From 85bc62bfb8f31a7c94cf4c0078e93c73ee835e77 Mon Sep 17 00:00:00 2001
From: Patti Short <35278231+shortpatti@users.noreply.github.com>
Date: Wed, 13 Jun 2018 14:43:43 -0700
Subject: [PATCH 01/73] Revert "Update
set-the-default-browser-using-group-policy.md"
---
.../set-the-default-browser-using-group-policy.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/browsers/internet-explorer/ie11-deploy-guide/set-the-default-browser-using-group-policy.md b/browsers/internet-explorer/ie11-deploy-guide/set-the-default-browser-using-group-policy.md
index 900f6cbb17..899c3da6e3 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/set-the-default-browser-using-group-policy.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/set-the-default-browser-using-group-policy.md
@@ -17,7 +17,7 @@ You can use the Group Policy setting, **Set a default associations configuration
**To set the default browser as Internet Explorer 11**
-1. Open your Group Policy editor and go to the **Computer Configuration\\Policies\\Administrative Templates\\Windows Components\\File Explorer\\Set a default associations configuration file** setting.
+1. Open your Group Policy editor and go to the **Administrative Templates\\Windows Components\\File Explorer\\Set a default associations configuration file** setting.
Turning this setting on also requires you to create and store a default associations configuration file, locally or on a network share. For more information about creating this file, see [Export or Import Default Application Associations]( https://go.microsoft.com/fwlink/p/?LinkId=618268).

From 461ac2fa0812738c0ca3a3602f0291919f5e3f4f Mon Sep 17 00:00:00 2001
From: Joey Caparas
Date: Wed, 20 Jun 2018 15:28:16 -0700
Subject: [PATCH 02/73] update API, add new topic, update toc
---
.../windows-defender-atp/TOC.md | 1 +
...ows-defender-advanced-threat-protection.md | 80 +++++++++++++++++++
...ows-defender-advanced-threat-protection.md | 15 ++--
3 files changed, 89 insertions(+), 7 deletions(-)
create mode 100644 windows/security/threat-protection/windows-defender-atp/find-machine-info-by-fqdn-windows-defender-advanced-threat-protection.md
diff --git a/windows/security/threat-protection/windows-defender-atp/TOC.md b/windows/security/threat-protection/windows-defender-atp/TOC.md
index a8defba7ee..66e5384064 100644
--- a/windows/security/threat-protection/windows-defender-atp/TOC.md
+++ b/windows/security/threat-protection/windows-defender-atp/TOC.md
@@ -130,6 +130,7 @@
#####Machines
###### [Collect investigation package API](collect-investigation-package-windows-defender-advanced-threat-protection.md)
###### [Find machine information by IP](find-machine-info-by-ip-windows-defender-advanced-threat-protection.md)
+###### [Find machine information by FQDN](find-machine-info-by-fqdn-windows-defender-advanced-threat-protection.md)
###### [Get machines](get-machines-windows-defender-advanced-threat-protection.md)
###### [Get FileMachineAction object API](get-filemachineaction-object-windows-defender-advanced-threat-protection.md)
###### [Get FileMachineActions collection API](get-filemachineactions-collection-windows-defender-advanced-threat-protection.md)
diff --git a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-fqdn-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-fqdn-windows-defender-advanced-threat-protection.md
new file mode 100644
index 0000000000..341de552f7
--- /dev/null
+++ b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-fqdn-windows-defender-advanced-threat-protection.md
@@ -0,0 +1,80 @@
+---
+title: Find machine information by interal FQDN API
+description: Use this API to create calls related to finding a machine entry around a specific timestamp by FQDN.
+keywords: frdn, apis, graph api, supported apis, find machine, machine information
+search.product: eADQiWindows 10XVcnh
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+ms.author: macapara
+author: mjcaparas
+ms.localizationpriority: high
+ms.date: 06/20/2018
+---
+
+# Find machine information by interal FQDN API
+
+**Applies to:**
+
+- Windows Defender Advanced Threat Protection (Windows Defender ATP)
+
+[!include[Prerelease information](prerelease.md)]
+
+Find a machine entity around a specific timestamp by FQDN.
+
+## Permissions
+User needs read permissions.
+
+## HTTP request
+```
+GET /testwdatppreview/machines/find(timestamp={time},key={FQDN})
+```
+
+## Request headers
+
+Header | Value
+:---|:---
+Authorization | Bearer {token}. **Required**.
+Content type | application/json
+
+
+## Request body
+Empty
+
+## Response
+If successful and machine exists - 200 OK.
+If no machine found - 404 Not Found.
+
+
+## Example
+
+Request
+
+Here is an example of the request.
+
+```
+GET https://graph.microsoft.com/testwdatppreview/machines/find(timestamp=2018-06-19T10:00:00Z,key='https://contoso.com')
+Content-type: application/json
+```
+
+Response
+
+Here is an example of the response.
+
+The response will return a list of all machines that reported this FQDN address within sixteen minutes prior and after the timestamp.
+
+```
+HTTP/1.1 200 OK
+Content-type: application/json
+{
+ "@odata.context": "https://graph.microsoft.com/testwdatppreview/$metadata#Machines",
+ "value": [
+ {
+ "id": "04c99d46599f078f1c3da3783cf5b95f01ac61bb",
+ "computerDnsName": "",
+ "firstSeen": "2018-06-19T01:25:04.9480498Z",
+ "osPlatform": "Windows10",
+…
+}
+```
diff --git a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md
index c654298268..6c0b695ea8 100644
--- a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md
@@ -1,7 +1,7 @@
---
title: Find machine information by interal IP API
-description: Use this API to create calls related to finding a machine entry around a specific timestamp by FQDN or interal IP.
-keywords: apis, graph api, supported apis, find machine, machine information, IP
+description: Use this API to create calls related to finding a machine entry around a specific timestamp by interal IP.
+keywords: ip, apis, graph api, supported apis, find machine, machine information
search.product: eADQiWindows 10XVcnh
ms.prod: w10
ms.mktglfcycl: deploy
@@ -10,7 +10,7 @@ ms.pagetype: security
ms.author: macapara
author: mjcaparas
ms.localizationpriority: high
-ms.date: 12/08/2017
+ms.date: 06/20/2018
---
# Find machine information by interal IP API
@@ -21,14 +21,14 @@ ms.date: 12/08/2017
[!include[Prerelease information](prerelease.md)]
-Find a machine entity around a specific timestamp by FQDN or internal IP.
+Find a machine entity around a specific timestamp by internal IP.
## Permissions
User needs read permissions.
## HTTP request
```
-GET /testwdatppreview/machines/find(timestamp={time},key={IP/FQDN})
+GET /testwdatppreview/machines/find(timestamp={time},key={IP})
```
## Request headers
@@ -54,7 +54,7 @@ Request
Here is an example of the request.
```
-GET https://graph.microsoft.com/testwdatppreview/machines/find(timestamp={time},key={IP/FQDN})
+GET https://graph.microsoft.com/testwdatppreview/machines/find(timestamp=2018-06-19T10:00:00Z,key='10.0.0.0')
Content-type: application/json
```
@@ -62,6 +62,7 @@ Response
Here is an example of the response.
+The response will return a list of all machines that reported this IP address within sixteen minutes prior and after the timestamp.
```
HTTP/1.1 200 OK
@@ -72,7 +73,7 @@ Content-type: application/json
{
"id": "04c99d46599f078f1c3da3783cf5b95f01ac61bb",
"computerDnsName": "",
- "firstSeen": "2017-07-06T01:25:04.9480498Z",
+ "firstSeen": "2018-06-19T01:25:04.9480498Z",
"osPlatform": "Windows10",
…
}
From 3a30ece451b758bd1133a56dd5d0d4f4cc7c07c7 Mon Sep 17 00:00:00 2001
From: Joey Caparas
Date: Fri, 22 Jun 2018 10:29:25 -0700
Subject: [PATCH 03/73] remove fqdn file and toc ref
---
.../windows-defender-atp/TOC.md | 1 -
...ows-defender-advanced-threat-protection.md | 80 -------------------
2 files changed, 81 deletions(-)
delete mode 100644 windows/security/threat-protection/windows-defender-atp/find-machine-info-by-fqdn-windows-defender-advanced-threat-protection.md
diff --git a/windows/security/threat-protection/windows-defender-atp/TOC.md b/windows/security/threat-protection/windows-defender-atp/TOC.md
index 66e5384064..a8defba7ee 100644
--- a/windows/security/threat-protection/windows-defender-atp/TOC.md
+++ b/windows/security/threat-protection/windows-defender-atp/TOC.md
@@ -130,7 +130,6 @@
#####Machines
###### [Collect investigation package API](collect-investigation-package-windows-defender-advanced-threat-protection.md)
###### [Find machine information by IP](find-machine-info-by-ip-windows-defender-advanced-threat-protection.md)
-###### [Find machine information by FQDN](find-machine-info-by-fqdn-windows-defender-advanced-threat-protection.md)
###### [Get machines](get-machines-windows-defender-advanced-threat-protection.md)
###### [Get FileMachineAction object API](get-filemachineaction-object-windows-defender-advanced-threat-protection.md)
###### [Get FileMachineActions collection API](get-filemachineactions-collection-windows-defender-advanced-threat-protection.md)
diff --git a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-fqdn-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-fqdn-windows-defender-advanced-threat-protection.md
deleted file mode 100644
index 341de552f7..0000000000
--- a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-fqdn-windows-defender-advanced-threat-protection.md
+++ /dev/null
@@ -1,80 +0,0 @@
----
-title: Find machine information by interal FQDN API
-description: Use this API to create calls related to finding a machine entry around a specific timestamp by FQDN.
-keywords: frdn, apis, graph api, supported apis, find machine, machine information
-search.product: eADQiWindows 10XVcnh
-ms.prod: w10
-ms.mktglfcycl: deploy
-ms.sitesec: library
-ms.pagetype: security
-ms.author: macapara
-author: mjcaparas
-ms.localizationpriority: high
-ms.date: 06/20/2018
----
-
-# Find machine information by interal FQDN API
-
-**Applies to:**
-
-- Windows Defender Advanced Threat Protection (Windows Defender ATP)
-
-[!include[Prerelease information](prerelease.md)]
-
-Find a machine entity around a specific timestamp by FQDN.
-
-## Permissions
-User needs read permissions.
-
-## HTTP request
-```
-GET /testwdatppreview/machines/find(timestamp={time},key={FQDN})
-```
-
-## Request headers
-
-Header | Value
-:---|:---
-Authorization | Bearer {token}. **Required**.
-Content type | application/json
-
-
-## Request body
-Empty
-
-## Response
-If successful and machine exists - 200 OK.
-If no machine found - 404 Not Found.
-
-
-## Example
-
-Request
-
-Here is an example of the request.
-
-```
-GET https://graph.microsoft.com/testwdatppreview/machines/find(timestamp=2018-06-19T10:00:00Z,key='https://contoso.com')
-Content-type: application/json
-```
-
-Response
-
-Here is an example of the response.
-
-The response will return a list of all machines that reported this FQDN address within sixteen minutes prior and after the timestamp.
-
-```
-HTTP/1.1 200 OK
-Content-type: application/json
-{
- "@odata.context": "https://graph.microsoft.com/testwdatppreview/$metadata#Machines",
- "value": [
- {
- "id": "04c99d46599f078f1c3da3783cf5b95f01ac61bb",
- "computerDnsName": "",
- "firstSeen": "2018-06-19T01:25:04.9480498Z",
- "osPlatform": "Windows10",
-…
-}
-```
From fe2418bb7742c4ebd4a218edcc7c11eed60fc483 Mon Sep 17 00:00:00 2001
From: Joey Caparas
Date: Fri, 22 Jun 2018 11:26:22 -0700
Subject: [PATCH 04/73] remove APIs in toc name
---
.../windows-defender-atp/TOC.md | 32 +++++++++----------
...ows-defender-advanced-threat-protection.md | 6 ++--
2 files changed, 19 insertions(+), 19 deletions(-)
diff --git a/windows/security/threat-protection/windows-defender-atp/TOC.md b/windows/security/threat-protection/windows-defender-atp/TOC.md
index a8defba7ee..fe90044ab2 100644
--- a/windows/security/threat-protection/windows-defender-atp/TOC.md
+++ b/windows/security/threat-protection/windows-defender-atp/TOC.md
@@ -114,13 +114,13 @@
###### [Is domain seen in organization](is-domain-seen-in-org-windows-defender-advanced-threat-protection.md)
#####File
-###### [Block file API](block-file-windows-defender-advanced-threat-protection.md)
+###### [Block file](block-file-windows-defender-advanced-threat-protection.md)
###### [Get file information](get-file-information-windows-defender-advanced-threat-protection.md)
###### [Get file related alerts](get-file-related-alerts-windows-defender-advanced-threat-protection.md)
###### [Get file related machines](get-file-related-machines-windows-defender-advanced-threat-protection.md)
###### [Get file statistics](get-file-statistics-windows-defender-advanced-threat-protection.md)
-###### [Get FileActions collection API](get-fileactions-collection-windows-defender-advanced-threat-protection.md)
-###### [Unblock file API](unblock-file-windows-defender-advanced-threat-protection.md)
+###### [Get FileActions collection](get-fileactions-collection-windows-defender-advanced-threat-protection.md)
+###### [Unblock file](unblock-file-windows-defender-advanced-threat-protection.md)
#####IP
###### [Get IP related alerts](get-ip-related-alerts-windows-defender-advanced-threat-protection.md)
@@ -128,25 +128,25 @@
###### [Get IP statistics](get-ip-statistics-windows-defender-advanced-threat-protection.md)
###### [Is IP seen in organization](is-ip-seen-org-windows-defender-advanced-threat-protection.md)
#####Machines
-###### [Collect investigation package API](collect-investigation-package-windows-defender-advanced-threat-protection.md)
+###### [Collect investigation package](collect-investigation-package-windows-defender-advanced-threat-protection.md)
###### [Find machine information by IP](find-machine-info-by-ip-windows-defender-advanced-threat-protection.md)
###### [Get machines](get-machines-windows-defender-advanced-threat-protection.md)
-###### [Get FileMachineAction object API](get-filemachineaction-object-windows-defender-advanced-threat-protection.md)
-###### [Get FileMachineActions collection API](get-filemachineactions-collection-windows-defender-advanced-threat-protection.md)
+###### [Get FileMachineAction object](get-filemachineaction-object-windows-defender-advanced-threat-protection.md)
+###### [Get FileMachineActions collection](get-filemachineactions-collection-windows-defender-advanced-threat-protection.md)
###### [Get machine by ID](get-machine-by-id-windows-defender-advanced-threat-protection.md)
###### [Get machine log on users](get-machine-log-on-users-windows-defender-advanced-threat-protection.md)
###### [Get machine related alerts](get-machine-related-alerts-windows-defender-advanced-threat-protection.md)
-###### [Get MachineAction object API](get-machineaction-object-windows-defender-advanced-threat-protection.md)
-###### [Get MachineActions collection API](get-machineactions-collection-windows-defender-advanced-threat-protection.md)
+###### [Get MachineAction object](get-machineaction-object-windows-defender-advanced-threat-protection.md)
+###### [Get MachineActions collection](get-machineactions-collection-windows-defender-advanced-threat-protection.md)
###### [Get machines](get-machines-windows-defender-advanced-threat-protection.md)
-###### [Get package SAS URI API](get-package-sas-uri-windows-defender-advanced-threat-protection.md)
-###### [Isolate machine API](isolate-machine-windows-defender-advanced-threat-protection.md)
-###### [Release machine from isolation API](unisolate-machine-windows-defender-advanced-threat-protection.md)
-###### [Remove app restriction API](unrestrict-code-execution-windows-defender-advanced-threat-protection.md)
-###### [Request sample API](request-sample-windows-defender-advanced-threat-protection.md)
-###### [Restrict app execution API](restrict-code-execution-windows-defender-advanced-threat-protection.md)
-###### [Run antivirus scan API](run-av-scan-windows-defender-advanced-threat-protection.md)
-###### [Stop and quarantine file API](stop-quarantine-file-windows-defender-advanced-threat-protection.md)
+###### [Get package SAS URI](get-package-sas-uri-windows-defender-advanced-threat-protection.md)
+###### [Isolate machine](isolate-machine-windows-defender-advanced-threat-protection.md)
+###### [Release machine from isolation](unisolate-machine-windows-defender-advanced-threat-protection.md)
+###### [Remove app restriction](unrestrict-code-execution-windows-defender-advanced-threat-protection.md)
+###### [Request sample](request-sample-windows-defender-advanced-threat-protection.md)
+###### [Restrict app execution](restrict-code-execution-windows-defender-advanced-threat-protection.md)
+###### [Run antivirus scan](run-av-scan-windows-defender-advanced-threat-protection.md)
+###### [Stop and quarantine file](stop-quarantine-file-windows-defender-advanced-threat-protection.md)
diff --git a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md
index 6c0b695ea8..c1b4514c04 100644
--- a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md
@@ -10,7 +10,7 @@ ms.pagetype: security
ms.author: macapara
author: mjcaparas
ms.localizationpriority: high
-ms.date: 06/20/2018
+ms.date: 06/22/2018
---
# Find machine information by interal IP API
@@ -54,7 +54,7 @@ Request
Here is an example of the request.
