From ad532e29a15c849c333f84f62abd562df61c25b7 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Mon, 4 Mar 2019 16:05:00 -0800 Subject: [PATCH 01/22] removed extra topics --- .../security/information-protection/TOC.md | 3 - .../create-vpn-and-wip-policy-using-intune.md | 126 ----- .../create-wip-policy-using-intune-azure.md | 14 +- .../create-wip-policy-using-intune.md | 484 ------------------ .../deploy-wip-policy-using-intune.md | 50 -- 5 files changed, 6 insertions(+), 671 deletions(-) delete mode 100644 windows/security/information-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune.md delete mode 100644 windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune.md delete mode 100644 windows/security/information-protection/windows-information-protection/deploy-wip-policy-using-intune.md diff --git a/windows/security/information-protection/TOC.md b/windows/security/information-protection/TOC.md index 6750ea0cc6..5db0c16a9a 100644 --- a/windows/security/information-protection/TOC.md +++ b/windows/security/information-protection/TOC.md @@ -31,9 +31,6 @@ ## [Protect your enterprise data using Windows Information Protection (WIP)](windows-information-protection\protect-enterprise-data-using-wip.md) ### [Create a WIP policy using Microsoft Intune](windows-information-protection\overview-create-wip-policy.md) -#### [Create a WIP policy using the classic console for Microsoft Intune](windows-information-protection\create-wip-policy-using-intune.md) -##### [Deploy your WIP policy using the classic console for Microsoft Intune](windows-information-protection\deploy-wip-policy-using-intune.md) -##### [Associate and deploy a VPN policy for WIP using the classic console for Microsoft Intune](windows-information-protection\create-vpn-and-wip-policy-using-intune.md) #### [Create a WIP policy with MDM using the Azure portal for Microsoft Intune](windows-information-protection\create-wip-policy-using-intune-azure.md) ##### [Deploy your WIP policy using the Azure portal for Microsoft Intune](windows-information-protection\deploy-wip-policy-using-intune-azure.md) ##### [Associate and deploy a VPN policy for WIP using the Azure portal for Microsoft Intune](windows-information-protection\create-vpn-and-wip-policy-using-intune-azure.md) diff --git a/windows/security/information-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune.md b/windows/security/information-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune.md deleted file mode 100644 index cd3a0e3848..0000000000 --- a/windows/security/information-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune.md +++ /dev/null @@ -1,126 +0,0 @@ ---- -title: Associate and deploy a VPN policy for Windows Information Protection (WIP) using the classic console for Microsoft Intune (Windows 10) -description: After you've created and deployed your Windows Information Protection (WIP) policy, you can use Microsoft Intune to create and deploy your Virtual Private Network (VPN) policy, linking it to your WIP policy. -ms.assetid: d0eaba4f-6d7d-4ae4-8044-64680a40cf6b -keywords: WIP, Enterprise Data Protection -ms.prod: w10 -ms.mktglfcycl: explore -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: justinha -ms.author: justinha -manager: dansimp -audience: ITPro -ms.collection: M365-security-compliance -ms.topic: conceptual -ms.date: 02/26/2019 ---- - -# Associate and deploy a VPN policy for Windows Information Protection (WIP) using the classic console for Microsoft Intune -**Applies to:** - -- Windows 10, version 1607 and later -- Windows 10 Mobile, version 1607 and later - -After you've created and deployed your Windows Information Protection (WIP) policy, you can use Microsoft Intune to create and deploy your Virtual Private Network (VPN) policy, linking it to your WIP policy. - -## Create your VPN policy using Microsoft Intune -Follow these steps to create the VPN policy you want to use with WIP. - -**To create your VPN policy** - -1. Open the Intune administration console, and go to the **Policy** node, and then click **Add Policy**. - -2. Go to **Windows**, click the **VPN Profile (Windows 10 Desktop and Mobile and later)**, click **Create and Deploy a Custom Policy**, and then click **Create Policy**. - - ![Microsoft Intune, Create a new policy using the New Policy screen](images/intune-vpn-createpolicy.png) - -3. Type *Contoso_VPN_Win10* into the **Name** box, along with an optional description for your policy into the **Description** box. - - ![Microsoft Intune: Fill in the required Name and optional Description for your policy](images/intune-vpn-titledescription.png) - -4. In the **VPN Settings** area, type the following info: - - - **VPN connection name.** This name is also what appears to your employees, so it's important that it be clear and understandable. - - - **Connection type.** Pick the connection type that matches your infrastructure. The options are **Pulse Secure**, **F5 Edge Client**, **Dell SonicWALL Mobile Connect**, or **Check Point Capsule VPN**. - - - **VPN server description.** A descriptive name for this connection. Only you will see it, but it should be unique and readable. - - - **Server IP address or FQDN.** The server's IP address or fully-qualified domain name (FQDN). - - ![Microsoft Intune: Fill in the VPN Settings area](images/intune-vpn-vpnsettings.png) - -5. In the **Authentication** area, choose the authentication method that matches your VPN infrastructure, either **Username and Password** or **Certificates**.

-It's your choice whether you check the box to **Remember the user credentials at each logon**. - - ![Microsoft Intune, Choose the Authentication Method for your VPN system](images/intune-vpn-authentication.png) - -6. You can leave the rest of the default or blank settings, and then click **Save Policy**. - -## Deploy your VPN policy using Microsoft Intune -After you’ve created your VPN policy, you'll need to deploy it to the same group you deployed your Windows Information Protection (WIP) policy. - -**To deploy your VPN policy** - -1. On the **Configuration policies** page, locate your newly-created policy, click to select it, and then click the **Manage Deployment** button. - -2. In the left pane of the **Manage Deployment** box, click the employees or groups that should get the policy, and then click **Add**.

-The added people move to the **Selected Groups** list on the right-hand pane. - - ![Microsoft Intune: Pick the group of employees that should get the policy](images/intune-deploy-vpn.png) - -3. After you've picked all of the employees and groups that should get the policy, click **OK**.

-The policy is deployed to the selected users' devices. - -## Link your WIP and VPN policies and deploy the custom configuration policy -The final step to making your VPN configuration work with WIP, is to link your two policies together. To do this, you must first create a custom configuration policy, setting it to use your **EDPModeID** setting, and then deploying the policy to the same group you deployed your WIP and VPN policies - -**To link your VPN policy** - -1. Open the Intune administration console, and go to the **Policy** node, and then click **Add Policy**. - -2. Go to **Windows**, click the **Custom Configuration (Windows 10 Desktop and Mobile and later)**, click **Create and Deploy a Custom Policy**, and then click **Create Policy**. - - ![Microsoft Intune, Create a new policy from the New Policy screen](images/intune-vpn-customconfig.png) - -3. Type a name (required) and an optional description for your policy into the **Name** and **Description** boxes. - - ![Microsoft Intune: Fill in the required Name and optional Description for your policy](images/intune-vpn-wipmodeid.png) - -4. In the **OMA-URI Settings** area, click **Add** to add your **EDPModeID** info. - -5. In the **OMA-URI Settings** area, type the following info: - - - **Setting name.** Type **EDPModeID** as the name. - - - **Data type.** Pick the **String** data type. - - - **OMA-URI.** Type `./Vendor/MSFT/VPNv2//EDPModeId`, replacing <*VPNProfileName*> with the name you gave to your VPN policy. For example, `./Vendor/MSFT/VPNv2/W10-Checkpoint-VPN1/EDPModeId`. - - - **Value.** Your fully-qualified domain that should be used by the OMA-URI setting. - - ![Microsoft Intune: Fill in the OMA-URI Settings for the EMPModeID setting](images/intune-vpn-omaurisettings.png) - -6. Click **OK** to save your new OMA-URI setting, and then click **Save Policy.** - - - **To deploy your linked policy** - -1. On the **Configuration policies** page, locate your newly-created policy, click to select it, and then click the **Manage Deployment** button. - -2. In the left pane of the **Manage Deployment** box, click the employees or groups that should get the policy, and then click **Add**. The added people move to the **Selected Groups** list on the right-hand pane. - - ![Microsoft Intune, Manage Deployment box used to deploy your linked VPN policy](images/intune-groupselection_vpnlink.png) - -3. After you've picked all of the employees and groups that should get the policy, click **OK**. The policy is deployed to the selected users' devices. - - ->[!NOTE] ->Help to make this topic better by providing us with edits, additions, and feedback. For info about how to contribute to this topic, see [Editing Windows IT professional documentation](https://github.com/Microsoft/windows-itpro-docs/blob/master/CONTRIBUTING.md). - - - - - diff --git a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md index 042a8923f9..505fe57327 100644 --- a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md +++ b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md @@ -15,22 +15,20 @@ ms.topic: conceptual ms.date: 02/28/2019 --- -# Create a Windows Information Protection (WIP) policy with MDM using the Azure portal for Microsoft Intune +# Create a Windows Information Protection (WIP) policy by using Microsoft Intune **Applies to:** - Windows 10, version 1607 and later - Windows 10 Mobile, version 1607 and later (except Microsoft Azure Rights Management, which is only available on the desktop) -Microsoft Intune helps you create and deploy your Windows Information Protection (WIP) policy, including letting you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network. +Microsoft Intune gives you an esay way to create and deploy a Windows Information Protection (WIP) policy. You can choose which apps to protect, the level of protection, and how to find enterprise data on the network. Intune can apply WIP policy to devices that are managed by using either: -## Alternative steps if you use MAM only (without device enrollment) +- Mobile Device Management (MDM), where the device is enrolled in Intune and fully managed by Intune features. +- Mobile Application Management (MAM), where Intune only manages the apps on a user's personal device. -This topic covers creating a Windows Information Protection (WIP) policy for organizations already managing devices by using Mobile Device Management (MDM) solutions. If your organization uses a mobile application management (MAM) solution to deploy your WIP policy to Intune apps without managing devices, see [Create a Windows Information Protection (WIP) policy with MAM using the Azure portal for Microsoft Intune](create-wip-policy-using-mam-intune-azure.md). - -If the same user and device are targeted for both MDM policy and MAM-only (without device enrollment) policy, the MDM policy will be applied to devices joined to Azure AD. For personal devices that are workplace-joined (that is, added by using **Settings** > **Email & accounts** > **Add a work or school account**), the MAM-only policy will be preferred but it's possible to upgrade the device management to MDM in **Settings**. - -Windows Home edition only supports WIP for MAM-only; upgrading to MDM policy on Home edition will revoke WIP-protected data access. +>[!NOTE] +>If the same user and device are targeted for both MDM and MAM, the MDM policy will be applied to devices joined to Azure AD and MAM will be preferred for personal devices that are workplace-joined (that is, added by using **Settings** > **Email & accounts** > **Add a work or school account**), the MAM-only policy will be preferred but it's possible to upgrade the device management to MDM in **Settings**. Windows Home edition only supports WIP for MAM-only; upgrading to MDM policy on Home edition will revoke WIP-protected data access. ## Add a WIP policy Follow these steps to add a WIP policy using Intune. diff --git a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune.md b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune.md deleted file mode 100644 index 48de57d325..0000000000 --- a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune.md +++ /dev/null @@ -1,484 +0,0 @@ ---- -title: Create a Windows Information Protection (WIP) policy using the classic console for Microsoft Intune (Windows 10) -description: Microsoft Intune helps you create and deploy your Windows Information Protection (WIP) policy, including letting you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network. -ms.assetid: 4b307c99-3016-4d6a-9ae7-3bbebd26e721 -ms.prod: w10 -ms.mktglfcycl: explore -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: justinha -ms.author: justinha -manager: dansimp -audience: ITPro -ms.collection: M365-security-compliance -ms.topic: conceptual -ms.date: 02/27/2019 ---- - -# Create a Windows Information Protection (WIP) policy using the classic console for Microsoft Intune - -**Applies to:** - -- Windows 10, version 1607 and later -- Windows 10 Mobile, version 1607 and later - -Microsoft Intune helps you create and deploy your Windows Information Protection (WIP) policy, including letting you choose your allowed apps, your WIP-protection level, and how to find enterprise data on the network. - -## Add a WIP policy -After you’ve set up Intune for your organization, you must create a WIP-specific policy. - -**To add a WIP policy** -1. Open the Intune administration console, and go to the **Policy** node, and then click **Add Policy** from the **Tasks** area. - -2. Go to **Windows**, click the **Windows Information Protection (Windows 10 Desktop and Mobile and later) policy**, click **Create and Deploy a Custom Policy**, and then click **Create Policy**. - - ![Microsoft Intune: Create your new policy from the New Policy screen](images/intune-createnewpolicy.png) - -3. Type a name (required) and an optional description for your policy into the **Name** and **Description** boxes. - - ![Microsoft Intune: Fill out the required Name and optional Description fields](images/intune-generalinfo.png) - -## Add app rules to your policy -During the policy-creation process in Intune, you can choose the apps you want to give access to your enterprise data through WIP. Apps included in this list can protect data on behalf of the enterprise and are restricted from copying or moving enterprise data to unprotected apps. - -The steps to add your app rules are based on the type of rule template being applied. You can add a store app (also known as a Universal Windows Platform (UWP) app), a signed Windows desktop app, or an AppLocker policy file. - ->[!Important] ->Enlightened apps are expected to prevent enterprise data from going to unprotected network locations and to avoid encrypting personal data. On the other hand, WIP-unaware apps might not respect the corporate network boundary, and WIP-unaware apps will encrypt all files they create or modify. This means that they could encrypt personal data and cause data loss during the revocation process.

Care must be taken to get a support statement from the software provider that their app is safe with WIP before adding it to your **App Rules** list. If you don’t get this statement, it’s possible that you could experience app compat issues due to an app losing the ability to access a necessary file after revocation. - -### Add a store app rule to your policy -For this example, we’re going to add Microsoft OneNote, a store app, to the **App Rules** list. - -**To add a store app** -1. From the **App Rules** area, click **Add**. - - The **Add App Rule** box appears. - - ![Microsoft Intune, Add a store app to your policy](images/intune-add-uwp-apps.png) - -2. Add a friendly name for your app into the **Title** box. In this example, it’s *Microsoft OneNote*. - -3. Click **Allow** from the **Windows Information Protection mode** drop-down list. - - Allow turns on WIP, helping to protect that app’s corporate data through the enforcement of WIP restrictions. Instructions for exempting an app are included in the [Exempt apps from WIP restrictions](#exempt-apps-from-wip-restrictions) section of this topic. - -4. Pick **Store App** from the **Rule template** drop-down list. - - The box changes to show the store app rule options. - -5. Type the name of the app and the name of its publisher, and then click **OK**. For this UWP app example, the **Publisher** is `CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US` and the **Product name** is `Microsoft.Office.OneNote`. - -If you don't know the publisher or product name, you can find them for both desktop devices and Windows 10 Mobile phones by following these steps. - -**To find the Publisher and Product Name values for Store apps without installing them** -1. Go to the [Microsoft Store for Business](https://go.microsoft.com/fwlink/p/?LinkID=722910) website, and find your app. For example, *Microsoft OneNote*. - -2. Copy the ID value from the app URL. For example, Microsoft OneNote's ID URL is https://www.microsoft.com/store/apps/onenote/9wzdncrfhvjl, and you'd copy the ID value, `9wzdncrfhvjl`. - -3. In a browser, run the Store for Business portal web API, to return a JavaScript Object Notation (JSON) file that includes the publisher and product name values. For example, run https://bspmts.mp.microsoft.com/v1/public/catalog/Retail/Products/9wzdncrfhvjl/applockerdata, where `9wzdncrfhvjl` is replaced with your ID value. - - The API runs and opens a text editor with the app details. - - ```json - { - "packageIdentityName": "Microsoft.Office.OneNote", - "publisherCertificateName": "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US" - } - ``` - -4. Copy the `publisherCertificateName` value into the **Publisher Name** box and copy the `packageIdentityName` value into the **Product Name** box of Intune. - - >[!Important] - >The JSON file might also return a `windowsPhoneLegacyId` value for both the **Publisher Name** and **Product Name** boxes. This means that you have an app that’s using a XAP package and that you must set the **Product Name** as `windowsPhoneLegacyId`, and set the **Publisher Name** as `CN=` followed by the `windowsPhoneLegacyId`.

For example:
- ```json - { - "windowsPhoneLegacyId": "ca05b3ab-f157-450c-8c49-a1f127f5e71d", - } - ``` - -**To find the Publisher and Product Name values for apps installed on Windows 10 mobile phones** -1. If you need to add mobile apps that aren't distributed through the Store for Business, you must use the **Windows Device Portal** feature. - - >**Note**
Your PC and phone must be on the same wireless network. - -2. On the Windows Phone, go to **Settings**, choose **Update & security**, and then choose **For developers**. - -3. In the **For developers** screen, turn on **Developer mode**, turn on **Device Discovery**, and then turn on **Device Portal**. - -4. Copy the URL in the **Device Portal** area into your device's browser, and then accept the SSL certificate. - -5. In the **Device discovery** area, press **Pair**, and then enter the PIN into the website from the previous step. - -6. On the **Apps** tab of the website, you can see details for the running apps, including the publisher and product names. - -7. Start the app for which you're looking for the publisher and product name values. - -8. Copy the `publisherCertificateName` value and paste it into the **Publisher Name** box and the `packageIdentityName` value into the **Product Name** box of Intune. - - >[!Important] - >The JSON file might also return a `windowsPhoneLegacyId` value for both the **Publisher Name** and **Product Name** boxes. This means that you have an app that’s using a XAP package and that you must set the **Product Name** as `windowsPhoneLegacyId`, and set the **Publisher Name** as `CN=` followed by the `windowsPhoneLegacyId`.

For example:
- ```json - { - "windowsPhoneLegacyId": "ca05b3ab-f157-450c-8c49-a1f127f5e71d", - } - ``` - -### Add a desktop app rule to your policy -For this example, we’re going to add Internet Explorer, a desktop app, to the **App Rules** list. - -**To add a desktop app** -1. From the **App Rules** area, click **Add**. - - The **Add App Rule** box appears. - - ![Microsoft Intune, Add a desktop app to your policy](images/intune-add-classic-apps.png) - -2. Add a friendly name for your app into the **Title** box. In this example, it’s *Internet Explorer*. - -3. Click **Allow** from the **Windows Information Protection mode** drop-down list. - - Allow turns on WIP, helping to protect that app’s corporate data through the enforcement of WIP restrictions. Instructions for exempting an app are included in the [Exempt apps from WIP restrictions](#exempt-apps-from-wip-restrictions) section of this topic. - -4. Pick **Desktop App** from the **Rule template** drop-down list. - - The box changes to show the store app rule options. - -5. Pick the options you want to include for the app rule (see table), and then click **OK**. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
OptionManages
All fields left as “*”All files signed by any publisher. (Not recommended)
Publisher selectedAll files signed by the named publisher.

This might be useful if your company is the publisher and signer of internal line-of-business apps.

Publisher and Product Name selectedAll files for the specified product, signed by the named publisher.
Publisher, Product Name, and Binary name selectedAny version of the named file or package for the specified product, signed by the named publisher.
Publisher, Product Name, Binary name, and File Version, and above, selectedSpecified version or newer releases of the named file or package for the specified product, signed by the named publisher.

This option is recommended for enlightened apps that weren't previously enlightened.

Publisher, Product Name, Binary name, and File Version, And below selectedSpecified version or older releases of the named file or package for the specified product, signed by the named publisher.
Publisher, Product Name, Binary name, and File Version, Exactly selectedSpecified version of the named file or package for the specified product, signed by the named publisher.
- -If you’re unsure about what to include for the publisher, you can run this PowerShell command: - -```ps1 - Get-AppLockerFileInformation -Path "" -``` -Where `""` goes to the location of the app on the device. For example, `Get-AppLockerFileInformation -Path "C:\Program Files\Internet Explorer\iexplore.exe"`. - -In this example, you'd get the following info: - -``` json - Path Publisher - ---- --------- - %PROGRAMFILES%\INTERNET EXPLORER\IEXPLORE.EXE O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US\INTERNET EXPLOR... -``` -Where the text, `O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US` is the publisher name to enter in the **Publisher Name** box. - -### Add an AppLocker policy file -Now we’re going to add an AppLocker XML file to the **App Rules** list. You’ll use this option if you want to add multiple apps at the same time. For more info, see [AppLocker](https://technet.microsoft.com/itpro/windows/keep-secure/applocker-overview). - -**To create a Packaged App rule and xml file** -1. Open the Local Security Policy snap-in (SecPol.msc). - -2. In the left pane, click **Application Control Policies** > **AppLocker** > **Packaged App Rules**. - - ![Local security snap-in, showing the Packaged app Rules](images/intune-local-security-snapin.png) - -3. Right-click **Packaged App Rules** > **Create New Rule**. - -4. On the **Before You Begin** page, click **Next**. - - ![Create Packaged app Rules wizard, showing the Before You Begin page](images/intune-applocker-before-begin.png) - -5. On the **Permissions** page, make sure the **Action** is set to **Allow** and the **User or group** is set to **Everyone**, and then click **Next**. - - ![Create Packaged app Rules wizard, showing the Before You Begin page](images/intune-applocker-permissions.png) - -6. On the **Publisher** page, click **Select** from the **Use an installed packaged app as a reference** area. - - ![Create Packaged app Rules wizard, showing the Publisher](images/intune-applocker-publisher.png) - -7. In the **Select applications** box, pick the app that you want to use as the reference for your rule, and then click **OK**. For this example, we’re using Microsoft Photos. - - ![Create Packaged app Rules wizard, showing the Select applications page](images/intune-applocker-select-apps.png) - -8. On the updated **Publisher** page, click **Create**. - - ![Create Packaged app Rules wizard, showing the Microsoft Photos on the Publisher page](images/intune-applocker-publisher-with-app.png) - -9. Review the Local Security Policy snap-in to make sure your rule is correct. - - ![Local security snap-in, showing the new rule](images/intune-local-security-snapin-updated.png) - -10. In the left pane, right-click on **AppLocker**, and then click **Export policy**. - - The **Export policy** box opens, letting you export and save your new policy as XML. - - ![Local security snap-in, showing the Export Policy option](images/intune-local-security-export.png) - -11. In the **Export policy** box, browse to where the policy should be stored, give the policy a name, and then click **Save**. - - The policy is saved and you’ll see a message that says 1 rule was exported from the policy. - - **Example XML file**
- This is the XML file that AppLocker creates for Microsoft Photos. - - ```xml - - - - - - - - - - - - - - - - ``` -12. After you’ve created your XML file, you need to import it by using Microsoft Intune. - -**To import your Applocker policy file app rule using Microsoft Intune** -1. From the **App Rules** area, click **Add**. - - The **Add App Rule** box appears. - - ![Microsoft Intune, Importing your AppLocker policy file using Intune](images/intune-add-applocker-xml-file.png) - -2. Add a friendly name for your app into the **Title** box. In this example, it’s *Allowed app list*. - -3. Click **Allow** from the **Windows Information Protection mode** drop-down list. - - Allow turns on WIP, helping to protect that app’s corporate data through the enforcement of WIP restrictions. Instructions for exempting an app are included in the [Exempt apps from WIP restrictions](#exempt-apps-from-wip-restrictions) section of this topic. - -4. Pick **AppLocker policy file** from the **Rule template** drop-down list. - - The box changes to let you import your AppLocker XML policy file. - -5. Click **Import**, browse to your AppLocker XML file, click **Open**, and then click **OK** to close the **Add App Rule** box. - - The file is imported and the apps are added to your **App Rules** list. - -### Exempt apps from WIP restrictions -If you're running into compatibility issues where your app is incompatible with WIP, but still needs to be used with enterprise data, you can exempt the app from the WIP restrictions. This means that your apps won't include auto-encryption or tagging and won't honor your network restrictions. It also means that your exempted apps might leak. - -**To exempt a store app, a desktop app, or an AppLocker policy file app rule** -1. From the **App Rules** area, click **Add**. - - The **Add App Rule** box appears. - -2. Add a friendly name for your app into the **Title** box. In this example, it’s *Exempt apps list*. - -3. Click **Exempt** from the **Windows Information Protection mode** drop-down list. - - Be aware that when you exempt apps, they’re allowed to bypass the WIP restrictions and access your corporate data. To allow apps, see the [Add app rules to your policy](#add-app-rules-to-your-policy) section of this topic. - -4. Fill out the rest of the app rule info, based on the type of rule you’re adding: - - - **Store app.** Follow the **Publisher** and **Product name** instructions in the [Add a store app rule to your policy](#add-a-store-app-rule-to-your-policy) section of this topic. - - - **Desktop app.** Follow the **Publisher**, **Product name**, **Binary name**, and **Version** instructions in the [Add a desktop app rule to your policy](#add-a-desktop-app-rule-to-your-policy) section of this topic. - - - **AppLocker policy file.** Follow the **Import** instructions in the [Add an AppLocker policy file](#add-an-applocker-policy-file) section of this topic, using a list of exempted apps. - -5. Click **OK**. - -## Manage the WIP protection mode for your enterprise data -After you've added the apps you want to protect with WIP, you'll need to apply a management and protection mode. - -We recommend that you start with **Silent** or **Allow Overrides** while verifying with a small group that you have the right apps on your protected apps list. After you're done, you can change to your final enforcement policy, either **Allow Overrides** or **Block**. - -|Mode |Description | -|-----|------------| -|Block|WIP looks for inappropriate data sharing practices and stops the employee from completing the action. This can include sharing info across non-enterprise-protected apps in addition to sharing enterprise data between other people and devices outside of your enterprise.| -|Allow Overrides|WIP looks for inappropriate data sharing, warning employees if they do something deemed potentially unsafe. However, this management mode lets the employee override the policy and share the data, logging the action to your audit log, accessible through the [Reporting CSP](https://go.microsoft.com/fwlink/p/?LinkID=746459). | -|Silent |WIP runs silently, logging inappropriate data sharing, without blocking anything that would’ve been prompted for employee interaction while in Allow Overrides mode. Unallowed actions, like apps inappropriately trying to access a network resource or WIP-protected data, are still blocked.| -|Off (not recommended) |WIP is turned off and doesn't help to protect or audit your data.

