP=^Ll>mi07)P;0Wm;`Kmr7kyYZYkb7qz^>)yHl-TU{q zlC`q4_qX5o{hsIdY>KW6Sn6jcS_B`mOhG49N7Q7)(@aEUb~J*0md~YzuQu*)f5=IV z-No@ZkB;4(eJG#)wc%l+6h!IU*9wKCs_js zsZV&TWE8lq^BnoNQ`)rSsdNU!k~+SN*AA06p{TKUz8QcJ2wh@o03*){uc5GAadJjQvZ%d{dPC2nf}5* z-V0c{mh<;PY8n0dx-8J;!j1KAz7m=DuR?kI{Y02od7FIUY@Syz#*l}vz%IkN+_2cv zQH?nHC)~3^<+aeK54r4^KTQ5!&&S@?A}G>lOFEfw%-+~fCN1uT9_7W@2DpW>`lpbP zcf6aVoAI6akmGp|r7T-h%#bE=k6?B-sCXksTcuSjInwG6P2gwU{K)w=Zse?ZhF;@;a>}- z-%Tk)Mg^|rQHQ?t6{!|XPuB5I_iX{#vDr?&>nC?}AGmq6rV30+h;bhKj@tcnG^FI_ zo}+6mG%I)V_O&>Oov$0v1YIhLw#BT=E;;u+q#?s;P|w9D*@nt%W~Y zGelCG4AvX$-qhm-FkMFN{wPf=3i&!QQ zC_KC)L&ef&v`>9A=XuUFvtimTO+EEs+NDq8kGTFVr*Wi&jaTKAVA0y7FbmVmK&LKv z!*?Avc);M?zY$oA#J?tj@gM7T^YDxa4K+1vSWq^J{Dea9qJMS#RwKz zWQj|x+kd%^HgELc+DQBU;*I6cFPo3Od!Pi6X~4eXs-d< z3$j-+;L@v_GIbhC-|Ql8eZrhOsYf+b1g#{*BdZYrMteI~B7fS~7HmaDMO6Wb2!}9S z=YtH@k9aPo*TiO|g38H1^9-w*n2!7#k@pHsD;HE`CSZAOlArNnx-1#w+%E1nq{cBB zOM4C-JXq_|kpAEI`CrPpClWOHvYRf?(1~)Ah2Sc|SN#IsJyPig^Rx!cUO|9Whj@Nk zdlY+Hv2?oBPdje>m%DLMe4%gT*?^$B0V5*dw@c^Rp&Kt5|Dt*#UHl!F9L4k#hPQWp zs#uuf{y1`GHrSmByStlq_gefX4c?OJ(ytYVzJGT3d!w1^=UdbEisZqf10xm#0G^`=S&{03)FMcCFS^s6JdtPdmeVh<)7 zHA!;D-|XuM*f9z8ckQ2w%{1%*^$Z#jP$OvGn7=OLpC8~`fflJRxJP=mlB1Z?Hlhp7 zFCP=fFt z_JIsP=ri{$(rG-vshYbctDMT@X^hucH@f7y`+bp*mzN+q)%Kh2VY?(jUvVg3Q+&=q zSe9Hy8d_{q8Npz1?(fQ)eOv)kn)V?nY-e02FxJb_IQSrL%^5_wT z`@!_!79jEh(qj|t0SEn9(MS@w`6$XM38E<_usKf!GU zoGX70*ZY%YK&2Abg_H~V29NH%I%)s<#L3ajRtJ1`M+fXoTSiA@mB=xF&B^<;k+K_? zG&%_Va>E@p!eSm4F_FqaUZ2YLW<#$%vr+h6{a$p7(>7dh`#m9-58{5>EK) z=M;)2x3rrmY5rqGLUaA_KLVySr;Y)laT*$(BSkOUSS*pcH1DnOSVTE6vUH&WK5Aj> z&X}(&E0H-G33g=DM$tUjXA(_fl-)qR;7r5!2f%mSj0%|qFc#${a&iJ1RJdOtVRDdT zl42zActs~zEXj0#`4MnB<44(DwzjmqlpegdGFj_keTOvVi3+Bh0`B>D)9pxHL#Xsa zTsU(7YoLm3pfu&t#)IGoxlWDE+iQNX>>3K??!GN<{ni^UEywFy-o<$4_o~3p*ngT+ zW}_=$97rMV5JUFUi@Gus(BzHz*8Mgc_l+>4?~`yePkKrNw>g%oUYwM|W$`TYz`SB7 zEHP$yN(YMA1{a$(NC0t5)8M*z;%J=;SCE(l6q}l{I3mrGvF;}gcLTXdGj;gxB8xPx z$Inpj3Vi$$j+{;?5y}b==cSoq&Ir!nlE}VUjB4^%og~VLDU^=Ax;*jC>Y;zX(6w8~ zxMhHAzd=8K(b@d=uVmr`oP#ZkXZ#b+u^EnNtQT!wc5=UAZrXT*GYYibWP=&V57eQB z=Vtrspt1O)1TBk>@(TV9_4wz}Sbto}@bq+AMnQ%KM6n+3F#G}TY3jr=jF=CprBVVR z)i;*D7}loN&kuC^zJ>>|MOxjTcr(6>9%nccQqukZ*l(lECl5{Tk=puy;E0bL{rn;GC^ubVQRwA5j?bp zDHri6aXKAFBqCS|%X`}s6BFsutERT$^9T^BBWmWAdB_BIK#?$CNP4KW*5yIOrd;K8 zdIl*l!-yxfHbgrV~{oH%^R!x?_89L$1 z1wYtZ6Q_92FV#pQ_jLT0M9X<4UflNb4LsmPwx%(s;12Fk8w$5`OsJfd-#Ue56X=D# zGDFYiGcqDaWE`6$xI^BO=R59i^A*}|UVRB0x$w=8uP|@*+XU%=7 zQM@S>3u!);%16B%kDBZeDAH3o2=`p-BHGP;ll=}HqQJ3}mB5AiG zF54vmQx=lYdf~LBoU?V&k>c@zW?xB+_`#RhMl;@uTCJ2{>NOv-8#O9YJ2SAIzqRt?pxNy+X^0jKo`PP2zYIAAd`}>Xu zYy@*F^Xl}brX_YedPWq~^s$R13L!n8qMcJWvwHTuXGn_7^K(Tx(x#|bu- zd?l1Vf+OCyoX^d4a}*R<$g*cUW6+dQu$_Y%ESF8t&=~T$&DcpWD{;z$yB9dCiDoBn zVjc@0tgh@+yHFkzh?2{>HPd1?-n(tM`8_4!X6G`Ncj5*M8^aOnGvaQVAtsma@+WSl zyu3wn6{p{AB7eKr!MJ&awTpToW+0_gI=+H`-G!mMvFSHYJBCiwmJd?VHEZ`sd%P%xULTVXH^i`Hkr zH0>^>?7K`OIV-LM@9HNSxuR}O*Joq~WsGgrhhM}!bP(@glL^CfL@CP(uaDn++dN}kI7k4) zX0XD1W1YZu;CAO1lX`oHMYaSzGP~R=PffjD^6CwjAFt`8d#{Mu_I`jll0W{Gx!?6OyW^QS z1vt6zl~@KzYsT+LJw47>gAV1NwdbD2CEb;;!-n%rN)#iRB|+D={OTZ~>3Q~O-pQ;5$@YUM>=iV3(NWPfVg?V*C%SLx9>@+1Xtv+eSB>ZD zYRuOZ^J5)I(qBV5&tyckUaU-JNjty3mpGiC$}i zMql@MGl&w@TW|CjyKid^DU;|I8iyqI$z61)#aCMe4H)DW@ zBoYTyCPz;)bpVIQo1)vEj?StRBQl>nHDw)Z?aI~p80B0>Q_01-_0mikt5J`a7wxw< zie24mbh8UKH%jHK^ST`}(k$y00_bG9OC??^U8q>T zMJGP`57N(#y}gX$jDo3ezJ3NXmDDVLEyj-DM7LGK-41HUH+F>)!PnpRKbGhz%yRU2 zUMwO2BaWA}_Xmv2s$j-l3`Rv_ur*_F+s%_Hcmx@fv{QCXYV?jrPW36(Idq`` z_0Dw#xQz)6MjhOhbx-p0ej%GpL$hP6nu*3D0xFTpuzf;TEkKv6v;;ApH|PeZ|5GJ< z%+>w);ax4rCC}C}CXw`1Lh(oP=+9e^T%hRAT@0Yn6o0!0Z9HsB5=Vl!aVu>SPk3+q zQFZ^Vo(9(Z59{Q=*4l>^IStLbyZ@pT|39;wI6ebJr8k{6%GHuH6^Wkr3#i${|oW`tpWf5 literal 0 HcmV?d00001 From 2854c31f490d6b9a4ce88579bb07ef21e0c7cc1a Mon Sep 17 00:00:00 2001 From: VLG17 <41186174+VLG17@users.noreply.github.com> Date: Tue, 27 Oct 2020 09:20:07 +0200 Subject: [PATCH 03/47] add info about setting for Edge > 77 https://github.com/MicrosoftDocs/windows-itpro-docs/issues/8409 --- ...rosoft-defender-smartscreen-available-settings.md | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-available-settings.md b/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-available-settings.md index 263e076dda..e0ab6e4909 100644 --- a/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-available-settings.md +++ b/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-available-settings.md @@ -45,17 +45,17 @@ SmartScreen uses registry-based Administrative Template policy settings. For mor This policy setting is intended to prevent malicious content from affecting your user's devices when downloading executable content from the internet.

This setting does not protect against malicious content from USB devices, network shares or other non-internet sources.

Important: Using a trustworthy browser helps ensure that these protections work as expected.

-Windows 10, version 2004:
Administrative Templates\Windows Components\Windows Defender SmartScreen\Microsoft Edge\Configure Windows Defender SmartScreen

Windows 10, version 1703:
Administrative Templates\Windows Components\Windows Defender SmartScreen\Microsoft Edge\Configure Windows Defender SmartScreen

Windows 10, Version 1607 and earlier:
Administrative Templates\Windows Components\Microsoft Edge\Configure Windows SmartScreen +Windows 10, version 2004:
Administrative Templates\Windows Components\Windows Defender SmartScreen\Microsoft Edge\Configure Windows Defender SmartScreen (Microsoft Edge version 45 and earlier)

Administrative Templates\Microsoft Edge\SmartScreen settings\Configure Microsoft Defender SmartScreen (Microsoft Edge version 77 or later)

Windows 10, version 1703:
Administrative Templates\Windows Components\Windows Defender SmartScreen\Microsoft Edge\Configure Windows Defender SmartScreen (Microsoft Edge version 45 and earlier)

Administrative Templates\Microsoft Edge\SmartScreen settings\Configure Microsoft Defender SmartScreen (Microsoft Edge version 77 or later)

Windows 10, Version 1607 and earlier:
Administrative Templates\Windows Components\Microsoft Edge\Configure Windows SmartScreen Microsoft Edge on Windows 10 or later This policy setting turns on Microsoft Defender SmartScreen.

If you enable this setting, it turns on Microsoft Defender SmartScreen and your employees are unable to turn it off.

If you disable this setting, it turns off Microsoft Defender SmartScreen and your employees are unable to turn it on.

If you don't configure this setting, your employees can decide whether to use Microsoft Defender SmartScreen. -Windows 10, version 2004:
Administrative Templates\Windows Components\Windows Defender SmartScreen\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for files

Windows 10, version 1703:
Administrative Templates\Windows Components\Windows Defender SmartScreen\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for files

Windows 10, Version 1511 and 1607:
Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows SmartScreen prompts for files +Windows 10, version 2004:
Administrative Templates\Windows Components\Windows Defender SmartScreen\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for files (Microsoft Edge version 45 and earlier)

Administrative Templates\Microsoft Edge\SmartScreen settings\Prevent bypassing of Microsoft Defender SmartScreen warnings about downloads (Microsoft Edge version 77 or later)

Windows 10, version 1703:
Administrative Templates\Windows Components\Windows Defender SmartScreen\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for files (Microsoft Edge version 45 and earlier)

Administrative Templates\Microsoft Edge\SmartScreen settings\Prevent bypassing of Microsoft Defender SmartScreen warnings about downloads (Microsoft Edge version 77 or later)

Windows 10, Version 1511 and 1607:
Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows SmartScreen prompts for files Microsoft Edge on Windows 10, version 1511 or later This policy setting stops employees from bypassing the Microsoft Defender SmartScreen warnings about potentially malicious files.

If you enable this setting, it stops employees from bypassing the warning, stopping the file download.

If you disable or don't configure this setting, your employees can bypass the warnings and continue to download potentially malicious files. -Windows 10, version 2004:
Administrative Templates\Windows Components\Windows Defender SmartScreen\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for sites

Windows 10, version 1703:
Administrative Templates\Windows Components\Windows Defender SmartScreen\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for sites

Windows 10, Version 1511 and 1607:
Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows SmartScreen prompts for sites +Windows 10, version 2004:
Administrative Templates\Windows Components\Windows Defender SmartScreen\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for sites (Microsoft Edge version 45 and earlier)

Administrative Templates\Microsoft Edge\SmartScreen settings\Prevent bypassing Microsoft Defender SmartScreen prompts for sites (Microsoft Edge version 77 or later)

Windows 10, version 1703:
Administrative Templates\Windows Components\Windows Defender SmartScreen\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for sites (Microsoft Edge version 45 and earlier)

Administrative Templates\Microsoft Edge\SmartScreen settings\Prevent bypassing Microsoft Defender SmartScreen prompts for sites (Microsoft Edge version 77 or later)

Windows 10, Version 1511 and 1607:
Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows SmartScreen prompts for sites Microsoft Edge on Windows 10, version 1511 or later This policy setting stops employees from bypassing the Microsoft Defender SmartScreen warnings about potentially malicious sites.

If you enable this setting, it stops employees from bypassing the warning, stopping them from going to the site.

If you disable or don't configure this setting, your employees can bypass the warnings and continue to visit a potentially malicious site. @@ -169,15 +169,15 @@ To better help you protect your organization, we recommend turning on and using Recommendation -Administrative Templates\Windows Components\Microsoft Edge\Configure Windows Defender SmartScreen +Administrative Templates\Windows Components\Microsoft Edge\Configure Windows Defender SmartScreen (Microsoft Edge version 45 and earlier)

Administrative Templates\Microsoft Edge\SmartScreen settings\Configure Microsoft Defender SmartScreen (Microsoft Edge version 77 or later) Enable. Turns on Microsoft Defender SmartScreen. -Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for sites +Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for sites (Microsoft Edge version 45 and earlier)

Administrative Templates\Microsoft Edge\SmartScreen settings\Prevent bypassing Windows Defender SmartScreen prompts for sites (Microsoft Edge version 77 or later) Enable. Stops employees from ignoring warning messages and continuing to a potentially malicious website. -Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for files +Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for files (Microsoft Edge version 45 and earlier)

Administrative Templates\Microsoft Edge\SmartScreen settings\Prevent bypassing of Microsoft Defender SmartScreen warnings about downloads (Microsoft Edge version 77 or later) Enable. Stops employees from ignoring warning messages and continuing to download potentially malicious files. From b69035ebc4644ab790b7a6d124c2cf99704fe61f Mon Sep 17 00:00:00 2001 From: ShannonLeavitt Date: Tue, 27 Oct 2020 13:58:45 -0600 Subject: [PATCH 04/47] edit pass: enable-network-unlock --- .../bitlocker-how-to-enable-network-unlock.md | 44 ++++++++----------- 1 file changed, 18 insertions(+), 26 deletions(-) diff --git a/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md b/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md index 5c7b1190b1..7ba0b08f43 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md +++ b/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md @@ -1,5 +1,5 @@ --- -title: BitLocker How to enable Network Unlock (Windows 10) +title: BitLocker - How to enable Network Unlock (Windows 10) description: This topic for the IT professional describes how BitLocker Network Unlock works and how to configure it. ms.assetid: be45bc28-47db-4931-bfec-3c348151d2e9 ms.reviewer: @@ -23,45 +23,37 @@ ms.custom: bitlocker **Applies to** - Windows 10 -This topic for the IT professional describes how BitLocker Network Unlock works and how to configure it. +This article for IT professionals describes how BitLocker Network Unlock works and how to configure it. -Network Unlock was introduced in Windows 8 and Windows Server 2012 as a BitLocker protector option for operating system volumes. Network Unlock enables easier management for BitLocker enabled desktops and servers in a domain environment by providing automatic unlock of operating system volumes at system reboot when connected to a wired corporate network. This feature requires the client hardware to have a DHCP driver implemented in its UEFI firmware. -Without Network Unlock, operating system volumes protected by TPM+PIN protectors require a PIN to be entered when a computer reboots or resumes from hibernation (for example, by Wake on LAN). This can make it difficult to enterprises to roll out software patches to unattended desktops and remotely administered servers. +Network Unlock was introduced in Windows 8 and Windows Server 2012 as a BitLocker protector option for operating system volumes. Network Unlock helps you manage BitLocker-enabled desktops and servers in a domain environment by automatically unlocking operating system volumes when the system is rebooted and is connected to a wired corporate network. This feature requires the client hardware to have a DHCP driver implemented in its UEFI firmware. -Network Unlock allows BitLocker-enabled systems with TPM+PIN and that meet the hardware requirements to boot into Windows without user intervention. Network Unlock works in a similar fashion to the TPM+StartupKey at boot. Rather than needing to read the StartupKey from USB media, however, the key for Network Unlock is composed from a key stored in the TPM and an encrypted network key that is sent to the server, decrypted and returned to the client in a secure session. +Without Network Unlock, operating system volumes that are protected by TPM+PIN protectors require a PIN when a computer reboots or resumes after hibernation (for example, by Wake on LAN). For enterprises, this setup can make software patches difficult to roll out to unattended desktops and remotely administered servers. -This topic contains: - -- [Network Unlock core requirements](#bkmk-nunlockcorereqs) -- [Network Unlock sequence](#bkmk-networkunlockseq) -- [Configure Network Unlock](#bkmk-configuringnetworkunlock) -- [Create the certificate template for Network Unlock](#bkmk-createcerttmpl) -- [Turning off Network Unlock](#bkmk-turnoffnetworkunlock) -- [Update Network Unlock certificates](#bkmk-updatecerts) -- [Troubleshoot Network Unlock](#bkmk-troubleshoot) -- [Configure Network Unlock on unsupported systems](#bkmk-unsupportedsystems) +Network Unlock allows BitLocker-enabled systems that use TPM+PIN and that meet the hardware requirements to boot into Windows without user intervention. Network Unlock works like the TPM+StartupKey at boot. But the StartupKey doesn't need to be read from USB media. Instead, the key for Network Unlock is composed from a key that's stored in the TPM and an encrypted network key that's sent to the server. It's decrypted and returned to the client in a secure session. ## Network Unlock core requirements -Network Unlock must meet mandatory hardware and software requirements before the feature can automatically unlock domain joined systems. These requirements include: +Network Unlock must meet mandatory hardware and software requirements before the feature can automatically unlock domain-joined systems: - You must be running at least Windows 8 or Windows Server 2012. -- Any supported operating system with UEFI DHCP drivers can be Network Unlock clients. +- Any supported operating system that uses UEFI DHCP drivers can be Network Unlock clients. - Network Unlock clients must have a TPM chip and at least one TPM protector. -- A server running the Windows Deployment Services (WDS) role on any supported server operating system. -- BitLocker Network Unlock optional feature installed on any supported server operating system. -- A DHCP server, separate from the WDS server. -- Properly configured public/private key pairing. -- Network Unlock Group Policy settings configured. +- You must have a server running the Windows Deployment Services (WDS) role on any supported server operating system. +- The BitLocker Network Unlock optional feature can be installed on any supported server operating system. +- You must have a DHCP server, separate from the WDS server. +- You must have a properly configured public/private key pairing. +- Network Unlock Group Policy settings must be configured. -The network stack must be enabled to use the Network Unlock feature. Equipment manufacturers deliver their products in various states and with different BIOS menus, so you need to confirm that the network stack has been enabled in the BIOS before starting the computer. +The network stack must be enabled to use the Network Unlock feature. Equipment manufacturers deliver their products in various states and with different BIOS menus, so you need to confirm that the network stack has been enabled in the BIOS before you start the computer. > [!NOTE] -> To properly support DHCP within UEFI, the UEFI-based system should be in native mode without a compatibility support module (CSM) enabled. +> To properly support DHCP within UEFI, the UEFI-based system should be in native mode and shouldn't have a compatibility support module (CSM) enabled. -For Network Unlock to work reliably on computers running Windows 8 and later, the first network adapter on the computer, usually the onboard adapter, must be configured to support DHCP and used for Network Unlock. This is especially worth noting when you have multiple adapters, and you wish to configure one without DHCP, such as for a lights-out management protocol. This configuration is necessary because Network Unlock will stop enumerating adapters when it reaches one with a DHCP port failure for any reason. Thus, if the first enumerated adapter does not support DHCP, is not plugged into the network, or fails to report availability of the DHCP port for any reason, then Network Unlock will fail. +On computers running Windows 8 and later, the first network adapter on the computer, usually the onboard adapter, must be configured to support DHCP. This adapter must be used for Network Unlock. + +Use this configuration especially when you have multiple adapters and you want to configure one without DHCP, such as for a lights-out management protocol. The configuration is necessary because Network Unlock stops enumerating adapters when it reaches an adapter that has a DHCP port that has failed for any reason. So if the first enumerated adapter doesn't support DHCP, isn't plugged into the network, or fails to report availability of the DHCP port for any reason, then Network Unlock will fail. -The Network Unlock server component installs on supported versions of Windows Server 2012 and later as a Windows feature using Server Manager or Windows PowerShell cmdlets. The feature name is BitLocker Network Unlock in Server Manager and BitLocker-NetworkUnlock in Windows PowerShell. This feature is a core requirement. +On supported versions of Windows Server 2012 and later, the Network Unlock server component installs as a Windows feature. It uses Server Manager or Windows PowerShell cmdlets. In Server Manager, the feature name is BitLocker Network Unlock. In Windows PowerShell, the feature name is BitLocker-NetworkUnlock. This feature is a core requirement. Network Unlock requires Windows Deployment Services (WDS) in the environment where the feature will be utilized. Configuration of the WDS installation is not required; however, the WDS service needs to be running on the server. From 5c9fae720f702d3253bc77c2f786571e0ed47a31 Mon Sep 17 00:00:00 2001 From: ShannonLeavitt Date: Tue, 27 Oct 2020 17:55:11 -0600 Subject: [PATCH 05/47] more edits --- .../bitlocker-how-to-enable-network-unlock.md | 174 +++++++++--------- 1 file changed, 85 insertions(+), 89 deletions(-) diff --git a/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md b/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md index 7ba0b08f43..a514c327a4 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md +++ b/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md @@ -55,138 +55,134 @@ Use this configuration especially when you have multiple adapters and you want t On supported versions of Windows Server 2012 and later, the Network Unlock server component installs as a Windows feature. It uses Server Manager or Windows PowerShell cmdlets. In Server Manager, the feature name is BitLocker Network Unlock. In Windows PowerShell, the feature name is BitLocker-NetworkUnlock. This feature is a core requirement. -Network Unlock requires Windows Deployment Services (WDS) in the environment where the feature will be utilized. Configuration of the WDS installation is not required; however, the WDS service needs to be running on the server. +Network Unlock requires WDS in the environment where the feature will be used. Configuration of the WDS installation is not required. But the WDS service needs to be running on the server. -The network key is stored on the system drive along with an AES 256 session key, and encrypted with the 2048-bit RSA public key of the unlock server's certificate. The network key is decrypted with the help of a provider on a supported version of Windows Server running WDS, and returned encrypted with its corresponding session key. +The network key is stored on the system drive along with an AES 256 session key. It's encrypted with the 2048-bit RSA public key of the unlock server's certificate. The network key is decrypted with the help of a provider on a supported version of Windows Server that's running WDS. It's returned encrypted with its corresponding session key. ## Network Unlock sequence -The unlock sequence starts on the client side, when the Windows boot manager detects the existence of Network Unlock protector. It leverages the DHCP driver in UEFI to obtain an IP address for IPv4 and then broadcasts a vendor-specific DHCP request that contains the network key and a session key for the reply, all encrypted by the server's Network Unlock certificate, as described above. The Network Unlock provider on the supported WDS server recognizes the vendor-specific request, decrypts it with the RSA private key, and returns the network key encrypted with the session key via its own vendor-specific DHCP reply. +The unlock sequence starts on the client side, when the Windows boot manager detects the existence of the Network Unlock protector. It uses the DHCP driver in UEFI to get an IP address for IPv4. Then it broadcasts a vendor-specific DHCP request that contains the network key and a session key for the reply, all encrypted by the server's Network Unlock certificate, as described earlier. The Network Unlock provider on the supported WDS server recognizes the vendor-specific request, decrypts it with the RSA private key, and returns the network key encrypted with the session key via its own vendor-specific DHCP reply. -On the server side, the WDS server role has an optional plugin component, like a PXE provider, which is what handles the incoming Network Unlock requests. The provider can also be configured with subnet restrictions, which would require that the IP address provided by the client in the Network Unlock request belong to a permitted subnet in order to release the network key to the client. In instances where the Network Unlock provider is unavailable, BitLocker fails over to the next available protector to unlock the drive. In a typical configuration, this means the standard TPM+PIN unlock screen is presented to unlock the drive. +On the server side, the WDS server role has an optional plug-in component, like a PXE (preboot execution environment) provider, which is what handles the incoming Network Unlock requests. The provider can also be configured with subnet restrictions. These restrictions would require that the IP address provided by the client in the Network Unlock request belong to a permitted subnet in order to release the network key to the client. If the Network Unlock provider is unavailable, then BitLocker fails over to the next available protector to unlock the drive. So in a typical configuration, the standard TPM+PIN unlock screen is presented to unlock the drive. -The server side configuration to enable Network Unlock also requires provisioning a 2048-bit RSA public/private key pair in the form of an X.509 certificate, and for the public key certificate to be distributed to the clients. This certificate must be managed and deployed through the Group Policy editor directly on a domain controller with at least a Domain Functional Level of Windows Server 2012. This certificate is the public key that encrypts the intermediate network key (which is one of the two secrets required to unlock the drive; the other secret is stored in the TPM). +The server-side configuration to enable Network Unlock also requires provisioning a 2048-bit RSA public/private key pair in the form of an X.509 certificate. The configuration also requires the public key certificate to be distributed to the clients. This certificate must be managed and deployed through the Group Policy editor directly on a domain controller that has a domain functional level of at least Windows Server 2012. This certificate is the public key that encrypts the intermediate network key. The intermediate network key is one of the two secrets required to unlock the drive; the other secret is stored in the TPM. -![bitlocker network unlock sequence](images/bitlockernetworkunlocksequence.png) +![Diagram showing the BitLocker network unlock sequence.](images/bitlockernetworkunlocksequence.png) -**Phases in the Network Unlock process** +The Network Unlock process follows these phases: -1. The Windows boot manager detects that a Network Unlock protector exists in the BitLocker configuration. -2. The client computer uses its DHCP driver in the UEFI to obtain a valid IPv4 IP address. +1. The Windows boot manager detects a Network Unlock protector in the BitLocker configuration. +2. The client computer uses its DHCP driver in the UEFI to get a valid IPv4 IP address. 3. The client computer broadcasts a vendor-specific DHCP request that contains: - 1. A Network Key (a 256-bit intermediate key) encrypted using the 2048-bit RSA Public Key of the Network Unlock certificate from the WDS server. - 2. An AES-256 session key for the reply. + - A network key (a 256-bit intermediate key) that's encrypted by the 2048-bit RSA public key of the Network Unlock certificate from the WDS server. + - An AES-256 session key for the reply. 4. The Network Unlock provider on the WDS server recognizes the vendor-specific request. -5. The provider decrypts it with the WDS server’s BitLocker Network Unlock certificate RSA private key. -6. The WDS provider then returns the network key encrypted with the session key using its own vendor-specific DHCP reply to the client computer. This forms an intermediate key. -7. The returned intermediate key is then combined with another local 256-bit intermediate key that can only be decrypted by the TPM. +5. The provider decrypts it with the WDS server's BitLocker Network Unlock certificate RSA private key. +6. The WDS provider then returns the network key encrypted with the session key by using its own vendor-specific DHCP reply to the client computer. This key is an intermediate key. +7. The returned intermediate key is then combined with another local 256-bit intermediate key. This key can be decrypted only by the TPM. 8. This combined key is used to create an AES-256 key that unlocks the volume. 9. Windows continues the boot sequence. ## Configure Network Unlock -The following steps allow an administrator to configure Network Unlock in a domain where the Domain Functional Level is at least Windows Server 2012. +The following steps allow an administrator to configure Network Unlock in a domain where the domain functional level is at least Windows Server 2012. ### Install the WDS Server role -The BitLocker Network Unlock feature will install the WDS role if it is not already installed. If you want to install it separately before you install BitLocker Network Unlock you can use Server Manager or Windows PowerShell. To install the role using Server Manager, select the **Windows Deployment Services** role in Server Manager. +The BitLocker Network Unlock feature installs the WDS role if it's not already installed. If you want to install it separately before you install BitLocker Network Unlock, use Server Manager or Windows PowerShell. To install the role by using Server Manager, select the **Windows Deployment Services** role in Server Manager. -To install the role using Windows PowerShell, use the following command: +To install the role by using Windows PowerShell, use the following command: ```powershell Install-WindowsFeature WDS-Deployment ``` -You must configure the WDS server so that it can communicate with DHCP (and optionally Active Directory Domain Services) and the client computer. You can do using the WDS management tool, wdsmgmt.msc, which starts the Windows Deployment Services Configuration Wizard. +Configure the WDS server so that it can communicate with DHCP (and optionally Active Directory Domain Services) and the client computer. You can do so by using the WDS management tool, `wdsmgmt.msc`. This tool starts the Windows Deployment Services Configuration Wizard. -### Confirm the WDS Service is running +### Confirm the WDS service is running -To confirm the WDS service is running, use the Services Management Console or Windows PowerShell. To confirm the service is running in Services Management Console, open the console using **services.msc** and check the status of the Windows Deployment Services service. +To confirm the WDS service is running, use the Services Management console or Windows PowerShell. To confirm the service is running in the Services Management console, open the console by using `services.msc`. Then check the status of the WDS service. -To confirm the service is running using Windows PowerShell, use the following command: +To confirm the service is running by using Windows PowerShell, use the following command: ```powershell Get-Service WDSServer ``` ### Install the Network Unlock feature -To install the Network Unlock feature, use Server Manager or Windows PowerShell. To install the feature using Server Manager, select the **BitLocker Network Unlock** feature in the Server Manager console. +To install the Network Unlock feature, use Server Manager or Windows PowerShell. To install the feature by using Server Manager, in the Server Manager console, select **BitLocker Network Unlock**. -To install the feature using Windows PowerShell, use the following command: +To install the feature by using Windows PowerShell, use the following command: ```powershell Install-WindowsFeature BitLocker-NetworkUnlock ``` ### Create the certificate template for Network Unlock -A properly configured Active Directory Services Certification Authority can use this certificate template to create and issue Network Unlock certificates. +A properly configured Active Directory Services Certification Authority can use the certificate template to create and issue Network Unlock certificates. -1. Open the Certificates Template snap-in (certtmpl.msc). -2. Locate the User template. Right-click the template name and select **Duplicate Template**. -3. On the **Compatibility** tab, change the **Certification Authority** and **Certificate recipient** fields to Windows Server 2012 and Windows 8 respectively. Ensure the **Show resulting changes** dialog box is selected. -4. Select the **General** tab of the template. The **Template display name** and **Template name** should clearly identify that the template will be used for Network Unlock. Clear the checkbox for the **Publish certificate in Active Directory** option. -5. Select the **Request Handling** tab. Select **Encryption** from the **Purpose** drop down menu. Ensure the **Allow private key to be exported** option is selected. -6. Select the **Cryptography** tab. Set the **Minimum key size** to 2048. (Any Microsoft cryptographic provider that supports RSA can be used for this template, but for simplicity and forward compatibility we recommend using the **Microsoft Software Key Storage Provider**.) -7. Select the **Requests must use one of the following providers** option and clear all options except for the cryptography provider you selected, such as the **Microsoft Software Key Storage Provider**. -8. Select the **Subject Name** tab. Select **Supply in the request**. Select **OK** if the certificate templates pop-up dialog appears. -9. Select the **Issuance Requirements** tab. Select both **CA certificate manager approval** and **Valid existing certificate** options. -10. Select the **Extensions** tab. Select **Application Policies** and choose **Edit…**. -11. In the **Edit Application Policies Extension** options dialog box, select **Client Authentication**, **Encrypting File System**, **and Secure Email** and choose **Remove**. -12. On the **Edit Application Policies Extension** dialog box, select **Add**. -13. On the **Add Application Policy** dialog box, select **New**. In the **New Application Policy** dialog box enter the following information in the space provided and then click **OK** to create the BitLocker Network Unlock application policy: +1. Open the certificate template snap-in (`certtmpl.msc`). +2. Locate the user template. Right-click the template name and then select **Duplicate Template**. +3. On the **Compatibility** tab, change the **Certification Authority** and **Certificate recipient** fields to Windows Server 2012 and Windows 8, respectively. Ensure the **Show resulting changes** dialog box is selected. +4. Select the **General** tab of the template. The **Template display name** and **Template name** should clearly identify that the template will be used for Network Unlock. Clear the check box for **Publish certificate in Active Directory**. +5. Select the **Request Handling** tab. In the **Purpose** drop-down menu, select **Encryption**. Ensure the **Allow private key to be exported** option is selected. +6. Select the **Cryptography** tab. Set the **Minimum key size** to *2048*. (For this template, you can use any Microsoft cryptographic provider that supports RSA. But for simplicity and forward compatibility, we recommend using **Microsoft Software Key Storage Provider**.) +7. Select **Requests must use one of the following providers**. Then clear all options except for your selected cryptography provider, such as the **Microsoft Software Key Storage Provider**. +8. Select the **Subject Name** tab. Select **Supply in the request**. If the certificate templates dialog box appears, select **OK**. +9. Select the **Issuance Requirements** tab. Then select both **CA certificate manager approval** and **Valid existing certificate**. +10. Select the **Extensions** tab. Then select **Application Policies** > **Edit**. +11. In the **Edit Application Policies Extension** dialog box, select **Client Authentication**, **Encrypting File System**, and **Secure Email**. Then choose **Remove**. +12. In the **Edit Application Policies Extension** dialog box, select **Add**. +13. In the **Add Application Policy** dialog box, select **New**. In the **New Application Policy** dialog box, enter the following information in the space provided and then click **OK** to create the BitLocker Network Unlock application policy: - - **Name:** **BitLocker Network Unlock** - - **Object Identifier:** **1.3.6.1.4.1.311.67.1.1** + - **Name**: **BitLocker Network Unlock** + - **Object Identifier**: **1.3.6.1.4.1.311.67.1.1** -14. Select the newly created **BitLocker Network Unlock** application policy and select **OK**. -15. With the **Extensions** tab still open, select the **Edit Key Usage Extension** dialog, select the **Allow key exchange only with key encryption (key encipherment)** option. Select the **Make this extension critical** option. +14. Select the newly created **BitLocker Network Unlock** application policy and then select **OK**. +15. With the **Extensions** tab still open, select **Edit Key Usage Extension**, and then select **Allow key exchange only with key encryption (key encipherment)**. Then select **Make this extension critical**. 16. Select the **Security** tab. Confirm that the **Domain Admins** group has been granted **Enroll** permission. 17. Select **OK** to complete configuration of the template. -To add the Network Unlock template to the Certification Authority, open the Certification Authority snap-in (certsrv.msc). Right-click the **Certificate Templates** item and choose **New, Certificate Template to issue**. Select the previously created BitLocker Network Unlock certificate. +To add the Network Unlock template to the certificate authority, open the certificate authority snap-in (`certsrv.msc`). Right-click **Certificate Templates** and then choose **New, Certificate Template to issue**. Select the previously created BitLocker Network Unlock certificate. -After adding the Network Unlock template to the Certification Authority, this certificate can be used to configure BitLocker Network Unlock. +After you add the Network Unlock template to the certificate authority, you can use this certificate to configure BitLocker Network Unlock. ### Create the Network Unlock certificate -Network Unlock can use imported certificates from an existing PKI infrastructure, or you can use a self-signed certificate. +Network Unlock can use imported certificates from an existing public key infrastructure (PKI), or you can use a self-signed certificate. -To enroll a certificate from an existing certification authority (CA), do the following: +To enroll a certificate from an existing certificate authority: -1. Open Certificate Manager on the WDS server using **certmgr.msc** -2. Under the Certificates - Current User item, right-click Personal -3. Select All Tasks, then **Request New Certificate** -4. Select **Next** when the Certificate Enrollment wizard opens -5. Select Active Directory Enrollment Policy -6. Choose the certificate template created for Network Unlock on the Domain controller and select **Enroll**. When prompted for more information, add the following attribute to the certificate: +1. On the WDS server, open Certificate Manager by using `certmgr.msc`. +2. Under **Certificates - Current User**, right-click **Personal**. +3. Select **All Tasks** > **Request New Certificate**. +4. When the Certificate Enrollment wizard opens, select **Next**. +5. Select **Active Directory Enrollment Policy**. +6. Choose the certificate template that was created for Network Unlock on the domain controller. Then select **Enroll**. +1. When you're prompted for more information, select **Subject Name** and provide a friendly name value. Your friendly name should include information for the domain or organizational unit for the certificate. Here's an example: *BitLocker Network Unlock Certificate for Contoso domain*. +7. Create the certificate. Ensure the certificate appears in the **Personal** folder. +8. Export the public key certificate for Network Unlock: - - Select the **Subject Name** pane and provide a friendly name value. It is suggested that this friendly name include information for the domain or organizational unit for the certificate. For example "BitLocker Network Unlock Certificate for Contoso domain" - -7. Create the certificate. Ensure the certificate appears in the Personal folder. -8. Export the public key certificate for Network Unlock - - 1. Create a .cer file by right-clicking the previously created certificate, choosing **All Tasks**, then **Export**. + 1. Create a *.cer* file by right-clicking the previously created certificate and choosing **All Tasks** > **Export**. 2. Select **No, do not export the private key**. - 3. Select **DER encoded binary X.509** and complete exporting the certificate to a file. - 4. Give the file a name such as BitLocker-NetworkUnlock.cer. - -9. Export the public key with a private key for Network Unlock - - 1. Create a .pfx file by right-clicking the previously created certificate, choosing **All Tasks**, then **Export**. + 3. Select **DER encoded binary X.509** and then finish exporting the certificate to a file. + 4. Give the file a name, such as *BitLocker-NetworkUnlock.cer*. +9. Export the public key with a private key for Network Unlock: + 1. Create a *.pfx* file by right-clicking the previously created certificate. Then choose **All Tasks** > **Export**. 2. Select **Yes, export the private key**. - 3. Complete the wizard to create the .pfx file. + 3. Complete the steps to create the *.pfx* file. To create a self-signed certificate, you can either use the New-SelfSignedCertificate cmdlet in Windows PowerShell or use Certreq. -Windows PowerShell example: +Here's a Windows PowerShell example: ```powershell New-SelfSignedCertificate -CertStoreLocation Cert:\LocalMachine\My -Subject "CN=BitLocker Network Unlock certificate" -Provider "Microsoft Software Key Storage Provider" -KeyUsage KeyEncipherment -KeyUsageProperty Decrypt,Sign -KeyLength 2048 -HashAlgorithm sha512 -TextExtension @("1.3.6.1.4.1.311.21.10={text}OID=1.3.6.1.4.1.311.67.1.1","2.5.29.37={text}1.3.6.1.4.1.311.67.1.1") ``` -Certreq example: +Here's a Certreq example: -1. Create a text file with an .inf extension. For example, notepad.exe BitLocker-NetworkUnlock.inf. +1. Create a text file with an *.inf* extension. For example, *notepad.exe* *BitLocker-NetworkUnlock.inf*. 2. Add the following contents to the previously created file: ```ini @@ -208,53 +204,53 @@ Certreq example: _continue_ = "1.3.6.1.4.1.311.67.1.1" ``` -3. Open an elevated command prompt and use the certreq tool to create a new certificate using the following command, specifying the full path to the file created previously, along with the file name: +3. Open an elevated command prompt and use the `certreq` tool to create a new certificate. Use the following command, specifying the full path to the file that you created previously. Also specify the file name: ```cmd certreq -new BitLocker-NetworkUnlock.inf BitLocker-NetworkUnlock.cer ``` -4. Verify the previous command properly created the certificate by confirming the .cer file exists. -5. Launch Certificates - Local Machine by running **certlm.msc**. -6. Create a .pfx file by opening the **Certificates – Local Computer\\Personal\\Certificates** path in the navigation pane, right-clicking the previously imported certificate, selecting **All Tasks**, then **Export**. Follow through the wizard to create the .pfx file. +4. Verify the previous command properly created the certificate by confirming the *.cer* file exists. +5. Launch **Certificates - Local Machine** by running `certlm.msc`. +6. Create a *.pfx* file by opening the *Certificates – Local Computer\\Personal\\Certificates* path in the navigation pane. Right-click the previously imported certificate, and then select **All Tasks** > **Export**. Follow through the steps to create the *.pfx* file. ### Deploy the private key and certificate to the WDS server -With the certificate and key created, deploy them to the infrastructure to properly unlock systems. To deploy the certificates, do the following: +Now that the certificate and key are created, deploy them to the infrastructure to properly unlock systems. To deploy the certificates: -1. On the WDS server, open a new MMC and add the certificates snap-in. Select the computer account and local computer when given the options. -2. Right-click the Certificates (Local Computer) - BitLocker Drive Encryption Network Unlock item, choose All Tasks, then **Import**. -3. In the **File to Import** dialog, choose the .pfx file created previously. -4. Enter the password used to create the .pfx and complete the wizard. +1. On the WDS server, open a new Microsoft Management Console (MMC) and then add the certificates snap-in. Select the computer account and local computer when these options appear. +2. Right-click **Certificates (Local Computer) - BitLocker Drive Encryption Network Unlock** and then choose **All Tasks** > **Import**. +3. In the **File to Import** dialog box, choose the *.pfx* file that you created previously. +4. Enter the password that you used to create the *.pfx*, and finish the steps. ### Configure Group Policy settings for Network Unlock -With certificate and key deployed to the WDS server for Network Unlock, the final step is to use Group Policy settings to deploy the public key certificate to computers that you want to be able to unlock using the Network Unlock key. Group Policy settings for BitLocker can be found under **\\Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption** using the Local Group Policy Editor or the Microsoft Management Console. +Now that you've deployed the certificate and key to the WDS server for Network Unlock, the final step is to use Group Policy settings to deploy the public key certificate to computers that you want to be able to unlock by using the Network Unlock key. You can find Group Policy settings for BitLocker in *\\Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption* by using the Local Group Policy Editor or the MMC. -The following steps describe how to enable the Group Policy setting that is a requirement for configuring Network Unlock. +To enable the Group Policy setting that's required to configure Network Unlock: -1. Open Group Policy Management Console (gpmc.msc). -2. Enable the policy **Require additional authentication at startup** and select the **Require startup PIN with TPM** or **Allow startup PIN with TPM** option. +1. Open Group Policy Management Console (`gpmc.msc`). +2. Enable the policy **Require additional authentication at startup**, and then select **Require startup PIN with TPM** or **Allow startup PIN with TPM**. 3. Turn on BitLocker with TPM+PIN protectors on all domain-joined computers. -The following steps describe how to deploy the required Group Policy setting: +To deploy the required Group Policy setting: > [!NOTE] > The Group Policy settings **Allow network unlock at startup** and **Add Network Unlock Certificate** were introduced in Windows Server 2012. -1. Copy the .cer file created for Network Unlock to the domain controller. -2. On the domain controller, launch Group Policy Management Console (gpmc.msc). +1. Copy the *.cer* file that you created for Network Unlock to the domain controller. +2. On the domain controller, launch Group Policy Management Console (`gpmc.msc`). 3. Create a new Group Policy Object or modify an existing object to enable the **Allow network unlock at startup** setting. 4. Deploy the public certificate to clients: - 1. Within Group Policy Management Console, navigate to the following location: **Computer Configuration\\Policies\\Windows Settings\\Security Settings\\Public Key Policies\\BitLocker Drive Encryption Network Unlock Certificate**. - 2. Right-click the folder and choose **Add Network Unlock Certificate**. - 3. Follow the wizard steps and import the .cer file that was copied earlier. + 1. In Group Policy Management Console, go to the following location: *Computer Configuration\\Policies\\Windows Settings\\Security Settings\\Public Key Policies\\BitLocker Drive Encryption Network Unlock Certificate*. + 2. Right-click the folder and then choose **Add Network Unlock Certificate**. + 3. Follow the steps and import the *.cer* file that you copied earlier. -> [!NOTE] -> Only one network unlock certificate can be available at a time. If a new certificate is required, delete the current certificate before deploying a new one. The Network Unlock certificate is located in the **HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\SystemCertificates\\FVE\_NKP** key on the client computer. + > [!NOTE] + > Only one network unlock certificate can be available at a time. If a new certificate is required, delete the current certificate before you deploy a new one. The Network Unlock certificate is located in the *HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\SystemCertificates\\FVE\_NKP* key on the client computer. -5. Reboot the clients after deploying the group policy. +5. Reboot the clients after you deploy the group policy. > [!NOTE] > The **Network (Certificate Based)** protector will be added only after a reboot with the policy enabled and a valid certificate present in the FVE_NKP store. From 373561d1e82e0e6908a478803e5cac7f5212c19e Mon Sep 17 00:00:00 2001 From: ShannonLeavitt Date: Wed, 28 Oct 2020 07:57:44 -0600 Subject: [PATCH 06/47] more edits --- .../bitlocker-how-to-enable-network-unlock.md | 118 +++++++++--------- 1 file changed, 60 insertions(+), 58 deletions(-) diff --git a/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md b/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md index a514c327a4..4a7d9d600f 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md +++ b/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md @@ -252,15 +252,15 @@ To deploy the required Group Policy setting: 5. Reboot the clients after you deploy the group policy. > [!NOTE] - > The **Network (Certificate Based)** protector will be added only after a reboot with the policy enabled and a valid certificate present in the FVE_NKP store. + > The **Network (Certificate Based)** protector is added only after a reboot. The policy must be enabled, and a valid certificate must be present in the FVE_NKP store. -### Subnet policy configuration files on WDS Server (Optional) +### Subnet policy configuration files on the WDS server (Optional) -By default, all clients with the correct Network Unlock Certificate and valid Network Unlock protectors that have wired access to a Network Unlock-enabled WDS server via DHCP are unlocked by the server. A subnet policy configuration file on the WDS server can be created to limit which subnet(s) Network Unlock clients can use to unlock. +By default, clients are unlocked by the server if they have the correct Network Unlock certificate and valid Network Unlock protectors that have wired access to a Network Unlock-enabled WDS server via DHCP. You can create a subnet policy configuration file on the WDS server to limit the subnets that Network Unlock clients can use to unlock. -The configuration file, called bde-network-unlock.ini, must be located in the same directory as the Network Unlock provider DLL (%windir%\System32\Nkpprov.dll) and it applies to both IPv6 and IPv4 DHCP implementations. If the subnet configuration policy becomes corrupted, the provider will fail and stop responding to requests. +The configuration file, called *bde-network-unlock.ini*, must be located in the same directory as the Network Unlock provider DLL (*%windir%\System32\Nkpprov.dll*). It applies to both IPv6 and IPv4 DHCP implementations. If the subnet configuration policy becomes corrupted, then the provider fails and stops responding to requests. -The subnet policy configuration file must use a “\[SUBNETS\]” section to identify the specific subnets. The named subnets may then be used to specify restrictions in certificate subsections. Subnets are defined as simple name-value pairs, in the common INI format, where each subnet has its own line, with the name on the left of the equals sign, and the subnet identified on the right of the equal sign as a Classless Inter-Domain Routing (CIDR) address or range. The key word “ENABLED” is disallowed for subnet names. +The subnet policy configuration file must use a `[SUBNETS]` section to identify the specific subnets. The named subnets can then be used to specify restrictions in certificate subsections. Subnets are defined as simple name-value pairs, in the common INI format. In this format, each subnet has its own line. The name is on the left of the equals sign. The subnet that's identified on the right of the equals sign is a Classless Interdomain Routing (CIDR) address or range. The keyword `ENABLED` is disallowed for subnet names. ```ini [SUBNETS] @@ -270,110 +270,112 @@ SUBNET3= 2001:4898:a:2::/64 ; an IPv6 subnet SUBNET4=2001:4898:a:3::/64; in production, the admin would likely give more useful names, like BUILDING9-EXCEPT-RECEP. ``` -Following the \[SUBNETS\] section, there can be sections for each Network Unlock certificate, identified by the certificate thumbprint formatted without any spaces, which define subnets clients can be unlocked from with that certificate. +Following the `[SUBNETS]` section are sections for each Network Unlock certificate. A certificate is identified by the certificate thumbprint, which is formatted without any spaces. These sections define subnet clients that can be unlocked by using that certificate. > [!NOTE] -> When specifying the certificate thumbprint, do not include any spaces. If spaces are included in the thumbprint the subnet configuration will fail because the thumbprint will not be recognized as valid. +> When you specify the certificate thumbprint, don't include spaces. Thumbprints that include spaces aren't recognized as valid. These will cause the subnet configuration to fail. -Subnet restrictions are defined within each certificate section by denoting the allowed list of permitted subnets. If any subnet is listed in a certificate section, then only those subnets listed are permitted for that certificate. If no subnet is listed in a certificate section, then all subnets are permitted for that certificate. If a certificate does not have a section in the subnet policy configuration file, then no subnet restrictions are applied for unlocking with that certificate. This means for restrictions to apply to every certificate, there must be a certificate section for every Network Unlock certificate on the server, and an explicit allowed list set for each certificate section. -Subnet lists are created by putting the name of a subnet from the \[SUBNETS\] section on its own line below the certificate section header. Then, the server will only unlock clients with this certificate on the subnet(s) specified as in the list. For troubleshooting, a subnet can be quickly excluded without deleting it from the section by simply commenting it out with a prepended semi-colon. +Each certificate section defines subnet restrictions by denoting the allowed list of permitted subnets. If any subnets are listed in a certificate section, then only those subnets are permitted for that certificate. If no subnet is listed in a certificate section, then all subnets are permitted for that certificate. If a certificate has no section in the subnet policy configuration file, then no subnet unlocking restrictions are applied for that certificate. So to apply restrictions to every certificate, you must add a certificate section for every Network Unlock certificate on the server. And you must add an explicit allow list set for each certificate section. + +Create subnet lists by putting the name of a subnet from the `[SUBNETS]` section on its own line below the certificate section header. Then, the server will unlock clients that have this certificate only on the subnets that the list specifies. To troubleshoot, you can quickly exclude a subnet without deleting it from the section by simply commenting it out with a prepended semicolon. ```ini [2158a767e1c14e88e27a4c0aee111d2de2eafe60] ;Comments could be added here to indicate when the cert was issued, which Group Policy should get it, and so on. -;This list shows this cert is only allowed to unlock clients on SUBNET1 and SUBNET3 subnets. In this example, SUBNET2 is commented out. +;This list shows this cert is allowed to unlock clients only on the SUBNET1 and SUBNET3 subnets. In this example, SUBNET2 is commented out. SUBNET1 ;SUBNET2 SUBNET3 ``` -To disallow the use of a certificate altogether, its subnet list may contain the line “DISABLED". +To disallow the use of a certificate altogether, you can add a `DISABLED` line to its subnet list. -## Turning off Network Unlock +## Turn off Network Unlock -To turn off the unlock server, the PXE provider can be unregistered from the WDS server or uninstalled altogether. However, to stop clients from creating Network Unlock protectors the **Allow Network Unlock at startup** Group Policy setting should be disabled. When this policy setting is updated to disabled on client computers any Network Unlock key protectors on the computer will be deleted. Alternatively, the BitLocker Network Unlock certificate policy can be deleted on the domain controller to accomplish the same task for an entire domain. +To turn off the unlock server, you can unregister the PXE provider from the WDS server or uninstall it altogether. However, to stop clients from creating Network Unlock protectors, you should disable the **Allow Network Unlock at startup** Group Policy setting. When you disable this policy setting on client computers, any Network Unlock key protectors on the computer are deleted. Alternatively, you can delete the BitLocker Network Unlock certificate policy on the domain controller to accomplish the same task for an entire domain. > [!NOTE] -> Removing the FVE_NKP certificate store that contains the Network Unlock certificate and key on the WDS server will also effectively disable the server’s ability to respond to unlock requests for that certificate. However, this is seen as an error condition and is not a supported or recommended method for turning off the Network Unlock server. +> Removing the FVE_NKP certificate store that contains the Network Unlock certificate and key on the WDS server will also effectively disable the server's ability to respond to unlock requests for that certificate. However, this is seen as an error condition. It's not a supported or recommended method for turning off the Network Unlock server. ## Update Network Unlock certificates -To update the certificates used by Network Unlock, administrators need to import or generate the new certificate for the server and then update the Network Unlock certificate Group Policy setting on the domain controller. +To update the certificates that Network Unlock uses, administrators need to import or generate the new certificate for the server. Then they must update the Network Unlock certificate Group Policy setting on the domain controller. > [!NOTE] -> Servers that do not receive the Group Policy Object (GPO) will require a PIN when booting. In such cases, the reason why the server did not receive the GPO to update the certificate needs to be investigated. +> Servers that don't receive the Group Policy Object (GPO) will require a PIN when they boot. In such cases, find out why the server didn't receive the GPO to update the certificate. ## Troubleshoot Network Unlock -Troubleshooting Network Unlock issues begins by verifying the environment. Many times, a small configuration issue will be the root cause of the failure. Items to verify include: +To troubleshoot Network Unlock issues, begin by verifying the environment. Many times, a small configuration issue is the root cause of the failure. Verify these items: -- Verify client hardware is UEFI-based and is on firmware version is 2.3.1 and that the UEFI firmware is in native mode without a Compatibility Support Module (CSM) for BIOS mode enabled. Do this by checking that the firmware does not have an option enabled such as "Legacy mode" or "Compatibility mode" or that the firmware does not appear to be in a BIOS-like mode. -- All required roles and services are installed and started -- Public and private certificates have been published and are in the proper certificate containers. The presence of the Network Unlock certificate can be verified in the Microsoft Management Console (MMC.exe) on the WDS server with the certificate snap-ins for the local computer enabled. The client certificate can be verified by checking the registry key **HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\SystemCertificates\\FVE\_NKP** on the client computer. -- Group policy for Network Unlock is enabled and linked to the appropriate domains. -- Verify group policy is reaching the clients properly. This can be done using the GPRESULT.exe or RSOP.msc utilities. -- Verify the clients were rebooted after applying the policy. -- Verify the **Network (Certificate Based)** protector is listed on the client. This can be done using either manage-bde or Windows PowerShell cmdlets. For example the following command will list the key protectors currently configured on the C: drive of the local computer: +- Client hardware is UEFI-based and is using firmware version 2.3.1, and the UEFI firmware is in native mode doesn't have a Compatibility Support Module (CSM) for BIOS mode enabled. Verify this configuration by checking that the firmware has no enabled option such as **Legacy mode** or **Compatibility mode** or that the firmware doesn't appear to be in a BIOS-like mode. +- All required roles and services are installed and started. +- Public and private certificates have been published and are in the proper certificate containers. Verify the presence of the Network Unlock certificate by using Microsoft Management Console (*MMC.exe*) on the WDS server. The certificate snap-ins for the local computer should be enabled. Verify the client certificate by checking the registry key *HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\SystemCertificates\\FVE\_NKP* on the client computer. +- Group Policy for Network Unlock is enabled and linked to the appropriate domains. +- Group Policy is reaching the clients properly. Verify this functionality by using the *GPRESULT.exe* utility or *RSOP.msc* utility. +- The clients were rebooted after the policy was applied. +- The **Network (Certificate Based)** protector is listed on the client. Check for this protector by using either `manage-bde` or Windows PowerShell cmdlets. For example, the following command lists the key protectors that are currently configured on drive C on the local computer. ```powershell manage-bde -protectors -get C: ``` > [!NOTE] - > Use the output of manage-bde along with the WDS debug log to determine if the proper certificate thumbprint is being used for Network Unlock + > Use the output of `manage-bde` along with the WDS debug log to determine whether the proper certificate thumbprint is being used for Network Unlock. -Files to gather when troubleshooting BitLocker Network Unlock include: +Gather the following files to troubleshoot BitLocker Network Unlock. -1. The Windows event logs. Specifically the BitLocker event logs and the Microsoft-Windows-Deployment-Services-Diagnostics-Debug log +- The Windows event logs. Specifically, get the BitLocker event logs and the Microsoft-Windows-Deployment-Services-Diagnostics-Debug log. - Debug logging is turned off by default for the WDS server role, so you will need to enable it first. You can use either of the following two methods to turn on WDS debug logging. + Debug logging is turned off by default for the WDS server role, so you need to enable it before you can retrieve it. Use either of the following two methods to turn on WDS debug logging. - 1. Start an elevated command prompt and run the following command: + - Start an elevated command prompt and then run the following command: ```cmd wevtutil sl Microsoft-Windows-Deployment-Services-Diagnostics/Debug /e:true ``` - 2. Open Event Viewer on the WDS server. + - Open Event Viewer on the WDS server. - In the left pane, click **Applications and Services Logs**, click **Microsoft**, click **Windows**, click **Deployment-Services-Diagnostics**, and then click **Debug**. + In the left pane, select **Applications and Services Logs** > **Microsoft** > **Windows** > **Deployment-Services-Diagnostics** > **Debug**. - In the right pane, click **Enable Log**. + In the right pane, selet **Enable Log**. -2. The DHCP subnet configuration file (if one exists). -3. The output of the BitLocker status on the volume, this can be gathered into a text file using **manage-bde -status** or **Get-BitLockerVolume** in Windows PowerShell. -4. Network Monitor capture on the server hosting the WDS role, filtered by client IP address. +- The DHCP subnet configuration file (if one exists). +- The output of the BitLocker status on the volume. Gather this output into a text file by using `manage-bde -status`. Or in Windows PowerShell, use `Get-BitLockerVolume`. +- The Network Monitor capture on the server that hosts the WDS role, filtered by client IP address. ## Configure Network Unlock Group Policy settings on earlier versions -Network Unlock and the accompanying Group Policy settings were introduced in Windows Server 2012 but can be deployed using operating systems running Windows Server 2008 R2 and Windows Server 2008. +Network Unlock and the accompanying Group Policy settings were introduced in Windows Server 2012. But you can deploy them by using operating systems that run Windows Server 2008 R2 and Windows Server 2008. -**Requirements** +Requirements: -- The server hosting WDS must be running any of the server operating systems designated in the **Applies To** list at the beginning of this topic. -- Client computers must be running any of the client operating systems designated in the **Applies To** list at the beginning of this topic. +- The server that hosts WDS must be running a server operating system that's designated in the **Applies to** list at the beginning of this article. +- Client computers must be running a client operating system that's designated in the **Applies to** list at the beginning of this article. -The following steps can be used to configure Network Unlock on these older systems. +Follow these steps to configure Network Unlock on these older systems. -1. [Install the WDS Server role](#bkmk-installwdsrole) -2. [Confirm the WDS Service is running](#bkmk-confirmwdsrunning) -3. [Install the Network Unlock feature](#bkmk-installnufeature) -4. [Create the Network Unlock certificate](#bkmk-createcert) -5. [Deploy the private key and certificate to the WDS server](#bkmk-deploycert) +1. [Install the WDS Server role.](#bkmk-installwdsrole) +2. [Confirm the WDS service is running.](#bkmk-confirmwdsrunning) +3. [Install the Network Unlock feature.](#bkmk-installnufeature) +4. [Create the Network Unlock certificate.](#bkmk-createcert) +5. [Deploy the private key and certificate to the WDS server.](#bkmk-deploycert) 6. Configure registry settings for Network Unlock: - Apply the registry settings by running the following certutil script (assuming your network unlock certificate file is called **BitLocker-NetworkUnlock.cer**) on each computer running any of the client operating systems designated in the **Applies To** list at the beginning of this topic. -```console - certutil -f -grouppolicy -addstore FVE_NKP BitLocker-NetworkUnlock.cer - reg add "HKLM\SOFTWARE\Policies\Microsoft\FVE" /v OSManageNKP /t REG_DWORD /d 1 /f - reg add "HKLM\SOFTWARE\Policies\Microsoft\FVE" /v UseAdvancedStartup /t REG_DWORD /d 1 /f - reg add "HKLM\SOFTWARE\Policies\Microsoft\FVE" /v UsePIN /t REG_DWORD /d 2 /f - reg add "HKLM\SOFTWARE\Policies\Microsoft\FVE" /v UseTPMPIN /t REG_DWORD /d 2 /f - reg add "HKLM\SOFTWARE\Policies\Microsoft\FVE" /v UseTPM /t REG_DWORD /d 2 /f - reg add "HKLM\SOFTWARE\Policies\Microsoft\FVE" /v UseTPMKey /t REG_DWORD /d 2 /f - reg add "HKLM\SOFTWARE\Policies\Microsoft\FVE" /v UseTPMKeyPIN /t REG_DWORD /d 2 /f -``` + Apply the registry settings by running the following `certutil` script (assuming your Network Unlock certificate file is called *BitLocker-NetworkUnlock.cer*) on each computer that runs a client operating system that's designated in the **Applies to** list at the beginning of this article. -7. Set up a TPM protector on the clients -8. Reboot the clients to add the Network (Certificate Based) protector + ```console + certutil -f -grouppolicy -addstore FVE_NKP BitLocker-NetworkUnlock.cer + reg add "HKLM\SOFTWARE\Policies\Microsoft\FVE" /v OSManageNKP /t REG_DWORD /d 1 /f + reg add "HKLM\SOFTWARE\Policies\Microsoft\FVE" /v UseAdvancedStartup /t REG_DWORD /d 1 /f + reg add "HKLM\SOFTWARE\Policies\Microsoft\FVE" /v UsePIN /t REG_DWORD /d 2 /f + reg add "HKLM\SOFTWARE\Policies\Microsoft\FVE" /v UseTPMPIN /t REG_DWORD /d 2 /f + reg add "HKLM\SOFTWARE\Policies\Microsoft\FVE" /v UseTPM /t REG_DWORD /d 2 /f + reg add "HKLM\SOFTWARE\Policies\Microsoft\FVE" /v UseTPMKey /t REG_DWORD /d 2 /f + reg add "HKLM\SOFTWARE\Policies\Microsoft\FVE" /v UseTPMKeyPIN /t REG_DWORD /d 2 /f + ``` + +7. Set up a TPM protector on the clients. +8. Reboot the clients to add the **Network (Certificate Based)** protector. ## See also From 0683698c0e40089c58ede8850fd50ffa8a381ae0 Mon Sep 17 00:00:00 2001 From: ShannonLeavitt Date: Wed, 28 Oct 2020 09:52:27 -0600 Subject: [PATCH 07/47] more edits --- .../bitlocker-how-to-enable-network-unlock.md | 121 +++++++++--------- 1 file changed, 64 insertions(+), 57 deletions(-) diff --git a/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md b/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md index 4a7d9d600f..68ca0dcc0c 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md +++ b/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md @@ -1,6 +1,6 @@ --- title: BitLocker - How to enable Network Unlock (Windows 10) -description: This topic for the IT professional describes how BitLocker Network Unlock works and how to configure it. +description: This article for the IT professional describes how BitLocker Network Unlock works and how to configure it. ms.assetid: be45bc28-47db-4931-bfec-3c348151d2e9 ms.reviewer: ms.prod: w10 @@ -27,16 +27,16 @@ This article for IT professionals describes how BitLocker Network Unlock works a Network Unlock was introduced in Windows 8 and Windows Server 2012 as a BitLocker protector option for operating system volumes. Network Unlock helps you manage BitLocker-enabled desktops and servers in a domain environment by automatically unlocking operating system volumes when the system is rebooted and is connected to a wired corporate network. This feature requires the client hardware to have a DHCP driver implemented in its UEFI firmware. -Without Network Unlock, operating system volumes that are protected by TPM+PIN protectors require a PIN when a computer reboots or resumes after hibernation (for example, by Wake on LAN). For enterprises, this setup can make software patches difficult to roll out to unattended desktops and remotely administered servers. +Without Network Unlock, operating system volumes that use TPM+PIN protectors require a PIN when a computer reboots or resumes after hibernation (for example, by Wake on LAN). For enterprises, this setup can make software patches difficult to roll out to unattended desktops and remotely administered servers. Network Unlock allows BitLocker-enabled systems that use TPM+PIN and that meet the hardware requirements to boot into Windows without user intervention. Network Unlock works like the TPM+StartupKey at boot. But the StartupKey doesn't need to be read from USB media. Instead, the key for Network Unlock is composed from a key that's stored in the TPM and an encrypted network key that's sent to the server. It's decrypted and returned to the client in a secure session. ## Network Unlock core requirements -Network Unlock must meet mandatory hardware and software requirements before the feature can automatically unlock domain-joined systems: +Network Unlock requires the following mandatory hardware and software configurations before it can automatically unlock domain-joined systems: - You must be running at least Windows 8 or Windows Server 2012. -- Any supported operating system that uses UEFI DHCP drivers can be Network Unlock clients. +- Any supported operating system that uses UEFI DHCP drivers can be a Network Unlock client. - Network Unlock clients must have a TPM chip and at least one TPM protector. - You must have a server running the Windows Deployment Services (WDS) role on any supported server operating system. - The BitLocker Network Unlock optional feature can be installed on any supported server operating system. @@ -44,28 +44,30 @@ Network Unlock must meet mandatory hardware and software requirements before the - You must have a properly configured public/private key pairing. - Network Unlock Group Policy settings must be configured. -The network stack must be enabled to use the Network Unlock feature. Equipment manufacturers deliver their products in various states and with different BIOS menus, so you need to confirm that the network stack has been enabled in the BIOS before you start the computer. +The network stack must be enabled to use the Network Unlock feature. Equipment manufacturers deliver their products in various states and with different BIOS menus. So confirm that the network stack has been enabled in the BIOS before you start the computer. > [!NOTE] > To properly support DHCP within UEFI, the UEFI-based system should be in native mode and shouldn't have a compatibility support module (CSM) enabled. -On computers running Windows 8 and later, the first network adapter on the computer, usually the onboard adapter, must be configured to support DHCP. This adapter must be used for Network Unlock. +On computers that run Windows 8 and later, the first network adapter on the computer, usually the onboard adapter, must be configured to support DHCP. This adapter must be used for Network Unlock. Use this configuration especially when you have multiple adapters and you want to configure one without DHCP, such as for a lights-out management protocol. The configuration is necessary because Network Unlock stops enumerating adapters when it reaches an adapter that has a DHCP port that has failed for any reason. So if the first enumerated adapter doesn't support DHCP, isn't plugged into the network, or fails to report availability of the DHCP port for any reason, then Network Unlock will fail. On supported versions of Windows Server 2012 and later, the Network Unlock server component installs as a Windows feature. It uses Server Manager or Windows PowerShell cmdlets. In Server Manager, the feature name is BitLocker Network Unlock. In Windows PowerShell, the feature name is BitLocker-NetworkUnlock. This feature is a core requirement. -Network Unlock requires WDS in the environment where the feature will be used. Configuration of the WDS installation is not required. But the WDS service needs to be running on the server. +Network Unlock requires WDS in the environment where the feature will be used. Configuration of the WDS installation isn't required. But the WDS service must be running on the server. -The network key is stored on the system drive along with an AES 256 session key. It's encrypted with the 2048-bit RSA public key of the unlock server's certificate. The network key is decrypted with the help of a provider on a supported version of Windows Server that's running WDS. It's returned encrypted with its corresponding session key. +The network key is stored on the system drive along with an AES 256 session key. It's encrypted with the 2048-bit RSA public key of the unlock server's certificate. The network key is decrypted with the help of a provider on a supported version of Windows Server that's running WDS. The network key is returned encrypted with its corresponding session key. ## Network Unlock sequence The unlock sequence starts on the client side, when the Windows boot manager detects the existence of the Network Unlock protector. It uses the DHCP driver in UEFI to get an IP address for IPv4. Then it broadcasts a vendor-specific DHCP request that contains the network key and a session key for the reply, all encrypted by the server's Network Unlock certificate, as described earlier. The Network Unlock provider on the supported WDS server recognizes the vendor-specific request, decrypts it with the RSA private key, and returns the network key encrypted with the session key via its own vendor-specific DHCP reply. -On the server side, the WDS server role has an optional plug-in component, like a PXE (preboot execution environment) provider, which is what handles the incoming Network Unlock requests. The provider can also be configured with subnet restrictions. These restrictions would require that the IP address provided by the client in the Network Unlock request belong to a permitted subnet in order to release the network key to the client. If the Network Unlock provider is unavailable, then BitLocker fails over to the next available protector to unlock the drive. So in a typical configuration, the standard TPM+PIN unlock screen is presented to unlock the drive. +On the server side, the WDS server role has an optional plug-in component, like a PXE (preboot execution environment) provider. The plug-in component handles the incoming Network Unlock requests. The provider can also be configured with subnet restrictions. These restrictions require the IP address that's provided by the client in the Network Unlock request to belong to a permitted subnet in order to release the network key to the client. If the Network Unlock provider is unavailable, then BitLocker fails over to the next available protector to unlock the drive. So in a typical configuration, the standard TPM+PIN unlock screen is presented to unlock the drive. -The server-side configuration to enable Network Unlock also requires provisioning a 2048-bit RSA public/private key pair in the form of an X.509 certificate. The configuration also requires the public key certificate to be distributed to the clients. This certificate must be managed and deployed through the Group Policy editor directly on a domain controller that has a domain functional level of at least Windows Server 2012. This certificate is the public key that encrypts the intermediate network key. The intermediate network key is one of the two secrets required to unlock the drive; the other secret is stored in the TPM. +The server-side configuration to enable Network Unlock requires provisioning a 2048-bit RSA public/private key pair in the form of an X.509 certificate. The configuration also requires the public key certificate to be distributed to the clients. + +Manage and deploy this certificate through the Group Policy editor directly on a domain controller that has a domain functional level of at least Windows Server 2012. This certificate is the public key that encrypts the intermediate network key. The intermediate network key is one of the two secrets that are required to unlock the drive; the other secret is stored in the TPM. ![Diagram showing the BitLocker network unlock sequence.](images/bitlockernetworkunlocksequence.png) @@ -77,19 +79,19 @@ The Network Unlock process follows these phases: - A network key (a 256-bit intermediate key) that's encrypted by the 2048-bit RSA public key of the Network Unlock certificate from the WDS server. - An AES-256 session key for the reply. 4. The Network Unlock provider on the WDS server recognizes the vendor-specific request. -5. The provider decrypts it with the WDS server's BitLocker Network Unlock certificate RSA private key. -6. The WDS provider then returns the network key encrypted with the session key by using its own vendor-specific DHCP reply to the client computer. This key is an intermediate key. -7. The returned intermediate key is then combined with another local 256-bit intermediate key. This key can be decrypted only by the TPM. +5. The provider decrypts the request by using the WDS server's BitLocker Network Unlock certificate RSA private key. +6. The WDS provider returns the network key encrypted with the session key by using its own vendor-specific DHCP reply to the client computer. This key is an intermediate key. +7. The returned intermediate key is combined with another local 256-bit intermediate key. This key can be decrypted only by the TPM. 8. This combined key is used to create an AES-256 key that unlocks the volume. 9. Windows continues the boot sequence. ## Configure Network Unlock -The following steps allow an administrator to configure Network Unlock in a domain where the domain functional level is at least Windows Server 2012. +The following steps allow an administrator to configure Network Unlock in a domain where the functional level is at least Windows Server 2012. -### Install the WDS Server role +### Install the WDS server role -The BitLocker Network Unlock feature installs the WDS role if it's not already installed. If you want to install it separately before you install BitLocker Network Unlock, use Server Manager or Windows PowerShell. To install the role by using Server Manager, select the **Windows Deployment Services** role in Server Manager. +The BitLocker Network Unlock feature installs the WDS role if it's not already installed. If you want to install it separately before you install BitLocker Network Unlock, use Server Manager or Windows PowerShell. To install the role in Server Manager, select the **Windows Deployment Services** role. To install the role by using Windows PowerShell, use the following command: @@ -97,7 +99,7 @@ To install the role by using Windows PowerShell, use the following command: Install-WindowsFeature WDS-Deployment ``` -Configure the WDS server so that it can communicate with DHCP (and optionally Active Directory Domain Services) and the client computer. You can do so by using the WDS management tool, `wdsmgmt.msc`. This tool starts the Windows Deployment Services Configuration Wizard. +Configure the WDS server so that it can communicate with DHCP (and optionally Active Directory Domain Services) and the client computer. Use the WDS management tool, `wdsmgmt.msc`. This tool starts the Windows Deployment Services Configuration Wizard. ### Confirm the WDS service is running @@ -110,7 +112,7 @@ Get-Service WDSServer ``` ### Install the Network Unlock feature -To install the Network Unlock feature, use Server Manager or Windows PowerShell. To install the feature by using Server Manager, in the Server Manager console, select **BitLocker Network Unlock**. +To install the Network Unlock feature, use Server Manager or Windows PowerShell. To install the feature in the Server Manager console, select **BitLocker Network Unlock**. To install the feature by using Windows PowerShell, use the following command: @@ -119,21 +121,21 @@ Install-WindowsFeature BitLocker-NetworkUnlock ``` ### Create the certificate template for Network Unlock -A properly configured Active Directory Services Certification Authority can use the certificate template to create and issue Network Unlock certificates. +A properly configured Active Directory Services Certification Authority can use the certificate template to create and issue Network Unlock certificates. To create a certificate template: 1. Open the certificate template snap-in (`certtmpl.msc`). 2. Locate the user template. Right-click the template name and then select **Duplicate Template**. -3. On the **Compatibility** tab, change the **Certification Authority** and **Certificate recipient** fields to Windows Server 2012 and Windows 8, respectively. Ensure the **Show resulting changes** dialog box is selected. +3. On the **Compatibility** tab, change the **Certification Authority** and **Certificate recipient** fields to **Windows Server 2012** and **Windows 8**, respectively. Ensure **Show resulting changes** is selected. 4. Select the **General** tab of the template. The **Template display name** and **Template name** should clearly identify that the template will be used for Network Unlock. Clear the check box for **Publish certificate in Active Directory**. 5. Select the **Request Handling** tab. In the **Purpose** drop-down menu, select **Encryption**. Ensure the **Allow private key to be exported** option is selected. -6. Select the **Cryptography** tab. Set the **Minimum key size** to *2048*. (For this template, you can use any Microsoft cryptographic provider that supports RSA. But for simplicity and forward compatibility, we recommend using **Microsoft Software Key Storage Provider**.) +6. Select the **Cryptography** tab. Set the **Minimum key size** to **2048**. (For this template, you can use any Microsoft cryptographic provider that supports RSA. But for simplicity and forward compatibility, we recommend using **Microsoft Software Key Storage Provider**.) 7. Select **Requests must use one of the following providers**. Then clear all options except for your selected cryptography provider, such as the **Microsoft Software Key Storage Provider**. 8. Select the **Subject Name** tab. Select **Supply in the request**. If the certificate templates dialog box appears, select **OK**. 9. Select the **Issuance Requirements** tab. Then select both **CA certificate manager approval** and **Valid existing certificate**. 10. Select the **Extensions** tab. Then select **Application Policies** > **Edit**. 11. In the **Edit Application Policies Extension** dialog box, select **Client Authentication**, **Encrypting File System**, and **Secure Email**. Then choose **Remove**. 12. In the **Edit Application Policies Extension** dialog box, select **Add**. -13. In the **Add Application Policy** dialog box, select **New**. In the **New Application Policy** dialog box, enter the following information in the space provided and then click **OK** to create the BitLocker Network Unlock application policy: +13. In the **Add Application Policy** dialog box, select **New**. In the **New Application Policy** dialog box, enter the following information in the space provided and then select **OK** to create the BitLocker Network Unlock application policy. - **Name**: **BitLocker Network Unlock** - **Object Identifier**: **1.3.6.1.4.1.311.67.1.1** @@ -149,7 +151,7 @@ After you add the Network Unlock template to the certificate authority, you can ### Create the Network Unlock certificate -Network Unlock can use imported certificates from an existing public key infrastructure (PKI), or you can use a self-signed certificate. +Network Unlock can use imported certificates from an existing public key infrastructure (PKI). Or it can use a self-signed certificate. To enroll a certificate from an existing certificate authority: @@ -172,7 +174,7 @@ To enroll a certificate from an existing certificate authority: 2. Select **Yes, export the private key**. 3. Complete the steps to create the *.pfx* file. -To create a self-signed certificate, you can either use the New-SelfSignedCertificate cmdlet in Windows PowerShell or use Certreq. +To create a self-signed certificate, either use the `New-SelfSignedCertificate` cmdlet in Windows PowerShell or use `certreq`. Here's a Windows PowerShell example: @@ -180,9 +182,9 @@ Here's a Windows PowerShell example: New-SelfSignedCertificate -CertStoreLocation Cert:\LocalMachine\My -Subject "CN=BitLocker Network Unlock certificate" -Provider "Microsoft Software Key Storage Provider" -KeyUsage KeyEncipherment -KeyUsageProperty Decrypt,Sign -KeyLength 2048 -HashAlgorithm sha512 -TextExtension @("1.3.6.1.4.1.311.21.10={text}OID=1.3.6.1.4.1.311.67.1.1","2.5.29.37={text}1.3.6.1.4.1.311.67.1.1") ``` -Here's a Certreq example: +Here's a `certreq` example: -1. Create a text file with an *.inf* extension. For example, *notepad.exe* *BitLocker-NetworkUnlock.inf*. +1. Create a text file that has an *.inf* extension. For example, *notepad.exe* *BitLocker-NetworkUnlock.inf*. 2. Add the following contents to the previously created file: ```ini @@ -204,7 +206,7 @@ Here's a Certreq example: _continue_ = "1.3.6.1.4.1.311.67.1.1" ``` -3. Open an elevated command prompt and use the `certreq` tool to create a new certificate. Use the following command, specifying the full path to the file that you created previously. Also specify the file name: +3. Open an elevated command prompt and use the `certreq` tool to create a new certificate. Use the following command, specifying the full path to the file that you created previously. Also specify the file name. ```cmd certreq -new BitLocker-NetworkUnlock.inf BitLocker-NetworkUnlock.cer @@ -216,16 +218,16 @@ Here's a Certreq example: ### Deploy the private key and certificate to the WDS server -Now that the certificate and key are created, deploy them to the infrastructure to properly unlock systems. To deploy the certificates: +Now that you've created the certificate and key, deploy them to the infrastructure to properly unlock systems. To deploy the certificates: -1. On the WDS server, open a new Microsoft Management Console (MMC) and then add the certificates snap-in. Select the computer account and local computer when these options appear. +1. On the WDS server, open a new Microsoft Management Console (MMC) and then add the certificates snap-in. When you're prompted, select the computer account and local computer. 2. Right-click **Certificates (Local Computer) - BitLocker Drive Encryption Network Unlock** and then choose **All Tasks** > **Import**. 3. In the **File to Import** dialog box, choose the *.pfx* file that you created previously. 4. Enter the password that you used to create the *.pfx*, and finish the steps. ### Configure Group Policy settings for Network Unlock -Now that you've deployed the certificate and key to the WDS server for Network Unlock, the final step is to use Group Policy settings to deploy the public key certificate to computers that you want to be able to unlock by using the Network Unlock key. You can find Group Policy settings for BitLocker in *\\Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption* by using the Local Group Policy Editor or the MMC. +You've now deployed the certificate and key to the WDS server for Network Unlock. In the final step, you'll use Group Policy settings to deploy the public key certificate to computers that you want to be able to unlock by using the Network Unlock key. Find Group Policy settings for BitLocker in *\\Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption* by using the Local Group Policy Editor or the MMC. To enable the Group Policy setting that's required to configure Network Unlock: @@ -239,45 +241,51 @@ To deploy the required Group Policy setting: > The Group Policy settings **Allow network unlock at startup** and **Add Network Unlock Certificate** were introduced in Windows Server 2012. 1. Copy the *.cer* file that you created for Network Unlock to the domain controller. -2. On the domain controller, launch Group Policy Management Console (`gpmc.msc`). +2. On the domain controller, open Group Policy Management Console (`gpmc.msc`). 3. Create a new Group Policy Object or modify an existing object to enable the **Allow network unlock at startup** setting. 4. Deploy the public certificate to clients: - 1. In Group Policy Management Console, go to the following location: *Computer Configuration\\Policies\\Windows Settings\\Security Settings\\Public Key Policies\\BitLocker Drive Encryption Network Unlock Certificate*. + 1. In Group Policy Management Console, go to *Computer Configuration\\Policies\\Windows Settings\\Security Settings\\Public Key Policies\\BitLocker Drive Encryption Network Unlock Certificate*. 2. Right-click the folder and then choose **Add Network Unlock Certificate**. 3. Follow the steps and import the *.cer* file that you copied earlier. > [!NOTE] - > Only one network unlock certificate can be available at a time. If a new certificate is required, delete the current certificate before you deploy a new one. The Network Unlock certificate is located in the *HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\SystemCertificates\\FVE\_NKP* key on the client computer. + > Only one network unlock certificate can be available at a time. If you need a new certificate, delete the current certificate before you deploy a new one. The Network Unlock certificate is located in the *HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\SystemCertificates\\FVE\_NKP* key on the client computer. -5. Reboot the clients after you deploy the group policy. +5. Reboot the clients after you deploy the Group Policy. > [!NOTE] - > The **Network (Certificate Based)** protector is added only after a reboot. The policy must be enabled, and a valid certificate must be present in the FVE_NKP store. + > The **Network (Certificate Based)** protector is added only after a reboot where the policy is enabled and a valid certificate is present in the FVE_NKP store. -### Subnet policy configuration files on the WDS server (Optional) +### Subnet policy configuration files on the WDS server (optional) -By default, clients are unlocked by the server if they have the correct Network Unlock certificate and valid Network Unlock protectors that have wired access to a Network Unlock-enabled WDS server via DHCP. You can create a subnet policy configuration file on the WDS server to limit the subnets that Network Unlock clients can use to unlock. +By default, the server unlocks clients that have the correct Network Unlock certificate and valid Network Unlock protectors that have wired access to a Network Unlock-enabled WDS server via DHCP. You can create a subnet policy configuration file on the WDS server to limit the subnets that Network Unlock clients can use for unlocking. -The configuration file, called *bde-network-unlock.ini*, must be located in the same directory as the Network Unlock provider DLL (*%windir%\System32\Nkpprov.dll*). It applies to both IPv6 and IPv4 DHCP implementations. If the subnet configuration policy becomes corrupted, then the provider fails and stops responding to requests. +The configuration file, called *bde-network-unlock.ini*, must be located in the same directory as the Network Unlock provider dynamic-link library (*%windir%\System32\Nkpprov.dll*). The configuration file applies to both IPv6 and IPv4 DHCP implementations. If the subnet configuration policy becomes corrupted, then the provider fails and stops responding to requests. -The subnet policy configuration file must use a `[SUBNETS]` section to identify the specific subnets. The named subnets can then be used to specify restrictions in certificate subsections. Subnets are defined as simple name-value pairs, in the common INI format. In this format, each subnet has its own line. The name is on the left of the equals sign. The subnet that's identified on the right of the equals sign is a Classless Interdomain Routing (CIDR) address or range. The keyword `ENABLED` is disallowed for subnet names. +The subnet policy configuration file must use a `[SUBNETS]` section to identify the specific subnets. You can then use the named subnets to specify restrictions in certificate subsections. + +Subnets are defined as simple name-value pairs, in the common INI format. In this format, each subnet has its own line. The name is on the left of the equals sign. The subnet on the right of the equals sign is a Classless Interdomain Routing (CIDR) address or range. The keyword `ENABLED` is disallowed for subnet names. ```ini [SUBNETS] -SUBNET1=10.185.250.0/24 ; comment about this subrange could be here, after the semi-colon +SUBNET1=10.185.250.0/24 ; a comment about this subrange could be here, after the semicolon SUBNET2=10.185.252.200/28 SUBNET3= 2001:4898:a:2::/64 ; an IPv6 subnet SUBNET4=2001:4898:a:3::/64; in production, the admin would likely give more useful names, like BUILDING9-EXCEPT-RECEP. ``` -Following the `[SUBNETS]` section are sections for each Network Unlock certificate. A certificate is identified by the certificate thumbprint, which is formatted without any spaces. These sections define subnet clients that can be unlocked by using that certificate. +Following the `[SUBNETS]` section are sections for each Network Unlock certificate. A certificate is identified by the certificate thumbprint, which is formatted without any spaces. These sections define subnet clients that you can unlock by using that certificate. > [!NOTE] -> When you specify the certificate thumbprint, don't include spaces. Thumbprints that include spaces aren't recognized as valid. These will cause the subnet configuration to fail. +> When you specify the certificate thumbprint, don't include spaces. Thumbprints that include spaces aren't recognized as valid. The spaces will cause the subnet configuration to fail. -Each certificate section defines subnet restrictions by denoting the allowed list of permitted subnets. If any subnets are listed in a certificate section, then only those subnets are permitted for that certificate. If no subnet is listed in a certificate section, then all subnets are permitted for that certificate. If a certificate has no section in the subnet policy configuration file, then no subnet unlocking restrictions are applied for that certificate. So to apply restrictions to every certificate, you must add a certificate section for every Network Unlock certificate on the server. And you must add an explicit allow list set for each certificate section. +Each certificate section defines subnet restrictions by denoting the allowed list of permitted subnets. If any subnets are listed in a certificate section, then only those subnets are permitted for that certificate. If no subnet is listed in a certificate section, then all subnets are permitted for that certificate. If a certificate has no section in the subnet policy configuration file, then no subnet unlocking restrictions are applied for that certificate. -Create subnet lists by putting the name of a subnet from the `[SUBNETS]` section on its own line below the certificate section header. Then, the server will unlock clients that have this certificate only on the subnets that the list specifies. To troubleshoot, you can quickly exclude a subnet without deleting it from the section by simply commenting it out with a prepended semicolon. +So to apply restrictions to every certificate, you must add a certificate section for every Network Unlock certificate on the server. And you must add an explicit allow list set for each certificate section. + +Create subnet lists by putting the name of a subnet from the `[SUBNETS]` section on its own line below the certificate section header. Then, the server will unlock clients that have this certificate only on the subnets that the list specifies. + +To troubleshoot, you can quickly exclude a subnet without deleting it from the section. Just comment it out by using a prepended semicolon. ```ini [2158a767e1c14e88e27a4c0aee111d2de2eafe60] @@ -288,14 +296,14 @@ SUBNET1 SUBNET3 ``` -To disallow the use of a certificate altogether, you can add a `DISABLED` line to its subnet list. +To disallow the use of a certificate altogether, add a `DISABLED` line to its subnet list. ## Turn off Network Unlock To turn off the unlock server, you can unregister the PXE provider from the WDS server or uninstall it altogether. However, to stop clients from creating Network Unlock protectors, you should disable the **Allow Network Unlock at startup** Group Policy setting. When you disable this policy setting on client computers, any Network Unlock key protectors on the computer are deleted. Alternatively, you can delete the BitLocker Network Unlock certificate policy on the domain controller to accomplish the same task for an entire domain. > [!NOTE] -> Removing the FVE_NKP certificate store that contains the Network Unlock certificate and key on the WDS server will also effectively disable the server's ability to respond to unlock requests for that certificate. However, this is seen as an error condition. It's not a supported or recommended method for turning off the Network Unlock server. +> Removing the FVE_NKP certificate store that contains the Network Unlock certificate and key on the WDS server will also effectively disable the server's ability to respond to unlock requests for that certificate. However, this condition is seen as an error. It's not a supported or recommended method for turning off the Network Unlock server. ## Update Network Unlock certificates @@ -306,13 +314,13 @@ To update the certificates that Network Unlock uses, administrators need to impo ## Troubleshoot Network Unlock -To troubleshoot Network Unlock issues, begin by verifying the environment. Many times, a small configuration issue is the root cause of the failure. Verify these items: +To troubleshoot Network Unlock problems, begin by verifying the environment. Often, a small configuration issue is the root cause of the failure. Verify these items: -- Client hardware is UEFI-based and is using firmware version 2.3.1, and the UEFI firmware is in native mode doesn't have a Compatibility Support Module (CSM) for BIOS mode enabled. Verify this configuration by checking that the firmware has no enabled option such as **Legacy mode** or **Compatibility mode** or that the firmware doesn't appear to be in a BIOS-like mode. +- Client hardware is based on UEFI and uses firmware version 2.3.1, and the UEFI firmware is in native mode and has no compatibility support module (CSM) for BIOS mode enabled. Verify this configuration by ensuring that the firmware has no enabled option such as **Legacy mode** or **Compatibility mode** and that the firmware doesn't appear to be in a BIOS-like mode. - All required roles and services are installed and started. - Public and private certificates have been published and are in the proper certificate containers. Verify the presence of the Network Unlock certificate by using Microsoft Management Console (*MMC.exe*) on the WDS server. The certificate snap-ins for the local computer should be enabled. Verify the client certificate by checking the registry key *HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\SystemCertificates\\FVE\_NKP* on the client computer. - Group Policy for Network Unlock is enabled and linked to the appropriate domains. -- Group Policy is reaching the clients properly. Verify this functionality by using the *GPRESULT.exe* utility or *RSOP.msc* utility. +- Group Policy is reaching the clients properly. Verify this functionality by using the *GPRESULT.exe* utility or the *RSOP.msc* utility. - The clients were rebooted after the policy was applied. - The **Network (Certificate Based)** protector is listed on the client. Check for this protector by using either `manage-bde` or Windows PowerShell cmdlets. For example, the following command lists the key protectors that are currently configured on drive C on the local computer. @@ -335,9 +343,8 @@ Gather the following files to troubleshoot BitLocker Network Unlock. ``` - Open Event Viewer on the WDS server. - In the left pane, select **Applications and Services Logs** > **Microsoft** > **Windows** > **Deployment-Services-Diagnostics** > **Debug**. - - In the right pane, selet **Enable Log**. + 1. In the left pane, select **Applications and Services Logs** > **Microsoft** > **Windows** > **Deployment-Services-Diagnostics** > **Debug**. + 1. In the right pane, select **Enable Log**. - The DHCP subnet configuration file (if one exists). - The output of the BitLocker status on the volume. Gather this output into a text file by using `manage-bde -status`. Or in Windows PowerShell, use `Get-BitLockerVolume`. @@ -347,21 +354,21 @@ Gather the following files to troubleshoot BitLocker Network Unlock. Network Unlock and the accompanying Group Policy settings were introduced in Windows Server 2012. But you can deploy them by using operating systems that run Windows Server 2008 R2 and Windows Server 2008. -Requirements: +Your system must meet these requirements: -- The server that hosts WDS must be running a server operating system that's designated in the **Applies to** list at the beginning of this article. -- Client computers must be running a client operating system that's designated in the **Applies to** list at the beginning of this article. +- The server that hosts WDS must be running a server operating system that's designated in the "Applies to" list at the beginning of this article. +- Client computers must be running a client operating system that's designated in the "Applies to" list at the beginning of this article. Follow these steps to configure Network Unlock on these older systems. -1. [Install the WDS Server role.](#bkmk-installwdsrole) +1. [Install the WDS server role.](#bkmk-installwdsrole) 2. [Confirm the WDS service is running.](#bkmk-confirmwdsrunning) 3. [Install the Network Unlock feature.](#bkmk-installnufeature) 4. [Create the Network Unlock certificate.](#bkmk-createcert) 5. [Deploy the private key and certificate to the WDS server.](#bkmk-deploycert) 6. Configure registry settings for Network Unlock: - Apply the registry settings by running the following `certutil` script (assuming your Network Unlock certificate file is called *BitLocker-NetworkUnlock.cer*) on each computer that runs a client operating system that's designated in the **Applies to** list at the beginning of this article. + Apply the registry settings by running the following `certutil` script (assuming your Network Unlock certificate file is called *BitLocker-NetworkUnlock.cer*) on each computer that runs a client operating system that's designated in the "Applies to" list at the beginning of this article. ```console certutil -f -grouppolicy -addstore FVE_NKP BitLocker-NetworkUnlock.cer From f62824ae2a7b3cdc5adabf2333477400e624b707 Mon Sep 17 00:00:00 2001 From: ShannonLeavitt Date: Wed, 28 Oct 2020 10:10:37 -0600 Subject: [PATCH 08/47] small fixes --- .../bitlocker-how-to-enable-network-unlock.md | 22 +++++++++---------- 1 file changed, 11 insertions(+), 11 deletions(-) diff --git a/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md b/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md index 68ca0dcc0c..092a234e68 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md +++ b/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md @@ -37,7 +37,7 @@ Network Unlock requires the following mandatory hardware and software configurat - You must be running at least Windows 8 or Windows Server 2012. - Any supported operating system that uses UEFI DHCP drivers can be a Network Unlock client. -- Network Unlock clients must have a TPM chip and at least one TPM protector. +- Network Unlock clients must have a TPM (trusted platform module) chip and at least one TPM protector. - You must have a server running the Windows Deployment Services (WDS) role on any supported server operating system. - The BitLocker Network Unlock optional feature can be installed on any supported server operating system. - You must have a DHCP server, separate from the WDS server. @@ -89,7 +89,7 @@ The Network Unlock process follows these phases: The following steps allow an administrator to configure Network Unlock in a domain where the functional level is at least Windows Server 2012. -### Install the WDS server role +### Install the WDS server role The BitLocker Network Unlock feature installs the WDS role if it's not already installed. If you want to install it separately before you install BitLocker Network Unlock, use Server Manager or Windows PowerShell. To install the role in Server Manager, select the **Windows Deployment Services** role. @@ -101,7 +101,7 @@ Install-WindowsFeature WDS-Deployment Configure the WDS server so that it can communicate with DHCP (and optionally Active Directory Domain Services) and the client computer. Use the WDS management tool, `wdsmgmt.msc`. This tool starts the Windows Deployment Services Configuration Wizard. -### Confirm the WDS service is running +### Confirm the WDS service is running To confirm the WDS service is running, use the Services Management console or Windows PowerShell. To confirm the service is running in the Services Management console, open the console by using `services.msc`. Then check the status of the WDS service. @@ -110,7 +110,7 @@ To confirm the service is running by using Windows PowerShell, use the following ```powershell Get-Service WDSServer ``` -### Install the Network Unlock feature +### Install the Network Unlock feature To install the Network Unlock feature, use Server Manager or Windows PowerShell. To install the feature in the Server Manager console, select **BitLocker Network Unlock**. @@ -119,7 +119,7 @@ To install the feature by using Windows PowerShell, use the following command: ```powershell Install-WindowsFeature BitLocker-NetworkUnlock ``` -### Create the certificate template for Network Unlock +### Create the certificate template for Network Unlock A properly configured Active Directory Services Certification Authority can use the certificate template to create and issue Network Unlock certificates. To create a certificate template: @@ -149,7 +149,7 @@ To add the Network Unlock template to the certificate authority, open the certif After you add the Network Unlock template to the certificate authority, you can use this certificate to configure BitLocker Network Unlock. -### Create the Network Unlock certificate +### Create the Network Unlock certificate Network Unlock can use imported certificates from an existing public key infrastructure (PKI). Or it can use a self-signed certificate. @@ -216,14 +216,14 @@ Here's a `certreq` example: 5. Launch **Certificates - Local Machine** by running `certlm.msc`. 6. Create a *.pfx* file by opening the *Certificates – Local Computer\\Personal\\Certificates* path in the navigation pane. Right-click the previously imported certificate, and then select **All Tasks** > **Export**. Follow through the steps to create the *.pfx* file. -### Deploy the private key and certificate to the WDS server +### Deploy the private key and certificate to the WDS server Now that you've created the certificate and key, deploy them to the infrastructure to properly unlock systems. To deploy the certificates: 1. On the WDS server, open a new Microsoft Management Console (MMC) and then add the certificates snap-in. When you're prompted, select the computer account and local computer. 2. Right-click **Certificates (Local Computer) - BitLocker Drive Encryption Network Unlock** and then choose **All Tasks** > **Import**. 3. In the **File to Import** dialog box, choose the *.pfx* file that you created previously. -4. Enter the password that you used to create the *.pfx*, and finish the steps. +4. Enter the password that you used to create the *.pfx* file, and finish the steps. ### Configure Group Policy settings for Network Unlock @@ -298,14 +298,14 @@ SUBNET3 To disallow the use of a certificate altogether, add a `DISABLED` line to its subnet list. -## Turn off Network Unlock +## Turn off Network Unlock To turn off the unlock server, you can unregister the PXE provider from the WDS server or uninstall it altogether. However, to stop clients from creating Network Unlock protectors, you should disable the **Allow Network Unlock at startup** Group Policy setting. When you disable this policy setting on client computers, any Network Unlock key protectors on the computer are deleted. Alternatively, you can delete the BitLocker Network Unlock certificate policy on the domain controller to accomplish the same task for an entire domain. > [!NOTE] > Removing the FVE_NKP certificate store that contains the Network Unlock certificate and key on the WDS server will also effectively disable the server's ability to respond to unlock requests for that certificate. However, this condition is seen as an error. It's not a supported or recommended method for turning off the Network Unlock server. -## Update Network Unlock certificates +## Update Network Unlock certificates To update the certificates that Network Unlock uses, administrators need to import or generate the new certificate for the server. Then they must update the Network Unlock certificate Group Policy setting on the domain controller. @@ -341,7 +341,7 @@ Gather the following files to troubleshoot BitLocker Network Unlock. ```cmd wevtutil sl Microsoft-Windows-Deployment-Services-Diagnostics/Debug /e:true ``` - - Open Event Viewer on the WDS server. + - Open Event Viewer on the WDS server: 1. In the left pane, select **Applications and Services Logs** > **Microsoft** > **Windows** > **Deployment-Services-Diagnostics** > **Debug**. 1. In the right pane, select **Enable Log**. From c9c6672bc3c1ab923aaf98951317500241de05f7 Mon Sep 17 00:00:00 2001 From: Shannon Leavitt Date: Tue, 3 Nov 2020 12:19:21 -0700 Subject: [PATCH 09/47] Update bitlocker-how-to-enable-network-unlock.md Added commas --- .../bitlocker-how-to-enable-network-unlock.md | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md b/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md index 092a234e68..b69e88d45f 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md +++ b/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md @@ -124,7 +124,7 @@ Install-WindowsFeature BitLocker-NetworkUnlock A properly configured Active Directory Services Certification Authority can use the certificate template to create and issue Network Unlock certificates. To create a certificate template: 1. Open the certificate template snap-in (`certtmpl.msc`). -2. Locate the user template. Right-click the template name and then select **Duplicate Template**. +2. Locate the user template. Right-click the template name, and then select **Duplicate Template**. 3. On the **Compatibility** tab, change the **Certification Authority** and **Certificate recipient** fields to **Windows Server 2012** and **Windows 8**, respectively. Ensure **Show resulting changes** is selected. 4. Select the **General** tab of the template. The **Template display name** and **Template name** should clearly identify that the template will be used for Network Unlock. Clear the check box for **Publish certificate in Active Directory**. 5. Select the **Request Handling** tab. In the **Purpose** drop-down menu, select **Encryption**. Ensure the **Allow private key to be exported** option is selected. @@ -135,17 +135,17 @@ A properly configured Active Directory Services Certification Authority can use 10. Select the **Extensions** tab. Then select **Application Policies** > **Edit**. 11. In the **Edit Application Policies Extension** dialog box, select **Client Authentication**, **Encrypting File System**, and **Secure Email**. Then choose **Remove**. 12. In the **Edit Application Policies Extension** dialog box, select **Add**. -13. In the **Add Application Policy** dialog box, select **New**. In the **New Application Policy** dialog box, enter the following information in the space provided and then select **OK** to create the BitLocker Network Unlock application policy. +13. In the **Add Application Policy** dialog box, select **New**. In the **New Application Policy** dialog box, enter the following information in the space provided, and then select **OK** to create the BitLocker Network Unlock application policy. - **Name**: **BitLocker Network Unlock** - **Object Identifier**: **1.3.6.1.4.1.311.67.1.1** -14. Select the newly created **BitLocker Network Unlock** application policy and then select **OK**. +14. Select the newly created **BitLocker Network Unlock** application policy, and then select **OK**. 15. With the **Extensions** tab still open, select **Edit Key Usage Extension**, and then select **Allow key exchange only with key encryption (key encipherment)**. Then select **Make this extension critical**. 16. Select the **Security** tab. Confirm that the **Domain Admins** group has been granted **Enroll** permission. 17. Select **OK** to complete configuration of the template. -To add the Network Unlock template to the certificate authority, open the certificate authority snap-in (`certsrv.msc`). Right-click **Certificate Templates** and then choose **New, Certificate Template to issue**. Select the previously created BitLocker Network Unlock certificate. +To add the Network Unlock template to the certificate authority, open the certificate authority snap-in (`certsrv.msc`). Right-click **Certificate Templates**, and then choose **New, Certificate Template to issue**. Select the previously created BitLocker Network Unlock certificate. After you add the Network Unlock template to the certificate authority, you can use this certificate to configure BitLocker Network Unlock. @@ -167,7 +167,7 @@ To enroll a certificate from an existing certificate authority: 1. Create a *.cer* file by right-clicking the previously created certificate and choosing **All Tasks** > **Export**. 2. Select **No, do not export the private key**. - 3. Select **DER encoded binary X.509** and then finish exporting the certificate to a file. + 3. Select **DER encoded binary X.509**, and then finish exporting the certificate to a file. 4. Give the file a name, such as *BitLocker-NetworkUnlock.cer*. 9. Export the public key with a private key for Network Unlock: 1. Create a *.pfx* file by right-clicking the previously created certificate. Then choose **All Tasks** > **Export**. @@ -220,8 +220,8 @@ Here's a `certreq` example: Now that you've created the certificate and key, deploy them to the infrastructure to properly unlock systems. To deploy the certificates: -1. On the WDS server, open a new Microsoft Management Console (MMC) and then add the certificates snap-in. When you're prompted, select the computer account and local computer. -2. Right-click **Certificates (Local Computer) - BitLocker Drive Encryption Network Unlock** and then choose **All Tasks** > **Import**. +1. On the WDS server, open a new Microsoft Management Console (MMC), and then add the certificates snap-in. When you're prompted, select the computer account and local computer. +2. Right-click **Certificates (Local Computer) - BitLocker Drive Encryption Network Unlock**, and then choose **All Tasks** > **Import**. 3. In the **File to Import** dialog box, choose the *.pfx* file that you created previously. 4. Enter the password that you used to create the *.pfx* file, and finish the steps. @@ -246,7 +246,7 @@ To deploy the required Group Policy setting: 4. Deploy the public certificate to clients: 1. In Group Policy Management Console, go to *Computer Configuration\\Policies\\Windows Settings\\Security Settings\\Public Key Policies\\BitLocker Drive Encryption Network Unlock Certificate*. - 2. Right-click the folder and then choose **Add Network Unlock Certificate**. + 2. Right-click the folder, and then choose **Add Network Unlock Certificate**. 3. Follow the steps and import the *.cer* file that you copied earlier. > [!NOTE] @@ -336,7 +336,7 @@ Gather the following files to troubleshoot BitLocker Network Unlock. Debug logging is turned off by default for the WDS server role, so you need to enable it before you can retrieve it. Use either of the following two methods to turn on WDS debug logging. - - Start an elevated command prompt and then run the following command: + - Start an elevated command prompt, and then run the following command: ```cmd wevtutil sl Microsoft-Windows-Deployment-Services-Diagnostics/Debug /e:true From 1f6e2b45bb0ffb7bccd709a236208985eb82d073 Mon Sep 17 00:00:00 2001 From: denrea Date: Thu, 5 Nov 2020 10:37:50 -0800 Subject: [PATCH 10/47] edit pass: mac-sysext-preview --- .../images/mac-system-extension-filter.png | Bin 25122 -> 15868 bytes .../mac-sysext-preview.md | 109 +++++++++--------- 2 files changed, 54 insertions(+), 55 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/mac-system-extension-filter.png b/windows/security/threat-protection/microsoft-defender-atp/images/mac-system-extension-filter.png index d2f1c35a83dcd3f85e43e6e9e24417da30ad7c51..db725b26fa5ae952cec16d6d6d26abe4627b9ecf 100644 GIT binary patch literal 15868 zcmcJ0gL_=jyLD{aoUlp5#x@(Yv2EM7-86O^+cp~8W@9_|^nUldf5Gpb=b6czXC^cI zoW1vY-*>I`Mks!jL`EP$00RR*J}zl|1wKj2Qvk|JQ06GX?r z36zep(yVdOmmaOEpIL2q7ZUdd;=9 zto+h>inJC8ga{$Gpb(L~Lb}X%zyE&o*NhTv@@*JBG4M&h|Ln<9gVo}R^uJ&EwzROI z`aeU6(WS$Zc@|BH1x6wG{h0PYe&Ph0P-rr98&73iZM551Uz(abzk-2Guvg#W4jMNY znQ%JXGfTVwl*MciIA-9$bM`ENg%DC}7fV*O+B$x-9On1tdmO6Mma#(6QQlh@9l(Z% zAKRcVKY;yIX&puznaxqPxf?}i=+M6_ zrp`ypi4*F|#Bw#NvCMK;z02@Hyw|(gD*2vgbhE=Oq$R)<9t@7Dxk&J9K;Q0b7F#CrYB1v0@{Xda|-LbW-ry^r@?>;b+T; znOxg>@fghQd{ytD!hjLEXs}&N#m7VYf}6 zhZ$KW?yL#Hw_^p4jI*CsmD5ecno~ung0GkS4{J^f8fIsI=V&du4PL|ypK4P$|FrHd z)98&eF$y}I2E&rJz5PDCXuFNP2}LF}X4MoSXJMd47=w93&lw`U3oH5s5-YM-M+(W` z))z}$Y7gv9`by+7&Hatk^Kqi>ysMzzdTEi=*X5zYjql-m^x z4hwR&L?MUE!H^a!lI9j!6LKnB%dR7(yz_p=O5Nw=cggTcAT(litNAoV?TXXR+4SN= zt;H<$UX^x>vfiS9<~A+ontf1bXId7on@Dqqt{n)YN7wJ;W%CZ1zqqjx2P0ze=r8}) zUXp@@5yor4yfrRC-Lh)UCVRo@VlM;jCsCNMq)=91BZlR(5QuiKSEEfWe`2c zb->m0uF?F(>HijRVQy#Vw;RJLg#toNZLh7x@Qj3d#rlK33?&gq5<>+grGy1it6cL=akZ6ylW1-J}*am)#Hh zdnO;o&&gwEIfACI5%LY&9!-4r4~v3RaX)43Z^B@(v9K8QI{A2cc_}F&)8n!6aEA39 z99UEjC$e~*4&=CMWtlo|PwOUq@0ZOYo&qOD-d`@ds#N=#)3hDoRi#^Hzw+OGXXtv| zL9A`{daz{x_D7e^DhFswqux4eW@aWopMnT(5K8#=WWFo`{$^%wE?BOazHXV%aZk$F zP-^n$7pu`^I$&?zbbY+p+1MSVYS{`KZMDaT+KE4>n`M({>6h{p3CSW>b4 zvHPv$X~u_jH`2^&U?35TYU}BaVvbTNwnO*p4{NVe3k`QZGV~K2x3|B|a{kbU=At4D z4S>ET&?d3S0J({xrddE^o3&c;vvaU3NrCLu_p+YFh&B72wqMjRu972dfM&vIe0E8r7UNow<}Hdz${V6Ns!IPdOjtLG6{5D0i}n!R&mLGtzd) zuFlS{uZMzRa0h#PWMIK;Gn}_z=1}xvNw+Sc!u#>E=4)RTwZADT)!1+Mrs;Z)*fvf6 zU@_Vqi~+FG&2Tbz86^x7KKx5;tkcJK80o=y1^}cyM*_ygP4Pn{UeQ=zA4(gL_q~3dHIGdS@6vX{2tu#W3b62$@X@e|3gu|g zBpOuuv?8jNUGJWS20~H?z5(QCuDeio&nzeQid;jVDw`qThkvP_2u2h0;>bq(Vbu3Z z;3L5l<~gfV@q{ZyQfaE`p+zqjRIyJ-?DMYp}qTVNw>SNa^*%Bnh_dl8ws&l8A7(TB;ETYs)M zbY;Fc_YbAqeai8E{&AW~v2n_7uf2q8I{&bxu4JIC@i~2al~;^oZ~(1l6i#zqJ;gko z-mLUw!0_bdrJUk70gdo6h?W9j$XIw}q8=C5n4Wcv{#@&! z(HuV$T4qb-2+S*~u2eN+AeoZ~SIDbR~Vn=GZ zAN~Yr-3JE;B2Ia592v+WqH+`oFi?i-A`~?s8!Jo8URL;PmFP$Ri#!2Wcw2a8jqv1) zt`A?Rlq3GAfxu9o_oqWW-zTcIWmr;ge}5&WEHL;=VG9eo)GuGYsP8!Qk)W<@7J=yi zNwnbX(L19OghR-BQ&@X=GG(Ud6$PXB$=Sh*qOEO@gONmQrbgtwL+QM2OsE)z3QQ6m z=j5{X1@ktg%6888>#7PuRBzgICMqf__4gwhw>_T@AbCPdpcIi! zTt)^Cyg}8nhAODPm@LMVK^S#UOU?-MU_gd+iHp6tbhKELIER1fCyv z_tACR2^hV_&eMiRIg{Czw}kdz{1 zLFC%^u1t^ITI>&(&$Dyzp{E6Mex21~r4JDG^49le@#>wX^Tm&(X|cYdT^FYCqlL?K zUJVl3b=;{ctcY^=O1I4TykDhRr7^g*%D^BKChofqJ^Bf6 zrfJO)F_h(c+Y>FVXVwSEbZ3j@DMN(Y`7eXe%xQZ8Ko7Hje7%`eSo;YlBA84bufWKQ z+n4tbirTa*6$Ia~V&P{ZvW0Wsfb33$wyNV^^ZH$fD0uZS%Z;QGl@|R(a6kFm!9*6~ z>K%}RQlN#Zix%AFf5@jXp03Tanf}4!b7z+O{3O;eb{~JOqbkKcBXwp6BGBTC+q|)! zGW$$-v0CMqH=@ssKMqsSV_t_uprNXE7E&?BG)_!#)-1X0XxIhs;k5MjP83#u#yH7`D>jy?#Y}{gWk%Piiq8E7=g#3( z)V@5gK%Qma+hp9=dlAsQ7GD3%V45RLGd%Bj*Z{B;p#aw*J-Y!FBEX+vY>%z;yk$F- zFqdvp@PjX*LKmtDjf)b)nI>?I@?ChZ(|@Y)$ZZJjD|*<$zRN=aZn#eV0vVE|!u{*l zDSqjcheG~j%A`5^b-VY+hg4F_ym)#}Juyi--MXpoXgfr;LIm4qUZxG}Clv%lY;L z9f_@hmr#X`cBu9yD=6&XaG%@t!cymE9Yw*XjTRxFVs5d1?#u!${r=@}bE#xA&;6sh zrR6E|Q>Fiv$63Ro=YC_C^>QtcAM|LDP0iK;)$F8H-i%Gf%3GVHE-8;`^Hk50yhPH7 zVX)RNGLcpF;mW5_Y`gWDnG(C=S%c-8nvs4M)e>>j$1_69jKAI?Mfc>CH>0ozrl#B# zu9UXZ%*1fAke$^`Xc}Fu27M#=6lx+yt1l>?lG+xH*8K@!t(2&aVd2WU|)g>y0$3G*ClM ziXQ7vacv}A(358BEu!Hq3AR~&tHVOGb~P$f+i0%oD34>`{{#L8i!F?Q7uhOw@9x9v zR`2`V^O-y!iBxH8bbMlRSBt>A0$D&K-Z4^pU|)k!O|@y>GX;+l4qYR%v9Z31y*{|V zF-Oo*UIY3~6D-6LDWOyWMDSOO(Dg~Kef}G6J#V?F0&QFk%voEfcJ%%p-cYr*Qr_$$ zI`Wfv!F08S)mZD@omq~a_ghv{D9QzFdQikFZVg^qN;3V!-p>RAPJ$U!R3 z@4V4Zk76t!j?-I?g=f}Uo7!g^-gG06&~4(c8ROe~8ZWq{jI&w*BNB^@6Rti*K!b99A3{1+?9qi-$*SCXtpyLRoQMK?|k*n>-B?@q${aQ6dO^cL7szY2TT|&0AU;zUk!U z45lo_h+D!yBQyp^QQ^-)b-%Gh7P?SGO?1!sL~ZMu$dBb}nKxgp>k#SY_%C+1=V0=4#A@!Hvk zT&WG3F_m(wCTibN@YF>>U)ii)0%&D$qR!S3R-s*gM5m&s36?SYs*ZxVW&3Mh_l2t|j5V#kfPOBOp7 z09^E|=a7fMiIKDO^+^+p>{hxe#pgN7A#r>vmKv4Dbfgc%l|2!oE)~O%Iiabbw=~rA zGj4kh!45B=jdX2$dreRA%^BKFi>3~GW~2>;Z;*_^!5rJtCnE6QWf7U{uQe@bs2L=T z0r{0Y_y@H9iy6kYNDv@(1(yNv$qLs?p+#R{+>H$lS>RMK;YkqiinxqZs@4X;1&Fx6uWgHnw-LpfRhzAsW+f#3w zv}+J)_=CofYBHk0>i4)EHeaSzr3v5p_qEA#-qGge1pAXJ07xNRypKJJiLWEy92;#P zMAp%2YRiS;WZFlD@wtA;d^Vl3)`>R5OX{H&PjBS8OUv#McX7FUeY&|zf$DrZ$k4KF zF#+mMHEjoIBwRQF zcvo`r%g$~BR1pdMX*dVp^HITGnTJEsU&lz!aLN(~4~-pq1*?iKu=zs<>+7MwhtW67Kx`4k12Hq^t!5HX~qb67sCz!WTh zckm{+f3uqQ(1OvUKa&o2SUkHXG2!bKl#!ZQop63}fWAKdQ3H^wQe$tcTnt z`1RFl?dIw}hLlOG5kn>nJSZ=O7<>>!w0h*=qpo`?seeaiS&o;$Xc`o7Xs8Kh72dOq zkIYxU*xirx<;!?sPlt$s!FEZG@AHP&#qnQ)_*1>t9o#n8Gm0)P&3g0czg1nfC+tm{ zwzi*xfnr>qD@&zJm0aHU4mzd0s*03Zzq_;e-`z4Oo3~`7r&mV(J^j4t)N$Oha-m?b zqy2d?8lO!Hr4W_?!9&DT?_0ZYphGf1wV=OQ*DVhlw+~D1&eP)!p1Br)hiBy_DjGBo zZ1;uv0eOg+w^uW-^fy|%{D+j!M9~t^%le9b%iSz662`9O<%rM0d6>^w-;GBQ2rr|~ zHZDW&7+V5GSWCI^%5T!+qYNGK6QD&UD)-7 z3TX_(O}pXlmopr0K26h*y6}b& zS#JSk3cJ|^QSFLHWfPb2MnWOJK&}i}#CeH(&~Wd5Le8^jcnx+8%{M9j_s3meDtJ~< z#Rz5ugYtXR%z#}8KGMCXOTTv{^_aw_6J|J; z(i$~yw@?-&g3Rq>ID2Z$K$9<_CU_hDqIdSiQgzYKSK;@?ag}+p`U&~zEWQ!3;izcIFqd=%BD??}mOT_E-8qLOiC71N=BZaMGbf|0+ zd%i!5qB^HCPT9J0A5NBESGba(UJP;x;Ug!l!WxMS3NnN@`X&GFN|i1|w=qGwo+Tnp z*HPs>9i9t^VCU}=*!oN8uRSU%M+hgA-4>VY(xtXqaZv*!k&#%E^jmtGE{5W}K zrR_vf!#qTflXDv#z0kPY{`zQF#hsmQ=f#qwKDV+lr~;2$XHA>b8A7jF?$Lg~@RV9v zj0U@Jg;_?79C8g6iI#Yd)DG$P;ErJVi@>eYxfV0B%fMR#5N+-3J^=KWLWy+;7~%2k zig&)s!*A_W!rr9I#Gey08MJ98nrPV2`)w#g5_vrJj>UwPyV@iK&ZBEi!s69qen002 z8?%584pyRMGL43C9_SimXZ(QG-NJ0kqI$-WF=CAhbGB{YtJjZ%uq-xxZojOL%#7mD zELJ3HW6Ea7K~G`D{9}B@da$%)*3`E*2V8S#6rnwTId1}AoM0_VNPF0yCjR&4zc>l- zdxAHA*Z>-srml`^ydsnx3waQk9^Qg1&TXmH#mdx_nnK%o7})E76AN25ZncrWyWEU( zQi5M)aoUkk*j}p=q}v~Z6}waNgq!1{IQNI6?#_h32_!q@ffVlvYS5YZGG4K@=fD`J1o zQ?`RqEOjx#`@s|r=Nws{?fZNTXMtYM|8_e|>if9;c(p5yl)>Ia;3x$a)sgGW<;MDr zJDmaZ)C!@+CxA8LABqtGSak)=K1$Bx-J+fmW~|GqO_PqxyvkC272U>gOS}mNbI>o# ztDOO>h4O$ujM~j;jaNl!x`C=9#iV|(4#xNPZv0Uq(#Rbjh#&kacYeB;!l`US5N;;* zm*MQl)Fjii5HgT}U8Gg{G zucU$4HNMjrUmP8E({=#VPbdm;WXDdQv}!&R!nH8|4L_kTHcu-Gg<|33hpmBSB93%p_yZd> zu2Q=MPf0iEbS`4HFCDT>h2OBMxgTy^TT1#$Ot7WRGe&gO@(0{~W+RbXQBiTK=npti z(IG2rqBFv_)1(QCVtN4)1h8|;IWVCRt_wPaOW=uP!PSa=7{KOt=Jd8CvDzYT+; z&OmTV?G;*-TUGYjyhgqoMK6I3?X%4|W|@D6&IM`<@(qg;;Z_CUxQ@Hr6tPOcUhhRb z+4Okpc&_TY6q5sdSnj){rrdap0UoPPQT@fNa3i%s_Un>SoPl&FHWIgJGJ+1|NroF= z+!mb6nh%ilt-Gk1nihB7=u#Na^(E-2pEHn{S7oYyXQ8#SH_^?Bl*^G^YA&@IdT0=l z#1dwS)^qKA-ujLZ;>a-dB4gJ0!y4zSsqvj#ab*5GR@8K7A56!$kMCwQ5-FK-R(NndQ4-B87cY zadO(N6AxQVI=5=u*l_=kR31MooncFkJuIy{86BJw>1{*k6SitPtWg%>i%-O~^i1)f zy9eDVt~0GRG_Jz!<6N&3O}X#ds&#mK1b-nF1(HEfLBe0OZEQ&deP1)Vo%A;?EiF&J zoSd9gmzS0ju$dw~@q@`UHa3bJ40kHZ&DC3505Vy&{N@*1-Q`v@ElCjVb31zWp$v>k z8|z%v5?tTydau)yw6r`Tg zBTgU);=IH2x3Uzc)judv%f=!?Rva1bNdaGeWFB1EZV7z_7U_ZSp_JgV!V zO*RVuPPbk?{br*fAsj80$k4s~n>15ocg}1vTxt1)RdkHZ6}>7s&B|(>;#~8u_~Quv ztv{A5mcQFy3}ydhb}f0uxrUquQ!_IxCXbvEv?_SR zO&t42V4?NSW}2hM!|J8cjzF{N8RS>rTvgZ3I+SRH4&lo#6dw8R?{}Nrqw3{${& zHf4wmtZ+J)kvrKQX1rn*4beYr~aUiXZ{Fn+=-2riUr zgZlWfIs~p|)~H2fo7zy5UoMt!;FQYh@J!p`^V@j2*2K6s-+iZgDoPR+CI|@8A)VKo z-__KT!gPorC=!Neie&FnI*3MLZa-&m+I{_rcPA-~%Anhh=QS|-3`YN?G&QnEh+-jX zxmn3$adPGHMwBPT1<{ZshHgkBBf`8gP2{?-)xf!@o^2#A0XccyQ~Ya^Fwsa(U!nY+ zx8)v|F&HwS>_aVvZmFCU{5FGz1ltg@* z4S!qr=i?Hl<}C;xaijTC6`E{!igfxX`vB8j+rp~b=vCXcGl0~*dGfxhi&dM6dh@$f zn@EsANI^-Up1k>1MTD#3y{*rMfld+MLffle## zbLYNLWUgi5AQ%^czjJqf1o8Aml$H>PQ+|qF@N8kwlmYf+c=HFE7zN6?bVm;otdTY+ zhfvB4)OB!1$S@0q@2S0HAu0Dfe%*xiOItI>brEN5e~8EQf409DtLn*$N?KJ2PGQuv z{5cnqe2E2{#8)R$^6&r6N)uK4?8SCx5N-2*aBt6rf%JS9a$3}Mg4z$!@yQiP2(JK1 zy^cfx`y)~Ivj-s80NS7D+udT7R#U9;`};#zj)2ee(_xMRiPU2^Bh#R z>!7u6lDBTv%_w=MqROdMkooHLW&%Slatfdqg|Kj=b`K0E+2^t z9iTWkss}{Nus<=afbK$Q*N(1AY!*|HWC+E60cbV70gCTces7;0a*jV{7~?>h-*yOY z{>q~UX5uqx)d7?572+)hfoQR_MBQ`}AYRj1h|W;KPI+-5W+Fn>%ij2YPZCj(6c9`S z9oHXYKFbfo1;6I$(_%!F8W=17+T5u*{J|Xs-iswF4Bt9j6U{?R{7P)c4j0bfuSK*V z^Kz}DGky9ZRLjKQPO9&9+I688Ic@9E;Gz+vva{Rl(6Fi*qR8Cq9i@>01DE95`w{TXx6lp6me(z3E-A_9i*H2UXRd(Zw(v4``u)0ZrugW3fnX< z34#DgeN%#j!p*V=@>|h02Z};wDQg(j)zwviATeNOV`T+a5%FF;3|YW5un-P= zwRexCR}dxyUQPkVFTSo@7?Anol2Ob$j7KnN=~$JpuMVbuOD9op7YVb_hPQs`D#AR+ zPDnES^IZYfiGZUeYYqlpwJ(-)wC4C8Jh11aMuXAhDg6Pa|3tsY2pG(ah($!pkPSjE zdoo>BWh8r|Fj|r-E>FBF&DU~x>9@Gm(7tUUNI;wCsfT@wxCT63kfXUYyn2qmwgHMP zWNU|DVseru>AeIKNO#&d#16nD;20kMWK2xp4?exU>ytqxVMj>td+}&mc`swT-i^6V zk=jVQaJ1p|(VvJ8?D>DMYi;nfl3c%!mEUBaE4QmN`SB7x&Pb4LGs@id%#{yLH;1+D z{*}!!nqfrwJ67+>Trb5K$C-IVut;~Sj1Y_!J=J%y{3`4FGFz4(r1n6JSy zW)b8+OBxF^8T%eW-(_EX&^8YdiZNPo7oP;z@3b#(U5x(arNpM z-q+^-k(XI$Xy|5LrLIO!$e{pqN5JBiFweC#z39^Lz>fc#}CqvgyHsWWpX)C5JXEQ z8N0$9BGL_Elt`0+lfV|d{iD7CYApCYAZyy`A@G|hH3-Av*7enf*Bo{aoBBM4bHkrv ztEhiEuf*QwXt1oZHPU@Vj7;5}FV=7-TOrt#61L5`5&_y?@fN!k;`4Ph+r(7a5~62r zeLXu96RJG;p*XV2@%cEH9qRSfxF2wg?piVhL^LIFeeGgyutPmS*9+*6{c7zPrI zgNk~EY9{Mwyyr~lhFYr_Gf?-7X!pJ(_nNwd5g@o@B@N*3vh3p))WC^h#(c|G@1*Ok8 zeZk0xSuji~Wc13Jz`RKR+_O+9mYMT*Y6iD_>A2=N#;DVY9Hx&f6Q(NMJN(TSJQE$l zRm`t?q<=q8dWxa8L3SrA+OTj|>S;m+JX3%NoHdNnHTw(CF?K&=zdmz(6gY7>T$c5^ zo;?Edbs>r2NdmqdM-h0z3!l=KLzP%K%U-XB(+Rge`3Lnbx!-<%AK@z^O!$)Kca?8^&>+=@~~WWtFUD^ z!8ck^$6~1<>rLIx0m(!@m%s^w_f!yU4;q#pCYfMP{`dnU_S>eRbLDQ_MQepm{#{5C zL=Sh4VWlgmHjKMeQ>p3fRjkcl@2yDZjYChy*dw0%MMgeJB5{F)xmiwudq25(eyAv@ zjdQ}k{GE1hB0>pZn**aTwh0H>wDDM3=np1yP>X~JWWu=2UmvfeM0ZEW#v4;@DFNE}3QH=!!T#*d(8AZZ)D9?mB^QLiJN#HwN9xd4;mEi!z6oVe6!Org9G zZ|Bbl+kWW;h41!(#-GS_VLD=%k!ikOgO_7U2=tx-=sOsLhw^Ye#+2iE@*A)Zcq^+& z$6Lbds6tP{AFYn)@V8;?MB&1|Z}*0nZ;PVx&yCv%@#cM;ME1Yuu$iHV zc){V@Y96INw&4d)q!GD_XQRx#etPOe}{SN)Jq))`jdY#nn}QD{E zpxn+vt9|Cc&mu+`Mhdqij#9jB;2i{UFZYPiuh{Nk3jfnylKPIW zh$=56YKYD)b_^shd-#K(knGk0hTgaskDen~8)(GP(_ShimLY;Av_$J=fMe2hfTC?2 zr)}QWb&m@#Ap-uy?j=v6xm4*-qQNNfkLl)~PmU_uz2Z{zJ2}rv z!Emd%DR0_eb1!~mb_UJ;mLaorPghBpU{Qc(yuZvZ&?R+u~ zj$~@T6nVxkDhS7-C&myv4qxhF5ZZ<7U&~WB(z&Trk?-N>BXwD3;E0m-p+@;68a%i8 zQKo=ZXMfIWR!zqMGgm@DpJ-Tr!@_}cD~5H~!|A!-BL$m5I7(`G?59mv1B&MW<=Q&b zi2fWVvTdaGhe~Ogn=UfoyRx?MhT4tqw2*l6l0HF;@LTk55>y2x2h|# zmCf*r>#tvpi5|CZB#4I7Q;`?(F%3h{E5i$QW<@BdMkre)|0$`$vmr1fj3s{#UmIa(e#qI5%RnN0F^sXc8@MFcPce z95Pw}CA{I$jx9dIc59ro|F`Iq4Rd%~g!WQOQHk=88BeRu+lTpvJ12oz#*#Ju+buq4&X z)<91KoU!NrXbPLzM6}=WEx-+Eb$Gg{sHph(yfrN9w)wo=1FrSj_V(8Zn(X1RF~krN zz;kzWy+4)^>YD{rpS*78-ay^J#>SQaf58D%p{J*(PdA5g_-rst`1SBKA-`^Zmt>1b z?-ld{w)-`&i;lPFyS^ILa`k`2Mqpr|S+)lZBcKv}9Nl@A$fXB*Rs&vQLZzolowf8^dKn(Bi7cm z8I-_sLHCYr>wpaPISrBCXr3ff>JKqlm~7S`0ObV%rPb-+Pe8Mf@Nhq`Ku%R&9{9D} z2vu6VAzAwcJacu!n1*z2G%&COAcKM=206jzn$AIj^8tAWJEi_&pp3fb(%FYm}Qb~F;gJu=#b*9KD z^?-4rX~Pq-3B0`ctsEOm#tbEBrU=ts7fm%WbeLj?`WO^L+0T~O%j^#lcC4m!rLh1h zGGd@HB|@@@z$wf~lkL%{pvOy~U|bpH(a%9nL;YhH{*c9DZ$d|iI?3iLqA-0wMu|kH zlpy;GsuOMpic|jd)B;&g)=$zDXjOo&1R5P3C9^a}KwwCah*cGXRRMev-Sl5`1c)iZ zAKmooRLNpvC#`_aDg1w51RMYra0P^H5q3=#l`nvH?$Z~Suvh5otcsybBAY10*XDk; z^DnhM2H35ge_H%m{j9G0b_g^g&aWa&Ar+tj;9v6!K(8R^1YHUr@Jwo=BZT}@0Od0{ z5;|y;*>|UW?tgBGp*V{qh~1ZATqij5xuS&iEqr7LF`#2f1Qc@9Cz@6W;ZqaVzqJsaclc{trx()>foFo&CIWmP0X|`d=vuY@ba&LpK@Y^Bj*7gnXGj#6e`y6g1Q z)6&u^ckvHH>O=!GEl~gWec&o?1p>*s8;?F6BTk^3l~&#Q8x?9P_rKq}VgTUYf!bSN zco<(q#WnO;_s6T3WrmT?(9eq(zSKE+g9az+`1b}G8XSn)p2Z@@ngxVa)Op*w_v$Iz%mo{5_-OnX{qN3QUU4Qnj!W zmX8i$0N#^Sc>YqKa0UfR`pg#&j(pNayUk9QzYG7o&QI6-x>ahMjX8jTH#a|@a0>uM zQawY$1V8D;W#7yVFk}l^Ny#uWIEFF6o^-4+L~q;VwbtxF12~lc{zB(7uJQ22!{60= z*fknQM@K0F)~2ear`hsDU@WobTPC%2bxuxB|Cq;eAOC7wpqWHAm7ymQY2xI>l8dYs z+m@EZ<_zdTT&&aq`LG+-EyJLaSU0WiE|lN2KxV#V^Ls4-3X=1&@-PJyN;*}0N?yYPylSxjx*0l_0TU{3k%_&(flAX%oShB zPt}_7L?0q2yMIxNP+XxWEKq9!IqJ^HkajKs|P{+bpL z{1+bI;qv-x?31sr9glX;*W0E$xF{@OP9nr8KntNK#FchSz$zhX(T~>`GBq`&P-n{+ z2ae~^uR`s)RzP$Zs4Xu?+D{1TiF1G>2cu3J*|zWgravcMpfvaU!eh>`MtxWkQzx63 zE{GOeImDOt^XJgfTuw3@4Gj(BPwnKbxOZTQm?ek&q;q%xDI+7|Jq@<@eYkTkhR>X6 z4o6aw0R3wF!~EM~-ZGgd-i=anK z6zJamqQXKzH(S|nNn#hH&z5@C-nN$xaqy5Wnc(K1QQn*zeL#^FP`X5$!+h;nZH?rswpci4IC6+DJ?5=_$Dl1NtTn|uLoC% zYBc!`n72Ir_Wgr{lTQR59v;lB&!f6%LmymyDw;oQz{5c*4Sl=pLWF=8B0mFW{OoHnNmvjES=4QONcGGbJADx1iY#M%i z1$|&D;R%}!2M~^!o*VP?1F^_jB?uskg0k=+l$4tdfL!6N<3+Y8os)jo1pEBD zqyAy6>YYpC1L=v29$3=l zHXz?r4wRrK6578lh{h%W!1%JdD*fNUXIiI`x({e4&JE05Oqs+J4qcsW3HR%X6e#7u z@8?Jz#Is5(Vc){&?DwaccM;4R{k4$N| zlqwb#;}F~6D!AXokHLT6RNS=tKcT`W=ReaNtnK5|kzEL=aqJ6-e+&bI zj%_I+p#qkWpj2_RGqbcdg@KU`Pf9`3QXj<`Dvy8#M|y%@lT4=*rWNM zB_}&G7z4(&VUst-7%;(Vg@SB=R1R*TKnV{7)>}i^_XZblP>Fbig^4@P%bq;l-N-2S zuOkvZABa@E%;quR(Idc6oHQRU88=>`okp@E9tC zhmT*vhgPk7t?%skQk3?jn=m%^G#Y3%f#+B(NyV_1@|d%JyINQ&dS!!7qGf61Zj#p& z?9iO1k5_2+eoJQZaIS&sfgxOFv!c!y=LbNYk^@H6!5;uL4!a6^94{85NTg;8`><-x zZ4ycf=CxBndK*vYKDhcQ6;TNsV09X|a97W_#3>&dgP}#|A5GR)kmAFPvV}JHUzqmEtK-vsJ5kp*q ze?tc&CF+3~hJmup58(aj9vsR0?{`*+L_2&lvWCTr zq2%wh253M$_G2E0*Ynd$MS4OGfMW4?Nk(Bg^$R{UeVNfLU;v|7&gW`_Z^m*b% zR8DbnCVXmv*5braeQ4l-!xp+DN@K7y^%ztnPMI!bQU(7@#6oVqid|x)^w+^%2q!^S zP;#E>u2BtfnS@)O;;zFbsmI$Ras6EH(+X)cV`KbO+&|I51`b+?$$^7aL|Sh?2G1Bq zYcc%x*X?YoOqr9(4C8RXI7YZ&!cp#ga|`rBY(uW-tY24z2>84?>GM3RK;Z8TT9Z8m zogy2fGzJX@If}nCL|cbh2d)!;4LyyK1y&nkcw$qB@AU|7XlwvB_&01f*fu~L5=Io^ zlI#G!_(!kp|t~lOf(&N`2rb1V^o@P^$D?1mV_MW13f>U zRRjwt22hZwlB}{%UzUiLNG>PxA?1tw)i)aTi{hUpGt<)h;CD%IX;4YCf$eXRz-zUH)=h?s0 zB+BHJP`pn;nkhfrA?-{qBhRL6WF|XT_q%RktMWs@wLDowOtexMhQ4`-QrW0j774$1 zlY%b6GVikZvQ*Qe%h;~)4E5gpZtxz;)zBsPLDsnEKu>D&FRUUzzLZa6f`f;K*q`bc z$r)ll3@-HYkL}OQPPxr0&*bFk|M1mnkBqLenGgj5IID3MV&_{6LFC&bM!@%Md3!#l2q^rTRu7xTBWYCc2-6h zdWJ4@iz$*S;3yWQTXXMm?s0H&M6)KPm9q&M-cLr^;F~0y*G(RV&2u;vx%)Ntcop8M zUhI&1W2C5el>Di2@?cV61TbmfXE2UxUt-piWwU#Yo-TKvd{Sd-WpZNF{9O0x`g59g zua@G^1w)s`bfY61raC>FWy7bHzTY$>W^IZ;N7S_?w6kqWjxZLRU7edno58Lwu9`>T z*DKd|*9V6z{J9w97)GI=L(yW2^S|ZyIAm=WVh3RhQx{P0OE1~y@i}BgWV!OX#G1rL zk@K0GTnuRDmr9#PedhjdJgsStxdXT3u_M6j!ECJar=h0lac_U^y?vQW>%O!bnp?)+ z?~Ut)H2!( zxrqHgtr6POb+kW^-x8pA zrT?B-r*Sm>YdU25#`3G>@KjS@46%UsVWab=GuT5Ok)E2%SYCRyq0-?;-<65St5fJv z*a`Ry-EzG86rKXFpsFXpccYC_{Nv}}*QH~Rygp>@EEy@S+|8O;04*j66*^8io-poR zWO8Ko*6j}Cn0xv`PBY*pjaNkn zTI?c@@%9o&aYEyRLCSL7^1j&-%I_3xGR)X)u4|6>mi98tC^@RlYes4^KXLyw|JYM% z^RwjVh4~A2zx(JppWRN;hz%15Q^tpDd%d0(vh65G_q*sjp9>zw4gy*HO#R(D`;o4S zcU=)blSY$1B;^pG;AcGzZhza)LB!u-6mIWv8oV#;DV!{vO?kt-Sf}IWzIPtVVDyo* zY^$_X>&|ti=Y#q8r61g-MdcsMj=#s0+kP^xHQP%c+ZMc5oUvC;d z2>i`s%et)6xIQI4*q4z3;O3f{pZ;J&W6Qkq*dScnwrPHnLsCa*SF&_&`or03wywwK z=&jz{w~LB(Ec5=yDo2ny4yT=7-LK7`iL;1#j?7NVm*B69uLWN~2Pp@h`PX$v7b~+3 zs~#^4@W0^SDaxvY)$M*ZH2wg!ZclcyAuWD>`i%L=e?D6l%7`&T{#&GF3;9ZRKF&YC zQ05_KFs4;7+w;+Iv8PUewlBM3A$#2C*<^Zf>RXp`*6x}ssnC({{W#Go2hx~Fj*ak+ zdwI!J{zZo!c{>^JiF?~#z-(}Gq%eUtOLUv_mgCy?rlxpBX46o!$MNUGTKQS^^3|3& z_xyvR(?3(%Z|e0{ncJ3q&4255Ek}6r-+VvLSgLqPd1`lcb9W^>#yC3mf?lqTN_2J; z#Nx#Y-y{kZiIjU7Jr}H(985`!b>--K2_L(Uq0L7=r);+$JhxpZE&q7(MR=N+7pSY> zseQca$cbDbY@NUV{bZx9@3s2m7JPEQs_DggUwM>&(;uU3nUj5~{H$=V^VIt+e=u8I z;f92YglOW$r~mU^hk=xnBh0N6gP>gjd`Am%ec~qK7-xC_dUiJ_!gDy%m{9r#N(W5? zg;LAH?|d^1X#z%eA&g3ADDpj_pD*1D;`D}wNPbAo=<6Ecqp23yOi>Z${c9N+ z1~$|Z2H~{?`+5<-UNA85@gXosuXmi+OEMSkzqPRWx$yrj!{ol!!HB6#fWfbKbz?_U zQ(GqsJLk|0CqTawJWi zj2$iQoh|KbDgTjcXk_Q&ECc}jqv-#B{$r;p#PWYM**g7g)@uV<{;6SMV`gRfzp`Ih z1^;==uVM)?wbqifw0VW+RfjMq8=v66^#8A#|Izp#&JRwejuLh@uZ+&Z|AX&e=Ko#! z|784E<){Bq$;Qq4zg7OPn!lWaEdR9peza=17<%K~w*Q-)2G%`q}Aj<{pl=B*lpI5~lu z?bmWB!EhTFjUcQ`Fn89woPLnMpG*sRy~!kzL!%Jjm@&q)H_H`_`d~Cs0937G9O|=@ zc=iLTp_G&}#(j{t0v#yHdjV;VmIEh$bJ1? zg3{=Km3kZKqazYzOum(tBuN7r)R1n8#|JkR(5WZ@{g_TiHiQQ_NzubsPuRv1q>3gW z;zo36V<;gJpe#kOU;MxfZu!R9~u9EsH^FonRVWJ2_q{`(2(ILXbB(v&gcTy}}T9 zR+^Y1c`8V>cN{*%oOqWvG7Q|38#aE3k^NvPi=UJPXy;ss%+=8NI3W7shd>QWACb7` zjWYQ4sjPbQRLt@SzPzN=eRMQi4@@2F3}C2&NWUMB1Zm*m5v=4xR~aU>;D2T_Yg=2sU5k6?GHpuFrObh8Hfg%qODuQlrkKN&L z$fD$VapKour}J50qC5-k>?3aE)S2qc$k7rW4gGle*)^8Fp4+E!-qpyf zAKVqoE^k~nvrq@8JTZ`ML6IcH1@+A&yrtpk2|LVcI~ohpsVr!Uot?D1KGq7N?-N5O;e~KMyqPei{D~Rt#S@yoSWxtRsD&EE z>!w7K)a5VNSMn6K*ZNQEYw&Ict6Ja|qV>FuVS6y}5jlnBL^E)U0rQBm$&{DnrtG z4k$$1ApH`Bw|gOngdI0HP*}l8k}>iQ4$mcMFa$qG6R4Bk=?b?dF5NFt`~q0RPZ?b) zhB%PUL_XkyfuwjWth>8M-4Ff?qRaUPYO17(lJO@L$483!-kS{0t0YMa7x2yo^^@Gu1WUwUU`W1=|&9WG~eze*UaYdD8-&ARlOga@LY} zy6vW*dbuGjcog#D#fM0}yHzrpocN8|M%U*V;YM_Gxeki$I~`pYViA9S#E=jkplZn} zUteFh79{5}VPj_xK#hpOPDoHVbX8W4#e4UTOiKEiF#9>xB$n+2(`PLUi%zU%O;|_d z{o#|S;4llZh!9rsARdgoiivseffJE`dT*nYp;y5znxQTN0PW#vgTYar81AQ=0bzh& zkl#>`%*T)v1~hT|Ks<@tx1Ztnz6PkniNz8SCyhQhON9bM2r_$2kS7k{F;v01;_oD6=wO^6s6+m>x2;GJv2eKwsa1C5`K3$XqZ|;0eiKlIC@nIF z9?V$|4)DUcB^08w1H^TPrUe+F$yy`BA+vm-R6ziQt)~V436#xSo47^J?q}#V6eh`r zeU~jZFVSg)?2n*l5R3g8YCd<;7mC{*+J#BZ!gfwU7~y|7g=I+Twl!iUbi4K>W{;y6 z#T#Ue%Hl;#(a53|EXoq1%`TDKUN9R2a?w6KLN?katdx<)eRbSfqyj;7o&V3LOuAd}td<2wFe)9IXhLSQBDmHPb9^vOao!p*B=y+JRK+l9%bMY zS+(7XPdMI(H63K=caPWXEIQkn3NdZII z*W+F$DwhGVTn|e_USIrvg149+GeA@#L?cu*KFJieq}U)ZU-SOnQ!H1C9VXtSn+t2L z9<{3@2k9-a&D@gtRxbd;!&9Mc8f1h?>|oasR(aw9fj1?QB+ zZpAPn`(y2h->O{HZbFDp==Eqb(Y{&}_wdroQ-$5&zC>BWoKi!Ho~R+xUQU{VFL*7@ zZ1c6>bakLqg%%c&@din4I9^&sp}tcah!++=)mcAlvt$BFBUjj)q zIg!HR5yM%mk4byFkwMJwR{MCIu)yw>1Ht!WVQ#TI>bBgI zmPm;Hc+r}NohYeC1T`ZfuCYpCNpc!p1UAz0dAb)0nFUtDgl z!d_+iJ77`L6Ma^*u^7R7M<87rIcpJzXSiY$W8sbipL2+e=EV5M^H zk)y83-yJ`DnE&^cLCu(~!(TI15KzPYzDNg4>YtST#~1@F74}I2vH!FqcMX}2=v@nH z4a~o0(!t3|-(&o>8IKeelpmn!kN>ZIuWcTbUHzx!{}>xUook|T`hFblFD)I>p1{8* zznW-|kQjxk_vZ6!ru<(eAZl-Hj;XYfKOnvs{=^4Dz@v0k`37GNi(?THSjO z4^s#o&4h(`i*0OBWT4t7b(#;gN!5^EqsFxWG+=-?2qeW}?=~X-pFUla#Da%=eHfzdchi4>-=y1k{C_z=()8ccM?m6!6lzkZjs~XU2 zK&IQ@3mpd|N0Ua(Z9A@U=))7kX5oKO|8i{0U0sV)C;+~V4kI(Rof7yHufWZ4rlrB( z>`_?TDucmUKa|z}lpuH+`T)eUAC^jK*LuDWu`;>(p1x=Fx$>YIQfKG;uqch@)i1C@ z#hh{wG*s>V;Ci=7@j{ouZ4)2K+$8Jse32tBFCW>m|DhuO_}JFz@E6Be;>D=INzgHe zCV{}PzNV(zFPnPX<@dh#Q#o6gQ_3kjLMQJ1q&XJ-B9Gl71352`=6A<#?PwQv;a&&Y ztMT@{jCStB+B8k2YyDd7Id{LzwI^j<< z8BZ2hpRbK$9QvQ19^Q)GTwlvE;&a?RZqbSidLC=Ia&vJJ85z%i%gBCt+{vi^`8aC2 z+UDK$7#bS7J^odK=0PV)b`N_=Gr3*z)Fwsrwksx_G`t;xy{{OtS?JRs&YA` zSAP4Pp3+{UKus(x~g2XgnVxGME}n?h= z!D+l^sz{vNP)nVwX6M99(O^e|WsDzaT4T}#GNvp& z0vVmun@bvu!7Xa+2u$C9)b?Abec(!RoF8V6vs%4>&-dWI1NKzc5WYVi>y*4bNb9%{ zx-ei!0*ZE?j!R&IO-&0ElatfE=m+T0!5VMhzBOBw5kALmyx;#3jd*cC+pbsMuz}im z_a`H|uM4+0{PecM=Ze8e_@(vOrGn$3&sCw)VXrVHJ^yuXo1OcFgh|f1h?m{$cEY`A zowifd8%ZGV?cGX`roHUU>b?<9`^(b0u)e-N!+4q(&fkxUhrGa`?YQY+D_)*C&aLet z>pWEC(U9@Lt^HxS=#Z0&T{U6r!uxJmpIo57Q4G*>)ej^73@TL!5JQt5H`% z#m@4>khfx6I62Kl)F$X{-pk|IOQKbIqqN>>0KtIg>cdKvxtrci2Rvp}($gSqPGWuA zRoUdi!WX4=wl7I7*>^tM4Ek(uadxg67kzKse9h0P$#rBi+i!bWf=*CK-Zh4w40+!y zo4cwD+)sZKHm#$5FH&n}^n4cUt5dw*wgqBgJJGjYx!1-XkTO__n`je4+LkzJ0lNy# z1LTP{hZyu;#N8*}VVM!dqGS45Oxg|>EyaW5qL%Dc{E`u>_d-80quIPi`#l&CUTukm zIa(zj(%wkHbc+6)9$Dm1=M%8*Ya8}fpfP2=)Y~h^y+VS4MuKdRm~x@lX7Wo&@^!1u z;h#&MHv-yA-!dH|4(ER&1qnK9$j^MiI$W&^4~Psn)qlCtFRZKkts}t{Ql?Aur++gr zFz_1ZLLf(!OrW!>%66Im?9NLZuDXa{Z`gY$$G45`$lmicE{pk*y)5_|e~n;XD>{62 zw|ct2GNVuoT#|_n^5(UkQ0G;nJD*S6i6Il%vU|C<>qjtia{5W{`#y=?eOzboTt#45 z@#*R5d>zww4(sEG4@qnvo^Ja^Mulu9+v$VcS%d>Q&Q^f@@mLSBAIo*<>z5oOy$HPJ zrKF@Bx05u7)Rl!m6pw32BUhtVcfWdjd(8+?(zb!wu_Dh6UYGe4@6s*6_drK(M&X;r zF+LU%vy6tS^2YI?p&k$8#tTcQOV-+Syx}h-!njEyak8n8$BjGWcSm-<4ATveG8(Bh z2=Xrmj^&kQq%B;E#};(gLX*4iNsbd}V~O{@(e@KDqE191cW*I}r^A+rz#X3qRZUR@ zweJNa9cg~NRk0dU z#M9wCQ!%J|GxCv3yOcJaj&OKwWNv=m@?M^FXDi zz=bzlo2ay@|r0;qY&_Y)$C4k!?bAqGG^e#K=s=Z>3yP$lL^0Sn<{Bys?)OvU52#AEo77qs-_e4=9I8DwOJr{rY z(Vc?kfpm#xf)`gYJ^}nYtwUIZi-wug=De}kds|*p*JVa)l}xc^3f#}o4x&ysND3MaWMH6r(f+8S*j) z736c!=%xSeU;`Hmk?)E!r_LL+!c!U2HX;pLNH=5$up}vTw|546lN-ayO)lO160bk8 z=cVj5%whaq2L01Y*7CKqkGF`E(Eb6J{O(HmBthzG#&P?HjCNzb8{MNXgU)%HcAwLk z*+EjcWQXM2&?i`R@ZmS3@5RNbL#BUp(sM16^TXp7x*7D&P=DrNv%h*pJ0VNk{{ENz z)^VMF3^!EB7fvrddAhobtgGRkov)wbyWCq$mXos(Sjp5#SbUGoyZxR_FI661LlgSf z3H(N(G0%I2AO-^tEW@g?xF3e|u)YPbmLeBl^ znKkg@d6()qro%*u*DLkETgesV7i!|L6>|!!KrPUhTgN2P7kYDKZ!JOn4 zD)f*A)kqvWLSj{P3=GSyjCj1!^0G+69b`RC9F%aRvS&O}fEqZ3QForwAr<-N#BtDO z^-ko|Pus%MWoY}GeFR8(9SI4^NZD?T(7Z`&zR#=ugf^D%XV1wG6Y?mxC^z?@*cZ9K zCD;M;b5%k>>Ly1g3PpDXJX>p*m*<;yo+pNuQGPvpbUfUgP|3^rF`thX8|edN>7TJ` z8Btx*cXkOKce32ly=d&UCpy zxJC>PUp7vLS=t|qOBpRE{r$bo>^!D2&^sqM@2)C*mn}X6ZR6iO?8)MBq%k&DRmA;~ z^!TEr;q#+x#Ds{mA_3liqR0U@=W29ynMrx&1uMvxI_QC3O%*?m@pCxyqx+KHR8y3U zdPvk-B~$I&ZT4}3gy&JJ!8}abcgndev^Jb6cmqSc%zj?7GG;YD+_^12U|Ht^FWJ_K zEd;<&1^$CxAB&HaO;XXE+K{ciBb#b(s|2D94L#lW!ZjZcl4k}Zt{7M;uNC-qa8fa? z4z{g$RwIsCzwUGFvAS_BqJqrigFi+FMm?@sh{)f~ROT_%*11n)M}8^domB9qzd-cWWJn z?8ZTTZkkt#Sol1dW=GGbN_#uA@#;87CNu^*TN-!L$YOjs$rx;_IcfRO3SKBE1LJyZ9nwyJFxWMnZMIqwM z(Xs_M+2EB{s`UX$1_2YX3USTCPZrglT&vl=gp=Z!YeDsB1GU61Y`{M&Ya{r+OBRis zm*aLkWvjnS_$vfGQ2#3!w2}WL{zxY%oPuC*ym^HJRUtiI0;et)TY_|jOG>UJByjjz z+DZDS;{7!BHYeFFb#xGCPp}d6$l|&^7exak=8hAVmAfB`zbP^|Sm(EFXK5a^=!y zV>_5NI80G?ie$u!i;JsKYUm+@W?F|zIRSKF(-iIB!ZY-fW3~0$=V!tBeP$^GbpL?# zJ)hf15lSB&q5)b!qVcs<9lfy4u4Dz7GHz-`Ps3KBvs2Zh6fV z1JP^7YuarzhQ(LaTx`M__4VFRsWKvA78G1{U=vwWgh(eP`pqKIhN|&?j-nJ^`RLxc zy)zvDE`QUbPlah5aXD~a?S*+MME|ynfSkIak0Du|g!m+L>4~&k;wO3k?k^B_6{&S^ ztc;|fQknVt5-iD{^Ego&c}YQ$l&}Un04c<)NUhCNx%QFc1OAA)AwY$deWCUym$c2U zqEy5)0eC+#kM_sjw5mhHEXtY^m=apGwKfrLNPQKJZ6Rm@uESW@$%OOAi!?P^yr$W+ zAcr>fN;%#q6Mt$eBF=UN?OL6u#b%XRguolsgup5=R2_wXM3A#d3fWF_Tp)UD_C4IS zr%C=B(a~a{1GXupY?JGa#Nv4v(gc|ip~bLREi*we=95~|hw;?4-q}T@lqHH~W}fE} z?Va95u};^Aqxv!MCkx@9n@NARLOgI^b5~m9$aqmvJ}!$#<9=|25_r;HjneZ^TDVQl zx!4Y{uxTp7<59BGhP=2M8hC>%-}aW1v01{3YC$2L0p8WlV7YSl9n0!3HbMiNbEDd~ zTw!A*tXVU)#X~bc4z@Oi5lvp&nD3q{asqHArMa`3WC1ftYTBDgqrYMKTE3}I?rQJb zlE7Jh$W@=C?WU9@Q1G~fzcGx6V7HJN)DpiIo&khjbCDp0zIiIz?WX@Hfyo+)tkR!) zG5ve;&D1Q+#!zsd{wRz+$8?{}J_X1E@VP?%z zx30V7G2_TBP_36&8Eh2c)jku2Jn-~W7aDQ{eLV{akGI#2BvIYo4eGXg+mEtMlf3`O z#!4s_9Ws&7Z9gp#kGYQ!fWQ+>Q**T5J?<0WcrV3Ji15S-{E8kV44?B+^WESEqU(6m zy7(bHwu`K%U3<&XGRf9mN;xb_a6hsI`@8O#In^$l)UEw(n-hLzW^cp%$9?m~H9FV; zbkXKK{=PFg!kuXk3oMiHXHfeXWWSM>jiR63y~HL-8c6y+X<2*X+jJ~4cKYA+Wl?ZP zW&(C=U7b)9(i8tXwZ>v}AxU!ZW$*Uj1BR^rO<3vT5*^9tCq@^B_a;Y8Up6IGKD<-}<|SGVfIfqKJk zJ0e0|gZ#_kh1gK=?>Z&@&`h~}RkFS8A;=+-Ds?!L=5rhecBnEJPJ-dlAtNM?QCL|h zgstxEmai+kv|rwtJJ2Xzax|IUO zoqcdLwj2BLf-BCM&@$85g7AZ%)4zTpkxE%$dia+_tzswQ- zEM*)I#B>w-5%)mIAmwDcan(No)kf-BoI=5T7L=RIgcOOSV0p~GE5?uvuI|Ti_gp&z zEMnwvpaF7_u_EtjT>dQhJt>ly(V&@(vBft0@|z11p$+@*R2(?ax8!n)KdP!eGB*{- z9k+ke9GwqqOvnpE@NdDjFGNe~^a`!Ee@s|x$TiQMFcr(Smk)I#gY%bnbE==NC>?e? zAX@I9IOVQUXp176$XM6r)yM2cVEfFOZ_e?Vhgy$g{?38-OOC@7-64@)2s|Cpj32xV z-=t4>$lE`9r0tjC%3k710!N(G9eck=WRXa-l#hD9m_;cm{v^&PV#VR2CY^J)xBldw zd1De7Fy$fu?-{Sb7nU6EK99VXSsykFje>~K2xD@+p3?rREzph3w!yQCghR}>hTxZZ z5I)6eFNjC2%A(()iLe`f!qxe$f&<7@)d?eLj7Po*n9Lt2W&c7SwxBMTnlRHz9s?H3G0$md&(OV4sjAKL-!C$P1&N@tFVnt#Juqj#b z!SUpYg~mz)VP`{xpF=p@{wTfaY_ydn#>+;h?uH5-R($<4Ku>lEqq+0Qi!Lp)Q80Po5pn$R-C{@h!IqYTiITO5ZbY&i4)L!dMm{5Q;OV-RxS1GRA?($}Q`dxf&{_ zKomIwmK2PQM#IU^is{mmuXe(~s&%@r#1_8*p@gfORQh+FpJq|+#ToEX;7II1MZtcV zH~oC9$x{ZbZR8{2nUyiKY&}@3EFtdzduoB{O4)UfO&?#kjl!{0)!8F3`a!Sj%Q4)( z)DP(F+c27R><{EN$@eoe)z1N-N!XLxm}Kmrb+DX13yqAx9E+*~W}5}u$d?ti3sQ3$+eNC=hUi1)38Y`(SAh$VZzogunjeRzR^{F;WZm8;kxg7J%&x7lw~lbab7dK`}uW8herC3>A`d!W-l^8kcYv;8|63c&>sb}=wojfW0 z`JZh_2W;NYMzNj?zeo*`d=YWyCLZ4~WP}Tt8|h6fy;)~nB2Oa2tR)Uus4O8~aT43x zj}d>SWy=o3u9HCt>k2~iz3@ms^g10f_M1_NkjGlFhlLL88eJDkP{w18o~2#5zkQ?K zCP-lT9wo<3(g+!QYdy$o>-{NZH#`weudf=m#G8pM{~)=a#&|tkntL-9KDB$_))g{G zO}@n&=#MYEt=iyAM?CK-`|bQ4sYCtsl&HSc;ZIEbIU$V#5tBS6rfzFzP6+kN&vu zEhIf}Y@#_P5F?)KA*p->>w{~G{R(O6^Je(L#3 z{je?RPWhjt4yLTrj*_Lh`EV$Gf5vi4^`G`Nqi0DjYMoFWJX=h5ZoW1~1H~^sz5WPW z1egH6I+jzWgWN@E1V-Q=!c*sHd(5|;w}CLDzMS)X-lg&+1w5vjshe_p0Fp!*^4P zU*J*M(|>zYzkr1j6ghbE+Ej$iw?T#GK)R>1N_2xgWx=04kp%=nc!91Oq!^tFJ3j3i=H>9W4 z=qka)t`zw$Q$aEW_Sf_d8-k-eJwDV$UKgA8?OZc#6!F++1@>muxJwQX5GT~L%y1kM z*v5;8t?aSq^qbZbZ)x28DOfJt#mRt zAg`XP_U8%UoDUo$`AZl?{?mQ_%H;f)TgLss+QcC4#6)eoMJi2QO;eGa%e%$hJ1o-s zxCB4BM`$8bTz$l@<${llZ^YyGW9mr@Zq`)jNytp1&GS^&=Ad2tV1GGi$i*J2T|xa zCOIfu)_0Cc;n9p%2y#I#-gDf3i!|=gtZTZCvLW8 znWXc!7sTX6g%hTh;`PNcYgWZ2uHfgN*y_WuD}o4`Sw9G-bWNgaKmX}!Lpa_^FJiLQ zE*s1q_IALM2V`UM@SozQrY{Amh)NZTDR5wO{_MMlw>RtXn=en+n}4~*4mT!t_TXi` zZ}@uz#lM7_^_vM^NF|0r$Zu=B0`WRAc4D00QOfZ2qlCdNidzOb@piHX1w2^znZxGSNUU{8)RFZeD9l)<>}kYF}M?!&=B z>5+a%=?~SBl}y$_4g?W>k>cEBBPT-%3zDp0KQ?Yhs-TcheGp8rA5NA}Huh47c~WDh z?{A{p2n>V+NN{4xXca zbD_WKege{F$a0g`JC1P8rmEfo=`muqe12f32?$GsVG57?`}_dV-%#VJ{HBc_j>Jyu zv?~(YX_1SzVp!LSgTi8|z}fDG6Vg68NhAay1^%}a>8V+FOlqu`apqlDsRj|IDsBDI zb87_;dSLL4coCrp-dIsGq{t;jrCP3nE7Z~Q)I}#dbc%?v3QnW~RgF1Q7+M#ZxNpCR zktRqG=;9C(&|;tIi1ZOm0OxA#w0@VpPbMsiISri%4H7MRLRJjQldBO4fl9I7)w;=9 z=j!9whlTa!scF1stl!IL)=%5~J!S+3{A1OZZk#A2oCXhJasIB`ar{uV<@2yK`S2Kms7~m{+DBfV@tOfgS~Z7XRnyQE1e@o7!q$Hd zJrPp)PmsUvkdEEPZA?~burLKO%2-gMRYdFn(HQov^t|{X60ikV$_SDcGMYkS*B%evgtL3yRw^nBn}T zGY+jBSH~a)e!9d3ZCav8VG&>uW1`Ui&WKOnuXH|A81kp}TnCH}yv^SX(qfJ$7z52K z)XX`#3#(IZr4V*u2)WA;+-J$LB}oNq7>HV#+6*+frf495P=4y{e1+Y!i8h8ZC`6^Y zQU+HSO}tL0n1g@Nlm>s4rIGB4{B@;GfC?6SUgQlCK}BHmH5M{mFbGXeyqLVyG9x4q`*C?PvA5Jys{rHKn0`qp;yT%MmF?kDN+>;FT;>U)^X zb(_u_L=RB@o*~<$el^L+A=~Y4Z-XATvxjnN{gThZU>3S8+pndCG8>Xno!Vf$02Z}Aq({&z0NgwXg6 zBYJ(D_&+wwI44SS{pG^*Pv1W7EpSnmbT)7@GQ@4~%AkIHV^~eXX{y+R-SckIT(=tI z29w=N@vm`HlDP&ZlCVDONf{;2o)BS*x7%A;T24lm828~;$~^Kx^ll*X#xNzbUMc33uBiGCJvHl^e3&6^osiB3 z!%M?XNrFfjkV;$}n!alv=hvM1VREn2&MG#|(WA81;a`8a3ARl{Hgw&VxePn`Xr~gC zh56R`oZO*RxD=2z|CahpJJS*EflqUTmfIJK4ZKO(*qYK7=E6#(=75uu#6XwfY72g1 z|A08`NQdW0rIhq{z3c%F{8b1=KxL4aC?yb548k(|)=vE%`*JyTg)9i=T>Rq9_};Dp zEv{y9lYLwOu!cs&pO};^@~v>s;nxa3%r_(+qj9jxq=Ui%>sGRb%*Xp1VBwvZg0atR zn6ohKMqrKv-b9l(b}Tw&p7?i)@+C@Ep0wD`Fjh1hRBz3R^`I!q&u&vOQU=lu;=*EV2Dh#rFI zy^9`okRf^dWas;NifmAlRWRc*0TVB5bZZw;khuRxASq6rip z+4r+*o5bUgPWskZ8s^rkw;#G`k(Km~1jebV^%UX{601cu{7fN9B*Vy2y*jZwzc|2}P-#S>QPAk}ca)IQWn2 z6+b>FGMOj8+ve8x(HxooBf?b5tSw&6_N9jcb?$yveKX2FFM3RA3)ZUcvVrl<6-(>f zl&D7hGW7z#lW?9+(ixK4kwQf>NDreyh%kWEfn@J6EFH$xuDOUV2X5usAO4&j1kOOZc=GV+MbDXgeK5QP05lpyO7wcbl!?NHm-ZCU02M$*AYE=kA2%^ zFRO|hHA9ynBKK?PM`E%2GPyY42epWpm(=Uhv*OpqqRF_j<g2xg&^dbi1WEp<- ztIl_4x_0;mNMZD#35F5RKs|hvJd+D;{?!QAH)8o-b*=dTi?>M&RSNx6!*0UvqH|7o zo_ep5G@#Z~SF(6#5vK>s!heX%jXNyo5oST##rFAE1K4-q%N4R=0BaI#b9NcI_z19p z=~_aq%Df4#T1$Z}@Z&%DVb!3Zm}t<#!jgSTt=+DRdA-~exjODtp7h>tDENfVrmpRH zh+oH&yV?_pmL}dSN(IXpg4>>429VOYEdWLS`9Xe5tfrWjpy_5SUo%>6Gz=pgvO;X{ z6bQ*wXB)H~9@;C-3(~A=+m{Ih9(EUx4LNhHzOV1Er}NBfqQ?l@q6zM448!uds(}>C z@A3Gg(=HqQdyHxR?Q2Y`3_K|nsf)eP4*>M2ZEVym4@_vpeYAhrzxST_m_OMx{?1H^ z{MEMZrtz*jAlQ%QdhIpNAj@_>0?cPJQ{n0GhxHB+;EiiR*)yl^Ve>3}zdYY$@>q2k z8+maPG6p_^>1GG9f>HOgVPoi^;Hw==dBdfUW%4n*$M^A9pHwDz>0)XLsA7_gNIF?V zK;K&qqq59d`Gt5@ZYBzn6iyQQL@@klU(f8%CVr>tPoFC+K5Quh$PFF1t|YJj<)24%4vNbd zk%5P|?#e*)M1%V6a-zLLi`qrb)G%;#sZIpDHeF21eO6RU_^Xl89VA9Y)89(`?U&uk;mm&_nVUzx&I5q4UikI-^4#zuciU8#Q0Rgc1| z!?(;m`yL#B=15Ii>8cZ*@8IGHi$7Zq|LEv*NPEyNhfvoxZF0Ha${!5c|0#@``%JQn7t-G}{0iS2>^1GV6(~r~{`Rntw&Cr!I z(Iu(gcKOrVRJz+6XC|hm&PxWty5{n){?xQAHMNu%OKJ*;LVuCIQ2%llZ7wd&+oQyx zN({3KA7gV6Q@i`l%PyU6q31om;bji+iAGNI+rQ;qyuQ~uObA4x=(L0p*6rcgCy-nJ zRD8?W3(`2{{tuOW6NiUp!rEf`X|^X*{6kw5r?hJTk%bqG_ipQ|Ff6M%l*M}dt*>}Y z%3*-Lo>1HMv!aow3G-VuF}+)ek>1o~7LZ2lP8t0E@ac>2UoY%Gco79q+@r*MfJdp3 zXx{~g!;2cYy(z9ee|y5&c9MF%etmht;I*pesG~ro>C!=M)yV@ik#gH%?1CK&we3Fg z4$t8+ouZ;MJ?!GSX(2?_-ZSFwZ3W*;41AC4~v9GvE9&; z@!~UX30bEE@dvuEcO|Bl5=a?tbMiq~#VB8ZS!jq<_v>LuV!U|(gm%b#V_(0uEROA z7(0pRIu@Ct0wl|LUl^HMuWEhXKr&RnhWqk0a9`Nbnh@ZHk(AUbg?B$&W{rmjwHOwC zzPv}m$FzzT;|;WPY+rdyml_Nqvd%?_Ce&@j zM)Pp(_~<2b)2KtD)y``{qp8QS6A{mcq^2w()I=dj?-sptm!)=WwoBmXWU-dc zj@MkBUBAyMzz)-4`mkI1?xRo($gMHga>8{YPYZ>SSH1Ql?yXWC0I8d7s1T`X1*K%b zp`tL*pt9Zpy3#G^&Ll7Q!W76X53v>ts_;W);Btf3d7sr)>c{-!6 zZK=*kXGg_V*&_h`57svD$g^p74CA6Z0;vlCZb2Qefv6hrj69oitL*QEvcj~vK|7f< zvma__43yCRWSctLFhN+t2EF^{Qpmvr25M9ry0fij*mo@97=pIG>o*hxFE z3!Iq>1duiha$i<%8{?LoO2`L)C3H7tgS`Dj#Br3CW^u7UTzvdf0GwvwpfR3C9t3T1 zS3i}Xez>IHBJ~p1jS;#>${icVMS+=(FczVVMwD2eClr8N;R!<#Vcb#){BaJ8S88$J z^7a4&fvav4W#TB^Xy!Dd^3K{fol3&GuH!>Q48tA$=2mTbsZ7{Hsv~>QUC#ZTj8{wT zs*p^HY9t~|h)7aN0*Bn&fCSsG>hqeG4({f1L$i2@XJn^%8gM$T| zaQ~mt6QjFM*6yJ@raIxoct{=2;r#2Lr6s6#vWp6b5}P5x`i?kfB5-E@Z2?OjNm%rz zUT22n5&bGezgQBUa~|TtJMPmHyU<$FzUb@~uKNsV>9*&Nyi{l8bUBTcZWIkpG0%wM zd*=Ab%SlBJa(V7TwK{cqE+isoT-V#+D1o%c!J!QK(+gm;axfi<^})LeIQtfwz~Wgn z{U&uc@E)b$tp=2yA-PRwvjE57o8&iH9lLh@6LIsCJ_c@AC(OH2)=N`e*s6uQxhKqP zp-NNh>IxqLQha3Fg4>BJJ|~h}^I9l6%RHR$mE&HT!r1Yg7iOSA5{EZ=Xs_NJ=8fQnVYay(0T{l;gA8&M;JTT8c3ShZOzJicFN7q{fFWDOvzIZF6a zm=*=H>Z9|{tSqTUo^bLLy*l<%HdXV=M2tD)XAC5;;T0M1d*vy?*Fs^HeQ#zM9^%9kd)-*_voJzwjVqk7xr175TfkpmSa_CH`~rqDSfR~!D6B> zD^pqP;U#zafJ?!)Gr^SFT}Vo~*?Ga@=(XC$VwRhTFpK5GCW}4AHsLQm$a?{3p^)80 zvh<5QV%V>)I@u920jV9>1vV)|r$VbV(5Y@_LpJrD0(=bW480R~HrN*;W9PS&bJifO zXHZDK9zcbx?bpg|-}PO~m0G&qevN2JdpRrbT?nJcS#}Q#ZiSt_y!iqvIodx0k`aQ+*6>ZS z{m*stwqmH7YSi{4Wn*5&^V|rk7b|PgifKAYch&7$SZU-ovZJ!E-v;TFHMk!1b-h3* ziHS10M<2I zSdUEqk}^BQMK~AxuGdD}b%e?5Tdf}*IEH}uC?O`=iqN`(9QFxM%Kcij;2~3|c{YBT ziz8v7xH1=EH7H2RRza?lz1mjP&w*B~#lAo>J!H2d-sWocALjIVgQ&V64ShD1t`uaZ zOPnk`Y)8#s5@+EJ$etq;$k<@>I;YT2Ws^A#lHnwgv0@hNTQa`JU1l~gp zu;fw8gL6*KCjH@u?E0te3Cg;upN?KC1l{x3XrGDYUH0IE#PwzT>WRMhZc53TKKCFY zg(NA0s2N|QW%WC;re*X`p1sM%;M_s{eA@tIfCWmGuR1QjzLdfB90U5{KTZ^mXWYZ&W zEWxq&CbecRE}Uew_hw4gP-C~MGeK}M!V9_B%9%VzPAcMhU9~a|`RlLdC}{n)wbj1gNe#=_n|e@C8JT z^;bcDEX{lFRT|2ED~|)@wHQyC&Ae+lfq5uER#zlbJzY;~oO7gRcx-+H%)8v_Y|?}N z$oP5&kL2MRC%_El^cZ))41l?_CGyHV$_+eyJZq+ zxv6{Gw)a+lL%p4K1C)Ze2WX(StSz@px0gME3?v;m7715XdszeFPWE$oIUb(ar4gyn zEm3r&=SLJu(LI<)3(J11IU70F%iBdYEh$M za;-VN7nF>H0niOO$02xkB60gxQ@6RRK#ft!boNC|C$x7u>LR;w^2}z*zk%ao zR}zB2Jd{OD3w*-pdsn4^&P_}d8K|X7Ote84K#N>Ky#v-j$0qCLnSjB-Bu?GR#6gX7 z^sB)6Ue~3J!R-#!M@57_h02uwbi_YS{n(m6Xw1A6ja>*Z&$0+An=mqFhB7buWzKAt zJO6p&X#ZMHpCWwx@}km{9hVB}UR~Mj79q41J`ZNbVRgCY{oFb^UpF;L*5_cf(>z?> zSyy3mF1#rZhP%qA`o9aReJaEr1WcrWta8K>{oOhN(M=CG&lE7>AFKU%m0k_H663JK zpjG2>Pg!($HZUS36s`*vV~t-+u=`8F2ND>%8g100iyh0G4+!aG(E(`&`_A62!g^dL zep^DHaH#vM>LH2K~%RjNMXVNqOEjQu)8Aw#Mb*RGMSex=dtdox^ z4KaVK1p)zp@=qP|VCT-?SRyw-EaZ*vJFb6+*$oV{;aj;8%fGSy@1(ej@GSd&NBoV2 z4hLdwhBG-5{vD>#AwdAmCFKtwGDbO~ey{}NsKK3KuTiXzK|8KkZvG1D+d4tSid{kc zsV(|K!ankgJs-p7=@0UpqENJwML{k;3HxZhMLk=|B(%087G}69xYgJ{jB!}u`n_a4TCfDKd7JnuD>3@Pc zcoD_-B=%8}vs#EZ>PYczVpQDRs%0mFMqik46@|S24pzY-s1XYlnj9ZbBOxJS^e!(c z;dXR&mAD8D8AxFoK#8&VqX^u1yj;Noaq;oRrKM08Sf4c(BKtOUS8aP|C&!CHE*0!?uq~-3um$&7Tmh|sS&)xria3B>b@N;%& ze;+)zlKp0jM*|hS-|BUZ-5NHA=Gv)8DJvX&M5w!nKYRW>*-pi^U&cCV4?Q;?G9(P+naKEV>_dACup0YN0xr??Zqvf6o)-0*%Y2kfB9l( zR=7R1xUeA0rz=jR+_Vci-JUYgmH3n%l_2O91TrRl^{KYL9&_0Q!ILw5_RMF}YA@ua z(_5-lLop1japXGoe>nuN0Va|R&|5C{Fq45W19+RcDM?hV=hxIHa< z(CE4#X~3Kr&8e&}8*o@qX5eHKf}eeEQ5&9gKt(wSbDKK>@zITJ%}>+`I^gn(@OI7m zcVFY3+WGkSFrFbacsXM%SNaigU30@G+P&*a)6>&MNj=%+1R*ZGv%RiP zQWzZ`{eucEsIh~eE!LQMTB1YPv2HC`WzPl3;gl@3j%gq_o{m4miikY`!ZcI^5;B=tJ`=9I@3u7K1A67bP3~WkvnUI2qiE`Fb zS>Jm3!SXHcrL3z+A9T$<{t(G)`yyy353oyED4BHP!GI?9;4#ptR+`2B2n+Y9$;e`aHXgc)+ck^Thrr)?FOEDLdhURR66rcwXlJUIM0MMa z7B{J37F{;v5sy&nkGF;`CH}jPQXMPhyWpXv*sWW2ahoYy{pzxHe3rCVKnr8(&eu8L z5%xQ?+VVv*B4|S$$Ih`p-1F}G>L-}>`>YnDX{s3?y?$!NbioaS;B)8n5WRsi9ego*xP#~|JglW@`!(hg7)K?HFp=Am@q`+^#nBs z5ut)VSBox0@xMTt<(~kzn87wlWc=@2;NPZ7V=O9EUdQ2rW<)u0ceGKRFh*<*jv=a` zTQ+4VLIz>7;`Xl`1zlvHeF_Hz(>Rj^_|fF zxGMcXqo4m@zkhRcbVQT~Z~u3MRFUljEoXZRS!WUZf4?yPG~U@Hx+SHw=B)oOuJfnu cQP&NA;_b1%)iJ! [!IMPORTANT] -> Between subsequent approvals, you must close and re-open the **System Preferences** > **Security & Privacy** window, otherwise macOS will not display the next approval. + > [!IMPORTANT] + > You must close and reopen the **System Preferences** > **Security & Privacy** window between subsequent approvals. Otherwise, macOS will not display the next approval. -> [!IMPORTANT] -> There is a one minute timeout before the product falls back to the kernel extension (to ensure that the device is protected). -> -> If more than one minute has elapsed, restart the daemon (by rebooting the device or using `sudo killall -9 wdavdaemon`) in order to trigger the approval flow again. + > [!IMPORTANT] + > There is a one-minute timeout before the product falls back to the kernel extension. This ensures that the device is protected. + > + > If more than one minute elapses, restart the daemon by rebooting the device or by using `sudo killall -9 wdavdaemon` to trigger the approval flow again. -![System extension approval pop-up](images/mac-system-extension-approval.png) + ![System extension approval pop-up](images/mac-system-extension-approval.png) -![System extension approval window](images/mac-system-extension-pref.png) + ![System extension approval window](images/mac-system-extension-pref.png) -Following the approval of the system extensions, macOS will prompt for an approval to allow network traffic to be filtered. Click **Allow**. +1. After the system extensions are approved, macOS prompts for an approval to allow network traffic to be filtered. Click **Allow**. -![Network extension approval pop-up](images/mac-system-extension-filter.png) + ![Network extension approval pop-up](images/mac-system-extension-filter.png) #### Grant Full Disk Access to the Endpoint Security system extension -Open **System Preferences** > **Security & Privacy** > **Privacy** tab and grant **Full Disk Access** to the **Microsoft Defender Endpoint Security Extension**. +Open the **System Preferences** > **Security & Privacy** > **Privacy** tab and grant **Full Disk Access** to the **Microsoft Defender Endpoint Security Extension**. ![Full disk access for Endpoint Security system extension](images/mac-system-extension-fda.png) @@ -107,46 +106,46 @@ Terminal output `endpoint_security_extension` indicates the product is using the ### Managed deployment -Refer to [this page](mac-sysext-policies.md#jamf) for the new configuration profiles that must be deployed for this new feature. +Refer to [New configuration profiles for macOS Catalina and newer versions of macOS: JAMF](mac-sysext-policies.md#jamf) for the new configuration profiles you must deploy for this new feature. -In addition to those profiles, make sure the target devices are also configured to be in the Insider Fast update channel, as described in [this section](#deployment-prerequisites). +In addition to those profiles, make sure to configure the target devices to be in the Insider Fast update channel, as described in [Deployment prerequisites](#deployment-prerequisites). -On a device where all prerequisites are met and the new configuration profiles have been deployed, run: +On a device where all prerequisites are met and the new configuration profiles have been deployed, run the following command: ```bash $ mdatp health --field real_time_protection_subsystem ``` -If this command prints `endpoint_security_extension`, then the product is using the system extensions functionality. +If this command prints `endpoint_security_extension`, the product is using the system extensions functionality. ## Validate basic scenarios -1. Test EICAR detection. From a Terminal window, run: +1. Test European Institute for Computer Antivirus Research (EICAR) detection. From a Terminal window, run the following command: -```bash -curl -o eicar.txt https://secure.eicar.org/eicar.com.txt -``` + ```bash + curl -o eicar.txt https://secure.eicar.org/eicar.com.txt + ``` - Verify that the EICAR file is quarantined. This verification can be done from the user interface (from the Protection History page) or command line using the following command: + Verify that the EICAR file is quarantined. You can verify the file's status on the Protection History page in the user interface, or from a command line by using the following command: -```bash -mdatp threat list -``` + ```bash + mdatp threat list + ``` -2. Test EDR DIY scenario. From a terminal window, run: +2. Test the Endpoint Detection and Response (EDR) DIY scenario. From a terminal window, run the following command: -```bash -curl -o "MDATP MacOS DIY.zip" https://aka.ms/mdatpmacosdiy -``` + ```bash + curl -o "MDATP MacOS DIY.zip" https://aka.ms/mdatpmacosdiy + ``` - Validate that two alerts have popped up in the portal in the machine page for EICAR and EDR DIY scenarios. + Validate that two alerts popped up in the portal on the machine page for EICAR and EDR DIY scenarios. ## Frequently asked questions - Q: Why am I still seeing `kernel_extension` when I run `mdatp health --field real_time_protection_subsystem`? - - A: Refer back to the [Deployment prerequisites](#deployment-prerequisites) section and double-check all of them are met. If all prerequisites are met, restart your device and check again. -- Q: When is macOS 11 Big Sur going to be supported? + A: Refer back to the [Deployment prerequisites](#deployment-prerequisites) section and double-check that all prerequisites are met. If all prerequisites are met, restart your device and check again. - A: We are actively working on adding support for macOS 11. We will post more information to the [What's new](mac-whatsnew.md). +- Q: When will macOS 11 Big Sur be supported? + + A: We are actively working on adding support for macOS 11. We will post more information to the [What's new](mac-whatsnew.md) page. From 059f8a3903ed77043d2b97a99c890bc18443a81a Mon Sep 17 00:00:00 2001 From: Dennis Rea Date: Wed, 11 Nov 2020 11:30:25 -0800 Subject: [PATCH 11/47] Update mac-sysext-preview.md --- .../microsoft-defender-atp/mac-sysext-preview.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-sysext-preview.md b/windows/security/threat-protection/microsoft-defender-atp/mac-sysext-preview.md index edac918fc2..79da63c6c7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-sysext-preview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-sysext-preview.md @@ -1,5 +1,5 @@ --- -title: Microsoft Defender ATP for Mac: system extensions (Preview) +title: Microsoft Defender ATP for Mac - system extensions (Preview) description: This article contains instructions for trying out the system extensions functionality of Microsoft Defender ATP for Mac. This functionality is currently in public preview. keywords: microsoft, defender, atp, mac, kernel, system, extensions, catalina search.product: eADQiWindows 10XVcnh From 9ee17c956a4d55a88f76bebb5863138b47e53bef Mon Sep 17 00:00:00 2001 From: "Trond B. Krokli" <38162891+illfated@users.noreply.github.com> Date: Fri, 13 Nov 2020 20:42:08 +0100 Subject: [PATCH 12/47] Microsoft Defender SmartScreen: Column corrections There are 2 cells divided from column 2, which makes them create a third column without a correct description, whereas column 3 has been moved to column 4 for row 1 and 2. This commit aims to rectify this by moving the content of column 3 back to column 2 and column 4 back to column 3. --- .../microsoft-defender-smartscreen-available-settings.md | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-available-settings.md b/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-available-settings.md index e0ab6e4909..a25aed7eab 100644 --- a/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-available-settings.md +++ b/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-available-settings.md @@ -34,14 +34,13 @@ SmartScreen uses registry-based Administrative Template policy settings. For mor Windows 10, version 2004:
Administrative Templates\Windows Components\Windows Defender SmartScreen\Explorer\Configure Windows Defender SmartScreen