```
-GET https://graph.microsoft.com/testwdatppreview/machines/find(timestamp=2018-06-19T10:00:00Z,key='10.0.0.0')
+GET https://graph.microsoft.com/testwdatppreview/machines/find(timestamp=2018-06-19T10:00:00Z,key='10.166.93.61')
Content-type: application/json
```
@@ -73,7 +73,7 @@ Content-type: application/json
{
"id": "04c99d46599f078f1c3da3783cf5b95f01ac61bb",
"computerDnsName": "",
- "firstSeen": "2018-06-19T01:25:04.9480498Z",
+ "firstSeen": "2017-07-06T01:25:04.9480498Z",
"osPlatform": "Windows10",
…
}
From f8c8e6dde0fafc01bdd333739fcd1230361cb407 Mon Sep 17 00:00:00 2001
From: Joey Caparas
Date: Mon, 25 Jun 2018 10:29:16 -0700
Subject: [PATCH 05/73] bold response and request
---
...ck-file-windows-defender-advanced-threat-protection.md | 4 ++--
...package-windows-defender-advanced-threat-protection.md | 4 ++--
...o-by-ip-windows-defender-advanced-threat-protection.md | 6 +++---
...rmation-windows-defender-advanced-threat-protection.md | 4 ++--
...-alerts-windows-defender-advanced-threat-protection.md | 4 ++--
...o-by-id-windows-defender-advanced-threat-protection.md | 4 ++--
...or-info-windows-defender-advanced-threat-protection.md | 4 ++--
...in-info-windows-defender-advanced-threat-protection.md | 4 ++--
...es-info-windows-defender-advanced-threat-protection.md | 4 ++--
...ip-info-windows-defender-advanced-threat-protection.md | 4 ++--
...ne-info-windows-defender-advanced-threat-protection.md | 4 ++--
...er-info-windows-defender-advanced-threat-protection.md | 4 ++--
...-alerts-windows-defender-advanced-threat-protection.md | 4 ++--
...-alerts-windows-defender-advanced-threat-protection.md | 4 ++--
...achines-windows-defender-advanced-threat-protection.md | 4 ++--
...tistics-windows-defender-advanced-threat-protection.md | 4 ++--
...rmation-windows-defender-advanced-threat-protection.md | 4 ++--
...-alerts-windows-defender-advanced-threat-protection.md | 4 ++--
...achines-windows-defender-advanced-threat-protection.md | 4 ++--
...tistics-windows-defender-advanced-threat-protection.md | 4 ++--
...lection-windows-defender-advanced-threat-protection.md | 4 ++--
...-object-windows-defender-advanced-threat-protection.md | 4 ++--
...lection-windows-defender-advanced-threat-protection.md | 8 ++++----
...-alerts-windows-defender-advanced-threat-protection.md | 4 ++--
...achines-windows-defender-advanced-threat-protection.md | 4 ++--
...tistics-windows-defender-advanced-threat-protection.md | 4 ++--
...e-by-id-windows-defender-advanced-threat-protection.md | 4 ++--
...n-users-windows-defender-advanced-threat-protection.md | 4 ++--
...-alerts-windows-defender-advanced-threat-protection.md | 4 ++--
...-object-windows-defender-advanced-threat-protection.md | 4 ++--
...lection-windows-defender-advanced-threat-protection.md | 8 ++++----
...achines-windows-defender-advanced-threat-protection.md | 4 ++--
...sas-uri-windows-defender-advanced-threat-protection.md | 4 ++--
...rmation-windows-defender-advanced-threat-protection.md | 4 ++--
...-alerts-windows-defender-advanced-threat-protection.md | 4 ++--
...achines-windows-defender-advanced-threat-protection.md | 4 ++--
...-in-org-windows-defender-advanced-threat-protection.md | 4 ++--
...een-org-windows-defender-advanced-threat-protection.md | 4 ++--
...machine-windows-defender-advanced-threat-protection.md | 4 ++--
...-sample-windows-defender-advanced-threat-protection.md | 4 ++--
...ecution-windows-defender-advanced-threat-protection.md | 4 ++--
...av-scan-windows-defender-advanced-threat-protection.md | 4 ++--
...ne-file-windows-defender-advanced-threat-protection.md | 4 ++--
...ck-file-windows-defender-advanced-threat-protection.md | 4 ++--
...machine-windows-defender-advanced-threat-protection.md | 4 ++--
...ecution-windows-defender-advanced-threat-protection.md | 4 ++--
46 files changed, 97 insertions(+), 97 deletions(-)
diff --git a/windows/security/threat-protection/windows-defender-atp/block-file-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/block-file-windows-defender-advanced-threat-protection.md
index f59eac9c00..19ffca76f3 100644
--- a/windows/security/threat-protection/windows-defender-atp/block-file-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/block-file-windows-defender-advanced-threat-protection.md
@@ -52,7 +52,7 @@ If successful, this method returns 200, Ok response code with empty body, which
## Example
-Request
+**Request**
Here is an example of the request.
@@ -66,7 +66,7 @@ Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection.md
index a71011d0c3..155b73f634 100644
--- a/windows/security/threat-protection/windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection.md
@@ -51,7 +51,7 @@ If successful, this method returns 201, Created response code and _MachineAction
## Example
-Request
+**Request**
Here is an example of the request.
@@ -63,7 +63,7 @@ Content-type: application/json
}
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md
index c1b4514c04..85a6256afb 100644
--- a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md
@@ -10,7 +10,7 @@ ms.pagetype: security
ms.author: macapara
author: mjcaparas
ms.localizationpriority: high
-ms.date: 06/22/2018
+ms.date: 06/25/2018
---
# Find machine information by interal IP API
@@ -49,7 +49,7 @@ If no machine found - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/machines/find(timestamp=2018-06
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-actor-information-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-actor-information-windows-defender-advanced-threat-protection.md
index 51cce300c7..7f0bbb204e 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-actor-information-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-actor-information-windows-defender-advanced-threat-protection.md
@@ -50,7 +50,7 @@ If actor does not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -59,7 +59,7 @@ GET https://graph.microsoft.com/testwdatppreview/actors/zinc
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-actor-related-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-actor-related-alerts-windows-defender-advanced-threat-protection.md
index 139e949a5b..0e8acb715f 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-actor-related-alerts-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-actor-related-alerts-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If actor does not exist or no related alerts - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/actors/zinc/alerts
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection.md
index f908c17957..df79e73afe 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If alert not found - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/alerts/{id}
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-related-actor-info-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alert-related-actor-info-windows-defender-advanced-threat-protection.md
index 2494eef313..4e7c980de3 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-alert-related-actor-info-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-alert-related-actor-info-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If alert not found or actor not found - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -59,7 +59,7 @@ Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection.md
index 0229f0e811..1de20c71f5 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If alert not found or domain not found - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/alerts/{id}/domains
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection.md
index 27c1f45f77..cc71f2c0f1 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If alert not found or files not found - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/alerts/{id}/files
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection.md
index 43c05e4feb..60b4ed3933 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If alert not found or IPs not found - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/alerts/{id}/ips
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection.md
index ce606758a4..dc027d084d 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection.md
@@ -48,7 +48,7 @@ If alert not found or machine not found - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -57,7 +57,7 @@ GET https://graph.microsoft.com/testwdatppreview/alerts/{id}/machine
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection.md
index aaac777152..62265fb0c6 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If alert not found or user not found - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/alerts/{id}/user
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alerts-windows-defender-advanced-threat-protection.md
index 2f07b3a6a8..da990f6575 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-alerts-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-alerts-windows-defender-advanced-threat-protection.md
@@ -50,7 +50,7 @@ If no recent alerts found - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -59,7 +59,7 @@ GET https://graph.microsoft.com/testwdatppreview/alerts
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection.md
index 6b61d695b3..2b72c56a34 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If domain or alert does not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/domains/{id}/alerts
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection.md
index eb0546f243..e2d4eda037 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If domain or machines do not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/domains/{id}/machines
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-domain-statistics-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-domain-statistics-windows-defender-advanced-threat-protection.md
index effc002d08..c7fc3c10ac 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-domain-statistics-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-domain-statistics-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If domain does not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/domains/{id}/machines
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection.md
index fb162188a6..3d8cfe44d1 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection.md
@@ -50,7 +50,7 @@ If file does not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -59,7 +59,7 @@ GET https://graph.microsoft.com/testwdatppreview/files/{id}
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection.md
index 310df69574..e907fae925 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If file or alerts do not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/files/{id}/alerts
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection.md
index 2d0f4a3757..3479d93096 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If file or machines do not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/files/{id}/machines
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection.md
index 9bb28cc2ae..aef687af2f 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If file do not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/files/{id}/machines
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-fileactions-collection-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-fileactions-collection-windows-defender-advanced-threat-protection.md
index 820d847ef0..21e1ef04f2 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-fileactions-collection-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-fileactions-collection-windows-defender-advanced-threat-protection.md
@@ -51,7 +51,7 @@ If successful, this method returns 200, Ok response code with a collection of Fi
## Example
-Request
+**Request**
Here is an example of the request on an organization that has three FileActions.
@@ -59,7 +59,7 @@ Here is an example of the request on an organization that has three FileActions.
GET https://graph.microsoft.com/testwdatppreview/fileactions
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection.md
index 61737167aa..26fbec2cb6 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection.md
@@ -47,7 +47,7 @@ If successful, this method returns 200, Ok response code with the *FileMachineAc
## Example
-Request
+**Request**
Here is an example of the request.
@@ -55,7 +55,7 @@ Here is an example of the request.
GET https://graph.microsoft.com/testwdatppreview/filemachineactions/3dc88ce3-dd0c-40f7-93fc-8bd14317aab6
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-filemachineactions-collection-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-filemachineactions-collection-windows-defender-advanced-threat-protection.md
index 8ce0e6f5a0..145cf5acf0 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-filemachineactions-collection-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-filemachineactions-collection-windows-defender-advanced-threat-protection.md
@@ -47,7 +47,7 @@ If successful, this method returns 200, Ok response code with a collection of Fi
## Example 1
-Request
+**Request**
Here is an example of the request on an organization that has three FileMachineActions.
@@ -55,7 +55,7 @@ Here is an example of the request on an organization that has three FileMachineA
GET https://graph.microsoft.com/testwdatppreview/filemachineactions
```
-Response
+**Response**
Here is an example of the response.
@@ -113,7 +113,7 @@ Content-type: application/json
##Example 2
-Request
+**Request**
Here is an example of a request that filters the FileMachineActions by machine ID and shows the latest two FileMachineActions.
@@ -121,7 +121,7 @@ Here is an example of a request that filters the FileMachineActions by machine I
GET https://graph.microsoft.com/testwdatppreview/filemachineactions?$filter=machineId eq 'f46b9bb259ed4a7fb9981b73510e3cc7aa81ec1f'&$top=2
```
-Response
+**Response**
```
HTTP/1.1 200 Ok
diff --git a/windows/security/threat-protection/windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection.md
index 9cbaad6521..a642d6074c 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If IP and alerts do not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/ips/{id}/alerts
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection.md
index 284901aa0d..9568580717 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection.md
@@ -42,7 +42,7 @@ If IP or machines do not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -51,7 +51,7 @@ GET https://graph.microsoft.com/testwdatppreview/ips/{id}/machines
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection.md
index c932fe20d1..cf7a8968da 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If domain does not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/ips/{id}/machines
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection.md
index 520cada5be..a62474ceb1 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If no machine found - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/machines/{id}
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection.md
index c95684b1af..bfc8f3e2a3 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection.md
@@ -50,7 +50,7 @@ If no machine found or no users found - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -59,7 +59,7 @@ GET https://graph.microsoft.com/testwdatppreview/machines/{id}/logonusers
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection.md
index 512f7def8f..224bd282f3 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If no machine or no alerts found - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/machines/{id}/alerts
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection.md
index 79d478e9ac..1a3d57de4a 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection.md
@@ -47,7 +47,7 @@ If successful, this method returns 200, Ok response code with the *MachineAction
## Example
-Request
+**Request**
Here is an example of the request.
@@ -55,7 +55,7 @@ Here is an example of the request.
GET https://graph.microsoft.com/testwdatppreview/machineactions/2e9da30d-27f6-4208-81f2-9cd3d67893ba
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection.md
index e39f95f2cb..d51bd26a90 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection.md
@@ -47,7 +47,7 @@ If successful, this method returns 200, Ok response code with a collection of Ma
## Example 1
-Request
+**Request**
Here is an example of the request on an organization that has three MachineActions.
@@ -55,7 +55,7 @@ Here is an example of the request on an organization that has three MachineActio
GET https://graph.microsoft.com/testwdatppreview/machineactions
```
-Response
+**Response**
Here is an example of the response.
@@ -107,7 +107,7 @@ Content-type: application/json
## Example 2
-Request
+**Request**
Here is an example of a request that filters the MachineActions by machine ID and shows the latest two MachineActions.
@@ -117,7 +117,7 @@ GET https://graph.microsoft.com/testwdatppreview/machineactions?$filter=machineI
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-machines-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-machines-windows-defender-advanced-threat-protection.md
index 9a4b7ce1a3..6a7fbdf3e3 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-machines-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-machines-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If no recent machines - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/machines
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection.md
index 514bb8ce9c..b81eb5bcda 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection.md
@@ -48,7 +48,7 @@ If successful, this method returns 200, Ok response code with object that holds
## Example
-Request
+**Request**
Here is an example of the request.
@@ -57,7 +57,7 @@ GET https://graph.microsoft.com/testwdatppreview/machineactions/7327b54fd718525c
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-user-information-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-user-information-windows-defender-advanced-threat-protection.md
index a7536e3363..15a4a3b9b2 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-user-information-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-user-information-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If user does not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/users/{id}
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection.md
index 991f879daf..6c84eac0d1 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If user does not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/users/{id}/alerts
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection.md
index 7d80d182b9..bfc2118fef 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If user or machine does not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/users/{id}/machines
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection.md
index a7c1630a56..78a1c54935 100644
--- a/windows/security/threat-protection/windows-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection.md
@@ -42,7 +42,7 @@ If domain does not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -51,7 +51,7 @@ GET https://graph.microsoft.com/testwdatppreview/domains/{id}
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection.md
index d120192d44..0e9105178a 100644
--- a/windows/security/threat-protection/windows-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If IP do not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/ips/{id}
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection.md
index 918573d30b..b60804b68a 100644
--- a/windows/security/threat-protection/windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection.md
@@ -57,7 +57,7 @@ If successful, this method returns 201, Created response code and _MachineAction
## Example
-Request
+**Request**
Here is an example of the request.
@@ -70,7 +70,7 @@ Content-type: application/json
}
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/request-sample-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/request-sample-windows-defender-advanced-threat-protection.md
index 85e0d2053b..2e97a61da4 100644
--- a/windows/security/threat-protection/windows-defender-atp/request-sample-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/request-sample-windows-defender-advanced-threat-protection.md
@@ -52,7 +52,7 @@ If successful, this method returns 201, Created response code and *FileMachineAc
## Example
-Request
+**Request**
Here is an example of the request.
@@ -66,7 +66,7 @@ Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection.md
index ef5cdbf26d..cc9dce0b85 100644
--- a/windows/security/threat-protection/windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection.md
@@ -51,7 +51,7 @@ If successful, this method returns 201, Created response code and _MachineAction
## Example
-Request
+**Request**
Here is an example of the request.
@@ -63,7 +63,7 @@ Content-type: application/json
}
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection.md
index 22acf4709c..3099c9d60c 100644
--- a/windows/security/threat-protection/windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection.md
@@ -59,7 +59,7 @@ If successful, this method returns 201, Created response code and _MachineAction
## Example
-Request
+**Request**
Here is an example of the request.
@@ -72,7 +72,7 @@ Content-type: application/json
}
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/stop-quarantine-file-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/stop-quarantine-file-windows-defender-advanced-threat-protection.md
index 91b69510da..0074b5f40e 100644
--- a/windows/security/threat-protection/windows-defender-atp/stop-quarantine-file-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/stop-quarantine-file-windows-defender-advanced-threat-protection.md
@@ -52,7 +52,7 @@ If successful, this method returns 201, Created response code and _FileMachineAc
## Example
-Request
+**Request**
Here is an example of the request.
@@ -65,7 +65,7 @@ Content-type: application/json
}
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/unblock-file-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/unblock-file-windows-defender-advanced-threat-protection.md
index ea8ff67abf..661a3200a2 100644
--- a/windows/security/threat-protection/windows-defender-atp/unblock-file-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/unblock-file-windows-defender-advanced-threat-protection.md
@@ -52,7 +52,7 @@ If successful, this method returns 200, Ok response code with empty body, which
## Example
-Request
+**Request**
Here is an example of the request.