After you turn off WIP, an attempt is made to decrypt any WIP-tagged files on the locally attached drives. Be aware that your previous decryption and policy info isn’t automatically reapplied if you turn WIP protection back on.| - -![Microsoft Intune, Set the protection mode for your data](images/intune-protection-mode.png) - -## Define your enterprise-managed corporate identity -Corporate identity, usually expressed as your primary Internet domain (for example, contoso.com), helps to identify and tag your corporate data from apps you’ve marked as protected by WIP. For example, emails using contoso.com are identified as being corporate and are restricted by your Windows Information Protection policies. - -You can specify multiple domains owned by your enterprise by separating them with the "|" character. For example, (`contoso.com|newcontoso.com`). With multiple domains, the first one is designated as your corporate identity and all of the additional ones as being owned by the first one. We strongly recommend that you include all of your email address domains in this list. - -**To add your corporate identity** -- Type the name of your corporate identity into the **Corporate identity** field. For example, `contoso.com` or `contoso.com|newcontoso.com`. - - ![Microsoft Intune, Set your primary Internet domains](images/intune-corporate-identity.png) - -## Choose where apps can access enterprise data -After you've added a protection mode to your apps, you'll need to decide where those apps can access enterprise data on your network. - -There are no default locations included with WIP, you must add each of your network locations. This area applies to any network endpoint device that gets an IP address in your enterprise’s range and is also bound to one of your enterprise domains, including SMB shares. Local file system locations should just maintain encryption (for example, on local NTFS, FAT, ExFAT). - ->[!IMPORTANT] ->Every WIP policy should include policy that defines your enterprise network locations.
->Classless Inter-Domain Routing (CIDR) notation isn’t supported for WIP configurations. - -**To define where your protected apps can find and send enterprise data on you network** - -1. Add additional network locations your apps can access by clicking **Add**. - - The **Add or edit corporate network definition** box appears. - -2. Type a name for your corporate network element into the **Name** box, and then pick what type of network element it is, from the **Network element** drop-down box. This can include any of the options in the following table. - - ![Microsoft Intune, Add your corporate network definitions](images/intune-networklocation.png) -

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Network location typeFormatDescription
Enterprise Cloud ResourcesWith proxy: contoso.sharepoint.com,contoso.internalproxy1.com|
contoso.visualstudio.com,contoso.internalproxy2.com

Without proxy: contoso.sharepoint.com|contoso.visualstudio.com

Specify the cloud resources to be treated as corporate and protected by WIP.

For each cloud resource, you may also optionally specify a proxy server from your Enterprise Internal Proxy Servers list to route traffic for this cloud resource. Be aware that all traffic routed through your Enterprise Internal Proxy Servers is considered enterprise.

If you have multiple resources, you must separate them using the "|" delimiter. If you don’t use proxy servers, you must also include the "," delimiter just before the "|". For example: URL <,proxy>|URL <,proxy>.

Personal applications will be able to access Enterprise Cloud Resources if the resource in the Enterprise Cloud Resource Policy has a blank space or an invalid character, such as a trailing dot in the URL.

Important
In some cases, such as when an app connects directly to a cloud resource through an IP address, Windows can’t tell whether it’s attempting to connect to an enterprise cloud resource or to a personal site. In this case, Windows blocks the connection by default. To stop Windows from automatically blocking these connections, you can add the /*AppCompat*/ string to the setting. For example: URL <,proxy>|URL <,proxy>|/*AppCompat*/.

When using this string, we recommend that you also turn on [Azure Active Directory Conditional Access](https://docs.microsoft.com/azure/active-directory/active-directory-conditional-access), using the Domain joined or marked as compliant option, which blocks apps from accessing any enterprise cloud resources that are protected by conditional access.

Enterprise Network Domain Names (Required)corp.contoso.com,region.contoso.comSpecify the DNS suffixes used in your environment. All traffic to the fully-qualified domains appearing in this list will be protected.

This setting works with the IP ranges settings to detect whether a network endpoint is enterprise or personal on private networks.

If you have multiple resources, you must separate them using the "," delimiter.

Enterprise Proxy Serversproxy.contoso.com:80;proxy2.contoso.com:443Specify your externally-facing proxy server addresses, along with the port through which traffic accesses the Internet.

This list must not include any servers listed in the Enterprise Internal Proxy Servers list, because they’re used for WIP-protected traffic.

This setting is also required if there’s a chance you could end up behind a proxy server on another network. In this situation, if you don't have a proxy server pre-defined, you might find that enterprise resources are unavailable to your client device, such as when you’re visiting another company and not on the guest network. To make sure this doesn’t happen, the client device also needs to be able to reach the pre-defined proxy server through the VPN network.

If you have multiple resources, you must separate them using the ";" delimiter.

Enterprise Internal Proxy Serverscontoso.internalproxy1.com;contoso.internalproxy2.comSpecify the proxy servers your devices will go through to reach your cloud resources.

Using this server type indicates that the cloud resources you’re connecting to are enterprise resources.

This list shouldn’t include any servers listed in the Enterprise Proxy Servers list, which are used for non-WIP-protected traffic.

If you have multiple resources, you must separate them using the ";" delimiter.

Enterprise IPv4 Range (Required, if not using IPv6)**Starting IPv4 Address:** 3.4.0.1
**Ending IPv4 Address:** 3.4.255.254
**Custom URI:** 3.4.0.1-3.4.255.254,
10.0.0.1-10.255.255.254
Specify the addresses for a valid IPv4 value range within your intranet. These addresses, used with your Enterprise Network Domain Names, define your corporate network boundaries.

If you have multiple ranges, you must separate them using the "," delimiter.

Enterprise IPv6 Range (Required, if not using IPv4)**Starting IPv6 Address:** 2a01:110::
**Ending IPv6 Address:** 2a01:110:7fff:ffff:ffff:ffff:ffff:ffff
**Custom URI:** 2a01:110:7fff:ffff:ffff:ffff:ffff:ffff,
fd00::-fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff
Specify the addresses for a valid IPv6 value range within your intranet. These addresses, used with your Enterprise Network Domain Names, define your corporate network boundaries.

If you have multiple ranges, you must separate them using the "," delimiter.

Neutral Resourcessts.contoso.com,sts.contoso2.comSpecify your authentication redirection endpoints for your company.

These locations are considered enterprise or personal, based on the context of the connection before the redirection.

If you have multiple resources, you must separate them using the "," delimiter.

- -3. Add as many locations as you need, and then click **OK**. - - The **Add corporate network definition** box closes. - -4. Decide if you want to Windows to look for additional network settings: - - ![Microsoft Intune, Choose if you want Windows to search for additinal proxy servers or IP ranges in your enterprise](images/intune-network-detection-boxes.png) - - - **Enterprise Proxy Servers list is authoritative (do not auto-detect).** Click this box if you want Windows to treat the proxy servers you specified in the network boundary definition as the complete list of proxy servers available on your network. If you clear this box, Windows will search for additional proxy servers in your immediate network. - - - **Enterprise IP Ranges list is authoritative (do not auto-detect).** Click this box if you want Windows to treat the IP ranges you specified in the network boundary definition as the complete list of IP ranges available on your network. If you clear this box, Windows will search for additional IP ranges on any domain-joined devices connected to your network. - -5. In the required **Upload a Data Recovery Agent (DRA) certificate to allow recovery of encrypted data** box, click **Browse** to add a data recovery certificate for your policy. - - ![Microsoft Intune, Add your Data Recovery Agent (DRA) certificate](images/intune-data-recovery.png) - - After you create and deploy your WIP policy to your employees, Windows will begin to encrypt your corporate data on the employees’ local device drive. If somehow the employees’ local encryption keys get lost or revoked, the encrypted data can become unrecoverable. To help avoid this possibility, the DRA certificate lets Windows use an included public key to encrypt the local data, while you maintain the private key that can unencrypt the data. - - For more info about how to find and export your data recovery certificate, see the [Data Recovery and Encrypting File System (EFS)](https://go.microsoft.com/fwlink/p/?LinkId=761462) topic. For more info about creating and verifying your EFS DRA certificate, see the [Create and verify an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate](create-and-verify-an-efs-dra-certificate.md). - -## Choose to set up Azure Rights Management with WIP -WIP can integrate with Microsoft Azure Rights Management to enable secure sharing of files via removable drives such as USB drives. For more info about Azure Rights Management, see [Microsoft Azure Rights Management](https://products.office.com/business/microsoft-azure-rights-management). To integrate Azure Rights Management with WIP, you must already have Azure Rights Management set up. - -To configure WIP to use Azure Rights Management, you must set the **AllowAzureRMSForEDP** MDM setting to **1** in Microsoft Intune. This setting tells WIP to encrypt files copied to removable drives with Azure Rights Management, so they can be shared amongst your employees on computers running at least Windows 10, version 1703. - -Optionally, if you don’t want everyone in your organization to be able to share your enterprise data, you can set the **RMSTemplateIDForEDP** MDM setting to the **TemplateID** of the Azure Rights Management template used to encrypt the data. You must make sure to mark the template with the **EditRightsData** option. - ->[!IMPORTANT] ->Curly braces -- {} -- are required around the RMS Template ID. - ->[!NOTE] ->For more info about setting the **AllowAzureRMSForEDP** and the **RMSTemplateIDForEDP** MDM settings, see the [EnterpriseDataProtection CSP](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/enterprisedataprotection-csp) topic. For more info about setting up and using a custom template, see [Configuring custom templates for the Azure Rights Management service](https://docs.microsoft.com/information-protection/deploy-use/configure-custom-templates) topic. - -## Choose your optional WIP-related settings -After you've decided where your protected apps can access enterprise data on your network, you’ll be asked to decide if you want to add any optional WIP settings. - -![Microsoft Intune, Choose any additional, optional settings](images/intune-optional-settings.png) - -**To set your optional settings** -1. Choose to set any or all of the optional settings: - - - **Show the Personal option in the File ownership menus of File Explorer and the Save As dialog box.** Determines whether users can see the Personal option for files within File Explorer and the **Save As** dialog box. The options are: - - - **Yes, or not configured (recommended).** Employees can choose whether a file is **Work** or **Personal** in File Explorer and the **Save As** dialog box. - - - **No.** Hides the **Personal** option from employees. Be aware that if you pick this option, apps that use the **Save As** dialog box might encrypt new files as corporate data unless a different file path is given during the original file creation. After this happens, decryption of work files becomes more difficult. - - - **Prevent corporate data from being accessed by apps when the device is locked. Applies only to Windows 10 Mobile**. Determines whether to encrypt enterprise data using a key that's protected by an employee's PIN code on a locked device. Apps won't be able to read corporate data when the device is locked. The options are: - - - **Yes (recommended).** Turns on the feature and provides the additional protection. - - - **No, or not configured.** Doesn't enable this feature. - - - **Revoke encryption keys on unenroll.** Determines whether to revoke a user’s local encryption keys from a device when it’s unenrolled from Windows Information Protection. If the encryption keys are revoked, a user no longer has access to encrypted corporate data. The options are: - - - **Yes, or not configured (recommended).** Revokes local encryption keys from a device during unenrollment. - - - **No.** Stop local encryption keys from being revoked from a device during unenrollment. For example, if you’re migrating between Mobile Device Management (MDM) solutions. - - - **Allow Windows Search to search encrypted corporate data and Store apps.** Determines whether Windows Search can search and index encrypted corporate data and Store apps. The options are: - - - **Yes.** Allows Windows Search to search and index encrypted corporate data and Store apps. - - - **No, or not configured (recommended).** Stops Windows Search from searching and indexing encrypted corporate data and Store apps. - - - **Show the Windows Information Protection icon overlay.** Determines whether the Windows Information Protection icon overlay appears on corporate files in the Save As and File Explorer views. The options are: - - - **Yes.** Allows the Windows Information Protection icon overlay to appear on corporate files in the Save As and File Explorer views. Additionally, for unenlightened but allowed apps, the icon overlay also appears on the app tile and with *Managed* text on the app name in the **Start** menu. - - - **No, or not configured (recommended).** Stops the Windows Information Protection icon overlay from appearing on corporate files or unenlightened, but allowed apps. Not configured is the default option. - -2. Click **Save Policy**. - -## Related topics -- [Deploy your Windows Information Protection (WIP) policy](deploy-wip-policy-using-intune.md) - -- [Create and deploy a VPN policy for Windows Information Protection (WIP) using Microsoft Intune](create-vpn-and-wip-policy-using-intune.md) - -- [General guidance and best practices for Windows Information Protection (WIP)](guidance-and-best-practices-wip.md) - -- [Azure RMS Documentation Update for May 2016](https://blogs.technet.microsoft.com/enterprisemobility/2016/05/31/azure-rms-documentation-update-for-may-2016/) - -- [What is Azure Rights Management?]( https://docs.microsoft.com/information-protection/understand-explore/what-is-azure-rms) - ->[!NOTE] ->Help to make this topic better by providing us with edits, additions, and feedback. For info about how to contribute to this topic, see [Editing Windows IT professional documentation](https://github.com/Microsoft/windows-itpro-docs/blob/master/CONTRIBUTING.md). \ No newline at end of file diff --git a/windows/security/information-protection/windows-information-protection/deploy-wip-policy-using-intune.md b/windows/security/information-protection/windows-information-protection/deploy-wip-policy-using-intune.md deleted file mode 100644 index 6f1c74f23f..0000000000 --- a/windows/security/information-protection/windows-information-protection/deploy-wip-policy-using-intune.md +++ /dev/null @@ -1,50 +0,0 @@ ---- -title: Deploy your Windows Information Protection (WIP) policy using the classic console for Microsoft Intune (Windows 10) -description: After you’ve created your Windows Information Protection (WIP) policy, you'll need to deploy it to your organization's enrolled devices. -ms.assetid: 9c4a01e7-0b1c-4f15-95d0-0389f0686211 -keywords: WIP, Windows Information Protection, EDP, Enterprise Data Protection, Intune -ms.prod: w10 -ms.mktglfcycl: explore -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: justinha -ms.author: justinha -manager: dansimp -audience: ITPro -ms.collection: M365-security-compliance -ms.topic: conceptual -ms.date: 02/26/2019 ---- - -# Deploy your Windows Information Protection (WIP) policy using the classic console for Microsoft Intune -**Applies to:** - -- Windows 10, version 1607 and later -- Windows 10 Mobile, version 1607 and later - -After you’ve created your Windows Information Protection (WIP) policy, you'll need to deploy it to your organization's enrolled devices. Enrollment can be done for business or personal devices, allowing the devices to use your managed apps and to sync with your managed content and information. - -**To deploy your WIP policy** - -1. On the **Configuration policies** page, locate your newly-created policy, click to select it, and then click the **Manage Deployment** button. - - ![Microsoft Intune: Click the Manage Deployment link from the Configuration Policies screen](images/intune-managedeployment.png) - -2. In the left pane of the **Manage Deployment** box, click the employees or groups that should get the policy, and then click **Add**.

-The added people move to the **Selected Groups** list on the right-hand pane. - - ![Microsoft Intune: Pick the group of employees that should get the policy](images/intune-groupselection.png) - -3. After you've picked all of the employees and groups that should get the policy, click **OK**.

-The policy is deployed to the selected users' devices. - ->[!NOTE] ->Help to make this topic better by providing us with edits, additions, and feedback. For info about how to contribute to this topic, see [Editing Windows IT professional documentation](https://github.com/Microsoft/windows-itpro-docs/blob/master/CONTRIBUTING.md). - -## Related topics -- [Create a Windows Information Protection (WIP) policy using Microsoft Intune](create-wip-policy-using-intune.md) - -- [Create and deploy a VPN policy for Windows Information Protection (WIP) using Microsoft Intune](create-vpn-and-wip-policy-using-intune.md) - -- [General guidance and best practices for Windows Information Protection (WIP)](guidance-and-best-practices-wip.md) \ No newline at end of file From 583b6570ad6109f46fa9e13366181b8b316164fe Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Fri, 8 Mar 2019 09:54:26 -0800 Subject: [PATCH 02/22] revised intro added prereqs --- .../create-wip-policy-using-intune-azure.md | 21 ++++++++----------- 1 file changed, 9 insertions(+), 12 deletions(-) diff --git a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md index 505fe57327..03c97548b5 100644 --- a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md +++ b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md @@ -5,31 +5,28 @@ ms.prod: w10 ms.mktglfcycl: explore ms.sitesec: library ms.pagetype: security -ms.localizationpriority: medium author: justinha ms.author: justinha -manager: dansimp -audience: ITPro -ms.collection: M365-security-compliance -ms.topic: conceptual -ms.date: 02/28/2019 +ms.localizationpriority: medium +ms.date: 03/08/2019 --- -# Create a Windows Information Protection (WIP) policy by using Microsoft Intune +# Create a Windows Information Protection (WIP) policy with MDM using the Azure portal for Microsoft Intune **Applies to:** - Windows 10, version 1607 and later - Windows 10 Mobile, version 1607 and later (except Microsoft Azure Rights Management, which is only available on the desktop) -Microsoft Intune gives you an esay way to create and deploy a Windows Information Protection (WIP) policy. You can choose which apps to protect, the level of protection, and how to find enterprise data on the network. Intune can apply WIP policy to devices that are managed by using either: - -- Mobile Device Management (MDM), where the device is enrolled in Intune and fully managed by Intune features. -- Mobile Application Management (MAM), where Intune only manages the apps on a user's personal device. +Microsoft Intune has an easy way to create and deploy a Windows Information Protection (WIP) policy. You can choose which apps to protect, the level of protection, and how to find enterprise data on the network. Intune can manage the devices by using Mobile Device Management (MDM), where a device such as a company laptop is enrolled in Intune and fully managed by Intune features, or Mobile Application Management (MAM), where Intune only manages the apps on a user's personal device. >[!NOTE] >If the same user and device are targeted for both MDM and MAM, the MDM policy will be applied to devices joined to Azure AD and MAM will be preferred for personal devices that are workplace-joined (that is, added by using **Settings** > **Email & accounts** > **Add a work or school account**), the MAM-only policy will be preferred but it's possible to upgrade the device management to MDM in **Settings**. Windows Home edition only supports WIP for MAM-only; upgrading to MDM policy on Home edition will revoke WIP-protected data access. +## Prerequisites + +Before you can create a WIP policy using Intune, you need to configure an MDM or MAM provider in Azure Active Directory (Azure AD). MAM requires an [Azure Active Direcory (Azure AD) Premium license](https://docs.microsoft.com/azure/active-directory/fundamentals/active-directory-whatis#what-are-the-azure-ad-licenses). An Azure AD Premium license is also required for WIP auto-recovery, where a device can re-enroll and re-gain access to protected data. WIP auto-recovery depends on Azure AD registration to back up the encryption keys, which requires device auto-enrollment with MDM. + ## Add a WIP policy Follow these steps to add a WIP policy using Intune. @@ -414,7 +411,7 @@ There are no default locations included with WIP, you must add each of your netw Cloud Resources With proxy: contoso.sharepoint.com,contoso.internalproxy1.com|
contoso.visualstudio.com,contoso.internalproxy2.com

Without proxy: contoso.sharepoint.com|contoso.visualstudio.com - Specify the cloud resources to be treated as corporate and protected by WIP.

For each cloud resource, you may also optionally specify a proxy server from your Internal proxy servers list to route traffic for this cloud resource. Be aware that all traffic routed through your Internal proxy servers is considered enterprise.

If you have multiple resources, you must separate them using the "|" delimiter. If you don’t use proxy servers, you must also include the "," delimiter just before the "|". For example: URL <,proxy>|URL <,proxy>.

Personal applications will be able to access Enterprise Cloud Resources if the resource in the Enterprise Cloud Resource Policy has a blank space or an invalid character, such as a trailing dot in the URL.

Important
In some cases, such as when an app connects directly to a cloud resource through an IP address, Windows can’t tell whether it’s attempting to connect to an enterprise cloud resource or to a personal site. In this case, Windows blocks the connection by default. To stop Windows from automatically blocking these connections, you can add the /*AppCompat*/ string to the setting. For example: URL <,proxy>|URL <,proxy>|/*AppCompat*/.

When using this string, we recommend that you also turn on [Azure Active Directory Conditional Access](https://docs.microsoft.com/azure/active-directory/active-directory-conditional-access), using the Domain joined or marked as compliant option, which blocks apps from accessing any enterprise cloud resources that are protected by conditional access. + Specify the cloud resources to be treated as corporate and protected by WIP.

For each cloud resource, you may also optionally specify a proxy server from your Internal proxy servers list to route traffic for this cloud resource. Be aware that all traffic routed through your Internal proxy servers is considered enterprise.

If you have multiple resources, you must separate them using the "|" delimiter. If you don’t use proxy servers, you must also include the "," delimiter just before the "|". For example: URL <,proxy>|URL <,proxy>.

Important
In some cases, such as when an app connects directly to a cloud resource through an IP address, Windows can’t tell whether it’s attempting to connect to an enterprise cloud resource or to a personal site. In this case, Windows blocks the connection by default. To stop Windows from automatically blocking these connections, you can add the /*AppCompat*/ string to the setting. For example: URL <,proxy>|URL <,proxy>|/*AppCompat*/.