-Windows 10, version 1703:
Administrative Templates\Windows Components\Windows Defender SmartScreen\Explorer\Configure Windows Defender SmartScreen

Windows 10, Version 1607 and earlier:
Administrative Templates\Windows Components\File Explorer\Configure Windows SmartScreen -At least Windows Server 2012, Windows 8 or Windows RT +Windows 10, version 1703:
Administrative Templates\Windows Components\Windows Defender SmartScreen\Explorer\Configure Windows Defender SmartScreen

Windows 10, Version 1607 and earlier:
Administrative Templates\Windows Components\File Explorer\Configure Windows SmartScreen

+At least Windows Server 2012, Windows 8 or Windows RT This policy setting turns on Microsoft Defender SmartScreen.

If you enable this setting, it turns on Microsoft Defender SmartScreen and your employees are unable to turn it off. Additionally, when enabling this feature, you must also pick whether Microsoft Defender SmartScreen should Warn your employees or Warn and prevent bypassing the message (effectively blocking the employee from the site).

If you disable this setting, it turns off Microsoft Defender SmartScreen and your employees are unable to turn it on.

If you don't configure this setting, your employees can decide whether to use Microsoft Defender SmartScreen. Windows 10, version 2004:
Administrative Templates\Windows Components\Windows Defender SmartScreen\Explorer\Configure App Install Control Windows 10, version 1703:
Administrative Templates\Windows Components\Windows Defender SmartScreen\Explorer\Configure App Install Control -Windows 10, version 1703 This policy setting is intended to prevent malicious content from affecting your user's devices when downloading executable content from the internet.

This setting does not protect against malicious content from USB devices, network shares or other non-internet sources.

Important: Using a trustworthy browser helps ensure that these protections work as expected.

From 6368d5c46113b1277856224fa84ae57d235b6d59 Mon Sep 17 00:00:00 2001 From: "Trond B. Krokli" <38162891+illfated@users.noreply.github.com> Date: Wed, 18 Nov 2020 14:43:47 +0100 Subject: [PATCH 13/47] Update: merge public branch into patch-107 See commit https://github.com/MicrosoftDocs/windows-itpro-docs/commit/f248872c9b4861a1d92ea8a945899fe6280fcab2 (`microsoft-defender-smartscreen-available-settings.md` file link https://github.com/MicrosoftDocs/windows-itpro-docs/commit/f248872c9b4861a1d92ea8a945899fe6280fcab2#diff-12e67b38e445922ed975beb4b144adf92ff9d4bd71fa12a0626dfe435bb0cb59) for the details. --- .../microsoft-defender-smartscreen-available-settings.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-available-settings.md b/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-available-settings.md index a25aed7eab..39288a73aa 100644 --- a/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-available-settings.md +++ b/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-available-settings.md @@ -41,7 +41,7 @@ SmartScreen uses registry-based Administrative Template policy settings. For mor Windows 10, version 2004:
Administrative Templates\Windows Components\Windows Defender SmartScreen\Explorer\Configure App Install Control Windows 10, version 1703:
Administrative Templates\Windows Components\Windows Defender SmartScreen\Explorer\Configure App Install Control -This policy setting is intended to prevent malicious content from affecting your user's devices when downloading executable content from the internet.

This setting does not protect against malicious content from USB devices, network shares or other non-internet sources.

Important: Using a trustworthy browser helps ensure that these protections work as expected.

+This policy setting is intended to prevent malicious content from affecting your user's devices when downloading executable content from the internet.

This setting does not protect against malicious content from USB devices, network shares, or other non-internet sources.

Important: Using a trustworthy browser helps ensure that these protections work as expected.

Windows 10, version 2004:
Administrative Templates\Windows Components\Windows Defender SmartScreen\Microsoft Edge\Configure Windows Defender SmartScreen (Microsoft Edge version 45 and earlier)

Administrative Templates\Microsoft Edge\SmartScreen settings\Configure Microsoft Defender SmartScreen (Microsoft Edge version 77 or later)

Windows 10, version 1703:
Administrative Templates\Windows Components\Windows Defender SmartScreen\Microsoft Edge\Configure Windows Defender SmartScreen (Microsoft Edge version 45 and earlier)

Administrative Templates\Microsoft Edge\SmartScreen settings\Configure Microsoft Defender SmartScreen (Microsoft Edge version 77 or later)

Windows 10, Version 1607 and earlier:
Administrative Templates\Windows Components\Microsoft Edge\Configure Windows SmartScreen @@ -159,7 +159,7 @@ For Microsoft Defender SmartScreen Edge MDM policies, see [Policy CSP - Browser] ## Recommended Group Policy and MDM settings for your organization -By default, Microsoft Defender SmartScreen lets employees bypass warnings. Unfortunately, this can let employees continue to an unsafe site or to continue to download an unsafe file, even after being warned. Because of this possibility, we strongly recommend that you set up Microsoft Defender SmartScreen to block high-risk interactions instead of providing just a warning. +By default, Microsoft Defender SmartScreen lets employees bypass warnings. Unfortunately, this feature can let employees continue to an unsafe site or to continue to download an unsafe file, even after being warned. Because of this possibility, we strongly recommend that you set up Microsoft Defender SmartScreen to block high-risk interactions instead of providing just a warning. To better help you protect your organization, we recommend turning on and using these specific Microsoft Defender SmartScreen Group Policy and MDM settings. From 3b423db0a6c6b3b3c88080d68d5bbc4ab03a1b90 Mon Sep 17 00:00:00 2001 From: VLG17 <41186174+VLG17@users.noreply.github.com> Date: Mon, 23 Nov 2020 11:14:35 +0200 Subject: [PATCH 14/47] Update windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-available-settings.md Co-authored-by: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- .../microsoft-defender-smartscreen-available-settings.md | 5 ----- 1 file changed, 5 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-available-settings.md b/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-available-settings.md index b7b275e78a..ef53ba233b 100644 --- a/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-available-settings.md +++ b/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-available-settings.md @@ -41,10 +41,6 @@ SmartScreen uses registry-based Administrative Template policy settings. For mor -patch-107 -======= - -public @@ -222,4 +218,3 @@ To better help you protect your organization, we recommend turning on and using - [Microsoft Defender SmartScreen overview](microsoft-defender-smartscreen-overview.md) - [Available Group Policy and Mobile Device Management (MDM) settings for Microsoft Edge](/microsoft-edge/deploy/available-policies) - From c0b156672b92c55252aa453bb4ea52acf135b384 Mon Sep 17 00:00:00 2001 From: chblac Date: Mon, 7 Dec 2020 11:37:15 -0800 Subject: [PATCH 15/47] Update bitlocker-csp.md --- windows/client-management/mdm/bitlocker-csp.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/client-management/mdm/bitlocker-csp.md b/windows/client-management/mdm/bitlocker-csp.md index 07f3aa7f0f..652a24f8e4 100644 --- a/windows/client-management/mdm/bitlocker-csp.md +++ b/windows/client-management/mdm/bitlocker-csp.md @@ -1126,12 +1126,12 @@ Supported values: |-----|------------| | 0 |The BitLocker policy requires user consent to launch the BitLocker Drive Encryption Wizard to start encryption of the OS volume but the user didn't consent.| | 1 |The encryption method of the OS volume doesn't match the BitLocker policy.| -| 2 |The BitLocker policy requires a TPM protector to protect the OS volume, but a TPM isn't used.| +| 2 |The OS volume is unprotected.| | 3 |The BitLocker policy requires a TPM-only protector for the OS volume, but TPM protection isn't used.| | 4 |The BitLocker policy requires TPM+PIN protection for the OS volume, but a TPM+PIN protector isn't used.| | 5 |The BitLocker policy requires TPM+startup key protection for the OS volume, but a TPM+startup key protector isn't used.| | 6 |The BitLocker policy requires TPM+PIN+startup key protection for the OS volume, but a TPM+PIN+startup key protector isn't used.| -| 7 |The OS volume is unprotected.| +| 7 |The BitLocker policy requires a TPM protector to protect the OS volume, but a TPM isn't used.| | 8 |Recovery key backup failed.| | 9 |A fixed drive is unprotected.| | 10 |The encryption method of the fixed drive doesn't match the BitLocker policy.| From 83d9bd9b7adc67699c85fb3d590e9d85f421cdc7 Mon Sep 17 00:00:00 2001 From: adirdidi <68847945+adirdidi@users.noreply.github.com> Date: Fri, 18 Dec 2020 20:53:34 +0200 Subject: [PATCH 16/47] API pages update 1. Adding US Gov reference to all pages with URIs. 2. Adding geo reference to all pages with URIs. 3. Replace MDE URLs ending with "windows.com" with "microsoft.com". 4. Replace the login endpoint from "login.windows.net" to "login.microsoftonline.com". --- .../includes/improve-request-performance.md | 2 +- .../includes/microsoft-defender-api-usgov.md | 20 ++++++++++++++ .../microsoft-defender-atp/api-hello-world.md | 10 ++++--- .../microsoft-defender-atp/api-power-bi.md | 8 ++++-- .../exposed-apis-create-app-nativeapp.md | 10 ++++--- .../exposed-apis-create-app-partners.md | 14 ++++++---- .../exposed-apis-create-app-webapp.md | 14 ++++++---- .../exposed-apis-list.md | 13 +++++++--- .../exposed-apis-odata-samples.md | 26 +++++++++++-------- .../run-advanced-query-api.md | 6 +++-- .../run-advanced-query-sample-powershell.md | 10 ++++--- .../run-advanced-query-sample-python.md | 10 ++++--- 12 files changed, 101 insertions(+), 42 deletions(-) create mode 100644 windows/security/includes/microsoft-defender-api-usgov.md diff --git a/windows/security/includes/improve-request-performance.md b/windows/security/includes/improve-request-performance.md index c2499cf092..efaf6664a9 100644 --- a/windows/security/includes/improve-request-performance.md +++ b/windows/security/includes/improve-request-performance.md @@ -16,7 +16,7 @@ ms.collection: M365-security-compliance ms.topic: article --- ->[!NOTE] +>[!TIP] >For better performance, you can use server closer to your geo location: > - api-us.securitycenter.microsoft.com > - api-eu.securitycenter.microsoft.com diff --git a/windows/security/includes/microsoft-defender-api-usgov.md b/windows/security/includes/microsoft-defender-api-usgov.md new file mode 100644 index 0000000000..6f525901c4 --- /dev/null +++ b/windows/security/includes/microsoft-defender-api-usgov.md @@ -0,0 +1,20 @@ +--- +title: Microsoft Defender for Endpoint API URIs for US Government +description: Microsoft Defender for Endpoint API URIs for US Government +keywords: defender, endpoint, api, government, gov +search.product: eADQiWindows 10XVcnh +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +ms.author: macapara +author: mjcaparas +ms.localizationpriority: medium +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: article +--- + +>[!NOTE] +>If you are a US Government customer, please use the URIs listed in [here](gov.md#api). diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-hello-world.md b/windows/security/threat-protection/microsoft-defender-atp/api-hello-world.md index 0dfd7bfce2..f9c9891569 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-hello-world.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-hello-world.md @@ -26,6 +26,8 @@ ms.topic: article - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + ## Get Alerts using a simple PowerShell script @@ -95,6 +97,8 @@ Done! You have successfully registered an application! - Copy the script below to PowerShell ISE or to a text editor, and save it as "**Get-Token.ps1**" - Running this script will generate a token and will save it in the working folder under the name "**Latest-token.txt**". +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ``` # That code gets the App Context Token and save it to a file named "Latest-token.txt" under the current directory # Paste below your Tenant ID, App ID and App Secret (App key). @@ -103,8 +107,8 @@ $tenantId = '' ### Paste your tenant ID here $appId = '' ### Paste your Application ID here $appSecret = '' ### Paste your Application secret here -$resourceAppIdUri = 'https://api.securitycenter.windows.com' -$oAuthUri = "https://login.windows.net/$TenantId/oauth2/token" +$resourceAppIdUri = 'https://api.securitycenter.microsoft.com' +$oAuthUri = "https://login.microsoftonline.com/$TenantId/oauth2/token" $authBody = [Ordered] @{ resource = "$resourceAppIdUri" client_id = "$appId" @@ -142,7 +146,7 @@ $dateTime = (Get-Date).ToUniversalTime().AddHours(-48).ToString("o") # The URL contains the type of query and the time filter we create above # Read more about other query options and filters at Https://TBD- add the documentation link -$url = "https://api.securitycenter.windows.com/api/alerts?`$filter=alertCreationTime ge $dateTime" +$url = "https://api.securitycenter.microsoft.com/api/alerts?`$filter=alertCreationTime ge $dateTime" # Set the WebRequest headers $headers = @{ diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-power-bi.md b/windows/security/threat-protection/microsoft-defender-atp/api-power-bi.md index 605b0f511a..39d611f4ca 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-power-bi.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-power-bi.md @@ -26,6 +26,8 @@ ms.topic: article - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + In this section you will learn create a Power BI report on top of Defender for Endpoint APIs. The first example demonstrates how to connect Power BI to Advanced Hunting API and the second example demonstrates a connection to our OData APIs, such as Machine Actions or Alerts. @@ -44,11 +46,13 @@ The first example demonstrates how to connect Power BI to Advanced Hunting API a - Copy the below and paste it in the editor: +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ``` let AdvancedHuntingQuery = "DeviceEvents | where ActionType contains 'Anti'", - HuntingUrl = "https://api.securitycenter.windows.com/api/advancedqueries", + HuntingUrl = "https://api.securitycenter.microsoft.com/api/advancedqueries", Response = Json.Document(Web.Contents(HuntingUrl, [Query=[key=AdvancedHuntingQuery]])), @@ -114,7 +118,7 @@ The first example demonstrates how to connect Power BI to Advanced Hunting API a Query = "MachineActions", - Source = OData.Feed("https://api.securitycenter.windows.com/api/" & Query, null, [Implementation="2.0", MoreColumns=true]) + Source = OData.Feed("https://api.securitycenter.microsoft.com/api/" & Query, null, [Implementation="2.0", MoreColumns=true]) in Source diff --git a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-nativeapp.md b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-nativeapp.md index fb00021426..6f75ba2ca8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-nativeapp.md +++ b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-nativeapp.md @@ -112,6 +112,10 @@ This page explains how to create an AAD application, get an access token to Micr For more information on AAD tokens, see [Azure AD tutorial](https://docs.microsoft.com/azure/active-directory/develop/active-directory-v2-protocols-oauth-client-creds) +[!include[Improve request performance](../../includes/improve-request-performance.md)] + +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + ### Using C# - Copy/Paste the below class in your application. @@ -127,9 +131,9 @@ For more information on AAD tokens, see [Azure AD tutorial](https://docs.microso public static class WindowsDefenderATPUtils { - private const string Authority = "https://login.windows.net"; + private const string Authority = "https://login.microsoftonline.com"; - private const string WdatpResourceId = "https://api.securitycenter.windows.com"; + private const string WdatpResourceId = "https://api.securitycenter.microsoft.com"; public static async Task AcquireUserTokenAsync(string username, string password, string appId, string tenantId) { @@ -175,7 +179,7 @@ Verify to make sure you got a correct token: ```csharp var httpClient = new HttpClient(); - var request = new HttpRequestMessage(HttpMethod.Get, "https://api.securitycenter.windows.com/api/alerts"); + var request = new HttpRequestMessage(HttpMethod.Get, "https://api.securitycenter.microsoft.com/api/alerts"); request.Headers.Authorization = new AuthenticationHeaderValue("Bearer", token); diff --git a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-partners.md b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-partners.md index e2de608fbd..06af8266e6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-partners.md +++ b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-partners.md @@ -129,6 +129,10 @@ The following steps will guide you how to create an Azure AD application, get an
For more information on AAD token, see [AAD tutorial](https://docs.microsoft.com/azure/active-directory/develop/active-directory-v2-protocols-oauth-client-creds) +[!include[Improve request performance](../../includes/improve-request-performance.md)] + +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + ### Using PowerShell ``` @@ -139,8 +143,8 @@ $tenantId = '' ### Paste your tenant ID here $appId = '' ### Paste your Application ID here $appSecret = '' ### Paste your Application key here -$resourceAppIdUri = 'https://api.securitycenter.windows.com' -$oAuthUri = "https://login.windows.net/$TenantId/oauth2/token" +$resourceAppIdUri = 'https://api.securitycenter.microsoft.com' +$oAuthUri = "https://login.microsoftonline.com/$TenantId/oauth2/token" $authBody = [Ordered] @{ resource = "$resourceAppIdUri" client_id = "$appId" @@ -172,8 +176,8 @@ return $token string appId = "11111111-1111-1111-1111-111111111111"; // Paste your own app ID here string appSecret = "22222222-2222-2222-2222-222222222222"; // Paste your own app secret here for a test, and then store it in a safe place! - const string authority = "https://login.windows.net"; - const string wdatpResourceId = "https://api.securitycenter.windows.com"; + const string authority = "https://login.microsoftonline.com"; + const string wdatpResourceId = "https://api.securitycenter.microsoft.com"; AuthenticationContext auth = new AuthenticationContext($"{authority}/{tenantId}/"); ClientCredential clientCredential = new ClientCredential(appId, appSecret); @@ -227,7 +231,7 @@ Sanity check to make sure you got a correct token: ``` var httpClient = new HttpClient(); - var request = new HttpRequestMessage(HttpMethod.Get, "https://api.securitycenter.windows.com/api/alerts"); + var request = new HttpRequestMessage(HttpMethod.Get, "https://api.securitycenter.microsoft.com/api/alerts"); request.Headers.Authorization = new AuthenticationHeaderValue("Bearer", token); diff --git a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-webapp.md b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-webapp.md index a7584847f9..3e602760b0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-webapp.md +++ b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-webapp.md @@ -107,6 +107,10 @@ This article explains how to create an Azure AD application, get an access token For more information on Azure AD tokens, see the [Azure AD tutorial](https://docs.microsoft.com/azure/active-directory/develop/active-directory-v2-protocols-oauth-client-creds). +[!include[Improve request performance](../../includes/improve-request-performance.md)] + +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + ### Use PowerShell ``` @@ -117,8 +121,8 @@ $tenantId = '' ### Paste your tenant ID here $appId = '' ### Paste your Application ID here $appSecret = '' ### Paste your Application key here -$resourceAppIdUri = 'https://api.securitycenter.windows.com' -$oAuthUri = "https://login.windows.net/$TenantId/oauth2/token" +$resourceAppIdUri = 'https://api.securitycenter.microsoft.com' +$oAuthUri = "https://login.microsoftonline.com/$TenantId/oauth2/token" $authBody = [Ordered] @{ resource = "$resourceAppIdUri" client_id = "$appId" @@ -150,8 +154,8 @@ The following code was tested with NuGet Microsoft.IdentityModel.Clients.ActiveD string appId = "11111111-1111-1111-1111-111111111111"; // Paste your own app ID here string appSecret = "22222222-2222-2222-2222-222222222222"; // Paste your own app secret here for a test, and then store it in a safe place! - const string authority = "https://login.windows.net"; - const string wdatpResourceId = "https://api.securitycenter.windows.com"; + const string authority = "https://login.microsoftonline.com"; + const string wdatpResourceId = "https://api.securitycenter.microsoft.com"; AuthenticationContext auth = new AuthenticationContext($"{authority}/{tenantId}/"); ClientCredential clientCredential = new ClientCredential(appId, appSecret); @@ -204,7 +208,7 @@ The following is an example of sending a request to get a list of alerts **using ``` var httpClient = new HttpClient(); - var request = new HttpRequestMessage(HttpMethod.Get, "https://api.securitycenter.windows.com/api/alerts"); + var request = new HttpRequestMessage(HttpMethod.Get, "https://api.securitycenter.microsoft.com/api/alerts"); request.Headers.Authorization = new AuthenticationHeaderValue("Bearer", token); diff --git a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-list.md b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-list.md index 785ac39e0d..4a8aac1dc4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-list.md +++ b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-list.md @@ -30,9 +30,9 @@ ms.topic: article ### Endpoint URI: -> The service base URI is: https://api.securitycenter.windows.com +> The service base URI is: https://api.securitycenter.microsoft.com > -> The queries based OData have the '/api' prefix. For example, to get Alerts you can send GET request to https://api.securitycenter.windows.com/api/alerts +> The queries based OData have the '/api' prefix. For example, to get Alerts you can send GET request to https://api.securitycenter.microsoft.com/api/alerts ### Versioning: @@ -40,9 +40,14 @@ ms.topic: article > > The current version is **V1.0**. > -> To use a specific version, use this format: `https://api.securitycenter.windows.com/api/{Version}`. For example: `https://api.securitycenter.windows.com/api/v1.0/alerts` +> To use a specific version, use this format: `https://api.securitycenter.microsoft.com/api/{Version}`. For example: `https://api.securitycenter.microsoft.com/api/v1.0/alerts` > -> If you don't specify any version (e.g. https://api.securitycenter.windows.com/api/alerts ) you will get to the latest version. +> If you don't specify any version (e.g. https://api.securitycenter.microsoft.com/api/alerts ) you will get to the latest version. + + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] Learn more about the individual supported entities where you can run API calls to and details such as HTTP request values, request headers and expected responses. diff --git a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-odata-samples.md b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-odata-samples.md index b4a487ffbe..ef758bf348 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-odata-samples.md +++ b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-odata-samples.md @@ -26,6 +26,10 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +[!include[Improve request performance](../../includes/improve-request-performance.md)] + +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + If you are not familiar with OData queries, see: [OData V4 queries](https://www.odata.org/documentation/) Not all properties are filterable. @@ -150,14 +154,14 @@ HTTP GET https://api.securitycenter.microsoft.com/api/alerts?$top=10&$expand=ev Get all the alerts last updated after 2019-11-22 00:00:00 ```http -HTTP GET https://api.securitycenter.windows.com/api/alerts?$filter=lastUpdateTime+ge+2019-11-22T00:00:00Z +HTTP GET https://api.securitycenter.microsoft.com/api/alerts?$filter=lastUpdateTime+ge+2019-11-22T00:00:00Z ``` **Response:** ```json { - "@odata.context": "https://api.securitycenter.windows.com/api/$metadata#Alerts", + "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Alerts", "value": [ { "id": "da637308392288907382_-880718168", @@ -206,14 +210,14 @@ HTTP GET https://api.securitycenter.windows.com/api/alerts?$filter=lastUpdateTi Get all the devices with 'High' 'RiskScore' ```http -HTTP GET https://api.securitycenter.windows.com/api/machines?$filter=riskScore+eq+'High' +HTTP GET https://api.securitycenter.microsoft.com/api/machines?$filter=riskScore+eq+'High' ``` **Response:** ```json { - "@odata.context": "https://api.securitycenter.windows.com/api/$metadata#Machines", + "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Machines", "value": [ { "id": "1e5bc9d7e413ddd7902c2932e418702b84d0cc07", @@ -245,14 +249,14 @@ HTTP GET https://api.securitycenter.windows.com/api/machines?$filter=riskScore+ Get top 100 devices with 'HealthStatus' not equals to 'Active' ```http -HTTP GET https://api.securitycenter.windows.com/api/machines?$filter=healthStatus+ne+'Active'&$top=100 +HTTP GET https://api.securitycenter.microsoft.com/api/machines?$filter=healthStatus+ne+'Active'&$top=100 ``` **Response:** ```json { - "@odata.context": "https://api.securitycenter.windows.com/api/$metadata#Machines", + "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Machines", "value": [ { "id": "1e5bc9d7e413ddd7902c2932e418702b84d0cc07", @@ -284,14 +288,14 @@ HTTP GET https://api.securitycenter.windows.com/api/machines?$filter=healthStat Get all the devices that last seen after 2018-10-20 ```http -HTTP GET https://api.securitycenter.windows.com/api/machines?$filter=lastSeen gt 2018-08-01Z +HTTP GET https://api.securitycenter.microsoft.com/api/machines?$filter=lastSeen gt 2018-08-01Z ``` **Response:** ```json { - "@odata.context": "https://api.securitycenter.windows.com/api/$metadata#Machines", + "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Machines", "value": [ { "id": "1e5bc9d7e413ddd7902c2932e418702b84d0cc07", @@ -323,14 +327,14 @@ HTTP GET https://api.securitycenter.windows.com/api/machines?$filter=lastSeen g Get all the Anti-Virus scans that the user Analyst@examples.onmicrosoft.com created using Microsoft Defender for Endpoint ```http -HTTP GET https://api.securitycenter.windows.com/api/machineactions?$filter=requestor eq 'Analyst@contoso.com' and type eq 'RunAntiVirusScan' +HTTP GET https://api.securitycenter.microsoft.com/api/machineactions?$filter=requestor eq 'Analyst@contoso.com' and type eq 'RunAntiVirusScan' ``` **Response:** ```json json{ - "@odata.context": "https://api.securitycenter.windows.com/api/$metadata#MachineActions", + "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#MachineActions", "value": [ { "id": "2e9da30d-27f6-4208-81f2-9cd3d67893ba", @@ -355,7 +359,7 @@ json{ Get the count of open alerts for a specific device: ```http -HTTP GET https://api.securitycenter.windows.com/api/machines/123321d0c675eaa415b8e5f383c6388bff446c62/alerts/$count?$filter=status ne 'Resolved' +HTTP GET https://api.securitycenter.microsoft.com/api/machines/123321d0c675eaa415b8e5f383c6388bff446c62/alerts/$count?$filter=status ne 'Resolved' ``` **Response:** diff --git a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-api.md b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-api.md index ce6887fc58..ddf250a58f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-api.md +++ b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-api.md @@ -26,6 +26,8 @@ ms.topic: article - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + ## Limitations 1. You can only run a query on data from the last 30 days. 2. The results will include a maximum of 100,000 rows. @@ -50,7 +52,7 @@ Delegated (work or school account) | AdvancedQuery.Read | 'Run advanced queries' ## HTTP request ``` -POST https://api.securitycenter.windows.com/api/advancedqueries/run +POST https://api.securitycenter.microsoft.com/api/advancedqueries/run ``` ## Request headers @@ -81,7 +83,7 @@ Here is an example of the request. ``` -POST https://api.securitycenter.windows.com/api/advancedqueries/run +POST https://api.securitycenter.microsoft.com/api/advancedqueries/run Content-type: application/json { "Query":"DeviceProcessEvents diff --git a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-powershell.md b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-powershell.md index cc1e69bc35..ea7771fd0a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-powershell.md +++ b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-powershell.md @@ -24,6 +24,8 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + Run advanced queries using PowerShell, see [Advanced Hunting API](run-advanced-query-api.md). @@ -51,8 +53,8 @@ $tenantId = '00000000-0000-0000-0000-000000000000' # Paste your own tenant ID he $appId = '11111111-1111-1111-1111-111111111111' # Paste your own app ID here $appSecret = '22222222-2222-2222-2222-222222222222' # Paste your own app secret here -$resourceAppIdUri = 'https://api.securitycenter.windows.com' -$oAuthUri = "https://login.windows.net/$TenantId/oauth2/token" +$resourceAppIdUri = 'https://api.securitycenter.microsoft.com' +$oAuthUri = "https://login.microsoftonline.com/$TenantId/oauth2/token" $body = [Ordered] @{ resource = "$resourceAppIdUri" client_id = "$appId" @@ -72,10 +74,12 @@ where Run the following query: +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ``` $query = 'RegistryEvents | limit 10' # Paste your own query here -$url = "https://api.securitycenter.windows.com/api/advancedqueries/run" +$url = "https://api.securitycenter.microsoft.com/api/advancedqueries/run" $headers = @{ 'Content-Type' = 'application/json' Accept = 'application/json' diff --git a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-python.md b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-python.md index c7d5c9e145..ed35434cfc 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-python.md +++ b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-python.md @@ -26,6 +26,8 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + Run advanced queries using Python, see [Advanced Hunting API](run-advanced-query-api.md). In this section, we share Python samples to retrieve a token and use it to run a query. @@ -36,6 +38,8 @@ In this section, we share Python samples to retrieve a token and use it to run a - Run the following commands: +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ``` import json @@ -46,9 +50,9 @@ tenantId = '00000000-0000-0000-0000-000000000000' # Paste your own tenant ID her appId = '11111111-1111-1111-1111-111111111111' # Paste your own app ID here appSecret = '22222222-2222-2222-2222-222222222222' # Paste your own app secret here -url = "https://login.windows.net/%s/oauth2/token" % (tenantId) +url = "https://login.microsoftonline.com/%s/oauth2/token" % (tenantId) -resourceAppIdUri = 'https://api.securitycenter.windows.com' +resourceAppIdUri = 'https://api.securitycenter.microsoft.com' body = { 'resource' : resourceAppIdUri, @@ -78,7 +82,7 @@ where ``` query = 'RegistryEvents | limit 10' # Paste your own query here -url = "https://api.securitycenter.windows.com/api/advancedqueries/run" +url = "https://api.securitycenter.microsoft.com/api/advancedqueries/run" headers = { 'Content-Type' : 'application/json', 'Accept' : 'application/json', From 8dcc5e7537ad168e43797de95dc95dc8fc2f9378 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Fri, 18 Dec 2020 15:18:24 -0800 Subject: [PATCH 17/47] fix link --- windows/security/includes/microsoft-defender-api-usgov.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/includes/microsoft-defender-api-usgov.md b/windows/security/includes/microsoft-defender-api-usgov.md index 6f525901c4..ff93c71ecd 100644 --- a/windows/security/includes/microsoft-defender-api-usgov.md +++ b/windows/security/includes/microsoft-defender-api-usgov.md @@ -17,4 +17,4 @@ ms.topic: article --- >[!NOTE] ->If you are a US Government customer, please use the URIs listed in [here](gov.md#api). +>If you are a US Government customer, please use the URIs listed in [here](../threat-protection/microsoft-defender-atp/gov.md#api). From e2f3abd0d5bd9277f9c2d9afaa27da70b2f7ee6a Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Fri, 18 Dec 2020 15:36:45 -0800 Subject: [PATCH 18/47] fix formatting --- .../security/threat-protection/microsoft-defender-atp/gov.md | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/gov.md b/windows/security/threat-protection/microsoft-defender-atp/gov.md index ddff7ba6a2..1c89d002cb 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/gov.md +++ b/windows/security/threat-protection/microsoft-defender-atp/gov.md @@ -109,7 +109,8 @@ Defender for Endpoint GCC High specific | ```us4-v20.events.data.microsoft.com`` ## API -Login endpoint: ```https://login.microsoftonline.us``` -Microsoft Defender for Endpoint API endpoint: ```https://api-gov.securitycenter.microsoft.us``` +- Login endpoint: ```https://login.microsoftonline.us``` + +- Microsoft Defender for Endpoint API endpoint: ```https://api-gov.securitycenter.microsoft.us``` From 8b119a506ef92e3a0de0640f96b5a12a35cc50d1 Mon Sep 17 00:00:00 2001 From: adirdidi <68847945+adirdidi@users.noreply.github.com> Date: Wed, 23 Dec 2020 02:07:53 +0200 Subject: [PATCH 19/47] API pages update 1. Adding US Gov reference to all pages with URIs. 2. Adding geo reference to all pages with URIs. 3. Replace MDE URLs ending with "windows.com" with "microsoft.com". 4. Replace the login endpoint from "login.windows.net" to "login.microsoftonline.com". --- .../add-or-remove-machine-tags.md | 11 +++++++---- .../microsoft-defender-atp/alerts.md | 7 ++++++- .../microsoft-defender-atp/api-hello-world.md | 4 ++-- .../microsoft-defender-atp/api-power-bi.md | 4 ++-- .../collect-investigation-package.md | 11 +++++++---- .../create-alert-by-reference.md | 10 ++++++---- .../delete-ti-indicator-by-id.md | 11 ++++++----- .../exposed-apis-create-app-nativeapp.md | 8 ++++---- .../exposed-apis-create-app-partners.md | 9 +++++---- .../exposed-apis-create-app-webapp.md | 8 ++++---- .../exposed-apis-full-sample-powershell.md | 10 +++++++--- .../exposed-apis-list.md | 4 ++-- .../exposed-apis-odata-samples.md | 4 ++-- .../microsoft-defender-atp/files.md | 5 +++++ .../find-machines-by-ip.md | 8 +++++--- .../get-alert-info-by-id.md | 4 ++++ .../get-alert-related-domain-info.md | 10 ++++++---- .../get-alert-related-files-info.md | 10 ++++++---- .../get-alert-related-ip-info.md | 10 ++++++---- .../get-alert-related-machine-info.md | 11 ++++++----- .../get-alert-related-user-info.md | 11 ++++++----- .../microsoft-defender-atp/get-alerts.md | 7 ++++--- .../get-all-recommendations.md | 9 +++++++-- .../get-all-vulnerabilities-by-machines.md | 9 +++++++-- .../get-all-vulnerabilities.md | 9 +++++++-- .../get-device-secure-score.md | 9 +++++++-- .../get-discovered-vulnerabilities.md | 8 ++++++-- .../get-domain-related-alerts.md | 8 +++++--- .../get-domain-related-machines.md | 9 +++++---- .../get-domain-statistics.md | 10 ++++++---- .../get-exposure-score.md | 9 +++++++-- .../get-file-information.md | 10 ++++++---- .../get-file-related-alerts.md | 8 +++++--- .../get-file-related-machines.md | 8 +++++--- .../get-file-statistics.md | 10 ++++++---- .../get-installed-software.md | 8 ++++++-- .../get-investigation-collection.md | 15 +++++++-------- .../get-investigation-object.md | 7 ++++++- .../get-ip-related-alerts.md | 9 +++++---- .../get-ip-statistics.md | 10 ++++++---- .../get-machine-by-id.md | 10 ++++++---- .../get-machine-group-exposure-score.md | 9 +++++++-- .../get-machine-log-on-users.md | 10 ++++++---- .../get-machine-related-alerts.md | 4 ++++ .../get-machineaction-object.md | 12 +++++++----- .../get-machineactions-collection.md | 18 +++++++++--------- .../get-machinegroups-collection.md | 6 +++++- .../get-machines-by-software.md | 9 +++++++-- .../get-machines-by-vulnerability.md | 9 +++++++-- .../microsoft-defender-atp/get-machines.md | 13 +++++++------ .../get-missing-kbs-machine.md | 6 +++++- .../get-missing-kbs-software.md | 7 ++++++- .../get-package-sas-uri.md | 13 +++++++------ .../get-recommendation-by-id.md | 12 +++++++++--- .../get-recommendation-machines.md | 10 +++++++--- .../get-recommendation-software.md | 10 +++++++--- .../get-recommendation-vulnerabilities.md | 10 +++++++--- .../get-security-recommendations.md | 8 ++++++-- .../get-software-by-id.md | 9 +++++++-- .../get-software-ver-distribution.md | 9 +++++++-- .../microsoft-defender-atp/get-software.md | 9 +++++++-- .../get-ti-indicators-collection.md | 16 +++++++++------- .../get-user-information.md | 10 ++++++---- .../get-user-related-alerts.md | 8 +++++--- .../get-user-related-machines.md | 8 +++++--- .../get-vuln-by-software.md | 9 +++++++-- .../get-vulnerability-by-id.md | 9 +++++++-- .../initiate-autoir-investigation.md | 6 ++++-- .../microsoft-defender-atp/investigation.md | 5 +++++ .../microsoft-defender-atp/isolate-machine.md | 10 ++++++---- .../microsoft-defender-atp/machine.md | 4 ++++ .../microsoft-defender-atp/machineaction.md | 5 +++++ .../offboard-machine-api.md | 10 ++++++---- .../onboarding-notification.md | 7 ++++++- .../post-ti-indicator.md | 11 ++++++----- .../pull-alerts-using-rest-api.md | 6 +++--- .../microsoft-defender-atp/recommendation.md | 5 +++++ .../restrict-code-execution.md | 8 ++++++-- .../run-advanced-query-api.md | 5 ++--- .../run-advanced-query-sample-powershell.md | 3 +-- .../run-advanced-query-sample-python.md | 4 ++-- .../microsoft-defender-atp/run-av-scan.md | 8 ++++++-- .../microsoft-defender-atp/score.md | 5 +++++ .../microsoft-defender-atp/set-device-value.md | 5 +++++ .../microsoft-defender-atp/software.md | 5 +++++ .../stop-and-quarantine-file.md | 8 ++++++-- .../microsoft-defender-atp/ti-indicator.md | 5 +++++ .../troubleshoot-onboarding-error-messages.md | 4 ++-- .../unisolate-machine.md | 10 ++++++---- .../unrestrict-code-execution.md | 10 ++++++---- .../microsoft-defender-atp/update-alert.md | 8 +++++--- .../microsoft-defender-atp/user.md | 5 +++++ .../microsoft-defender-atp/vulnerability.md | 5 +++++ 93 files changed, 518 insertions(+), 254 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md b/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md index 94849b6b18..bfed28074d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md +++ b/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md @@ -25,6 +25,11 @@ ms.topic: article - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + + ## API description Adds or remove tag to a specific [Machine](machine.md). @@ -54,7 +59,7 @@ Delegated (work or school account) | Machine.ReadWrite | 'Read and write machine ## HTTP request ```http -POST https://api.securitycenter.windows.com/api/machines/{id}/tags +POST https://api.securitycenter.microsoft.com/api/machines/{id}/tags ``` ## Request headers @@ -84,10 +89,8 @@ If successful, this method returns 200 - Ok response code and the updated Machin Here is an example of a request that adds machine tag. -[!include[Improve request performance](../../includes/improve-request-performance.md)] - ```http -POST https://api.securitycenter.windows.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/tags +POST https://api.securitycenter.microsoft.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/tags Content-type: application/json { "Value" : "test Tag 2", diff --git a/windows/security/threat-protection/microsoft-defender-atp/alerts.md b/windows/security/threat-protection/microsoft-defender-atp/alerts.md index eaa7c56c2f..d7949c4065 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/alerts.md @@ -25,6 +25,11 @@ ms.topic: article - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + + ## Methods Method |Return Type |Description @@ -71,7 +76,7 @@ comments | List of Alert comments | Alert Comment is an object that contains: co ### Response example for getting single alert: ``` -GET https://api.securitycenter.windows.com/api/alerts/da637084217856368682_-292920499 +GET https://api.securitycenter.microsoft.com/api/alerts/da637084217856368682_-292920499 ``` ```json diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-hello-world.md b/windows/security/threat-protection/microsoft-defender-atp/api-hello-world.md index f9c9891569..81f125ba22 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-hello-world.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-hello-world.md @@ -28,6 +28,8 @@ ms.topic: article [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ## Get Alerts using a simple PowerShell script @@ -97,8 +99,6 @@ Done! You have successfully registered an application! - Copy the script below to PowerShell ISE or to a text editor, and save it as "**Get-Token.ps1**" - Running this script will generate a token and will save it in the working folder under the name "**Latest-token.txt**". -[!include[Improve request performance](../../includes/improve-request-performance.md)] - ``` # That code gets the App Context Token and save it to a file named "Latest-token.txt" under the current directory # Paste below your Tenant ID, App ID and App Secret (App key). diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-power-bi.md b/windows/security/threat-protection/microsoft-defender-atp/api-power-bi.md index 39d611f4ca..32dda775a4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-power-bi.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-power-bi.md @@ -28,6 +28,8 @@ ms.topic: article [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] +[!include[Improve request performance](../../includes/improve-request-performance.md)] + In this section you will learn create a Power BI report on top of Defender for Endpoint APIs. The first example demonstrates how to connect Power BI to Advanced Hunting API and the second example demonstrates a connection to our OData APIs, such as Machine Actions or Alerts. @@ -46,8 +48,6 @@ The first example demonstrates how to connect Power BI to Advanced Hunting API a - Copy the below and paste it in the editor: -[!include[Improve request performance](../../includes/improve-request-performance.md)] - ``` let AdvancedHuntingQuery = "DeviceEvents | where ActionType contains 'Anti'", diff --git a/windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package.md b/windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package.md index 0d6949ea0b..20536ad64b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package.md +++ b/windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package.md @@ -26,6 +26,11 @@ ms.topic: article - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + + ## API description Collect investigation package from a device. @@ -49,7 +54,7 @@ Delegated (work or school account) | Machine.CollectForensics | 'Collect forensi ## HTTP request ``` -POST https://api.securitycenter.windows.com/api/machines/{id}/collectInvestigationPackage +POST https://api.securitycenter.microsoft.com/api/machines/{id}/collectInvestigationPackage ``` ## Request headers @@ -76,10 +81,8 @@ If successful, this method returns 201 - Created response code and [Machine Acti Here is an example of the request. -[!include[Improve request performance](../../includes/improve-request-performance.md)] - ``` -POST https://api.securitycenter.windows.com/api/machines/fb9ab6be3965095a09c057be7c90f0a2/collectInvestigationPackage +POST https://api.securitycenter.microsoft.com/api/machines/fb9ab6be3965095a09c057be7c90f0a2/collectInvestigationPackage Content-type: application/json { "Comment": "Collect forensics due to alert 1234" diff --git a/windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference.md b/windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference.md index a5c286ef37..05729852d3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference.md +++ b/windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference.md @@ -25,6 +25,10 @@ ms.topic: article - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ## API description Creates new [Alert](alerts.md) on top of **Event**. @@ -56,7 +60,7 @@ Delegated (work or school account) | Alert.ReadWrite | 'Read and write alerts' ## HTTP request ``` -POST https://api.securitycenter.windows.com/api/alerts/CreateAlertByReference +POST https://api.securitycenter.microsoft.com/api/alerts/CreateAlertByReference ``` ## Request headers @@ -91,10 +95,8 @@ If successful, this method returns 200 OK, and a new [alert](alerts.md) object i Here is an example of the request. -[!include[Improve request performance](../../includes/improve-request-performance.md)] - ``` -POST https://api.securitycenter.windows.com/api/alerts/CreateAlertByReference +POST https://api.securitycenter.microsoft.com/api/alerts/CreateAlertByReference ``` ```json { diff --git a/windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id.md b/windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id.md index 123ce4959e..b3c2960440 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id.md +++ b/windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id.md @@ -25,6 +25,10 @@ ms.topic: article - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ## API description Deletes an [Indicator](ti-indicator.md) entity by ID. @@ -45,12 +49,9 @@ Application | Ti.ReadWrite.All | 'Read and write Indicators' ## HTTP request ``` -Delete https://api.securitycenter.windows.com/api/indicators/{id} +Delete https://api.securitycenter.microsoft.com/api/indicators/{id} ``` -[!include[Improve request performance](../../includes/improve-request-performance.md)] - - ## Request headers Name | Type | Description @@ -72,5 +73,5 @@ If Indicator with the specified id was not found - 404 Not Found. Here is an example of the request. ``` -DELETE https://api.securitycenter.windows.com/api/indicators/995 +DELETE https://api.securitycenter.microsoft.com/api/indicators/995 ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-nativeapp.md b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-nativeapp.md index 6f75ba2ca8..9f93b7365e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-nativeapp.md +++ b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-nativeapp.md @@ -26,6 +26,10 @@ ms.topic: article - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + This page describes how to create an application to get programmatic access to Defender for Endpoint on behalf of a user. If you need programmatic access Microsoft Defender for Endpoint without a user, refer to [Access Microsoft Defender for Endpoint with application context](exposed-apis-create-app-webapp.md). @@ -112,10 +116,6 @@ This page explains how to create an AAD application, get an access token to Micr For more information on AAD tokens, see [Azure AD tutorial](https://docs.microsoft.com/azure/active-directory/develop/active-directory-v2-protocols-oauth-client-creds) -[!include[Improve request performance](../../includes/improve-request-performance.md)] - -[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] - ### Using C# - Copy/Paste the below class in your application. diff --git a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-partners.md b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-partners.md index 06af8266e6..cfb61033a4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-partners.md +++ b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-partners.md @@ -25,6 +25,11 @@ ms.topic: article **Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) + +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + This page describes how to create an Azure Active Directory (Azure AD) application to get programmatic access to Microsoft Defender for Endpoint on behalf of your customers. @@ -129,10 +134,6 @@ The following steps will guide you how to create an Azure AD application, get an
For more information on AAD token, see [AAD tutorial](https://docs.microsoft.com/azure/active-directory/develop/active-directory-v2-protocols-oauth-client-creds) -[!include[Improve request performance](../../includes/improve-request-performance.md)] - -[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] - ### Using PowerShell ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-webapp.md b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-webapp.md index 3e602760b0..f4dc27179e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-webapp.md +++ b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-webapp.md @@ -26,6 +26,10 @@ ms.topic: article - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + This page describes how to create an application to get programmatic access to Defender for Endpoint without a user. If you need programmatic access to Defender for Endpoint on behalf of a user, see [Get access with user context](exposed-apis-create-app-nativeapp.md). If you are not sure which access you need, see [Get started](apis-intro.md). Microsoft Defender for Endpoint exposes much of its data and actions through a set of programmatic APIs. Those APIs will help you automate work flows and innovate based on Defender for Endpoint capabilities. The API access requires OAuth2.0 authentication. For more information, see [OAuth 2.0 Authorization Code Flow](https://docs.microsoft.com/azure/active-directory/develop/active-directory-v2-protocols-oauth-code). @@ -107,10 +111,6 @@ This article explains how to create an Azure AD application, get an access token For more information on Azure AD tokens, see the [Azure AD tutorial](https://docs.microsoft.com/azure/active-directory/develop/active-directory-v2-protocols-oauth-client-creds). -[!include[Improve request performance](../../includes/improve-request-performance.md)] - -[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] - ### Use PowerShell ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-full-sample-powershell.md b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-full-sample-powershell.md index 31142c2936..676e6a5185 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-full-sample-powershell.md +++ b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-full-sample-powershell.md @@ -25,6 +25,10 @@ ms.date: 09/24/2018 **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + Full scenario using multiple APIs from Microsoft Defender for Endpoint. @@ -63,7 +67,7 @@ $appSecret = '22222222-2222-2222-2222-222222222222' # Paste your own app secret $suspiciousUrl = 'www.suspiciousUrl.com' # Paste your own URL here $resourceAppIdUri = 'https://securitycenter.onmicrosoft.com/windowsatpservice' -$oAuthUri = "https://login.windows.net/$TenantId/oauth2/token" +$oAuthUri = "https://login.microsoftonline.com/$TenantId/oauth2/token" $authBody = [Ordered] @{ resource = "$resourceAppIdUri" client_id = "$appId" @@ -75,7 +79,7 @@ $aadToken = $authResponse.access_token #Get latest alert -$alertUrl = "https://api.securitycenter.windows.com/api/alerts?`$top=10" +$alertUrl = "https://api.securitycenter.microsoft.com/api/alerts?`$top=10" $headers = @{ 'Content-Type' = 'application/json' Accept = 'application/json' @@ -108,7 +112,7 @@ $query = "NetworkCommunicationEvents | where RemoteUrl == `"$suspiciousUrl`" | summarize ConnectionsCount = count() by MachineId" -$queryUrl = "https://api.securitycenter.windows.com/api/advancedqueries/run" +$queryUrl = "https://api.securitycenter.microsoft.com/api/advancedqueries/run" $queryBody = ConvertTo-Json -InputObject @{ 'Query' = $query } $queryResponse = Invoke-WebRequest -Method Post -Uri $queryUrl -Headers $headers -Body $queryBody -ErrorAction Stop diff --git a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-list.md b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-list.md index 4a8aac1dc4..e5f0ac91e0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-list.md +++ b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-list.md @@ -45,10 +45,10 @@ ms.topic: article > If you don't specify any version (e.g. https://api.securitycenter.microsoft.com/api/alerts ) you will get to the latest version. -[!include[Improve request performance](../../includes/improve-request-performance.md)] - [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] +[!include[Improve request performance](../../includes/improve-request-performance.md)] + Learn more about the individual supported entities where you can run API calls to and details such as HTTP request values, request headers and expected responses. diff --git a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-odata-samples.md b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-odata-samples.md index ef758bf348..9c0ee43caf 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-odata-samples.md +++ b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-odata-samples.md @@ -26,10 +26,10 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -[!include[Improve request performance](../../includes/improve-request-performance.md)] - [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] +[!include[Improve request performance](../../includes/improve-request-performance.md)] + If you are not familiar with OData queries, see: [OData V4 queries](https://www.odata.org/documentation/) Not all properties are filterable. diff --git a/windows/security/threat-protection/microsoft-defender-atp/files.md b/windows/security/threat-protection/microsoft-defender-atp/files.md index 6289c8645b..677387cad1 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/files.md +++ b/windows/security/threat-protection/microsoft-defender-atp/files.md @@ -25,6 +25,11 @@ ms.topic: article - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + + Represent a file entity in Defender for Endpoint. ## Methods diff --git a/windows/security/threat-protection/microsoft-defender-atp/find-machines-by-ip.md b/windows/security/threat-protection/microsoft-defender-atp/find-machines-by-ip.md index 3db35c6164..616dfffb2e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/find-machines-by-ip.md +++ b/windows/security/threat-protection/microsoft-defender-atp/find-machines-by-ip.md @@ -25,6 +25,10 @@ ms.topic: article - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ## API description Find [Machines](machine.md) seen with the requested internal IP in the time range of 15 minutes prior and after a given timestamp. @@ -75,8 +79,6 @@ If the timestamp is not in the past 30 days - 400 Bad Request. Here is an example of the request. -[!include[Improve request performance](../../includes/improve-request-performance.md)] - ``` -GET https://api.securitycenter.windows.com/api/machines/findbyip(ip='10.248.240.38',timestamp=2019-09-22T08:44:05Z) +GET https://api.securitycenter.microsoft.com/api/machines/findbyip(ip='10.248.240.38',timestamp=2019-09-22T08:44:05Z) ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alert-info-by-id.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-info-by-id.md index 07ac59b945..210a00624f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-alert-info-by-id.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-alert-info-by-id.md @@ -25,6 +25,10 @@ ms.topic: article - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ## API description Retrieves specific [Alert](alerts.md) by its ID. diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-domain-info.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-domain-info.md index e9d18d97e7..607206740c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-domain-info.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-domain-info.md @@ -25,6 +25,10 @@ ms.topic: article - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ## API description Retrieves all domains related to a specific alert. @@ -72,10 +76,8 @@ If successful and alert and domain exist - 200 OK. If alert not found - 404 Not Here is an example of the request. -[!include[Improve request performance](../../includes/improve-request-performance.md)] - ``` -GET https://api.securitycenter.windows.com/alerts/636688558380765161_2136280442/domains +GET https://api.securitycenter.microsoft.com/alerts/636688558380765161_2136280442/domains ``` **Response** @@ -86,7 +88,7 @@ Here is an example of the response. HTTP/1.1 200 OK Content-type: application/json { - "@odata.context": "https://api.securitycenter.windows.com/$metadata#Domains", + "@odata.context": "https://api.securitycenter.microsoft.com/$metadata#Domains", "value": [ { "host": "www.example.com" diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-files-info.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-files-info.md index 6e61e17504..95743e8fdc 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-files-info.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-files-info.md @@ -25,6 +25,10 @@ ms.topic: article - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ## API description Retrieves all files related to a specific alert. @@ -72,10 +76,8 @@ If successful and alert and files exist - 200 OK. If alert not found - 404 Not F Here is an example of the request. -[!include[Improve request performance](../../includes/improve-request-performance.md)] - ``` -GET https://api.securitycenter.windows.com/api/alerts/636688558380765161_2136280442/files +GET https://api.securitycenter.microsoft.com/api/alerts/636688558380765161_2136280442/files ``` **Response** @@ -87,7 +89,7 @@ Here is an example of the response. HTTP/1.1 200 OK Content-type: application/json { - "@odata.context": "https://api.securitycenter.windows.com/api/$metadata#Files", + "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Files", "value": [ { "sha1": "f2a00fd2f2de1be0214b8529f1e9f67096c1aa70", diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-ip-info.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-ip-info.md index 62db50d08a..dd5859b46d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-ip-info.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-ip-info.md @@ -25,6 +25,10 @@ ms.topic: article - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ## API description Retrieves all IPs related to a specific alert. @@ -73,10 +77,8 @@ If successful and alert and an IP exist - 200 OK. If alert not found - 404 Not F Here is an example of the request. -[!include[Improve request performance](../../includes/improve-request-performance.md)] - ``` -GET https://api.securitycenter.windows.com/alerts/636688558380765161_2136280442/ips +GET https://api.securitycenter.microsoft.com/alerts/636688558380765161_2136280442/ips ``` **Response** @@ -88,7 +90,7 @@ Here is an example of the response. HTTP/1.1 200 OK Content-type: application/json { - "@odata.context": "https://api.securitycenter.windows.com/$metadata#Ips", + "@odata.context": "https://api.securitycenter.microsoft.com/$metadata#Ips", "value": [ { "id": "104.80.104.128" diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-machine-info.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-machine-info.md index 98f64ac8d1..ab1cfd8107 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-machine-info.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-machine-info.md @@ -25,6 +25,10 @@ ms.topic: article - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ## API description Retrieves [Device](machine.md) related to a specific alert. @@ -74,11 +78,8 @@ If successful and alert and device exist - 200 OK. If alert not found or device Here is an example of the request. -[!include[Improve request performance](../../includes/improve-request-performance.md)] - - ``` -GET https://api.securitycenter.windows.com/api/alerts/636688558380765161_2136280442/machine +GET https://api.securitycenter.microsoft.com/api/alerts/636688558380765161_2136280442/machine ``` **Response** @@ -90,7 +91,7 @@ Here is an example of the response. HTTP/1.1 200 OK Content-type: application/json { - "@odata.context": "https://api.securitycenter.windows.com/api/$metadata#Machines/$entity", + "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Machines/$entity", "id": "1e5bc9d7e413ddd7902c2932e418702b84d0cc07", "computerDnsName": "mymachine1.contoso.com", "firstSeen": "2018-08-02T14:55:03.7791856Z", diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-user-info.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-user-info.md index 3e96ce7383..c5461ce794 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-user-info.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-user-info.md @@ -25,6 +25,10 @@ ms.topic: article - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ## API description Retrieves the User related to a specific alert. @@ -73,11 +77,8 @@ If successful and alert and a user exists - 200 OK with user in the body. If ale Here is an example of the request. -[!include[Improve request performance](../../includes/improve-request-performance.md)] - - ``` -GET https://api.securitycenter.windows.com/api/alerts/636688558380765161_2136280442/user +GET https://api.securitycenter.microsoft.com/api/alerts/636688558380765161_2136280442/user ``` **Response** @@ -89,7 +90,7 @@ Here is an example of the response. HTTP/1.1 200 OK Content-type: application/json { - "@odata.context": "https://api.securitycenter.windows.com/api/$metadata#Users/$entity", + "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Users/$entity", "id": "contoso\\user1", "accountName": "user1", "accountDomain": "contoso", diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/get-alerts.md index a7c825d739..687c2dffa2 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-alerts.md @@ -25,6 +25,10 @@ ms.topic: article - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ## API description Retrieves a collection of Alerts. @@ -87,9 +91,6 @@ Here is an example of the request. GET https://api.securitycenter.microsoft.com/api/alerts ``` -[!include[Improve request performance](../../includes/improve-request-performance.md)] - - **Response** Here is an example of the response. diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-all-recommendations.md b/windows/security/threat-protection/microsoft-defender-atp/get-all-recommendations.md index a5cde6e4a0..b0b573c0e7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-all-recommendations.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-all-recommendations.md @@ -23,6 +23,11 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + + [!include[Prerelease information](../../includes/prerelease.md)] Retrieves a list of all security recommendations affecting the organization. @@ -61,7 +66,7 @@ If successful, this method returns 200 OK with the list of security recommendati Here is an example of the request. ``` -GET https://api.securitycenter.windows.com/api/recommendations +GET https://api.securitycenter.microsoft.com/api/recommendations ``` **Response** @@ -71,7 +76,7 @@ Here is an example of the response. ```json { - "@odata.context": "https://api.securitycenter.windows.com/api/$metadata#Recommendations", + "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Recommendations", "value": [ { "id": "va-_-microsoft-_-windows_10", diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-all-vulnerabilities-by-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-all-vulnerabilities-by-machines.md index f2de05191d..843f4cca7c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-all-vulnerabilities-by-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-all-vulnerabilities-by-machines.md @@ -23,6 +23,11 @@ ms.topic: article **Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + + Retrieves a list of all the vulnerabilities affecting the organization per [machine](machine.md) and [software](software.md). - If the vulnerability has a fixing KB, it will appear in the response. - Supports [OData V4 queries](https://www.odata.org/documentation/). @@ -65,7 +70,7 @@ If successful, this method returns 200 OK with the list of vulnerabilities in th Here is an example of the request. ``` -GET https://api.securitycenter.windows.com/api/vulnerabilities/machinesVulnerabilities +GET https://api.securitycenter.microsoft.com/api/vulnerabilities/machinesVulnerabilities ``` **Response** @@ -75,7 +80,7 @@ Here is an example of the response. ```json { - "@odata.context": "https://api-us.securitycenter.windows.com/api/$metadata#Collection(microsoft.windowsDefenderATP.api.PublicAssetVulnerabilityDto)", + "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Collection(microsoft.windowsDefenderATP.api.PublicAssetVulnerabilityDto)", "value": [ { "id": "5afa3afc92a7c63d4b70129e0a6f33f63a427e21-_-CVE-2020-6494-_-microsoft-_-edge_chromium-based-_-81.0.416.77-_-", diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-all-vulnerabilities.md b/windows/security/threat-protection/microsoft-defender-atp/get-all-vulnerabilities.md index 9847c928d4..138a8399ab 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-all-vulnerabilities.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-all-vulnerabilities.md @@ -23,6 +23,11 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + + [!include[Prerelease information](../../includes/prerelease.md)] Retrieves a list of all the vulnerabilities affecting the organization. @@ -61,7 +66,7 @@ If successful, this method returns 200 OK with the list of vulnerabilities in th Here is an example of the request. ``` -GET https://api.securitycenter.windows.com/api/Vulnerabilities +GET https://api.securitycenter.microsoft.com/api/Vulnerabilities ``` **Response** @@ -71,7 +76,7 @@ Here is an example of the response. ```json { - "@odata.context": "https://api-us.securitycenter.windows.com/api/$metadata#Vulnerabilities", + "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Vulnerabilities", "value": [ { "id": "CVE-2019-0608", diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-device-secure-score.md b/windows/security/threat-protection/microsoft-defender-atp/get-device-secure-score.md index e14a6859a7..15eece5384 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-device-secure-score.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-device-secure-score.md @@ -25,6 +25,11 @@ ms.topic: article - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + + Retrieves your [Microsoft Secure Score for Devices](tvm-microsoft-secure-score-devices.md). A higher Microsoft Secure Score for Devices means your endpoints are more resilient from cybersecurity threat attacks. ## Permissions @@ -63,7 +68,7 @@ If successful, this method returns 200 OK, with the device secure score data in Here is an example of the request. ``` -GET https://api.securitycenter.windows.com/api/configurationScore +GET https://api.securitycenter.microsoft.com/api/configurationScore ``` ### Response @@ -75,7 +80,7 @@ Here is an example of the response. ```json { - "@odata.context": "https://api-us.securitycenter.windows.com/api/$metadata#ConfigurationScore/$entity", + "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#ConfigurationScore/$entity", "time": "2019-12-03T09:15:58.1665846Z", "score": 340 } diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-discovered-vulnerabilities.md b/windows/security/threat-protection/microsoft-defender-atp/get-discovered-vulnerabilities.md index 5b16a71cfc..9bf4ba7a3d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-discovered-vulnerabilities.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-discovered-vulnerabilities.md @@ -24,6 +24,10 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + Retrieves a collection of discovered vulnerabilities related to a given device ID. ## Permissions @@ -62,7 +66,7 @@ If successful, this method returns 200 OK with the discovered vulnerability info Here is an example of the request. ``` -GET https://api.securitycenter.windows.com/api/machines/ac233fa6208e1579620bf44207c4006ed7cc4501/vulnerabilities +GET https://api.securitycenter.microsoft.com/api/machines/ac233fa6208e1579620bf44207c4006ed7cc4501/vulnerabilities ``` ### Response @@ -71,7 +75,7 @@ Here is an example of the response. ``` { - "@odata.context": "https://api.securitycenter.windows.com/api/$metadata#Collection(Analytics.Contracts.PublicAPI.PublicVulnerabilityDto)", + "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Collection(Analytics.Contracts.PublicAPI.PublicVulnerabilityDto)", "value": [ { "id": "CVE-2019-1348", diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts.md index 26fdbad6f4..2ef6ab2307 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts.md @@ -25,6 +25,10 @@ ms.topic: article - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ## API description Retrieves a collection of [Alerts](alerts.md) related to a given domain address. @@ -74,8 +78,6 @@ If successful and domain exists - 200 OK with list of [alert](alerts.md) entitie Here is an example of the request. -[!include[Improve request performance](../../includes/improve-request-performance.md)] - ```http -GET https://api.securitycenter.windows.com/api/domains/client.wns.windows.com/alerts +GET https://api.securitycenter.microsoft.com/api/domains/client.wns.windows.com/alerts ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines.md index 5bf5182ede..588bbbb442 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines.md @@ -25,6 +25,10 @@ ms.topic: article - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ## API description Retrieves a collection of [Machines](machine.md) that have communicated to or from a given domain address. @@ -75,9 +79,6 @@ If successful and domain exists - 200 OK with list of [machine](machine.md) enti Here is an example of the request. -[!include[Improve request performance](../../includes/improve-request-performance.md)] - - ```http -GET https://api.securitycenter.windows.com/api/domains/api.securitycenter.windows.com/machines +GET https://api.securitycenter.microsoft.com/api/domains/api.securitycenter.microsoft.com/machines ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-domain-statistics.md b/windows/security/threat-protection/microsoft-defender-atp/get-domain-statistics.md index cb49efb465..a1174ffd17 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-domain-statistics.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-domain-statistics.md @@ -25,6 +25,10 @@ ms.topic: article - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ## API description Retrieves the statistics on the given domain. @@ -71,10 +75,8 @@ If successful and domain exists - 200 OK, with statistics object in the response Here is an example of the request. -[!include[Improve request performance](../../includes/improve-request-performance.md)] - ``` -GET https://api.securitycenter.windows.com/api/domains/example.com/stats +GET https://api.securitycenter.microsoft.com/api/domains/example.com/stats ``` **Response** @@ -86,7 +88,7 @@ Here is an example of the response. HTTP/1.1 200 OK Content-type: application/json { - "@odata.context": "https://api.securitycenter.windows.com/api/$metadata#microsoft.windowsDefenderATP.api.InOrgDomainStats", + "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#microsoft.windowsDefenderATP.api.InOrgDomainStats", "host": "example.com", "orgPrevalence": "4070", "orgFirstSeen": "2017-07-30T13:23:48Z", diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-exposure-score.md b/windows/security/threat-protection/microsoft-defender-atp/get-exposure-score.md index 43d7ac20e9..2dc25a2049 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-exposure-score.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-exposure-score.md @@ -25,6 +25,11 @@ ms.topic: article - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + + [!include[Prerelease information](../../includes/prerelease.md)] Retrieves the organizational exposure score. @@ -65,7 +70,7 @@ If successful, this method returns 200 OK, with the exposure data in the respons Here is an example of the request. ``` -GET https://api.securitycenter.windows.com/api/exposureScore +GET https://api.securitycenter.microsoft.com/api/exposureScore ``` ### Response @@ -77,7 +82,7 @@ Here is an example of the response. ```json { - "@odata.context": "https://api-us.securitycenter.windows.com/api/$metadata#ExposureScore/$entity", + "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#ExposureScore/$entity", "time": "2019-12-03T07:23:53.280499Z", "score": 33.491554051195706 } diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-file-information.md b/windows/security/threat-protection/microsoft-defender-atp/get-file-information.md index 61ab343580..c69bbf38e5 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-file-information.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-file-information.md @@ -25,6 +25,10 @@ ms.topic: article - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ## API description Retrieves a [File](files.md) by identifier Sha1, or Sha256 @@ -71,10 +75,8 @@ If successful and file exists - 200 OK with the [file](files.md) entity in the b Here is an example of the request. -[!include[Improve request performance](../../includes/improve-request-performance.md)] - ``` -GET https://api.securitycenter.windows.com/api/files/4388963aaa83afe2042a46a3c017ad50bdcdafb3 +GET https://api.securitycenter.microsoft.com/api/files/4388963aaa83afe2042a46a3c017ad50bdcdafb3 ``` **Response** @@ -86,7 +88,7 @@ Here is an example of the response. HTTP/1.1 200 OK Content-type: application/json { - "@odata.context": "https://api.securitycenter.windows.com/api/$metadata#Files/$entity", + "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Files/$entity", "sha1": "4388963aaa83afe2042a46a3c017ad50bdcdafb3", "sha256": "413c58c8267d2c8648d8f6384bacc2ae9c929b2b96578b6860b5087cd1bd6462", "globalPrevalence": 180022, diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-file-related-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/get-file-related-alerts.md index d1c53228ac..e9088291e8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-file-related-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-file-related-alerts.md @@ -25,6 +25,10 @@ ms.topic: article - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ## API description Retrieves a collection of alerts related to a given file hash. @@ -74,8 +78,6 @@ If successful and file exists - 200 OK with list of [alert](alerts.md) entities Here is an example of the request. -[!include[Improve request performance](../../includes/improve-request-performance.md)] - ``` -GET https://api.securitycenter.windows.com/api/files/6532ec91d513acc05f43ee0aa3002599729fd3e1/alerts +GET https://api.securitycenter.microsoft.com/api/files/6532ec91d513acc05f43ee0aa3002599729fd3e1/alerts ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-file-related-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-file-related-machines.md index c60f272c69..99313ac5c8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-file-related-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-file-related-machines.md @@ -25,6 +25,10 @@ ms.topic: article - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ## API description Retrieves a collection of [Machines](machine.md) related to a given file hash. @@ -74,8 +78,6 @@ If successful and file exists - 200 OK with list of [machine](machine.md) entiti Here is an example of the request. -[!include[Improve request performance](../../includes/improve-request-performance.md)] - ``` -GET https://api.securitycenter.windows.com/api/files/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/machines +GET https://api.securitycenter.microsoft.com/api/files/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/machines ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-file-statistics.md b/windows/security/threat-protection/microsoft-defender-atp/get-file-statistics.md index 59f525f594..d81d9b8af3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-file-statistics.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-file-statistics.md @@ -25,6 +25,10 @@ ms.topic: article - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ## API description Retrieves the statistics for the given file. @@ -71,10 +75,8 @@ If successful and file exists - 200 OK with statistical data in the body. If fil Here is an example of the request. -[!include[Improve request performance](../../includes/improve-request-performance.md)] - ``` -GET https://api.securitycenter.windows.com/api/files/0991a395da64e1c5fbe8732ed11e6be064081d9f/stats +GET https://api.securitycenter.microsoft.com/api/files/0991a395da64e1c5fbe8732ed11e6be064081d9f/stats ``` **Response** @@ -86,7 +88,7 @@ Here is an example of the response. HTTP/1.1 200 OK Content-type: application/json { - "@odata.context": "https://api.securitycenter.windows.com/api/$metadata#microsoft.windowsDefenderATP.api.InOrgFileStats", + "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#microsoft.windowsDefenderATP.api.InOrgFileStats", "sha1": "0991a395da64e1c5fbe8732ed11e6be064081d9f", "orgPrevalence": "14850", "orgFirstSeen": "2019-12-07T13:44:16Z", diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-installed-software.md b/windows/security/threat-protection/microsoft-defender-atp/get-installed-software.md index 293d458f27..f686ea7ed2 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-installed-software.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-installed-software.md @@ -23,6 +23,10 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + [!include[Prerelease information](../../includes/prerelease.md)] Retrieves a collection of installed software related to a given device ID. @@ -61,7 +65,7 @@ If successful, this method returns 200 OK with the installed software informatio Here is an example of the request. ``` -GET https://api.securitycenter.windows.com/api/machines/ac233fa6208e1579620bf44207c4006ed7cc4501/software +GET https://api.securitycenter.microsoft.com/api/machines/ac233fa6208e1579620bf44207c4006ed7cc4501/software ``` **Response** @@ -71,7 +75,7 @@ Here is an example of the response. ``` { -"@odata.context": "https://api.securitycenter.windows.com/api/$metadata#Software", +"@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Software", "value": [ { "id": "microsoft-_-internet_explorer", diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-investigation-collection.md b/windows/security/threat-protection/microsoft-defender-atp/get-investigation-collection.md index 296f7c81ce..b58d1ddd9e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-investigation-collection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-investigation-collection.md @@ -25,6 +25,10 @@ ms.topic: article - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ## API description Retrieves a collection of [Investigations](investigation.md). @@ -54,7 +58,7 @@ Delegated (work or school account) | Alert.ReadWrite | 'Read and write alerts' ## HTTP request ``` -GET https://api.securitycenter.windows.com/api/investigations +GET https://api.securitycenter.microsoft.com/api/investigations ``` ## Request headers @@ -71,30 +75,25 @@ Empty If successful, this method returns 200, Ok response code with a collection of [Investigations](investigation.md) entities. -[!include[Improve request performance](../../includes/improve-request-performance.md)] - - ## Example **Request** Here is an example of a request to get all investigations: - ``` -GET https://api.securitycenter.windows.com/api/investigations +GET https://api.securitycenter.microsoft.com/api/investigations ``` **Response** Here is an example of the response: - ``` HTTP/1.1 200 Ok Content-type: application/json { - "@odata.context": "https://api.securitycenter.windows.com/api/$metadata#Investigations", + "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Investigations", "value": [ { "id": "63017", diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-investigation-object.md b/windows/security/threat-protection/microsoft-defender-atp/get-investigation-object.md index 6953ccabba..866f046908 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-investigation-object.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-investigation-object.md @@ -25,6 +25,11 @@ ms.topic: article - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + + ## API description Retrieves specific [Investigation](investigation.md) by its ID.
ID can be the investigation ID or the investigation triggering alert ID. @@ -50,7 +55,7 @@ Delegated (work or school account) | Alert.ReadWrite | 'Read and write alerts' ## HTTP request ``` -GET https://api.securitycenter.windows.com/api/investigations/{id} +GET https://api.securitycenter.microsoft.com/api/investigations/{id} ``` ## Request headers diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts.md index 6d078cbf15..184d6eb709 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts.md @@ -25,6 +25,10 @@ ms.topic: article - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ## API description Retrieves a collection of alerts related to a given IP address. @@ -74,9 +78,6 @@ If successful and IP exists - 200 OK with list of [alert](alerts.md) entities in Here is an example of the request. -[!include[Improve request performance](../../includes/improve-request-performance.md)] - - ``` -GET https://api.securitycenter.windows.com/api/ips/10.209.67.177/alerts +GET https://api.securitycenter.microsoft.com/api/ips/10.209.67.177/alerts ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-ip-statistics.md b/windows/security/threat-protection/microsoft-defender-atp/get-ip-statistics.md index b58fd359e9..839b32dbf4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-ip-statistics.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-ip-statistics.md @@ -25,6 +25,10 @@ ms.topic: article - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ## API description Retrieves the statistics for the given IP. @@ -71,10 +75,8 @@ If successful and ip exists - 200 OK with statistical data in the body. IP do no Here is an example of the request. -[!include[Improve request performance](../../includes/improve-request-performance.md)] - ``` -GET https://api.securitycenter.windows.com/api/ips/10.209.67.177/stats +GET https://api.securitycenter.microsoft.com/api/ips/10.209.67.177/stats ``` **Response** @@ -86,7 +88,7 @@ Here is an example of the response. HTTP/1.1 200 OK Content-type: application/json { - "@odata.context": "https://api.securitycenter.windows.com/api/$metadata#microsoft.windowsDefenderATP.api.InOrgIPStats", + "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#microsoft.windowsDefenderATP.api.InOrgIPStats", "ipAddress": "10.209.67.177", "orgPrevalence": "63515", "orgFirstSeen": "2017-07-30T13:36:06Z", diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id.md b/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id.md index 30fd9d4263..331dca7bc1 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id.md @@ -25,6 +25,10 @@ ms.topic: article - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ## API description Retrieves specific [Machine](machine.md) by its device ID or computer name. @@ -77,10 +81,8 @@ If machine with the specified ID was not found - 404 Not Found. Here is an example of the request. -[!include[Improve request performance](../../includes/improve-request-performance.md)] - ```http -GET https://api.securitycenter.windows.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07 +GET https://api.securitycenter.microsoft.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07 ``` **Response** @@ -92,7 +94,7 @@ Here is an example of the response. HTTP/1.1 200 OK Content-type: application/json { - "@odata.context": "https://api.securitycenter.windows.com/api/$metadata#Machine", + "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Machine", "id": "1e5bc9d7e413ddd7902c2932e418702b84d0cc07", "computerDnsName": "mymachine1.contoso.com", "firstSeen": "2018-08-02T14:55:03.7791856Z", diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machine-group-exposure-score.md b/windows/security/threat-protection/microsoft-defender-atp/get-machine-group-exposure-score.md index 112ed575be..437599c09a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machine-group-exposure-score.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machine-group-exposure-score.md @@ -25,6 +25,11 @@ ms.topic: article - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + + [!include[Prerelease information](../../includes/prerelease.md)] Retrieves a collection of alerts related to a given domain address. @@ -65,7 +70,7 @@ If successful, this method returns 200 OK, with a list of exposure score per dev Here is an example of the request. ``` -GET https://api.securitycenter.windows.com/api/exposureScore/ByMachineGroups +GET https://api.securitycenter.microsoft.com/api/exposureScore/ByMachineGroups ``` ### Response @@ -75,7 +80,7 @@ Here is an example of the response. ```json { - "@odata.context": "https://api-us.securitycenter.windows.com/api/$metadata#ExposureScore", + "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#ExposureScore", "value": [ { "time": "2019-12-03T09:51:28.214338Z", diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users.md b/windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users.md index 55bdffa21c..42ceb10f0e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users.md @@ -25,6 +25,10 @@ ms.topic: article - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ## API description Retrieves a collection of logged on users on a specific device. @@ -73,10 +77,8 @@ If successful and device exists - 200 OK with list of [user](user.md) entities i Here is an example of the request. -[!include[Improve request performance](../../includes/improve-request-performance.md)] - ```http -GET https://api.securitycenter.windows.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/logonusers +GET https://api.securitycenter.microsoft.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/logonusers ``` **Response** @@ -88,7 +90,7 @@ Here is an example of the response. HTTP/1.1 200 OK Content-type: application/json { - "@odata.context": "https://api.securitycenter.windows.com/api/$metadata#Users", + "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Users", "value": [ { "id": "contoso\\user1", diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts.md index 49e6162ab5..73d13b3564 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts.md @@ -25,6 +25,10 @@ ms.topic: article - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ## API description Retrieves all [Alerts](alerts.md) related to a specific device. diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machineaction-object.md b/windows/security/threat-protection/microsoft-defender-atp/get-machineaction-object.md index dc294c9002..cca2d17971 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machineaction-object.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machineaction-object.md @@ -25,6 +25,10 @@ ms.topic: article - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ## API description Retrieves specific [Machine Action](machineaction.md) by its ID. @@ -50,7 +54,7 @@ Delegated (work or school account) | Machine.ReadWrite | 'Read and write machine ## HTTP request ``` -GET https://api.securitycenter.windows.com/api/machineactions/{id} +GET https://api.securitycenter.microsoft.com/api/machineactions/{id} ``` ## Request headers @@ -72,10 +76,8 @@ If successful, this method returns 200, Ok response code with a [Machine Action] Here is an example of the request. -[!include[Improve request performance](../../includes/improve-request-performance.md)] - ``` -GET https://api.securitycenter.windows.com/api/machineactions/2e9da30d-27f6-4208-81f2-9cd3d67893ba +GET https://api.securitycenter.microsoft.com/api/machineactions/2e9da30d-27f6-4208-81f2-9cd3d67893ba ``` **Response** @@ -87,7 +89,7 @@ Here is an example of the response. HTTP/1.1 200 Ok Content-type: application/json { - "@odata.context": "https://api.securitycenter.windows.com/api/$metadata#MachineActions/$entity", + "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#MachineActions/$entity", "id": "5382f7ea-7557-4ab7-9782-d50480024a4e", "type": "Isolate", "scope": "Selective", diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machineactions-collection.md b/windows/security/threat-protection/microsoft-defender-atp/get-machineactions-collection.md index 026a5fe161..4828b5ec67 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machineactions-collection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machineactions-collection.md @@ -25,6 +25,10 @@ ms.topic: article - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ## API description Retrieves a collection of [Machine Actions](machineaction.md). @@ -54,7 +58,7 @@ Delegated (work or school account) | Machine.ReadWrite | 'Read and write machine ## HTTP request ``` -GET https://api.securitycenter.windows.com/api/machineactions +GET https://api.securitycenter.microsoft.com/api/machineactions ``` ## Request headers @@ -77,10 +81,8 @@ If successful, this method returns 200, Ok response code with a collection of [m Here is an example of the request on an organization that has three MachineActions. -[!include[Improve request performance](../../includes/improve-request-performance.md)] - ``` -GET https://api.securitycenter.windows.com/api/machineactions +GET https://api.securitycenter.microsoft.com/api/machineactions ``` **Response** @@ -92,7 +94,7 @@ Here is an example of the response. HTTP/1.1 200 Ok Content-type: application/json { - "@odata.context": "https://api.securitycenter.windows.com/api/$metadata#MachineActions", + "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#MachineActions", "value": [ { "id": "69dc3630-1ccc-4342-acf3-35286eec741d", @@ -147,20 +149,18 @@ Content-type: application/json Here is an example of a request that filters the MachineActions by machine ID and shows the latest two MachineActions. ``` -GET https://api.securitycenter.windows.com/api/machineactions?$filter=machineId eq 'f46b9bb259ed4a7fb9981b73510e3cc7aa81ec1f'&$top=2 +GET https://api.securitycenter.microsoft.com/api/machineactions?$filter=machineId eq 'f46b9bb259ed4a7fb9981b73510e3cc7aa81ec1f'&$top=2 ``` **Response** Here is an example of the response. -[!include[Improve request performance](../../includes/improve-request-performance.md)] - ``` HTTP/1.1 200 Ok Content-type: application/json { - "@odata.context": "https://api.securitycenter.windows.com/api/$metadata#MachineActions", + "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#MachineActions", "value": [ { "id": "69dc3630-1ccc-4342-acf3-35286eec741d", diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machinegroups-collection.md b/windows/security/threat-protection/microsoft-defender-atp/get-machinegroups-collection.md index 93f27a6093..f4c7216ceb 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machinegroups-collection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machinegroups-collection.md @@ -24,9 +24,13 @@ ms.date: 10/07/2018 **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + + Retrieves a collection of RBAC device groups. ## Permissions diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machines-by-software.md b/windows/security/threat-protection/microsoft-defender-atp/get-machines-by-software.md index 7490907216..042f48719b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machines-by-software.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machines-by-software.md @@ -25,6 +25,11 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + + [!include[Prerelease information](../../includes/prerelease.md)] Retrieve a list of device references that has this software installed. @@ -62,7 +67,7 @@ If successful, this method returns 200 OK and a list of devices with the softwar Here is an example of the request. ``` -GET https://api.securitycenter.windows.com/api/Software/microsoft-_-edge/machineReferences +GET https://api.securitycenter.microsoft.com/api/Software/microsoft-_-edge/machineReferences ``` **Response** @@ -72,7 +77,7 @@ Here is an example of the response. ```json { - "@odata.context": "https://api-us.securitycenter.windows.com/api/$metadata#MachineReferences", + "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#MachineReferences", "value": [ { "id": "7c7e1896fa39efb0a32a2cf421d837af1b9bf762", diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machines-by-vulnerability.md b/windows/security/threat-protection/microsoft-defender-atp/get-machines-by-vulnerability.md index bbd94f8b8d..eb8b9da158 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machines-by-vulnerability.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machines-by-vulnerability.md @@ -24,6 +24,11 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + + [!include[Prerelease information](../../includes/prerelease.md)] Retrieves a list of devices affected by a vulnerability. @@ -62,7 +67,7 @@ If successful, this method returns 200 OK with the vulnerability information in Here is an example of the request. ``` -GET https://api.securitycenter.windows.com/api/vulnerabilities/CVE-2019-0608/machineReferences +GET https://api.securitycenter.microsoft.com/api/vulnerabilities/CVE-2019-0608/machineReferences ``` **Response** @@ -72,7 +77,7 @@ Here is an example of the response. ```json { - "@odata.context": "https://api.securitycenter.windows.com/api/$metadata#MachineReferences", + "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#MachineReferences", "value": [ { "id": "235a2e6278c63fcf85bab9c370396972c58843de", diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-machines.md index aef7e2789a..725fa8e4b2 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machines.md @@ -25,6 +25,10 @@ ms.topic: article - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ## API description Retrieves a collection of [Machines](machine.md) that have communicated with Microsoft Defender for Endpoint cloud. @@ -56,7 +60,7 @@ Delegated (work or school account) | Machine.ReadWrite | 'Read and write machine ## HTTP request ```http -GET https://api.securitycenter.windows.com/api/machines +GET https://api.securitycenter.microsoft.com/api/machines ``` ## Request headers @@ -79,11 +83,8 @@ If successful and machines exists - 200 OK with list of [machine](machine.md) en Here is an example of the request. -[!include[Improve request performance](../../includes/improve-request-performance.md)] - - ```http -GET https://api.securitycenter.windows.com/api/machines +GET https://api.securitycenter.microsoft.com/api/machines ``` **Response** @@ -94,7 +95,7 @@ Here is an example of the response. HTTP/1.1 200 OK Content-type: application/json { - "@odata.context": "https://api.securitycenter.windows.com/api/$metadata#Machines", + "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Machines", "value": [ { "id": "1e5bc9d7e413ddd7902c2932e418702b84d0cc07", diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-missing-kbs-machine.md b/windows/security/threat-protection/microsoft-defender-atp/get-missing-kbs-machine.md index 52846f5bdf..089381bade 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-missing-kbs-machine.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-missing-kbs-machine.md @@ -25,6 +25,10 @@ ms.topic: article - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + Retrieves missing KBs (security updates) by device ID ## HTTP request @@ -54,7 +58,7 @@ If successful, this method returns 200 OK, with the specified device missing kb Here is an example of the request. ``` -GET https://api.securitycenter.windows.com/api/machines/2339ad14a01bd0299afb93dfa2550136057bff96/getmissingkbs +GET https://api.securitycenter.microsoft.com/api/machines/2339ad14a01bd0299afb93dfa2550136057bff96/getmissingkbs ``` ### Response diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-missing-kbs-software.md b/windows/security/threat-protection/microsoft-defender-atp/get-missing-kbs-software.md index 21506f3767..b9b44afb2d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-missing-kbs-software.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-missing-kbs-software.md @@ -25,6 +25,11 @@ ms.topic: article - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + + Retrieves missing KBs (security updates) by software ID ## Permissions @@ -63,7 +68,7 @@ If successful, this method returns 200 OK, with the specified software missing k Here is an example of the request. ``` -GET https://api.securitycenter.windows.com/api/Software/microsoft-_-edge/getmissingkbs +GET https://api.securitycenter.microsoft.com/api/Software/microsoft-_-edge/getmissingkbs ``` ### Response diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-package-sas-uri.md b/windows/security/threat-protection/microsoft-defender-atp/get-package-sas-uri.md index ffd04c4f62..17ac22ae88 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-package-sas-uri.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-package-sas-uri.md @@ -25,6 +25,10 @@ ms.topic: article - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ## API description Get a URI that allows downloading of an [Investigation package](collect-investigation-package.md). @@ -45,7 +49,7 @@ Delegated (work or school account) | Machine.CollectForensics | 'Collect forensi ## HTTP request ``` -GET https://api.securitycenter.windows.com/api/machineactions/{machine action id}/getPackageUri +GET https://api.securitycenter.microsoft.com/api/machineactions/{machine action id}/getPackageUri ``` ## Request headers @@ -69,7 +73,7 @@ If successful, this method returns 200, Ok response code with object that holds Here is an example of the request. ``` -GET https://api.securitycenter.windows.com/api/machineactions/7327b54fd718525cbca07dacde913b5ac3c85673/GetPackageUri +GET https://api.securitycenter.microsoft.com/api/machineactions/7327b54fd718525cbca07dacde913b5ac3c85673/GetPackageUri ``` @@ -77,15 +81,12 @@ GET https://api.securitycenter.windows.com/api/machineactions/7327b54fd718525cbc Here is an example of the response. -[!include[Improve request performance](../../includes/improve-request-performance.md)] - - ``` HTTP/1.1 200 Ok Content-type: application/json { - "@odata.context": "https://api.securitycenter.windows.com/api/$metadata#Edm.String", + "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Edm.String", "value": "\"https://userrequests-us.securitycenter.windows.com:443/safedownload/WDATP_Investigation_Package.zip?token=gbDyj7y%2fbWGAZjn2sFiZXlliBTXOCVG7yiJ6mXNaQ9pLByC2Wxeno9mENsPFP3xMk5l%2bZiJXjLvqAyNEzUNROxoM2I1er9dxzfVeBsxSmclJjPsAx%2btiNyxSz1Ax%2b5jaT5cL5bZg%2b8wgbwY9urXbTpGjAKh6FB1e%2b0ypcWkPm8UkfOwsmtC%2biZJ2%2bPqnkkeQk7SKMNoAvmh9%2fcqDIPKXGIBjMa0D9auzypOqd8bQXp7p2BnLSH136BxST8n9IHR4PILvRjAYW9kvtHkBpBitfydAsUW4g2oDZSPN3kCLBOoo1C4w4Lkc9Bc3GNU2IW6dfB7SHcp7G9p4BDkeJl3VuDs6esCaeBorpn9FKJ%2fXo7o9pdcI0hUPZ6Ds9hiPpwPUtz5J29CBE3QAopCK%2fsWlf6OW2WyXsrNRSnF1tVE5H3wXpREzuhD7S4AIA3OIEZKzC4jIPLeMu%2bazZU9xGwuc3gICOaokbwMJiZTqcUuK%2fV9YdBdjdg8wJ16NDU96Pl6%2fgew2KYuk6Wo7ZuHotgHI1abcsvdlpe4AvixDbqcRJthsg2PpLRaFLm5av44UGkeK6TJpFvxUn%2f9fg6Zk5yM1KUTHb8XGmutoCM8U9er6AzXZlY0gGc3D3bQOg41EJZkEZLyUEbk1hXJB36ku2%2bW01cG71t7MxMBYz7%2bdXobxpdo%3d%3bRWS%2bCeoDfTyDcfH5pkCg6hYDmCOPr%2fHYQuaUWUBNVnXURYkdyOzVHqp%2fe%2f1BNyPdVoVkpQHpz1pPS3b5g9h7IMmNKCk5gFq5m2nPx6kk9EYtzx8Ndoa2m9Yj%2bSaf8zIFke86YnfQL4AYewsnQNJJh4wc%2bXxGlBq7axDcoiOdX91rKzVicH3GSBkFoLFAKoegWWsF%2fEDZcVpF%2fXUA1K8HvB6dwyfy4y0sAqnNPxYTQ97mG7yHhxPt4Pe9YF2UPPAJVuEf8LNlQ%2bWHC9%2f7msF6UUI4%2fca%2ftpjFs%2fSNeRE8%2fyQj21TI8YTF1SowvaJuDc1ivEoeopNNGG%2bGI%2fX0SckaVxU9Hdkh0zbydSlT5SZwbSwescs0IpzECitBbaLUz4aT8KTs8T0lvx8D7Te3wVsKAJ1r3iFMQZrlk%2bS1WW8rvac7oHRx2HKURn1v7fDIQWgJr9aNsNlFz4fLJ50T2qSHuuepkLVbe93Va072aMGhvr09WVKoTpAf1j2bcFZZU6Za5PxI32mr0k90FgiYFJ1F%2f1vRDrGwvWVWUkR3Z33m4g0gHa52W1FMxQY0TJIwbovD6FaSNDx7xhKZSd5IJ7r6P91Gez49PaZRcAZPjd%2bfbul3JNm1VqQPTLohT7wa0ymRiXpSST74xtFzuEBzNSNATdbngj3%2fwV4JesTjZjIj5Dc%3d%3blumqauVlFuuO8MQffZgs0tLJ4Fq6fpeozPTdDf8Ll6XLegi079%2b4mSPFjTK0y6eohstxdoOdom2wAHiZwk0u4KLKmRkfYOdT1wHY79qKoBQ3ZDHFTys9V%2fcwKGl%2bl8IenWDutHygn5IcA1y7GTZj4g%3d%3d\"" } diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-by-id.md b/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-by-id.md index 79fcaae0ff..857d3458e0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-by-id.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-by-id.md @@ -20,7 +20,13 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) + +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + [!include[Prerelease information](../../includes/prerelease.md)] @@ -60,7 +66,7 @@ If successful, this method returns 200 OK with the security recommendations in t Here is an example of the request. ``` -GET https://api.securitycenter.windows.com/api/recommendations/va-_-google-_-chrome +GET https://api.securitycenter.microsoft.com/api/recommendations/va-_-google-_-chrome ``` **Response** @@ -69,7 +75,7 @@ Here is an example of the response. ```json { - "@odata.context": "https://api.securitycenter.windows.com/api/$metadata#Recommendations/$entity", + "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Recommendations/$entity", "id": "va-_-google-_-chrome", "productName": "chrome", "recommendationName": "Update Chrome", diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-machines.md index 079ab2c449..9322ad8635 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-machines.md @@ -21,9 +21,13 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + + [!include[Prerelease information](../../includes/prerelease.md)] Retrieves a list of devices associated with the security recommendation. @@ -62,7 +66,7 @@ If successful, this method returns 200 OK with the list of devices associated wi Here is an example of the request. ``` -GET https://api.securitycenter.windows.com/api/recommendations/va-_-google-_-chrome/machineReferences +GET https://api.securitycenter.microsoft.com/api/recommendations/va-_-google-_-chrome/machineReferences ``` **Response** @@ -71,7 +75,7 @@ Here is an example of the response. ```json { - "@odata.context": "https://api.securitycenter.windows.com/api/$metadata#MachineReferences", + "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#MachineReferences", "value": [ { "id": "e058770379bc199a9c179ce52a23e16fd44fd2ee", diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-software.md b/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-software.md index 0656c420e8..d0c62de5ce 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-software.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-software.md @@ -21,9 +21,13 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + + [!include[Prerelease information](../../includes/prerelease.md)] Retrieves a security recommendation related to a specific software. @@ -62,7 +66,7 @@ If successful, this method returns 200 OK with the software associated with the Here is an example of the request. ``` -GET https://api.securitycenter.windows.com/api/recommendations/va-_-google-_-chrome/software +GET https://api.securitycenter.microsoft.com/api/recommendations/va-_-google-_-chrome/software ``` **Response** @@ -71,7 +75,7 @@ Here is an example of the response. ```json { - "@odata.context": "https://api.securitycenter.windows.com/api/$metadata#Analytics.Contracts.PublicAPI.PublicProductDto", + "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Analytics.Contracts.PublicAPI.PublicProductDto", "id": "google-_-chrome", "name": "chrome", "vendor": "google", diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-vulnerabilities.md b/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-vulnerabilities.md index 95b525bf6b..07d26afe6f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-vulnerabilities.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-vulnerabilities.md @@ -21,9 +21,13 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + + [!include[Prerelease information](../../includes/prerelease.md)] Retrieves a list of vulnerabilities associated with the security recommendation. @@ -62,7 +66,7 @@ If successful, this method returns 200 OK, with the list of vulnerabilities asso Here is an example of the request. ``` -GET https://api.securitycenter.windows.com/api/recommendations/va-_-google-_-chrome/vulnerabilities +GET https://api.securitycenter.microsoft.com/api/recommendations/va-_-google-_-chrome/vulnerabilities ``` **Response** @@ -71,7 +75,7 @@ Here is an example of the response. ```json { - "@odata.context": "https://api.securitycenter.windows.com/api/$metadata#Collection(Analytics.Contracts.PublicAPI.PublicVulnerabilityDto)", + "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Collection(Analytics.Contracts.PublicAPI.PublicVulnerabilityDto)", "value": [ { "id": "CVE-2019-13748", diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-security-recommendations.md b/windows/security/threat-protection/microsoft-defender-atp/get-security-recommendations.md index 91a19e9c18..a6e9564b8b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-security-recommendations.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-security-recommendations.md @@ -24,6 +24,10 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + [!include[Prerelease information](../../includes/prerelease.md)] Retrieves a collection of security recommendations related to a given device ID. @@ -62,7 +66,7 @@ If successful, this method returns 200 OK with the security recommendations in t Here is an example of the request. ``` -GET https://api.securitycenter.windows.com/api/machines/ac233fa6208e1579620bf44207c4006ed7cc4501/recommendations +GET https://api.securitycenter.microsoft.com/api/machines/ac233fa6208e1579620bf44207c4006ed7cc4501/recommendations ``` **Response** @@ -72,7 +76,7 @@ Here is an example of the response. ``` { - "@odata.context": "https://api.securitycenter.windows.com/api/$metadata#Recommendations", + "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Recommendations", "value": [ { "id": "va-_-git-scm-_-git", diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-software-by-id.md b/windows/security/threat-protection/microsoft-defender-atp/get-software-by-id.md index 07550126c1..e5246656fb 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-software-by-id.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-software-by-id.md @@ -25,6 +25,11 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + + [!include[Prerelease information](../../includes/prerelease.md)] Retrieves software details by ID. @@ -62,7 +67,7 @@ If successful, this method returns 200 OK with the specified software data in th Here is an example of the request. ``` -GET https://api.securitycenter.windows.com/api/Software/microsoft-_-edge +GET https://api.securitycenter.microsoft.com/api/Software/microsoft-_-edge ``` **Response** @@ -72,7 +77,7 @@ Here is an example of the response. ```json { - "@odata.context": "https://api.securitycenter.windows.com/api/$metadata#Software/$entity", + "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Software/$entity", "id": "microsoft-_-edge", "name": "edge", "vendor": "microsoft", diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-software-ver-distribution.md b/windows/security/threat-protection/microsoft-defender-atp/get-software-ver-distribution.md index 7ae8324de9..68faccd755 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-software-ver-distribution.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-software-ver-distribution.md @@ -25,6 +25,11 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + + [!include[Prerelease information](../../includes/prerelease.md)] Retrieves a list of your organization's software version distribution. @@ -62,7 +67,7 @@ If successful, this method returns 200 OK with a list of software distributions Here is an example of the request. ``` -GET https://api.securitycenter.windows.com/api/Software/microsoft-_-edge/distributions +GET https://api.securitycenter.microsoft.com/api/Software/microsoft-_-edge/distributions ``` **Response** @@ -72,7 +77,7 @@ Here is an example of the response. ```json { - "@odata.context": "https://api-us.securitycenter.windows.com/api/$metadata#Distributions", + "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Distributions", "value": [ { "version": "11.0.17134.1039", diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-software.md b/windows/security/threat-protection/microsoft-defender-atp/get-software.md index 6a02de62a0..e6eba350a0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-software.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-software.md @@ -25,6 +25,11 @@ ms.topic: article - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + + Retrieves the organization software inventory. ## Permissions @@ -61,7 +66,7 @@ If successful, this method returns 200 OK with the software inventory in the bod Here is an example of the request. ``` -GET https://api.securitycenter.windows.com/api/Software +GET https://api.securitycenter.microsoft.com/api/Software ``` **Response** @@ -71,7 +76,7 @@ Here is an example of the response. ```json { - "@odata.context": "https://api-us.securitycenter.windows.com/api/$metadata#Software", + "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Software", "value": [ { "id": "microsoft-_-edge", diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-ti-indicators-collection.md b/windows/security/threat-protection/microsoft-defender-atp/get-ti-indicators-collection.md index ea42bf22ac..5cd725bebe 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-ti-indicators-collection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-ti-indicators-collection.md @@ -25,6 +25,10 @@ ms.topic: article - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ## API description Retrieves a collection of all active [Indicators](ti-indicator.md). @@ -48,11 +52,9 @@ Delegated (work or school account) | Ti.ReadWrite | 'Read and write Indicators' ## HTTP request ``` -GET https://api.securitycenter.windows.com/api/indicators +GET https://api.securitycenter.microsoft.com/api/indicators ``` -[!include[Improve request performance](../../includes/improve-request-performance.md)] - ## Request headers Name | Type | Description @@ -76,7 +78,7 @@ If successful, this method returns 200, Ok response code with a collection of [I Here is an example of a request that gets all Indicators ``` -GET https://api.securitycenter.windows.com/api/indicators +GET https://api.securitycenter.microsoft.com/api/indicators ``` **Response** @@ -87,7 +89,7 @@ Here is an example of the response. HTTP/1.1 200 Ok Content-type: application/json { - "@odata.context": "https://api.securitycenter.windows.com/api/$metadata#Indicators", + "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Indicators", "value": [ { "id": "995", @@ -139,7 +141,7 @@ Content-type: application/json Here is an example of a request that gets all Indicators with 'AlertAndBlock' action ``` -GET https://api.securitycenter.windows.com/api/indicators?$filter=action+eq+'AlertAndBlock' +GET https://api.securitycenter.microsoft.com/api/indicators?$filter=action+eq+'AlertAndBlock' ``` **Response** @@ -150,7 +152,7 @@ Here is an example of the response. HTTP/1.1 200 Ok Content-type: application/json { - "@odata.context": "https://api.securitycenter.windows.com/api/$metadata#Indicators", + "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Indicators", "value": [ { "id": "997", diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-user-information.md b/windows/security/threat-protection/microsoft-defender-atp/get-user-information.md index bc5b69d9cd..184e70576e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-user-information.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-user-information.md @@ -23,6 +23,10 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + Retrieve a User entity by key (user name). @@ -58,10 +62,8 @@ If successful and user exists - 200 OK with [user](user.md) entity in the body. Here is an example of the request. -[!include[Improve request performance](../../includes/improve-request-performance.md)] - ``` -GET https://api.securitycenter.windows.com/api/users/user1 +GET https://api.securitycenter.microsoft.com/api/users/user1 Content-type: application/json ``` @@ -74,7 +76,7 @@ Here is an example of the response. HTTP/1.1 200 OK Content-type: application/json { - "@odata.context": "https://api.securitycenter.windows.com/api/$metadata#Users/$entity", + "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Users/$entity", "id": "user1", "firstSeen": "2018-08-02T00:00:00Z", "lastSeen": "2018-08-04T00:00:00Z", diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-user-related-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/get-user-related-alerts.md index b6282b18f3..3126731b11 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-user-related-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-user-related-alerts.md @@ -25,6 +25,10 @@ ms.topic: article - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ## API description Retrieves a collection of alerts related to a given user ID. @@ -76,8 +80,6 @@ If successful and user exists - 200 OK. If the user does not exist - 404 Not Fou Here is an example of the request. -[!include[Improve request performance](../../includes/improve-request-performance.md)] - ``` -GET https://api.securitycenter.windows.com/api/users/user1/alerts +GET https://api.securitycenter.microsoft.com/api/users/user1/alerts ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines.md index 33fbf7f79a..8956cf7608 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines.md @@ -25,6 +25,10 @@ ms.topic: article - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ## API description Retrieves a collection of devices related to a given user ID. @@ -77,8 +81,6 @@ If successful and user exists - 200 OK with list of [machine](machine.md) entiti Here is an example of the request. -[!include[Improve request performance](../../includes/improve-request-performance.md)] - ``` -GET https://api.securitycenter.windows.com/api/users/user1/machines +GET https://api.securitycenter.microsoft.com/api/users/user1/machines ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-vuln-by-software.md b/windows/security/threat-protection/microsoft-defender-atp/get-vuln-by-software.md index ac266cf40f..281e8cdb0b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-vuln-by-software.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-vuln-by-software.md @@ -25,6 +25,11 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + + [!include[Prerelease information](../../includes/prerelease.md)] Retrieve a list of vulnerabilities in the installed software. @@ -62,7 +67,7 @@ If successful, this method returns 200 OK with a a list of vulnerabilities expos Here is an example of the request. ``` -GET https://api.securitycenter.windows.com/api/Software/microsoft-_-edge/vulnerabilities +GET https://api.securitycenter.microsoft.com/api/Software/microsoft-_-edge/vulnerabilities ``` **Response** @@ -72,7 +77,7 @@ Here is an example of the response. ```json { - "@odata.context": "https://api-us.securitycenter.windows.com/api/$metadata#Collection(Analytics.Contracts.PublicAPI.PublicVulnerabilityDto)", + "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Collection(Analytics.Contracts.PublicAPI.PublicVulnerabilityDto)", "value": [ { "id": "CVE-2017-0140", diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-vulnerability-by-id.md b/windows/security/threat-protection/microsoft-defender-atp/get-vulnerability-by-id.md index 3e66207db5..5fb7863435 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-vulnerability-by-id.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-vulnerability-by-id.md @@ -23,6 +23,11 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + + [!include[Prerelease information](../../includes/prerelease.md)] Retrieves vulnerability information by its ID. @@ -61,7 +66,7 @@ If successful, this method returns 200 OK with the vulnerability information in Here is an example of the request. ``` -GET https://api.securitycenter.windows.com/api/Vulnerabilities/CVE-2019-0608 +GET https://api.securitycenter.microsoft.com/api/Vulnerabilities/CVE-2019-0608 ``` **Response** @@ -70,7 +75,7 @@ Here is an example of the response. ```json { - "@odata.context": "https://api-us.securitycenter.windows.com/api/$metadata#Vulnerabilities/$entity", + "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Vulnerabilities/$entity", "id": "CVE-2019-0608", "name": "CVE-2019-0608", "description": "A spoofing vulnerability exists when Microsoft Browsers does not properly parse HTTP content. An attacker who successfully exploited this vulnerability could impersonate a user request by crafting HTTP queries. The specially crafted website could either spoof content or serve as a pivot to chain an attack with other vulnerabilities in web services.To exploit the vulnerability, the user must click a specially crafted URL. In an email attack scenario, an attacker could send an email message containing the specially crafted URL to the user in an attempt to convince the user to click it.In a web-based attack scenario, an attacker could host a specially crafted website designed to appear as a legitimate website to the user. However, the attacker would have no way to force the user to visit the specially crafted website. The attacker would have to convince the user to visit the specially crafted website, typically by way of enticement in an email or instant message, and then convince the user to interact with content on the website.The update addresses the vulnerability by correcting how Microsoft Browsers parses HTTP responses.", diff --git a/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation.md b/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation.md index 683be6e6bf..84ab44bf10 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation.md @@ -25,6 +25,10 @@ ms.topic: article - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ## API description Start automated investigation on a device. @@ -79,8 +83,6 @@ If successful, this method returns 201 - Created response code and [Investigatio Here is an example of the request. -[!include[Improve request performance](../../includes/improve-request-performance.md)] - ``` POST https://api.securitycenter.microsoft.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/startInvestigation Content-type: application/json diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigation.md b/windows/security/threat-protection/microsoft-defender-atp/investigation.md index 9a079ca9cb..98d5f63bef 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigation.md @@ -27,6 +27,11 @@ ms.topic: article - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + + Represent an Automated Investigation entity in Defender for Endpoint.
See [Overview of automated investigations](automated-investigations.md) for more information. diff --git a/windows/security/threat-protection/microsoft-defender-atp/isolate-machine.md b/windows/security/threat-protection/microsoft-defender-atp/isolate-machine.md index 98cfaa0d40..e52dcfca9e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/isolate-machine.md +++ b/windows/security/threat-protection/microsoft-defender-atp/isolate-machine.md @@ -25,6 +25,10 @@ ms.topic: article - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ## API description Isolates a device from accessing external network. @@ -52,7 +56,7 @@ Delegated (work or school account) | Machine.Isolate | 'Isolate machine' ## HTTP request ``` -POST https://api.securitycenter.windows.com/api/machines/{id}/isolate +POST https://api.securitycenter.microsoft.com/api/machines/{id}/isolate ``` ## Request headers @@ -85,10 +89,8 @@ If successful, this method returns 201 - Created response code and [Machine Acti Here is an example of the request. -[!include[Improve request performance](../../includes/improve-request-performance.md)] - ```console -POST https://api.securitycenter.windows.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/isolate +POST https://api.securitycenter.microsoft.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/isolate Content-type: application/json { "Comment": "Isolate machine due to alert 1234", diff --git a/windows/security/threat-protection/microsoft-defender-atp/machine.md b/windows/security/threat-protection/microsoft-defender-atp/machine.md index 817ecce65b..ab02cb5c21 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/machine.md +++ b/windows/security/threat-protection/microsoft-defender-atp/machine.md @@ -25,6 +25,10 @@ ms.topic: article - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + [!include[Prerelease information](../../includes/prerelease.md)] ## Methods diff --git a/windows/security/threat-protection/microsoft-defender-atp/machineaction.md b/windows/security/threat-protection/microsoft-defender-atp/machineaction.md index 94f6a0a86b..4f6e60ca31 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/machineaction.md +++ b/windows/security/threat-protection/microsoft-defender-atp/machineaction.md @@ -25,6 +25,11 @@ ms.topic: article - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + + - For more information, see [Response Actions](respond-machine-alerts.md). | Method | Return Type | Description | diff --git a/windows/security/threat-protection/microsoft-defender-atp/offboard-machine-api.md b/windows/security/threat-protection/microsoft-defender-atp/offboard-machine-api.md index 8cc6f7bed9..9dddb35e92 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/offboard-machine-api.md +++ b/windows/security/threat-protection/microsoft-defender-atp/offboard-machine-api.md @@ -25,6 +25,10 @@ ms.topic: article - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ## API description Offboard device from Defender for Endpoint. @@ -55,7 +59,7 @@ Delegated (work or school account) | Machine.Offboard | 'Offboard machine' ## HTTP request ``` -POST https://api.securitycenter.windows.com/api/machines/{id}/offboard +POST https://api.securitycenter.microsoft.com/api/machines/{id}/offboard ``` ## Request headers @@ -82,10 +86,8 @@ If successful, this method returns 201 - Created response code and [Machine Acti Here is an example of the request. -[!include[Improve request performance](../../includes/improve-request-performance.md)] - ``` -POST https://api.securitycenter.windows.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/offboard +POST https://api.securitycenter.microsoft.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/offboard Content-type: application/json { "Comment": "Offboard machine by automation" diff --git a/windows/security/threat-protection/microsoft-defender-atp/onboarding-notification.md b/windows/security/threat-protection/microsoft-defender-atp/onboarding-notification.md index ff6119eee4..f405b1996b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/onboarding-notification.md +++ b/windows/security/threat-protection/microsoft-defender-atp/onboarding-notification.md @@ -25,6 +25,11 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + + Create a notification rule so that when a local onboarding or offboardiing script is used, you'll be notified. ## Before you begin @@ -56,7 +61,7 @@ You'll need to have access to: 5. Enter the following HTTP fields: - Method: "GET" as a value to get the list of devices. - - URI: Enter `https://api.securitycenter.windows.com/api/machines`. + - URI: Enter `https://api.securitycenter.microsoft.com/api/machines`. - Authentication: Select "Active Directory OAuth". - Tenant: Sign-in to https://portal.azure.com and navigate to **Azure Active Directory > App Registrations** and get the Tenant ID value. - Audience: `https://securitycenter.onmicrosoft.com/windowsatpservice\` diff --git a/windows/security/threat-protection/microsoft-defender-atp/post-ti-indicator.md b/windows/security/threat-protection/microsoft-defender-atp/post-ti-indicator.md index ab2b412ae2..e5fe251155 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/post-ti-indicator.md +++ b/windows/security/threat-protection/microsoft-defender-atp/post-ti-indicator.md @@ -25,6 +25,10 @@ ms.topic: article - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ## API description Submits or Updates new [Indicator](ti-indicator.md) entity. @@ -47,12 +51,9 @@ Delegated (work or school account) | Ti.ReadWrite | 'Read and write Indicators' ## HTTP request ``` -POST https://api.securitycenter.windows.com/api/indicators +POST https://api.securitycenter.microsoft.com/api/indicators ``` -[!include[Improve request performance](../../includes/improve-request-performance.md)] - - ## Request headers Name | Type | Description @@ -88,7 +89,7 @@ rbacGroupNames | String | Comma-separated list of RBAC group names the indicator Here is an example of the request. ``` -POST https://api.securitycenter.windows.com/api/indicators +POST https://api.securitycenter.microsoft.com/api/indicators Content-type: application/json { "indicatorValue": "220e7d15b011d7fac48f2bd61114db1022197f7f", diff --git a/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api.md b/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api.md index d656f995c8..bd9ab75684 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api.md +++ b/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api.md @@ -203,7 +203,7 @@ Here is an example return value: The following code examples demonstrate how to obtain an access token for calling the Microsoft Defender for Endpoint SIEM API. ```csharp -AuthenticationContext context = new AuthenticationContext(string.Format("https://login.windows.net/{0}", tenantId)); +AuthenticationContext context = new AuthenticationContext(string.Format("https://login.microsoftonline.com/{0}", tenantId)); ClientCredential clientCredentials = new ClientCredential(clientId, clientSecret); AuthenticationResult authenticationResult = context.AcquireTokenAsync(detectionsResource, clientCredentials).GetAwaiter().GetResult(); ``` @@ -218,7 +218,7 @@ $appId = '' ### Paste your Application ID here $appSecret = '' ### Paste your Application secret here $resourceAppIdUri = 'https://graph.windows.net' -$oAuthUri = "https://login.windows.net/$tenantId/oauth2/token" +$oAuthUri = "https://login.microsoftonline.com/$tenantId/oauth2/token" $authBody = [Ordered] @{ resource = "$resourceAppIdUri" client_id = "$appId" @@ -237,7 +237,7 @@ tenantId='' ### Paste your tenant ID here appId='' ### Paste your Application ID here appSecret='' ### Paste your Application secret here resourceAppIdUri='https://graph.windows.net' -oAuthUri="https://login.windows.net/$tenantId/oauth2/token" +oAuthUri="https://login.microsoftonline.com/$tenantId/oauth2/token" scriptDir=$(pwd) apiResponse=$(curl -s X POST "$oAuthUri" -d "resource=$resourceAppIdUri&client_id=$appId&client_secret=$appSecret&\ diff --git a/windows/security/threat-protection/microsoft-defender-atp/recommendation.md b/windows/security/threat-protection/microsoft-defender-atp/recommendation.md index 4d71206462..d53ac74ba4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/recommendation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/recommendation.md @@ -25,6 +25,11 @@ ms.topic: article - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + + [!include[Prerelease information](../../includes/prerelease.md)] ## Methods diff --git a/windows/security/threat-protection/microsoft-defender-atp/restrict-code-execution.md b/windows/security/threat-protection/microsoft-defender-atp/restrict-code-execution.md index 414c106934..9a05137743 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/restrict-code-execution.md +++ b/windows/security/threat-protection/microsoft-defender-atp/restrict-code-execution.md @@ -25,6 +25,10 @@ ms.topic: article - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ## API description Restrict execution of all applications on the device except a predefined set. @@ -51,7 +55,7 @@ Delegated (work or school account) | Machine.RestrictExecution | 'Restrict code ## HTTP request ``` -POST https://api.securitycenter.windows.com/api/machines/{id}/restrictCodeExecution +POST https://api.securitycenter.microsoft.com/api/machines/{id}/restrictCodeExecution ``` ## Request headers @@ -79,7 +83,7 @@ If successful, this method returns 201 - Created response code and [Machine Acti Here is an example of the request. ``` -POST https://api.securitycenter.windows.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/restrictCodeExecution +POST https://api.securitycenter.microsoft.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/restrictCodeExecution Content-type: application/json { "Comment": "Restrict code execution due to alert 1234" diff --git a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-api.md b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-api.md index ddf250a58f..6eca5df06d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-api.md +++ b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-api.md @@ -28,6 +28,8 @@ ms.topic: article [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ## Limitations 1. You can only run a query on data from the last 30 days. 2. The results will include a maximum of 100,000 rows. @@ -79,9 +81,6 @@ Request Here is an example of the request. -[!include[Improve request performance](../../includes/improve-request-performance.md)] - - ``` POST https://api.securitycenter.microsoft.com/api/advancedqueries/run Content-type: application/json diff --git a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-powershell.md b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-powershell.md index ea7771fd0a..c22b6113f1 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-powershell.md +++ b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-powershell.md @@ -26,6 +26,7 @@ ms.topic: article [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] +[!include[Improve request performance](../../includes/improve-request-performance.md)] Run advanced queries using PowerShell, see [Advanced Hunting API](run-advanced-query-api.md). @@ -74,8 +75,6 @@ where Run the following query: -[!include[Improve request performance](../../includes/improve-request-performance.md)] - ``` $query = 'RegistryEvents | limit 10' # Paste your own query here diff --git a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-python.md b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-python.md index ed35434cfc..b09ec393cd 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-python.md +++ b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-python.md @@ -28,6 +28,8 @@ ms.topic: article [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] +[!include[Improve request performance](../../includes/improve-request-performance.md)] + Run advanced queries using Python, see [Advanced Hunting API](run-advanced-query-api.md). In this section, we share Python samples to retrieve a token and use it to run a query. @@ -38,8 +40,6 @@ In this section, we share Python samples to retrieve a token and use it to run a - Run the following commands: -[!include[Improve request performance](../../includes/improve-request-performance.md)] - ``` import json diff --git a/windows/security/threat-protection/microsoft-defender-atp/run-av-scan.md b/windows/security/threat-protection/microsoft-defender-atp/run-av-scan.md index 9525f7a282..e1e4afef67 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/run-av-scan.md +++ b/windows/security/threat-protection/microsoft-defender-atp/run-av-scan.md @@ -25,6 +25,10 @@ ms.topic: article - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ## API description Initiate Microsoft Defender Antivirus scan on a device. @@ -51,7 +55,7 @@ Delegated (work or school account) | Machine.Scan | 'Scan machine' ## HTTP request ``` -POST https://api.securitycenter.windows.com/api/machines/{id}/runAntiVirusScan +POST https://api.securitycenter.microsoft.com/api/machines/{id}/runAntiVirusScan ``` ## Request headers @@ -87,7 +91,7 @@ If successful, this method returns 201, Created response code and _MachineAction Here is an example of the request. ``` -POST https://api.securitycenter.windows.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/runAntiVirusScan +POST https://api.securitycenter.microsoft.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/runAntiVirusScan Content-type: application/json { "Comment": "Check machine for viruses due to alert 3212", diff --git a/windows/security/threat-protection/microsoft-defender-atp/score.md b/windows/security/threat-protection/microsoft-defender-atp/score.md index d911b24cb2..aab54c586f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/score.md +++ b/windows/security/threat-protection/microsoft-defender-atp/score.md @@ -25,6 +25,11 @@ ms.topic: article - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + + [!include[Prerelease information](../../includes/prerelease.md)] ## Methods diff --git a/windows/security/threat-protection/microsoft-defender-atp/set-device-value.md b/windows/security/threat-protection/microsoft-defender-atp/set-device-value.md index b2a76a6693..98266678c3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/set-device-value.md +++ b/windows/security/threat-protection/microsoft-defender-atp/set-device-value.md @@ -25,6 +25,11 @@ ms.topic: article - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + + ## API description Set the device value of a specific [Machine](machine.md).
diff --git a/windows/security/threat-protection/microsoft-defender-atp/software.md b/windows/security/threat-protection/microsoft-defender-atp/software.md index 617a6c15ec..a471bd94f2 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/software.md +++ b/windows/security/threat-protection/microsoft-defender-atp/software.md @@ -25,6 +25,11 @@ ms.topic: article - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + + [!include[Prerelease information](../../includes/prerelease.md)] ## Methods diff --git a/windows/security/threat-protection/microsoft-defender-atp/stop-and-quarantine-file.md b/windows/security/threat-protection/microsoft-defender-atp/stop-and-quarantine-file.md index a91edcf37d..83727872ac 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/stop-and-quarantine-file.md +++ b/windows/security/threat-protection/microsoft-defender-atp/stop-and-quarantine-file.md @@ -25,6 +25,10 @@ ms.topic: article - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ## API description Stop execution of a file on a device and delete it. @@ -51,7 +55,7 @@ Delegated (work or school account) | Machine.StopAndQuarantine | 'Stop And Quara ## HTTP request ``` -POST https://api.securitycenter.windows.com/api/machines/{id}/StopAndQuarantineFile +POST https://api.securitycenter.microsoft.com/api/machines/{id}/StopAndQuarantineFile ``` ## Request headers @@ -80,7 +84,7 @@ If successful, this method returns 201 - Created response code and [Machine Acti Here is an example of the request. ``` -POST https://api.securitycenter.windows.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/StopAndQuarantineFile +POST https://api.securitycenter.microsoft.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/StopAndQuarantineFile Content-type: application/json { "Comment": "Stop and quarantine file on machine due to alert 441688558380765161_2136280442", diff --git a/windows/security/threat-protection/microsoft-defender-atp/ti-indicator.md b/windows/security/threat-protection/microsoft-defender-atp/ti-indicator.md index 2b37172304..39a5774d5c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/ti-indicator.md +++ b/windows/security/threat-protection/microsoft-defender-atp/ti-indicator.md @@ -25,6 +25,11 @@ ms.topic: article - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + + - See the corresponding [Indicators page](https://securitycenter.windows.com/preferences2/custom_ti_indicators/files) in the portal. Method|Return Type |Description diff --git a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages.md index ce25cadea3..a6af2f344d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages.md +++ b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages.md @@ -78,8 +78,8 @@ You'll need to allow the `securitycenter.windows.com` and all subdomains under i ## Portal communication issues If you encounter issues with accessing the portal, missing data, or restricted access to portions of the portal, you'll need to verify that the following URLs are allowed and open for communication. -- `*.blob.core.windows.net -crl.microsoft.com` +- `*.blob.core.windows.net` +- `crl.microsoft.com` - `https://*.microsoftonline-p.com` - `https://*.securitycenter.windows.com` - `https://automatediracs-eus-prd.securitycenter.windows.com` diff --git a/windows/security/threat-protection/microsoft-defender-atp/unisolate-machine.md b/windows/security/threat-protection/microsoft-defender-atp/unisolate-machine.md index 211e184891..2f5e42faa5 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/unisolate-machine.md +++ b/windows/security/threat-protection/microsoft-defender-atp/unisolate-machine.md @@ -26,6 +26,10 @@ ms.topic: article - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ## API description Undo isolation of a device. @@ -52,7 +56,7 @@ Delegated (work or school account) | Machine.Isolate | 'Isolate machine' ## HTTP request ``` -POST https://api.securitycenter.windows.com/api/machines/{id}/unisolate +POST https://api.securitycenter.microsoft.com/api/machines/{id}/unisolate ``` ## Request headers @@ -80,10 +84,8 @@ If successful, this method returns 201 - Created response code and [Machine Acti Here is an example of the request. -[!include[Improve request performance](../../includes/improve-request-performance.md)] - ``` -POST https://api.securitycenter.windows.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/unisolate +POST https://api.securitycenter.microsoft.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/unisolate Content-type: application/json { "Comment": "Unisolate machine since it was clean and validated" diff --git a/windows/security/threat-protection/microsoft-defender-atp/unrestrict-code-execution.md b/windows/security/threat-protection/microsoft-defender-atp/unrestrict-code-execution.md index 49037547d6..ef5ea2434a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/unrestrict-code-execution.md +++ b/windows/security/threat-protection/microsoft-defender-atp/unrestrict-code-execution.md @@ -25,6 +25,10 @@ ms.topic: article - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ## API description Enable execution of any application on the device. @@ -51,7 +55,7 @@ Delegated (work or school account) | Machine.RestrictExecution | 'Restrict code ## HTTP request ``` -POST https://api.securitycenter.windows.com/api/machines/{id}/unrestrictCodeExecution +POST https://api.securitycenter.microsoft.com/api/machines/{id}/unrestrictCodeExecution ``` ## Request headers @@ -77,10 +81,8 @@ If successful, this method returns 201 - Created response code and [Machine Acti Here is an example of the request. -[!include[Improve request performance](../../includes/improve-request-performance.md)] - ``` -POST https://api.securitycenter.windows.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/unrestrictCodeExecution +POST https://api.securitycenter.microsoft.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/unrestrictCodeExecution Content-type: application/json { "Comment": "Unrestrict code execution since machine was cleaned and validated" diff --git a/windows/security/threat-protection/microsoft-defender-atp/update-alert.md b/windows/security/threat-protection/microsoft-defender-atp/update-alert.md index a62ac7611a..9e142b87bc 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/update-alert.md +++ b/windows/security/threat-protection/microsoft-defender-atp/update-alert.md @@ -25,6 +25,10 @@ ms.topic: article - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ## API description Updates properties of existing [Alert](alerts.md). @@ -76,8 +80,6 @@ classification | String | Specifies the specification of the alert. The property determination | String | Specifies the determination of the alert. The property values are: 'NotAvailable', 'Apt', 'Malware', 'SecurityPersonnel', 'SecurityTesting', 'UnwantedSoftware', 'Other' comment | String | Comment to be added to the alert. -[!include[Improve request performance](../../includes/improve-request-performance.md)] - ## Response If successful, this method returns 200 OK, and the [alert](alerts.md) entity in the response body with the updated properties. If alert with the specified id was not found - 404 Not Found. @@ -89,7 +91,7 @@ If successful, this method returns 200 OK, and the [alert](alerts.md) entity in Here is an example of the request. ``` -PATCH https://api.securitycenter.windows.com/api/alerts/121688558380765161_2136280442 +PATCH https://api.securitycenter.microsoft.com/api/alerts/121688558380765161_2136280442 Content-Type: application/json { diff --git a/windows/security/threat-protection/microsoft-defender-atp/user.md b/windows/security/threat-protection/microsoft-defender-atp/user.md index 948460d6a9..8d75aea649 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/user.md +++ b/windows/security/threat-protection/microsoft-defender-atp/user.md @@ -25,6 +25,11 @@ ms.topic: article - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + + Method|Return Type |Description :---|:---|:--- [List User related alerts](get-user-related-alerts.md) | [alert](alerts.md) collection | List all the alerts that are associated with a [user](user.md). diff --git a/windows/security/threat-protection/microsoft-defender-atp/vulnerability.md b/windows/security/threat-protection/microsoft-defender-atp/vulnerability.md index eaaa313b18..924169d5d8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/vulnerability.md +++ b/windows/security/threat-protection/microsoft-defender-atp/vulnerability.md @@ -25,6 +25,11 @@ ms.topic: article - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] + + [!include[Prerelease information](../../includes/prerelease.md)] ## Methods From d6769ab4ecb09499d691460a33440bfa07f32ea6 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Tue, 22 Dec 2020 16:54:51 -0800 Subject: [PATCH 20/47] Added ADMX-backed Power settings --- .../mdm/policy-csp-admx-power.md | 1882 +++++++++++++++++ 1 file changed, 1882 insertions(+) create mode 100644 windows/client-management/mdm/policy-csp-admx-power.md diff --git a/windows/client-management/mdm/policy-csp-admx-power.md b/windows/client-management/mdm/policy-csp-admx-power.md new file mode 100644 index 0000000000..c8d950a87f --- /dev/null +++ b/windows/client-management/mdm/policy-csp-admx-power.md @@ -0,0 +1,1882 @@ +--- +title: Policy CSP - ADMX_Power +description: Policy CSP - ADMX_Power +ms.author: dansimp +ms.localizationpriority: medium +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: manikadhiman +ms.date: 12/22/2020 +ms.reviewer: +manager: dansimp +--- + +# Policy CSP - ADMX_Power +> [!WARNING] +> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here. + +
+ + +## ADMX_Power policies + +
+
+ ADMX_Power/ACConnectivityInStandby_2 +
+
+ ADMX_Power/ACCriticalSleepTransitionsDisable_2 +
+
+ ADMX_Power/ACStartMenuButtonAction_2 +
+
+ ADMX_Power/AllowSystemPowerRequestAC +
+
+ ADMX_Power/AllowSystemPowerRequestDC +
+
+ ADMX_Power/AllowSystemSleepWithRemoteFilesOpenAC +
+
+ ADMX_Power/AllowSystemSleepWithRemoteFilesOpenDC +
+
+ ADMX_Power/CustomActiveSchemeOverride_2 +
+
+ ADMX_Power/DCBatteryDischargeAction0_2 +
+
+ ADMX_Power/DCBatteryDischargeAction1_2 +
+
+ ADMX_Power/DCBatteryDischargeLevel0_2 +
+
+ ADMX_Power/DCBatteryDischargeLevel1UINotification_2 +
+
+ ADMX_Power/DCBatteryDischargeLevel1_2 +
+
+ ADMX_Power/DCConnectivityInStandby_2 +
+
+ ADMX_Power/DCCriticalSleepTransitionsDisable_2 +
+
+ ADMX_Power/DCStartMenuButtonAction_2 +
+
+ ADMX_Power/DiskACPowerDownTimeOut_2 +
+
+ ADMX_Power/DiskDCPowerDownTimeOut_2 +
+
+ ADMX_Power/Dont_PowerOff_AfterShutdown +
+
+ ADMX_Power/EnableDesktopSlideShowAC +
+
+ ADMX_Power/EnableDesktopSlideShowDC +
+
+ ADMX_Power/InboxActiveSchemeOverride_2 +
+
+ ADMX_Power/PW_PromptPasswordOnResume +
+
+ ADMX_Power/PowerThrottlingTurnOff +
+
+ ADMX_Power/ReserveBatteryNotificationLevel +
+
+ + +
+ + +**ADMX_Power/ACConnectivityInStandby_2** + + +
Windows 10, version 2004:
Administrative Templates\Windows Components\Windows Defender SmartScreen\Explorer\Configure App Install Control
Windows 10, version 1703:
Administrative Templates\Windows Components\Windows Defender SmartScreen\Explorer\Configure App Install Control
Windows 10, version 1703This policy setting is intended to prevent malicious content from affecting your user's devices when downloading executable content from the internet.