@@ -64,7 +64,7 @@ Content-type: application/json
}
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection.md
index 99073f445e..59dacfcac1 100644
--- a/windows/security/threat-protection/windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection.md
@@ -51,7 +51,7 @@ If successful, this method returns 201, Created response code and _MachineAction
## Example
-Request
+**Request**
Here is an example of the request.
@@ -63,7 +63,7 @@ Content-type: application/json
}
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection.md
index a7c2aba602..7aab86e7c2 100644
--- a/windows/security/threat-protection/windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection.md
@@ -51,7 +51,7 @@ If successful, this method returns 201, Created response code and _MachineAction
## Example
-Request
+**Request**
Here is an example of the request.
@@ -64,7 +64,7 @@ Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
From 49f6aec8748fd6efb8ed538c0a2e36679a83a4f5 Mon Sep 17 00:00:00 2001
From: Joey Caparas
Date: Mon, 25 Jun 2018 10:36:03 -0700
Subject: [PATCH 06/73] add note
---
...e-info-by-ip-windows-defender-advanced-threat-protection.md | 3 +++
1 file changed, 3 insertions(+)
diff --git a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md
index 85a6256afb..78a31363f6 100644
--- a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md
@@ -23,6 +23,9 @@ ms.date: 06/25/2018
Find a machine entity around a specific timestamp by internal IP.
+>[!NOTE]
+>The timestamp must be within the last 30 days.
+
## Permissions
User needs read permissions.
From 9cf817231f8ab09c2232c6a92a158c78bb77d625 Mon Sep 17 00:00:00 2001
From: arottem
Date: Mon, 23 Jul 2018 14:29:40 -0700
Subject: [PATCH 07/73] Update licensing and brand
Update to reflect ASR in E3 and the up to date content of WD ATP
---
.../windows-defender-exploit-guard.md | 7 +++----
1 file changed, 3 insertions(+), 4 deletions(-)
diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md
index a7574b02af..aa73196ed9 100644
--- a/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md
+++ b/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md
@@ -53,10 +53,9 @@ You can also [enable audit mode](audit-windows-defender-exploit-guard.md) for th
>You can also visit the Windows Defender Testground website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm the features are working and see how each of them work.
Windows Defender EG can be managed and reported on in the Windows Defender Security Center as part of the Windows Defender Advanced Threat Protection suite of threat mitigation, preventing, protection, and analysis technologies, which also includes:
-- [The Windows Defender ATP console](../windows-defender-atp/windows-defender-advanced-threat-protection.md)
+- [Windows Defender Security Center](../windows-defender-atp/windows-defender-security-center-atp)
- [Windows Defender Antivirus in Windows 10](../windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md)
-- [Windows Defender SmartScreen](../windows-defender-smartscreen/windows-defender-smartscreen-overview.md)
-- Windows Defender Device Guard
+- [Windows Defender Application Control](../windows-defender-application-control/windows-defender-application-control)
- [Windows Defender Application Guard](../windows-defender-application-guard/wd-app-guard-overview.md)
You can use the Windows Defender ATP console to obtain detailed reporting into events and blocks as part of the usual [alert investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md). You can [sign up for a free trial of Windows Defender ATP](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=cx-docs-msa4053440) to see how it works.
@@ -76,7 +75,7 @@ This section covers requirements for each feature in Windows Defender EG.
| Feature | Windows 10 Home | Windows 10 Professional | Windows 10 E3 | Windows 10 E5 |
| ----------------- | :------------------------------------: | :---------------------------: | :-------------------------: | :--------------------------------------: |
| Exploit protection |  |  |  |  |
-| Attack surface reduction |  |  |  |  |
+| Attack surface reduction |  |  |  |  |
| Network protection |  |  |  |  |
| Controlled folder access |  |  |  |  |
From 850fa5d195c326e85915096d4511464db8decb15 Mon Sep 17 00:00:00 2001
From: Justin Hall
Date: Tue, 24 Jul 2018 15:24:48 -0700
Subject: [PATCH 08/73] removed version 1703
---
.../create-wip-policy-using-intune-azure.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md
index a293cb908b..2a988c9641 100644
--- a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md
+++ b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md
@@ -422,7 +422,7 @@ There are no default locations included with WIP, you must add each of your netw
Network domains |
corp.contoso.com,region.contoso.com |
- Starting with Windows 10, version 1703, this field is optional.
Specify the DNS suffixes used in your environment. All traffic to the fully-qualified domains appearing in this list will be protected.
If you have multiple resources, you must separate them using the "," delimiter. |
+ Specify the DNS suffixes used in your environment. All traffic to the fully-qualified domains appearing in this list will be protected.
If you have multiple resources, you must separate them using the "," delimiter. |
Proxy servers |
From f46fcc896da550951739c3a71604fb6379ef9425 Mon Sep 17 00:00:00 2001
From: Mihai Peicu <41653989+MihaiSP@users.noreply.github.com>
Date: Tue, 24 Jul 2018 17:17:57 -0700
Subject: [PATCH 09/73] Fixed default values for 2 fields, and adjusted the
statment on atomicity for more clarity.
---
windows/client-management/mdm/firewall-csp.md | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/windows/client-management/mdm/firewall-csp.md b/windows/client-management/mdm/firewall-csp.md
index 1a552c057a..57a80b55f0 100644
--- a/windows/client-management/mdm/firewall-csp.md
+++ b/windows/client-management/mdm/firewall-csp.md
@@ -14,7 +14,7 @@ ms.date: 01/26/2018
The Firewall configuration service provider (CSP) allows the mobile device management (MDM) server to configure the Windows Defender Firewall global settings, per profile settings, as well as the desired set of custom rules to be enforced on the device. Using the Firewall CSP the IT admin can now manage non-domain devices, and reduce the risk of network security threats across all systems connecting to the corporate network. This CSP was added Windows 10, version 1709.
-Firewall configuration commands must be wrapped in an Atomic block in SyncML.
+Each of the Firewall rules in the FirewallRules section must be wrapped in an Atomic block in SyncML.
For detailed information on some of the fields below see [[MS-FASP]: Firewall and Advanced Security Protocol documentation](https://msdn.microsoft.com/en-us/library/mt620101.aspx).
@@ -284,7 +284,7 @@ Sample syncxml to provision the firewall settings to evaluate
**FirewallRules/_FirewallRuleName_/Enabled**
Indicates whether the rule is enabled or disabled. If the rule must be enabled, this value must be set to true.
-
If not specified - a new rule is disabled by default.
+If not specified - a new rule is enabled by default.
Boolean value. Supported operations are Get and Replace.
**FirewallRules/_FirewallRuleName_/Profiles**
@@ -310,7 +310,7 @@ Sample syncxml to provision the firewall settings to evaluate
- IN - the rule applies to inbound traffic.
- OUT - the rule applies to outbound traffic.
-- If not specified, the default is IN.
+- If not specified, the default is Out.
Value type is string. Supported operations are Get and Replace.
From fadc0b19e54f7f975ea5db507477672974b4b71b Mon Sep 17 00:00:00 2001
From: mistermik
Date: Tue, 24 Jul 2018 20:12:49 -0700
Subject: [PATCH 10/73] A parameter cannot be found that matches parameter name
'IncludeManageTools'
Add-WindowsFeature Adcs-Cert-Authority does not have an 'IncludeManageTools' parameter.
---
.../hello-for-business/hello-hybrid-key-new-install.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-new-install.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-new-install.md
index 11d1a66100..1a48a21306 100644
--- a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-new-install.md
+++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-new-install.md
@@ -60,7 +60,7 @@ Sign-in using _Enterprise Admin_ equivalent credentials on Windows Server 2012 o
1. Open an elevated Windows PowerShell prompt.
2. Use the following command to install the Active Directory Certificate Services role.
```PowerShell
- Add-WindowsFeature Adcs-Cert-Authority -IncludeManageTools
+ Add-WindowsFeature Adcs-Cert-Authority
```
3. Use the following command to configure the Certificate Authority using a basic certificate authority configuration.
From cda330c3bc02f81e433616bc89d5ec9b6e49a351 Mon Sep 17 00:00:00 2001
From: mistermik
Date: Tue, 24 Jul 2018 20:22:45 -0700
Subject: [PATCH 11/73] Update cmdlet with correct parameter
There is a typo into the cmdlet, -IncludeManageTools should be changed to -IncludeManagementTools
---
.../hello-for-business/hello-hybrid-key-new-install.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-new-install.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-new-install.md
index 1a48a21306..f986fd3e0e 100644
--- a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-new-install.md
+++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-new-install.md
@@ -60,7 +60,7 @@ Sign-in using _Enterprise Admin_ equivalent credentials on Windows Server 2012 o
1. Open an elevated Windows PowerShell prompt.
2. Use the following command to install the Active Directory Certificate Services role.
```PowerShell
- Add-WindowsFeature Adcs-Cert-Authority
+ add-windowsfeature adcs-cert-authority -IncludeManagementTools
```
3. Use the following command to configure the Certificate Authority using a basic certificate authority configuration.
From 9fab58eef6dcf2b9dbed2637e41c9543eb1687ee Mon Sep 17 00:00:00 2001
From: peteregerton <30479892+peteregerton@users.noreply.github.com>
Date: Wed, 25 Jul 2018 12:42:59 +0100
Subject: [PATCH 12/73] Updated supported ConfigMgr version
Djam confirmed MBAM compatibility with CM versions 1802+ in this UV item https://configurationmanager.uservoice.com/forums/300492-ideas/suggestions/19123522-support-mbam-2-5-integration-with-sccm-current-bra
May be worth a re-word so not further edits are required.
---
mdop/mbam-v25/mbam-25-supported-configurations.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/mdop/mbam-v25/mbam-25-supported-configurations.md b/mdop/mbam-v25/mbam-25-supported-configurations.md
index 195791d851..4eb36ebf32 100644
--- a/mdop/mbam-v25/mbam-25-supported-configurations.md
+++ b/mdop/mbam-v25/mbam-25-supported-configurations.md
@@ -284,7 +284,7 @@ MBAM supports the following versions of Configuration Manager.
-Microsoft System Center Configuration Manager (Current Branch), version 1610 |
+Microsoft System Center Configuration Manager (Current Branch), versions up to 1806 |
|
64-bit |
From c492ed8c571f8e164de426ea6c204348cbabdf6a Mon Sep 17 00:00:00 2001
From: Patti Short
Date: Wed, 25 Jul 2018 06:43:15 -0700
Subject: [PATCH 13/73] updated three infographics and updated the
corresponding policies
---
.../group-policies/prelaunch-preload-gp.md | 3 ++-
.../prelaunch-edge-and-preload-tabs-sm.png | Bin 82279 -> 99295 bytes
.../prelaunch-edge-and-preload-tabs.png | Bin 62561 -> 115410 bytes
.../edge/images/prelaunch-edge-only-sm.png | Bin 78961 -> 98029 bytes
browsers/edge/images/prelaunch-edge-only.png | Bin 61352 -> 112817 bytes
browsers/edge/images/preload-tabs-only-sm.png | Bin 80873 -> 96842 bytes
browsers/edge/images/preload-tabs-only.png | Bin 62635 -> 114603 bytes
.../edge/includes/allow-prelaunch-include.md | 4 ++--
.../edge/microsoft-edge-kiosk-mode-deploy.md | 6 +++---
browsers/edge/new-policies.md | 8 ++++----
.../mdm/policy-csp-browser.md | 2 +-
11 files changed, 12 insertions(+), 11 deletions(-)
diff --git a/browsers/edge/group-policies/prelaunch-preload-gp.md b/browsers/edge/group-policies/prelaunch-preload-gp.md
index 1443c06e6a..373d7c0dfa 100644
--- a/browsers/edge/group-policies/prelaunch-preload-gp.md
+++ b/browsers/edge/group-policies/prelaunch-preload-gp.md
@@ -14,9 +14,10 @@ Additionally, Microsoft Edge preloads the Start and New tab pages during Windows
## Policies
+- [Allow Microsoft Edge to pre-launch at Windows startup, when the system is idle, and each time Microsoft Edge is closed](../new-policies.md#allow-prelaunch)
+
- [Allow Microsoft Edge to start and load the Start and New Tab page at Windows startup and each time Microsoft Edge is closed](../new-policies.md#allow-microsoft-edge-to-start-and-load-the-start-and-new-tab-page-at-windows-startup-and-each-time-microsoft-edge-is-closed)
-- [Allow Prelaunch ](../new-policies.md#allow-prelaunch)
## Configuration options
diff --git a/browsers/edge/images/prelaunch-edge-and-preload-tabs-sm.png b/browsers/edge/images/prelaunch-edge-and-preload-tabs-sm.png
index d64a08644616a09fbb5a779f4423ad36a9ed3c4c..51dfd7258aded94f7ee0a5dcb88e2236b3b1c2fc 100644
GIT binary patch
literal 99295
zcmcG#1yG#Z^B_uq;2sEWg9LXQ+#z^?;1C9P8(f3C1$QTCg1ft0kRV}j2rj{Ghx@zt
z?ti!Tz1_D}Z>py1lRn*j`ka=pyHB`^k_NSa_x|Xw+q5{9My)6sK#NNo1#og8c3Jn7zDB|t_
zGPX8#rZ6%!x3m)ioV0cVC@f8c0Giy2Y>EyNrWTg6o=&D}o=WP*p4P@d6M%>?g`hh>
z6oIX&Gl;_7*2WIZ?=A%R3ok$P`sFbzfZ{I@XKNvV*b6}lEkzXy3413~3T_r2W@C0P
z4hmi%3p)=Rkb{eff`g5nmz9l|m7SBBjh&y3ho2Kj@%Ik^rRHQ}#;+oe;pn
z+1Y`gmDSD7jm3?V#oo!Bl^qBKva)foa&Rz1A(+7)cFrJoW;-y|KNuuU!NyLO4$hYL
zb`&odK}Pm2&O!hvr~jFPt;4@)?ZAJF2`VsFcaQ@sI}6*(l>P!VG5#0M!NtkuFXAS~
ztfn@mwx)K@U??p6zpxG#_RjWT3;X{E)c?Nz9|%B2tEl)djsGPtwzmJ006R;$LZ|V!