When using this string, we recommend that you also turn on [Azure Active Directory Conditional Access](https://docs.microsoft.com/azure/active-directory/active-directory-conditional-access), using the Domain joined or marked as compliant option, which blocks apps from accessing any enterprise cloud resources that are protected by conditional access. Protected domains From ac8cc5ee1de964477bab088f9e46a0a7ec558f38 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Fri, 8 Mar 2019 11:09:04 -0800 Subject: [PATCH 03/22] added Mobility step --- .../create-wip-policy-using-intune-azure.md | 10 +++++++++- .../images/mobility-provider.png | Bin 0 -> 20894 bytes 2 files changed, 9 insertions(+), 1 deletion(-) create mode 100644 windows/security/information-protection/windows-information-protection/images/mobility-provider.png diff --git a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md index 03c97548b5..2ec83c8744 100644 --- a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md +++ b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md @@ -18,7 +18,7 @@ ms.date: 03/08/2019 - Windows 10, version 1607 and later - Windows 10 Mobile, version 1607 and later (except Microsoft Azure Rights Management, which is only available on the desktop) -Microsoft Intune has an easy way to create and deploy a Windows Information Protection (WIP) policy. You can choose which apps to protect, the level of protection, and how to find enterprise data on the network. Intune can manage the devices by using Mobile Device Management (MDM), where a device such as a company laptop is enrolled in Intune and fully managed by Intune features, or Mobile Application Management (MAM), where Intune only manages the apps on a user's personal device. +Microsoft Intune has an easy way to create and deploy a Windows Information Protection (WIP) policy. You can choose which apps to protect, the level of protection, and how to find enterprise data on the network. The devices can be fully managed by Mobile Device Management (MDM), or managed by Mobile Application Management (MAM), where Intune only manages the apps on a user's personal device. >[!NOTE] >If the same user and device are targeted for both MDM and MAM, the MDM policy will be applied to devices joined to Azure AD and MAM will be preferred for personal devices that are workplace-joined (that is, added by using **Settings** > **Email & accounts** > **Add a work or school account**), the MAM-only policy will be preferred but it's possible to upgrade the device management to MDM in **Settings**. Windows Home edition only supports WIP for MAM-only; upgrading to MDM policy on Home edition will revoke WIP-protected data access. @@ -27,6 +27,14 @@ Microsoft Intune has an easy way to create and deploy a Windows Information Prot Before you can create a WIP policy using Intune, you need to configure an MDM or MAM provider in Azure Active Directory (Azure AD). MAM requires an [Azure Active Direcory (Azure AD) Premium license](https://docs.microsoft.com/azure/active-directory/fundamentals/active-directory-whatis#what-are-the-azure-ad-licenses). An Azure AD Premium license is also required for WIP auto-recovery, where a device can re-enroll and re-gain access to protected data. WIP auto-recovery depends on Azure AD registration to back up the encryption keys, which requires device auto-enrollment with MDM. +## Configure the MDM or MAM provider + +1. Sign in to the Azure portal. +2. Click **Azure Active Directory** > **Mobility (MDM and MAM)** > **Microsoft Intune**. +3. Configure the settings for MDM or MAM user scope and click **Save**: + + ![Configure MDM or MAM provider](images/mobility-provider.png) + ## Add a WIP policy Follow these steps to add a WIP policy using Intune. diff --git a/windows/security/information-protection/windows-information-protection/images/mobility-provider.png b/windows/security/information-protection/windows-information-protection/images/mobility-provider.png new file mode 100644 index 0000000000000000000000000000000000000000..280a0531dc078128e2525ce350470463b3307631 GIT binary patch literal 20894 zcmdSBbyQs4w=GCQNN@rKx8N2$IKiFZ6z=W>cSvw|cbCFFc!IkZF2UX1`;hOx``)kn z$-U$C>oNKdMxCltd$aAVIoDhhg5_kykl=CQp`f6UB*cXkprBrhK|#G*gnbQsqG+1j z3cS3sR}d3~Dj&h$1>U?d5s(&uf~tx{c+i6Z-ot$pSF?wLLhgL|dDUxEWC#T%&mti# zpyZ-`n648xH50$R+Ar%>`&l85lFu-2T#|c&3LP&`tKFq`-gJ}aV5rhI4(HNkz|i5ytk&Tv0!+1ufnrJ?a$F_Y`PFSCp(hBxay2Rg0Ce5d}6 zWzf1=+3bFgO&ba@X}7(s6%XqIIM~ZKseJB-z53T_2E7rUyHYwi(;wICTORsorJlcn z?inf`hueeZSRIxVjoZzS}qeB=KWqF8snr~ zn2Srs*Z$Ue05hfJaY8yWZB+o4P0q@DYt3~pK6PRSQ3dUb+PR<8R}}Z%ULEh?hI$OQ zuU7JmDmU{hT@~l_(@tKbLr0MN$V~O>4aMgjhP6mBF_UMu`_r8m&eGSqzy9u}08HBB zbfWg-G%*ggO!>okE+1;Dv5xlL_SR{Ba_6+O>DCq>-(A^poB2b_Rb@3nTo?V<7%UF2 zhnx923mvapBb+C(TPZq2URk`MB`i)g85@-DurJp@NQ`JwNf zB^@xM`PU>B{waN=DL$C>8J5I(hBnMPF=RD)ZGC%`*C-3>9#om= z(-xqs643Tht33RyHm^kGm~A3!t;Cp}IxH1V-jb7Vf!!)LRCLeKcU?8{M@|1nKQynb z*9YQ8P83iG;qfeYO&cpTf0o`Ib5&n>lSL+f`Fy^YI#^2F^4QSWZu;zCysKr?W}Tk) zyyIIjkcBk$K~zj^#rxS4$E4+HcHAhkl@=Q2Hj($F9uana36a#hD0cL|fsa*&H@bW{ z9v33JLq3%8E{9l1>LOoJd~Qz=CUS{dCB$fR2#3#sNe@F zWpLt9M!XaDE#%iQEoGyFIT5NL+~MW;>6SbX6hg>Lq>7~Z({bh4Ti;Fr-I)x^{PLuD z_cY&cv@av0L9|ZNZv!2a(|Ua~G1^v6RB|;Rl+bd2)a-rj?0p@o^B~wmUeNArxywG< z$1m_?w9@<$x+9*Tw^`_v+T+VI^}|IfbGJpY9jBLD@C3oany=Q`!P&%S$jIjFzKV)= zgj^mrJr3QVsls!OZCTrgE`O-Hx_*3_y%MBao*-^BGaa9f2aC=_l6QI&xPFGF;_Nh9 z3f_%Lvn#e%yHhYtZkN{WuKg=b`(+=WhZi8o*7&{87dA^DRe4E%B6?xp*3H=TQIq5- zK&f)m`yhLbbW6r z|F~Z0g^5zwpXF1gXSRCnYU*s^2OZFtH|5;ZcZ@E2gCOYVo2s=O9B5k?QR$w<>`Jk& zcQFxy0(nXvh^Wx_I}uJ&>K{{$qkGsL;K|FQpT?9)pFAu{#4rS{LQ;Qv*AE~Yw4a*~ zibaJ^_1y$jGQJ$xTx#XAH(A~J#kciSs58YYO!|SfkfcM$a!E9Zn=eF5k zSSRH1PGgWfD_$BWB0?J1gpywKr*5iG*g|!KtwZrjL=w;M=94xr?((_$Y+VYjxQcM} zh<3*zWD40g3u`=SV3!U0th&KetZ=jPZIdNP0Z%o74n0;Ud9ZZzz5QuH_1HULwgb77 zsP1^}__={+9HxrTEt51Lh)E|aTz8;(@`X>43s^0k-PNo(<*=K*-U)0X*&Z^h%=FqQ z=(UH0g8+Ooj`t;3x%44gjr(PJPQwBCWMHm2k#RhNhurl$R4#*0#Elw z6jPIC|NWJxe8+^Oj0`UT@eRjd+AT-K)!l^2gY7TlZa601?FdP?_D7e4TaglnU8gXg zxZ={6_z@D>z3HIm)o1X_5#vo_WyOB)uXy#vZ;y(=EF^v7N2e}cn@rYg)E!v26Rmi) zsnWeq8ArI0U|2$Pq+}W(~)FM#7aeljz}onTZ`XAp#bs=PCded8EbglY8G64Zld@MJ^~zT({e~ ziufYjB35#y_av;ZIn}cR-=h5#uYjTz;<*pm?p|hN)Q;?NHCCUNQ-?HlqKbC zc{?J-jEiYZkwB-$#zaaA6#zqPBF8!wk(}O}xXkP4i8GWUaY?)uQzdcwno)R6YR1bS z{0a&R+bzo+pf`KaN=Q&p{GQ)mJ}W|zV+B6DBrck_0ABy0NyA`#;F_^TmDBg{ccB0I z&MWX+D5xx6eh6@L>Rk~o6x8=SC=fuN3yRd2Un1%E`0oO%H?D zX-^>YJAi%(+&r#4KRz#F!bgp%opl2@(w >Q=_e@E1JD==3XX}jyJ@YsqaYR<5a zz4ACfZz%TwgS}O*54WsD$DaPM|hJQ>9LcQXQ>H=G;Z#CvL>uIZEr#&Y<|m$tFstMZvjpywn!` z-gYmy&hQy6=kZ>wHlikLpj#klex>aSu%qqt@(AjR_)nQi;)X(xBGRyX}sQY1Vx zydLY6c=gYGI76|?!A5c3bHbnoFQDm`pe!g{+^;M*4;5gQeg`g3_+}692Ar1Y&?jZa zXx_anq%VI3DEy>jIy?_GzGVJ~G`n2&^B4!oI`eVsRVPxzz;?{c(zo?8Jg*$D83Vhp zC4*QZLe~q1rznH+=2evE9BL9XN{ol90u4QqAYf{ll~T7RHY*Rezs28L)nazLwBofo zSDvm=1tNGH|H-AbspF$;c{0d+2o2sIz4}`J3QCts6$(UJTIon?_NLDCzK#S`(;%OD zb2rFLf4aPp^cZx8!pp+N`{a6G5;n7R6Azt(mc!MsX!jVNNk~BSco8o8z}wb8)PCpP z)BAjfsXT&beYL#F*`Yt=!|i*oVo}7oP!SJKQ4WjKc^-r-4>@G)VwEEnRw_IXZJ+?Mo z+RLt8D?&kqCc((DKL5^bHQ1-JoJu*IkpvyaqR0$#Z0|O!{W(riG`nR_brNbFn zuZY;jh4R-`KCsa;o2bEsWniON;e(oSE|L)&v0V3-qTuazughnO1HJ%vR;XVj1%==Q z@s#}BO8J_49a@FDj(1^j%ETep=63Fw7KpJfO>%WNlS1_bd~mFzO^oPYQL(tSuiLk_*vl*# z20_ZdM%X^#iC+JFI6lN-ZNFZ{oE;^txL=HA`}L?=5f1KuZV{HcjISB}{LJvALjm<& zWcc`T`S?*pgNk3!q`#2waW^MV%{1h-;d`Ohd9Sjske{o^je}3iB)^|6qBoxDn9tjv zx}LmRo(TH(pA7@=wZd+T)#a#Ty)Rh2zdiQaG>WX0^dHC0u0-eE;#oI#?^F(E9%pXE z<$!=l1oif{`P7w#Ke)%kMd#ev#3b_?U@Q*D)A5me?GLQ7 zAkt;-o#&?cUhAdG?J0-qKLf>I@PxneIqj=>J!!YJWtqQu9+kh)sS33Ko;F5Uxlmw@ zmFs>8^2UXECjfyc%j?tYmq6t^t`qnY#5DGb%vrdf7Q!=sUY1g)QfhRAt9VLo^> z8|ZOQ2t~o`|uT0 zt!6OT)@gou_>T4SA8J~Uku`9;%{45GvFha)3Sb_DG_JM;n# zIkl<_G)&|N({{UA+Fv1nDfAP|;O5f1!Mn<~Q4v`N*a!eJ@K54_&_ycI)~0@Yp{VP@ z3eicg<=Y&IQma#Bd--dd%U_#2#n*V4rczg_Zt|c3O?0z%qro^vQJICDkf`Img3zF@ z?&1(;xC$m~HK!Gfi@x!A@GV4wtExjEn5vNAsM2t#zskD`w9o4{-)kMB2q>oHUO!Z; zdX(lbew6|#X47XXt|&pOeSmKxa>bVb00cG0{x8t;FPQc(compsUh#6u{wDXVC3e8& zuM_=E#J`w^{J+Gsf9W_|ALRacIn#cger$Q{6G-HB6R)BjZ3J}5kD*j*o(EE{ecH`@ z+6_i)b~<$1$quwcgc+=U6_9tm&G+1hs6YP|66U<@+RN)1h(d&k1hB_L79%e6Ox;Il}F)9snj>2&CNZzPe` za6GLF84!}*24obe_oh~QKW%&0M>7+OkEC;(gx2mXFgHn|SG**0%<`l=qvUoinD|@{ z;(`DK=D}JB&oE-`Cr$IBULzoE=H=-Tan19?;Er$r|i* z5^VRTsNuj+P5AK;L@3pb3t>X*HT8shOv$_y95PeR-h z2D=KM1`Fueh$L=dNLia+7a5PMVxz2K|L4;6Q?ru5eZyuR+ zG;tCcbn5w{NxC-mBoGJ=Zls{chs0+eY<`=*$UG~LN6u(*Lc^-X)u{V0rXv_7xR1BK zh!ZT;vYEWng$1Ot($bDfb#wRx!2TA6X&2)@+GeQhp)#2HeLAn*>7SZ;!#(K9TsvIZ zcOfg(?d;lEx!KMagVx|gqEvQQ%a_9E%puHC`sXb9lHqiKY~vjRL4`78=a$6xXtb|@ zuXqgeA`q=fh&(c!dSYuw*vZh5bIMG*g{ws>N{0yw>f}Na(j=S!^A#(Uo8+45^rUpx zs7Wfu>OR#xqDfZy_aH+%k2eSb)O>cq^y$gZuNCBZo$t9Shc>LNT7*0}SiRVHrpggmNWYeOo?JUfiG(Ga?v$M)MYY zr$-z2N3%`VT?n?9W|d{n=(LgBFo^&IoMJEX&Z&;eB(zYjjGF!()OY?0r9+kWyZE2X z^jb|D{?eM{ML%wldk#m4c_FA)$CFF}=3L7yUK(U(hiynDTc3;u8FhqC;=dVs@{-k& zb-KzQwx&=^Wp@9vJ>syVdwoT=SKGY_1@(R>9t<3)DcWY(Sed@o5mp9BO&QKzVG1~G zjo}n49Y)YhaAyQ8tFeev6Wq7XVqVzBBb=dkq*Q3$2DS{at)a^hbj(`=9#Gf|WeBg` zY&H-KZ!@z{7t0${iwm|itxtSC@4fzD3CCjSrv4NwQ6aJ1Z1*Q{*2VSTn~Hw3J+Aj) z&&nG&*kL~%F}-hJlU|U)oo9%`_rSR1G&z&`cwllhRVb4VC_ginUhfn#B?w6VL@Ij0 zUz$k`zJmHVrU8l-D9|oDhJ4k)%uzP}lBb`&pFCUCeaoK{vb+tUZ6~&1A>YwQE4KAi zPiKq6o5s-znrj#h_SZN*k)nAf5bsYNKh>6wo{Ht`zTEnM4h<|k>q^M!YFJRE}7x&ylsZt zFl@@LRU514mX;iih6`$JPum(&$K0Jgo+f=1z7IT7J)PT}8DZ&I9MCwjE$xi`n=o&F zeS8IiE;ZLjA{Nr(frEzd<)IYeVt)mKJ$RbEMG$dUDB{)M@5t4){Q$_+3#ZO9_k;$& z<=+IBMXAij#UFbj5Fh%x!0UhRT$@8F$!vnzmNXmmMGPcGBZ>o@t8wI_d8*1e=}3P} z8p+7fO=WlC3I;T}0J%;4Bm#(3UoF&wOj}Qxc23DRS09Gzc)8YW zk~EUX?&-lbd4~vSnu2jJL*M#%_n*3DtiE9K-j%-G=yHx4B-A#n*K8 zWMhMnf$*+EtBsPG#=VaT3Y!cFdPox_`NA9KpLg4Rz^GnBqNEvQ@)m5n?ej(Rv9i3b zy#&r-VPU0O%}x#uafo+!59gzU4w*>??(@!ew|DDOGnpCDrzb`87rUFGhrjPT6!lcUGC(!@J7vas&zIF~6V>U413`y|E*H($Celp%Ii%HkY*(%reGyRp zd}W$gGg)eWAh_dR&Zg$3j?HOW%A&TA7sGgXK|5)On962V%`9rU)Z}=+HO!2SW5$+> zHic3o6wFFn%2sqwSZ1E*H1V`Jj6Y1j;%cq$xzXZu7~^7%vd2Mdnyp&%XK`;Kl5QoL zZS#uNzU6+AIc|@yU+KDZiPWOReer5dY>QqRLA63DoX`#t>TR%gamxOFe^eiCTYRfB zZLKow{HEm{p>@7tk!f^rmR0R^K4hHa3q2;eOe}TOu@Rqp?ZHa>bF>&?^zXjD*6U?j zfk)kl!~UgHx&7+^tLslFN5i}s#gx* zO7xE4-+xFRG!z53sUS2t%HF)MRsjR)0b|m|S4b(-rZ91lNDkfy3Ijep#6ria@7T4p zDO;Ll7^NHNVINNoF@=z|%BHXbgC}QJ;O~7uBOpCeMs;~!FPRwJy>_IkG8Wm{C6Sq$ zOIJ4YL~ESzT$vN4=^(vZilt9BIDL&ZrZp`2efMgr2zMB~=1b)y+YK(@b3tTNLi$AS zR%mV+-19zrbAQW5aFGgroam&ROK7ZRo-`xjQ(A|O0ksi)pJjp^<(h=Seo;=55W zF^XTvK~z!Wc58nab>xCR`h7z)+EV!aT7RZlrvXt7B6u29;aMOjnIcJU$CMW06p`-7 zrO^hd`{I5T6x0o_Hy%zA3PheuYGdrZ$^#91_%wKU2FiY90g)C{J$P6s59Qx@Qa-+m zY-^EW#Zn5d_;q-$uqk;AQ5YwQ=00CDTP*p}ExHM=r=o&4WdHj0t19_Il|e7CsTPMz z&CbA+mW50{T^a-$ewYt>X2KYZujRY8_&^RKy)O5or6SlXv#uqZWX!d=o&$PEquu7f{c-#A&Uh~KIN!@+`60TW z3Oz;{0BgYy+3N66vVy|dyZSuUt#SvqA;|ag=%N?leg|J7y+kKy5Ht|^Rx$L&iCzvb z+&^~~OJ2!w%CRzDI3sr6f7Gk&sNV>_p1av!mvYk9HGtqr5%P}q1jI_!ryH$%x7A&= zu~;rT2Us%qjn)|Qcx0^i&$|9#i8}4NM~Kzb=7&N=`_BnK|3Z@g9Tfnm`X8x9n)ieN z`GuN@*?OmhR0$4-fr9b`!Zi&L#-Vn&73R3r#OHIG__c1|EWZ0l-VkoCs3ysLWH4V*)Szg8~3sYZS z=AcWt*;5nnlEGE@a2Bg?e4X$56s$7JpmM*tqhmDXxO+-IAv@Z^i)Y@j!Rn*Z{hhH7 zEZXJCekP)&_78HjQr!j-I$V{*hA0vrDh(fs79i|7TmdOS;hd${DuNESEziv#U$F@M z=v_2V<+^^R^e=?NghliCax?i2iBxV*SXXm$%>t0Ou|JgS-kL?5KmA1tJC!Q~Hr!LP zVD%b_XF4~KqElfF-^nj%JTm$w6Ti{{2g2muWqJ3|LEovA zZR}qKGUJuokqgw35Ur&rYpBn3_+c&!ZL@(-%%^6Z&rCopLq(w{bhYgY_sx;fY>#o8 zMWIS!n+*;QLT`ziS$guV*8b*Wt624~;UZXH!a{eKMd4!DZDI|yxgrNrT^vgg%N}uS z;&H>8?L>Tfr&nZ(+h=7zd^dISvw4AY>tEJtq6McIv3MM+^^BaQS|QHO<{J0dtRsqK zzlpzJV@$<-cJ8XTS`h9M6`d|st8qG1$4OdXg&Ww})0STLTaH*x-lHREZ6*(DYgCTo zX8~jF$j9+HKw})%(}=)-?yj)v@$1SKZakTFz)l>=Iv^`mjiKrJQ?ILTZ7pq5#0fyT z3#lO+k{9mY8~RMiTo!d^SxyN~G0S?I3iy-{s1~4xiY%;3cZSa<*Tk@`T%$o-7y@I~N z87U9ym{lZSGr=`EK`S-J-DU)5`t;v(u1TTweN+pY*_d%d2{^Tdm%Z+WgZY$$I#x`#Y}U<=bx;;m`n1s}j9lkXaJH^|IMuOM5*&A*Frgw9 ziQj^R7CbCs8@LMNNJ@}lT5Ha4<1pnD0}HtBogkHo_;xJ8qQhLRAu|1M^3^Y;>HesC zZ0d&53TJTAO)A9$m7#f`YD`86QL7HLt@fwO(BhaVK`h569c}ivUo4+t2aXq*SV%Uk ztW0o-hDEvMS@6Qclj$xpt&CK9I2~Pusk(dZNYK}W@?Sr<`kUFKdXTM8r0!ZuB%ST9 zV4h;2_G~(xaVHGVQdWv33i(N35e2e<10Kkxw>aTZmMbaj<1zw#)ZViaV8&ag?dEZL zn~yw&$qVbnqkJu~)3}p+o{$Xv)3@RIE0l~ytl8>^0jyFuUL~^@!xrJuIBxblE4h3D zGMXhCcQ%?^;PJh=>+ihdaY^YUgjgE?4y-@k{w#5M5yTlWZSf}SOB|G=#p_$e<=U-H zuII+I2JevZIh+oX>cqsvBvyeV3C4>3-FnO|cx;P-9SLh!MDclOYMacS!rf_KcIFuR z4~{Ab+H-5IJ5;0IvP$0=hlr@~o-LVvoCvhfZ&mx9zE2;kt{Ya#>WUx2&n@0_buf1h z#B%~Jhn)dHC$f5_RAyJ?=B0=;wunh8S2y>9g7U=xME=tJ{@(}7oo*nb^b}K{c=%7F z^#7w+^dEutKPxKGP>65-f%ZQu9dDs7h=58LB0yfUj)6%Ty(F)mK-Ts@1$)s#tjVFS zY9n+O<{g;Rw-`3;ob`s5%*>cy9LU|C{On}az7J}h#_mmAK9H}tpV6+Pbjyx@Y{U4U zB71Q*6u0c)!drUmHj*FkwD?Pbd8?kfGGI*3?HP?V2*!1BRE0^ffKL;1Ykc59P4hsB z%;LhJTvqL>4;GWgTQx|K>NJUt>6xE$b@5xVZlt!2P#h?Eanlm>qa8y@xkBg%;Mw-v zD=s{0+Al}#eY{?IUJGRyaKN}wgHZH3T)8N{YO4o>iuOD%1+vQSoApQyre>hvo#}Zs$9?qE*YeH{(C31a z*tLr1^B(2;y&OacSw8kq6r;oPnB4i;H?qqIu^+QSE?u%#%-uH7Lun=H;J#X+AJ{MT z$pl8WKNydU^+tyvSqrpPX%q7jt&R32(HVwJG@5IQYikkPb2eOuOP|Di)+t&V%SL9g zDvg>MI(@V09PP#YA;u~>o%$25`{#7~uI2>#FzWnaRP3|cS~V@V)^mBeLk6Iv`_p=iFF_mqr>)n|~&k z8hzh&y6|%gkj(M($8!b4BoCQWeKbEV@Fqu|1gGgG+%$g5jYPpK!LS^tg?I4t*d#|z z{3(>Q@T1T&YN=zEH_%a3ihC;i+<5;&)Oz9_1zwd77IA$@4lL2fyyk@1lPk8c?QR@8 zq~;yzH1<*yPU(Wmf|ioxYn)*;zC5@`T3edvAQTqRMR-0;~eHktkaDJ6!NRcjQ{gh<^s3po}xI{#WKLmWX zq*boXuN-kK52qMrcH(ITE{5Ct3`|8^M<9Klm?*Pi%htvsC>CR92ADNAvUZQ9YA7*EbH&0*T_|tTX5>j+_3;p7 z)K3@ah-ynWEibt3Up3!}*X8L>IL}RXSb$V3*XvHnCA)yF~89voQF^tFeY>drK zq1Vp8+_ktvFx?iHK+v$+$z^`PIF4OP!ZfqyGADvyL8gQpMzN7+e*5rqRL>JyeT7y+ zz#D%Ud8aQy6dhFIHXzA`!WpsNRMj;lHrceYu3sf7tOaQS8)aIs1k1A6o&8eF7Y30; zBCck-`BWM*$gQm!M(ctOaneDaM}(hcM#(HX8CAihrGmqeUKgbDmC?~aavWu{IS|iG zs0o^MdJs(Dz#?oPnUtsb;gwt;JKy2;LD#AsT$yL6pxR_x9X!ixTRTlREFEG;-!4YX zG8`O=g{@fjS*mriqVC4>b}M=pab%MMiH0L(3P#n^Pzk!ROWDjr;&%x;%O)9(*zY`6 z8j&~wxzGz5qG>M`qT+CD5oDV$uz)q_y+-+7NO>b zofn_Sl|S!VF8k6bu#7VcqH*1neHoXZ3gCy#l9=`5HXYqkbcN?cO_+EhYv*H19d0w{kB_l26S^7P>4v z=fr~Rnz>S9IS=zjCp#f|w>f-Go1$hJ>#;s)6w7Z!#<5(;gSbMi$S0U__Z|lZmZrFq z0b)i57p`%n{x!#LgM$1Up@2~z{f`E-WNz5pX|h|PJoSl*IQ$rqVQP&IDv|>*o8zph zioY*(EveS~M07ewJoH;Y`ffOYNk;ZRxSBIDYJ$JZHP@v-$qcde{4FWs=wz(m+cqJ^&;kY-o z-0JRpIDZMKlsYXg@+}yzKzI&2Ib7coUkAXQPaK|!Ab|EMx1f7E3jKv7^IvLk_5i8) z?@@s)EOaQS3j#BV^A}OzKVm=m-{Uvmy>*bF7~hLar4Y%ne)mSegBtVx7qJ1*rGfGM zuc%DA_E#44!361{zAUURyo+zm8JT%vUnA&tZI^1HtDvxYd0{T%uSt6-jB?(MWjna> z8q6%%`o~WjS1>AGg06bW45)OLBYuGDcDI@^XmJ&p?Y^?M#14NC*$8$VHp78Sqqo08 zoFBICSuhSPg6Aq4Ib^S!8CeyIIU!`E1cjza+$WKr?%i&hx3{>UWmQN;GDLg28BXPfA zz`dT7nlDaS$oPsiB>`CmWkuHT>LBu;`MgQKVQ+p%r!Oo_c3Q z6Mbu|@NNzF%F=vAq&9-_KJxwL)=6t?9)b2*XBU5ox^Jy`FmxlX^j*bb-eXd@D33(W zwB>~N7c5+Xeo2&FQApg91f<@2X|LOIG~>&(c8&3{jn_F|@Q$zwn2kCUC;6K4A0dN1 z{+In0-InIjF#g)`0>d$zeu;do*$3+{@@Gcq=m&)NqCCmnDPxt%N+f!DV$C0Q6 zc+v|}N($5AOEFAK!M|G*K|hcw8J2>-eVjJVl@sjaW5YSlhdv)NX7j|U{Wzz9dTh!_ zKIl~sZ_xC{jf<~<&2LSxA(@6>Guc1@=Y`CeIWlT-)^3$baEqa-NN#2q-}rK=Q~oq< zn7`HZ`!qIL6`N?$DH?|rFd?X`E+2$?fdki`SY4a!*UNK%P@~)vRG0zKy<$Z`8lS5& z2z=w1g8;I(L18=GPcJ>uzO+qNKU;{viyUXXDQa=vYXS!R1*s+4-tWP%F@C_ok0U$D4{0uQ zoBS8#cUN(4v^u`Y1u-uw<@GX0K0m6LJvB?$E=CiFZ^{M5F{Ropj$~}zvWXBY?+=ZN zRYxyponVP^w@^lciqo2Y88;et$rj=_o?+<+wUZ# zMB$z?Aq{MJXg%j>e-gpFrs0|4PCg6-u>(KJ*N`4q|Tbrm$GVgQ+Eq27u_f9uKe zaJ~*$54Ae;cwjwB+*w`g+%>o_-9NfBb&jD9VBY5^!) zwp8-;JZuC#`7Bi2aI^_|AxuB%k`huiCUMM1a@a#`{0w_6aUVWU!D;fwi<;CLX4u8p zMa+gJ7MIe5MTK=k-=-jqbK&;oBUvp3>{aTDB_q;|Bwu_f=lWu4m}ttha_T_NLc^(n zZfqu5F6>6_L$Imemraear16)%$OH&a=an7QsiV5JQ4aGHyQMLFO152g2v5nU4xAHV zaB#{dQPU5mnB0jP)A+D@-4`Qfx%g9F*wSzV5RkV=Ghdh+*SI~%o~?DL`a0UKR`Wlj zgDg^XCrHUANR9kNQmWK8k%v(mkQm_fNzNbdYL?t7RSN&KeJz7EV2^6dReDL4$gR;G>oe#^G(oV#Jwr((T^!@+CSsCk7r{H zhddIVHrY18A)Ezhq3PYP2SH+f6g}xR(`vb7PF%_e-I5o zST{R%_<=mv?`@;U2I$9JahitP!^!)niO`+m zAiN_X{ebQSzuUnKha`a6AP~2bMbauE@ep90kF3NNXs$%>2}9Xiz2teRP<_K3>nt~7 z7>?~Fc(`idLxAziFv8#X1QcHOEfr0@#(IK+?0DI5SN2`q8^#uzGuxKIj@TY$1gQd< zmw&u*~MizQY|O&}kxzrx9@j`mF0jMavr zBzNaQy#5hp-jr~s9Ah?IyjVViK%BXFTNy1vRLRq-C-x@KBBej=4UAUwK9Po+ZY=3^ zaEiQ-3nXnM9X}Ukyn3r~?%!PP*ab1}uC0F)g+yg`&GU$@{>Ga&jF^~|V`PzEAMgq7 zgdcTU_=k`^uojpA(mr3>K$+>OV(%-llrl@94DO2B@QcLiEr`!PY$Fbre8FdxFn>e z=LGLoXH==bcBz2GyOiHmxv(C`mEMqILP@1Ud#S~>CcX-Ayx?;?4bA7~=H`7vn+gVN ze|`ISWromtsiez8(zK7!$?qw{Y*KB)4l`54-Q?wrL=IhI-YHo6v2&<96sy5D_;k zRm>Ly05UR7AXjId#h(5M57KB+0t4n*My&q<7jR>G1r#cx6F&3(2mMI@6aVc04uJuz zr1`;@y$Q?ok&yeY1n(z9nEq0l+kz6yGD#oCi zt5B9kF@I#Zj>4DY)nTqo$%5EBAi>4A3Ypc z^e)bVm`LyObaoWxla7vhe!S(1gnAObw;h6sREQ0rhA70^Kknkxztm|$UY+7{` z;ClayewvUU4xWR%!8u^mHYhfk9(JE?bNX#^Ch4wNDOwN@O%9ZFiSU~H|CK@dWZ=t@sjU#{tQ@nO+${8$vvlMv^ z<9HkwXxms#qvZ$5K!t=axT-dlmZh|@tp{h0)1 zzTn0|LgaX3sszAQ?U;iF-eTofr@7QO`1LXUq}aWtchh+jU_D_KxY-hNbdoVRyh zj-9~ODr^=k0+Y0YLi$Q8$WFH;ui4XF0@57T16Avvdx2M)7W7|5Kv{?c-?^23!#LLg_{o zY5uoGP4P65-lnbEus1RZoYV>xc}bt%425J{%XVr%$npJc-YUmRl2EtE4pE&k6*d