This setting does not protect against malicious content from USB devices, network shares, or other non-internet sources.

Important: Using a trustworthy browser helps ensure that these protections work as expected.

+ + + + + + + + + + + + + + + + + + + + + + + + +
Windows EditionSupported?
Homecross mark
Procross mark
Businesscross mark
Enterprisecheck mark
Educationcross mark
+ + +


+ + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to control the network connectivity state in standby on modern standby-capable systems. + +If you enable this policy setting, network connectivity will be maintained in standby. + +If you disable this policy setting, network connectivity in standby is not guaranteed. This connectivity restriction currently applies to WLAN networks only, and is subject to change. + +If you do not configure this policy setting, users control this setting. + + +> [!TIP] +> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). +> +> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +> +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). + + +ADMX Info: +- GP English name: *Allow network connectivity during connected-standby (plugged in)* +- GP name: *ACConnectivityInStandby_2* +- GP path: *System\Power Management\Sleep Settings* +- GP ADMX file name: *Power.admx* + + + +
+ + +**ADMX_Power/ACCriticalSleepTransitionsDisable_2** + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Windows EditionSupported?
Homecross mark
Procross mark
Businesscross mark
Enterprisecheck mark
Educationcross mark
+ + +
+ + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to turn on the ability for applications and services to prevent the system from sleeping. + +If you enable this policy setting, an application or service may prevent the system from sleeping (Hybrid Sleep, Stand By, or Hibernate). + +If you disable or do not configure this policy setting, users control this setting. + + +> [!TIP] +> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). +> +> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +> +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). + + +ADMX Info: +- GP English name: *Turn on the ability for applications to prevent sleep transitions (plugged in)* +- GP name: *ACCriticalSleepTransitionsDisable_2* +- GP path: *System\Power Management\Sleep Settings* +- GP ADMX file name: *Power.admx* + + + +
+ + +**ADMX_Power/ACStartMenuButtonAction_2** + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Windows EditionSupported?
Homecross mark
Procross mark
Businesscross mark
Enterprisecheck mark
Educationcross mark
+ + +
+ + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies the action that Windows takes when a user presses the Start menu Power button. + +If you enable this policy setting, select one of the following actions: + +- Sleep +- Hibernate +- Shut down + +If you disable this policy or do not configure this policy setting, users control this setting. + + +> [!TIP] +> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). +> +> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +> +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). + + +ADMX Info: +- GP English name: *Select the Start menu Power button action (plugged in)* +- GP name: *ACStartMenuButtonAction_2* +- GP path: *System\Power Management\Button Settings* +- GP ADMX file name: *Power.admx* + + + +
+ + +**ADMX_Power/AllowSystemPowerRequestAC** + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Windows EditionSupported?
Homecross mark
Procross mark
Businesscross mark
Enterprisecheck mark
Educationcross mark
+ + +
+ + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Available in the latest Windows 10 Insider Preview Build. This policy setting allows applications and services to prevent automatic sleep. + +If you enable this policy setting, any application, service, or device driver prevents Windows from automatically transitioning to sleep after a period of user inactivity. + +If you disable or do not configure this policy setting, applications, services, or drivers do not prevent Windows from automatically transitioning to sleep. Only user input is used to determine if Windows should automatically sleep. + + +> [!TIP] +> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). +> +> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +> +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). + + +ADMX Info: +- GP English name: *Allow applications to prevent automatic sleep (plugged in)* +- GP name: *AllowSystemPowerRequestAC* +- GP path: *System\Power Management\Sleep Settings* +- GP ADMX file name: *Power.admx* + + + +
+ + +**ADMX_Power/AllowSystemPowerRequestDC** + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Windows EditionSupported?
Homecross mark
Procross mark
Businesscross mark
Enterprisecheck mark
Educationcross mark
+ + +
+ + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Available in the latest Windows 10 Insider Preview Build. This policy setting allows applications and services to prevent automatic sleep. + +If you enable this policy setting, any application, service, or device driver prevents Windows from automatically transitioning to sleep after a period of user inactivity. + +If you disable or do not configure this policy setting, applications, services, or drivers do not prevent Windows from automatically transitioning to sleep. Only user input is used to determine if Windows should automatically sleep. + + +> [!TIP] +> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). +> +> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +> +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). + + +ADMX Info: +- GP English name: *Allow applications to prevent automatic sleep (on battery)* +- GP name: *AllowSystemPowerRequestDC* +- GP path: *System\Power Management\Sleep Settings* +- GP ADMX file name: *Power.admx* + + + +
+ + +**ADMX_Power/AllowSystemSleepWithRemoteFilesOpenAC** + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Windows EditionSupported?
Homecross mark
Procross mark
Businesscross mark
Enterprisecheck mark
Educationcross mark
+ + +
+ + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to manage automatic sleep with open network files. + +If you enable this policy setting, the computer automatically sleeps when network files are open. + +If you disable or do not configure this policy setting, the computer does not automatically sleep when network files are open. + + +> [!TIP] +> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). +> +> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +> +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). + + +ADMX Info: +- GP English name: *Allow automatic sleep with Open Network Files (plugged in)* +- GP name: *AllowSystemSleepWithRemoteFilesOpenAC* +- GP path: *System\Power Management\Sleep Settings* +- GP ADMX file name: *Power.admx* + + + +
+ + +**ADMX_Power/AllowSystemSleepWithRemoteFilesOpenDC** + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Windows EditionSupported?
Homecross mark
Procross mark
Businesscross mark
Enterprisecheck mark
Educationcross mark
+ + +
+ + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to manage automatic sleep with open network files. + +If you enable this policy setting, the computer automatically sleeps when network files are open. + +If you disable or do not configure this policy setting, the computer does not automatically sleep when network files are open. + + +> [!TIP] +> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). +> +> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +> +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). + + +ADMX Info: +- GP English name: *Allow automatic sleep with Open Network Files (on battery)* +- GP name: *AllowSystemSleepWithRemoteFilesOpenDC* +- GP path: *System\Power Management\Sleep Settings* +- GP ADMX file name: *Power.admx* + + + +
+ + +**ADMX_Power/CustomActiveSchemeOverride_2** + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Windows EditionSupported?
Homecross mark
Procross mark
Businesscross mark
Enterprisecheck mark
Educationcross mark
+ + +
+ + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies the active power plan from a specified power plan’s GUID. The GUID for a custom power plan GUID can be retrieved by using powercfg, the power configuration command line tool. + +If you enable this policy setting, you must specify a power plan, specified as a GUID using the following format: XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX (For example, 103eea6e-9fcd-4544-a713-c282d8e50083), indicating the power plan to be active. + +If you disable or do not configure this policy setting, users can see and change this setting. + + +> [!TIP] +> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). +> +> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +> +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). + + +ADMX Info: +- GP English name: *Specify a custom active power plan* +- GP name: *CustomActiveSchemeOverride_2* +- GP path: *System\Power Management* +- GP ADMX file name: *Power.admx* + + + +
+ + +**ADMX_Power/DCBatteryDischargeAction0_2** + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Windows EditionSupported?
Homecross mark
Procross mark
Businesscross mark
Enterprisecheck mark
Educationcross mark
+ + +
+ + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies the action that Windows takes when battery capacity reaches the critical battery notification level. + +If you enable this policy setting, select one of the following actions: + +- Take no action +- Sleep +- Hibernate +- Shut down + +If you disable or do not configure this policy setting, users control this setting. + + +> [!TIP] +> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). +> +> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +> +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). + + +ADMX Info: +- GP English name: *Critical battery notification action* +- GP name: *DCBatteryDischargeAction0_2* +- GP path: *System\Power Management\Notification Settings* +- GP ADMX file name: *Power.admx* + + + +
+ + +**ADMX_Power/DCBatteryDischargeAction1_2** + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Windows EditionSupported?
Homecross mark
Procross mark
Businesscross mark
Enterprisecheck mark
Educationcross mark
+ + +
+ + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies the action that Windows takes when battery capacity reaches the low battery notification level. + +If you enable this policy setting, select one of the following actions: + +- Take no action +- Sleep +- Hibernate +- Shut down + +If you disable or do not configure this policy setting, users control this setting. + + +> [!TIP] +> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). +> +> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +> +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). + + +ADMX Info: +- GP English name: *Low battery notification action* +- GP name: *DCBatteryDischargeAction1_2* +- GP path: *System\Power Management\Notification Settings* +- GP ADMX file name: *Power.admx* + + + +
+ + +**ADMX_Power/DCBatteryDischargeLevel0_2** + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Windows EditionSupported?
Homecross mark
Procross mark
Businesscross mark
Enterprisecheck mark
Educationcross mark
+ + +
+ + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies the percentage of battery capacity remaining that triggers the critical battery notification action. + +If you enable this policy setting, you must enter a numeric value (percentage) to set the battery level that triggers the critical notification. + +To set the action that is triggered, see the "Critical Battery Notification Action" policy setting. + +If you disable this policy setting or do not configure it, users control this setting. + + +> [!TIP] +> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). +> +> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +> +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). + + +ADMX Info: +- GP English name: *Critical battery notification level* +- GP name: *DCBatteryDischargeLevel0_2* +- GP path: *System\Power Management\Notification Settings* +- GP ADMX file name: *Power.admx* + + + +
+ + +**ADMX_Power/DCBatteryDischargeLevel1UINotification_2** + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Windows EditionSupported?
Homecross mark
Procross mark
Businesscross mark
Enterprisecheck mark
Educationcross mark
+ + +
+ + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Available in the latest Windows 10 Insider Preview Build. This policy setting turns off the user notification when the battery capacity remaining equals the low battery notification level. + +If you enable this policy setting, Windows shows a notification when the battery capacity remaining equals the low battery notification level. + +To configure the low battery notification level, see the "Low Battery Notification Level" policy setting. + +The notification will only be shown if the "Low Battery Notification Action" policy setting is configured to "No Action". + +If you disable or do not configure this policy setting, users can control this setting. + + +> [!TIP] +> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). +> +> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +> +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). + + +ADMX Info: +- GP English name: *Turn off low battery user notification* +- GP name: *DCBatteryDischargeLevel1UINotification_2* +- GP path: *System\Power Management\Notification Settings* +- GP ADMX file name: *Power.admx* + + + +
+ + +**ADMX_Power/DCBatteryDischargeLevel1_2** + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Windows EditionSupported?
Homecross mark
Procross mark
Businesscross mark
Enterprisecheck mark
Educationcross mark
+ + +
+ + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies the percentage of battery capacity remaining that triggers the low battery notification action. + +If you enable this policy setting, you must enter a numeric value (percentage) to set the battery level that triggers the low notification. + +To set the action that is triggered, see the "Low Battery Notification Action" policy setting. + +If you disable this policy setting or do not configure it, users control this setting. + + +> [!TIP] +> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). +> +> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +> +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). + + +ADMX Info: +- GP English name: *Low battery notification level* +- GP name: *DCBatteryDischargeLevel1_2* +- GP path: *System\Power Management\Notification Settings* +- GP ADMX file name: *Power.admx* + + + +
+ + +**ADMX_Power/DCConnectivityInStandby_2** + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Windows EditionSupported?
Homecross mark
Procross mark
Businesscross mark
Enterprisecheck mark
Educationcross mark
+ + +
+ + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to control the network connectivity state in standby on modern standby-capable systems. + +If you enable this policy setting, network connectivity will be maintained in standby. + +If you disable this policy setting, network connectivity in standby is not guaranteed. This connectivity restriction currently applies to WLAN networks only, and is subject to change. + +If you do not configure this policy setting, users control this setting. + + +> [!TIP] +> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). +> +> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +> +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). + + +ADMX Info: +- GP English name: *Allow network connectivity during connected-standby (on battery)* +- GP name: *DCConnectivityInStandby_2* +- GP path: *System\Power Management\Sleep Settings* +- GP ADMX file name: *Power.admx* + + + +
+ + +**ADMX_Power/DCCriticalSleepTransitionsDisable_2** + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Windows EditionSupported?
Homecross mark
Procross mark
Businesscross mark
Enterprisecheck mark
Educationcross mark
+ + +
+ + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to turn on the ability for applications and services to prevent the system from sleeping. + +If you enable this policy setting, an application or service may prevent the system from sleeping (Hybrid Sleep, Stand By, or Hibernate). + +If you disable or do not configure this policy setting, users control this setting. + + +> [!TIP] +> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). +> +> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +> +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). + + +ADMX Info: +- GP English name: *Turn on the ability for applications to prevent sleep transitions (on battery)* +- GP name: *DCCriticalSleepTransitionsDisable_2* +- GP path: *System\Power Management\Sleep Settings* +- GP ADMX file name: *Power.admx* + + + +
+ + +**ADMX_Power/DCStartMenuButtonAction_2** + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Windows EditionSupported?
Homecross mark
Procross mark
Businesscross mark
Enterprisecheck mark
Educationcross mark
+ + +
+ + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies the action that Windows takes when a user presses the Start menu Power button. + +If you enable this policy setting, select one of the following actions: + +- Sleep +- Hibernate +- Shut down + +If you disable this policy or do not configure this policy setting, users control this setting. + + +> [!TIP] +> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). +> +> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +> +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). + + +ADMX Info: +- GP English name: *Select the Start menu Power button action (on battery)* +- GP name: *DCStartMenuButtonAction_2* +- GP path: *System\Power Management\Button Settings* +- GP ADMX file name: *Power.admx* + + + +
+ + +**ADMX_Power/DiskACPowerDownTimeOut_2** + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Windows EditionSupported?
Homecross mark
Procross mark
Businesscross mark
Enterprisecheck mark
Educationcross mark
+ + +
+ + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies the period of inactivity before Windows turns off the hard disk. + +If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows turns off the hard disk. + +If you disable or do not configure this policy setting, users can see and change this setting. + + +> [!TIP] +> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). +> +> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +> +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). + + +ADMX Info: +- GP English name: *Turn Off the hard disk (plugged in)* +- GP name: *DiskACPowerDownTimeOut_2* +- GP path: *System\Power Management\Hard Disk Settings* +- GP ADMX file name: *Power.admx* + + + +
+ + +**ADMX_Power/DiskDCPowerDownTimeOut_2** + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Windows EditionSupported?
Homecross mark
Procross mark
Businesscross mark
Enterprisecheck mark
Educationcross mark
+ + +
+ + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies the period of inactivity before Windows turns off the hard disk. + +If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows turns off the hard disk. + +If you disable or do not configure this policy setting, users can see and change this setting. + + +> [!TIP] +> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). +> +> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +> +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). + + +ADMX Info: +- GP English name: *Turn Off the hard disk (on battery)* +- GP name: *DiskDCPowerDownTimeOut_2* +- GP path: *System\Power Management\Hard Disk Settings* +- GP ADMX file name: *Power.admx* + + + +
+ + +**ADMX_Power/Dont_PowerOff_AfterShutdown** + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Windows EditionSupported?
Homecross mark
Procross mark
Businesscross mark
Enterprisecheck mark
Educationcross mark
+ + +
+ + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to configure whether power is automatically turned off when Windows shutdown completes. + +This setting does not affect Windows shutdown behavior when shutdown is manually selected using the Start menu or Task Manager user interfaces. + +Applications such as UPS software may rely on Windows shutdown behavior. + +This setting is only applicable when Windows shutdown is initiated by software programs invoking the Windows programming interfaces ExitWindowsEx() or InitiateSystemShutdown(). + +If you enable this policy setting, the computer system safely shuts down and remains in a powered state, ready for power to be safely removed. + +If you disable or do not configure this policy setting, the computer system safely shuts down to a fully powered-off state. + + +> [!TIP] +> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). +> +> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +> +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). + + +ADMX Info: +- GP English name: *Do not turn off system power after a Windows system shutdown has occurred.* +- GP name: *Dont_PowerOff_AfterShutdown* +- GP path: *System* +- GP ADMX file name: *Power.admx* + + + +
+ + +**ADMX_Power/EnableDesktopSlideShowAC** + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Windows EditionSupported?
Homecross mark
Procross mark
Businesscross mark
Enterprisecheck mark
Educationcross mark
+ + +
+ + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to specify if Windows should enable the desktop background slideshow. + +If you enable this policy setting, desktop background slideshow is enabled. + +If you disable this policy setting, the desktop background slideshow is disabled. + +If you disable or do not configure this policy setting, users control this setting. + + +> [!TIP] +> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). +> +> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +> +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). + + +ADMX Info: +- GP English name: *Turn on desktop background slideshow (plugged in)* +- GP name: *EnableDesktopSlideShowAC* +- GP path: *System\Power Management\Video and Display Settings* +- GP ADMX file name: *Power.admx* + + + +
+ + +**ADMX_Power/EnableDesktopSlideShowDC** + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Windows EditionSupported?
Homecross mark
Procross mark
Businesscross mark
Enterprisecheck mark
Educationcross mark
+ + +
+ + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to specify if Windows should enable the desktop background slideshow. + +If you enable this policy setting, desktop background slideshow is enabled. + +If you disable this policy setting, the desktop background slideshow is disabled. + +If you disable or do not configure this policy setting, users control this setting. + + +> [!TIP] +> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). +> +> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +> +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). + + +ADMX Info: +- GP English name: *Turn on desktop background slideshow (on battery)* +- GP name: *EnableDesktopSlideShowDC* +- GP path: *System\Power Management\Video and Display Settings* +- GP ADMX file name: *Power.admx* + + + +
+ + +**ADMX_Power/InboxActiveSchemeOverride_2** + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Windows EditionSupported?
Homecross mark
Procross mark
Businesscross mark
Enterprisecheck mark
Educationcross mark
+ + +
+ + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies the active power plan from a list of default Windows power plans. To specify a custom power plan, use the Custom Active Power Plan setting. + +If you enable this policy setting, specify a power plan from the Active Power Plan list. + +If you disable or do not configure this policy setting, users control this setting. + + +> [!TIP] +> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). +> +> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +> +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). + + +ADMX Info: +- GP English name: *Select an active power plan* +- GP name: *InboxActiveSchemeOverride_2* +- GP path: *System\Power Management* +- GP ADMX file name: *Power.admx* + + + +
+ + +**ADMX_Power/PW_PromptPasswordOnResume** + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Windows EditionSupported?
Homecross mark
Procross mark
Businesscross mark
Enterprisecheck mark
Educationcross mark
+ + +
+ + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User + +
+ + + +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to configure client computers to lock and prompt for a password when resuming from a hibernate or suspend state. + +If you enable this policy setting, the client computer is locked and prompted for a password when it is resumed from a suspend or hibernate state. + +If you disable or do not configure this policy setting, users control if their computer is automatically locked or not after performing a resume operation. + + +> [!TIP] +> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). +> +> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +> +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). + + +ADMX Info: +- GP English name: *Prompt for password on resume from hibernate/suspend* +- GP name: *PW_PromptPasswordOnResume* +- GP path: *System\Power Management* +- GP ADMX file name: *Power.admx* + + + +
+ + +**ADMX_Power/PowerThrottlingTurnOff** + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Windows EditionSupported?
Homecross mark
Procross mark
Businesscross mark
Enterprisecheck mark
Educationcross mark
+ + +
+ + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to turn off Power Throttling. + +If you enable this policy setting, Power Throttling will be turned off. + +If you disable or do not configure this policy setting, users control this setting. + + +> [!TIP] +> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). +> +> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +> +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). + + +ADMX Info: +- GP English name: *Turn off Power Throttling* +- GP name: *PowerThrottlingTurnOff* +- GP path: *System\Power Management\Power Throttling Settings* +- GP ADMX file name: *Power.admx* + + + +
+ + +**ADMX_Power/ReserveBatteryNotificationLevel** + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Windows EditionSupported?
Homecross mark
Procross mark
Businesscross mark
Enterprisecheck mark
Educationcross mark
+ + +
+ + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies the percentage of battery capacity remaining that triggers the reserve power mode. + +If you enable this policy setting, you must enter a numeric value (percentage) to set the battery level that triggers the reserve power notification. + +If you disable or do not configure this policy setting, users can see and change this setting. + + +> [!TIP] +> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). +> +> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +> +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). + + +ADMX Info: +- GP English name: *Reserve battery notification level* +- GP name: *ReserveBatteryNotificationLevel* +- GP path: *System\Power Management\Notification Settings* +- GP ADMX file name: *Power.admx* + + + +
+ +Footnotes: + +- 1 - Available in Windows 10, version 1607. +- 2 - Available in Windows 10, version 1703. +- 3 - Available in Windows 10, version 1709. +- 4 - Available in Windows 10, version 1803. +- 5 - Available in Windows 10, version 1809. +- 6 - Available in Windows 10, version 1903. +- 7 - Available in Windows 10, version 1909. +- 8 - Available in Windows 10, version 2004. + + + From 7c0b00e858893f237d46eea97b0c6907e33d9922 Mon Sep 17 00:00:00 2001 From: Max Stein Date: Tue, 22 Dec 2020 19:58:35 -0800 Subject: [PATCH 21/47] Doc update and screenshot refresh Updating text and screenshots. --- .../hello-feature-pin-reset.md | 19 ++++++++----------- 1 file changed, 8 insertions(+), 11 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-feature-pin-reset.md b/windows/security/identity-protection/hello-for-business/hello-feature-pin-reset.md index e4e7af1253..93b01bb01b 100644 --- a/windows/security/identity-protection/hello-for-business/hello-feature-pin-reset.md +++ b/windows/security/identity-protection/hello-for-business/hello-feature-pin-reset.md @@ -13,7 +13,7 @@ manager: dansimp ms.collection: M365-identity-device-management ms.topic: article localizationpriority: medium -ms.date: 09/09/2019 +ms.date: 12/22/2020 ms.reviewer: --- @@ -45,37 +45,34 @@ Before you can remotely reset PINs, you must on-board the Microsoft PIN reset se 1. Go to the [Microsoft PIN Reset Service Production website](https://login.windows.net/common/oauth2/authorize?response_type=code&client_id=b8456c59-1230-44c7-a4a2-99b085333e84&resource=https%3A%2F%2Fgraph.windows.net&redirect_uri=https%3A%2F%2Fcred.microsoft.com&state=e9191523-6c2f-4f1d-a4f9-c36f26f89df0&prompt=admin_consent), and sign in using the Global administrator account you use to manage your Azure Active Directory tenant. 2. After you have logged in, choose **Accept** to give consent for the PIN reset service to access your account. -![PIN reset service application in Azure](images/pinreset/pin-reset-service-prompt.png) + ![PIN reset service application in Azure](images/pinreset/pin-reset-service-prompt.png) 3. Go to the [Microsoft PIN Reset Client Production website](https://login.windows.net/common/oauth2/authorize?response_type=code&client_id=9115dd05-fad5-4f9c-acc7-305d08b1b04e&resource=https%3A%2F%2Fcred.microsoft.com%2F&redirect_uri=ms-appx-web%3A%2F%2FMicrosoft.AAD.BrokerPlugin%2F9115dd05-fad5-4f9c-acc7-305d08b1b04e&state=6765f8c5-f4a7-4029-b667-46a6776ad611&prompt=admin_consent), and sign in using the Global administrator account you use to manage your Azure Active Directory tenant. 4. After you have logged in, choose **Accept** to give consent for the PIN reset client to access your account. - + ![PIN reset client application in Azure](images/pinreset/pin-reset-client-prompt.png) > [!NOTE] > After you have accepted the PIN reset service and client requests, you will land on a page that states "You do not have permission to view this directory or page." This behavior is expected. Be sure to confirm that the two PIN reset applications are listed for your tenant. - -![PIN reset client application in Azure](images/pinreset/pin-reset-client-prompt.png) - 5. In the [Azure portal](https://portal.azure.com), verify that the Microsoft PIN Reset Service and Microsoft PIN Reset Client are integrated from the **Enterprise applications** blade. Filter to application status "Enabled" and both Microsoft Pin Reset Service Production and Microsoft Pin Reset Client Production will show up in your tenant. -![PIN reset service permissions page](images/pinreset/pin-reset-applications.png) + ![PIN reset service permissions page](images/pinreset/pin-reset-applications.png) ### Configure Windows devices to use PIN reset using Group Policy You configure Windows 10 to use the Microsoft PIN Reset service using the computer configuration portion of a Group Policy object. 1. Using the Group Policy Management Console (GPMC), scope a domain-based Group Policy to computer accounts in Active Directory. -2. Edit the Group Policy object from step 1. -3. Enable the **Use PIN Recovery** policy setting located under **Computer Configuration->Administrative Templates->Windows Components->Windows Hello for Business**. +2. Edit the Group Policy object from Step 1. +3. Enable the **Use PIN Recovery** policy setting located under **Computer Configuration > Administrative Templates > Windows Components > Windows Hello for Business**. 4. Close the Group Policy Management Editor to save the Group Policy object. Close the GPMC. #### Create a PIN Reset Device configuration profile using Microsoft Intune 1. Sign-in to [Enpoint Manager admin center](https://endpoint.microsoft.com/) using a Global administrator account. -2. Click **Endpoint Security**-> **Account Protection**-> **Properties**. +2. Click **Endpoint Security** > **Account Protection** > **Properties**. 3. Set **Enable PIN recovery** to **Yes**. > [!NOTE] > You can also setup PIN recovery using configuration profiles. > 1. Sign in to Endpoint Manager. -> 2. Click **Devices** -> **Configuration Profiles** -> Create a new profile or edit an existing profile using the Identity Protection profile type. +> 2. Click **Devices** > **Configuration Profiles** > Create a new profile or edit an existing profile using the Identity Protection profile type. > 3. Set **Enable PIN recovery** to **Yes**. #### Assign the PIN Reset Device configuration profile using Microsoft Intune From 272fc4ceda6b43d82bf09ff5701fec8f67645a4a Mon Sep 17 00:00:00 2001 From: Max Stein Date: Tue, 22 Dec 2020 20:22:06 -0800 Subject: [PATCH 22/47] Doc update and screenshot refresh Updating text and screenshots. --- .../pinreset/pin-reset-client-home-screen.png | Bin 0 -> 90751 bytes .../pinreset/pin-reset-service-application.png | Bin 0 -> 113741 bytes .../pinreset/pin-reset-service-home-screen.png | Bin 0 -> 71281 bytes 3 files changed, 0 insertions(+), 0 deletions(-) create mode 100644 windows/security/identity-protection/hello-for-business/images/pinreset/pin-reset-client-home-screen.png create mode 100644 windows/security/identity-protection/hello-for-business/images/pinreset/pin-reset-service-application.png create mode 100644 windows/security/identity-protection/hello-for-business/images/pinreset/pin-reset-service-home-screen.png diff --git a/windows/security/identity-protection/hello-for-business/images/pinreset/pin-reset-client-home-screen.png b/windows/security/identity-protection/hello-for-business/images/pinreset/pin-reset-client-home-screen.png new file mode 100644 index 0000000000000000000000000000000000000000..fce622e7f7a0fbee64e868b71ff042806524ed4f GIT binary patch literal 90751 zcmd?RbyO687%onS(kLO_A}q)v4NI4V2ug>_QUcN~jRKNOEYeDf^n!E>61#wOcQ?|o z)SdnQ&hP$n|GwwkdoJeyJHyN{^NII;p67i&6RD%EN_y|nJuECNQgt;YT`Vl@QYV|PU9PIAz_U-nyX3ZT&%hYuDv7-3tIq&mNC2)munmAN~ ztbwo3^hSNamnN{mdv{#$p}JUOW4^w@$zK$OK8+bDj_;B@g6+hu~-aF8LhXa3s zU2MU|Pi4x`=T8<}47TAWmoO7A#x1no{I`C)3n7G*eRsS-O(&7DBqI1>1?v z9K$|D&uPa6e8>@28-9*C%O*ZA8FRt_t2!U%%uM+Nec(J!$Y+3ZvW(nnj`|+m$i66-w)C+IPevVkWf=?v*sdTBtYjY( znq5}O%lere-MFqZ*{9H21bTnV$8=S+d$c#uoqueQ$5Q2{D*h{qYeT8G1=8rM+icZ> zD;=M=y)4OvWim~SzE>ZuVyGdn#$|uq*@Vv9B(Fe5Im#uF!sW9P|MR8-3QmXJ*8Vgb z2*zEnDy|(`1m;OY&Rb7zq(!e}lV}anN~JwID%T>UXdg42M%baM(1A7E{^PQ1ife)s zw?Cz?kaM^ouCC8s3;wlDx9FX<(%Sh);t9YINu-@)Ep7JAJ6&P6WBXBmYq9XxQuglZ zX!*+lY}~>(@7LS7>Y7cMUMu;sak;8-IJvwr<1t@(ldie%R{r)6iQVttq7j0v*GIO6 z`;)?drS;7H_I{z8i@mS*YEdh3vgT!V%U@jAQ*GesPAxtqXw2|b59TbDSKDbPWGNv- zU#!Fl(we!y^f~I~A@mrHlQ}c2|M&Yos+T9*bU<>aZbb)@E5%f| zwXgTa+IF-(PoQQcaTy^8n`0-=|b0g7t?-c~{ zNpTXX=;SwR`cP0*rr&=3uif{>rTUp@;Oy6N=O;#RPeiDVlH1W)+N>fT)*XWyBQ8`)&Kb~Aa6x*3>xyp~uD!hKIOKBj3u`s1Y)u$#ZQ ztl_=H)o#^}(5nAVX)Qd{bGnG}@8-PAxt(B)9KrxxLC59F!L(y21Wh6iWVODaf1n|>XDQ$j8DCcrAl>G{Esn{ z_|DJAy#O z)PD?gvZ=>yae0d`7naeB#b83_$1@)q9jB~P%-*Lmc}~718CJl7lfn{9?(NraWDRlF zOG#FcHGLY5a2?7N$e-pW z%y51MM9MvHS-gYIS_P%GZ3et*!z+&6_6D`%xO?=0*ZON3tlP+R|6r4Q~DN zvI7>k|K!)!#1=RbMdQ1VP=Xdr&C!IslQK4;Dh@pryx6?GX%5=9iSXT>7lCNKDVuEn z?csE;R-jXB6WDYU`se%(n%8P(KJWoq&%E>;ff6V-BGpa25&v+WV+HACy>bIx_E=q# z3Gv4Lph!6TC2tP3+4?K<7#wm8m!^biMv)MyT2NBDBI=bqy+&WEzJ8~hfh!=^-hyy|3ON8llG|Hs`JUV+`jI`&$`8B^8yE5G_4>sm0 zDxU&Rk)LI;u(R%kjEnQB>hnjYTb0Q}WM!B7j|!un*B=h~J+Jp4IvViF=07k!$#0k4 z_?Xk=c08Qlbk-)PVacwx6TuPtW55LduH)019DM{y_i*Z!gs5p<;R6ka8?~t1THKcf ztBv+(Y#~-+ys;*7Yr>qqo&<9WeXOP4cqjxpl_yWL8tO1>pa^NMEQQ)j==pS~JDa!C zSbRKuZi_^Y_E_c;X9kfn?@zFSrZQs~F*h!Ox$#e8^B@zmL*vW1=4`pR|&XaDwuJ+AK%Zq{ZRkmRb1Eyw3W|F60=aIP-mg)dndD-VrIM31(`|CQdaU8 zHH&SI0smV2N%slcoz-@}TE-U9li|?wkK7wZj84uL{ctpTwETWSNZazup*aZF4#R6N$COpz`N{5DD)XYm9iYn*j|Sl2*!L_t*4r;g@w zYIxsRiVh^zP-vy7a(#Q>hfRh>X*H5&--Qh%_l@rPE&Fpmn;*|F*1 zIk*u_&9vfTS|~Dxvy?3>qP=pahB*%(J{nIS?my=-5pz3K;U~-3vI5&<Qvd zJon?Khe=+K6Z0B>sp6neS60a{S$Q{%W(C5v8mJUj!5ijbk2u#Lg;hzbm>jJY8N0@jF%p02sXPXw~PAVrC~BX z6(-ZetwdVYUGIL@Yx0;VfJKEmLtW&@Ijg1}YvoybSJH!WRc9VO<2nx$d zHG;wAlf)5yqhk)VQ1Cw2l&BzemB`#L&ucavdJ2Uh2)le(M1-cN?B}KkcoWg&DS|7n z&;t3V>z>D@8NClbt!Q8df39K<(U4Q`uIMXK06ubaB~%lzfzC51lJXmS3b0_4ytega zKBl7U-K~sXQ0t6VNe5yl$a2pD{1IhRTtAsh-2I{=MKf@fC`F>Ll_dQ5`e3?%zb7Ud z44K)5eU0JNV&!yg;ITQzA0DxmYE;x-eOcziGH^N|QAU32wC|~j8MFVPsVF^_N4HLv z6_$s@7k(9zZS`lDm1fk=%r8mx1-9vbl8_XdCT)2^21r%cF(XI^fTxHx|3+pz|L>~C zvfHrn6Pb|h^GnaT>e~iC=U8Iy{}@NKGzP}ro_e7OQkwK{&jwIQ@Mp^n=@?)sKS=!l5h0xa^9j)SQY^2$1ZgH^_}`o%hf*L)qbOs#7;?7 zR}_Di?{*Oam^pAz&16pWBa!!uoBv$qeKwK-r1|UPx^Omc_SNhLQWbIpLky`fB&#y} zK%3N@6@r>z))+F$r1#8juXZ6|ZMW)gRtY^BBHe930+nW8X2k4&GW1;MPy&E!NQL{L zR|55`32E(GWdAV-02)08Ztt=U2K4NvfTW@^e8${oE%|8H?Qil%c3?{rfKV;@Z`eLf znERDx1p<%}1+ZEp;Zor8g$Zzn4xbIv@{HXMms1FUch^4An*UfxKfSy#VIpc15o|uu z^#RzzJWr@E2I0ESx^$0uCQaz~+>g-g@&HIhoJ*;%qJZl&brAYtc0A>E>4!D5jgQs% zEiAxYTZNK}{%}nsKH)`|YE~UAHbJCsPDXNf-1!GYtb75~*IidbdgI=VK>wKAY~1M) znUpws&xicceQCQO;!cYI*fcLgCR-^X%g2h6#{Gu1s_Yww%j*qU3w>j|eAk2KbFvK3 zT4gsgpNUhm$K_E`Yh?8NB zIPT~Ew-?>A=8)5(7s&vnDyz8_O?n zB0lRt2mjm%kmJT6oaWn+>|6I{>qIS4UI4Ny$piuzHyP;WI%Hv7SGQqDzu1Cl_Zy%q z%l*+vgBD%5k#(vo0NIiNCid&>lwsjQg-NwDRgJUYqkBlT(lEHtFA*Y99DgSa$uZ<$ESX41kwQcLC^pDorTUK_Z+4AkOAlfWC?7O#zsb zPpIfcbB}^lhKQ=fO0+Qip@C_o^zFsUFETRybcDbp08f#BXe~_d;A@vX(0J4%`;wR1 zvNtE_a}0&70WLmGR!7#0^c;BV(^g(fIr&?ynasafi@IS zrG2$|k?lbXUnlEAfF>f93is`LC1-^d-e7={hiQg5&a^{S|IcF*XKz9#cO8kl>*Hc- zPgy&FJA%A``L%i6v)oDjf-zIRM?ZcPmt0yWQ?{EWFP|CZn_>}gX}e)dAHSjsf&Yph z#So^*_vOuJKT~lMaEvBACd>@(T6W4BpHLe4CJvPVEIavu_!4)Lh5L}QeRg{M=~mPc zI2q`a#%=7Lu3)#-AZPKj(wga?0TY6&^+2SUXvGC5Q)`QVKckQAePkA@mP39LxLs7( z;^g+FMEgu_L2KFh8sLYZa3)W~F?H&b@=}gCY1imzJ$>#*Wly*cK0X)~pB##Hpn05P;w80iy77LDQNeowLUvF$hLRbFpHakUs>oyrIG4Z$ zave32!E#|CBvwYA4{L&Lt$4xF+)!ov@@7vi%Di8b@1kP3&GY2Pficx|)?TP?-189D zvzX?b5esz)lBO|y6MR%`ar09kHQ_Zqr=^~1qHT4IX1uDN{#1esrD=RFaeHVDzX5x1 z&`Jn#aKxdKj+*`zYtJBACXQM6=X5~NdxuozQA4?AaB+}jxNWqFTWbWhSOB7o2nrUA zA5ZmL{&^^jW}`3*VB`!R>fTl-DjP@WnSrqf^tij~Q53O~+dq7@>$%{DIk$1nPyJ z7DI!ALTjbz&ZD9D89z(sum?;<+vQQw++21>`=Nkp)B>+H?Rm>VX2f>ny3hrl{~K^t zl~%7*Q&6Hs(1X3SDM(oA51u~x9*C6M5N8)(jaS@0?cgfa0^-k!k0U^dU2{_=M>WXM z6huLq$X{|SXytH>LQ-1XY!|ADR@b(CXOmrm5}JZLJg9yVIPDfw@-x+n-Nm<1Z{>rL z2u3}{lT5U8`JmR}&#tt3uI<^{OEG)wVlGO9dJeCE62VK`L=bRMJCRJLjs1XoJfJAp zOFTPXp8HGHq18}|>FAP3%dyXz!FtLB5bOz&R>E2GVOl&TPwna990Vi6&koK6(n{#) z3Y&Be38FAbtWJVW;oBLpE5GX@hp|35AB~T5P?>|9Q_3P-1;3CWo}d$g*~s^#Uhs&z z4t|n!oc<!vNfJzR4eXJQiy!+tbs9&-t5v=9i5nfv%idW$-r^ z7dsU7vmPf}3vsK8{Ht!+TbIiv@<79#4+325IIE#e*e?x@t5)e!sZuGjuYzGQ?1EM; zx2NS3zK-f%AXXxDrd>fQvbObRuc2QWp)U8nXIkHTW^)3-HNJQEqC>AdPUzBk9Kf)t z%OV_lhd!cAhHQLV(~1upwN@4dw5uEy|1$S;1SFMBh4y=9yew%w0C|d+Hj@psxVs`u z*X0@DDtDDpv(~m%nB8){sVe((H3%!*wS>)2_A*>jj4}E}vtnjwWv0`+9|*-v4C&#P zR5mtK9HB2%)CRVQRsU~L)nh26G4KkIBzb{&J>3RV4;5SZSS5WnX^GJkA2(Mri>Ik+ zieq5r5g@{*U~*Lx0AcJbBGp3%;^D+?l?#D)H*0`;2Rfhgvbedp{ntUB0w|T~`?obBc#Bp(VR24O^3@cYpp!NQT9VI57gm=wg6?Y$fc zpdfR4@kBLEY4^|77!}zS&~B2IX^ir&*Tq_S-TumWr2kf?jWG{I_~aJ7P+481nK2&^gRdk&?B$FbFVdfi!0;$&73HL0nUO~M6WOs zXs-e*Mm$ahP$jAxa#ktHf}arC*{NcqrXkAy<*N1W{0<(7E)0BKcQ|$J@deu(_mq0+HD!2jZp^y=Z#0enf0@P z9F1#3rT1ta02~b@9|35P0_4+*S)h$^ZMd1rT5r)uGYhvh1WJv2H6~{4nw;FC0D{h` z0f2bR$HOQKez!g$)vaD*;ZK;HxLdapE3$&_QHAJYCP)e(!xlDOEJxuQ#C~*s8UeSY ze0T*ZVqI3z_nP;y@c|$eVJvsSGa?;r$*sJ!%j<1})+YcYzimrZ4`(ec4>&Cb3P|do zwPElph?;%n9~wT4s4X+l4(Ru&U-*ZJ3MJFNoyH z{)k9;oI18Ja@dx7zUaGw8OSXg@=Sq(uwbJ%kGp_w?~aKe^?RtN{b^AIo8Vl6(14cB@m zukR}HVm%8TLM!n-eQAhPR<4zl9JQL3fGZWdYRbs2Wa{kjz- zppBXYphvRd82TV$A`FxG?##}80N_CLlvnzOZ$G(SuBA-uU~u>&dElK!X&95Wmbtzsz*&-PLd9?yj0e4pmf>nPZeskD8LiplifCN+hVfCwhSv~R`;6O(J zQz|*T#PAWTQ9mSa;j5`TfJx{Vj^O!7oZym)f8(#}1D`SjiQuARI#8p^0H8#4cuGzY z?#Zw9i*DQw!XP)Y3m=b@vw>QwN699Aujtz*3Nogj*_!CqPAZL2t5Vj;_O_zwS2-~l zDclq&MtCr8suVb;s^fspAm{TLr&a_I3*i5S`DNPH#{jUg z@>t)7)jL!VspN{?4DvPq1&;R+`DVs5h`Z%Ti=Hh}R}j`+&Ae~#%GfdwFV*;`DqFW(zH29lA^-VP8D ze8$LSidg7tyjIzz8}i9DjCv_&y@Dk+AopB5VshhxGyFZJ|jMaNYxK}VlB{RbEZm;#Gwjm1Ep=1a& zuEynXO3SO;y@lIS$;B)PAGXWKjN}@~?O|NXi;v6HV?rqH5Ps#KIeH$h%P@JDfX0Is zKM#_!2|)xa5gGG$997p1i z8S~uaJ$ci_H1j5u^gaDIuN!%NoT@^P*WU80jVVvT%E13*ev^iL4N>iGgC9b%to2J>hRA^w`&%+`Pu>Waiy*7zG19s4^MA_wB*P2%a+C&ym1=l#m!ce!Fh@o9JAoMI-TE_%bypNf%-3gRIA-%4Q{!11<$JW@F7fCT_r_(M zv8-#|R;dX;dgeZFPeqS7dzG8z|wF zHRxq87*_f_IyGz+cou(_c#tVeMXzYTw`*ecaQ z3v#(lsn2;rs&CKlZWn%ijHj`Qsr&Uw8uVHuMeqjnyY_xeti;)7l_Y;AJE#*XjkCHk zDXyFv>no4N%D22a0cZ+C=fB(PU{%fhV+4M3SgT8%__Y03Pfsi(HQ>Pxv-S=+>TXS7 zwXu?g+Yy{eR7PY2>W2%-JA-T?;^z9S{wn302i_uV&N_q&wX<`ku_6Rr&*gZcRDw=8 z_^7cEFd(seR%eFn!~|Eum$>Y>xE}(5_yhlyBRn$NL7Z`j)n@VQ8WqakB{7quhNMRx z#Rw(Z*SKWGJLfV*(MKWMp?WF&yMS`&oqZgw8MU%e2X)tq(4~xzMA5r4V^cHKBRip- zOYQ_5pqD}+o~EmO%j@D2?c5Z6%Q5`D&CIKmN{n>T)#5f9juH9`n+>FnUm7GFhCKO; zekz9D04b$Tz)B>OMOAeIOyCRI{1&?H;$Z||E5Uydf@>5i*{!0F4Q77o1hB2)C;B*<@`tOVG|8F{YOp|@Hk#76D7aO~LFT#cVU zvq+klsF}mfG%_2so*#Lx`NTc8IzBm)gB`9Mi3cOISq@KH8dRQRcO(nWU1Rl!QXkfG zLC(Fz|3xUl;79E5sT=o5LaJvqmcFGK;dH7HQfIB$Nxn_(e$H3=Dw~cK8Do{wt`_B{ z7y_?@#)IWv3T(6!E7#;^a6O8BK)jjjr@VhWNd&IZ)VSL3W!)han{|%n=WE06RRCqO z>1ZTT=3f?#5Y9)-iXSn>@BE1^Au%ckBrpx*%h%x0b%=D1$O7^-#_EpFi z&<^7LdH!UIeMXh3fSzS~@OL%T1v~r7J9Wuv`vLN)^#vefjo+1;_VmTKUT#1>oHP@Q zzU2o5{6wluQ|8rIvsa4_b2F~wp}F>wCfX5+BEeA0{Xd2+;G$WZ!==&dzc0J{?Iu`3 zVhE5dnX)m_4=v*eVYT~jPdGrUi_B``8|`ZMDX7C8wv<1w%oEyts;~-S%l15x_v{UB zC@fgmw=v9dGdBaOpNh*D@w|nzNfK??E=n16nf0Hx|e zcs8Q>+T1Eeo&x>GHUS=ktyVxRS!IO7Hb|f27~9;sH_6$UFVFzXA1OWVj{##ZIOYLG z@IzNYO1mu$w^S-9FPlbUb#&BKvRV!(n>?o~`pawwB&Ig=>%Qs~jE*6wgoJ3D-In1? zbu>(Km)-IdSXR(G3=Ff~!r_^OCNtXm7h!E^s2JtMJj`gg;_k`hXEaK$<`*7O?SV$~6Kr7b# z5=N;6Hq59ZY?QA9dn|`_+I>5!1H1B&?>7gMnUaIrkO4Yeq}s`U5bd25eiqd01IEw$#Y3CJc_ zRiHVq&dq+qA}Ho|9=-R`DQG`D=K!5oi+iC$Z`4qo>v{Z*&kpSB3!2w5JG}0KLjQ&N zxtee*{fHRrA{yw_g$Ib+2nQqfS&Wt|o9BjEHoD)QcGVrgy}&*0Cz-Kh-CMkIj6L0K zyp~0e%k;wg;&yM~gc7gtcu^6hGooa4v{ENM_BMHtdn(m&VGiZY_vDSIe?^aRgDUDj zmkvJcj-iWgB$*}mnmewll-I}3sLvO?ad$%bxL)>v`5TebR>u8n@)g&g2YVC`P7Wkj zY`U|*De1_q55mr(Q&)&$90w&b2OIqm(+`QTO>%{A-rUC_b*xbJn8c&Bd|zU=ac+cO zVg3o3VT4kDs(f1v=8&v?C9v{N>I6`3zn?r@wY+>$V8<~8z<7($2dE+BaI#;y=!YIg z;r}A_=W21Yp>i&MdKCveItFpWmla&#POIPbmwQgs#^Vpf>M0+vE2?EgN7QQ>v%fm$ znQfzW496vR=G?Ba3(>QcbUBw4uK+N>ou5Ym5e5IR9-`66uM)x)xPu2Mr84L`h4L;V zDG#Ma9=m5OgTxGTd0d7-4y7`Oh1_RMjnA?Bz$Iy^iha{EstykN%&*RlJ z9|QUaH%TESy|PpX{XK3ToG%eNpE)%s^BZ_rO|YrWJab7@-wjKRhi$%m#;-?3S)1J( zuIad;-`amqYdFer?8A7J&dTRzKglu}F;esQp<&w6zw4~%D)%g53VAnAwsfw?jqOTH z@Q;8mBr1(kspp$H9yi#)Cfzx?ic|e>4|Sz8;>6mg=qA)+uQ+rih3lfyOeLEe^O*fV(T$>{)dL=n%@-PUOPav1~(0x`wRpqkg(~z($fwI&KOI`p~Oi zkDy@vo`_6CmEBrOjy83Z@n`Vq%E}IpE+d*;Gq9K=j;Rf*em88d9$vDmr$d2CSr5{p z40(!%hT;Ixq_4X9n)eMAl<3vy&Z8p{M>sQx2}RNmazv4VJ|X^`eYIB%dQ+qmNYQk* z6%DG>u0fi2(Rg!Gt%ME$Sd(4v>5|f~y+~Qn$4*rBS&56A5{II^sYz@pl63(!hZK{i>G8Iw z=UY*3K*VhrB$|bO8qMlfmEjxC?lX}tHsoYEST^D<^&ul^#A%@eG7}*=Hc@?Cf#03! zR11iLB!DPL6-oXm<6=?`P~kO=F&5_zB|vdKZ07)Uc{=WRxSzPFY;|oD4^?C@#@PJs ztDLcCx-V%Ik8Cu``WsL#cft6eNvK6>Ce60RtOEw#jK~9?hbD~r-G%KbGhMoIH_Mcw zrWx?R`lm%G7bEX8Tdwe8o7GD!Fl?av6kb&QtHyf~LAP53xEwFq6y0T-JA}zq6C8aU z(rX`i%N^^;_Gw3J0yi%Gz1=cITEE*eLi$73O5jIn9 zED2InOLm0JW2@N3Sw6O685_4Tdu+cVJDrz`m_$pwKj+w3#U}Z*pUGtPRf#l9>$jzD z(g2f$S#ZTCh&woZ{dR8Q#?1d8fA~&gc)71cp3M&*>xI>@4P16m;)w8S*O}UPaw_QY ziQ9|Qvqb~R<0kRH0(mP+@7@Jvo?ff_KdlUZjVaHGG-jLr<5wcb{Q&W!zTV@#WZt$X zTm4JZ5Dw^r;dShw18Idf%bAKN$zY9-)XCI3a&`zW zNk`6)jL9%bXDR*dUHwqk*%@YV0JI9GHkkcVyq?whaI17c`3MdlbDL>UIT|jUSuZNnnpKa#?KVBmG=P&b9ifLdPQEft6N;6Pz&s1q2H?3 zLh3P8*iZcZ1w+K>oH94G}tWW>35z&n}A@ke8cGI`~LS;P4!NHXIHkP;XNC2_|oQY>G!df|9Nwboi-Wz zgb==sRc_|y)7N#~&#hfM8Q(aqfA#7ds!yr#CE&bF7v1r9oEO;plyCmzeIl$)GZW2S z!Id%>eIh&g@#SYTAMy+rgYm2WCW{hMD@Uwjb1}4-zMSm5#=0-sZbuelgi%Ay7}Ce| z<8%ADO`$kf8B1MEAk~qI1xs3`RsEtS{>^pZ{c~@Z>_TtUcvDch1ZBI-vrb#ygtv+> zoK8OrgP*#jY4@2#%Fxg1e)9Vu8tYvQ`n@RUcz^u!S@USzM{dJoN_obL$b(;7^EI=x zYlWcL!5MFuovaNhQG(+6_&WxJlb3f}!KN9y;(W1x!nmtk;Z(_P$I}e{y}d?+o20~2 z8v(hF1L(8bz^mF*ttR(rZlc8`hj)i?Q?%Pklh$|!8zGOYN{Rf}3@n>n(h;G8)jUF1 zXF7)*i2(EYA|~+J%+rokgVfvM!FTL4lHZvKK>m^t@0s105}*}Stg9DXZd&$4H-&UG#eRKfLS>JIFs zn?IS{tj5qfhb*@3n~>kWW-*F>=+pFR(%a=9_5iwZ;pW3HzxIr5^})uoNvcLAxsVV# z*%imoxWyg0{#|-hD2| z7EJTICDCG{cl`_3T9-gw;Z^V4*O7eJES4z}EP1(Qu1a(vnW%E%F7n3Jsa-`E`$lQI z>x*OM!*+Z#pDN*-3MNraS)kg+qpnf?u-sqFMOg$v`?*Iv-6?!cM?x_X)>AQ^Nh0FwT)#9%y&D}`NUd75ugj?L9Cp>g7VRdvU^x4{?Q4wm7Np+Zs9j!UxBXYOR9-oE~g{D>|7UXE{z85HUi z`3os7{OCU3sJ58wv+81Lo?HkXqiw97>~I48mw^~93=f?9UbYq#)BM;%r$ZpUbCMuo zjdLr3iHQGtHmGTS)`3LaK)e4r7M@+Dq9{m?3Xe{zyP56l90yK=s6Nqa0(pVduMT0k zwC+7+Q(T*FP0eY0m0rbEU6WpCHqpNx>U1@|3xtBt9JE;ac#fY-fxE+50_w~ycbi_O zIh1{O`bJJ)c=i$ciYVDp3-CuIe*{=E>GYu2)R)$NmNk4AXud37p@qZ5*TLFvI{p!f zW`;5GLkUrRt0I5X^45I)IYR9_%1R#CW|Pt>wsb`a$os2lu#E8%ahFT{4E#vb_&q#7 z#T@PL6rvq11!zX>ZwEl06vzxsDn(>t&SwS2kF_vD@JuS zUT<&-+dcY4ECkfoCVq?*Pg~mk#)E_Uq>uY7<7s%7#U-?+ACr@$xg|eTdJz3lc^u7t zB+Ay7r$~UQ8hSVbw*SM;2z?fDer+!J8v>?g6Lp|=aQ7Z%f|nw??wN5+ zZ+aqIB=EI)%MycGePjDqS5Lxm>Az{d^v_VMB6nxu>>P52c8%{GOa(FJs(~Upc(zyG zh(9yAR5W0WJOnf;DBbp+s__Y%Yb-xxAcl0>#$tDT=L9rEZ@_|hWb(3kF|vxlgM&v@ zK=17eY>aSHXs##WX1?dLf>u&NbJyH?`P^IH80nmW6YJcBT?73ULMA@b^S+CU^4D9a{(ADJ*hOgoeM z*GJYTBp2AixyrFxg|plsYPnac+=*X=9TsYz!e#^CZ05+vepXz0061$G@Otb2a)(fV z=a4(6iH}hazNX;Mu@&GYBiP$ijn_}?wEDbD8+uU(5`2Pb(%~--O;ZKOAwuWxqnk;Dprp=qYN1(p#`4BmL~o!*IFzY) zjl-&r4dt{)>>v$GsFHQRL%TS}sr8!dSW|zQ&WC`bl>5Xh-La;~Eq;DV!Os+n7nbbL zihbP4xJC$7x>jt43cIyP>X8*7SkG!eAHWT5fiZhd$|Y$g7JPB}M+6*Ik6{ zT%2q;G%jqi1F4DQv1;aX!J>A-`OHdoMsfvhKXT_TerTK^x0GH*ee2nVe2wfZiVSeX z`KPF+6u~I&P94vmBTnWePWPp{CpsQh!1deOnl6G=kXxWTcvAvDmVC=_rZx{Oz#5v4 zcK>14K;ZkD2PY<94W)SUlOMdLI$GIx{NnE9g$KP*fSe>-o>j@@{pMQYcTef0(0P0s zHa91B(z6^?5xsDHe2Tn3p7>9-;%5@*czOat2h()~Z`fu;?S^W7-j?+7_DDj&iOwZjhC zKsAD_&-B+{$ySIQ>t;{p9Xck^n6Y>-1_MbCccI;Yo(C+JVn)3ZJ^+LFyc~UG^w36d z*z#NSv=XuE`Xd6C)u4>oucwsXFQ58~jcW0u+}`A{5-0vn$oUcV*7b-x&f~(6IXEEi zPpZk2MGA4wy=OBqaW%@ZY*h}=S>`&H+MuN9KQ4BOp~98bTaN}(EgAL^9XfedK5Esa z0jT^N@Vx=-Ue`C=%`Qa4U?DAYG(GJmZTCi&A+(7Rhp-)HOcu@B-b}1*$l4~4Hzn3i zS%3bRnpURUA5P2#TCv9+bXJclqmc3^qro#Ye%+d{s%^napf#-UKx;6CB)vt#FSa$N zT@95{L1I_0cZ2v?({JbY4~Nq-3VH>jnMpOw%a_3>nj7{{^lobszUw2@i1UOY+@@-L z+5`HFBIS)m_iQ^1jc5)CkNaiJ{Skam!2_%y$9p;HYQt$4oBVbnUgXA4R-jr>cDgF{ zdRLcswRBRGNZKCN`%w|GLAZlAo3>twznz#Gwy(k>e6wtfB<7*pR5gZA^9xSiVJwN(rii`=-cDVDirMZS4q+ zW1_br-E=PXwa+BfP||q}8~Elp1)}_fj{-aGV?{QIWr*+b(AaGiA9NwTPeSF8GFrhu z{G5jVa+dZ+@rG2(!8?6~RXV8}yXZ(%Bk=fTtC_~$EHY|+7)ptlzxfPQm~Z{1?tRxX z=Kjq8Cn05xxIYEe?T;`;Y?SJu-y`bgiIn#` z2tw@vNpYURoejG4T>kqPrT1-S`>K_GdTt5nzHGcxz931$78~L&{TdWK=0T+PivIjN zmPEbRx-q3GHMCmuk53v2d#iIrS)!E-JDg(7QGuKm=-4T!I9LYtn%&5wQAJ5$1x8xO z_M&DoZ}~bbfo3oq{mZF@g2b#kWsE=ErHS4AJi6y0*!7;;!=m0tmi43*u(mE&kg9;m z%i6y5l?_H191Jv>90Bju28orlrwsyhbgz069zYZu5;P|Jz%KYIAR@C#A8+!>@*3yO zvo^$I-8U>Jl-LoXAlgS3Q|={?D(o9xv4lf-)%Z?S2<27Y-mQw#K;G^^t#hFYk6oOG zrN3YSws3?~0u4jONB#>$#)p>lg^xs2Xc!Hv=Y)h!s`T!2xi=DU=9pwRHjRYw)$Rw1 z#*61tV0NXrTV-`c;jU|@`Qo1QLFt8<;aQV-g|@_k zA)g|ZjghXC5mBbw=sSlWH2R;!eR2Hu`8zlzpJz1lOZl9tnbj*33|2 z$dTY92vlx1gaDoK6%~r6%(D|P=6chLqb_MXpnArwQG+6*tPfYR8IoP2%qq#~yAgfY zV~%f%Ruz~q6sbIcJg_4sD(y1VcXynGT#hPQ2eUU5CRB6FV!)(EmvxRYvz=m6mk;=Z z_6s~3>KD)URLY1oc>3Qn9O#^>@BMgHtT&f0 zu1@|`Mt!iVa-YKE;pR}7Wqdw@9d}>T`P@d_EEYLzEOnnW9#-|VD}#L_qC#8=VW{m$ zO|#j`Wj@d?!fwx?k(4r|Vm-{sGmz3D+Ok_FLDPXPG22=_)mCS(I5S;|*Vij*by~|m zF2m>R?DUf*$qhs}0H3NB5^3oI*q7(K*|g(78Bb%;mJa>IQ{*3*`)?$%qK#VA_owf~YPHhZ8N-Qlqm!5;MNkqO#wcM3<5w`SzRt9`sUeA} zgt23E{f!kPN8|By45Y5iLY6V{uoJA?7>yoX`gq*Z=lp$cQ?K<57x}4=O+!3SRDlqJ zj3z%p<*lCwIS zVv8&?9UoJ>^%QR1Pg|LFl4i2seufmi8t&9)OmpLNa^cEcn~f-M2>E+-P+ak6s?iq}6k8HocN@&phMm zC;bvn!2{qxh>oGQi|mj#M0V2MqODBy{5@4@=zM(B0(=UzX&x1~@SvglQ^hQYt6*1i ztJ1sYzt+YNpr}U81;!zkYn3+nblz*u!(i_mSn>*XcK5Lm%#yr_bd;u{cj<%#D!7PBdJgaRr`_E`f zZ#c+iG+HxYPK7g=Kz@HjfK007u|!-F(F(jJ#kqZC3~a9D~+Ao8QBcn3X1b?}|%n zev-}l6*SrE{^NM_m5y%4dni9>$LV(6X`A6w%mm;Y)`y#UPPzVhXh4#b=KV$yW8?F; zKkW3DrEg|y2i|W`NDv-GVF0)w5rF-3&99Lv@gZRLehKNm&KLAA!nm0*j%PaYD|0BX z-qN>boqqsrE=$yS)vu0u5yaYBiUsrIn=I;=g*(4pBH1bb2Xk*371bC1eM?9Pl1fN3 zg#IW2=?)1g6_JpV8APPJ8wF(O5*bQR6v-i!20?1*?rsnS29QDE-pBjp^Wu4)weEGV z|4Y|$I5Tt3-gE8i`hGv(%*)KfsLmQQ`B;g?@8T(TYWdymQsWZa;ZW1IJD`g@?FsR= ziS8fBQ5A1Y!yEb#GE;2btN%r>1XJiU&#=kzc`*s3wd(5AgH0QH6>$!du@50H&4b4p z@dPtK9Q?H&Xbn#kyH0W((bd~nucixPQ+i*!Ea2(FbVK@%W1wkP(ll(UC)|gGgxs9) z7+FN-PRJpv*sCYp#CBIX)yxv%L8l@zghGF!(%bu11iNkR+n>^4jS+DQ}CovA&DlbzTI=121c)&?72F)DM!}K7RKR<{{Hp^X^H>xO_n*i6nj> zp0+kEqwxDS)W_9|cV*>8Uj(%5rzqB2LwqnhP$v=Mag1rCh8Y1%%B$+K)3uCoZlTp_ zMH5Jf+FOLbqH3~2==vJ=F%FWWnt~PMQG*3urXtLfFl+4W3eHm9lX7dM_gpl$!nnD^GGxz}3v%-5+TtDYH6Zd_?K)f6* zB#QT%Nv{t$GafYvk)OLjV%A> z&-#!z-ITs;rRQSQ4SZ#WQWMEF+%hPj?*7VB;p9;}_U<)*`)%xJijXIwMk9LblY&EP z$2%3qJU}-htz^Q(UC{nfc08=9vd zr>z#=2yAQy=!F}BXVdekpjB5ZDDWjaPh@Zm_#364XF~K43J~!DQl-}3<*AKoywzX4Ep-7o2K|?r=08)IjB$xBu{ZvHEtH&nfi0*a zw;584r#pE4a?h*j%*=xywF?{rrkcpGx7H$BkyA!s9<^NqCPv>%TPcT@{)hv$d7(mh zp5r9_Iw_^XU*}1urt`u%tl2{)wiW%-az)urZZwDP+hrLD7t&h5R(n_*K#{JJ$A@W2 zRYFDxi{N_+S`Drg8pIt!uD$bg?o$byLF-uog3=e6Dwr#=%o#ge|C_-_^xC?4H9=TT^Qrc87qB+yc!SKS@EVd$J! z(jTzv_RpzM#ikWT()(^W&NBEf+G+VVtwd9g+)DJqk;GH{iOL=aaI+ZYEO68ToP(5L zL+hJ#eWcgEwZqWB&6-ZD-nqyE8dRgC&mN1As)lOZNqwVjPTLzn>$6kd@!#gVGET+V zmNuHq(8zhOq^HR-vhlnHuaS}#x@5WOC{)OqA~UzmkNwZXZE005M$B=6x8Wk-J3bzL zo@fw&YmIt8@BvPt)ZhT{77tdqM)f2j-;v{-Hnq=4A`XWs(OX*aL}>CQJ5G&g7;p4W z>I_6?;1)!`8h@N2qGYuNx>T278!04g(HtZWWtZ?lPA)|YnX_;^o0iayGEt5fj(af@ z`}pJUS{DOTgjn<4H(|M&Chl6geJIC}5-F$jdvb2=yAoYvn*%=5t22`XoJtfsJrkdk zDn7xCX=>iP5`|Wd=sCH!EDkr7|7LmqU8q1|>!I%Kl!V%rr`%~m#P)_-8BdOKApTWG zA^aE-G~5$OuB4E1KM+TXf3@v}IVtnVw)D|vnp7Beg1W4H)X<_~ilJsAyj&izdA7uM z(u+y{OMVS`tN&Sq@Pcb>`Z&~;LN9n}T9pbkFkC7WJTs7n{!;BO=OBckVO?(n5(>L( z1%1@wX>6u%CW63Z|MZ=?ms1Fru(pH+R1Kmk3&b9g1+;0j`r4PN=dt=Zo%mm7q<0 zb7aV4G53x%nb6s};!KsAT33`P(add_M{c`)Fc&UvHyT3QG)L>V=!q-5(ao)cu7BG@ z8;O{N@{gkQ{67$hY>forT^;g@S+$jR6s$`$lbIr85BiEPBB2SSKF3^Y$^VEwP7Cn`+OsFMoz0*mqn(Q#-s`n;u6(tqIj^vRvNO~H;L;Ghs ze~D{^KAwd`r>{Bu+sq3Q&g*??{ybHCW54p`2Piw>np)VeW`tA}afd5}U0p3$mH1Q= zi-0LZL;fS%3LTTFgc`+oy3E9;>+34nEBip+3Bwelc&*lw`I%f^b%rz|6iF=V+O;Zm zVq+xczK?|<5RM4LY&!wGb`OLEYiB5crf9J@Yj$7ZH@yA^H0KgUTyGe4I$~if>#DOE z!|FJiC(eb!^5XrHbSpaj?V+t~_Vp9%z!A4!i+xc~b^Qm)^uo^M3##a9q;NWwZ8N%b zq0<{fQFW)x$_DS;>JZyq(i7%6t0AMIb@%z5_zQSSE-6k-KC+(8wnm7XjF!3Gr;MlqCm$a!L}xwV>prJ zXUy@R?4)}w@41#4A}l9`nF}^d#p&~J>UK8}#13Bf(QR+5yfMy2P?g7}+7T+Ma~wfT z?m~W*;oK7ogi?W%M2|O#LzLrFKh6d!D()`E$6dsH+`oIAOR4MqSv&f0-C4@_{@P2qtTY+ zy?ElRie;&%6Y0La1Of4P@Xp^6;1d~_l)E(?!`=;z#}9g^6NiSEt+ET?#o(^Sw^!FZ zu@fXUivL=RFquLaDpKVCYzLatR&dV4G>{O*)+@T(Fm_J`%;-`7%s?^g#HU8RW{|vn zLZHn#Nl<|4G74QrN@?~L)yQ@Zx^?rUXzs4bMo?!kN=nmG)v)WRu6}Abwy#_um!crV z)HsVUmvfgHnJm>;O(UJ9#@H@?M~vov*R_~Zd?#{KEA6~lIPnn=b^cGEXR!pjQT3=t zerM8>dJ2f)Y)Lf>ca44&ETD^7QZBY5Kn*v*=5UKQC<313ut^*7;&1$I{A1z3ga-DT zN~GsZ67U@e&SFm95`lZJ8$u{T|_dURVd=lfu<>m-UE#aoQdRJ0f(p?#A(Jp@mKc zsS@|FFaHvHiM$#QYs$c5l4FG9ShgAwoP(;s#LPuqoG!^s^A4=+b&f3p-Tsx8A{~<0 zhsoW!oD7f3e6?xXmV^3`@a2^q*%fBVZ^2!>&ysRo{^M!1lf+ki*XLFOu3@bGGFFjM zD~+eZE_z^F>zOpo*g76bSH zOdMN%Vxx86KbuR4=m}L(rCC{PqmGatx~d-c9Z4pVAmD6S{?~?igW1Qe8f!H}^=gMk zl_a$S@z(wAM(Dlw597FvPrU7O*wduDRK?jC!{rA^(*wNp)B{lR>H^Ek3(Q~luw*2e zf7`jHczJzbzZGAi$~~<=B&0~ROa^UgS@_Nic3wfhP@rZHKF0RD@}F*`?TDn7`M41z zNC|nf%QOrTr*Aw;@9di>^$Dw-;2y$1Y<-+-=Z}>6fsnwps+pF~Q}1wSSrdj&<-)lT zvYU^q)%)9@Ss<)piCr@C)`aTv=T)sFLFsO6vcSMUe#)k;syjY(U(!RjjZi$-3`TP^ zfHQ%eleW_*DaOrUPEddlzI^3_ozT8BGf(A5Ca#-Wn$35nOrLN5loO?fi^AfsN47~x zV~{BQ;nTOTs;15HVXz-)vAPB&g+ss zl?)gk$gaj_P*gdXT4QkbGgc^N-2<41Ydjk^a}FzPNh+|zlY^4Kt(7G%8FV0)_BLbT zkJj_fPi4T`0>nDEV3*`a=R1xwyk;Z3SjbZ?m) z&c?~zPQL8A%zZO9>y1u1?ePquUN+|nre9KfCeFHV3g*x8D^x$Qfm#~^+h{2M|Lupz%!W6tJZ$dvDIG3_O9 z`#H?v2FMzkI{Z5~EhYE6JG$4@XN@VE{w!wI3yn$tdn=1zblHHNdbSEMd_vDy+-xSX zoig1V4fbkJX%+vAQ#kPzg8Amj{vP?ddLWa1XMFa|-)DFAM1&l$Hp$$DgxF^XgUDcI|2|J?7v6IfrIdrQ=EtkF4cg8r z1Wtn6Y=O_D_SSgqKCMZAUoTI?q%68JK%+dI45|1y=Qnj;dDbmhF!StKYWo7c#_=uLfU@@E-}Tp&hKWPv zq9s8e?EPkD8xARxi(?xq_`mJNSRdx?-8P&*H1#zUcz)(==CO6%Qpx&3pdq+VNCF`EL!F(<{g}9D^ZQS!(_~C)XUuiuG$_FP z^Nw}-Y>80Q>{_>Lk9Ax!-(Fy~x=~*Dt%wsB^EpTYTxR7kc&qYM0ZX;x5vfTB2R?<(h76R8{LZiKuOl&^tW<23G zeyhi_%Z=twJq&9u_YJ$L=@n*R>2?_72IOt$z&QW04Qu%Vi<3WRB5YcTOeZ4JT(E8F z8g*5&J%0zOMevMnJ2e`5uIumKnPv_0^4ZutS(!K=IqQB-k1QPj(Z@SK3@gs)4%55z zSniCL!#DN+w%u(!t^f#2qQ(#>_YDxwj+w>Pn~v>T-`!^R)vEcP#*yiM1h;NwP5*1V z$D}4iJtw{O6TKTW_mmX2D?CY8xw_xRW^hI)m9oom*$3Mm^u}1YKBQ?!R~QCT7nMF7?^)lh5UK zaQV0DW;l&v3Gk+9;1J$}C+g7Ax9|l|G#1UA4<~i}BIk5FXyRh)AkF-kaF@wARc0$O zLS3k)hR*hve|JO56MHi+A$}5~o!`?X>Lxbkmu(w6cYq{eOvU5`VC@tQh*5`@dlL?; z#}V@|<@_qWxXQm-^{vS{t;n;PXQTT1b_t z^9TMuON&+??WLtZLRU32j>{W=`)uLXf4EoI^h9$zvMDiDhh5`v$}gKq$7E|RM;)>I zMJawPslVx)YR#T8<&!1fvi&-dliJjYbDZm9uU=f=wSQEsdup<_lXQVyzxtC?D87GT z_Sm$r&}93LjkUoXoXtInty>xdEVET}DaOelGs!~cd70|-C@;guU%7_2)0Yn&y$mLI zHe|NN!1noYa^d$hCdmA5;a*&Xz-F<_Zvkrze77)tXpuhVKfYf<`ZWiAO^IWya!aPG z&Cj+(V7KieIIKb+=`}swOP?&>z`=!rDpMyf!u__A#|UkjJ~+puSRGTw3TD9q0^ z!tD1$sl~S^;^wBV)1s?6tb?=X8+<8*E#kgRs`g#P2=A$?xU_YPQ$EtU{Z1|GX!tI_ z9jmL|>~7<-=1JPF+`930}yOKzcl^DJzK3|#l!lI<$SDKxA6H&^Hy7Z%>DN% zW$L5;`YBjy8ec-axN~;*-beco!?nV??60aG>v=+>Y-E&btd;wJF-~JhEk>>I{)WF} z40YrJ9RJZOJbXGUNi=mv~5{c7;?f9x@4oq901 zSk3a=y#wH6b~RucK@=Msm1gey1?4ejyb8d&tdb%;YB9GAD5O^6T|v8jbPuAd8ap){ zZM|y%=m-x}2&j9|&g2C64xp~!fS!wT*FcEyQ3IOJ7(khORt@MyTQ{f&fPvePWe*@) zpZNyd1|{@bb4t)vPKZZ_0qw=7|0o!FQFBIyXcIu(#TXcxi8;G#%Yt6mDxmc8`+-hW zbAm8+tpdOgY)X2VD&*_}TBfmk z;B&76G>0by3fX>q^ZPC|@QD@c>^p&mA^zArHUTpJGQ}EznBLwOS3QEds;2<3Ve%>c z#e4M0oL?Hfxp!`sN)812Jr9BgC;x~dA{c&AH6BZ!9Wa9ufD}&Y@K~u=j2Ih{cYzBl zrGSn-h(ST49%Epj-o9jqPr7ulV1QZkVH1os{2-;&|0C2=y$$i=)wb6Ffs3z$)o+I( z{1DjLpEfW%H{%_hfgzSOFkL_CIy>JBYWn*-LV-WSvDWrF5#swfRsN`GJ}%QV)xH$M zkASxk!z19@?db)c4u~H(wykIZ+U&arPM60{1`27Wu9|Xl;r7qybUp=Lo&=R@wQl(w zPugtz;2>-P#zx_6QUs_n)4;>w<^KDJAl70m4J^etAd`V0%IMwN?Nsm`7D&&W?KL&c zwN61)YA}F$l=;p2quj|%MdBEsw>{l+$^?II6|{kisAYMl_5vrsZ8XmWlNouV(rI9A z-}Z0@47~BPSJ1$STTa)w4xHkAxF0Y4P9R+`7U&yxojRU&vd9X=ZJK-{Jqe-`a>aA- z2hh7B5!b)F!o_7ju2or(*h88 zs_v8;ZNh}DEgY1w;~uE2CK!w+cv}Jn{$JZ0fWxW zeNY%plF!Ab{1lfT&_-3(_O=qhrXz4HwjBQXuO&B-CHUAcvE>4kM7A89^9dwFu0lva z<|&K6#XyYk1Y1ySBV`oVC>$B%!33W0=P59>?qqH?BDQx`{b);JazY<;8dr(%(ix)Jhefdq0H^kIW9?v33%lYfTq2!w4@s2%81Ju=%Ap4- zmNS%ZKPsPm?a^t19jnz(}{0qpEtxWrDGjhZEbKl%z{Q$FU`=G2vw7&^d3elK^m zlbd$fa3IK+WFwDTmx(c_M)u`b=}=FdW*R0bYz13;wd`#S7g^{m02iq{RSu*sqv6Y< z%9lL%`+!dg@(Lar!h1C$AP=0T4*9*-TlhJN3~Vz)~b z4et(flaG~IYmBlM%O9vOxo&+Q+g(^X8GELSs_p6ZVaworkN$bUUht*(vyFXZHU1Wt z8@7PdLCvCb%ARe6cKw`1nlR{_mxh{;$Nke5_Zz;khmXEpE~6;hyv`#JE-266_&b~e zV7OHNjnyTi&Y4}z#1>!}&nm5J*m2?68fU$7YappZm-_Cfk8k=&3DfKPbc61u_P3`Yp)FhS41h#@@$r2Y7&V3 z(;Ou>`xnaAkNP!+_B2$sYN7Fx|14^D#YHnivv|j zAqs$jK^%haor3H@+{Sn|@ZJJ91cTENLr0Wk<7D$FzqS zp!^yp8$31sNF;$D1qJ`C0%TrLb}ZHd&~U%h-oJ64Qw zO?F6`5C6hHP5`7ie+Q_MKCaW^x_tnJEg4D{>47L!{#f9HTRY(;vF0YzReOqe82b70tKx*@8OC8bp;~HP`KP(tHVZc?< zXq8`4)n3m<0)XxusXlZfQg##7)Oa3FR!nVBj4@UgJ zLz4`PmHdDLqKCXQZoZ*67p^1ih1W$K04~fUopQqy%9RL6k|XTgm;sn00|E}$gszDJ znRxX#QT*8KzaseO)`t-kH2ua4+m;eus|uwqr3a0uC_W*(zx zh*K3<7$*Rcu&PXD%Gjelud*R>^@LPD$}rM1c7?T7e$n;4m%ULr?~kyV`bh7AE&yV$ zye)ze?n4PWbbY*L(*#4EJmAU|#)JfRz3SmZ6q$R5qpqr$_x#uSGSoDb8Wo58D5rEu@80+as@UxlLqk_mKLQ-}+EgJ>s;pc|XIwSP=el=O}7Ueq(hx;SGp9 zLH4tYZnzlt3I8F_PP(qbN`Lo8QilGjD#IORJfihK5FEK86UcE&bs5yU)7?5#P3TOW zTOQmXpFhIzS7^)ialCuUg9?OBXb{P|^fCiW4(&MnV8uK4dTQ4mtFHTlxRu#K5n*?( zt^}8rAV8hl4!`?Iip>LN`3nO3?PZh+hxm#=w0@dxA3KBFt8WwloI;PGZGsx?uYUl+ z_={K3b6r{|jnO$N^g3>zA#y_c^EZs$kZA1EQQGT#>E%XN#egF%^9m?@9vvwwK*Xt0 zJVr_8@bY0@nG`5J#U7G9BwQ)rWqRm%*eg+radn6HNdAGy*dF}n{ezt7fB3rcHX5-d zx&SvW>`)t+1{+ljm+2hY%`<)7g)YlCZ~iyO*>MSzURL#W6;rQ!h#nB1Im|}7x7jzN6&&boB### zt96%}g0Nbw$9yxY8?(?G-fRU38Q%~xv5o7B}o{q}E2-aS&) zb_aHC*MB0B_xHLaInLLxrZC^Dg9@3>6sVZ4@ol-9<>CM2MM; z(;9~~{oJCDlcW8(H0(g*q(ljin0_243)i8S_d|4l%x%Eo?Gat6C0%%udyqo1c^F-PfGps-AaCb~0j{C&(24T=#t0GkKNM zns4w;xfrWlfvG}{V@SR>xPM@8#|uNe<4iB7riYXNSkh>o&bimaqUlP)nw@O&Wact!JWgV~*_JF+Z=BjbSQ%IrJu zv8Av|ZJJmXZIiz6F#9lBksBvBIlIY*gpKcGP`nX~zOhMvdGeNVEiShRmbnKWW(%v3 zw-ee%$y#$V2TGoaOInS04sd!u{Ko(KaDl6;i-!cYTw#fJ0I7!^+Fh7-uwfiu$LYc$+dEUv&b2)*x5hmV+EG>{$8u%FtuA zhW$)!ltpkuVFvRGtn}sl#LJGyoB?O7ksI@WYTx*Wa$6GbJh?m6e@w_Fa&0-se3`3x zP@?vppoUg}y=Z6H;R_k&fM@gFwR+V6CpmUjxrHQ06{jmiMvI<&t4^Rgzjh1x#gdwk zGYE(+3z=8)gwhj^uS%03S&75s$*}Qh+r4h*<%yPA(rR?oyulw7;Ng`@^M8xU&ojud zU1~jfB$ijh+lxsX-^7qfpVFQWQJhzMh*y1}&A+N-`oWO4NQd0=A*1kmXIXnhS+Gk6 z12T1yqX`6|p0>T z;@Mhzd1Yq0-RL@Nl(f`?0Uq8_E`g&rts*W|?*hdZrD=_CI8Cbil`LvhafgZS3&_|~ zK6gb<;fLVc1b3>=b@Ra|i6&3k4U!V|@5yua9;@C6k;rrQNMIB0`lS6*WFW24O^`E4 zOIU>Tgqd^e1zF^y_!eWePt5tR?{&6yUEOSZ=hEFiW3*XH$-DQS2Pw5a#3K;EE|amS zy?Hf(F$r?rT|>P0ET%xTcX1Hp$gD6E66}~#ebfv7ZM_8~!X_*#(l({;4Dsnn84esw z`K;nJ4xdGFql9Piiww`;mVw~{WII3+M&H7)k$3tWIknsu!WVbfYP9+Lm7&2{VF`*0 zUJJq)?7Acij3Ceoh+%KZ&HIlO1RP=x0(L4L^3uy0*;bS&*Yd72KjQThm#{8cxvREw zeIj1iG7g`+_Wnq_KGnyf!`O^7odKr#uDF~l4 z{wC$%C+aARhb^ypGnVwUCWhTkQV}O*$S3X3k>W~HC+rO26r^o)Q4@M~Q%a@5Z6ifFvMx(RulwE*A5{0VXxRWY^Ujn9reh6!3ejD|1 z9$sP=uA2eQEVFKo?k&{a=8{en*9KK<;*%OBrKLG6Xxm4^*Pcjv1}M_uU-hU}yYZC` zOY0%sZY-{;#U(hcOoOtje62C^g#z#ON3mFj=NoM2Zj#Kt$W}{BKGZ8@?y)r~!kNWS z)!+UKHsYMfwj4GnK7F_E!ZQ}Of=Ed9dsLqMpyPw5mVSwi4O)v)$G(j8?70>qm+4$} zZ0&WNuy_`(SYR0#zvA&(#MX@z{o2#RuAdVlfO~nNTUh$T zANZ;;GLc284|i`7txKvP5ImK)vj<&dng4^WBU$K`&YZ8Icw4`ja$U2jMAbCD>>#Wl zTtXf26l!bGEil8>0(IhBxExMWig@z*d$}T4TOvOkk!~JiDkU|fWBizSc+_vdisODX zd8G!+%LxzQ;FWWJT(V9g#j%?3X}R0&6ACRK^+f9GJVD8Fv*a^ej>WiZa(l2S?W5t` zW2(IEg#SJWQz)6_WKOtKb&Re{qqi#>+40~xPRwt)^&DPiGlL+ISJHerY~w^6xRThH z(TC+ktPhNAhvaz6D%iVczX=|xQZ2Mh&t$6KcOjlvdd3y4#??|+jDM{YW5tP8`+flLprqPHL z(bUwf&LvvRG`1kKvohFzjWIM|3pfv$nBaRCDe@fRzux)%jSK#Pg3lu?Ti0Bd)H&} zPv)l@e3S2oitwz$UE2=wS6TW*(C>L9O?6vTUlJs!x0PI{h@-`;g=y{Bzxoj_zGqY6j21k4UyQ|n%F?-cxCyHS4Ns0nY)_aU+-)5W? zEKmK#Aid|05Ln6;CMv>Cn)j;s?!`^NmMu*uQ!PP83teO|oFuMs+V=+6fRNv{Kf1ch z&jZsH+LhVj%cQAD<&3CpiFo=ri1DJOUS$n(4-ojpaM$s4uHC9G(stV!i5VH`$eOI) zKN42MvEEhdB-i|Ta6A2Pu{}0Bp#8C9Jd;$flv|Gr;SBTT7nV#efxDZGUr0NBj@$y1 z2o_1E8MeI7W}M?dFh9pzvz7Z`!>#y;L(hOUFoVVGc zHh3=|2He`2v0UXSVJzx-xZX~GzLjy~mo_PI9f$C%TocrxALXK9BUD{TRZe&+ovvy% z^kMjaC)s`>`~Mz!yG;f1vr8s>MP#&;yQ3` z!zejlYb)xs+U3bN%LH*%`+uuCM-YyzEF=Deecyk?Rmi0lo(}XwvIkp@p)G>Ah=Z~R z{Z!b>>-`@Ouju!a9-_qi&O@(n`yI6F{^7{Ty#MJTyYYCNOVF9O?t7b~pKe5Q zH%5~x<+Q8MgGZpt-+?Y~Y#`gqLKPhm$B9QtcQl~gwyZhHij9i&t^G&(cSCPXy5@x;lDWj>p z(O>oCNFICM*2gaBVG>d=5ms6GF~M>lWz0DlOT&J1*w zb;j<(c)B0IpX_=|aVanUZje_JU%S(rCCOGw8=t_zHA#j}Pb)&&vKDJw8#$3peQsi+$Q+TtqR`s-BkA*V@id?&N`?X%-mGz;me7E^$L#k)?5`{S)oTM+A+RrFzn;S2DcQvozV5-=$ z=^F5>w(6ojwIyRT@l4kA(Yx`PQpr~gKmPh1SPgU+qM*B=zgB|QU!i?#Rq_Kfa zpy)61qNtg_q2<48z#*{0O%Pr5U+|UL;lxvKizHW<;@WyG;#}{DB;T+~{9Qw1T=c3| zzV+$AxtLRQl`Nxk@ob!k_?{@5KavD5x5kiXI+R_25KP}_VAPr>0aWR!AH@iNY^u|} zu0&O^u*Sdj(}`6FjpU(&={qMyRF4oQBJ7yxIhyF18Navm8ln7MXx5>`*Tys;d(=O+ zE^h5Uvc&dwgWvKKkOBx#k1O&tWET2f^f07a##H)Q=kAbDE=&z86Ze`!Aelc+teA%7;dGjR{VyHaAP2VtAxHt#;2QTAEs>5-I(yRnSprzy^Iug&epFd+@fjBjinveV zVI-Yw-9>Zg1@weg`J9@3k3z5qQ4G*OfTH0Mhg&j-cmwp!P#%i;H;z`Q2b=gnC>xdN40Hr(P~=e~-c+EF z^>Tke^yL>JEBnTMZ&y6L6Y|`~)F9U@kN)}fK(|~FAo@p|2X|W~p-d2K5Dsuw z8dPII)R<9NC}{3h6oKjb>C=sW7ab*@o2vuKD>KLFc z`4<6v0D8rv2iVsO>mZ<11PWdN{jg$I;uQpGGOC1o8{*1UV0c&oU!_oAn(&g0^Pfw0 z_Fx*c-kzP+gK-7Y{1f*&WL8`QyYHay7(m3(hUZew^)dghesSIiQYHQ+RlmscSwkQ8 z$)rIB)~o{9_)w;}${Q#Z57_QxtwFRJUxSo>n){Ix=&$n6gZR2vm;F-fDCsO>W@p9T z?gYBi(8|t&K8y1$Lu>H4*m#+AxIVoA@+y&zi*X<D!R1ZV_Ac=Jp80^xn$hY~@W?(efd&NJ zL*N6JW-YUKkx;$IvXuw0aW9VT6Wq1&8iTl=4(Byy@};FeK=QJ;)eINKBNnJwRF%@Eh=;{&n6N?eqOG{!}rBEVld9QBFaZyoWb?z#{pjQxKDbWq<1(ub#cHLTfC0sXkdREuaLu^2r`(B z?=Ue*P_bE2#6OaoigIyo>hb!u1D;ZYxfgG4-tA*@sC>ko&aQXzA-0kTXm6xz-ET4<_fXXuzEaQ zqVn5vM7TZwY?UT}KTCorv+U82#gHvhjPJfSHoPpvzq9=SRh{67BG9F4sob-5`Q-jt zFyQy2rrtYHhRdru1z_lYC9X_y(5VRKP!`Ehq={e#Csi!VBeixuzH)nB%)ki`fP#eI zJTH@R0)dOg@GDqRD2L}?oJ!X&6lBRwf=g~GiwI=0K?;W^a{OfAqzLH%H^Q)EW?pF^ zvg3qju+Y%i>SnOxIM~$&kH4JXd}_29kk3u_7n;XIPDyD;(Vn|1r%<*f2JlyN2T6zU zDH4)yz5O0q#(!c|%V_cAl`;!jyw9lpM*eCRZA7PWM5|kWD-i`nnhN>Q+ryHS8uEzB znQ79Y$Gpn6NpuBUs7opH$wYDjTbGj5CB?Hy72^QK>Rq3!lBNL(y<*h)9|b)MBU)2# zcB&qkUG5Y;Ay#&4B5vW#H=^LGBOj%6UihBy?PIkkQ8-{TaPZ|2keqeKp1B zU3#~>R}_&`u0kz(h*ER*V8H?wW%sDUn!`nU=L7nZFZb|m3Nwr-3}m?N`v}{YDQ&c zlq|wtBnvQYSBK&w{)#`?DCPHo6idIZJYJunwthxWGVs{yZ(H+Fp0!E%2qF4$pDQc= zuxI>z#d&}bs?G6AH$mn$a+ohi^t{jK_T!0`C+g~YNX_$OupMAoWJnCEH@rddAOX(R z?2*yKYrm!9+4*&=H)lGCcl(V3adRh)hJkKAr_SlZL7v-_W*d{4ocN&c4SLj-8* zbBw3rnMRy_u)nny1PRy{lnsJ0fYlv4(N5&?g%(RDytM~uIS!WDF276r>av#q3;%-T zkzZwZUw3sX(!DU8^=dks-Ksy*{4{FLI`Szecn*Yg9{cKPigOVpeKCGpq0&F}-c>{K zIJA=g8E}iw7uA92#agPwp6@!b3-z@r<w@ z)T3D35^ADirE>rDZFWCQ{?@h}Nd80VZpm_|GS9fHiNk?X?e2;53zGJEk&G*eQP(MS zKC3@Ntgt6!~~534r^Ks zxh;3y>gTj!{78xfF9g3%{QXZiF|k-RHte!_wsa@RO5hev9kiX6n$HxK@2>KoKv=2Z zv!rL(Rnf!kcCZZsdCkgAT}p8rVcV!^_SZct9&(coyOFg4Hm&Wk=Y)fxj?V=MUHn*T zs4oT>I&H?(!WK@Pg+WhO(1bcq4mAzaRLAIt&eP$mD1JB9NiPplBi&d(VKU7d+; zf&TzenSp$x50FOwr)qWo-?|M0j6=Sl#NFl{NUDHR@QyCq&Xf$pHrw|FHw180a5fRj z(Qj?Psiaw=UQY8$fwHRi0H_ql`@eU~C7wy&QS{PBJM931!UV+O3}nd0s{w@r2JGkN zj$jNK@>pMxVcwa?Ecp;BWzV+Oz@+gu_@#BK0RmN`Sfr`!(TM&k6qy#_^LM`k^Z8L; z_jYNM`DGxePqyZ1uhni1t*~17WQ>=GfKg|eET}P$&NNy<5%?4cGfNJD3wvyD?Oc;L z^9jftu6704?FKaoMs?19>+WBb@LR8v*P1e2yOm1~_llg$;-gLCI*}88>UhK>H zs=gY*oF3eEsRgO#S=b_A1l$406vy5i(;$%dn+h>lvh;2AOL#`uM8wZ-yzHK~&+h4a zt^46(pulbLGVtg>+Vfbuzm)rO3wuyC$sF`|fAlm990ZP>0vyAbr$(xqGLFIn1C}J! z8^OuSAmC{Dk?C+L+ar3G@SXE1XTeyp=?%lDOjE8!v#eHCwPoPA1E@NbTP`ue_G4_$ zyCCUX5QGF;jHdV8#6y7uoFo4_frIu5v9mEkAF~3ac*?%ZjM(`W`Ljn}6@8!n=0*gQ z+x|=YHB^xLATVCN?LKpfp9KPV(Sc6N&*Y!;l#_A@A!+@yUdY$KdHSXxqqU?yCt2@K?3 zO_S)mv#KrM(sc)q7(WO$x-Ularn$xW#tIKXYuU`t&&RV~^Cl5+@}7L?*|d9NdnY{1 zbr;N;|EUost)c~99gp;Xue7nc09it}0fR-Ww}>9q|{Z0^G?9GVr|eJ%gx5Bvm(@pezkk7Sck=00NuI4 zrNg~nq2@g*zo5YEe+kqc8DwkMH|C+k^jW(g61I`%@?kzNPQLbqp)m2}8~fkT(RLE7 zy01DjK)dB(o+MTxW`k8HBE@PsPNqnC16BWsUeA88_(W4p9;NV8+z2z@_)nuR>K4hP z7Sil8*?^x^IHGiATw6xbX%RE<7e1qF^7v746<^MCGdM7TVh2WNi6j;JI!?S;AR$CRz1C|@ac_}yV` z(UhNb&x&;Ccxv#^>s~-~AV#5r!pofw$(q>R7`z`;rk{g=eyhmUE&~pC>xSGPqZBAu zHX8dC)o45ga_aAQgJZvO*X?Gy_$yK`fV{g_R(HJndm!++6v2_GPU?jb?5xoyZ^4@E z>1H?cdmz=?a^d0&Ry2aV6PbLe@2Z&aZj~|VX6kIvS}oj7h^X1T)p71H)63!sXB`-a zLN7~|h%_{$4w5?j>6`}`9}nue)~T6cc@>x9yQ(1ZhRnEvu5qTj)o2StnO;yvp2N@w zg4$uP#`~95+tSN4@SpNkd;g2I^9*O}|Kq+rYSXGz5G(XoGg^CZwc2VGwFOl(R!ePa z)Jjk_Vn&NnwQG-3V%DtHTCrylMJn9K|GJ;wPwr2x#uIQjIge3kHyisn6wxkb8-)Wk4H<5kKZL9ELX)RRMP*x|NQCW0;9TDtsZkDr?@ z5cm&SU{xU^eSjo<#f7BifyY*HI!k&J8gVL?Z<3i#x?T&S$0TnEsvgk9 zNcxaesKLQ^g&ao=?HRiOsUwKond3xfVgO6f;!c>f&DN!wQ@Xh;>AT9mg?i%^4fd8| zg@qdc;*$t?5IENDO&5#afBS*QIxDfU$IikKvgrPRPvqfP?a5ViY`>;=ZVQxB$$QUG zXe#;;${w8A%@@en6?Mcl-l%57Qdy&<5rfyZ2N23D__IAM|-N+>8?sPNJE{Y}m9`JbjO_%>&zzETQxv z-Rwv%p-<=weuE@^l|*VGp&C03K{L6Z0vV@F^WO&bbh|@OnB|IOazbn1<^V@?G@JHy zaILC(rE1Se=E2Pl4x8icFOn4DT(3u|>>o3wIC#eX1lzygqA%1+CrnMyBAFyLo8eNX zTjOn2tY+WMP%IPi5`)fDgp9J;d&)aM8&s#6=BWOv-gKMzB|(j4Kd$8Rk9$5-F3GPF z`YjI?)6PK;le|b$!Pq#khG4J7o-N9T+WLjJSZM%KrA`hGZAhJGL^$Mz_75+5*_eUb z3KiV8wh1wkrKuGB091dn`KK4=8gHpn8^@a z$*^1PAYCM0agVX;@%1}Yqyl|*eW&5OBYNem5CL38o70LLJzQuOcHuTRJ*v=P{TlyW zEJ4bO*I#oVxN(q?yFP<3v7}_~P0a;9%)|Ho3B@5byo8(isAsJ#X?OjAArn#6t%}Xm z)``A0rWP)Yzi&$P0f*mnkBro2+%*_L^K%xGIQ$0Rk;bUF4O>2HS5A#ny2eZv6fZro zo`o&nFjSe5)bygp+T^Smgo*4Zo4R1XT?_(-NRT-NiUmSBjX@MB$UD;Y{8prrUt;U? zXai+`%<-iJipMM8uo1N!YT30N5RSVPU9adlbk-D#2V*(j^f`^lky3@F8Cb7!0OmSb z*LCoE5J=F$!FN_e0xfq|>%9Ct#wQ8O;{q`rrtN#viBg-uSRba0!`S%g#_Yq;l)V$a z>7?@BiO;R%^c{hZEO({imW{UtX!hTkSk)x2t>GAhi*;eZU45UIosDdMMi4_V#%nH_y3`#(pVuVXo$+@5y4 zjs|Gnqaflx3qZg=2*0y!w?E4-g^7AP0>an>_Cd}#Y?R%Ipqy!@08_Ix4e z-p>^XXRDm^-X_yOnT3dwTDx;qo>OjIak+G@sHz{BlvIHabAgHzXQrqea{ zLpcr<2v5PnR1ybV8gryx0pp7OG9qahaSkns`}P2o?tQU_<%oB6)ZF5Ytgb)}mGn}W zKx4@`Dg|%!%FcukO_R6l`oe`VHXRu(rL=vGqgJwB!}nk7HfAbiKxPYNM(b&0`bQJv zoIr8oqdIJ+%xaf~4+q3%<3r4)-N;AFm_GG>Q$q9@EUr zBEy3&o(>+FUB@u|7crhBa$e!} zE>x9d(c52E@uzYi#@GJ$qcUDoT=ayFRLf1gIh^~0m*sc}ZO;{{U zH$I7(GD3z&z0IG>W1a>~AxF?KQp*c5GxV~&toxAH&rjpi9rL+T2OcJzNY~2yY~_Q; zUoG|~@0LuLQPN<#|H^fd<1P18ray-bHdF}`YFGM`fGZnBp$pjDUL?Ic(~u$d+-Dzt zKa$$^!p3U$CcLky?;|6R596R8fl}J@99!H%&uN$WJ_z~Geb!G2#+QdEbbxmY)#=3t zABF;jQ2&V^`@E*|lD*B*xxe`HYWX;A73r-g9GC0fFLZ>(PiV$t|LZu2yC%x-l}2@) zBU8`zfuS^;w!*AiM5KfsM;Of;7Rl$TNzl|Z>mC-A1>hIBIoh;sAlz#x%!oWVn-h=; zkV}iz4!3(Fwf>w>|Ao5BMwE$d15~k>1p48xoRl|$1pEmGeXBf5>);VV4`vULyR|#c zFgEtX%Ro1=i-f|?KI1vw1;)P}l5cXXQ|oN0^(K~f&ypY|#xox4y`o*GzJ z`=6RoM`Kn4Ho=5u3?sxChu%fJWGL>>o#67vS*(1UDWN+Huc8wYfsh@__keEk`1i>n zUhIg$xEVP&Awici?hsWSG=p=|<;v>maU3RbqlKXfnhlBC8>IHRwvo0wB3UVedrO~) z$fihCY28p58#5+&C1_~pR`CiD78R8mqYb@&uF*F8+}G7J9rP^E&0GOaLsJydz#Ltl@b2tIIrdrwZ*ikT`R1K`8^Suc zne`mFCnY(Vga_9DaGjf!bC2GPfKlNchif>GCe4o2?BYp@{9j1Ey^5?_%05+sMe{r| zvgKTDiUPLPULCOpwyDXHETgqt%y$`lgCr)7iNg%0Z2{Y6MJBRAsbiuIxIFDG|0!IjDl1z!_*;c&^mpUPbM1+)nw(J- z??4*T_Rn@|va!|tAe}P89=qeqJSzz?FJ4#Th!SFc3Hq(!2aQfeS8Q_Bdm8Q9nZcqa z5)eHZ^Ako&R9eZ`UEmaxInqFXTrcVasTPgCA~O^>_ghb2I3bET(IudnR} z$~moT%VVEg8{BU;ks;Q2?)F`54j@9m9N{QPL@<(n?+9`fhJ%Pz$y8f+u$Ak*Nk_}mkc`JkcGBeN>_Xr6dW zrd~)|&&U9oc)qu3)DMVqz94G#)T14xQU^^xuF9k&-P0RCEMQQFXS2d21D#$DDJL;h zRPlE8l>KFG_aRGU3fyd`14e^0?;Kwu{e1P^{5KiuUvEW*{eBMh6nlSu1Nx!k+X~kd z?OV-_yL*`>T|L>;jWSgo(Ta=%`(E}_x2Ban%e)lgIrMB@v7OQvdI2_1Ax_0Sh1DXS z=Ir5Tb4F%rdgFWVo-$I!p)kS!{- z8uDZ(SL1Oj=D%kT?@0}^Wf4V z&_Wlq?)EqjJ;CKy(8djHx$%m?*T5_gM!7~xoe#~-HglY`zprEbK@a@KPFUi-2UbGfOy zfF#3A`J0359OA@aZKXTsl-IM3MGKKB#3{a-+ zH~UYrH2fhzRVJEtGQ3Xye9+8iG*wi)v+@!eQf3$TgTnEbfA?9if!kj|kw?~eu;1*O z{Rd;h7A`r*w|Bx3;P5zBxCRuiu3d?%~5Lu>D^D9wVq?KBst^8 z)w71B6;N5h^-U9=bMBZ5%VNg%%}R!aWJN<&M>Bq>veUlJ?m^@V_Y3l3P(&rpx z7??~`?KAR7vRQH%4)APK@)C$>d)2kQm_i`o6z~`(_I@R2${*afffl-=uV&fu+TFs+2p+7hAQu8(zfV{=N<%sM4r7}7`d&} zyCSs~5JzeyS?xBAl9?U&r&lJ=f3 zZhm3B%0CRx>covs(r0;y9?y^Y3$--Hv}sM!_)d%91~<7HnlkE};%+$% znY+YS$ldefykpcS=kV!jYh;rhqB#&wI9>Xr_XAX7JQLgVFT8E~hWQMm`NmI4!k@1W zv$*o(7=9KqCfk;>QQ{9D^j*2JANgD;U!Gd>wr-mE2U7Jn<>K)Z(l`$MVO`|+V-xl0bfB(mC zJC++#Ems|;{EDniu1radO#q#C6<%sdg`Nm{2c1Ga!q>j60`n8L- zuLE(BNaMBDJ~Vk~-mfxD1fO**e^$6Te-z3@Dx2z9>4$0Lz63x2R$tH}3Z;pCE4 zqIW1|xg9rSkCOAhU;5fNe&T{t$U>S@pTw?gs{g?l`F9)PpF)`ZHl&;_TJ zf9i;4B!?FW$piM9w)zAVQ|k*2uda`xHs8^=5^9lEkp4QFn`tK0&K}k}A914Jd&*~Q z0EmUY<&RvXB_>5aW)hLFItJn&RoP7D2? zVvIK4Dq&l$=-#v1@Rx4Zp))XH*9wkgq*TYpcYgDVA8!Vp$k0%nDgITibLdWG$KY%^ zGS%3Qy-w+K54>8SW57_5l+r~~bJaj1+CD{Z3Y6noR}ezgt2!~nf`CJ-`lx|vb{Ux8 zR}|w$R+@Rv_moW#O64p(>nh($qA>|AwC{$dOCud>M09RZu%#N9!v=KE4Q0@_oCFMd zHH~D9eQ2{-Se#oQBjUYyU9}a=&h?*j3h#}>xN9u;8sX*GI3wBTjM||IsW|9|IQ^KU z7;Ap!B`kQo1Q80c`4Ihjdxm|cSk1|Eo<1jm~!ZkwlcG-Tvxuo3`={i4i_N?Tx zUi?zFZ$cLT;a9bFO;K_VUF}X)6qC?=RNt!nI!965w?78lY?GQ&aay|c>W|^yq?DsS zGemoOXLYM7qH}bUG#v2Y=X1<`g8@Dvd@Amx`ptz7Y&Dz0VMlA{hVpFWBE}Z-NEUAh zI?a(HdQdO+!Da`7jT4c9gu)`8M@l`o*=VJs&DhtC0lq7`J4j33D_+QKZYb+YT>yrY zhtwdgQ~V2c9~xb(z=Y81`EKALpArm$nBt?r6&VGqa;%IgAIkJ>2}o5xN@FaY@H!wvG{ap1WNvs7az=xXoY ziQ(8JV=f@bB0}SrCySZXSPd)hIc{3B3;z3{!iesgfLihE)K^$Z_j2Q({d7=nU@WNR z50zK@w4?fOYs@(lbBH(gZ}Of8^Sesr(|VKoe>Nr<-GoCh2X-cSxLD(`nU?KXRDi2x zf@IEi^8xu39e$c~Bah^+o2kDZHGE9So0DfZLxm;3WUhtsX!1TCF~$5De1s|(qUJA# zxySB{QNa&+jx}O2rl(%)l+%vsn ze)QLn)SIMrOY+3KsMgpq!$3AY_y)MQvw+IrdGP4dzzLgO;baLBeN>{!^?L(OxZDEe zj1@Emb)nVezv0{Bz-n{M0Q{MZ5&Vv9=CAf;)r2xgC%j%Ua)McT`MAK?h!XXzur{C* zz8<@Y#(9Zy$S`(fc%}GG434N?%Beb%RbXBdKRm1N1y$(8B;vrqX-f5-u$#Oh(=cTB3G=B_zF;GScUcqKll$OuD6 z_w_%guU%yh9iY*?!{TzU6A6N(z%n_aT($JU!o3B<8SvR<#iFeQGve0juW!@mLw`V7 zeY2KLv=Z>5ZzJbiqvig!qtd^^9I1x$*EC+A zq?&_y^bK=TaR48c(?=t3 zF8_|t_j3fp3|3cs<>aN*oVHX7UbW1F`J# zQwx=E!ag|pfp`Si9fy+tuo0Fmr^9fwrlzJq*oFL`o0HruEmu!aeANT#bhUSwm%T#( zhxN0&k19_E8%gBF2wP6&ZYAK!&VhU`rG(b%-L{va)ww47A~i1Z2=%U>|5DTbkw(wk zKUtmKMP$`1n&z2$2_gb6i4d%fbu6u=~Id$^n z*<{AFsztieXJP!nTUH)$O071t$kV2$4&M?4%C(r( zy2sVM z#Taln;By#%t<=+RWbnKrxTm()ea@Nw zB$|p>sLX9mm?tyvtTt#@GI=lfsMnIZZ9Ms+L3(S<2KORfT#i^TTp>wS@3NgII?#B) z55RVT{bko-q=JgbyP?yZ=zk_5BhR05E~~23Xf&RZ=3mO0=tri1l{ISTJ(z>2lpkYM zhHn;}iblyZ=L}JWwC>ACZJt=@s(z%>4FmfOO6m|%n1$pshG?GKgz$167Q!fR0Fu(& zYQHxxMBx5j{WV2Uw#Qq z-(;rnKDra)KFZrjM6xxWg;y?gPWKx@kH<3QQ8BJ8v|Iu5F|Z_skLW-wd_Z~mVRA^r z{H4FvR`L4A@lN?)(trSO($+>(X2@&7GRZ&uPTss?QCYwZkOL7_c%=x90mRWka5L~N zXRKXd^&2;}+9WsTgn$2`OJ2jU1IZ#R$iv+7&eDI!P1~~imjeQ6xC}=%8l4=Pk^q&# z9>(^x^-9savx7X>TK?CuHf=sz=n9`)4i+YgI`qcvYjD-9ep0ffj^lw|4Ox_EAw9%; z?nmACgMnAf=*t`ooyr4kGs36jYC}y!D)UTl-32xQ%NSo4mPSWCLegCky8c0AJUz-F zS4_1XzeJ7h(XyF{yGz_)?JLa-A`~gZu-zNvDBAxNpL7Qh(th*WWR@i)D8^bTU{!z^ z7y!DZ2{R!#LgDZme8V#iRzW%xH2Ttuo~v@&0^d6MB|)*hg;)W_Cag|R2jbbh#tYr} zqXZ!a2z2;sqe1V%0LSv?^;pyqkWQ@TOv=Xm#pr^fMf6|OBsl!luoAG76RVb=$xG0b z3r?+?Ss4`&b>FTLH1sm!Qp@0uUuoH%#03P$T02E|ce3&?$Hqi{qRZS6-$*VWMGW|) zUodANApE~a+~GD`yyTDg@;*FpH;<-2B!d?(RG@Z8dF{!F_!3@H5+cZC;hn22bM8w=viA;yd_Go_O*I+a^^6;-h6oMu z`ZQHD?Dh~pl7N`Ay~A2$eKVd51Wh)geLGOY{5uQ4tb5;&0y3O}9HUFgLeU z7*M^IPC;bS)vwp^@aB~-+OY70Xc*;L*HXgsnTlxfD~gSzn*)Oz)~z(4T0vZ)jRT}P z0xRa2moB9Abhw84_ZRQbVQ(I!#?RHr#SMc1Rf{b_1>`6PM6=s*^YNN%Ia^%!M4SpmO4?_QoIJK*6=k-KxDEH!l$rYIobQrJAuZi z$KFLk+KvLd$c;4U8Oz#97*8_fYx5!KQph16_GmeQ^nQ(}P@2!C-awgrjBHT!8jmsY z-2bLwTCG(Cl2>J?p=#Vp1vb0i@lSq6{NgGWQl+UD^d_|z@`PLHlG*WF6(tV#xzS_w zwFgRLO|`d`bER1xGrvlp5UYdz-JC?y)A(4|)qwfANHY{q8PV zoP0t?xAC*=hL@vSz)I>`&tqw5w_oC){MB+IQbrZ=_)_?;gMagLbc>dyB)TZ`VDI-_5a%=gm@XTU+1LE0&-k@O!kmF z#d{6g0ELU>;-@%|z6r$rSRy35Y9Sp+QfAeL5OCT%B8Hd$yyNZxeBJ(%VX| z)=$|yX)@9l9Tewk*4fH(Ti+Yc5tgi8Sx3l&UzLTw{26eE5Y>^**wQ3yJtALsCAA|9 zILrIG1hYsTq+TZ)1B!9$*WJEF-#iolL2P5)vXneZ)G|y{R{g1t?#d;9eelp zF${NP=dzTXUe2Ai&o3 zqC<&SqKzi)w}8B+1r)`ES?xe&yk|3F_(Nr96et|qbQOCdQ@BFl3to*!V8D$r5t3fZ(p|V2Y(SekXXhta(wvE zFCKa}@Xoe{BSp&0@!gaDuWiSl|0|XuMD(4O*$_YVciQ><1l|EG|0{1@5mOIoLAiO9tnX$``wew|$T^F)9=Fk-$a-D zRxiK3V=A}7m(B&~d9TcZQ;7HjcBN-dkLRbWWE{$WowQ#P1Iy)%e2G^Dw|#GD0L3kM zv5r4h?iPPHFLS}u8DnIfWa@X0;wlcu?!;hhpHfo9H=;IPG{-I``|=bXA>7F>SNgroInd;RIXch6uR9OlOLGWm+>4XDrOErkQ3Q<%lq1vUN^dkEVS9hHG6(`|NX<-^dIE~p zQW;Q8e?4~X$;IqpR^VYOc>pr81u7-f2ihWU<-1SFzd0qZ?QwzxkJ~V2<8VQ!=%>4P z*z{GE!Plx)r)M?iXC-bkDxWS|P=j(bqVcvZ$m+KF&`Y8N{C1DVOvd9WOCLi&G1xua zr(mP|3$phYeyCiYZ{er4kR}~Pt2C5!WC;)rhgSeC`ezl!b&8KZSf=s#X}hRign!y9 z9w`xHXDKVI_V#i!pB7h=d(|$LFQJLu$ZGwhb4h8iqupNn*`}JyC?#n*L@)rK%Eims zB*|V;;2e0*!|h>cgv2zcxZEvl_?=9&+ao67J61l{_G$7K%!$a%^ZQN4Himn7p<$dBc;nZGg7A5wJzP> zh()KrpTiZX^e|)V24Mq_i5$tV_#4jDpXz$J6@5skPsI4pyqTZWF(LwEb$P3^IgUHV z=`c^32mK5@#l43L5=+QOTdSkt$f#~kmiXqL^rcX_UblSZo zgBJn?p5XQ&(D3L}Bs;m&Ih2XaMgA3IWGBBAgzfjX!ib9fq-S+@H{clT+_*^1QJ!Fe zOS{NY6JVu%-}LTq;zsC|!@%gpe%2U}HzFbkmOP^AQ?%El! zMA0^nYI7#Gsl2@om#v1f06MdOGq(=B`LKyNT)C(Au7(?Q*`wNJ+JOefMuOldyy^-Sx>SDeJbLzQf zcWVHefN6}?4Cb>%d_DyGh2>Pb6KX#(hw%0Ykd1|1G(;x?wob7po-6QFY zR4Y)DYAf^^lAY|J)zCsWxid4YP!N?zdk1D81oi3=*wYEZ>NF?hYAjK3h*Ni)ImmGK zb~R`k6KaQ~=O$bY@;jM}-YDYDo#2fVE2#*?p_;|TPvf3jE7!f00%SELmV(!(!|1ox zff44tkwp4$)if!%4n7SsHl2W7%5b@l<#BHo?U$+0QhI$$@{G6pg?WlTh#CpfEJVGu z%B}@Ft8773V6Zbo55|OG8v1E=t6MjdbVrWH^Db&+0!&c4++N$&tyqcxDAo0$?ft} z`p1{3zbEv_jj@zOa;MR9a8|#VYowtkdNNkBWab~uQX8SI#%%C4N*8Lkc2M(?wHvwQ z9#qu69aMdSK6ZC(&yl97iybX@pAI?(uj$}ZbK(8IFv~I41di9c*SHf>8wbTl`2Qs~ z=A$q8#E+6aPP4+=2o%0k&=wr7KQdJF}7wjvl2yE>{Xw95?@S%Sm?G z4k>Z~3gk$4xn8UxBe}h*+=TECGgQ((G(2u-1eB=uGC0+XqXGuaC2(XDki3|*Pcr+M z3`O)qw^62U#?MYp~koDkP$T3pxGg*Zz2WaFKD<8go*A>G+`o% zUppXJMF2C6D-`2MsFfA+{@!rQSo%9D=+5w0Ia5Op9pY53Zm!7-s@t}MD0Zvb&f77# z3FA@4nBh`$f@85EQVIPi?AL4^SWmpeDe*&ooP+PeZ5WrTe0o10$tHDhl4_w+9>BX} z^omMv_?9^?=iG0d(Ah~TTZgZQG3s*$CjW127m4Ko^ttq`9doH;n}*#kk@&COxM5TFQHcZb>>;P(`?)g z+mjtlZBC<^%bvI{Cmg<`-i;>Tm@(z|Fz|M-vyncktbtZ-u~m;*zgFhG&DgN%OX((E zHf`V#r)RT~n?vK|X30y=xhAn`s4^sj8~iyf2m9bKm6;7dp;UaI?^WHDURBP&F#jf1 zJfYP-TM#Obt37@P-Vviga`7EHse(p?9M>Zht3P&&P&(8< z*QZd6{oNlH0CF($Ke<1oufGfz41Eunw(U#MpVgvcpU;kpW&EMajeH@mHZ`CvYpV^` z7od+aS?RWS(N=KplH8!0ihA%R?uH*yaBEGZ>(4u!nPw1gS-q@euZHqr*4+vr9ocY_ z7=iyLKUNRvimU3({#8NBz|uzY0w=Z`+SPcl+}=&YjScLDdq{C`yYg5Zt|IZ^p|wgM zcvVAew^RX&a!sHndt{>;u&%xaRabUA|Lpm&y*+q#s{25AJt(2hzt7kdHxP~05eqyB z#nM&8w{3=E-Gjh%N))x<4`kQJEob?d6ui(@BiV=WM9FI-TuNFz_6c3}wVd@Iz}+01 z@1?&fXLGnIH~u`R^zkzIJv+i~r4_vL;ZBoX*YNkc;ZeyLeeQL2PdoA*VK+hiGR{Jt z?#!~d0?CWty+w!*oLk6#@YLic-teR9wEn;S%0wt|BW_MxKGF`@jkyT=mOHJEy)N%# zX_MW=SfUeb$5fFRNHm=C-3uf#D4i{wd{p|+xYsV;cf?qQ9|TPK5#bvTwmff_E6M5n z$BcTO%F9TZs#Whe_P>cj?Ct1US>F>_(RBLu?C6Lt)mSyfXhO$7Qd<7{3M2v;EEu>M zJj_hT%cTc3QMd#ZU0lJ!Ilv~r4s8pYEB!r#m6T!qr}Q`bn@p`7B4Mz@rL>&1*bv~C zUooc@J4X}BGz{q(WquO9rjqpM{C6#Cy81mdPX7HW;b#0b_?7%e(&rGFI`ZK&(K+B) z-h4mQXm}MajZwOMcB9fn)ZY~fG;IOkNp2-^TKYxv8&)=|0Ze_)Khd|J|5PVIz|T_M z_Y>U*9U^VN)j9Ck_Xr;wvWQMdq&!$^I&!OZY{V0cQ@f$M z#lx5*_c@Z|H%UZek9CaE$i7pa>Kt$g$&d+84l%}v9!H_`6Xel!bCDbG+hpez-|HF} z0%vQ8z+9@u+qjUlZJqF?Uz(poup7NqL+hV--+`Pm3NC2IzAU?s{NZF#x%QX5{i;-s z38i=&bpB_&W<~QK`pf6l3gVShhyM`5GSb5rFY+kVZTt3kHHA^nmpNkP;ljo4!WNt8 zIX8w@g<#U-soxQxLi3kgEvcVLjCeZ1#Lx#aN<0sFU}(Ck$g82fd;$t-aE-sbQgupJ zD>FX1%R_kZlc~b0H!cubz=I~J)vZb{8URqLg(>Hh(GRX0gP2@Jzp(jiW6uZ43teYw z#p}n!-q3R$;={7-^9%CZ8+pltJ(7XP7;P1g3Gw!`gCYut)!q-eBTG6tRRSB-9}K;# zq$Z9-rnjik!0Ke8ywhE4uyLDVr-$GFoMw_Kb|zk)=#D<$cxnzboazfa6doqZ<#0;L z{|%Bcmi$9*Mm$hdQ3?Ct5PU#x_ao22HJ{6W6=zZHk~j2V$ zUv-`Ib5x6Uf7cu;vW?d5_7Z_vBDs8xA~qoY1@Tdv(E5gRBElZpqWff}uj;$_hTKwY z1`E0O;T`WJvD{CKH#gB}8v?Z?FRwdArkADr^vB^DudRN_ZKEhQC^^~k$ehtT@&uic zR|bjyK!ooHsgVvh4V#NKlv(_aW+G=FrE?>>sXt!smXo{imcA-yY{YiE5MDhBYns&Y zBz)mwv}{FJ7junBrW6?;%lH*|uHflj8$TJLsvZ>zL@0e*^dkO2U9coBWH!cV*}%9L zPzC#FX>-2j<>ltSV>zIjG^m^AS*gF z8YAVu(WO0|R6kQHWCgho&;7r5FA4NEHE}dKq*l4QTdG#}?#a7lH8ez_YN8wEqf2Tu z?2xM2RSiS6m4`(xnaNQMQ^hPs^*bPCIT@|jRwTtM=!%nMUVJHQaUXTNqH?nVP**#w^4?|tx%lCvO%P@j?58!jMyd1Nq!OR4d{e&hls z7Ty8lOQu}j$sT~KS@eA4&zb;bey*lT*i)L-mR|MjjtRmGg@I>~4n4g1FQUmkaRxR# zSgn}FQS&Vg4?;vY-&{(;C`!`K(~XjJGY>NOD$vP_!eV%wGD360*U^uJSrn9==?M&l zZM##`;|A<92hm93X^Qo8M}4rdEc2qUtUgofN&|V}%Yi$F>zF;r^%En-;2GEhk$nhM zGbX5Zj>6f1s_0vRS2Rq@kBoKkvFtX~1rY&;6&rE8qu$hvCkw}?Y2vU{E-0JdXs|jL zBY;skkT42-$W+XT77DhgU%o4+BLMt+8ohI2>A9#0XYTp}ahm>P$oQXfIn4qq2ezU& zQHlCTYQ-08u`HVaKjUX49xKwt`z*nZZOB01)IEWZ(@w^H3|6sKFW@3VUM<_n^cxr# z*=|H%P)gZaZirUnA)@Zs5oD_?_DxVkZGz}sy?D_E>r2R9==YfwWS6s$4I^y|bU$@O4E7Aox+Wz!kmO_N|I7Dr_ z9gTcSX*;oRQx7{v8;S)Twsb7Ew1j61$lV)_wT!`S(&wUGBhugMK zVnZVLTqht{gN8shd&pIQWYMc86{s4P-=6q;92r#2x6*g<>k{w{$6x@{kYHwDLXB!T z!0_e9mKpgA)i~$*8afm5_wfRBk7KrH!rMx-m08NG@?%~-lK*#{BbMf4s8D%d;G?Fm zeE{=qFE5Xu&EZM4a2WU+bw}J>%i;y4I+;-i+k2&VXxtiFRxO)WBs8Eg-ykNkHp;<# z(4;kZ{q$Gy!(z_kq&ke5yN@sIMpC4dIwbvz;_l2EB`{ua>+YdCyt{oPuDR2Lmd)i2 zzoyX@Xz=s1Y;=*U)>`3tND(DCTj>6rS^fexM@okSugfHz)_q(Uc;c)m_$#0&J_s&b zFa^aMM=$rChS+FL4ZYWCVgym*BX_JrK*ludwWyMMN6rdNs5$6RlO22iqxL$w;e&p* zZp-rgsSNKkEnR}x>r_NDyIY~ECH}1eUcCB6xAx8SgXzrb6_|3hry8*PYmB7n>z8&Y zN18CVNaLl_Yx?#ASM1{+s^E>=>!=C)7Zxo|T&Ny|S^|WYFF%DemGpoYr)hs5NN3;a zaH;JhUk2cv4|=nDV_ugh9yC(%^{-dXaqJM5e*W&Uol4w32!W`mAAt7mNr*ZA;V#&xV~_K&wVud<{>;z z=EcF{ALA`G5Q0ryRyu4p8uZZtM9P~f8VB+ zGPp$qpS`-#*UdE>E6Zi^XH&yyTi=3cBKDWdQY**U~NV6g=O+tEnk!+QZj* z*|vlFu-3>y#jK3s+1L9m#-h6YboW|S81(MhhzhysCeLm7~NTfW8uF0nHneDM8>LlzG@`YrzI;E!TzC41z%e3GrI7R z;kixlET6+Oriv%YfqnZymgC$%WaoF@AHivfspRU$%1L+Fyu|utdg&&5&jKA_F>5U{ zvUE-pTsQ!-p=mu5N*Zy~)H|U-h^BGb4F8_{{C9082YIiCF|myrEaZt#Y*VXu+v^#S zYpord%X{}!2MCUt^k&0e+<}L$HHNhX20Vv9SSy$D|LW+1x$T)?#b%c}JZ>09-(Lf2 zI^n}dGT+ml=6?` z41@G^z8j#0IKK0};=SktCr57)<yy8MDT zEHr1^=S*4r$5~Xwr&Ri&s_C;rmun?lghl|)H+X(cOmH&P@wCuOg)}Eb1)jVLbe9^kKr2FfuIbc97t9U-A1F-r&Wp4@bRF5vG5I2pJ zzrv|xxsO}+gZIk_gG-2ro+%E^%LFM)K%@7ra)QQU>=!WBhx`z?vFN-don-E)%L z-pB}=U7wsb4$dUwKei4saMG>2V(?$`PXaM2zS_v%fTr{v*`f5>4Gm`Y%>P5vxyLj8 zhX3E0kYm^w<`i5?i{dv}z(bvb7l(t?O$tL_V+aGNI?2am)T61PRJmP3tC}Du=i^%wp|a2&*W9$pNDI6Eh_DNcvd ziU1=s`wOChU|PlZXnpZ9CB+y^_h>QZLH9DIfki(G>hlIywGoI4VZaatNA?k>lS$J{ zpiEk*bG7s}_x>xkUE0@&NK)eKhN)6g0osHn;f)|gkoNYmD(xa`YvNv70_=mC%3O8+ z$FS7@D5%tTMB7pJqD}^2hXr0yTDngM|BtwIcQIx^_oES@u@i8^Q^yY-NkOgDGd$HW zio@ahIEUq9Uw}NXqtEzy{utyn9tE=g6jpqKzdw(D8syw}FRm>hWYfllFcOR$PF1>% zmlQ}*Vn#>?ElX0NOf~T6crmRNerv_ZH<=?I@`SsX80}abw)qI`I;y=;Lh%z(P%u;M zvlFU=-zh>a+rU}g<)@c7pE`mVI>v#%X}g>8ej5UeB!^{jDQiDE0pevPmL=77<0Ng# z_-RM5!7`~Z98Eu$-P*(~P_9=Q6=HaC5yD0i_@TrQSv0&Sinyw96!+u{1 zW;iYR1~zYU_7jGZId6v=n$*QsDyfV*JR1E2ePT~v<@uX9)FI|@D5i@Q3LEGke;+nF zNrB=(Z_HujUJ_@?a>M!+C=Z({FTV~A<5&t*oXzT-0Hgz~c&X>Uyv&-`XPMLuYmlwR z&nbm4$jhv~7~((4>GA37@Jfdq#M0XM6UOcM`H~t=+*X6FaBYB9;Xf##S8hwxwc zPeBF_WW%v(LF(eRiJQIXt?5tR#Xs&gXf}!U^l8#GD1WxfM^$Sr{XV}Ry`9fqk#&&w zb5r2&GzG+@JtWkKN+EpwZlGYad`1 zqcKWB*K+eJZp&gJj5CsQoV>MtoFs*T+R%Hs*XMR<=IRJH>3$?d6hP8F zN*M*P&{YW~=nCmX;iQuFj|oQNCQ*3nM*_>f!h?gUSnd*~&txJ4cR5@5Xa}@_w)$7O z9R5-&mgSoWOS7KZfn7<%(!&gsh2DCL9uf;MD1j_bQ;>LKHi|DoJQbj!)5#7IiwgN-75-%*SGaYLqLE z@h)8%B|xTiEKA8f>t?A={&M!s>jvBW5D{9)jZwT_esu}aM0IGigRC7g9Kvc`Ea6q* ze2|$T?Wkx}a1a}HYL?ZPPxFYV+02P-k|WnPlJ(dRavH(hD!l#v^Mb;8-`MF977h&g z+387A@R;9yR*8uD2lX$X_wn9SrW(cST{pY>gQ9*@M6BDHvIOv>EptCqe1W2l-*Uh) zGzQIMVY%AXeM4&SuN({kbepr9{k0mKmHp^A>x~>Nom{Y>4whcy1Sl8H!#_C0j}TX5$wv;TWoQX?6T&oLM9-Mexf;XwNcCO zv0LqC&gkKeQKcvf3(M3Q)mEvMGyqfV{*p|YZINr>JP!&516FPkI+9i#ePh<9DeNnqKyfNaTXCf48pxHnh5f! zvlYf>qQnH&CuoZU4?n$W;~-$L5E9$FnvVzQ%yIu%k#&FdxePUu7wNeYbJ#1N&iADo z)za|hs)b0f_s)GE@rnKj|@ZB?k z^Sm2v%oa^~Lvw-RtOQLfFMVI_4&ciRW#ojdK*)9mNdtSU^#IXwf2WJ%*YEPrU{xBl>`%vYk~=W+w_#wuf>baQ~o;EJ>*u88EmUEHE)A*LZ7%#W84(os)}X+iuY~&w~RRsa$GFiV9d&G>|jBC{8X(&-TUw^iv-@jv&H1%rW`K#Kv_wR?zihbPkawSHB z92mIrZirUb@=Hdx*)0{_kK;}am5p;M8x2+GCiR@YUHLXvxPAlOnwS1?w}@B-7B98E z#mY@tyV3Y*{SkI+8@w1X`$v#n{>5!C6NkQ6XCGlGOoNUrNNIhYpDnMqIO3Ll zaX82Ojl!yCj1Nr1K2GBGFl}@MuUP(z`j3-NMRc^Ob#0nZ%E5Z|h|HaoBD>u_9g!4Ft4LNpvTj?4F5@WXE&xO+-!BsIPM9 zUVv%jieO|7%dXe0_ff$zaDmo5zjm<2s^f5$dh5*t^J38KSbzV$ZR7N&0Mp&~@)A{w zgoM{i^BP9$JQg6?y~@H;N5wo!-$;8Dv5iLG3;jI!`X)%&WbK$BaYm3W6qF@KcNs{SX_z@NV&x&##q_!roZg zFM)MjF{#T!HTg@h24}LnLE*XR?ZAL2^}*#>i}O?xt`|k)Qdlnt5}cfoXB+DH6*_qH zJ{Mne=7vtDd6AG!3mNnFa3ZX<|M;4i$;QwZXiFp*fzXj(c|KzPcT-th2=w{tdduRg zw^L&#NI_fnB5YprgF~~B>M;=42UYp+VkCQB1p2yqa+2LyhGhn~^Z2hAC5mtO#+C`% zxn8aTRf?K5pN(hy=qt1+p>7Q6Yt%&4 zDfGc?07cC7WTOq`nM2TxBTTPqk&n@58*(&C_(ySU*lHLe&xeE(h2NUyWAY;Ud)axLwMrH32fFW8gqABJhrt%bYIz3v_Y}6R9aV{56b-L> zikap%8%Yp`MY#W8yq zjYNP7iPiJeZ27w={o!>xsR%$CsfgO{!_QzyZmII|&9z}^g?Km!J>8e?yT-kEy~P>! zUHhdRh_27T6r>{%9JjDrL&H$%Odj-pKpU7pr>Nq~B)Pt1Opy23eH;eYTPew0h$jm)x_sJXU71ajPgwdgS7&pU%y&K)M z?Kid8h&uipZEahPTTmN+BSjTtqB_)a^i#*?`pAy*D3-HTC!;5WaZi$hiIK6-DOkW= z4Kv7PCnAKu8IIz)P5_>Wh8?2sJgByP6HJ@wP>g1Ys~N<{&6Bu4RBTa2x&17Di0uK)QlV^?j(#Ax-u)&+fA-K z;$We6G|Z1J_uh$17CJ@wFb!aslz@?C1h|EQoT1UaA(|oQ@DwC3!(DFi<;?DWBD8aD()EA1XB~LY0}qJ>}Ui z4zbZ(-vJ?vkH~Yv1u=_^mnflh&%+tp#`8O+BgwBNxsfj)BB($m-5qSHq4fEhCmG^s zZm`4hLt^@fAbSew&}8w78!fIGWspgPXUY+%FY!Nap8QFu@yNuZ`!Z#9>}hTu#>;*R zo%3hi&^%Y-#pi#MGRYTEYTp0pV7+6WB`u!w;o@egP zDGe=3qmNzh(q!cdNM*poj(D$=0>coszl+I#Vd)6uWHj6W8u@sk6R7K1U`ib4ml$81 zV_~gqu0Rl{7-t?NbZ=Lci*a2ncr;xMLO<}QH92S80y+AA8fY1U$zQ(sY`8A=kfGj{ z{NW_+4K@L?tO@F4hhbX1B5kTAFqZ5cf#^+Dmtk;0eoJN4a_jveMFbX_(ZKml+#gWrnLm>*AN%_X!|U zK_Di1q*lV>T+hKbDXj%fzixgXMyk*rPzkjgcTqLWpNxys)K@N**UN%2flqBKhYDfz03MNz+7_&<({Yzc!+mNuEw z2fXW9g-&`yK$WTxbR~qz*HSY%wi#5wHiviSQGzA>3K2rmhvD{t5Q^z4Z93>HP;nnoxGYo zZHwrY?&O`wu03x^HI1FR8qZ5Zm1!(IZTuN2;kbk(0GC>-2Vj^kH5d?SER24-rN7po z{1cxc1bDnE8eq<7HDrmF7~J?3rO3GmLJV8qN8B=5I5a6DURrvBKtug~*Ix|@%_Y*d zFQCT#)lAs%mSr^LmytCmrZ<4XNRvUN!lO$fhp+X6$Aw3UCpA-~xMmXV4<(lr8l5=> zF!vWK*s!)UyntYQU$>UTJjXAib9ru)eNKuobu(S_QbO*+aNd0GR(LqcpPK1}U$vL& z*@A2eY9hpXFeT5IP(x_+Z$FrjjoY=V*+n%(O(3kFtk4{QYZ!GL>67sef9d(-)OW;X z{x)L?2Oh)&OFsgT4A;yo^fngAUa18iRKrDP<;V6_v{rFXoYAgl)nmw(G)Mo;8v^ z$>@85ti%n69mH=CLv8xX!AFK+@n8S?Q|8A|1*SZZX$9&9t9}3XqgceET}i!AHQ!vS z3Q%CR9eEii$2cYuRL(iqmC60X2*by?>~FpRVB#ly#@7Wt6OCXqkA`FO$r~9>Rmw)$ zuf_B_E1qz$lHioPtkb603GRBnMcER@U*uqS!T#hK(SvW5G>BVeA4CF)n-cZB#2D>d z?@fMbmS?$7*-l%8V?{ItoV|i`e6b28wxuZ5sO?)?PI~^44YWWe(1vi}Q^uOUIkTI0 z8SzEV1EJ$L6C}PUeb=EH&O%N2B^b^+_X%M<7W_7HOw$D^i7K6LqW=qeFxGn)XfzuI ze!TP4agiTcS3<6eQZt3)>Sd1_*>>ovjV*GE3qx6xTBJ%S7pT=dsaNs-Ey=y=Tax{t|XeIs*U)ZHCEu2)%$NYAIYshlV@`-cIU^&DnWyADc zozrvo?-F?t({XQeEf(?w5j5mR`Bk8>M{;-T>YrkvFYJ#7J61OQ1)A@$m0Z#Y>RvdA zeaq=2Oi6~|>31=XXgzdsbRN)GRFeF{bmu`9Jx=d0Jv*wQn|dzUCH^Sq@!3`75Wsr; z#kIjTr^rjr)1LwD>ENSjIax0w7GQZ$$_M~QQ>Fmv#nXG!;j(RU9`BO)vmDZgMu<0UeNP9b9bNDeM$Nh$?N1(2Mtf8Z{5ca(AIQ!By20?X z2sT#9p~ih2b)TMGE=V&KRwR9>Q?Sv|cJQnC6Em^?8!vrFK|bZ5m*0Zq@yiY>eEm^T zO0+7sd+^i65EWx@-B`m*n`-+gAA|2cl$HTmyFM=_AFa&9p3=E=v#|t{?0J|^M$`pR zRoG8>Bo^GY&G%HGqzr>^tVl8T$J!5hOMIVy%jkKxV32`h4X1`nWq9{m&A<6)a6paC z%**ECYr%JYSc;52_k#^YiatrBd-7h}q&S35e3%SHXbXQS&P%h=5{;Ydo$leurYZBR z{L1@y{Aq~J2u}AEf;!QM^Cb_K2%-446~}*3(qvE8ik0s(o-1e6HJ;CurNa8$jMFDl z!HCq;7w=JNWZ>F7db>=1B+`0%4x6v(Emrk+?C;qanU&)1>|~c44maHXD^p;=13e6q0DT93V#?AR9sxWYWU|L&tL3&nAzrQnlLcgP6^uB zd&%*~uc8~&)+`jxlzpXN*eUMAANvD0*c;h~#JO0C$fRrZ$~bqH&Ui*`;OIf`7m+Ma z$bjUl{Xg`lVV%G27%1ibhf~>MkRofZ#youf*RfR1oGzYm8tYk!QccR%2*=^+mB$7j zJt;2ztu3;i%wbw)pR$Mx4Zw1xSF11U8ms?#aH;;;Ejn3d9$&mBwh5h7A;NZQh6pRS z3iGWo)GN!pK1zM|M?xXY*w-JRwC6yHA3rFA z(a$k|V58Y@+|Xm^im+@JroSnF>qxz*I{-PVoJdRHYJ%T+AsnSFn>nm(QE5DO0iaD< z2c0jUz0DugT*vp}wXcefV?<7dc{3Q3b)sr?mSe5XFVCrEo$UmHL{Mmm#qz@Uv%kJpAYY$6KP@4!=(Ulq%|Vs z*S%0yjn+#Jr?IT>o|-g7eEs^}X7zaw?_E-vidSuSLW5NNyFvrSH8SJ&S3r{$MNfI> zbOW~~Mtg_N*@5C;7?yF_O?%FVXCz5QcuKDHKb}KZwP6Ixsuc(&4gBzsZBXYAn>e2# zA%d*{9dH+Xeimb1vuxo|1Cx3oeaWQjGS{k7>(aY$hFnMxt5JGfko($qpfv5W_V%*r zPAye#b}txc-n12cm%ljKx5R&+?Pf5=W=>bDeIj*faCjW3vd)qD<Aw>gAJqnGP0mpKh4=v;J<-$A27BjAEAxdbO!2Cl0WbhlK*H zze2r{x9&IC)(}Geb$aoijE26vDU8!S5P7_p|A~GM_&R{$y;R<^MkYumPBrs@W+>pp z_vs3Y8VFWNQlcDdu*tXgutXFP9a!_2CQ0?}(&aq2>78(3a#OHr+xy;ZzHd8K0?`>iaM6phYScbbjA+*hS`|?)5+xAe9@sHectp6t9 zvs2EpIeCBigC@}%5n`ay5J3^5Ic>SoHdtv1AbPe9-0qE#a7yLJ2a|6^{r0NHQsOl* zFSlAsF1#fF6bMIrbo_qXg<@l!ZK42m(tn}4_lEN2`GeY8`ngP|5f9T!Bi3urksl;6 z9o-S6$ftQW&&A4i6iVN~bfIu!o$MgAWcBQ&*syu!BQ-yF0#7&#-nHwAi++#CV{-Su9DIqG zt9@0I4*&4li{;-&+#*J9zFv+~}mj&Wv9$ zDh5}#4-ICs>7saBK98-%w-9)&ypx-8$!~K%HHk4I`uxt!{4PE}M%HVp?Ks(U0L4~9 zYQ(f{Ms@bc39_7TnvwiO9rJ_PLOK$ghKQ&5qC?xucbnGoCznDvVOnw3|4d%bPY-4v zGM%TmDc<)azy%J9&0E87`P11PBxE%CFYB)74Jo{%r1u+r-Ar`!A&_cMbu_mtPft;$Z^M1EM?L_y;(Ru$rNXDVh~Va$(n_z z?FWGo+0rOkoS$ijQeb8_H`N5oz@k3X+5E0X%Ge!V+6i7}0zf-#lV_)v9#+ZHs^K0Js$GJlt-Aq=`IJA&rN6q${opb z_r0|>i6;JZYzJv0Lm!paS-j||$hZCusXs*jb*m?uME~Jzi<|#4^9-EgzZl(85&r=|>CJdgRbY6_(?H;nn*^>s_bHq*p{Rh~Oyn;@<`6?fBLD>K_~p$-CZ+1GUwKz!E;r#SpT!JQ+R?=S=B6^8$vz43 z!zYeTEmI6#e;V&oD0yuMgF1gP&~G!Y>jKt2L+0;qd1fSPj!TB?e_wR%eSRcz2A1ng zRwrLjw-jWEz%)&YH)1r$^(-6Ouo*|#o;Dxhxoo8#(HO-%pC=nQ)a6O$z;^Zxxn_ds zjDIHcpQI$pkk60u1W^Ddl<_L_j~M7p&I+AnR%w9VJtTDIFr&4$0ppG5d&cGhx{ z-ss!k(B=nH7!DBOAylc^BZgpD^VDhOdRmKVd};zvvq*aCP9{qK)z5`-76Dq7%P-`J zo}I~4J#Az!{rxupS3E;0w`2=uxJ+*)QzPA}V(g|JBK{m_2%nVG;jk!>h<^ zWZrUsKp=xT|IpAjojk<{W&YQln4B5(=aFvo`!^H*qrCQZq+a{ygLd_O3-_r=VRToS z5^$aZ}{-hER(SA$a_S}DqO5IMLEnz zA7t!5W!d@jO8B(|aorVZe0-2|0T4L6)+KS%lC8(xiq4)ncUor*lYknx)u)h+DP@>c zEfKwby>(N>lvO16SyR1L__dT}Nm5lOI=yMX9VIGx&S5mJ5O`bb6xm1A9-9L#@b(r3 zZCugNy*S9z;8$n^9?z2@0MY+nd(}y?#87$AB;9ut?OGCtg{S$&NI@w^Jc2mEJV6w) z`kS+aI)qK^j*8yz#w{3lc*mb%1T~jCrsK`MuCD`pFrq;l=>7`#EK=#4sKc6~^be^? z_fS!vVGzS`iqs2Mj)M}tJh|8qQRCx!KzBGX>>=}5Z2D)|BZ&L_CROAQMOgHpX-3*6 zfL4!tA}FRt;UPX2q^E+c?-6y5ma$!c(X$cWC|+CUENa~HkWMkr9bV*A^nA*WltG9o zcmQ7$+{ucc^x*{a;#^~w6oDm25hwrjO$|5kr$=o* zt!f6&$(4v8GVKKMT)kM~o64FV)!7BXlP@!j-`#Dn5hH>eMWI_6c`*>s-l; zPgD$C33-vPBzIO+oe*y`luo>Bl|HwRd(Iy8em}%+&k5Vl4Z4tGnui=Pl?p4>Q9G9$ zr!>2VL;o}W?N~JGX-mOxuI&GzU1i3XXlc1|RC`!TQziQH^hROz^x30=)KqBaKfoG- z*`N(?kLIBaI}77~clc)wi$Pg(h;#0E-79-(fK#pSG;F<03_RN*d*v+bpiV!?6Vd2_E*{^6{8dKwJT_+cQ)O z9<_TMZuuW~bjyil8l0T(tueC3wQ!9I<*L>w>4&8b(I$)fq^<5#@MWXe>eiT;s_U!X z*D9iEHI#ncyEbyAaHEt0JzF=Ly!8+E>81#ngf#jp#XN2E8*Wp5%N>1L72VbJLNy!# zJDN{u3RwPP77`sVFu8mCOsys(~wjgP$& zlTAw48=`ww1yx5^ZMDMkB2z}*Y38nW7tcK#T8CCOt=>v1nahVVaiz6!+JrQ<=Av0@ zh7Z@}n;yWFIw((cRCYclylpUh3dQJ2>R|eqBPlu+b}isNPPc0$+>h26$UW8&I}>0d zakOxuII3vgv>obl^Me)UBrHm{bYIUQzjRDNK~3=5A7K+xP79uvGN&M_G-e)J{*zuI zR43B%m5*oS&!HfYP~gGhbH;ObNV3~yDk^t`vA)ioSZc9j*2G95ngg`CX;aFyta2t} zmO*6cz;AWNd4gWc-}8mP&aP?F z%6H^zNhg50EJigAJ@L4$zFcE;@Z2iuv9@-x4d^mb-d*~NTb*GY{jh1H}fACF{TP*i7bgi=m1cv0Gh&{#^0kGgD~ z=Gg0i51{7m(5s`Z#9!e%oA9sAUgwA7)t$R4qH@U8DpM|PcZEJnMP5sFD{SOB+ zu=*!)6u-%0{*M1y50zg2>OJ4aw-9{uqcNK~PktK>q1+7BM1s1y*qR6eGI=#cwJlU} zUatfD6#Fh}T-tX#J`z(`KHj$|q;3-x)5n|8;c`+sAn+ab@t_xPrYEOq@VX}Go`;rE%F{pLjxY6T~vJ zIDRSg>=Or;_QUHy%aHznnU_xN0y62!2M%C1=P;oM2S}~kg*+{05$KGzZ~{cgaxKM_ zPt=^vt_a5#hT&Wv9zwAa0l(XiFa=G@qefZrSXg)pprS6zX=gu#i#<8e?|a*XbZ~H> zoGIc#I_hqt=@rlUlQGZ;UkXfi>>sYJP+0u1A7X=eU=6J?fA2&itgv_vW7`%74WOg zg@_wT+hDv=B>sH|KGBqfat~BW+0e1i^D;lsD+0bGWQwBP7vC7ASi7qe5~os5Y2^S< zrO-i(rn&J(0Odqm-bCI@ftIWZQ_I_&dYF8&{?X1>w)Sagn_2Po2KgW7wbA5S zvSR)5w{uE4)?$YRE_Tav1XObYR)b8lMfzTP$`0g)8;&A}fg&Oad^$9f%Tn8L2b7TK zruzBAEin6X`Fs>ZjX(a=x+WdBsFx0N+*H)!A9PuugH#T;{v+z}fu_LUXsA3xGvu;`_s~8#FvcX%DRodF-vVfhpX;n4@u^2Tii~ zJm(F@%^VPZeY0IlpPAHHtat2sySDJ@o6Ol?oi^`kmNb@F~A2SS`! z%fP$p6wtR~z5K}A1`aN4Y5E5BM4sd3Tw0s};(EyvUPCvxM8tc19V|BruaRI$mliSC znI-@Z?>e?-G-WsbI!Sqf=rq0w>(+#ZuPpLsW{=jX5jOzN_|7s{X$W^6g9ft|G6_6TD--ASJZ#FnQayW$4XhWWOJX zhB$hZ5!+PRj{nbhpfG-S!n|4RF@iqo_?#-j0K-Y5Ye{vXE?Lq0!xa)YLY|9o4^(8D zto#DG1Z1M2t`^B&d4bK6P4BggvS+5@7Hr4*v#l8u|LQu)28N*oigICDqu zEA-CjRX<`-3#i`PDDrM&Hx-=py`t{+lokQA{GgUPPx^L2Z@6A3JvB(u6Ta4L9GlRz zetqZ$j=w)rYlnG{Dk00%Y)m99dP<~voPmicRauO0{Q)hbH*>n!wANf0M>>SWG?_Mn zLoavpd9puxuVFXURkMk7IX80UHSfs?8j;eE&_2P{M#Ef=m!CXvi6p|ikpsN{%7#S0 z&Qz}rv5v0_KEFIKH)KdZw$6y-B{!IWRF-f%rq_nv?x9iii0C-=s+tAE1E&}q!9f6{ zC~*B-I+Yj`D?se{C4KIS@ngm~|MtXsoYJUiY|$6Ej&z=p1s$(FE3MME z-X_a8Rw=Cg@0c?c79BjKr=l{QoWTwhH#gK688=Qe6?sps_R|GWWt$Y}0m4C(1yRpOL8Z~HiB(yVl=gB1hmSho`ta!s`xTfXTqS4h- z&)Mf>`TzrOz*%k1D+Ud?95tueY!*!Ikym{bR$?wFtupd&pzi2v*GQ}6y%x#l7T!_i zt00NmHBg`xgO~8_=7mD*}bofMk{SUCD)<=M-UhW+C1AH z2m7${@*-C%s-K3UB2YiRY+6_NIn_Hs|Hs^iX`Hm@RK(A`P6a;T+#9{5due8C*+yt( zUg#v`lUrIMcKDU)C2_7G+L|s?=l^~-543#eh;cHD9k}izs?=cTR?Eo!k0-58IgZIP z1jIx0+sAzD)ZL!L54Mx!L-B;o+Ba4=d){A;QZ1G%Xq)tbfVq!kGx88S%C7%D$21Aa zSf3O4*mU}eI7*AzHKdbCenCu={ISl!QR8X)0!<^+qh>#o=cVJm&wVg-$LhuOe+93I zANRucc*N}nJk(!aN#_Zt9Q%3)+>Aa3i3(lc?t^>@ofML_HVD{#IQ}|O*5Y0M3?AYD zO!2gY9`(;BMqGo~v4>~ByX#v@-~8M+ij{+MB%JC48+}aE>R<5={)LMeka4lHRSWyv z-9Q1zi(WuCLp&)lL|&sg=v%?d|$9<^B+cl9@mtsh4>9hA(R>J;&xM=&+8dy{Rh#jgBF-p4VB7>GG04`w$-D z*UT9cI&Ks8J!+{ix%K6rslQGs7$dYQLyk9!Tw1ToE3~(K1twXhl^NQs5W6AVQ0<<$UbV7sIVt?>O|z|KrK8%ed43MtClx|8oZ4T!)ciysf^yR(79v;t|1&#KEidP zFYvCJVGd(*N>#U|uAG3IS<)<-{T5o+u*aE`{PH{_SIzm^PTt0|uPF9sqL)2IPwE=sazY!x;<)wef3v9BalYm8iDnqc%0)9<0@X?Wb=ru|K6wLSx1 zVrn{@Ey1KlCshN;lhB?}(cji_@_!L zs0R5nF=ERJKW^yaxNAXU#R;?-v!4Ur4)1mfuf#LKJ|0~n{}G@TZ93YakE)m9b)&rW z`mKGJ`U?e)>Jds=%i z>Kv{@;1DVNNt>VmNKu+FPw;0hd@*C}mts_|6Vm+bs5F1iOaSjFOhdyNYs{fi#Khs` zzfH1w8#iPJD?qmzV`BAlTDVeo2iz!-BQrWSIqxA$sHL?QIBsplVNzFi$r9#d5A@u0 z@CaJ@&NIl_wz!fjX!W*E(>&|-WyWEVz+5JygRx$?Gp_B08AC#7>zq%jD7T(?&2>(U z8WMx+YR2%oXM{to6RuSAoG-i0cs>~IAf$*Lf7h84{NhisQuN=zbzGp%%AZW7>Np(b zVC8BKXn1?TJV^FU>-;?tBa`1TtY=pl?MtOKi+~?kVcuCUC^^C_guWJ;BCi6n#}_h3 zLfkkdb?ZoY)e7UqVkksi_q+0fR7Dk3`W@tqmYMa(bkdY{#6aS;E~oDRck(OP{Pp11hJVbPQ6{NCipke*E?MT?%kc=@uIY=@ zrnJo;QicZFuElF}FzML9<#ims70zx!w^XK@g?C9>w~re`yj3TEoFUYa^3A;ZCMpnx zNE92eYZQ>J0R(#{h|$_m92W=RA~4r-x&JWaGsN1Xt01|MVA_MJg|x7^|7Vf^%x~Gl zv_+{V-b^4)1@2b9FdQV?{G*V|T%2n;UI&vOAp%n2qRvd*Un-1wy}#z|zpzF!bqvda ztxLSdp1&!$HxW0M+8+#|o(lY)yW_MP7%m#jmLG(!6KCVz9b$qmX-l?m0(OEl;2>af zNWiuc9TNVNcIb;JLi+)4${)q54XxuejKbuPJ8~|s-sqfuP-679FJH>o{TYpV3+mo5 zXSpl;0@GA@)jBf*Q3Lq)H_eoV8Y2ewUM+Mn$VKXf49~EyO52{6=&9@kIn^9K8D8ob zi}Z7*t2Ecn=T&>VNU!jW1@7LIz&awz7C8k^xQ9Cw^seIuQtR#~p^hbX_{6~vJ-Q^1 zEBW3%`^@Pv#ppi}y~N^b$LFrk;EN;NgvcR0uH6>qlq?dnO{k0Z4ahbU$J0_KXU%P< zM><-1JXqbdBxM~_5xCanW+8J6{OX(iA8Ksb2rerz!C4|wMl@h_bis`tT+5evecZnQ z@-<{YDc~I|Z4(1%_On;~mdVWg^xEvb=nHoK@Cinx}u^yj~-$JaYwic7Hun`|8uX zfXay6+-;0(qDWlOe3UN07=w|CzTmON+7+A)^ycsO$fe(&tu z)Ps9!imneSW*Z78=D6D9+UT8vQ&a5m=UO>3EC60v1Sv#{ko|a|O8YSJ*f#%EuP=lw>=HAV(J574^3vV)i3YK)S z>SQh)Q<6s3?5%PJAJ);XRKkK6&Jl`(AP(g`W-%su&L6NxB$OFf*8tz7DtO^{u&N{D zP0kzkD<%0QS_lc{<9{sL&66X7A71eHA8S-zn|_YOhdVxYLH~9}OwjN|mOGp!ObqIp z6E)y&enIo*u;yUO+q}1%(vq(jQS)`)->57!T)d`rAA2O&2rfGSJEk}A%V87i5Ju#u zcMid~`9hBE!!XC1_el!r}Y zw0~cr6kH)wjJ^$CQ7Q0_j^mbb#oqG?jh6JwH=;pBFLn^-W-sGuzYyqLIIxHsW5;Q~ zOC!T+sq>QH1%l~V-fL&-BoqK_sdBzi7G1gnW+Ap+Q%u{Hd(v*sBU{cw-Oo2gE4x;> z!5AEH{Vy5=9_B>Xv$yRY+7eP8r}9`nwPa|_`w4dWKL(eqfONm$Xcn?nV4il<3I{YlU@giyvwyc=tPL07eZ7?UM zIYDExSC{C(5ZZ0~h2<^p%Yw6?jvFXzmqT#*Zc(3J!V+(;>*My*AEM*ISTcm#0{z~( ziOk0G6F@WYFQ8!4|Co!?{vIf~R_0{JyCA(S7Ns%EasIn^BU{$M(4t=;tz{m43-jCE zmqnMLsf1Atys&c2^Tqxn)e|(f!o2$eD?c}Us^curb!)CjisXd7(1!&T+{P5Nvf-qy z(KHnI#0JZD6FT<9{SG_p9ZH38uQ)3is6R3cv$)uohFrfz9_p`({`&UkEi3kD!rFRz zr|~$oc2Ao3a4$uTrouE~e~b3=S+c$LHDO}&l!bPCf_(dFc|+rIA-;JDeU6wa z8qfm7r~gyA!U16w|3ASV79iLBmu5jX2_U2_$E`zwxtnw4*!m4k{R*YO;k2U%^o$?y zNNFJNV!wH!t-5uIZTBPkr?@k#ohiVWat2NHb}|EAky_pOyE{6EKllUfkNqdO>IFJ zxA5iVNLKrkP2#srK=Mu&kls;tMe|bn-R#Sf#82`vGCjp?4s*gqXNY2A|CK^C|AdK9D?5sBw)Dg5L6?iKIZ7={)4+wo%52cqa{sMQRz4M6B!67PbR-^&f=^_2XuhRo@ol>S@%Au7Ha+ z-k}9D)sy4~eKr93%^LG}2!$7f?}%GgR`-RLSfMB-qG=_w(sx+DH0&=b6i5#eV0CZx zWHTfcpfYAEmR$gcl))<=%`MA>yPPaSB|f z5=4lM#5$EOK}&AOm2(rDM326#&$SxCwvrL8oHPHMQ(NWL&8!>5+5)87GKhBox20h5$?nb(jvbN>W^X_c^f|v1sxE^o+ z5rT3I-u}bc_3t?Q5bJHpw@G+tPeaTC{jn-!23g^(r|>-NYTAfyXc?dHto3-0EN@6< zgRC5am_D8WZ|!{9LZ(I&y(pWMk}59$R&#ForLm$Tmktfz5EqDo=3Z@|tBi%0+9Po4 z*7q|cdwHk7Cc5&cBJ@s94&~T$7Gr}tTACU0OXez0L9YozUoXxLjUZ(5US^T{svR|* zCqU2f?iU2jlt|IT-D?F`_kBQK2x$eh)VD`+v%-;66dBusOq4x{tnx+MC8Rs zjkRthG`?wV;^U!5T;lLw6qD5cf>cCY%<5G&bpi+ky?rr4i-E{Rw26>ay?=KQ5*pxg zLB?3r=t|#}%q@&aoTde|C+EKuRkGSE;&(Y|yEs^%L??y$u1p z|3F>DxO2H18roKbW#Mm0h~bj(O3EoI6rz6eVg+1ilf)&Sq=pj2I{vDo9i-G2Q#?sf zcQ2m3VQ&_4wj#J5v&d5Ko!%ES2e8&A{Jv?HqQzt+aUNxNHDY6;Af{e@Je746+Hbx$ z(ye$B2s7*@7u-RE14opCU`6|d-ziU0m?#nxxHsv^HteZ16BzZ}J;EqWGL_$A@{z<- zJR5);)`^qa)M3*soXqjX3@NdM4nC|ID!zR`FqmsdF#<(Oy!??3ol0%yk&iVYA6W#a z-t|fqAWwmm_tCpl9^9ZGj6*>|rGirpePC75lw|%q5n|vFmPo=^ajiwRz8Sf>ULd|5 z*)1&s%*izH+^ma2ms0G+Jh%i0A%+oh*N9VP1|K+?gIAsZ#eglPkMlJXkG zN!gZno;VJ8rEy1u7(ETBkLIZ0Cy6V3^w1_H^K#0rm0)w=6YYAKe8uugw(Oc{pVJ;u z_;o8uk%cwhgwFrnxMa5tQ0Vo?MW7taxcQ@$Rp4eshER(b01j+*V z<-RXur-FO?V?G=+{+!QsZ}(4}V=-6uWa4cJhahqNhK#)jDkN#-sFb& zP>HsB@R(ua4l@BEbWW<1o~Xw!6+5D&D5G2@JSl>jqlqv9BpTpLf;x^koX%LCJc+^7 z(U?N@0%4X?YSP+>5Es52&lKu(WV#d1@tmbh_9(K}OOM*T#g(#CeE&t&u!sQ~>aoAE zScPfx6;tM2{_IB6>0hGNf4Wf+cEf)?*^>_WvSg`F46)#YL0SnEEdBYbPwPCyKjL+J zQZRC985I^XqS3*|C)nE;MKby-z@<6I6{FrpSwC-rAGwK;vRba_n4)#C(L+7W0e=o@ zsB;Tn#tg1P{aFliT_Y}J{I)eI9n?&YR9G(%RilPAN5kJXVSpe}EerDmZA(pOScNf` zZW@6vC2Kjre9V;CC@z7GaWpHj;g|j;c~{1M-*cq|LkCCk)kE#ovU$Rqb(d%hfWMKz zt#S(2ZFh^qS(KI>z*`U!d|F0;o$JrHlyMi^*6m@5O;*+nh8zHeZ<1K`PZfX7`6Doi zy=@9*XU8D?zf>oqDh*~!lu&KYoeX7%mvsWSdibGXK!8h?EZcRQnTBlw!=Cs%zkAVt znv`k@88nVVZ|6i)ZaBU{m9~VOB`!mUaakdRgaKFzR>^KqZfK^Q zBw@Ys7BZ^Yta`k`myD@S$k2Ose$?MlQpPT01PVV$E%4LSe8I5xOVl_1*ZS=dRrK=5 z8l)l&+t=5+_Aycr`Wm@@%B;oI5pdu{}x@gV6POj+)ox7gRfFUOqgE|~T zZSiyRG=wdqCQj3GLcXva{enml6H}1tDxnJG*JBp=_6~uz^PSWf9RVJEpHsG<4Te15 zo2lz;qN$jNUb=*73=@??{h?SM{7StP2~VN5H>UltlA>Xl5WVDHWQFE^?|6ZvgpZQb zXg*uIH_RV7u8CMhr8CoK{*3%uOACqm`VzGnbV^|q?!Gm-F7ghf#v(V9-XQ|qOsrd4nn#2qX$g5*tEhhh@K z8J1rsTDtrKH~K+MloATsf3P&fxT;()LcP>1(Af|-Hl}FR9hGGaXW5xq3WV>i*!o*> z7s;m%+zXT=4}CZ8mBL%05=rc+cw|CbSRrk&I`5&jC4n`Z0hB_P18C$J1iUZkk)$b^ z0W!b8HU2PAmczvAd(^qc9l)iRzkA|{!YS_DQdMRjEOC#~Vg*9xw;!?J@oqm*<-_Qn zV{Wa<2N${^q2D#05b*DfRBl@GI{LD>sF%A+mA8Ij>(O#&gGBx^mrBe&tfhs+rZKNZ zpFHGLZFZyj#TQ%xbBI+Z@ziU9Tc9nh*I|q6zzpNawX>+1;>S%Pj7=+&>-$P){;k1+ zyP9mdvuB;*T#!i;K8eOIQ!Z8_QoKyu>le}G&ez}UpKZewwW!vAQpq#O3<^#TB?d&q zz;(qHX6)7i{v!n%8a(l4Kz^U|;cS81^At`yX3+bcc&8r!o9HC5)Mx5ny%~y~?ZK1i zkNm+ZQPeTFF*!hR=AN%4*S5EYgL_76`+zble*YU@JT-^mgTvpi%^in6Me>tq z9FM_?*lLe*x`K0(Meq(!Lbtv(LM49(CX6xNb>KYoH#i((%<`Vi$}=Y@`9$p`y`%82 z#ZjVX4(guU*A)tvy-A$EfLh9EjYzP#`LuW{@oApw*_i#f^+5U){_UR!hGpHhLjwFr zGScGZ_I*!6Is!IItt{$JJ^cj;GQ34T1end|?i)l^<mo_5_dhg)NLFL~1;{7m;FT&TBc7~UdS8U zb;^jYR9LeyLa@72iR zmeG9!iU|;czrbYPa*1w_+ytMvchFv9COr)j>(Vsn;t$ecAyd0k`~|M*L;R?~XD3xC z+`HgpB7T#cYKE|sCNDtNzcDfRvcS`;x}l=mr`&#d=fY?*QhecM0#%;pz(*UErl~4} z{c-aC8sQ@;@?mm#s^Fx?b$V|_w1q0)VPAd2cvn3j8kd175fcDD=p#o?bZthxM$_lNTBc@&5QPA>dGDc{~voyz{}(Y-;YkX zrS!p2xk;e<>SMPz_uSzh5SQ0WVAy;>*GK{VEV~qj=^icH8fSTJV>Yf{jeJ;+<_gg4 z^UWW2PMr5o=ws!oT4tmcQ}tb!<5qje{SqG7ALA!Wkrf2W%I1 zF}4(LKs(-?uLkHKbNm9g8H4R+=JfI6HwA_J5^#mqXskHxXY_AYlS@A4I!@yyo0-HC zr-pXOedGPY8up)3FTjrzIubs9?aiT0j=b{BT&5Y6WKbTGkq;2+d@SV;+~Bc(+3}eP z2WmpxRO!q)H#$tgTpf?m%fXryWmTgE{6 zB(iM>+v*dym%ZiMdEn=hu}ie=0A$zG^t?_j7w~`7aXIJYEPu+N*r~YWD8H8IcOZB{ zHOr@F(|AFXYa@8UoO?`3GCM)ruA7qtj8XvnPylAU&A=chX^0k3z#6ec3O>Y#32>1~ z@Y8q2w_h9=@|QTyXvOVwQpODwNw^uLL8z010-_`e}6LEX8ku8ZqVWjqIN!*+(FSD9i3ME+H97~wF7wjsviK>=h66Wq$ z40DqJa=DKiqkQKwEVruWG03hsN*VpZDzeBiK7{I9>~acAR9*diWa_dDL8ZktrsquS zy=~uP7H_K5vUZR(sK|?6qRHdMRAN-R3;0rZ5Iy(W12qNTl6hXY@(~bwKyiu*M5ZhZ zG?9|AluYWy)qL)RP8Du`#HjWC7gd<|NnCrs6fRfgp$zu!35oFs7+5aU$le7^jHYk$ zcm&RpSkDu(Xt0rQd!aYG%=n1evP>F?Z78dpnZC`<8CqA|?K76Wmg|+$>N)Z(;BIi) zbc{{`N+S#~8tYMz1rpTVp)U-c$R)fP@LldMBR>57yMn@~2l_Hn7Fjcd2H95jpMty_ z)HSh%w1*9Bk_gFsABw&{3sN3e?Un>8?lFUfkBLMI#c6{)f>Jgdi*_)ebenEAgJ!V} zbKxK8+BhInXfKaMUz*Ud$}Kfwe#^M_z2*elt1~AwwL3GP0n8j^WzeNj!|^|Xto1q4 zaQ?zY=!_43K9C9d0?9Q}nWhszF4YLvh(cSi)gVR|T5mV5Zhx^HzKFQhmB{eu3pDNQU_3lLv*oIWhb`)(U*Y}hhn8|@3b#O*jds0^4^{q56 z6#|;$Y4y}1K2!-6F7^*@jtX*$m4W5+*3`^LyFp&rSY>5b<+G{ffPjTca%`dXRHx^N z3}6=|*8ak^R4R*GT?HJxSZ+4|&<7wg7zsuGO!eUGOo8gZbtvRFg4&X}DBn)EA7og0!m~mMRm2vfPw4<+4|< zLwasLhf@YeQ&ZD+5vdjaMpDIKL1cVAwQ}e`xpu`pn75KHc@_I(OR}21wr9Cp>TL-z zI3oB)WrKttK1y;_iRQ_pUlEZeWwnd07BDwz1Ahl?5%B@X4%xnUU7sRJd_Kp_pI!M` z1OuRB%~Y<4aa1D?oX=; zn5w+yC%lexvi=hqjE0VIv642B0Oq9P=2r30@VV4fN2E)l73Crr% zq-+vwAo@v{f<10;^*aFzvfE2llTjh}BFCkaK@KmClja??{jQP(j3pj7h{yaS87&bl z(b8=>Qqt;AxFPqHcb>B(`8*uEmuvMPdahPlUAIQL^CNp92R7!Ij2m}n?E!<)KCNwy zii7eHDQ1v|4?#uh#04Uh(EgDlo?=(jn4BtO-yeSAmD~^sA`ak8`@pc=J^vASvL%lvtn+XDHsHRxVYy<(FTv4N6GidUF7Oo-ik_1J+!_h3oaI&Fnkb@|l1=C*x6jfjN^I{F ze$w|X1BlXL_oRoEBAuRI4M~zu_D%ASN$^fc7I#wCB*2v1tIpu`CHG4sYX@5* z%^J%cQxGl9KVVh75mgk*{065gAEb-4TrC9IP+K?jo0XyCQgAKR>BkdB(EE2KO4aqL zmYX-~jSBDU8j;K3NI)ERCKP<~w=lFSp4kq`t{AOn8gt7!ZV`|U1eavelVg3ijg&o3 z@n(!RtGE3?xL~dbi|Ald&{~V%rr;UG4?iq8*mN5ehGdf_$8rg7`?BQ@v#(&ICix#1 zx)bbMkJOaKbWYYODcmeF0DHf@ePIEx%N%7Hd=1{mS)KPi3a+;8aLv0Mrr0(%pt@2~ zK&Q#C#~ZTCSkI5C!NT*oEc{|z6ZjM!vJ)x{H%iSniq4k@clz|^`?NVRqTdD;yZEN> zegV-o+Xy8_*Zw!Y6^GEgQR#}{!et+UWPw>~dIWuriS#9!h>Lz0qV`aXN%dQf^Mjbw zM=X@(y!(ZPV39Y4L50+DoEv{E_>=ajWr>%cfH)y)vTi+<{o>~tx;e9fi?8|lDdL3q zlUa-Q^eY}cQD$M%dw#gUD-3_y(eO=E3B*eQLb!KPE(vcCzT0pY+ap6DjGEi-^kuTB zGre$B)BW#0iuFQ}vM{E!w;=(iV0&ctia>PG-8aUc1mwl zIEO`sb3P7g4qqe%jPc2)-xPE1Wg&t6e63Lr^#7+PqP+!_R-P4XmRKS7&2xd3_ZJ8S zxZAxOnd(72sKU6hY6A-62mgu3$SAMK%+E*Mi0TxDWj>HAfW@!Bu%vXqD9B{@k47qNmfy|!psA^~d+?HN&%mtK+dvTYThwyqH}DBWF1 zi1$WZ(Kt>;fD^>a8EGi&kT1v(>ZQvSA;Hd(w7%<=;!is2`ZSeLPYW<6E$J%cTHQ^> z#~!5wt-+*Cj%e7ksoRI@(??y;-yqE>|0C0j`9wDBt(Ql*v#;XnYJQ%QVPAqJyZn-x zb=7EJ4i0dxI@Iqt>TV)@9EiyKMYdmCpf}3gGa6Ba;zLjEjZ>sh1(Tmg_Dt{n;yte) z>X>5WbO}+NKAaVwaE`xpxGPoZw#0b8?vIKGo3-rMgbb5NNh;Zhm1bmv#lQyI>Ajwf zHqT?2oy1Y<#B>4?X}2+o&}DTyH!f{Kar2lB_18PN9(jM|!`Lc4Cp4oWHy4$put2{v z^Z7qzr?y#aIjNV#%5Xshi7{Il8^PEimW;XVV@igASWW=9xHQl%TVxrSj$1wV9ylN_ zll$4ZRtMxNoDQKCm8vufk} z{sF)HbKl){-yVH6JUzIBo^LBSgTFE17B~9mnJY!Q&vOmwdyK}!mh40>sX0Gm8qgnE zzAs##c~fE9OU6mpzWyuOa)p7J5Y6m}iqw!36j=lO&9yu08c*~C(8!e{R2^J4QYlYU&N(5|k zN#kAk7J1w&? ze7oll=z~$^oX}UPq-Vy2T)k1YWZTzQXh~^tKY;SuhdK3UCAV}cqBbqUpSHTiRUMi% zWiD0<5{AF~I`Ha}UKXhli(PM|g*^X(pZxGKD`*mS!5e5lvtbQLi-9kU>z?MODd*cC zf0x>v6H;r*k((+{aw4Kx6c{&%)C|H?AM}!BvSSYbQi_am>bFKnVCT@2`@Q!T)?{Q2 zro7eXG8bZfYOZ3lGP%iV6TDDU-P&CI%d7WjO}RB_<-H8Veczx`NcsA2!g#~vGd{S{ zo(3q>3#_v`mWs0f9krtU{wY3<2G7nZN~^)GXz)8SGbB(jhC)Z?nh9*1lG#kJu6|80 z%w$(R8Yco$ITPNtD){{D@`@=lQ$TJJ>Cq0MbMf#>2aOQ4SQ#v}y4^EBKhikAVIz0X zYbKjg9n%&0vrKL2&)Bg)`wH&1`|h}5sclewUTe8t&f^u0x65$(RGK?pGitdG@lf+w z;``n2x_Me~_QdF%c|qoXdiUd@N*uj_AO^pU$%h>J1VHHqt(%ZV4Zq7n2A`c#CPn%rdIe2Il4J$H zJ|MRHvnDKupMheTkf7c{Plyj`7~PTeYEcMaQ*-LGqx;s8N_^&>LQo!D-u>1Xo!027 zVh}?`fAb!yAniW$d7oLE6-46-T$31?Sp;Pkcj7D8m2yb_>)`1SHG>N8K7K~Jy>VjB zl#qR>GEL73x~JRBskKm=DiSg3xUFV(%t}$W)*Z6a9Fq8O{Npxn^y~9CwPL(z&A>j> z!eWJ(87L?Bb%Sz#o%~T6V(lh~KT;ma_JhWJ6kQ;X5iA1YkYoiy(vK`?9mRLQ3+MW; z#_o@+#w>)3(O%_-x|V>s`d`OSS1 z^47@$2wds6>Z8&gxe3a>>eC@*jmZc~$?1#?0rj^FjoEgbr&vj&0NulQKzg`Cs!EvK zh?;Sh#3NbiW#Az1#Pv(%9`P;ZIUo6jZ^yT&%{X0DZkVP)EFs>e=~AQ^t|@h3mLxAW z7s8tR?;&IvSrmga5E+PptplxjV`3uh){4!O2HbmAvc1EMnQXnX6XdCzlL1>BCH_t1 zA_~eydVkSxx2H*qil}0q@wvGO{;z9-cn#*N0+5j=pT=uK{fTV zpM=2{fT`6MQL4A(`K}B{{FPf6|H*inV?pfl884sioK{x{p)$FSi&O0~NkBmTdy_LO z2y4^#)I5PA=N%iT@Fe3M=f0nw2=8DeoL6-f$==6!S2(DS9?#8plycKcnPuvBjJDK3 zg`CpD)jR5Jp)HtI9VE)e>(#Tb_dopSvz&79;-UyHB<(qAVKq!xQwxK@mxY$LAYEZSV84s!>aku4cPxto|VK zazHlbo|b6EmprBD1)aPOJCOd&cZ1R+Vo-yZ&@bR!iiy#K8&?nWo#>+?_3DQ^Qg2RT zgd`-5-H`lu;_V%_?}djAK%L?fdiOX3N*$2(RJH4X4xJU};V{ehIa@K&Q|&u3^HLn< zkXAe8CWzbEzBmyblk|H+*8QmeJ{vP-&atudh^ijA!)u-Adl3WX`zTkQQL_DD>`y^u zLx17nN5mXE?Y|OG!@9hdrXaz zM!r_UKOPd2I&$$oT)R$?y!V^FT7AlPOp45lq%ajp2hE>Eo=?D4WQ<6Pa;mz!I4@+P zR&E;2$25pW(x8bIlnpT=b#$Y=b4{az@&+A6d03&45FH$bjyk0KOh6!o@GM3hQV&XHC98c&iiw!lp6g4Bj5BMVB)J3#7Zqd4(Wl9A z;aBaX+6#jpELbcFavn&ZRrcE5+E1()S3IPsrFv_pV{8sjCZ?W%yuOU))ap$LzoA~H zyAwf`!+fcCA59OGJm{fcP=8ifw?K3GogTWELu^NK)i8EZgR8C z1o~iLSKm(xX&!utp}dKPlBFcukbtH+N+kqSV5B^SwAIGF9~C1G$b=k*RYUD92o1#- zzxpT(w+`F`t+>VAfVzX{PG{5m>hxIkRe{RH1lPK-M|zt-7(Jz(cCOKG~-wiVK4N@G+;e0OGlk4eV_a?DExt3_me z44_9`2O1vSvC>}-G`nIW6D>Gm@^e=x$gP3xFIpCKTLS{2P4h`u#wBj4JmdDU!q=*+ zH#n?LAku8Gd4I=XJedP|f97BTvXUa{_F!Hq0R0O6;!PlX5DFYThgkVd^+EyZ0 zBbm0-ksNYz;f22Y%D00<$u{Ee0wh$VLkU4sS3$upK#}LAcDC**+5UQF@i>rOL}@MN z*b$P%b4RVKP^%xm(jDs|qWC;oU2i&^+BW0qGlBo1HTGWXLBgdGuh>2t#{;>O<3E${ z5%}|I4~6STA0Kt6Y~x4Z`ifI0|CFBwFfSWL@JF_}Pi?F3UB*Qjd!vsWLKUA-PBj6# zl`J6pv3e&9g!(HJ3kYF5{s~@uWwEcam80C_uvrdSRsrj>WcMZr#9#c*oA)L9g^WA2 zSm%px9cuTxPkx`CJ8t+VAsrWe2z#NLGb_t<4Q{#~@+Cr`#RE${l}a)8nsvS+k-3rhMfh zF0H$%`x*0=MrBs7%}tLb`6ib5tmK!BA7H<=w!FwtFcjFGzFe;R)9#pQUOsesy2y5- zXmNG&*99BS*7y7Rth!Z0QL$dA0q42$wWAd!|MxEgsLT%>*tNal*gO9y#A^$+{}yre zglYEAx4IK|k(yrOS99lDXGU4@;H!zO%-Ik>Pt#Q#Uq(TJ$K_8`lAQNHJ!A6>Kl)mP z_C~HWtkY&$=liIg&D4kpwp<-9>ioj(hN6O276kiS{1j?~)>s|0zRLOoc8pt*Ji-gD zL36X^V=@qH+=?qy*ZRh>Hf6yNyq^B0hZhjrzTBSJ5!^mok9FR){n+cTIJv`~nyiU! zT@?JXQ_jhZ%d9?7DDjvA*NXNzGvj9pzDvwj2xF+$H&`R~Zu%JH9USwRt_VgO-{kg5 z=sp(kooINet$UvFNAfSB8Zih90JQuG!9^44Y4qvc5t6%FE0z@wcrjsu zxH{^S&g>p)|6nn7bS7Os^Sm5f6O8=E5F3jw)Q-1bj)6+jq>`+D>uO_5ie2(b#t&z?ST zSqv%MWec|SUrX(MaCZ5z{~O`kQocx_-2VF{3&*tseKzqBe2mM3J@BhP+rGAa<_&TU zt#}+?X5;Q_i^--+YxDNW)V);voLNoNM~Lv`*t8$CL1+RV?LOz`Z0fR$!>(r;?nFZw zsA$M_&5#n&KbkzhUnMzl(G@|2C!Rmye4KUHK~KXyDssQK!t0{0iSvDD$oaMj+kfT#f4J`qat!w|eYbt@mA1at5dxJi z4n5a%sgJ)4&>Hd;Vbfhrbs$h--PF}an!r=jX#2ALnTeZ^odK~WvsYT5QwOzHfqqd$ zT^}|bsb_4%sW$7`%jR;K1j%}?RidP&nORQlrNJJ9-t~L>A|Yq2w6Rjk4zPrYO{7=g=dD6;a4VvC;bW!!W|6d}iaS8J!B4ws z`7P*DRZnTNu431x6xXXaBD>MN->H_IS>S_^`DwC=+s3f0FLb9`JMm4=VN98GDtbK-*kp0Fw0s7MwBiMCrd* zOg;DS7{2LB$<$y$(s?|fgt%pTD;EdgT*^YA$JvXjPs$RYm8QZl=Hd8O{j+*f`+(a5 z`O5ix*QHFs*W-n0pkY2*A0g%rA#lKM0iV{i_a^Q_T1-&V8Jn)Wf%d-%zm zyic3LY(ydt&knMSw=YvqB?ozKQPQW2mWZ=e1lLIlO2X|oSTrmaWP3#9hF|5d$wUhL z5Dh)+&nP6`q33ehR@Ewl+Ut>lBt-GK`wT+A`Eq&Eq#(COR9`QL#iR+-P_H{LsrVOQY*yCxBzr?VZ6eiK}ueb%t{rWt{vr~K`gF`9*4Hr+&v`YER6N62O50;@`!#@)qg#Fhs4v*xs zl!!!$Y)O2c4GnQR)6Wu6oYGU^{r4Y@Q<$dI#oQFgZSHpg5TF6wc}sYf?pVmXw&SVF zx#x}Flu5U*C{HICXL5mr@n+ABvKj{)EXwnRL@v`t#v9W|T=8*lNW?Aq;}@4LdjDW4 zp;P~ayh5#izr$yJCqAqHwiYX*j=v?e571Q^OOM8CLh23dMF7u@FX1*9F)X=M*zEPD z`Mg=pW{sV?UY-8^HFx6|S5jn6zwP2PJ~vD`mmR=*D7S#$^R?6~k~a>*(4?l^u2Vhz zXT9RN4m-fCz(oU1Eq`-M;$Xq`bZEvZA%+|bucgZ$tSXi86YbI0ob0${rs9wDiy%{@ zluFKpf1&0oVbuSj$Dr$wkvmUbLKdw7ptZA-{^czu48vNYhH#ndzeFsvYU=54reXVW zCauL-{upXgIo?P2$WC4*wX8MlYr)KH2(CwM2EryjlW1w0wmK2J=Rx?Te!E#e9sHU; zZT0n-WIxlqOwEqD*960cvIMyfkLQ&|9*^IA!ueZN%mSxqvD)s&TMzT&9A@^rd&bdG@`V&6Bqpfwu z>%@A9_x>G*H-J_7XDowwp8b36Cj+*PRA8uFYHNj3>O($8oc!R@g(Y(@)D%C>hg-y? z4^yZKJapHa=X%(YA!>)`moY8n#h$o_I@6^y1RI4^c`YO9i!Q5Svf^wQ@&0{_ za@ydC+aE=--k<#h;w|hRvO~*)d}Wvnrb8}om2bO~;^)Jza=p~pwZzI+M}=7)6}afZ zrtoIl4N5VYt`0>KcFR$iVw#DUuTt6?SRj{DNik3JYN1i`v+?oAq_*LEMvXSA*BNkR zVqEk;3h6cNJ^(}x_ zhi>ey^t_45b^YpAYYR{&=2Ip6b-xMpaN>v~_l_al&g;TEpZp*l zKb!w&p?xMJ)6$iic;|V;sZS)L=PivoPkh?bfgxox4xoJAIfsdE0iIt&T5U6XQsV@P zQj= zQ0hvbL7d26nBaV3)faOh|6l#V|Hmih|7|e-f4zVnKQz6==ei%E*9hwV@1L8QJiNna z{OFe&ZN@sTJga55U9M4lCMb4_xx!qY@VlV@Y2%Ew!MD>Sub=*n8A^Et(@+Gg;FXKa zCbp$N??mzOO;<|53r$T-x%sKG`ayY~pP9^hX&SbVuK+pCf>Co41&7R*g)okh2JFnVJGFqF)A0!+NjVV@4nRCe;ss+nL&G; zM<=x^?swob%y&ZUX3!v@F`=?h-LmrlpC9PPWo*+1MS}u9Hw@z_+}VS(>4xNB0he4%HpGH~0VdCv@Wf zm|{DoUL#hi!6No(D zaeFtp+_mG3!m1w04+YH>t1Kt2u$B}@pXd2O$i__x$Bej|bm7#wQ z_v?f;3#3IGvlOp(slUrQukQLc@cJ)L-8wFh zSBm3B2$glKV^Ys1pl!l%EeSM@V?HzE-spHsI5UM&VwL&>)4kQGWBmCw13X=UJjbf2aWS zz%zl(>K3=N$)S*E{qfB-il+-Y%9Yj4&I9@FN1xrt+6!JU#;yojpXvAmT?>=`tKYqf z&-(qg0OPFhyK$k0>x+e=6^ysLu<=mGXE4;)tZ8!&h8;gIFu95L%%R1%!Ls%)mQOeP zlaq7D5ffR-+o2);UA)n+NMGrl?RS}^7vzgA{iZFmGEqEC{MvsYrC8M(9KF;}6xv*U zfs&hlcz$seSJyMhH|o-GwR5)80<$t!ygbnDr$yo{ueTx90xrAWni+lV6xOEI?Pu*? zuO{+Knvb_HO5(9{ezNWI*J?mV=6|gp32iC?{XE%vAlPA7fP($C4NsX7ev(G%;%^<$ zelbz4{R}h};Wcf?pL)}4M<45E{7*DTtDa;v(AmjoHGuw!dN0oAh2esiBuafUPBur> zKb^FT7sfg&9^{yn2R@T%6KDG|oQoygF{|&>y*1+h&v2jh(WVEt&B+k6h{R zXe)LdhyRB>xXCdY4Au@fA;^raFz zd!k?#5=t0Ysf@OGI@s1dEwY-ebs#trpGwG zETE~PmeF-rde$Ul^78U?ceMz!eoHyh@5~bZ)jiL=;kxV1%7x2rMb5aWEFjDM z*0IwSX>!OrZUMS${Tx?+qw7u=<0tgAd5?idtDy?0S&uH9aAg_sqV36* zSEB)g?*j|0+zPI=WVWiz`&kvG>O<=6*A4R@J)2n?mH5#AvF!h9?n=X&y3(+1r$em@ zw(gaPO3@-qKq^9lPywMLf)-iAmT`%w5cVW&A@iUVtTqu5A}#?6grZp_A~6JrT?9=q zR1gA$kQNL}0*M5Y5JHk3be4ZJ^K3`2s!lOEWkIdvxtpq#}Dk2H45+Ye~$N% z6|0BWSUSNWS;sjOrcS;Uu_9vQ;P^m}un>|)XH7K7%m^b6(~=hN{A^kNA7R`6}O}#j*b3ya7)Pf3bot5ER%jhluldpyFgt*@=`y8#VtHy;_0z~eAZ+Q zk1YaXJ7yzTF+x3}YiBRBf&2VQA33$n_h<%A7D38u`^1hwUO=oTE-}WFg2`xsk1}r ziSd8@@}y?#iQRE|3E96_cfwfQx+VGRt^A+rrLRyYabyQ>*9Da{K3)r-m*>pvwtQT* zL`bxW-E@wof7;6jWRerXYpk3#M5!-RK`?Qg`9%Xiz(5H%p)dLf=QdpW*DrVe8TM^* zzbbD69ttByopOD;yhINSo$y^M@DA>U;S*_%9l<@(=tq5WPa%#zgVf%y!JK< zHzp!$l3v^0&*{BAa-#l2kbf?UZYF@NeWs{O=zHyRI&Wlcx4V>EWlJnlte5Plm&RJc zWF5=2b6Js%F~d_?AXdD88CjWmnlqye!E^F3g6i|;oL*|naE4oF9URnjZYrbee0Vf-nVTRQ;)yp;D)@AqPpr-; zSR~}#X$pZ(#JjaEnSke^t~^jjx!B}B`LzOB5)rr)ZL=%qA13H<^uZt-paCMsfARVU zCzjpTZ^j-t-G~C~Sjq8J2WBfP7Bo=9Y4ASJ0ospHpg;E@wOg>h%HH?a)8D;(-zw}f zKaIZODqDh$;Q$SX3wo+mS=lOAN~w!Kmn0@>*#j-A2)kU*sSERLJ(ETBmk3rHk;S8#DQ-$K$eQ3m7&~ z>C%sCErjI2^VCy=g0|*sXlep|k*hW{FsaKvS`WFT$8yO23@wd*>(ZDs4)V2e?qWeJ!agOUQVW z=_jlFW1GTm%H52($?Bs1@V~1FW`l$Mhv%Qy4wLuFevB2}mWvZA@$wW=I}p8Opl&&5 zS{)r^HK3aZsh?IEA{l-sC|kprg`2~u!S+DC;K=m|cH0Bn;&7eUqgb5ygMGHXe>G38 zo0DkoV62>D@Vcd2XybV8ZT>ghyT{(*jl<+wny&02{}db&i8c4xp(dO&qOrPC#W(tg zj9c*$5=9g1we#**6ZgDlFU|?TIMiR#@3$NQQn9F|f={{D$Y!IdP<9^}q;eGlUM2Wp z8-5xZ_pJyOUJ0+GE$PGfHp0i8`w9x{U}SfqcY3g$`S?t#_|o?&xn$JuaBys-3-i zXC}Y@3`l3}zo2K)A=rWH5uXg+$Im^H9kTXYxu;UV3Sa!?NXE*p?|c#4(;r%!Gb#QVvYlv&|JOI{Z`z6SbY2krU5TMeFLZDpZ{3z_`g2sPHNMCMX>wT+8M1=%P(oNC#M+>R$fa{o|+!GAZ^p|aU$;xaq;R+Y<9U~1LPpS z$+r7SOHOzDqLP&m_-(ODA9wfPU9{PvhgCr=)l37Rf>O2V7!@UjYa3UOoEX*d%*LE9 z9&5XQy@aY?LeCb?-RXXLTMY+-Mtk(z-R^(n)Zy~|Byu9~?D$C8hRez;oNl|^jNk+1 z0>P7lwG$fmkXo73dexBTlG@Z3%3S3#T0tA2_{fS`zGMh}1QiMe$#6V$);UBrDU82M z>cs`#83%O{T8XG%fn-gU$b9yDx6)=o9PzC5R$7t-FZ?29F!_QVrO+E2j9?nt2J_vB z_$otg2`Q8=CQ(D~_ZH=1&YbAh_j_Xcs_WFxjs<91=%j{AoT>fY_KEnZ`Ni_pX9k)v zJAwP}f2zR6xfXT&5;j#B8Jl)UvKDb|?P#MKsdyXdh~B*HuEC`8Q%!fXFyZ1k)pVo+&)1n+s%(`IsqG$IOjM zQ}Wz9O>~FeJ$?q{Z>aO;gp0e0#zb%^S~W2BSbb%T3DtSOiHcjTCNQ;JMwibklnOe{ zxEx;akzDGYIb$Q>rDR6oC1I~Tq0RrS_J*ye&an}YM4iuFG#1sR95|Ca77*PGgLs_c zy=c^CEh$xmU7aI6DBQNMv~M01+L+s4R`07(AY+*97o!9IDe~ZDgS!G;#5n+B^*y&} zFO2t|V!arSY=b?jgkhdF{hTIVhQKR*ulFyc9F7i6if}NAEUcJe#MwNN$2&~5<8a~< z=*!(HrLHnv=DX@$tKDZ3)4mqW4-^DNkF~!;I{S`Cpwkw z2Bn(J^ZLU#`L^j8FilK*1zy(0Qd8>tBX`K$cZq>1F4KBEN;0<1Da78}vZuRAq@gT8 zG`McgY(dm46xrl^04#s?=#i-Rn0s65Y?-%}eDriP+~%GQZ=U#T_5Z9{_8%#Q&p-X| zqG$iVH~9T&6&Jqdd~$ZMm#m z?2(*x@A}3}Lefoe-g4ns3#RswTDtTC>}IQ1U;bsyngGM(3a}kM6yneD{aeAG>{FW| literal 0 HcmV?d00001 diff --git a/windows/security/identity-protection/hello-for-business/images/pinreset/pin-reset-service-application.png b/windows/security/identity-protection/hello-for-business/images/pinreset/pin-reset-service-application.png new file mode 100644 index 0000000000000000000000000000000000000000..970e9f8109d547f92db305a726fbd123fa9b975b GIT binary patch literal 113741 zcmdqJWmKF?(>9vmG6Z)B!QDMrAh=s#a0VM(LLkThK?c|04nY!vLkO;edvJFN!3H1v zV}I|n_xtQ0=g;|f&RR3;UVX1M)z#fq-B(pzJrSDf3OHC4SkIn4!%)BPj7T(U2C5n&)u~ZWS&)wQtdr8P{7h^($Ah%$6?=rP@meEu8Ick&z`-2{q=p` z=km?!*|WzYC0S`*FVll;R4=Of1*q?Od$bex`uOP>?