zK>nA|V08}%Q&v?|u)T|uv8j|RlufFa**Ne^IGKW+?VZ%^?QQ;9D3yO$rjU?$Sr|SF
zI!#ME6MHu>{eKx_DhYBn6#~4xXJ+GN=HOIkXXEGK;OFFl-tx1t{RdRh-o(<(<9`C>
zR)1MwUVe`M5fr*>OhC?{|1GeIF~6C;lPw53XG>d0LrKcA@)h?|$2hnbrP$j;2m#bw3};sF{ln;5Zi@v)h)^YEAf{~0f7Z|w523;r2z
z^8azXvXdoL3qdyj*LYrZ^JV++%UXh=3+wT>_NbXU{(WU*N%7Z?;RhMNXo3*H_+<;2
zngITOZ25mJf&ZX&voM7s{eRgP{{aKrn>o9IoJ_^cq0;(4*?O!{{#jqt_CHf${hw#~
z*Sr6s;{Sj{?Z(UHzXl6>^RLM>wS(F@C#XSFf)mV#dF5;QUQ$fmJ@YWjt&LRbcA(R1
z$+nrMT|!p;gl@)5M)VN!ds+oHIGTb2#zxYr7b`@3@Eo|29o|hDk-Dh6#mv1q+XaMIrhbrq>@;^0N)R
zJL;)51(uS%s>Y$GV
zWUFS8_xV}GNSH6Oy~ekxUlWbGK$20wQaR1^Xc_v=1PTA=Sea3+*nDu6<-H3irNRFG_9=JFwZoGaiVm%@zUE
z`(3)3RqHX(RnqPm(bbwlWT?en*So~WlWKWTQt?ia5
z2%nf=oJ$@&yS@00PV>99;lVtYeMUOP5x;YvgbAUxP?L0A{Xk6+sax;us=5p8`066g
z_zae#<9K*>BD}o(SP^^v)eaxlB;Ox+Np{SJBW3HMI7iaAm8HgWqN#UPk*I|=RT8=p
zS?`MW(kIX=GaP$}U
zDnIvdjBP1zy(olWXm}8f#o;;KQ{zwQqMK*H>v7ALFO;5Yn<844dK7Dyqiscq)X`i$m5vzrU)=slG}*<=lLl|siOYA*_@
z(<&sq0CoON>L>ydnO5+NLgfeU#Z=M*!GzI-7&)Zo$Iz*S&%ll+FIX{TA4EA#?t8Z2
zP&TB-?SugX$Fkyf7Gnt9zT4%qZmW~l*jPEt!5fYutRttzuu*3
zXR&_`wlu1jCE?4V2$dMuRt*aoZ5GXU#h>QNrK30)%}mE(j`t&;WO}+X=7N2;j58!`
zoZXb1n@l$Ef226=VT5V)SLuwGq7&Az2sU)YENjeP47CvWlw!G6mhI*eI$~twncJy_
z92athWJGxX87WYoU-##J;naU{evm*xV5Pk*CeVBU=&lja{D#As_K$D9cwNPSm6cCO
zcT}%_`F^vHsgQERpsWeWv9|tXUhM`6p9JJ9`>4rTQp=
zcQ&L7_`*F;TC
z43nDXYt#%+W%G;96rXG7ZnukuN!447QqG5EyHZ!P@1dysqr$8QWh?Pm3ZFRN~i`}
z=#%~m$68nMh*lq%leAtKevgrpWH?z0%r`}RnokW|=FDQZ(>9pwJ=ouq2P#yi7@o)j
zov9_pEQTD`qToX(A~-vNipp~7P2z+m_frVX;!oF1LAIzKkU@ILB%|2S*I&3JjpC9d
zbNWlnGp-|bz|%SbMB4fH#+OZ$8nNFZ<45=vDkrhf#oSbh)}b4fM38Z!n{#u_ax8Jy
z!ecw;G3(vnkUp!o;=-)_&jQfdNOw=mWYOezL@!^btgUIPgM%g?524sb8OP}$z(&=&
z&<^icpu1USpc!rIYFr*CA>dd-edKby$CJQr+3~aNkg2MEvgE*eH~Kl3G*SxvrM5T*
zu|g)Qt{MqH=fo2y4wRc2(1d`}MByryqenI4h~g-*d;7bdwq!1uNkWs>2Hdl#_=K$#
z#tkZSJ*T(9_${+1
zCdk17+jCmXCz#;f5zk|tkCVhcAe{pf&vPmP-&D(rlg
z3e3d}CmxH&8kSiZJwVKH7QrZvD>c&jP+Y;lnW|fmt_IiX=@LnG1g>{e9Gnk5ca=6&
zEwa48S2!Obq3Ms1QaYGp*r@-hu<8l?JGV
zS{Q^uZmLS4niDF;5_%t6nJ!faW!X@=Kz+r>GW3119;=HCdUaWWP~N$xVo*DMsDGUq
z2z^IL9D|wz<6x6g$4L8%ov8U}Np&{(GW!05`NK8`d%CZt(Y|Vk93o1Fqa0LWhlK1
zp%EygZrQ(1!b`BPE`$kjJPN#5!S{oh!{c#b{=?W%Qg)&Q?ZJzoVk8_%U{@UAt>(o8
ze9ZkgN^pyKgCW;%7`Z|;K0^Zj{hnW>H$O{}f&Pl4E+6srBy5bQaSuSALw^
zn%Py6W+f*O#pbEASK`ZFR`*f}suq?Qx?nzPzY<`wQM8}3P%In$GQuw@!NTe)(`+my
zbX{3m@D4AZ@{l9d(IVPx(XEA+cDb>LU@Qzq@!KetQ=&cS{u^p5)Zf@pXh0*VgacCm
z(_zY4ok<9dPUvI=XDxg5rl_&jruWK^lZrGVl26S9uDQch_=93U_*~)3Rg7J(%U<+z
zaAp;WnLTAk>#esLO_8Ctr58Yw|DfvR54^6D?1iLP6d^jHYgXn~S`1w|0@ZA&J`N$!
zj9kbqPM@~ey@PQi(E31YhM1OUV%s{SU;Y=irz&M}Dxo%gxBct)ZXA69$y}Vo9Mm<<
ztf?bbaRP?Y0X|;`EshMnO-RyY4^HRY6?Or1^aMu(@E6PxC2Z07*LdDc+3z@~7c`+Z!
z=PQaiu{WwO*^{qj+?(HtBVjjhKY|QSBH8GZi|BPcVgBGG(O(jp@tXduq3`_wM%13l
zEMBm9%qNSUqdM4cvXv52{z+)0pBxvfF+FdlEVpeimAT5snZ2009?Vjjexm=eGtc-f
zPPY>h@VsA#9CP~ZsMD!Jde%sO;Qll2=25iVk-ADxnw#~m;AJ|4OtgX7PqlT(P
zKk0}3^_4MjEYu5Sks_`IPte6y#8%gca8N_k5gKeJPLt{1yXIteNgaWVvL0Y^Y+}!T
zde;9+{d%;t+vXzoMZ%0Gl^`J*L~(TL?k)SGAEj;jO
zz31l+dMdMZ{U>k8yQYuKCA1E8bEvTDEHy?I8tWMZ?D?8-9(^)&gCl7
z_e*IlA-Yd|_P07lEYSU0JD5mKDU)3RwLbR?v*6_se%gg*=!65dAF;DfBDU(Y)Dd>l
zcp8_t;B)O$X?EXTcxxu=CNI=FQS?9q^LA@Oc}7E$ZdEqTh--ssPTbf`fgnCH$SaY&xOgJX>>5iI9R_
zjG9eJ%NTx~JoKkv%0cco1qky45^bx*i&LSf^&p9nSS}}x0+)vsv9}Gy%`U;X6j|Bf
zWm$0;M2bK9TA1z?l^w=1#fo{&+)ebOOntDS+W{knZYMMbBn3cds*?Iqrh
zgy)}FO!yWtX1|q#n|>8kTb2J{Dj-@vLPRXB_llBcd^;l}PlRwh7XWoxty_lTc<*ijc_Cc(MM^F7t~YaQ6VDV-G4=ikT}
z8Kma-^SB2al*f7>C$pg8_Y83!%i$MS?l-@n0cu(_hf5_v*pwlc6rrYzA@{qhTT6T#
z%g~olii>lCvUbA;NU7)r=*#E6TxrP9-fhW;A%>61x?prEGVl&G6eo
zmj|jivdGaNf$rup0?KmLiq;WQ*4v+t@Zfucnf=^mD38iW@g^piXS7pSDQqqM_$8SN
z?SJ#JRI40kSD=V-<@`G
z>En#CUmj20WwKBLZ?wH4>S0-6wO-pML%;ETiq@b?9OIu2)~oHxZ9$%l6C_1nI@ko!
z_SKNE35gB)-)rnD!1mH;^p8N2(Bj!4<@6gGS)Fqhx3~Fxaql#l*nj3R_dDuZO?9|^
zByFs;Sc~>&LkBHrZn8stMGO)1??XO;h9X&lPLYg(RZjL|vAtjxOVgJK&P(qNYiHXg
zVW^fC(H1oDCzJ)QG_`>OJ?IWg9zcUhj8ff?P%9M@wzRTdyK%?^6r+Zpbd_%QkrKkJ
zs4UBJ+Yf0e_M
zcCM$HNDQ&~slwZU>Asy?nFEbRq2a50G1Nxr5E0rx&0jYFb$rMjK6m_4smy3kcDa1~
zI%m#jSllsvIDqy-+Z0OsJCt^jFDb*ctCR3|dJYyr%g4ZlIrdc7DAU50b1!Zk?LylV
zg&>P^;xbUpsnTDc1yF1K8w2|X0y)qakGcPx5kbBVVdl%=Zzh``=^J4{M~u|$wfa@0
z1=a*Vy&1vQRK1m@rng7DLeOMOv|OEZj$!k+pO@uA*eveF!FbRZHhRFSu+NIGO1zVm
zlqea7Y`XS?@ri5@lGki{W%Xf5jdp`@fmn<$)UdsL`v--|TkE?@*bf8VNB}lvD@jVD
zN_5`!XBVpXK%<}+;}tqTkIn7s_5CwBdJxGTuP;9*5tr8|A%gXZBo|_DqKAjLk&Z~<
zRiQXEyrvzHR;ma=1^Tv1$|G^vdx-7md>`q+qLfLWgxYP}Y9?q_$GucQ&aI|SV@`mo
zzIHsS+*KorI)(-sPS#FgV{QUCrERFLTB`#ZMFz*tuc20zh^lBigEVmo8fqG|+$%(a
z`wsb*l@+jgG1@B!VozVkdK4FkMyfEKsK0HAny1|?i&kIy-fsJi<cw`!rL)T
zp{nOUpNFFbOyq)RNWx1)%fJ9>hP&<>G^@@;
zG%n~)UyWOT_^R9N;vsaA{)1S*YXM+`czU0jT8OG9!W_O2UGpwa(WcrDa;XnN(Z
zn1y{b7l*U2uYHR5_G(orV5E#T1U=MF2goZKbLnZ3S14A7FNg1n>U7jrGu+kN3g{1G
zVVqlj)5vHl?bZ2qr%Jis%TkRpoJ+b}@!q*rqgKn#6Bd8&fS|r;nnsI-tzLMvHtWNL
zXIoNni9B^3Vf|m}P&&Bp($-KHVyp858g+pB>C#%^;E~vH4HUKRMN<66}^k-9~kKH-(KOcXQ$!CvI+t$~K{PewUW!l$oD2zw(2?~+Tp#`rwy1Em%S
zx8fpsd&b~(hvq*SX`Ntnb0^3?zrj8k@uv#xHx=j|ni^hnST_d$(yKbO+`f_cKuKa(uo-=Btgv8PD(7Wx<$rzCdB!4%ZYZ#3
z-__&DBJ(*q^wB@Xf4d81ZFf^Q69lrJwQD5Yb!yYDCNG1~Z|cQV_was39c;y->hhYt
zF0Eg?Ml5iuk2a^|xiP9N-Q50g)gKYHwUexs3=JpAbjeA>Pd>umuvNWgt6y8#0IMWQRHNzvv3Lpz^eFjdfYQb_CJ2i=cwFM^2U|hDTNCwK
zIM@VY2_><rxa55Lr9O`g-mBd_0bF-jd&0Ihf|v_grc
zS3WnueyqsXTDlIl9H&%VqP`e6yHz5Eyo3Ji-UIYqh}fka_VBlQu!nGZ
z62jg5a4vg;{*6%-&*QHaC;&b~1j3u5g`{C{LNqh&-KWU&qTTFWd-=;GYMVL{)xD~@
zpf*%?SlpQM`T!-cLaa4?+*|9KvwnUPv&_G;g)$v7>tPB(+W7gDDMLf97Y%L(ND8bs
zAk|8kRpTCc(oAy!T~sLaxPY`FbzR3NOr~n
zgt)Cwxb)oaw;Q`g_)@hXYY;nTUygAT8z4gGVVN(RzUVJ2;`Vb9-sR{b9a4AXJmoZe
z8emfY9F4Jz5d+geZbp`jTVY<3eC0Pp@)!u(X>T@+0kY7?n-Q-ipm85*!U=R+k&2PM
z;3g)C(qk~%)QzeRz3gvs!`(ER!|7(wOvcREv^3U>f!T}*)Z-%kc_JU&C+N+Emj=
zQ)N&|pZlz`4W`H!6A@aOxfE;|nKs$GkU~AVWlW4hXnmj9uRn)*6B4R*S&5;$?-|}_wWVJmdH*hvh15iwbveg$b2)q4|aR)%&W%P
zmO0OSI@!9&>Hf7ttk02qSvz-yjlPQZa4a%JUxnAW*Z!d7Xrr;5KLQ6IzR@y$4ty(-
z8KZ$DP0+&EJ^vVEdcFk5+@U4+P3c&|<@ktKhH}s&5<>O$PWZetwm+te{Dc0YH#w(A
z;z6uSm^%ym^(A2N#4WM;1a0lrjOVCPDxf_qATs@K5?ra
z20#2VpuLWHE~-PjMd3L6%+>41X1Xu&W*(Auv8{rbi7a^HaYfoCFn*~T`DSE2q3d3-
z6B0Uha|QfP0rsuND~>J^IkEF4mr`oz?3%icgn>w%cMESygCVj|GhoF9Jd|*85<2~c
zaw0->OSpVeOLp_-T!bl<&||Yd-dE-YH@vGD4K$~0IK?R$A}UBBqyC+6?=(MXGbATrucutU*Uay^E%@Dxk8%x14PJA78EE(A0NPNX?KWVr$7tz(phv%%F=Uyo|oii7VQ|60`?k{dg
zpLhp9sb)GWNV!~nTw4TK`i6!r9avx;h!ziQe$Z_tucx{nllXw>hXVZhjO%hIezd6F
zbe&BIb<69rpMnk893GB+obDUgn6weBoNp*WSCSOJ?A&?i9s*utIX$`d
zn~l87#Y@Qb-=dLpg@pHbcq7aWPGX<^`4M3dMr${jdzB>q=DU5qm>IsLN?AYrn$87T
zIkvxU_)<6ibl*M_wKd8aSTbrJPPqVix8DLwCv53P#y@L1cPG?Gr6h*Us@9KpH}>^6
z$)jB}upM7|Smabs!f4zBe_vaqZMj#P+fDkdAIKspyre@}`smJT7J)_P+z+RD&dOdY
z;Wt9v$PM|PfFI0dY)-t0b{TxMtnf+X-SbJ@p_S;-KFXSs$OU8HetYzaYn{>v6=*~~>{3?6AcX%%%ob`+?ey3&zC~PnX5I~2`kX;n
zXG2k1-gK*430xK|NoY_$ero~YR==!!EWC&)WJ7^VC8;-7WsEkixF56OxHUqr69qX6
z6XyAhUO8{k5qQ^-lHL{xw0_2kKl;Ae3HU~czH?0pI*4A_%Do=R_g}q#_)aCJ!Pj(z
zx?+1SkezpOuMIwF-f5)Ko`>(mvXsY=f&7S6PTLgxb3C}Nj50`+FqQiUhrvE{cWE&!