fAnTM39G}x^0>d#i{brLu)3iJSpylff=G3ujk z`C+i%>do0@ukvy1>HFgOjf9WJvD{cq#*vAE@I-lf?^aqo4u=uu0ZlwK@Wt#RNgFPo zEglk9MD7+RvKj1`02W2ZZ15}SGQdh2qY&GDqo$fcExhwyv4VIiX*=YvB$ijERud2~ zY&?m4+;)EiWWBRV{wBb023hH^>~0G52Z#V(m;QY)k&A25k*(Xzed2NBW5;ic3s9OI zYh}?+I9Qr?w+aojhn}Q5O$M zYREq588?gxRvG)wU2Noq;g{FvH*gQ8(NbhAxMzU_+BLwyY$3C$D z25`J$Vzer-&Ol4=U zf|vH2K00ZgsO4kmu+_LO6GgH%7gN9PFwYKt>QvpqHJG_3wPN)qBOj{SzP4 zA7q4{7xH*DC%}k`M^DAkRLj%Ahup>9Fr5;K6Hq32#jq%?V5u$jmS5~vGCFkyAzd_O z3a<~4tv|~`j%8=)%&o{#9)BBDW}EBEk8^_*1qFTv5Eanj8&dd?L~Yj5Be8$`-j#AG z;a6(*WfGoRpwJ{o__LW6!RE{2wB2+ws3Q%6td5sk*^F0{E!-#g(n(Scb?L!uf%h!K zE$$_0`VrtQbBV%u(*UX!~?C@ohukIpv3dMcwXF}8yW;4zes=> zs`053>`J$vGMLB^n-LuboO@%SM2^R1`SE^)``uUtetZpTQ<~r z`3RWQ_JsPVG!kDVJ_3{4b>TimYpUkP^TV zJ^#~|baxI6Dglyvx2++ZMJK_jCm-WZ=rnOC?WAf?tmpF_WZXte~p1W|J4{Mw4!mkGxJ{}E&vpl|HnY#|0NsC zUu7x%Uo{^zlktE2iLu=>vAiT2QyM=5*+VD{VmOBb=jex!L&`ux*n~{^PO% zBnhcEp_<_ok67wV{UCewOG_VjN7ADie8`44js<2an7X-h9QdnB-R_qp+i+5ad$HZS zUD)t%CC?-aRK}T~+P>Q%Ps^5*ATEp0XU%ewI18J;UE>o)IKkPmo+sy0e%CrR^a0sZBKE%n{6b=?+q-<7GN{Hs)%BUgR^6 zLkpc)CSW%he<8Mj)eHuLeQmnUd;ul&9kvi}t`Y$+F*1Ak_p4&WfAI(W?KmL;CT5ON z34Kre&Vl+V(A*DHSEkW0fDMSA*t&0ZAhS6I^hiJBKYfczhHagln5Ai_YcOZZKot~;%&{&44NjOazu)dl#AoYHT$|=o4EamM3$Btr+IVldg6iec z3VHC3dwMrG9TyeAKzTtG2T)xWZqK*d&*Cd)R{?pMoa7(x7Lbi)Jx6`t)j?}qkKhKL zdB@8=Q1Zx2YV+das$D;rs~P3J{}hblna|C3S`YOfa(w;&w20mNFGcM1`rKP`gIH!L zBRB78ir$|#7gzpzQ8T_vqs*CF)RB#h>DtD+*?>VH)w*1xDu;=jv{#AL7L#B;^7cb{oLb5xWPcu!vL$1?EqeK<3O1U1lDv8(lJ<_v~{OrO8^jZanhXhU&)K zDK8xnR}~e)FD9@0Z6YKDjCpYN?k8Y%TykEq>OKHiqzzl@^fD0tr6tB5c4QzFlnJN% z!n_aJ(;q*jx+u+U`Q}tfu$SRwp8f36rwU0i=lp>Gwf;dTCU4A7jL`=$mP6Dobw=yn1;!5-t}t~QSe1y#FnK);-Ly^&i%C6(tD z^l7=Ulb$6tLAi^I<5+3N$1qB@saqHN$lxgqUtX3m@O0XQ=e&c>(nz@GxaHJvO%YFY zRPcBE8;D^S(V4uT3t4Mq)O*~(G+tRVoPCymuP|fW`3)!-J7om{=4>?_(ibt|&#zZF zVPRu&Z-yhSm87p(%ut#JsTLfP-|HvjBMJNWD(YIg(gKCw&cuYmLUGM>6a;K+G)26(x)Wia>{pZ-oIO8g-i{ zbk(=jPXxHFLnW{CEk>@>=H97{>Dr3vy)87ZsfUTlbVhXJK}iHcxC=>&}2O`9YJSb zTy1^$9^!yZ{fvCu*Z6@yk|t9=F}sM4x}op|5;kb&!Sf+4Tt5b}3SVl%FI7Y-mQNP# zp*0ZmGuPN}EcxP$u!v27`jCML;@3}HcdR5mkM7)XavyW1!_~70MZlU!-w>TJhT8!n znhT`yRWJ&3gp$A~hlE8$gan0$jh(#sYq4>%sqt83G5H~gpVyyEkAi%pa+8CZ)cMV3 z<1n{lMdxB6ZmK|aS7T3;Mq{qF7A5!Cnql({CoSFP7+l#W&LAysPySNpy^33C`$1DF zi|Go|Ya8JRFHi4tqN9}86JZ%iJw$U&D{BYTm`^9!!LQ+QU!TL8?ePA>mQj~P z;=3Gw&3#3UjXMi4YdgQn%7GsL9jes#_lsJlX&DmJ0eY26YHI$d*NgU%K>)V}a4-vW z2>dI9_^ey`Mz9&THGcKHf3FoKVe;uLc4&%L!w{>e&TAZAzJ(Z;C+*LkwWq3+g>x@SUWrA$Tr{T+0EpBpXSm0B8hH#tF3F5-V^_!MP9!k zNqCbgxqqMdU~P=hq(s=5lrIY^kuCC#@2@{4xEf@iB)Da{Io>4)7o8{aZl4SDB0J?q zb&&jM5sCAg`N`kTCvZ2F6__G%E#sssK>NTYRjq7Oh#qBSkT-&Pqk}?hS_BF&upHt^ z&IQ}LfAlDMpPJf}go8Ta@UvCb7JSeD)y-y`XRfVWS$| z>gf+X>$LE$HjpD4+FIF|7Sk>dj`OyvmXKG|5f&G8z^fZfWMdF@-bPqhW|w& zeM25c`(vE+zw_O%nz)jL_@Ubx*=AbEN7|Ii$)G+KJ*TM+@whoUtj(@KkJcaSsgbu* zuIN=hvs}QO8I}#)oGO%0Ay{O)Vr>nv%xx!w&2(@dtn+rt>>|PoNLY#NQmMY1Jtkh= z6>HzSNZwo~1NHkFxC^&Nc_Hi58A`ju>(sYa^B+36?g-GqsMy}Yj?cd0O>j((i-J6M z6p>J79<~X^q-JSAcR8WHlo2BlO!Y^8r=z1|{Nb*>^hoL=$6c^5V(3ltJi2Er*IsY<@3%YAHMCTT{S{1FvBOsa>wr;*X_)r`gJZHbc$&W> z$yyZ`HS>c_ldw;4&suVQcNvx@ zsgEf`&ctk~pf*YW`b(+m?id?h2N-S<+bJ^+%FtZj}_^pHTve*zt;Qq>kVu zyef^e$PY2CO433ccaP&+tF#ArKy@lFt;G6T%l+UBT9+|lS?=CAL6n$ybzI*DQinXV zddNS;ejkv=Sr`BY_UC{|CaS^3{M%azdf+5bLbSvMN58GPkxD9?zvzxUMFWcY_2Upf8Kt8 zrCe3@oJxI_g z;CA+$=p9$tI^X??zyl>duKnpl{HwO~BEbv#Y=hCkj3{q*_v3uP01he{_B=xl*{<+7 zg_dw&E3<+*Om*n=k1-K0-372gY_A8|FmcMG#IP1N4-xB8*UvW1FRdD~@ZWEYO>@lW zPv4Oc=Zl8j?u=zC*5RNlFtJcS$GKC6ZF(SPJPaE=`5je`QBx zi3QZ?Il1gc%Lrmd@Y;&&;c|ChS0TRRv%IRi^8@L_MGiEF?h-YwN#EdX9uGIw0E~W{ z)FM)_l3PKNW1mA!byxJFw>ozx{)>w>SY3;IBKlwogZi#z`6qtQl<}jb8LJA#mvLpN zRd-i3j?3KR{f)W))Al)35XiMY(rrXE@(*7_hA}}JXBs^l0B=23n$IYFVUk^oed_ zm*1|WE^*2nSm|CllAy*bMJ#pw9yC(NCp9;Ss>7!H#9}wMs>aT&)6j_JrA(SIu7VVP z3wph5z0qXkw}1}IIgL7u7gI-(JnD7r}HJ9Y>7te&jN& z*{Nnz(%89ozoqWLn={vq8hdJDuI4KoQZD4@Z^Y#Ai`%uB^_@wVm*_$FCLw7M=T<5* zaIPBNF!nA>pBI-sf~r->quV7;bd0J_i#S8YS Date: Fri, 8 Mar 2019 11:30:18 -0800 Subject: [PATCH 04/22] added image --- .../create-wip-policy-using-intune-azure.md | 32 +++++++----------- .../images/create-app-protection-policy.png | Bin 0 -> 37524 bytes 2 files changed, 13 insertions(+), 19 deletions(-) create mode 100644 windows/security/information-protection/windows-information-protection/images/create-app-protection-policy.png diff --git a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md index 2ec83c8744..41d9d886e3 100644 --- a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md +++ b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md @@ -21,7 +21,7 @@ ms.date: 03/08/2019 Microsoft Intune has an easy way to create and deploy a Windows Information Protection (WIP) policy. You can choose which apps to protect, the level of protection, and how to find enterprise data on the network. The devices can be fully managed by Mobile Device Management (MDM), or managed by Mobile Application Management (MAM), where Intune only manages the apps on a user's personal device. >[!NOTE] ->If the same user and device are targeted for both MDM and MAM, the MDM policy will be applied to devices joined to Azure AD and MAM will be preferred for personal devices that are workplace-joined (that is, added by using **Settings** > **Email & accounts** > **Add a work or school account**), the MAM-only policy will be preferred but it's possible to upgrade the device management to MDM in **Settings**. Windows Home edition only supports WIP for MAM-only; upgrading to MDM policy on Home edition will revoke WIP-protected data access. +>If the same user and device are targeted for both MDM and MAM, the MDM policy will be applied to devices joined to Azure AD. For personal devices that are workplace-joined (that is, added by using **Settings** > **Email & accounts** > **Add a work or school account**). the MAM-only policy will be preferred but it's possible to upgrade the device management to MDM in **Settings**. Windows Home edition only supports WIP for MAM-only; upgrading to MDM policy on Home edition will revoke WIP-protected data access. MAM supports only one user per device. ## Prerequisites @@ -31,37 +31,31 @@ Before you can create a WIP policy using Intune, you need to configure an MDM or 1. Sign in to the Azure portal. 2. Click **Azure Active Directory** > **Mobility (MDM and MAM)** > **Microsoft Intune**. -3. Configure the settings for MDM or MAM user scope and click **Save**: +3. Click **Restore Default URLs** or enter the settings for MDM or MAM user scope and click **Save**: ![Configure MDM or MAM provider](images/mobility-provider.png) -## Add a WIP policy -Follow these steps to add a WIP policy using Intune. +## Create a WIP policy -**To add a WIP policy** -1. Open Microsoft Intune and click **Client apps**. +1. Sign in to the Azure portal. - ![Open Client apps](images/open-mobile-apps.png) +2. Open Microsoft Intune and click **Client apps** > **App protection policies** > **Create policy**. -2. In **Client apps**, click **App protection policies**. + ![Open Client apps](images/create-app-protection-policy.png) - ![App protection policies](images/app-protection-policies.png) +3. In the **App policy** screen, click **Add a policy**, and then fill out the fields: -3. In the **App policy** screen, click **Add a policy**, and then fill out the fields: - - **Name.** Type a name (required) for your new policy. + - **Name.** Type a name (required) for your new policy. - - **Description.** Type an optional description. + - **Description.** Type an optional description. - - **Platform.** Choose **Windows 10**. + - **Platform.** Choose **Windows 10**. - - **Enrollment state.** Choose **With enrollment**. + - **Enrollment state.** Choose **Without enrollment** for MAM or **With enrollment** for MDM. - ![Add a mobile app policy](images/add-a-mobile-app-policy.png) + ![Add a mobile app policy](images/add-a-mobile-app-policy.png) - >[!Important] - >Choosing **With enrollment** only applies for organizations using MDM. If you're using MAM only (without device enrollment), see [Create a Windows Information Protection (WIP) policy with MAM using the Azure portal for Microsoft Intune](create-wip-policy-using-mam-intune-azure.md). - -4. Click **Protected apps** and then click **Add apps**. +4. Click **Protected apps** and then click **Add apps**. ![Add protected apps](images/add-protected-apps.png) diff --git a/windows/security/information-protection/windows-information-protection/images/create-app-protection-policy.png b/windows/security/information-protection/windows-information-protection/images/create-app-protection-policy.png new file mode 100644 index 0000000000000000000000000000000000000000..345093afc893cb1a31261a2d796fdf0c937d87ee GIT binary patch literal 37524 zcma&N1yo!?*DcryF+6yJ26qS&+}+(ZxVt+E?(WjKyE_3waCdF2ardT?*L?r{Z@roI z-puq`w{KOgbMLJ>RdwprKD)vcF>*{|$C~ zr&EVR?9a2~8&e0HyEsdNW{GVhjMpQ%i~ns<`W& ztikJGf?qzKYhu2^QbOv8(V4`&DyAr^N{=wrk|caNJ_lgXj3Gfyc6Bw?4jC_~=)W_? zOfyH($wrOAHJ+DX${Ngx@chA0iGF|k!oxCw-_AYK`VA3yXO(1@?XjC?Waioh9c8J< zht&h%uRIg$H#9WV`~?ab%Mmz?2(aeBe&dCb2^6e(osQuDDT2#pEkU|mu3r7$BH(A} zSuxs46drq^L2+_iTwGF;=x=8>9X2y|px3?KU7r&!?;qyjiMg+gAgytS?E!QC$=V93 z{oy29LPA14Jw59d%y>prtyuP_E7MMh>MqUQgBmSXOS7`G>w!ykw=+MEUk{Y_^kbX! zVvd*e?Uk}t)P>R4!i2=cowKuv4`qR!Ge>^s8*wK_gdEVhKMY6uIn-<)067n3`rUj{ z=8|+&NGW3{b7wkWu||Zr2?6!uAT!i(%lQ!GWoV&z2J zy4w*Lsu}zZGQCX%Izi8Ss=*m40ho33FHm<@)sT7dvHNb!oTnJL1SyiNAX^1twp_}; zTahqT^g#T6*je05ZS8 z%jpaPaZ$GN92^`BEZz(mlwKCkSq?;gz3Ru&FDNdqr-SOSR`D``be)2c5w^DLP?sx& zJV>vOrfN{|CQIzT!zx@j_|{~hP&$PY=zTdO&)?~^hcZ&f_#9Dx=L5dHO0luMs_w?y zot8aO5>^g=`c*+(Y;Yj8Ep~mYg#jnqeQefu7n#Ld{Q1t_OKqp3ueaBBt*z1H%9Kqf z_5MIlPrlWf)QjUxNDPK!(N0fK zYa|n77R{H8GaN;O4Eh2uhF3?jfgjpFWdtw`g&%nd%Z`8U5H)IET#5Z#14piPC;~x_t3k!>8a@qYXC4(2C{#+d+p6i8I5jeue zLTHs}P^NHcNc-%>oi6}HdmA4$YKAbvXiar$A3W?BP7YQ~{vmOe4;K4uCN4paWv5^J zcaILSf~7lupiaa=eG})Vc5IHw-8TcrsU@ITdsk@$iNl~XmUH+6%N0;Lsvtu-1Xke}&7V9yTA*AKz+tr(4 z&MQ@==|W)B+SV4IbGtj10rGp{9jP-qn-vVJ)9X6i?wfrb73^O! z6Y5lRhMeyJ3gnz@dE{{^sv^?DOg-yZ2i0tqK!Taz4ms!XlbWsc*y^d&c?)lgU1f%9 zU*}zN>P|6^iM6n_tXz*cxg_5F+qM`Lxk5Dw1?c0|gt(ZPshL?l9hP&?WA?@2gHy1| z=DL18YgXqVd?bB+aA1@7uzTT)cx%4d`N+AUO}eOCjZPRe6`?Ue}9TEaC_& zj}y^I>#@i0i6P%9lS%8g-w$ENCc0jHa~#}7Hv>cskirZ^plxX}OY#t2^5}#8zX|90 zX|+q;FEjV`rVQ0_mDhsG29W+rxsj1_BVJ;~tug7}TAh0GzqRU@M(eDPWm#`_nhWTg zzVB4G#2Oz}9?7Vs(Fyy=j&?J7cL?2v3x+j93NL3Ly|auF@WPM8*r?ZbrMxh7eK(uS z3_CG@#6~%B=D*x|Pv$RvD%d6MJsyPO^;v#q`*{)f!>2O8dL+M5pW9np!?EWV@XTBY zf}mea005v7b_;IZgbHc*RQ@pRi(tK;FO!vw^{0an-v#=s(R< z&TyaVi~a8D;?w-3*n9cm$BMXro?bL}x2eA;0y}jtqCZbdJx!0X4w`PlH#T;$-Q-tP z^`aDMeDQE4>v0XUQXY_O&olEfAj2!HOIaq=5Ber(6)~ODb8l z=NJ#=e@Om&jaRbNlfuDiY6GA)2piwz9ZT{4MW9Pr^VYeHv;l!nJM$|&J>e`_Kc$4E zN9jLvo$H=z0*!WYDp~d8Mz^7OIDm=?O0>By>n=P|wu7IdrwId=q1HCo4Ylq#?