^mGcF_ros|VQ&4ri?m|u z!ytLFi1hS%hXoVv9J7q&x>+LiY@yZLE%E&X0Scvpd0^k?9sbdDez4(ZMFxThS-OP( zJp3Wanf#-pqt>dRf4x^MqXgL4Xmm-5UbrgW&U$P2claLGiyJrs$KHL9Qa!>Fan+wKs_xVY*4sYlR%HOi5PV!K-OL52mH1hQ5*_o(wodB@oY^;RA zAmz!^aX$$$1@5spxpskwH+`jyiiz0JFp+wU+S%$Fdz@6W_CW#5L-^N`6A|`_EVDGj zPosBt8593lpcH9qzVs%kNu;0t2G565;mhluYUyuG!+UllXh1KEulhfD3W|%}9SDV$ zxoV#`%ge#<){w8Xjg>I^zF)rp?kB&Pg%fzqrp2B=yu(_Z)8xo?f_hgpy5g3yjwpQp zrk&;Sq5IXMm)?>7`ANSv;<{n;OyYS%|ILROyOmOb;?%Zv;C17Kq>;~w3!O%18k^6) z_)4apGF`^6-y_cHfo^5`G@*i|zQ znHuewtU}`ti*Wo5lCtQ4m8`(9mfvisrXj=~>jqpT6bk10Ed&;gfK;x~wOSm(tkOgf zilmfj2ul9tCu6q25jW3R)7$vJEnZ6OX;R!J)PvfJQ{CV`NGX6zmHq+(3&-Bn+KvEtcN&#WXweyQC)*D3hRB?pQ0i?Y zMAZt$m>aulLf^N)XCiObK)(cn5-#K*qSG#R zTi5*c!aT>#?r-ke4V9$tJr0{6hRV)2z1q6?7+@HXYEJYq-8Tl(_#}2QY3+_NT|E|h zG*H0NQA>``^}Az7x~W%+;%drtZSJ zhxG0CqJO@;+1;x!%Tf2`_$KZ&-DE%6#^6`}o%3F$VhC)2aTN{q)h#Ei42y5Oag4(? zA-#uupN3NJ_vs%Y`&@Cfpn$Wf%q+%#U(E7cwji4Hd2Q|6AA{`6bhh2?|Ku*QEVs{M zMM367#mC^XWR>+@sVUrRJsSx3eM-(=(XT2z-oT=`S_HE1AxKxySYri$3=aFDBGR2R zU#tFt%qmm!!ML^J$wgr3(=G)Wr{5itDFy!UErq|6DgV4V;Z4#9j;P{${G|hE>tg1T zj+Xfi$l$qKQLXJ(%1Q_uLl7{-T<`W2g<9V0#@D#UDwlMWXMzxQ5lrPZZ=xOK?$C*I z#I1J8`Yi1}q0D2^Hhxmnjr1Gk?Yam6Q3YP6V&gMuIamfx1QC?|;?lV(brOPLvv25P zF(M(?jtBMJZx^E|JBcWi>(X=QlU;>utG}MYBPCi7t0N9oX+!|BI7=GX(5!ka4){jj ziii~ml;Rc4Krv1N7BhlLGosmOx!HqL!6?I%*MWeF3Xc05o;#2Vktf)$Yt+mfw6kED zOaMCJt5V62->JK5%c3dyrSPBg@P>R32Pea_KCx=88(BnR zBs6XXKvA*p=3+l?Wzo08Kev_~oUm6nCB>hM@4<=#4?)7d`}cW@sU8vSiJ{T zNbxczx$7p0KVwuPa_lQrCk=^N?~#HiJeCu-ja~7rehil#r~G7u0qoe6i!;`sdaz<2 zhsIw9pN&BOb>WIKst{^<_=TTGB!GC6B)3;T5qI+{O5FTfM4#oYoM_!pK8Xkn9zxlc zZ3%T&=yGE!Byz5(u;q&zQ#H4)YQWtGqrxKyHV12O(^}v}5B$l=zIWtl)iowI$W|{U zl`y12+cjQ?94Wxo2!Q>6bkIs+W&Rc9A~ap#R7Ka#@5~RiSNI2}MC(3l644oc_?czd z@abV#nhzH?DXgc#^+B9sR3elcczfrTE*vX46s8f4(pLt|9I5GAofGr{%B?wSCTLci z?T+R@P^I{v;@{crTZ*7Z+GqE4fg7@pne+ zNZ9z@nMh{wkvPgGyF+T$+j8#@ecEP9a1^9hj=@3U(TJ>R{q;eYsrdlF*Rds?Iql^N z$I(GLKf;D&D6wunS0AxK)SUA11M3T#pEe#ghdoCcxrDzO@U$7o2*4)BaH*V}>3eRm zoEmtSAz1nZ5=-?O`Zy{Q%5Crv0J_cv5OhY>4WKeJL#mmd`CercZ9EFC3(PDH&XTFL za7(s9@oQr@b9D@SD_TP(gf7X93#4KD_~AumM~@jc&~^>C;B9Mt2&hER7AWQ`)fBPL zAG=92>D3sQx4H*x*dM8I^Zd}=4&|$HC~w2^^^Z{y=27(>-PJL!uFp`?LCWo$<#qid zN40jlYzuA%c&b_)YHgEq1pH(RqyF*XlUq5O8fMnv0dF^}lE|h1d&0NC<;!=1siyf? z7US@F@h1$vnRR2N4D_>VS@_v!A^mOqR6MocY8_8R@8JPz+k~Pc|&Rk7?AE_u&TKT2z zXlHcUE9j9I~GW!b!k zIV_s`Vz!@;N~~)T!i!A$0c}K(`)=&CdM3|1{KUN+eqYUEj4@57OFEX*88Ca>`KK{_ zn-e;nF6Ig#UJr`Ge%dxLvx1}CIC-%bqvI@dj9#`>c&)eZ18+#_5WV5+Lr414w_03! zNBgtlaF>(^uU8so-<8I?Doq-r16&#gd(EKmsMPhT^+dA%UZIM0i>#`e-uB`wn5QQW zjcKnt7+$%o;mQH?1_6EL&_O4GZ)WP1 zU7_2x({M60S9gXMBGS=@H8UMt%Ta6RIk=}sXR1R*RSi)!ANod^-3y*3GnS>q(y=3p zt>}V-r3SWIPi0_$M(8gec8+s4tFdr0eT1YKf86?+$@3uTZ9?L3)XB1{{wPY-GPCZ& z&ZRY$9aFYX==(HaYHIlQ4W+A<^?4M@X80s$gKS$z7wZ$I>mS{{AiDYNznq3}-(CB} zeJMez%6QD;IjY;I%x^6YlWpj}LCX!);Vp<58wPGq6lmH~KoL6E9XO4ZQA8 zo|hC}ZOtw$E_1@Z=^7oiRvd%XIYw~epflqAnFIf(+To##1<<}k9OI%&H@=R#YAhcE zCuK!Aa*E~F9p>WN53+N!^%e^*2@D3ddqzwmUFHIElg|`tF^t#bqk_g9F?+%L_O_%c zvy~(Cyn?aGaz)+QVoxqDLO?C!P5ll7Te%##)4gxoarJ#bfhdZTovSnDZ6~70o5-^z zMH;5A&E~r4iBhUS_Ru8w+!!|vjz6vO8>!@g;yoQ zJhlxLHJ$f{U%_dfzex^gz*wPJW;0#rA2%EzQyCZS?iE?@2^2od+T z%w_HAFRs$~mYVj$LeV7W{JC|~%Gbz8a41O~;p?@w%Iky%h2$SX&(dj0c?OvPFFGx} znwmBiTX9_{q;hd=85=I|Bzwus0;e~rgr4nsZ0$sO;%1=6aBJTEH}=*|8s>c}@3V$uZ^{ti66G z!~beWKIyix77^Lk&N99=GU$1RCbf%y5Uk>QSA;g=7oFqrd@*-xjgP(A#gT$TNVM~} z%?qxY=Mvmsd49+3W*)zHXTjcm3v2`$j5TF-;w_RHLwsm9cN;8*U>prIHM+&dOXgl~ zG?w6Ii~UVUC!ZDhy@RGcp4H@Sn(qCP)Dy2YGvAywM_bld>emspLcFfTHjP!DzMi=B z!p4Du!j2Z&=EH-I5M~U^M3BBj7JJX#4lkETGjIs)FFHqM>x5f%dS5ADcv4aHGn zGP=6G?|ro>V(jljS^#dcXb#|70!o+}l1eYlu@K!9HOJ$wDln;Aj*EzG()eD>w?Spn z{g98$yLI&stUW|_x55K{+jPJoUw~%r6(C#+&z#&!v9>u^>Prq9wKOvQN@If2kKn7{ zSq1cMOIK9eE*=|)u#NVmGe9ccXY-oT=fyt7Sh_X9HopW5HpyEi|j$JS4r~9XPpIlb?MXFn~I? ziLd5^sc8kmA|TIZFG=X&QxP$V&;InI;JGP)LV9}#M)|$Cu%|@?;a_L(bSZ_dx|CraTIBj zsW?ytwi_qD>8(g48m+KQ!sw$K0T3oDN5In{9OA=QJrNx<0wfhl>t8Z^z1E8dX*lRy z+ro>IBdc9FRq7kN@~#6Z**HdMIOzoW{fPJ)PTUPl*ap8RON%_z2oh=lb-oQEdOHq` zCl&8@A*`o!C7+*xh&t9XAa2-}-OPSIHa{t_Y z6|bL`U($$1+{`TZg}{;VpS;w0{sj}i?VS18ksDf*bHk^-FqeYNK+0mOhKPBE<1d>F zXTZaLv|7hk1C!Gq{L3x&{49oCuO4uIq&dWh=A^?L{g9nfv$}V61dtUf+SOl&D2<{yf5Lfv{hk&yug#Km4WJO#hcxd>s=Ed=8AfIbLo{7h=||kW8-Jk1tT1&# zB4QV>&&ccuU-Xeer*WQK6L_4hJ#Ruod}H517#>~R`}+qVFnL1ZM$=~o1(ibl3O2Oxc2BUoxW4C_6M+Z@{*?NAlb*YBg~#wj#v zvlWT^DusQ<+z5|UBekKw*JxjXh>o#IWnrv*iCnc``jtVagpyAcuj*yE`Eyg2}CmYJ=tpR48QFq0wx$j$=)*D3FKSGNhx~) zM&S=FnoQ@_DiYZQW=gwbK8~-t$W!)S<*lRPtTx+J`L&qa+l^X!K;B~q&#r#bLCL+? z2=$vDW-`seBVISLFq_-_1@4+r~O#z$!0y z>63hE$Wg0C(R3MmfSp|d?iWvP<`&tTchWX|>ZcYgk3pEC_>N2MX%>Q+bO`mP^F-+j*U{7}sw!i2bph^u zR?%)sonGbgwdiF73ijuJ=TZITeV!Bpk3#A%sfL%{LfgNc;h5pBDt4@AI=c4z@7yL% zeQ-Y9pd8QxoVQpGy6y$B%P-1rwA6EF9Ql5-d_e6gqkdp>k*?+#xjsYqTp?#|sALgr z9b{pXIT3zOm)4oiYxF>k5%L1f22*unOc>X0W#eR&7mv<)2_he9Ss4FHj;YJH!Nj6D zPiMZ{7f_kWg4sJ ziu=-tui(S?x5cCnwKJrB!HFQy7D}*DBi#JTP%5D9Duy^$TE}_Z)$&acHrRw`Sn@^l z6;&TWoVYQ-a&HJH1M+0yplgm9`Puh_Bj_44%uj3dp_tP1j9j5HU60{kAu=0;D>Ok`Y30&&u^XI@J)6(PJ3AlZ73%cuz$7qt>Ejz7E&$WuLi` z#AIkx>h_@Zox>q<){B{uJl0NfUj;~`@EiW%P?O!EG>w!HVQ&(LZbPEOivj4a0$ z-K_jr{5xZ>&SGryLXC^$9bMT}NMog1hVwutBgld(v3y_n1+FO^R%E(Y)z8By02FQA zd(X|Jb(wktCCWHBmXA5u&F$o9_I zz4dpzK)#9h9ckYgRKlU~3mu0cW$5bkQ)(+kq|t0Dsc6C|3z)HLDBBrNsoo+vK$qpi z7F6DjA@m$7lK5pF%p^#cn9NP}*rpjx$0t>ioue+RrtgVs#E}5}iq? z3cSk++)*1IYEb9^E64kh5C>Uuu4dDYN6(e8i%E!HA5Yo+I!fEz9o}VN&pQBx=?ovR zRtRxyuW_(DlmisK5?uWNZPt71(}(l9lQHr`XRx5C55 z+h{|tBvp!u{I^xIPS@}mdj>3p5LXl~R5<2~k;PTA3z_laO99?|Any>C`|{};#qgp){PeHy5L^ngnVo|9Mt5KfWmG#+3dUwk zUv+mWUQSuAA+;zppzI=8uoV4R!}p+~R>=I?cHfVc1Ct4@uR6Slbm7fMrx_YVY5TQ& zU&gi$V^^L0ut;d&S4(J-R>n`ZknOfj;DO0;x|}?H5# zUT&Lra^l}%Ul*qHWx3<@RL)-vUArH$IVMOZ&@LDk zl0E|&P+{-tS%VBurYOZf!LcSzQfUs<)vUQ0A)t;8Xh&H@^5YB{-{&ChgDOR+QAsgi z{>cF`Ew0`4FTA-@=H%9nBiSyYE?lT_-*|=2WJP&+;f7aFF=aV z)zOJI(Hw@txF^_JH!}aO9NxV0fl9-KZ|nRDdBMZndP3lpcPqcF;pcGKOlTjpNI6$S zJjD5KM83-?tgr!pBW|8ueKSC(EQIl8fZ-q1AqDS-3VIbK(@ND@r6K@4$UxzJY0A&*K1K&CxQ|>^BuPV_Dw_B%t8+y#lheoeX zV$1pCOZC8afD8minMwD=&8dW~0KXo@!n#WAFr?SL435fvyUO&kJBi<*frt<@xJU>Q zYO;Tv_@ZDpLNRMI6xHk}(H+VpNiIRk;a$wM#{$$*$ZPjHxr>{YATy=<3}F<_)C3x1 z{0MO$r@7>gbd7N#5Fb-(MvvK%yzU(^cOQI?V^jMx9fA_D@_-TxLEa4EIGDE&a{$h%yLOWr zH9ZT9*9{zG_|_tRLEBO)wJw;Io2s)^#*s-Ia|x4V&ZIh^ag06ws>vye$A!Z<_s+88 zs;1LL*o#wZliOTud4jlh!UtI;bxe|`f5wXfnn}3j@4C0rg+Broh0D> zc#Bd=4KO`-r8oRSA5@u{4cn(m#EMeOaQ9w35pS;oOo&y=KrnT$Te)_&N32eltpWOw~LO~+_yYc9&9E?`Vf`ddHV_keAKCZ#?AuM%R zjYBt9w48 zNC~SlDPdgM!$pd6HMnb*v@M~z`pgag7PO%l-a1Wwt7 z%>d0q)yWHS|MG5k{x*OF&a$~D?^bID|8}GmvS%wJM_ckKICzXr#cmM&!DkmPu)TXi zPO-iB;rnM(#Zt`Dq}bG=-ka(8ln7i$4{yB@eNw$T$s3Pyoc*W&d{2v+^Nb7D8aStCMIomzsV#o{w#jb7IgBSKdT-Q_n%&N1 zqY<@*UZ@>PGB7DBhdBJCXQeg4)&`+TA;XC+tq%$-o!=6joclRcSm zS_qE`#d5VN1#&A-cF4W$d8~(>2iusw#x{S9efZ?+YVpkeo)T#VjoyX$y$IJm-@BO2 z38{Lay+JJ8bxffDi|_IOK(VlM!ceUQPm6r}i3=?V-=5eq|FrN>wEF(P)`su|%bOOz@r*z+ zxFIP0QGFalVNHPAjdchT)Wu6>)4G)8x_HqKypP(lKh!$xx8nPzd#nenQ^rg%6$97a z4E=DELZ7m~5UWd6F0sp1Z50|!U@_3RQCz>UzGqg@?#o7afVSWDC-*1X50>h(yxQ=C z`w8(h%ctuG8XpQ`1ikv7kH0g7EI1Tr_-G+)tyT?$2)2`L^si-p2|5;W)hWR;uV+Ug z5lqn?K?~dCF`#_DEAFI8ou~cHb(ssLz?so*lRH{U>4yL;s<5D&IsYL)~% zg0MZ`L|3El5&o1@Y=VW_sLCIhz|};l%k;lCR7v{3(Eewj8@v7J{I)NfLO`b`62U=G zRI}*rV__(a?eH)R$d-(ue%n<=FGHz`DVQ_}aGWQCx?eBkz5YZgP@mn!v*%nbROm^B zg=%bKvN~9(l|0}&#tCR&rijZVaLO}8wex3tu@Z1mXNEac%ES8-Cfq}>NvW&<ZD~o1_$9=&VaU>5p&K<|M;!& zbz92Vp665WzwI4D@nkGJfhuIZt87zfwxD&ns{%N7^Z99eP^lG`6$yKMXLo8|_=UWe zy|&P<_bphA3nCR9 ztum|z-nE6wiYkI`O~j-vWliUMa_^TQYQdprdQ36e&@6>th-5heQ^CrR`sxbDmhwm< z;#tkA21h;2^rU1XO0%+<-CFlAU7Ng10xyLJ=Pm}>hZb_CbHC1Rm$Vl~ayJfgfA81$ z@=?P~FGc_4N#smkdV?tD`ob%}r1y+9^Y_~-ry)00eB1W3eI@Vsx|ta*vkf??YIIr5 zuS_t&7o_`t#wK=umw%nyW=?_Muy#tm0(n{$+3@>IAr&@W2187!flZ5A>MV%{1#+rC$)%z-VuxuV)-Al>}tghC?D zB4474DyqVr%F52^wz19iYd`Gn?lj%h$2z5^>4fj>buwEW)Zzp}PTnpgC8b~XC0+FI z1)XA*s*r|hZZlfm^a7VQ(d~&hAawA6VtfR>nSTu{5v8eZsFHmV5-4XKkt}pn$>iq6 zkwq7jXiWyVo2-U%?}6Of`NKPSL3**Hc@ZJ+EM9Y{0<&DXqBNf91Ztyrq`RQ8SUg(w z#E&SkUw@<7+Osg&%{6GbAJGiUoHR>BC~j`P7J3zZh7AMHU{*=s1xmR@K*PebX_MCz z6h!<7POl5RQ6BtXJy*!?;@uX+p@=o+3ZPF6rIhpc1f|^~w)p`>Mb-_QB#~oY^Ij&x zVV1pu3B?tT<5YhLLm$Pm(WLZN%&G+fcyVBJ`v+~+zKK`jB)R0F>-w2p@Wqh?#7tsk zrgi}jH#&*YTX;arQ_TjkyTdYPZ97zEfxI3LJYVieC4g?yEY7!v|B@Y0DQq|z9JCl7 zB8Y8w!t7hhoWAWJ^0G{ncNmYZSL|>S8XvO>c5}8OI!$Pi2@DC-Lcl6SjL##wx&OkC zXRZ);+Dy5cn?6SKPts)moqrw!b`orN(w>u-21wfo4cCWa`JD-8(vPpvX^fd)@!Uug z`PWOlKtF_?hz`xtDhD#JtRp74h~p&a;pEL|QeP8RMDec-$UVE)pNZ{8EuV-`ewC#f z+Qlx_?MzDAiE{gGTjh!yFf{mUg4V<#d>}p}KE&I>V3pr`x8|p*!QyZUAGzsLxYbqS zGJm4$ou3MWzgPcc&24%z^li#I4!_~}?{2XhlENz1ZV9*d4 z7{FsOmZ3%V(9BQ5OzLW#LkL<*de|E2 zf#h9EokQY1CVYG(i=AjQ$QR|$d|^i?lX3t4nNtGrqEI$mZzr{5K{#{KBEAVzQiCf!6ADn}dU&SVfWHSHCN1v_+kq z1EB&1@3(u|3fqBBw4Lsd53A|K@xus0kXg1w=Uk}J_;bOPnG+YOL&dc11Zt`ETImYtGz2R?fBjT zU{-?&@}e4@ISDIDi;zWi+DGHUBD?oKtoDqj8ymkqayBa%zTG=J`~^IVUVXzzKqI%w zpU6^%yG2>dl8~7dUQ(PeM>(XS_l1WWM{LB>P0dwSmt|n6_lSBO`0~rVxtuoele`@zVxyWRd|Ib!ageby|ALd>lWS*VrnZ(}_MpzQA+elH>h^ zTG*Yr^SjY2#n8>XSn;1fppq{ksu!n&m#a0ID-WD?yMB!5UU*YJ1Uqf~D28@Hg{Tjv zKph|lwh1C-A3LzKa}#c~uVf;vC$OZfZKP}7*=f+B&?xn699O-s+6-fSFMHExo?%U) z?PVANkSjsWIL7`PJB7dA=*yLc;SdEY8sh<;#bS{|(x2-XTF}WmMUvVKetWOY^U;Ap zotX`~jm_A_5({-m6*(kC8>bQq8Bywz^;{wJ>^@s5z9wymg zlG$c`VsWBUC}Ig(40KHkv*qs6v`>{QBw=x#=LHZt*EW5d4sRz3G{ffS5LxONfR&i6 zi*Q6k1mP04IaN39M+D5&P$;yjwiZ?kUi#xjzLbaGnUL(QP`(pN!B^7DQ9W_xOQhVr z@&toMt*RN=LQEn$j=Al@GH`bWRM&Z$K#49Eedw2NlxShKDGF=l@Qn@LZgI?$JK(2m zdXjYx$}*QYt3!RgXTGJ1!)*qiTC^GYpn~iWQNtIp$Fbd*lI}8L#(`Co35ZDp=kiv` z#>Pe&F;rB{A|Fv7-*Md}gD9Cm1T!yUDB^>j49=-G`CS%__ZI*74O{rBHV8z5%?W=4jjZd`r{lO#lq~4(}h!Uk5 z(H9}$8A_0V>tPd3A`u)qb{pwU6z1~;5-U}qO9Ug@Qj+vczdZ#c!QO>KbNsqxvOXzf z`g3)~65kqEPqsBtp;%T)DYOhi0 zNu;cVS!+!8mNgvgala7Sto$A^Yd&tA`n)GSUF5?nlF_;)i$?8;A2N(J*gXwne?*u0 z-thpp8Z8<`d=|N|E3AVw3{KxsRv7}gq1Ht22 zlQBZm@k4x7(=5tkt`^s#ST(limD~f$2 zo3;&m%%I@&mNzpy3ffv-6Cv)wy>(r#Y>8ViPcsw_ROGTqX&Bn%{Fnti3|2C31}uta zbItb1PRA9@=To9RxC+~RA}S+}uT_(3&boW-<{T-4Rc_R}(04i7SB;8f>M3^KZEbI_ zpYKg#VEc|#e6L4W`zG{_s$BYPchhbg`GY|OASZTxp~&(nU0;NR3F#dPb-n8`o(0px z`#697h6rI}b*e^muB!h@dBuwo%!KsVQg&s?nM}p{3p4F~P`i?{DwQY&x)Eq28BmRn`MXh)X!Rg2>@DE<{%?qi=h25Q zXd7a{ybW(P+j6bLfh{p-X!*=Xk=_)QnD z`uXWoVUAW?+dEjNE~73x+6BTMG?ed3hWZCbV%}Wp8U$!-N$Ml82amUO<&lFk!trP` zsJ}9RitWTJ{+MX$8HS#D;#UzYs6q)Mc6``Mkm{-4!gtTgTCJe2;zZ9U&0A~wuRrGj z@0uZ-@u`WqxpD5hqqJN{I4gbUHEKa-lX<+tQPBD|LYDaC_;6^SwpIaW?;jX=T$kUr zg$|A@yv)HUZ$O^29Nrl~UE_7^S0W9A=^mKcZ)_<>#K61~MU07A@z2Cx#4MR@`u$-e zw=nCrK>Q@KW#VCtPtQRrC_j+2$H^!_FR0c}6D-OX`AXF1L|4Tti=;TTwuv9;a<0Y{ zf%37UH?Nc2v~mGFu2|#ldTI-}Owus0WCcoTCo8%=`VjqDw993z10)2xrCFr2wKzpl z3XHyZLT_J+$px^w(RwXcR)|19vtxtKE#}1fx}eOg__Oxob0;2Z2juwJCR(vmb5>-A z-Cc$Oo}_>0U%KOlpQ33*baH3gwIaI}@~dJZt(WT6fsd=|g?2V(-=-DYDWOuLh4i)I zMfd}F2ZRx3&J$z;-^a^%rbdnyTx z7SfldZ5zFU6{z4N_$d!g^K+C9P-Y475!rqeQTiCOF}`>)QjQvEW7@1^UCxs%R2n-& z6;_H?$R7&S)``(ZrZMgeU6fu3yB;;mZ*bod;u(H)ck}^%7u~Z5;BuV?vV3o|LKVRai74Axk0JLEFRmL8~0AgR-EeT7C?-&PFikk zwvmPFYm*3Zy#O~iNk@ZwurVoZ+-$;jPwMW;yva7&2&P1>92-pHis#PRh^nPlx1TG4 zPCycWpTmL{0Z|t1YLqT;`IAH`K+dAWg6AReQg1+c3uBkba&d)WiB+dSKp3aFUfvRn z5m)*xbw^Fnr+>cof`#N!EIpKA25r94!nl-U zXXDuJ`jm(UZc8_BMvN%+o+5MdidsH_k7Lr9>^eSZt3QOP%&5(+w+x-5K&t3BQA6`x*Yop?4ZrcBy4-V3Vd$zs+5i8r}(@c#P6QyjNj(a2!o#kz3;?Nf0r% zCd8{_Lst-1z;cniiIPLHF;(rF$R6| z!;$mEBB?q<)UZk}?yOw`y(AR7X@&)6A1oC32J6c}a0xrET4|vGnG)y z;alD=$~dp3-AqEaZgvWlm+r8)F$_X@_l8%O6rA=&SYyWYCt_{7QPaD*j^pHeeBlSGsbMx8J7Q&d-4BNq>)W|!qevM6m?u)1~^OJVaNeky=qXgQ|*KcL> zWv33w1mF`UxyMHIUGs^&BKgZYVPh)|zLH3feMe>z>zwM2E!>W>0N{v7&hQ(9YFH+bx)Jf*Q>wAi)c z(?Y6uGW>fNf5(*#nYGyy56~HP*GhsQ6(d}J;$`&NiqQaRJ3Z?9je$*Lg@>>b9&l2W{-er zp>~|Kja0uLFm2b%KE4q40RmM>C1LUrz(Hu;{kj2qI*jCE%G+1x&{WWGPG?t`{2-3_^H z-oOcwIJfRvPXWpYo8(#5743WhG29g2xoeKG)pXe}nQA11hs_q4;+5TBj-6U1Y$x2! z9dbjW_LK{u%y~4;mygv#_p1+H2Qf1j&;AKxn$}@t0w~h9-|TQR;;@LZY6X4Av&L6d z4RZE22^qY((4Joxhl#t9LEN*uOCj&78IPby4ix_>Z5VoV3vf|C2#@ zQtwOb{}0<<$Wxl^$_ben(NjMhlUROqcB^Q?C-^K>H7*E|5n7Js4lOptX!_FHqxWvuX;nP zIiN}AMMaq57i@FbYXN>GDo`o^T1!SXmo2be+ux11D0_TjxT6nUWF zn|D)qYMI= zcKHvKG1n{e3p}ALXl;w3`HN}S@Ebc}ThWPb2N9u4oKWs6h42+pW78^jAsoj~6_X#= zM&owGzvpW!Yia9-cUc(Jk=qry%~pX8Req5Fq~Ow8c=I2hMua0!a5A19I8S38F4Vv6 zt7zr59e)L=D5NEm>_VEAThLi~UZ)-1y}0W(=ZMeb2$xHETC^yFi64t|?T#Ew91F3O zB@5;oj8it_&)Ae+1Y+7!4>D|5N3o!OyLbp3J9jx-$>{)Zo=E z->0W-tV(yf;$4c>hTHQN2r;5jTl}Fgd*RRWs~0bqppH_&BSM^;f^_zd&}@1?{Gs4# zZGFrKIpL$AEm1$#>o^>kuSNfR_q35ev7lP@r|ORpHJ|ODP*s$<3h7)u`syx5V@mn| z^e#m$nI;YUnwrWw#gaVD5vyzJPDL8GIYrdhb5`*hdO!V}T!6a$?W{)|%XDu`fNs1B zQdO-S_K&?eatR?*s4V4Mh%zJ#E#}KB5=r@sUk!HpfS2{88vZkjn5_lU^h$3(T_Anf z6GL9Smx2FYGym{g7!y5bYDY0%T1VJw6I%Nm&66xj5NuyR_IE+cayyt@K$MZK0bL1n zrf978Gfr@ywdL)gee~`r_GHWS&UtXgro`Jq7O%~0$kWX-hgP%J1I6+;ZhA-rgo*K4 z3==ISvb6Hj>J-`pgb7J$kV@&NVzpYo)n)6y;cSkhrZLg%m}e5nR>4@TFl(swUiNgsuO6RF>pYc)Q~h1 z%hYr*1&Kb>ZCU-P=t;^5EW49QdY75d{XQ|3PD+fLRY{za-NlgPG-_zYtMa8_v%=>M zajUPj`&fsmEG^`$?CluV@Az~|2Q|~k$Nr>8PfgLO-F{=hvo5k99R8D&WAe=H9ZaS? z=!*a;=1I#@Nk8e55V2KHqoRiT)Op+w)h*(^)*_`m&*0E@R;48Tv4zBT;?lIDvge*A zjSZT%lSzdrPRkPsCYpfs2dLLIaB;W#Hmi4#{)gXZo5UG{)}!JbU%G8ZS|<3513mbC zN|Sj9hK_OMfGkC+uVGU$6(n&s%S%rvC+s2f>$zs>7T*3%`M76UZXviJ4`|rRWzXnP zN;TtuqNuKhKBSF7NNR<-y?xjx?83=ax~F_+Shj>Z-)}yq`Q_5kE?pF_TJrJF!>Kb` zjL0@^?3jJf@z>)n_Xw;KVNTxfmS(Dwh`b%&%N!hvmC=bVW2@7qGhezN?<6CO-qEmK z-bKjuTddNgL#;C`?PzNzKZp2drX>yLM0}>mkxS9$3T5F>sAKiDK~x7x+=}iUcu$zd z`GJ#kn@ta&{x0F?&{^qT%J(D|_5lT^eKBH>!M6#rrX`gp4{Z3`ujm;Kev4()5as>Q zW+aLy*?zirPqTuanr{|{5A@o4O~9`Me6${m947%35y^?NDh~7qHiQbT-D{b$S*+3@ zh{gE@^qu+lwzZ!|GQ`i059rodY=IeSz-6*t#mN&ETgA2SYmWQ6w*;)Blxa(g+}XT+ z&yKgcQM&tT_p89K>#Hu$|0kQ#{k0RF*A~G&_p(!4wQ97_DicZdwaK-6q*`12=x}pG zFJj=pJ=2W$ik@fv!-dy_DAaEya^_**-a!!uu{wX7{5_i5ubOH9knh-dNA5(W z%pVno{ttC;)fQLNbqj|eLAr5mEV#RSa1ty8cbY~Thu|LEEog8F7TgIIv>~{=1b27M z*Z01k_j$iRun+bLN4@H*#hNv1&QW8GayZOW+r%Wk=rOuO+O-)b1zSxaroG&<_$=k( z=($3}Fprn=e1~ArkEi<64wHZiEG?y9yN}am{SvUBBRpKS-aI~!$4$`j5;hbS&TM8z1U~;=kx7{2n+fyuI3gA3-BaE}g%#)I{ukob z;nz)9Z@ya-nB7O5-3o>iY#;=ZHk>B23A?ggc71E-RaKyTtD&2{ z`8>A82D?~#US%f{nZ2rizQv_FVN)EsmE3Q^!;Pukpq))FVHgz^{xFIu)Q03O3!x zn%%OYfslE3AynOD3LE=qbDEt1me@+lA(XY4vynOD0?AFeJy8#o;aE{~u_w*8C`t9` z;H5X5KaXDx3zIR|2MO+r$0}KctZoiFR=}cuNd(EU5m9abBvnZp?oSi<9WOMrskd1} z5R+%^y{S`8(E9y7g?fKSO{r`RPrdv}O%FfFrg0}tqESG&!8U}SycOI#dE9))NKmLL zYHGEiNtUfe>03l5|4xl6ziOe=v`gpec=@&6VxxSVnqu|kGT!&kcsg;50MPq3tQ*zJ zxYJ^Nnv%%<+#~`jwmab?H}?LL7sGSIL;j=I$Qi3UsUzXX{3kn$AGM;i;$l%WD9)Te z+#OsjTpgA=XuRSKW7~<0->T=sSNqvhG@2a0btwG76#q4J>m^*aN0lBFqGNxXZ>mmS zo|Z1@&FFJKY|FlDB~b}HFfC(N_SI9BD;+Q8`aa(5Jv}=P3y6fUNRnV{-+y9`5sYGk zfFSd@mcd)*Z~qLlvu4dx8ZPof)*e^5?2oAo&_+t(H8d563an01zS;_Aa&@qXX{X;H z+dtaQc_&-lfs{TB&X(@x}w?am)6Gsglc2cq*0!6ckFz zrMdajgMuh%)n(#ivKW+biH4UBEh54vG+HG>VKQSqKdE?gxjV%+zI)Pr6(BICOuSl( z6$+pXn4k&GH*VsGPW?dEb5D=LV0r?)XdjwnlJVoy$OENL-Ru@j0)WA-Se*kC1)LU7 zGD>1)D<&F!D1We2{)ACnk2kw&Ur`F9Z}!Lb%}+>k`wU}hrS4N<#ZFIu!hmn16Zo%gLqr{wn+hSm53v!R% z(4U{fPjqs1FA4XS3$T>z_ZN)=He^)OFw5gYNA&Xaf8`PLxRJrmTcU}B6M9g(g!M9# z8sb<50F@}d6XC$YUx#8y1;OK$gujvuSK`huAYT0m;Kw1?=?q`dEzvJp9L zw;0#cH(}A;X9z13*~xW=yYH)gjJRsQ5(f8pS<^M#f(Y=|7gCX_y~3GO1iB$p>-2i&w+GRxVH5#GbZX;~fa3 zT<0Z7Kh*j0QmCM%f4>OSX?A!*2QJ-ozcs?j6YDpb9{1Z@ZRFB(GYk3!0e36mnS*id zb#MA}yUOFPO%ONTjweca4y9R7)o6;q=gh|7FRYOr(ZF)U3|G=%G;c~xklByO#It!X zCNI7xLS=I$KGZl7p#6o%#C{( zw`AJCg}KKSFD6eD27&&ngs$bI>A8}Bp~Lj5nos!Nvt}>k#aj}Va@-2}6FxyK5If^A ztN_>-!Q|O(K@XiA@_Z8%+EB4JyAI`YC32; zwvL+>-@KRSA)DO3~X{@(XEy~2{ zf=txl*vagYI{IYj#Pb$B??KHLh@aZIbjJxQ4>BlKmZ7))EShpX0ld7kDxIu0&+$mp4uQ2@mLU)*-CokS$7BV`mtvD?bSV${0a0Doe8i%gD*mREA`}ZFDAh>?5XP~K4eQ;%H2o6)<5^^ z{sm(H_W$Q9J|BZDYL&%{<}Vi5pVWDrLn&1u8)@D|GsF_fzV>q<-b4?bWRI8MBcNM% zc-3UAqt7Q<@Nhl;&NwDLw=dwM-2-}1k)8gCv3V<&5qfKwZg=N9&98u8hBOoHuB0w^ zl{BH`GY;b7i90xM^?wvIg$o{A%CN0RNacyE8L3n*dqXLJz*87T5=N{4L1ZU#<#)2qk5IGMJ4MXx6&Tf?vSCCm6@kYoWnOK()q z^F*$$zRNKmC`FZdhpu$KQ}iW;tr9wdl+26ql0q|4;$-7O!cFd7X$eIUvljY5vkd0U z71OIfjiz8>uLYl!eaz=QMJu0wJFp|kJ;=~j@_hhPFs83PBj3FLfwBs-=fyct+^jbsV{%52q?W#z~c91ZJ|IEpvjc~bZ5KETiR6Vk=>t1*OA_F-3 z9Jy^^vrxN$l?I8(O-VlPW@MsBT@}Fft6;@>&kg_*l2J=FnLqT0PPT}70W)GNFkck# zS^_{9Pe{SbZZPHJ4Cq$A*|LZ*$qpuh0?RF-?$Yq!5K36zEC~7L0ZE&DgkI8Yo$(%(K za2Y#s!(>J1;V+J$&>0Cn6s)#W8b#84>Fjl^;%&PL=Vg?;6ytmV)2(eyQiIbYm64?g1V{ z(uX3HnAcWVw$=F#zAoRaVxw?0E#5_PC*YAs3+8b!Cy*1x%Fkuz{y?TzYzf)K&?{Jr zW^2~{4gK8}#S=gaY#`?CThE>sFXUUqGzRv|YwGJoly}x~Qp^GjVda4Z zMs$4>sg91TP0;x^28%SIjgXg&aoY1{FAwqbCQyXA{PWN+d1vE!$W%27aXYMNIeao# z?tLjfaz3-2)W7J1&!>O*pHI$c^z&Pg$$e3!tsMSERX0&xoAESHBCsj&d^u_1K%17B zceA3b|8k6}(eso)s7TCz#ElX_!j05()o1xuP~+)$ohgd4h|9q;))K|R-`69SLw69% z;uPpo9$t%*P*`MB(}i+iP6{cn82_E7o=Ra#>f5aW6JDzYgcTG}-ls-D2rZ5ZB)vdW zKBem3a3t5r0Yy3Nw8ivG*R!=^Ju?8LwR(aG_Nf{i%D6Y82$1J&bj7GYUIzNcK^;7Q zN>1S(i?~RhzE{yiagWvmfRewz!fI-gnIa^gC>TR&E@tB0e6k);`|5%dmBBBybmGhP zY!J$CfU%~!JLpw!vj`IN8VNmQkze)ECM$&*tlu`4H?;96x384oHYOVv?abAg~OJf?|OU6Wgu`ZZ!^wowMcd>eAPRCUs>|W zYXCjp5o|@uYqyHChP51S(_M1J21uWD5fu{zt?}B2R6a964r4y>>+(&PznDwWl;nL? zRQr?`*S5@RMkl{sGxCAgei^AfG`icWy*PuE*C9 znP@O|vpqpl9XoPJUoPM8*ZsVwYLocsOo`@)0ot~cp95gmvB}Bb^W?jxjLkJIhXKK%hEah%)CUGTmE#=GT>>BNHvI3|D*J9}=swC8tXDvC@{yI)dP=U8}yq zsRH-wiwm2f4}ngmsA~*)EDz;pft(tX`Ww@EHmcE%v&z2X1%yGNr!k59Hi6mXdbzHx zH+y345~4XWZ-w|UsGnEd2u#h4`6Q=`*v2d7ZUtQ!-jqfVxT=IlNewgvrA?QUbR5nQ z!Q8Duj9QX~Uj#*P^5QBxXDlfBtBhm66?he>Ry9H=YS|W>j)TR6hMg3bG~gOiy$d?? zH#p^Jv(m^;qY$#Au}PPsm^{)dYo+Q7I+b!;Uld4)F;FW&DOhkWnN?Z+icAo{7};T0 z83^M0z?1W5uf$=ZUfBVVs@d8Qt<%+vD!5+nt`?O<{^L^LQ@m#JJtc>XAm-M_^S`k#0GLd{f7%{@Y9)qPH z7M8f*y&XzVj_=z=0V)`&@pZ?Z* z;gwgj1X3`D57x^#luOlOqi%8V)MWwP3DW^T_n&|vdw_4BklVkf4SOOPYj^{ z8C$hpKsw=u_y*of<&B}1i*JPG2D5I>)}nF!r#jp}ho5v?`g4Wm40MHmHc$O4dhp$1 z@&Ps!;$_9WABYmI^o7xS6hxa_ZD z%<>&+e*}-a$W@6Kf4o0^0c~y2HnTz_wJLPeUuLm)Fsy*-7Vzrjq#f+n8d`b-4;A>H zM9}1})LR|kJ5eC5&TBm$4?JP$I=WI0Hn$ddP9~rkbVEt6yJ&KlLm46UQ!gA{Lr1(y zsnE-Z2xR|dDS9j;U^GMQ3aazUReRpqTP~v{ZN}{1tHI;4y7~0P*_LeLcuj5=u(VkD z2|ls@PH^muB^sAU`cxfhp6(C@G4J4e9{qP?x%&^#ACEkAI#vr`r_f(Va)AWwBP*Xn z!Nu`%_n{~;Wce}+7QK3XOk0;6p1)9Z1#DZqTaWhPD>Zi8*;gH8;u;1 zh1g@I!}hpba50fJN|RYh!9=srjWA_c*Q=Fq&B&wpC^)l}^4Z&6u9dz#j@K^A@6vtq zsYeGtX_jAKF{gSXNhZf1`hS ze(1RKBgF9jEtUXlfvgSh5Z4{?N;Qn3uLW6*)nler!x|R9A<6m2}o{2#pSH;)8CP`XB9& zli4jb5%CXZaXN|8tCUD?GC*ME&U%Tt@E_)fss(gNPSuSu#oT{FiQakr(eOmw?1ksjz zIx&GNdX}T7dm;<2cGo!aFY!-Zjgu@GMGIUi5{FJWGqYB~wD=Q;J~^IVy{;z_Eo+gS z^1|N9MxPATlnw0F@8>KwGFIYg@A>c}zya6CRFVadWfSvc z+v^2*$O?7sf_Y0=ipnqi3MC5$Jy2UU#U@(T49MEEN>;|+N6})gzOl@G-ZMY7A2+k< z_8Q^socUoxc+D8$(o^~Sm=ipsyGOqW1*G2)|9TLmw%H2;1??CU*F!N*_DOhOAAB-H z_S!fL^(3AtL)3EzeOXBHQ}7C5Q2w_=cxtsfe zkGFUmM~mc<@4??O%Nwg(uIj+yRIS?P!R{o8eq^!WG=8R;IofZ{Cn8bs5luzKHk#hf z%XEM&?BbclI-ivT-7>{LL~g_ja_3QzP%NDurLepG=dokjc6@pY#Or;2*Km^yzU6qp zRnni8Ppm}b^qW&|7eL+rSoipu=neg>{O0U4mwg}K$jR^vGN(Y7@LWLxtzEykDYU|2Dari-Jk+dGPMN#9Uibc6h|9;Mk=T_y37gQv;_$DP$Klg9>O7m?bd1u`dd3ByV zk&^LgjJ0y|^J`1so7~O$bc=D@&M&c$ng^vqR3IM-Z^(Lcy{qUVz~D;|mi5xQLP*jh zL-luU)nWc$dPdpq+|Vm*3wpNW5VOU@0H%vBIF5}@2s!y?Ff5T6=E?pu ztzV*{A7h@ua<`!yw7FXc8OjLh2BZtI&ureG2iAF>p?mk!sg!Zh$me}2SJE;>A8}Yd zwH`m($~bpB3O*TPm*UY-mo#7w(qocM+LZB`YXb_qribFacn0okAgrA=z)$~J4FoFv z5QB+dSxbgUi4Wa2V0-`iRvf2X@2@Y-Hd8l0aW zq;O8>l|6)WBJRf3?F6OOqVfIta}Ro#^5}y?9dMUX483oA+? z$MXqVfN8;yuElOEAgJTL<5H~HcoX%Kh*0Hzg(I?7v*BN-s zRDVjc*r=INsJEL0WO-rrK47df;tvfjy|4Hx`6(&P)a{Vgw%W_o%a_+`0x_sR^Ia}I znlzf)vM*WsoZ9@|&vbZag`wIb2c53xL5W=j+%$7(91$w&L=X&AnJ1d)8VN4XHb~dW z*^Orat?jZ?bCoKi%*Rq05md=$3mn>updu#Rvqm!@dfZ1NI1cw$@aa#fW#IHc28frs*JvSjeeI@KCa8>$lw2>;w94e~+0LHWD600LSnDl# zd?5a&mqM}QIM_+?2Z;B>7Shiy+vUIGRvI&6P}`clvZ6hS1+or4B}e9n)(}Jq7g_HY zIqG)0uj$Hxf1?PWi%e`{7+@Q)m;1d{d%&!ScIKU21`?56kNcPm9Dk(4l3I<-lXr6 z4ZoU?_|5jKpI6<1R(n6?^#-HCf*6*s*I3_;KEagj>T)i4EcFwbX9JTHu1xDm_mw|Z z=hx%gt7!3mNi!SjoAAc5m@+kYZXIw{DG5g{{C;mM=30N43bTsw?l2j@64VjPj@n({ zGp>Q|U61oXgll3%QbWybe0s*jLV66DJZQt?hCS%O?H_lePhIt#;+ADMX%iTC=<5 zw8s&xpNB)X<04Rdvz+xgI|x`5Qzg@Ei>-uQb#Y#+sz^5R!;wX0`Di}DSev*WY+RhE z`GJo}%Qu0?2#CXF=7@`MgPARHSVsrjM7gH-)tw(x`Drk`oyA31z0r}VVDY+v2D!mu zuP45xHs6Q1Gyr1j5-K`+_hrBKA2WW$l>-6EjME43*9n4=BP>lr1tQd^a~Eg zO;>8_v+k>tW=hzFA8?}Cob-xV=*{eQpT9F)s-wZAbQaQ=s{&ohCxMrGfx1gsj+gHl zrHtA-6K!_Et?r1U=OhXn_{)n61Z*Gy`QlZ?YS;-*Hw1!xeuk@3k=6NN>pqJz0|aS0 zG2827O4Z4Yj2Di*vaR+F@03?{dK?CV31dqLgHV3pewPrA*k2LJRgRj4tBESQk_DneABMpA=EjF3T()Q`c?_Zw{P=ijm;?Fi8tghdP z13lcCVn2X7?4K0qx=)`1na|Anm)>`0c4vYTGm?mV zC7Kz#D$mVJAAMFTbW*?rUA`DE3-z$?EdQBQ%mu~NjN9$^jr$z5qluC9qZ+Ky$je=_zfpOj`K763t(@E|Ym&WR?RUcE9itZfe9})$INx>3t3>;hbo%jz zl-GI@P$6=KosuIu9fL!FODi;nW8vg-GzsjtIpbtb5p|WV`$F zT2Bxfde=$bVl6pp{=I(pfl0=FIAoiXT==%L=n%ffnnrZe>G#G982}DYITq$p)VNze zhI-2>6l09--8t*UA7U+7#4#j8DsP*gs$frSpC$yG{CGpJ4kOs@GV*ZBoPFI?o>71k z`Ld)g6ucC59PM7DY7OPY2`6Pbk8ZMaZmg8E9Y9cR?KOGS&o`AlHuBPNB$Gny@!PuA z44q1aSHAIIh~Q}rAV{P^4#Vz|*W$KDKZh! zRY5IF`UWs+`+smDa#g!q);mm~UVDnnSeo0;qCdmNLc-37-zSi|5DqDs=5n2Am*sW~SX$ zk0)!~-BP71aWstuahG7tVWNG@AvIVbt;1VO`QYLZm!eEs{n-ED7K8$wI1#x5@nT{C zDsXZox|CCb&M?Xr_zns%T7NxeYY9N5#;Upn)~fHi@T!f|unT33zB5EGRr}3+r#kTO zc_g$slvAFlRCm{!rQ`gG&Em7xmI+6Cwg%8eqh{9l-u<;&TK_xv-m6fd#T$PL)YKKf zz>uelt^I|V0|Ri(``WqfilR0UdS^=!twOWgdC3QN{j2$$bc?BUw2VM5d<{$Mv#GI~ zAyXn2M2Qk03oV%WP){yM&M-8$Z*`NaI}a8tI{w_f(2h4@(}_B4)Q(1~H45A7I3Dk~ z{K&ev6WGbzT7Z#(^miPg!15?`>RT2ZmE@2cF+}T$8RE3GRdqSKBbQ@c40V=FHrDQq zNu#OLHyJQk`rtjMfLrcw}^$8QW?~BK|;*qNIm%1VX&9(eMHXCHULkTz8oN*yZBp-s zP=t9LJ4*g&TC~r!T=99VSBAn`9%?= z@ntuRm}xb74w-aZ z4I}M{#Ns}*7VLV+t#A-Cw181^R^3~NH9gX4lcCzXh0uE}q!ujxG06qvF$}Y3?^{&$ zD3!vP<78eiEd&1QtbX;^h7}~Ym+Ae>YOj8$W|Z#*i#MZ3e!a#`z13hEPMdu%K~1Hy z@wa30%MI=6cjlyj$cla00Ue8O-r881Ok z@K{2>3?1o#(To}0rwGIfieXy?r>XDV zx!-IIm-I8OCBNs`}MxhAGQ-Wf{+)k#%Pzc!>8B*fe}2JtSXe7gK{ zlSu9^oXZ8>$r-Z%&uog+j?vk}NeWr!aH{LVz6rB!_T=}oAMkNL59HqCQ^BjJ|Mk*x z9fM<^C%uZ*&t3@X9XIO5K1XeN3&>sPx=u0YPgC2T3GrjIHhlf3CZ3`S-^mHeq)h{wWEKK4 zQ#;2K4Ub&C&>l44WFTi|<^vmuZ@p@*v7)imxxz6BHuviKKtQHH8?kzuf`nIs+-v~g z*qiT$$a#M;wvd}ZeLspeY_*ETql#kPV}xZj2_(yy0w7vu%YD2i&-*vQqXypL+;PI| z^v;`%`@4+ytS=Uz{$BBgG5_71qdN@ek+xW>S*tr6;Q5nty`iuMYmNlTW%c0s)15Q@ zP%B@1+}4zwS_;D22!zXNQfXNK56Xxsw^UfUAVsQ@JoqVCNT;?NFP*647s}u#GYL`V zwr%U1?rlNxl3O>n4I25_HdN!I^cpf))$_ym9BQAUc#%dWJ@hEW?J74fHnVRpj!WEV zEI-;}BK{+8`8P6-+SR}OwTg3i0;8(e?iuV|lP2{{Ck_Wm#YByChsA`%?9JMG627 z@6Days1W?hDc-K!`zT$d1`ofd?HyvB)ghvb|MBAbXP3QWy6gg^R|s63F(g8t7I-5| zFLu|4`5tKi!dZb5`yq$oe@zKv5^hQZB`>`<2QD0+$9|>Dg2&(rjejHk|NOn%zeKPc z-`dd5fV(Hjfu7|ae_x9vDo`1&;l00e1)l%nitRMXFoRE}ujtJB+~5~v(f#z8|4D;I zRv|V*)|OS>fULG~F+2y&T9c_34>y5j3S}DEnjnd8K|yJ-Cxb{Dn4FJI;#A7$)8Fo) z`GM&|eFMAyw88P$Wx zPa%Wf(+K+rAiYMV^iCCc{uh$&BUjhEZ@iTMqwjJImQr&T#g22~={x-qpPuHS1CO87 zHZU)bDmq#jeA$fc@Ye#)J1AUGc!Hwbp(|Ya)VQ9QlC|j<0m~4#3I{G0qdgU|HoI)_ zgGiZ>_emIW?So%`mGT!%r|2&*rFvjflVnB@*{rqFY3m}EJMts7{s{SqPsrG4jFR-5AeQ#6PUmksN>+CG!HZodo`};%uj%7s5Vfop|N}#uKiDClY2|DDG)T3(V zKkEh_B7QgjaxJQrTHDdnV)+vqngYS^ zycB}Bd=($ll&Qb7Op&pK`$*c$#3HkJEmrNQ40*$> zfH4_AT6|KH9AEpGsrT`Vi(6cXx$2QoiZPARDTuYAjTUjDoXym9BO#4GP$@IAlLdZ# zsvo9gY3abG;;zPLH@|vEKc({33uZ012*(N^w+fx!qTT8Ti+pNtlE^wd-JF7-g8wy{ z$a$R;D_QU<|0IFE1Qvc_>J}xSY`hqMrBNjE&|J^(2Jy)*%g1;}qT-lY^n2oOX{IY`#%9Ss=5>C( z8jE%4Wmd-{&Paz0$&P%g%CC29KGB6;nD56Z*H|6uiW0StTww}*sP(CFxP>H1g+^zz zntYBO%Ttr4_e5C&qHyx^2Tp|2r3twM%PF>{QvQU-Wccv%gimuP!J17A@;EMX0|j?p z&$5eP?yA#Q&%5DpG2`G;7RT*zyTQkn-8$7NihRul&<`Mj}`-+aGZUWsK&j z4XMR@ATj{8>K;H{K1(VFsLK5_S!LBe>!#)W3$bFWYVkxXJpuRf=Q0m~;#AU2)0Um9 z+I-$Sdt;O^!FQRsfSgUaayDJhMq8NQEu)5!vSyTIK}!Bx7@mHkfqdl;)b(8e*e{tb zJ__3_Wo5S@R?wmm*xJ59^&TVimTQHt@z0-a;;y7mM8$9KhWS~!IL&T7NN*O!-+6r% zXspr+m5tKwak)kCV5s%Z_=B}eu2>zhqAyM3oOaq8?P$*);f(D9cWDl%iFH_g%_HJI z@38zjjx{ehehapK(MTY85q$&uZ|c9pzY7L{kh$B~Ot!w20!yMlP{FcRFiidw8pifa zMo}Dfu>>;b_!~E1zQn zAZ*A7Ojv4l|FI=A`|MBl%_c%$mViersn&FP`56(=-hdhWDYVVIwZ`mLOrsV$ZCw)i z35S57@EiOJq{&gQ(sz9q=yd|Hj#u_nj8r4-QSC)U%pA_2et#s}ij{T?h_B(@xEtbJ z^8t3d4O#2nJBbSjm~wPN7wDTYWLc!&H{)qlxJp7*2)Vy*V(&NL)nVOTDu~UyVg#<6 ze10`{zl9~s#BHzN-L1I^w-sa%UrJqftakel{RLz$%XGFsKY z%FBl7bW>au!+2M`N9!m-oRJU zUc;5Bid2uktkU*v0ynlTuQ2e$d%}O45@8A=X{ssk=j`&7 zdxa9tmUjYWlv$-?yRZ7IjjX~_emRJ)N4IpmA@wxB3(=L|$E%@nuB( zHy`(o#i{n^f)VY_M-h+oYso3B2ps%B!6`BW13?-IK;uipv)@xA`f8FXn_*dHnK(m! zD(9RbKdUS{kOZJ#hvEp}dpo{F<}7cP)XnQ+069*+GZYRjATM-!-1=4|`r82?I+rsENLM#?jobao99dU=K8~G`T7oxbc|2Y{O>BZghMiCeI4=YFbX=2Lsq zEje$Ks&hKpGISh2C(@hcAC9s3Aq%KNzc5s&_M3f=u#Gg_asQ`Zc^jU?loKzB2o73E z8_EDfcfN#iO@zlrN}2WIHH)lCvnSa)+D9k1a?qso$;t(9#*S#|+|k$I5h%2np+X!+ z6tW!t=sA@KvkqepxqDNwv!ng|%DODlfgo2*fp#ww9JbNjrCjYhD!(tQ5D_hdzlJK< zg~brPjDw8ay&PR*9rtF#6oUPGa;bRMR;}F+(?dbyBZ|(EnrDrpnH0UX#=t# z79Jy=l0?V!zBiei-VvZ6^~s)!Hvdtub{-@Zrt$tGz8Cr-n;T?o8$hL4SdWUZt5oCn zO8|Gn6q|q`X1klI>ur|gH!U*gMag=ZagG8!wykP# z(E+&f$Z~|2f{_l{!wZH_iuv%CD%+6et04^)>8Fmcm|qytbEiQLuWg!2h>t@j%^AaQ z`q+6GL=}}~<%|%rGr25wAE~*hFma9+JBrt13B;NH;rPf*1Ql@da}!#)r|FWtSsT*A(+uvHR|cEezQ*f_I4#}nHlp^C zNH6!Et@iv*((GJNyphHc7uhR|!IP#()+5cosx<^zw}uIzTHL4E!7wR1A~1}(2~fk7 zebjaF((G0d9Af5PB^v~X$t#&K8qB?3vU`1Qp^sG8HZ3Nn zye&q0N5955ilnTGD|)2Kq<>p5MQ-%qGk%erT=^5B;K2!yA?($eyGC;1N>EINe;+P= zGGL>`nUjk*FrtP_Nx&iOI`Kls$SGXieluw$YETXhBlY`A7*HT@KCg|I%rXY3>l*{^ zuoDoy1HCOIE)~G)nYU%R@#ud?hZgcE?m&x5!bru29(ahUXfRDu|A3*4MsGA zKxXZ|#jaEEoTlTG={FXsoYQKAFS$t_RwEDvn2UN#h9VQ-Sz2Z6LszOen#3E8;p(ph z#hbH!(!^&r#JVO7EQ!^TAGD&cNZ(XPIN;j00KLhxG3qR~WFwkKCo_)cvDP$F{NID@ zkJe~29n2aL-;Bytf2wheKs|3dUcWH#CyXV_ug?%{bHroEsQj1M)`Az{mS_O%@6Y~8=e6vA`%E9b|AlG(8T9`>3-tdR^UuNl{F97?gybW0a(9gqy|kWQ`WX-W zhQ<;df6eL+MV}`|0(8bS)D7RBUx;_^2>-BNo-+S&nGwfnX2Qe8eJvs)Qlh~e-e-Du zf4}~4eYl8EDe)m0bdO8-!Hn4s^_=OWfkt@wFyI*HoJ&1EC#-Fm>=;L~O`^6APFc|@ z5&K6E8lJ-d|F*phuLLZmq@|s%_SBG&kWhK7*p1r45#L}!)t`6=@L0fq4T2AA=oYaz z)ZcP2yg9F#Sfts2(9^IHF#V2LENGHu)uyU>7dt>klK+yw*F9ivv+(J!QAy>OzEg2F)FJGKBH&mDkTqDLK|mlKNVV7KNSaqzW3FQsA{T7 zmMVRRL~{73*7=?zE#_wCr#~cW!Da~n%OG^FNh*@HnlsF>O|E%*wARxd>VmYC6C8L1 zQ&PaeoefJBKR@xC<0XbP?#$h>9LUSlefO9I-<`48oTp{?;;(oAOs@?qsHjAVZn!%9 zcSSiPVM-yn2f=&euSLNqmQ_8EoKQd;H`j;|@HAd$)R<>Soov# ziDHK|M~O9CpHRNaru$ZWR!rt>PYDudz~daJk6^-y2a}q^>U*epb zlro3=&m4*Wouic%6T5K-fQX2wt9(7<_31+08xEtk@uIu^cPPrhfyjh!xG}k`B)N=I zdbZfvy&Y9I2~tVJ7k;>5uSbsl3a`WIbO@!mte;i;^=AFA8je1Po)J06`hPgK8b$X1 z)6PNbsh|`qZN}ajCjnj!ldPNIz?d2ZXi$qPtS?&c4?<7`e`J zH^{@=d?3;*pmo(9n>ZCCg8yoF82+D#t~3KDYloiszt>a|XX_*`#uqhTBhd65>>!m} zWZ2XjmalEo`WpF%L15ikf{aA=bYDdJYb??Gg`=OF#y8ZoqEXTo9mJ=W`W8&w+459$ zWk?do4ubFy$HMw2wV`z?rz@tiqmd#J5fD&`h>#Kz5_;SmedF&_4Z1ZSALtVbNAn4{ zJTF|tW~;@;HVv0REb;E6`2b4R7u^JTlIQT!u;p z$IAn%My$n1XMv4#zZM5{vaqUdt|rbcYw5uR^Noeg*5=QBZ#w+)25^(D{wX2EmEmx0 zxGGZC`^~K_TC&SIJBOu4Al$vB`&<>le%#h1h%e)dI}a4y)ZSz$Etc5g;EQ1UFZ(j* zp7Ty8nqm9D!AAR;cmQ{O^QU(WwRKNw4*qEmT#u0+17B87LT$vBf#@N-zLz7m zN568yF1utM(OApXQoAE3)`W3LeT?nKWsDbNW;VScSJ9q2oZjf6>;`e|{~vR2*%jB) zwTHmBvEjJzM?7)ENmOJe0wa8|Zs@n@i!Dy`6s_v6ULQ~SBoa6>-AodoM z7e$H+too2#5EkZo>Jw7G&Uy5J!}p$IKN{JaTQhZ@P2 z*m0$4Efw(;tULsY zs%7KpN}}mG5r(AMDWrBlFSM~j6zV=tEh#VD=%{i{LF4(W_FDwjco%7El|vF-abF%`UL zF9d?;2hJhmO)Am|2fg;-2*@QH_5G%7A{zCRHn-J^&kj1sMX`J})A>ibBxF|wt zKD3gOqc?7s2;`-Ou|h1RGa~OVwUR=P5HsBYc+|XIP%+^am6H|^2nLtX0%Lxj*&jJ6 zbEv3Ne#*)GQT=?<@gOYXA=huP5}9Cv(e)Gxo?wOzDyn-~kA{A57ikDNA8GCmiCiP@Y$ev?5Pj zWRu>@AaK&X5G?Hu(uB98HZLaTwzB4$kPIk0F(himXJ>$#jGd;;2QGk)1|_y(Ka^?@ zaa};1UizeYXs%e9jFkal3L~5jyI6rPjuaFS74#xA^0jaAvdPf{H)?c#JIo$C{)$sE zjgA33)|cxslxE*5M@xM3*V;)4AP36H=eZrMi-;Mx{?Xd>N`dD2@?qLV40a`?3QX&h-A`H31``g# z-HR3Y>YGEsUlF!@VFwkj<`b*BOdW~jC(O4ry5TI{9{boUvVR)nPqBgb-Fc*Y+trGH z)!rnB3;v0jN9GJP*W zq_tGSqvTq_5|F5bRIZjd0+Rc$W2h8*A|X7R`@LtPN`yDG;-z&4UGLefJ`3;6vBu7~ za#CEiIlz7)AgjltcrI@r#*BhNe->5trs_$C1A-sVg1g2BjPB+;Yp^Ltc%>P8qwh97>n8sO=YBEtLZ&FyxZ-@HO@n$YpK^{hwl5ZML zuO4rAxYx&v9@*+f3V)&qJ*N~Mjh@{eLg0EGv*{JYEd8{qzE9F!Z9Bf_65z_G$1JM) zcSU@2Yf4Xwd4Nc=CA~Y4dgiqh}=byBM?HpPCgATyBK+Ey%fIB zojM2T%CcG@)N%5*2w8rYalZTJJt@_*>1PNW1q;*jeEXfx5Z#B$2*X4y_|X{(x?#`) zr^6~Vd2*hR&t+-nw9Sg)$I{5_aK*>zRzO(Ov2SSYNoZvA3(MH~6HPC!@#&jhD!`7+ zyh<|?CZ($9>DNc|sKZzSS@{k8Tu-!!oX-%ygc{9;TLd(l^cY8&5~Jp3$`6mW^k%-Z z!?0x#h2DBA#+v0j;py*;FVh>&JP*OP2|sGm6oHf@(>fZSfoN6D7to`EJmS) zR7a!8wmCXpsBG9Ys(K`;(edN;!npxl|4i0`IX6LBN=A=i67@Lzo+veH(0TT)Cbu2G zxk6ej>Ru(npkbh_fwN8H3UZa2t*|({q5BF(Wh{)N^D)T@pdBS|A6F=NzS8yNg`nq= zh?!-}vl!cvgw}A|0fV)E;%RK`y4w5|QSj5tx+ZUWR!Fp-5_JLK^e0T?_*smI=o6Ho zn_QqV2C1B&$J$!gxCl=8|BcevL`fz+!%{PkW^^52lPcuRA0n?E)SeQk6!(Ilpkt9I zxh`@5bir=S@&A#T@33%I*YDZMYfGxWxft$SE#&-prKPoI?Nc!j->`J^dpY<@L@pba z9ek=uG}aqMFvITEfM|0rfdq5AHJMSp+60GOqS&1%z3jNDuTu2)%kqUVN_ss-v*Fz( zwKHE)l?8$0OtL-G=sM=z5%8~|&A~S2>RU7x9%<|RoixB5v;L1oRdbWGa%oM=T6CVr z6T&F~@p1>ktH3?vB9GE&2t_vfkwMRq_q)3b%-^AN_&r~jF zeu>Iul=;8r*4lnu+333JhbBeRnA}B4Ynr+tfGM0mCP-!benhiQF@ffOr3#N=?z>g> zvdN;a$Zk$({Dr2--q#WMTr+Npx;K^@_9pAuQA$|HcFYh%#ALDQ%x@x#De$;y`eF|}Kv75yT@lR#Ra@#|}z z(o0P~3Sscq%VuL+>(C<*P6d54O6ENkywz=K_O8VyWx8_0bj?GbQ$?icJjMN<|2%8K zbZ#m2TF=k)B-E$xUmv@Aa`Yb+_)DM_X7z|m*I(HM398btI6S_WBkUf``q0p(OV@RX zh1i^2Y>*Vi%vWEyQ&}aXu>f6$*`;+wfBClm(NcL2sg;|NN(N)892~ckpu1He~B}|xpp?= zeG1ty_-##b`->w!tjYAZI&Nu$I|TBEW>T(%Z4)5*HGo$jp5E!?1p)21i5&%UPMDPO zviO_E5nXh{PN6)1^Q!TLahj?O;neEH+6=C&y!1F)p>&zujOjDsMp`_>_m~~>v}EBR zSPcMc<#X|zqZgcu(S=P67c{oDBhBO4082T+_BG=6Y}%X=L%6085ABqQvtqNOuQ)M6 zpqnAd+`@BP?XSgq*9NCDu2iDR&BFSlW1j+4ZV~bwU}n*u3%E6Mt*32Y_BMn-2^H@8 z{AgOrOeE?8F^>IlxYkOH=c3)9$Wr8m;-@RxyrnYKopNM!buQ*aZZ6dp3jRcDH!`%+z8-C1DI3%q`+C+N@1 z+LPcbjJ-~Alf3@SbL9<1?xy0l&QU+9GS%}EL3$Iee#@;K?3Y1mTjoBh5j>`mYpo@_+AgWkUQmx=1#0!Oee*fMw_hS#v46W7bpQF&DX6WBNl46)k#E6|Qgc)#u)yDkQ+9;!M8B`v35N0_rS(Z-9F ztV{DP@_r!eAMUsf#eeU4w#CCdzwz(;tKEc(^o~}*|BJP+%JCgP4bSKBVI~TL%+O&? z=MHO3$;-gjLelntXkOYOccdm&rLUFq^lSI@g;o3k_r&o-$HEt~JuZajXYP)_`)|J~ zI*mw>fE~2jdg%+4YL{L24U21HYEOuf7>sKk@?f;M&<&|cVIWL|-Z^i<#$R_H3GZmv zH{e5i=-Z#wp7Y&!{7zNnZeL@y#*v^RSu%>l5*w)>F9h!zrvw5g-;5h~#<8v?zW_h? zpzbyqZxtxofS{NRPj~B=bKd5bsY*(`y>MAT4D`cbJQtLh!?R?L+%G@1h4TVjGyz5} zy@g2{wOqLRjW9ekmS;p7)k!Bo=h3~p_k2Dlbm#4UVXFHtoT?IpoRwA0R_4($k~bPV zTfY2(o*4M9MM1`IeoNbq@@_O%bdkLaouWIcZ9zb@N#dl{ti9zXER$&0S=DaH91_-N zPY*uby~)i2V()t%Vqx##4Y!&TFg_<1Lk` zoR1)QTQAnjlp(cHc*h}rU($NBf7Tz5yft;FdjxYj%3YKCL0JLWGEA?#|Dbg!aO0x& z+>q2i!$@y>^c(NSp|$MX54-e5h84T)eSuEC(L<~)eFwRN10&*XBz%nBTQ;7kgFapD z3{{87STZ&5g!Fciehsj2e1Id-N4t$yCewnbm`y%X+vEXDV!eXPonEgHi4{& zGNH8cP$8|1^Nv#A4hCxyoN(gFt`1v3DPeTphHcCy76|Vlt_k8e8RffIH_mWeXM^j z5MA=Ii$85#vVDc$H*KcVFQb4q)>&83U6|J^sz4-3j#I*6@SZyu244FGRs5=Q{S+n; zwiTr87V9hPSAn7mQTzQ&%C>AEx{_p_>1~jCt!jU{T}2r8hmEopccd(PF;NJhK0$S8 z{BG}ipP}n8p6~qKG_0hN>^r(3-6MUNnej~oBh3%e9DW~#JwXWej!6satJ|rhj})EvC3Pi%71&E zu#|FYHA=P?aq=q!pqCjl+{ptshz8iv+ZTMTnzt@LXS%K~i`T3I_-N(=wB63;RX%-> zDtXy@k^nY4j<+3CXUs_5z>S4!$+7pH8j7N|?$+I-wF{_As-)uZ6e4oY%dKF+MI)fp z)gnA)LaY8z($W1P_?)fw2$*SVNp;-#q^1@ zKuJ$Be+l?-G5!{&QCLHqud3ou!%0g?8NhN%m@`Yji54uVdDsJF`|G{UB3fstfS(pK zf5M5rJe<(+e8K9Tf_#%OMNgK#%ImG>gov|NO8wa38kMZ6S`vKm7t!pv?hOLfRb}P0 z?cC!g5rOPa8wSpd(4XzV4sq}MCcCW@QK`{`KOc89dQDgA`vAq6p%d(uAu8h9?CuYG zq}&WV*!ODpE?(I#On&zIP<@2Ya$4|D24@z$&iIS)Ueo{~b0fEAhJ-S=-vwY%wUFeF zmhqg#+C(~&yP78dyT^L{Qn}NnizRN+(pW9pJOGabcVi9`T77C^$S8_7&+0ARXgEF4z}~rWJ#J6o$mMdGNO1k#f+I6mt%O_RRC) zfLec)P#$42G*}ab#!$R_`M@FSOhnqOu=*O9wEJkI_$}VtIdR5fHH@W2wDRS&|ZD((VrNvhhm|y9*MC+`5tB_=C&sygdwENnv3tp=zZwY9R zXAE9_{$8sB4>&QYdEBko>qCd7hAyk0A!O{nG{*id!qC1_bs#B4^M)x>AoyDBRA?3a zJQNe&18j+wj1943k=b`s5Jtp^@sRkadX1i ztgm+-05E_I-NDSA?{_c~Vq`)cP5rHi_stY%7@b+4TQEh#kmU28heEIj>&&>DJhUCk z6oH~ai@ihRP5K;t0{Sb+P8@@Dze_CM_ut^L`*|I9UEU2mO^2uO0-~x-Jda_eb$vszv`Uvy#6e3PtMHVmeDG2Ne9& z?qVXp_(rlAxSybAA`UYYa?t*;KKJ?IX!vnv%ZsJydti#r=C-35iTdWLO-QiDCoOlU zp<$_#r^=J@`d&3jp(28`os}V~o^AfkMYAV%={E=c5E05nfYs;~sfu9JXjQ(%!^ZvL z+zqE{|3f;Vp${Oja8%dH*=djwq5s;6stEPUI46JQmUDonGN@#Q9B3ejo>>*AIoDIK z?kOSFY8R4Fhu*x3#Uu;}oA=#XzoP+wH7t^2@eFOPqEsCU=X|*tDWh9{hNfTEP8|+^ zBmxLhsx~EfXN>9;xkL@wciT>Gy8UepV5LyKYEo7Eaup1Ij2%(-3M|IB*D%ObJ*Z$fs!GE;WU8oI%6ugBT z_>!dSS3zHWmH@4A-}Y4-D9L^INXXXPdp?%taHVoqdQaFq6MSvxCiXk`RUj4^1(hW? zsU6?93rbjv@S+ijwj5Rvw8*MdyOmD8|9-%3b-q#i==6}~&PVe>$mAV6qCfIE7s32Y z!*t^s`7$8mGedIc7`rH~kM=zUgr0vopY1i8hu+=B^ZeAk+4NMrTR*ebBX%jDx9zxJ zUqiB#J_6F}R^_AKyq+8~=52rdwu!9Syl-t{!{m~<{rZVNmp7Ifia%>BK-8)4zbPcjF8=Ks|VdVECqDSll;hmp? zfk}DZPoH;f;i1KNs8eB2)kN!0g{JD7_cxIF`lD%Z^7mEi9X=B5 z?%7i%jK8dB7*TK|4y!rF@R#u!a>)b&oL+gWYrS=4#Xt6Q-Fr?ZM6XAK`KTsJLg zsngrHa+8Q=+Ok6*=9=tz&-V%*_VDpMGRmBR0T$3R*OJNf;K|Y%>bsUYgn&j zjPp)A*g>uwTe41Cqn@^StHV=j#apg`;lTGy{_=j?jDR!#Di6nx&@UF~el*iE`r5rW zDvX8wwCwaaX%yq{pt~}^-d)o4(YFSfM2RWcfX^rFzF%m)wK_Ny{%GrIl`ONW^QXvz zs)6HlYSGd$ntTP;GfcHT_<8d?RkpHZzo*B&yr9#P=daFFxjk4hI$Bnz5FVx26vCD+h2} z*OdGEu7emI2F>BhY1Z7nMWnf+H%bi2o^Q=cXQ6>Es;pXTzmgiT*jrd(Z_~yDCAQ7Z zeCN!Z!6BL@-}5ES{L4QFxJdMW4sh?zG%k;9v6Rib-l}|uR5^!ka>R&r z;-}FyMck?x0|oQq5`5wX`|;cdVgNa6ItXHt`a;fRf1HhEaF2*~d>#cS;}?)#2GM@$h4<0F zPmk9oF5()4{z6#`d+*Z=?)Wu2F~;$P80gnu()*_uUQWShS~(Ou!UDuxw`ZPn?<*J# zbzsrGc_{tk!BX-mwqcw7CR;3v+dlES=??-eecfue7IxHt_Wva!Ixa8&HR0`pp{b)| z;(CjP#+|Pu2=9p=cmLskCQ1F*4F+8zbZ`DyDN?`1zjpZl{q^r4Y?3Ha@L#t;cafmr zA2<5H5B$#%F@bM3`JY+-x#%-M7bx*xw?Nq@K;oax|L^B=*bP1enx~9CvWJi`9hczz zuYZLN+H?cWtrF*k1vzGBq!cHL>zi}Zm|trZBeR$XYNH-E%;_Vaw4f8$nRt6=G&l3@ z?e8Zg{ukYNS;37B1WI6Lj$f{MS6$y7S6%NN+h4717NmYm;b_Y@IGi!G$Qa^Kw0ZfR zHZ=j&19LtT5fP!FqdD7K26+cU(Z&8lDo_(?F)OcU3-YoJMI}g@9bV{zA&I(I!te<< zct7rRV!0$a9-T_a5nsI6u9R$LEKoDUnG~p!ui?;@b@Sq&Cush2UIA|H9bH{E<+;o;DLqY0=E&CeEhe?S zZc;H^O4NenG~)1Y_AJr&06Q=5#*CFwwBnsYs6VrJ5$D~$tFdYBzcwK;(Zvf9Zj7ZB zeTMI8_I*pDa<5*{+&xPjoOA6CbSg0M4SE2-#rw1W7TXbJS~e;jPkw(nGMYZ?E%-^i zVxPIOa0tj0@=gWJ3(>W(=C@=qADzAh0pAZj+XQW!z1V;J9@kuZE2}b5Zzx_KyQARZ zUf&>%T`~SzZea0T^3os9SvX(IwI&zz_;K9FBfhRg!Qn2Qz9#G1CYHu|$NmjAG(}t9*|!OB1wzpV-7YKacuf81N7+e41I7o#pj?2eSY6qr$bD z-njbK;djZ6Tt5Bzg2DgY4FRThar6!;$?bhiLt&qzRY2lus_H`hC3RtwFghE!qha6C z?cS~})~I21@hA+u`gRxf^-_9qb@AI?RQ!KvTGi_kZtRQ&8C-RRZctYsolXW1f|IXf ze7~8EG#!f=YR0tlx%O`2tmu}ZQ~*BEn9q(>s|77;y#EB-Zc8glQ_<5C+$Z=C8Tfic zYBgFpy)wM}aOk{LSh#1D=3Dz*OS06LpV#W{cg1#?$wb?v*R|&XELqIh!83{ntZ&Kw z?ZjWyzjH{3hX)b8Ms&V}I$}fjNbf1g!!Y{l;R5!Iz)T{cU&6U} z#q=KVY9 zc>RS$7+U%7;gfT&HCM-wA_(ngy7e~JxvgWLz4?Tr*P>yUYGR=?$Sc64(RvkFwW!3N zIUc^=$I+-8yvoB84^WGmny*qW?)X!oNcl}S#T|?|^Gl>^yWGd|X2?yw6CE^$C?e3kLYVZa)|9GEA^i6`J zx4^Y|C>ffAlv)%`Uk5q6V=9tZ-_Rgo_vpA1)m?U}&?6z@1gBYmoHE|`I>)ZkW|C#p zwc-?F2B+q1*yq+?2+%4+UMQUYYNQ=%ejwFtXxu9)ajrj8hcdf_JQPCe|4@;|tqKYu zMnH`Z4@s|R=T?O?oTipGw2^5~gS-Ej@-~&%9i({C%%T#zx5_`k{`KDd;%H@dV$HmK zGQ@pNFb3q!hCz-I1lJlrOPM^xZbtkT(8-tdR%k@gn8w^Z4)ov7@HvNHTbXsQiieZW zdNsHJm)KhwxMQB$DE@o2QudH81zx$yZXkiKv-AKNM zbv`UtT}b?X@=N%7NdXmG|M~9Yr|Z0=;i6+!!zEN;D%e~6qK}KYAE@Toi|!5Y7FP8N z>HF{jbuM0J*91bXt=2cY4<@!Q;fxw~hNn65RVT*vtz!<^eCm$OEmgo%%CT&?ukvy= zgC|(3Pt5{4Pq#V^EQ+7GXGu7-Qj(_~sB@zF>xja0=VaW{*f-hnp+DB%c z9Mrdd)H$whZo6Kw{qKbfv#R_X`cm_pf*ac#M$@rw9gSrIXmX3_43kAq32{Ph9eKQi z!W*^J_rVKm8_mm%^#37WlEQx@=%rT_sOc56pXX8<55_-}A4_m`1IPLf8QB+Jq{x1Jqe_hC=oIliwaE+%k(Cw}K9obXqq zc(6$G@RyxWH!t=NKXnC#?iaSwrgac^n%gsF_}ZS3nJ=J%U}C$D1W zW^FnJ!Tmt%oY2dkVviM(SIaAA*W!seZ@lhve%?aQ#xlgqOBOyhvJ~iBJ~cHXbJxl5 zB=M`1yEQ&){7Vb!-uEAr4Zs@WzDdt1`|huo>o#HhH<_mmoMKO{UzbNF4BkBBS*o^D zvlHgm8&9^S6N`B5wF!jXA1%sp9DTNQ?ZThmol`nZZ6jMkhZ_eGv_QDRn`FoP7s z)TXj)dVv?`vg6@76a$x7TuzGa?+y@EAtzfc-G?Ye>d7U5UiN!!2Yo>JXN+7s*2vrB zN@t{)6VnHshFX4LR>Pku3X|{*Gqg}XI=(k%#pR)=|!Cl8I6tf zbHIca8dMNY$na6=(7E{)h}XbhY4y|m*b*+fK+C~*f{o2-)kCImFEI1bi6&*y(A$G2 z{07mtFTUWWzfYhlzGF(|5~8}>JU-L!qT*jEp%X(R#Z4i2&)*L%t<7Ba!0Q4o=2MbH zLaaI*RmiJJ^1hABCGP%p zEKh=Cc=?b}&tzYf+p1Cg5zPf1l#(>jdr9xOuE8wyk6PMM{(n#2VCJohvL-N{kH)_08X_4{f3->ENy>YN;((ntx(Ru3uWSu=MJ zmVw(j{?2eS$GE(ndsCF#b+K5PKA1yaJp5udTWxn5nY&awf7w;q)Uk2MSa>FwORmg~U(S3-9Irh`18gX^bO%_{re|T%v5ckyI9Ul8)eAIvG`v;0;JahFb>_rrL z=z9?##ZJI0oSuK}CR|D`FBh5nk^noXLqrj0OV|C{)0%l1YoP}F#@gQDqpgkWYTFT+ z_~TPsV7k`&BhyhjuYr!NOYyFgKua=6(%-Uu!N}b^VejIvuRfTT8F=@_uP$y2YfHxY zjUg!R$R|uJj@!eomFWVX{7OQbE40q=KVq3{3~(O1(3mG=O%5J7Us1SqYZjCLO+KC& z6?UcL>(s2kUuRj{kTpI>UYyMxDNJo^-)(v1>C^jK+VXCyzgr7Rta}iHRbfsE_nz#w z%}F{-9U#&eQT6invRX zLSlV>lob%wB{-jic~0nPK(o-L4`X%ybrt6@Gao0_$O}^ zm>EFidF?+`#EhopW)V{%@P!5}C8Ourwj^I{QM=?yH%6S4*}>0b!T3e?sS_o5%* zTMqTeD+B`Lbj95w`6eqYWx18tlbJcPWmMffL90|dcgC%+wtaqu%2Y7DuFctgUXrlL zqbN#oo4r*gG<`u*Zou}>r_Nhgs5oL7YlSL(nC0@*4gzpG5Qa4B&+x4#LoT~-)D->` zZ~RPw^dR)bU{TnQgvQU1fdJjg9M%|-W2C|y+E&5xND~mVmm81Ea`}ka7CxGrLHys7 zUItvA>~;@a!V0p-43t-tt-?|T5~7JyF$i&ueU2>kRPkrtsn`T75rRX>sI>y|1N!GFI>}at!!N@x(swP3 zf;9#;FMOUe+N6iEdd1+1Q&|ng`(abo_CU`CoagBnonl7^J*`k&uR(-J8n)kh8Ht0} zZ{?-b(^$JrlvmWpWg$|kbJAMLPHBy#pu6#q4xhUi5wceFp^5F0Q&Q3@VR_}0de>d{ z)1v!7jY}Z6P0l(f1tD{c>H6 zYT@CFNmwl88EhR%jBShY4oDM;Y2zONx>B)CL~ zE)g_B{+f)0;ey3N1$*HwG{@_2ulqIicIsEcts0Lvkb3vF>4Qnk`9?fX{!~dVKMI4| zktM9>+37@AsTanCx%HXsMfLRNC;o;`pmK?+@b2xkK&ySYt*P~wQy)Rafb`$mYyS6a z;WhLWWAdQvCMdRC@;{o@G-<`Z4h7+F!lfdVs8P?Tsx8SJ22-f8Cs(nKR5>hpgEiqC zvAAbELVxZW8kvH=AR`c1)@>1cYg?t18aXo6hE3=Aw357PL4+=L*g zKJT$0^i{(gd9~uvqxmsDRew|nqy9{4+srkoGzJNCrTy|&VZ&{WPKOBj#$vZmE+V+neml?E2775Qd^>JFfvwyqWL3bx{ zH0(5^WuR$&`KzrnJWfrvhbN75$w7y?p{-mD`yW+VEi1mX%{1)QEYsT7(19muZg;oT zLmL{1Y%!^{wwnM}EsJ1!5tu_Zv4Y2MQ!8tr%uixZs zt+-!bz`87|0c9#<{j01Vw|?bXpQ+j;C5(|WugRF`O}N=ugZBu-VbX}$qs>IjjCNvB z71R5IK;r$d!Ncv(jM3#S6g`~92hXrwqcm)=Tn%%Cy>DB>5w<F14{ zJB%kt_`&mOGezy|YIW44M)Nwan70CTa5F*So(nrO(%qDyz(-}_{IiF+#F?(0K=Rsx z1VqHaf=1rIS?@KkhC@>E_T7PBQhuIHqxhZ%y8NkE$-t|cExpO7p%HU6vPyr8F(QnJ zY)bf~Xm=PCR-%Dl*(Msr3uiy!!qCT6%MOq-v&G^P-6{{iaVHs@TK*%dF^|ye+U}wr zL&4(cm>Y?rzJpO=>n&>|Fm_ge_+6)^^m7~@nVh>?q?5g=i$eLkWr!UV4e#|M|8_3| zx?Iug4-v|-F!)EKATb(ciqIQve;?gi#t2QBjv`LW->JCav5D?e-vo+BMhc{lkf-aN zcd(?JeGliW|GybTbp{ir;B}tfHeMYLy z7hjdm&-aX{2DNd@t3S*3zlyBTuKG&R9nH05U^|1rcc;KroJM9bf)bOAamZ`3~nGEkW&26Gfh>zZ4{b&me(Scl>!{}c&2eP>8d zy}xR3%}#miFx_yT%$@p>?X)G|F>Vwo)k9qFh=8~q;7EMW6>6Biw~Ub~NYeXbLA{X* zy$G}>BX#UY&HI9t;V{DZT^;L{v+Bc8~n?(^qqU48Nv+YFF^ ze%tFF>thuU$^{Z#zQKBf3>q09a6zp6QlRZ_+rXiZCTJmD7{lek`O;U^=c{1z-KN#J zel>Njs;QTGK=xMyiVx*A9N@0$VNhHjF3IqQ7;>?jxI>+oh8MQP`qQVnFtVtLh%c90 z;&!;q;a|0PjqI_~y7L~iHH~ZyqlLvx z1kLBRgiw#D!f6l%-mYBnLY_nXf}WnRNOB}cn!>DfR1w)Z8u7bVZC7&-HV#pdgvLgBrPF9H)HHq>#meR^3 z?F?O3;c^BE2lhzV|EL6L7?REHsi$TvZs4ZLh9WeP!pBk2tuC1h0wZivNrVTauRl#ciz~Ix8_STK8>1gqa_b72g=EAs!r`GgZnjY( zx)4LhA#li-~C!yloMpB z)fu~Tk;jIdl!&2aJiN}Q3>v2tL+83!`x7C9O<&TVO6VfMJ1cwwD%a;VRO9{0NMR!SEtNn?-MAI>2X_XIXC)-5_oB`*&9D3q)q3B=PK*YUAr&Shu?RP3`zVc7||qz zD5(P`(s^;M_=jpzBpA1=gr&m1Hiukb9)1+S|35GfPwsl^XyAnoxj%lY_Qx|J1H&=E=NaJs^84#&ew`NO?I}8_L&>-K|8+;9 zq)$E3SBOVl0|zj!*FG<)JQ0+7lLdTRWzC5X6}tBD1w0};OUN`fNee2MS6sK<+*1dR zmY}5fugMrQ`}ZYLJ*x7S-*7uFPbL2HV`ra}@%v-Of;*Vg@A~ui2?JnNTOw?TK2t~R zL;Nhp_pMbv+r_?QhsdhP~8f8X?Qe} z6&iB0`xCxeBP{M5k7a?js6w_qH7gvkt;dVCFrspA`@;GnP?80ZmJNflwmGLQv@R1=}RI?@ubZS zd8?K4IRy~pG)tN!e};^iAVd-yTQ_CDTx5ui&_)Pbra)o5f&gQOyg;B6%nZ?djazJ? zjg)BtAfZbZ2;t2&K<=ZBP(|pllj+Wx2b>hQ%9hBVR3IEU#YgY@c?{ew1@FFJZR~4_LH~-RaoWq*eho0#5h(@XrV4 zDs0Bxxe>=W&InvdF;cB?kfhl%qIvf?46C5=W5kfPx64`~>n z+S<;i!<_HxUGe#SjRX=e0~i;I03@5Oso1l{qs}JQ69kh3;l>2TaY21voNTni6n}bR zFA~WKBCYRHO2Y+pzOGhn;$w%(%dz878kaVqLsPz|-QkZSqN(V~Q^=e3{0U=v(u=E8s%m;j7+;08Cm+MBDU{41{B8^x0Rp59#t5lfNftiL6zc0 zp(R{?B;oag*NwuWCR)NZ>{Gm%yirN+gidW|X#zC(*-c_%L!zhnZUQfk&bQ=cRw+Zo zFki(;bnx6tT{(9KtVCCOW~5{hH-_(7HV%|4(`L09318V8f??xb%CHy7!gk$yDsvzU zk7!P*cr+Yru1K^sZlKM=8GK!#=&T$mRz9@jd;R`Cfj|Xi_d7WytH~$}J=}X%n60vs zhL_WNuZ;~%v5ux45_5yC_+U!D)#-ABf+w&EZoINVDhHn~t(@5zhQ zwA>RZ@}2Sq%KBoyZQtF(BApU8bRBvgo*(nUMZZKySI!^z$%;y}E!&SpO(tSRIgcU$ ze3Pga(^Poc@stM5--x2-xIlIp5mAv1m*|Ze1S|{`5A!vgt5r1f+o+f>(Mp<4I$vYX zm-}wQ4%7UQrhPnlp0aTtgvT@F+#{bGsKvB+RcRm)O~Mj#+U$%<)Rvmh$u!~}m<~?# z7EJ}8?t7~oh9@yqMNOhmqa4u{3SB#ILpd#R58IODH>O-TkFBi3&vf`;No34?Y=Z>y zLSB|zHEIA;w)Vz&QcknHfGnIs&lZfVbrJ6nT2OF>DYWup=Fh0@IsTLB{KxhhD%5m~ zfm{q%5q>H_wABidpmYeag@oKh!{8yh6hTl@GPa7ZB8Z83C(6WnXtuvw`8IMxV z4lY3-&?{%n0RAu@Pp^=~G;*8GQM=uSV2e9*+`4tcJVTHn{t%AxM0-3KeoNIP669g5 zhZ{n#fbH5_m6mnOS3#Yal|?O*S7VBe0$4Q=jqinT^BabhrF48T?vx<8G;L%K_ku!w z?_8duU~iec3$J%>NT?YiY}%O<3t9CM06hapl}TM92Z_X`I*oM_$Ic8fz?eP=R$fxx z9&pMb{jn*i*m21l@=9a4Wv@6?uzVXkxW&=?%3MqoLcX8q?prz3WZiOw#`n6##LQGz zfe=GKPB+NfPI+GNTN}|Pk-^|(ALSDxpt{ql_gl^X;q9%W;(E5W-+zJ!cXtcHfZt=3guL>gPf}8K^PM6zkq_O~tM1VceVyx#@(;9l;yQ>Amti>sD~a@v`!!&m$A2aAjE$#G|LElx3pO9I637{w zzn`qJT_8IeFW1CEv1hOFl-Z;_P|&#azcAIrP=OKcxddoDkTFpI_U51e5xV6LbUB6x z*l)e<5FPh2=1`BfHj8Z4*Gy41vwQVPmpRE|H!f4>Pnz&;q(RThDY=ED{&*{of*Yz8 z=r`q4K>imfrb(4(o?Q(?bnqjWYAkk!@ab37LqvEOZmCX;K;gQqM`{L#3(MaTz@<>= z;~6*(7WT_SZ3XETl>>)~cT-T@g!V{a!;Hw{p#LZS{6xy&wDKf&w@KUEM0foXZnY67 z`rWyC@10)virbiVf$-lQD*Z0XVajhNzqJh}3dEa!wDLn&3B;@?W->9iA99yw2h+d> zh1wXc@oy8*bcMoHF-x^z+B8RsxEo;Sq8*j@36?VQcKr5AN<ohchrHMr7OcfHeSMOr9ZCwTV#cu^;&Shla3s*gnV88TC{gGL-!j)|ye94esHdJpb z9TJ`BJQii^nA7zg5W7~S6;;zJDEl*;);hR7Y6YY3`71LgLwoi++AM}kYcFBhF%eC0 zyE_RIUrXg%ZBts_LsD-Yn_zE!F0H05g$f&{S-u~l4F+EZP!e@#2IJh^g+7Vv`ik|B zcJzwO_vghYKY0^ex#K$B%!pKs*r!o}@}j4&WGMc?mC?uUGsyDH;>G%uLwTWh1A?nhp}Q&EFSjXidtV0ugs$o`y0X^;OK!Y%Uc2k zun2R8k86gclAnF~4jRW+%31=;pYs~m3@N6ReHQc;f)=s6i@WG_X-nxvez2n^E5`~r zL64B<8d^V1b2g!iJmZ|ZtR5J`ir{A+39$LofzHjNm(}K>Ndbp`J(%C6;*EXW_fW+X zc2$lD{}qyfqpv+WmOS(%^XM=2>*a6?%5i;eUg`$w>E6*O%Jc*6IH%INN@9z6YD8q? z(cg><&kjp3%TeyTRV3DOsBsCCswaOL7||gWP@jK~uFT5hBd=#!#qshDtS{XrnK5B! zN@3kWo4{b|jsI(eza-)yu_$~*%tn=A_7qvSmcGk{JKfk&|H8_Pfjc1`&ZL1Di(?t( z!=JIc(ZV~m4b(~jBXp?$s>=UEax=;iJsU^N_WJCdE=F&ycwm32A>5(0-txoS+q*dS zk^nR9c^BwB`Eq+#!L?QH#N1&m|C&cjYG%-QzEHD?HQP^RQ)OkDfBcR)zNWn5uL4ig z?8YvWgO)x$G2tr8i0IxYh~LO_T=tyU(NV)co=7@Vbj__5L3t;$;+haUlq=wrm51M9yNIsodE1NJi~xw?MV^@f+sBrJo7p z))P#47JhO;jX!tLk|Hi)`#Cb>hCNj2v7a94y7295os-@|XdJ>1@&*M(zCcX_EoxG+ zJRMh7p#0McA2RIKVRtP-&YnI=%O;s|`#1;L;enN`e@00kgcs*ed8Ssr1AhcH+lf)@ zpQ(nkwyKa!@H0>4)l`{Sx1fMXjj{;L`RWI(0vT~h2r?-`(hUShcaTOrR_KMsqM$I5 zm5xGN6e0Jfm|gf+*-t+@01ipNklC}(@6!FlTcu0YTD@N)03x{lh{pG=v zW1qz;j>9;NCMv6{)(Jh2(VfMj0}TF2=^&q3*PGl0(0uWf(`TpTkARaCCicXwfJMpG z2IvZ)?jbR5N;du#=eY6(wvKI7)}NJ=oTuk#pO4!qM@;*9qtT-=3S`#^K4skUVPmL- z6;~oi_Kp$f<#8~st6+nHW%e)gobQ(ZadmXO2&w-xK^a{d2_Sc;%;+K{p!{^y&0?O? zc!#oc^zGsJy!T_5N$6&pO`CX_3Y+nl9B3cQ>+C`W((p(j>u_YFO5ngYlOYITsA*)xF6&rCaeW{EhjikVLN1#K_L-l7eNxL#oOqn0Q~ zsl0WS{nsg;(r>lVJl!=ST+VX_k+$m5tedZ;pWk*w`Dp}NNOx36o;*bMpCfLW%t%>I z9gE{^)s?{BoFcmd${u3`Pc}DC+Bx-ee4x??#7$-7PQ|F>BP@W_Jnr5pF5!zdkZTqD zynqWWf5Zt+p8sv0+L|OBB#ZXT4FE-nd^`GCc%jWePhwFG*vpJ#(8#jDjZRCdU9p0| zuqIW%?j|!o$7y@YVWyW<_e#q!g>O*y4(IuK|7=xuT=N?bD7un8ab5C#Rm2apSS}A2 z5bN^pTqdf&narRLPj^qhDQvn~Jc&Z*IR33`NX8^|%sT*H!rR`9ZSv)3Yw}4a<$iAc zZj+i_iSj{X$_d0sGCF`ieKKV2)kZ!pj-L#8tI+p&Ma=a94gc>B=g<0O{y|d%qk=k) zG~0P>g|~$2$;<2~A-TnK5+LEjbBXw{sZNmn}sK7=0eXDMGd z5_(HMOxL@^nu~7kE#~JFn~~2NHy@)| zjJ$+}rs}O*F-BgQH)RfAclTAWx^{o^gn%XQe7z$6w)}+g)Oj1Z(Wa^zE&3a-_B}Ei%r%ux{Ns|C@%TihRRVa2d`F-=GqiumfxkBjXY+S{<-E1(H*NXF%Pl+Thr$(U0&gV~FRi=;pp^JF5+oo;onJ*I(X!Le_l#I1{~#z7mC1&3{S%XPGkg%#Y%Mq}Ls6 ztKR6T+*1ZD$XWj*+>!2!q=md77ndcTm+n0>yJ1hMYV(8)MIskoGUyu|4t{YDqv2}$ zWs`2AJJTbcD1Efa6f-m-wLK}2@jV{E4uyJ^r0~9j#oiLeZc!5|6^h-utS-@IIglBf zmO%@BW#}uBA~RmGjuyz*6;koGe473-81*)HRzt{6y6zVlfjgKUZ-BCY0cKCBE3=$; zyxyqbABQ0n_4-$me|IBooY{i}D+i&>hl`&Jd4t1b&q2JXpVGwzyFrlcf4Wab4P-)O z`FO>CkC6XsTghEx*eZGX5m}P_@d&xG!bH0v%KM&oEt-8B*M35XJ$K?ofe7to6|@R6 zW6wxF!2XT&p~2azNWt{d62BS9nNx9;+)K^&=c}^lV~?q;Y=*$3qUQ>xs zNj;oL)!rI~t-+qZe|zH^O#RBaf2G-s?&lB(YW*Br-Aw3O|D|{h$5$>$fakIOYHcNP z2-Jbl=~GsxtqD-S(V;`4dfjk+L(-Oq2d4nXpgq7;o@8{&4{y&uzchp>^=Re&dxD)E z1v{TA!TmEcEr|^wu*-=o-7BCvkpSrg0MggK$ztQ+&c_;It{FpL3+eGPe?@Q7IS)4I z;e+EK;gYoIt$sA0B|9nrpKwX!RcZj*NtK~nIj8jOED@O`TtPl$PS>@3>blgeb8jOP z>%YusYKepG3oDt#5CLpnxmjx4OxhZvR|2}Y68on71U{WN>c`UFE$Y- z@Lub+=ZY4VnvS=<@!iUZDuaQues?h3OuYm<<1!4Q>pruG8{YYKfAWduyP;WXX!c6D z+eW{Z`rdKjkfWZ-lY>NqmiZMF#*M2tbcM^r)Sj(S6Z>c@vu$bF7I^$OQ{P3c)b2Br z;Ix8jGoKKc(rGJ#GQ96`1iH08Ug#j20&`~VQqy0)xU1SA(vrC?N?T3&L6Gf*T=UmZXbz9nuo5mjWw!Zq=Reea_(I06y; zb%G^Y%sDs1LB6B_oR04dZYmmLvAAI#*mRaoiX17_e52*L#~*0n>6sj}|JlV=k37|A zmGE-TXPE8RVS!NzYvYMZly_UD>pKDQ%WpI!6sAL5<(3}>y9uUm-!QV39emese8Rsy zc|yFl$qaR0ZNC}bG?fR^7?A`~p+9*;{|grBpzoN(pV%Ij$I?2<`cW4kD2 ze*5Qd&9{#0=?iUpPJ3~P9>h*u9kum(2k3U0o00PH!K<8P&&g72S3L_Yy;0urMX7j_ zL#3m|9UsF{=U?9z`9n43=*bz1fLWOrsX*KIZ!6u|KD@7_zhszO#gxPDSbwLoD32LQgKYQOC3DA*nybq5W}dX3p2=n>+;<=4w%BKOV*WwJ;`wy)JjX z?OwWlZ(HfGHqC(HB6N=I;RxzyFEMrmm$NHR4p@*~uKJp?X>?FE2ys)bdsB_B+5{ z9@~NT)Rb-SWqAd@`@iSVBfVp#4CbkzDQXB}{TyqAW%_ zHvIc!U+nl>PTjA(AQRt{J2Mfey%`N|3bacM#<_eX%Y4gt@$U4M-nZ5JF#GF=_*?5$ zpBGtH%%E#wawJ$nKJn(3$MWBb=$oslmuh=MDr4JR7ln7azG4 zJ2umYz4#SGgch_x>63Sqm@vf}_pi*A-w#hWB5c#mTJ>AKf9JoY{w4Od_D>~j+PgO#;RnRz zZVWi{A()IqE+(-{Qatb6FOHuOwEZfV--fXgp=cl$c=Mo<1?tfCW#9NXE(id6{gR#| zT~Q0p=G>(ytch`)MoszhmZ&q6)OtdGXpZ!Pbo8L()6#UvuQQv%GYdxMvC)}OPdE{+C5JMzAf%(u*4mpOM*CcXd#5@lxWLLxuB zijVvGM=$ln|1F*O@4D{B&M?SFExoZac@@-o1h8=oloGkPQ8jdnn8e?xD= zB~!V!-pC)?8N%bMFhXm&`B_=Pn7a||e~K-c#_khW(q$G)O8F8Ny%EbSoCZ=f94cjCce@ay!~$3PIU&KW-{W2er%Omu=E?c?F8t}*Ze!i zy<#%{|C{(zR5WsWnPt1zMQ8}yGvQ|n-my-Mq0VOm#Ik4|+kor#kz}hkTI#c2*i&XI zZ6tMLzoz%;a*W%-o|r60rs`G$Eo7>(?PJTmkoRq)MX=TGpkgAST!oFUdEkbaDTk`A zu|20-&uhz5!QDl3*S9H*&s*-tgwiz)4J=K95k`nVkr4Q+t;TuQA-|)&-sltF6tAdG zmy?OzQ#;k^{qNC3*zq~Z6C$DxUvX+a7=-NbaQoB;TnOqkn+}1Vn%J&g3M;i_HDAD^ z^B2LgpUD3}Z(i`Z^C-3_w(m(*C@Xum0aBamARMYNt0w{z?SMn~b0)0i69B{s`(k6q2f2%exoN9k{%Gdi=WJ@BfAt$$DZ&^bA+%=!y^L1!Ga)1ez)j zQ53?T4{WlZRH%I(kUso*LUQnCJ`5q61e zdB7)I%`mpiN8XY?7>NpU9WJ&9`B4UM#!|n~!T-Vkh?kQ(OvtmyoLy&Et3R!{$2}iN z^gcULZgY#HvXOr?_HfSxOz&cb-#<$u9%4Is_+M}`+TUxdz>gc}(pgUL{+{m(Kra<fxR+75Fq_{)3T?P#@|$_{>@I{6+cMNc9n6H1^o6 zJ!-RzFg%7;ujR({EY?xgU3M=|6LRCKiB;*jOo}A>KB#DTEE@hE*ljnuXx*^Ck=U=V z6Oc?^gk*KnH(nDg`*?5pLNeX0*RTf8yNpB&DB;?%$Gb@gK11(Wym=h|O_MdNZs#Xi zfc)8w6dK#!xY$^16Zcbt=2C6;D9Ss>j`5~g$OIc2CCPFOlm6e%PFv+{8;Qa@g8vgv z7|yTHkU@F}TtI)$w8wo0JV>0ZKgX(YKSTVvpN$}fPhFOHkSXgFp{LKGCaEWjZ>Ub} zTD+%K_gP}NX20ir{|8*5x7XKTM`+xUwt>eVo#D68F|Mz8W^uGubh-h_7?d3v|`hRlI|2`eNT3lT- zw{%TCiKhPF&HvY({{JJ1|6eWs2Y`PU^@2kFC#?Vfzc~Q+YM!;hVwbf`V5{6RTtuyw zeMYe5qtjNNL&$%Bu+*qjhY7dJ6DK>XXd(F5{cnqt9>JsBs<^N_p z5W!8(J(_o*H=WKi6*QE+zR6yxq_bl5QoEU_v$0DrT!2c=_Pebd_@3bfoqeFWpA#gC zKC<+;UNp9~PjWeZM{~I6$J?k2T2Kse6qtsK1TbIb|BDJHfP1ELv<1zk>u0 zL^Re)&AoSR>5Xl>-SKhRx2dW;a(>e<@H>smkANd3s9^c!?80+4ANMYDRow!4UpUCA zP!Di)**mvM)+h8Fpww~%7eQMvFmC0^N;JAHPy;Caha*G8ct)zlgjaOc#p;~*8U*qO z#6Nx>i(Q8(^3U05uqV-;uX%gSRB(@bI#*vOu7H?4b?qO*1sNG3{QS?Zd3rDE#kry} z;SEF|8g=!44V^N0E@4~UMFq^JiajGH1%B~!#Poii2#6xqHXztBA^Lbw%;oecuVG z`gHk$F^usPq~MwcmJ8dMvX)@^^_*^B|GUSB%YRX`Xxo{Y-yN)@+fCmYz)@9PfB}Pr zEyXA)Le$RX^W4JUCsxd3cFjB~cHJWR`K-W^QS~@x56PoD7#AbaJazS5lP7|=ZtUXW zgGXQVSR@*7$)N)My(6!EwYf9udlro!C*PaXq`Nhmn;IX<%U1Cl&gs}h_K(b9DJkh? ziMf!)mtz)5YQmndu`W-i3D~Cin)((+aVtxgU9mE*gVk$QqTe^*9eM8*5c6bm#5Tlj zXh|w*3bU{XHp5AIhEOkOyT~G}g*q8n>fKTFpd$i7rgjWt!GY{+4Rvso2(?_|63Ed| zjGeJUR@Ffa!DgQ~wbzsIPA9A02=&GYD%{Hy8FbJ6#eAgcHP|r(Mp(q$sVr z7P4YQz-1h2MpAunS!+DA1o0sECd{#`jf*xEfs~Jte#M8cK?wcW9K0s}>zI*zCT5*JieqJ@fa` z>cpBZg(q6AiDM?#+iE{LEi2ju71_TIHsGH17XA1fnr>ctbKpm#U4EwK_LzVOZB_a+N%t9xw&`&3x+06E>o zX<%$NlB#O-Ch-&79BDJ<6AkF`ka<({_4)1jALuR?DobC6ZtX=L-gM_3ja;AxI(BrP zn^kslfS*H~E6wGfe_s2WFA8t&&xH7KIRY|@7H-NBh$8NAjHf$a@4vt;RLhkQI>g?& z)0F&EM9T*L@~$)FBhg40N#=G(LFIap@|J<=A^+e!pV%&xlx&{DB2LN}vs~O5dFk;1 zLZo(M**i94{_zp=b?lggzH(v+8EW)!Ca}S$Q`*Q;U6>Z@2I0*0YojcSgV8sCFVq;~ zEG=uQVzL(A$mUWNB1~($zoafmw34rquUa_Q2T%QC`e1JE8^EFFp^-|cl==HZL~5TR zH?j2r(@xac=4O=yFQwoG>gS~OYqS_OK^1Kv3UOZ`1M?8-t?k9zA+Xt% zi1=3kCr#syhPv)pd+hnrMYTX?#BW8}r2L|^at1EC)M2p5`L>tj@s}-xlBmfgYM%hd z+IoUZ8O-a?)+=Nnu7~W~NRE8}?_WUxom~eTtYYk*5m1ovg^6wnA6vxK?gIx<=GDns z6%$u!%#%n>x2nk8dINof&leELD?u(BLnftxhwYR&ImK^YBD&St+w8V1Y^bCIq$)bL z(fwVqwO0a=Z2FQeiCE7~wV60}cJv9aYZASi?)7*o_)7!Q6YCD2L&E|iHmbsC%_pks z`mDMgg_8v_^+uchPF|-^-7l<~w={(-tSZ`pQ!h5wKTL3yG={w7*X~e$Ut!C5G}3%_ z@CgH*x3j16rnqE)Bpl=-ujo9QbR0c4N&#Il^{4ucELt73Uy)X#lRtm+AT(IV)3-JUhqIdKh!gkk^RTtU zs1jkpOBp(ZK*%C5a&pI@u=VM)K#A5SeWT#VrEo(1%1PGd_TfhgB++Ij8QW+Un!L#62Q-zup5BtI;+~>*{RtA?>NhwkgFp}M_+Fhpl2w5@ z1xuA`?%{fA0tagoO{sEhp8md61LpacBY-DO+s=jwj3hUd(2MWgwC<%80wgsAl zGc0vrkg)62#FitqgSt0v!2v8Dps8(tWzgWElV#Pnhpl(`X&7_VIO~2K^F@%eU|?48 zCn6X4h;@*$(e%fwhOnw5=MR=`RC4oqol%K(*;@&&%?v6V=FQa8OW3T^Ok4Fob}>&Y z@3D-cXR$KW`Z-oT8F=8{D@wF@z9r(JPFvdYQ~IXCo1f}>0ufYppeuGRIP%m38hOgN z>5r_;wdUm%u?NPU(^0yn3jg!Qck?4RX$scvy_fuo#b4!sv`=Q!R z?NRrp(>|gv{qylcpSgiV= z&s{GsR<;gt>(^OPfjmZS%1<{Ew8xtfJQ^=+Ac@d6x4;rxmw;Ty}0$5@xxftQXC>Oy{BJXOX>9HlfI>WcQB4=xi?>X z)>eZlZWYeubT-+~RWdEEnw)@fjc%vX@lCDw?oxlyukxNJKtzmUt^qBRY)^*eHG8zj z->#rcqIMj!-yeHEhR7`8QnWQ&`w%NpicU4KP*QSe>s-#Siv|QoqmVFgTa?U;T=bmc zBeH<1qM1i-vXsU)T=RU}GmhYR2%XFIFPv0Ri|huls!;A~prgO|7{!BT_V3wjrr1re zj09=xnfDkOKVOZt%h=i>Sx#u zw(_t$lqnOFF=^o$Q(`ko!e*MBzh^VqjCVY$^S&!oXYrefwROySbR?DU&U|lp1xI7A z%e|;EoJ*}-xrxce9^?~zuB9}u_L7=A{qzI!1acV?zmrDxj%Ufd6vZzC#- zAbjCR^H@$-vH82{*!2J?y=n@J2{Un2TB?_YWn3blGBOok_d)0B3t-w zEd%LHvQA3sYvPX&U4|JPolaWuCCO2uY|1NmH4N0GRYhit54`j{BLeiOP_li6zPC%7 zYL5}b?sHZY9e+G)UeJ@Q9l*xI!g7urEmms8(}NZA4^c}qB1Nf44Y8%p!;oj2vb^?K zJ9it5sJgf$a$&^+{pIh<2Cb(XJcy4~lU!Lx&>2llYy97f6#I@xvweWgOn?2XU<`ae zUu8JJUL4gSUTAjC#f;%V7V!`)`TavN<2dH|%V~JT!06crA*|O!;M4q4L8O5u;9z;x zW5kvaAsdW%pnXaOn8hy3@GQ%MPc%2UV((HVjPfAV*IL!dFsD*r_dPv1UW!8RU2~H* zT`atLdO|9>BYad|5;Z{91;o`$dfoO@6D~nw^Koe3ZhSUV)Xu z%6B1T+>8$TLQFOJsop0(dPSTyVPiKeuwLX%I@p#F0`p)tBN+Wfo!M=C{v|Ds_jk}- zNBW~@Oelj22+i3)>}Zs`DjUtE>kIKD@Fp#75T2oURQ>Cr+<*z0?Ciw?cw=I6+H2c` zr>;(3&JU--KJkImrP0?Eh{ktart%X^9y1m_Li}GkEP@S9$95BV+bky6qMre z;^OkO2JU`JmH3iuL5O!4QP$z&M_FPkBQMj^=g{SL$|(#p>B z@`q%dxN3MI>67X!WK{Up3*}h`IxkYPW5mt?Rol-n(=RS=s|Sl1-NFb6^`eS%wv6gK znMLiujenoUX-xF8B`>ugERVcHIFylEX^&F#-Lht3PgF(-M3%FgQ{GJ%PWfyjVwKHv zvs=dSb+tv@Z4nQ-oN?k3CHuQ!YtKzws?uYcnGS$qbdGo+3!=ug z4)Q?-G*VSlNxUO&5O4`v`5Ob|$e(R-Fd1)G&3F=*tgX9YfQ6^*|_lh>9&PrZ3Oah@%b&O z4AKU08pe{azB_Zj?1c^!A0_O?G!_aE`U$x!u)eRzux#UrpDxv)jn%7pFO$EwjJSl% z%gbXk4-SxPM?!T(=EC3GrG~0t=sygP3m@gm+kB?W0pF16tkM;!bwrK6blCi6I?=Tg z9p4WqAbJ8kaIz>7Azfu`ajGDnCrT5rCX)=V5m=QDi6jO~(t9oII-iWZh#X6FTQg(s z?{U2zA)6?IoSAcrTKMlvzTYBI4i{tA3G}Q=IgaVK{?L|3?}EXEzxi&Jpx9lym5Q8= zb<%df=ShBVgyukD(6s=*VCylQj38NE|tEgHuAs7EeE=`H6_x7UmN3uCO{S!^I?u$-w^Gn8 zO~Bnhb$^5j0t20EJNgA2K^F~}9`cS8UliFxmr20F8Km@%m+X(hOmH&eqhlrcAJjOK zWl1-7eDhzGE0$Hnq`RG3Tv8$h4T)AMOFMakT&rkz2bbs3-&vX2`R05h719SYGc4ED zE~$Mj63|wOI>*Ll-Y!A^V6drhn%LkQr(CDh_ArNCu|)=U0BJ=yYdhw zVc-M+XxlWEtTOyQBoMW54>GNckmJ$<{Mx5}9k&h0TapKq0!KFrPfhXkWtO)YOs_q| zJUsuf^JDE{(z#9iEL?dnCI1Fj=mF)}@$Pu?+sbO}6HltN%YG{1 z=BhrQ70V|>&*5ssjY{p3j}=s{A9mt+@x*NEz*7GnkPJlc(W5~qL=ibEJSqEnL6s3M$dpUMmWBW_6>2+u-trNawwHQ=4@13(7Ge5fl z_*!xM>zNL! zHHpBM8Rz^)#`<}$`=3ckG3ORY9z?H7$|SgH`*0{@zd1ebswvFIIEP;Ekmv(}>BoC7 zF*K7ss>I-L#PL?0pfV!=)T!XhZQ9DJzQy}p72p*%$X`2Wudba}so^}=xxp(tI$vk) z@f25n?)k6|QZwi@49UWpS&H0;2p@EA*0*;nw`0=km?xT_zxuRPg>%Gl)#tn|4qboT zd22l(lfAtjD^u_Qo@c>CO3wnFATw{`&C$^CTW#0GYS=w8uDy4_7l{x1=hj%np(-a& zp622L`IF%DNO`K+A39QQK7+dVroaFBr;SHJM)C{opZL1`6~d#jra>MnH-jt-NP&n) z@6Do1e2DV&sp-V=dDugC7vfOP7!K2l*sB}*VvF;{3RY(=`TD>fet)L&^VY92*jNz} zd+A^J9%jwz9eS`PCI;|J9gL?YS(<+Txa+)PbLFspLDzs!>h)~XBCk7h`$AHPf|CZb1wD!09|F@x>*T#2g%$vEFG2c zla~(gPiVmXh!xL_py#wfjZjmmop&~5V@w~|lX4~Ts5Y$WiC!z%|3T*4Q{najb_Ovl z(USEUjHkW9>wcco?9Dt?Dc&QPo@-zXbjVIes}pOk0(q$vZ4n#>xrb-bY&1&Ky~0U` zbE#f_@xA+No&jF99N_y|!*{dybv>trS60>x4;HUw;%K_9OX+-J!nE_vwT0N`=SWQ_ zx$3DhYk&o~8BTNTh~T%K@k#r;dsyY}FCh>5P5g?1tYV(Gf%!tBXC{a%bS1WjVFIb? zodIQghnee(p4@tZJBO==ucqC(~ zWh-l5+M__#qZIC*L5%zZf7^hLMyYS+0!>Y|tUz0%r?ZLffGk-y?89v0kr zLz-3N$n2AKx9xhKb^n73X#(cyP${LtW(HP5|IeEdeNz{^QIm^%yU0u(HGDeS>7B&aMX)rUrL@U zr0T*`9btU($u=eF^7L<(eyHFvRI)!o*gjLrJr|Zii_O=^T9qBTiII&+!8aDU?G^QA z88Esmsoxmd=<_V6zDw3ab>H&Q+)pOde^YMx-mgI_zG)#gt3`KVC`qy zD^4r^z>f2_^aQ6HJ6J@d$K4aFNp&+=&#%#YF0TC=xB&q_{`SK#Xj3}eQOe>WJ$jQKqI+@Hn7q5OwCG0>5_$&d;Z&g5vaL*lB{lX4ES5*k;Rhs zZRsx^4PqSewx;8w+Oa|ha3tIdM5r7U^3E|cQ%{KB6w+fbEry98q6=z|a^2}A~I zEg=*(g-7gxc4-v~<+KKer|z{nsR9j}XdqCr3T(pZwb)Yg+f>jwen1Znru~q<(EDEH zq{4gbmntN!0*Rl`@hhUI{h;YRDR8}*Uq_F9jXJ>xr%0E9L~@iDM@UGu$0IAn9}bD; zl9f2zw*SIi(MDG$Yr3tpaK-@Gq}mVED2+Je zUX<-&H8utHje@6t;N9K|tmK0uzR3mG5S)f`S_OrPQom3UA+BxovHKI|xeXWial=GI ze7*bVs}OvW!;zZ1*S>RO(8@G?7X$M_H~cYOKJKiu4|?lO1qEuzY2 zX5;**EGAF^Y@a$KUrZlKyyhLqZ+;1;!o(tlY#Qk57J|BEn&$RrFeks8GvfQD2}xhF z^PY8Jf5*2KNzt%~*a7xi@2}U$#GX>k&OKzAwgdOc0hlm%-rp1q&?QQ>0T<3{f4hkl z6P+T%6Dq}K`zJ!q2^u0e0WG2Ya<{O^*AC?7nf+1fnp6hS?rwu$B;ljUMH|L$fw+#y z@!BPjj9d%vwm5!mMl4l*);m=ZQ#dUGqN#j#ac(w_n-Um9Vu51v{d?5OEF+?KBJ(ec z!Q!e4Z};?k=!eI;`+HQC*H6)#pUlhRSL9ul!G?c0iw~VWIr>O5Ys|oDOrJkjRlO&~ z_d+gGU#|4DqGm@Zg4lgyhwA*US_Pxh42OMx~j2+0xGfh12IiGsO!Y>}C+{y+{1S~a_LfilrFI75M zHz_jcp4=^Y-#pw@u?~G-2t_94=dD`_dMJl&e~CKoyu1$SjIjJF(lhRcO~E?Z9k^m~ z?xg29(9QN!H2Y$oMZs@6ta{mhQ=(QLWJbrrA|woA3?K9Tz_+ImSn?*+s5#L{sH0Pj zhS+71?&rI62k{I9g>2_+UOL_mTCxYAPoyp!qkX7O&p(>*eAX=zX_XBy8azXh1bDIa zmryc{kz`Domgry4v^dueAy2xM5PkhqztqJp=CpVAtg~g$ndzbFvG$q+0%5-*{)9(D zCF2zL<$b>KsG69(hbPSxk@j$22g>lA{Hv~40mz|2cuNyf+EV2bP6?HcFm*hlkDouI z8yl;L+0|^%$Mb3|8Mkx>-OaT(vDd)nq%*ekZXO~|?KmgM2tMWw%E?=i^}+wKwe$@i z;{d%z`t&5#9d&~c5{O@ z=Rhn5>#J1DZ`o*Jhj(h}@?jx0>jtp`%AG;fKBW%w*_GHw1iSM!g z`ezSA_{kFJxTak~$v+P8Dj*;zL{7aCK+`WsS=XM#(r^-cR8v+)Ew|Rs0#hZ&(}R+3cuA& zfe0KyS~on<4kcogQoFkD{Xq8>DydpWPx-0dBt83J!CIaI5MjGC<|Z1=BXwz}_MIz-c#Z0LH=>LlVQglJ6-i8|=c0(u8rs;#KUC^2G~aI$Q!%{O zWgW3s@#5AJqZ5^MyNqsag7m)AihexJev~jmBTzJc4+=V^c-Ltom1M>w~F_ z1CR808$WvoM+N_YvB%~E;x_(h;hWBPbC2*_L*H!7M(5Um`p`=!?2A9YHP(NBs&*HO zxI!j%p#e{F<qPi?(jy>+XIj-D@)lg4zo{H z@Ca_My7UmlZnn1fUKah=U6O^g?A_9JU*h?C+0_T>M4{7%qJ(l^ky#yXNQAZzy}#bH zS#~uGZ_Cb~KUYXWhOu-;lt~o_x`8D!Be}}k_NhcJzBEQX6tS>`1hVi#$A6v*I{HO& z_aKdBNzp*6!2a;7?haO<-67@&IUQq6S9TSzwnOD_ed3RewfQ5NcRSQ%jtBp2os)Qx z;7n!ur&B8I)Z5N)lVMEd4INIlN1kHEXXC4dwFsn2NA4#y1$`TMsd3lFij|=+;Wk{P zuwucIVDv!EX_ezRQN7rwlF77G!unR&Ghilz=FvCjW#8&2*hchHZ4o;y0ftueoRY$m zp}_Yc&{&-{ns6MX3%`ozbcBa{oszA2f;t_vBLH~zSQ(gp>}Nw`QV{?R4;mgF+JVW$ zd5l;LR-KIhi?y$cifie*JqZCqaCZnEg1bwAKyY^pH16&eG`IyChu}_dx8UwH?$E($ zn#Se!Ip_QC{l~Zu_vOB92D^4wt-Y(ps#UdS%~?sUf(mizAKc>ymJbM4+k`1#`&kwep z_uQG?P@-0cn5&8svv}n3*+B7sI$?0>E=~jKoEP{eD6+lv8)&L>zh@0W-QsMbT|dDE$z9kgKd%W}o#qnXAGRqFY&*E+a6K>F_v}%52A{Gw$8Y7lwHB0ga5*9uG7WcE zl+zMagLpPkRjNs=^gY1WqNLn><~Oslbq2Bgjzpg`33{ubPCg;a3xEeWzf=BF|z#Q&pjUT%+U8Qj8+gW|)ES%+EPHXctEb?i@x(bE zQ1@=8Xx9Be5y5jrnS7brB7s>FK|vvggNNhy-fX5px9-3am!b$BTUeuaTfW#< zh0zr0Zym_c;G_cKooJ0S|A8}tL+k{yo5j-Q3dBpAfW8b(a3C<-g?4c0?QR9AC15Z( z)B2LIpM|2K5O5dU+)6?g-a6yXy52HwUBceh_{Sx6Lm`m$SqH+uYMIxcJNd#9;llU!-9~#xpll|*R5$(L!Ot_@g*&q;^z;g zN>0`6n2DQ8_mDS^3Nwk8Q?XD-XH7d>8;fsYfjG?#$_wMuiF;!y#?q&mbYmf(&AcCj zzpQ_iSN_GbEFRvM`FNGjfPMd|m`_?r7Vl1A7ufXjx?NCBI%^=%^|qXn$|8J?-!p}Y zaQ*x79O8Fdngz3roUM6T+;Igo_6Ep%I91%SMEUKmNreywCh(XapVH3wqmDKG;&Kub z>%w@f=8kP(q-V`4_MSrwq!pUgeIg&TXa*NB!}5$V7MpT+G-i&ezUVC)(~;iis)kMf zq3K&g^sQH`J$TzZk>$+JGOv)dzX3;*Ry!RoxhupfN7~Y)w^egQsgt$39cFnQWNh1d zXL&Mb*UlluE$=wgF<3+x_3FIQ^FM~p3$|~&(R~7mc$Q^84%-@Zy2X&v)2HbyePy{+ z6{0U_q)2k)-!|25+f>u=V0#zul4oHSKFaM_ZP@*7gh!Hj!t{efMnL(((ML%{+1u~F zu|Fa1F;&dpnXDJ$0QEFTmIaa>4msl1{w(Pz7zV9=Mq}OG``7`1?MTb2$rU~O=-)Fc zm9`|3k&iobaAY32g23|`vBJ1N3SavuX|d65Gi%*!%IDH2%^0*;0ZWHqWhMONkGzi( z^?Dv5$rwNJcM)% zzLa2KPs%ZvgOlKVa4~L8!Tzg`sExbwJ67+_Ms0;04v(dfPuF{?PP8JVI79{12>MvD(=RX4NFgd5EL8* zO%JV@avT}>?|$NYPhci|<|4V1WJLo1X?v%Y0VQwe&aSOjkGc!gO*Y~yCRRnggOfy_ zp)nY^9A?gd12~DN3c&1RBtE}e;HsrjQ^8YVpP>Wh;Z?VJN{dW`tGO zdd#DV62LsEmori3<$Z9z+VJuV*(ynWh~fMm?EKu<);i0V-1|@G4~At!ll+p)>cdLz>7!W*n7OkrBWe-cGR-Ru66b?f}9T(6qFCUueq;1xNmqNUZB>6 zqS^!&rFD~9HXad%CnxD^>_by!*CjnIt3xuFDf1mbE{^6Qhu0n}Hb^)61MG9sh8};t zGSz>%eVq|;Q(f(iWV>o*n=>7(IkF;!+xcWa&a5z}ms-3}HO-c|lZst+JezFCKBFVo zmfQVhHNJmGOZr;xwcXUTnlozdAF_-=EnQOE;t#68myQnMI(?Z#zfv*NS_fBeK~auY z?u|LaKU|9VYZzApLu{D`2fQ}Y=gyuM*)k!Td;L+ukxz(be6y{aK1z_!`>KJW=WAsHU3sW{llKF(0OG8B-)N|5xSjUy2-1MlI*Ao6TOG1=8$7i^lUMSF> z{>^!LL_dNIwaVWtt0?}~*|mu-d9RIvKJ|toC;rb^)j@TOk_RO$IhjCSC84G1$zevg zHIGY$A+u$jvp>Y#d3Py0kFhEnyjHdpHD*FCOOxs$}eA#)Eg z9y)W!5F8fVRcv;CPAA9rJ@*bQRNz}k^qPoHLYUb*QsH29fcue}TzI6bw)ejGxmxGc zebqY{@#yncu(#x9)Mt1BCrPLGrby!2GZ==LL3`RF(2Fu5+_aC+mRWUV%P)mDCsw7) z|4-xa(*}Px4yew3+=4#7e-sF5{5AO0=4SUi7Lz14TRfau@Bc%_ucxTuK&t-`iFXZP zzJ=k;7Z?>nRw47#3meVM1Z)yv(u*6?_$P6<$7{!nH|lz5q5&>&L@Aez+Fct@T@Uv5 z|28P=cZ{@wjeZXS;jyK(3cg;e6fkoN$;yE|EqeZKiSB+Rw`h6c`{<>ENSkof|{DNVWgOYZ_YPsd)Em6^Tr>@4Z>@I%QCpVQp z53R@iZNQ|4P?-Hw46|?z+w{AT0hk+1@wlDnqtQosku{~Lp6(NhIU6ekc;f<}{%?7~ z|JR|0F7~S_yRR;mQR;`da@`S=<_c~6!yCGVSzix@hg_8Q|jl4 ze}oSqWp$m61JhgYmvz(EP-YAub^UuUPX7X^CT{nb*3_TU&lkY`&XyVS=>q{NHZowRTIuzZRG!IZ;P^H&Bxk~q@y%!B4 zid86b9* z>h!8N-15nKx!OnVw$*RACBB#FeEKB%aC7E?jzX2O*5Jz4Z;ZSY}dCvAz6j5~}_=1yn1HFQ_C`T?f}JmYewY zvh8k11_|&Mghz+;QLR>*5MzNQ1k?TP;h|WHg@}qwJR+$W>bp7P=AUt<8|-EOe!mR( zRqB{F4|}JC=2a|~Sau0tUSvsMgN~qrDo;VaUE@9w}XAobtMDN zbicq2U@W8DM#~oZyyWtxKId5OW%}a>_oN`{@40bsYaiWmMuRMr zgvmWfTeXh`p_6QTxjJJNgdjie%i2Oqc_Eh zwvF+m2aA}b$l|s6Ttj*_q@I#kOtMN+e`?R~v9Zt46)~`2{arhYzF4Cc{0ma$Sj3Y~ z&!?2&)VY$(l_;4HHZUq=w+FL)v-SgljRBu|ZzP+YSv%3i7`s);iz^?b-VCU$h4+T8 z{}_h_@tm}&{2`e`k~6(n;RD7$MJmNgD5;xwjKu0T5Q`2fKA}eDMRH=C9G(){CEOYE`iPK0d~@ht z5m%m}7k9Aoi)XRcMj7Wt+V+$~C}*Q&bjfq52d|s+dQj)0&GDdT;C0SiYBv7R1J!=Z zIybxM((q4Ti;gp`UpyZoUikS`G0CoiifdB`EJykMhQ`Cy86P_rB`iJ2L|&tjwb+^+ z4bnb0Rp|q*U~rvi8V;?}NtXSpOcd_b$4cl6lEa717Q4iFkQf{ zG1RlUADY=(`*>b3P}yyMV3viL>r0>NRelE^fPgYx(+RByxi*4t)?KvVBpo+gu4$g_ zsW_eA)I#*M=~k!8?^Xd~yea<-?B!h~?&9&|6VfM&=(yYMyIj9v-4vHKY;=w2+d`nHrYRPg3o1tDpGP&+WyDSCgeL#?*;t!@Ag@V~i({c7* zR-@Esm(m?Ip{{N#rcGJxGO9LspM=I>kPC5O}HNFygl*bw6K$=rX->x)Qz^s(knHxiwbZq69t-C^AIC-V zsoEHW&J6THI#zdbyGN&dzHqkPveoMukGOGCcR@LKiHq%?^cD3X_RSdFQ ztkF*n;2$#h9`?4kI5AKFT!S)XmafGe2Jj2AcTpgKY+>&tD#`GKgp1RXu-Mqx7!sbS z{V^b*mVb3FAi0D!FP&UIBAKAhPD`RQ>29^`&~Cg@-H{V=lte3%M@+1(TqS6v*p?vE z>^|}sD1>HErA2DNeW@IcqXV=bIQZo_V^&aYoHq(O&MZ)l zsHc0vsG9qYN3)|_ARPl$O(*AgO-z2h{A!VXvF@GpncOxdpE-2Yp>c9fQ={}Vj-%Oy z@xdSz6Fvo$0?ibLcg3n$=`~(-H7;JtHj`f(PG(N6ci~gyTL`!BV-P*kd68|)KFQp8 zmh5fnw%eW4JBAPh{==r|Mpp|?Hf~H`0I{c1wb}C@AW`cP9%0R%$~k+Yn>il)^>P z)3DcspvO&lee;yIhDJEiu_pG{Bd3YXhnT{6vc1=n(~muzf3Ms?cwl{lg*_2%ZG*!-Nt0s-%{LFFWPnVyFgdw z9p%HH-c&jcym)I|o#tJ<0EQ;lz5amTm-D@!?(wfH_Wco*>U^O%2drwV+1e3|`^*)^ zN?Xw8gRKA<@ACfVHIcT=Fyq^!W83lWxR-F}aYK)ozXFXh&Nh1n5%gQCi`dOM$c#l} zfZZ7($`_0s9`-884DvdZWy*VJ1Ay`67G%suOt{*;v*b(t?9^P9e)H{4G}}^(bAjzR z=0!*1!LQbP2Zj86OEQ3!#WfQelij6$-QZGi8V+b9#r z;W|Q(!Jwh)d;Zpzx5_M@X}FO2_4&HcvhT+iA^i>%NXzTjuf5JYZ@OTe4Hgq5(s5)X z*+QNMfUf0a3@ehFDHC1s4=96gnxy4>Y;ZNv0c78TB&9^=2YjCo-`ZJ@D zE1LcI=*XXEynxu#_>_~K}yF0MWlRfO_LRVYm^BiOQ+ zB3{D8bJVU~iJ*?`$2DfK%&t2h<(ntohRGq>wsOp1^#>O`QrZT1JkGc7cH`P=MDy z{$p$t<|@sejqZPfJKxA;0kEL2bXPy}ZV8wDrPKlQruf(J43+GO0e=8d!+56YY2UP- zf*-X( z)AD5G5fjJLn$lob?Q1cXc@?s7sbEjVooGPo(&+hCz1w@PwTz5LB3V(_?}(IlrYi9O zC5P=XY_Q>6mW>Pb#jHYH ze(Sm-_c2{lsuB1zLpSw)c6loy7Wqn!mY1V6w0!QSYR?OdYq5emQd_KDSbur%OVPK=2tJUPw?~7I+?h8i3NYk$1Ojfc zR+R)cWx|;@yxJ(~^2-ELu4&Z zjOGbyBsFwB^`dVc;;yWM@+JFA1iITHXQ;RHqu z9f2PXv)53jb9^<`W;KR24)m@WK1{LoYmm8L9pl~&={mcmseE^Ag;TZJU{5dE=yrTa z?9Oz~#bAmt&^}j}aVCCQqR!K86i&n#lW!^AcnSaU+JkVlj7MwQ*BPhVzUJ$;?DeN) z!|_d4*%F{&OV!}yldbn-p8^7?VT#?A$Mx|Y@u~4Jp^ciSL&oj?=eooBsR5G&*Q@_4rbt1+_c3Yo2Ni+SsU$kd6fxdhPyZ~!Yb&bH8!&O+PJfN_ngKnph@OcM zU0=h@MRAh`KG)|*&RnJJk*hNGG~NR)(fb{MG-8?K?>eEZ^?MA`%$FrSCAn#A0{^WL zrd(CyYNQ?3b}qn#JM;dG&GS#YI1feJcUGcT(n3~N(1Mq19y*oA9(*H4+S}gV9bo#EtyA&)!yAIoRvcmg8SqJ)16=OfLVt|&yc%BL zIdCVVsrS~hDe$|a2ZHr0WZmllM(yeRrKlG2oym@g=34lX;TJ1$t|R86*fImi=I>cs zOpLCKg#&C)50-*KC9}~|Wg;$r3X4A9>45LWevJwIAM z&2+pxKPY7JV;9V{-gGs%~ zhA`8)9CKi>bXNwnp|8PUTT8tvFpN4Z@7WNVGwccA6v|BMWR8gZ%k$H6n>!N^&m=Fy zCSTT!@JtXrD0)QRuf+?LVw&n*=Rd{hz+g*={?W4uIx?vqYQfX^etfULL`VQPqwHz< zTYW{dGd-tbcGjM=--2kcqs6RW*iS5btIaNdxAP6d7uGq63`(3ytDN#6i$(uuBBO#h zgwwSPWw0@*=)xFOcySIica=D1F7L|NhT;(Wb{jduw46%5YkOL7-YU=u9I2FZv?l}_ zVAUA!6b_*9NkF}v^?4~bD<#Jq-#J=BZlDJK(^ju0qG$v7M8eqANXmHlRQ8+_{AiK` zD-1X0SFRgBi}VH+(>MPJEVx#VNb$~^zt5WyH1?1;S1&`5ktEOTth)oEmpz&XQsMg7 z|8Xh|#Rt3GLF>4Ea;oyhg<4pdx0_3tI7~=L2~mAS1L-X1 zzqX5Q^<2eWaV#a1_0YVV`42sU3^P6IpY>Sxi4$8CpQ9!MKE1ikaua=7c5)~rg8fxO z2T=H{!uVdK#;<(6Rc@g_(U1KE0clF8CV~}x8F;ZNnnmvOWyegZt=j0^@3&%O;Vrr8 zGNC2K71(rwW@nUxzP04o6YSl9I8itA4R3)K>rYn}u{K4krLyL$<~|Irz+B{4&(F6l z_GWY8<|hkNfn79tkmbqmyXp6M47fKEO7#HUH=3HYUK9qCw>`zh#G16Z7<*eS>ih-Y zK3;NFJF7j#*{%2mk@KxyC~2L3`1mpEr)0#DVpn7Fc3%W0!-o&UJTQpxNKo*3P#tAKt~0hQbtA&`dZcIu$OGsq0;I_*Z+detV}t?N0u4yR|%j{7bqx z>sqID-VN0n4Q&qgDR{n2{pxg8`y9b$qr=+|wxGSq1RwbD`nkUnNQR?Z{P~V@Z}~LN zn0qOA4$=jC4iVc)pKm2sZG>8I8(wLAfBEkJCZhQ8lfvn~$jLipD(D%p>FD@d!$&54gR(-2w-` zi(fxp`t_B0Lk~xd=-b0pK#Z=l_Dg<=C~!4^H2v2R8A17%OZ~nj&jXi1_=VX&4a2C376pmZC(&lhYnT|9TQ> z>-aRpv4{B4bHegI9Q|ZrL+Fkw{tY+1!5L=J$eMDM$$t4Roh2C2{0JoaUoH&dLAw+63J7Ttr^^ zLD&?_kIJWJ-PVs;UeDIr7=4|n-j>SLySSwD*j6-_@r0a4#SI z;35GrZ}9>f2c(eBcej7O42B4OWSQD>=W!_1#&`j!zMG;P2h%jN$yfuK%bs|2PT_}q z>WNNtd$eEKWaa8TTM-26;7vKsi$1n1E_a-&_5f`H?9-K%%^;SIXPe`(;Fsl;v5VwM z>%MiITevrtcstWJ)YZ=j{irYYXEcFhE=|z;HSXX90G6tsc2tid#2)$WOp!0In(lnj zn-|?_?qPB|IF6_W1uYPOWZPVESDWBxjesj1FkC2`Jnv&sXV<6O@ZhTht=VpFqa3T| z^)Ju(g1IqPs7+tLy@W&`_Y?)e9jddrq2u}NZ+#%W)!rt?l;JoCc;D-ZIkzeJiG#Vhbx)RBX)&; zL)?t!8iU)aRXAIlr0$)fpH|m6(ABfvc9wt8kK@}&vZssm`4`Za;1{Lh4&D@ZnZ+`D z$`SrkR!N7%$)EySk|~k;+a4KIX*4Oy^^ucp1{eXmyTFlq71@+FrLx&h8Va)kxVLdf z?d*ZoY$c&4jotedv}D`@k|AIhJ$s!JvZLQs`Ov~v03xU6EJ=7c6H0%GjPDYypo)W% z9&niqe`uUyULl!<0EI~**Wci{3t107F0~N{Xw61(&BhQ=J}nmFXdFDe0u9MiMj62%H^gE z#BD{w=@i`7J0fIo1a~tpQ(Hi2t9o%APhpud1Jw%9!?UEYkQOw311)@=adc4@qaPSL zcAuN1U;5T!WBBt43QOM6H9>f_h>}V<#n1q#aFkqvS)v{j788mnx=YVJHLPs%C&y#u$Yo(Z0^3E zG|Q$N%3Ks(Lzyz-yT&(LFQBrBOZ)-%d{{?kzG&i7Q=kg-n!GNOa0j&`iCTV5#w+!-Ua zA1|P=-l-{M%G~-;!^z@sJvq*EoW%7j;Ac{vK~uFFGr^a-(k|u-dG(e(_o#$1T_0B` z-;~53@iGMT z7T~?up$nT{1 zI43S}RM+V@!kXj_H$P)bYCf9OOz#!kdBCVF!?i_DJ%Stw2O%BS*?zC=IajE$JV<|V z9^cX#S{UJzQy&_>PAkfkedPisY%6H`ex;xDCe%QE*QT}WRQqiUeO@3!}G^X}N zK9c^%R;WFECzSt82CSy4Dd(bx1EEs{{^n6h&5+cJ)_+)BTkhX@;u3g1_2eVivD}9H zXaUgovGLxkKbD<~!B87K*<}kDNBUsw9$D1KOrPy?x*KVdu+J$+xN~JYidBn&0#PzKRsKFXFX=Zm!X@I#d61&)7hm ziy`Nwoedc8cloCtzJPTw_ZbTD_S;G6gRami#49;|tXdd8AQQb{{MtVvY_y!zZ`{ah ztPjsy+Ux%(YCaDtjwuWhQSk3GJfAuM7t_<=P4U#U3yKG5aCpX_n=Z0X$=vs0D@T{` z$x-jOe(* zKg|rd5|2KQ9S9jnA5pnl16jb9cgtoKtW<3KB#c!QyYs4vnV;4sgrDkIAy?jd2pQ%1 zUer@Lbez@VU2_BKyVmGdF^t$*m~UySryn(7Q*;6A0g10B=HPwNU@wCHDz;BG>PEX8 zZ2WTfGHpNmnZid%kR)>T?%jI(^$y$aBP@Gc$Ge%fNPsQLdG$O z8s*(1Bdasc&f$(foK@tkHGCx;7(p;?)%=Jn(a-=`B~aM6C!4N>cRn)cO6zsTfb8b_ zicC2y<4NNUH_{`6sPa&40rAuCh&SAx2U|T3ZIk(3l0*Wiv7M%ZuE-TV>!^}>TaxxL;T3BjqaHA-JuHWXlK+3 z>$AdHlNze0agPIqtez{np%z!BG(^-m7m#~z^}5!mdvmJ-G2b_0rZ|_eEi$%HE3vRJ z#FNc-nNHs@ESAqkvF|@z#MqYFuXQ+gPDoNx1)wPT_+Sy<{IQ1ykmV*D_4iBtonI$8 z#ZZ|f;I@CTyc;kndVK1T5>$vxfdd{`;^Kv&W%hozU;N-A2!U0GrVA^aYMTagyLY2C zSVMEz(;ea^_LgtSV1yem7uff$Uw{tbSR>>6t_hk z;J3@Xr@`&VqVl1-&P7o58hpdj?S*=m+SIw#V2F@0xq5EW#hwh$t5d5U^GzE`T(oGX z;~VvM+S{}-<;^(W**L*8cYh@Yo=E1Lwq;B4Sg~E0@1T;WALxr`-z(OoW?Np@Pq7R2 zdn4$}XcE)ii#mU`?HK%RnPZ~&3(-zD>v8Kd5_5OZCtnABI^vS`b)()(Dt9#uDreFmy44BwVdGqSm!-DJ{}pF)H-io%+;1V0_jAep!ggU%jolR zVC@iAW+P;Hl}1^>dVo4`#4t@?vdI&HOTl386APx^wAFT00sp%fgbJNb8{XZ`z%bVA z=6w4YifOl#eh2?CvZbn<0ozJI`6Ddwus_MRnqEdv z9JjGnAg`>A9Vphxo^<-{=Nsf4I`#`PLTZ{XA5!&0-~AtZV7PC%G3=Jl{Fe3=Hx6$^ zAGoS~bS~fLIe!%v2@ky6#e3a23D;PVswTV5el-!@KCiJV($sOw)={gT`6rJR#%^5Z zU4ops&|oJl`b^Wwko~@1ORwA{_S{9iYW$-E?||-B{>Q6OVIs)X3lMgnjYYmhTA%~zen}Uzo0TA@Nwn?Sn&>^h z+z&NBL0#*c4_stbFISl(VT=?Qj`{gSbU6c5FzP^^VoCn9X8!S;9z*XnTpt(6eqCVV zcfb6$i;OQZ%r?Z?-IDn~{U`Ajl57nOl5Vdo+cM(cJ|qDBLU0|VW3|-a#ndh=JG_aW zW)rUisStUlPrHKOMvoR3zE8b~KD3e-I(pYa7?9|u4PwWTK`bNu-I}&-;OXxz=*f!Y z%F3N|n`Fwl&`~>}2;^Dj=r^X~=1+@m=3+O{Q!25v#5rnHPcEp9nb+UW!hA>l;flIh zeJlYr>;G7#Zd(#`Fygv&YGwr4&sj{9w)FmGnctKBGy49yh+%eb1r5s0 zMnYnqFI}bmo&|FKo{5t!9Kaf>#~vI1<3Zf+r68n;kd+;N2V+rXCnt6)phH4}df3`G z5m_Hb@laz=TiS| zQaQQ?kvk>zU4Y&GftkFltjN!g!&3$2vuj7b&Skj`S<45J&*J#5oLc&MzB=vvadw?mq^{{*N-eJ^8;u8UK{TC;VIc-}tqEZ&?MN5=?6l zEktHlGz=9J^yyjm#ZS(y_!Jfv=Ggs>Q2Y0Xr!|JJNm%Sgn3(BArgWDPk={k2PyGGx z%5AZUeE^DeVPQZ3%WN07@oxXs=i5T-J}nzG0ot|6p1o;HFPHMV zRyP-cbG9p5UaE8#c>!5ahwd2^ol0Kwm1+(u@pCV`=>3KNMqnW47~lF&)yzc|S!a*e zGrIWqmH&Rr@5a?0C{_*(q(mOm{m2m-Wr2j*oG#pTF*k;NeVW#Ns7k=&zI%Qi7Qw2@ z1=!OxXL`jiEt2l*+Y&~EgHgew@yQ_q*pl9|R?U=n*yqlij7zOzS=mN=k@TR!ZvsM5 z_LSG)`p@bu4j!=%vno>KGuRzVhv>XAB8O53*!z)d0-fOl%?5qwtp+G7qwS>mhBOo= z-@&uJ)-jv@iKY6WNdD82ICIqWK-M{)kpIjTpghCZ8OM=G;cdj;H$fj^=fOdo7&7I~ z)!R23wtgVjr9`oQQQ13Qvn}nGhH`3|fv!>qr<|k*`qLzdxhufS$2$Q1a%4G1biF)ku~x z(vDbCICjG@`UWRVK8M;G&zC`-q2A!^pB*n7Uo5Kl!xkrpR8zlPtUROn6=AY}%fEj*aNkc!-pIbWn*#wmA7y5_r*IKut?3zx^1Z zj5qxQe;=!Bhj`G(+?0bL86Wq{aOVl-^iP1B)K1ny>rvI+3wVXPnjP<%UByH;?vTv{u^V=^|~k$esz zdUT$BO~!B3BA3WPCTrVonrgCWKAEsBZpzoMX9dc!7OR+7`MamHzT(#HjF)vYa>rtc zIPQF9oco2jkpMRmh{@s6heGXOw0m^g-cQ^B=1g=t`^(s`1*tpjgTv=HyX~%gq^WCz z3J3#y@pYaHUd3nKvMzoU;SDMtHR+?rbJwmyjKq?idY@6@QO99tQY>GCyDiBGdi>S} zve6!QvGa;OE9D(=9(~GOMfmh?f$Z%@%TR1R!%~|aFV~dS>c@Xwlh;b4ym)e!{%99d zIjhhMEdC=EC#3fx09M0$QZmRl(JYq#<44CL=w?DwBAqIn2B8?T5DMhS(}ukNi;;!; z?v|*nGJYN*<6x)?kz}9#h~(&3TlwI;O9yfN$eM6f?SQ!&e)U*!gM50{oNbv0O9dh~ zp|+=Kz9#`e^0!eE((7{0m}+xH{8Z%QO6^s9mEG9=`L;pp)sfLHGO>x5#9V5p|xX1DK|%HAZlT-X_rkukfYciiZ`PpmN1UO>NT0^p&DC zHv_PG+th)A&{NrRJVnl5&fP=UQk!M#s{ujev%C&|Sz}(=dy&1j&<$w*8&nAJ=3+Yo zs&Oo@W8I*wuBrZM@UBxK&=PgV!`_d^+}Y&h*^Xmq7KSZHE^sqdZ&FKIcGO95-W zP{rAH9WRmWl9;sg9opw|xF{pd7dqWvP>YJ0t0-rUABrRsH!;0_O0T+;^0u=WZQ*)M z3-})PuZI%DgggB;1=fAZ8&grie7UFgJ-BVvz>A-@w*Yw0b$p2hg*V=b3g{_l*c=}} z407TDVm2f=<&HyyCoLv<<=hnK0*>r| ziU|Ka9r?n;J}Ohi&xJ_U=2wyJ8X2SP#OQc$*tCw-Yqr--{2uSv)92>rs)Qlhc?)94qm5EQK?_i6rrSH;Kow8rK+dt7w=(g`3xp+y1mL+iC{lX)hMN z&t~>C%i79y7s;;ksn?=zuP>!SU?I z6Y7PSpd??e&{Ii_@gCbNr{^di(PM3_ZdU&@6sF);DTHa=a5N4 zK)TZjb?eG~EClm)#;BAMxo$oMP!Op8K+ST+y(*?zv&{3KSPyb#1NWCMekkkB1V;-1 zeJX%R^pbOJnnSfol}GuuD#d3v?fAw!AA7bv8`F`S6XgN%ljkl4wDA&Zp&$qw8(1x8 zrZoGWmIvbw3aYoAlu#5OGp);hY z{8%122|eO|spnL69cf9n$GX3u!Y1G;951t1G@E)uVJ8wvtPgdzE)1fEzESdoXUWDH zL!Eubv(8WGHi~pV)`a_iz2b6e$C60%LH`!P$Nq%tsAe5jl8KU-EHJkbnwWqGKYfv3Vv4ltokh$M}B8*k0#GTW`Z1L@@N z$zN+v(du+Nt052o1on z$i|FFrdlOv_KVW9C_w40REU!V@8P(6BDoK;u_eEHt0!NRS~H^p7NJZns;Y8_oqaKf z+$l7XVe=YVD&`+Gj)~>tTR-8EpvnphMzL~XBpPVQHWs~hH4&!3ZQ~H*kB>@Pi+D}) zR2%POkRdZa2~68d4Xs^KNLemax>Xwn87W`;&wgyczAo_JY=z%*BkzR^>u%URCXFE7M@UC z&^3S<4J9agX7|P4`Y`me_}Pl9D-I5Py_Wk=%-_!@(f)?}hEqPxw>Ze#2fq&NLiLSf zpxQZXT+A>J^IUDWaogL*>v{S0PMw^dp>c)z2YLo4R)4Uxifu)oo^iaQ6nFz&OK;3U;AEGZ7vKKCwC)>q&5VC5whF|P_TD17(0 zitoWDtdm>6k60B%Qj{B4l#+i2J?bOh`UMkuAE?!xlUbgYYI}R$me_S_ee$2n&Mz!9 z_wrg}JBw;65LV{cH;O-g-?(PsA24~R0k`N$xaJS$#=-?JKxJ%HW z12Z@bFoS)Q>}S8RxNztJd48sW@$5&d&OPLCrJefP=rA zQKYYo*dB8+>PzHd28VSFRIABy*~@WWMn?nE;|g*iZ6`ZM*kmZ`{C;Oz!3IsIG#p^J z%*E)6)Z+y){VISUXsAQFhyIg0de}rX#gI{tNfK9g*B% z06UdY*HF1i)}uys5FQmmcoo5=Em~QaI`)O2?YT^9d)m-27~* z2*XH9-weHW^dw@q-cc`1p2bKf_GVByrx~~CwPK|?uz3z0Bex#j=MW^ZO%}H+pe$p2 zIq?Akj-T2$X0E@HapTq2Fo^$Y&%EC0>B)bKH8^^ZDS#;DnnC~O>BjRVT9G06X`)+$5>J|4y zR1zwglh4o8!{_tE)mXJ0yzMK#JO0o(;+VHqjHqn*)Yc^b&Eh4MV^BgrfG>z0$+qKC zRFp(uoA3=&mTzppT7{)rqdbs5gef%4EcQRaVCf7R1hF%IabL@y5M+?@{b=5r`^F9z zE_HU*30_~T8h_tT8n`AVH@ca56bt8RPEwWf#Jp`W+v}!>8{i@18 zMGv=6OY2UM%`SpT#npD^D8*Gyq_tK+ovJS3E^EHYaDv>*V<3JjZ{>{Qq$1A7ikiK#;C7Q6KxZdeEnYeE8^$4`oV7_EurD-oo zjIVz~gYP~gYADwQ9*7Oalf?)fG5Q=9>bfrVX5G!Lz&Jd=OJ6yB6?4>(y?l>o=KL57 zCIlSH3}{b$wVNX7`O_yZbBX$MNQnE%28DYx9;$pWvhzp#xrOp*Y-HxR3u{lRn^xsn z8)%G^U8dMvdsD^t@+sbAf9XL}K+cxmq!l6A`GEjo(Q^vIZ`riEPDW4rUTlEJ89tPrJKexVZv%&^)?~cK+;qqR3vK#p&uRX_eSq|4~!C z(%X|wZ+u7YwCco0?os{FK4aAoLfOO=k!#1v{zm^BJNxN$!}Zjt)KOXGP#QhSx=^E} zu~s(w>5QCdf{C`K^_IXeM(8OR>RH*i%^&FGXC!VblLpM3T(HPo#PzgTZWF)tw4XL^ zd=Yexs5ds776qdgfevtYFH;4BR z;AXc-pF63DWmG>$WoRD@`H*j~Pc=UzT3HDl)Op(f>D8f3uU4*!?D?*T^wU0j?=Q+D zw}E^zXII7#~EV(dNeF z->RZNe@@=f<;KOwqvn1m^88b5ac%w~X?`B@?`<<}3C#JEn*UEAvaSQ|Z%|mpy3W9a zis(NTQ7;aoPn-Ao_fqJU_RF~csT0i*Jx%!k{g*@IhaG2g9JwRn^Oj=DR=FftY%Cv6 zE9DwTnH$@G-54A_=S25BaNr<3zGv;|2{HwRAyQ^GWxTJ{ln#%Nh*m6Bn$qs8IYaNi z6*;wN?*0p=p{v-KFI{<<-uza`Bb9j2g+Y${-WUw>SD9tYUi10z(mV824eJwfv>=03 zI0tG7gZ9Qib|1pUPhV@{7+`(U7xf`ow}H-34X9c=Vf(H5yu8Goe?$GQye#sYTMmEX zWF2mT6)<{6o5=P0$Fu%X+`qmK!7zm z@ez%UC&*)rWv=rl$)2-$gV z->blr7v-N$OCd1Y-YUuKN4#ZYjC!009{fDoAqCo;T(4t&Ki*}=P$+aTeUKKAFb7ET z=9TJAGB z;rj9QDJUe)HKTi%q4i++`^}~M;Gn%L!u-qP67Pga`h;VM+2p+m2V$1v&nK2m&Z0+% z$eXTx?M^9dKD6%I365F>#?~6nmzagO928#7Or6(O$atJW!zL8r>?$>93<`lh4qsXY;TAbmtS#Xk(L8ZWFys+RMBT3@Nl2 ze%xMb!5{jQiAGlKsZL^q$3RdlPi3!p`7HSBisKQxj)h<2g<9~mV`N6#?H(z6vObsT z>fn|d<{1hTcpToSzBWVGmp)VqF*`Yg-}?G>>wc;O%p||@)YvCJc`;D6ym{VI<>PV; z$2Qwn0$B&Ie*FN`e&{v!Yr4^F6Y^F%t(hnO(+&f(F1K2x32C<;)^WZhoh{ijp7iL30T}(&kM+Xvf)_sW&Z>#WZc2OdzZ)_OpbWSC2q98qL zzrncuXui*E`{RE>#spT$hfwgvwD+{u=2#>PLAjuOyq%Tx2Z`pz>>$irQ<%(UjF>N? zlDZ$VK9Ed3_3!q=M#x-r{v^&@8|JD9Y5 z5YKG*no`A2?n{H^V8=+P8;0-N0r#bs+Ild@vcf!rw)o$6iZkykxf0|%C7oBIH&M-E zBmUlh(ay`2R(&^gmzqC5tP4PTDE;kCJ6`RuC?dLc|B|6fxI2lANT}spYZd8ANWD0q zuJa_XRqkZ<^TFqp_F;lp0_A&m8qAl5$Q^<|lSu^OMBBT0&y+z(y{HXykL7!gessv1 zEKuObb$4)?+IGgP=hEjo>%?5uc|j0nIfQsm4_){RC%#xC& zN34NKszIp4;BXxn_GE98j5N|?E^tg{;KgR$r&!GKEp0B_mD zU23clH_=7K7wzFs+`#J9(2C-tXw4SK=(JS@PKzBL|RphgopA7mJK|zHftVke6IhTzaN_ z_cog{as5*^wHkqUH5cP1y8>&m1@*7u@i&f5=fb=(>c!pm@gDQ)&Tp$4I*`ic#~l+? zagB;a)X&i2IutaDyX{LLmmcY-RXrf?lBMedlhZJu_Yl>>&f(x=OK zOCt+!Gn!BAc;3pDFaw8AV$|jTB z3a8+j3;D`*1?`l2J}w!&L}zJJ)Njy2EoUrBEK@OBxJ>lg&E-jzpj=F!FRNX9b9RS` zEbxs&mOsJckVshMC_mY5&sC}VJ$+{45u zXoli&M?*ltm`=Co-i@j^lH3d|j{10wzd*?qvb+DniugiHdMW9IgH5CQgFD2ZA6Zd*k@a~)A5{%Yb%+{f5GJ7n|n>jsE4EI+PH z(Fvm>mBsjo+z*4#J9*N+m2hvNbR1zj6e;4Cz46n&B*sDuYX2y0R^5pe(=@B=?iHJ^ zmr7%Ao#hRFeLp`=+N!d@8;QBj;$U%bXu1_{;A&Wa{aABG=|PEt#9%LYxLN(+rs=z( zlEwr%h&?8^-?VQu8io@%GkeizDD8aw5XFY2LnX^@=#UCL+YK5?>)=hTJ2pb%V^+!5 zTEWD*At?rCZ{x4!cVz7_U=V1I?RPr0y%L>zEVOL^&j&nzB?z^q)EuYRF>%c5@D6IO z1{<_SFu|*>>E9EKbJl6KMdWhop7OCxU?Y(wS7R8PG$uzpKMi}nIwkw5fI6{f)MJkJ zfeT`u!WS9HWa7zH{YHI9Ga21@dl&H$XNGQ;^?6f z2tu}&ir}^xC)O}6SZRd*7)v{7s`y^=36ADCQdXkn=IDM56EnVsH*2VQ#xzr9JjNlM zwMxgG^6DXNJU**TeuflKmx|cK2h*9v$N*Trx%%8 z?CWDKr*&{@X2shF8%pwov$w`0N`?Js`|k47Jo-y8c{7An=u4XYo?_0m*zt?E#tHJB zqXFes(0=aSsu#-9$y&fZg}87(Kd4iW_#F1v6P$gyssJXyrz{jJ z%w}{}RwXdqE`?Uc3HF_xua;{#Y|zAeGI3x5HoCk#@mTEIUIEK)sx58GsqqZ|c{HhB z*52q9)5lbDo#n;l5CiiuJW)AmzUIJ$G*@t6pf|62()wuAPwKIWevMdqFOCFER)&(j zbOt|)ozK$B#vT+bkXIoimbI67ZSPdR98J8MXgew|W)V~_HC_;m``D9G3q)YA-b@e$ zqvBOA*1E!|Dj8n$2S;6%`>+!al2IYW&>tx*MIe1puqxE-dV*kq_c8BLtr+;pCWSze zH`PcwmhUT@!ua%LRaw;+^aP!?*$00j1xh1Yy_Ac5c(V`)AAi!u`fImGthImqoX5sPAT zi?bkYN(&IF${a!;=LlN~;gXvw0ru9`*%C2;iX{Fvo?7uKh3n%omOFh}lN~1-sJ;e} z52AoYacK!EHO&vM^MeM_Ftl@)1XN$KP@0byBV@jF*IX~tar*(e~ zoCk97h`mlA4IpY}cN31IM|Vm2*2lbOpWOF2_ejx;-)IOCyW1{^N(w)lQSfj)QBMxY ze#h~dL3})1gx0=V=vo0OPR@_D&Xc`;@3l7!ufnzZs(b4H-2@}nTAx!$ci0gLaJ2$YW(n2uz%$9&Jo+T@K+w&n-x*6DpDK>)wKygcy>M?sH^egi?hRqwPIzkiSQz|Vxj=&r%N<;$ou$fIBPd9|)_Ob0cG+uFMNflp zidiNdL?%+X!s){(93n)jqE>p^M?9u9wX%}pyGO-xrY@Vj_^tC7Ttw017LAmPre!|$ zE$40P*k%L8K90Bky}!4qo5`4Eqb|@_gQMREVCxin@pgIxzc|9xMr)7DW z9+ss3iZe#SX>>yNnQ%7=Rg*$!U%AmJbW5=U0bR!pgLb`quCKC84r z35q=_(5~!c--JIH&8n=#h=(k8H5;txlNaL5YQ_0{eXDhmV1Pf|z;$~v1?HaQoqONXl*l9}s^74kj*=(* z7Ldw=Hng_)e&WaLtyH->#Gn~W$i3Tn6Y}xsTD>B0Udg$c=K!I4?tlA|0lY9C)0}gB zDq>1JbL6J`OH&+v%aDy?W|kLgMT7Yv#dGuV>DfVNuct-Y%P<=kA>SWg`Wx^|wZ@?6 zpJ1b(2rk+Lg-sa!!R|!M;*@|b$Hk9}2f=6#+^Vi~pw7R6_DS$uZJ+Z_HWbhwaPb+3e>+JV2Hb!E~LmJC@3XiMp%&|KP zR&X%$NSIxyd(Z$zWY{WxvK_u33D$NY!fXh&<8SBu)NX1-GI3Av1ea7khY#xZq=BEb zR*VEOfYV!^*H0MhHlvxoJMd{NfP}MJqNyJFpyU%SKb@tlCSLAp`|#h7%j z*$*D&-_@5Q@!uG=hh)I-l2jHw_1Wy%?55h&7SLu9?Y1XF!?!*M(I1s1GCy3T*;bYR zT1*eJmdZu15y^36YuPI{Bb{&0=ee&c1%3upejzPasT|G`;!xZ9I(HHU8l{gTBbg2& zcmZM@(FH_|*Hx?yJI)0&Q!j?K*N|Fj;64V&EN0dZzZiXGZ53x$(w<{-Mqu?dJ5D7~ z;qlHX{^?9g;{|$ZWzK&iKxOM-D1x)-YC2sFGzrZVo%b^vHLvV3&Xkq~G28FKgs=(E zqxAmt=z6KFabou$?B(B1@*DyxQh{|$+_UBmq$Vy!yc`MV_1aTFB`$%5*(ud%8%PYz zO9VKLio$D#_{Sh~{vyn<-!!;}Gb5^=S98|Q{H<>#NVc%wH+(w%%wWr^d~c6ri=-^0 zQKeNemsdcV0&1;gtP{>868S9xGlhvS{n?K}W!k!?C+OYOP~s9VV$X||l3-jZTk%QR zMakoIjWee|9Gu@~<)jTi`!Oc3S0xa<+|A8QmLbeI$Ez8apM9ODRN$D3#XZP68DmLS zqJGVx)G8(2-p>me*VIxhwO>u!NGU;s$u64HU**E-GePjn&WgPUn4bOEiW$N^PT$Qd z3wZO1mGYxEv=VmP;FNqai)3%2qoVL_*O&pmM(uTY>0J*KK+{E~FI%y>jp#aJWU=TC z7;d8%PHXzt?Q)HSv;gpt0^^)PS)H@90!v<(yF%;8lHCPo6$}e_lh*SJxg` zth0Cy%0G)v$<79^epR840AUD}K*s`)m&ZJ z8fPoo>)-khXK>Qn{4hPqyl+>JCIFA*JLcbN0I*4CEmjQNnWTiT?SS}S>3{8T2o|4BoH4yG7iKHf{Sf{O(_{g=G>#&+`w<6m+7 zbF^1%@c%G5=pt&V|DXN(l9Man#14u6D@@P$>~0 zL|*9<$<-Z=ejbT#J~Uj)8bBYzs+v7 zRQ_didpSP-sWkoHrubs^@SiIF=akMz2b2@Myu7X#`vy<&C`U#!1Q2dz1q;;UnN6Y1vdFe8a$o@cKtswye zmIrxIQ$lfi1zKcp^&1p#)QY)!8lw`6y*mFHYqQXq1ONcwT$ji2c^%rB@nZjHeyoe5 zW3L@A>>jW_3N~rgZ}nn3JUmp+7EME;Kmi?Q1P)@zVw(w6e%1&;tz-Zp1CqMteIPoieof-gA6sIMmKk-&dxC-l2 zxEani#@!aw%Ibf@!VnpqeuSuXBu2}^nyJG(b>KI}h2b}&WxTRwIkp*f^RC;Pgi5#3 zV>vwnOpUG+EaA9Vvku0IKhQ}I8ya>P(vKtCwS4bw3dN0_qEUC{^^?CQFoV8EV83it z+jgZZhggj$np<#L&Np9-ZoIn#81ZA_Lq3$S@y2_IrQANCU%t(I5M3ER{nnrYk1r4E zjw>=d8=a`PWOwu8TIP2fZ=`%1#UN$#nM7qG(RO^tXJ?l1xyn}r1bfrU3@dHT;6Z%g2KbmxTguyn*i<`|Iu@eV@~e^F6#A>7fQ~g4mG`BMCMRZ|LkM z$;eebahJ#(nuC6MCYt~vEXfxDL+F{ZOit>{5!?;^N{Gs?;MIzt<&rM3s)*$l*)k_w z#TgP{?&Q$Kf?*&~1Ivuk(nNwGx3rR;PBaadMN>a;u0$MS2q<_XmJ`d^e+CVfdDYZ^ zXRN)QE=2J)B!x%l+nd6#?ao41jf>BUvU^j>=k}Rje_K^m@FZBD=T3#(l6@*2u%Kt` z_>d*%e!@08XTKR(5eH%9UPwU(XPo&5GfVYMr3F;XkTCd1<5((kSEv9L@1DsxI z|7;?2qT6cu*yfHk96*WAzRu$=jB+w1*&nhyfbhqIL}CvpA7^qcaLvrQa?ym9I{(ZZ zafxK$h^AZlvE7CK2xkQ9^dw1#)yRBz%l}y%?=Fhw)+`;g-JA~h_V-&r3`@b_Iq8h9 zE=g1W6Pflt<$17)P!L)b+R1N{!NI@~ibiSoHajvf{5DPa#Ux&MX3l@2aQH}-z>r-; zahHt>UVuesrcK3(k&K!9S@OAw2y^q?4Bqn@e=++s@YJqem*@VvEUnT2LZ`P>qkjO? z>Lm#W+|L`j70d|>I#y4L6s6;u6GAd|E2}Q$9`o`+9+|0aN*s*++Nv==tlwu`(NyV8 zvRV~S9o)H?$(^GHqkvBs`w{=u6h6eaA>Q7{d)!Y!X; zm^^4AWL|iq!14b42Hi>BXoBjfv+(lEGU4isOUP1WRA!1~SO_{@N%Kd*ZRVQLU3rl; zzs<2ieM3}MZ3VtfMU>unMweNYYTi;ZZ-@4hXHWM$M52UOV`8P n0?5Q6BkJ5 zju=wBF#GWf^7lOb`y#~{Uq<*fw2I%B`!G<8*mU?HBh4eL+zH4njWJ~WU5TwRy`MvV zy$3z(HuL#pspR$SKME8P$PQXf=!qMVGxSMLGYDdi7U&tSfm{hTmakRHW}sr2!S8Db zCzhv7<=EEO4M3b4-^O*Mt*oAy?34u*XP=z`w*gTWRSf$UxUFsO3k8AM6gG^fwvGO( zWPlQR_Ko3fz`et@pYyYvOrBHMv03?{1JUK1h%fff)Q6N=@rJaoH7ms$A2v>46Z+Vm z>}+Vun#|utX$&W^ka$c5uEK1Q#lgrcf(CgrYywB|?01+59^VVJpv@n6{FIgcR1C=fB$f-16;jlv6>GaFJPD<9-bOZ7WNXNM_ zou)uSPdek_brr~n8HeJQz*3z-77UcLO_mlUu2#tyE7J-I_}UB2+ZMdP`IEeMGCaY~ zX6LoP@V3!;rOE3cU0l_HDc=)26TQZZDP&PlRh<*TW@loWgm(HPYsEXm!otMwy@5}7 zGelH(M$lT0AODb;-7+bg$vQbT)OkSooih{4c=2lJYZ|~G57lY$fFm1NWCBv1R^u;$Cb7DF_i5{vbF; zv!vh9;i!7Ak7#dk`*926Q0`vH)JOHG2(NRYodd&6Og{ZWZxeO8Q2yG4=al zDcym8ob#fnOU1hEneWHoP?%4HH(V;#l!Iq?_Lk0uYSZb`BLE<+L%!4km`0U3=@0ca zT=!HymoSQbiJo3Zy6>AT%r(3yLS+veQSgIV=GixR2;bAN5|Hrcr1I^0&jvY3E$Lig zp`)FY@uVNDAQ^thr2`!YeJq=Z)=$EuaqvorRauQ^ND{eVa`#P>Fye*wIC8=x`)9&9 z4nnwgn$@_|R9VWCO>SiqNwoxQwyV~focKcBn8@a*nda7xuay=3neJtVYC#=aYiL=U z#RcWqj%!(#g%WL_4nIP{Y9P_1n*lOXK{jT+@pAZQ30p#5z~4eYRJd!WX%i?)aaj=v zx_8hTA2q_(seNsJQIMRttz_M{WDOl;Js)u2wqb;}3J-2- z;-2%h*~r#YP&Hx7n;Q}s5gt$=_f~eShFBQ|u#g9@}DvM;>JHjjj zZL!iZ0s(#*JuEyd-P|NEOmKu4I*cg>{#w(FhwsmnK^2>l2fwW#$;az0E6O$2`T(t} zg!zFt>JH|&X&#}ENq#uEs>j>BABqt~`6R_jQ#5whE^O+}Ef1B`fnPP&g?zSqpps=c z$CETa16;N7`}~VKrWx0gIfQ>N>2KWY(N0p6hP}&8 zZoz0X>D``1Cx~8!exAgfU8Q6F*hh$O{eVm7Z9|}5@xZ0vgXrM?>sDWDFdj)Lz8E%h zrKa3xTr!++Okdxjr&B|UOzb1{9+p(P#=4l*uq{TwEl=BmgNXMK4ly&#FtcB%dTzy1 zt+V;6sLZ~wFELrSw8z8Ap9a$`Jwnc%#JUf;^{8rln;>Ooy^28V&;&R7aHOT2A2)ti zJX%Y{6QWlUTQS0z zjeL`YxzvgrN?0aKbl}gF@-yU4f``RsQM6!d&dvI`Q+%w}*n(=_!oEUoK-z~1UJxir zw0>k;9-{oAE=hH9u4Rzl}t+Fnnv(-5m|xt}mRfvP=mK+#Q++A;-g#Oj70R1V0M zdr^aO=YN*)Y+)xGz9`;jVSeAI94bS?MZZ;dD9LVX#9zhAQ@5_o+>;^l9!v|9<_o@Qco%3jO8x=S%)aNIwd3)~ds~o$8qD!6@G5bU3S}E4 zR-?z0*36QlwGH@L&#gOZAVZ1oL1+0Bf&s>9kwU1otBK1qKhacs@IFt3TLp|p=`-vk)Us(;L| zWd@EXo!Kq@(fNHT)eY8f1=i?TSd^%WJsEDo zByK)NlL^44JC`;e^UhUl`rmc4pBiiNc{x0NTjy7M(&6yANAY$Aa=wsJMk(;Ty^wZu z=IPLUX+mx&c}&p7LqB(ueBOp95o4oyxO_PRl;5E9IL$AlY9WVD<)?0*eG{~c87$~f@tHcV*5p(a3wziol69Ln_ zbIcKARRv4guMi8$y+aZ_XAutR&pYwg(9Ss&cXzrvYbDHwiSw>~+5-{ifPOmNI?;06 zBX^Od$o(kQ3iB3WCIm~#R#9P$+n(;7B0RRJuZ7akh3pY;Ru4;;abMc>9;<43A@y39 z+a>wKGO|InG3(8-FgG1+YEO*~*d}YewIY33A!p z#Ke+CWBg^}_o2^nW+ii&D%7njKp~UE*F4~;s*A$oz^DsfK>nNNuNq1ld)4xANqzVm zz1Gif!Y{|{&0cvfcg78Nm7cWyGVSF%7-Gy%s|=gH0pcSY7jK5~k)suYAaZt^%DiMH z>OEyK(?vxyNi@PUoZN%_9Hj#WB>R&_ z(xpe=L}~qkYZq4CO?0tL^U@r@yrExre&Br9$A-$Vr`wjL#8gX)zlwgK@*;)#z-mqN zEQ@K~G_t(VgC8rq!=6>$Y#DW_50un;8&H{sgx01$-+cDoW7ZgZ%p%D3abe+hlt|iG z;*Qc>+2430R!2WiU5>>y7Lk>Vq0x*1%!>OASt&x0h?S zXs6xLkI{1*JFwYuY$|bMsykFh{er#0}u8ZxM?JZXlwfiBoXM;^wM9%gTU$esg;?YYE{|?0Pdy$m48&9 z%pZ_Xcs!eqkC2Vu1TJ*&B}iY^?RlzROV-7smpGDIGS;eSBWIg{cCFR9hv{FnTdo?L z+T-(+jl8+je7`*sqik3#Ei2s~yY+7%AB0+XQ4~vQ?d<^A^0kJIV~4C7Y)erd?hUy} z@dqj!E97&BOur0+qiJqyX)+9lgxKkjzBsKq^*6(_7nm6Y!Etz2EykqyCLFq`Z+{sPcHXAg? zeJfNhNLI2VVsCe7RLI(leL0Ozdnl0Eu9+_XkjqU*4@0EPEo2;#&XP~?LOKR{$_^B4 z6F~=~%q;qZ@qMYpv@%@Hj;C)n6wg*x9KxTCTP3Wv44{E`)6Uu**WN_+p&CiH+?qIF zo{Z>h8DpnOLAgtc2cr*Oq zgbw5A#T;LagL`eG72F)|6`Ln57SJn%B|NiJc#^I=% z`b5okY+^RVf+GTim0k*^6f1N5o)^N~_i87kX1$QWxT0EPUm*MB4yhld0%s{4vCA_R zSq0xeco2Q3Z&};{!_6>TMvr*ls{GBiVem`xzTcuCY`#vG361NHF=MH>s=RWxZT%X0 z1HDo=@nWV}>411PJoc2yu@H{ZZSf`-bIbH_VTXKBqYy#K&%pE#{k}q)I_C5a{L9cz z=kc8{bIKv1Xv4HugaGr9!U!?vr=q}xU;9+$ZOI$&foosb)+`mU z5%)ZSp`bfW$j?deoF6-%uMKWXaV_tlva>%S7038{r3PTy;zO*k8EzngkokQeUGAXL zknL~>xvCf`@m|NO!ZC&fd#;cxO%7azBxG=e{hoKVEmw74g;2MZ@uYz=FyJMN(B;|B ztz<)9=`cERc0|72g}ksJGsJIW@6i0U(r5-qEHaug;>(OF zs4|4l)G(~SZ+Rw=>kKDqExxz<*E2+d?#z)&5o(OB=TosabEGOs)@?63FVj{Tpvb28 zY36P*J<_G-%m~a~lekTpwm)y^LqJNx_Kyuv;QH?_`HG0>Y>1_*8iW9dl}s9riYj8c z^Si8$EH?uY$a-=6`efeN(N)Q@@bO*l>j+`(8M{h==Fj;$T9(6ITEpsTyW`DrD1SmO zMJ5%QOl(LTAUsT{BKE~Z(*kVxm;y;|v^neM+#-_i$GTz2lHpQ0-siA?w(m(1?(kr= z5@(!SYH$ zj5GQEv`RUKkB_OeqIa4@qqBU%4@woy1^d#PFp63U@fTy!o&LscP++>rMyjAQ-fX8t z83$f|+lmnn{mDz%C)N^MY1Ow=wSS@+uYb#3+-dMt zG9_5%9iY;FMm)f!VNn;6em_5_?A6;kXJYytoS=X*`FN+%zJp7~O-!_TqmWoklGd~% zejg~u;_Wt7I`1ZuVjj79wPFE1Yv0wCY?^Z|o#~|+w_5E4A9Mm#b5zZ{x%7hgtr__J z>V3wdNt9=U!h+dwb;PJ`!avC<*Nb}cpvgRv~zkqDT#lPOJ*Q0gG- zCAJslE0JquW)52f7v!K0AGva&EbgV&bKv+wrSpl-UZL_TMb&+_mwsmVmOS*RmAc_` ztlkQ=^N`~;@6v}VHRigTj6-Lg!9w8PdG`9v%1uu;c}!t*pekThV?Zly%Kxc00gYaq~B`)fo@(;yT;$S~Qz*tGi?v zV0J4a!y|XV_3?uUSTP zUd9hhdA@(mje*-N_0o@G+Z>1lrmSM?d%UG6S}Ijt?tzYb6|emzFg5d3?r?BYv{h&6 z1E>};0LFEwN4vQ5JKWd4xW%-r>LZ3^ycqA4kIfDsIUdpl%YcjF?2rn+oP?LclR9wT zt3tiqPLYUyIhQh;UXBUx$GnT3V)1wXG$ z{2ued&T2Zoht}*ZzC`?-vV&-pHWb@0l!cZ%?4zJbb5C8JvT!P6fmsdym0tEyNe?3l z@-L_h`e*0L2S(vDg4Lx6?GoR5WW5NVPV1bx-sWi1*vVsnzwc(S6SByf7dIog1w@9& zuS4eLtc08g(d$)72mH;~9up>1tkcZy3ji&*k$AP@E)B$hatKxHIG% z^G!+)4t;`1pKLdRP_^wqUxQPw3g;i^?u};cFHWJ z01U$os}%6%jMzxvEZD z?H8?;gzl<3okWX%(gz7eQ0;`QdM6Ex_) zmB^&^V`OAT}e9+iMG@Sf9fLDPow{X}^bp&r*SyArQxJssVj z8(mryk8~UL!4=q^Nej0%igD=-wXd|4)#X*qd4c+4w(^ho6Xxklwqm9wXq z%5THxKSRT}N{AmC;1YhsPa4h3E0~dKcMs@U^f_tT=ha@ZkRDL=fKO&+ue45H7OpzB zBXfaT)Pd1xFvy;{(k$)Xt1^8aAC_vg>$=*fAVwK?@T=3LYTX5_Jxy(FG~ZaI_AlxC z&gfd=~+ok`>7Jg^+JCE^1`#SHz zXzU-B`yU$mHv#?smWKZ4O8+{OpuJ;%v(BQk&e{vR&#m&L?Y7nQpe(*f)o2H-|FGQ~ z1OHsTPPoe|I3lO1Y#)sCPfJUE;eU;8^$kWHEv=q|rAGAb=k|3i-j|1JrrtV`2DaZB zoBtjX1-~zJQ$UW3sap;i9kQt_OIi#(bzg9*bpF4k@!v#dtr=HrNW9a&w?g2hl>3S_ zj6oj%Ly-S{viWDL*fPGAzS3YX@4}q2?lK>P!wtHB?%7WIpT~61aQa8Z@c)RR|GzX1 zI_*}04dTw8m)&(Gtb=$|8U!&vSWE7K&UC&7ufIpQw0wsdq8;W$DgTS-ccPpS)JFEs z9Ivmt6FxT7F9FzmFrb>da}v5aiF23D=7b}{Tc6(h@r@;+HJz3yt_Ld9CTWHl7f%1( zgOwzKqGjm;+5JO$Oqpo@U$#8$9vfh zqz9${47mJS5o##zjCIj(=3aQ)wPn&jVjK4 zzfSDSg`30&Doz>%<+${dP{k03k(XN~+pCq>*;$0+XJOBp=YNsjquG8Bjs#z$Q$cIj zX#Cg``W?e3KyM;^%|lWIP*>yoX|*H6TDg1l)yc@yC*p#s{ZUOhu!TQ*ij6@4+T7^J z0rQhXcCQ%qjR;cW>hjbAeCT8w|8kHm*AW$et#HN1q_R~B?fw&ywac!tkL_G>PFccJ z+kNaF0W~aQeuwmdy8n&%d3Prr9p!Lnfmv=rW=lSd4@rT$lQU)dE`)2w}f z8wu_*!3pl}65QQ2xH}9E!QDb|7zj>~!QI{6-JRfW@8o`-bAH3SKlEO^XYE=o)4i+u zx~fX`(NWJ8!GKP2P|}@jPErb1a!t$G6RiA&%JGIe?y?^z8~AYDI!U>MUFd&R(y>JR{HS) z2zp|)#Z(?9jT~thJJb(Nkkg&ER|QYXH;0TX#`3(nZrOGsy1C_xLPUC!{>AIX)Hz?g z|AYDWOxTDti>erMW5RtlYzjyjQy-}NZc@em3-cdjTs=(o$W3nAV;5o9j55M^s`_11 z{0sl?c8HqHC(Ij;W|tsaI8IPhjqwgXSpG%&+Xt^d)moi~wEcA9%8|CT{muSp%^pW5 zDmt6))%J7Yy7+_vD+#UWa)Z-yv`AMD)NkHG} zB+pdlpG@-75;b@pCEa;*+|IRNrpdT&`mzrDckM64a*$JDAF$q04P_3v4aFM;NWTyc zf5v!F4^#NunLY1xsPNR*q)`TKxRx^6tyc*%c(K>z5NoQ{D3di-Hn?z&H(*@&^#jG_ zn{AAx?O~kTpP6*LR`=q`K>0&~O~4dS)xuy+^X`q?$u+s4&*ZMC>mrYht^q?P1lCkI zm5<->Tk^XQ$^-?(#bq1jx@z4Kx{6knU?sKk`>=D*dF7s1mG5t)93C%Kvm5YvwDcdW5`#zQ!PhI;<7^6?l0Uw%iRO*(N zE)vcwb1S4GD`UV&++8XVz>wKbkLmR;{Rz$vyYS$87@2cZK%;CH-zEQ;y&-Vzr@l}I z26!P+gt`&hv&#ErkH6hBR@G&la6lCvVG`HvpDCctWA|EgH{9VU|4@ca1M% zn)q(JT=wv;)sF`DiMssx$Z^X05tGgdW1 z2nSt(SWo(nBc^op%Os#~TMUcCs%ljQCAU8$^`OLQh11e)Ni)7l8?e15Cin#~C*%^> zxgj8w-l&vp3Ly&ZxYg)}ucRzry*`{T6S~#ETC1km^a+xpec*2YT(9i#$mob48M6~U zS&4Hekase8R!ej+xky(p^0c_V-@$INmod*V!q`@b{cfl6kHLh+=)S1K=CJYXH0GaU zT2OLNlc=PXFigF|2gIbIz9r2E^<^%%RlYG;QnC$Aig?d*)fK>Ukfr->yoM*h?Ktk$ z@aO*Adj?G8OqyJExOF%wZKVfOuBm3)PSROEYc5XuTCnAWrg>hfl~QuCMF&3L6tNwf z!C_Ij%$=$mrBUuTh3>iV%-)UK*KZMJ4Byk^oHVMEd^L0v>P@v7rMevKUA99V+OFNV z@dW)omhtuK7xfNHyz`C*Xnj*tpCIS1sQ=L*7}@sO>WdWQpCcY-v3rm`9HvI_s`5g# zlGXnk`*=|ify^JEL+EP`pw5#mbvWmzxj_g%^u*FyxNTk=+Bb(;22zs9@ta+z{{dI+ zO0p(1E}Ro;iE6a2B^70CrO#d}XjukUw7(DTS(OwObr+Fj3R#!F_^=LBgu2MJuYhbs z5AH2|)KOxEgU^mqD-EDCvJ-Ix8fjA{wMaM;A(;njSyPAoaZ|FvmU+(){rQErordE# z{78?Z&xC&Oe%$)-OPdn5g03F)27@m*3Mi}R3vAHE9>zZ$G44+G3R`M|Y%^O}sO4Kz z-ZEhTQl_+l?1pA?>iK+Vzx%Sz`hObwOaUNHR3=N)1`5#)szz!u=0$k^9`oDPyeRQk z*~{ev+#D-a+zU>YkP~nCG75bu7>U5yW3K+xnE`K`vaz2K-=T+Q9axrM8+m-m8kgV{?vY8A+U-n_!mN@}3Y+ek>&py1T=j zD^qtB>hzZ{Cyun?TYeCQ>R13l(xwL9oXNZrXKteho|VtYH7ljlVD=hF?i`c(33c2x zcVZD7Gxe%BaXMSItZilMuth4^G#+Mqq16u{}VxLiIjy9mUbzqu#3> zW`tL&&`|QjfuAhAaryo=yQb`XQFqbPtcH6~bfMjD;f$G7^gONwj=%o-+UB#PW!a)~ zm$`kQ3%j0T@r`%H0%C23TA+1|ux_3aSDAss4SICwIkAj@PeI6>lyF)Z-Lf-R_Tog! zan6lbq~wB+g$wCo6vblSBd7E29TTOILhS*5`bGB0ph{&5b?81JZ|eAjJeCZ1jkbG9 zn)cmiJ;Kb%w)S*8nK^%4jWtE)14$c73Fjv}!4#$MKqAd{0k`+Lv zHF@yYcU8>!2RUhFHa{+lYT@xa9|JR!iA1xoQ2cq2vg}CuMbbdAR^6u7XB`z@J0X=J zowsK&orAvgVW_#ayn^Z|UUIEed)OO+0#qyk+MVmBn~H6jDa8wriT&QPTFLQFeYk$l z#G#l|8K5=d8_xhN<_p+Fw((5Y!j+oy&tDkpp`dN^DnhcgMwXbZctB*3zW}a%iqhZfN4_DKjoDM##tAtguSOVt9p7ez1ul=;ukbjuzb$&`_dx}hcK*C;ai zWgex^0HDgKxW3ltWAgEK6)-ZX(GeH)EYqAE^b`6oO#AXR)szuJYp{op8lHtCs@IQ} z-o43w5?}r-)0qmvehN0nO^)MyE1LkHG|bYMfDEzqGH8vu)1X?O!h~tLog)@z700*P z7i|pZXBW+D%(;8QiT=jpi~`v^K4uHHTOjX20W??BzH^cJk(!M~YyjYb)8Jl=h?To$ z*(SBK89*&$i%=N&Sj`KE|zv%tlOZlaAGd4kvpd6X) zBrskwfUY(j14u*CU>e3yFn4(8riiqpDa$K7$?GEMzFkkDtCYjy zDW#dItZaXwP+qeI4{QFF!iw}>m&s=We~1ZeR$&AnDcx*5*j3Jt>Z+Oo3yM_VLV-d@gAj6(9x$IZLi_U+Si{z*XmIP+bLpeCI#?^a}rC0G+31+lc+q1^)e4=a5d10UQ-B+yP>#%97 z4r_ez*bT+wyME32==*)jz0CiJVz^K#?fK69`sB*}V{XxOp_*IU_npfUw|$}uG!RY!?@SVr}SJ-T}gb?m!ZnYK=SvXqi_@z4cggQV->#b$aK97)!+>D}THnJCTXaeQhV6!RGPg zAD!UiyfB4?K;ZxEY3!Zg?b^^|oKL2U+FDEFG2?$mL02a z2kp~i2rQnwxHoT0!g^pMkIp~bQV%bRAO5iguiIt5ZIuhBh#dZd5(R^>mHFGQIw~Ey zbF|l^8f@0pv{S$De9o*OX_^kOr6Y%sUbhrM z#f}U8Kg-4{GH`2Oi6-Mj1I~ty?@Y`y@g}vFSvprDUQv;l(g@QkAGTHpVfMi~7xw5@ zCh?IM{IxhwImcDnWAbN=>r2-v>{0r}b#q*%8fhYG@rz}QRU971vnfhbTK-dF0Ub!3oa-I(=! z*jXjbYazD`I+E(Ec6}3i=vDwa@Xqj_ETwdnn_T4jQk3d`F(>tJ<}f4i>$APVpkB;6PiY1;h3q>W^I z`66065@DM{aQQe!|9CaPmGv`2z7vCh1a{5t=W9)NX|nWV6P9-|5p|zfC$^OXwx(p% ztxzk$%Z=^TTnlPe_2ZP*Y?vj*YIO7*f%;qq*Bmz=fO@U)~aO`O=vhQV^|_)|7d8N0D{BGjxX z%*!Y~M<`s|7lW)y>Zzej2X?w@8w-6xA#b@r$;vbWs;P)c^W9|&Gm&K;3?mOp zh0ng-ws}Q}r`*rY^Fas3qYaoMvC=vK8s^gG->vbhtW5+=Hu%DT`S|g4LS4H_yR0YK zyGIfx`zz%hqiCeD0OAQ)5;9v_vl*;RmJn z`}tc9ZRh27UypMdNG;eu$>7THY3I#3t+i9)R=}%rUYOTPanROgG{U>m7Hn_dkw5qL1i5K;h{EX*%M0@O2 z96rAvD)mMHcyWPy0mUE36ft;v?w!a~xqY4IJC0vK3?VK@u#hPBr=_J8}i{fj?wnACiLGgqpv=c?|`7Q4~FwaBA+hav*0C{l!NoVEKZ-6w zU$d`Upkrz9vb|va8-1}>HC(&Sfxp}*k^8_T9a;MW&2B$0nn^=auvG7;t4Yu8VfhYlssK+?!*^(Vd3X~(x02V z17m!ji~NoI0}Q!L#db-NO)e9RzA>82rA=?O??Nk#VbF#&sTi#Xp=ok{JMS;UFK$}! z%msIVL}nw$$|cXDZjB+0n07*uw_bYUrzFsG%TJbSQ4$tSUcyQEaTPh1TG*14(SUR+9r4 z4M!bQ(Vh%hOI5U{*3{QFp(tje09S|C{X{lz11b@>e9xjOAi;ndM{II4hP$u>Q!t^hw`Z76KJ&bGtRy}G4C3unW@bPP#>{{ zr`g%fm|T;{F;Io*1tqhH)cO?G4K{dbNtwkFb7u0kN9&1<>dS?=fzjjI=xGf-8E24~ zMz4jujvt`nSD?N4ido`<#gF_dF?|oz2Ce&^N}
+
+ ADMX_Power/ACConnectivityInStandby_2 +
+
+ ADMX_Power/ACCriticalSleepTransitionsDisable_2 +
+
+ ADMX_Power/ACStartMenuButtonAction_2 +
+
+ ADMX_Power/AllowSystemPowerRequestAC +
+
+ ADMX_Power/AllowSystemPowerRequestDC +
+
+ ADMX_Power/AllowSystemSleepWithRemoteFilesOpenAC +
+
+ ADMX_Power/AllowSystemSleepWithRemoteFilesOpenDC +
+
+ ADMX_Power/CustomActiveSchemeOverride_2 +
+
+ ADMX_Power/DCBatteryDischargeAction0_2 +
+
+ ADMX_Power/DCBatteryDischargeAction1_2 +
+
+ ADMX_Power/DCBatteryDischargeLevel0_2 +
+
+ ADMX_Power/DCBatteryDischargeLevel1UINotification_2 +
+
+ ADMX_Power/DCBatteryDischargeLevel1_2 +
+
+ ADMX_Power/DCConnectivityInStandby_2 +
+
+ ADMX_Power/DCCriticalSleepTransitionsDisable_2 +
+
+ ADMX_Power/DCStartMenuButtonAction_2 +
+
+ ADMX_Power/DiskACPowerDownTimeOut_2 +
+
+ ADMX_Power/DiskDCPowerDownTimeOut_2 +
+
+ ADMX_Power/Dont_PowerOff_AfterShutdown +
+
+ ADMX_Power/EnableDesktopSlideShowAC +
+
+ ADMX_Power/EnableDesktopSlideShowDC +
+
+ ADMX_Power/InboxActiveSchemeOverride_2 +
+
+ ADMX_Power/PW_PromptPasswordOnResume +
+
+ ADMX_Power/PowerThrottlingTurnOff +
+
+ ADMX_Power/ReserveBatteryNotificationLevel +
+
+ ### ADMX_PowerShellExecutionPolicy policies
From de10c523a1e9faacda55dc9a381519dc60c00534 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Tue, 29 Dec 2020 12:09:25 -0800 Subject: [PATCH 42/47] Updated the availability verbiage --- .../mdm/policy-csp-admx-addremoveprograms.md | 22 +- .../mdm/policy-csp-admx-appcompat.md | 18 +- .../mdm/policy-csp-admx-auditsettings.md | 2 +- .../mdm/policy-csp-admx-ciphersuiteorder.md | 4 +- .../mdm/policy-csp-admx-com.md | 4 +- .../mdm/policy-csp-admx-cpls.md | 2 +- .../mdm/policy-csp-admx-ctrlaltdel.md | 8 +- .../mdm/policy-csp-admx-digitallocker.md | 4 +- .../mdm/policy-csp-admx-dnsclient.md | 44 ++-- .../mdm/policy-csp-admx-dwm.md | 12 +- .../mdm/policy-csp-admx-encryptfilesonmove.md | 2 +- .../mdm/policy-csp-admx-eventforwarding.md | 4 +- .../policy-csp-admx-fileservervssprovider.md | 2 +- .../mdm/policy-csp-admx-filesys.md | 16 +- .../mdm/policy-csp-admx-folderredirection.md | 14 +- .../mdm/policy-csp-admx-help.md | 8 +- .../mdm/policy-csp-admx-helpandsupport.md | 8 +- .../mdm/policy-csp-admx-kdc.md | 12 +- .../mdm/policy-csp-admx-lanmanserver.md | 8 +- ...icy-csp-admx-linklayertopologydiscovery.md | 4 +- .../mdm/policy-csp-admx-mmc.md | 10 +- .../mdm/policy-csp-admx-mmcsnapins.md | 210 +++++++++--------- .../mdm/policy-csp-admx-msapolicy.md | 2 +- .../mdm/policy-csp-admx-nca.md | 16 +- .../mdm/policy-csp-admx-ncsi.md | 14 +- .../mdm/policy-csp-admx-netlogon.md | 70 +++--- .../mdm/policy-csp-admx-offlinefiles.md | 94 ++++---- 27 files changed, 307 insertions(+), 307 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-admx-addremoveprograms.md b/windows/client-management/mdm/policy-csp-admx-addremoveprograms.md index 36128621e3..650e2497ae 100644 --- a/windows/client-management/mdm/policy-csp-admx-addremoveprograms.md +++ b/windows/client-management/mdm/policy-csp-admx-addremoveprograms.md @@ -106,7 +106,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. The policy setting specifies the category of programs that appears when users open the "Add New Programs" page. If you enable this setting, only the programs in the category you specify are displayed when the "Add New Programs" page opens. You can use the Category box on the "Add New Programs" page to display programs in other categories. +Available in the latest Windows 10 Insider Preview Build. The policy setting specifies the category of programs that appears when users open the "Add New Programs" page. If you enable this setting, only the programs in the category you specify are displayed when the "Add New Programs" page opens. You can use the Category box on the "Add New Programs" page to display programs in other categories. To use this setting, type the name of a category in the Category box for this setting. You must enter a category that is already defined in Add or Remove Programs. To define a category, use Software Installation. @@ -189,7 +189,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting removes the "Add a program from CD-ROM or floppy disk" section from the Add New Programs page. This prevents users from using Add or Remove Programs to install programs from removable media. +Available in the latest Windows 10 Insider Preview Build. This policy setting removes the "Add a program from CD-ROM or floppy disk" section from the Add New Programs page. This prevents users from using Add or Remove Programs to install programs from removable media. If you disable this setting or do not configure it, the "Add a program from CD-ROM or floppy disk" option is available to all users. This setting does not prevent users from using other tools and methods to add or remove program components. @@ -270,7 +270,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting removes the "Add programs from Microsoft" section from the Add New Programs page. This setting prevents users from using Add or Remove Programs to connect to Windows Update. +Available in the latest Windows 10 Insider Preview Build. This policy setting removes the "Add programs from Microsoft" section from the Add New Programs page. This setting prevents users from using Add or Remove Programs to connect to Windows Update. If you disable this setting or do not configure it, "Add programs from Microsoft" is available to all users. This setting does not prevent users from using other tools and methods to connect to Windows Update. @@ -351,7 +351,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting prevents users from viewing or installing published programs. This setting removes the "Add programs from your network" section from the Add New Programs page. The "Add programs from your network" section lists published programs and provides an easy way to install them. Published programs are those programs that the system administrator has explicitly made available to the user with a tool such as Windows Installer. Typically, system administrators publish programs to notify users that the programs are available, to recommend their use, or to enable users to install them without having to search for installation files. +Available in the latest Windows 10 Insider Preview Build. This policy setting prevents users from viewing or installing published programs. This setting removes the "Add programs from your network" section from the Add New Programs page. The "Add programs from your network" section lists published programs and provides an easy way to install them. Published programs are those programs that the system administrator has explicitly made available to the user with a tool such as Windows Installer. Typically, system administrators publish programs to notify users that the programs are available, to recommend their use, or to enable users to install them without having to search for installation files. If you enable this setting, users cannot tell which programs have been published by the system administrator, and they cannot use Add or Remove Programs to install published programs. However, they can still install programs by using other methods, and they can view and install assigned (partially installed) programs that are offered on the desktop or on the Start menu. @@ -433,7 +433,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting removes the Add New Programs button from the Add or Remove Programs bar. As a result, users cannot view or change the attached page. The Add New Programs button lets users install programs published or assigned by a system administrator. +Available in the latest Windows 10 Insider Preview Build. This policy setting removes the Add New Programs button from the Add or Remove Programs bar. As a result, users cannot view or change the attached page. The Add New Programs button lets users install programs published or assigned by a system administrator. If you disable this setting or do not configure it, the Add New Programs button is available to all users. This setting does not prevent users from using other tools and methods to install programs. @@ -511,7 +511,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting prevents users from using Add or Remove Programs. This setting removes Add or Remove Programs from Control Panel and removes the Add or Remove Programs item from menus. Add or Remove Programs lets users install, uninstall, repair, add, and remove features and components of Windows 2000 Professional and a wide variety of Windows programs. Programs published or assigned to the user appear in Add or Remove Programs. +Available in the latest Windows 10 Insider Preview Build. This policy setting prevents users from using Add or Remove Programs. This setting removes Add or Remove Programs from Control Panel and removes the Add or Remove Programs item from menus. Add or Remove Programs lets users install, uninstall, repair, add, and remove features and components of Windows 2000 Professional and a wide variety of Windows programs. Programs published or assigned to the user appear in Add or Remove Programs. If you disable this setting or do not configure it, Add or Remove Programs is available to all users. When enabled, this setting takes precedence over the other settings in this folder. This setting does not prevent users from using other tools and methods to install or uninstall programs. @@ -589,7 +589,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting removes the Set Program Access and Defaults button from the Add or Remove Programs bar. As a result, users cannot view or change the associated page. The Set Program Access and Defaults button lets administrators specify default programs for certain activities, such as Web browsing or sending e-mail, as well as which programs are accessible from the Start menu, desktop, and other locations. +Available in the latest Windows 10 Insider Preview Build. This policy setting removes the Set Program Access and Defaults button from the Add or Remove Programs bar. As a result, users cannot view or change the associated page. The Set Program Access and Defaults button lets administrators specify default programs for certain activities, such as Web browsing or sending e-mail, as well as which programs are accessible from the Start menu, desktop, and other locations. If you disable this setting or do not configure it, the Set Program Access and Defaults button is available to all users. This setting does not prevent users from using other tools and methods to change program access or defaults. This setting does not prevent the Set Program Access and Defaults icon from appearing on the Start menu. See the "Remove Set Program Access and Defaults from Start menu" setting. @@ -668,7 +668,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting removes the Change or Remove Programs button from the Add or Remove Programs bar. As a result, users cannot view or change the attached page. The Change or Remove Programs button lets users uninstall, repair, add, or remove features of installed programs. +Available in the latest Windows 10 Insider Preview Build. This policy setting removes the Change or Remove Programs button from the Add or Remove Programs bar. As a result, users cannot view or change the attached page. The Change or Remove Programs button lets users uninstall, repair, add, or remove features of installed programs. If you disable this setting or do not configure it, the Change or Remove Programs page is available to all users. This setting does not prevent users from using other tools and methods to delete or uninstall programs. @@ -746,7 +746,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting prevents users from using Add or Remove Programs to configure installed services. This setting removes the "Set up services" section of the Add/Remove Windows Components page. The "Set up services" section lists system services that have not been configured and offers users easy access to the configuration tools. +Available in the latest Windows 10 Insider Preview Build. This policy setting prevents users from using Add or Remove Programs to configure installed services. This setting removes the "Set up services" section of the Add/Remove Windows Components page. The "Set up services" section lists system services that have not been configured and offers users easy access to the configuration tools. If you disable this setting or do not configure it, "Set up services" appears only when there are unconfigured system services. If you enable this setting, "Set up services" never appears. This setting does not prevent users from using other methods to configure services. @@ -827,7 +827,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting removes links to the Support Info dialog box from programs on the Change or Remove Programs page. Programs listed on the Change or Remove Programs page can include a "Click here for support information" hyperlink. When clicked, the hyperlink opens a dialog box that displays troubleshooting information, including a link to the installation files and data that users need to obtain product support, such as the Product ID and version number of the program. The dialog box also includes a hyperlink to support information on the Internet, such as the Microsoft Product Support Services Web page. +Available in the latest Windows 10 Insider Preview Build. This policy setting removes links to the Support Info dialog box from programs on the Change or Remove Programs page. Programs listed on the Change or Remove Programs page can include a "Click here for support information" hyperlink. When clicked, the hyperlink opens a dialog box that displays troubleshooting information, including a link to the installation files and data that users need to obtain product support, such as the Product ID and version number of the program. The dialog box also includes a hyperlink to support information on the Internet, such as the Microsoft Product Support Services Web page. If you disable this setting or do not configure it, the Support Info hyperlink appears. @@ -908,7 +908,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting removes the Add/Remove Windows Components button from the Add or Remove Programs bar. As a result, users cannot view or change the associated page. The Add/Remove Windows Components button lets users configure installed services and use the Windows Component Wizard to add, remove, and configure components of Windows from the installation files. +Available in the latest Windows 10 Insider Preview Build. This policy setting removes the Add/Remove Windows Components button from the Add or Remove Programs bar. As a result, users cannot view or change the associated page. The Add/Remove Windows Components button lets users configure installed services and use the Windows Component Wizard to add, remove, and configure components of Windows from the installation files. If you disable this setting or do not configure it, the Add/Remove Windows Components button is available to all users. This setting does not prevent users from using other tools and methods to configure services or add or remove program components. However, this setting blocks user access to the Windows Component Wizard. diff --git a/windows/client-management/mdm/policy-csp-admx-appcompat.md b/windows/client-management/mdm/policy-csp-admx-appcompat.md index ef0f985661..a2a770794d 100644 --- a/windows/client-management/mdm/policy-csp-admx-appcompat.md +++ b/windows/client-management/mdm/policy-csp-admx-appcompat.md @@ -108,7 +108,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies whether to prevent the MS-DOS subsystem (**ntvdm.exe**) from running on this computer. This setting affects the launching of 16-bit applications in the operating system. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies whether to prevent the MS-DOS subsystem (**ntvdm.exe**) from running on this computer. This setting affects the launching of 16-bit applications in the operating system. You can use this setting to turn off the MS-DOS subsystem, which will reduce resource usage and prevent users from running 16-bit applications. To run any 16-bit application or any application with 16-bit components, **ntvdm.exe** must be allowed to run. The MS-DOS subsystem starts when the first 16-bit application is launched. While the MS-DOS subsystem is running, any subsequent 16-bit applications launch faster, but overall resource usage on the system is increased. @@ -185,7 +185,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting controls the visibility of the Program Compatibility property page shell extension. This shell extension is visible on the property context-menu of any program shortcut or executable file. +Available in the latest Windows 10 Insider Preview Build. This policy setting controls the visibility of the Program Compatibility property page shell extension. This shell extension is visible on the property context-menu of any program shortcut or executable file. The compatibility property page displays a list of options that can be selected and applied to the application to resolve the most common issues affecting legacy applications. @@ -256,7 +256,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. The policy setting controls the state of the Application Telemetry engine in the system. +Available in the latest Windows 10 Insider Preview Build. The policy setting controls the state of the Application Telemetry engine in the system. Application Telemetry is a mechanism that tracks anonymous usage of specific Windows system components by applications. @@ -331,7 +331,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. The policy setting controls the state of the Switchback compatibility engine in the system. +Available in the latest Windows 10 Insider Preview Build. The policy setting controls the state of the Switchback compatibility engine in the system. Switchback is a mechanism that provides generic compatibility mitigations to older applications by providing older behavior to old applications and new behavior to new applications. @@ -407,7 +407,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting controls the state of the application compatibility engine in the system. +Available in the latest Windows 10 Insider Preview Build. This policy setting controls the state of the application compatibility engine in the system. The engine is part of the loader and looks through a compatibility database every time an application is started on the system. If a match for the application is found it provides either run-time solutions or compatibility fixes, or displays an Application Help message if the application has a know problem. @@ -485,7 +485,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting exists only for backward compatibility, and is not valid for this version of Windows. To configure the Program Compatibility Assistant, use the 'Turn off Program Compatibility Assistant' setting under Computer Configuration\Administrative Templates\Windows Components\Application Compatibility. +Available in the latest Windows 10 Insider Preview Build. This policy setting exists only for backward compatibility, and is not valid for this version of Windows. To configure the Program Compatibility Assistant, use the 'Turn off Program Compatibility Assistant' setting under Computer Configuration\Administrative Templates\Windows Components\Application Compatibility. @@ -552,7 +552,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting controls the state of the Program Compatibility Assistant (PCA). The PCA monitors applications run by the user. When a potential compatibility issue with an application is detected, the PCA will prompt the user with recommended solutions. To configure the diagnostic settings for the PCA, go to System->Troubleshooting and Diagnostics->Application Compatibility Diagnostics. +Available in the latest Windows 10 Insider Preview Build. This policy setting controls the state of the Program Compatibility Assistant (PCA). The PCA monitors applications run by the user. When a potential compatibility issue with an application is detected, the PCA will prompt the user with recommended solutions. To configure the diagnostic settings for the PCA, go to System->Troubleshooting and Diagnostics->Application Compatibility Diagnostics. If you enable this policy setting, the PCA will be turned off. The user will not be presented with solutions to known compatibility issues when running applications. Turning off the PCA can be useful for system administrators who require better performance and are already aware of application compatibility issues. @@ -626,7 +626,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting controls the state of Steps Recorder. +Available in the latest Windows 10 Insider Preview Build. This policy setting controls the state of Steps Recorder. Steps Recorder keeps a record of steps taken by the user. The data generated by Steps Recorder can be used in feedback systems such as Windows Error Reporting to help developers understand and fix problems. The data includes user actions such as keyboard input and mouse input, user interface data, and screenshots. Steps Recorder includes an option to turn on and off data collection. @@ -699,7 +699,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting controls the state of the Inventory Collector. +Available in the latest Windows 10 Insider Preview Build. This policy setting controls the state of the Inventory Collector. The Inventory Collector inventories applications, files, devices, and drivers on the system and sends the information to Microsoft. This information is used to help diagnose compatibility problems. diff --git a/windows/client-management/mdm/policy-csp-admx-auditsettings.md b/windows/client-management/mdm/policy-csp-admx-auditsettings.md index 1aa77b30da..62b80d6108 100644 --- a/windows/client-management/mdm/policy-csp-admx-auditsettings.md +++ b/windows/client-management/mdm/policy-csp-admx-auditsettings.md @@ -74,7 +74,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting determines what information is logged in security audit events when a new process has been created. This setting only applies when the Audit Process Creation policy is enabled. +Available in the latest Windows 10 Insider Preview Build. This policy setting determines what information is logged in security audit events when a new process has been created. This setting only applies when the Audit Process Creation policy is enabled. If you enable this policy setting, the command line information for every process will be logged in plain text in the security event log as part of the Audit Process Creation event 4688, "a new process has been created," on the workstations and servers on which this policy setting is applied. diff --git a/windows/client-management/mdm/policy-csp-admx-ciphersuiteorder.md b/windows/client-management/mdm/policy-csp-admx-ciphersuiteorder.md index 649079a937..232b4fdce7 100644 --- a/windows/client-management/mdm/policy-csp-admx-ciphersuiteorder.md +++ b/windows/client-management/mdm/policy-csp-admx-ciphersuiteorder.md @@ -78,7 +78,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting determines the cipher suites used by the Secure Socket Layer (SSL). +Available in the latest Windows 10 Insider Preview Build. This policy setting determines the cipher suites used by the Secure Socket Layer (SSL). If you enable this policy setting, SSL cipher suites are prioritized in the order specified. @@ -151,7 +151,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting determines the priority order of ECC curves used with ECDHE cipher suites. +Available in the latest Windows 10 Insider Preview Build. This policy setting determines the priority order of ECC curves used with ECDHE cipher suites. If you enable this policy setting, ECC curves are prioritized in the order specified. Enter one curve name per line. diff --git a/windows/client-management/mdm/policy-csp-admx-com.md b/windows/client-management/mdm/policy-csp-admx-com.md index 1da39a32a3..152e8d9044 100644 --- a/windows/client-management/mdm/policy-csp-admx-com.md +++ b/windows/client-management/mdm/policy-csp-admx-com.md @@ -78,7 +78,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting directs the system to search Active Directory for missing Component Object Model (COM) components that a program requires. +Available in the latest Windows 10 Insider Preview Build. This policy setting directs the system to search Active Directory for missing Component Object Model (COM) components that a program requires. Many Windows programs, such as the MMC snap-ins, use the interfaces provided by the COM components. These programs cannot perform all their functions unless Windows has internally registered the required components. @@ -153,7 +153,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting directs the system to search Active Directory for missing Component Object Model (COM) components that a program requires. +Available in the latest Windows 10 Insider Preview Build. This policy setting directs the system to search Active Directory for missing Component Object Model (COM) components that a program requires. Many Windows programs, such as the MMC snap-ins, use the interfaces provided by the COM components. These programs cannot perform all their functions unless Windows has internally registered the required components. diff --git a/windows/client-management/mdm/policy-csp-admx-cpls.md b/windows/client-management/mdm/policy-csp-admx-cpls.md index 21bf8792f1..9517dbfe30 100644 --- a/windows/client-management/mdm/policy-csp-admx-cpls.md +++ b/windows/client-management/mdm/policy-csp-admx-cpls.md @@ -74,7 +74,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting allows an administrator to standardize the account pictures for all users on a system to the default account picture. One application for this policy setting is to standardize the account pictures to a company logo. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows an administrator to standardize the account pictures for all users on a system to the default account picture. One application for this policy setting is to standardize the account pictures to a company logo. > [!NOTE] > The default account picture is stored at %PROGRAMDATA%\Microsoft\User Account Pictures\user.jpg. The default guest picture is stored at %PROGRAMDATA%\Microsoft\User Account Pictures\guest.jpg. If the default pictures do not exist, an empty frame is displayed. diff --git a/windows/client-management/mdm/policy-csp-admx-ctrlaltdel.md b/windows/client-management/mdm/policy-csp-admx-ctrlaltdel.md index 9ecc74d2e9..c4ed633cb6 100644 --- a/windows/client-management/mdm/policy-csp-admx-ctrlaltdel.md +++ b/windows/client-management/mdm/policy-csp-admx-ctrlaltdel.md @@ -83,7 +83,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting prevents users from changing their Windows password on demand. +Available in the latest Windows 10 Insider Preview Build. This policy setting prevents users from changing their Windows password on demand. If you enable this policy setting, the 'Change Password' button on the Windows Security dialog box will not appear when you press Ctrl+Alt+Del. @@ -153,7 +153,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting prevents users from locking the system. +Available in the latest Windows 10 Insider Preview Build. This policy setting prevents users from locking the system. While locked, the desktop is hidden and the system cannot be used. Only the user who locked the system or the system administrator can unlock it. @@ -226,7 +226,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting prevents users from starting Task Manager. +Available in the latest Windows 10 Insider Preview Build. This policy setting prevents users from starting Task Manager. Task Manager (**taskmgr.exe**) lets users start and stop programs, monitor the performance of their computers, view and monitor all programs running on their computers, including system services, find the executable names of programs, and change the priority of the process in which programs run. @@ -297,7 +297,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting disables or removes all menu items and buttons that log the user off the system. +Available in the latest Windows 10 Insider Preview Build. This policy setting disables or removes all menu items and buttons that log the user off the system. If you enable this policy setting, users will not see the Log off menu item when they press Ctrl+Alt+Del. This will prevent them from logging off unless they restart or shutdown the computer, or clicking Log off from the Start menu. diff --git a/windows/client-management/mdm/policy-csp-admx-digitallocker.md b/windows/client-management/mdm/policy-csp-admx-digitallocker.md index 43d6152747..b2b311f5a1 100644 --- a/windows/client-management/mdm/policy-csp-admx-digitallocker.md +++ b/windows/client-management/mdm/policy-csp-admx-digitallocker.md @@ -77,7 +77,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies whether Digital Locker can run. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies whether Digital Locker can run. Digital Locker is a dedicated download manager associated with Windows Marketplace and a feature of Windows that can be used to manage and download products acquired and stored in the user's Windows Marketplace Digital Locker. @@ -148,7 +148,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies whether Digital Locker can run. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies whether Digital Locker can run. Digital Locker is a dedicated download manager associated with Windows Marketplace and a feature of Windows that can be used to manage and download products acquired and stored in the user's Windows Marketplace Digital Locker. diff --git a/windows/client-management/mdm/policy-csp-admx-dnsclient.md b/windows/client-management/mdm/policy-csp-admx-dnsclient.md index 79b48babf1..5176ac1024 100644 --- a/windows/client-management/mdm/policy-csp-admx-dnsclient.md +++ b/windows/client-management/mdm/policy-csp-admx-dnsclient.md @@ -137,7 +137,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies that NetBIOS over TCP/IP (NetBT) queries are issued for fully qualified domain names. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies that NetBIOS over TCP/IP (NetBT) queries are issued for fully qualified domain names. If you enable this policy setting, NetBT queries will be issued for multi-label and fully qualified domain names, such as "www.example.com" in addition to single-label names. @@ -205,7 +205,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies that computers may attach suffixes to an unqualified multi-label name before sending subsequent DNS queries if the original name query fails. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies that computers may attach suffixes to an unqualified multi-label name before sending subsequent DNS queries if the original name query fails. A name containing dots, but not dot-terminated, is called an unqualified multi-label name, for example "server.corp" is an unqualified multi-label name. The name "server.corp.contoso.com." is an example of a fully qualified name because it contains a terminating dot. @@ -282,7 +282,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies a connection-specific DNS suffix. This policy setting supersedes local connection-specific DNS suffixes, and those configured using DHCP. To use this policy setting, click Enabled, and then enter a string value representing the DNS suffix. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies a connection-specific DNS suffix. This policy setting supersedes local connection-specific DNS suffixes, and those configured using DHCP. To use this policy setting, click Enabled, and then enter a string value representing the DNS suffix. If you enable this policy setting, the DNS suffix that you enter will be applied to all network connections used by computers that receive this policy setting. @@ -351,7 +351,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies if the devolution level that DNS clients will use if they perform primary DNS suffix devolution during the name resolution process. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies if the devolution level that DNS clients will use if they perform primary DNS suffix devolution during the name resolution process. With devolution, a DNS client creates queries by appending a single-label, unqualified domain name with the parent suffix of the primary DNS suffix name, and the parent of that suffix, and so on, stopping if the name is successfully resolved or at a level determined by devolution settings. Devolution can be used when a user or application submits a query for a single-label domain name. @@ -438,7 +438,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies whether the DNS client should convert internationalized domain names (IDNs) to Punycode when the computer is on non-domain networks with no WINS servers configured. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies whether the DNS client should convert internationalized domain names (IDNs) to Punycode when the computer is on non-domain networks with no WINS servers configured. If this policy setting is enabled, IDNs are not converted to Punycode. @@ -507,7 +507,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies whether the DNS client should convert internationalized domain names (IDNs) to the Nameprep form, a canonical Unicode representation of the string. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies whether the DNS client should convert internationalized domain names (IDNs) to the Nameprep form, a canonical Unicode representation of the string. If this policy setting is enabled, IDNs are converted to the Nameprep form. @@ -576,7 +576,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting defines the DNS servers to which a computer sends queries when it attempts to resolve names. This policy setting supersedes the list of DNS servers configured locally and those configured using DHCP. +Available in the latest Windows 10 Insider Preview Build. This policy setting defines the DNS servers to which a computer sends queries when it attempts to resolve names. This policy setting supersedes the list of DNS servers configured locally and those configured using DHCP. To use this policy setting, click Enabled, and then enter a space-delimited list of IP addresses in the available field. To use this policy setting, you must enter at least one IP address. @@ -647,7 +647,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies that responses from link local name resolution protocols received over a network interface that is higher in the binding order are preferred over DNS responses from network interfaces lower in the binding order. Examples of link local name resolution protocols include link local multicast name resolution (LLMNR) and NetBIOS over TCP/IP (NetBT). +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies that responses from link local name resolution protocols received over a network interface that is higher in the binding order are preferred over DNS responses from network interfaces lower in the binding order. Examples of link local name resolution protocols include link local multicast name resolution (LLMNR) and NetBIOS over TCP/IP (NetBT). If you enable this policy setting, responses from link local protocols will be preferred over DNS responses if the local responses are from a network with a higher binding order. @@ -720,7 +720,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies the primary DNS suffix used by computers in DNS name registration and DNS name resolution. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies the primary DNS suffix used by computers in DNS name registration and DNS name resolution. To use this policy setting, click Enabled and enter the entire primary DNS suffix you want to assign. For example: microsoft.com. @@ -795,7 +795,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies if a computer performing dynamic DNS registration will register A and PTR resource records with a concatenation of its computer name and a connection-specific DNS suffix, in addition to registering these records with a concatenation of its computer name and the primary DNS suffix. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies if a computer performing dynamic DNS registration will register A and PTR resource records with a concatenation of its computer name and a connection-specific DNS suffix, in addition to registering these records with a concatenation of its computer name and the primary DNS suffix. By default, a DNS client performing dynamic DNS registration registers A and PTR resource records with a concatenation of its computer name and the primary DNS suffix. For example, a computer name of mycomputer and a primary DNS suffix of microsoft.com will be registered as: mycomputer.microsoft.com. @@ -869,7 +869,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies if DNS client computers will register PTR resource records. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies if DNS client computers will register PTR resource records. By default, DNS clients configured to perform dynamic DNS registration will attempt to register PTR resource record only if they successfully registered the corresponding A resource record. @@ -945,7 +945,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies if DNS dynamic update is enabled. Computers configured for DNS dynamic update automatically register and update their DNS resource records with a DNS server. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies if DNS dynamic update is enabled. Computers configured for DNS dynamic update automatically register and update their DNS resource records with a DNS server. If you enable this policy setting, or you do not configure this policy setting, computers will attempt to use dynamic DNS registration on all network connections that have connection-specific dynamic DNS registration enabled. For a dynamic DNS registration to be enabled on a network connection, the connection-specific configuration must allow dynamic DNS registration, and this policy setting must not be disabled. @@ -1014,7 +1014,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies whether dynamic updates should overwrite existing resource records that contain conflicting IP addresses. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies whether dynamic updates should overwrite existing resource records that contain conflicting IP addresses. This policy setting is designed for computers that register address (A) resource records in DNS zones that do not use Secure Dynamic Updates. Secure Dynamic Update preserves ownership of resource records and does not allow a DNS client to overwrite records that are registered by other computers. @@ -1087,7 +1087,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies the interval used by DNS clients to refresh registration of A and PTR resource. This policy setting only applies to computers performing dynamic DNS updates. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies the interval used by DNS clients to refresh registration of A and PTR resource. This policy setting only applies to computers performing dynamic DNS updates. Computers configured to perform dynamic DNS registration of A and PTR resource records periodically reregister their records with DNS servers, even if the record has not changed. This reregistration is required to indicate to DNS servers that records are current and should not be automatically removed (scavenged) when a DNS server is configured to delete stale records. @@ -1163,7 +1163,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies the value of the time to live (TTL) field in A and PTR resource records that are registered by computers to which this policy setting is applied. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies the value of the time to live (TTL) field in A and PTR resource records that are registered by computers to which this policy setting is applied. To specify the TTL, click Enabled and then enter a value in seconds (for example, 900 is 15 minutes). @@ -1234,7 +1234,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies the DNS suffixes to attach to an unqualified single-label name before submission of a DNS query for that name. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies the DNS suffixes to attach to an unqualified single-label name before submission of a DNS query for that name. An unqualified single-label name contains no dots. The name "example" is a single-label name. This is different from a fully qualified domain name such as "example.microsoft.com." @@ -1310,7 +1310,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies that a multi-homed DNS client should optimize name resolution across networks. The setting improves performance by issuing parallel DNS, link local multicast name resolution (LLMNR) and NetBIOS over TCP/IP (NetBT) queries across all networks. In the event that multiple positive responses are received, the network binding order is used to determine which response to accept. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies that a multi-homed DNS client should optimize name resolution across networks. The setting improves performance by issuing parallel DNS, link local multicast name resolution (LLMNR) and NetBIOS over TCP/IP (NetBT) queries across all networks. In the event that multiple positive responses are received, the network binding order is used to determine which response to accept. If you enable this policy setting, the DNS client will not perform any optimizations. DNS queries will be issued across all networks first. LLMNR queries will be issued if the DNS queries fail, followed by NetBT queries if LLMNR queries fail. @@ -1379,7 +1379,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies that the DNS client should prefer responses from link local name resolution protocols on non-domain networks over DNS responses when issuing queries for flat names. Examples of link local name resolution protocols include link local multicast name resolution (LLMNR) and NetBIOS over TCP/IP (NetBT). +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies that the DNS client should prefer responses from link local name resolution protocols on non-domain networks over DNS responses when issuing queries for flat names. Examples of link local name resolution protocols include link local multicast name resolution (LLMNR) and NetBIOS over TCP/IP (NetBT). If you enable this policy setting, the DNS client will prefer DNS responses, followed by LLMNR, followed by NetBT for all networks. @@ -1451,7 +1451,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies the security level for dynamic DNS updates. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies the security level for dynamic DNS updates. To use this policy setting, click Enabled and then select one of the following values: @@ -1526,7 +1526,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies if computers may send dynamic updates to zones with a single label name. These zones are also known as top-level domain zones, for example: "com." +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies if computers may send dynamic updates to zones with a single label name. These zones are also known as top-level domain zones, for example: "com." By default, a DNS client that is configured to perform dynamic DNS update will update the DNS zone that is authoritative for its DNS resource records unless the authoritative zone is a top-level domain or root zone. @@ -1597,7 +1597,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies if the DNS client performs primary DNS suffix devolution during the name resolution process. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies if the DNS client performs primary DNS suffix devolution during the name resolution process. With devolution, a DNS client creates queries by appending a single-label, unqualified domain name with the parent suffix of the primary DNS suffix name, and the parent of that suffix, and so on, stopping if the name is successfully resolved or at a level determined by devolution settings. Devolution can be used when a user or application submits a query for a single-label domain name. @@ -1684,7 +1684,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies that link local multicast name resolution (LLMNR) is disabled on client computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies that link local multicast name resolution (LLMNR) is disabled on client computers. LLMNR is a secondary name resolution protocol. With LLMNR, queries are sent using multicast over a local network link on a single subnet from a client computer to another client computer on the same subnet that also has LLMNR enabled. LLMNR does not require a DNS server or DNS client configuration, and provides name resolution in scenarios in which conventional DNS name resolution is not possible. diff --git a/windows/client-management/mdm/policy-csp-admx-dwm.md b/windows/client-management/mdm/policy-csp-admx-dwm.md index ff5b9de5cc..e03d29b3c1 100644 --- a/windows/client-management/mdm/policy-csp-admx-dwm.md +++ b/windows/client-management/mdm/policy-csp-admx-dwm.md @@ -89,7 +89,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting controls the default color for window frames when the user does not specify a color. +Available in the latest Windows 10 Insider Preview Build. This policy setting controls the default color for window frames when the user does not specify a color. If you enable this policy setting and specify a default color, this color is used in glass window frames, if the user does not specify a color. @@ -162,7 +162,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting controls the default color for window frames when the user does not specify a color. +Available in the latest Windows 10 Insider Preview Build. This policy setting controls the default color for window frames when the user does not specify a color. If you enable this policy setting and specify a default color, this color is used in glass window frames, if the user does not specify a color. @@ -234,7 +234,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting controls the appearance of window animations such as those found when restoring, minimizing, and maximizing windows. +Available in the latest Windows 10 Insider Preview Build. This policy setting controls the appearance of window animations such as those found when restoring, minimizing, and maximizing windows. If you enable this policy setting, window animations are turned off. @@ -305,7 +305,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting controls the appearance of window animations such as those found when restoring, minimizing, and maximizing windows. +Available in the latest Windows 10 Insider Preview Build. This policy setting controls the appearance of window animations such as those found when restoring, minimizing, and maximizing windows. If you enable this policy setting, window animations are turned off. @@ -376,7 +376,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting controls the ability to change the color of window frames. +Available in the latest Windows 10 Insider Preview Build. This policy setting controls the ability to change the color of window frames. If you enable this policy setting, you prevent users from changing the default window frame color. @@ -448,7 +448,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting controls the ability to change the color of window frames. +Available in the latest Windows 10 Insider Preview Build. This policy setting controls the ability to change the color of window frames. If you enable this policy setting, you prevent users from changing the default window frame color. diff --git a/windows/client-management/mdm/policy-csp-admx-encryptfilesonmove.md b/windows/client-management/mdm/policy-csp-admx-encryptfilesonmove.md index ec7948b584..82b82ab53f 100644 --- a/windows/client-management/mdm/policy-csp-admx-encryptfilesonmove.md +++ b/windows/client-management/mdm/policy-csp-admx-encryptfilesonmove.md @@ -74,7 +74,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting prevents File Explorer from encrypting files that are moved to an encrypted folder. +Available in the latest Windows 10 Insider Preview Build. This policy setting prevents File Explorer from encrypting files that are moved to an encrypted folder. If you enable this policy setting, File Explorer will not automatically encrypt files that are moved to an encrypted folder. diff --git a/windows/client-management/mdm/policy-csp-admx-eventforwarding.md b/windows/client-management/mdm/policy-csp-admx-eventforwarding.md index e47d548237..985a4580ad 100644 --- a/windows/client-management/mdm/policy-csp-admx-eventforwarding.md +++ b/windows/client-management/mdm/policy-csp-admx-eventforwarding.md @@ -78,7 +78,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting controls resource usage for the forwarder (source computer) by controlling the events/per second sent to the Event Collector. +Available in the latest Windows 10 Insider Preview Build. This policy setting controls resource usage for the forwarder (source computer) by controlling the events/per second sent to the Event Collector. If you enable this policy setting, you can control the volume of events sent to the Event Collector by the source computer. This may be required in high volume environments. @@ -151,7 +151,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to configure the server address, refresh interval, and issuer certificate authority (CA) of a target Subscription Manager. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to configure the server address, refresh interval, and issuer certificate authority (CA) of a target Subscription Manager. If you enable this policy setting, you can configure the Source Computer to contact a specific FQDN (Fully Qualified Domain Name) or IP Address and request subscription specifics. diff --git a/windows/client-management/mdm/policy-csp-admx-fileservervssprovider.md b/windows/client-management/mdm/policy-csp-admx-fileservervssprovider.md index 37b6b9a826..97a0885008 100644 --- a/windows/client-management/mdm/policy-csp-admx-fileservervssprovider.md +++ b/windows/client-management/mdm/policy-csp-admx-fileservervssprovider.md @@ -74,7 +74,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting determines whether the RPC protocol messages used by VSS for SMB2 File Shares feature is enabled. +Available in the latest Windows 10 Insider Preview Build. This policy setting determines whether the RPC protocol messages used by VSS for SMB2 File Shares feature is enabled. VSS for SMB2 File Shares feature enables VSS aware backup applications to perform application consistent backup and restore of VSS aware applications storing data on SMB2 File Shares. diff --git a/windows/client-management/mdm/policy-csp-admx-filesys.md b/windows/client-management/mdm/policy-csp-admx-filesys.md index fbdc148b37..aadede45cf 100644 --- a/windows/client-management/mdm/policy-csp-admx-filesys.md +++ b/windows/client-management/mdm/policy-csp-admx-filesys.md @@ -93,7 +93,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. Compression can add to the processing overhead of filesystem operations. Enabling this setting will prevent access to and creation of compressed files. +Available in the latest Windows 10 Insider Preview Build. Compression can add to the processing overhead of filesystem operations. Enabling this setting will prevent access to and creation of compressed files. > [!TIP] @@ -157,7 +157,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. Delete notification is a feature that notifies the underlying storage device of clusters that are freed due to a file delete operation. +Available in the latest Windows 10 Insider Preview Build. Delete notification is a feature that notifies the underlying storage device of clusters that are freed due to a file delete operation. A value of 0, the default, will enable delete notifications for all volumes. @@ -224,7 +224,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. Encryption can add to the processing overhead of filesystem operations. Enabling this setting will prevent access to and creation of encrypted files. +Available in the latest Windows 10 Insider Preview Build. Encryption can add to the processing overhead of filesystem operations. Enabling this setting will prevent access to and creation of encrypted files. > [!TIP] @@ -287,7 +287,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. Encrypting the page file prevents malicious users from reading data that has been paged to disk, but also adds processing overhead for filesystem operations. Enabling this setting will cause the page files to be encrypted. +Available in the latest Windows 10 Insider Preview Build. Encrypting the page file prevents malicious users from reading data that has been paged to disk, but also adds processing overhead for filesystem operations. Enabling this setting will cause the page files to be encrypted. > [!TIP] @@ -350,7 +350,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. Enabling Win32 long paths will allow manifested win32 applications and Windows Store applications to access paths beyond the normal 260 character limit per node on file systems that support it. Enabling this setting will cause the long paths to be accessible within the process. +Available in the latest Windows 10 Insider Preview Build. Enabling Win32 long paths will allow manifested win32 applications and Windows Store applications to access paths beyond the normal 260 character limit per node on file systems that support it. Enabling this setting will cause the long paths to be accessible within the process. > [!TIP] @@ -413,7 +413,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting provides control over whether or not short names are generated during file creation. Some applications require short names for compatibility, but short names have a negative performance impact on the system. +Available in the latest Windows 10 Insider Preview Build. This policy setting provides control over whether or not short names are generated during file creation. Some applications require short names for compatibility, but short names have a negative performance impact on the system. If you enable short names on all volumes then short names will always be generated. If you disable them on all volumes then they will never be generated. If you set short name creation to be configurable on a per volume basis then an on-disk flag will determine whether or not short names are created on a given volume. If you disable short name creation on all data volumes then short names will only be generated for files created on the system volume. @@ -479,7 +479,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. Symbolic links can introduce vulnerabilities in certain applications. To mitigate this issue, you can selectively enable or disable the evaluation of these types of symbolic links: +Available in the latest Windows 10 Insider Preview Build. Symbolic links can introduce vulnerabilities in certain applications. To mitigate this issue, you can selectively enable or disable the evaluation of these types of symbolic links: - Local Link to a Local Target - Local Link to a Remote Target @@ -552,7 +552,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. TXF deprecated features included savepoints, secondary RM, miniversion and roll forward. Enable it if you want to use the APIs. +Available in the latest Windows 10 Insider Preview Build. TXF deprecated features included savepoints, secondary RM, miniversion and roll forward. Enable it if you want to use the APIs. > [!TIP] diff --git a/windows/client-management/mdm/policy-csp-admx-folderredirection.md b/windows/client-management/mdm/policy-csp-admx-folderredirection.md index 845c514983..97576c4d96 100644 --- a/windows/client-management/mdm/policy-csp-admx-folderredirection.md +++ b/windows/client-management/mdm/policy-csp-admx-folderredirection.md @@ -91,7 +91,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to control whether all redirected shell folders, such as Contacts, Documents, Desktop, Favorites, Music, Pictures, Videos, Start Menu, and AppData\Roaming, are available offline by default. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to control whether all redirected shell folders, such as Contacts, Documents, Desktop, Favorites, Music, Pictures, Videos, Start Menu, and AppData\Roaming, are available offline by default. If you enable this policy setting, users must manually select the files they wish to make available offline. @@ -166,7 +166,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to control whether individual redirected shell folders are available offline by default. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to control whether individual redirected shell folders are available offline by default. For the folders affected by this setting, users must manually select the files they wish to make available offline. @@ -240,7 +240,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting controls whether the contents of redirected folders is copied from the old location to the new location or simply renamed in the Offline Files cache when a folder is redirected to a new location. +Available in the latest Windows 10 Insider Preview Build. This policy setting controls whether the contents of redirected folders is copied from the old location to the new location or simply renamed in the Offline Files cache when a folder is redirected to a new location. If you enable this policy setting, when the path to a redirected folder is changed from one network location to another and Folder Redirection is configured to move the content to the new location, instead of copying the content to the new location, the cached content is renamed in the local cache and not copied to the new location. To use this policy setting, you must move or restore the server content to the new network location using a method that preserves the state of the files, including their timestamps, before updating the Folder Redirection location. @@ -309,7 +309,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows the administrator to define whether Folder Redirection should use localized names for the All Programs, Startup, My Music, My Pictures, and My Videos subfolders when redirecting the parent Start Menu and legacy My Documents folder respectively. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows the administrator to define whether Folder Redirection should use localized names for the All Programs, Startup, My Music, My Pictures, and My Videos subfolders when redirecting the parent Start Menu and legacy My Documents folder respectively. If you enable this policy setting, Windows Vista, Windows 7, Windows 8, and Windows Server 2012 will use localized folder names for these subfolders when redirecting the Start Menu or legacy My Documents folder. @@ -381,7 +381,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows the administrator to define whether Folder Redirection should use localized names for the All Programs, Startup, My Music, My Pictures, and My Videos subfolders when redirecting the parent Start Menu and legacy My Documents folder respectively. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows the administrator to define whether Folder Redirection should use localized names for the All Programs, Startup, My Music, My Pictures, and My Videos subfolders when redirecting the parent Start Menu and legacy My Documents folder respectively. If you enable this policy setting, Windows Vista, Windows 7, Windows 8, and Windows Server 2012 will use localized folder names for these subfolders when redirecting the Start Menu or legacy My Documents folder. @@ -452,7 +452,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting controls whether folders are redirected on a user's primary computers only. This policy setting is useful to improve logon performance and to increase security for user data on computers where the user might not want to download private data, such as on a meeting room computer or on a computer in a remote office. +Available in the latest Windows 10 Insider Preview Build. This policy setting controls whether folders are redirected on a user's primary computers only. This policy setting is useful to improve logon performance and to increase security for user data on computers where the user might not want to download private data, such as on a meeting room computer or on a computer in a remote office. To designate a user's primary computers, an administrator must use management software or a script to add primary computer attributes to the user's account in Active Directory Domain Services (AD DS). This policy setting also requires the Windows Server 2012 version of the Active Directory schema to function. @@ -525,7 +525,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting controls whether folders are redirected on a user's primary computers only. This policy setting is useful to improve logon performance and to increase security for user data on computers where the user might not want to download private data, such as on a meeting room computer or on a computer in a remote office. +Available in the latest Windows 10 Insider Preview Build. This policy setting controls whether folders are redirected on a user's primary computers only. This policy setting is useful to improve logon performance and to increase security for user data on computers where the user might not want to download private data, such as on a meeting room computer or on a computer in a remote office. To designate a user's primary computers, an administrator must use management software or a script to add primary computer attributes to the user's account in Active Directory Domain Services (AD DS). This policy setting also requires the Windows Server 2012 version of the Active Directory schema to function. diff --git a/windows/client-management/mdm/policy-csp-admx-help.md b/windows/client-management/mdm/policy-csp-admx-help.md index d705d091a0..9f96bb2c16 100644 --- a/windows/client-management/mdm/policy-csp-admx-help.md +++ b/windows/client-management/mdm/policy-csp-admx-help.md @@ -83,7 +83,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to exclude HTML Help Executable from being monitored by software-enforced Data Execution Prevention. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to exclude HTML Help Executable from being monitored by software-enforced Data Execution Prevention. Data Execution Prevention (DEP) is designed to block malicious code that takes advantage of exception-handling mechanisms in Windows by monitoring your programs to make sure that they use system memory safely. @@ -154,7 +154,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to restrict certain HTML Help commands to function only in HTML Help (.chm) files within specified folders and their subfolders. Alternatively, you can disable these commands on the entire system. It is strongly recommended that only folders requiring administrative privileges be added to this policy setting. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to restrict certain HTML Help commands to function only in HTML Help (.chm) files within specified folders and their subfolders. Alternatively, you can disable these commands on the entire system. It is strongly recommended that only folders requiring administrative privileges be added to this policy setting. If you enable this policy setting, the commands function only for .chm files in the specified folders and their subfolders. @@ -237,7 +237,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to restrict programs from being run from online Help. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to restrict programs from being run from online Help. If you enable this policy setting, you can prevent specified programs from being run from Help. When you enable this policy setting, enter the file names names of the programs you want to restrict, separated by commas. @@ -311,7 +311,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to restrict programs from being run from online Help. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to restrict programs from being run from online Help. If you enable this policy setting, you can prevent specified programs from being run from Help. When you enable this policy setting, enter the file names names of the programs you want to restrict, separated by commas. diff --git a/windows/client-management/mdm/policy-csp-admx-helpandsupport.md b/windows/client-management/mdm/policy-csp-admx-helpandsupport.md index 10d08651fc..50be68bfc6 100644 --- a/windows/client-management/mdm/policy-csp-admx-helpandsupport.md +++ b/windows/client-management/mdm/policy-csp-admx-helpandsupport.md @@ -83,7 +83,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies whether active content links in trusted assistance content are rendered. By default, the Help viewer renders trusted assistance content with active elements such as ShellExecute links and Guided Help links. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies whether active content links in trusted assistance content are rendered. By default, the Help viewer renders trusted assistance content with active elements such as ShellExecute links and Guided Help links. If you enable this policy setting, active content links are not rendered. The text is displayed, but there are no clickable links for these elements. @@ -152,7 +152,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies whether users can provide ratings for Help content. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies whether users can provide ratings for Help content. If you enable this policy setting, ratings controls are not added to Help content. @@ -222,7 +222,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies whether users can participate in the Help Experience Improvement program. The Help Experience Improvement program collects information about how customers use Windows Help so that Microsoft can improve it. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies whether users can participate in the Help Experience Improvement program. The Help Experience Improvement program collects information about how customers use Windows Help so that Microsoft can improve it. If you enable this policy setting, users cannot participate in the Help Experience Improvement program. @@ -291,7 +291,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies whether users can search and view content from Windows Online in Help and Support. Windows Online provides the most up-to-date Help content for Windows. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies whether users can search and view content from Windows Online in Help and Support. Windows Online provides the most up-to-date Help content for Windows. If you enable this policy setting, users are prevented from accessing online assistance content from Windows Online. diff --git a/windows/client-management/mdm/policy-csp-admx-kdc.md b/windows/client-management/mdm/policy-csp-admx-kdc.md index 4a63715208..baaaa464b2 100644 --- a/windows/client-management/mdm/policy-csp-admx-kdc.md +++ b/windows/client-management/mdm/policy-csp-admx-kdc.md @@ -89,7 +89,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to configure a domain controller to support claims and compound authentication for Dynamic Access Control and Kerberos armoring using Kerberos authentication. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to configure a domain controller to support claims and compound authentication for Dynamic Access Control and Kerberos armoring using Kerberos authentication. If you enable this policy setting, client computers that support claims and compound authentication for Dynamic Access Control and are Kerberos armor-aware will use this feature for Kerberos authentication messages. This policy should be applied to all domain controllers to ensure consistent application of this policy in the domain. @@ -185,7 +185,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting defines the list of trusting forests that the Key Distribution Center (KDC) searches when attempting to resolve two-part service principal names (SPNs). +Available in the latest Windows 10 Insider Preview Build. This policy setting defines the list of trusting forests that the Key Distribution Center (KDC) searches when attempting to resolve two-part service principal names (SPNs). If you enable this policy setting, the KDC will search the forests in this list if it is unable to resolve a two-part SPN in the local forest. The forest search is performed by using a global catalog or name suffix hints. If a match is found, the KDC will return a referral ticket to the client for the appropriate domain. @@ -256,7 +256,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. Support for PKInit Freshness Extension requires Windows Server 2016 domain functional level (DFL). If the domain controller’s domain is not at Windows Server 2016 DFL or higher this policy will not be applied. +Available in the latest Windows 10 Insider Preview Build. Support for PKInit Freshness Extension requires Windows Server 2016 domain functional level (DFL). If the domain controller’s domain is not at Windows Server 2016 DFL or higher this policy will not be applied. This policy setting allows you to configure a domain controller (DC) to support the PKInit Freshness Extension. @@ -331,7 +331,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to configure a domain controller to request compound authentication. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to configure a domain controller to request compound authentication. > [!NOTE] > For a domain controller to request compound authentication, the policy "KDC support for claims, compound authentication, and Kerberos armoring" must be configured and enabled. @@ -403,7 +403,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to configure at what size Kerberos tickets will trigger the warning event issued during Kerberos authentication. The ticket size warnings are logged in the System log. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to configure at what size Kerberos tickets will trigger the warning event issued during Kerberos authentication. The ticket size warnings are logged in the System log. If you enable this policy setting, you can set the threshold limit for Kerberos ticket which trigger the warning events. If set too high, then authentication failures might be occurring even though warning events are not being logged. If set too low, then there will be too many ticket warnings in the log to be useful for analysis. This value should be set to the same value as the Kerberos policy "Set maximum Kerberos SSPI context token buffer size" or the smallest MaxTokenSize used in your environment if you are not configuring using Group Policy. @@ -472,7 +472,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting controls whether the domain controller provides information about previous logons to client computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting controls whether the domain controller provides information about previous logons to client computers. If you enable this policy setting, the domain controller provides the information message about previous logons. diff --git a/windows/client-management/mdm/policy-csp-admx-lanmanserver.md b/windows/client-management/mdm/policy-csp-admx-lanmanserver.md index ddaddd01f1..bf08d08f1b 100644 --- a/windows/client-management/mdm/policy-csp-admx-lanmanserver.md +++ b/windows/client-management/mdm/policy-csp-admx-lanmanserver.md @@ -83,7 +83,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting determines the cipher suites used by the SMB server. +Available in the latest Windows 10 Insider Preview Build. This policy setting determines the cipher suites used by the SMB server. If you enable this policy setting, cipher suites are prioritized in the order specified. @@ -172,7 +172,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies whether a hash generation service generates hashes, also called content information, for data that is stored in shared folders. This policy setting must be applied to server computers that have the File Services role and both the File Server and the BranchCache for Network Files role services installed. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies whether a hash generation service generates hashes, also called content information, for data that is stored in shared folders. This policy setting must be applied to server computers that have the File Services role and both the File Server and the BranchCache for Network Files role services installed. Policy configuration @@ -255,7 +255,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies whether the BranchCache hash generation service supports version 1 (V1) hashes, version 2 (V2) hashes, or both V1 and V2 hashes. Hashes, also called content information, are created based on the data in shared folders where BranchCache is enabled. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies whether the BranchCache hash generation service supports version 1 (V1) hashes, version 2 (V2) hashes, or both V1 and V2 hashes. Hashes, also called content information, are created based on the data in shared folders where BranchCache is enabled. If you specify only one version that is supported, content information for that version is the only type that is generated by BranchCache, and it is the only type of content information that can be retrieved by client computers. For example, if you enable support for V1 hashes, BranchCache generates only V1 hashes and client computers can retrieve only V1 hashes. @@ -338,7 +338,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting determines how the SMB server selects a cipher suite when negotiating a new connection with an SMB client. +Available in the latest Windows 10 Insider Preview Build. This policy setting determines how the SMB server selects a cipher suite when negotiating a new connection with an SMB client. If you enable this policy setting, the SMB server will select the cipher suite it most prefers from the list of client-supported cipher suites, ignoring the client's preferences. diff --git a/windows/client-management/mdm/policy-csp-admx-linklayertopologydiscovery.md b/windows/client-management/mdm/policy-csp-admx-linklayertopologydiscovery.md index d4f25831ab..f36c218e89 100644 --- a/windows/client-management/mdm/policy-csp-admx-linklayertopologydiscovery.md +++ b/windows/client-management/mdm/policy-csp-admx-linklayertopologydiscovery.md @@ -77,7 +77,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting changes the operational behavior of the Mapper I/O network protocol driver. +Available in the latest Windows 10 Insider Preview Build. This policy setting changes the operational behavior of the Mapper I/O network protocol driver. LLTDIO allows a computer to discover the topology of a network it's connected to. It also allows a computer to initiate Quality-of-Service requests such as bandwidth estimation and network health analysis. @@ -148,7 +148,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting changes the operational behavior of the Responder network protocol driver. +Available in the latest Windows 10 Insider Preview Build. This policy setting changes the operational behavior of the Responder network protocol driver. The Responder allows a computer to participate in Link Layer Topology Discovery requests so that it can be discovered and located on the network. It also allows a computer to participate in Quality-of-Service activities such as bandwidth estimation and network health analysis. diff --git a/windows/client-management/mdm/policy-csp-admx-mmc.md b/windows/client-management/mdm/policy-csp-admx-mmc.md index a86907a534..e51d3bfcb5 100644 --- a/windows/client-management/mdm/policy-csp-admx-mmc.md +++ b/windows/client-management/mdm/policy-csp-admx-mmc.md @@ -86,7 +86,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits use of this snap-in. If you enable this setting, the snap-in is permitted. If you disable the setting, the snap-in is prohibited. @@ -165,7 +165,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits use of this snap-in. If you enable this setting, the snap-in is permitted. If you disable the setting, the snap-in is prohibited. @@ -244,7 +244,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits use of this snap-in. If you enable this setting, the snap-in is permitted. If you disable the setting, the snap-in is prohibited. @@ -323,7 +323,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting prevents users from entering author mode. +Available in the latest Windows 10 Insider Preview Build. This policy setting prevents users from entering author mode. This setting prevents users from opening the Microsoft Management Console (MMC) in author mode, explicitly opening console files in author mode, and opening any console files that open in author mode by default. @@ -396,7 +396,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting lets you selectively permit or prohibit the use of Microsoft Management Console (MMC) snap-ins. +Available in the latest Windows 10 Insider Preview Build. This policy setting lets you selectively permit or prohibit the use of Microsoft Management Console (MMC) snap-ins. - If you enable this setting, all snap-ins are prohibited, except those that you explicitly permit. Use this setting if you plan to prohibit use of most snap-ins. diff --git a/windows/client-management/mdm/policy-csp-admx-mmcsnapins.md b/windows/client-management/mdm/policy-csp-admx-mmcsnapins.md index cdd93c1d97..2190dbabeb 100644 --- a/windows/client-management/mdm/policy-csp-admx-mmcsnapins.md +++ b/windows/client-management/mdm/policy-csp-admx-mmcsnapins.md @@ -383,7 +383,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -460,7 +460,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -538,7 +538,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -616,7 +616,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -694,7 +694,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -772,7 +772,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -850,7 +850,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -928,7 +928,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -1006,7 +1006,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -1084,7 +1084,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -1162,7 +1162,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -1240,7 +1240,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -1317,7 +1317,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -1394,7 +1394,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -1471,7 +1471,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -1548,7 +1548,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -1625,7 +1625,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -1702,7 +1702,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -1779,7 +1779,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -1856,7 +1856,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -1933,7 +1933,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -2010,7 +2010,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -2087,7 +2087,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -2164,7 +2164,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -2241,7 +2241,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -2318,7 +2318,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -2395,7 +2395,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -2472,7 +2472,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -2549,7 +2549,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -2627,7 +2627,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -2704,7 +2704,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -2781,7 +2781,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -2858,7 +2858,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -2935,7 +2935,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -3012,7 +3012,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -3089,7 +3089,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -3166,7 +3166,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -3243,7 +3243,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits use of the Group Policy tab in property sheets for the Active Directory Users and Computers and Active Directory Sites and Services snap-ins. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits use of the Group Policy tab in property sheets for the Active Directory Users and Computers and Active Directory Sites and Services snap-ins. If you enable this setting, the Group Policy tab is displayed in the property sheet for a site, domain, or organizational unit displayed by the Active Directory Users and Computers and Active Directory Sites and Services snap-ins. If you disable the setting, the Group Policy tab is not displayed in those snap-ins. @@ -3322,7 +3322,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -3399,7 +3399,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -3476,7 +3476,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -3553,7 +3553,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -3630,7 +3630,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -3707,7 +3707,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -3784,7 +3784,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -3861,7 +3861,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -3938,7 +3938,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -4015,7 +4015,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -4092,7 +4092,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -4169,7 +4169,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -4246,7 +4246,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -4323,7 +4323,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -4400,7 +4400,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -4477,7 +4477,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -4554,7 +4554,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -4631,7 +4631,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -4708,7 +4708,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -4785,7 +4785,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -4862,7 +4862,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -4939,7 +4939,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -5016,7 +5016,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -5093,7 +5093,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -5170,7 +5170,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -5247,7 +5247,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -5324,7 +5324,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -5401,7 +5401,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -5478,7 +5478,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -5555,7 +5555,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -5632,7 +5632,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -5709,7 +5709,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -5786,7 +5786,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -5863,7 +5863,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -5940,7 +5940,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -6017,7 +6017,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -6094,7 +6094,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -6171,7 +6171,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -6248,7 +6248,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -6325,7 +6325,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -6402,7 +6402,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -6479,7 +6479,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -6556,7 +6556,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -6633,7 +6633,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -6710,7 +6710,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -6787,7 +6787,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -6864,7 +6864,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -6941,7 +6941,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -7018,7 +7018,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -7095,7 +7095,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -7172,7 +7172,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -7249,7 +7249,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -7326,7 +7326,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -7403,7 +7403,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -7480,7 +7480,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -7557,7 +7557,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -7634,7 +7634,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -7711,7 +7711,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -7788,7 +7788,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -7865,7 +7865,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -7942,7 +7942,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -8019,7 +8019,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -8096,7 +8096,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -8173,7 +8173,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -8250,7 +8250,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -8327,7 +8327,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. @@ -8404,7 +8404,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits or prohibits the use of this snap-in. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits or prohibits the use of this snap-in. If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. diff --git a/windows/client-management/mdm/policy-csp-admx-msapolicy.md b/windows/client-management/mdm/policy-csp-admx-msapolicy.md index e8c35ac22e..7a9e6a5a84 100644 --- a/windows/client-management/mdm/policy-csp-admx-msapolicy.md +++ b/windows/client-management/mdm/policy-csp-admx-msapolicy.md @@ -74,7 +74,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting controls whether users can provide Microsoft accounts for authentication for applications or services. If this setting is enabled, all applications and services on the device are prevented from using Microsoft accounts for authentication. +Available in the latest Windows 10 Insider Preview Build. This policy setting controls whether users can provide Microsoft accounts for authentication for applications or services. If this setting is enabled, all applications and services on the device are prevented from using Microsoft accounts for authentication. This applies both to existing users of a device and new users who may be added. However, any application or service that has already authenticated a user will not be affected by enabling this setting until the authentication cache expires. diff --git a/windows/client-management/mdm/policy-csp-admx-nca.md b/windows/client-management/mdm/policy-csp-admx-nca.md index 840af17067..da9eca2118 100644 --- a/windows/client-management/mdm/policy-csp-admx-nca.md +++ b/windows/client-management/mdm/policy-csp-admx-nca.md @@ -95,7 +95,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies resources on your intranet that are normally accessible to DirectAccess clients. Each entry is a string that identifies the type of resource and the location of the resource. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies resources on your intranet that are normally accessible to DirectAccess clients. Each entry is a string that identifies the type of resource and the location of the resource. Each string can be one of the following types: @@ -174,7 +174,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies commands configured by the administrator for custom logging. These commands will run in addition to default log commands. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies commands configured by the administrator for custom logging. These commands will run in addition to default log commands. > [!TIP] @@ -239,7 +239,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies the IPv6 addresses of the endpoints of the Internet Protocol security (IPsec) tunnels that enable DirectAccess. NCA attempts to access the resources that are specified in the Corporate Resources setting through these configured tunnel endpoints. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies the IPv6 addresses of the endpoints of the Internet Protocol security (IPsec) tunnels that enable DirectAccess. NCA attempts to access the resources that are specified in the Corporate Resources setting through these configured tunnel endpoints. By default, NCA uses the same DirectAccess server that the DirectAccess client computer connection is using. In default configurations of DirectAccess, there are typically two IPsec tunnel endpoints: one for the infrastructure tunnel and one for the intranet tunnel. You should configure one endpoint for each tunnel. @@ -310,7 +310,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies the string that appears for DirectAccess connectivity when the user clicks the Networking notification area icon. For example, you can specify “Contoso Intranet Access” for the DirectAccess clients of the Contoso Corporation. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies the string that appears for DirectAccess connectivity when the user clicks the Networking notification area icon. For example, you can specify “Contoso Intranet Access” for the DirectAccess clients of the Contoso Corporation. If this setting is not configured, the string that appears for DirectAccess connectivity is “Corporate Connection”. @@ -377,7 +377,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies whether the user has Connect and Disconnect options for the DirectAccess entry when the user clicks the Networking notification area icon. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies whether the user has Connect and Disconnect options for the DirectAccess entry when the user clicks the Networking notification area icon. If the user clicks the Disconnect option, NCA removes the DirectAccess rules from the Name Resolution Policy Table (NRPT) and the DirectAccess client computer uses whatever normal name resolution is available to the client computer in its current network configuration, including sending all DNS queries to the local intranet or Internet DNS servers. Note that NCA does not remove the existing IPsec tunnels and users can still access intranet resources across the DirectAccess server by specifying IPv6 addresses rather than names. @@ -453,7 +453,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies whether NCA service runs in Passive Mode or not. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies whether NCA service runs in Passive Mode or not. Set this to Disabled to keep NCA probing actively all the time. If this setting is not configured, NCA probing is in active mode by default. @@ -519,7 +519,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies whether an entry for DirectAccess connectivity appears when the user clicks the Networking notification area icon. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies whether an entry for DirectAccess connectivity appears when the user clicks the Networking notification area icon. Set this to Disabled to prevent user confusion when you are just using DirectAccess to remotely manage DirectAccess client computers from your intranet and not providing seamless intranet access. @@ -588,7 +588,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies the e-mail address to be used when sending the log files that are generated by NCA to the network administrator. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies the e-mail address to be used when sending the log files that are generated by NCA to the network administrator. When the user sends the log files to the Administrator, NCA uses the default e-mail client to open a new message with the support email address in the To: field of the message, then attaches the generated log files as a .html file. The user can review the message and add additional information before sending the message. diff --git a/windows/client-management/mdm/policy-csp-admx-ncsi.md b/windows/client-management/mdm/policy-csp-admx-ncsi.md index 3e575f3fdf..68f54caf09 100644 --- a/windows/client-management/mdm/policy-csp-admx-ncsi.md +++ b/windows/client-management/mdm/policy-csp-admx-ncsi.md @@ -92,7 +92,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting enables you to specify the expected address of the host name used for the DNS probe. Successful resolution of the host name to this address indicates corporate connectivity. +Available in the latest Windows 10 Insider Preview Build. This policy setting enables you to specify the expected address of the host name used for the DNS probe. Successful resolution of the host name to this address indicates corporate connectivity. > [!TIP] @@ -157,7 +157,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting enables you to specify the host name of a computer known to be on the corporate network. Successful resolution of this host name to the expected address indicates corporate connectivity. +Available in the latest Windows 10 Insider Preview Build. This policy setting enables you to specify the host name of a computer known to be on the corporate network. Successful resolution of this host name to the expected address indicates corporate connectivity. > [!TIP] @@ -222,7 +222,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting enables you to specify the list of IPv6 corporate site prefixes to monitor for corporate connectivity. Reachability of addresses with any of these prefixes indicates corporate connectivity. +Available in the latest Windows 10 Insider Preview Build. This policy setting enables you to specify the list of IPv6 corporate site prefixes to monitor for corporate connectivity. Reachability of addresses with any of these prefixes indicates corporate connectivity. > [!TIP] @@ -287,7 +287,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting enables you to specify the URL of the corporate website, against which an active probe is performed. +Available in the latest Windows 10 Insider Preview Build. This policy setting enables you to specify the URL of the corporate website, against which an active probe is performed. > [!TIP] @@ -355,7 +355,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting enables you to specify the HTTPS URL of the corporate website that clients use to determine the current domain location (i.e. whether the computer is inside or outside the corporate network). Reachability of the URL destination indicates that the client location is inside corporate network; otherwise it is outside the network. +Available in the latest Windows 10 Insider Preview Build. This policy setting enables you to specify the HTTPS URL of the corporate website that clients use to determine the current domain location (i.e. whether the computer is inside or outside the corporate network). Reachability of the URL destination indicates that the client location is inside corporate network; otherwise it is outside the network. > [!TIP] @@ -420,7 +420,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting enables you to specify DNS binding behavior. NCSI by default will restrict DNS lookups to the interface it is currently probing on. If you enable this setting, NCSI will allow the DNS lookups to happen on any interface. +Available in the latest Windows 10 Insider Preview Build. This policy setting enables you to specify DNS binding behavior. NCSI by default will restrict DNS lookups to the interface it is currently probing on. If you enable this setting, NCSI will allow the DNS lookups to happen on any interface. > [!TIP] @@ -485,7 +485,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This Policy setting enables you to specify passive polling behavior. NCSI polls various measurements throughout the network stack on a frequent interval to determine if network connectivity has been lost. Use the options to control the passive polling behavior. +Available in the latest Windows 10 Insider Preview Build. This Policy setting enables you to specify passive polling behavior. NCSI polls various measurements throughout the network stack on a frequent interval to determine if network connectivity has been lost. Use the options to control the passive polling behavior. > [!TIP] diff --git a/windows/client-management/mdm/policy-csp-admx-netlogon.md b/windows/client-management/mdm/policy-csp-admx-netlogon.md index 782b57ba8c..a01bbd5c4d 100644 --- a/windows/client-management/mdm/policy-csp-admx-netlogon.md +++ b/windows/client-management/mdm/policy-csp-admx-netlogon.md @@ -176,7 +176,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting configures how a domain controller (DC) behaves when responding to a client whose IP address does not map to any configured site. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures how a domain controller (DC) behaves when responding to a client whose IP address does not map to any configured site. Domain controllers use the client IP address during a DC locator ping request to compute which Active Directory site the client belongs to. If no site mapping can be computed, the DC may do an address lookup on the client network name to discover other IP addresses which may then be used to compute a matching site for the client. @@ -253,7 +253,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting determines the type of IP address that is returned for a domain controller. The DC Locator APIs return the IP address of the DC with the other parts of information. Before the support of IPv6, the returned DC IP address was IPv4. But with the support of IPv6, the DC Locator APIs can return IPv6 DC address. The returned IPv6 DC address may not be correctly handled by some of the existing applications. So this policy is provided to support such scenarios. +Available in the latest Windows 10 Insider Preview Build. This policy setting determines the type of IP address that is returned for a domain controller. The DC Locator APIs return the IP address of the DC with the other parts of information. Before the support of IPv6, the returned DC IP address was IPv4. But with the support of IPv6, the DC Locator APIs can return IPv6 DC address. The returned IPv6 DC address may not be correctly handled by some of the existing applications. So this policy is provided to support such scenarios. By default, DC Locator APIs can return IPv4/IPv6 DC address. But if some applications are broken due to the returned IPv6 DC address, this policy can be used to disable the default behavior and enforce to return only IPv4 DC address. Once applications are fixed, this policy can be used to enable the default behavior. @@ -328,7 +328,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies whether the computers to which this setting is applied attempts DNS name resolution of single-label domain names, by appending different registered DNS suffixes, and uses NetBIOS name resolution only if DNS name resolution fails. This policy, including the specified default behavior, is not used if the AllowSingleLabelDnsDomain policy setting is enabled. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies whether the computers to which this setting is applied attempts DNS name resolution of single-label domain names, by appending different registered DNS suffixes, and uses NetBIOS name resolution only if DNS name resolution fails. This policy, including the specified default behavior, is not used if the AllowSingleLabelDnsDomain policy setting is enabled. By default, when no setting is specified for this policy, the behavior is the same as explicitly enabling this policy, unless the AllowSingleLabelDnsDomain policy setting is enabled. @@ -401,7 +401,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting controls whether the Net Logon service will allow the use of older cryptography algorithms that are used in Windows NT 4.0. The cryptography algorithms used in Windows NT 4.0 and earlier are not as secure as newer algorithms used in Windows 2000 or later, including this version of Windows. +Available in the latest Windows 10 Insider Preview Build. This policy setting controls whether the Net Logon service will allow the use of older cryptography algorithms that are used in Windows NT 4.0. The cryptography algorithms used in Windows NT 4.0 and earlier are not as secure as newer algorithms used in Windows 2000 or later, including this version of Windows. By default, Net Logon will not allow the older cryptography algorithms to be used and will not include them in the negotiation of cryptography algorithms. Therefore, computers running Windows NT 4.0 will not be able to establish a connection to this domain controller. @@ -476,7 +476,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies whether the computers to which this setting is applied attempt DNS name resolution of a single-label domain names. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies whether the computers to which this setting is applied attempt DNS name resolution of a single-label domain names. By default, the behavior specified in the AllowDnsSuffixSearch is used. If the AllowDnsSuffixSearch policy is disabled, then NetBIOS name resolution is used exclusively, to locate a domain controller hosting an Active Directory domain specified with a single-label name. @@ -551,7 +551,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting determines whether domain controllers (DC) will dynamically register DC Locator site-specific SRV records for the closest sites where no DC for the same domain exists (or no Global Catalog for the same forest exists). These DNS records are dynamically registered by the Net Logon service, and they are used to locate the DC. +Available in the latest Windows 10 Insider Preview Build. This policy setting determines whether domain controllers (DC) will dynamically register DC Locator site-specific SRV records for the closest sites where no DC for the same domain exists (or no Global Catalog for the same forest exists). These DNS records are dynamically registered by the Net Logon service, and they are used to locate the DC. If you enable this policy setting, the DCs to which this setting is applied dynamically register DC Locator site-specific DNS SRV records for the closest sites where no DC for the same domain, or no Global Catalog for the same forest, exists. @@ -624,7 +624,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to control the domain controller (DC) location algorithm. By default, the DC location algorithm prefers DNS-based discovery if the DNS domain name is known. If DNS-based discovery fails and the NetBIOS domain name is known, the algorithm then uses NetBIOS-based discovery as a fallback mechanism. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to control the domain controller (DC) location algorithm. By default, the DC location algorithm prefers DNS-based discovery if the DNS domain name is known. If DNS-based discovery fails and the NetBIOS domain name is known, the algorithm then uses NetBIOS-based discovery as a fallback mechanism. NetBIOS-based discovery uses a WINS server and mailslot messages but does not use site information. Hence it does not ensure that clients will discover the closest DC. It also allows a hub-site client to discover a branch-site DC even if the branch-site DC only registers site-specific DNS records (as recommended). For these reasons, NetBIOS-based discovery is not recommended. @@ -700,7 +700,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting defines whether a domain controller (DC) should attempt to verify the password provided by a client with the PDC emulator if the DC failed to validate the password. +Available in the latest Windows 10 Insider Preview Build. This policy setting defines whether a domain controller (DC) should attempt to verify the password provided by a client with the PDC emulator if the DC failed to validate the password. Contacting the PDC emulator is useful in case the client’s password was recently changed and did not propagate to the DC yet. Users may want to disable this feature if the PDC emulator is located over a slow WAN connection. @@ -775,7 +775,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting determines the amount of time (in seconds) to wait before the first retry for applications that perform periodic searches for domain controllers (DC) that are unable to find a DC. +Available in the latest Windows 10 Insider Preview Build. This policy setting determines the amount of time (in seconds) to wait before the first retry for applications that perform periodic searches for domain controllers (DC) that are unable to find a DC. The default value for this setting is 10 minutes (10*60). @@ -853,7 +853,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting determines the maximum retry interval allowed when applications performing periodic searches for Domain Controllers (DCs) are unable to find a DC. +Available in the latest Windows 10 Insider Preview Build. This policy setting determines the maximum retry interval allowed when applications performing periodic searches for Domain Controllers (DCs) are unable to find a DC. For example, the retry intervals may be set at 10 minutes, then 20 minutes and then 40 minutes, but when the interval reaches the value set in this setting, that value becomes the retry interval for all subsequent retries until the value set in Final DC Discovery Retry Setting is reached. @@ -933,7 +933,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting determines when retries are no longer allowed for applications that perform periodic searches for domain controllers (DC) are unable to find a DC. For example, retires may be set to occur according to the Use maximum DC discovery retry interval policy setting, but when the value set in this policy setting is reached, no more retries occur. If a value for this policy setting is smaller than the value in the Use maximum DC discovery retry interval policy setting, the value for Use maximum DC discovery retry interval policy setting is used. +Available in the latest Windows 10 Insider Preview Build. This policy setting determines when retries are no longer allowed for applications that perform periodic searches for domain controllers (DC) are unable to find a DC. For example, retires may be set to occur according to the Use maximum DC discovery retry interval policy setting, but when the value set in this policy setting is reached, no more retries occur. If a value for this policy setting is smaller than the value in the Use maximum DC discovery retry interval policy setting, the value for Use maximum DC discovery retry interval policy setting is used. The default value for this setting is to not quit retrying (0). The maximum value for this setting is 49 days (0x49*24*60*60=4233600). The minimum value for this setting is 0. @@ -1005,7 +1005,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting determines when a successful DC cache entry is refreshed. This policy setting is applied to caller programs that periodically attempt to locate DCs, and it is applied before returning the DC information to the caller program. The default value for this setting is infinite (4294967200). The maximum value for this setting is (4294967200), while the maximum that is not treated as infinity is 49 days (49*24*60*60=4233600). Any larger value is treated as infinity. The minimum value for this setting is to always refresh (0). +Available in the latest Windows 10 Insider Preview Build. This policy setting determines when a successful DC cache entry is refreshed. This policy setting is applied to caller programs that periodically attempt to locate DCs, and it is applied before returning the DC information to the caller program. The default value for this setting is infinite (4294967200). The maximum value for this setting is (4294967200), while the maximum that is not treated as infinity is 49 days (49*24*60*60=4233600). Any larger value is treated as infinity. The minimum value for this setting is to always refresh (0). > [!TIP] @@ -1072,7 +1072,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies the level of debug output for the Net Logon service. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies the level of debug output for the Net Logon service. The Net Logon service outputs debug information to the log file netlogon.log in the directory %windir%\debug. By default, no debug information is logged. @@ -1147,7 +1147,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting determines which DC Locator DNS records are not registered by the Net Logon service. +Available in the latest Windows 10 Insider Preview Build. This policy setting determines which DC Locator DNS records are not registered by the Net Logon service. If you enable this policy setting, select Enabled and specify a list of space-delimited mnemonics (instructions) for the DC Locator DNS records that will not be registered by the DCs to which this setting is applied. @@ -1246,7 +1246,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies the Refresh Interval of the DC Locator DNS resource records for DCs to which this setting is applied. These DNS records are dynamically registered by the Net Logon service and are used by the DC Locator algorithm to locate the DC. This setting may be applied only to DCs using dynamic update. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies the Refresh Interval of the DC Locator DNS resource records for DCs to which this setting is applied. These DNS records are dynamically registered by the Net Logon service and are used by the DC Locator algorithm to locate the DC. This setting may be applied only to DCs using dynamic update. DCs configured to perform dynamic registration of the DC Locator DNS resource records periodically reregister their records with DNS servers, even if their records’ data has not changed. If authoritative DNS servers are configured to perform scavenging of the stale records, this reregistration is required to instruct the DNS servers configured to automatically remove (scavenge) stale records that these records are current and should be preserved in the database. @@ -1322,7 +1322,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures whether the domain controllers to which this setting is applied will lowercase their DNS host name when registering SRV records. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures whether the domain controllers to which this setting is applied will lowercase their DNS host name when registering SRV records. If enabled, domain controllers will lowercase their DNS host name when registering domain controller SRV records. A best-effort attempt will be made to delete any previously registered SRV records that contain mixed-case DNS host names. For more information and potential manual cleanup procedures, see the link below. @@ -1398,7 +1398,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies the value for the Time-To-Live (TTL) field in SRV resource records that are registered by the Net Logon service. These DNS records are dynamically registered, and they are used to locate the domain controller (DC). +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies the value for the Time-To-Live (TTL) field in SRV resource records that are registered by the Net Logon service. These DNS records are dynamically registered, and they are used to locate the domain controller (DC). To specify the TTL for DC Locator DNS records, click Enabled, and then enter a value in seconds (for example, the value "900" is 15 minutes). @@ -1468,7 +1468,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies the additional time for the computer to wait for the domain controller’s (DC) response when logging on to the network. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies the additional time for the computer to wait for the domain controller’s (DC) response when logging on to the network. To specify the expected dial-up delay at logon, click Enabled, and then enter the desired value in seconds (for example, the value "60" is 1 minute). @@ -1539,7 +1539,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting determines the interval for when a Force Rediscovery is carried out by DC Locator. +Available in the latest Windows 10 Insider Preview Build. This policy setting determines the interval for when a Force Rediscovery is carried out by DC Locator. The Domain Controller Locator (DC Locator) service is used by clients to find domain controllers for their Active Directory domain. When DC Locator finds a domain controller, it caches domain controllers to improve the efficiency of the location algorithm. As long as the cached domain controller meets the requirements and is running, DC Locator will continue to return it. If a new domain controller is introduced, existing clients will only discover it when a Force Rediscovery is carried out by DC Locator. To adapt to changes in network conditions DC Locator will by default carry out a Force Rediscovery according to a specific time interval and maintain efficient load-balancing of clients across all available domain controllers in all domains or forests. The default time interval for Force Rediscovery by DC Locator is 12 hours. Force Rediscovery can also be triggered if a call to DC Locator uses the DS_FORCE_REDISCOVERY flag. Rediscovery resets the timer on the cached domain controller entries. @@ -1614,7 +1614,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies the sites for which the global catalogs (GC) should register site-specific GC locator DNS SRV resource records. These records are registered in addition to the site-specific SRV records registered for the site where the GC resides, and records registered by a GC configured to register GC Locator DNS SRV records for those sites without a GC that are closest to it. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies the sites for which the global catalogs (GC) should register site-specific GC locator DNS SRV resource records. These records are registered in addition to the site-specific SRV records registered for the site where the GC resides, and records registered by a GC configured to register GC Locator DNS SRV records for those sites without a GC that are closest to it. The GC Locator DNS records and the site-specific SRV records are dynamically registered by the Net Logon service, and they are used to locate the GC. An Active Directory site is one or more well-connected TCP/IP subnets that allow administrators to configure Active Directory access and replication. A GC is a domain controller that contains a partial replica of every domain in Active Directory. @@ -1687,7 +1687,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to control the processing of incoming mailslot messages by a local domain controller (DC). +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to control the processing of incoming mailslot messages by a local domain controller (DC). > [!NOTE] > To locate a remote DC based on its NetBIOS (single-label) domain name, DC Locator first gets the list of DCs from a WINS server that is configured in its local client settings. DC Locator then sends a mailslot message to each remote DC to get more information. DC location succeeds only if a remote DC responds to the mailslot message. @@ -1763,7 +1763,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies the Priority field in the SRV resource records registered by domain controllers (DC) to which this setting is applied. These DNS records are dynamically registered by the Net Logon service and are used to locate the DC. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies the Priority field in the SRV resource records registered by domain controllers (DC) to which this setting is applied. These DNS records are dynamically registered by the Net Logon service and are used to locate the DC. The Priority field in the SRV record sets the preference for target hosts (specified in the SRV record’s Target field). DNS clients that query for SRV resource records attempt to contact the first reachable host with the lowest priority number listed. @@ -1836,7 +1836,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies the Weight field in the SRV resource records registered by the domain controllers (DC) to which this setting is applied. These DNS records are dynamically registered by the Net Logon service, and they are used to locate the DC. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies the Weight field in the SRV resource records registered by the domain controllers (DC) to which this setting is applied. These DNS records are dynamically registered by the Net Logon service, and they are used to locate the DC. The Weight field in the SRV record can be used in addition to the Priority value to provide a load-balancing mechanism where multiple servers are specified in the SRV records Target field and are all set to the same priority. The probability with which the DNS client randomly selects the target host to be contacted is proportional to the Weight field value in the SRV record. @@ -1909,7 +1909,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies the maximum size in bytes of the log file netlogon.log in the directory %windir%\debug when logging is enabled. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies the maximum size in bytes of the log file netlogon.log in the directory %windir%\debug when logging is enabled. By default, the maximum size of the log file is 20MB. If you enable this policy setting, the maximum size of the log file is set to the specified size. Once this size is reached the log file is saved to netlogon.bak and netlogon.log is truncated. A reasonable value based on available storage should be specified. @@ -1980,7 +1980,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies the sites for which the domain controllers (DC) that host the application directory partition should register the site-specific, application directory partition-specific DC Locator DNS SRV resource records. These records are registered in addition to the site-specific SRV records registered for the site where the DC resides, and records registered by a DC configured to register DC Locator DNS SRV records for those sites without a DC that are closest to it. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies the sites for which the domain controllers (DC) that host the application directory partition should register the site-specific, application directory partition-specific DC Locator DNS SRV resource records. These records are registered in addition to the site-specific SRV records registered for the site where the DC resides, and records registered by a DC configured to register DC Locator DNS SRV records for those sites without a DC that are closest to it. The application directory partition DC Locator DNS records and the site-specific SRV records are dynamically registered by the Net Logon service, and they are used to locate the application directory partition-specific DC. An Active Directory site is one or more well-connected TCP/IP subnets that allow administrators to configure Active Directory access and replication. @@ -2053,7 +2053,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies the amount of time (in seconds) the DC locator remembers that a domain controller (DC) could not be found in a domain. When a subsequent attempt to locate the DC occurs within the time set in this setting, DC Discovery immediately fails, without attempting to find the DC. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies the amount of time (in seconds) the DC locator remembers that a domain controller (DC) could not be found in a domain. When a subsequent attempt to locate the DC occurs within the time set in this setting, DC Discovery immediately fails, without attempting to find the DC. The default value for this setting is 45 seconds. The maximum value for this setting is 7 days (7*24*60*60). The minimum value for this setting is 0. @@ -2125,7 +2125,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting controls whether or not the Netlogon share created by the Net Logon service on a domain controller (DC) should support compatibility in file sharing semantics with earlier applications. +Available in the latest Windows 10 Insider Preview Build. This policy setting controls whether or not the Netlogon share created by the Net Logon service on a domain controller (DC) should support compatibility in file sharing semantics with earlier applications. If you enable this policy setting, the Netlogon share will honor file sharing semantics that grant requests for exclusive read access to files on the share even when the caller has only read permission. @@ -2203,7 +2203,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting determines when a successful DC cache entry is refreshed. This policy setting is applied to caller programs that do not periodically attempt to locate DCs, and it is applied before the returning the DC information to the caller program. This policy setting is relevant to only those callers of DsGetDcName that have not specified the DS_BACKGROUND_ONLY flag. +Available in the latest Windows 10 Insider Preview Build. This policy setting determines when a successful DC cache entry is refreshed. This policy setting is applied to caller programs that do not periodically attempt to locate DCs, and it is applied before the returning the DC information to the caller program. This policy setting is relevant to only those callers of DsGetDcName that have not specified the DS_BACKGROUND_ONLY flag. The default value for this setting is 30 minutes (1800). The maximum value for this setting is (4294967200), while the maximum that is not treated as infinity is 49 days (49*24*60*60=4233600). Any larger value will be treated as infinity. The minimum value for this setting is to always refresh (0). @@ -2272,7 +2272,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures whether the computers to which this setting is applied are more aggressive when trying to locate a domain controller (DC). +Available in the latest Windows 10 Insider Preview Build. This policy setting configures whether the computers to which this setting is applied are more aggressive when trying to locate a domain controller (DC). When an environment has a large number of DCs running both old and new operating systems, the default DC locator discovery behavior may be insufficient to find DCs running a newer operating system. This policy setting can be enabled to configure DC locator to be more aggressive about trying to locate a DC in such an environment, by pinging DCs at a higher frequency. Enabling this setting may result in additional network traffic and increased load on DCs. You should disable this setting once all DCs are running the same OS version. @@ -2350,7 +2350,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting determines the interval at which Netlogon performs the following scavenging operations: +Available in the latest Windows 10 Insider Preview Build. This policy setting determines the interval at which Netlogon performs the following scavenging operations: - Checks if a password on a secure channel needs to be modified, and modifies it if necessary. @@ -2427,7 +2427,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies the sites for which the domain controllers (DC) register the site-specific DC Locator DNS SRV resource records. These records are registered in addition to the site-specific SRV records registered for the site where the DC resides, and records registered by a DC configured to register DC Locator DNS SRV records for those sites without a DC that are closest to it. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies the sites for which the domain controllers (DC) register the site-specific DC Locator DNS SRV resource records. These records are registered in addition to the site-specific SRV records registered for the site where the DC resides, and records registered by a DC configured to register DC Locator DNS SRV records for those sites without a DC that are closest to it. The DC Locator DNS records are dynamically registered by the Net Logon service, and they are used to locate the DC. An Active Directory site is one or more well-connected TCP/IP subnets that allow administrators to configure Active Directory access and replication. @@ -2500,7 +2500,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies the Active Directory site to which computers belong. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies the Active Directory site to which computers belong. An Active Directory site is one or more well-connected TCP/IP subnets that allow administrators to configure Active Directory access and replication. @@ -2573,7 +2573,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting controls whether or not the SYSVOL share created by the Net Logon service on a domain controller (DC) should support compatibility in file sharing semantics with earlier applications. +Available in the latest Windows 10 Insider Preview Build. This policy setting controls whether or not the SYSVOL share created by the Net Logon service on a domain controller (DC) should support compatibility in file sharing semantics with earlier applications. When this setting is enabled, the SYSVOL share will honor file sharing semantics that grant requests for exclusive read access to files on the share even when the caller has only read permission. @@ -2651,7 +2651,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting enables DC Locator to attempt to locate a DC in the nearest site based on the site link cost if a DC in same the site is not found. In scenarios with multiple sites, failing over to the try next closest site during DC Location streamlines network traffic more effectively. +Available in the latest Windows 10 Insider Preview Build. This policy setting enables DC Locator to attempt to locate a DC in the nearest site based on the site link cost if a DC in same the site is not found. In scenarios with multiple sites, failing over to the try next closest site during DC Location streamlines network traffic more effectively. The DC Locator service is used by clients to find domain controllers for their Active Directory domain. The default behavior for DC Locator is to find a DC in the same site. If none are found in the same site, a DC in another site, which might be several site-hops away, could be returned by DC Locator. Site proximity between two sites is determined by the total site-link cost between them. A site is closer if it has a lower site link cost than another site with a higher site link cost. @@ -2726,7 +2726,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting determines if dynamic registration of the domain controller (DC) locator DNS resource records is enabled. These DNS records are dynamically registered by the Net Logon service and are used by the Locator algorithm to locate the DC. +Available in the latest Windows 10 Insider Preview Build. This policy setting determines if dynamic registration of the domain controller (DC) locator DNS resource records is enabled. These DNS records are dynamically registered by the Net Logon service and are used by the Locator algorithm to locate the DC. If you enable this policy setting, DCs to which this setting is applied dynamically register DC Locator DNS resource records through dynamic DNS update-enabled network connections. diff --git a/windows/client-management/mdm/policy-csp-admx-offlinefiles.md b/windows/client-management/mdm/policy-csp-admx-offlinefiles.md index abd5e758fc..1a170d2024 100644 --- a/windows/client-management/mdm/policy-csp-admx-offlinefiles.md +++ b/windows/client-management/mdm/policy-csp-admx-offlinefiles.md @@ -209,7 +209,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting makes subfolders available offline whenever their parent folder is made available offline. +Available in the latest Windows 10 Insider Preview Build. This policy setting makes subfolders available offline whenever their parent folder is made available offline. This setting automatically extends the "make available offline" setting to all new and existing subfolders of a folder. Users do not have the option of excluding subfolders. @@ -280,7 +280,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting lists network files and folders that are always available for offline use. This ensures that the specified files and folders are available offline to users of the computer. +Available in the latest Windows 10 Insider Preview Build. This policy setting lists network files and folders that are always available for offline use. This ensures that the specified files and folders are available offline to users of the computer. If you enable this policy setting, the files you enter are always available offline to users of the computer. To specify a file or folder, click Show. In the Show Contents dialog box in the Value Name column, type the fully qualified UNC path to the file or folder. Leave the Value column field blank. @@ -354,7 +354,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting lists network files and folders that are always available for offline use. This ensures that the specified files and folders are available offline to users of the computer. +Available in the latest Windows 10 Insider Preview Build. This policy setting lists network files and folders that are always available for offline use. This ensures that the specified files and folders are available offline to users of the computer. If you enable this policy setting, the files you enter are always available offline to users of the computer. To specify a file or folder, click Show. In the Show Contents dialog box in the Value Name column, type the fully qualified UNC path to the file or folder. Leave the Value column field blank. @@ -428,7 +428,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting controls when background synchronization occurs while operating in slow-link mode, and applies to any user who logs onto the specified machine while this policy is in effect. To control slow-link mode, use the "Configure slow-link mode" policy setting. +Available in the latest Windows 10 Insider Preview Build. This policy setting controls when background synchronization occurs while operating in slow-link mode, and applies to any user who logs onto the specified machine while this policy is in effect. To control slow-link mode, use the "Configure slow-link mode" policy setting. If you enable this policy setting, you can control when Windows synchronizes in the background while operating in slow-link mode. Use the 'Sync Interval' and 'Sync Variance' values to override the default sync interval and variance settings. Use 'Blockout Start Time' and 'Blockout Duration' to set a period of time where background sync is disabled. Use the 'Maximum Allowed Time Without A Sync' value to ensure that all network folders on the machine are synchronized with the server on a regular basis. @@ -499,7 +499,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting limits the amount of disk space that can be used to store offline files. This includes the space used by automatically cached files and files that are specifically made available offline. Files can be automatically cached if the user accesses a file on an automatic caching network share. +Available in the latest Windows 10 Insider Preview Build. This policy setting limits the amount of disk space that can be used to store offline files. This includes the space used by automatically cached files and files that are specifically made available offline. Files can be automatically cached if the user accesses a file on an automatic caching network share. This setting also disables the ability to adjust, through the Offline Files control panel applet, the disk space limits on the Offline Files cache. This prevents users from trying to change the option while a policy setting controls it. @@ -580,7 +580,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting determines whether network files remain available if the computer is suddenly disconnected from the server hosting the files. +Available in the latest Windows 10 Insider Preview Build. This policy setting determines whether network files remain available if the computer is suddenly disconnected from the server hosting the files. This setting also disables the "When a network connection is lost" option on the Offline Files tab. This prevents users from trying to change the option while a setting controls it. @@ -664,7 +664,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting determines whether network files remain available if the computer is suddenly disconnected from the server hosting the files. +Available in the latest Windows 10 Insider Preview Build. This policy setting determines whether network files remain available if the computer is suddenly disconnected from the server hosting the files. This setting also disables the "When a network connection is lost" option on the Offline Files tab. This prevents users from trying to change the option while a setting controls it. @@ -748,7 +748,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. Limits the percentage of the computer's disk space that can be used to store automatically cached offline files. +Available in the latest Windows 10 Insider Preview Build. Limits the percentage of the computer's disk space that can be used to store automatically cached offline files. This setting also disables the "Amount of disk space to use for temporary offline files" option on the Offline Files tab. This prevents users from trying to change the option while a setting controls it. @@ -828,7 +828,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185.This policy setting determines whether the Offline Files feature is enabled. Offline Files saves a copy of network files on the user's computer for use when the computer is not connected to the network. +Available in the latest Windows 10 Insider Preview Build.This policy setting determines whether the Offline Files feature is enabled. Offline Files saves a copy of network files on the user's computer for use when the computer is not connected to the network. If you enable this policy setting, Offline Files is enabled and users cannot disable it. @@ -902,7 +902,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting determines whether offline files are encrypted. +Available in the latest Windows 10 Insider Preview Build. This policy setting determines whether offline files are encrypted. Offline files are locally cached copies of files from a network share. Encrypting this cache reduces the likelihood that a user could access files from the Offline Files cache without proper permissions. @@ -979,7 +979,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting determines which events the Offline Files feature records in the event log. +Available in the latest Windows 10 Insider Preview Build. This policy setting determines which events the Offline Files feature records in the event log. Offline Files records events in the Application log in Event Viewer when it detects errors. By default, Offline Files records an event only when the offline files storage cache is corrupted. However, you can use this setting to specify additional events you want Offline Files to record. @@ -1059,7 +1059,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting determines which events the Offline Files feature records in the event log. +Available in the latest Windows 10 Insider Preview Build. This policy setting determines which events the Offline Files feature records in the event log. Offline Files records events in the Application log in Event Viewer when it detects errors. By default, Offline Files records an event only when the offline files storage cache is corrupted. However, you can use this setting to specify additional events you want Offline Files to record. @@ -1139,7 +1139,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting enables administrators to block certain file types from being created in the folders that have been made available offline. +Available in the latest Windows 10 Insider Preview Build. This policy setting enables administrators to block certain file types from being created in the folders that have been made available offline. If you enable this policy setting, a user will be unable to create files with the specified file extensions in any of the folders that have been made available offline. @@ -1208,7 +1208,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. Lists types of files that cannot be used offline. +Available in the latest Windows 10 Insider Preview Build. Lists types of files that cannot be used offline. This setting lets you exclude certain types of files from automatic and manual caching for offline use. The system does not cache files of the type specified in this setting even when they reside on a network share configured for automatic caching. Also, if users try to make a file of this type available offline, the operation will fail and the following message will be displayed in the Synchronization Manager progress dialog box: "Files of this type cannot be made available offline." @@ -1282,7 +1282,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting determines whether network files remain available if the computer is suddenly disconnected from the server hosting the files. +Available in the latest Windows 10 Insider Preview Build. This policy setting determines whether network files remain available if the computer is suddenly disconnected from the server hosting the files. This setting also disables the "When a network connection is lost" option on the Offline Files tab. This prevents users from trying to change the option while a setting controls it. @@ -1366,7 +1366,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting determines whether network files remain available if the computer is suddenly disconnected from the server hosting the files. +Available in the latest Windows 10 Insider Preview Build. This policy setting determines whether network files remain available if the computer is suddenly disconnected from the server hosting the files. This setting also disables the "When a network connection is lost" option on the Offline Files tab. This prevents users from trying to change the option while a setting controls it. @@ -1450,7 +1450,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting disables the Offline Files folder. +Available in the latest Windows 10 Insider Preview Build. This policy setting disables the Offline Files folder. This setting disables the "View Files" button on the Offline Files tab. As a result, users cannot use the Offline Files folder to view or open copies of network files stored on their computer. Also, they cannot use the folder to view characteristics of offline files, such as their server status, type, or location. @@ -1524,7 +1524,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting disables the Offline Files folder. +Available in the latest Windows 10 Insider Preview Build. This policy setting disables the Offline Files folder. This setting disables the "View Files" button on the Offline Files tab. As a result, users cannot use the Offline Files folder to view or open copies of network files stored on their computer. Also, they cannot use the folder to view characteristics of offline files, such as their server status, type, or location. @@ -1598,7 +1598,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting prevents users from enabling, disabling, or changing the configuration of Offline Files. +Available in the latest Windows 10 Insider Preview Build. This policy setting prevents users from enabling, disabling, or changing the configuration of Offline Files. This setting removes the Offline Files tab from the Folder Options dialog box. It also removes the Settings item from the Offline Files context menu and disables the Settings button on the Offline Files Status dialog box. As a result, users cannot view or change the options on the Offline Files tab or Offline Files dialog box. @@ -1672,7 +1672,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting prevents users from enabling, disabling, or changing the configuration of Offline Files. +Available in the latest Windows 10 Insider Preview Build. This policy setting prevents users from enabling, disabling, or changing the configuration of Offline Files. This setting removes the Offline Files tab from the Folder Options dialog box. It also removes the Settings item from the Offline Files context menu and disables the Settings button on the Offline Files Status dialog box. As a result, users cannot view or change the options on the Offline Files tab or Offline Files dialog box. @@ -1746,7 +1746,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting prevents users from making network files and folders available offline. +Available in the latest Windows 10 Insider Preview Build. This policy setting prevents users from making network files and folders available offline. If you enable this policy setting, users cannot designate files to be saved on their computer for offline use. However, Windows will still cache local copies of files that reside on network shares designated for automatic caching. @@ -1819,7 +1819,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting prevents users from making network files and folders available offline. +Available in the latest Windows 10 Insider Preview Build. This policy setting prevents users from making network files and folders available offline. If you enable this policy setting, users cannot designate files to be saved on their computer for offline use. However, Windows will still cache local copies of files that reside on network shares designated for automatic caching. @@ -1892,7 +1892,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to manage a list of files and folders for which you want to block the "Make Available Offline" command. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to manage a list of files and folders for which you want to block the "Make Available Offline" command. If you enable this policy setting, the "Make Available Offline" command is not available for the files and folders that you list. To specify these files and folders, click Show. In the Show Contents dialog box, in the Value Name column box, type the fully qualified UNC path to the file or folder. Leave the Value column field blank. @@ -1969,7 +1969,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to manage a list of files and folders for which you want to block the "Make Available Offline" command. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to manage a list of files and folders for which you want to block the "Make Available Offline" command. If you enable this policy setting, the "Make Available Offline" command is not available for the files and folders that you list. To specify these files and folders, click Show. In the Show Contents dialog box, in the Value Name column box, type the fully qualified UNC path to the file or folder. Leave the Value column field blank. @@ -2046,7 +2046,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. Hides or displays reminder balloons, and prevents users from changing the setting. +Available in the latest Windows 10 Insider Preview Build. Hides or displays reminder balloons, and prevents users from changing the setting. Reminder balloons appear above the Offline Files icon in the notification area to notify users when they have lost the connection to a networked file and are working on a local copy of the file. Users can then decide how to proceed. @@ -2126,7 +2126,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. Hides or displays reminder balloons, and prevents users from changing the setting. +Available in the latest Windows 10 Insider Preview Build. Hides or displays reminder balloons, and prevents users from changing the setting. Reminder balloons appear above the Offline Files icon in the notification area to notify users when they have lost the connection to a networked file and are working on a local copy of the file. Users can then decide how to proceed. @@ -2206,7 +2206,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting controls whether files read from file shares over a slow network are transparently cached in the Offline Files cache for future reads. When a user tries to access a file that has been transparently cached, Windows reads from the cached copy after verifying its integrity. This improves end-user response times and decreases bandwidth consumption over WAN links. +Available in the latest Windows 10 Insider Preview Build. This policy setting controls whether files read from file shares over a slow network are transparently cached in the Offline Files cache for future reads. When a user tries to access a file that has been transparently cached, Windows reads from the cached copy after verifying its integrity. This improves end-user response times and decreases bandwidth consumption over WAN links. The cached files are temporary and are not available to the user when offline. The cached files are not kept in sync with the version on the server, and the most current version from the server is always available for subsequent reads. @@ -2279,7 +2279,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting makes subfolders available offline whenever their parent folder is made available offline. +Available in the latest Windows 10 Insider Preview Build. This policy setting makes subfolders available offline whenever their parent folder is made available offline. This setting automatically extends the "make available offline" setting to all new and existing subfolders of a folder. Users do not have the option of excluding subfolders. @@ -2350,7 +2350,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting deletes local copies of the user's offline files when the user logs off. +Available in the latest Windows 10 Insider Preview Build. This policy setting deletes local copies of the user's offline files when the user logs off. This setting specifies that automatically and manually cached offline files are retained only while the user is logged on to the computer. When the user logs off, the system deletes all local copies of offline files. @@ -2422,7 +2422,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to turn on economical application of administratively assigned Offline Files. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to turn on economical application of administratively assigned Offline Files. If you enable or do not configure this policy setting, only new files and folders in administratively assigned folders are synchronized at logon. Files and folders that are already available offline are skipped and are synchronized later. @@ -2491,7 +2491,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting determines how often reminder balloon updates appear. +Available in the latest Windows 10 Insider Preview Build. This policy setting determines how often reminder balloon updates appear. If you enable this setting, you can select how often reminder balloons updates appear and also prevent users from changing this setting. @@ -2565,7 +2565,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting determines how often reminder balloon updates appear. +Available in the latest Windows 10 Insider Preview Build. This policy setting determines how often reminder balloon updates appear. If you enable this setting, you can select how often reminder balloons updates appear and also prevent users from changing this setting. @@ -2639,7 +2639,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting determines how long the first reminder balloon for a network status change is displayed. +Available in the latest Windows 10 Insider Preview Build. This policy setting determines how long the first reminder balloon for a network status change is displayed. Reminder balloons appear when the user's connection to a network file is lost or reconnected, and they are updated periodically. By default, the first reminder for an event is displayed for 30 seconds. Then, updates appear every 60 minutes and are displayed for 15 seconds. You can use this setting to change the duration of the first reminder. @@ -2708,7 +2708,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting determines how long the first reminder balloon for a network status change is displayed. +Available in the latest Windows 10 Insider Preview Build. This policy setting determines how long the first reminder balloon for a network status change is displayed. Reminder balloons appear when the user's connection to a network file is lost or reconnected, and they are updated periodically. By default, the first reminder for an event is displayed for 30 seconds. Then, updates appear every 60 minutes and are displayed for 15 seconds. You can use this setting to change the duration of the first reminder. @@ -2777,7 +2777,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting determines how long updated reminder balloons are displayed. +Available in the latest Windows 10 Insider Preview Build. This policy setting determines how long updated reminder balloons are displayed. Reminder balloons appear when the user's connection to a network file is lost or reconnected, and they are updated periodically. By default, the first reminder for an event is displayed for 30 seconds. Then, updates appear every 60 minutes and are displayed for 15 seconds. You can use this setting to change the duration of the update reminder. @@ -2846,7 +2846,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting determines how long updated reminder balloons are displayed. +Available in the latest Windows 10 Insider Preview Build. This policy setting determines how long updated reminder balloons are displayed. Reminder balloons appear when the user's connection to a network file is lost or reconnected, and they are updated periodically. By default, the first reminder for an event is displayed for 30 seconds. Then, updates appear every 60 minutes and are displayed for 15 seconds. You can use this setting to change the duration of the update reminder. @@ -2915,7 +2915,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting controls the network latency and throughput thresholds that will cause a client computers to transition files and folders that are already available offline to the slow-link mode so that the user's access to this data is not degraded due to network slowness. When Offline Files is operating in the slow-link mode, all network file requests are satisfied from the Offline Files cache. This is similar to a user working offline. +Available in the latest Windows 10 Insider Preview Build. This policy setting controls the network latency and throughput thresholds that will cause a client computers to transition files and folders that are already available offline to the slow-link mode so that the user's access to this data is not degraded due to network slowness. When Offline Files is operating in the slow-link mode, all network file requests are satisfied from the Offline Files cache. This is similar to a user working offline. If you enable this policy setting, Offline Files uses the slow-link mode if the network throughput between the client and the server is below (slower than) the Throughput threshold parameter, or if the round-trip network latency is above (slower than) the Latency threshold parameter. @@ -2994,7 +2994,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the threshold value at which Offline Files considers a network connection to be "slow". Any network speed below this value is considered to be slow. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the threshold value at which Offline Files considers a network connection to be "slow". Any network speed below this value is considered to be slow. When a connection is considered slow, Offline Files automatically adjust its behavior to avoid excessive synchronization traffic and will not automatically reconnect to a server when the presence of a server is detected. @@ -3068,7 +3068,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting determines whether offline files are fully synchronized when users log off. +Available in the latest Windows 10 Insider Preview Build. This policy setting determines whether offline files are fully synchronized when users log off. This setting also disables the "Synchronize all offline files before logging off" option on the Offline Files tab. This prevents users from trying to change the option while a setting controls it. @@ -3146,7 +3146,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting determines whether offline files are fully synchronized when users log off. +Available in the latest Windows 10 Insider Preview Build. This policy setting determines whether offline files are fully synchronized when users log off. This setting also disables the "Synchronize all offline files before logging off" option on the Offline Files tab. This prevents users from trying to change the option while a setting controls it. @@ -3224,7 +3224,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting determines whether offline files are fully synchronized when users log on. +Available in the latest Windows 10 Insider Preview Build. This policy setting determines whether offline files are fully synchronized when users log on. This setting also disables the "Synchronize all offline files before logging on" option on the Offline Files tab. This prevents users from trying to change the option while a setting controls it. @@ -3304,7 +3304,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting determines whether offline files are fully synchronized when users log on. +Available in the latest Windows 10 Insider Preview Build. This policy setting determines whether offline files are fully synchronized when users log on. This setting also disables the "Synchronize all offline files before logging on" option on the Offline Files tab. This prevents users from trying to change the option while a setting controls it. @@ -3382,7 +3382,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting determines whether offline files are synchronized before a computer is suspended. +Available in the latest Windows 10 Insider Preview Build. This policy setting determines whether offline files are synchronized before a computer is suspended. If you enable this setting, offline files are synchronized whenever the computer is suspended. Setting the synchronization action to "Quick" ensures only that all files in the cache are complete. Setting the synchronization action to "Full" ensures that all cached files and folders are up-to-date with the most current version. @@ -3454,7 +3454,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting determines whether offline files are synchronized before a computer is suspended. +Available in the latest Windows 10 Insider Preview Build. This policy setting determines whether offline files are synchronized before a computer is suspended. If you enable this setting, offline files are synchronized whenever the computer is suspended. Setting the synchronization action to "Quick" ensures only that all files in the cache are complete. Setting the synchronization action to "Full" ensures that all cached files and folders are up-to-date with the most current version. @@ -3526,7 +3526,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting determines whether offline files are synchronized in the background when it could result in extra charges on cell phone or broadband plans. +Available in the latest Windows 10 Insider Preview Build. This policy setting determines whether offline files are synchronized in the background when it could result in extra charges on cell phone or broadband plans. If you enable this setting, synchronization can occur in the background when the user's network is roaming, near, or over the plan's data limit. This may result in extra charges on cell phone or broadband plans. @@ -3595,7 +3595,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting removes the "Work offline" command from Explorer, preventing users from manually changing whether Offline Files is in online mode or offline mode. +Available in the latest Windows 10 Insider Preview Build. This policy setting removes the "Work offline" command from Explorer, preventing users from manually changing whether Offline Files is in online mode or offline mode. If you enable this policy setting, the "Work offline" command is not displayed in File Explorer. @@ -3664,7 +3664,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting removes the "Work offline" command from Explorer, preventing users from manually changing whether Offline Files is in online mode or offline mode. +Available in the latest Windows 10 Insider Preview Build. This policy setting removes the "Work offline" command from Explorer, preventing users from manually changing whether Offline Files is in online mode or offline mode. If you enable this policy setting, the "Work offline" command is not displayed in File Explorer. From f7464d8ae463afe8a5c93e059a847371f6fedb5c Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Tue, 29 Dec 2020 12:32:01 -0800 Subject: [PATCH 43/47] Updated availability verbiage --- .../mdm/policy-csp-admx-peertopeercaching.md | 18 +- .../policy-csp-admx-performancediagnostics.md | 8 +- .../mdm/policy-csp-admx-reliability.md | 8 +- .../mdm/policy-csp-admx-scripts.md | 24 +- .../mdm/policy-csp-admx-sdiageng.md | 6 +- .../mdm/policy-csp-admx-securitycenter.md | 2 +- .../mdm/policy-csp-admx-servicing.md | 2 +- .../mdm/policy-csp-admx-sharedfolders.md | 4 +- .../mdm/policy-csp-admx-sharing.md | 2 +- ...csp-admx-shellcommandpromptregedittools.md | 8 +- .../mdm/policy-csp-admx-smartcard.md | 32 +-- .../mdm/policy-csp-admx-snmp.md | 6 +- .../mdm/policy-csp-admx-systemrestore.md | 2 +- .../mdm/policy-csp-admx-tcpip.md | 26 +- .../mdm/policy-csp-admx-thumbnails.md | 6 +- .../mdm/policy-csp-admx-tpm.md | 20 +- ...y-csp-admx-userexperiencevirtualization.md | 252 +++++++++--------- .../mdm/policy-csp-admx-w32time.md | 8 +- .../mdm/policy-csp-admx-wincal.md | 4 +- .../policy-csp-admx-windowsanytimeupgrade.md | 2 +- .../mdm/policy-csp-admx-windowsconnectnow.md | 6 +- .../mdm/policy-csp-admx-windowsmediadrm.md | 2 +- .../mdm/policy-csp-admx-windowsmediaplayer.md | 42 +-- .../mdm/policy-csp-admx-wininit.md | 6 +- 24 files changed, 248 insertions(+), 248 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-admx-peertopeercaching.md b/windows/client-management/mdm/policy-csp-admx-peertopeercaching.md index 426fcbe069..54b15aabfb 100644 --- a/windows/client-management/mdm/policy-csp-admx-peertopeercaching.md +++ b/windows/client-management/mdm/policy-csp-admx-peertopeercaching.md @@ -97,7 +97,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies whether BranchCache is enabled on client computers to which this policy is applied. In addition to this policy setting, you must specify whether the client computers are hosted cache mode or distributed cache mode clients. To do so, configure one of the following the policy settings: +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies whether BranchCache is enabled on client computers to which this policy is applied. In addition to this policy setting, you must specify whether the client computers are hosted cache mode or distributed cache mode clients. To do so, configure one of the following the policy settings: - Set BranchCache Distributed Cache mode - Set BranchCache Hosted Cache mode @@ -177,7 +177,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies whether BranchCache distributed cache mode is enabled on client computers to which this policy is applied. In addition to this policy, you must use the policy "Turn on BranchCache" to enable BranchCache on client computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies whether BranchCache distributed cache mode is enabled on client computers to which this policy is applied. In addition to this policy, you must use the policy "Turn on BranchCache" to enable BranchCache on client computers. In distributed cache mode, client computers download content from BranchCache-enabled main office content servers, cache the content locally, and serve the content to other BranchCache distributed cache mode clients in the branch office. @@ -255,7 +255,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies whether BranchCache hosted cache mode is enabled on client computers to which this policy is applied. In addition to this policy, you must use the policy "Turn on BranchCache" to enable BranchCache on client computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies whether BranchCache hosted cache mode is enabled on client computers to which this policy is applied. In addition to this policy, you must use the policy "Turn on BranchCache" to enable BranchCache on client computers. When a client computer is configured as a hosted cache mode client, it is able to download cached content from a hosted cache server that is located at the branch office. In addition, when the hosted cache client obtains content from a content server, the client can upload the content to the hosted cache server for access by other hosted cache clients at the branch office. @@ -339,7 +339,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies whether client computers should attempt the automatic configuration of hosted cache mode by searching for hosted cache servers publishing service connection points that are associated with the client's current Active Directory site. If you enable this policy setting, client computers to which the policy setting is applied search for hosted cache servers using Active Directory, and will prefer both these servers and hosted cache mode rather than manual BranchCache configuration or BranchCache configuration by other group policies. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies whether client computers should attempt the automatic configuration of hosted cache mode by searching for hosted cache servers publishing service connection points that are associated with the client's current Active Directory site. If you enable this policy setting, client computers to which the policy setting is applied search for hosted cache servers using Active Directory, and will prefer both these servers and hosted cache mode rather than manual BranchCache configuration or BranchCache configuration by other group policies. If you enable this policy setting in addition to the "Turn on BranchCache" policy setting, BranchCache clients attempt to discover hosted cache servers in the local branch office. If client computers detect hosted cache servers, hosted cache mode is turned on. If they do not detect hosted cache servers, hosted cache mode is not turned on, and the client uses any other configuration that is specified manually or by Group Policy. @@ -426,7 +426,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies whether client computers are configured to use hosted cache mode and provides the computer name of the hosted cache servers that are available to the client computers. Hosted cache mode enables client computers in branch offices to retrieve content from one or more hosted cache servers that are installed in the same office location. You can use this setting to automatically configure client computers that are configured for hosted cache mode with the computer names of the hosted cache servers in the branch office. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies whether client computers are configured to use hosted cache mode and provides the computer name of the hosted cache servers that are available to the client computers. Hosted cache mode enables client computers in branch offices to retrieve content from one or more hosted cache servers that are installed in the same office location. You can use this setting to automatically configure client computers that are configured for hosted cache mode with the computer names of the hosted cache servers in the branch office. If you enable this policy setting and specify valid computer names of hosted cache servers, hosted cache mode is enabled for all client computers to which the policy setting is applied. For this policy setting to take effect, you must also enable the "Turn on BranchCache" policy setting. @@ -509,7 +509,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting is used only when you have deployed one or more BranchCache-enabled file servers at your main office. This policy setting specifies when client computers in branch offices start caching content from file servers based on the network latency - or delay - that occurs when the clients download content from the main office over a Wide Area Network (WAN) link. When you configure a value for this setting, which is the maximum round trip network latency allowed before caching begins, clients do not cache content until the network latency reaches the specified value; when network latency is greater than the value, clients begin caching content after they receive it from the file servers. +Available in the latest Windows 10 Insider Preview Build. This policy setting is used only when you have deployed one or more BranchCache-enabled file servers at your main office. This policy setting specifies when client computers in branch offices start caching content from file servers based on the network latency - or delay - that occurs when the clients download content from the main office over a Wide Area Network (WAN) link. When you configure a value for this setting, which is the maximum round trip network latency allowed before caching begins, clients do not cache content until the network latency reaches the specified value; when network latency is greater than the value, clients begin caching content after they receive it from the file servers. Policy configuration @@ -586,7 +586,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies the default percentage of total disk space that is allocated for the BranchCache disk cache on client computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies the default percentage of total disk space that is allocated for the BranchCache disk cache on client computers. If you enable this policy setting, you can configure the percentage of total disk space to allocate for the cache. @@ -670,7 +670,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies the default age in days for which segments are valid in the BranchCache data cache on client computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies the default age in days for which segments are valid in the BranchCache data cache on client computers. If you enable this policy setting, you can configure the age for segments in the data cache. @@ -751,7 +751,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies whether BranchCache-capable client computers operate in a downgraded mode in order to maintain compatibility with previous versions of BranchCache. If client computers do not use the same BranchCache version, cache efficiency might be reduced because client computers that are using different versions of BranchCache might store cache data in incompatible formats. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies whether BranchCache-capable client computers operate in a downgraded mode in order to maintain compatibility with previous versions of BranchCache. If client computers do not use the same BranchCache version, cache efficiency might be reduced because client computers that are using different versions of BranchCache might store cache data in incompatible formats. If you enable this policy setting, all clients use the version of BranchCache that you specify in "Select from the following versions." diff --git a/windows/client-management/mdm/policy-csp-admx-performancediagnostics.md b/windows/client-management/mdm/policy-csp-admx-performancediagnostics.md index f02fb046cc..fe3507834c 100644 --- a/windows/client-management/mdm/policy-csp-admx-performancediagnostics.md +++ b/windows/client-management/mdm/policy-csp-admx-performancediagnostics.md @@ -83,7 +83,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting determines the execution level for Windows Boot Performance Diagnostics. +Available in the latest Windows 10 Insider Preview Build. This policy setting determines the execution level for Windows Boot Performance Diagnostics. If you enable this policy setting, you must select an execution level from the dropdown menu. If you select problem detection and troubleshooting only, the Diagnostic Policy Service (DPS) will detect Windows Boot Performance problems and attempt to determine their root causes. These root causes will be logged to the event log when detected, but no corrective action will be taken. If you select detection, troubleshooting and resolution, the DPS will detect Windows Boot Performance problems and indicate to the user that assisted resolution is available. @@ -160,7 +160,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. Determines the execution level for Windows Standby/Resume Performance Diagnostics. +Available in the latest Windows 10 Insider Preview Build. Determines the execution level for Windows Standby/Resume Performance Diagnostics. If you enable this policy setting, you must select an execution level from the dropdown menu. If you select problem detection and troubleshooting only, the Diagnostic Policy Service (DPS) will detect Windows Standby/Resume Performance problems and attempt to determine their root causes. These root causes will be logged to the event log when detected, but no corrective action will be taken. If you select detection, troubleshooting and resolution, the DPS will detect Windows Standby/Resume Performance problems and indicate to the user that assisted resolution is available. @@ -237,7 +237,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting determines the execution level for Windows Shutdown Performance Diagnostics. +Available in the latest Windows 10 Insider Preview Build. This policy setting determines the execution level for Windows Shutdown Performance Diagnostics. If you enable this policy setting, you must select an execution level from the dropdown menu. If you select problem detection and troubleshooting only, the Diagnostic Policy Service (DPS) will detect Windows Shutdown Performance problems and attempt to determine their root causes. These root causes will be logged to the event log when detected, but no corrective action will be taken. If you select detection, troubleshooting and resolution, the DPS will detect Windows Shutdown Performance problems and indicate to the user that assisted resolution is available. @@ -314,7 +314,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. Determines the execution level for Windows Standby/Resume Performance Diagnostics. +Available in the latest Windows 10 Insider Preview Build. Determines the execution level for Windows Standby/Resume Performance Diagnostics. If you enable this policy setting, you must select an execution level from the dropdown menu. If you select problem detection and troubleshooting only, the Diagnostic Policy Service (DPS) will detect Windows Standby/Resume Performance problems and attempt to determine their root causes. These root causes will be logged to the event log when detected, but no corrective action will be taken. If you select detection, troubleshooting and resolution, the DPS will detect Windows Standby/Resume Performance problems and indicate to the user that assisted resolution is available. diff --git a/windows/client-management/mdm/policy-csp-admx-reliability.md b/windows/client-management/mdm/policy-csp-admx-reliability.md index e466f85f86..5db45b394d 100644 --- a/windows/client-management/mdm/policy-csp-admx-reliability.md +++ b/windows/client-management/mdm/policy-csp-admx-reliability.md @@ -83,7 +83,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting allows the system to detect the time of unexpected shutdowns by writing the current time to disk on a schedule controlled by the Timestamp Interval. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows the system to detect the time of unexpected shutdowns by writing the current time to disk on a schedule controlled by the Timestamp Interval. If you enable this policy setting, you are able to specify how often the Persistent System Timestamp is refreshed and subsequently written to the disk. You can specify the Timestamp Interval in seconds. @@ -159,7 +159,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting controls whether or not unplanned shutdown events can be reported when error reporting is enabled. +Available in the latest Windows 10 Insider Preview Build. This policy setting controls whether or not unplanned shutdown events can be reported when error reporting is enabled. If you enable this policy setting, error reporting includes unplanned shutdown events. @@ -234,7 +234,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting defines when the Shutdown Event Tracker System State Data feature is activated. +Available in the latest Windows 10 Insider Preview Build. This policy setting defines when the Shutdown Event Tracker System State Data feature is activated. The system state data file contains information about the basic system state as well as the state of all running processes. @@ -312,7 +312,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. The Shutdown Event Tracker can be displayed when you shut down a workstation or server. This is an extra set of questions that is displayed when you invoke a shutdown to collect information related to why you are shutting down the computer. +Available in the latest Windows 10 Insider Preview Build. The Shutdown Event Tracker can be displayed when you shut down a workstation or server. This is an extra set of questions that is displayed when you invoke a shutdown to collect information related to why you are shutting down the computer. If you enable this setting and choose "Always" from the drop-down menu list, the Shutdown Event Tracker is displayed when the computer shuts down. diff --git a/windows/client-management/mdm/policy-csp-admx-scripts.md b/windows/client-management/mdm/policy-csp-admx-scripts.md index 7f655514ef..1a7df80d7f 100644 --- a/windows/client-management/mdm/policy-csp-admx-scripts.md +++ b/windows/client-management/mdm/policy-csp-admx-scripts.md @@ -107,7 +107,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting allows user logon scripts to run when the logon cross-forest, DNS suffixes are not configured, and NetBIOS or WINS is disabled. This policy setting affects all user accounts interactively logging on to the computer. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows user logon scripts to run when the logon cross-forest, DNS suffixes are not configured, and NetBIOS or WINS is disabled. This policy setting affects all user accounts interactively logging on to the computer. If you enable this policy setting, user logon scripts run if NetBIOS or WINS is disabled during cross-forest logons without the DNS suffixes being configured. @@ -176,7 +176,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting determines how long the system waits for scripts applied by Group Policy to run. +Available in the latest Windows 10 Insider Preview Build. This policy setting determines how long the system waits for scripts applied by Group Policy to run. This setting limits the total time allowed for all logon, logoff, startup, and shutdown scripts applied by Group Policy to finish running. If the scripts have not finished running when the specified time expires, the system stops script processing and records an error event. @@ -251,7 +251,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting determines whether Windows PowerShell scripts are run before non-Windows PowerShell scripts during computer startup and shutdown. By default, Windows PowerShell scripts run after non-Windows PowerShell scripts. +Available in the latest Windows 10 Insider Preview Build. This policy setting determines whether Windows PowerShell scripts are run before non-Windows PowerShell scripts during computer startup and shutdown. By default, Windows PowerShell scripts run after non-Windows PowerShell scripts. If you enable this policy setting, within each applicable Group Policy Object (GPO), Windows PowerShell scripts are run before non-Windows PowerShell scripts during computer startup and shutdown. @@ -343,7 +343,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting hides the instructions in logon scripts written for Windows NT 4.0 and earlier. +Available in the latest Windows 10 Insider Preview Build. This policy setting hides the instructions in logon scripts written for Windows NT 4.0 and earlier. Logon scripts are batch files of instructions that run when the user logs on. By default, Windows 2000 displays the instructions in logon scripts written for Windows NT 4.0 and earlier in a command window as they run, although it does not display logon scripts written for Windows 2000. @@ -416,7 +416,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting displays the instructions in logoff scripts as they run. +Available in the latest Windows 10 Insider Preview Build. This policy setting displays the instructions in logoff scripts as they run. Logoff scripts are batch files of instructions that run when the user logs off. By default, the system does not display the instructions in the logoff script. @@ -487,7 +487,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting directs the system to wait for logon scripts to finish running before it starts the File Explorer interface program and creates the desktop. +Available in the latest Windows 10 Insider Preview Build. This policy setting directs the system to wait for logon scripts to finish running before it starts the File Explorer interface program and creates the desktop. If you enable this policy setting, File Explorer does not start until the logon scripts have finished running. This policy setting ensures that logon script processing is complete before the user starts working, but it can delay the appearance of the desktop. @@ -558,7 +558,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting directs the system to wait for logon scripts to finish running before it starts the File Explorer interface program and creates the desktop. +Available in the latest Windows 10 Insider Preview Build. This policy setting directs the system to wait for logon scripts to finish running before it starts the File Explorer interface program and creates the desktop. If you enable this policy setting, File Explorer does not start until the logon scripts have finished running. This policy setting ensures that logon script processing is complete before the user starts working, but it can delay the appearance of the desktop. @@ -629,7 +629,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting displays the instructions in logon scripts as they run. +Available in the latest Windows 10 Insider Preview Build. This policy setting displays the instructions in logon scripts as they run. Logon scripts are batch files of instructions that run when the user logs on. By default, the system does not display the instructions in logon scripts. @@ -700,7 +700,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting displays the instructions in shutdown scripts as they run. +Available in the latest Windows 10 Insider Preview Build. This policy setting displays the instructions in shutdown scripts as they run. Shutdown scripts are batch files of instructions that run when the user restarts the system or shuts it down. By default, the system does not display the instructions in the shutdown script. @@ -771,7 +771,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting lets the system run startup scripts simultaneously. +Available in the latest Windows 10 Insider Preview Build. This policy setting lets the system run startup scripts simultaneously. Startup scripts are batch files that run before the user is invited to log on. By default, the system waits for each startup script to complete before it runs the next startup script. @@ -845,7 +845,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting displays the instructions in startup scripts as they run. +Available in the latest Windows 10 Insider Preview Build. This policy setting displays the instructions in startup scripts as they run. Startup scripts are batch files of instructions that run before the user is invited to log on. By default, the system does not display the instructions in the startup script. @@ -920,7 +920,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting determines whether Windows PowerShell scripts are run before non-Windows PowerShell scripts during user logon and logoff. By default, Windows PowerShell scripts run after non-Windows PowerShell scripts. +Available in the latest Windows 10 Insider Preview Build. This policy setting determines whether Windows PowerShell scripts are run before non-Windows PowerShell scripts during user logon and logoff. By default, Windows PowerShell scripts run after non-Windows PowerShell scripts. If you enable this policy setting, within each applicable Group Policy Object (GPO), PowerShell scripts are run before non-PowerShell scripts during user logon and logoff. diff --git a/windows/client-management/mdm/policy-csp-admx-sdiageng.md b/windows/client-management/mdm/policy-csp-admx-sdiageng.md index ce4096ecc5..bc7b4bc48a 100644 --- a/windows/client-management/mdm/policy-csp-admx-sdiageng.md +++ b/windows/client-management/mdm/policy-csp-admx-sdiageng.md @@ -80,7 +80,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting allows users who are connected to the Internet to access and search troubleshooting content that is hosted on Microsoft content servers. Users can access online troubleshooting content from within the Troubleshooting Control Panel UI by clicking "Yes" when they are prompted by a message that states, "Do you want the most up-to-date troubleshooting content?" +Available in the latest Windows 10 Insider Preview Build. This policy setting allows users who are connected to the Internet to access and search troubleshooting content that is hosted on Microsoft content servers. Users can access online troubleshooting content from within the Troubleshooting Control Panel UI by clicking "Yes" when they are prompted by a message that states, "Do you want the most up-to-date troubleshooting content?" If you enable or do not configure this policy setting, users who are connected to the Internet can access and search troubleshooting content that is hosted on Microsoft content servers from within the Troubleshooting Control Panel user interface. @@ -149,7 +149,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows users to access and run the troubleshooting tools that are available in the Troubleshooting Control Panel and to run the troubleshooting wizard to troubleshoot problems on their computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows users to access and run the troubleshooting tools that are available in the Troubleshooting Control Panel and to run the troubleshooting wizard to troubleshoot problems on their computers. If you enable or do not configure this policy setting, users can access and run the troubleshooting tools from the Troubleshooting Control Panel. @@ -220,7 +220,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting determines whether scripted diagnostics will execute diagnostic packages that are signed by untrusted publishers. +Available in the latest Windows 10 Insider Preview Build. This policy setting determines whether scripted diagnostics will execute diagnostic packages that are signed by untrusted publishers. If you enable this policy setting, the scripted diagnostics execution engine validates the signer of any diagnostic package and runs only those signed by trusted publishers. diff --git a/windows/client-management/mdm/policy-csp-admx-securitycenter.md b/windows/client-management/mdm/policy-csp-admx-securitycenter.md index 3f963a77cb..5016dd12b2 100644 --- a/windows/client-management/mdm/policy-csp-admx-securitycenter.md +++ b/windows/client-management/mdm/policy-csp-admx-securitycenter.md @@ -74,7 +74,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies whether Security Center is turned on or off for computers that are joined to an Active Directory domain. When Security Center is turned on, it monitors essential security settings and notifies the user when the computer might be at risk. The Security Center Control Panel category view also contains a status section, where the user can get recommendations to help increase the computer's security. When Security Center is not enabled on the domain, neither the notifications nor the Security Center status section are displayed. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies whether Security Center is turned on or off for computers that are joined to an Active Directory domain. When Security Center is turned on, it monitors essential security settings and notifies the user when the computer might be at risk. The Security Center Control Panel category view also contains a status section, where the user can get recommendations to help increase the computer's security. When Security Center is not enabled on the domain, neither the notifications nor the Security Center status section are displayed. Note that Security Center can only be turned off for computers that are joined to a Windows domain. When a computer is not joined to a Windows domain, the policy setting will have no effect. diff --git a/windows/client-management/mdm/policy-csp-admx-servicing.md b/windows/client-management/mdm/policy-csp-admx-servicing.md index c18852e5ea..c2738859de 100644 --- a/windows/client-management/mdm/policy-csp-admx-servicing.md +++ b/windows/client-management/mdm/policy-csp-admx-servicing.md @@ -74,7 +74,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies the network locations that will be used for the repair of operating system corruption and for enabling optional features that have had their payload files removed. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies the network locations that will be used for the repair of operating system corruption and for enabling optional features that have had their payload files removed. If you enable this policy setting and specify the new location, the files in that location will be used to repair operating system corruption and for enabling optional features that have had their payload files removed. You must enter the fully qualified path to the new location in the ""Alternate source file path"" text box. Multiple locations can be specified when each path is separated by a semicolon. diff --git a/windows/client-management/mdm/policy-csp-admx-sharedfolders.md b/windows/client-management/mdm/policy-csp-admx-sharedfolders.md index 7b7f7b195c..365e67295a 100644 --- a/windows/client-management/mdm/policy-csp-admx-sharedfolders.md +++ b/windows/client-management/mdm/policy-csp-admx-sharedfolders.md @@ -76,7 +76,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting determines whether the user can publish DFS roots in Active Directory Domain Services (AD DS). +Available in the latest Windows 10 Insider Preview Build. This policy setting determines whether the user can publish DFS roots in Active Directory Domain Services (AD DS). If you enable or do not configure this policy setting, users can use the "Publish in Active Directory" option to publish DFS roots as shared folders in AD DS . @@ -149,7 +149,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting determines whether the user can publish shared folders in Active Directory Domain Services (AD DS). +Available in the latest Windows 10 Insider Preview Build. This policy setting determines whether the user can publish shared folders in Active Directory Domain Services (AD DS). If you enable or do not configure this policy setting, users can use the "Publish in Active Directory" option in the Shared Folders snap-in to publish shared folders in AD DS. diff --git a/windows/client-management/mdm/policy-csp-admx-sharing.md b/windows/client-management/mdm/policy-csp-admx-sharing.md index a293d2b013..92d7458cc6 100644 --- a/windows/client-management/mdm/policy-csp-admx-sharing.md +++ b/windows/client-management/mdm/policy-csp-admx-sharing.md @@ -73,7 +73,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies whether users can share files within their profile. By default users are allowed to share files within their profile to other users on their network after an administrator opts in the computer. An administrator can opt in the computer by using the sharing wizard to share a file within their profile. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies whether users can share files within their profile. By default users are allowed to share files within their profile to other users on their network after an administrator opts in the computer. An administrator can opt in the computer by using the sharing wizard to share a file within their profile. If you enable this policy setting, users cannot share files within their profile using the sharing wizard. Also, the sharing wizard cannot create a share at %root%\users and can only be used to create SMB shares on folders. diff --git a/windows/client-management/mdm/policy-csp-admx-shellcommandpromptregedittools.md b/windows/client-management/mdm/policy-csp-admx-shellcommandpromptregedittools.md index e8df85ad6d..70b33efe0d 100644 --- a/windows/client-management/mdm/policy-csp-admx-shellcommandpromptregedittools.md +++ b/windows/client-management/mdm/policy-csp-admx-shellcommandpromptregedittools.md @@ -83,7 +83,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting prevents users from running the interactive command prompt, Cmd.exe. This policy setting also determines whether batch files (.cmd and .bat) can run on the computer. +Available in the latest Windows 10 Insider Preview Build. This policy setting prevents users from running the interactive command prompt, Cmd.exe. This policy setting also determines whether batch files (.cmd and .bat) can run on the computer. If you enable this policy setting and the user tries to open a command window, the system displays a message explaining that a setting prevents the action. @@ -155,7 +155,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. Disables the Windows registry editor Regedit.exe. +Available in the latest Windows 10 Insider Preview Build. Disables the Windows registry editor Regedit.exe. If you enable this policy setting and the user tries to start Regedit.exe, a message appears explaining that a policy setting prevents the action. @@ -227,7 +227,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting prevents Windows from running the programs you specify in this policy setting. +Available in the latest Windows 10 Insider Preview Build. This policy setting prevents Windows from running the programs you specify in this policy setting. If you enable this policy setting, users cannot run programs that you add to the list of disallowed applications. @@ -302,7 +302,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. Limits the Windows programs that users have permission to run on the computer. +Available in the latest Windows 10 Insider Preview Build. Limits the Windows programs that users have permission to run on the computer. If you enable this policy setting, users can only run programs that you add to the list of allowed applications. diff --git a/windows/client-management/mdm/policy-csp-admx-smartcard.md b/windows/client-management/mdm/policy-csp-admx-smartcard.md index 76452c2119..67c2a2ea26 100644 --- a/windows/client-management/mdm/policy-csp-admx-smartcard.md +++ b/windows/client-management/mdm/policy-csp-admx-smartcard.md @@ -119,7 +119,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting lets you allow certificates without an Extended Key Usage (EKU) set to be used for logon. +Available in the latest Windows 10 Insider Preview Build. This policy setting lets you allow certificates without an Extended Key Usage (EKU) set to be used for logon. In versions of Windows prior to Windows Vista, smart card certificates that are used for logon require an enhanced key usage (EKU) extension with a smart card logon object identifier. This policy setting can be used to modify that restriction. @@ -194,7 +194,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting lets you determine whether the integrated unblock feature will be available in the logon User Interface (UI). +Available in the latest Windows 10 Insider Preview Build. This policy setting lets you determine whether the integrated unblock feature will be available in the logon User Interface (UI). In order to use the integrated unblock feature your smart card must support this feature. Please check with your hardware manufacturer to see if your smart card supports this feature. @@ -265,7 +265,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting lets you allow signature key-based certificates to be enumerated and available for logon. +Available in the latest Windows 10 Insider Preview Build. This policy setting lets you allow signature key-based certificates to be enumerated and available for logon. If you enable this policy setting then any certificates available on the smart card with a signature only key will be listed on the logon screen. @@ -334,7 +334,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting permits those certificates to be displayed for logon that are either expired or not yet valid. +Available in the latest Windows 10 Insider Preview Build. This policy setting permits those certificates to be displayed for logon that are either expired or not yet valid. Under previous versions of Microsoft Windows, certificates were required to contain a valid time and not be expired. The certificate must still be accepted by the domain controller in order to be used. This setting only controls the displaying of the certificate on the client machine. @@ -405,7 +405,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to manage the certificate propagation that occurs when a smart card is inserted. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to manage the certificate propagation that occurs when a smart card is inserted. If you enable or do not configure this policy setting then certificate propagation will occur when you insert your smart card. @@ -474,7 +474,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to manage the cleanup behavior of root certificates. If you enable this policy setting then root certificate cleanup will occur according to the option selected. If you disable or do not configure this setting then root certificate cleanup will occur on logoff. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to manage the cleanup behavior of root certificates. If you enable this policy setting then root certificate cleanup will occur according to the option selected. If you disable or do not configure this setting then root certificate cleanup will occur on logoff. > [!TIP] @@ -539,7 +539,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to manage the root certificate propagation that occurs when a smart card is inserted. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to manage the root certificate propagation that occurs when a smart card is inserted. If you enable or do not configure this policy setting then root certificate propagation will occur when you insert your smart card. @@ -611,7 +611,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting prevents plaintext PINs from being returned by Credential Manager. +Available in the latest Windows 10 Insider Preview Build. This policy setting prevents plaintext PINs from being returned by Credential Manager. If you enable this policy setting, Credential Manager does not return a plaintext PIN. @@ -683,7 +683,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to control whether elliptic curve cryptography (ECC) certificates on a smart card can be used to log on to a domain. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to control whether elliptic curve cryptography (ECC) certificates on a smart card can be used to log on to a domain. If you enable this policy setting, ECC certificates on a smart card can be used to log on to a domain. @@ -755,7 +755,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting lets you configure if all your valid logon certificates are displayed. +Available in the latest Windows 10 Insider Preview Build. This policy setting lets you configure if all your valid logon certificates are displayed. During the certificate renewal period, a user can have multiple valid logon certificates issued from the same certificate template. This can cause confusion as to which certificate to select for logon. The common case for this behavior is when a certificate is renewed and the old one has not yet expired. Two certificates are determined to be the same if they are issued from the same template with the same major version and they are for the same user (determined by their UPN). @@ -831,7 +831,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to manage the reading of all certificates from the smart card for logon. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to manage the reading of all certificates from the smart card for logon. During logon Windows will by default only read the default certificate from the smart card unless it supports retrieval of all certificates in a single call. This setting forces Windows to read all the certificates from the card. This can introduce a significant performance decrease in certain situations. Please contact your smart card vendor to determine if your smart card and associated CSP supports the required behavior. @@ -902,7 +902,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to manage the displayed message when a smart card is blocked. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to manage the displayed message when a smart card is blocked. If you enable this policy setting, the specified message will be displayed to the user when the smart card is blocked. @@ -974,7 +974,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting lets you reverse the subject name from how it is stored in the certificate when displaying it during logon. +Available in the latest Windows 10 Insider Preview Build. This policy setting lets you reverse the subject name from how it is stored in the certificate when displaying it during logon. By default the user principal name (UPN) is displayed in addition to the common name to help users distinguish one certificate from another. For example, if the certificate subject was CN=User1, OU=Users, DN=example, DN=com and had an UPN of user1@example.com then "User1" will be displayed along with "user1@example.com." If the UPN is not present then the entire subject name will be displayed. This setting controls the appearance of that subject name and might need to be adjusted per organization. @@ -1045,7 +1045,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to control whether Smart Card Plug and Play is enabled. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to control whether Smart Card Plug and Play is enabled. If you enable or do not configure this policy setting, Smart Card Plug and Play will be enabled and the system will attempt to install a Smart Card device driver when a card is inserted in a Smart Card Reader for the first time. @@ -1117,7 +1117,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to control whether a confirmation message is displayed when a smart card device driver is installed. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to control whether a confirmation message is displayed when a smart card device driver is installed. If you enable or do not configure this policy setting, a confirmation message will be displayed when a smart card device driver is installed. @@ -1189,7 +1189,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting lets you determine whether an optional field will be displayed during logon and elevation that allows a user to enter his or her user name or user name and domain, thereby associating a certificate with that user. +Available in the latest Windows 10 Insider Preview Build. This policy setting lets you determine whether an optional field will be displayed during logon and elevation that allows a user to enter his or her user name or user name and domain, thereby associating a certificate with that user. If you enable this policy setting then an optional field that allows a user to enter their user name or user name and domain will be displayed. diff --git a/windows/client-management/mdm/policy-csp-admx-snmp.md b/windows/client-management/mdm/policy-csp-admx-snmp.md index 2a83f8346c..4cdc53625c 100644 --- a/windows/client-management/mdm/policy-csp-admx-snmp.md +++ b/windows/client-management/mdm/policy-csp-admx-snmp.md @@ -80,7 +80,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting configures a list of the communities defined to the Simple Network Management Protocol (SNMP) service. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures a list of the communities defined to the Simple Network Management Protocol (SNMP) service. SNMP is a protocol designed to give a user the capability to remotely manage a computer network, by polling and setting terminal values and monitoring network events. @@ -161,7 +161,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting determines the permitted list of hosts that can submit a query to the Simple Network Management (SNMP) agent running on the client computer. +Available in the latest Windows 10 Insider Preview Build. This policy setting determines the permitted list of hosts that can submit a query to the Simple Network Management (SNMP) agent running on the client computer. Simple Network Management Protocol is a protocol designed to give a user the capability to remotely manage a computer network by polling and setting terminal values and monitoring network events. @@ -241,7 +241,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows trap configuration for the Simple Network Management Protocol (SNMP) agent. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows trap configuration for the Simple Network Management Protocol (SNMP) agent. Simple Network Management Protocol is a protocol designed to give a user the capability to remotely manage a computer network by polling and setting terminal values and monitoring network events. diff --git a/windows/client-management/mdm/policy-csp-admx-systemrestore.md b/windows/client-management/mdm/policy-csp-admx-systemrestore.md index 8e49043225..41c38ffa9f 100644 --- a/windows/client-management/mdm/policy-csp-admx-systemrestore.md +++ b/windows/client-management/mdm/policy-csp-admx-systemrestore.md @@ -74,7 +74,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. Allows you to disable System Restore configuration through System Protection. +Available in the latest Windows 10 Insider Preview Build. Allows you to disable System Restore configuration through System Protection. This policy setting allows you to turn off System Restore configuration through System Protection. diff --git a/windows/client-management/mdm/policy-csp-admx-tcpip.md b/windows/client-management/mdm/policy-csp-admx-tcpip.md index b43d4d2011..403e0686e1 100644 --- a/windows/client-management/mdm/policy-csp-admx-tcpip.md +++ b/windows/client-management/mdm/policy-csp-admx-tcpip.md @@ -110,7 +110,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to specify a 6to4 relay name for a 6to4 host. A 6to4 relay is used as a default gateway for IPv6 network traffic sent by the 6to4 host. The 6to4 relay name setting has no effect if 6to4 connectivity is not available on the host. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to specify a 6to4 relay name for a 6to4 host. A 6to4 relay is used as a default gateway for IPv6 network traffic sent by the 6to4 host. The 6to4 relay name setting has no effect if 6to4 connectivity is not available on the host. If you enable this policy setting, you can specify a relay name for a 6to4 host. @@ -179,7 +179,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to specify the interval at which the relay name is resolved. The 6to4 relay name resolution interval setting has no effect if 6to4 connectivity is not available on the host. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to specify the interval at which the relay name is resolved. The 6to4 relay name resolution interval setting has no effect if 6to4 connectivity is not available on the host. If you enable this policy setting, you can specify the value for the duration at which the relay name is resolved periodically. @@ -248,7 +248,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to configure 6to4, an address assignment and router-to-router automatic tunneling technology that is used to provide unicast IPv6 connectivity between IPv6 sites and hosts across the IPv4 Internet. 6to4 uses the global address prefix: 2002:WWXX:YYZZ::/48 in which the letters are a hexadecimal representation of the global IPv4 address (w.x.y.z) assigned to a site. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to configure 6to4, an address assignment and router-to-router automatic tunneling technology that is used to provide unicast IPv6 connectivity between IPv6 sites and hosts across the IPv4 Internet. 6to4 uses the global address prefix: 2002:WWXX:YYZZ::/48 in which the letters are a hexadecimal representation of the global IPv4 address (w.x.y.z) assigned to a site. If you disable or do not configure this policy setting, the local host setting is used. @@ -323,7 +323,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to configure IP-HTTPS, a tunneling technology that uses the HTTPS protocol to provide IP connectivity to a remote network. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to configure IP-HTTPS, a tunneling technology that uses the HTTPS protocol to provide IP connectivity to a remote network. If you disable or do not configure this policy setting, the local host settings are used. @@ -398,7 +398,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to configure IP Stateless Autoconfiguration Limits. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to configure IP Stateless Autoconfiguration Limits. If you enable or do not configure this policy setting, IP Stateless Autoconfiguration Limits will be enabled and system will limit the number of autoconfigured addresses and routes. @@ -467,7 +467,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to specify a router name or Internet Protocol version 4 (IPv4) address for an ISATAP router. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to specify a router name or Internet Protocol version 4 (IPv4) address for an ISATAP router. If you enable this policy setting, you can specify a router name or IPv4 address for an ISATAP router. If you enter an IPv4 address of the ISATAP router in the text box, DNS services are not required. @@ -536,7 +536,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to configure Intra-Site Automatic Tunnel Addressing Protocol (ISATAP), an address-to-router and host-to-host, host-to-router and router-to-host automatic tunneling technology that is used to provide unicast IPv6 connectivity between IPv6 hosts across an IPv4 intranet. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to configure Intra-Site Automatic Tunnel Addressing Protocol (ISATAP), an address-to-router and host-to-host, host-to-router and router-to-host automatic tunneling technology that is used to provide unicast IPv6 connectivity between IPv6 hosts across an IPv4 intranet. If you disable or do not configure this policy setting, the local host setting is used. @@ -611,7 +611,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to select the UDP port the Teredo client will use to send packets. If you leave the default of 0, the operating system will select a port (recommended). If you select a UDP port that is already in use by a system, the Teredo client will fail to initialize. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to select the UDP port the Teredo client will use to send packets. If you leave the default of 0, the operating system will select a port (recommended). If you select a UDP port that is already in use by a system, the Teredo client will fail to initialize. If you enable this policy setting, you can customize a UDP port for the Teredo client. @@ -680,7 +680,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to set Teredo to be ready to communicate, a process referred to as qualification. By default, Teredo enters a dormant state when not in use. The qualification process brings it out of a dormant state. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to set Teredo to be ready to communicate, a process referred to as qualification. By default, Teredo enters a dormant state when not in use. The qualification process brings it out of a dormant state. If you disable or do not configure this policy setting, the local host setting is used. @@ -751,7 +751,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to configure the Teredo refresh rate. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to configure the Teredo refresh rate. > [!NOTE] > On a periodic basis (by default, every 30 seconds), Teredo clients send a single Router Solicitation packet to the Teredo server. The Teredo server sends a Router Advertisement Packet in response. This periodic packet refreshes the IP address and UDP port mapping in the translation table of the Teredo client's NAT device. @@ -823,7 +823,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to specify the name of the Teredo server. This server name will be used on the Teredo client computer where this policy setting is applied. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to specify the name of the Teredo server. This server name will be used on the Teredo client computer where this policy setting is applied. If you enable this policy setting, you can specify a Teredo server name that applies to a Teredo client. @@ -892,7 +892,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to configure Teredo, an address assignment and automatic tunneling technology that provides unicast IPv6 connectivity across the IPv4 Internet. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to configure Teredo, an address assignment and automatic tunneling technology that provides unicast IPv6 connectivity across the IPv4 Internet. If you disable or do not configure this policy setting, the local host settings are used. @@ -969,7 +969,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to configure Window Scaling Heuristics. Window Scaling Heuristics is an algorithm to identify connectivity and throughput problems caused by many Firewalls and other middle boxes that don't interpret Window Scaling option correctly. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to configure Window Scaling Heuristics. Window Scaling Heuristics is an algorithm to identify connectivity and throughput problems caused by many Firewalls and other middle boxes that don't interpret Window Scaling option correctly. If you do not configure this policy setting, the local host settings are used. diff --git a/windows/client-management/mdm/policy-csp-admx-thumbnails.md b/windows/client-management/mdm/policy-csp-admx-thumbnails.md index 69fd52c66e..9aabebdc8b 100644 --- a/windows/client-management/mdm/policy-csp-admx-thumbnails.md +++ b/windows/client-management/mdm/policy-csp-admx-thumbnails.md @@ -79,7 +79,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to configure how File Explorer displays thumbnail images or icons on the local computer. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to configure how File Explorer displays thumbnail images or icons on the local computer. File Explorer displays thumbnail images by default. @@ -150,7 +150,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to configure how File Explorer displays thumbnail images or icons on network folders. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to configure how File Explorer displays thumbnail images or icons on network folders. File Explorer displays thumbnail images on network folders by default. @@ -221,7 +221,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. Turns off the caching of thumbnails in hidden thumbs.db files. +Available in the latest Windows 10 Insider Preview Build. Turns off the caching of thumbnails in hidden thumbs.db files. This policy setting allows you to configure File Explorer to cache thumbnails of items residing in network folders in hidden thumbs.db files. diff --git a/windows/client-management/mdm/policy-csp-admx-tpm.md b/windows/client-management/mdm/policy-csp-admx-tpm.md index aeec40aa7f..da8e499dae 100644 --- a/windows/client-management/mdm/policy-csp-admx-tpm.md +++ b/windows/client-management/mdm/policy-csp-admx-tpm.md @@ -101,7 +101,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to manage the Group Policy list of Trusted Platform Module (TPM) commands blocked by Windows. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to manage the Group Policy list of Trusted Platform Module (TPM) commands blocked by Windows. If you enable this policy setting, Windows will block the specified commands from being sent to the TPM on the computer. TPM commands are referenced by a command number. For example, command number 129 is TPM_OwnerReadInternalPub, and command number 170 is TPM_FieldUpgrade. To find the command number associated with each TPM command with TPM 1.2, run "tpm.msc" and navigate to the "Command Management" section. @@ -170,7 +170,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the system to prompt the user to clear the TPM if the TPM is detected to be in any state other than Ready. This policy will take effect only if the system’s TPM is in a state other than Ready, including if the TPM is “Ready, with reduced functionality”. The prompt to clear the TPM will start occurring after the next reboot, upon user login only if the logged in user is part of the Administrators group for the system. The prompt can be dismissed, but will reappear after every reboot and login until the policy is disabled or until the TPM is in a Ready state. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the system to prompt the user to clear the TPM if the TPM is detected to be in any state other than Ready. This policy will take effect only if the system’s TPM is in a state other than Ready, including if the TPM is “Ready, with reduced functionality”. The prompt to clear the TPM will start occurring after the next reboot, upon user login only if the logged in user is part of the Administrators group for the system. The prompt can be dismissed, but will reappear after every reboot and login until the policy is disabled or until the TPM is in a Ready state. > [!TIP] @@ -235,7 +235,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to enforce or ignore the computer's default list of blocked Trusted Platform Module (TPM) commands. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to enforce or ignore the computer's default list of blocked Trusted Platform Module (TPM) commands. If you enable this policy setting, Windows will ignore the computer's default list of blocked TPM commands and will only block those TPM commands specified by Group Policy or the local list. @@ -306,7 +306,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to enforce or ignore the computer's local list of blocked Trusted Platform Module (TPM) commands. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to enforce or ignore the computer's local list of blocked Trusted Platform Module (TPM) commands. If you enable this policy setting, Windows will ignore the computer's local list of blocked TPM commands and will only block those TPM commands specified by Group Policy or the default list. @@ -377,7 +377,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures how much of the TPM owner authorization information is stored in the registry of the local computer. Depending on the amount of TPM owner authorization information stored locally, the operating system and TPM-based applications can perform certain TPM actions which require TPM owner authorization without requiring the user to enter the TPM owner password. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures how much of the TPM owner authorization information is stored in the registry of the local computer. Depending on the amount of TPM owner authorization information stored locally, the operating system and TPM-based applications can perform certain TPM actions which require TPM owner authorization without requiring the user to enter the TPM owner password. You can choose to have the operating system store either the full TPM owner authorization value, the TPM administrative delegation blob plus the TPM user delegation blob, or none. @@ -455,7 +455,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This group policy enables Device Health Attestation reporting (DHA-report) on supported devices. It enables supported devices to send Device Health Attestation related information (device boot logs, PCR values, TPM certificate, etc.) to Device Health Attestation Service (DHA-Service) every time a device starts. Device Health Attestation Service validates the security state and health of the devices, and makes the findings accessible to enterprise administrators via a cloud based reporting portal. This policy is independent of DHA reports that are initiated by device manageability solutions (like MDM or SCCM), and will not interfere with their workflows. +Available in the latest Windows 10 Insider Preview Build. This group policy enables Device Health Attestation reporting (DHA-report) on supported devices. It enables supported devices to send Device Health Attestation related information (device boot logs, PCR values, TPM certificate, etc.) to Device Health Attestation Service (DHA-Service) every time a device starts. Device Health Attestation Service validates the security state and health of the devices, and makes the findings accessible to enterprise administrators via a cloud based reporting portal. This policy is independent of DHA reports that are initiated by device manageability solutions (like MDM or SCCM), and will not interfere with their workflows. > [!TIP] @@ -520,7 +520,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to manage the duration in minutes for counting standard user authorization failures for Trusted Platform Module (TPM) commands requiring authorization. If the number of TPM commands with an authorization failure within the duration equals a threshold, a standard user is prevented from sending commands requiring authorization to the TPM. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to manage the duration in minutes for counting standard user authorization failures for Trusted Platform Module (TPM) commands requiring authorization. If the number of TPM commands with an authorization failure within the duration equals a threshold, a standard user is prevented from sending commands requiring authorization to the TPM. This setting helps administrators prevent the TPM hardware from entering a lockout mode because it slows the speed standard users can send commands requiring authorization to the TPM. @@ -601,7 +601,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to manage the maximum number of authorization failures for each standard user for the Trusted Platform Module (TPM). If the number of authorization failures for the user within the duration for Standard User Lockout Duration equals this value, the standard user is prevented from sending commands to the Trusted Platform Module (TPM) that require authorization. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to manage the maximum number of authorization failures for each standard user for the Trusted Platform Module (TPM). If the number of authorization failures for the user within the duration for Standard User Lockout Duration equals this value, the standard user is prevented from sending commands to the Trusted Platform Module (TPM) that require authorization. This setting helps administrators prevent the TPM hardware from entering a lockout mode because it slows the speed standard users can send commands requiring authorization to the TPM. @@ -684,7 +684,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to manage the maximum number of authorization failures for all standard users for the Trusted Platform Module (TPM). If the total number of authorization failures for all standard users within the duration for Standard User Lockout Duration equals this value, all standard users are prevented from sending commands to the Trusted Platform Module (TPM) that require authorization. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to manage the maximum number of authorization failures for all standard users for the Trusted Platform Module (TPM). If the total number of authorization failures for all standard users within the duration for Standard User Lockout Duration equals this value, all standard users are prevented from sending commands to the Trusted Platform Module (TPM) that require authorization. This setting helps administrators prevent the TPM hardware from entering a lockout mode because it slows the speed standard users can send commands requiring authorization to the TPM. @@ -767,7 +767,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the TPM to use the Dictionary Attack Prevention Parameters (lockout threshold and recovery time) to the values that were used for Windows 10 Version 1607 and below. Setting this policy will take effect only if a) the TPM was originally prepared using a version of Windows after Windows 10 Version 1607 and b) the System has a TPM 2.0. Note that enabling this policy will only take effect after the TPM maintenance task runs (which typically happens after a system restart). Once this policy has been enabled on a system and has taken effect (after a system restart), disabling it will have no impact and the system's TPM will remain configured using the legacy Dictionary Attack Prevention parameters, regardless of the value of this group policy. The only way for the disabled setting of this policy to take effect on a system where it was once enabled is to a) disable it from group policy and b)clear the TPM on the system. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the TPM to use the Dictionary Attack Prevention Parameters (lockout threshold and recovery time) to the values that were used for Windows 10 Version 1607 and below. Setting this policy will take effect only if a) the TPM was originally prepared using a version of Windows after Windows 10 Version 1607 and b) the System has a TPM 2.0. Note that enabling this policy will only take effect after the TPM maintenance task runs (which typically happens after a system restart). Once this policy has been enabled on a system and has taken effect (after a system restart), disabling it will have no impact and the system's TPM will remain configured using the legacy Dictionary Attack Prevention parameters, regardless of the value of this group policy. The only way for the disabled setting of this policy to take effect on a system where it was once enabled is to a) disable it from group policy and b)clear the TPM on the system. > [!TIP] diff --git a/windows/client-management/mdm/policy-csp-admx-userexperiencevirtualization.md b/windows/client-management/mdm/policy-csp-admx-userexperiencevirtualization.md index d967a2db8e..b82218ed41 100644 --- a/windows/client-management/mdm/policy-csp-admx-userexperiencevirtualization.md +++ b/windows/client-management/mdm/policy-csp-admx-userexperiencevirtualization.md @@ -450,7 +450,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings of Calculator. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings of Calculator. By default, the user settings of Calculator synchronize between computers. Use the policy setting to prevent the user settings of Calculator from synchronization between computers. @@ -524,7 +524,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the sync provider used by User Experience Virtualization (UE-V) to sync settings between users’ computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the sync provider used by User Experience Virtualization (UE-V) to sync settings between users’ computers. With Sync Method set to ”SyncProvider,” the UE-V Agent uses a built-in sync provider to keep user settings synchronized between the computer and the settings storage location. This is the default value. You can disable the sync provider on computers that never go offline and are always connected to the settings storage location. @@ -603,7 +603,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of User Experience Virtualization (UE-V) rollback information for computers running in a non-persistent, pooled VDI environment. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of User Experience Virtualization (UE-V) rollback information for computers running in a non-persistent, pooled VDI environment. UE-V settings rollback data and checkpoints are normally stored only on the local computer. With this policy setting enabled, the rollback information is copied to the settings storage location when the user logs off or shuts down their VDI session. @@ -677,7 +677,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies the text of the Contact IT URL hyperlink in the Company Settings Center. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies the text of the Contact IT URL hyperlink in the Company Settings Center. If you enable this policy setting, the Company Settings Center displays the specified text in the link to the Contact IT URL. @@ -748,7 +748,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies the URL for the Contact IT link in the Company Settings Center. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies the URL for the Contact IT link in the Company Settings Center. If you enable this policy setting, the Company Settings Center Contact IT text links to the specified URL. The link can be of any standard protocol such as http or mailto. @@ -819,7 +819,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting defines whether the User Experience Virtualization (UE-V) Agent synchronizes settings for Windows apps. +Available in the latest Windows 10 Insider Preview Build. This policy setting defines whether the User Experience Virtualization (UE-V) Agent synchronizes settings for Windows apps. By default, the UE-V Agent synchronizes settings for Windows apps between the computer and the settings storage location. @@ -896,7 +896,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of Windows settings between computers. Certain Windows settings will synchronize between computers by default. These settings include Windows themes, Windows desktop settings, Ease of Access settings, and network printers. Use this policy setting to specify which Windows settings synchronize between computers. You can also use these settings to enable synchronization of users' sign-in information for certain apps, networks, and certificates. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of Windows settings between computers. Certain Windows settings will synchronize between computers by default. These settings include Windows themes, Windows desktop settings, Ease of Access settings, and network printers. Use this policy setting to specify which Windows settings synchronize between computers. You can also use these settings to enable synchronization of users' sign-in information for certain apps, networks, and certificates. If you enable this policy setting, only the selected Windows settings synchronize. Unselected Windows settings are excluded from settings synchronization. @@ -967,7 +967,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to enable or disable User Experience Virtualization (UE-V) feature. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to enable or disable User Experience Virtualization (UE-V) feature. Reboot is needed for enable to take effect. With Auto-register inbox templates enabled, the UE-V inbox templates such as Office 2016 will be automatically registered when the UE-V Service is enabled. If this option is changed, it will only take effect when UE-V service is re-enabled. @@ -1035,7 +1035,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for the Finance app. By default, the user settings of Finance sync between computers. Use the policy setting to prevent the user settings of Finance from synchronizing between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for the Finance app. By default, the user settings of Finance sync between computers. Use the policy setting to prevent the user settings of Finance from synchronizing between computers. If you enable this policy setting, Finance user settings continue to sync. @@ -1106,7 +1106,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting enables a notification in the system tray that appears when the User Experience Virtualization (UE-V) Agent runs for the first time. By default, a notification informs users that Company Settings Center, the user-facing name for the UE-V Agent, now helps to synchronize settings between their work computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting enables a notification in the system tray that appears when the User Experience Virtualization (UE-V) Agent runs for the first time. By default, a notification informs users that Company Settings Center, the user-facing name for the UE-V Agent, now helps to synchronize settings between their work computers. With this setting enabled, the notification appears the first time that the UE-V Agent runs. @@ -1178,7 +1178,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for the Games app. By default, the user settings of Games sync between computers. Use the policy setting to prevent the user settings of Games from synchronizing between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for the Games app. By default, the user settings of Games sync between computers. Use the policy setting to prevent the user settings of Games from synchronizing between computers. If you enable this policy setting, Games user settings continue to sync. @@ -1250,7 +1250,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Internet Explorer 8. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Internet Explorer 8. By default, the user settings of Internet Explorer 8 synchronize between computers. Use the policy setting to prevent the user settings for Internet Explorer 8 from synchronization between computers. @@ -1324,7 +1324,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Internet Explorer 9. By default, the user settings of Internet Explorer 9 synchronize between computers. Use the policy setting to prevent the user settings for Internet Explorer 9 from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Internet Explorer 9. By default, the user settings of Internet Explorer 9 synchronize between computers. Use the policy setting to prevent the user settings for Internet Explorer 9 from synchronization between computers. If you enable this policy setting, the Internet Explorer 9 user settings continue to synchronize. @@ -1396,7 +1396,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings of Internet Explorer 10. By default, the user settings of Internet Explorer 10 synchronize between computers. Use the policy setting to prevent the user settings for Internet Explorer 10 from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings of Internet Explorer 10. By default, the user settings of Internet Explorer 10 synchronize between computers. Use the policy setting to prevent the user settings for Internet Explorer 10 from synchronization between computers. If you enable this policy setting, the Internet Explorer 10 user settings continue to synchronize. @@ -1468,7 +1468,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings of Internet Explorer 11. By default, the user settings of Internet Explorer 11 synchronize between computers. Use the policy setting to prevent the user settings for Internet Explorer 11 from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings of Internet Explorer 11. By default, the user settings of Internet Explorer 11 synchronize between computers. Use the policy setting to prevent the user settings for Internet Explorer 11 from synchronization between computers. If you enable this policy setting, the Internet Explorer 11 user settings continue to synchronize. @@ -1540,7 +1540,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings which are common between the versions of Internet Explorer. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings which are common between the versions of Internet Explorer. By default, the user settings which are common between the versions of Internet Explorer synchronize between computers. Use the policy setting to prevent the user settings of Internet Explorer from synchronization between computers. If you enable this policy setting, the user settings which are common between the versions of Internet Explorer continue to synchronize. @@ -1612,7 +1612,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for the Maps app. By default, the user settings of Maps sync between computers. Use the policy setting to prevent the user settings of Maps from synchronizing between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for the Maps app. By default, the user settings of Maps sync between computers. Use the policy setting to prevent the user settings of Maps from synchronizing between computers. If you enable this policy setting, Maps user settings continue to sync. @@ -1684,7 +1684,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to configure the UE-V Agent to write a warning event to the event log when a settings package file size reaches a defined threshold. By default the UE-V Agent does not report information about package file size. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to configure the UE-V Agent to write a warning event to the event log when a settings package file size reaches a defined threshold. By default the UE-V Agent does not report information about package file size. If you enable this policy setting, specify the threshold file size in bytes. When the settings package file exceeds this threshold the UE-V Agent will write a warning event to the event log. @@ -1754,7 +1754,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Access 2010. By default, the user settings of Microsoft Access 2010 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Access 2010 from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Access 2010. By default, the user settings of Microsoft Access 2010 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Access 2010 from synchronization between computers. If you enable this policy setting, Microsoft Access 2010 user settings continue to synchronize. @@ -1826,7 +1826,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings which are common between the Microsoft Office Suite 2010 applications. By default, the user settings which are common between the Microsoft Office Suite 2010 applications synchronize between computers. Use the policy setting to prevent the user settings which are common between the Microsoft Office Suite 2010 applications from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings which are common between the Microsoft Office Suite 2010 applications. By default, the user settings which are common between the Microsoft Office Suite 2010 applications synchronize between computers. Use the policy setting to prevent the user settings which are common between the Microsoft Office Suite 2010 applications from synchronization between computers. If you enable this policy setting, the user settings which are common between the Microsoft Office Suite 2010 applications continue to synchronize. @@ -1898,7 +1898,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Excel 2010. By default, the user settings of Microsoft Excel 2010 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Excel 2010 from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Excel 2010. By default, the user settings of Microsoft Excel 2010 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Excel 2010 from synchronization between computers. If you enable this policy setting, Microsoft Excel 2010 user settings continue to synchronize. @@ -1969,7 +1969,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft InfoPath 2010. By default, the user settings of Microsoft InfoPath 2010 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft InfoPath 2010 from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft InfoPath 2010. By default, the user settings of Microsoft InfoPath 2010 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft InfoPath 2010 from synchronization between computers. If you enable this policy setting, Microsoft InfoPath 2010 user settings continue to synchronize. @@ -2041,7 +2041,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Lync 2010. By default, the user settings of Microsoft Lync 2010 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Lync 2010 from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Lync 2010. By default, the user settings of Microsoft Lync 2010 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Lync 2010 from synchronization between computers. If you enable this policy setting, Microsoft Lync 2010 user settings continue to synchronize. @@ -2113,7 +2113,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft OneNote 2010. By default, the user settings of Microsoft OneNote 2010 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft OneNote 2010 from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft OneNote 2010. By default, the user settings of Microsoft OneNote 2010 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft OneNote 2010 from synchronization between computers. If you enable this policy setting, Microsoft OneNote 2010 user settings continue to synchronize. @@ -2184,7 +2184,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Outlook 2010. By default, the user settings of Microsoft Outlook 2010 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Outlook 2010 from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Outlook 2010. By default, the user settings of Microsoft Outlook 2010 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Outlook 2010 from synchronization between computers. If you enable this policy setting, Microsoft Outlook 2010 user settings continue to synchronize. @@ -2256,7 +2256,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft PowerPoint 2010. By default, the user settings of Microsoft PowerPoint 2010 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft PowerPoint 2010 from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft PowerPoint 2010. By default, the user settings of Microsoft PowerPoint 2010 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft PowerPoint 2010 from synchronization between computers. If you enable this policy setting, Microsoft PowerPoint 2010 user settings continue to synchronize. @@ -2328,7 +2328,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Project 2010. By default, the user settings of Microsoft Project 2010 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Project 2010 from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Project 2010. By default, the user settings of Microsoft Project 2010 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Project 2010 from synchronization between computers. If you enable this policy setting, Microsoft Project 2010 user settings continue to synchronize. @@ -2399,7 +2399,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Publisher 2010. By default, the user settings of Microsoft Publisher 2010 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Publisher 2010 from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Publisher 2010. By default, the user settings of Microsoft Publisher 2010 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Publisher 2010 from synchronization between computers. If you enable this policy setting, Microsoft Publisher 2010 user settings continue to synchronize. @@ -2471,7 +2471,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft SharePoint Designer 2010. By default, the user settings of Microsoft SharePoint Designer 2010 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft SharePoint Designer 2010 from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft SharePoint Designer 2010. By default, the user settings of Microsoft SharePoint Designer 2010 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft SharePoint Designer 2010 from synchronization between computers. If you enable this policy setting, Microsoft SharePoint Designer 2010 user settings continue to synchronize. @@ -2543,7 +2543,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft SharePoint Workspace 2010. By default, the user settings of Microsoft SharePoint Workspace 2010 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft SharePoint Workspace 2010 from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft SharePoint Workspace 2010. By default, the user settings of Microsoft SharePoint Workspace 2010 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft SharePoint Workspace 2010 from synchronization between computers. If you enable this policy setting, Microsoft SharePoint Workspace 2010 user settings continue to synchronize. @@ -2615,7 +2615,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Visio 2010. By default, the user settings of Microsoft Visio 2010 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Visio 2010 from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Visio 2010. By default, the user settings of Microsoft Visio 2010 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Visio 2010 from synchronization between computers. If you enable this policy setting, Microsoft Visio 2010 user settings continue to synchronize. @@ -2687,7 +2687,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Word 2010. By default, the user settings of Microsoft Word 2010 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Word 2010 from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Word 2010. By default, the user settings of Microsoft Word 2010 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Word 2010 from synchronization between computers. If you enable this policy setting, Microsoft Word 2010 user settings continue to synchronize. @@ -2759,7 +2759,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Access 2013. By default, the user settings of Microsoft Access 2013 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Access 2013 from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Access 2013. By default, the user settings of Microsoft Access 2013 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Access 2013 from synchronization between computers. If you enable this policy setting, Microsoft Access 2013 user settings continue to synchronize. @@ -2830,7 +2830,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the backup of certain user settings for Microsoft Access 2013. Microsoft Access 2013 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Access 2013 settings. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the backup of certain user settings for Microsoft Access 2013. Microsoft Access 2013 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Access 2013 settings. If you enable this policy setting, certain user settings of Microsoft Access 2013 will continue to be backed up. @@ -2902,7 +2902,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings which are common between the Microsoft Office Suite 2013 applications. By default, the user settings which are common between the Microsoft Office Suite 2013 applications synchronize between computers. Use the policy setting to prevent the user settings which are common between the Microsoft Office Suite 2013 applications from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings which are common between the Microsoft Office Suite 2013 applications. By default, the user settings which are common between the Microsoft Office Suite 2013 applications synchronize between computers. Use the policy setting to prevent the user settings which are common between the Microsoft Office Suite 2013 applications from synchronization between computers. If you enable this policy setting, the user settings which are common between the Microsoft Office Suite 2013 applications continue to synchronize. @@ -2974,7 +2974,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the backup of certain user settings which are common between the Microsoft Office Suite 2013 applications. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the backup of certain user settings which are common between the Microsoft Office Suite 2013 applications. Microsoft Office Suite 2013 has user settings which are common between applications and are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific common Microsoft Office Suite 2013 applications. If you enable this policy setting, certain user settings which are common between the Microsoft Office Suite 2013 applications will continue to be backed up. @@ -3047,7 +3047,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Excel 2013. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Excel 2013. By default, the user settings of Microsoft Excel 2013 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Excel 2013 from synchronization between computers. @@ -3120,7 +3120,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the backup of certain user settings for Microsoft Excel 2013. Microsoft Excel 2013 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Excel 2013 settings. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the backup of certain user settings for Microsoft Excel 2013. Microsoft Excel 2013 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Excel 2013 settings. If you enable this policy setting, certain user settings of Microsoft Excel 2013 will continue to be backed up. @@ -3191,7 +3191,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft InfoPath 2013. By default, the user settings of Microsoft InfoPath 2013 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft InfoPath 2013 from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft InfoPath 2013. By default, the user settings of Microsoft InfoPath 2013 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft InfoPath 2013 from synchronization between computers. If you enable this policy setting, Microsoft InfoPath 2013 user settings continue to synchronize. @@ -3263,7 +3263,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the backup of certain user settings for Microsoft InfoPath 2013. Microsoft InfoPath 2013 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft InfoPath 2013 settings. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the backup of certain user settings for Microsoft InfoPath 2013. Microsoft InfoPath 2013 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft InfoPath 2013 settings. If you enable this policy setting, certain user settings of Microsoft InfoPath 2013 will continue to be backed up. @@ -3335,7 +3335,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Lync 2013. By default, the user settings of Microsoft Lync 2013 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Lync 2013 from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Lync 2013. By default, the user settings of Microsoft Lync 2013 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Lync 2013 from synchronization between computers. If you enable this policy setting, Microsoft Lync 2013 user settings continue to synchronize. @@ -3406,7 +3406,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the backup of certain user settings for Microsoft Lync 2013. Microsoft Lync 2013 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Lync 2013 settings. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the backup of certain user settings for Microsoft Lync 2013. Microsoft Lync 2013 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Lync 2013 settings. If you enable this policy setting, certain user settings of Microsoft Lync 2013 will continue to be backed up. @@ -3478,7 +3478,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for OneDrive for Business 2013. By default, the user settings of OneDrive for Business 2013 synchronize between computers. Use the policy setting to prevent the user settings of OneDrive for Business 2013 from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for OneDrive for Business 2013. By default, the user settings of OneDrive for Business 2013 synchronize between computers. Use the policy setting to prevent the user settings of OneDrive for Business 2013 from synchronization between computers. If you enable this policy setting, OneDrive for Business 2013 user settings continue to synchronize. @@ -3550,7 +3550,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft OneNote 2013. By default, the user settings of Microsoft OneNote 2013 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft OneNote 2013 from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft OneNote 2013. By default, the user settings of Microsoft OneNote 2013 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft OneNote 2013 from synchronization between computers. If you enable this policy setting, Microsoft OneNote 2013 user settings continue to synchronize. @@ -3622,7 +3622,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the backup of certain user settings for Microsoft OneNote 2013. Microsoft OneNote 2013 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft OneNote 2013 settings. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the backup of certain user settings for Microsoft OneNote 2013. Microsoft OneNote 2013 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft OneNote 2013 settings. If you enable this policy setting, certain user settings of Microsoft OneNote 2013 will continue to be backed up. @@ -3694,7 +3694,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Outlook 2013. By default, the user settings of Microsoft Outlook 2013 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Outlook 2013 from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Outlook 2013. By default, the user settings of Microsoft Outlook 2013 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Outlook 2013 from synchronization between computers. If you enable this policy setting, Microsoft Outlook 2013 user settings continue to synchronize. @@ -3765,7 +3765,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the backup of certain user settings for Microsoft Outlook 2013. Microsoft Outlook 2013 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Outlook 2013 settings. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the backup of certain user settings for Microsoft Outlook 2013. Microsoft Outlook 2013 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Outlook 2013 settings. If you enable this policy setting, certain user settings of Microsoft Outlook 2013 will continue to be backed up. @@ -3837,7 +3837,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft PowerPoint 2013. By default, the user settings of Microsoft PowerPoint 2013 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft PowerPoint 2013 from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft PowerPoint 2013. By default, the user settings of Microsoft PowerPoint 2013 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft PowerPoint 2013 from synchronization between computers. If you enable this policy setting, Microsoft PowerPoint 2013 user settings continue to synchronize. @@ -3909,7 +3909,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the backup of certain user settings for Microsoft PowerPoint 2013. Microsoft PowerPoint 2013 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft PowerPoint 2013 settings. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the backup of certain user settings for Microsoft PowerPoint 2013. Microsoft PowerPoint 2013 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft PowerPoint 2013 settings. If you enable this policy setting, certain user settings of Microsoft PowerPoint 2013 will continue to be backed up. @@ -3981,7 +3981,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Project 2013. By default, the user settings of Microsoft Project 2013 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Project 2013 from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Project 2013. By default, the user settings of Microsoft Project 2013 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Project 2013 from synchronization between computers. If you enable this policy setting, Microsoft Project 2013 user settings continue to synchronize. @@ -4052,7 +4052,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the backup of certain user settings for Microsoft Project 2013. Microsoft Project 2013 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Project 2013 settings. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the backup of certain user settings for Microsoft Project 2013. Microsoft Project 2013 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Project 2013 settings. If you enable this policy setting, certain user settings of Microsoft Project 2013 will continue to be backed up. @@ -4124,7 +4124,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Publisher 2013. By default, the user settings of Microsoft Publisher 2013 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Publisher 2013 from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Publisher 2013. By default, the user settings of Microsoft Publisher 2013 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Publisher 2013 from synchronization between computers. If you enable this policy setting, Microsoft Publisher 2013 user settings continue to synchronize. @@ -4196,7 +4196,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the backup of certain user settings for Microsoft Publisher 2013. Microsoft Publisher 2013 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Publisher 2013 settings. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the backup of certain user settings for Microsoft Publisher 2013. Microsoft Publisher 2013 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Publisher 2013 settings. If you enable this policy setting, certain user settings of Microsoft Publisher 2013 will continue to be backed up. @@ -4268,7 +4268,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft SharePoint Designer 2013. By default, the user settings of Microsoft SharePoint Designer 2013 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft SharePoint Designer 2013 from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft SharePoint Designer 2013. By default, the user settings of Microsoft SharePoint Designer 2013 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft SharePoint Designer 2013 from synchronization between computers. If you enable this policy setting, Microsoft SharePoint Designer 2013 user settings continue to synchronize. @@ -4339,7 +4339,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the backup of certain user settings for Microsoft SharePoint Designer 2013. Microsoft SharePoint Designer 2013 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft SharePoint Designer 2013 settings. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the backup of certain user settings for Microsoft SharePoint Designer 2013. Microsoft SharePoint Designer 2013 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft SharePoint Designer 2013 settings. If you enable this policy setting, certain user settings of Microsoft SharePoint Designer 2013 will continue to be backed up. @@ -4410,7 +4410,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Office 2013 Upload Center. By default, the user settings of Microsoft Office 2013 Upload Center synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Office 2013 Upload Center from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Office 2013 Upload Center. By default, the user settings of Microsoft Office 2013 Upload Center synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Office 2013 Upload Center from synchronization between computers. If you enable this policy setting, Microsoft Office 2013 Upload Center user settings continue to synchronize. @@ -4482,7 +4482,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Visio 2013. By default, the user settings of Microsoft Visio 2013 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Visio 2013 from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Visio 2013. By default, the user settings of Microsoft Visio 2013 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Visio 2013 from synchronization between computers. If you enable this policy setting, Microsoft Visio 2013 user settings continue to synchronize. @@ -4554,7 +4554,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the backup of certain user settings for Microsoft Visio 2013. Microsoft Visio 2013 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Visio 2013 settings. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the backup of certain user settings for Microsoft Visio 2013. Microsoft Visio 2013 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Visio 2013 settings. If you enable this policy setting, certain user settings of Microsoft Visio 2013 will continue to be backed up. @@ -4626,7 +4626,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Word 2013. By default, the user settings of Microsoft Word 2013 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Word 2013 from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Word 2013. By default, the user settings of Microsoft Word 2013 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Word 2013 from synchronization between computers. If you enable this policy setting, Microsoft Word 2013 user settings continue to synchronize. @@ -4698,7 +4698,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the backup of certain user settings for Microsoft Word 2013. Microsoft Word 2013 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Word 2013 settings. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the backup of certain user settings for Microsoft Word 2013. Microsoft Word 2013 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Word 2013 settings. If you enable this policy setting, certain user settings of Microsoft Word 2013 will continue to be backed up. @@ -4770,7 +4770,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Access 2016. By default, the user settings of Microsoft Access 2016 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Access 2016 from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Access 2016. By default, the user settings of Microsoft Access 2016 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Access 2016 from synchronization between computers. If you enable this policy setting, Microsoft Access 2016 user settings continue to synchronize. @@ -4842,7 +4842,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the backup of certain user settings for Microsoft Access 2016. Microsoft Access 2016 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Access 2016 settings. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the backup of certain user settings for Microsoft Access 2016. Microsoft Access 2016 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Access 2016 settings. If you enable this policy setting, certain user settings of Microsoft Access 2016 will continue to be backed up. @@ -4914,7 +4914,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings which are common between the Microsoft Office Suite 2016 applications. By default, the user settings which are common between the Microsoft Office Suite 2016 applications synchronize between computers. Use the policy setting to prevent the user settings which are common between the Microsoft Office Suite 2016 applications from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings which are common between the Microsoft Office Suite 2016 applications. By default, the user settings which are common between the Microsoft Office Suite 2016 applications synchronize between computers. Use the policy setting to prevent the user settings which are common between the Microsoft Office Suite 2016 applications from synchronization between computers. If you enable this policy setting, the user settings which are common between the Microsoft Office Suite 2016 applications continue to synchronize. @@ -4986,7 +4986,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the backup of certain user settings which are common between the Microsoft Office Suite 2016 applications. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the backup of certain user settings which are common between the Microsoft Office Suite 2016 applications. Microsoft Office Suite 2016 has user settings which are common between applications and are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific common Microsoft Office Suite 2016 applications. If you enable this policy setting, certain user settings which are common between the Microsoft Office Suite 2016 applications will continue to be backed up. @@ -5059,7 +5059,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Excel 2016. By default, the user settings of Microsoft Excel 2016 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Excel 2016 from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Excel 2016. By default, the user settings of Microsoft Excel 2016 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Excel 2016 from synchronization between computers. If you enable this policy setting, Microsoft Excel 2016 user settings continue to synchronize. @@ -5131,7 +5131,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the backup of certain user settings for Microsoft Excel 2016. Microsoft Excel 2016 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Excel 2016 settings. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the backup of certain user settings for Microsoft Excel 2016. Microsoft Excel 2016 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Excel 2016 settings. If you enable this policy setting, certain user settings of Microsoft Excel 2016 will continue to be backed up. @@ -5203,7 +5203,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Lync 2016. By default, the user settings of Microsoft Lync 2016 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Lync 2016 from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Lync 2016. By default, the user settings of Microsoft Lync 2016 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Lync 2016 from synchronization between computers. If you enable this policy setting, Microsoft Lync 2016 user settings continue to synchronize. @@ -5275,7 +5275,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the backup of certain user settings for Microsoft Lync 2016. Microsoft Lync 2016 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Lync 2016 settings. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the backup of certain user settings for Microsoft Lync 2016. Microsoft Lync 2016 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Lync 2016 settings. If you enable this policy setting, certain user settings of Microsoft Lync 2016 will continue to be backed up. @@ -5347,7 +5347,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for OneDrive for Business 2016. By default, the user settings of OneDrive for Business 2016 synchronize between computers. Use the policy setting to prevent the user settings of OneDrive for Business 2016 from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for OneDrive for Business 2016. By default, the user settings of OneDrive for Business 2016 synchronize between computers. Use the policy setting to prevent the user settings of OneDrive for Business 2016 from synchronization between computers. If you enable this policy setting, OneDrive for Business 2016 user settings continue to synchronize. @@ -5419,7 +5419,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft OneNote 2016. By default, the user settings of Microsoft OneNote 2016 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft OneNote 2016 from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft OneNote 2016. By default, the user settings of Microsoft OneNote 2016 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft OneNote 2016 from synchronization between computers. If you enable this policy setting, Microsoft OneNote 2016 user settings continue to synchronize. @@ -5491,7 +5491,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the backup of certain user settings for Microsoft OneNote 2016. Microsoft OneNote 2016 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft OneNote 2016 settings. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the backup of certain user settings for Microsoft OneNote 2016. Microsoft OneNote 2016 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft OneNote 2016 settings. If you enable this policy setting, certain user settings of Microsoft OneNote 2016 will continue to be backed up. @@ -5563,7 +5563,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Outlook 2016. By default, the user settings of Microsoft Outlook 2016 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Outlook 2016 from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Outlook 2016. By default, the user settings of Microsoft Outlook 2016 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Outlook 2016 from synchronization between computers. If you enable this policy setting, Microsoft Outlook 2016 user settings continue to synchronize. @@ -5635,7 +5635,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the backup of certain user settings for Microsoft Outlook 2016. Microsoft Outlook 2016 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Outlook 2016 settings. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the backup of certain user settings for Microsoft Outlook 2016. Microsoft Outlook 2016 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Outlook 2016 settings. If you enable this policy setting, certain user settings of Microsoft Outlook 2016 will continue to be backed up. @@ -5707,7 +5707,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft PowerPoint 2016. By default, the user settings of Microsoft PowerPoint 2016 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft PowerPoint 2016 from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft PowerPoint 2016. By default, the user settings of Microsoft PowerPoint 2016 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft PowerPoint 2016 from synchronization between computers. If you enable this policy setting, Microsoft PowerPoint 2016 user settings continue to synchronize. @@ -5779,7 +5779,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the backup of certain user settings for Microsoft PowerPoint 2016. Microsoft PowerPoint 2016 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft PowerPoint 2016 settings. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the backup of certain user settings for Microsoft PowerPoint 2016. Microsoft PowerPoint 2016 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft PowerPoint 2016 settings. If you enable this policy setting, certain user settings of Microsoft PowerPoint 2016 will continue to be backed up. @@ -5851,7 +5851,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Project 2016. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Project 2016. By default, the user settings of Microsoft Project 2016 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Project 2016 from synchronization between computers. If you enable this policy setting, Microsoft Project 2016 user settings continue to synchronize. @@ -5924,7 +5924,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the backup of certain user settings for Microsoft Project 2016. Microsoft Project 2016 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Project 2016 settings. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the backup of certain user settings for Microsoft Project 2016. Microsoft Project 2016 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Project 2016 settings. If you enable this policy setting, certain user settings of Microsoft Project 2016 will continue to be backed up. @@ -5995,7 +5995,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Publisher 2016. By default, the user settings of Microsoft Publisher 2016 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Publisher 2016 from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Publisher 2016. By default, the user settings of Microsoft Publisher 2016 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Publisher 2016 from synchronization between computers. If you enable this policy setting, Microsoft Publisher 2016 user settings continue to synchronize. @@ -6067,7 +6067,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the backup of certain user settings for Microsoft Publisher 2016. Microsoft Publisher 2016 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Publisher 2016 settings. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the backup of certain user settings for Microsoft Publisher 2016. Microsoft Publisher 2016 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Publisher 2016 settings. If you enable this policy setting, certain user settings of Microsoft Publisher 2016 will continue to be backed up. @@ -6138,7 +6138,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Office 2016 Upload Center. By default, the user settings of Microsoft Office 2016 Upload Center synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Office 2016 Upload Center from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Office 2016 Upload Center. By default, the user settings of Microsoft Office 2016 Upload Center synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Office 2016 Upload Center from synchronization between computers. If you enable this policy setting, Microsoft Office 2016 Upload Center user settings continue to synchronize. @@ -6210,7 +6210,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Visio 2016. By default, the user settings of Microsoft Visio 2016 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Visio 2016 from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Visio 2016. By default, the user settings of Microsoft Visio 2016 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Visio 2016 from synchronization between computers. If you enable this policy setting, Microsoft Visio 2016 user settings continue to synchronize. @@ -6282,7 +6282,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the backup of certain user settings for Microsoft Visio 2016. Microsoft Visio 2016 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Visio 2016 settings. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the backup of certain user settings for Microsoft Visio 2016. Microsoft Visio 2016 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Visio 2016 settings. If you enable this policy setting, certain user settings of Microsoft Visio 2016 will continue to be backed up. @@ -6354,7 +6354,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Word 2016. By default, the user settings of Microsoft Word 2016 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Word 2016 from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Word 2016. By default, the user settings of Microsoft Word 2016 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Word 2016 from synchronization between computers. If you enable this policy setting, Microsoft Word 2016 user settings continue to synchronize. @@ -6426,7 +6426,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the backup of certain user settings for Microsoft Word 2016. Microsoft Word 2016 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Word 2016 settings. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the backup of certain user settings for Microsoft Word 2016. Microsoft Word 2016 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Word 2016 settings. If you enable this policy setting, certain user settings of Microsoft Word 2016 will continue to be backed up. @@ -6498,7 +6498,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Office 365 Access 2013. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Access 2013 will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Access 2013 from synchronization between computers with UE-V. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Office 365 Access 2013. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Access 2013 will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Access 2013 from synchronization between computers with UE-V. If you enable this policy setting, Microsoft Office 365 Access 2013 user settings continue to sync with UE-V. @@ -6570,7 +6570,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Office 365 Access 2016. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Access 2016 will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Access 2016 from synchronization between computers with UE-V. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Office 365 Access 2016. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Access 2016 will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Access 2016 from synchronization between computers with UE-V. If you enable this policy setting, Microsoft Office 365 Access 2016 user settings continue to sync with UE-V. @@ -6642,7 +6642,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings which are common between the Microsoft Office Suite 2013 applications. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings which are common between the Microsoft Office Suite 2013 applications will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings which are common between the Microsoft Office Suite 2013 applications from synchronization between computers with UE-V. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings which are common between the Microsoft Office Suite 2013 applications. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings which are common between the Microsoft Office Suite 2013 applications will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings which are common between the Microsoft Office Suite 2013 applications from synchronization between computers with UE-V. If you enable this policy setting, user settings which are common between the Microsoft Office Suite 2013 applications continue to synchronize with UE-V. @@ -6713,7 +6713,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings which are common between the Microsoft Office Suite 2016 applications. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings which are common between the Microsoft Office Suite 2016 applications will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings which are common between the Microsoft Office Suite 2016 applications from synchronization between computers with UE-V. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings which are common between the Microsoft Office Suite 2016 applications. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings which are common between the Microsoft Office Suite 2016 applications will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings which are common between the Microsoft Office Suite 2016 applications from synchronization between computers with UE-V. If you enable this policy setting, user settings which are common between the Microsoft Office Suite 2016 applications continue to synchronize with UE-V. @@ -6785,7 +6785,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Office 365 Excel 2013. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Excel 2013 will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Excel 2013 from synchronization between computers with UE-V. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Office 365 Excel 2013. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Excel 2013 will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Excel 2013 from synchronization between computers with UE-V. If you enable this policy setting, Microsoft Office 365 Excel 2013 user settings continue to sync with UE-V. @@ -6857,7 +6857,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Office 365 Excel 2016. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Excel 2016 will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Excel 2016 from synchronization between computers with UE-V. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Office 365 Excel 2016. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Excel 2016 will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Excel 2016 from synchronization between computers with UE-V. If you enable this policy setting, Microsoft Office 365 Excel 2016 user settings continue to sync with UE-V. @@ -6929,7 +6929,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Office 365 InfoPath 2013. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 InfoPath 2013 will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 InfoPath 2013 from synchronization between computers with UE-V. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Office 365 InfoPath 2013. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 InfoPath 2013 will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 InfoPath 2013 from synchronization between computers with UE-V. If you enable this policy setting, Microsoft Office 365 InfoPath 2013 user settings continue to sync with UE-V. @@ -7000,7 +7000,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Office 365 Lync 2013. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Lync 2013 will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Lync 2013 from synchronization between computers with UE-V. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Office 365 Lync 2013. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Lync 2013 will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Lync 2013 from synchronization between computers with UE-V. If you enable this policy setting, Microsoft Office 365 Lync 2013 user settings continue to sync with UE-V. @@ -7072,7 +7072,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Office 365 Lync 2016. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Lync 2016 will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Lync 2016 from synchronization between computers with UE-V. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Office 365 Lync 2016. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Lync 2016 will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Lync 2016 from synchronization between computers with UE-V. If you enable this policy setting, Microsoft Office 365 Lync 2016 user settings continue to sync with UE-V. @@ -7144,7 +7144,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Office 365 OneNote 2013. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 OneNote 2013 will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 OneNote 2013 from synchronization between computers with UE-V. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Office 365 OneNote 2013. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 OneNote 2013 will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 OneNote 2013 from synchronization between computers with UE-V. If you enable this policy setting, Microsoft Office 365 OneNote 2013 user settings continue to sync with UE-V. @@ -7216,7 +7216,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Office 365 OneNote 2016. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 OneNote 2016 will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 OneNote 2016 from synchronization between computers with UE-V. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Office 365 OneNote 2016. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 OneNote 2016 will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 OneNote 2016 from synchronization between computers with UE-V. If you enable this policy setting, Microsoft Office 365 OneNote 2016 user settings continue to sync with UE-V. @@ -7288,7 +7288,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Office 365 Outlook 2013. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Outlook 2013 will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Outlook 2013 from synchronization between computers with UE-V. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Office 365 Outlook 2013. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Outlook 2013 will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Outlook 2013 from synchronization between computers with UE-V. If you enable this policy setting, Microsoft Office 365 Outlook 2013 user settings continue to sync with UE-V. @@ -7360,7 +7360,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Office 365 Outlook 2016. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Outlook 2016 will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Outlook 2016 from synchronization between computers with UE-V. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Office 365 Outlook 2016. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Outlook 2016 will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Outlook 2016 from synchronization between computers with UE-V. If you enable this policy setting, Microsoft Office 365 Outlook 2016 user settings continue to sync with UE-V. @@ -7432,7 +7432,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Office 365 PowerPoint 2013. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 PowerPoint 2013 will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 PowerPoint 2013 from synchronization between computers with UE-V. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Office 365 PowerPoint 2013. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 PowerPoint 2013 will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 PowerPoint 2013 from synchronization between computers with UE-V. If you enable this policy setting, Microsoft Office 365 PowerPoint 2013 user settings continue to sync with UE-V. @@ -7504,7 +7504,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Office 365 PowerPoint 2016. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 PowerPoint 2016 will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 PowerPoint 2016 from synchronization between computers with UE-V. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Office 365 PowerPoint 2016. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 PowerPoint 2016 will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 PowerPoint 2016 from synchronization between computers with UE-V. If you enable this policy setting, Microsoft Office 365 PowerPoint 2016 user settings continue to sync with UE-V. @@ -7576,7 +7576,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Office 365 Project 2013. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Project 2013 will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Project 2013 from synchronization between computers with UE-V. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Office 365 Project 2013. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Project 2013 will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Project 2013 from synchronization between computers with UE-V. If you enable this policy setting, Microsoft Office 365 Project 2013 user settings continue to sync with UE-V. @@ -7647,7 +7647,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Office 365 Project 2016. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Project 2016 will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Project 2016 from synchronization between computers with UE-V. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Office 365 Project 2016. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Project 2016 will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Project 2016 from synchronization between computers with UE-V. If you enable this policy setting, Microsoft Office 365 Project 2016 user settings continue to sync with UE-V. @@ -7719,7 +7719,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Office 365 Publisher 2013. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Publisher 2013 will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Publisher 2013 from synchronization between computers with UE-V. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Office 365 Publisher 2013. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Publisher 2013 will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Publisher 2013 from synchronization between computers with UE-V. If you enable this policy setting, Microsoft Office 365 Publisher 2013 user settings continue to sync with UE-V. @@ -7791,7 +7791,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Office 365 Publisher 2016. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Publisher 2016 will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Publisher 2016 from synchronization between computers with UE-V. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Office 365 Publisher 2016. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Publisher 2016 will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Publisher 2016 from synchronization between computers with UE-V. If you enable this policy setting, Microsoft Office 365 Publisher 2016 user settings continue to sync with UE-V. @@ -7863,7 +7863,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Office 365 SharePoint Designer 2013. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 SharePoint Designer 2013 will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 SharePoint Designer 2013 from synchronization between computers with UE-V. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Office 365 SharePoint Designer 2013. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 SharePoint Designer 2013 will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 SharePoint Designer 2013 from synchronization between computers with UE-V. If you enable this policy setting, Microsoft Office 365 SharePoint Designer 2013 user settings continue to sync with UE-V. @@ -7935,7 +7935,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Office 365 Visio 2013. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Visio 2013 will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Visio 2013 from synchronization between computers with UE-V. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Office 365 Visio 2013. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Visio 2013 will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Visio 2013 from synchronization between computers with UE-V. If you enable this policy setting, Microsoft Office 365 Visio 2013 user settings continue to sync with UE-V. @@ -8007,7 +8007,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Office 365 Visio 2016. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Visio 2016 will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Visio 2016 from synchronization between computers with UE-V. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Office 365 Visio 2016. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Visio 2016 will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Visio 2016 from synchronization between computers with UE-V. If you enable this policy setting, Microsoft Office 365 Visio 2016 user settings continue to sync with UE-V. @@ -8079,7 +8079,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Office 365 Word 2013. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Word 2013 will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Word 2013 from synchronization between computers with UE-V. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Office 365 Word 2013. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Word 2013 will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Word 2013 from synchronization between computers with UE-V. If you enable this policy setting, Microsoft Office 365 Word 2013 user settings continue to sync with UE-V. @@ -8151,7 +8151,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for Microsoft Office 365 Word 2016. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Word 2016 will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Word 2016 from synchronization between computers with UE-V. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for Microsoft Office 365 Word 2016. Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Word 2016 will synchronize between a user’s work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Word 2016 from synchronization between computers with UE-V. If you enable this policy setting, Microsoft Office 365 Word 2016 user settings continue to sync with UE-V. @@ -8223,7 +8223,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for the Music app. By default, the user settings of Music sync between computers. Use the policy setting to prevent the user settings of Music from synchronizing between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for the Music app. By default, the user settings of Music sync between computers. Use the policy setting to prevent the user settings of Music from synchronizing between computers. If you enable this policy setting, Music user settings continue to sync. @@ -8294,7 +8294,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for the News app. By default, the user settings of News sync between computers. Use the policy setting to prevent the user settings of News from synchronizing between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for the News app. By default, the user settings of News sync between computers. Use the policy setting to prevent the user settings of News from synchronizing between computers. If you enable this policy setting, News user settings continue to sync. @@ -8366,7 +8366,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings of Notepad. By default, the user settings of Notepad synchronize between computers. Use the policy setting to prevent the user settings of Notepad from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings of Notepad. By default, the user settings of Notepad synchronize between computers. Use the policy setting to prevent the user settings of Notepad from synchronization between computers. If you enable this policy setting, the Notepad user settings continue to synchronize. @@ -8438,7 +8438,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for the Reader app. By default, the user settings of Reader sync between computers. Use the policy setting to prevent the user settings of Reader from synchronizing between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for the Reader app. By default, the user settings of Reader sync between computers. Use the policy setting to prevent the user settings of Reader from synchronizing between computers. If you enable this policy setting, Reader user settings continue to sync. @@ -8511,7 +8511,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the number of milliseconds that the computer waits when retrieving user settings from the settings storage location. You can use this setting to override the default value of 2000 milliseconds. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the number of milliseconds that the computer waits when retrieving user settings from the settings storage location. You can use this setting to override the default value of 2000 milliseconds. If you enable this policy setting, set the number of milliseconds that the system waits to retrieve settings. @@ -8581,7 +8581,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures where the settings package files that contain user settings are stored. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures where the settings package files that contain user settings are stored. If you enable this policy setting, the user settings are stored in the specified location. @@ -8651,7 +8651,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures where custom settings location templates are stored and if the catalog will be used to replace the default Microsoft templates installed with the UE-V Agent. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures where custom settings location templates are stored and if the catalog will be used to replace the default Microsoft templates installed with the UE-V Agent. If you enable this policy setting, the UE-V Agent checks the specified location once each day and updates its synchronization behavior based on the templates in this location. Settings location templates added or updated since the last check are registered by the UE-V Agent. The UE-V Agent deregisters templates that were removed from this location. @@ -8727,7 +8727,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for the Sports app. By default, the user settings of Sports sync between computers. Use the policy setting to prevent the user settings of Sports from synchronizing between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for the Sports app. By default, the user settings of Sports sync between computers. Use the policy setting to prevent the user settings of Sports from synchronizing between computers. If you enable this policy setting, Sports user settings continue to sync. @@ -8799,7 +8799,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to enable or disable User Experience Virtualization (UE-V). Only applies to Windows 10 or earlier. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to enable or disable User Experience Virtualization (UE-V). Only applies to Windows 10 or earlier. > [!TIP] @@ -8864,7 +8864,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting defines whether the User Experience Virtualization (UE-V) Agent synchronizes settings over metered connections. By default, the UE-V Agent does not synchronize settings over a metered connection. +Available in the latest Windows 10 Insider Preview Build. This policy setting defines whether the User Experience Virtualization (UE-V) Agent synchronizes settings over metered connections. By default, the UE-V Agent does not synchronize settings over a metered connection. With this setting enabled, the UE-V Agent synchronizes settings over a metered connection. @@ -8936,7 +8936,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting defines whether the User Experience Virtualization (UE-V) Agent synchronizes settings over metered connections outside of the home provider network, for example when connected via a roaming connection. By default, the UE-V Agent does not synchronize settings over a metered connection that is roaming. +Available in the latest Windows 10 Insider Preview Build. This policy setting defines whether the User Experience Virtualization (UE-V) Agent synchronizes settings over metered connections outside of the home provider network, for example when connected via a roaming connection. By default, the UE-V Agent does not synchronize settings over a metered connection that is roaming. With this setting enabled, the UE-V Agent synchronizes settings over a metered connection that is roaming. @@ -9008,7 +9008,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to configure the User Experience Virtualization (UE-V) sync provider to ping the settings storage path before attempting to sync settings. If the ping is successful then the sync provider attempts to synchronize the settings packages. If the ping is unsuccessful then the sync provider doesn’t attempt the synchronization. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to configure the User Experience Virtualization (UE-V) sync provider to ping the settings storage path before attempting to sync settings. If the ping is successful then the sync provider attempts to synchronize the settings packages. If the ping is unsuccessful then the sync provider doesn’t attempt the synchronization. If you enable this policy setting, the sync provider pings the settings storage location before synchronizing settings packages. @@ -9079,7 +9079,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting defines the default settings sync behavior of the User Experience Virtualization (UE-V) Agent for Windows apps that are not explicitly listed in Windows App List. By default, the UE-V Agent only synchronizes settings of those Windows apps included in the Windows App List. +Available in the latest Windows 10 Insider Preview Build. This policy setting defines the default settings sync behavior of the User Experience Virtualization (UE-V) Agent for Windows apps that are not explicitly listed in Windows App List. By default, the UE-V Agent only synchronizes settings of those Windows apps included in the Windows App List. With this setting enabled, the settings of all Windows apps not expressly disable in the Windows App List are synchronized. @@ -9151,7 +9151,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for the Travel app. By default, the user settings of Travel sync between computers. Use the policy setting to prevent the user settings of Travel from synchronizing between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for the Travel app. By default, the user settings of Travel sync between computers. Use the policy setting to prevent the user settings of Travel from synchronizing between computers. If you enable this policy setting, Travel user settings continue to sync. @@ -9222,7 +9222,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting enables the User Experience Virtualization (UE-V) tray icon. By default, an icon appears in the system tray that displays notifications for UE-V. This icon also provides a link to the UE-V Agent application, Company Settings Center. Users can open the Company Settings Center by right-clicking the icon and selecting Open or by double-clicking the icon. When this group policy setting is enabled, the UE-V tray icon is visible, the UE-V notifications display, and the Company Settings Center is accessible from the tray icon. +Available in the latest Windows 10 Insider Preview Build. This policy setting enables the User Experience Virtualization (UE-V) tray icon. By default, an icon appears in the system tray that displays notifications for UE-V. This icon also provides a link to the UE-V Agent application, Company Settings Center. Users can open the Company Settings Center by right-clicking the icon and selecting Open or by double-clicking the icon. When this group policy setting is enabled, the UE-V tray icon is visible, the UE-V notifications display, and the Company Settings Center is accessible from the tray icon. With this setting disabled, the tray icon does not appear in the system tray, UE-V never displays notifications, and the user cannot access Company Settings Center from the system tray. The Company Settings Center remains accessible through the Control Panel and the Start menu or Start screen. @@ -9292,7 +9292,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for the Video app. By default, the user settings of Video sync between computers. Use the policy setting to prevent the user settings of Video from synchronizing between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for the Video app. By default, the user settings of Video sync between computers. Use the policy setting to prevent the user settings of Video from synchronizing between computers. If you enable this policy setting, Video user settings continue to sync. @@ -9364,7 +9364,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings for the Weather app. By default, the user settings of Weather sync between computers. Use the policy setting to prevent the user settings of Weather from synchronizing between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings for the Weather app. By default, the user settings of Weather sync between computers. Use the policy setting to prevent the user settings of Weather from synchronizing between computers. If you enable this policy setting, Weather user settings continue to sync. @@ -9435,7 +9435,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the synchronization of user settings of WordPad. By default, the user settings of WordPad synchronize between computers. Use the policy setting to prevent the user settings of WordPad from synchronization between computers. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the synchronization of user settings of WordPad. By default, the user settings of WordPad synchronize between computers. Use the policy setting to prevent the user settings of WordPad from synchronization between computers. If you enable this policy setting, the WordPad user settings continue to synchronize. diff --git a/windows/client-management/mdm/policy-csp-admx-w32time.md b/windows/client-management/mdm/policy-csp-admx-w32time.md index a9b6715a43..0afeb2cfc3 100644 --- a/windows/client-management/mdm/policy-csp-admx-w32time.md +++ b/windows/client-management/mdm/policy-csp-admx-w32time.md @@ -83,7 +83,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to specify Clock discipline and General values for the Windows Time service (W32time) for domain controllers including RODCs. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to specify Clock discipline and General values for the Windows Time service (W32time) for domain controllers including RODCs. If this policy setting is enabled, W32time Service on target machines use the settings provided here. Otherwise, the service on target machines use locally configured settings values. @@ -228,7 +228,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies a set of parameters for controlling the Windows NTP Client. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies a set of parameters for controlling the Windows NTP Client. If you enable this policy setting, you can specify the following parameters for the Windows NTP Client. @@ -318,7 +318,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting specifies whether the Windows NTP Client is enabled. +Available in the latest Windows 10 Insider Preview Build. This policy setting specifies whether the Windows NTP Client is enabled. Enabling the Windows NTP Client allows your computer to synchronize its computer clock with other NTP servers. You might want to disable this service if you decide to use a third-party time provider. @@ -389,7 +389,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to specify whether the Windows NTP Server is enabled. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to specify whether the Windows NTP Server is enabled. If you enable this policy setting for the Windows NTP Server, your computer can service NTP requests from other computers. diff --git a/windows/client-management/mdm/policy-csp-admx-wincal.md b/windows/client-management/mdm/policy-csp-admx-wincal.md index bceaf394ed..d5aba0a18f 100644 --- a/windows/client-management/mdm/policy-csp-admx-wincal.md +++ b/windows/client-management/mdm/policy-csp-admx-wincal.md @@ -77,7 +77,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. Windows Calendar is a feature that allows users to manage appointments and tasks by creating personal calendars, publishing them, and subscribing to other users calendars. +Available in the latest Windows 10 Insider Preview Build. Windows Calendar is a feature that allows users to manage appointments and tasks by creating personal calendars, publishing them, and subscribing to other users calendars. If you enable this setting, Windows Calendar will be turned off. @@ -150,7 +150,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. Windows Calendar is a feature that allows users to manage appointments and tasks by creating personal calendars, publishing them, and subscribing to other users calendars. +Available in the latest Windows 10 Insider Preview Build. Windows Calendar is a feature that allows users to manage appointments and tasks by creating personal calendars, publishing them, and subscribing to other users calendars. If you enable this setting, Windows Calendar will be turned off. diff --git a/windows/client-management/mdm/policy-csp-admx-windowsanytimeupgrade.md b/windows/client-management/mdm/policy-csp-admx-windowsanytimeupgrade.md index 8b06f92864..c0b49d9fae 100644 --- a/windows/client-management/mdm/policy-csp-admx-windowsanytimeupgrade.md +++ b/windows/client-management/mdm/policy-csp-admx-windowsanytimeupgrade.md @@ -75,7 +75,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. By default, Add features to Windows 10 is available for all administrators. +Available in the latest Windows 10 Insider Preview Build. By default, Add features to Windows 10 is available for all administrators. If you enable this policy setting, the wizard will not run. diff --git a/windows/client-management/mdm/policy-csp-admx-windowsconnectnow.md b/windows/client-management/mdm/policy-csp-admx-windowsconnectnow.md index 80b7d947fa..bec9255c05 100644 --- a/windows/client-management/mdm/policy-csp-admx-windowsconnectnow.md +++ b/windows/client-management/mdm/policy-csp-admx-windowsconnectnow.md @@ -80,7 +80,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting prohibits access to Windows Connect Now (WCN) wizards. +Available in the latest Windows 10 Insider Preview Build. This policy setting prohibits access to Windows Connect Now (WCN) wizards. If you enable this policy setting, the wizards are turned off and users have no access to any of the wizard tasks. All the configuration related tasks, including "Set up a wireless router or access point" and "Add a wireless device" are disabled. @@ -149,7 +149,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting prohibits access to Windows Connect Now (WCN) wizards. +Available in the latest Windows 10 Insider Preview Build. This policy setting prohibits access to Windows Connect Now (WCN) wizards. If you enable this policy setting, the wizards are turned off and users have no access to any of the wizard tasks. All the configuration related tasks, including "Set up a wireless router or access point" and "Add a wireless device" are disabled. @@ -218,7 +218,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows the configuration of wireless settings using Windows Connect Now (WCN). The WCN Registrar enables the discovery and configuration of devices over Ethernet (UPnP), over In-band 802.11 WLAN, through the Windows Portable Device API (WPD), and via USB Flash drives. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows the configuration of wireless settings using Windows Connect Now (WCN). The WCN Registrar enables the discovery and configuration of devices over Ethernet (UPnP), over In-band 802.11 WLAN, through the Windows Portable Device API (WPD), and via USB Flash drives. Additional options are available to allow discovery and configuration over a specific medium. diff --git a/windows/client-management/mdm/policy-csp-admx-windowsmediadrm.md b/windows/client-management/mdm/policy-csp-admx-windowsmediadrm.md index d9845c8533..0fa4658ba7 100644 --- a/windows/client-management/mdm/policy-csp-admx-windowsmediadrm.md +++ b/windows/client-management/mdm/policy-csp-admx-windowsmediadrm.md @@ -74,7 +74,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting prevents Windows Media Digital Rights Management (DRM) from accessing the Internet (or intranet). +Available in the latest Windows 10 Insider Preview Build. This policy setting prevents Windows Media Digital Rights Management (DRM) from accessing the Internet (or intranet). When enabled, Windows Media DRM is prevented from accessing the Internet (or intranet) for license acquisition and security upgrades. diff --git a/windows/client-management/mdm/policy-csp-admx-windowsmediaplayer.md b/windows/client-management/mdm/policy-csp-admx-windowsmediaplayer.md index 69a27c1fef..22acf9fa38 100644 --- a/windows/client-management/mdm/policy-csp-admx-windowsmediaplayer.md +++ b/windows/client-management/mdm/policy-csp-admx-windowsmediaplayer.md @@ -134,7 +134,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to specify the HTTP proxy settings for Windows Media Player. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to specify the HTTP proxy settings for Windows Media Player. If you enable this policy setting, select one of the following proxy types: @@ -215,7 +215,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to specify the MMS proxy settings for Windows Media Player. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to specify the MMS proxy settings for Windows Media Player. If you enable this policy setting, select one of the following proxy types: @@ -295,7 +295,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to specify the RTSP proxy settings for Windows Media Player. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to specify the RTSP proxy settings for Windows Media Player. If you enable this policy setting, select one of the following proxy types: @@ -373,7 +373,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to turn off do not show first use dialog boxes. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to turn off do not show first use dialog boxes. If you enable this policy setting, the Privacy Options and Installation Options dialog boxes are prevented from being displayed the first time a user starts Windows Media Player. @@ -444,7 +444,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to hide the Network tab. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to hide the Network tab. If you enable this policy setting, the Network tab in Windows Media Player is hidden. The default network settings are used unless the user has previously defined network settings for the Player. @@ -513,7 +513,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to prevent the anchor window from being displayed when Windows Media Player is in skin mode. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to prevent the anchor window from being displayed when Windows Media Player is in skin mode. If you enable this policy setting, the anchor window is hidden when the Player is in skin mode. In addition, the option on the Player tab in the Player that enables users to choose whether the anchor window displays is not available. @@ -584,7 +584,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting prevents the anchor window from being displayed when Windows Media Player is in skin mode. +Available in the latest Windows 10 Insider Preview Build. This policy setting prevents the anchor window from being displayed when Windows Media Player is in skin mode. This policy hides the anchor window when the Player is in skin mode. In addition, the option on the Player tab in the Player that enables users to choose whether the anchor window displays is not available. @@ -655,7 +655,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to prevent video smoothing from occurring. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to prevent video smoothing from occurring. If you enable this policy setting, video smoothing is prevented, which can improve video playback on computers with limited resources. In addition, the Use Video Smoothing check box in the Video Acceleration Settings dialog box in the Player is cleared and is not available. @@ -728,7 +728,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows a screen saver to interrupt playback. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows a screen saver to interrupt playback. If you enable this policy setting, a screen saver is displayed during playback of digital media according to the options selected on the Screen Saver tab in the Display Properties dialog box in Control Panel. The Allow screen saver during playback check box on the Player tab in the Player is selected and is not available. @@ -799,7 +799,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to hide the Privacy tab in Windows Media Player. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to hide the Privacy tab in Windows Media Player. If you enable this policy setting, the "Update my music files (WMA and MP3 files) by retrieving missing media information from the Internet" check box on the Media Library tab is available, even though the Privacy tab is hidden, unless the "Prevent music file media information retrieval" policy setting is enabled. @@ -870,7 +870,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to hide the Security tab in Windows Media Player. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to hide the Security tab in Windows Media Player. If you enable this policy setting, the default security settings for the options on the Security tab are used unless the user changed the settings previously. Users can still change security and zone settings by using Internet Explorer unless these settings have been hidden or disabled by Internet Explorer policies. @@ -939,7 +939,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to specify whether network buffering uses the default or a specified number of seconds. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to specify whether network buffering uses the default or a specified number of seconds. If you enable this policy setting, select one of the following options to specify the number of seconds streaming media is buffered before it is played. @@ -1013,7 +1013,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to prevent Windows Media Player from downloading codecs. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to prevent Windows Media Player from downloading codecs. If you enable this policy setting, the Player is prevented from automatically downloading codecs to your computer. In addition, the Download codecs automatically check box on the Player tab in the Player is not available. @@ -1084,7 +1084,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to prevent media information for CDs and DVDs from being retrieved from the Internet. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to prevent media information for CDs and DVDs from being retrieved from the Internet. If you enable this policy setting, the Player is prevented from automatically obtaining media information from the Internet for CDs and DVDs played by users. In addition, the Retrieve media information for CDs and DVDs from the Internet check box on the Privacy Options tab in the first use dialog box and on the Privacy tab in the Player are not selected and are not available. @@ -1153,7 +1153,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to prevent media sharing from Windows Media Player. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to prevent media sharing from Windows Media Player. If you enable this policy setting, any user on this computer is prevented from sharing digital media content from Windows Media Player with other computers and devices that are on the same network. Media sharing is disabled from Windows Media Player or from programs that depend on the Player's media sharing feature. @@ -1222,7 +1222,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to prevent media information for music files from being retrieved from the Internet. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to prevent media information for music files from being retrieved from the Internet. If you enable this policy setting, the Player is prevented from automatically obtaining media information for music files such as Windows Media Audio (WMA) and MP3 files from the Internet. In addition, the Update my music files (WMA and MP3 files) by retrieving missing media information from the Internet check box in the first use dialog box and on the Privacy and Media Library tabs in the Player are not selected and are not available. @@ -1291,7 +1291,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to prevent a shortcut for the Player from being added to the Quick Launch bar. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to prevent a shortcut for the Player from being added to the Quick Launch bar. If you enable this policy setting, the user cannot add the shortcut for the Player to the Quick Launch bar. @@ -1359,7 +1359,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to prevent radio station presets from being retrieved from the Internet. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to prevent radio station presets from being retrieved from the Internet. If you enable this policy setting, the Player is prevented from automatically retrieving radio station presets from the Internet and displaying them in Media Library. In addition, presets that exist before the policy is configured are not be updated, and presets a user adds are not be displayed. @@ -1428,7 +1428,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to prevent a shortcut icon for the Player from being added to the user's desktop. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to prevent a shortcut icon for the Player from being added to the user's desktop. If you enable this policy setting, users cannot add the Player shortcut icon to their desktops. @@ -1497,7 +1497,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to set and lock Windows Media Player in skin mode, using a specified skin. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to set and lock Windows Media Player in skin mode, using a specified skin. If you enable this policy setting, the Player displays only in skin mode using the skin specified in the Skin box on the Setting tab. @@ -1570,7 +1570,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to specify that Windows Media Player can attempt to use selected protocols when receiving streaming media from a server running Windows Media Services. +Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to specify that Windows Media Player can attempt to use selected protocols when receiving streaming media from a server running Windows Media Services. If you enable this policy setting, the protocols that are selected on the Network tab of the Player are used to receive a stream initiated through an MMS or RTSP URL from a Windows Media server. If the RSTP/UDP check box is selected, a user can specify UDP ports in the Use ports check box. If the user does not specify UDP ports, the Player uses default ports when using the UDP protocol. This policy setting also specifies that multicast streams can be received if the "Allow the Player to receive multicast streams" check box on the Network tab is selected. diff --git a/windows/client-management/mdm/policy-csp-admx-wininit.md b/windows/client-management/mdm/policy-csp-admx-wininit.md index dbbecca9d5..9e17ae7971 100644 --- a/windows/client-management/mdm/policy-csp-admx-wininit.md +++ b/windows/client-management/mdm/policy-csp-admx-wininit.md @@ -80,7 +80,7 @@ manager: dansimp -Available in Windows 10 Insider Preview Build 20185. This policy setting controls the legacy remote shutdown interface (named pipe). The named pipe remote shutdown interface is needed in order to shutdown this system from a remote Windows XP or Windows Server 2003 system. +Available in the latest Windows 10 Insider Preview Build. This policy setting controls the legacy remote shutdown interface (named pipe). The named pipe remote shutdown interface is needed in order to shutdown this system from a remote Windows XP or Windows Server 2003 system. If you enable this policy setting, the system does not create the named pipe remote shutdown interface. @@ -149,7 +149,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting controls the use of fast startup. +Available in the latest Windows 10 Insider Preview Build. This policy setting controls the use of fast startup. If you enable this policy setting, the system requires hibernate to be enabled. @@ -218,7 +218,7 @@ ADMX Info: -Available in Windows 10 Insider Preview Build 20185. This policy setting configures the number of minutes the system waits for the hung logon sessions before proceeding with the system shutdown. +Available in the latest Windows 10 Insider Preview Build. This policy setting configures the number of minutes the system waits for the hung logon sessions before proceeding with the system shutdown. If you enable this policy setting, the system waits for the hung logon sessions for the number of minutes specified. From 564a005dc434b3bc89e0efe60e9ce7570d45afe1 Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Wed, 30 Dec 2020 12:29:07 +0500 Subject: [PATCH 44/47] Update microsoft-cloud-app-security-config.md --- .../microsoft-cloud-app-security-config.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-config.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-config.md index a05d99d1d6..869c67e8b9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-config.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-config.md @@ -44,7 +44,7 @@ Once activated, Microsoft Defender for Endpoint will immediately start forwardin ## View the data collected -To view and access Microsoft Defender for Endpoint data in Microsoft Cloud Apps Security, see [Investigate devices in Cloud App Security](https://docs.microsoft.com/cloud-app-security/wdatp-integration#investigate-machines-in-cloud-app-security). +To view and access Microsoft Defender for Endpoint data in Microsoft Cloud Apps Security, see [Investigate devices in Cloud App Security](https://docs.microsoft.com/en-us/cloud-app-security/mde-integration#investigate-devices-in-cloud-app-security). For more information about cloud discovery, see [Working with discovered apps](https://docs.microsoft.com/cloud-app-security/discovered-apps). From 49e4bf55a51c12da969a07b21540aa81d6e14beb Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Wed, 30 Dec 2020 18:24:38 +0500 Subject: [PATCH 45/47] Addition of information in security properties As suggested by the user, there were security properties missing in the document and has been added. Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/8819 --- ...nable-virtualization-based-protection-of-code-integrity.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity.md b/windows/security/threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity.md index 8dc3221ed3..fdec65680d 100644 --- a/windows/security/threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity.md +++ b/windows/security/threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity.md @@ -196,7 +196,7 @@ Value | Description **5.** | If present, NX protections are available. **6.** | If present, SMM mitigations are available. **7.** | If present, Mode Based Execution Control is available. - +**8.** | If present, APIC virtualization is available. #### InstanceIdentifier @@ -227,6 +227,7 @@ Value | Description **1.** | If present, Windows Defender Credential Guard is configured. **2.** | If present, HVCI is configured. **3.** | If present, System Guard Secure Launch is configured. +**4.** | If present, SMM Firmware Measurement is configured. #### SecurityServicesRunning @@ -238,6 +239,7 @@ Value | Description **1.** | If present, Windows Defender Credential Guard is running. **2.** | If present, HVCI is running. **3.** | If present, System Guard Secure Launch is running. +**4.** | If present, SMM Firmware Measurement is running. #### Version From 9631e4445d6d9b450ac5ad6287b17c5d61b673c5 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Wed, 30 Dec 2020 09:33:27 -0800 Subject: [PATCH 46/47] Update windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-config.md Co-authored-by: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- .../microsoft-cloud-app-security-config.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-config.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-config.md index 869c67e8b9..1ec715c5e8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-config.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-config.md @@ -44,7 +44,7 @@ Once activated, Microsoft Defender for Endpoint will immediately start forwardin ## View the data collected -To view and access Microsoft Defender for Endpoint data in Microsoft Cloud Apps Security, see [Investigate devices in Cloud App Security](https://docs.microsoft.com/en-us/cloud-app-security/mde-integration#investigate-devices-in-cloud-app-security). +To view and access Microsoft Defender for Endpoint data in Microsoft Cloud Apps Security, see [Investigate devices in Cloud App Security](https://docs.microsoft.com/cloud-app-security/mde-integration#investigate-devices-in-cloud-app-security). For more information about cloud discovery, see [Working with discovered apps](https://docs.microsoft.com/cloud-app-security/discovered-apps). From fe771ab73598467829e068f8973dd7509634e74b Mon Sep 17 00:00:00 2001 From: Thomas Raya Date: Wed, 30 Dec 2020 15:42:54 -0800 Subject: [PATCH 47/47] Update docfx.json Add "**/*.svg" to build.resource.files --- windows/security/docfx.json | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/windows/security/docfx.json b/windows/security/docfx.json index 1998bdf279..a27324310a 100644 --- a/windows/security/docfx.json +++ b/windows/security/docfx.json @@ -21,7 +21,8 @@ "files": [ "**/*.png", "**/*.jpg", - "**/*.gif" + "**/*.gif", + "**/*.svg" ], "exclude": [ "**/obj/**",