zQ8<9B68S-*lEi;#j>dxRq8Nx;AIuo1;
zrhFkjd0)BYmwmTN^ya(;hqK7cygP)`cBGyh!1eA6)u_RknC-fO`qx##3314YI9Jzm
zb5D(o%HyQWQhrYr2Sg$v)(ac?XI9<~j1~TUUdz>nGnZux-gCcxa@Ql-jdyoFc^>-_
zButO>`&KZTs%#+UOvSITw;}72?~sgCfb(@qU{zeV%IE|5F-;3>yQD&0H?A<@?p>pqNinW2o^k_gRzmulIad
zyK?mWxtLi!eFr}jJmIDgAYH>
z)IFzjZk?92@cNOct(B&ecqvvWfYOBR3A^QUW35bPOy}S72K^B6
zMz59+Gk)MCPizcz8Sz2k)mz&gKAbnHk4pVqbVUyDaHf{OD1T!zkUFU+wIUAInWCFP
z6A8L2BNuBTLLc&?P}2sb`+Ru5MS8L=hB_MClI-&Sz&%~uFN~3!<7a`w3oYZf5Y9wB
z|FNJGvB2vm;e``1>U)a^#8Slg-_H263!!ha9SNOGf4+$~5dj~M?h!YzJFiDZ4$YXW
zcwJFx<|2<+6~SwgY$I
z&|3WDP9y|Mo-xkM0+YHiv>-OkFs4Xhm|V=HHBQf8_9)4s=9AWUxUj+}y!uU}zAMHd
zpKaDH8RDPh+6Aj>TOET#vHn`vID{7EqczY3b@QP-MJ~^`0W>N2F+VT<|c{{uy31F_v_es+_$B0?R)*C%(9HO
zAd#5)+7GX?!Sk5C$_c+iCjsK?yRDjGQWkE9m4q)H^69}}7EKi8>Na6`FK_+!Q4T*GCLqwnUmvxwmU*1|7bfS
zkwh1Ex&<;(qVwxK_OE)K-elO9KYTYsc$-1^vXl%FZ@{=6*fD*pmfp^HLlKG<)qYY53kjggO`LwesTp@Un%u|
zy59{w7@yXaQHu+yP-oMK?96RY4OjE1*P58>7omvuY4%6O{oU%2Gr(HlU!Hmri_g>Z
z7f|!FN-XKhTEPG82X3-BN_2EE
z{O{VKKU(3#iw*u~I+f;wfs3zqZT*=3e7Nd;Q^F#=1~gA%PGXQ80mQpN6Orqwi-FX&
z6Jd?^rFi5OcqQGL8^B$PSL{P7GI}C6mJLi-5?j_pMdKRZ-t(?}R6&hrxM3a=F*T=d
zA|o;LEi!DhqmyP}t^m$j4^->s+@#&eb>mbxaUuw8l2!T~2#0o@Am6-66QN+v&Pi`q
zZG%Hzw`xqPV)$beQ|OhpssC~7mV^Uer$RI#&>p}kQ|d!RI=l0v(SLC)M*C}VE7{bZ
zi7S1xL%mUXZC$-XrgZL$$M7`#)~B1V3>T+8{8!&4bOu$ce9Tc9F53S{Af*vsOD0S*
zV=tzLJ{&!$3>yX3qj6sxOIcQC;?Mu#CkZf6w!_iFXz;O#9*Vn8Q%-KOXO+Y?|KK?`
znk(jAjxyqeG()1%a-Hw8{*xG+N`x!#{qNPG3X9I~5*@|XfSIL_EyPlOx6}n8zh$2e
zBL{jbhp{)r!C6_E8cQdiC?QGf++4s1_B#we0%?znILADieQ0;o7m_>=EUQq%dJ2$7
z{jT0y^wfTvAYs;??PBKVeLmpK18FPUt9zq8l)xsV{_
z$Ge@}V46VyU^W;DVm;L6g!6Q%Svnal-|@P8q+D)!N|rk(sRAn`Gd2a%NJsPBIyLfB
zPVq45kN={2BmZQ}mz%VGS25!u%CN9Ts{BR*W}`bnAO|ck^jMC2mRN%G(ZD2Pl`N?p
z6}uHNPVk;i;x>d?v&bhuG|%{V=ydA6mtcwK+5xWrFWDZijr&4r7n+s8jeJybLI
zb12fen|Gh^LKv^gVIe|{zcJzc8H1TX}XqLpb2B@aM$*BLEv&QYmV
ze8ap=?XC-}eOl6g@;2CP(qoogZq_iyg`f%;e&lbuzmzDKdV<+rRzgW?T>2a>lOMh$
zKZNUnc>en=`Q9SJUQ>N|jR^4kX!FaaV!WD>28Kt!K10qvTtoG#FrZFIy|_O{#beo@
z#GjcuG)Lym;JdiRd&({OeVVpUw2(SI+htPg2XYidM`j&`Gr`+8DTHB$ctbFBCBrhg~(E~
z(8y3MwQF5*>*=1U?m3hQIfXW3_WLS$2iTji5GY*S(ThLgqmD!h5NBJbRW%ViIzDfJS0|YFqceV+y
z^Ym>(PXk;_ALF`FiOfev6tYI_l#CMlVB6^~cF8mxlVf+6(Y(8^?)$MdW>gT|8?UU{
zoJ5aGz%S6q+1r4U{l?fi_}vz)O)?;)KI}VXo{90*&p5<6NiWur-BKk(4U_}M8hyO$
zLpcxdcEJ$j#Hx;e`YyUKuGs{_kZu0hUWP8qm+c;yC%+KcJ#o_>uws?Tu&DUTiI(pK
zZRwj9Grpx~Qx&C51hYhAYVWByHLipR(bVGx&uzC=UnpmsIU$ktcLJN!4LP3%rfeF&
zkH;2k$PBE!TPC9k*W7%I`<5$*pfaw=SJs3BY$fu{
zx}I3xbsaLaeJhjGAangV_f@XAOy~g_-9dz{QzW>-nh?YbgPX@MIYIAJXNVZcs+sEh
zD*fo`Q}AyQ>zLIf*XP2PIXQCafX*ecC8eVQrw~0fUKJo^gZxT6?CKpGUdTJT5UR21
z<#{F#7W^mECiij=gHpn$28+|u*~&cC6{+p}4l?VQ-bJjYHvbEO
zp7b`<>`w|n$KYG)z-p&+9XB7Y+*ndSeZxh!Q~m{5sbG>-iN2Y6?}s
zeSWxV%4EGruD$N1LNlzhO18UJ=iKzwAP^P1F=3=o_w&+}!w}xqn9sKO0EvX%eX12G
zE1MA+5hm#tPB=uv!az@Ki4Fx1)JR{m2eR<)5&zkt$G7y1q)jnm>4+)wCVqV&qGs~)
zVDl;?MMq44SPD^=(^;?ne6tN@F~&^fp3=*W-6j-p(C{(t
zYjmU^E~N8GFX%#pM+?rRi?2IWxkg0Fh*
zhWgwId%;NcwEc}3n+B+ifehh|Tm7T5qu2To8GAY^_rBQ3D?L?|e!P?IDI1sfZ%tr5
zNG!WhOm|9m9ug8`Ed0otf6+mWb6X_yL^D#_r)L-2;R`3ZAa%`rj{g6x+m7GVeKLh95qqE#K?OXK?tw^(*Rgo^AXl_U3cX
z(?XPqN7zhW)KlP)Z(f6gb%cG0?R8>XfnUM1N3%T6Y=cU6`SfkV0=7lfJvR;kV?0EK
z(oPEYkNwb}`ts&y3dvO#$>lYLK?tsqkNC)VgG~Vo^#`~iN#OFsv&`PFMse6nuM)D=
zljgyl4=f!?%xb!6&c0PgxmpKG@uU_lx~($SxP
z*xown&=qs$3zJySIpAV>=aG<_uG2c($E&*?G56|9K+^1Ro)ACHYl6Dbv94cxi1+Au
zO7xa;@*+ku;2L>W12U=d(_T-mcQJenPDHBgrV?wtWcE9w&P9v0Xp6JorXn^7a0etaB%1F%t*Qu#w|o_X+82o
zhDf@eA76iFE27V4PpWzC*@B92s76>PaedzR1ZxoQP=em!WPmo3&!Qi`rBs%9Y4O(USJ&~}mc_OFf
zJ0{7^VJj|=dsu*4u}o>{mC=?E^MTTOn^O#kkc_Jqi@#7E(~QBV}_(=esW+Unx;l
z=F$Za(~!)$O{CjMd?m}FA5})G+KA>iS0iZqhW)VHNrBNjdc!F3_IU`8sOQ&LM52z#
zN4$Q
zjAS6pr#t(O4&{h*UVozGjBxv2LB{3oLDm1A%Ogpb9gp{SMCA=#aI1<8)3)0=@gIXC
z{>j>6wBYiyyRlpRkQK^@x0M)=coKms-*|W1t@Z^M?I}vH)3%Q;QjY)&mLv2>(5kBgTb5p20
zz-0vAiH<0{oSTWhj
zQd_JikJWw0s;clXpf{QC=;QUUeQ8>3^YzQgMioYUt>68M+S_5Kx>?gjV<)G+Zs{y}
z*477DE;yD3rZzew%AppPU1q!Oq+_IngPMX3+qU>B=H|s;s8QbGcgs^Y-oPX&6
zF=oMlZe_Cxmmz7JgzT?R3>;580hU_;#P45Q*0Q#%P=N_EMhwK6Jr*Hvr5`U#XNE7>
zLRTX;BZ{M*S{gOX
z?=}UL-$Md@;=HwFTs~aOg9y{BNOpjYR5QNj1R45lqB`>$k^?zr1e-aSL{rq1L3g4>
z0_dMt7t)Q$i(2?xuNJ*hpF73uywa!pR%NenGem8JX*ubgOe%2rwh&1gh)y+2nI7Kb
zDk}A&b)LY@=vD4vg10jHKCR@1UY?!G@{Qj@D}LWlYtuPaYTEoi3I7<28kj~|A$>VC
z#2qXX_uhDwFJ*H)#MENLNwPWU6>Jpu7wu3JgpN)bUR2$gx_9DK>~FF~0OU-A{?I0e
zdj;jH%|dEYDn^Bu3hgYzs@!e#9JJzH6%N>f9?Iww{_*CJjh&mp+pJINI2?^jrj~@A
zQHYfd9;CLKBo^(Nt$!HedenWQq|moH`F
zF6pl1oA0@QHkj%t)&lAC
zT!uK>azViacmdncY96%rkoDTei4o<6%iDGCy1s|VEu@b~l@>YyM!{KwNE$S+=^{^5
zZfW=n1$q66!M2Nk#CE7mWOiDZ;A
zRnlI8moQIAT!F6!@ZN8Fx%{jU!x^}?szaJDu}w<2=$C`<(1MEUCvLp7e*heGaF^NV
zIJg6z8-pV0@oOuIr-IZJ?GJlSKP$RFT=Zc6dq~Sx3sT-|j`@Y7L$e_K1C18&Qw6n`
zlHyF#ir&>1jK9Hb7=B`1TP^MNw-Z5Y_Y<-12($~P(5_7*3cUY*s>>D>crtfbUE37R
z0O#aCpE_#Y4kFXm9qel{Jjnd#=+}{9h0k{$L34F5IFCDd`}pH!+Y)gRJO6&>sY2bd
z>t~qlQ_{7@P5rRH2B_!~SVI^ip=^zRNGWOuy)>owwV)mE9jpk47|loF$4JY!@X{=s
z6Wma4Q)zfP(mALETQGn&ca^=ZKEvicetuIUFe$jnra3tV!xM6_qu_Mb_)uHM3t;`(SP=H*}
z=`JKV0vH$P0i
zik`N%o3Fs+mTN3<8%z_K77|zTd%yO{TgCvEu@;upyrlkN!UUBND1ybcso@Pd)D{fnZUM50fIGrz)Q#nvAi
z)19QS(w0bX1c)dO#sq9aduSeVWfuWmwse9$K122l#>e*rQ>cfp+Wa*ReR9WI-vSV*
zr%*bLD2bl}!>r)vesB)G+hNG5Yc1fvZhgY3;+8o0on;Z1gW!#FgY1Cn5ZLTXHIE#>k<5*n
zf5x9~TqeY(QP3v-uw3Jg=A#?=I5o1UAu0Y{Iw8(B9&^Ey3!8!KtQ~XiM1%I%f`1Ox
z7jEMCEQGqHIt=W39%{sj$Uc5U@~spXIDq!{*5-mgIKDz_M=je-4YM)N^N#n6GaOEfFXNBoFRYT0AbPgp-3N|3lw*-0$!g{Jd(E}Zs7IHC>mv&X3pfP9g-MCp
zElz*yQ%wC+q;!{)U<6%O;ZTI$e%aP*r}*DwazDeC&3Zxxmx8-){~BNpYS$CZUh~+TW}Xa
zTHp3k%#5{>x0mN=>|hkq-?qFz=vR`3bLa0bsCy=gKd+4UsKA0qZtcUoRMqfgFFuBH
z*}c^^#O^;Zc{MX@LT6`mM{wtxEX$o|f3Nm{yl%Z^ojkH$uyeBxSjaJ=`)!fiCcTGP
zV#|8g+<-B6AZ%e;il0o99e`v@*~}0`vtw&IgN~2<=bN9TNn4zrw%%u2JqUbp><8_a
zhPMG(lidEkb~!ViZ`Q|E$jJxd)bOK-J%zP-@qAH_KwL=j#$S9Gi~F4L|I5JAQ!6=7IT9xvCT+hE`=>B@Qoa|
zY(e)CK(4dg7PS>x{bHOk&{Np~?&kVCYjod+HD8ICgfIuAIUt;CUoyQCeYq;LAZ-hETDivOWwqTQ6R{1?tf
zSd)n8?Ul6~?9Cs7BpT?d8;50{d<@9q$v>G3*~PpbkVS%?sfHf3aajk+Bv?oWT2yPB
zP`*t7CzC2_$!Lj$9?2Pw$G9cFzYYT`{mB$qBJtDf24|l)cM>tl5Ou{u3w%ftqxQ(!
z>#(r$IIKndvuVc7RTw-IKO3^a=v~=eCk)>6Z_v2ablyFI8OAmN;6Ha2i~MJ(|Ba@z
z4v4DzzP@yK2@H*NcXxM5cXvv6NymtEhe(HX4WV>*m!u$_!w~QIe1Gr%L!3MJp1b#1
zYk!u-71e%ohQ5ms7CSTz}@Z$rLx->f=YKI%f}@V&G`y6URwR&6iSx`
zW}TQU!HfiN>)?WJ>i{gT?r#Hj-rUW#0Q+QhU7&nKP}5Za&oSW;elDtWII=$MqWZ2>
z6jrX2y8l#1MTjrbYyV|S8sRc5R>`OoC+nI5C!WB22UB**vZ*Ht!Vn|Kq|=A5F)k13
z=R=nQ=@*Xw%19DuciAr>tfJz=GJOBch5jH%ge;7Wk;K3g>0M=_Y4L<@g;!7Sc+GmN
zT8W>Y$~=PcXiD9KkPgv_4nD6ZeB+RJYezh-_i9mp>MbR(GnMi|Cm9(=4Y}hXaj`+W
z&3~$973
zJzpTAyITO)0a33+ah3?E=+4TuZ98NA6K&nLOTH4FCYn|K8w7xld(v`Tie(R1B-73#Z9KgNWr;f)=TuB#r6-qE4K9~3#
zN!d<1-DqaBUnv?fj&wf`bdcchIh|1yo&y)|In
zP?5=b)!G*%%DsJ)!F)YsAWy0O!bOpy0=2p-T`@KX&$?e}H(P!ZolA5{+H!y~)O_;R
zQ6Gd|P0on&dT(IXcErr8UK8{W)v$ou4bl^Cb;+wZ10B3SPr^*~pvp(Ed;HMG467_l
z^iZ;*@gKfgQU$p7^gj
z`qqa5sM+^bgB}dlLtQwP-6YX;R|AgVc!zL#Wl(g5iYvkCX)7Qd_Y46&bkP;sjt#+>
zZddF0?8&%1{A@tcC5(-Rx{|*TgJ3s@ysptmcVZkK(WdazfnOaK3Oe6x%0{c1GgASA
z3W=B5(6@6loS(pg<{-eG@&!`ZNr`8~1aSNUXTa=U^9
z6WZCx=jEEnTSzLn0hjyM6W?{0IW{YO9q$LgRVJsIAG^Og!@3}bklfgSI_ZPHRnK<|
zcCc9DpgB|DERwOl{ad6E)qxt_x8bIwQ;J3eqDTp|j-|sIq`uHg(8d97ckToUVq8i+E0z-tXIt@l%s!h(D>lZ>FdsuQ5>#!7c<>Lc
z=;?=bGzgst-?R}N{u$Dz+{40~f9^lA$WIc}a;ib^dz$NhR6$h9!YQGjHn9%-GB4y~
zxhTCUCvLUVEvGZ+JqtCrkt2-$s&|6`?Tr-M10vnjCB$VwWkwNP_Un{X^6~-VYc6(W
z*L#d#Z{)i-F_A3P0rXm8I>Wx$RP4`7n+$&Y#5&~&U>eVp`-D8Vwg)gL^+SmFBi6#<
zlw62U=EqAF@x+X!#U~*`$5~^g@d&Z!y$}N#&9{k+(eJqWC3+LfQ#s`+%${UrJt75j
zYXfeYATpDPiPnd&ibVfyLV+R^aW{x74s(xSQ-ef>_qN6>0S2GP*!i;iL=O#?g<nw$fHr1
zjCg?cr8?5B=+U^V#1~7uqtusig#(Sb!kL+{y0N1zqS@<`e|P0$X|ysJ&EoV&?M{$5
zR~nm)%R%-2$scR{=+~4!;Thqxehpe|6bIl0oeWibz7Se$8BnTnoZ
zoBWOk;lqM~vkdCP3yB*s(c|0;`|C%___TXL+R*2F3=Hg|0BdfIZPZCQo@DczElqiW
zv6ZN-4FP1~h5(LB0LBQq7AF5*@6)j@6B=*hd$2fI
z^wgMkB2*2OGB2caub#E-lDIKSro*nM;h(xps^Gs2s+V=94
zlMrhKI8(SZ!nYjg0^bM6I*U)1M>&(^&^cjWm|?|E8K@i|`v~kziatv%r~f&E^dM(F
z*A$YFjtxL^@Ke6ajoa6?NN(}5fF7(Q%v9oZx`|T}zBJ
zA>CB84c1Sm1oKQh^SPj7vrL+Iu7o7?jv5#IPKHBX?i6V4Y*Ew!)9&zditmqSz)D-Z
zx#9YFJk9a;I})^rqml}@OsZvS4jYN>dbEg@0_ZhJ!%V>@CQkN|_He&Q%wv{r+IKL-ZQWzvedB5_E^~|9$Y!x*>GeCei>32sS%RBH4Co6&|EUU0lbM26W
z?mgMbH&g8NjbaKBBPDmSM^&3LKWu9;9goy4L>gb6Ky7uCg-2~E5afr(;t%g5fZDpD
zeDQ@u=e4+Di+c_EihMEr^yC#~o^lnb?G+wzO*Yl`FS<5SY(oU{NKfxla65-Tm9v+?
z#G33{r40Kox?|!~v+(b1%N>i;{Sx%eYB9N>`heB59%=*E&&4!$lCmqE&IN2=GAEBA
z)?a4s5Ltq;zrf9iVA!6+sy0#azUy)F^ygQ_?Ksg#9jAy?K_%}-)&;#|CQnua35Nw`yoN%5oUc~Nzm9wXgGXAyD^Zmn$
zgVvWLdHDo_J_<9AVWgoJd}s^t-prbNW`#~_uk&(k(|tahj(xXyg=ts>1%PrF??`*G*f&tTIgz7xvYm=;
z5Sv|!kA8JooFxR*?HwCT8^Z+_ps$mo%(s37lY>b`f*Qx7N}n7Hirs*!rx0uI%cZp2
zo-c6JOh6%r%#o7~^UMN*%E%!_CiUUdxe{5@A~!OYKxCoJIQ+%7fy8|C>!9GDXUVv`
zNx#e|ZyFvQzg?JCKGZsWCN@ei-n>y>{0U>GYnt6$ko$MJ?Gs>eFRHTP{zH1P!w-<+
zN-Ge3fwxk$Ona`xmYas!0ux(Z7&=J-<@}_L2|+;`K6zQc%c5VLH6!;?<-*PTE1oP7
z7?S^tV4W5w26GHUYw|>TV?B84CEBF4+-R{q3cTdLh3E!r9FY*loxVBQp=mopYc4LJ
z&77cAG@NyDo$T5d+00n<{71B`#z@4zzz~#&H}a=6YUhjR4-?yFv`$6J1`E)WGiL|4
zf=B+_ny4Oegi|v@!N6BUeMrt+IWDz_hgF@@ZDpeL7B8Ah6R)}Wm77Cg2}UP9el+X-
z*H*^dISFwm{wyB#GFp6H6V)};j18VfK0WO%jAf>za$yJzt6^^3rlG|Qoa++L{!@gnl
zpFUK8=%>be+IZI&+ZgNDr*t=a?yPYdRA2*^l}KCuT4c4c|9!>`hCJ!|T~52N3y#s?