%bHx}t+og@c>Y|T@E4%C&Wua!ThQ?mPoF=o< zY)8al|8uR)MKc+imp@epE4ID^;ocyNJ^6x}R1n2S>e&6{^ zH4?gfjWm_q!$5LSM_O81yW1HdkNfv9bd6->I&59M(hpy+RYtMJ@B8d{H)Y*&?Lr_x zS~9^qgeJ)YCHS;Q8Y*?!0^nd5;Jp2Fxn5NdxU1&ZDfFdH7=+j_W^b`_on^b*=m&DJ z&@M0kw;m1(OY3*t{niAeI!EMBofk{VRO=^=m{eXj=ul^6dHNgTfE!ib0Jl$6y^=ui z76CU!a{I3fG555n0cu=KoX{-^v$DhXxe1}!5#j98jXjs<_cpH)JmYsjm{nrxG*eIR zXl`fqzM;l3=uD(7JlnTzwNoy$^0A#+E1dqY2MR3=^QNMkNIyltKI_77HC`z)U?o1K zxAZC3R3_x~Hn+Irh7~xL%J3E_BRPUrc;WrHSLrRLb~HZ06_H% zM8w%xL|R@pd8dtWNB<`^$==R;_3kEbCC)IL^vt=oxd~`l)b#@>-@6N!IMe5TGb94V ztnj_n%5^7&Tgq8$n|JwN4iV{K!U+Z(wJhFG}1H1B2tk|9S&m+Lh0{~W4cXd-dE z4PnN3baOOKxDC)|7i$+B{#kptsUr2M7XIH&wXehez*_nmKZBS6B4F-U0I8NzoQ*DP zapgklZtGJ@EyhHeogL%pKiuZTgpva2e6&Q%O_5Yi&emueOTT3n7W@^-=E4@E-OxzB z##>@pguiy3ZAza=Z*|bol}d%wWH%Njlk!iLx&qpcBGn7h;sX!c z1ur$4WZxJ_#O)Q@D4oygdn?2{AM{tgujqgogX+pzmFF-oj6M<5qtn&$4i)tT;mg7)dFoE6LEcD`wN zQ*kke63Fn){msmUe!rm`UEW%gO=>w5AgY0gpuDr6Ycp2MI}z100agrr6y7dVux3E; z^bbdy)xqpq%IB9T2K=p^jyJkh^(miMBnOA-*L&EO?M5)6WG`DwYY~Go{ZYchgWP0B zwJGa*5c>a^W1HG$t3h_&u~a$Mef3#+>UgBDR_*h?Sv<~{D6U>$lzu#7HR8ucsx)T{ za^Sc8{Y9ZWrHlKzqrYJob{!XDikozW!29=iN*R2#;5ApU-vK~Z!@=U|ns`;(2uw2j zb(@$$fwm*9`>7=rb1xx$=(-0j0{W!B$YCilb)Uj#gl7j{OlkSdTN*8c#W-=)JfYE) zXZVm(L?`v!q$Ck5%6q--=f`v1FY>Mdpnx1JFM>Oj%s)}%5yjW-T>meX?9$SypXKET z5nItGzLyM5N(1t&@U9|#);e#jla*%5O*%ZPF7YG3^@@LcF)RAn;@Ueg<&aD0uVm+nH9?veo7Ae&;vacV)W&eQj!6N+!-NAD4& zrS*d9Ip? z*N3k@D0?TfYcXW(iGsbVF$>&ade1GsFr*AYvE*(<3&#nc-D+qSZIcsQeM+22|g^ z3f6p#WawUPS4t zpPd*nuZ+>1ejrwvZ<9^ng>^b)XZ!gQ&p=f3^2xf2X=JzbxUdN}tBHw;@7COi@TfA` ztnGTLe=$Pp`7{}FSIZ6Ne$`D>xKocpR#^N&Zbb!pm(8Z zQ!@;}FZ(ZHovGE1_4V@#_`yTzns0`n#~&&RjU!L7dMjPs8v%f%II;ZFR5mRDphO_p zWb>C3+W1?6n_r>WfE*eonR# zb|@S4_^cZ^W(t=SL~V1nWkAruiW>#})3~QW!I5S%lDyXClYzYWEnngdn*!&Te6Kj& zD)k1%FRX>+&)KP_=pO*#l}cxv!9&KB3o>jqJ%-r;`|kh&CJyF2EV-dXXDu~mg46@r zNNoOzDr@&Hm%GzSpoVH%uhZUBP;+aKfVH?(*{T12S#_ z?rgjab2#SDKCH0J4E71UTM3qjps;hx+l}o6Uo}px=hTH<;X4$1(_@3a95SEe$ffk2 zI)8^e-r^QY06r2x0UtaghS$AQj6p{|wAkoqz$MK>7`0-tw%V}PxK5YP%yGUJLXBUn z?YhyN8e^CoIUQdy8!$B!;^N_%B(W}s-RTzVSo<`v11!G{%fa| zu|3~pBh4n`ag&yknU%#;9RmZ7kS=98cU}bOkxkNO@Ot@Iy|1-u)2$-NeeT53%H0Y~ zYXzx@ngmaHk<3~nd0ET~$5<2!(7&bboKK4%dChIyTMyuh}8oeM9MLR`= zj+l@xQUSk0-Oh7GMDRzV>+xALoT|wxd~E#ZL+lzHuco>hz|2EfH1ncaTrb-N0C|hw zt5;q)A+AQYc|ORjxKczA^{5FHMTFOn zD=}1x=s2-SX|2)}@TAIh!U-;ysFWue3(eS6a{bAON z$t???+Woo`(X zC>dlg_)Q7|GU?)4a_NdTF0>UdESmRgvhLKhezF-5M+k*Q=nqmx2syCn)tVNwiD3G^ zRj7zxL*@Q>W&_xu+ZU9t$z?Von%miy`(!cjS;8)Fui3x}o(x+fCljI3@OG&K{P?-#b~ zLmToB-C`^$z~<&*H+yZUH^>=h-g1!Lc`4eD+vQN&6L(#Lg&5e{o2=k#TJCdwbnPkM zCWVnbeFnSb4#uY>G@Ck=e3 zB)~Bb`&ir_)H)j6p(+DS1)rz2yydBmF12V)eey|3?xW~BO!^-a6@3e8P+6O@0!ei| zF{=7y(W2dRd*R6%varqeI#t)4W^saO4ioy7;_#~7>+2siFhat)-e7M3w7*{e0FVpt zb^mN#G8#BR@O%}9YS22xk3dWh;_C;x(((7ueOwBe5@yjjikB%_9Fyff^}1N;`VI$a zAn{3j7+sWiT(mHUP_r@L4P$jpYxBqCUnyjE{vC9m)Y@D%=nPGaCHKi$R;p+?#+Fob;ndyrgzgVn`q&v*7H7h>B#HB-u}giGJ`W)2r#K4@Mu zx3DQTr)iaRS;&?6hy+_WsJpvxajk-!NKtQnkx7t=Gh@-_`pyvEwIB?~V6h4^86v(| zOHHWM+l!b_dHlJ2qRp|8j=NA)pd5QT*~Oz0tDcX2VgM&}rDhSx9L{-J9|sbOz%l_% z_ykuZxdOsYyl8hqz2xE|df7s<+(mQX`%M7u~h_%=r1lfR2oX%xuY(Sn6CbpEKUp>ZCE!Q&b6XNvQQ+C~d<`)`| z@+V^X57^HpbNQR;<@Z|dFKnzXVpylmEpHzE*Aabp>*i+2%Lq(BnkGOkwzl7Cmr`!D z3J&Wa<`dgx6#D7yJbriX>x+*>*7HCAn6XY6Isz>)LLTab$F%uf(Zfic&?CdmSdr40 zn(FPXlKYfTa`-} zI8OJQOUN`9T!}LN< z_xnb}>d)Q6sss90E*MgKBzGQjflX*UIowQ4@KZNWJz-06 zOUego{+(lP*%h+c*7=GaC6e;qV)+xwmu9SS-u0|LHG=MBhlhMSP=Be9z-)7b2O zUk2GFou6DziP_}Z>}4ub`u_;p@p`j=7rlX_J9sR&gA3}U#9PhCnJ=HXy7oM7vOq*$ z&{PXcT7YI;j6gSo@lThkUpOzHiitX(d;JCc*u+ey+N`;N?xByRs=^KeySvmRAM=@h zJ)Z3j$GF)%FLr>YZHt~;eJ(zMuGd%|khCkO0eI(rMAS0J`40{bhU(W$O4TtbkVp^hsU^U}qOFyR$J*PU(x4rhXX516*}zlzQ?KmgC!+pJzX* z)?rptRjF09AyfS&Zd+1<+i6#9+~#rcSv1?Tkyo5YWL$=*t5e8ajy_R^;Ss`jGFW^J--WI&|01rJ+U?roC$aR-h--kC$NwLec9Az(KUUF9Ilqo1Uu+1^ zQfsIv-3hr76q7Qz$mYOhOV~>eVZ?;1^CBV2yG&!*jY#OZ`BRFFg%|sA$vFQeEXX>s z7+n9BxP<)uqP^((;fq>9^tKYoN0*G6G}l11ROW;x`Iq0m7_^Z_>-rHKBE(OZUmuDE zb)T#79l!P4Zed9IjcPNDXW%nArR>?S3JVijknbqa^6StOhA$wGtdlZDu2A_2$ZI``a!6vkx^ye}y*z#eEtp$f@*@njuiHthZAAc4sMV@xN36u-Zm6-K z%3{wFQ?A~T@4OEX%_OAz9hNBPZMcLmlzg~P*f^HG>_#qsnE}`Sqw2eN3X44(gPq8L zO!OmFZPR&n>Ka1mu_=8v*yoK}z$J30>_<%3a@w=`Qwwi{%_a@kk98TY;r7yROEp@S z)HVnr!g|`mPC?phfpf%G+xZLHDi-Z3*qmEWI9pm*M<%U3ITB#VH3P}rFiKOv40~DW zVh2@MSTZ#9KWn^&D?4Hce-1k#JbP$DpXf>^k#Pc|OQX*|u{=2L-w$A2#+oDPaVTos zTkPiMBZzQ{-1w;uWqx2WRpj&3!#HpYjnKcyaU|Z}>r1S`CKi%Qh5jta|YJIUCUtsbVJKkGdkHLn8i23>gTDqD*n79eSIls25>6V zMVvw(z8W#*9q)Ja?paG21|WDPbGxg-M3dl1wEPjK3WmTUoSCcjM|M^4z(W>3OK&1R z@Ha1XMpSRw!?n$4ujKOJMoTFL7)p?X-V59E%XqARZ8C#6GWbJ(bn=I>2K6|DMlATw zqR$cLB4U3$IM)1eh-T?I_>Fkn0b|KQWutG;rHEyu;tMA9O`E*->8Q zuzda}fq1z16Gs2YVTC~t0{sUVlly1g7SiU^MIxYQf*_fxZ1C00gXl#d)x{^A&saC7 z_O>(2-P~RMd);#vXN?*0@z2lgQ|4TQ1EpTc)tmRZB_&g<>0qzNkZ$fa#4wrsB9WRv z%yBJ_OLq2fxfydPg9q+S-fI7eg|TAZI<7lpK~~aubD{3N&j>pjayty^;Dn(VB~(5S zZjW9Igv;B1n)6kUQxkn#rTs;{DDgTH|G5|kJ#oA4Ofx`GiNH`Rj-#aV%nEsdl#zq} zsPFC9FyrvAOK2fP=*QPZ;CL^n7>%GU(e+{wm-*%V9I_Hqpqr-&>$5xD*FM|k?;yH6 z%GBp1&Qu}U+(Hv&*VZ)Bmor}^-#h~OIdw%@(4UEkioPcsUrH>ka%+7orTJKJg;C`NG zyy8RSpWI&2AAtXi@c(ld|1U%KRlw=L1)}&mU$NI-fPf1HPbV!uKR+X5wd=_;9S%&4 zrup_{W!s|xfRrtcs8EnVDWAMQ*%H@>zF~i}rtucQ`VJBhitP`ZGYSRqVhsx!+#AJd zJ>e8-&zRp}$Pzs4`U+DbNfJpORxhJHWoa1ntBkQa( z*{yd_I01t*Bo#(Jlp%;TDCovI-Lg#ZT%9z7Tn}f%GV3MB(|=e6Dgx%dqD0YH{2bsS zEAja=kc7Ol=*D#fjA*q6{DE-pviEg8KUgKdZ7B}Cs--{3TJlw zu?ybZ_aDxo3kg>8crn!o_}+TnX#V)SDtrr;yS8iA(@NVtIE_!!75E_R<>doW5;nku zHv?+e*H&eWWNVH+;x0#dW-0F6;x*S*DBBZBynkv$= z9Y5mV(zfhiOs)@*3j|Rc^W(FcD|C9^NW5`;rZ|B6h~m6I`6~(|Nna!)AMUi0nGjbh z)La_85Y(2s%Vd>(!{52tkK_8W^2J&OkF97Y{OeSFYEmGb2V~d3sL`_B0)2dkigXzy zw@z?=AKzeRh2~#Yo3H)aYgNlpY&jwN!oP5@n$oesFBT3t4R~pVw6z z_nt0GiYY%V`TfIWWemUb5i4IxtYO~;FxT4*^7Y#64H`@CQ zLk}U!vf;_rk`9MEX(C7Xta3NwIxtwaeA>0H1+x~b=9u0kZpE&n9nv;;w5z+Epy87E zJ*l_)OjefUV&&M^I@Jn;Ipe)U_&=$Y_vEBt84rIuU!Ae}G+RuEr~YJp-;5`k-C@-d zo8mh3rT}^`$nB(w(TF?_kRcarDPbi($rRZ@<85Ie4mqRqMdfO}ejiaP^#<0@q&uUX zZfEOVKG1kpPN%cgR^`EuCA*n7li&ZoOgH(d-`K`d=1&~KIyU7V`K%Lt!S6jNlsh70 z*l-o};=>wjH}AuLpOQv)UGVhAly?Xcquq^A8nmOV#%KlX4$9npn8YwAD>j9ZP zg7Mtp2wVZkqJjJ{(BlT}?b7^Kp)DxrP!S|+o8|SjTp*s0xL@G+MerR*%fbj$)A(f% z)}^lb5#=^xi*=(?JyULE7~sO%OZqEx(Y>|nr3yy^Fil}RmKzh$`ZInA_sr1Ep?=UE z9c?*T&2%Wrhce~gc|vTs9K%zQj3Dv=Jp?@84$`mpTyuZB4OAcG zWl+km?dsqY4&Iseb8*g#39#58Vk`tB7#1V69_eof&fCwOsEC1{;+9}Wd8E05Xj$}f zrNg62M9`*t$rxg^|ND|x&a{>sQ$3(Ud|HJ%ueo_{G5WH*^^x#z^V<=9QmOnclI2%c z3XBf3{VxheB74&Jds0>a#QM{l#5&Mz(aLNczDrwA^*8kL`Sm$JMpQ_;D~T9cYQ0 zfm7_q5SakeaWQKD5IHoGB+Pd$niZGX31KbyT)eawM&7 z?Xi+pvdax4WIk_?XqzO$rxkMDnk5>19Q@%eyvAvpbchq1awCRto^RXFm0I#0f8T~O zU8?(=VBTj^2$)tA1#N z%9(XGFrU;b06iNK5kD3B2wIzxGgZD!+o@GYOU7?$di=N_b8=jGv+QW)S1!pNp0A=H z;sw1uvFm=C9~q(L;AruCc{V;js_tf(vf$=34X2{W1}8-^x%T|l@B(Ff6#T_h3#1?q zVicIVks6eu*SN57kQT-Y$`{6pjy~Mj7q6_)%S=nqQ_CNWkS$8|&gEzyWMt{j2Cx|Q zOBO(fik^E@Y8{xl5@m0OFB63Dtz()>XBCb?8n!I9GmG*_N|l8LnM%n85)ES^{j1q< zwJ~=;nFLDV-wbco2Z=WLeL2u*N25RDwpg;K31NdR71S=GH3Ln~-AfI*(Z(fu(st{0 zqZ6qP0{mKDxyJ3uW18XLA`bUs6LR9{s?SeUw1ANv`bd@*`9I*z0$$uMA{@HN7O@Z( zN$>KLv?8IrcUsfax=&#D`QMLnYJb#>XsGhmYK;c|{DOmf`*wA0Z75Bg^}7yj(J@L;WQSFg;}>3ind zi!s8+=?0(>JmX4=h$eJuny;_HMKMSe0K7aKy6hyV%4|ybJc|<1;e6xj%hado0$TxR z`4>;=11@(vCnIGUDU4*o7WXAJQes(0E zY7Z`fzO)1J(4}@Iw}Y70IuZ@V$4{DpLeeP%CN6rfI%*QPJwOaE znwlvGk-{|y`*(0TE*QdVk}_fPb$XsoCwQBt!LNiNb9`E2&pz5rvtdr*%LLy;_p&o& zo0C@k8GSB@je^FMchsB;!b8oSoScppswX~RB0w~8X`?!PFz&P)?+0qLW>bf}|1US;&WxsLz-DqFnat?YZJwU8{r;DE?q+V9Pv zzqkB>Dm)>Nt#M}cOumtTLS> z=zdRvw&-NTsowfFJdW8uEBS?0IkoQX|BkozaM8PGpDp^OwJ70ytiy2KSmy$)S(c+) zaDZ`k2inIXh{lK4#P{Lg_kFB{UY6L1>vuB#v}`=D>U4eb(F&X;(Z5&Q4$G)IuAJIs z*6#M@l`b8cn1~4rGk_zBZ}q&fWK%$bs&ztkGs14;@{9~o@nHOu@wZYX=T9{fy{N$^W@culrm)EU zZ*cP0XcT;cJDsnn$c6EQxC`kJ-3d0Fm%^_uTArFwWjfV1XMB%BGQU+#m-Gh=vuVq; zEE2E>*grA{@JT4zsvi8HyWE=aTQ>y*hWAxQOF}?v{U1)>ppU7E;8jLMNMG%a4efoy z+dWyTr~LNK9~m=%!MW!*@hWz1Cl#Nh`J24>N1VXJ`-sHq^Av82cC-Qg#SU*6!_{QE zW4&T3#H=HE{5{ep^iA2f8=Sc%c|{Q>BCx9J{9&V^9j>-YDHDzFnI2I@aHXMcXb=tj z>yQErW!t4RVH1sPe4cQvhW6pf?jl)DmPduO)7lhQ9GwbH!>q7h-(RtSXJr*XxDp`- zoe3*mNakVrgw97d>lR8Hl014Usuqu{U6`Zn`wZEeDV9%2xce7{C%M~)%0DWFnNa0s zr@vepo&CitqB-w;PwJVZ^qg3LG4RqtORA%{^b6y+uSy`{Bih_VXY9fhXNa~g9reUm zIE3nG`h$G#$eom(K03aHwAA?GbuvzJ(N@B=jVbEfhu5CSai(9^_pGh3{QZ2dxzM^g za9J(N@d@5w59wx|rF?0P@d;u6-b}JcJyd zV1wtn9%4qpfl^viLP-Nq(QCMKP>kuKG6UmHNl_ld_T&jY^Of3nr)%xvF@#-R{fFTU z<~v#A47t-G@1|z5*xWVjY|jvg6Zo?ZJ?kUSTAPjy={d2aPh>I~oI_DF{F94QH2X0M zFRv@5aEA3Ku_`#g^w~c#n$MdTHAX|eElq#TMz?$3m29?;*q7aAbDI}v^v{PA{|EqZ zAaw43yDp)RsD_*!vupzkafnz4-j#ZlhX&Fq4~X);BLiHWW!!;b}agwfH4JyVL=!?3ML7LP}rNXWmN-RJb3Jfbg% z{bsjD84Y|-@Y*os30Ic0X$p1(WR6pQF>o9-u-j|1bRd+(z7mUZ8-B#=&|8&l@2t@` z1;ai}6r#~=?CoouvTLYy&0B#o2c1mA3;_yR8~arFuwe|KiVJt2e+5YZ0uaIf3ni(< zKSP2m`6=fNL%2lSn%#nHF*#6Ruu4rH@gPx%NCVw_dwJFI(BwkEX_gn()cT+SygdgD zQ9%z8Z2+hWaK8S-hnZ_40CJ|yL0!Bs+~Wfpy+EAQvKS&j;mz=C3_w1tx=&j&WYmS8Qk*i^TF zZR?*`cF=1L{)_oTQ~mh(m@ghvrQhuf+fsA8op!h!VdK34|U~ZSW^XOjRHlI1mcz&b-iSt9B#pQW)Ci^Vl*}r29wPIn%rtWl?C^*rSXs13!<@ z+K&ZH+&>!0l1fwuU&6@JAIK}-=Y;>)2Nd=6vNJO9@Te%zr{CYt+|MQBpCpl-(r%I! zw0r?r!7V=&>DOcMrx;2av*O#X)YCV+Re$-O@Ofc<8BWCmj5U?rm3`B9;C#uC_W>|< zbKHTka2o%z^c_%QF30I*?VqO_I_Qbn_tx z=k)#7+{^pgi-r+@QCbEYTB#}5j+oR`sxd>y9cCAZnjWN z+3J6bPhoF(0~*QvbsWm*vnp3n1$8L+dc^;PD>*|NkiDm?^s$d5&v<2)7zHEsU7p{B zK_NM+>GYb_^qGqXJ?ev`q!`WK@(Ym_y`^V3=aLSM2bgNwZ~rX8m}pN&mnXISz~{Rr z$^2aYs-x}A!$a6{x2b~lF+Y=#DfjIv1*9C@Hpc;0ClF*za)H_DYADCvdG!aDHLsJ; z^12`6`Z!kj8-FrJ#)-MPn*@2jrFJ(vIXRRe;;9qZ(XGyojyAV5hQwNt03JS#Li0%K zX02gC3V25_CP+g%&OKU2KzPBQn2kVd=x>1@pEAtVu=wlio`;9!&U3Zr)L%I2zNE6#wvDrMU1HF;me-tng+*78SON$Zjvg^ zba{EEA$h}gazJKuAIY+Gvr{rbr@5;ERy@Y-R?bHX=e&Habbq~0l%a}2`5jm<9ivBL64>K~BK}e316g2HWF!(2QYNR9 zsiWhiIFZlwY5Q4~R^wruI3dhh7z9-e8PJlN#G1$4d`}9{Nv{j_gIv-OC|U^CV*Fy| zgl9YW7Dec#Eh}hM+rm9&Ikf2CAfuFpT}Xw^KclvhoqSQj^TWpN^q}6&u7jg74;y_F z!2(PZd$E;B*H&y)+4RnT#z8}*{qStW4M8KlB|FPZq7}=JX(llR=zDUzX080#&2IQ& z&>0pkCSQg=0MuG%l&!z0m7>H@?6owey+eM$dHFnqIMb3_cnPP3;(UG@d6Li~(oQLh+y5?mK;kYx2s0g38_|#+s z4>1IGKi3OI(o5E)`O>>q%g#`Df1zo#SE39`r5E~4M~@*X(P>+0OJcP%rYj%0X19hw zN0-Qh(Y4p(Oa0fR@rzM6XymtgzZPv%yrB<$vk1>o{mAn)U-P~WVp0~Y`)1hdG{YAf z71xv(>Ze)itJhm>hGA=WSO7J9pa>dL!Vh1j+#yp6PS$_&EK7gH-g0E|Gk{E~2|2k2 zFG!sEV;>!c@*;IPxN^#rgX`(a-Bq@y{?gN7ORuyGb<~FMOclJk3UW(FYG`dVQz#!Q zzMN#y{7WWVT=g1Wfq?`#eMQ*1`=5zgQ4Y4cTV&{RsruhaFrWSHT<}_M%FueZD>Msy}jPY;#}hnx{dX*tCQWkPFYk9oaa{THP~z@$fyOKDZfwz9REmIk+YSo~7u; zR6g*YxJG{u^Kn4SWRT)AK-AEK5&R-TjXaz~vB>h@Zv}eyP+bxYhZQ8)|3od zTDEE#Bx=Z|qL)?u{{0&k12{fD9vvOUpp>i85&zQ8J9N8$fAT16Lg8VOb{TYe8`r5& z%Z{i)2z>nU+=*W;gkNsC>oc2&y*(_jin2;|By7DW+I6OdVi zKO^Qv$tb@qboL>kV7*{L!