w!lEK96_ks27|Ai6v~-5kD~JW z8bQQm4Aj%R!F`-fRwsko61&xB;&?&DeY5+4Kh4gF4|WQA!*?yet>WZo7)C!}S&$a1 z@>hPf5XA(}>-^*ueS5Bs5~0BRII6{}+EJgJ;uPmM$5`D~?*sD$`~NpJH(=b8HV3zj}sdxZ?}E@&m+RvnvI@6rPDSHieXu5>(U68Eg0z z!J$p4#@Vl21*YRCIjdk~5py`Sicrux*6-F+2ztK3rCdLe`Y-PF=D0IS6v)uB@2dLj znZ3e2u35e9!HN$~_9o_9k!_$0!Y4lI2)|aUG7#ZJdtF;<25z4AB#&8*t>I})`nThA z7{2H*#70SJ7NG7v^jI&2Sx@gK6pEkR^{i@rpQP)f^*{nD#P{$KV2iSRnbH>LqL)pH z>sf-O&XvcKXsy7T#o)Fj+2dG-gslpc>^F7nuS_*bAXpp8L?>_N4IGHleUb}}BJ`FW z6Y4Ld6%!_f`|(SqOu?*`A6j9{cy+ZXLcRjEe=@dPd74#>Hbe6* zpRu=PO}KAOfj~yk4<>QHV9&RFz$=%kGKRifZlZ(YQ}O4^;zsu&-j)1vO+-YF%vNQ} zKa2Y&f*`}`h}iM#DBv8&!V7+E)fmw3>jw`7F2eBoE$X(y#4amuV*TDRBIi-{7*L~?No__3{+qdhMt~8$Gu@&Qwtyf9b8*; zKj7HIAJS35aiUL!*^72e+>N&cvk;e1;fo$=KK=3;}0 z^_~HCd`uC|V3M~XBNmKLtZ2LYZE@fEH8iMp*qOQ*wBTS%yI-!Xo4$QQ5aec@if9?I z_z54HOqy(q9oSEtVi-Ht#9?lVn2&9xnF?D%wEYD1fst;XQV?mCtHWHht2G*9_7=G}!M6DIA` z29pd`OF~RcRhX{~Z%o>X%-usJtkOSQd7iRq^zINW4&kYKh<$_=+i%!o;-bEur8%eZ ze6ZjCK6lcYG=0jibyD`LRMpSAA44~n2+GI45WGgnGs$NK`jX>fubm-Mh!PVz0AUp> zczszqO&+$v8k%O@u$tIbby3Vzv{SyPiijM=ZV@V)qX=!lEPDH{XkLRIR<)g=%HN+x z7wc$S8)O2hY;75FOUNS|Cu0=!=vhttIVBk?`*-2JxA5F8E=nbOs+GTXee&Dacx95= z^Q%WhtFY-pY*rQb<-X?vlFO_n9%p;MwrFDk2}{6DQPlHn!szCj8Yp+JRo3YIKyH&( z+@Jk6UpG1c<`4Nshf;rb_C(B|G|F{11Gi66`V1{#Fd8yy^vN;VWCLv z4ZC2EBJg7~e@f{B1t>z1AU4b2|s%s+-J(0kNZX zbZUG#II3GPWps{Bgd9 zPe85c6Ads+xO7l&nTSTqB9Tj9z_d&Kn2qZL(S*xm>*w4rUn)YnlEL_c2rdTfdtIWU zYycB7E%f*=H~~Fx`#_6DkoVa7dNeAh%#7Z8ur<9n3GP4od1me1pDIQp-r!FznOz>r zp4>gHTZx&8+oO)7R+HdcW-MMUu5g?KY%X8)1#!|9En(JBZ zN4g@5lw1mq%NS9L8tTdj1XP9@Osy?>7M?0>`2$k0xANGJ9*9;~95tL-rtkKGXl8ax=gA$S5DAW4x%dVlZc6ik`Ys~R)t z@csAA&SwwVTnzimsL94z?m2vdFPvvDqQucqGBSyk(uO2!GXd%nDXDUz`(T`mmpJM? z#mF_CVan^FwwZGY=Vi@VoW;)-aS1NhD~og#iTh@HqJy&FA?6#Ka|DU|(fm6K=)%dJ ztk(^cH@&ae33uM2&*fyR)Gs7_!phIbiEqlNKeJ2gI)(#{xD-;7gcfu=`#Qhwwa;F! zitD5fmE|r_&hDcjC5EKbhNUFw7Zb6q=dbl%KEDc0zen(qU&vXJ1l@fq05^%X$JJE< zts=fGZ`gvchI{}G^7`Z}G#6!UAdV|X{Ofj7F#Tk+nb)!*XZ%_Gy^zbudz9<1hbiip zGEl1DwBj(|xyd~>_4jM{N z*VN2-xnQWep7sR6@GCN@&(v*oVfty34~#D%w#R&;n8Lxy)r#T0TaGk_Mv;e2OHBw_ zzbpEVCyubtgB_FEjs)lK-cam`K_v;X+i_Vf_#sx(7qcv)5UI+gCq#Oy@;t$X-eLUD zt+7?Y(4a*VoS;BiP?cC{hqvYj*#z0?NA*1IRv!e}>2YcfN}AqpFx~0Y zqdtuwhRIS2S{r#>5@iMSg4X%?YK1lL~cVu=nhx=;j4)`lyt;!GDx z%462SH%JFc`hRdoeLXoR-pY{^#CIM8TK)t0OKM608ab7B@8C){zEc-{i8z&{_%oe||1?2+TUu>o z!zC0(yPJ=GHzeJb<^#8Cm=S5fN6W)G-@%nSd@q8IuEUI&JOsN1yZ z{7cnJD6V?Z8%y@9qu)qQo;~rw(Bs_%#)D{>AIyK}=;`-bj0nYg*84#StT3JXH*5YW zx{gzNBB3^I^X>tvr0dbq1Ao%zD7;M}+G~C5h27y2?IPH1ANj;#~C z&cVVaM3f5r`<{K5o?}FYZHW2j>caeM^e9NLh=09%KG{D9o~c+KN$H^_JE{umO;TRR zAVzcCNS1sCx;s#8M%~PA=9}Lik&YVAPG>65QT6pUw3>Ig%CmQd^7qwN@~O(~r)PTm<4%)5k*?<1 zP(!_fL<|dwbV=r2G29K91#bbm!W0|mz~Udkc!$?o&_zzeH)*L5ixyhk7@=?CB&V!L^5y*(-L0b zA%<_lONJhX6|}{`Ca7);o|4P=;V0}SW5dpc;wsCIl}Oen1dc^IZnOWBgR;DvShriV zmV2F&SmxT6SiN4EC^_`@Kd=DNA;0koB#sY{{J&Z^#G-ylU=kxXDmX1)2p@=1*HeZbg8<9WfZZc$oeB_@7$FzW-|{MD&{J|G!V literal 0 HcmV?d00001 diff --git a/windows/security/identity-protection/hello-for-business/images/pinreset/pin-reset-service-home-screen.png b/windows/security/identity-protection/hello-for-business/images/pinreset/pin-reset-service-home-screen.png new file mode 100644 index 0000000000000000000000000000000000000000..9903a59bf515023bffa4a5b2a0932755efde96b1 GIT binary patch literal 71281 zcmd?RWmHt}9|tI+gfu7}!_ZO!N;d-xQUXd0CCx~;w1kA@&`85jQUXJl0+LcggMbp! zAOnc>-ueCa?3;bRXZI}Uc)Y{RTyA`y=liMWM!(QfC3!&q;Le>pBx+EI?wvb0Rd?>( zl_J0ceq$cedjkB2*a?&-kQQ=o`qxu|G{A!cchdZVX2P zdrT(q!=uyt{l6c_Q=j1da<|>B&ck=hh~M9*Zha5F`;&PZ7#PfURkV)D9EROqjon_o z4#FhoU9EG;P43urUH`q5OZ|Lxba;Dn=(EWscRr{cgb}F=LEDFW5d+eo~4e%^!q zH1?g6Z)5LJ)y%Hbo1BR=F8FVcN5qc*x3BZe-?BZ>-4UED4$5c-=q5XV`eB-X*eXcSh7@D9~b8idk?mr#IKb-mH>W*aLdIet?h!@7v$M@*+D=Ix*^yzWmm=?=r z`oDG-iDK@kk?xp~-Y9SZHZb*F+zD4FW0673xf@;S>9gj|KZ5%wY-%dH^hL$b18pWJ zBZ5U40%oLd0yoyP^l1}kJk}hZYY@A%AF24BP8$q=(eGnX1B%24|C+7Jg%nDpaJ_y@ zaxHz;ajS1;=2C$9!larigO6;ud503EOPu^nwhFTXBTt8TYf@;;-WEvTUL8;Cbe;bm z*l|19NH?#Z?K(lLQ&oHIm6zsz8toh#k8e9@t;qI2XxZ4S9}`HBz1aFE0+j2~0Z7dO zjP#n+6iZFkk}PNR`Qf&K85XQre@1!Gd3oUeJJT+WN?W>C(!2NmX0`{Zayo-^b3yyf z#qO!$%DZ;K&VQ?Qr!&Us&t?pZZfaz3?#a*>a8XA08vbv;S4aKn&t^^PE88(cHp!Zz zJiz|@|B1NtTSPMH&zSk|*DbuMcvULUdN&xmtBr9bvZ{&aEAL{-F`|o(dTFNK^L3lK z{%Q52k`+IERsuI_`b&x7CDaL)kBYVHlk_qod07D$UrrWv7zH*s+%WS;yZ6 zhqbXAW^LJX>v{KK{$aGbps5_eK{Qux*`}7nMoL{jvwsS2O?zE>yeaJD>Ud1BqNdYt z-m!jUNapN^UV?hq2gN4f&^`)iV280DgBpyAwaO}9qJ*#O3S(0gC;GUevhMl3Q`6E= z51E|w&E6p^KX>@WpQYyP!%hT(hkLCclKE4fU9RtMCkF1yhL)9cRc2pg ziToP4^0llZcSHbZrfhn@DOn7`g$=l-ymW;X-Ubgo`PVv zgZAUmtQTCML}QnZhDM9c9G_}0M&ES=71Tf?O68%~xB~vPL*n>^DvRkXW*~$QxIOF7 z7kI0iEscV&Pj?%@FPxU%uEp`HsWUOV53s&63r_*04E>5^F-wEJDR=LsPN4@SmIEKHm z>|Uw!=SwoW=a;Oo4Rr@RLRPJbS=q}yy&|5xD9-7afgikg>kl@~E}?tA6E7qbFw zd%D%FJD=Py_nT&KmDLM{PGPD_lrue*#ioAS#m^*_xS=mzdhR#O&OpDn(yh8)1M>%L zmx2{x`dsh%;i%MMrB30?;^PB_kLxnmCzHG0-ojDMm22lLN9DNl<&z)NFg4AqALtd5 z?hmp$);aV;;X^=kd|SFj0`It5a2X~clhzw;-$u9}R3*gybG!L;nae-c;Tr6_eN;4j zOtxp78@#om`tM5B_uximhCsRko}~Xh9gGpiJ>bn@K}T?+Te5p5r)J z9n`8*P)KqGHV=SfUb-L4?C7K&Mn##3>Ot<6#fdGywTk;lPG1OdMSrl?Z}blJdcvbg z!5kV(z&i`{_}(c+7wGOp`Z8aZ*^SEis7_6~dGXr|m2X9#!2)AdmHpF0&b%&91Ha$UECE$fUTRoKp}ejEVWg`oDR8BcWL-Z@6t zheSEH{u^-#(%U_5+ERmX7b>El`18>RmP}f`wv)<4Su%+elE>2>tOX`fj-}DWk8^SncnJ_nrx%6`_oBXhl#Dv#7Hgk=lKD^jnA>7{u@t z)~y7CPL)uQiKsppbITHgM9r*{=X!z)!EEPMJq_~T3l)$X=`x83Xp*!kI!QnoHq$$h zgPoPA)L?q@Fh*Ihq6uT0JtyPeUMSIoiR;(_(_F{p9z1l%|Q9X<+SePx6q)8WJxp?uN|1gie>8PI5^bKG&X=0B1}j@4cg7TwXU z?OXFLF}y^CdQ_cq-ve1n{`rFI&}-c$-Y*!M)ThKgK=_pvv>A%}5<#>vhYT^yK4Ve? zi`ew`bTy8!X*kJSJ5)93SB?FCApd#&?VGGR(87Om53$g7(2Wp%{0@p&j@p&Y4X$e& zQz07jnh&AP;z)d$g!;>Yrs8QJpMV~*lDA!vmv&L)K}pCXxwTrV6|x&U7XxWAAI2RA zJ`246VZ!!)tLeTejT~vL^`I8>It>MT6sdC9!L*9b!siq_Y{A@5LUAg>W+J4mc^}P$ zDy2)VeOdI($Wv2f%q{)!jB8AeRRl6kNiO_nFU2kwB9rT;TkSCA;DN78o966MWA`mF zen5>$K{%fnsirb!X4F)NQ`B~_E{RBPRU~zIz3)dy${^Jlr`}x2y{c_yJACr4wc|MtwD{$L9CbGfiPj-7X z?W~>dtIfM{aEX7LeLI2KLEu_S+NO-L;-XuE>{4sfw|bN(f-FRh@~9K3ER1->XzRh|HGUBJaqpsuzJvTD4;Ib;R)ci zz#)$@8L^u!`9-sJc!8+HC|s7Yn=`B5u<^`~be(=L}s zTkhJEqZ0smZLthu)jxngyjGLj3OXxFkcACm=ByH!f}aA%d=a^fNPC&Zy#X8^|Crou zfG^Oz`|{42#J3F0e2bI99BP1mUk8A`Y3Q&7`#LlGI=#)eBP?l1+r0sC-*#Q>R5b7< zE+03Iect^AfKb6NarfzaAGv>k9&u#flD!%JC-pO3_z?tQq?YJ>W zPv}~c4*lV~nd9}=se$bEtYHds?oY3S6<4Z1*9a4J?!=;`=P`dwaQJ zo@U}cNT`#zWuN0U!=uXN_3}FC&sY5P9PfqlG?7Ke`qZwAimt~F)h)Jh)^~AbW{$I; zl(qt>KUF*UVsgWv>*AG>|9-1pUUWKT!)L)A={Spjwp-SD*sZeSc?` z4qf~r3vT8^jVr!NaQ*hkAf;t9x9w_a<=V6=IUqqA1C>!#vAzZ52;|kN`K{M^H%;e@ z$s7e_p@A^^)K2blzV259gI04Bk(2cA467l&`tQ23|Gtu?9R?oyZ>%S4S8tM!0u;`; z^C-^c<++Imz{Rvd1wj3@I@W%pesy@^S(0h{X@6SaG&#q)2B=QIKw#Pkn&3sRP9eqs z9AwCpbKA7+x4T2E@H~F9>85uuD}=2~Vl%tmB;e@V>Bs%XMSzU6#fuk8>RN}tpf>fK za9;^LOU06&B-~P33Ov=Ib%g57rG%b!%ZTXWOT{%LPYh_`J-(k%~+o@Xs5jN&3dR|B6SNnIzQnt1-M*fRJ=$M zOI|9HYTXl=BvO0^Inq;J=^GVi1AwPNz-uzbJH~a&2jH$Vjk!L{zNc-CQGElqz@T|$ z>iGF9Uc(4jWo6q?E()xiOk?7zz@HF%FwMdrf{Rh`UU>I;FviuT<8)?$d0(`}HLp&f z;{^S97TbvrOSyV^s&>pEw^c5I6;~&va{RMq{!aYnT`mpN`mYWE?sZ-0gP;aSc~X~l z0&l%ijmw8+Vv=TJ^RTc76+^(NcwKvSV@|JtDl!L#Q6(c-M z1~4muX&#T?+R{f5jz0gxjwZ_cTnEAOqS+$&WQB}p;CrJ1#i{zAPVb{qlVy*3sdyC< zn4CiJF!4_Y?UfScd^SBc1PrfI=SS22NrUNOOwIWS@i zgoW(9 zUoTQ4$s-Um@~U1Q%ELJcCygb0D|Qj|lawxAEA7-9D5!piRJx=m#fjs*r%kEc00W`{ic znS5R@nRrepyGX=mfcY2h`@+CvQFSLGrmXz?F9f%!E~2<8A?S-|K%dI!1ggAlwAa_Y z5vt1m!GrXHV|zU2I{mQuB7 zsEuVK70IuvPsMfc?^5zawZcH`z1<;A5YVUknIf~Zs82Hh1wOJ1)`o#uwvuK5ift%X z1{%QvbOi$IB0HWQ^Q%>w(`N3Z%7L=`x+TUsFo?mXf-~x{OoH@2j_rBig-=(XBjwbk_d4`m2N3>J1@w2=B z`xQBRIPeHQ@!pf6EP=7Gc-#WXzD=VBosZ5Se?kd)j3cQsH}ffl<2g9%5IVNr?c>V) zgY5!UO&t}4=7g)QXJduVd;PgI(Z}gUp8j)>WrBX8(KwIB-_~ODfUaa-Q~UcD z{jMb12P`5Vp51mEhJx^C3vUjzu*q2C67ZvgaS++hvOtf*3(ZEUx4Ff#pDDWYb>cJX zRdb{16TKuDIHr2ejVqMW3LkA&a7p6nWF0@oOK>pUC2e0r#8_YcC zZPKSNtg4`XR1?iwIh+JL1yrr37VjUuX?@uRVnK%dXh3x47;uiikE2D$L-zn-thyIU zdffta#90*BlG2E^c#Z^m1{EYw>q?xYxBb#_k`A1s#>&DTyu8=@@A+n4m*i_wssgt}M(`?OsDg80LY8wY{4U&Ws+uZfZmDlxwN=BqXHY%! z{?xBY6{evEFXJg28BNbsHn6<=egh69#JcmOSTMCF=(NIS$!oUC8c!iN@AAjyj?yqX zp5i{MfH1Gvms+;dxu^oCsBeG0+n6ZuLAyX3ZaR>DS-Q)HR_a98HjYh->FPS)$(;Xs zc9am@9;Cb+}w@F-MVRn$)xKn}-p2IqT}Bp^xaXh(&v ze*z=)@~#9ZQwI&8O|$qZ!@iumxy#k13mW<}5{vvx3{WI#rFlWE?MHnKYYFi(%K!wx0EL}in(Oze9S~jD5;!Rj869`u z)0lB5$lbif&Zi}xn7C{;PU2C-cf)=G>K8w@yI-$tV#Q3XMCsLyr^VuSdwrG;bjiv} zpyzG?tSjry{?C{3GJoglh8|a>uq8;>Q5u4UsGr=B%3b}b`z}13vgEy36+Z&85VdnYMEETWn+3{MK(C7+$4*=4|}i`((lYdVqQ@4>e0lJL!=FjHQ{|DhIkK#@c86 z=ONSn|8AcZ0C4$H}!Xm!eqj!+Mz_A^vmNElQksd<_CqKOVz%Q1-vZ`U` z6Ov<^^9`K!BZ9fUdd&H!$l$ zTIV+j+5lZ1ytW1wsq=WinhGi}m@58IE^_5q03T_~>F1eE0TUx`sflYHll0^mv1 zwEo&qmAlZ%bZVR*0yv@BX}?6{J!Bv-dAu=IpSsztZmZsL1e$-P(?p4;=sZ#j1hdmL z^PAOg<6P2S#u9|T1;U(oPL}u!ma6MjP0O&wlHewQ-F+hai4<&EPx_RO1r{5?_zp4x z6y0I0&vH83h%X*^tq^a1y<_kSfA0Xe%{BY3hl)h}FE7~-rsI{VjgUJUru?YWa4M}b zn_4-F7euGcy=F}vvKFGF>&VNVeF9!I?aZEHd6rW>AtBf(=zPNg z_Tuq1)^#1G>HPB^lXDnQ>fAXIe}}=Q3)k)iHDJrY(mLm`UJT$*$y(G+b{k6WlobsD zc-Pno);4#dDYo>|%Q1ixxc7L#y%)|9{o&e!@d-Zjd4_HUuHCMih))0QhWSl#z$#T< znTU3lXiCp7y3YzGj6agp1&o%@I?rC&@h@4Bw=r87`Us16osYQ8IOxOR#eQ*LFEhsi zO0Ix!+nfVcv*@?4Ok?_z=IbD)STL|$lB^9^4xo{*RGD<>vjhLmZzSCQOW6HQNh+RQ zAnMe*U9vH3e&c=)0DjXAu9#bjL!g+9YSsoEMO2Vj586Z)C_}Agt!qX;5L5UWe()ds zRO|0)xV22nrw1fVZUHRUTdEanN@n~8QREVQSr#|jc{k;h1@`HToeqM5uAf+WLE2jM zA@&9*(f)~A15)(WofkU`r57PG8MIq8b>O#NpkEyH9hQ~8Kx~$mrG+j1UDs*ch~mn>KCxxRH#;J3 zin@EM^94k~S?d{hlzpLuLcFT}Cc8>53j@CqEld7;BZhy@BZL1%UgQL60WJ+JO?X}e zGa-Ab+*QvIzO^8_D*RhRaZ4++@UfHr!2{mP7i#Hzj=XBTLNikT&j2Hj z2k`qGIB4sQ!d~@q4C$m_W>f8h1hw#Z0ExuyS(58${$^}w_V*wOAE)~0UboS1VkWpN zc_B@F-qp}rtOU=jdqAQ3er=fgWwzb{Yb2vC8%};bN19yOfFIVwnMglLacCF}B;eQ816qL@ho}>kP@;BQqVL=dYK&vp%AxK55HlN}Z9 zSeotrJTAZMw8~}Ld#CGbbLP+S=}W9Aa4@vK)rR~QK^{`3+12lM8oi1r3Yx%==LxF< zF-~L#S^5v?7?UFho~lM+ma=tA_d;!9yj+gFiAWq+zp0TYM04N4~q_=(%#qyR(10mIpDiGoLW?FB6H6|#tU@oK4J zpP=ZzB3d+GNoq)1_=^Rg#W!!InJ^kkwc(dH0K@3s;tN%@rcN;|`5vy<+m7`^E3@qMGV@i)%E^ zY->Vj{|QdMYAbGCb6>c;+{n{O4Hq_k1ou)b1V%tffd`++dB{#TXR*6JXa_Eq+a}0N zwgDhe%_*C9_@fv2{)CwO4uPE318CAk>Y=3jAS&?w0yRTI)Fsf|tNWb+6e!6vkP zgYR)*gzDFuNo4z_LGUj=Vjl8|)ct}TQzhrGOLM$Gh2`)qMJaqje^DW2q+1QKKyHM^ z7CU|SEBaD-HiRac7lFBmdt4Dh(Rg(6BggZ)`w1&7Wc_{!HA2x zpyIKr*_H%c>WTXkF{4PT;-N&wyDn-1uM5}xY&!MOt0&6BP#U@<-u2_IR%F?HTNGJ& z9lqDD9YuyiqLR8kj!l_%2d8JAMqCEOnp|&L9Qbv?f`b8IjH1!z_Iz{W?PEXTX zpO7Zf`HIM7WYBLtgP#W+c;r>|+K_v&QzsQ`cl)xkIxsLkR$Z4AS^w9(;^qL>eQNug z5jXM_yO(MQxt`n|GV}$@?OO25&=1_4UkcdxN!hYJ<(X#G6BC(C6@Uy65z^g};1@SU zWJU<0sOvLBvnn}}-M~Q+>Y2Fv{R7jQG`NsK1;$uYruZRF3mF{|BCr)LTdcq)tPHzQ zGDl^Z%cng4`15LuO_bHum9fQ(7W2{5uxQO>I*gnv0#tQ-+I3@~Y3#)$#>5)nm%8A1 zxvZLlMlOUwoL+yXhKv;sS#(ueQd%-d7*mFzkj2-@N-%U&6hnd3Y^pX3_z@MicL~{i zqo;^JS7~%8A>Cc)eVkAfDp|8p7+$e88Xi~Wy*nf8cjr5%9I8=yuSkFmxE) z{7{_+p!+;E%#6w{35+Pa(T0vU5dbNZ|j#u|Wo=cVuKv>`2P;N(p4BqLNBZg0xMPz~#X6$LBN1r?;Uk`EL^{!^lLSKf zbQE$^{7L{07h3|o!ZZj!RyU2>k7A3@kYD$Fv!wQNE#Rd7S%-J>_g-jBu9ek`3Yt7x z1_Jt!dj8&u1PuX*t!Z*+jHIMLMqZ%bhgNu`hdi!!|W!7 zI0zD7LQ$%KQw64r&{KplmZRo-!Bx})>N|KkAEKr#s!IH;ygkec`9}L4mu&H!CP#sT zY9a`22WxMCb?w8M1<4{P=p-y=A%5iW%mQP7xDY)&#C>GEShM&`rOe0cWHC|V*zhz| zrLvbA(L{1|wc|viMA5!~uoS1JUEP{XGOJUqn}wktc?<7YsU{h0Od)h&qSZ#7yn4c} zcAE>TeqDGVcReXr<&YN@9vB`V%gQ3tXmepKH(6SzY%&ld0~w-&vr0QeIu^VS5=*O; zi$-ePOiflTMlMYx{QZPKp|0+2A!Fc|>ZE=SKq??(z{yWKo1aIEBpP`)!aSniR&Pi8 z-s3}*9SqDLuO?Zx8!Lf7`iPFzg(5-JGp8~oo+&i=L^b&3A~*@qZ;0K5=kV!+y7Dc zdY$hhe9+h&ZM1jesHWaZ%*q8uNO9_{{`5jIr+t zTDYwdr$8NMJ=F-}-$d?6?>Ta^2*gAbdNiI+UXKgE0JfQd~FDK-* zv#*a<2l_*H{L{=!r{eSr%w8&8+smZC@2#?5qU)T)P~gD#bCB|Rl9GzeTyN|WV`5q;a+EueBbE^)r4lJ_BCJG5E`R-l>7;Zfr-AI6;^1I1PO zki8EpnxsY!rXdB`8tn9v;y|Np0_-KyEZ&gP1=a_6h#C?$QHomJ;K`f>A?rfc>3D)- zWHJiyF##{h{)>Q|i2gQy_*0<_8F$J;0v;yB-A#*}VZX?P6qUpnC?B(c=+DJxq3=$~ zcqnH3|s5%ggtac$qa|1jYPQOp(styfdW=a9uXe8UCMP8((EU9RoFcX z<3zPx8wYe3QIlTY`ftn~-??@e$;|Kn*%?hMo~SeeX?tb9;vI%1pOPSop@Q<}*`JtP zcYZq>NBu=jR=n7XExLyRd&TR^=tRmURa0_k5byVV%Qbpn+89NE=p?6!e4cOuH+_I` zAFnlo;6uNPSTBq!Oy1YccS*jtzf}$276dHs*O-uh4TF8O`>Fsrcas*uKZz`Z94u(d zo+eF8rtfOTnv@1cafn(p>oYAVlC3)w=|Lhr$%*|_9!y0>F`(#b!B4&F8CrEXvyyjE zoIe(#qR?zi)w9gA{kG)c@V(C#V;Lk_e>f-)?*Ssozeo2)bi-=Ba*IOrXj0Y8=Q#P$ z6lx%05y*B{2K>_e-fNZE#E7aao){`&sg3ovQFQE#pnTMWwu$_KK9%S>9NJOcsh=5* z%5O&Tw-LB%9*)epzq7@!4UgTJ@LBJ(f4~HgbUzaMxZUKGuY}y8mrU_{6T?qP-t7OT#3!;LB~_;rY~&IK3b&{ctW(fE-qhZpWf+K<(1<6=?!g4LEK5` zmQuPYNK5!R+-)2>uY$7+Eu`Btwl7k<7pa*5&8=L=d_MiW6edsO&AMZL=Bx4@mJ}U& zk;(>(c?ka!NI)y0c8o}1`ds@Jl=E6?NAW@wFucYY>OQk7T`EtQ4rnDRv|PvoL^4HK z^Sg$0q2OG>-aU-yJp3}WYNBm-Fn{HwVk_2Zg3y@Uv_c9&tBw`Tn6(m%Qj#hkh}%-{(u@484pX)qYEnUWh_}!oZq5r}HAa@)9ZjBv#kwmx_qSn^O8sx` zU+ACoKr#0fNoQ5F29~C+Vm?1R3pe3>*aLKl13gv$yhiWgo$hC&{a$RREG^so)sxj0 z?)MhlQza@#tUm}39<)wegvLb#qP!Uct12fvv!EJ;04$8|^(QHp;pv)y0%>9mCTvzX zIT}b3uXg+=@Mp@y&|#vn*k2zCU<1X2;ZDE3vlm!t$qa#1r4K$JJoQ?4Ye}_{?*H7A zeFp?lO8(E!nYw#VpZCVM{4dk_f6FQhg*T9Pef((`EB$&Ne-84KhOeD#utwOFgF`&pE-<%U>2QGy^2ht`!cU!(^@(Uv;`392gK@fvN~1drsMM zg3cHGv#thq+ni$YBIy{rPuiR&g&{>jvC}nfYY#pVE-2z!;7X*j(=ZjW2&Ykt5dq zc=EgRoGtl8K4$%I$K*gaiq7IvM1E+&z9?=-9haoto728=OS5eq?2%QTbAX>9`i_ZJ5((Fn$#FoZkGe}wDKzR{rG8$YQQ7R{IO{N~)2kH5KU2Vo zsqR(aUXJHd1KUPDulKg8rdOR2!z`bbt(m>u?*M{zpXg^T)W{Vuzaj~=B<8rrPmfU z*>W)ano2KXTL4`bxTwAjP`}Bf$dJwVQ8TVclAGP&>ze=RP>X>b#8{7^W|nR*b~)=U z(;;Qi*Z9i4=6dfw#GU@vY!Mf2*6`0y0$kD?e*eX)Hm5-`Q;dd=ZLjp(g=Q_?q~wVO zaL2FBtmhiz%m#L31w$F}-2Dsk(vAHlYs7Y8pfkUJa{t2Q%3LZMPMIuurAt>wS{9Ve z(b3CEyH%)cxg0!kGvV>7TM|Q;`;9s(ZEfMSt}K)dwYIGi5Ad&(RsOaIHQTb2ZpM*#ooWRvda^m@67{5wi$1@l|v7wml?RcV>xt0 zXxGY5IAQ=wW}5Y+q+P;z#r0xgGwg{*#*`YFtmrE`56?mqNEsipS0HsvWqOl;?%>SU z21#j^;`G@-GT+LbM_b18U1EqCDvR0J|E|}^w|*3yS;rA>7`hr!0TTb{(u+7=KQYA7 zWy%jRdZd)t`DIVkqPS;3P-Deqoxiozr=qK}2?CNfH8p8I*|>xl)su_Rpm`kw&iIcq zuEMsz6<`;W#!*X=;!YPrVZW~iq-vij#3M{WkB~Ns%7UD73qKo9<0tjn-y)8uoJ9d) zEU@BlGIy^vXt^=glOj!xzJtxxWobrxS#)GDXwQnJVszFquNsGNf&)!yGjWRz9Sn=f zPL;=Q8P85K;A>GE5&s=b+g9k>#&^Lzlf1dZFfFiuOw1OzL&OjaiP;-<3->*Q7%NIlPZi&7)_h+a;e`b zpr7n3KKft}`RB<+`Aomzy}$yL242h1*`Jk15dg8fY3eXraWL>Vx5P}Sqb;Rl5tG)8 z*gRE^jK@nn#>j4=COEEE5AQtPr`cT(GrZ4arN5WoPD4x%Grk@eO5uw7i}i?nK}Ow$ z#+dNKSv6J02*G?|bNR0X&$C4s))K`7XBiUlstt;y@bHi!MFH_DD37gz$Qh3V)?~W6 z5T>)(dtPmQ3wcH$4CLb1xOg|{b=X3z$;GfQ>FGy@>hc;Ju`-Er=qwKv1?Xw=1H=Qa z)lP1Ic4*FcNaj=3xt*+Iv~4(}hz%7^d~z;il;FF}&QX`0i#SE=#vkxC1G3nOz=9SI zpL~K=yvryer67LcV!3};>v_1czG##yd6NGrFV~m^ngO3dC(Pmd4h2WYKZMynLEw&v z4I;9gV7yvx%$#1v2G zR=1MDUWN;YXI&V(CwPaq_hqVOs^R#Pwwz=hm65g9p)0mt%y10I`|dpZg`}a1`5Xu6 z8SI2CD{qGbAqP}ZfR+wME$@%p-!RlFZ$^poj z7&#&D3>hQj;mQtaMc$uQ>L=*r2!6q32X_T~?K*ym&b&smB}GGBb@NGV|DJr%SoFeM zcT^dvRoxjEeIxl(zB17B^Z{e}C1gqHa<)nDIgCi4`8CI#WUxC*RFq!B5g9ViqDn(5 zBk%1rwZho0_Hf)kF%8Ozp2g9k_$oeT(YNr1=&zFYUIjwyk;Sc^q$d(73RMG2$-6fPvz$D!tGVpZf@at$WQb|5>^JgS0h{J5DyVBC6c z2ONS3T&vzrRT%Df&-E?3qItl|5 zSud6KsTnmq2fCrvw|r3^_JvdtHF1oB{g(XCAHGi!CoY$FcWosgG2&HS z+@~0!eVx694Q?g)um*CID5^|=`zu_&2W)?N=S&!=`?~1eRw`Tc!_vRe)Z}$9b&=}I zl8m*T+mhq&z6I&vEU8E>69R+qEHgx#k7+J6=d)({bDm{^6T#AwrEIClp$S%g;Usev zg@@C35mDc_vaa!UP)|aXIDrDRgO2ycc!;SLTFt688Fg7$S)A=y)f2mzY*(R+>(#twFVyl?hwXbVuhx`$ekD=DMP zcYBh*Z$X(M{WbQzT%y*7m8q1`(C->C7WBQg1+SZua1P%3&@2KXNZ9%nNx0#-lN?w% z{>$$N^{T>bq!d~Z-|X}yS6!}!_egPap69snMH^3ux73za=I;CmI z139bhrU__F;P$4sE}%CUx>aX$yYGaWfEApq*|OWL6kyiH=?5@^MJ}qW$;ci8K&8R) zW@A#H<#gl3;gm+Z&$On%*OVZ`3NU8G6NQ~2bW&PFxf%z5G67s0lNr8!IP>drF(XDa z@oQ_bTGaP@Nwv||e9)MVq24HAAd9bgH&&COG%*ch)qWpdOE&Rl5pP_8YK^_hC*CYs z-)Fe(s(l2PAXF*dGdjfLSC#@@nYXymTU^w&;g@G@4{+`Bsn6)jPFRc5x-IvJ>oswJ zJ4J~AF)%PAnG@xk%vgM#ovij4(++ojrI4t^ztc-jTYW;pC^DjeKVwvOLP2?0qM*_Z zMRHgcGQ{`YQF`42YDL^#e+UU%=j;L`dk131rS(ve2?0b&XB;ZieG!A4-@?~vBD&?@ zNB~7`lib9u3lXN*;}ZNyB~>-EQk&0$MC#np2LZFv?SbEDgS^ zjgdd0S=CRt41K8a5<%VVUy4)~ZDc*|Uxt{OCMK9dalu0w8MV_O{x#`!0(N*DQwc9x z_@_7l?z^@6m=CPN?(wNgi5PkIo7P!daKvD6G?3&g61D%k6;_{kF;tR12YDg)G zl`;$rk$NWKoSa)-xi=#jf07*qZmi4NPEdhGeI0$OCCVwrKh>kqnpaPZMxPOIgFmD} zPa1N33MUchFrXwaC_~t&!{0a(vk`6#1#KmGR}l}q8-SE9LDhFA!}~Jiw(`T4RU&|C z@$HP<#T>iqoOKj)tP7Qu_rncNc!z&RHIzu4^*j(aspzxTUE5g3S{!HZ$C^Dx_lQX; zA~3KpkuMSzQP#)@B+Cc3q`*Z2O>c-}L|lu{?q-9H9Qo{L`@35{V7^C4kgq?g`}SHT zAIuzYf!xfGuwX~u9aZu}-$6YQP-WTQcZPh42jr=x2f07;jk|ZaSySLsI z$Lo`lT+9pc(6^u&2_AN9)wCHSca7?4Q3f{0*Azl*5?K`Da*%;}x7WZK56z~ZD08;4 z^=z{dlBNW1J5VLME(0z?pe@tXy^#(A=Iwe4}Abvl~VciW*0)DlHf;V@= z0}{ul!2EyNHP!RhILn9SOc>4n z;U&+GwEqsWvd61__+FEuhf%J-&lmh0$-yDUXZhhJxPLZ@I`pR}u{689sE8Fyu!nW_ zt6hS@7)J3I;dZVFemq<|yEG>Qa0~ICbF2H)L_%NVqD0C4Q3#3RM#YNix{^5w z)=k897pndgY8KDW*t_1%Nqjn9yoKuvP4!~6oWZ+xY>bBv(n_6@Q`e2pP!o*b>+309 zC=_7Xe!~7M2ss^x64$&}nAdjkkyhM`fp$wbxIAoWJGhRQ27zkhL=bRo=UO1|_u(@5 z#1Ycjy$NOG;Ol=zC!?exSLV?Zf?L5V+HO>i>-0?8@G+V1?)V3CLdFy%3ClY z#6F3tcQ+`@Z%!6%xwiN6p(EdCwsJk;WQE)E**S8BtegYs;O$e4k2ff(%!$aO_hB{V8L3x8Hl*}I+cq@flqV4%VI7w|D zJz5D&`PEDq9yJtM#Sq2`zla@y1*a`P70^^fHWbxdyCg-v-d1WkNQiqf)1sj<@Rb_& zhbo>foik=nse|+04i&9lEWtJ|ZuKkyKk4b&A^PR+i|Jgv1lK zMDM2skT+cT}ejf^+fwXYNhnhwBoww!aKel-HM45p8XP%bzAej%soy+FhBCq*yMebnp{i7=&FKiBT}nerS-lS zZ(axSuJOLR3|gsBXc;oFP*!zP6%ekXH7hyVxtL(JQ(6lB#mlvzIzuaR(cS#?cdIB} zpkn~H!L72NE<;0>V^87RC!K|3(-rZe4J(CA6+LxwJD?^>F59u_2_QWAT;uj9W2IGe z24wKp9javfUa&uiGTn%Fd$WTwS{8WpgU|?$jv9^;+Y>2G4LS&XrT|GJlOf=)#(ojc zUe)^)2M&U>Awsch~-0Vj4=AxmYA9*ftuG{qzwOLqH|(Vbv5 z-lJSxiTRe_IF4=q_C61P+ffUPqin2U6R@^9`?yrzXmGhL+-9SCaWoGpOaPuf(Z2b4 zLh<8py(~D=LW+v2#{xfx$t`My^tmKza{MCIX+M)vL&N3&xyMv=fU80rPg5UZmp!!r z@!7~5`hUZMT_)zUK|u0S<1I__tk@4AT6TJgy4dj+Q~(x}OAX(rF?n&&ycVx^;pN=* z=NcgBDZpYZ)PEtZ%KFhy``&y%IX*1E-Zkhlm1_Y-n!h&ar?bn}*==4=Qh(!XovZ%` zi0sZZG5Qy`&$|6XS6;%zyDLao;`!67;H8%;5cigvaxpc1FzQf>~J2iy2b_@1?I|qyPBaDesYRk z0e*QLV}50MJ{x>J`(_MyYJyD*utvDw{F(P_E_Hzx>v_u<{yr98J9!OG^CPrcs|03% zt-`539kQBJ=!5(}s5{H3sJ`&uOGrpd%K*dBAT2FDlr$A$|Ax{nxs$@0)wqx^H~rTEm$$=j{FL@AG{=-|wM=z(jNWqXbMw=?6Bw z48anX71QG*e|Y_GW&0rArMW&~0eGLqp4u)wzBA~1bv(rf83H zNo;?xjFqZ|CTL1ElRRXOh7~^lReFL@A6dJ;*f;BS(#@^o-M9oM8(spQYHc0`iqEXS=6R#AzbhsFx=M_#9uc}CA1L-xTn`vWldG;uTzU=I3Y zo~2=O3<&8MMqeBU?8&r-0?z#sVu_9H4~IJv$?#I}yyQI#Jf1kFF^s2Y zAFROaE-alLjQ6OXZI39LYhqSZmou_inI$Zf0_Mt3F+-C3-~7~Pj=1v`WjtxDCD=>V zL}#_i^n5&5q_38xud+)=Th9+6x9H4^&!sOIz4E@}G6sCP{MRj07O%1~*JSgrwD}up z{9>MqMP(kZA1YS5kefx7N&?4PwaUFUS9(*fmYtIBm_towgp(d+A#ZvLe|(iscuImb zD*twIwM6=P3nC{!#pqMPL4Y#x>Nnv3{#5!k7Iw6g;Vn_Pz?0i#|ySsriWfg@}nJTueU$AA7j&B{S02RbR4Bz;2Of#%%YLp zVJTA`__{%F@0M-j4(KH2^o|*_w{l8qCXK8CT%}y|WFs%OtXq5%SU#&I{?g0?Yn71~ z=FN%Ajb2_Q7^eS53|kulBQn-Mgr`c5;e=ROd4}NGaiD-^1ScGjE&`j$kAK!Ta;oz&`I)%JVc^!| zEH1{If87oZj-cffG>4R1Qn}(vulk+T7{@jrbg|2R6pg3TS?087W}W=>#lq?oA50=} zBvF;nwHX>xaY{d&o_*%=<7p;urX9PyUO2^nZufh%Of({hS;fPxDZP=gFDhSHdHirV zjSO#l-`)P0^{h|*cc0TboDbycxvfA3Nr9~XH3P^ zR<`jb;FX?K#V&GyTy|?ig8la=%1Fdl<0NvP?BUA%YdcIX56C|ezpxo%OWVS+8Vu^$ z^t-v>-NF)46k(KjQa4^#`(?c|3OE(0?*2R?Bt=?Yg@*}wtW5_hv%zYfFu^mdQw$4; z@AG#&2ovSV5c({%EG}>gry6X1uI!qD8(sxQH1rX&BCt2xNEnWYp;!sZXh8ahQL-vk z*rY%h&4_{j3>dij^jHWbUYx9FR6J>I(5I-+TVR=L2^2nha ztVB<{f4f{+;b@8wqpE({{V3XWf^6T3_*H>I4vDy$<1AriZ^=HZgawIf$7m!`ki`fp zlASYFAZV~PZ1)})oCK`UEfqEVoHpqoR<{##aY9m^$CE#;?a>a-0&}p(-}W=gE01pH zDh;TNSm9S7=mHDWkz^;+nD(k9m2S0|M{23L)UW0Ch649ICW17o$763T2m!#)Wbf@O zXreWlf;7sZI%`2qYRlidT&5JGQgI4yTFbEg{YWF|6!{=FL_>Nbxrs~Pf2L7Dh2&zd z(WS=l9BI@?VV`K0l}P^6fllhZSZ~4?`r1|;3*FX&qtCs$s`|*52wHNWQVlM&t{YfP zI(ysj!^wmKuo~2iY~uU)r;)@Ng`u7Ah<*dLqp;U>8>Cf+6$hcBFzMRH@{5ra*u&7o`x zoM+18x+nZ&PiT@DQ`JlKsA61-L|o=Zn0khBwa(VtyivaMaN>CW?ziv~Ta@+*uupPn zZD<>z$Q83;_oY0}k6wvjII_5YnB{$;mwM6LjgdfPzd~?W?9A%gr(hJij4hL6xgq0^|HhX26S!(J{s8dR}K<9I$iVA-&t?Yw-p1Nlm zp)>}E`=jbG$@P5Rut*P&0Y9ZUxJo^Wxa2mf3oT5hPpA^3J(H2?@HSK^`O(TPvb>^! z7?E?l@OFGpRke$fH4JuDpCbh=6QmzMg3^j-RyM%qvNdhigk$vQpX#izDF%s1Pek|j zw;za6Cj?zLnqz^PXqDNkS1uuS#a+Eclki;a!E-^<5%#neFcUXHAFC67Q`61z+ESk} z9WN8ZSm^ImH%cYg?NeDeoX5$PaE7aJTU*htjQj`kVk3rpeZUey{)gVao&h70cjIo_ z2DcN1>gHdSx(e<@tVW{f$Pf_~;ZKqDa5V=sPelTWT#q(~KaD+;=4-jEO3dqmSl;=e zlnv?8lbGA~BeZGxyc6WZyfb8LM&vAs8^)cq4#DS32J8gs>R|t2wRdB|DSYz&0R{U& zc0S9%Y+MQ$5UD2Qi0R!KliFpA0lkTrIHef4eQS7gv|NS#7;fG_dk9^HR7V&KEl&C? z`n%Pb6|FFBYBN&P{_z81NKYshP3;LrhQvBtu)?6!$& zI#(|4=zG_3x_|49O84x=$ z5WBlIMPp@TK5Rify0VF^U}JjIt>cRBP>EDnb{(iq4yRH0C>xhjY0;GPX1fr_-c4{c z7KK4;EbAkqOy}TNksh^j)KWtb_bAG)zvM$6f<#w0HJYSsDkv~N7R`Jtgj+zwGmRZi z)i^fKJ<-XaZYmbII~9EXgdSmOZ|o%owD9lVu9^lE**C8oUsWS!<1MViQK9s&HRAEj zBWmN}z7u)79h014)o~YJgp~qkS$W{x?&Bo01;l~OPi-y2;c+@fl`2wSopes4R2R^C&n4UWTRS3Bn1HBMJWbl7xbrxL8q^ zcnQlzCEGOL%GPPbub>EpBct)p*kN=Oii3ZL3Lg>As z{ip&SKg=csOL;)ov12l?r<^z@m3-JcM)RWmryJL-O*Eg)6pt95M9z>%APT)1vUh}` zD>oS9_Ekh1E=jC$Hra?|_Eb=|xmZ=V9WGPBeNi5fVAoHB z;1ka$B$I+up2urW#Ih0Xm@>Y97}^|5pX#~i;`iLlvCV*d;YIi%KoD5uQml*!oN_O{ zjKCw!Nq@hU_gC_6%yu)!!9@B6pyF$zOy#J~VCJlYWcbqJoQRQa>@eq+;82r|j0IKzcb zyg2nfj#s+;18&jf-tL3iH4NL{g9u{ggiVCae4obDdpH&jur3B3;Yaxi=nHj)iiB5LL@Iu<_^O zpL+DIZb^vvA;`n;Q?gEccItav)}v}@@`cGk?p)dm(}~o{s`L<&94nePH4sUI5N&{Lc)iHy2!cv~RcsoQ;<2Tx5BGjrRyy7NArTaIn z)3Ec^3-xM;&yL?&wC@;aapG>MG&<#^zIdRNk;h$&JKHJ(_Bngqjv$3tE0N;d@C_F) zy3?+fAT_YUQrh2c81$!Um?CWKuJ~6?yO1@+Jgk>v`F{f7q?F>uH@{e%YS=%Reiemq`%i{X=EF zfyVp3z)B7@;thyKw1DsQe+KriYH!sAmK6Lj*pUN1U(jko#Uxf|UmzQ`CN3Vrc?Qu^nTsZn(MMu>@7m}HsiazfA zTb`VU6W=d^yYx&?@=urh`Gjf5m4Ag9U0g?h`3-OK=_R*I68lI0numXXIkd1xw*`-S z54Jo+efW4UY5ha08J*NC_ba-UZC_tf;bP^ZqoeE{_AGy=KXv-wrpAsN)=rw5FS~tD zrz(w0r7wPMuk~W!ON$qsz6lLD%MJ$f-|F}LRE>Nd9?8#aANlvYrAp}%KfGwJJQk=+ zZDhQ<;*(i=x$j|pBec(_Y<8$UbNx@U4^#4)q2A*DTlY2%Elv1`Jl>!$m+NOFPjn4~ zvbOumYnyTl=(1k!m9{uh%Q{Mabk!H%FIc(~JQYZleiHL_BL~A*T31hexvT9eH8pVP zYx%>!uclOzD(6&vQq!iSTLv0NSgk8e%6X?2{yMT&hJOqwE;-m2O;Pl&Z@6Fi_o?-^ zrAs*)ViQJ00O^&rUEGP(aM!gxb8QmC*W~5jMC<&kaz0zL(~DCYlYsujwZe20-QNp) zeeN5#Nm8oHgTFZn!)u?OwB$VV>wa7l6;0Au6JVQ3(4V5bpf~vS_lWyZ$m^7ui-yYW zULTU&g1W>W1+6CC$MLwCe;XOM7S_;`{Zmt7<&N&1rEBA#0e2|V*CowKdwp|C+Gs3% zYT@b`Yd;ZjeSXHv?;SM*a|{7F_nR*!tYaVVa~3{3w!13%vQPB%Ew$P870DU^dLS*t zfCE$H`Hpwr!kWxrU^d`;rmw|>o6(RC^H|@2$7U$j=Q4Hif{Pvfcj$#5`5mP#6=DtDLs}ue^gH{X zJ7K@7rgBhm=$1p*U58-r(!zD;`8$4xCSaX1UK3Fmj^B8?wC;jh)2iT+?!W3LMPrXze z{xS!*R3KFPyGUM`ShvviITy|g!#^$U>sIU4F30GnIN*|@aSOkw7i^%>L_YMb@O*wp|FXd*m6A#(AIkmKbh}31R zdw*Pb1YgU_<|D-V;vZza9qAiYlCr=*8eUEglN!8buRSKcVyEo7_>AE6=-S2L#V5a) zuHOl6cTrE(R49M+y%>~x=_rd-IoMEREL%E#c>J+)O~)q*_k)U4y5&B{9El2tH>2~* zjncL0eulI^YBZR|iRA&+0~Kr5$3p9qsmZ{<#~=?F91)$J0O*$R+yDIgRR80lCOx1o z?Y5|xhkvZjDBAu;msQkw6w`S5(|rp5uHk3%dS6o*ibF&e_2S`N%~^b1GTpv^?fm)h z-?f5^tj~0kO6_!E{!X(modb|Z0|e#z?k|GZ+HnX;Xq6u&JnX6caUMUf*+qwYydW0W zFPugRU4W`W`D8U4q(rbBUbT6u8l^5?KbhJ1 zV%%3BhH@~V_&dtoQaa?f>)CFyc5tw*1>NNLCjur3DLlW2nvZ5*hx;|kS}`C``r!D|(<9WmXz_r!0{@-;c{!e%N|Bdkm5YU<_Q*M0|uctH4jk|r22q*${;q!x2J!7Y* zLsI{i!`5CA@N)bIs%Tt%$DS2X`5%D;^ewmmaOLt}9)3d;AanEq48_A-Qy|etxQ{4O zKc)8(_>$%h@r;_J0c3RzLW$UBxG9OBttR#Z#D~FN%gyzFWM+T`wz{N;?wK_>f0hFD zsx_b>@Pg@TeM8^1WNv#Cpwh1a_;D#qm!Uh_1YSz6DV8HK%u>39RRK{ltgC*A&^>zO z3h|#I=+j+e>hhLrzlqPyvZj13m+s==@Am_0vVkf1IClWBn35g~w#2v!0J{E^A9+M) z)Em=$TmbL*aSo7Xwx1Fof@aO9j_4Jr&Ei#Ja~Yx94f-`th^3B(D*-wrHJriE?sBB= z7eLA02kNQ@1jOrRJd=v+<}A$61?`T^M@A+Pr`j6AVvt8xv_eQ!hHg@qReYeVmf7n9aAs>jHC?b4FTngORgETqK-3?(EG3kJL|KxR6Yn4#~K#Wqj2XxP{IgkTGRc0 znLia*>3L6(N*KI%(NCpWh#m7SZ*P(2oerN)|e=+#xioIw39x@1^NhbFDlDhID z0h*z7D_6~EOZ*p#xer1^=gqCe$~0eV`IuCrS%tS7w>RGGY}u<4U?gabD^ZCZk3V)W z>E~^9OjfL(yq$Ieh{J~vQx0M{S%XdrAE3iHNEK=ZHh0}~7?-{){(^bqaYN3{uquGi zvjgkRuW9l7n*M;pR;n{q9(=WZF52z~_|Km#7a@RQ)sVC?=mAw$jwsP31F+qf5+JTy z$4Z?Ptv(=xgz@MHXaxB2j<@*5&0LoN5L-{x35dyMQzZaHll-;)?9&Qh=c^{a`Kw&^ zxwO{EPAKnZA#SOdN3KDaJ5r$oVW01G!#icG172;_$VefZS31|!Xg zK*0!LVmw&qz>s&&U75RMBCj7wON`haS?rF~Qvp913k0YE%@{?tBkI6ifKIGg038{x zR;)}<+!W}{Ig!!+OO;&sepWp(q45W zA_Kk9F3xnf>LuB$i@3?`%;fBh3kc7f$q_CifE|CocG^N%iqgTh52B1O$xG|H>zcqg zQ6XY;D*K^NKAeY_GOJquhnWj-sb5QZ)T!$UP5HB8?ovl^lAO6-@@(98`$|lvamU_1 ztmnHFp87Z?ur|6`I2Zu~Nf&-1{(8I)`bZYLu@#eG97PkV=JF05z(_R_Z&JS+U8H(5 z;-taoPV3?mpoe(E6T=73|K8?t z37~eyUV9l^fKT{%NV0I=zzowp?JAPxmVLw@v4aqm_A&|d=$nl@I>lH_Fz;z|;ik7q ziez}5H@V1Tk6%3Vu^Ba#Og^gp73SzS85>WJP}5k5PSqI{&`8nm0=lB<^z(EM$NX=R z@c|M+^2-fxsI|!0oiEk6k&sf9@DXh>=b5`QS|hSuEujUr!Y)r*dsS;iwD4Vfw-bz! zsAG~&3nArsx-VYFe*F@%n?l-b;d4qxpci6hq93u~*{A2SEvsmbDs@tj^^|2> zLokluyFZQ@r%{fEkrKR;Jnx7hRDo|zv>ip~!lP1z&ctVSz3zi#_EM!=ypw|M|a zD8=1I>R=-KoID4iT09HTb1&tOn7Nb;dUT}@Xz>RPMaOUCbZ4oy^)c4C_0M?HKsgk*0nEd^kYa`_L5!IZH=arw z#Ft`K{*w2@FLA+rZ_OZo3RdThqcZp#V^u-KD(rcw1JN7|uB$zi;W22~E8E#l#ywU* zf=x43tdHg(!WA)tlR21*ynqwOEcmP^jQ?VmV-r-<5*&R#WDLlsSlW?f^?{o?!pY+A|rsiqBg&5_hRq$Icly~c&Q zZ!Zv1J)yH-m+#Rb9{w8$jg-Lj?qXt`f<{lQ0gt~JIaxr_NP1lK_yvi$TTgB?)X#SD z{T=bQ*4uKfd7F8`8#EEe|H5jb@pM0kgiX8iy~^Wep^w*#qjEbM!*1UNI%P^46#a zn_c&ozu?P*??VF4%rKJhy)g-Tn*frQ~Hp*NXFpOi(@<|c6Hzh*IVYf`;sNH+TANr5+4_ir+m*PR<`R_`8= z3i%=e*>mr@MG#ID24SnQuclVQ^t4)~tQ6!cA{3=!nEFHMr+UDHf5g$WIa{j*&PX@I zYNPkmuxbCP6Ed5y=l=O=r`*tmLq=@4DljT+85)r+Rqv&>cf60SGliZM-D&8pmjUY- ziO@s)=-ZA8`+E#K@_yRbA^!s)wpJOvhovHV9#w0Kc*;gEIx3+7#03^MV9)^-=l|WH zmJjkT`BHt|<6%*}$KhzXF*3|lw*R!bcn>7h6 zTn1MH*8ALlP5Jie>2^)b!I9RJ#a;tDBf5^!U+4??M;rkIVG+mH?@%@+%ikjw8DM-i z0ita=er~_wl^G0!qpufk*#?0SgK@t?_IY3%u?9Ap5|{duTs1xtYZ*3dQ<|;PVeq+q zacJQ?-*|%|q)2&r7U13fSBN+_pZ)e5obw@@G)Ran+U;e}f{krB>4sL9fjaV0*J9G8 zb4U;_j=^^3$LE4o`^^`Vz2QZMEWLW)>V4;&>PlVeGyw+vElVjGT=DIfZw;o%<);Ai z`)$z#`|a~zR|cl#`x95DXS{1`-%cF>-yX@yG&oQ)$Ne`vK9fUJd{6G(o;Om%DTT$MAXOtVX%%P|;`rh<=@cCxpl;_isoyEV_zk}OuQzroqa^0lj3Ds;4 zZ0emvezU9;MAZ=o<`ah`n&k|rtmcY!U!lB)&;B{T2GvfZ5);@=U)F;esqU;RsSQ*~ z4tqlZK?BBdCNRg;1RZvHS&cEA=PGEoY;TTzzO2cgkkNHBU3w8&)U#A35DJg{i;&-( zYojR+l%qyGZkVu9k|^E z8-z(cNJ?QBD^m@15Wja?JLqAtJbVf;a3I|xT-`M&=1o;%mn0~eUz}wu$4KrO1YK>L zrGjHcW3yi{sIEQ{f2cA7f2JSw?)9O{LhxdzYHH?$ANRk+7O1=YvGMl@hdzLlHZ>cO zfne}MAUwo~-i8{s2GNnrX+@o%l@g511M=2?))lBCG6YAGeoTV<+RV2a#)+|22O$6$ zgdMa7euColu=iL!mVjVXZe0Q>RLLB1s3J!&==Yx$2Lj=J_F!YQ9kd?;#3O6)o0M3U zO2=eMLzbt?(MR0LJazMxlj8TKP=AmtWL^jfa=haN7vOdJbRPez5d?5-3FFDOY=lFm zkh_Rc*%wEjnkn@RauQTOcLP3OZNXnaPp-T7G|`X|l)P2R|Bl=4Ih5#FKm83rZ6*=Q zlFvT#*2j(w-(+tF4oRJsIE}O8>9#PjSb;Jva^eD+ zxge@ORwJ!jSc{shP7dhHkwLG)nkqQ`C>CB6-b@677UWZLevG)9<)u5NZe7l^q$($HexX&t!W<55u`%ar<%M;=0pxF(V}Hm?E=d8 zRF2wJBW<9+dmh{>{}2<*EmZ?D<+rtm;p~)CCXILPOF`j2G2>Rd7s){quOeBqhK=+` zXz#8TDe50g15^pqOf{iq117X!ecoGgpWGhn3Y)a zN9{4nBt#apSMH(Pe!i&@etOr4(Ka16AFOiw?NtDemv@pT&6Rk+y@xjGV_yU%wf zP-?U$jX=3*QQn`d7BdwZA3;S{x$@$vbqeK^61la*tdX2COju}EiM#d@3}7w~%SBaf zoSf8)X*?o6B`Kw$O<+()kZ^}HNf4ko zX7c^XXkIZyS0kNt6Tph;v&&bxCA0b64*c3LC4tmCe3$y}PZ*}0!C(`4``w?eaXc08 zeIsw7QDPPZ8yT@)4C!|;tyZunH1v=ZtG5y#8D$76;tq&+7 z$)d6C>!}3n6-eVnMyLvfp%CwkmJC1t%Gm z=fG3BQKC?1YY?J+9*md)j2U_(<~&9^`=0HGGsga4BXUvXQzanuTZMmkhjJ*vBM@UD zrf*ZJcl!XNOj!LYGGmqa=oXAPoQ;R|)6bGidIuvs+0K!K=xrqPt~z~*LIi2G#?jAa zI8V3OnrjJ$m%#@042rNMtH`)dEz^oj_0~F9<X9N!9ZBC0=1 z-5!54pIK#&jRD})gok^tp7r^}2I|nDc-{q+OdXjYw5FhlwfH54^e}A@wKF8G))+NbQ5>ll2z(Pvx z!5dObdWCVO4{{IjLOLjDnOFu#70_0)55UF#W>#8mY% zO@2!pHmxF_%|48yJ<0iw?I%L3F(p$GOBIa>oDGsT@x@nFPc`X^QEbrxF^|{5rY1vVswpE(1mQeaYktqE%W!vxZ7R9d7$r!~ zJ38euJuNcJY7)V>_CESh-Aec|@0VEMr4-fc+bXQ1A}|Xz!Jbc7gYk;1oxLA48gWUr z#2zeP&hBG$zoM9Hkvn5vpce9TSNbsM)v?Fq(X;z-CQf&L{aIa1{Fb*m-NMpV_rY-5 zVW7U!X~qfBXTIe{=k)ASYBJ;u>1k)+;91eiW%RM4O=L7fdXq!H+I{; zX)2B?soZg5)Auqb&@)YMJTYR!JRjQv~^SUkxU z5+*s8)tmM@BX3{%HQsd3w)yp!pSpROH7&jQtN+YRF>sDAw*lm!ZGWC?A`ZHrZDOkV z&zT%mhvPryaq84-@;V@peG~koga4JP9~QS4Tfj(v3Z!2h*Bpt?yLSAm+K0jZK+$1K z?olvhtoGIUCe5WlQ|4e$sl@hj3n#5->aPCby6_=4JplUXh1StprfJ=N@|mULD3E)A zlzi_tgjEMSqRFQY3Nm;U&?CzsyYBHrTRzOlslGa$TX)^(xn~+j)ci@51AwAM$XZ$( zP;PaaD^I-WW{qPWAv?c6)@-rZw71>&8_d@S>%cIf01OA?6{9Imt*h(UsZPm#ms8F; zlRxRyXSgCA9dLMkuml!ebU`YvthO4y8~)z)MqVYl-p<4u}PF1C@-AV6?cx z;>*kJ_?l&wk|)!a4idau-+;NUA1KUv&S1Ygzbb3o=U(;LF0D&Z zAd#xROW2+*c`nP*$I34FpE?aD@(uSrGJ7IRX8nOEm;`}{w-%*PR*)R~n!PD}U_n`A zHyG&ZTx4UJ`xrX(f$*=N%Njlvm`y=KdCwlx1r!c&tjw@GCbEtUh0Y~S%4YMRTs;P` z;ilT_*w>I+bs!8ho=r+n<{`o%mERGhTaY8dM_eJ~IH1TBEUql}-VT@UhIx#uZ22!; zm`2~R*nN}u`=8>246${PHpL07F)NpfFJVW*-hNSzF{$T()0=_8^x4OVaWsLd%jJ4NHo+5(mD zb8#1Fcm#r`=4~iVl7&p4G-al~$ovuf-LC)_aH!q-GQqudYos3{b$`&TQniGL7{w3B zD53ESVJQx;V@R$|pmLYPfqAr6IQx-C0EJ3iIGSo(Z;%->NTpPwx6q>@E7X*#oS)Ji zReZpwa;KX5*-I(ErRrm@vwORuUvR=iv4(*l>y1d-Sn#!1e2u}Q6EROph^gMI&a9;G=hw?JeVIY0+YV4d{H{cuEfPpG*QHiJsXcGo(>H`K$`oXLR=V zS=AYWWcU{ERJ2~Nn2xZ&8u3QnMJr09nOHZZSI0~&6K26^+<^j`AYUP0KA--WHZviy z8N)YX6)`IRd}~DMB)ch%L7k-_7))h`&oPBS3Kg zzjMQkZLfg6G7BA88BRrYjR8`7`=+PkJjJ7IJwuT)!^KB~Ai|(SH`O8k#8EyjMd3kD z2M!)~$Bc2X`@C|sf(VPM2xIYs)z=0P>bs%1Ly3e_vVnq=iN~7hX{T+pT6I4CaVl{Rcw;FM_noU%t;YJ zZeW>5U|jA^??|#Sg;nMzI6S9m+feVZ64WOZYi4m6FKj*LYpU^zn>gT*oLvsyb@2iL zt_500AFE}#el*0}A&-(@`h+4$^Sr)>5;ZwtDFM|kin4%URIo#2?xc6-q>)4?F`862 znt>nG`w_)&HeXfW-RD7{pbyYzKuxrG0cPZ&7_a}IGn%0=gWu^clUl7y(0G_HIDLa? z;A)y9+bd5w7f+F$`Dz?@r5obyo6aP2qrD6BlQW>xPYoqaJ54zk_}Fo`sF;n>fte*B z7CeKJO!@(g-n0eCVt>~F+?@l6O_uc#O}%217H6vy=i^_2Y|!nSa0lu{5>N&Uf=Isp z23sUA==qt}gI;MjW2Uzol&=Iv^}e0lfZ|CHw3t8smw5rjO$@9SR`q(l-lxosWw#+P z@!W4*iIMCBH2}Xx?FHB(?}NlA^JIY?FYtA^uo$0$7=R4F7%6qG>0YQi3pDk#1LXoU z8alAK+CYu;t?9JIVeV0juTdvQV_M})@l#Mc9g-c~!CpLJImS&m4C#7czJg#S_8UFU zDcD?}@Pchlf-dj?pJfqP2a}Ey6R{l?A5n zwp@=RQ5ZU)MQ!AD$$URhc-CO!Rpt(8IVOMGaP@mDa*qz`7-p_&xd7Lq)cHo<8lcz~ zkzua?x{<@`yELltR4uV(Wj^g8z(PuYSG3vdIAJj%GdRXexUO#?TF`WRxN9NVx(E7vlUn~8d;WIw&iwwl*q#exH&Y*8925xknYe!msBBuS)#iXk zuI6lwOj~|-g!}IX1c>qePueYS4~59eP3`@4(jw^?Y5gn-*#1eq<=}UL)5fWTuS@ks zLsC4?hRFWIW{ZYOu1Ya944H{+h_o74<|k_F;@XDvH=@+udsw4=ZmXn>L=CTR;W zTA*NSNN5_I?LaN8NZ?qKzK@3jUtG3T$lirEgQU0#j(t#qXFlIpg$Q|lKxEb5_Ib8i z1v~|*P~gPiUD^T(O{wGYN-&_A3<*)1U`3ur-+f;(+8iVYbs9kovL) zm0yP7jqC>(_;h<)e%#9Y_-a46MS^`-X9ybK#4YhxES^R33QB_mf|s5H)gx!*aCGy= z0XSilRzhFkX=>lHI+|%b#}v&Kh}*}XC{va1vspIpWOqma9IJxF|Onc$lP`?-q1I3vh4~1yITKK|w#mXh9BS_^vYhMUO&P{9|bLLucOP?PIqlVV|+3(RT|a_mY}9D4{XyDJLI(=sS&6HM@D_g9QIwo z+Reu|6~UE~TGHJb49S+imW=|iEQhf;m14OprG$G$IJAYHV>C@rFnxD{Op6O3DF#LR*rq^1Z$OVwZhblM>&Nfj4g(^1H!a!SH4fS#s41}abP&obwAOC6 zgoHrW?DukBaxzhK%X%po_QP-fiWK#BVK7-?F9#QsW7$9^46r_4&gBwGRGi4!qI%)^ z#$hB(ZqpeJwXV82??T%)N68Cq;f9IJo>;Tif3~o$e!F1B?-9Zq)}q9dpn&wP#ihLX zlu%9Ft-OvfVu_+zJX|H2BYC}s^-FP^b1MSqRG7@<$eHc3krgDyW2Nk^`II&$G1Br^ zc6{#jWVxeGx+4A-I+$3wrAR**;VF?T)Sz^0)h%j%*YSe}XE3CKUgeN%M3!=7T?bC< ztIvjf3#a!sfO3xNb@@cAq1^ zAYAaP9(KF$*`TV>miOes8-KA|UAr!o!(nYNM7o&HV;(9fqckKZ=*YCF_q^yaMbymP zds(>+-;2>`@98s!XR8Y-hE2*ou#@MFS#Vpz+Ec{Kn9D{;V7&g%xmW-AP#+a&>>0i&&fnTGk#Y=ISV_v&=!sZ~kUsi} zR5XD^4li`y^3F{7N#zjAb^Lp6b(N$q9*Rng#S6}y2!Bm+%p}-gd%**o(2^3v79##>VMd6pyInz~QIwKr~&z5jD&oT)p_MuImZ z1y2}J@|J7q8UJbc3uvsB9_EARwA z@hfO1eT{MQj+(dPJ0cUG&Jp1pQf5TpR3Z?;SZ6a?2Lz6DUwxV?kFu^~+-1=PQnLjl zakcp5jEa2cy=b(PTI=-h^`kue7wXSV`l%0uY%{&|k|RpL)9ey}#(q=+(?)=h-eA?6 zP{%*-*S4$}m0CB%f1p0XR*F0snAbyS#BE!d1e$s6nWWcgUST*43t0)###G+MZG#)< z3WNz-Mx}9BCX4VtCwdm9HV2mv+!dG}|Je}V`X^4vU4SM)44ZK|Zo-^j$l_4I)v7g= zmJoHT4ZGUx0%_f+7?L3(<*rh8Dif#Sze!fn$gb;z7o9i4=OhtkDU8Zk;U{D}+@!v; zrc#}X0VbdL{sG-U*&rd^?iqsIUv^1(&#?4vz5qY4YUJJwS$M~$n^gv$VLbVnWvc^q zeV`G0D=#`Qjv;fns^@7#qQ{ub4$7%Q>Ku(rmLu(M5+a?{9n{nJalUW~YnEZK=uNXX z%r~_8c^Jk@=lw;mS^IV*`zouJD5fw&vRrDPTUIj}rLy1X&3W(D5&MTx#^Avk^369$p(HQ#7KpIYS+j8_K~xV`1ke!6Owbs}G7tmaIHu zdwFR8VY$PfHLQtF`-jlSs|Aa>l-#02#(0ug$-R~hpJgoWxMhNP93LnBhv~B&>PLK< z%<|2&dPrbVx{QKBnRUwuV;9lYrh|k}aMV)s^I`TYCZ2cHxZiU~J}hKS2HxTq%Y^yPKH zeXLyz9MxK?WZbu@C6MoC+l#l%tlbSVs`vXwe6|!H9&t&?z0HNMx2Hw)WRPrdOGK&a ziaoCV*?7S`i?2+{uR5l*qC`LY>N2;94QF;m+R2hzMZmF|z*?-(MNw-N^`KIsI+TZr z(ehm&o#avOGwV^>?xE%l^@Xk&5d_hxeV+ej>_TFqGvdxVR+M?=d#hVB8obBib2i+b zldL=v&&?|G5`I)jk$pT2I7;-JVZ@B25ReotwzBN=idmASxI}GV4zZaqvUFWflMZ8H zj+&V(&wggyjBfdxS^75Xj|shFpTPrStn-B6$l5CUL`JJJ#}!3Jx~$6t)uiq7*QW7Q z%+|{pDTCwcq^g10Z0-OdT`T)M;=iB<+N-Oj$xuOeo+c}qw=Y zU()N)=cM-@WW*?Lx~+6gv^i+gJ<$zSyI+B%e;qXx@_Z*I{j9NTIhjpY^p`fVA?-K0 z-_lB3e#Gy?1PzS7#_;yAHYv!!R0nX9+s-@$!AvR5x3(^EuJmSDWT?i_78AMeW>2eU zENy8U`=dDd1k4o!(x$fkuiN<@Xi9OE_g&Iq2B(!LZL*XTZg*Qp+=5_uCbW(jO*0R~ zjcCTLvSo@9gW4ayW50^2FWm&2yTNVFsGoI4TT90*XXN;1$MK`3wL;e&DG5z#4C}@$%SpXNd=YEG4z>+Nx(&5p&O|I> zrKIjjF|A!z8RJymaW;2XG^+asg{M=2vG$(ki%GZTuT@jVRkXULZkl7P^mNIA@_MQ1 z2EP64m>E1ek1P@sCidFm8}*Ql4+|sgO$J%-DjYGDm1^IiOQar^CcG(YYeKQCW{Wz- z#RwBelY6U+=+IwS1Ut$#Zu}7N6G@q%bj_+zmg$?YWdkQH_OmnE-PQ1@8XBKKxpEaX zTsT9RUikKXs~oHbep19I{&f5exMth3aH|DQag`#cjT2!TA>U-KQPG(1V2|UQs>pL% zj4=Ms?(IwxatY}P z*@C+rWA-+bo)kJeDQho?B&J0H#fC`P!UpxM=U0Y=zjYFqrPtoAI6VciJuLTra~x}AFc+p3{l%&E+lWqF=8yL$(2N^H`v;aS z!p*$fsWw{ONHZ%Wy|dN*lnHkkfbZSRGq&F#%;#;Fj*EahmbgODf6SX{D_e~PU z0?Qt!SmMdZHV-$JDBYJDzU}YYvU2ppJM;(Q&v4^Sv{O7~U;PzTY4RT1g^iW|y5;!i*XEz0p@T!h*>77$1Szs|Ama z7&-s>TUM7DSr`v?{9H2<*JV3;Njg+cV_)l~#1BiwzW*U%d8>AvNMwZEkX>)jK;9%n z;Md9@MK_zJ(!V5z?8;>$WsKg==xz4nS@Z6O_X+;bb<6P8O9oCJ(iOOLDl9QCi0Y;> z(`Qjcd8N6T`R}V(6E%wPj~>lAu zcV^?N`H|-~R!WzqbkFa!e+Ivm%eON9*B4xaW zC?eaF##Q{cbG+SC&Iku}c^`MvMSRo#`$3|@V1QAAz0s}qm3a#d%STMF65hS@ zin?XeLLSI0KQWisZssw91=<#ae4%w{Zj?>YuQN;Pu7bnhtKQo4dcnE6$f zV9v*QuRognCUGg>R}Jv$#CG-#w1djqd%1 zh%$lR9m%*D)gP-iFt4595l*USp@A3H?zP}$=a=Gqva^J7>d_Eov00l4eJ@Ecj zU80{T#*4FOshVh`71U=v9L1{jU2A^h4EZQtYYRq)De6#-){r|pKlxg}5?hH)du$w#6lh$x5Xp3Og%{$d_u>m6xl?Ubj~9Ikt0 zlnF}CY~GOl$ujMt(ZDm`%UH_-dYcDDjNekMRU99}iXE8kNLsIpk)D-Ks5Vu+4klX~ z)>j0fBP1*o6(wWhD5zaEVNO_5M6&Ghcj>O|jm&zp4F`pMF711L`CP|Y+_TM2m!ISK^ldAz zyt1zYN%puN8q`vLPpfCzeAY61_j2r1i2J*!xd#iHcfkkD>NT1)?d9S*CRl198@b>u zPvQ^)wtOBulMs{ul)g-1yuaXY@ zp|a^wX4FvrZ$?i&GNgfVlzH^eP;R>g`Ih3*zu=7E%yD2ui8TwF`lgt`Y;aCLmly=kzsV>VIeS`u_|cNwag`LY4fY5UUkE z3JcwFM)sL9;_S;`uTg7Jq-fh5nr;J5(`}1epyW=~cIL##9sSXFHgZ13bHS@X$f8tEF^)1>H22>&rwvcQxDzob}% zQHS*sY@q0+FuToX3-XsE0@AXD0jCqJ3k378n7Mxca%d*Ql7{R4<-I>x;=fnm4+zol zx=bDl=?=WxAE>&-B8f2=UKCyXG^vE%*{+^wQqOu@y4@a(lz1`(H2ow*Z4T-i)p_Z zgZ4)(!q&%d=|h@|i4x91fac}Sl;BEEc%;es%0cJfR+oGJ?tIrb52xKnC4_rL^Ea@q zD+PZkpK>Wjb~ee?;IK8D7r>oLFSaqNCj1s@a=-gf{u)#2N5hO%ga|8=ooQ*EzPoohD0WXI`9+j`*9;LjhcE(h z;RxYfGF8;L5_74KLdu~?!;n+VLTqCFm<_}FE;->(4%s<7{iFE|e@OdHb=o`MnzHgs z)H`kJm%SFXq*QN0MO;`em;O|IJz_7o;EF1s)>81rS*Lvz&`LD~a|gm$x(9vxhzYlN zkQT}?%W<*Xvxr-?WP6hjF=Z#o=|mfRa3)7~*(Tg6f|9^)tHhQ>a#?PMWI=^-h9c=D zCrO#iIGF*(Ca;LwN`-st(M&k$oq-xVG5Oc1Fs;kVa{P>|<##j*?4{o-B=w-{$Bb+X zE7@hUN-lST)~vX{0zIbv2(H^Oqm{S96+Cn6-}2bNK%@rq=8O56Y#B@OLNuLGRzTuw zlP$JOR4J~h{gR+|AkmB72CYfT4GdHi($^-8MHn9L%hT<4XSf)%yp16_kMlfg0yR~U z$aIH4y|grU$0=wFTMv{5Yd~k9l6mSi^yzK2T*+dAF)3Rqxp|V|ipEy-qT5b=P=6he zZyf7Ut(}{#y$0o(kVGze96%N)Qs@)SjtZR*aHw>axuJj|mX>%U%*3=5lhoPEP5(Z# z45c7-GRn~o7pCmc*__ZG9(NCr>(J-nB6xCX z?$CCTsOYzh`Yh?4hgP<^&C2i&9VkNLx5lw9jANbgV%!-VsmH-({d;F49L9m4oW@9x zp}Bj!wbUe$LYuKfasrql!UMnM7xhNcU3r1HVYTrXx2Y~Cn3SJY48}+46{g02Mps?m z0a>vLHe}HuYr%g!SV%j7+Vqw2L08@AFD+NjePuakv^pROcb10)~ z=`iV=7oXZ;i)VVpKY}!sW}3MbS`nHC-xhK31uUU~o6}?LJ-cc(H%OqV|6JulZ=`La z)Kx;X`6u=GEQ+2pMK4at-g>dERm4qR#u71OCfC#o4RN%bZo;mRSo?= z9JALg2ipF5|H7hrJWCmC? zS?Lu>yz5Y0(b9v)3^w9o-a8^RyfVOkd$~DdmJnGRPpvYf)1Buww3}4ju>6Nye>}}C zHD7~LZ&3bn&1Gar#M(A!Y$DHU)59Vp%hT;HYcSdIqnV1AoGT?PNLhqoQ%J^Em_+Fts&pNu>=p>-{7KK;P9P=K32k}ttHhWIW0U?d$L3m z^NMWGS{=&b>DK(qRx=UDwo#e@*E`~6DQnWs#gcLTNFtD=u|qKMDz2ek{EVsVR}q{G zE82WMnOC_LZ$Veg%?MY0Jg#uvNYXh$WRO00w?&AP4XYC$WWl>zz&NlixhD=XH>@TR z*-<^M611u^V!zi+1#=pLcum(5T{9BRKE$qKLT;l7po)*p^lII zaUb|(L7JR_yFn+zPSni)7VWr!5exp9w#`9Hc@}l=x1!m$qW%Z*{>jWiD8BtWN004X za=ogU`fM!8@fEUL@*|4`!T{xl2~|X%LGRJ8hI_yh7DDJW_Rp6KWGSbLj|~;pFq2la z=*KW}u`P%={cPO6PcGNnO(>-DjFYVv9pWBM%GW{TwhZF1F|UfKmiR5XdY}LwbhLT5 zFKX-XzKSyJMHm5GnsP+@AuDw}vyNSq2<)f8rqZN^sk$@+0wl7bK=Q-bJftx#XG?Q| zbjj3>f`R z4O7n07uc#j+8hk0EkiKWGMy4;L-F*;ZO#@o&;mV+S&V~xmSG`FtfCmP!^D}eKpbx~ zjnR=Lz@ty6u%l{MJl*|yykDq&X?1}mGZ1l_6=57Jsj$Dplu~v*6*Z&(P4|OXZQmaf z(f@$+vBdXfF&BEe)yK4d%?M)qxvuuZLLXI;Ps>H`z+^-@L^mL8E zdZ;;7a|5rcCl8UcwrbLD%D2D#EmPyw9#t_Hn zN%#6+UGv{B_PAod`cIl_5~Go`p$S(BS7aH9P>GF!@`Tl(JyswysyF-8ka5Fsde8*S5bvbE^5#W_t$=Kt*~t%-%6 zDw+23D3EQO7$d=;`1?_ar%#pi`K+6wyITnLXn1D4+~D;g7^Q7!E~L2IKY_j6j@&vJ z@I^|QFF5FjFyuZ?Ns016r4-nH%J$^Er^|>P;PiwxcoX$P3IfCtBEohE?E78_2dmYJ zXgN(7_p|qtySm%f`q8&&MJZ=Y#rI%O%%q+Q<7I^%O(UWF_B3>Z>!^}68hvEab>doau-Nj`hK!1`D^v`xV~`7SLH z&Bo-rw>NZwC}VV5c}Iga8))?Qto~rMUqugykZNW2`CG|y65`^z4vAR%@}4tU>`SjM zU#~7vlS8R^1oXLSLx!J|LJDE^uoS7blTmh1b5HGkY*^0xAM(hJR;h&5rhKpQjL$hb z)of~OH#viiPf~^Vb@IICPWBnH8XF==dx_$59vlUvknpZH(TOzoHF%8fClV=zh&@Av z^xGL!oIK5%dw_B=vY3d7dL{ij;&a_gr82Exe^9^TfS232pc~ffa#>HnYOYNqxZyM` z=D}?HlOGNSDf&>%(Wfy6U zZFyZ5s={7mF;*WjQo%-b;(L}vqcKQv%IIJ^~J|!M{vgyoxBe{;~=c0kPF&h z-Gm3OXPo;FnxqsP@0jr`SwqRf34RQ%d|6hKCgo@tf*NS|^igHK8>8k{9TjF1(lQK3 z@qIlCp*>x@23Q;VOu=MYKLtr_(;pX$K^4b8AfjcYGPSvaE?#%vLz5NA#f!zCy(DBW zBA1{x@d*~hXmqZ};e-aJezq~?;l_xXTZfnmssLs~ za|^qo0XNn9p-tSBV6i3#*P3p8NLZHOPPc_JgubMgD}s_5~*tpP%G$d@8sWms{%ATH3D-hR5U3W&YG{K~?{REMG?E zj_Bm7MYuuZKDGx;CVcJJ>f6^|dCG3>0K`*^F3lqax8+}v4oXl*(QDDjtGQ+lt5dx% zbDtqqdLJ*!ROkIIGWw0`3h;)ypP)%Ooa0eae9RG%z)rP zan8{eMYtr=8DW{Yb@gxw%N7)a;hjn$lxTMIAI=Dqr5;a@=;gYpOAi&nkg6j1s=m&X z%qc;NXjoMF;Y|dZ1z3Vx&>ar2h>JD2rPT5!(-IV?hmY=hkd3Hi=u6m1ESSNg5sWWV%QC4lH;}g(i`TOTbN$9P1cF z`daCiG4XE_38NARVn!{gj>CU6FO-Uz<`M`Jllw_{xOMT#7i+7y;tObYG$x=#wJ72R zx)p(Puq>fMvxg}tLAm$x-0feqO{7|2b3LN|6mu*4k%BUT^>MiR)uUJwTWyJYB8fIp z^2hyB4JnqVVQorf2n4`8)_lOCGe0#|dIEXAvW#Y^p^k|7D;kp?^e%;2gxU0Q%N)^41+Ts}UA?wYXj_X{$sMLWmKXY<5$@zrYcyzJ$J?4WU26){~Ab zjht(dc!YmNb7!J6L{j*zYzrXLTNxDe2u_@JoX$L&GEnvLM=24de@gEVT1)z}6Jp&T zmda1Jvh23FDu5rA7T}>zS2D=(Pj=ZkyhGS+#(Lj%u^wy|aIkoQ`3JLPUj=(q{`JN% zf{xv>gFD9ams&DzAH^*_gTXNp`TmX%3n=D)p<{N!xQPa#>F%s1UmV8yZg4z^Q-6C4O&N< z4QQq&uGDI!>Zk(fBAvvdDGSJ_*c#xg#)kjDm&<|I|BGXiiC@|(zJ2;{k=F;%+u6_> z+li$8vEMY#+e~Gen0F@g<52&%GNcyjo#30v**aAEM}n>rd)S;M^G$O7Yf`WOavjGN z^9cx99p*iAQ*)*@K6wNPFF)e|7eda*W3FCifWdrVa`co^@BwcBqc_>&lXZ$_os!oM z^r*cZ@elVwXhN{_>9GW5<=Saj&sJPrT^wyDxYd^`&BBqR9|KECGk5&q}d;ZVeN{*Z%<0*wA#`%D(?$lejT4c4Y@xwo9pwSx38S`#`o{)yoR)W=~J>Y{yNK1o@nz}NsqS0iCt-4fti*{X+7=-8~T;Mbe*TS z6$58_f3!1dH_8EZ;2}PDc@^Irl}gq%(zoOqd}{q z()dQFK;Qa&kuiGs<50m3)#=biJ#b>L{o;FjigwUZ^3)a^oXC4U^|e6ozc0ZCfGZ*% ze_}BMw`uOEder9X};9p&>dYOt3aBzPqtwat)xg z_z3*j6U4?eXQ&t<$%nVrio|*Bn#rXD{vcWSfRc{a-ovqy-n&MS=YjigyjM`RHknpw z|FtxXbChVD2-ua4Hoh8_y;_z1ai~srQZkxaDPtjnE!=h=G3Y9E!k+^u@t0Tl%IoI; zIUDruwuL#?Zj1(B{k1A9PWw2{l>vEw9~*swOA+l$pOgD9vhN5pHLduq|X)p1agX>FM3Qal+Sy` z+jQ=fldUJK{p&BOES7J5f+_bW!vhwM*}142epYK#cFmWB;EPqO;?!5$j_;dZ17kQL zrO1PqM=4H;!cwM_z!=q?so&bO!aKY3ZJw(b`8W8IXCvkB$@27!I7*<39xIQqflx;F zAuvlfsc_!k3=+U`{n2BDedukv(lW696L8TE`N(>@Nt*;ot+dG1u8r&`XC_LLTcBcl za)Bd;sw_ZhkQ#xMe>=Fg3FBV7Upcw~2@ogv`rbH;&C!ldRn=7^i$+?Scr!$ly+kC% z`40o})dy#-oQYqSn}e<+KB+HXl?5so6VX@OvnjAi+T`UHMZnaWp_M5QS|{@DX=s_G z03zG5KJhYr>qN4DVS8d$^JY)f$mU4B@w=uQJXf1J38=kasXhGXpl$X&pVsSw7yl|qW?~u&S^XphCly8FCyyk5$V>dP75=f#0-1pqf~)eU{ibKT9FM z%&*ltou&)M=TlUHij{~Md4^4Lm6A+h204iZc>D-F@_~@M@aCLeL@4Wu@G7-kX7trE ziEQb}M4kwOo{;`ND)tvETVx+W2qDN$nDkVbbomARHi-T1oxX1w%6Ixht8bIvi@$x| z*b7oY2)TCbpb$Ok=5g&3D*FMd(@^2P!XA&6OP1nDSYkd z-+JLc1O;xO-04|fqw~hxWLY3=&pCwJ`hJOum4Q*j_d!_O?J3x;*r+9xS9U5|oU$(& zCYOzg-bl{%6P<6FT$XAblk~rRCfRp>Mmg7GHj#e(?S>QdQU<>l<}L?vxa({CW%j>~ z-dQ&}L==+t4$xC$sXznIoZ+R(S!tWXgv7?#W?O@6xYifUohs?|cbxF}n~+cn9g`;$ z$2Z00iivbw50A=+5W_ZiuemjSbdjx9egxgelWj~8%3pts4Evn&k{dz06JXt_(uPmW&0`h%`zKr&wW#coSxo zWQIMMcu)z7|0KD8PI_Vm9@nv78hm`NY&Z^bDL?ruTX6?#&KvN3`%|Uy`j}Q;x^wWq z`E??eGr4*yuNx>Ghn=P)eK-a~o!#|2Bw|6L&vf63#$T_&J^M>y=W3fr)#B4^|8<#~P=i>*MIxS-k?mu0MD z$)7jL?7L=rB_b`XE-*BGMVA;;U?(9=IZ8lc<-+OFsm4kkuP$k{6O6=anEcy($9&1O z^_()tUF@t*6cgQyPICu6f^RB>_g1rd_YJiTKSzf&>=0Q=RsgRCLq3D^EO0g_l$L-7 zgG6E~_%GlKnui({S^ePCR1VUjtp?dOX=mYDCF;~$wvZFc4u*=hx()dqm?5mpJ&>C76pIoR|kRsltJf;Lbo_+9n4!jqr5bJ7rye zJ@L*YFtK-wvYg!L@<#O4{QJY2M^OXry_Z$YyQeFTHCLBo5mxi0Vklgieecfs84vh8 zSCldwa^WLKPN?3Km-nMh)1{2;Rj_+7r`9n^8+7lw? zLqXss^b8pzOu%MQg~|6w?JS`@x&X?~rI8gBguPv`;w}2GZiy)ku!lt)*p6yL|vUF)8W1u<67=KnP2;dvp7@n z>Y8k~^NepuM9$h5={-Xd;C1FVEv1;NgC4F$h4mqcY zQn!7TOMr(>)hxH10NIER9g~{H8+vgAc9L^w&xg^ifj}9+tRYN~7F-CC@roBf|9;(e zl-gV^w;k?o+c^$}0jmjNoIUuU{EZEY;vrt^5Hht3s9~TqHglE_2*|6p}L& znJJhw?<FlQ@nJXj5J1Dc%0M z&j9oCvSY~kcVLr0r!rn~1zH_r?>)m0Xa_y7oY>%>t+98s{`=exJK&+_G?L6V6}8)` z6sJ+G79!m;dfY33c-hb}szt3VDL{l6=A>stCx#CE=TEip-hsXr&&nCm+j?l0+2Q9d z{-0H_$HOxD<|i_^rmH-vOqQUiVfzGOjvAVLwePdtX19J$$yU)wB(?o`)jS^6%a~;~ z;ZQ>sXmd0erS|KuK`$Nj#OQk5?u>dhmG6QnH*_d2vn^k|==Oct&lB^jSJRy`Anj8h z_4`-Wi88K6MI`XACqaKstF-+Egmznw$mw?MK!ZYcrxd(}|5{UJWfmH`sv1D#9$L4y zB*b^$!xqawwK~n5(jB(8j$9ixT`V-@UlOal)jn-L+oxS`*dTJ%%=^^7FWt3$+I}!n zf9ib@cc9aY5V<{fv_jO?7A56M{!{Wf6DK9&F-nHoN?EoJ<=(Y@H`YVb-|@6wN!sSF zQY{+N0MjPN_r{AzHkmWx5YN)DFkpp%FL_K2G3p1ida!!k0I$=nPd=FC)?18^&dUDl zOVRSu=-$1bN~yiF&5~5dN%JG%vnP&GYlHB5)^7@57ov(vI6vHG+9Vr|o4xp> z1;yEw%hD#t13yZ$6--*y@?qoAq~`X`DTGKBaE?EUA;lhwKRo;*a=~BDzP|2DH8NWr zax`q5YNH|mxRtg=-wf@-pIoaN<+N63FYpOr?GKk(N+kG-^Rje^0`gktel-G( z&7_3gwFxKBCY6t%Ld=# z@hCOk8+RIAX>3>5$H#u&ejV>NP$|9rNQ{iG-uI0}PN?olhu4m%)SSxVk4&Bf@Y)13 z#9$`e0>4-*?D#$|2(B_Zxi!6+zNrgj_ID;Xj3ul@=YFkzwPyle|Nkr*US3Qb^>j43 ztuN_fR42dWmoX`dSU~A8rhLjxRi`6mz|{u1GG)0k-$}~;jFT4|Qyo#g4tE-Ow5ll? z`gsuY=_u-$~e?Y!f`-KO58Tho~aav^hYpd0R36x%=GG zH*c!nNu$ViX2@^y3x!Y{RWKV#Aj1U+iaj2y%k4bkWdhOpDk%h=MDH@cU89$>)O<}E zYJB-SucmlaN^YyuN^7vzXbJ!0%Qi9hj>ZU!mF(hjawfu0IR3s4D#a%vLg0u~A*(v*KoWBKS~!FlIXS4A zU}^g*vhf{6(>L_yz~!8g6*I%YJi)y%i!5yT?!*#qkJW+-FVP$APd!UC?JzC)#$(SY z*q1wp!f)B6eTSsQOPaf!1;=kd#<1B_dE!q!PX$U&FrE{eD7m6#NB}IIbEqrD=QyCP zHJm`|LohAqP-PW38lQMy?>H;UMLMw}cUCi2a3e0b%zbq#YJq_ZM`8I~Ch$K|;S*qe z2-A;r^2I2s-pgrDXEvXV?R7;mn=v4sbCC=ED1fmO%^b&S58kz7ZS`^y78^-MF25m1 z5WO!XHFu9|hYNeM64ZK5pUEx)T%f1-&_y5QAw|3;Bl4&pO$js1!Jy~cDED`kL`uMD(!TmR`B4P6>!-7BD(5=DIjfq6lgi{KCM-3Hp{BkC? zVZ8EA#6iCjoYt7B(Y zOXg#3Xpug7;>*r^Lh>S4hTkg&1U?>-arBx{XPbOC3m()F&papbjL2?ItC%5cW&G}7 zl>3Ke-0O6(>dd5_TbqUB10{go>F9JrfVoMW<<6I42TUK+cgU>?DanB=Lnk@-DZ8)9 zMXaX@iTb25Ivs%(o-C@{CC)?fm*MYbKZSDL5+%clyUc+yGTRu0`+lgn%L%ABHS8^j zTbF|37|Kp*GJn0*uH(;hD2hm#w697`XNxNxf~?xoNJE8p#K~SIg{D@bUO8(sCuoMy$TOb>CZm<2t7Ka6&??hvf|ctj z-MCHvTd0)+wVfosSo>L;+t0$F%KATlB{3}rgvU*h0j`*t9+F;skj+4HQNE}r$dIL5>9u9tod>gM^1z-0N^E(x!?*8g zlRYdD8Di_*8prUre4FYg1sH<)@rS5)6k~x((b3haz`Vtk-mrgAV?0kRMnQ|5$9f(7 zUzClU`!nmk*a=mfWr)iVdCFgrQUf8kkrzg07;C$2PyU)`pjB07Fr&@eKdk)m)62<& zLIy8D8>YY27DHAsO?t)hB~qf6MDuW#_4Ai*j@#dkL5~Vnefn4Mjbb2%Cbm}Ebv)z& z(Qt^$WT+ZIy+cd5#qa8TkO4kR9M$nzy1!mIy)K2(Eh9sTeWpNNe<6;3ADCls!RN&$ zG8+;Tq;1)JTWBBJs;SSD4Q0*L`spZbvilr)Ge+KQYt1~z%8Pz-$77*$7KXeD|BDU z{8?tGup1Go8g7%P^kQ9ta(0O%d%n1gCnPDfy;?GY&^5k+3S*+U2}OZ&S~)&UQVoRKKhJgx(-<4D0V(0(>d@AOQvnmvQnW$R~-EtzgO!Lrn2eF$vm_%#E8& z*i-F0UzXxdQX02H*5=f1)`XMV_drbI&QOgqBOY1%Qg%Z{K=eEs{YvB33}sX?mC^_< z%yu(Z>mq?(1#T6RpQzq{?0gIus%<1P}+`2;UFpNb@CF6wDOKe=p< zl7@inp1O@kNF4J+^KJTWImBqq3Z8dd_lDo0u^CC*(rO=!(8z<&n{Jc41HJJZ97w+Amw?%$LjM!RglMM z3NEgp(;6AdkV7|Pv!9@+5BF;qIU-oipL6v&Ya$+a`ix?x8x@zLbg8)DA%N^=%f^mRcT3kA{)a9)V`tq*KR zFjbX2-u6Eg(r(w*Q%tjViubC;u;PHXFh&r7)4&Ri(_ed_Qj;)^sYCa0~s{QdC~={ zOTKDeCe;itnu78CX^*?L`z?lOKr~Yc$Bo(bYs^Uw9UBu%q*~MT z(!!_^aP@Somv+F)KLl!rv)<9D`_k1p<;mw({^lhEkAtiX2R0+o;?wR!*mNss?r-Rc zKZfN)l+(FUchh*qmbv+9h6jW$nT8$PTH!z1-G;Pat1p%&A=O+%1<>j~1Y*ddkXqeZ z2D>8i&ZWCZ61!+V=%5C>^?e9`vYw8k_XKv5cqJ(?@m5;%-iK>ii-g5QItx>Jtn0!H zl@&lIHVh4%((K~6Hz7%#>hZPCElUhDCzP31k@6@3=VHEH@On!=9{%lci^1AiX8gxl zi{mxIkACayjd@)&@Lx!_nK?eVuUj~@b(?l4W}p)>9d)&O@h0`3llfE29P9}vCy;_D zM~^)kw#}H_`M}A^iDW1=G7)2(i8X6!W(uZD<^N;wLcB0G`|Saz!y_GWcyp~DqXr-5 z-wd&t_xl%d{*j%Ww|A1n-o;K0&6qdF-NlJJxDWeBoMQJUd2f9|KF2qbU79j+itTFL zO&PfQIlZu8heX9`L74-oM@`lC5=ygQO|g8KPZ%Bh?%WhHXn-p^Of>U3Dn0LOkv z?sfr?P~_x9++r-T#6+N+Wj|7d&GFbuk5)Wx z`R3pn{Kf3qT#t2(Y?!SX)37$5?_&b9SyweD$@0ifSI4?}016vPF=J(Iv*s_q-PI9o z&#QW74CD5)-oO|Id3Ac4+2kw)H2l#17*J7Lv1{g*{D}@RSZn6c=~J8a!%5*pLjN2! zyf4=vTV^?~(8?*_Z{c=4I>~93we{J$pa!$IT zXnt_P6VIQriY&UgMRf03q(#BQ_K4pY3&+;bQtu+t-t)7@B~Kld$%P=Qnamy?z_c-V z>6(K)Dh+5KY<4@H&kB zsH#Z>cn==jcWCD4F0&2R+*ojj$`*CdP|m+%*^73YZ)QsH%l<2?Bnc)9cQ9%)v@rNe zApw1c!e1QFMBI=bPZWVMjKPY`#!PPX3#q%*as)y42|qrUe?H0@p#$ZYUEA_~ zFgoi)`Zy=nHFJr{W zd!J2J{wsF7%=@@`U%0f8Lm*JTWbkM_o%1E9xyLA|euB6|m3^SMj(@wrVj4hP%|WAOgC(=iOdQ`lw;GAOI$c#8_uB@7L^BwQ85 zR3YiMPggs0`tBVw7Ur-d-yVDAhSinI{a}1~??l_lvzi8-v!f6-_tAt#S1DocDGOpe zL6~j+>^5WI_xS!@WBjUp(SLD_8?kzUpN;(6#Ip97{WBvbDS*{xg zw|zgljCGkpeD;a#Tu0>f!MP^R8<>F&LRF+z3;e&4A@UhvDn7RD24FhN{Vk#WM*@esB3?fTdFa}5XNQsS!Ra;llCIJ9gaBVdEM?R z;<4AMU(>u{Z}Lx{fBM*ZZtmAFqd-L&ys9B$g#6{DbvLOjb}WNBv$VI|ujkhzxOt4A;tHw5EMmuG{u`EiM^Qz{@#GiBj zWq%0XO4szEo;&WX^XpgbvlP`+U>~%Kvb?<-J|QOjrzPrnGUltW#n)P%zzxE0d}Y`TKJ4SiJQOmlG874Wt`*and53|xVzq;6=^%t)_qyPJGl+KXE#8X5-NE=mBVIFf>VLFp!h z{#Clw&8~9Io%?s~P0P_XSu!Mko;;&%mX_-iCA(_S<+icamUiHNi$9D#nR?G6Yi(^4 zAPXp8_J>_5ecsItDB!lLBHW1Ot(mAl7M!l3ZQ$Hf7T@Ku9A^efO>_&mJm50C7JG-x zKp8nL?OLV4N$N&KBZUu@s7 zl#P1tdGbp?V%bgCnEUNatK8OeR>UhdAdW^;>BxR_U#Ozs?v-gbuQ3gPB{Wh$U=$rd znH-bK7PCNmwlf;^um5I)+p^?ri5P{>3!E)bOjYOA`jSDFQwAg%*XrVA9qCM6a zuR_v0lsPf!8#K!p4U0D<7a8e>j8|I=gUJiUt6+-Z4@7;eSf7kMEn)mhp6g0a3QD<# ztJ9=qf}>1NdVD$wHd3Zyh%sc?mCZ=A$5;^<%)KvVqxGq!*AQO}?K+GaC2v`EJFITA z2Ld6^UA=%htL-DEr3OU@2VQY7T9p@cLg4QETWA+$K7?$tuhHbxMMUsY6!ZqTRS`rn!3&LzQgzC`J@XBm39izOI zhqGIr!zJ7EI|Ziypg>d2WR}NVIA4del;QJj;Dcbre?$gYt^S_{?Ox(&n)g<;gDWU~y>4{<2sc`MOM}-lzZus%WsP6Hs7rla3Pga`ZMWw zWx#ju{StydA|8N4QP=IQ|3c#gHO{{yCz>?JganYsNN_22D4 zmYLvky~-T--$T2zqP5qxrb% zV0)U-%a~-o2^0%AKcy~**ROE|@4V3=F*>T-OsigJ8jCsXs}jzkBh2Gt=ANY~u-CtX z-dNXP6e6k!?r2OOT^Sa(bo`}S(px5!EaTC7n~+U2*p%EpU7}u557jXv9%;CA_b)oW zp3E*&o&4kBs2rp0U;$%bx%QCaMx1=0GRYi&dw?7XqN7h}U~b#hPLi$M$iwp2vw1Vj zrnAW5BF^exK>gWR+9O|T=Cxsi`=3;o{&uG*%Ur&^6CT7)ChYfRGw-!U&(BgnhlmT( ztaQ7@q@@71_K4dVwS#3b1Qzvk|G7t1@V%{%`-)dt8Z>$6cl>|6y=7bz>>D*;k8UXi2}xmeN{<$48Ka~GhO~5dDKWZZG{R^kMo7am|M&a-eLg)O$L|{a zxZ;fCJkR53qgbRfqKHz?)SIPd+LL#GW}7<6cJFM_6cvnp8P~7{XnMjwTlx`5+CwE1 z68wFEW^`Nk4ZK;e99R<(%IW-#Da6i!$_0Pw6u&|yvWDc7t2zam(CwYdCzbDrR|fF% zM_bfA-pm$tRSH0S6LB^AggKVdVletj3h%81H;c`w@grqlbv}z=5|~Emx_~F5IV=cj z#EIqW)iq~pmKg>byy@=&+6xmaM||#Kj&W<@Qe564E!@IO2*$b~22YAL*SzFriekav zkrWu~T2;LkCd+pqJ7TKS#9JjlII*l90km60M^lx7aBNhV^p}DyO@=Kc)Q(kElJJ38 ztkPXAwF1hhamPwNPMrBo&@ijEPB>{>kSfMyZx}EVAr$ZP@UzV{Yp-Fmm zaf@u!Yfb+1$pD#a8&Aa-N7}Y+b!R)clVA!eeHjIaK?F=ner9)+)HXdDr*g!=Y1aL3$X`%MHOGS&I=$IRpl<O)$j#;q^k=oa!3ShRAxX^r2 z1;rcHyWgsG^BW1?(0fZ$OpOVnZ*nd5VuxS82UdzP0@=w_!u1s*$aY_nHIsfxB*e?k zQ7649kq>DH=vts=zHZ?=anC=9RU?(}fTh77%4s2G%nwtIj-D5wI)4fRGJo2|#zmRQ z@&n#qJ$T?vWYx7YXOQ`G=)0~KdD8n2lLTv4zkwPF-+XMzck20}gH#`U_)~Xx20jWs z2ioAjHkOsPP*4NZxKf$#eMf%YH7=060CJeIa!TFcricw4z6T?@@oP*CsUC`rS$#m> z<1;f>!p9H6x@APO@4a_lw?DO@5{G_7Jbe`WW5y==LmIeSr#v^* z_3r8fxY}iy$<3MzlJ-)0e%s(#(9#eXiI@6RO;0hICpvQ)Y%9scZ3eEIREY&x4CAz zYx-qI%q2akK-r>7DB~7=8y)EOrhS)vkDYzdLt!o>EPHbp#Qh!BJjEe>RVnpyc|c+J zl(!zP_qCpGuczs9@vDKEtALp9midzLdeHQ);mE;nn1b)pWxb$I%`L;<1uy1~YqN`6 zjBlJImZmB_YZwl8&JLQ}ZfJ9CDskN)=JUtyIwnKtDbbl(!BQJ;sP)DCNG-j+6#DZY zOliC6cH^HDEt`=EALCtY*(kE$=57y-hVES$jNLZViE~1&dknBz?afVf5`pYF7-ddu z_|I4H0?;#PXxf&jzVzXPkckiv+-SprQvCETKo%s+=n3&4ch>wZwncab3OTZa3B@V5 zycFYyaL{wz4%mNpx#~KQg&@JdUzFY2g%EC;%$_dMiLedxlr2AJEY=Tn24uxPYE&uD zBO$g)z+SvUea3DqZP=?*MkdD~n7NmN(xQ-$ii9_PIn}rl#)*CzOY}`z<3(nCavDzx zSajK#3ijo9YM5`(q9k@wKBnIpy3+VaBA%TfjxO`k{ zo}*YI-$JoHN%Lx&gO6pruJ>MOl2$zdh<&b6Gce;eRM}&ziYgF32m|--om3G(4nhq=rd)grw<5E1QGWOA~@S6ELIwP$?30aOBXzs zeUMxhwH~#c6_w}yu}4l`YVlRj#>IETW2YZ#NH-*_G`BSkLtpn)&4vv>-SQl*-6v9=+zwfAI)V95vlYRm% z=m(h!R+VYT2yN$h_Bzj3mu?7I$BtzG(C2r8|I4p48rRf2vr{>$O$XHxavft{^r-zl z%HtZZ_wLBnl(V~r{AS=K}yZlI|*}?6sL2dV3`L~Zdz?SM`3m5St zAN!z1=MFYDv$$4l3uL6Tx^N^%KkiYC_r_0`ktaC5Jx1|OQTpI7phExU= zkC?Ylz+%oe{+);KLmk-U@hi3@YwcIdg6OYn$ayWEs&UB?>wji%@;OK5zYIH{{PG5( zV@Kp-ERJa(w!$Ps0&dzlMR<6oX+nJ|J^X~NVW>q{~we@cNz*70~M?GZo-HDiG-6TmB#G_w8m>Cx{(SC(FzQ~*RI zc_M0{9E-_=;B4mxWs6oQ~!`}u>`5>?06%|Ub>W!OZi1WV_P}$#VD`$c4Fn9 z4U#>k95;8p<(h0B{~R7@tlCL<1vlG{^HEWh$xXhYkIcuT_{iIBh15Aa#JgUQb?&AC zv>3$hSd}Y%>UG26c_4VD6q#Q?!95V@03v< zX&i++S3aQnePWc4;m4`QKF1^G2V|o^EK|HK@mZk`ul0zF$>B*?P_`xrTuQDSP_9tu z{N5ArlrKp)QL^v-kwFmF%1@)?K^dsxG5(x=3eY&L@BP`ugM`cyi=$zIuF+SIl?T=i z5i)yB!H*ERu{x~0&RV02oN8-b%J$*pAgwwdg&9Cx%E z0YF_sY8Dkw)H}%|zSpHU2(_p9@ujXZ{(9Mo?a<4NH&CEA^IQx|t8T>u#l6b~ z!Co0DAZOV+NVLp2U{~r0R!efk9A2q1Jgw8Lkcc(2Bwi~ZfGSJ!Z$s0Jfi@T!?-MiH zRE7>8xF}tGW&lZ%0=4YR04}7_gqYP--bkY6lcQp}v}iYI$IR3A~O znhQun;m$ExY#pi* zr@i+xRFnsTPD2D zUqeEzFH=lBR@-6s)oZ~ZQ{l5K)te(dO?`UDBKmuWAA!PVHIFg>zB`|P%wpATs<#OE zx-8hz|C;|}nPvJZO$^~1a0&q8-TO@=toqaN7n$&3kdov3nMA|RF!H(VMN~azO^=>b zAnXJWico_;iXyu34(l&hG;QqXstfdW&Pcs=w~l zS_ZHI@GO`M(rd`4(p?|-F^E&sIJ%y?{Bgp(T|fK%mIp~@{2vp8e}_C&Q+r^UXm{T* zV6kvK?-0uxg2sn2aSA466R&7j#)X-kPt~2! zwK<73Kpp%@a6Isd<7wbh`JZzsIpqLOhp2y>?EZDl2~_<2v(_hxA$6CX-|$C+$qfR` zzeC{hR?gr}>$5QR3pg-GmAJ#|**l&Wah%mZ8J_UV~H4iP|~4toK1b z?We6z3|e!==;wO!s)`CaMrpL&ExC%LT877jb7GWF1s3%m_G&U*4rWKTO%`(bbCx%G zH=T?<#vq(d8mnqe7uO2udG5bSKH^I0l^;?5=m2kSBh4N=iXkfZiJQuE6h#N@|e{2YN)dMTZQ27vYrh61} zh+T%e^4z?=-cfx=V;dGv?!OT%KOR!}O(#2k63Kl{6>|%K2ww`38mcSg_hbBA-tUi} ze|`B{j!a1FP?{t~~9c;5Zg>iQYS_Ihk3XR@Eg%y)IX?L#QM{n9AC#0RBck0vp4fFRZct~D5f_B z#3`{Y>>aHxuar5rZ}KLCo&3nA9)hX`XWyLsvzF}^CGYmyH1=o1>QG!XoQak~5k-C< zd|PB~9BI@{QgBBTyrYwO@zDX+8u8W3<{r*oqWh=N?iyYc85@Q6(acc-{u)Z|CKBAo zddtkLOWD^D=?g;%?iHJ^LVpSc2o%lHV+vaR^HACxot=X#|GsZ1Ioa_v3+@Bs&HnI2 zyt(HMc$=WnR`!0C55x)`p7(< z8IP=$RE_fsG;dIOvhHol$(*gMKpFf&%36fnRWYrFP$efwq^xyK7e5vF?i5Y*h^^F5 zXQW>zd@8RB_|daBW-B&c^1katYtso4=Cw?q`-TW}@qQWnBfqyqM9q#S1BgJ(^5M4L z&012CWN-FeF^|Dd)zRCcK*#Ky7vdL_+NVssP!)nB&IFT5P>lSO)8Hdm3gpF&Lsls8 zrw59xY7Bq9R!%%x0;+b`D@VCACRsIw{mygAr?E|D1|s#*4sWt+Ud!|HHttNb4Q(Qb4BWjMQ2i~|lCQj* z_`@z*=4t*@u?hn9%9n<+qa*yinO#6`}ho5Qf6wu z^56^~mLt?u6JF;@eo}oUxnJu+-n94JVd>fdo?gYY?`>`d$gF`(JDsGz?pjSuGw&-h zKGSHiR?Xv_c0@D|2z|Mob2%jbk-km?UA^|GEUmHZD^dpsDxlMnNh6W+N^wbPm31vg zh`Au;bmvx?==TN;b2oA;^r30pryGr8A)gk~14`qPXomJL8nFvgRzdst<7@57Q0`0?xFA3pk;sXR3I52 zi`BI*Oj{B@ZC-LPD{ne@uJ#<++vuek6`;w37!%Oz9(^=m{`>b-D6kGSMLdYurB9!S zNjKkDwm%e5#cX>}rk~?-z4b8Dd(L~_8{I&MOrET$HobVU{ zF8Qx3_EGHkqdW46&qjAy7dOe`Q`Zq3xvwL-DN61PtI(O%eMcW$S{s4-^WM-g=#2%5 zqk0|PqKk>4{mjU;o~5qVgZ0Bp7%QS#*ea@QuL>Zc*bX&o27Vjq%hbL1)gH5dtV~}0E4npUTX!Ucyj(>q+IY^mbO5*3A@8X(cD$A38)i;l z!V*VONwzID|5ajltzJ?(x0D2xi)T4%%{qH|tx2^u^vC~ll81kykb8S>1e(uGpYf;t znMzD*qZp#q$q%zKSy<(AT&LgeVz_X!)zaY8n+}xpR#*^o4^T5X{FK~ocQf5^x1Hw# z#hUB~`lysVZx21m=Qg6`oc4Z}4L=~KG4}+ea2sYuIp+O-rz+Gnr{%<1=j6+S8hS@p zPn5~vPj5+)ZR5C)5ozAfH`;!)v>9 zDiszxvv8zK;!$H}T|iprq6(VWd&llA%S$I8Ujl8M1*Glj8dL$yn2}#T(zCV7c#Y=+ zDbv2sJ3bwuuf*Y=W9Z`$X&z_g!(Z9q0)06E;tHQFvRS@;_y<rYag#64|jr$ zENwaE%IT2%?DYiP8PJ*9+2G<~?~k*cO>lvW*lGgq+Ke)Yp4LxBX8xW;6-m^RkhRz; z3AaDv^AZ2CyrvrMRQmptQ7+f-7UtpU6{VYoU(^Y9%ACo*K|ya%8<&F1`*R7pHlm** ziknF(7kz%scXU>3xbLWQtd(^UMQAM!8`i|4!Gz>ZpkNYa3GuLoSf18+!&ZpRjSd5B zT61ohT(@MA6is0+h9h(TJeG-$1$4~nww8a3kvbPpzm+LyWBqSUetze@2FSW zbtcK$9AnOD*t)Ro&$lnJW6qNu`W5C-BgqfCa1NGmBPR}%InnMY!x~p8mua&o59g*8 zm(R*=Ap~kwiXaOV2M4_E7ulPRbQxDC!z@TnJa&2ZJpJtr92!lT|i+C4WqE@(}TwI?6oJ1|m=Lt4uD_iS zEUfed^`#zDtI!*{BHz+m6ZX6>99Wb5RH^BQz-xk>fe-dkLg4<=vs0kEk9mrW=o<98 zHrZjA+0Fwbxt7nR*!Bt18#-7^)c@=G7z3j&Iw9!xX?*Mp|9Cmr6Hz_f>oe+okNxOQ zLc`JdsS~TaMX+fg!5qRlX?R5svpxy^wXK+GILK&-H1SXBm+b^z`P0A_o_mbq3A2lA`&blaqn3pIIMirxdGxaB7k%o^8 z1#@*E+5NPy7Cy+LssAii|SJ&S*Jhgt}F?v1^h zLZcsnXv3m~yMGRk_ zvDDrf#U4I7#2K7&#+N1$aYl2iu+TfgjG~qf!rUDj0W(V``Z^n{!J7K`EImMLhgt_BD$UXEZDW$I_t4f7`>~7$ z!mhz1U;BO?rEdVK-!qx22Is-NAkCtx!Y|LpNv6y9nMdlj?k2NE_QM{j11mwLtBcqg zCptDr!wr%mK0|M=L_*oa^*L|c)^l9>8bpd(umh4j%Yk#*%_xaP-z(#^XX&D;EZV%` zvx3mBKv0M*dB*;gb&*XURKgj?KoR+~T-qF9eo6uqG?TdaDOie35(^#OAqwEUd4(uT z9HDs@!m++y8;55r$_6fpKUR*5(+R(NhqxMmjyvHq+-sJ~S6^eNxi7=gBEkR9NbpiR zJA?VCBArIOekZ6gPn=-%V}v5{J=0Evf4_92m8Z=mGCZ|G1sLo*SJ* zpX>!B2r)q|)>B-k*8eR(c`suI`jJ3--(6#N=PiY-PC-TGZ4NK=9+rtax1YHtmc&OV zpqNs)K6X&2dn$1b0usR2-hK?1f6Hz@}261gd-sGfMl7E%$)Dcn8sSmpL)Lj`Pevf7YKG95%2gINA@%$^Kg zZoN)rbMW@X?#Gg*mND?xV~3~7&1tT2ZcktH`O$nKhcnZdHV)!3SAGhB5&+V4Ab6d> z_+9~?K?i;b)C3q>HY0v2S?q7}DeKObC5+rqgpE8-PX@L7f@HNIpPJ$~jTu9BDs}ig z0gQ~#EOm)LK>&`dqM(<#I&#JcWY&*0?p_-~%r4F?D5 z`$zHWsl9Y&lNB`13aP^a!;rU^=I7h*B=li+Ev3A+Av$R{mx z(9H}YoW^vFCznZU;cSb`PHDpGr?!bG%KC34WAPi38b0vbSaNoizi*Q zu!lSxOTVBAbQ9Q(hF9Z-k;YRUmJyzBu#zr6Y;=zxQ(2JtYe~*eywUX>>f|B8V zf3UJ^B%1YQQgD>LMeVy4cz4~zGMAlH?f~kS-?WHj&hCePPr)rX1)s=sBnAxQ+`p*0H+QwVf zTiVq9^?s%e=1o(!f2w~AYtItSsc&QS((ByKY_UMk58mY*nj1Kao?R9rKk;hsI^Qgj zw=~Su|JV_pFd-Vv7^(C7Q=J)&_eA8I_fOX=!?#vE1`Ou{?`78mu|8H>I)=S(DgL5TEHw9=Vmq8cTq4gQ)kx%Xfexks8 zlbVs|MvCX3sB+U@#GubfOdEy+jxQ3l@dIWq~#t^?_A#7i1eH z(c%n-=hpHh&R4LFBmQN!!S?>0{o%C! zR^3Wu#=Fchd*5@{#lDeM;drO6)ql5L?Gvr&!VFu8Sp$CIF+||BcB{SJAm=BMRjqMI zrERwt0rg=!M!OStnde>XUtRqnaRn;Er;eABYTNam7gd$KFL8u#49=3D3Kx8qgi(?> za;+Yh9=fv@YdI;%LXohE=ahBnfO#mv6Ui!GC(6Iw zekOoj`}@P>@!=-4UeWraem7?f2;YVa`L+Y|pGmGmR9+eg%?y#3l5XRp4F`RDdrE3I z{deB(%Z3^Qs3KEEKqzml$Ro<4zpQiD|vBuIFpB6pHS+$LI6px zOwKLTkaw%yQ=OQkq$)PlRIqhV55l+RBBY&{yA!28zdC+pg;EOC$3a4cKr!2^vl)^M zUe>#HZZjR1cKSsKs_>27Z0TzjC;kIu!T)+so}*1;utHUG zU>`5GH!MgFUp5kudR(?WU+?U87ZOB@uoKjRr}M?}K4w;Jr8y>t5B{c@62smtz-y(i?Pv)R z_N4Nq1;6#Pr8k5asRgX0Y=S&d--u}jpi1Mej=mmVmg`An`Q7DK}(pDAn3 ziFS^xcFH8RUKVV;FaW!X+=gM*=}mdsEPj-Tti_LYrx`BzA@08ZbX$$!?CEC4B%>~6 z`N(C%JK0Mk1XSNuCp*|2`QLr6B>Gvm5qyblL3{E%Q;rQKU z**6Dz6C$#UoeCmGS(_htW{gkCVnQI0mz)8LH5nxaD-(Bj=P`FPFtHX$SRz)39xqDz zDbY9yV$G3}442(At>@KDkG(Pgi19uv{Am9rTz`u&^6;bdMZg3op1tRd65SMu;;Df_ zki`>;lhF;xR)XjFDissM5()njPX3$bsQA|@BcjOnjJWpA&6-}FeQkTZnvXw$L(juy0-ncpAmxmiD*8b_r9JfpNx7qIM)Cm$Mb86j)y#-0xINm?ENcK|k0wMZ^ z9M)w~FHQS>=UPmVbyAm0DA4~V<;8)YLx7R{!HKNrE+(QFB}7ksA?5m8F1kmkA@)E$ zW-u!1F?Oy6bdx=DGTs)BA(IMtd0UuEoLFZfZt+JIaVoz$CEb%i0qt)#w+a0PV@Oo{ z_|)aKAz$rI>;Tz`i+I# zi4@(hO!wVyRBr_cnwxR-1&8=4ng;aMLP+R8`U!>*>}Y8SPQO-BHECirB+3HGipc&flc>l>G4KL}-bS_CXY9&ROCYfBx+D3g2^Bf%rZr2Zvg9dfq# z^mdEz64o*_|yd2ZLMrs-?XRcHD%KO`SaM0}nEP?c#<&IZ1 z?df7yV=-p?U9tJ^be$pgYp?7o`Bfb`9Drc#3n%B}YT;NBP)yP@8)$^+P6A@@2DIfA z;cLV2H$+}K9p9y4T8nvM6~I5qOr_JiRByu?P6I{Fzh2FKoGuYBOvu;YK9ZlvODrUdHLJ$GHveKcc*A#)nk(^GqPo}g5>3Yl9yyiIBa}M;ae$>H?XTgd$qSU;E zMR>iWA>FYe^f5c}4uVjHnZU|@9OgQrs=%v@2LWERo-=0AaY_qo?9D{fm$Io5|2!Ax zq5YgY6}+Y)vJ#@$z9zo)Ef{&0(yKWV5lm2bcY7s#bDPKOUsyOV`=FAE+uw}q;oXiZ z;isL{ZK<;%cv|b9x#BpTRtixi27h6eHH1h{aFU6wVRlNJ0KK*xVt^4n;^4 z_N8alYkjuG<_E`_ z4nn?uhg$@g5E^!h7-u&O)>v#SbTL9Uiv8Nk+^?cW8|dC1g@hM)g@}+v?&E5S6u})c z{4W4Ba%?qdJN@fSGX>IKIM|I&{~aNLsC8{QS5HVhE#}7kbdVTti0^UjyTXCa=I`rA zOtjkdmoNckR4c_g|5rh0P9V&+H;1l&CFAg6T%_BaerMv&+R&jLiOX)IZY*WoR2?Hb zKTfyXevz*5X3k3Pp|@fAo6Ne{48N1PB74WTCXPAw-|7ZLn{+g$qFWH+_#JUAjQ;EC zw}m*O;`>zT69@aEAc#LmvsCY*KaN0U+SO=RI5oD?bF_MQ2lh>M?_N)0-gQ}p%Rrre zrKcO_;v-eH-%!4lK-dr&p`O#{=Y-R!FS4|%x{gi|^0QK&_CPDQWt;wv+R73mQ#9Yu zO@-{o1Y_;tQls`(iA$IDChp4o*w-0fAVn9PLfs{-Gy&`<^_ABY{n}+2@cqgmgDS94 zt+(Z_ki`62acJ3M&FRI5oL!2eSM(3~zAiC8P<#wSx!#Z>?Yrx=H2R{m4gV zdt44vk<#N2Rhvx*K4jX;%^z#wvfo5z6;52LOG+2~A1}T;AReduffL05E04dz{YCj6 z#{WkPev|TXwVkFGp5u7WVu&rSiiqjN?GC4Ii1qvQHkbaNL))5^$Q^io+;5Bvz8e_R*X?uRSf<4E?^x)hD^mt=P z+=t8jILR9GS*CjRMhOrpbvxaP4QsvX&a~Pg-zM@sjk>cQ@x?gD(2}A7NOF5&oN!W3 zJxGOf>`jVh^Tgl)M-iBvgHs}CCL8zJDJ+;%ws-T}D~TIPm=+f}EjmeFZk4*N ziJfkvgir}kmM@Rlw^IK7hj4pwpkW+8jhhu(N{^kUIooHrGCsG!*8DvuJ#yTA5NEaZ zFnNVLt){2{_n%rLYmhjZ0hBa)%}ejX(~?O}vwv(}WtZ+QAh6|TnLseGS?tb7?Joc# zoLwKQ%Suo+IXMvmn!1crx@t6z^AWHWl-G%GSKndM)XWW2ZjV+b@bGSH*2Y06W6@hg zx!oKB!)RkKV_LUCFt(H7mJcC$xg~PYa%{denl*G$R<=7FQlf~UrK(@@vHv^!4>s?L zpa+dEso`J{*n7X@1@_h4WevDQAo#_SSJy8S86#zA^Ja4HsVfeJ+2S~PX$$U+k-W4q z`tb8#Y^k$9r{pa*re_mJpMQ??C=`F`;4ujCeVe6+L44PVMiZ|XZ%wuBk<&hQZ5bKm zJ$YY=&6qS@AxFK;#!0h_h4t~%^Pky|k)7dPe~Tsu=;Jet6g{=G#7Vb2$eqJk9r7&$ zX^(}k*-O-Cgw!Rx8M<0Moch@J+v)Jbt;R)so@me-?DUdmup)sH5dp20Yy`y13FiHM$s>!D(#Wwl&jw?HjM(9dN8O zvfeGSfMTAMjoaTwTQ1d^rH8tKgz za5cXygd8jnI4w?jX{+Uyo>jKV+BIIFnTd0_WUHfc#E!BN!pnYcZbn)t9N{}X+BDE# zj-PxU#ntpXVY-C z-<*aiD_>`|Z56pmzParA*FV1pqpgeLmfP%Uv82HaisuV~I_jBYS1+!+L3o&7s>si7 zS87qFU)()nl&3dWTuZFQ7o^#Hs}?Nqg9BVNMZL~y z&Sy)>Fca)Vj>>i;Zpa7$=SYFmN!ElJto3DiW=|eInj=h z0XY=iZ}eiKG}8}luD#>(iap(x{(FfM3IHCRmd*H| zEn@z%2++EZ%8a!K-U0dEOUvn-Ui9m&{uM3o!$z6HJD-Sig#oDIb88b$HVKH~i-jRuIqYFhcafhXxxm|7-2(tvGcq$r5js<;-9Z45;qt>)p_CIrs7_`>WkT{)$ z;R034f(%cC!LNdxs2BzYocYj`vnp%ctD9dny*o9(zOF?hVQ+okvFXJT~(`PYGX*8K}K8fz;H})OWXb zS6}WP5F@mmkB2MOd^OGNfo2q;EaQMT*g({1+yf&HtOw3l8hsimFa}uJ|vLD>2wf1Wfbq~K3=t? z`|#tQ%da2;l;qWKvdn8-&92Jld?g%%!>m=}byaJOYde1)aNc&&JsNS4K%-?m(Q zyoa5Tea1QM6q!b!N_ik<{(;u(<{Tw=Y1vMN-9I355_)xg7Q7!Nyg$!7+-h$C%HnqE z#}(m9L%%F!`W)Z8Nn4EYlBnaGcATT|qRhTL{Yd3<@vSNrW~IXQu2nQZr-cjjQ;?>v zn|B{c;XJdu#0H2wUofN*wN$8ngjv8F8IDr#*qFmiz9noA!*U2g+~e{`wvEm@DumeC8jzISL0j^bUfFsdh=C>Y zpTxa`Z!*DOUH^({bOl`PQC=Oi2Oggtb`r<%d(mXS(%kLd9(mGIK6wL!2tYjsP3y8A zjTpNw526NS*r3+sh#0!N4{~bCzYByl5oh#aHTyC3pm$!LGSd6;C)4yGJcLy~+UmH2+-`q+h$)2(MqS4`uwk`a#z>0G*=f?=TGZ8{K<<&_f{L+_kcTE+(o#lHzWY-apM(>u%fL-#o?*X(RL+KvxfGbNPe8j?P$u-Nr7ha!||U{1;9a zSHbo@IA<-&gc>xW!)%sBwvPDn-`<83_q++sMR2H4xjhCUQd*cirJxp~XRm*I{nU0r z(IsHq3IO&UpVI0f^C5t{^^>PqEE#>Y>StjgUn~km<9n4AOl^+odqg&ef46_&e74bK zr|p&d|J{&W)<=(;yxw+(Aknh#aTu1h8{p?dtp9=Ua@1duplEbwFzJgLb$Z*`h@fw4 z#kr?{N!(}2BT|6=OJDgD%juCba>NpovEN2lH>K__tj@kIMz(OGXaDI?t=6t|$~-6{ zT1@pJv%NXP+mFHvxOl7fwOt5@g#a@z`$kbwX1Q@4&BUDkf_87Jp@+BzMBE zww%zeTyhsor(4>U#(wB?`-5X8@&g-3h*88I%5{*ZW8kyiAIeboVeYP%f!+DA_b2fU z*tkY)FT(iq!~W?D^|VY!W#{*xk!D3MIIe>bB^bQfwM>8dK5jio;IMCxEuwA5sf2v> z)dw_fmcX=IKxRr|NIkan2-p|Utb~nRnEUCJp77aZEd4>h6_Ew(cV&-|Wudm{&U3d$ z?8C&x#B1DcBo=r?s1tXtUL{9ImLo-vE_`)PTds^vMWOPv0o^lfYG+}sm)+<9N&Wy= zOo#~PPv77E+qB~Y9>p8=tCJ{y9^h2S)5T1&{U$6nR6AUF?_!>rfoo|t#VRMv4VS|E z$w2~f7KMh_ZoR40W&OvjS#{6IXGZQYDv%ly(%6{E;?0cDU+jGyxG|VImco|> z`f7lL9!)_3?cvGx7yIvYK4~Ld>GZ;PjW8`f*ZYq;;&G>6xXVpIY_m_++6Xh=OTC0Wk=I<`toImXU*ef?WQk$ZAMKzK+ zzq=GhBK2V{w&8q`8$PJ8Ul;henl zKQ|zGfHe48DewP2&48_Uz4Y(}v`5%;EjL#`lXH5W=yz2Kra{jH z{?FV^=CiMib6<9E@|&bBzYBpQJ3TYIK{s@Ui{7g^XP~ssXRmQ(Le^9# zftOf*oZr3t=%Ot;?adw4PY&I9-4yuoW^miF=l-(OR!(1Xe(IN(!EHzF z#QVDT`RjD?&ffO+#nyY>z+%Sz;m+sty3fuwKmP0MYvZqnwj>^IyRobEb>F=z#@FWg z-7kUt^cgo-C&w&{o4n^~-I+I`hRKC5_wy;}(0im|FpPFk*9~>;TgqhoLBlnRt}oQ~ z&;D0@-gdfX@G_s7MqhV*vB``rK5LqF{-pm0s!BaI mW##r|PEou6UzGm~ME{pfTekBCm-0gfAn Date: Wed, 23 Dec 2020 15:45:49 +0300 Subject: [PATCH 23/47] Remove fs.microsoft.com under Maps --- windows/privacy/manage-windows-1909-endpoints.md | 1 - 1 file changed, 1 deletion(-) diff --git a/windows/privacy/manage-windows-1909-endpoints.md b/windows/privacy/manage-windows-1909-endpoints.md index 9721578892..9fe2ca8cc1 100644 --- a/windows/privacy/manage-windows-1909-endpoints.md +++ b/windows/privacy/manage-windows-1909-endpoints.md @@ -73,7 +73,6 @@ The following methodology was used to derive these network endpoints: ||The following endpoints are used for location data. If you turn off traffic for this endpoint, apps cannot use location data.|TLS v1.2|inference.location.live.net| |Maps|||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-offlinemaps)| ||The following endpoints are used to check for updates to maps that have been downloaded for offline use. If you turn off traffic for this endpoint, offline maps will not be updated.|HTTP|*maps.windows.com| -|| The following endpoints are used to check for updates to maps that have been downloaded for offline use.|HTTP|fs.microsoft.com*| |Microsoft Account|||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-microsoft-account)| ||The following endpoints are used for Microsoft accounts to sign in. If you turn off traffic for these endpoints, users cannot sign in with Microsoft accounts. |TLS v1.2|*login.live.com| |Microsoft Edge|||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#13-microsoft-edge)| From 5ae61cdbd9ab3c9f0d7726d6568d0dfbe73c2c8c Mon Sep 17 00:00:00 2001 From: "Trond B. Krokli" <38162891+illfated@users.noreply.github.com> Date: Wed, 23 Dec 2020 17:39:42 +0100 Subject: [PATCH 24/47] Defender for Endpoint: clarify Note blob contents From in issue ticket #8810 (**Confusing text**): > The Note about server licensing is confusing. some words are repeated and acronyms are not defined. Please review and edit this so that people that are not familiar with server licensing terminology can understand what is needed. The whole topic of Defender for Endpoint in regards to servers is very confusing and needs to be simplified. Changes proposed: - expand and clarify acronyms and initialisms in the details of the Note blob - convert the list within the sentence to a bullet point list for better overview - remove a duplicated word (Microsoft Defender Defender for Endpoint) Whitespace changes: - remove any blanks at end-of-line (redundant blanks) Closes #8810 --- .../microsoft-defender-atp/minimum-requirements.md | 13 +++++++++---- 1 file changed, 9 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements.md b/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements.md index 98cb4690dd..b1b97569c8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements.md +++ b/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements.md @@ -44,7 +44,7 @@ Microsoft Defender for Endpoint requires one of the following Microsoft Volume L > [!NOTE] > Eligible Licensed Users may use Microsoft Defender for Endpoint on up to five concurrent devices. -> Microsoft Defender for Endpoint is also available for purchase from a Cloud Solution Provider (CSP). +> Microsoft Defender for Endpoint is also available for purchase from a Cloud Solution Provider (CSP). Microsoft Defender for Endpoint, on Windows Server, requires one of the following licensing options: @@ -52,7 +52,12 @@ Microsoft Defender for Endpoint, on Windows Server, requires one of the followin - Defender for Endpoint for Servers (one per covered server) > [!NOTE] -> Customers with a combined minimum of 50 licenses for one or more of the following may acquire Server SLs for Microsoft Defender Defender for Endpoint for Servers (one per covered Server OSE): Microsoft Defender for Endpoint, Windows E5/A5, Microsoft 365 E5/A5 and Microsoft 365 E5 Security User SLs. This license applies to Defender for Endpoint for Linux. +> Customers may acquire Server Licenses (SLs) (one per covered server Operating System Environment (OSE)) for Microsoft Defender for Endpoint for Servers if they have a combined minimum of 50 licenses for one or more of the following User Licenses: +> +> * Microsoft Defender for Endpoint +> * Windows E5/A5 +> * Microsoft 365 E5/A5 +> * Microsoft 365 E5 Security For detailed licensing information, see the [Product Terms site](https://www.microsoft.com/licensing/terms/) and work with your account team to learn the detailed terms and conditions for the product. @@ -104,7 +109,7 @@ The hardware requirements for Defender for Endpoint on devices are the same for ### Other supported operating systems - Android -- Linux +- Linux - macOS > [!NOTE] @@ -186,7 +191,7 @@ The Defender for Endpoint agent depends on the ability of Microsoft Defender Ant Configure Security intelligence updates on the Defender for Endpoint devices whether Microsoft Defender Antivirus is the active antimalware or not. For more information, see [Manage Microsoft Defender Antivirus updates and apply baselines](../microsoft-defender-antivirus/manage-updates-baselines-microsoft-defender-antivirus.md). -When Microsoft Defender Antivirus is not the active antimalware in your organization and you use the Defender for Endpoint service, Microsoft Defender Antivirus goes on passive mode. +When Microsoft Defender Antivirus is not the active antimalware in your organization and you use the Defender for Endpoint service, Microsoft Defender Antivirus goes on passive mode. If your organization has turned off Microsoft Defender Antivirus through group policy or other methods, devices that are onboarded must be excluded from this group policy. From f4184b2962ddf6a3b26d7502b6f3c2cb32e2fd62 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Wed, 23 Dec 2020 10:07:07 -0800 Subject: [PATCH 25/47] Update minimum-requirements.md --- .../microsoft-defender-atp/minimum-requirements.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements.md b/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements.md index b1b97569c8..8605eac87e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements.md +++ b/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements.md @@ -34,7 +34,7 @@ There are some minimum requirements for onboarding devices to the service. Learn > - Defender for Endpoint demonstrated industry-leading optics and detection capabilities in the recent MITRE evaluation. Read: [Insights from the MITRE ATT&CK-based evaluation](https://cloudblogs.microsoft.com/microsoftsecure/2018/12/03/insights-from-the-mitre-attack-based-evaluation-of-windows-defender-atp/). ## Licensing requirements -Microsoft Defender for Endpoint requires one of the following Microsoft Volume Licensing offers: +Microsoft Defender for Endpoint requires one of the following Microsoft volume licensing offers: - Windows 10 Enterprise E5 - Windows 10 Education A5 @@ -43,7 +43,7 @@ Microsoft Defender for Endpoint requires one of the following Microsoft Volume L - Microsoft 365 A5 (M365 A5) > [!NOTE] -> Eligible Licensed Users may use Microsoft Defender for Endpoint on up to five concurrent devices. +> Eligible licensed users may use Microsoft Defender for Endpoint on up to five concurrent devices. > Microsoft Defender for Endpoint is also available for purchase from a Cloud Solution Provider (CSP). Microsoft Defender for Endpoint, on Windows Server, requires one of the following licensing options: @@ -52,14 +52,14 @@ Microsoft Defender for Endpoint, on Windows Server, requires one of the followin - Defender for Endpoint for Servers (one per covered server) > [!NOTE] -> Customers may acquire Server Licenses (SLs) (one per covered server Operating System Environment (OSE)) for Microsoft Defender for Endpoint for Servers if they have a combined minimum of 50 licenses for one or more of the following User Licenses: +> Customers may acquire server licenses (one per covered server Operating System Environment (OSE)) for Microsoft Defender for Endpoint for Servers if they have a combined minimum of 50 licenses for one or more of the following user licenses: > > * Microsoft Defender for Endpoint > * Windows E5/A5 > * Microsoft 365 E5/A5 > * Microsoft 365 E5 Security -For detailed licensing information, see the [Product Terms site](https://www.microsoft.com/licensing/terms/) and work with your account team to learn the detailed terms and conditions for the product. +For detailed licensing information, see the [Product Terms site](https://www.microsoft.com/licensing/terms/) and work with your account team to learn more about the terms and conditions. For more information on the array of features in Windows 10 editions, see [Compare Windows 10 editions](https://www.microsoft.com/windowsforbusiness/compare). From 5306624a905ca573aa1c69d42830d02957addb2b Mon Sep 17 00:00:00 2001 From: Sunny Zankharia <67922512+sazankha@users.noreply.github.com> Date: Wed, 23 Dec 2020 14:02:49 -0800 Subject: [PATCH 26/47] Update md-app-guard-browser-extension.md --- .../md-app-guard-browser-extension.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-application-guard/md-app-guard-browser-extension.md b/windows/security/threat-protection/microsoft-defender-application-guard/md-app-guard-browser-extension.md index d01a2ef115..a84686a871 100644 --- a/windows/security/threat-protection/microsoft-defender-application-guard/md-app-guard-browser-extension.md +++ b/windows/security/threat-protection/microsoft-defender-application-guard/md-app-guard-browser-extension.md @@ -48,7 +48,7 @@ Enterprise administrators running Application Guard under managed mode should fi From there, the steps for installing the extension are similar whether Application Guard is running in managed or standalone mode. 1. On the local device, download and install the Application Guard extension for Google [Chrome](https://chrome.google.com/webstore/detail/application-guard-extensi/mfjnknhkkiafjajicegabkbimfhplplj/) and/or Mozilla [Firefox](https://addons.mozilla.org/en-US/firefox/addon/application-guard-extension/). -1. Install the [Windows Defender Application Guard companion app](https://www.microsoft.com/p/windows-defender-application-guard-companion/9n8gnlc8z9c8#activetab=pivot:overviewtab) from the Microsoft Store. This companion app enables Application Guard to work with web browsers other than Microsoft Edge or Internet Explorer. +1. Install the [Microsoft Defender Application Guard companion app](https://www.microsoft.com/p/windows-defender-application-guard-companion/9n8gnlc8z9c8#activetab=pivot:overviewtab) from the Microsoft Store. This companion app enables Application Guard to work with web browsers other than Microsoft Edge or Internet Explorer. 1. Restart the device. ### Recommended browser group policies From 721b655ac4e0e827638ff464542c5d48992e01f4 Mon Sep 17 00:00:00 2001 From: adirdidi <68847945+adirdidi@users.noreply.github.com> Date: Thu, 24 Dec 2020 02:38:21 +0200 Subject: [PATCH 27/47] API pages update 1. Add a few missing Gov/performance references. 2. Align "applies to" + "trial" section at the top of the pages. --- .../microsoft-defender-atp/add-or-remove-machine-tags.md | 2 +- .../threat-protection/microsoft-defender-atp/alerts.md | 4 ++-- .../microsoft-defender-atp/api-microsoft-flow.md | 2 +- .../microsoft-defender-atp/api-power-bi.md | 2 +- .../microsoft-defender-atp/apis-intro.md | 5 ++--- .../collect-investigation-package.md | 2 +- .../microsoft-defender-atp/create-alert-by-reference.md | 2 +- .../microsoft-defender-atp/delete-ti-indicator-by-id.md | 2 +- .../exposed-apis-full-sample-powershell.md | 5 +++-- .../microsoft-defender-atp/exposed-apis-odata-samples.md | 4 ++-- .../microsoft-defender-atp/find-machine-info-by-ip.md | 8 ++++++-- .../get-alert-related-files-info.md | 2 +- .../microsoft-defender-atp/get-all-recommendations.md | 5 +++-- .../get-all-vulnerabilities-by-machines.md | 2 ++ .../microsoft-defender-atp/get-all-vulnerabilities.md | 5 +++-- .../microsoft-defender-atp/get-cvekbmap-collection.md | 8 ++++++-- .../microsoft-defender-atp/get-device-secure-score.md | 3 --- .../get-discovered-vulnerabilities.md | 5 +++-- .../microsoft-defender-atp/get-domain-related-machines.md | 2 +- .../microsoft-defender-atp/get-installed-software.md | 5 +++-- .../microsoft-defender-atp/get-ip-related-alerts.md | 2 +- .../microsoft-defender-atp/get-ip-statistics.md | 2 +- .../microsoft-defender-atp/get-kbinfo-collection.md | 8 ++++++-- .../microsoft-defender-atp/get-machine-by-id.md | 2 +- .../get-machine-group-exposure-score.md | 2 +- .../microsoft-defender-atp/get-machine-related-alerts.md | 2 +- .../microsoft-defender-atp/get-machineaction-object.md | 2 +- .../get-machineactions-collection.md | 2 +- .../get-machinegroups-collection.md | 5 +++-- .../microsoft-defender-atp/get-machines-by-software.md | 4 ++-- .../get-machines-by-vulnerability.md | 4 ++-- .../microsoft-defender-atp/get-machines.md | 2 +- .../get-machinesecuritystates-collection.md | 8 ++++++-- .../microsoft-defender-atp/get-missing-kbs-software.md | 2 +- .../microsoft-defender-atp/get-package-sas-uri.md | 2 +- .../microsoft-defender-atp/get-recommendation-by-id.md | 5 +++-- .../microsoft-defender-atp/get-recommendation-machines.md | 5 +++-- .../microsoft-defender-atp/get-recommendation-software.md | 5 +++-- .../get-recommendation-vulnerabilities.md | 5 +++-- .../get-security-recommendations.md | 4 ++-- .../microsoft-defender-atp/get-software-by-id.md | 4 ++-- .../get-software-ver-distribution.md | 4 ++-- .../microsoft-defender-atp/get-software.md | 2 +- .../microsoft-defender-atp/get-user-information.md | 5 +++-- .../microsoft-defender-atp/get-user-related-alerts.md | 2 +- .../microsoft-defender-atp/get-user-related-machines.md | 2 +- .../microsoft-defender-atp/get-vuln-by-software.md | 4 ++-- .../microsoft-defender-atp/get-vulnerability-by-id.md | 5 +++-- .../initiate-autoir-investigation.md | 2 +- .../microsoft-defender-atp/investigation.md | 2 +- .../microsoft-defender-atp/isolate-machine.md | 2 +- .../microsoft-defender-atp/offboard-machine-api.md | 2 +- .../microsoft-defender-atp/onboarding-notification.md | 5 +++-- .../microsoft-defender-atp/post-ti-indicator.md | 4 ++-- .../microsoft-defender-atp/pull-alerts-using-rest-api.md | 7 ++----- .../microsoft-defender-atp/recommendation.md | 2 +- .../microsoft-defender-atp/restrict-code-execution.md | 2 +- .../microsoft-defender-atp/run-advanced-query-api.md | 2 +- .../run-advanced-query-sample-powershell.md | 5 +++-- .../run-advanced-query-sample-python.md | 4 ++-- .../microsoft-defender-atp/run-av-scan.md | 2 +- .../troubleshoot-onboarding-error-messages.md | 4 ++-- 62 files changed, 123 insertions(+), 98 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md b/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md index bfed28074d..2cb1370de1 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md +++ b/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md @@ -23,7 +23,7 @@ ms.topic: article **Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/alerts.md b/windows/security/threat-protection/microsoft-defender-atp/alerts.md index d7949c4065..0668c313a5 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/alerts.md @@ -21,9 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** [Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md b/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md index 95525bbf97..44003ec0b9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md @@ -24,7 +24,7 @@ ms.topic: article **Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) Automating security procedures is a standard requirement for every modern Security Operations Center. The lack of professional cyber defenders forces SOC to work in the most efficient way and automation is a must. Microsoft Power Automate supports different connectors that were built exactly for that. You can build an end-to-end procedure automation within a few minutes. diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-power-bi.md b/windows/security/threat-protection/microsoft-defender-atp/api-power-bi.md index 32dda775a4..57369b9d50 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-power-bi.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-power-bi.md @@ -24,7 +24,7 @@ ms.topic: article **Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/apis-intro.md b/windows/security/threat-protection/microsoft-defender-atp/apis-intro.md index c105db89bb..ba3e749a61 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/apis-intro.md +++ b/windows/security/threat-protection/microsoft-defender-atp/apis-intro.md @@ -22,10 +22,9 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** -- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) Defender for Endpoint exposes much of its data and actions through a set of programmatic APIs. Those APIs will enable you to automate workflows and innovate based on Defender for Endpoint capabilities. The API access requires OAuth2.0 authentication. For more information, see [OAuth 2.0 Authorization Code Flow](https://docs.microsoft.com/azure/active-directory/develop/active-directory-v2-protocols-oauth-code). diff --git a/windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package.md b/windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package.md index 20536ad64b..b3cb7a04fa 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package.md +++ b/windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package.md @@ -24,7 +24,7 @@ ms.topic: article **Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference.md b/windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference.md index 05729852d3..eefccc5624 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference.md +++ b/windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference.md @@ -23,7 +23,7 @@ ms.topic: article **Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id.md b/windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id.md index b3c2960440..dfde8bf37e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id.md +++ b/windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id.md @@ -23,7 +23,7 @@ ms.topic: article **Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-full-sample-powershell.md b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-full-sample-powershell.md index 676e6a5185..8100c26890 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-full-sample-powershell.md +++ b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-full-sample-powershell.md @@ -22,8 +22,9 @@ ms.date: 09/24/2018 [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** -- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) + +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-odata-samples.md b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-odata-samples.md index 9c0ee43caf..8cea855481 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-odata-samples.md +++ b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-odata-samples.md @@ -22,9 +22,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** +**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/find-machine-info-by-ip.md b/windows/security/threat-protection/microsoft-defender-atp/find-machine-info-by-ip.md index 0d640fa36f..b94742b61d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/find-machine-info-by-ip.md +++ b/windows/security/threat-protection/microsoft-defender-atp/find-machine-info-by-ip.md @@ -21,9 +21,13 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** +**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) + +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] Find a device by internal IP. diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-files-info.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-files-info.md index 95743e8fdc..f95776b987 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-files-info.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-files-info.md @@ -21,7 +21,7 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** [Microsoft Defender for Endpoint ](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-all-recommendations.md b/windows/security/threat-protection/microsoft-defender-atp/get-all-recommendations.md index b0b573c0e7..a076a373b1 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-all-recommendations.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-all-recommendations.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** -- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) + +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-all-vulnerabilities-by-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-all-vulnerabilities-by-machines.md index 843f4cca7c..8839180405 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-all-vulnerabilities-by-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-all-vulnerabilities-by-machines.md @@ -23,6 +23,8 @@ ms.topic: article **Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) + [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] [!include[Improve request performance](../../includes/improve-request-performance.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-all-vulnerabilities.md b/windows/security/threat-protection/microsoft-defender-atp/get-all-vulnerabilities.md index 138a8399ab..d899f7c360 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-all-vulnerabilities.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-all-vulnerabilities.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** -- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) + +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-cvekbmap-collection.md b/windows/security/threat-protection/microsoft-defender-atp/get-cvekbmap-collection.md index 7a5a5aacb3..fb60d09e95 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-cvekbmap-collection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-cvekbmap-collection.md @@ -23,9 +23,13 @@ ROBOTS: NOINDEX [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** +**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) + +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] Retrieves a map of CVE's to KB's and CVE details. diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-device-secure-score.md b/windows/security/threat-protection/microsoft-defender-atp/get-device-secure-score.md index bf5679b787..920e2fab04 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-device-secure-score.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-device-secure-score.md @@ -23,9 +23,6 @@ ms.topic: article **Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) ->[!NOTE] ->If you are a US Gov customer, please refer to API endpoints listed in [here](gov.md#api). - - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-discovered-vulnerabilities.md b/windows/security/threat-protection/microsoft-defender-atp/get-discovered-vulnerabilities.md index 9bf4ba7a3d..14425d3b01 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-discovered-vulnerabilities.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-discovered-vulnerabilities.md @@ -21,8 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** -- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) + +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines.md index 588bbbb442..8c70e05df5 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines.md @@ -21,7 +21,7 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** [Microsoft Defender for Endpoint(https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-installed-software.md b/windows/security/threat-protection/microsoft-defender-atp/get-installed-software.md index f686ea7ed2..09233fa7ab 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-installed-software.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-installed-software.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** -- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) + +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts.md index 184d6eb709..b18a482d19 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts.md @@ -23,7 +23,7 @@ ms.topic: article **Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-ip-statistics.md b/windows/security/threat-protection/microsoft-defender-atp/get-ip-statistics.md index 839b32dbf4..7492cfa46e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-ip-statistics.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-ip-statistics.md @@ -23,7 +23,7 @@ ms.topic: article **Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-kbinfo-collection.md b/windows/security/threat-protection/microsoft-defender-atp/get-kbinfo-collection.md index e7ac39a93c..b3e1d5574a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-kbinfo-collection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-kbinfo-collection.md @@ -23,9 +23,13 @@ ROBOTS: NOINDEX [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** +**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) + +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] Retrieves a collection of KB's and KB details. diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id.md b/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id.md index 331dca7bc1..f46e912d8c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id.md @@ -23,7 +23,7 @@ ms.topic: article **Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machine-group-exposure-score.md b/windows/security/threat-protection/microsoft-defender-atp/get-machine-group-exposure-score.md index 437599c09a..e13a900af5 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machine-group-exposure-score.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machine-group-exposure-score.md @@ -23,7 +23,7 @@ ms.topic: article **Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts.md index 73d13b3564..86de75298d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts.md @@ -23,7 +23,7 @@ ms.topic: article **Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machineaction-object.md b/windows/security/threat-protection/microsoft-defender-atp/get-machineaction-object.md index cca2d17971..da012c1b41 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machineaction-object.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machineaction-object.md @@ -23,7 +23,7 @@ ms.topic: article **Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machineactions-collection.md b/windows/security/threat-protection/microsoft-defender-atp/get-machineactions-collection.md index 4828b5ec67..ec9d161528 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machineactions-collection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machineactions-collection.md @@ -23,7 +23,7 @@ ms.topic: article **Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machinegroups-collection.md b/windows/security/threat-protection/microsoft-defender-atp/get-machinegroups-collection.md index f4c7216ceb..925103b0d1 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machinegroups-collection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machinegroups-collection.md @@ -23,8 +23,9 @@ ms.date: 10/07/2018 [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** -- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) + +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machines-by-software.md b/windows/security/threat-protection/microsoft-defender-atp/get-machines-by-software.md index 042f48719b..8cb9e3c2d3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machines-by-software.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machines-by-software.md @@ -21,9 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** +**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machines-by-vulnerability.md b/windows/security/threat-protection/microsoft-defender-atp/get-machines-by-vulnerability.md index eb8b9da158..bc0c969c79 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machines-by-vulnerability.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machines-by-vulnerability.md @@ -20,9 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** +**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-machines.md index 725fa8e4b2..6c89d74e65 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machines.md @@ -23,7 +23,7 @@ ms.topic: article **Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machinesecuritystates-collection.md b/windows/security/threat-protection/microsoft-defender-atp/get-machinesecuritystates-collection.md index aba82de482..4f1d4fedec 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machinesecuritystates-collection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machinesecuritystates-collection.md @@ -22,9 +22,13 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** +**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) + +[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] + +[!include[Improve request performance](../../includes/improve-request-performance.md)] Retrieves a collection of devices security states. diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-missing-kbs-software.md b/windows/security/threat-protection/microsoft-defender-atp/get-missing-kbs-software.md index b9b44afb2d..a74bad1490 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-missing-kbs-software.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-missing-kbs-software.md @@ -23,7 +23,7 @@ ms.topic: article **Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-package-sas-uri.md b/windows/security/threat-protection/microsoft-defender-atp/get-package-sas-uri.md index 17ac22ae88..332e875e6e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-package-sas-uri.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-package-sas-uri.md @@ -23,7 +23,7 @@ ms.topic: article **Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-by-id.md b/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-by-id.md index 857d3458e0..3666ef7955 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-by-id.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-by-id.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** -- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) + +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-machines.md index 9322ad8635..dfec0fb89f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-machines.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** -- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) + +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-software.md b/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-software.md index d0c62de5ce..c0adaddae0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-software.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-software.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** -- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) + +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-vulnerabilities.md b/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-vulnerabilities.md index 07d26afe6f..9c06a2df8f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-vulnerabilities.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-vulnerabilities.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** -- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) + +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-security-recommendations.md b/windows/security/threat-protection/microsoft-defender-atp/get-security-recommendations.md index a6e9564b8b..1cf2a7793b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-security-recommendations.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-security-recommendations.md @@ -20,9 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** +**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-software-by-id.md b/windows/security/threat-protection/microsoft-defender-atp/get-software-by-id.md index e5246656fb..8c13f1d5da 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-software-by-id.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-software-by-id.md @@ -21,9 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** +**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-software-ver-distribution.md b/windows/security/threat-protection/microsoft-defender-atp/get-software-ver-distribution.md index 68faccd755..2bb098203c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-software-ver-distribution.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-software-ver-distribution.md @@ -21,9 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** +**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-software.md b/windows/security/threat-protection/microsoft-defender-atp/get-software.md index e6eba350a0..7629b66bff 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-software.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-software.md @@ -23,7 +23,7 @@ ms.topic: article **Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-user-information.md b/windows/security/threat-protection/microsoft-defender-atp/get-user-information.md index 184e70576e..d9af8b76ce 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-user-information.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-user-information.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** -- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) + +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-user-related-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/get-user-related-alerts.md index 3126731b11..d16cd4cfee 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-user-related-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-user-related-alerts.md @@ -23,7 +23,7 @@ ms.topic: article **Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines.md index 8956cf7608..88a70fd056 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines.md @@ -23,7 +23,7 @@ ms.topic: article **Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-vuln-by-software.md b/windows/security/threat-protection/microsoft-defender-atp/get-vuln-by-software.md index 281e8cdb0b..abb77af560 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-vuln-by-software.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-vuln-by-software.md @@ -21,9 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** +**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-vulnerability-by-id.md b/windows/security/threat-protection/microsoft-defender-atp/get-vulnerability-by-id.md index 5fb7863435..df3bc5a56f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-vulnerability-by-id.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-vulnerability-by-id.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** -- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) + +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation.md b/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation.md index 84ab44bf10..90bd7b9256 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation.md @@ -23,7 +23,7 @@ ms.topic: article **Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigation.md b/windows/security/threat-protection/microsoft-defender-atp/investigation.md index 98d5f63bef..d5a2cf97cf 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigation.md @@ -25,7 +25,7 @@ ms.topic: article **Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/isolate-machine.md b/windows/security/threat-protection/microsoft-defender-atp/isolate-machine.md index e52dcfca9e..7d5d12f3e4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/isolate-machine.md +++ b/windows/security/threat-protection/microsoft-defender-atp/isolate-machine.md @@ -23,7 +23,7 @@ ms.topic: article **Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/offboard-machine-api.md b/windows/security/threat-protection/microsoft-defender-atp/offboard-machine-api.md index 9dddb35e92..b87d77da37 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/offboard-machine-api.md +++ b/windows/security/threat-protection/microsoft-defender-atp/offboard-machine-api.md @@ -23,7 +23,7 @@ ms.topic: article **Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/onboarding-notification.md b/windows/security/threat-protection/microsoft-defender-atp/onboarding-notification.md index f405b1996b..452f25222e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/onboarding-notification.md +++ b/windows/security/threat-protection/microsoft-defender-atp/onboarding-notification.md @@ -22,8 +22,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** -- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) + +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/post-ti-indicator.md b/windows/security/threat-protection/microsoft-defender-atp/post-ti-indicator.md index e5fe251155..ac9c3929ea 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/post-ti-indicator.md +++ b/windows/security/threat-protection/microsoft-defender-atp/post-ti-indicator.md @@ -21,9 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** [Microsoft Defender for Endpoint]https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api.md b/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api.md index bd9ab75684..9587df251a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api.md +++ b/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api.md @@ -22,12 +22,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** -- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - - ->Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-pullalerts-abovefoldlink) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) >[!Note] >- [Microsoft Defender for Endpoint Alert](alerts.md) is composed from one or more detections. diff --git a/windows/security/threat-protection/microsoft-defender-atp/recommendation.md b/windows/security/threat-protection/microsoft-defender-atp/recommendation.md index d53ac74ba4..6a3c3ce05d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/recommendation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/recommendation.md @@ -23,7 +23,7 @@ ms.topic: article **Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/restrict-code-execution.md b/windows/security/threat-protection/microsoft-defender-atp/restrict-code-execution.md index 9a05137743..3c91b9c04c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/restrict-code-execution.md +++ b/windows/security/threat-protection/microsoft-defender-atp/restrict-code-execution.md @@ -23,7 +23,7 @@ ms.topic: article **Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-api.md b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-api.md index 6eca5df06d..50b5f9255d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-api.md +++ b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-api.md @@ -24,7 +24,7 @@ ms.topic: article **Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-powershell.md b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-powershell.md index c22b6113f1..247f300dac 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-powershell.md +++ b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-powershell.md @@ -21,8 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** -- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) + +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-python.md b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-python.md index b09ec393cd..7cda7c8cd9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-python.md +++ b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-python.md @@ -22,9 +22,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** +**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/run-av-scan.md b/windows/security/threat-protection/microsoft-defender-atp/run-av-scan.md index e1e4afef67..f2d979889c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/run-av-scan.md +++ b/windows/security/threat-protection/microsoft-defender-atp/run-av-scan.md @@ -23,7 +23,7 @@ ms.topic: article **Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages.md index a6af2f344d..1ecd70b09d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages.md +++ b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages.md @@ -22,9 +22,9 @@ ms.topic: troubleshooting [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** +**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) >Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-troublshootonboarding-abovefoldlink) From 07fe23266baa7d1a1fc0eb4c8e663b0846e2201e Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Sat, 26 Dec 2020 20:41:57 +0500 Subject: [PATCH 28/47] Update deployment-vdi-microsoft-defender-antivirus.md --- .../deployment-vdi-microsoft-defender-antivirus.md | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/deployment-vdi-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/deployment-vdi-microsoft-defender-antivirus.md index a7990f4bca..5185a99f15 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/deployment-vdi-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/deployment-vdi-microsoft-defender-antivirus.md @@ -84,11 +84,10 @@ See the [Download and unpackage](#download-and-unpackage-the-latest-updates) sec Now you can get started on downloading and installing new updates. We’ve created a sample PowerShell script for you below. This script is the easiest way to download new updates and get them ready for your VMs. You should then set the script to run at a certain time on the management machine by using a scheduled task (or, if you’re familiar with using PowerShell scripts in Azure, Intune, or SCCM, you could also use those scripts). ```PowerShell -$vdmpathbase = 'c:\wdav-update\{00000000-0000-0000-0000-' +$vdmpathbase = "$env:systemdrive\wdav-update\{00000000-0000-0000-0000-" $vdmpathtime = Get-Date -format "yMMddHHmmss" $vdmpath = $vdmpathbase + $vdmpathtime + '}' $vdmpackage = $vdmpath + '\mpam-fe.exe' -$args = @("/x") New-Item -ItemType Directory -Force -Path $vdmpath | Out-Null From 6d4fd807f25c240c109a7f5e7391b8aa773b0f65 Mon Sep 17 00:00:00 2001 From: VLG17 <41186174+VLG17@users.noreply.github.com> Date: Sun, 27 Dec 2020 20:32:52 +0200 Subject: [PATCH 29/47] add note about AMD processors https://github.com/MicrosoftDocs/windows-itpro-docs/issues/8514 --- .../system-guard-secure-launch-and-smm-protection.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/windows/security/threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md b/windows/security/threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md index c141b00025..4a2dd888c5 100644 --- a/windows/security/threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md +++ b/windows/security/threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md @@ -91,3 +91,6 @@ To verify that Secure Launch is running, use System Information (MSInfo32). Clic |Modern/Connected Standby|Platforms must support Modern/Connected Standby.| |Platform firmware|Platform firmware must carry all code required to perform a launch.| |Platform firmware update|System firmware is recommended to be updated via UpdateCapsule in Windows Update. | + +> [!NOTE] +> For more details around AMD processors please check this [link](https://www.microsoft.com/security/blog/2020/09/01/force-firmware-code-to-be-measured-and-attested-by-secure-launch-on-windows-10/) From 80cc1c7b1961acbe3ca1739146ab665313efb64a Mon Sep 17 00:00:00 2001 From: VLG17 <41186174+VLG17@users.noreply.github.com> Date: Sun, 27 Dec 2020 20:39:02 +0200 Subject: [PATCH 30/47] update event ID https://github.com/MicrosoftDocs/windows-itpro-docs/issues/8434 --- ...onfigure-network-connections-microsoft-defender-antivirus.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/configure-network-connections-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/configure-network-connections-microsoft-defender-antivirus.md index 1be93dc8a6..8ac5917a9e 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/configure-network-connections-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/configure-network-connections-microsoft-defender-antivirus.md @@ -113,7 +113,7 @@ You will also see a detection under **Quarantined threats** in the **Scan histor > [!NOTE] > Versions of Windows 10 before version 1703 have a different user interface. See [Microsoft Defender Antivirus in the Windows Security app](microsoft-defender-security-center-antivirus.md). - The Windows event log will also show [Windows Defender client event ID 2050](troubleshoot-microsoft-defender-antivirus.md). + The Windows event log will also show [Windows Defender client event ID 1116](troubleshoot-microsoft-defender-antivirus.md). ## Related articles From af853a81d073ea57376075e3390c6ce489d3bb11 Mon Sep 17 00:00:00 2001 From: VLG17 <41186174+VLG17@users.noreply.github.com> Date: Sun, 27 Dec 2020 21:09:59 +0200 Subject: [PATCH 31/47] Update windows/security/threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md Co-authored-by: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- .../system-guard-secure-launch-and-smm-protection.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md b/windows/security/threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md index 4a2dd888c5..93a31b46c4 100644 --- a/windows/security/threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md +++ b/windows/security/threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md @@ -93,4 +93,4 @@ To verify that Secure Launch is running, use System Information (MSInfo32). Clic |Platform firmware update|System firmware is recommended to be updated via UpdateCapsule in Windows Update. | > [!NOTE] -> For more details around AMD processors please check this [link](https://www.microsoft.com/security/blog/2020/09/01/force-firmware-code-to-be-measured-and-attested-by-secure-launch-on-windows-10/) +> For more details around AMD processors, please read this Microsoft Security blog post: [Force firmware code to be measured and attested by Secure Launch on Windows 10](https://www.microsoft.com/security/blog/2020/09/01/force-firmware-code-to-be-measured-and-attested-by-secure-launch-on-windows-10/). From a187d96a823d9e277d0211cdb4d49b58eaa7cd32 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Robin=20M=C3=BCller?= Date: Sun, 27 Dec 2020 21:04:32 +0100 Subject: [PATCH 32/47] Link fix in how-to-enable-network-unlock Fixed wrong HTML tag in heading 'Confirm the WDS Service is running' --- .../bitlocker/bitlocker-how-to-enable-network-unlock.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md b/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md index 5c7b1190b1..2061c1421c 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md +++ b/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md @@ -95,7 +95,7 @@ The server side configuration to enable Network Unlock also requires provisionin The following steps allow an administrator to configure Network Unlock in a domain where the Domain Functional Level is at least Windows Server 2012. -### Install the WDS Server role +### Install the WDS Server role The BitLocker Network Unlock feature will install the WDS role if it is not already installed. If you want to install it separately before you install BitLocker Network Unlock you can use Server Manager or Windows PowerShell. To install the role using Server Manager, select the **Windows Deployment Services** role in Server Manager. From 63d9212da87971d2e66dce379a4151ddd8dc4e00 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 28 Dec 2020 07:03:36 -0800 Subject: [PATCH 33/47] Update configure-network-connections-microsoft-defender-antivirus.md --- ...onfigure-network-connections-microsoft-defender-antivirus.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/configure-network-connections-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/configure-network-connections-microsoft-defender-antivirus.md index 8ac5917a9e..1485e83d0a 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/configure-network-connections-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/configure-network-connections-microsoft-defender-antivirus.md @@ -11,7 +11,7 @@ ms.localizationpriority: medium author: denisebmsft ms.author: deniseb ms.custom: nextgen -ms.date: 11/18/2020 +ms.date: 12/28/2020 ms.reviewer: manager: dansimp --- From 9fa5711599c1e1a2b787d1083292b2a3c0a6c5d7 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 28 Dec 2020 07:05:24 -0800 Subject: [PATCH 34/47] Update system-guard-secure-launch-and-smm-protection.md --- .../system-guard-secure-launch-and-smm-protection.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md b/windows/security/threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md index 93a31b46c4..f38f5ce14a 100644 --- a/windows/security/threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md +++ b/windows/security/threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md @@ -93,4 +93,4 @@ To verify that Secure Launch is running, use System Information (MSInfo32). Clic |Platform firmware update|System firmware is recommended to be updated via UpdateCapsule in Windows Update. | > [!NOTE] -> For more details around AMD processors, please read this Microsoft Security blog post: [Force firmware code to be measured and attested by Secure Launch on Windows 10](https://www.microsoft.com/security/blog/2020/09/01/force-firmware-code-to-be-measured-and-attested-by-secure-launch-on-windows-10/). +> For more details around AMD processors, see [Microsoft Security Blog: Force firmware code to be measured and attested by Secure Launch on Windows 10](https://www.microsoft.com/security/blog/2020/09/01/force-firmware-code-to-be-measured-and-attested-by-secure-launch-on-windows-10/). From 3182310f60802a00faace4c6f0eabd1843f64cca Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 28 Dec 2020 07:05:52 -0800 Subject: [PATCH 35/47] Update system-guard-secure-launch-and-smm-protection.md --- .../system-guard-secure-launch-and-smm-protection.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md b/windows/security/threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md index f38f5ce14a..5dd9dc063d 100644 --- a/windows/security/threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md +++ b/windows/security/threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md @@ -8,7 +8,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: dansimp -ms.date: 03/01/2019 +ms.date: 12/28/2020 ms.reviewer: manager: dansimp ms.author: dansimp From 8c3919fa63f11da3317d7f67fe0161423c106c5e Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 28 Dec 2020 07:10:36 -0800 Subject: [PATCH 36/47] Update deployment-vdi-microsoft-defender-antivirus.md --- .../deployment-vdi-microsoft-defender-antivirus.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/deployment-vdi-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/deployment-vdi-microsoft-defender-antivirus.md index 5185a99f15..172fb7952f 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/deployment-vdi-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/deployment-vdi-microsoft-defender-antivirus.md @@ -10,7 +10,7 @@ ms.localizationpriority: medium author: denisebmsft ms.author: deniseb ms.custom: nextgen -ms.date: 11/18/2020 +ms.date: 12/28/2020 ms.reviewer: jesquive manager: dansimp --- From 5d37dd768df520be49b21cbda6e5b6fc96440c7b Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 28 Dec 2020 15:11:38 -0800 Subject: [PATCH 37/47] Update microsoft-defender-antivirus-in-windows-10.md --- .../microsoft-defender-antivirus-in-windows-10.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-in-windows-10.md b/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-in-windows-10.md index 23c85194d0..fb9db59528 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-in-windows-10.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-in-windows-10.md @@ -7,7 +7,7 @@ ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security -ms.localizationpriority: medium +ms.localizationpriority: high author: denisebmsft ms.author: deniseb ms.date: 12/16/2020 From dd629682cb02b9c12f59233f7171ec2aa4f38ec5 Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Mon, 28 Dec 2020 15:18:25 -0800 Subject: [PATCH 38/47] Replaced blind link with targeted title --- windows/security/includes/microsoft-defender-api-usgov.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/includes/microsoft-defender-api-usgov.md b/windows/security/includes/microsoft-defender-api-usgov.md index ff93c71ecd..4fe2a734da 100644 --- a/windows/security/includes/microsoft-defender-api-usgov.md +++ b/windows/security/includes/microsoft-defender-api-usgov.md @@ -17,4 +17,4 @@ ms.topic: article --- >[!NOTE] ->If you are a US Government customer, please use the URIs listed in [here](../threat-protection/microsoft-defender-atp/gov.md#api). +>If you are a US Government customer, please use the URIs listed in [Microsoft Defender for Endpoint for US Government GCC High customers](../threat-protection/microsoft-defender-atp/gov.md#api). From 46936a5bb14a9499dddfb866ba7ead8c268fbcfa Mon Sep 17 00:00:00 2001 From: Joe Skeen Date: Tue, 29 Dec 2020 09:14:30 -0700 Subject: [PATCH 39/47] Update bitlocker-how-to-enable-network-unlock.md fix wording --- .../bitlocker/bitlocker-how-to-enable-network-unlock.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md b/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md index 2061c1421c..1284208f66 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md +++ b/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md @@ -26,7 +26,7 @@ ms.custom: bitlocker This topic for the IT professional describes how BitLocker Network Unlock works and how to configure it. Network Unlock was introduced in Windows 8 and Windows Server 2012 as a BitLocker protector option for operating system volumes. Network Unlock enables easier management for BitLocker enabled desktops and servers in a domain environment by providing automatic unlock of operating system volumes at system reboot when connected to a wired corporate network. This feature requires the client hardware to have a DHCP driver implemented in its UEFI firmware. -Without Network Unlock, operating system volumes protected by TPM+PIN protectors require a PIN to be entered when a computer reboots or resumes from hibernation (for example, by Wake on LAN). This can make it difficult to enterprises to roll out software patches to unattended desktops and remotely administered servers. +Without Network Unlock, operating system volumes protected by TPM+PIN protectors require a PIN to be entered when a computer reboots or resumes from hibernation (for example, by Wake on LAN). This can make it difficult for enterprises to roll out software patches to unattended desktops and remotely administered servers. Network Unlock allows BitLocker-enabled systems with TPM+PIN and that meet the hardware requirements to boot into Windows without user intervention. Network Unlock works in a similar fashion to the TPM+StartupKey at boot. Rather than needing to read the StartupKey from USB media, however, the key for Network Unlock is composed from a key stored in the TPM and an encrypted network key that is sent to the server, decrypted and returned to the client in a secure session. From 3aad2708061405158296540b1deb349fac267b50 Mon Sep 17 00:00:00 2001 From: Jeff Borsecnik <36546697+jborsecnik@users.noreply.github.com> Date: Tue, 29 Dec 2020 08:59:31 -0800 Subject: [PATCH 40/47] Update hello-feature-pin-reset.md fix typo "Enpoint" --- .../hello-for-business/hello-feature-pin-reset.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-feature-pin-reset.md b/windows/security/identity-protection/hello-for-business/hello-feature-pin-reset.md index 93b01bb01b..b1fda98d52 100644 --- a/windows/security/identity-protection/hello-for-business/hello-feature-pin-reset.md +++ b/windows/security/identity-protection/hello-for-business/hello-feature-pin-reset.md @@ -65,7 +65,7 @@ You configure Windows 10 to use the Microsoft PIN Reset service using the comput #### Create a PIN Reset Device configuration profile using Microsoft Intune -1. Sign-in to [Enpoint Manager admin center](https://endpoint.microsoft.com/) using a Global administrator account. +1. Sign-in to [Endpoint Manager admin center](https://endpoint.microsoft.com/) using a Global administrator account. 2. Click **Endpoint Security** > **Account Protection** > **Properties**. 3. Set **Enable PIN recovery** to **Yes**. From 0bedf58ded5e6baf79572605cc8f4d564a10dc2d Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Tue, 29 Dec 2020 11:17:56 -0800 Subject: [PATCH 41/47] Added Power policies --- windows/client-management/mdm/TOC.md | 1 + .../mdm/policies-in-policy-csp-admx-backed.md | 25 ++++++ .../policy-configuration-service-provider.md | 80 +++++++++++++++++++ 3 files changed, 106 insertions(+) diff --git a/windows/client-management/mdm/TOC.md b/windows/client-management/mdm/TOC.md index 3b37a6caf1..3675333e76 100644 --- a/windows/client-management/mdm/TOC.md +++ b/windows/client-management/mdm/TOC.md @@ -231,6 +231,7 @@ #### [ADMX_OfflineFiles](policy-csp-admx-offlinefiles.md) #### [ADMX_PeerToPeerCaching](policy-csp-admx-peertopeercaching.md) #### [ADMX_PerformanceDiagnostics](policy-csp-admx-performancediagnostics.md) +#### [ADMX_Power](policy-csp-admx-power.md) #### [ADMX_PowerShellExecutionPolicy](policy-csp-admx-powershellexecutionpolicy.md) #### [ADMX_Printing](policy-csp-admx-printing.md) #### [ADMX_Printing2](policy-csp-admx-printing2.md) diff --git a/windows/client-management/mdm/policies-in-policy-csp-admx-backed.md b/windows/client-management/mdm/policies-in-policy-csp-admx-backed.md index 552222926f..c6e37891f5 100644 --- a/windows/client-management/mdm/policies-in-policy-csp-admx-backed.md +++ b/windows/client-management/mdm/policies-in-policy-csp-admx-backed.md @@ -789,6 +789,31 @@ ms.date: 10/08/2020 - [ADMX_PerformanceDiagnostics/WdiScenarioExecutionPolicy_2](./policy-csp-admx-performancediagnostics.md#admx-performancediagnostics-wdiscenarioexecutionpolicy-2) - [ADMX_PerformanceDiagnostics/WdiScenarioExecutionPolicy_3](./policy-csp-admx-performancediagnostics.md#admx-performancediagnostics-wdiscenarioexecutionpolicy-3) - [ADMX_PerformanceDiagnostics/WdiScenarioExecutionPolicy_4](./policy-csp-admx-performancediagnostics.md#admx-performancediagnostics-wdiscenarioexecutionpolicy-4) +- [ADMX_Power/ACConnectivityInStandby_2](./policy-csp-admx-power.md#admx-power-acconnectivityinstandby-2) +- [ADMX_Power/ACCriticalSleepTransitionsDisable_2](./policy-csp-admx-power.md#admx-power-accriticalsleeptransitionsdisable-2) +- [ADMX_Power/ACStartMenuButtonAction_2](./policy-csp-admx-power.md#admx-power-acstartmenubuttonaction-2) +- [ADMX_Power/AllowSystemPowerRequestAC](./policy-csp-admx-power.md#admx-power-allowsystempowerrequestac) +- [ADMX_Power/AllowSystemPowerRequestDC](./policy-csp-admx-power.md#admx-power-allowsystempowerrequestdc) +- [ADMX_Power/AllowSystemSleepWithRemoteFilesOpenAC](./policy-csp-admx-power.md#admx-power-allowsystemsleepwithremotefilesopenac) +- [ADMX_Power/AllowSystemSleepWithRemoteFilesOpenDC](./policy-csp-admx-power.md#admx-power-allowsystemsleepwithremotefilesopendc) +- [ADMX_Power/CustomActiveSchemeOverride_2](./policy-csp-admx-power.md#admx-power-customactiveschemeoverride-2) +- [ADMX_Power/DCBatteryDischargeAction0_2](./policy-csp-admx-power.md#admx-power-dcbatterydischargeaction0-2) +- [ADMX_Power/DCBatteryDischargeAction1_2](./policy-csp-admx-power.md#admx-power-dcbatterydischargeaction1-2) +- [ADMX_Power/DCBatteryDischargeLevel0_2](./policy-csp-admx-power.md#admx-power-dcbatterydischargelevel0-2) +- [ADMX_Power/DCBatteryDischargeLevel1UINotification_2](./policy-csp-admx-power.md#admx-power-dcbatterydischargelevel1uinotification-2) +- [ADMX_Power/DCBatteryDischargeLevel1_2](./policy-csp-admx-power.md#admx-power-dcbatterydischargelevel1-2) +- [ADMX_Power/DCConnectivityInStandby_2](./policy-csp-admx-power.md#admx-power-dcconnectivityinstandby-2) +- [ADMX_Power/DCCriticalSleepTransitionsDisable_2](./policy-csp-admx-power.md#admx-power-dccriticalsleeptransitionsdisable-2) +- [ADMX_Power/DCStartMenuButtonAction_2](./policy-csp-admx-power.md#admx-power-dcstartmenubuttonaction-2) +- [ADMX_Power/DiskACPowerDownTimeOut_2](./policy-csp-admx-power.md#admx-power-diskacpowerdowntimeout-2) +- [ADMX_Power/DiskDCPowerDownTimeOut_2](./policy-csp-admx-power.md#admx-power-diskdcpowerdowntimeout-2) +- [ADMX_Power/Dont_PowerOff_AfterShutdown](./policy-csp-admx-power.md#admx-power-dont-poweroff-aftershutdown) +- [ADMX_Power/EnableDesktopSlideShowAC](./policy-csp-admx-power.md#admx-power-enabledesktopslideshowac) +- [ADMX_Power/EnableDesktopSlideShowDC](./policy-csp-admx-power.md#admx-power-enabledesktopslideshowdc) +- [ADMX_Power/InboxActiveSchemeOverride_2](./policy-csp-admx-power.md#admx-power-inboxactiveschemeoverride-2) +- [ADMX_Power/PW_PromptPasswordOnResume](./policy-csp-admx-power.md#admx-power-pw-promptpasswordonresume) +- [ADMX_Power/PowerThrottlingTurnOff](./policy-csp-admx-power.md#admx-power-powerthrottlingturnoff) +- [ADMX_Power/ReserveBatteryNotificationLevel](./policy-csp-admx-power.md#admx-power-reservebatterynotificationlevel) - [ADMX_PowerShellExecutionPolicy/EnableModuleLogging](./policy-csp-admx-powershellexecutionpolicy.md#admx-powershellexecutionpolicy-enablemodulelogging) - [ADMX_PowerShellExecutionPolicy/EnableScripts](./policy-csp-admx-powershellexecutionpolicy.md#admx-powershellexecutionpolicy-enablescripts) - [ADMX_PowerShellExecutionPolicy/EnableTranscripting](./policy-csp-admx-powershellexecutionpolicy.md#admx-powershellexecutionpolicy-enabletranscripting) diff --git a/windows/client-management/mdm/policy-configuration-service-provider.md b/windows/client-management/mdm/policy-configuration-service-provider.md index fff1b3e3ca..8bfdfd90cc 100644 --- a/windows/client-management/mdm/policy-configuration-service-provider.md +++ b/windows/client-management/mdm/policy-configuration-service-provider.md @@ -2749,6 +2749,86 @@ The following diagram shows the Policy configuration service provider in tree fo +### ADMX_Power policies + +