zegqZAQjOq!q{uF7)@I*C!I-R?UhV4V*89o5Tp2>L_H_$)RYl2riwlpu1Afg+dtLdq
zf1&nHZN3c;7|+*d^%e$sMNT{H6Au0Gn}3E4m%wGF&G>;tB@6lHK3t|(VT(hxm~AE-
z{c07V2O#X53S~!ev8iy4<)!of_WBr$12H#nz8nlFNh0bjg|dv`WvV^9vB0AnANQZO
z?6X6$JTEbkq2kfc$h-cv{1ep*E3D=8CF=nmi~tiid-D{&SY-X*jn+6D*EIS!LOcuO
zJcN}u^c*4XQZtP*@FzR<{lBYsu0qG@zk?7uGk*SJ-DRctQf_yK7FG)5_Z@F%&}g^g
z%|W8DCpT92VQix>|1Tb+z%g^fT`@`4_X+-k=@Fd_#n?QR9C|K~JG~-144Kmvb8;^L
z@~~&`o+!!X_LY}|9c~Xb5&JgEa*%AK-wnES^2E!k^Hg4@8j1EX{+X%h)e^H`UT@RN^Y;^X?hn%+
zr}VYKZe*wlspYs;r668vA8)+)?bE0Q(9_ZZ;Bp=XI2|lT4b#e|3r!Z$N@bF
z`uP*0(Xbjkvn1OR=`2^CXLmVdI6?rzm0rSVtuPtf{
zIYj)`lFbfEQxwejIN5)UoK!UFekhGioKbV)a7s}V%p!hkglof_+sOr_E{&roY71uI4%UWq8&530*!#dx%<+jmh7rwTd-_j@Q$eKsTb*wfM~h!D{vDE6
z8JRNuZ5=7WX92o^k8Q>7Q*mO}JXUcbi{ldCo3nvWV{tsm$l83hkk6&}$kBIyKN-K8
z!R0fVm8snc&J>SI2$VlJ5vOx6A;-Ze-1cF*Wp105=&kjxc2&FVYN3c4a=$-R7QT01
z_$$EdID@YbUn<}5u7s)r%MKi8peZ1DIaq~{vvbB!K5aBQh>{OyK#%M#ol?@^u7jU6Qp)IJmy%gVU6TQ})ioX$LH
zL{snKi8I#&yanf-S0PeQuW)B`E8q60e-9V1&MkK6oYgBBjV+sc1IGktn{pAmEO~Ts
z0)R&ei{y`%AH#X(j7_+=5Ky4vP;%yIia)Pd!`jy&MXuEa)vym(1LCT;}p)W9q+WM~ILibcoX
znS|}K(V+WwN%(@|_Yxv-i$3UbYLtL?L8Tmft`qyycGw}##$dL0^wHF%uL6(7&A4Wr
z{=@$k;JoE-0-okk(`5+vW*-MUo&{{=I0s?W+GgK5K0u$H&~~t+&ATJ(1eiT%qm1-Vb!2#xSwX1>CtkiwZ?35QW}%
zgJD|(o|c6!JYrFhk%E!Xu^3
z(tnz~A6`G3nOh#ib@N{f{UD6)fXoP{waI9Dl}Usv=#i0x;xEg)8soNtb=OWHneSG%
z21AsvDHW4k7$=Q>>dl}Kl)z^fA&SaRB|z8bemMvW&k*lycokfNv1WL<+iUN&{YmPu
z|8r}Q6hUhBI~b;jQ`>AIZzim*Q1KY@EBy6~cDPf1N!Fz-+?s)Q{b?kRMn_Ut-S9V(
zHBV04r)B1`Te_u&n_VUWONP7zCNj!Ch15y=deB{cUx~N_fzAcV*)*Yxh8Zd{biV$l
zTuoi_-RY7Cq?W(w=Df?rb02kRWOOsZ8ZoCNJ|W$Q3R{pA#fR8gIv2%prKn!FWgszBmE+}X9{Rf3H-|OeaJSVxU*WCr7Ux+Ml(l%Sf
znpwkjd!b9>U+en)|I^`JU8L
zn;k=i4=$37F6kj(^<}B8FNf&saw6HM&~ExS((h?ICIdet(S&CI8tB0Tg^mNH-wH*{
z)(RKQz0d4KQhE0sH^={Vdv0VZ{JVs(m4r}V0ySY8;ptMY+Zt_f<4~S?I6d3aUx5VZ
zQ{EU&W=yXVy*?dH|3)*JPS(z)h!M69Ko#!6E59g$;ZKXo4TVoJEeW2X_V%3XIg&c#
z5%(AC{?x^HiteAI+KqO2h7?#(WA{)qg>he3O`wC}LK2JD)8T2&&1CfhtDuwQum^)q
zB^-2zus=8}vB^VxV))gUp~U16N$B>?SqUy6I6=YCQzFuv0X?lXg2*j=ed=?+ss2NA
z2@=Kg$E?tIH6etiATmSSeq9K2eK;m~Hf+jnp4uLc>@p**sM0jb9j=%&c}g{{j0|ub
z)vwlMmz%4M=d{oky9D(;oN-Z96`|R3j|ppGVZBj^+^gH0!AzT>K|;w}MU}RB((nb*
zWvx2{?#LH=@o=*Xx+O@@#6lQ9vBhj|BME~{*0uGyPHd^xkX^iXXM2CTh->a&<*S9U
zK75Wds&M_ALC?x9`zdhw7_!uMOm^`mS`)0cJ%Kfg2>kj9uyswf^2C9&`RbF;Ol#=M
z*VdyF`h9J3h|Y?1WRdxDds^~M$UYY@$_V=YO*9W~B=5WsBc$-4g+947r^~hL))UeH
zBbTl{H@mS=;G;-N(~cXYv>^oIClj!AIOd@G=AmJ|Amn^Mxad2N;=z7sbHd&{XKB#r?U1
z+MY~Vwu)W_Cp_S{IBGnx)65GTS!d{P!Y8`b#Os0{=BQKi;XR%2*=4aWCA|_nT6q#{
z7=fECzaZx0J@|wEOKjBhqSc#Tv2cz8{5T_oJ$n~
zqM&M|&Ej%yH?dXp+q$JUB63(Xtj`^8>56|kPInta;~M_HC<4RFD-EYY28oKj7**D!
z;GPGhcaA9>cT8Vu?wyQYYLFM_kc#&(V&%MSyX>vhpdes9{{c;hl4Nnc{XaSNj;U@r
zd8Fvl77j*;LS7`9pQK3Q>}e)eP;AdDf+*hFcvM}y?p}MG%7x(m2O{7zG`eof(pDfL4EIzzrTkUbD?~wI_FQHh
zrhD0%^0V#&E^&z`ZO#|EiF45*dEVhCp9F0OgmSm$^4={{H`!Q9fH3NqwF(sDYkXOw
zt9wcQeT95nT9x=${V<@1y{1)L$eDv#ucCb;A9+7)ED7sU3WXc5VND;Alg`ef@uoky
z$m7x6z9WnIOA(@w^;|9}lE=(sT=ogKhlHg~9MSdyQ~gDcuB26v8in$$d`XaGWx0no
zlmbA>{MMjvbtO6J@rgAp18jdCwl^xl@6E6{LK_NUCWR}x)SuZcB6Gh9%a
zX-*P~b~@jd)kLNya*Veb-G?&;=mV;^ZMZldzc|JqLH3m(#+Q>A`9w-@3
z&H8P16-NVutP}R=Q46ua?;TH-6A`4j#$c)~nn~%2QkYR&nSd`ZBz1OFE|bBIE}v@M#&uhAO_<1{&3}(6q3GBy_KZ12x^I^+^X#+rB9iZ>!Xs6
ze_FRWtZ^bo6qNeY#29=7>~n1H)N@S8{v1dBTQyCzT)3Lo1VIhHRSe%pOtUO#mVzq(
zi^DufnhpgnxM6yDx4|uL1j{E5nQuCEdsjL%e2QOZdG|f3%C0W=u`T5swu~hfws~Hv
z+PC+K!{8~b&|f~n=L&&m5X<~t&Abg(zQ39RqWx#gTH)+V3cE*MAJO(vc{EnJ)=Kwc
z^*KKtea1%A3lSs@!8{@}euHu!YNQ45*_}9Hc5Hd|=k=e6??s0qjKgE&HxvD&S3hfB
zBy)Ru9t8WW1DYH?vK_e9&U0LpYn#5g1RSXO9bo2HJB1IyYMo`d<6*rNPEp*eg1@x%
zBJv06(ambehXsnfXecugFZsChgr`j}TbDCP}TWX@s;M9KwXiUn$
zVnmC~zt1r`Bd6F$iteTjO}a=o?RIj1g*OndiSybS9k(vnJlHg}fc&lHut^@VkSKuq
zcMbgZEXhJ{XPvt??|CUUgG-U}uZ9NK{I$L$`!P`JFH);}d7J+G2l|Tlbtb>m96A_U
z_zx28B*|MmJ*x^|Izz2IIF{btw-0w7>y!LAadI9~EoA)A!HUd@zNpx7C_k*MNzI(P
zh7c$OPD#v^4ut*ywezQ^az;<*dN+(%Xz7}Zz2Tg}IA4CX6a3Kh_~&~TkH4oX5;+;s
zKlkpMgXfofKY{tE@$Tw8{Pu(a)a%(@#W+nyFT3;88=
zLPGo3!KJ~KdCEZ5&d9DmI1M`q;osd2ZAYB>Mr@l@vW3!-E}+#Y5qq5j>ry)o6lSGA
zkNX!N+P$WHUV278gZ3@|tfIDI`oW^X!ND6o^QtmVD@0Dl%IVNWRg7Ce7X|yj{t@~)
z31WS-8rg^KVQzJClP1F&j}Q8!L5<}fR-n!N|BqbI3G38P1et;@2TNviZU;$xdkneY
zROJ#DGd&f$a?2nNq#T>ii%D*p|NUjCi20qRrgcA?T?kDa!#G~q)_(-{4<6h!sCa_5OXRH6nnl!zH7%7ky)17GP2l+Nl7w9i<_wfT&JVH&)tA2#R@)-$vcN;bA*wTZ
zzD!7!@hRAgHpI>@isYl^@y3Jy4@#EH3Wa-ZmWiTD^Og)&5l1YNj9**&MlA=>G!Oo0
z!Nofb*jN9E^MlQr*=lMVMoer&%7ykBp?&P83$s0(pI%UeeB~eS3ek_EBbrD!Nt+lt
zL^J8Lcl$hv!~d?A^g;?9&P>wAjqD=Aj|0k~yE_zs^W&f4Pyz>BIp~Bo4N+d?e7+kD
zn0d5Rt-)c{oy4xOA31>HETJ?=cbC*@H`thT<^6Y5!^KvVgH?3`J&_Ir#qp*)^?lDc
z86NGA{0)GWdYPOQIQoDP`7o<6-z1a9s-fX#s&ExE)5=|X+>JMVYOuGoHYxC<~r^ixxI
z2gb52Jug@fpE_jgD6H#3N1s91?SRLHV*(F2Oqn}9Wq9w>{wK>#pK;b-mYfJ{0J{bF
z{`e^4H9RWQzwvYLJ)9&1d65LZ>qMlMzThq2e(?8~#cCq4H1-^G&AZtm(_c@k_=J=z
zo+4#XJ*d+BZ+ZsxQp*o;7j7AK7sa(KZeJ&E5n_h=Ow?W-|3f$4`%qu8H)tNZ
zI8nd19+56T4^`*}Ky5t?fI8ag*R5FoBydp~;;oClH5f;*aByVV4l}BD-;5vx-Ousi3r_uPVYTaY=qJua6^!e^z$aTK`u2wDt{B&h^lm-(?ZI!V
z9!`vB?102=MRL!u(1{36Q^)MU9H|oxn~@ZAD3D||u^H`6(s1uxOG?tL?G((G99UK!
zi^ktW1$Zi-v&UkNR#toc8{VsX6Hw0?Y88HU?zEQ--JnjF>-UyO-K^Kod@1o!lbA=V
zP%w0n-Q7p6ok}EXb&5>QI$gt3&iFHB#YIx|><0mTf2ykeVA`$fiCUaOzfe4dB&0-Fq+lG`SM~R_kT_Kz6BVL?op
z=BqF||CombDQmhquZt~5hk8fG@q|YC@Y>me2k8WZM4G-NajT`5f01cN6
z^>8+@b3vZrva!GP@yk(d?}f*t$}u9;AgVnWW5J{V@nlS&F(#kN3G#Yz{4(b97g1{q
zbM4GDXg5V@k=5nJ6t|uV5W8WX7mh$b!yz-m-%>SN6Yy+vJVRIZx8v}0g#*r^q!GKo
zH?18n*|A6Mw9v8r8{a}63dzP5=a71uVO@6ecLiK;;`3z??(0#d>>p}3`&Y@-2gI0a
zNJ1(gvJr=ltPV^0eY8wYhXVL}SXXIp(^xDR_UvYd1y{PqvKvbrE*Q9=p^Yv~j37d8
z;9*mWalSE%^G7!aE{CNG>$AzAJGKIzLWwilXqBd3%YCgz
zm`66$0O!*S&9cS2-|*TX8shlgET`5fGV>4aVxErntgZKYy<@-GDXnhb;dUcFzai0(@BU^ypc%%Cwrcl+;Qd%T
zV=f8^$~C53RHqF0W5Ml?p_0syjNC&RS@mz};7>#()gaTCB$RFH@2Z$6+_9id?Tta4
z_=vDv3wN>|mI4&dO{CuCXxk}ZFYb3CzC@tS+lo;*c`F8SBl)p&ad*RX%el79u+RD^
zJ>=R&JpT%bLF9AFK+k>Hpb#L%i0CTrbfWwY^CWs{khXN_i+d@rJ~|RYC0$)tdSZIwHry(%BQsH$%+IsBi
zk7)eo2yX0R$Ol8RHkwQ0xQD!CMDP*zpEw$f7dO?A-Ve*6pm@-Qooc7N@_yiV!H{2H
z2M2JgAe!Pr?K@)1zg<}w_5jx?$LO9e6-X`l4hpWKVX-rY>Q7xjX$Zv(ttIKcNTEf=
z+Zy@)(_?l;k4wV-{gnc98@%7IJYm#P$ApL6>w>V8rQc1*5K)Zgq6=|^mQ&1y!Uqe$
zPA8ihgABudVwbot^ws^jLD@T_g;QE~{4UqhqQG=jdMJA2mTrwiUMIavld<2k3A-{<
zLA3oNI6@BRssjy(FcT722&aaiR!zqp*+v;2%m@xq$t+r3t_LX&~Zvbv$wU;&Rf(%dkVaSsXV<|!6fA36!mSTolQ0v
zG*ovsWtumR*KCqfH>dWxfduaG)Oz&A*)8F_hO@N2945H)BF!^jH~h7^C1TTrrK
z!1(jmj!-F}FJn}?I)y}&Ir}*ky}P>H_Jx8d_;lP_g!kv*tGD=Vlv~-HA
z^R_LCm%TjN($ZE6^GbBs=E7YlYsgWr3ud$~d3v8iiH?+jJ$u8Z(Se|f3{tA=)sINK
z9R2x4>msWK(cw2pHDujIa^K3=b82&$((_LDTJZ&8Uy4fKY{v9jPe9yxYxi`Yjwob=
za-e6$>l{}`EhKqAb(4Du_gFlAWV&Q}A56GFU(0yzUgm+&vkltsy@`W5Hm~+=Z0dcr
z%wJkfC4P+kmgP}=V#yH*Uz-nCVDk@Vd5ZvjH#tBf*>>Zf&XWRlygt}#`K2>9-Ju0y
zeOaeW`n`4d7JW_xf#J`6c#IznCF~e=`EYHck~(P}CsWG9!}CRvC^ygru#gznAct*H
zQ8`BRr$*UG`m17+rj*8?s(#A~5m&`B%%>&E3&&WUmYh|ejrxEo(G;O8yXw)A$cyaK
zLW*U#)V}9du!~)|DeqI}jKqt28Ojg86u|&HD5OZQQ#2aU->s`vtwz_x1SP4BSz%j`
zEB%rQEW;5QtC0}|&Fn)`51hng3VF5CO)X5|@efJ<^PONHNsw#5O^QkBP7JrJRB{D!