>V0t){mQ=zj|<`4Y@Y1O`&scLEFb(#5=O5WG>{8#7NUC zaq4s5)bD@$dV-nu%!MbaN=~ZANX_Xx^yzdmw8rtvq`z;3(#^Pkq`?mi;|-~s>b`{l zYtqnjG+>6M{tA=Vk>k`e`5~XbLd!;VW8c5b7IFzLG|%e%sABuciKh_{7M{s6B3U-g zCdBRcq5s-kZ);q_vy@|?+w6JzV@ZJcZ6n)&T?F7cARxP8iBpBg1TQ(rNf9F`q12Fd zKy=hZ_ss!3{{;`Qf%5`(!e{OS0;Pv9_VGJgR*H>8KpDKUIhp4%5xNe#o@8$Tm_1Brl@Y<^e2sVG>p1hy2eu$AOG3-&MZtk_P*h#G9Xc=kBbKFgdjmQ;`oWM>hwpr1JBkz zpk-kH>@fL}(n>n?nT{cw8=&wuI?Np2hedvTRJYqj+&rtYhd*Aev?yYCsHxZK5kXWw z^-)tZOwSriF73F$W-8No>6cxcjdq;<^e$dfMfGACjP1b>{32nRJNMzzqEYfqI5_O% zVJ)V-`@bwzypxUj8_lxM99%H}X_kX7k6@47^eQGTXy#5-l4gu(Bc7>S=7(|>SYP@b67POHj!`XbXD>e)S$b;y7_tjrFv z-?Rm4)}!Bl|Am=rky)2JyUbp~o0Eh;8{Y$S9MTa+*9|E%#WU6x3Jr9Lb*b=Qx#KkE z(q&76F|OT?+-4&~v^y>%mmiOgX3GS7H7_j>!Q*w|A`>%lbh0a9iL%nLQR%z+E1ZWf zfY(k0C#i!`M%oE|kER%1?$H^aKqO21!ZW`A9*xfm2&^77EGbItDOQQskXvI3h*?$bq6_|SfE=cs}wF)ja7S9 zR$EJ5f;McpInz$oF!y}p^R+MP7SENhw}M&_?5GtgB}se zk})=<*mi&Zc@v)yvou1A!hizQk;m?#jS`xCD1(1N$LKzz$UsI34F8sn2*X0;w+4*u&DRaeX~|_;%N4 zD|#e&n`A432e*vtb$hab^tMr}ukPIaV6_T4LwX#-^Z`ogV02A~izs8P_+Fl$Noqj! zpV*8dniJZ@ZzJ`*bY{mCE}nbxdp|v!WcC;^H%RBjaR>dais>`sh!!DjFJWi{RSLaQT862_@s1^}ZdWfpDm?i9u9;o( z`d33mcIF;^LZH)7(D@ar-t~i$iM9ch zwP!ZtxA(|61VuZ{9H_5PZ52TmA}%{5n4}7t3fiUEo}ZvJFRyLzDenzbA*ho-43Re< z#YZnxRkB!(f3jOZu6KOD#_#R=oG6gt2fz%3A!Si=P z)|zUCm5*?0ZsY@u;DnfOvmY)kw5RWQ3ASv$*O)hy>TztO&!Ls(x9j)cU)+}tF5GML z-f%mZmB(g2BBz;8yk7MU4$sAy`c~ zvpE2culi48SDHGaWk7!@;cGZJI2RX}f6IAZ!34^s2?UA4!q5?*Px0r4IeqId?UG<3 zYInU_4kaW_p_DZ2X-wwiNIGw(LO)*O#EPu!DENR!Mc=9E?cPVVtY-q%ca;1^>$M&Q z&w#JC`~BBmGg^?46~FR8ZXd2v2eUxhQ#ZN#U*O1)GEpo?)JorlC4Z7`Zm+u>*iuDhg zRAS!sjEvAJT=O`OBVg1fc{VdND znBTv<^|GQ_xyA?OVp^DSAPedw5VbNaVq5~X7y^^Yn_YCJcB3hO0CPx1bdLr|9kx)| zBcp~^9})@|F&=2*Kq|xxb$_4xi^6~FeGZvXAp_RO`RV)-jtYCP!z4>NErGQa6S*bs zrwWn`deX;2Tru*l5)whlKLG&};}UpPB5;t*AM0+a^SfNXu2eF-$ut4t1h@_pa2<*I zE2xv{NLQpzqf!4b{b$%Ls;?nU@fU*36@#`4z7qRK5)GNNu z2_^xy4%uM7neqIlpcr^cI{x=NIFvvNjPE<8{FkmixXX+`9zP?9YwdD)dolM8Xk=_qCtwXMlU$LytK56zb-*H=7zvx{ zo+crEwfx`%pBiRa#mDFxiPP6N%eU1Qmnd2XHdj3)2||{GAIS!mH_7#a?Xh_7%<|%F zPwclDYmF#KE>o6=dDn0GB5&7C33^&N%CJEG4OOPY>q9L&T`=V+M%*b}P+cpIBz5%? zSIA7N@#W8ND}0Oz4JH~mNtt$6hXYkIwA%XHXOfwTBSGp&GPL~pSGkQfD@z=45>d}j zmvR_w>?Kco*~lQc`gC8AB1iVYN_U}PwTTb>s>g+cxbj*fX)eXhS}Npc*1Mb8b6s~rWMCft0xSRp?+@<+1Z%dcNtDCp<9otL=F%^PJ_{@`KeFBI zB9OSRWLC~M5Go4|5DVECwC8WbHcjTBPs>q~TR3GqYP!q&l#_=<4m7-o23XCoavx3#ed;{w zug@s+mkGxP;=Z6uVDG@Y-<@>$8sV@V2vRaVY!Myx=RpOjmR;@6()-MV4)S{M?{$Wo z!}-&{PrFwhrd#IRkKifj#;Le?SFKG zQ}0kC3}5(=-ISiz?W8s$v!} zl&a<+k|E(ktnVh!MXWQk8ApQsE!?9mOnqW0WIqCz+Sv73JYTdtj3z6{kp?lHnKU~h z-vHc+DyqZKbEfZagi(A?U0l`S8mkPbFc?sd+4To+4cysx>vq= z>(LnC*L1{xSyuPQS%Gx7(>}EUqpLW1V+T^t)e_$3;mXW@2D_mOCi(KB(5QS^-8uGc zsL6z%tpGW6UbEUTT*GU=z}MvMYJB;8-0ysO@GXyZZ|Lgb&5H&c;4#4n=brV{$+vcH z4Ix=lioHdd_H_Rsej3XJE?|@9ue#Z(b>~u0T@-rQ51(WpJ>*=e4h{V(&yDF%S8ZU^ zx?5|%8&ODT%2)CDFksWhSwc$ydj<3NZjEIS45ftmGmLtuscJNvY4u*4-xTkamuXzo zlsAj7PZ=$}XhR!`t#WYHk3ZX|YbqaRzk|BR{Pzy<9$rPdhm=s_Sj=M#Hr&$kW^kM?6lY zzWLc^F(FymLDgdYbD=|!Mk`UXm#zq`rnK3FF{jS;cB&!3%7`&un(s}*O6eOZRr+P| zXh0=AVizUiUXR%3JL>U43$2N2!Y}PL9TrXHm|94gmU3d_B`&{wz15;kAzrf@6PVow zjH*6=!I`?mQWwIq{=+hLHR-zpJM8ys7RbL@i3PUxrCH`ywFkT0sk?w&k!UL3@%Jv3 z<}h^h2*mh)y^EmE{6p_{Gd4S@sP(#Mn^;VrB44euyi{WL5#4{;lT z)TlT+*L5=zfFi*Nxs{o9qD(+>FZ|{(!3=U0q^H05^)h;EKO|&@M^~k)72mjCjs)Z) z7{V~wsOrO0PutuD!HN;6;Te-VI-<2+7`-TTWGyKenRYS>rmSVx`@;-VN_lnlEr~l~ zRzywcs=p3V=>E1yhGx=jPbGG#)aBy>XC``Hg{pD#MF+R2z{LQDRH|l>v}4V$()6Cn zFzID3>rn_2ouBWgl4Wt1)wo^l=6sIrBndFTe8SqD-4K?vf%1=!8j{6g>g9cCJD)(9 zXsnVNcJmj4ce!bnymv5tKkUV_G=Y&0d^8Oq^>zlgg|ts&?_QLX3~1h55ErihK8X^2 z5ELXC6&#D>_Y?{PGF3cUMv5`gp;wMq=UyfUl4`-+r%&*=P4+px_&zf=5qi5S%Zsg2 zR|!kFQPuW625P=ECGcqhcU}5apobM7Q~?erf&?SOgeOKSUZ>08RGmX|c{giMmus(V zFX{doGprhR?Tf^|VEhsOXHzh36fFMq_@o8TPW5?;m(s+ctn=3g`Uh(J0jHrEw`#(~ zTe?rlUwgK-*^t*^1vu~{zDq%Cz9(2;(^wydcTx>Ec&%58kl%5s(o(1xUT{I6+tZY^ zqS!5h6}-B^nK4wgf^~MFeR&;cIIa*qN!c$OQ%||(+~njD@@|Fg2@r8}{84?kn{~yJ z!TI}{E-)8zEGjT5!6+pDyzFASa<$y1G+B1DngPd(YH8jM@#}bcGHvVj==QQ~ZoWYz zP(n*fwnUC63ocsieYyDEhD7hD?ZF3lt4Yj4dBd1_$7{&sMCJOPCx4#ogkrMNjX>Hh z_;650Y0`Nv(uS$Jj=tJO|L63Q@3Ub)AtvQ#QlEd^n|ZpI>EAp}tKVbqN;z^L$(C_ak@rmcYoDySh%2TpCoHpeNswj_+ehyd)wh<+xydv zCN^bDFX(4EU6ASa*j2h*YUJ{#kg~W=e~{}7F?mcw*iP4xt$N?ri}PcG%cE0Xkwnma znHiQ!dgPRgROPJt<~SmQ1o!kcUrw1krJUAgLW>oxzPQw9S2g;oebX9NB$OqfBjvBQtTdB)pVN4d2b!Z6v6dX zDW9p00fWo`geXSe7ACYHr(Zb4gmF&MV|ztIu36!Bs8!PWVYe^fB>-H zs(2y`VGK1SwAAQGJCWCTAYRSRVg?T=TJ7Jz<_`GR?l+_o?MwE}@r(Gi2GtSsKyCY|TPG|CyDu{Guv`kn)C8xo+n zXZmm-g}7SXiGL$2+?>29O`C{`bc#R4VOZ}pwJW|!Mq7K?`H&;2N;%Im$4sT-jQtM6 z3QP!ewkOpnkSkO-vmsMZ9)3Mz1jemj$bkUwpRE^!#B)6f0q3rxkm@T`_zi6fDY`THePn-qd+bf*G3Xju3ck9?H*+AQRz7wzaWY?AO;JgmjinD~yDDs4o`>rYTW@CfNB zA5JmGE$=|wY5K_&$k7~qQSf~svPL+_W;go58#jJEJps(hh@Zl`U+D@XalKbI-p3iU z@unz?yPF2s0UpKxi5i`W-x%T!R?C2w02wLxsuxX;AAD4kg!EDn|NI)VPMaB~_JBrB zhf4jT;PmZ42k)iPPj6$ftCzG5&-J-OrmNFjha4B`A}a7WENmwyn(2DukVOgnu8)V) z%H4}dzKa6oZ#1ZNfJKv?{{3852(pKQtc=;I&>v#eHb)it3l0E(27nHR!0qzE5e&iM*(>4?y2_~&49{qzukDqyTRw~qu^dVQ58fWiwF z;CfX)0ELM$@C_(30xwTiI~m|$6yO0(gxE)L@z2=(?3Tt9{L)z`<_xMKzv-Yt@m6qd2uws`J!QVP2>O1y7 zT|)n50{Y*oPKH?JkAnjP8(c5w2v#okXO02s5fln7EG%RQ8A%az<0615Fz(;o)qPmH z6O+8p&%IhtO&WY!ZD6^co*;VU`?j9YKKr7|S}9%pLco_ph0@toy)PFZ+be+^++j4N z%R3BI1;6)|$-RV<($?o3fBo6Pszwl6kwc0?bLi-1nvY8AbK&wZA6gwrx9*kKQ4Aex zy*K<2bLD5QDPB0L)d9Oc7;?^#ZA;0Z7Zq!xyelnkDiSy`bogjDQuHI}X*-V`!pDZbG*CVj_ zy>=+!(QbDcj+4{4nYMebImW`HJ_ko8O7OTH^H61R&J?JQDp+3hpILd_d0KhKIKj!@B-mK0;R9tTaruk% zFUBQqO{736c3;b=n{cefUwG^jhA(*C+W=_v-m=N0$bSet^E#F>=Utu3q-a+xJ~EgH zNGQymT(wSr{3>CAO;Au3Yf0N`j+Os#?Hjs5tNVO62c_JtYD^ETaqeCJOOYqcdzn4N zhPAP=9HURpE`BwB9?Vsh=>}jk#@D(zeX0+4dS+dY1Yit}&=pKkUCf7VAOG??p6v-ABYD3T7-jHMw40!9TQYfLP?ay%NfhJW9gc ziJA+K@I2%WNS87PD!<+7!(aj!fxVudK_MMCHG_I}5uyYng zk7CAV10FIi4a(+h71H7^XJ$N@5~b%JilG@TuB+E#`u<142R8m-%RcJAf zS>h)L^l>7#8+zXxaDss%QiHqn%VH2X+DNxjA>5RYh-hQUuu4QT`9alvW2!#w@@u{+ zxpM#T?tTCGm$_tfRQq> zjopvQ?-Sgoy<;B>SvF6y$G6f0Q0-vMJF=*^BdsCn7@_`x{FU;hPYn1A)c5 zukE=e2U?94LoJnpI#%_myXXFu2M;6-muYo0>MomjV_Tctk9P=%OCz_r_k{gKZfi~* zen>bUL`CP!ny-oUGdF%@aDmesLp_pHd@)&ls#%l!2Bvbmf5|Pu@-3Pz7BCGk6XU0- zer7Nm`E8zrrXL4>is}56bw##5B(^vw3`b|&hU#n8(s(?FF#B%7Xhuoi?uS;$$f;WC zV`uJii>T0ckLS0~bL8#vZ^5&_sD#!U{*wb_HR?t+B!nJ%ChQ`Nv&oh3Hl8&;Y0G`! zrt`G?GSof({TuFBNcS4M~;1!%E z-+r*BBDx*^(jF*EyUwz0DG#Y|kM0qweug??dW>WV1%_)w30@C7aMkuVf$rd2rU(({ zu=Q!{;C#}Qzc**>i-=f_ zbQXG$wi$H!ExKQq_Rl+8AJUKD!S^gtxG7&=DwfU~D-ie7W-+pCr#2*OE6gtrx%FOa zKjAqq@UIvqw_T*A+Bf>+&@18Us<647!PybsB_XZEsvXN=>$Tszj5$*(OU_*OGLGt; zoGy6W_uok{GhCfqQ#}kn&hsYBafq?FbJE%#T=(j_&9MkispO}jUd`}^jBYP9wl~zt z5{%}2+phRZJt1%7M!DUZ=3zdNm@pc z%pS=uEG9d8QK=-H$y@N{du*7G3^AiV**s^XV3&G(S!<`2F$`4+{x^CTBRNsV!+;@m z9(ofm(|HYp8rDtzS*fMM(TPs(=be`i7xMC@?$0c!R!&=R(0s7(M7UktVkdFc+CObFlDI(|$}S6$yDTV4=hT%Zy-U=2MJ zQp)x;0zxt(6B<3&@sX1)_hKDK#-F$4J`SU6lWk(_koMPtb16g*_5v_r2QUIRcjDfJ zyp`t4_S^dd4p}g3vp1Le=m)owqfx$NrWTKlnXfEk+!_t0^Z7ZnJ^n!?O2@rHf0f<0 zf9E&07k;^i{Uv0CH!s=vWTCdzEoS-du{^3{mh2!*ms7}j3j?j#Gk*D7TjOMfL58?? zL`%;8mj9KMtIhfAq{1SV18`QF0^@L|%a?~_7eJ9>hlv0zN4*1NXAEh!dqo%Hgci zz!m4!7n5qryAKXwj~4IalrB~t?>46iLuiI;##6Ia*Rke4(lS4}0i~W-zyYZnKhBJn z>VvL zFx|=d>&QvZpC_YuS}pLRkB@)9oLV8S`_WF`=(NwC@^Rmzsd7%kihss>A|n09L*!}Q zfy8{#V2Q-S2A?O;ha8eL13JIbcT1NSZ^mYxJZsH7yq#D?a`08;y@C6XwE=`)LRsN& z?Y{h!NssS1rnb|0hs?BT=jaI3auuhu<7 z$LsP7ko;l$tWGkH?o5?Scwfg*Emlo0BoI{|`f*PLKTLsDwz_eyjDlIn9UH`5Npq+z zBD8sZ364W0w8d|{(bRNF1ZUu)JQDI=A_~s%J0AdP!NlnS)I)3W$zj|>-6XL2-{L!} zu6Idnk)*a{&zgo;UFT22*VT~24@YoV7^HA%16-q$8>T26Ol=r>3)uVRnQsGl^9-Vio zo&1lzGhXa2*RCMaP^z3bEp8$E97soTDQ8ff&to1^w>%9~C_Z{Myj_QTg!oOh%!|^G zgjh{M<%!k^b$nZ4Mn$6Sd2U0NqcxkiqU(1NTBq}%1m>r+`RJ$!c>xaNU1#(xTyEL) z`kQix1gXnQRsGb{U4l_>*^ditQAz8I1ySF^28}>Hf2w8HCZkp7nN5<}B1-RVbLRu~ z4$98M(n~<`=KXCA9ycwZB+!^&TP20U(Z4yRSr^C^{%RdGh8aa~a8M>Q*Ka|4msY1* z9C`7K+4{jcHL~l5!(zxTp=?~J?Gn3N>A#qy-e_BZ(qhu7m1s3AI?Rci@1_p8@*2p( zDHZm>68je|6}uvnD3zQ5&Z6IjT=XThOqc$weH^`xs^L_&QkrMrYdZjlG-g)D2xOcHlaq(5%9m+v_YEm9trKepx!cmwAGZjdz125AzHwR21D-bF+#*QhU{5$jbY`31F75AQQw zNR19@6H}$^H@9P6oSbUR#}8M6s^oGRy9bHfShiq7qRE#&izKfWOQonFmZrq?ONJ5% z1rqX$ri@{r1;|G~OjlUC{Aog+gPtGYl4h>mt5>UqMUZE*%ikTm1qP26trGRONg85T zwz%4*W-uR4twJbIpO(Wuavg?JO|5pyF|5Hz72FCmF4Q3VytA45-Ywn|Dx9&$CVVp% z{&2HVr^vmHP;a@=pnGy(OztTIxn{5uFWFyjx~pA61!P1G6F(PGB_2-wt4RM_4gaOu zY=lq3|8Dy9O^Pnde1$ttGxHPZu*`jOZX$a(F!iBrPRu5C`3c2~M7~tc!NT*ib9013 zumx_*Npr%)(*D?_1plq%3}VTa-g^7naDv6r>aOeafHbr!p7J!Ke6#vcvz?o1;$|eH z!iVd0rxryP{?X$2Zh+D{L+<-jq{?tIJ+h3oS?@mj1eIs2&S(lID;GIK{dh6Yn^hRl zt$cTogg@kAR%RKoqTU!r5Yf(?h0~6viY=CE$f$|3n)`H8U;E$`0lhjsadn=)c*1WZ z7zpnon|=PE_F0Zrkz3voxirSqCq!7=1rrQ89I~!4G6}WqPp)F!aWKvUvf||Yo8-H_ zuxqOwZu-%vIssm)tWw3u?WQw_t4T)AMF)OvO_qj-q^8=vm?tU7P^vqQKvc5+=dDj9 zV`=iCIL9a%rAgiylB8wiFZ7HVcpst^SVTg_@wyz@9@zv(m<9C0<;287r!6)=|M9jL z&xt&YrTp9+jjiz=b=bi3z;5+o=+U8Pc=_Epn6T$dvi0`H;uqL1TTh$8Rp{>zFcu)S ziMoS9C2ZnRCu3SSt?S}t7OYt%YbDCK9%|jsu%C+ItLaZ6zoR%#`7Q68-Gni?s$Qek zE7w$TB00};*-|7je2FkD<+t42>(wHWY3YS$NC72(X4R)h=)5SI`LTTNb5D1rXY5Ss zZ&Gx=4AYZ|laWI&e}wurU6i zQE60LCRc(Y5vwLVaqs%`*SuqX#!M#)wnr@bt@iEjLGCME+M(=JXS%1pu3buYGh7CC zb8~iey5?4DitUm+y6;bp2#M6ui*Q#tZ z)sr;t1+v^gkM(ilJLKR#0r*>yv(J($j=cCm35Jmp7k#|_{s=K<3=VCk$7H_N6*%gr zbr(Ki8mT`3kkxLd;}Ksg@RN*m;}54eUL=U(w2@MqpMs=fD&ce%*#x^oY-)|I%KP2A z|9EJ=HaB+z7w8FCP}V`;x3VgmIH+K;LYOu~L%Uz4o}z0Y7M4=*ln!uL`_5bprht{( zBC*BeYT94S)uNQ(+-9CescoNhB6PMx2D)i+p9G7}Y`Wo%#R7hA$Dq*ps3TfsV$Kz& zObqe&>u2NW&EH&V@n_~Rw#lkHl0qxkC>WW#ylG+AKFmN2+tkdCU%Q0)<}F|wT}E+) zSxz+x!w6G;?w5Jmp7%RDmP-^UF!Yi@Ib!VjSmOha?D}vqla7Sa>@l$KbW|pd2TFWn z-}^-2!QWZ@tJcF>#GHR@Jgs8&M+c`@sgTNCh-ybb%>cR;tQH%YUed33vgkDhv-+xH zXxWEVKhc&EL?|1Wh~4NBRX?d&dxWzu_q7%t*eJ}DqDjwn>c264(7Z`72$E|O_HrI) z%ar(iQ~n{(AyZJ}Gd}16Df7Es=e6w-T&q=1!yfGPnzOCeC|%_XjUP@nKZW$baXAC; zRhh;voqxm(yx!?@Ej%l>>r{6_Ex~RTCD9|MxJ=#TXAw|bIF6>XTm%5f?-TCa`GGbC zeajBRHq&fwns$Ow>;7>vO^haziWe{iDxt*)H%_h>(}N^SN6Klayx%|dL_L`CgH9Tz zjXqrJqR!yY(R&?>K2q-v9t81nG8{M1B)MfF^9u4t0gOKELR3aq0fH?QpK+F*iqkP0 zng{l_;)X_s6eEx44X%A)d^C6uFW(F8XLSAa zu*bXfeRWtpAG1w_r4{?YW#>o+QB`-H{;~0+B1|It(Igf7KH8)Ler!!a+wx&B*^X$} zd+c5wLOI_WBF(!z%$g$BS?!tEB3Y9BC@mAna3*VI1u*&phY&1IRp zuV?V2$O?r36P%Ip9x%=rv*qUGG;l_xz56q{zv6Y~j7~tqUd`+EH1~velg5iL8}@4p zgBZ;55m)sMLVlsYwg1)r&?!i(R~{ah`z?d!E6u`L&Heta%H|=#1P7>bv(t0{Jj}1w z+%Yr4IdOXDqWPcP2sZa8ji6=1mO9e`Az90f>ls$iP9d6Jgp-;h1iqkK60_LyL5<{a zaQfDTiC8vG+t*}eJN^0QchSXp3 z7kFVL79Oy14hS#`d`|=bYu^9QT%~{50=Fu*$Cz}R&aalezS-H~v3&j>5YV$ZkN_OF zV+U~3KwN^qzkk&Sm^cky!HCNrPmg32O_r?z2waJ$Lv{wXza5A?xtFe)NL6tc__O8N zZBT(HZN3WF9u*LIPhD!v@xJXN<8Dqp`T4+I5gbkO?iQ9lIGg#bmPd`o$35ROkn@ZZ zVuobV*j#Hy-`bF81uWUkmi$#?fB(3d-Eup&wS`kLDfl_`D0dgj%2+fGNw=;KK8a0c zx&l+h94+Dwv3&K1EQA{x3omtBi6S(fksu+<^&=*;nL{MJ;muqw{dEIrHHMJ%n;VtF zK@uPleoCzIV-1`MQ~o&`BfrR}Po9_K{)gWC<3N}_=e9Lm;pAXoV>_nFx8K2Db;B!Quu8LhASk3BA{wHGS*^eSw( zD}mRzu!1 z6}ZDYp6GJb*qN3mQ>3P)wb?AU0sbPu3#Qv>@Avl2mp4654psXD%jY!a5v)CM{sVX3 zsbDn3`W#&vI^kX@5-O&B$t9g#0QNT(*G54m?