zWYPk*;z@lj-T|q3+8RM7Ohz%rqF)V&D8tWqcMXo720n&8(A3Izw01=c5bc7N0K`HtF7u+o(XydjE#^Ig?k_2uE&w^7YP-V$@pEX!@q|
z@EcIxtL)l{I%jh|t31i(CN!8!vrs72*sO($0u&A^Hlb~95?s4*Hkc@u-f{-aEH3to
zK`8pzx_YC}>*_pMl_eUkXXU^)T~^^^-oA}=!0NktDU)wMU^I>DV7&?C>@#J4X5_+P}pm7La?bN
zY&Cf$&qnDE&CuW}x$w~giu|4P$j#&>-8@etEMvUFjPla#dg1RN&|fafez3MSB*t_W
zMD3+OIPzuj+#JAMs0SN2m1oqVO%V+lqXB8sGl6dfdReDF?zu@kOrsIv^?WN>Mnxe$
zXgRUXrLEfbYW0L6bUMPE4R9^#tZ$c!r_sFWpj|IkHJiPU=-CYQav{azIJ5djyDx+8
zErNzg_rjC2j#h;dw3nNQZFg?f)`LYZ(#+6t2?HD6RqlzmdiF0VFBz@%WX{PCM2c>Z
zB9}eg)8-h#0?TWW>F3roD`A*c+6(>>76?|_k%w$SnK$@
zec5x>_eKeu?S5}6Ky*0f2yJCV=A=|UT~v@-0dFXK5wXaA+83qSUo)${L`%NIsA~y0
z#PP+eCh*=`!l%uVTRNYo;+6YzOwT0@@v7CtQE|RH>NZ>M~>P3{@HJ+L$TG%=2g3zHiQ+8TQ>>ERu$pe2T|<9$8UG(SUELbSlu*Ax*`S51z4Pps*?*5e6>)f
zoqr8O{^Qx~w-0083W&?!MJSUMTY3&*KY?QwbvUQ|zS#(0o%3#JP`7mLq4jPhP8=1I
z^U^waGAT5;&gVK>^x@ZV>ik5HTCz?-SZpSS?|jn4_ao>DqxVRS(H|+GrmT|@DHglo
zFK9b1qkQ@}WL!&3Q9~jrF0DuGf{u@B92%wa7Ia4#iIN-%~_%KONVPF690_!I~v
zF3H2bwfrC*?A5(8g+C)yWfrYMBTspw5|I~X82R@}S6e&IaT9A>`l5rC3+rC1qY{Uw
zkN$m?H^XPCj9jUvGp(GI+7Y6Oq5v?$^)#4$?R^j?HFq@gB&z1InRZ?GA|}r_Dd&||
z;oga!`)u6`A|vrlrPp_J@oV;#59|n#VAQzWyTELzsnK<`u7N7REE_@lG+Uluqe3=|
zRylxOJ4Cq@rYbi`MYg;Y2{^Q>To58H#@Pnfxh+hv&Q<=N_6+K6EA7G^tAk5-o~TYHt@sS+3<>VP3#D9b#i}~h8wJ;;M`Y?}c-EY83=bd(65boF
zJ!j;1^X2Z-tAq9luHPoK}Fg
zGjradQ^IOaybTO}ZGsy%IeeTgR$L`(`RQHYwM<#Nd@uHgIXrlIK;e3+*~<|KsoC@G
zpzQN`cXtZsV|mjXaT8K?bgB_p{WVGlRrxkl?sdl{xV{^YO?l4uX4FnxDQ#4%0nHCJ
zI8lytiO0;oRpfKA4g05>diXcKVJL_wKH_v~{~nJPGL|hxg1)_!+fu9Zr
zq7at?cJC4(NQSYOUJHEWoJZ{3!xXuDy;t%iwa#Ls25MuhxWwM=b;<&Oa!|3w22IB@
zdcTt0aH!(9e(Al-3CmYrF!C_vEK((mJCm;1`Det61m&{EQZJSNqSX-&SkA
zbwYBU`yB(VF-_E`np=dWt)5p1vX@fEF;%9&)bFmKAgGzBPN|nb!9LLdpH?G9^w!!L
z36n=VRcOf2TT0$g6**9hlzwSE6>AxhU>IE1+_>mR$a=ZVT%ga95ILHe<>NbTwe-%
zbyvvbxY8Q8(X@#Kh=HYsThsjuyhLO5Yh^%))iW%9#3VrvmiFl1#zo#9goMP8!J!|L
ziz%B>(eKh4%TAO&56v1XyvB2l>+~=SE|-L_4-Ff*z7|j(9Xnjy%rn(WNGNyIg74=x@vT-Yiv_p+)zN@U>Y_2q$P>A`Y2Av>{01
z(WXnEnwtWW_$}qzw@ppq&~Rh(@ibN9zf6+{<zArRtgO?!-DW+FndoX|n
ziu+EO)6&~6oF_=>HD%{?L@Z$9=h3zgCI&L@sJrw{Ed4AC&Yw~1BG(q(Gz**W9)$uj
zdvgQ34>x>^+Z}slwtWRpAm6DlmcAiO-!i>N-Q;n8j2l1@xsXioUIM0Bpw0Yh#Krql
zL5+{P3q6<5;mX#q4`NhPeKZ%uR7tdPq8edPNM)frs?jH`OdS78mn6$=c&cDmWf}J^
zRvl9fSu3)kY$YPKq#btBQmNJvZn9mSlAq>{2OMb$iy@?pdTx{m4{hAb4vMl(ErwhC
zR`#0~j@FPEdZ=r$-(=y`cTwv;D!kh~@|r#x39ZM}F8Gc*x0w=k9Wx4cGnSt!tlr#s
z5O{4zLwR^e<1XCnn=v@+O$`g;$L*|6&2E~p`>iX3E-vBfJ#+VX!T#(44&(rCO|h~
zbXZ?Ylf8bzqRye9hgwNddz^S5g}`{Z7uiAEk+EZin&LtE#TWi~Bs1!gGM7}hrbyJ>
z6^niyhk_v_@xv1>11lkXbX)S+oF;L|b$8)i*bYn2hzIprrjhs9IqySAfVW7qZ5u?Y
z@I7g%N2&KG+Q(hnDmIU(RSA|;r@fLFHoT9~?EoB{`iUp8x%Y%ZrAFD1fPOH0NkAZb
z&d8SK^=1;l;`Vn>#dgqpuo&nw=#S9zm8o`t6c~&r^P`Sg;7#>*Gg&GmXu8P5#aKrn
zxF>ibM>vxvS?F{4t0PNaDc1k^2(o@>%$a^Q(5n8ATGZp}JZp`5lzn_+7s;uNrzE@b
z0D{odm%JYr#+a)POzOR}Kc`&-(&Lh5m0Bl>B}h^WJW=|?4;?Q1D0cc2ioEY*Bi#^?
zHLMzTMcC-Y*$i3tY|Bj0xq~RaL8XR7SgB%cHx{F@7_lc0v8Pe>AC{|Jc~|q6`DS<|
zH8P0hyw+KZSr-1GQRNCBamI#W^=QmuEg=#vVQ?yLwR>(@Y)8w!Y{i^}8HCJ6IAFoZ
z_z{BGF+mP5`dB_GKAKvnzs`+3&muWpX1R_x3i+Quc`qKcWokQB@Uu9E0(yG&(7=a8
zuDb9G`K%KYny6B{uJwyst=2jFCj444>eG;orPbGtG}5d&K=oJSP4y}9Dz0C`7Gp~s
z4&=1MdUwQ>eH^=#^e5~zc#h}}9@EkZbamf58%Xw&a#D+-`pY?TwA3eWAI}-87%tx}
zk$|o)57>wgx3toKIR!^+%6Wn-bIkSYskAKyD@qoWHJUG>`Z|BRee@AKkh?u8+6VC(
zLn!1qo{yzD$@iZy^Da2JXQDtjQ#wT;qM+{liU-5B?=iEli2a}e3QT~r`vuM1c9Ko-
z#^?|bD~8tTbPR>`T0a?E67n_iG@PTKtO)Vv#`&L!0$bB+MiM
z)R{4rj0tsGU>{Bvs=H0gnROp0H?uN!sax^^=+BiO}1VmyYdTB7wNK-_6_f#!HS2f
zBknU3Idhib8AazZD20rfUx4(PMVIe}IdMG?Y^k)6iWQ3fPsqy^h29?d`T2lP#}>|l
zZp;CWeNf7LIdVp%!V)xudBVAd*o-B?2Y=Xx9-r~q1{xbnRWSC$IXEvpABD>xGgZtL
zcTfq8e=S%^Yj5FU&Ak>l<4rXSSM0uO^#6rF?x&}KY^$L9&Mv2)(BJK&6hWo07{ltM
zonUjtvX&l_t1z?rSf5pS~p%>g7YUCyEntOez`=iTR#6R+TY}Hmp47r}^KOSt+2q
zQRr|q-%;yzkJbDytQq0O5{V6jbe9@Jo->%l3)i8&L}>C)3}CDqd}BjiL$!eapL2Az
zrKyAi3vkA6_4Lb!M;hW9_-?OqA&!>0$n3z4?jo3H*be4mW
zgQCNoHGdr9OpRHj6o?LPEbW%tSpg+d^#Y
z==f#*JfbZ>VnA|@Ceu&jjeC69Rkq?esr6z?zTIe#eE=Ym%#vFd5=V9qqxl#mSgxxk
z($kfyenBfOe#qH-=f*Z60|kS#X1W6|$(l`+cYWv=OOPH#TuN~XsD><@0Y33mYEgwDm&Sdb@xESTq0)~sby3!&sh4WaCCee^}zpd;f
z@G|#L4Ds~v77cm=fYk&hiW#l+e%l4w9T!er?w6Q&1|7E80I+54nUecsopw8TA>VJg
zK-=FNn#BtD=S0zx4{lQX?yXuqQt#rkqEXT}F9?>#<#6Ln<5DSx9TvsE742;^Bv_#}
zzip@?9OXysm*ceyWCz86K
zKKvp7e*j5Aw!V~XEcx6_8h64}DXOmi3cPyHXlkzN$ycYx%(+hUdy@I>7s8{S{9WL^
z2o>BDLHn~s$OU8UHTT!~q$`ADu6YG$n4y~v7b{OCXrXwhl49qh3j9$%PaeTw;)ZWh??{n6e`HJe=Bne+m=J+vZI=QUrilsG`OxyG#VumiIC0Kq5`u<
z2^L6W)RPKv*z7n{q6t=XXXqZ>_^ZNQ^WVJ{i%#E#PaHgx^_>Yi2GWFm
zR8x_#!-|eLUA-wjeb{Vn`qECE_wKED`_2=Y-4Mxhc?4~
z)uj2jxqlrwVY(cdCJXTnbL|+xseqo*&
zCa39p4eet8lqpLJ_%;4B>pjpGNpX|*35NP`ooSxk3Y?8*r*YsVDvNUd3aWR|mNbLF
z^X9iT5w1d7l_lnSC-9{r`F+sjIfzV4R|3;3CXl+9-~u(!F^4qR*g|2uPi5&8HQ`d))TKk&nX>l1+$z*m6-QGMBZ`KU>=5AZa(
zZ~TkWuf75QM&HvbYiFVuVD^2|z)vd3YdLVE&-o9bJ~oKj%D;dG=2|5ho*8I^?Uc#m
zb>Mv!+~;Wf@pI$ktQpIper3NXIk0zAnzwEBdL6`g7Zm@bs
zik5u=8t}G6;Ui|E0sn(&aM=?LyaR|ZfCj{$B1hdHnRDj@|3&2BesgXj8hC$g^1B%c
zzl(rN&G8O%Orb%g#oRO7r_8P9TC?Ze6y!Migt_+&Q`XO-0dEWQ9+lz|B>3Lqc@I!@
z@#%;lJmxw71vEe>&HI9)k$(d1p?3~iG4@5|l>C0ry$1t#BEobss)O@@dr`eVYSP(y
ze9%1W%ZQNt842=T(Li4eHk8OuP`zJEZr1=yBritVgP#IjChf0~z`fX$*Z0sjzYY0-
zOf~7=3T#JdU#=rj8+aVG2hi%<-OW39p+Wo<^PUzBh%hWhb#*i%6%TpxIRlZ^2N3~!
z3mO#vM6Ql4Zb6R57n(fY0(>8t744uILEr0Zh^SnI2Jj1jzX3a01A2YAw&w#Lg8(;BIm
zFDp3jq7_YtnBSj50wjTi%(Fh}e~tz*i)rMd-_f+i!d(5{_G-nIOQvNHbE82t^-5
z7ZIe;U~WJ3_mPI>A#$@$(5(JNM3xJk*9$SzEr+)W{W;C#xYYa}Nl
zD#6ZZaQB*_KY<4KcO#+#IpSL=mp%{t7WMQ0Gw1$=+QrVO?OE)J2v0BSk6k6owH%Sj
z2J%VgO7#63(D#{#+SMDLG}a~HW^y4H>dwXnrq5g!dMcpT!(hC;vzJNySD(d~lGK
z)>h8=&UcwSWeNiWHMM@{{F*fpg1C+2z?$9^o!tpmcO^IeUuS~V-AR&Z$-R+qZ0{W|#f&GCai*NR~&63!p-ocknt-*eFn)oOi?Gsi2;(GG;SFw`VvXM6V+cAFH4o8x5gQhZ6e$p;kqsn2X@G9z=~TY?7h
zZ=u2J9Hd&W#&=-`65{(IA}|N3yr1x-v2E#I#txQX70&!2r#4^cbFCCEMP#8Fk*yCP
zGt&={usIS9rYE6+qmVon3Vp~ek+%cpuI6|FIkSPq?&dh3eBU%bQrpS!9nB#pfL|_>
zH{=G3EzI#M@&{>`%6u_Ci`v4ANJIH+G$2}}kT&C87^fYpW-)jnPGG#365B6Kwa@%ioeUWFasGvN1
znB!>--B8?;i|xtv?U{&R?oCeK#mEnbU?*I6Rq*^5ea_js7z`fS0LK@
zxQ?N+#!l{H)JUig*L8_RB80->n)Jb{J<7M4!*yNy`Um*pm%q$DZ`+HG&QV!``)y>B
z=|W3;I~Xcxis5L~VZVnoP!A*Gv4))11#*LTKb6DYjr{?%BbF>cSKlh}0*yM95(i%L5h*mkG*?7BG)UoZd
ziJ|SX3)Rt+RhH@3h;$r--u0j4d^f!ldKdqGZ_91#yv-bYhbGNSUkdg;TNwJDZ=mh4#EQLz?+i0S2TrZ_ai4~L~YJN{+XkA@J<%>Hu3c}%V
zpuq}I9R?E#W=x;P`~?em@`)#CZEYKkZ2xQi_CW*PpO9AIPIKLFNpTZ$FkXrV055s^
zF*zaQh2J1$&lM9U#Rj&*dorGDg~HkT96V2TxW^oiCO25!Y>syz6G=1bD}VR7zmi^U
zHCp>oxj)NDq(!;^XvREJNh#RAjczqj78)IO>d|LJInJr>{{Qcix{fjpUzON
z3zQ~Ug+0JNYhRyxY&K=X
zHMex<)WVMG|3dy!%~Y?&x*5rEzx@e6W{#ys9Xq)y6*9ov
zX6h(yay-}^&nq~8k~t=*9@cF4ai44T$iJ#wzIMX&gEHx?>H81l*IOH!Os?^qyVM*%
zM{$f6F)z2ebTnYgdZqb)B_UzP9RmXc%$Ylv$y2A2NDQZWjV%I#RbvQ+LO7ui|NQ&k
z=^f}N5*>-l4In4u_mZ!zv<|GddCpm_fhAv!2mD~W~ZKElqxwx79LFJRk=jTdtPRaWs)28>C#c&Z?eRw2V?PPI{r#!bY
z{4HkgMqwDfPX21i2BgI(T-`ZRSih9Qtz)W*0Ddm2@4LyL&2E9}$j?dJB8CX-)}C|Q
znR^Qt1Xy$6El6A8)e_dBw(E5+-Vu@eJ3Z&DQ?fUvQ3$mQke1SG&OR6s8?RIR#=;@w
z`#UwD)pg+S8&?XyLj&(E$al@+tK{Osl_HTVkx$s6h-7&Q!RN>~)&2zea5hpLHq^+E
zJm=nx{LNr^Bq4<+I13PQvt`@@$svdGTEFK}U;ZHZ@$y2*!T&7t+d86uhMeEwTyk;c
zyafJow9@i?@+S?`$*uAoEkC6Wa(-k`-l=~$u=V;IB-gJ+i+n6*qRG&^sUg(5iLmxc
z6o8BiU7ejoozQ4RsGW+OXj4ez)PV%ndE{1dfrM!f@_AW{GzHyg=C}nCF00WJ>_tde
z9^$!wk~#Vb;C>{;b~68eg`8^t%g9muZ-~$>G0*(Hxjxa8&m^Qt`XgFZwAz&MBIFJM@~z33;D3j*Uxm}R~LsNe~ydM?07XAu)a^u+yJ>%MShxs
z8C13%%u+;Djzy+2JMh`T)=#Tf=(xTf4ZQtmMc-=kw-jk4N;wy&k+$F^&wbCEaukLW
zSc&|QCLyxzC4nh4u)pfb=NZ)gyx;ms^!-0-%6*49e>)<_2cSA$ZJu{0YKu00lC2lN
zcx(&EEw1pQaMfoq6xQp}XoApf%F~G)$&V+uVzLyxWOF?^vi1bI?{g}-0FvJ4+qUH`
z^CyuXqK(UB%Vf!$bs6|P((HDXDBHi$!2DGtOO~Pq3s$2w%ae8?{<6aMtC^m2-$(8F
z3{M%KN8wQJK;NRAHu6N|?(hrp-}7hWOr@QOTrEJ8snux0W}W=Kgag#B?n3R>_UYB+
z%%irRCo&ZF{VJJ3pK9`Qk&LukU=_A4+ph~i28Vd#^|D^ak?V
ztz=QbMuFovWV2ZYYb!KE9s(b%8iVV)L>+kB-g|S)?Y9vMjhJLDLaT+|ja1#e$hr5G
zf^;t!2^{gql_9;|<|0p=W4$X$2
zVkoXb1E_a}VGmlBbOah?W2mnFMZPBRPl$*Vt^@*U5-W9bKN)?K{mI2VddQUdQJ?hR
zLIT@6>%I>WpOetCc?W&_YbotKokbePcaU4Db~D9Sg58Jwr2enqd=_aUPb9Yp;RgJp
znIC7$xhEoow$uCy`5vB(e4LVq2zXaC_Mm$4^WXb4{=SC)LaWOBRh<
zM;npsC>HJC!bRWw?I=iZ91-L`L~QTzq&)?HP0U*Ko{J04pN#s(@uoaiA#!yHYFCxS
zaXc3Fhj$>t@*4V%-ah{)Br`u~%4eVR5JMFbz2^A`pf(yq^=l_-FPV3_jiLCZ$+waq
zssBI|&l6BPu`;KyZ9QV1cW3_X44Ct;G8CtyiG{a6KaM7IA3#34A@uF8rnFDrMum$=
z*1QD^YEpXzH6Ca*n^mCEz4v+>lO|27NgJy{MS(^uMN4xt?HwH)cEAC2c687-abis_
zK^+HNhX&FZr91j$H1qll5|{yM8_yx_M%y@-BY;0XjwWSOsZ7fjAi$WyaU8n3x|lV4
zHfR3iY(n8M@xf~1;cgVvcA(MC72Q2O%$+@plRy4()^~T+uqB$@1mr3}&7i-xmqU*@lBv_CG0?X(
z*=jzW9itKp>&<{lSA9K%oIuLz2~Yw*V5sk0fB@qH$8qTD
z>}26K+pzyZ2hqNMea)H(YqM0FIUL8KqrHQx#@-*
zx$5dGnKt^-+yev%5FkK+O$HmZSKCN?Rm;9t7PVcv%@nb^I^u~0fB4<+$Yx!lBah}D
zpgg9dm^SmvB^)D!kYoPBaeDs7#ys@CwcfaAp>mcBC>kI@fH8y%^!N2~*ilE-yziAo
zV0)@TOloW8y6djz)|+o;i#c;fBbxhs6bx?=MRhNSMzr0-0B{94r}6KiD8Hwmz;|yJ
zoIx(y^vx(BVYQXMA0kJ7ed-b5=`#1%p&*6#qhN>|8{47?`PTs#Y=q~XkG9j*V4R)sb^5{~+4dV@uvV1nW3NuKtL&3zt+|p2x8EVRL3JU1
zOK$(iau}~j$y=l7>mfD{!KySO{dmJ}-4jIm4G>@)(P!dbZ3@0u76HMkQ8Y9(5Q{`d
zgIqy=l>V;+?<_9#Hm*l|trgqqXtZJ9v(|}=C4#kH&Hw@4l<>yAI-thmUKJuBSepmz#=)zQ>2C_f
zqcVR2X>ryubTif!)X-+1ql97u=RU|UtB@=egZ0t5d6?zMlut6|sAOa8%?*_Xw+#>=
zz!+dd+^eG$_iFhYZv+G@Kuy86#-AhKmv11yBR~8UZFc%P+JM)KgMh8j2C0RysKQ7y
zwzau-722#BMk5J_I4zwxo1VnnyGuDPBQM6(9y$s#_)ejTVCb&;9bOY;yk#;MK2;?JFjy;eW
z7IWXtl=p9&fZlB;GSOa6aX&3@{`aExP?-OgXd~z_a0}WDx)@GEK8wrHM(4Hc9~L0M
zn;Le{!G+sy%K@8^@0CSBur?1^@^KY%QvWIFv?Py_i{Sk&;B51Md;f*zzVCXT69)c^h*2-{mHHv@
z1>kp{bl*dS$(!G=O!bORuOO}6Yrxx(_AU&3&0K$-(ge%;ZB;_9{)#rx
z&7g$@KSYChFGGpz+kk7(?)JT?j!#2=bRR&(>nczB(-Dbwk!kpcz-`EJzm)lLJ|e&u
zqPhTWzI+4vcD+bT_hYne%5`PlafT_^-liNb`VK!u-@BOR(3T%^-|pwYxxhCI(*6gL
z`d;(OGg8>4J6Z$-R4sI&GR~DO2
zNdt@q`VnCW0U!3c{&O@4KY?cbg|HeRFEM*B(rDdo?rA~Vm5-A1UwI9YiOYb$AWfJZ
zEWe4!)gO=+rN#XH7CDZ43D%zxxjM$AX-3*G?+U#inZI9o@@fPAgb3E@Cf#M`nl(UbRa=AEu6Q-15n-)@c$B2oJQdzrjqz{e=B)rlZ2(cXvvHkDyJ{{K0k%cSo`tL~mK<*{0(k0L^Glcx-q
z0r#2z&qUg*|Dml|tY)Jd_zW^jo{!9U7RCBNwS8laIj%>V67Szu=GvBs1pNc}ndja+
z$%STU@SOhvA}c$PGux$sFENxbO+duzVdSuH3BmsmK{+0nUB&x^Oqm`rd0JcyJXz-6
zpP+Z$i+t_cZREaP;eL{>X!YW~sEu@*^ZiIG^&leLwq1S<)vZ^P_Fr-YZU!>%UWGJf
z7MB25qB^oZhJQ52UC1p+=t1r65udVdLU6#%LN)`=CiEJPDR*)JT$fGy69gC*9M@%_
zzn{a8s{K6&iy)D@(43XbJqiP8U%3Dy2xNsj2*@}0*}SQ69b
zIrmZIU-g<#dP^*<8TSx#{2Qv97SEscIjUw;+qN!7gxc0cGdVN0CB8?ZclDFtH=5(dk(EvevT5j94T)a;9(G<1
zB>P~X69&5=-UF!t=vxcjE1`P@q!SPtrXRoKKxz;&sgad4FVB$j>sh5T*Ed7FTVyLB
zS(^}Pj6{r-unq#@8{dR@j%7XLT
zm}4<#_NC@H*Bn2G{BFL3G#h^;Un{e%IeMMhy;x$7GfNkDSeRsv$028N`}b~SdICAA
zhzwYD6Q|cL2XeZRZ@yYc?mNvfoqX
zvus-^W`4Bi=a}P{fq$Z~BfZG1=rwEG{iXhce86m7^pI=+ULVwAvEeq}s2&Q#KnJAb
zu>1R=Z3}3By?|&r`Wx)>Ct#tlNK@xB=vWHT1~}ro@Qw?haWX_2V4EX!?$EF6p1$?f
zkt`*R>K
zMFM@JmyjtDir4e#JGh6!A}E7h5DLizmPtZ92{X5b!@dRc4}i|4u=px?_B!ZY4J|Vv
z(FgtOML<%6u=+WO)Pb9Ux@M8C#!0Z-d!cQv@|n5~gron@-g$>fQDtrXSJioP28J92
z6cx;Xpe`zg6>~&gcNGC$T{o}a=3O_ruC5ymm=orl(;6`cOeD!LGcY-IPp7Kyk5hNL
zx~F?GFhIS}12tWB>(mqqxfBNT4d^S&4O3>r49E*%q?c_t{=4^v6MTk}xs`ccaLcM+rY$wRYN|+^yxB1P0Eo1~sA({4KOsE6960<3F!^+N@hbTARVXVF
z0ygOch_u2R{}gp!b}>}16e2bI*RbdDLbk#!A{{bKC>$ZzP#pwoBrOwW3#obUHt^?3
zdZHmAUNv8fL@7`Jm=J1&U>HX34afct$|p-2CY=c5W=Z%jo`BlbkULo7s$L0$Ckff|
z_+j!HLJHqq1hth=SO&-b9`=|esz5Z6;I%baq%00ug(7h)8!u#Y%W@%pzHD&$aER8f
z1x?cuey>VPcPhVEsc;C^?u!kG-N~=5-*b8q$Fqnd&g+pa{;89Yht8!%FImt3X1$;K
z?k|yva#@DBK0@qflzQnoD-G8Hi&Mh-5lP3V!0JxYq@dHYgNRjM>P(jX7-Go%2V_T`
z9qK3}`>w#-5Em53knF&;goLzFmHBH3vH2%r$eoJO2>I&nY~-Wk5kbm8y|V+c4P;}&
z?|}2^diSNm{}4iXHL~N=F40r&IKD7__$_?dCYd
zb%$NbHwoDV*?-Uw8>oZ7BPzO3*TPY-Wm&?gUDM^eZA~c&F`;%1j66gnMy4TgMT4TAY}pEL-vFy$
z6ZPWgnIcu1a+Z*$x^?o7?iTViYMR7VzX7s~L`qk^5(e!lk}KT>-W(WvI24V5ckhNn
z=gE6pzDloN)Lmjj=FNhs7sG^O;j5=$#f#9qMF?J2kt5OCMUb$)+ByARrNSXty9bmf
z_tg6SIU@C`M2r(z)FPhT!g3|SCQDYm#T(oL)1?%k#Hfg
z8gW*7Ekd4@Ls2(E=)Ob@$+5nXg{TTa2*HU~UK*|RtVN_f*CD$UkMBl4vA!_{AwzE?
z>axxpR4Ov^03C_oSIEYKwFsH~F+y&yMrMVdlOO?h`>-n!!}#Zsop2u^lA0@!a+pMd
z1V*i}Ph0u?2|}obBW^3cAoE#?kdWjkd$|Hc67~X#U7E^eMpv5}es6v2E<|PbfOY@J
z2od}HKg8uh_t1#NSVb+Y^rc0M*d%uAW|0~c5s(lzk`T7jN6gL#4ix3
z;dm>3&j8=D!p=vG^1njb;OB_M>>@<6JCXhvD>YqIeS`LbY4e3R#I2^%Xfs39-O2AX
zRtTAz^JgIxTbEnpNfQF1>7s5d9wUUOxvHB+=bH4$P?KeYWr_sMQzYans|b#~681kw
z?iY>}qSIO@cTOq9BBHt+eW*yjV%C8Op+-sjxLGiECd6VAS7+%}c4f6|
zL~=E4KJ0z6*nPcr9en*JxLqP81KNpJPMHutV;~%o;Gnw@zgI`^lzy*L;Sj6=iq_Uv
zLa`_=my3A3&jUoz`j;w^Sb|I}ccgizhK{?c>aBZrN!4qJitwL^Jq*ZX{~EB#`dw$e
zmu`vqGBTO{jl@o|7(x^-C1J20LTqWSu>OG%hzm%T*gS(w>dGIKO3&j~e5nTJwQ2GR
zG6|1ECT0-(p3Vr?Mk}6l=R7VW;TGd3RvNCd(%OcQg%gp<-0oiJ
zx(4fe_Qw4>lHb3PXiIT~U|vGP(7g>ItCx}3;kX{L!?H_4@36jcHHkLTLW1NeY(iAA
zH*V=!X#*SAin=|Ya$g0TO&qK>QI&^;ogyM&-LY)ZtXV8jziQxd8k@8~nd
zKB_%F3#~O`YgI5@NK~-alDKJ^jp9v1@(D6Zw4`)5B~@#!2Hhj-$?m$3P-Pft5s6so
zc=+a@;L`^z5^Amgbho5q`3pi~1BLP(2Lm1r4GoMPKb{#!9I;c|UMXmcAAI;)Wbke2
zD)9D(VHlXE$<#v*rl_cha5$A83>cIklhLb)QE;D7Sdh=BpDyLpIdd>gldP4;}onDBB0qwNZjJhNB{Id
zIutt#S%>iA-l@4*zm%nnB+83m&udd2VxmD;4Muxc4A)RZC
zbVx0??&V*1C45bdnE@qxh%J*sTay@t?>|@6Z>F(xIsP1o&|L}DWD-n~cI|VDkld%Q
z1T;sIHGrXPuS9zF4eDxZcXo0GI4Z&c3DY!*nsC1Fg`D@KWwoa
z>|B_I90l|QiSrg`AvSBzlQ@Wa$3b^NxK*~;>uw0-i$S!xo2b8Zml&vLm%z!_i;IQE
z3L#vXY@r--wH=^H)>_!x+93Vpk44&*S8lb>-K34~1ZZezVBC1|+P*8;UMcJvx!46^
znkJE0jEgV1gdruRG&eVQ{gQ)S4gW)2VC+f4xZi^qb9c5QaQi?xopgJ}Ipl}~#m7^_
zW=l%5iw`fch)79tO5yYyV935uvqlWkclEsQ6tGFMCLROl+%E1VwyuFty;VmJ+1=65
zG>u?O3r8Mv45ej*2y9Y2KJgbfpg9~kL&u!7R$lTg&O3b;~#Vy
zO4DT2$ntyYu^;t0{*`CAYFMxL*j(8
zoj|5h2X!}`J$$594q+}FDQ5+an+3Up#NSih`raR!>|h&1llG^)*}H__t5i4yYXBqJ7VBL8{?F?jTPz0&=q~Z4R6GWb
z`h^f3(}2p)p|w_sNX;tv>``cLfYNa=;t)Bmq->(7O`iH0tXcwD0rAou3kzuo
zho$?TCSK%yIk5T-c=u+=87ytaAz9lT%Jyo;5r^+mwpR)c!5ZLDwpjBnS;+m1@1wc7
zxj+13IoR2u$W`G;QF|1RmBWEeL&%fcCxm0z0dh1+OFiTkL;g@Pz^?pEj$k?VcQD~i
zIi96r6%3sK`%v51h#ydhBW8BCf3
zQ|Cd&QdsjAZ2C~tm%2-y*KCBWEK%+4caD&&wQmX0YHJkrs_vHjuYVsxK^Su|9Ciha
zo-Pu@y7g8uXpYhP&W3h}rLEE?M;s*mWyHZ!_y7ARWakQ@cZ}h;8RX2t7LJ;IEM;Yb
z*|c%jl3s!1Xtcl3uZ~7LK+_mpTEY*%{{#O1kLw*3^D>c+HCA*j1+uGfVzzvk))6l*Z{p~gP`!}E>|!BTMjTu&`1*BN`Lamn_B>ul
zsyAEC&TDIu_ccujmZrgbx68MtUM$kAh7E~hY8>o3Fb&HgX)%1V7(TvF775Bpsms0l
z?2O&U&~=@*wl+3aRxo@>Ie-7}4Y)m?UCOxK!Zi-T>K|-Vf@PW}Wo4zTSh12LXU+uE
zBs(Y55qb`GSt!C2tQX1D>|colD-*fuHcU~W={gvO<&3eP34}UdFCLZeWS1sXbxOL_
z?YLZN(q~#b7hRHm`()T2x8-co;}^o$TAPqUrN*mvL1q_A+FNVo9Y+p~q|oj+9U
z0zZEY*1snU0n-!`?i?!JYuJfZZXk;@&ODQEU3d{qt*z8nR};v}!rZk;tmDajXF!rI
z*16|${Xec}e15)Ti?usJ(?pUIYJ>yM6}4F;)DPqe+IL#Tjl}Q%hB8W5#_laPC-yx}
ze`mWA%{0dEN$2a?9J;5f_EO_D4N+SvIOJ;AhB~;qe!XR*wEzw{PYmJTz5%u@Pe`)-
zd5~4;I4$i4?8GX^=jYtB&*9>Q3po7n!vXke`3h=lYG`X~!|(U+QY6bESUU+!(F*xoj*ym)K_#KIg0|)(&R2!}FM?vWXSo0=e%C6JT9)ZnE
zpYQ`9c)>yrKm0I2h*c~WN7pqpU8kw3
znW5$7OrJK5CGYH7B+DUKI}wy$ta%F;viRP6X>Mv72)0l$DZ@H#s$!P40Av+kb2bHGUJ_szf@U