~wO?jO9)AD3enQ4Cs;Aq-_5Bf5cpe z0mbi?twB4rzIjZxBi$LzZ+k7}d5TL^N6R{GnJjw&x~fr5K+k{ABa}7N$GwfUaW~_j zfBh5WGDHlqob*Zx-5D*AICITy(=8GE9{$KGJ`x=Ib3pD5N35&>^AjZ)R!j6PPOVnT z`%sE&IWG)9HZ6|=rr&0EkSg{cKRb7+#qE^tON_9hC@UlfzKZ{;MDc=DGzR~gPx6e? z2xUM^&v0A==kiIn@G0QA3koSX54koSW}_~FDz`ll>TDJ&zd8W(fa!3`4R9DE2>J(u zB1;!IfrxwAy)%#Yl^5noGw9DiI*&**~+HRlSX&tyl0{5a2mA}8k}g!ev;UY=}g z!b4VIPep^U08%kU@t)CJB?(iXf{AhN7)ddHQ)Q0Ak8no~T=!Gv(0S4V7K;QC*bbE= zBpG{SP;7~eBVV7?Q4Dx`F4E;q0E5@dTw5Vly@Mi&WKlSgsE#1-lH98>0 z?Kf7Q2R4J?=I4>d{imftvY5Y)mU1g9JF24lx1JoLuCenXdcJ z^0{Aq_1a>CtOU^K5o3A9Qiczd!^B-EQZA%Z=oye(TeJ$$%TX2_aLP;(%g;konj3GP z^jh8YTW=|ryTpWUEui=uX21LovtE?m*M`H(t`0B|=(;#vDo=sudxyw+9@DgOzhLFS z$J5~>nwr7|COjfpWm6JXr1Z-w9l$O+h4f8^OF(!#n~VTkH&1*gnO4HW!M=99zD_&K zVKHi%M?J^W^wj;!vwcviM#VAMTJLuQ(~w4EbQV<4Im0$ez8F>Y5WDA}h|*P4?VpG; zE4!F;3UPz*u_)`)EI49vXpDuow@B1CG$p9ZftsXjR();i$0su_1)t?Lr>H-GGr``$ zL23<%KoHM{0-KOPir#9-Y>)o5nr9*T@{gR5LnT|wP!z?3e5We7b4WuC5?*#Tay&1E z^dp}p*d1%FP2O?^<3lI4rE=atR#kb7u#yEG=O1i{xc1*qV3*LSRsGMB(e8_w2a+iAks7#Ovv9 z88~4xIz63)kg#L|YwV-Ew?OKqb=h0uuZk}!?>&XvVf*h2Q^Ed(%HvEMIGs`DYW;+d z*Yqx(?We-Xt6QJciOskXNwpJ;h4~kQtHU?{aA~#0F!a?fv=3CISS07nA~YRh#}pDq zC?$}&@@q;72|jO-n`M}D@t+uIPsYvjg3>=BtC1l6px*mK;qL(mrfi8yN=lGg%O3IA2;kt@=_1vEo*rsW&RSr;r5OA|{zcGO;oqK|oHV%K zoQ4zeTQ9Zn0?y^pQ3bWv8R+B)A4Eh%fHZ@DoB0&EQ17pB;;Yv8p+6QMTIOJcH=Ry5 zq$G%dt_{xux^`OJjhBDSMn-G9KdXCntFmQo49+hPQ0M&kiKR0e} zrj^mD;5c&AU$p7y-I@6jeg-;`qMs7j=5pZ8jWF9qR4Ck_W(0=NSsM!@L6O2=n$XUq z+9gV_J@9ellqe{rFBfK&xQs3qlJUfm#MK~^zoe^~(}7e%;EdhpHg?C;hwgscy`+!QW* zjKBw*XkZiLqM_l1U_Uol4}gh{H>aH#_V!hpMX~20gLY_9)qljL8sXFf?c=n7W;YUO}(j#y8fLmmW=z z1k}oG{{yh0(6&xERmJ^j6(y!WmRf7eHP%jxWb<1LBSg@lxS{(L5_m_`PBV^a9H?5R zMIz7CsZJJ7ZJrdnSG~}eD;3zG4ovGs?|?WHIL-y%k9t2eckDm6eXTXQZ3ogVQ-O`# zQtf)+6dvD~l=-OPff1~u4haTT`Z5Kho&-H`V`qs1;o*6vuA5&a?ZsoLSJFwv?Y(&* zjK9EgC}GfQp|L{w$oF-4)roJ`{wlc^0(;+Up&_;bNXQ+wx@$_IOR0RzB+9`9jm+rU zRfH7LtqDMq2YBV+WcuSeWH|eMunl8B{m)=!Qi&I-74w$cxP*5T2zdFvz#n5 zvxBElkfD@9^TmY(lT5O!%e)iYbgMZ=rpD^5wVad3O)@d%VdPfBFIyLciWo)(LR7;U zn0X%=k&A26-#M{(Siizy!!O$uFS!&1RgeUUck!z-9^A?D*U?8NasZ!|-(IOJYal;w zqJwwCpkLW*z!FJb2bg+RqRyX3Av8fdxsk!FDx@T;iIHa+*w7;^`z+ zWxL9OLJ&00p7NLD?rUVWsO1sCmBRgpN&BBj&81B(U3hTy93z`&H>U*StdGoA4U1NT zp_U8G$vcB1LMI!{Y$(MS@!|Euw=P_D0xtD2PwK6S3oLG|1%iO#rJqKUXPUPzL{^rh z1rKiLxTGmo{Fbi8I3dstlgHAnZw^iS(r)CWhmnq;DJlN%so)=K1ZIuLMa0JFQ|kf5 z-`3jlk&%q}Ga2JVYXjG#2(LR%@eMIPh{F1DAX;0!)H0{uzVh%a#%v=4U|AOcQ{&R? zBRi&m^T7KC2f-70L%`H4*#THdaaEPJG1g&gI|_sJ`Y~ULy~#JUuUZ>%+;|)RK8^4% zT^cMH;e=KpFjOd)F-ZF2dw*h-*n(4Bre&!kV_b>#Duc;~_+GB=yfLH&OAvAE`R=Or z((&LK(P;XsT5c2~szlEiYApH`%H~GWzkm!1H{hLGuSKcd9#|I^O(ZksZ|)XJJ4*-> zH~PT(&2~z(wqjlJt-ZN$F)9*p^lVgJPeJsW8H1x3u$a-=*?vq;9%&*JI5|EJvq>Wl z0z4`KzPVqKF{k+g?6>{~08tFyFQ!Hb>4JRvW-RY+s$bZ@Yie}4+W8G1 zEDWo~tFYc|#awOXh&4MWuUc&`j~!z9Xn~L@b9k+I6QBR-P=WE>nSzutXijQWZlM14 z$^>FOjv=`B&U2L>;2%_j03jIspG}mXAd2-FXE2RglqhvSS)(h{SOid^5 zIsxg}{?U<~G!Dt(EIu)fj#5rOcWqk6y^DQff34(y5qvbu+p4L1uk2C0qEslsOqf=t z(YO5LJ1O#!?tpoJXcm_!Yq~l94~Y_NC28F#mzF2hcra}{?5|d*ORos+R?qagyJZ_y-wGcKlYJWR^fVL{xb+neY3dtX`f zM0B;8hKAP>S_a9L3#f$f5YH*H(fi+Tn*ND$%z&gZ5*hgSiFCB-Uk3xE3)Xr?;B@&H zhlx!f(Ib2_FNLaHcfQ`l#3cGYmH(T#xVY!tVLb&ACMK|*E!yV1x`7mh-~Ol3zB7yq zOw!uu7Z!c2pSRuB`zp?X(?h|VM?`^4kbVzmOk3jmZO4{1+FxL1sC61oyr~2@19LrV z&XX!5O9xdmQmwnbgl*<a*tmN?RD$ho?9oMj*5j&MA*8xUc;Q()55W(EWgT`}^{slI6q_c^x3+5!~F zn~p#PRBV!Xw%vWIK{SBF=l7!rrJ+3NOEhO72id(4OOsPNo3effq zHG~yFpR7w1QdO>o2a=RvzDLva020jMTtfhY@o=8=!2mu<twIDsKDgQ;X z{SOz|vq$Ow?hDL&LDh2%Z)3GSe*804tUd=*4g_ie8Np!@5%RLKUo_pf01yg*EJ{%n z-@ln90x^BD(b3~&y8K*O;BlMnmin8?cJ<>5gQ(`>0s03mgxWKMPMG19e@MLn1FM*5 zBV^AdyB+x2_-W2-Z2Mx-gF5k?~5oPi5-udr&eN@ z)9V+A@#Nlgo%SQp+%8+9ObjZ-%V%2Va-h7O&eu2QVji!4L8=#{K}g%**&FoX^WXQk zC`MNM4G5MS3yj%yPu!Z{15>7+i&%|j-aXJZt8d)Lr0X^hrYm;G-$Sf!r`??TH}UmK zJ{mZlQ~dg4CnERt6MRLi6`g`!al!7^+UCB9UYZc`(ULWYpxgu9OU||OLzjrr^n0do zBI=H)4*aKHn)aUx(D%VeELl<~X^4|+&73g8a5VLSToHOIrK^fP7mrjO13K+?Vg5s$ zUxP8m=>Em+CG2kGQ3INv7GDW}NiIh6u3x9G40#K6rPCBBkur1|nx=LZA0H$9>oD{p zKsyt|`QazGs~cEqy-em_+<*ofp_^9w;XEWdyW!*uxCaOa=#uJ?xCE?Eyp?lN2$&P6>Nms3>#HyVXv}sRg z!Y~w&4lzMyERGXDn;Wa)YIOCF%j5;LMHDyUat=9giqZMeYNC{YK|UCuKCR^RMB-`F zkpt~d&22iA#ty==N}T4z(cLROjghH zoXp-2rf{|m5Nl42Pa88CPCw>!mOD8g@D0}(ufBdLMx7Gt zj@C`0Xt4F%uIqe9PyCAFH3}MR>Gg@`f`t%2lLBjFD%h_#WA<~Ku)WGlFO8}LKs12< zb;5{2q~){&Ww9edw=2`yqf)PyEv+VJL)td7-#d7qP{XpzUCp7oWBtZn?Z7(WqZYx# z;QQLqV;ljfgP&7OV8{xYWL;_m)_g>DhZ+G4%o}B(;c9wqQ;Y_UH(ON;|G<2>*`{LR zgI}l-T=``F7k2J@oeJ~;0_YlcZa}}yHfkWk;g4`Ms1K04s@M-eG|CNk!PyS%(mJs< zRf~Yt%Vn~ims%CEzDNBZyv3Dk+QU=hg&xSTnZ|s+%Pa8Rd``rr{L>u^G&GQ>vI(H` zXjJ($ZaU>ke5X60U*7OL^|3OCR~zQDebQ1=s)n#KGEwVVwmF4FU|P-Y(YP4V%q}t= z#Q2trExfwtQka*VRsjtklykwrVDI(0`01p(qC;J5C!7E9BhMCBwi;e8EX)Qdg-8dYu9JY{mj#@jCYq@-^Cb> zx4Q0w!Dn`AI~D-j<^e<&qAw-h&ZcSZs0!m*RwK?!jIV8efI&DdQ{F$TOnq_%nH`4;ZE$+n z5<~;1Vx|)h?T776ZcO}s(NQcCJ9ADM5w7}qP;Wq!vAJU^qS`083 zmw--zh{J4jKZ|?GdEF{1AOHa`IYvKHTLB_hbG|_U;JLANH-t~AkH+`rcA8m-Qc9P5%y;nAZ=Ut9z-yrbk>h)FRkh?3t=%Y`YE}urn=V7ubw4{8`dVZNMZQEcu7h{|mO!de>e5j+N=@sxff)O%4;!EZr5%$eQp* z^Z(P>bq6(-t#Mc$2x3AJ0Y##yNDrv1NDm6qmZ)q5DFy_DARj z7^w~!ZOL8F@2;Tj$bIcz9_Q$06$wY^Dgpjz)aBv9WquZRb zl0k%*3{D`hE!m%>s32s}P2_6%X+#U#@<5c?>1mzE>M%vFCyF+AS5V?BqacWzi4(gw z67wn{w+e!v?JK8(osT4B-Sy0qEHgwFI_=D+Wql{7!?`$;Bedw5&#DQ)C-4=Z{DGpQ^Y8n3XH zsopi`lLC?)*Gu&tBrasGBNe0c;>*Z|&Q)FUAW?cY%2LdOWce1Tk|qf=iVfMIeR#Og z57@UTgRCi26u?6`xfvJN$G={q+E{{5n`_qzhUozJn0VcW7p*Gb48aRH_h679n1_sr zM;(-{%$wBMJ#C`Q`w?iMA`$@&9U+S%Mu}fW$%e0H*MekCUi6P1rXUC>pd_@!VXFV7 zx|(-a|7+5Mw1Yxi+BON>J})S7o5qjt{_@H^kThbeCwX7L`RwamX8I<8Df1BmX#et} ze@u?^2@d3rOerX9tINe;APW?F#UubJs_z+ixMn)v%J~P^V2aa5A3J1T9M}fZH{I>4 zQ_|C{4(}N%oP9_9$7ae4zx(=AiI%HnsO!dC2S_n_M~BAj2GVI=i+VKxI)C+c`!fQp zPva}ZCjR9)J?dg)2#L$^oF1oTdvGXz<$ej$xJ0K_N@POL1b@ujD_4Kfv0uz_!P%qk z@VwC}fr?o=rV&os(Q*lsPAa8@PqLZ>zQv`wuDFm#d9I&o!&s+g*Fnc8I{Bc$LW$n@ zWLQXF(%nC!cL0EQFD@EKjcRPENoZKWkBgX5Uu2EX;BoLGXNRSxl0a*5nrDd%1z zcnfhNjPcY;GaQs>M9Z5d=Eds4t+^>pq^OIle}i`yGY1Fh8O_^i zg9lvc&?0NP+m@mx_t=|H(du$P^;2Q0pV_*dRP#2r{NJAZ{EcZM9#=@Oi#pAxmwBj| z-?-&KwYU>4PDj!k5#{sRNX41EETl_xtS|%OTpPN&mMe&Zah}(xAXxS(@ouVh8yLC~ z^xG3Ylhhew{7g%}!kf!ZS^5PQTT4C7`$7pJ7PTHs>Qp!)xjc5|#0Pg~TJgAB*c+m9 z-mxKKFgEC*`qQDq6~Y|B34~!G&M$Hqn*81%_JWou(`suSct{0#d`-MFr0N!_7O<$j zjN}0@9==M_Ebm?Rt!6SKBHx+yi>5}j`~3&8oNGqhFN~;zE;%LN>DN-qCco@ku$}0U zeY<+-kcL-kI3$TL+R~TZy*6V_K5i(*C=|LnF@o>EXGsupDVuL%mPAAjzwGlwPDQR- zV%rT@c}m;Vtk19YXgfIWk7!pLNq0uVXXn#)G$mrPkAU$C9<%K%H6;t1Z03ClFec;hUME(2c=48r{&NN>r<_-!y^|P8ypxjOA>F z(ggjW3u`${XS>-%{*W}ZadJj4m&5ZLomBfRALAH1@(!tIZq=t=@QdP!GXf;|KRNr=E{C!LUKH4S1mp15~wuE_E6_PM*JUs_fzG6~V z%s(_a3%Ei;Kka!>j`5?UP6OeM4%=6(=6l!6k7Kqo^B#r-MpOB=cMJ|*8@RIw_Z4uXSm)2jj!DhPpP*e-K+wXzp%n){a#Iefdq8$))y5R zP4x#wljl;MPq2$iT9W;OjEu*>h_%(gq}zvQ2+LMfII1)~{3*nJm-Z{W+VI8yQrs!~ zC9Xe`VHWr9uARZNlr!%RSh4KmqqmWx-ar$=*XVP@-k{nFLi{t0`S^y^P=DPZ`=^0B zGg8bxxsp>yA@$y_n)N~~p`B~}u0b<*VWoF&778^s3+{`^!Ht z!n<|GbXX6NsRJv+tt{eY-~VA#oUL*tG`UlaN_+|z=Erk4%{(9e)B4qPshX+8hCz^@ z45ypx3)cApdB%f_(j>;~mJC%57A*>0to-OJak|L@RdfL4{>dTVpk~j%7U%4-8?*EH z4aB2@8W0LlPxFI~pwx1QrjJ(mAbB1t65qN>Oi^CxK&Y z+qIfhm#OOiNB@rj?;>g!2ziRgeHV54DZq23y{J=xDGb{-f{dC!S4 zl0_go6I8O>`TB`d@0VG+<1knez6v{BO2_L~^Xvun^Sx~#@+oqS$1Yml24SW^leq-v zEb%Mg3mjoVyx--&sr1HMmG9{v0=+{Q#O!8^#hB>F>RA+ShPML%MP*XB!*=h~H=@|h z!t1~K8+2M+5;&Z#Vg;tWgDO(Y%06ln_65*S{|u!OT4c@;KXkr1CtTH5XXm%MDYRmo T4y`4M^NWcg(xCX9!@b`D-eZIQ literal 0 HcmV?d00001 From df4d9328d06a03e28906e5bf616f35eae8a989f0 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Fri, 8 Mar 2019 13:43:03 -0800 Subject: [PATCH 05/22] added new image --- .../create-wip-policy-using-intune-azure.md | 43 ++++++++++-------- .../images/recommended-apps.png | Bin 0 -> 53560 bytes 2 files changed, 23 insertions(+), 20 deletions(-) create mode 100644 windows/security/information-protection/windows-information-protection/images/recommended-apps.png diff --git a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md index 41d9d886e3..b8de6355c5 100644 --- a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md +++ b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md @@ -57,25 +57,23 @@ Before you can create a WIP policy using Intune, you need to configure an MDM or 4. Click **Protected apps** and then click **Add apps**. - ![Add protected apps](images/add-protected-apps.png) + ![Add protected apps](images/add-protected-apps.png) - You can add these types of apps: + You can add these types of apps: - - [Recommended apps](#add-recommended-apps) - - [Store apps](#add-store-apps) - - [Desktop apps](#add-desktop-apps) + - [Recommended apps](#add-recommended-apps) + - [Store apps](#add-store-apps) + - [Desktop apps](#add-desktop-apps) ### Add recommended apps -To add **Recommended apps**, select each app you want to access your enterprise data, and then click **OK**. - -The **Protected apps** blade updates to show you your selected apps. +Select **Recommended apps** and select each app you want to access your enterprise data or select them all, and click **OK**. -![Microsoft Intune management console: Recommended apps](images/wip-azure-allowed-apps-with-apps.png) +![Microsoft Intune management console: Recommended apps](images/recommended-apps.png) ### Add Store apps -To add **Store apps**, type the app product name and publisher and click **OK**. For example, to add the Power BI Mobile App from the Store, type the following: +Select **Store apps**, type the app product name and publisher, and click **OK**. For example, to add the Power BI Mobile App from the Store, type the following: - **Name**: Microsoft Power BI - **Publisher**: `CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US` @@ -85,7 +83,7 @@ To add **Store apps**, type the app product name and publisher and click **OK**. To add multiple Store apps, click the elipsis **…**. -If you don't know the Store app publisher or product name, you can find them for both desktop devices and Windows 10 Mobile phones by following these steps. +If you don't know the Store app publisher or product name, you can find them by following these steps. 1. Go to the [Microsoft Store for Business](https://go.microsoft.com/fwlink/p/?LinkID=722910) website, and find your app. For example, *Power BI Mobile App*. @@ -108,7 +106,6 @@ If you don't know the Store app publisher or product name, you can find them for >The JSON file might also return a `windowsPhoneLegacyId` value for both the **Publisher Name** and **Product Name** boxes. This means that you have an app that’s using a XAP package and that you must set the **Product Name** as `windowsPhoneLegacyId`, and set the **Publisher Name** as `CN=` followed by the `windowsPhoneLegacyId`.

For example:
{
"windowsPhoneLegacyId": "ca05b3ab-f157-450c-8c49-a1f127f5e71d",
}
- If you need to add Windows 10 mobile apps that aren't distributed through the Store for Business, you must use the **Windows Device Portal** feature. >**Note**
Your PC and phone must be on the same wireless network. @@ -170,10 +167,7 @@ To add **Desktop apps**, complete the following fields, based on what results yo -After you’ve entered the info into the fields, click **OK**. - ->[!Note] ->To add multiple Desktop apps, click the elipsis **…**. When you’re done, click **OK**. +To add another Desktop app, click the elipsis **…**. After you’ve entered the info into the fields, click **OK**. ![Microsoft Intune management console: Adding Desktop app info](images/wip-azure-add-desktop-apps.png) @@ -182,6 +176,7 @@ If you’re unsure about what to include for the publisher, you can run this Pow ```ps1 Get-AppLockerFileInformation -Path "" ``` + Where `""` goes to the location of the app on the device. For example: ```ps1 @@ -199,9 +194,16 @@ Path Publisher Where `O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US` is the **Publisher** name and `WORDPAD.EXE` is the **File** name. ### Import a list of apps -For this example, we’re going to add an AppLocker XML file to the **Protected apps** list. You’ll use this option if you want to add multiple apps at the same time. The first example shows how to create a Packaged App rule for Store apps. The second example shows how to create an Executable rule by using a path for unsigned apps. For more info about AppLocker, see the [AppLocker](https://technet.microsoft.com/itpro/windows/keep-secure/applocker-overview) content. -**To create a list of protected apps using the AppLocker tool** +This section covers two examples of using an AppLocker XML file to the **Protected apps** list. You’ll use this option if you want to add multiple apps at the same time. + +- [Create a Packaged App rule for Store apps](#create-a-packaged-app-rule-for-store-apps) +- [Create an Executable rule for unsigned apps](#create-an-executable-rule-for-unsigned-apps) + +For more info about AppLocker, see the [AppLocker](https://technet.microsoft.com/itpro/windows/keep-secure/applocker-overview) content. + +#### Create a Packaged App rule for Store apps + 1. Open the Local Security Policy snap-in (SecPol.msc). 2. In the left blade, expand **Application Control Policies**, expand **AppLocker**, and then click **Packaged App Rules**. @@ -274,7 +276,8 @@ For this example, we’re going to add an AppLocker XML file to the **Protected 12. After you’ve created your XML file, you need to import it by using Microsoft Intune. -**To create an Executable rule and xml file for unsigned apps** +## Create an Executable rule for unsigned apps + 1. Open the Local Security Policy snap-in (SecPol.msc). 2. In the left pane, click **Application Control Policies** > **AppLocker** > **Executable Rules**. @@ -322,7 +325,7 @@ For this example, we’re going to add an AppLocker XML file to the **Protected The file imports and the apps are added to your **Protected apps** list. ### Exempt apps from a WIP policy -If you're running into compatibility issues where your app is incompatible with WIP, but still needs to be used with enterprise data, you can exempt the app from the WIP restrictions. This means that your apps won't include auto-encryption or tagging and won't honor your network restrictions. It also means that your exempted apps might leak. +If your app is incompatible with WIP, but still needs to be used with enterprise data, you can exempt the app from the WIP restrictions. This means that your apps won't include auto-encryption or tagging and won't honor your network restrictions. It also means that your exempted apps might leak. **To exempt a Store app, a Desktop app, or an AppLocker policy file from the Protected apps list** diff --git a/windows/security/information-protection/windows-information-protection/images/recommended-apps.png b/windows/security/information-protection/windows-information-protection/images/recommended-apps.png new file mode 100644 index 0000000000000000000000000000000000000000..658cbb343bf0a7642f80a0411ed684c8d82d14a5 GIT binary patch literal 53560 zcmdqI1yqz>+cpd$f}}_{3W}hVGz=ghp-2xREhR8?m&}NifPhFT-7~awgLFyB(A_Z9 z&^0jsfcNvf_rKP&-v4{w|M_BlYcY#`)vjxw`#jF$IImze6$N4fIsz;#EaDf6&o!{H zaHKK675p2RGX;S-W0-%~&Ke3bScQEI>zIR^7ShU?JBlL+QO3BK<)XF85Y(+?~CWsKo7&s3&^hm3(r}?r_C9iLXo_0n_vVKpJ8gd%!-LH4cE1sneiEm zv?~6A#mLsJpKr&T9$}Anu$<$+2aIrw-HPD2D+TblDNw>O^jR$SZaaUkqqXSwyYb3q zZONPDP%8##@B%QXhFIB+Zl!c)XCGXBbdm2~Z(V<^yHh&i)oA2X<}y9%EOi{Qak;BM zp0HK-BqaS2=5OM~1@B)a#s@*6f6ht#*GtMNEf;;VkOXYhRuI_YQG|<4z*Y4j>0EHM z*KJ}gZMYOF2#sX%({m>|rf&2a9meau{AD`JtgrA`RG&glokGq#$5gY7eAR&zfcz<) zTfV}u%>!Ouh1gggH+mjK+**x%NkV;f-=HDLS(HJnvuq@x#RnZH`JCWb_;Le%W^?4a9_zq)2q zF56`xX!|}8YHZjZeNKAOo^$wcU3QwT1b>|q)<&emwP@^1!=!# zF2>LsV~w=o*ON_GrYSnbjLJZVtdM9_wXkhZ;6XO#27MdQ{W~YYIzduyhqI^N?lY&y zmwm%hm*i4>=f|WfgW&}ZIqy6tBGA1lm*e7t{f3akxQW;<5|rx1I}g{mRupBz6?am(3OaL z*YC|T+>IlsmMtJ5s`X;TZ*<|LIOQ^+MQY=$$=(MXYbh!xULlhqb=GTyo@ORGB88kx z8lhg~8eXhJJk>Nvj!T%&zZ;uk% z&l;UHPMwxYT|_|^=`Q#tHtiKilh@jm=xdjD++#8g_UtVVwVOc3o$N)`mkma!8A7R- z6dBiRGInr#$>F8f%Gz%!+FAj|+E#a)0QnZ?{EMrX4%z8L@5`biiqM-+WNQV2^ajS} z(M;QOU8#ukL9|LZa2wI+JliOO+OPYwz)j2fMW>LfueFW#g+mU4OtohZ^GXjCXo08B zVlG`NpBeS$HHaa<+_!}Tr(PBr#kX86QA5sCT~gUEh-CC2 zso}{?CG&f96I#(8e4qAe!K(`>B=pQ1daY;ay!&`dAud|Y;7mKt(t(-HQI^2xax2^myo~-d)?4x=Y#RnGt#;#qbd)5yoh}XZDkIOfZc`TrNW`(C=NMn;9QE zwluPyBn8F1V?@agj5ktT1gD(kC|!Qr8Y9qx96%uG{JjVR=ZpRs&(+y;J?)K@ABLDw zhglb0?D|0#y-s#CAPbnWqK0lRJB(_~&ly#apt%n_z=(OjLJtG9h}%(w2706k62D}@ zv=516`?DTpdcV>LM2lsjsdJn)M9_>IP0V%|$e>d6n*{WRead^(G31)iDV z{0-*#Ya2Vy{U15jxPDf>jPS2bO})(f|I89*q!!m3RY>~u;FlI+T7&;{daes0ISy?+ z32i*fYZRm49&Ws-M8`s9=hd8(#5o@}y9725o>`zbQ<9`0;71H=%>jgsNW#XSJ8F`5 zl;?rHMrT<@3tXqdY`3JCT4>{_qdPmDO^QD*j)l87Q-Qh+!bDCKk}fb-Zn>rFOwwV{ zUx|Pveuge8V5-l3(CDVH?BH+ri1|~0nsb$Ms9_>&U$0PKc3mp@io=D0`&9+)qWaU? zS1!v7VL>+j>UOs$arju3V$pC5KpTHqj}yH?W$}%xmA3Fcj}B zVsPBs)?41^j&H1H>^sz)L2$OI4m5`#QDQ0bAuhT17a|eJPiIcQNo2nkK!LI#+Kdq( zt~UTcBJy@UFnz7jmQgEX5zWYr3tit>L9t>O70aRaGY`LnL1dI9%Ff28Llf1 zXNjFFVzEtJJLkHyei?~c9w_xRWgo0BAgA?O*5GXrqYrgX#@X5L&KIS1;Y~#iwD_{q z>Iz(=)pPL2We=f-#Z5)I)zXKdmI_?nKtNW!jnecmwbqisaG9@>UnI!78Xchk?Qhq^*%r(C9Nn@Yh)01-L1Uj6e#c11810@4i&|aa9prvflz}tek zw3ifHIt*sSuSzpCCktPw7YXnDrpsMyb%PS#N5_GLnG2-Gd|l3-9x z4Jo8bA~ znvTFn-IknrO%qCtSh0r!Hi!xCmi2K8fLNzTJL@;wB`{Q_5f-25IyU=GAG&s z{vh$HF$kNFZdFtDg;o>ukLtc$uj!#^A|<1uG+rK_LG7kt5cMSt9uZXQ+9K%=;|Q2Wm|Gcn4Hv;xcAm}N{R zys@nxMSZbVhJcxkg39taSZVi^n9`Cpbilz1$z)ut<3w75wgQ8xg4%Xxw(WD=fV-`= zCDsB{+LZQPsbsicj3UM}7Ai>$1-Y1p@9C63d8Wmm*nyuvg0 z?3IzPlQls`^8$9QPDtH`sP5vZ`I_rtx{xjGV;~<@y?|+I_W5$84H2kY$D1K^-pc zjAh|z@5uAcauy@;R^ksSb=5S1c{uXhxK`W48O6Ke(MtK2-AM~e>b6vTSoI%$m!zG% zkOC%9Js8ew#$#(wDR?%pk<8U>0N=A;oV8&E)JuR? zPgr}=KuAa1YEHkN?&a|I`P%%aU1uk;6(Eq$tkHPq9D1|zehv>YP{pCi93i+^vVTiMJ7Wz9NrUU(eOLse^Aq&k$ zldgObSAXrmCpc}rNrZ)sL|@i^YvJNSLtkr$bagE?{JE&|AgK0v*Zd#%qh7YGYeCWx zl=6h&RO(}h0;Iz|e_y)?ZO`m^$I3rZ5lzOCOtS2`PN!12iC&AoEYbMdksINmp6o~x zq~IDYT1}E3E}s68I5>W<3YSw@G?DzN;Kpqs4q#Y;p<^pNR6)zn4T*^G@7Uet^-yQZ zWMP>Y#d7E#0uFt9pnV+|t-;Is82aviS2JlEH3$x{$-*~_aB1ulNU%J!QO z`f%)XT7yb)SIQIZjPRONAFY*9drvGoa#<$f@Q&MIxx-Y*u~^XP%ZMKxIZRGHD2*tw zG59f-88S4CZ)ED^t;bI%lPVqn3S?7C7vzM?6c$8>d24cm+2wr<;qO24)Wb7xc;!Z1 zsHfd&fximgOH0@iTJ8SOq=QyN%14G zEs?|`TR#Wfr*p8Cwe-a-@(BuM8&TFX+>4Sw{3njdbw>KvNazLg$t zi^zKzX4)BRWctHn>2wdyrC2xPGCfAc6gE->^hSkj=ykMr2-$Z3Y~k7Jgo)w*dVqF* zR(WLyS2J3{K(b4z@cuGM;_d$TxW+EiT+Q$P@Jz-}BgnjLBjCbs{Km&3k%!@$>l+8`-(gLK&s`-Cg_OnEfSc9)xL?)b4KN~{r)w~pVH z17+gn>Gu1voT;qa{*yzMI0N9NKCD)L9q~<+jeKtjTLz|r3i-uwMK5$iJLlW2Os;_} zG-JuZLUE&a9&B~sUjEms_}Y?mui$ae&}{k&>HL*_SjrS|1)Y0ghVmLzm5DiXq_pvC z-VhU+Ogz0JODv6I7`Q{yeO^0NVXkR)VIG>W_^(`mMz>rnLQoNnZZM+QRxc|O+hW+p&>_M}Yp98$i}*{o@@&aH7LW#N z+30dP4OL#0bHjd~jjYvAT2SK9Xs|mr>VBB1nvrTGK(PpZD-yw?ohO=@H|}Swn)GSu z4D8?0qPJNV1l@Z+_ga*ocX<>MeLX9~>&p(xVlvz231)H}WR%f0 zFGQ>v9|(8b0DFlwTo8UyiA1ueDNYK>2ueh4sH0z9dZe22t%V#Lj3ZRx94Ju;@Bn!~ zY3vCtTrpe`Th~s06fz(ZCNAVFdp*(GNrog){q7f(Rs@}2&j zK}$K5mYIAYWvCin{e@zkVcz&kB;ZpTXO0P$my(9LU?@$(K5ytz&_obqQ@i7H8VB<- zgD{Ppg^pmD-ot;k;6|drlyS2yIC6QaE%!UIhRmV>;V=Q)i!gO-vGG04yw{}$QS79{ zr9WVs*q@z6n8p{e;e4jB+G>^O2}D)5l_-+TIl}gL<|K6g>arUNdx8LN*boQcB&d09 zN5gzHIxkz&u2;T5NAuAGv)2Xh5~On_)1~X1Sx2K0_?`lN^QdTf0G99qW(v6aABEh1 zj%Y6^e|011&ui5naL*NGxE=EK?p+q57doMrV=pwED7Xsg9;Tk>0iY^?_0XZje-j4u;++WXuCe!6F{`LAemK`Fs z_EoG4`9spd|5(-AWmijHMf1;i9t4ToUR@ai{ue9&v(I9T#*$D_Ujt)!=UEs)aczKd zgBYCshZG##{=d0oRVq5wb18)ew-ckyJWV|?^Ls@qiRse!&)>2ZP0GP=py)jwjI~1c z1E>vYx(BnowyRf@eU8SjVqUs#^}!TWR|+Z*a#(bU>PNqSq#y@5vVa_IG+u7ZqA!nw zoPg2R7R63mPt*#NaN`jZ;|?V5EmE}k%VnU8X-fB-!flP0qv$iz%Q@0ZBq`bf$#jCZ zVYA^5Id%^w+C5F0J!R}*Yl^IT5lmX+FfUWDO3vJ>+}(9wr199hQF~|TCLWo;zBplP zMOV3VG^UvW|Ixlc=c)&n`dg6qD^izpJb|9vr>hRClBaB@4J+~1!1qg$3Xc|myCZt` zStsB7-^98V zOMz!17;SX)bRh#ofZ4l;O>lBNeDk)Mp20Og z=vC?M{fJ^lj;>KAO+on$gMeY$_=AXuB!uD)Vz3x<6D!Aa68zubF9I8!4>eeRyk#D_0VD+PJ3ku zxtR{m+v??Di9_t5%g#q-|RIz8qHtNTPDg0I5^Qx;qXY!t(d7ZoTRyWP&qmAi)H z4|U}io#BuYz(txqiEa`ZovLSES+%u-hB`eKWOk0JxKI` z@kYmu1Qs&3_j>>oiD^8=trk20@9IA`*(XUhXN0ZdkE!74ry{j=&R-4{rKu4ON*}th78oQ{xrN6(^ysQ7R1Zbl9T=g|mz#|4=mc~d zdcL_Dz1kRM(bcFl{L#wu4eyRR)3_ZVH~&82difGHz3E-s?We=s$7zS}>(@Pj?Az(q z_wk188JF{&ph*)0<{3br3oj}NIX4MZ(3J8i;-72)z+$K zyu89Q7}J8}I9!~jphYWC?3&ZOUn_iZ(m50-GzDR8%S=dJej+Q*g!mx* z8q&R>fkdzDo@2K1or{^B;-#lcfbZW-OV0(3+7u#A3dr3DBc&TS-UBz;l81G&SV#j% z$Y_n?sd)_R9Oj#uFXx%}zBjF*m_xh>WUDtHQFdsGfJ(@_o9@vy?u$3J2<|FC4iso4 z&>$N?FWqB>U;-LodyY15e1<^yy|#=a8m>{H2U<}nBe!;(a#Qpwh`$rCE49xV81z1r zW_puE29hbZomeZ+z-@cWQ7-&Ox~RkyX8z#i9;q_Jr!}2D0gQb&M=V7je7ZG#h2d6SZGJzvfQt7Z_OV`}+Oif6y=>TGE2HBj>eM2|ry@Bj%4*6riG@xz z&8~op;&|O2ePoYrw@2MV$L-FEMYa#+d$*|OX%;sRF=ROs8KiCV70KCZ(%I{ts4 zos?1LI*B8C^!y&im-t_F7L`K~6^N9U9N6>|C^eD#64~%U8F#^Py7R3qt$XhTVa#fUQPitra`4^u-;yq)0CiY`|Y8=GgGn>%q5YHN(B#dOi*_P%=in5R~_Omr`H-UQg|8;8!sg8R-yMAA(snAeW$Zj zPfp!){@_;&efqw6c}Sr=-LdAeME{Oj14a$}s}ggU3DGH&E3AA~sjfWc&ey2gL6iaL zIvyQ-I^jSPC-o00{)13*OK;VD$`gAc`zz83^QT~4`WHA>FT4GZdM5rGn*G0e_A1P^ zyKY9ktSpcMk*TXkay*4*kioy_egvHnGBH6%lH=Xl?W|+r zy7gX8?v$4L%dpX@lQcd0Rq9gH{qOBO4X0b|7RD05{e$2g ziH;NcRXSsv#Ut8Wd6^xW&p#v$ctRRSOnxo3n7(!K4cBep$M|LwQRImkEz|G<4UeT9 zy{xT?TE6ONXy2SXsV=^;!DoB$_8o)4_fLhqv|lMf@h4u%=E(N`XkAF$yyWq@h|#V` zAVwRu_erHV`(KJOw2X8-v&3VF5zePR+pBCk&u^C3=lyzi_D~HxZsR4F?43+MDaAkLDo)Fc7z^&8gn6aUp_a( zyuEdO*>Qx5V@4lFG=&o>iLloq7utfDe13sF5Z_meybi6`&bFON$Eq>bJS_x!;w{G*|5v#;&GE;%R!f5P~_KMi}2dKW_D`oX94oL_$%oFBQ*RbToD zce1|joSjXx2dgDQmRYN~qHwbq8mW;=eQ`V=g__i9#kHNEY3=$^oaU4|X!W=48g zopIn^T99_&-u!GEvLNj44W$BfztBzmw2Y2t$!Lq3OR72jexA`NKxjkI2i6^TV_;mV@s);^Anx>3~EXTs`YRqVye&c zH6DKwyL&7+`oj9aL~!egU&8XCih7cnsM@wO!c-Ww+mS6-9N zb>D0Xq*!Nlj{#1A?@$Ru3aKmLVScJL@U1qbuPt;rNi$RkWFtquCB{UILt1YQn2QZC za#TQpe%)+x2&;&*b#b@U@=$ZJ+T7F5HfOdN5ehN2;AmF3eJ+e zi|P8)H=+eu)Wh=o#8?HDHu5G?1?!aK0F6P$+qPttq`mCV;RGKetBmM?;?7CV^!m5^ zbpxT}G=TJvfOIzl99+5t+w!^an?;Xa|22R`kpjqH0FUrvKP;0+ zpFhSI>UYRn_qsg#?Lo{VH@OW<7L(6vk7Jk-A?Zb0Lh0-ve7R37Q^L)hb;NJV+K0#}lrgL%FiALiL&Nhq|Gi_r9dUVEg3(Fa0d)ro+!P`2#*3C5PID#%TQPx6w`Nw?L8}}G;VKs40?Y$uTHF&{w63W zjc?51JT%AFi{0bPSTbv%kvjDaJ<2b7W9$srW~xaXjz<|8so`;cpN7?}+iV3Aegs#X zeO+=yZQSVct4o@aw3HW+Q?571vDo7Fcj$(jJ{GCdCv1=vNn>~;AttiSzaE*|5DJ(m zu&&k&X~*!Tp*rQ4l1&x+!W>tA&|4MywZ)e35dHPa4>!*Y<%F#|o!`u z_LU(j#J5|oOfmn;Bl`dNyT|-jUi80y?q8vU(ahK@|BP>porEE%uNvn4cai zEna6?{b_+`9p3I-)n58-$>HjR2&)T*`o5l!n|~{T&KS0{6YRY=yY@?>S^_X#oBuqJ z6YN|SG3&}x-#D*q|Jw1CVf)a&Zl#@cdO~FObbAA9v8hN>ru1-dBF(*~YCpMO0KD64 zFC|L2;Y$PBcNyZXaD)=YG`$7v*01u?82i*1Qa}pYXaZEkI6u$__$rT`A7vEWFV_19 zIM}HS5el4WO?{J6NS)L)B;|9@pPcuS*D+`G!WW?uSb;k7ragD??7L-Ei3eA@|QewE#Y=Q}fWO>QG z(nh-Rba=SEFRLBqqy_mTtAF?{j75=3oPE1M!uk7+4iTdRhtsP}Kb(i9g7S>; zH&^ycMG@MwSG#uNCA+_fK-yb?$EOMj`ZmU1;Dtgp(GaW)d~t5~MFHb8ck6Ss`3p`7fl_j3M=VD~{FA7`(RUwMO zk-)}Ru2?7Lqtu7^fqT-LZf@y}{gxQ4kUFDPmd4L&yz%R;HLt7N;@KXoA#*#hIjbp$ zU9BamccX;S3;<>$-FtqfUdlZpXC=Qd9gxDO2^aHv%ehVNYQ;Gr^(v8IkJm>ki7-Z* zr#qv)p34@l9N+^ii>z!?lRQ9nt4X3v4Ggt+>vtN}Z>4k8Gs%o`igYIGeD=a!C$UOw zF_uIruGb8(+7W3vTZ>CW109I6NCaE%_H}JvOi`~dFUJ`i1r+&&F5pRe5Vlp;9onik zBENEeig6Md=`zB99p2VHQg4p~DUCfjRIDg+J@T!%ffEJY#feEcT6SU0eyzsis=W)e zUDzGT_gnXGr@SKwduHqb`VXWafg40d>K9jfh7B2NNVIFU^q^t-Ao0uxpio{%1y99$ zjn}1ECNPK3OB1H)RxoG0gZC=TQb2`;WUutm)4KZ;{8~qkB}w9_qK)JA^=H z^aF2+YcJIFoE17SEpASZsW5wzl=Mpu9{{0x9r~5Tt_POvYZSsWe<1Pm z-mY!QV=P7k$K}V8sKH5dz-5xf1u#Fp#j`#kJ#3{04+V(n<=s4%Q^lo~;i`pcuWXkR zP{KGowTYK;a>ggrZA;1fk+zLr@!2+Sc~K+JhMQQ=kNqBQw(qWLOPg+k#i(~4>?G=zshd8Iw~VO7 zX7V})JM=UcRk4BvSMD^sEez?}GTSmDR#?twj>@reKXeq>N+pS%+({Z~v^weBa?h#l z;b~lGz-!cC4%TuOq0LVm`5g+%IKA~@L{EsdIA!D@#D*znE!@B2(`3*J`F#*>6EDjA zu0Y<%%_0FxmCqJjEkib+cfVYLo>US_J+3O&rpF;M;&dI@@s+8!pE3;Zc?~jbup~rU zjtHtPHtmpO@PlFMv#!@S5#Vp3$6tx?D)>M)Z67U1Z9nu1W&E!L4L38gq{GH}g&^rL z9(t&}r73E`geD?>!FA@aPJoqu@t*on3?G6aVO=fL5k+!^96q&gnE^plE&LwwG<~+7 zHlOj_o|LmHH_~Q4=G7fPFtK19Gi=@jeKNDIULLG)yz}X98|QiXRPK(DCs_osM2rFh z-@ooIg%m$&)#6?c{#&<(wq>C|NR_Xzi@VNaH(WJov2r(*e9582-0~t9+vY~E`Y>`I7=Z;%_8QiD?poBj zC}e$pX2TKz&3S97CKy?{sm9F|m`OGeACASDBx3OK52+g!<|B|*CT6Mqx=1Ei4*{=rmcuG?Hllfx^P!SOZelxM#M zm9V58o`+mZ!nq6i6Q(+u0}PDN!JvQ@CF&=di^6n%aH5#|DuJtFpn{Qgf8QK)livV> z)Pnm~9e0c033>uUO;?zxxUwc%k;T(DZSK|3Fk|o@)ziPQLukeSH+G2qHUCD1N~?lu zrtQqqvwfU0Y`~_}KH3nd+ESI&y#TddGV?QHP3FLJO6*!+M5sBu%;Bl!W|rp}gNGfIAiBS0uv@WbSAHwA~e@&pA= zMOuKhp(r1st*wTNF0=MXL=X@{7uZqVu5Nq#)zD+DK~7#r&d!#D3m0zSt@=k1bjKBC z>cW&q>VxvRq_U?2EsteSkvk?H25rX;XnERC*#}_+V`rnxxHu!Xaq5O6t`O#vIWCIXy^%_Zi)N)G-5x(hU-5PZ4)+Y%H0u!0ML=U;}{{pj|>1o8Pi=0t_Cj zMb|U)3bxfXSvNWLz|L>h{?DcxdR85td~FcE>;`==_cwG(<58PtDCBrQO<(y_t)p#% zqN;qNZ;S&+D(sDj79%h>ok06tIit2}My_A-3L;JM>}6-Af^M>n7S5u?|Y_B)G0;oB17nl zE`&lC#7=So=L0e#+fz#vO4tNXK+FI|8{H92*EDSq4+)_Y;kiHShs_-R;q+ROxSHta z`GGZ}BmfN~d{uJW!v|f9C!@Gu@jNSQeFi>ThQxdI-0GV!z@LxK>3HqnQBCze$U#Q* zhnI^(x5aN(X&-9OGQCkJC`H&%&pcHr=;GP~Gya|0$7G-UJ?6$Z)$4nBW!X*KpaLXXtupZFGDZ z#2jOh#h_yJk*Qr=_87ch{d?51iAlGv6Lj%8uEyJ(3Sc&$X{=`~2 z8DD%We|d@9@4o>B*!$++SV6o!mi*`5I<=(aSwR%N-0S!ci1$aZIn@eAGJOOWm=1v| z5UwdjA8prxhb810OxB-hI3<1;g$Tuev-~wy_EQslh#$7mlX3R7hMoW~jOg_#D+5C0 zc_0*6sLc14extV-9vVsznkijl9iiEh0W)c%w-r>YhfEs!|o@oy;81KEfG{HYB}gL&;#)_e8$_qe~DbEs&QP zoath)MkXAXTV0-%swpdSy)$Ew*fDrJ^k8qVhx@#Fv_Wnchq*3bL2u@)0&3*(g0l6c z=v32Bi{BE3=0~~vlkZJ(IQ-7MfbM~6HEQl3LNH&ZY~iSEF@dM6l9+DG)hi{?<=W6D zJd^OkN-o0Vz-i22hhe~g7onvxPWz&&(;?1fwvXuaC*)hs!WBNhb2{PQ!GQ=&_+%*Q z@V^TSuwOchNS7LdA+G-1XPk+>9nXg0ADIN@i0U7qY++kt7 zb^yGyyaD^LUlv}c!hi}9cftx=)ZA5EA$dF1shi3gmRV6`)g9=V%Il!3jOCv6PFmT3 z5I3y)d>!LWXGF^_P3vwaSdQ*m(s-;HEMiwa!BnxJZAyY6-6RW!j|NB5>_|#>Y>fz0 z2|T7Ij)rplNC&Mh5&|Qpz;QLTsJ+MA-pI#?kzVmL} zyW0rI&Vyftfr=HQH}I()^OWR^yTM#ph+1Vs`0t(pP0v>K!9x01YGDK?(>c0PTj4)d z5Xbgucbe(uu@HrKB-a~cU4HW+d$9V7Y{Eq=!b>Ho{u6>A#;MA94KD?6;O-43E-n=< zBqH}ySv$&07JmzC9I)4(D>z+FH>mk#s3_t%MUwYxp6y35T`@XHmks=zTCXWpa^Y%s2Arcg$>UO(qK40RRxK72*Lzz#YlX8Fh8BP_;twp%UD@H6d_Xt zH~c#{Am{GL?aC4ShPYfPlb9)o#~=E4g<*2~zoRgKugUZ9-#LE>b$s%HzjTFbfBz%S z1%yd8xVlH?n-WHVxZ=|9y?XX_19^J|ylKd@FIZfi#N z=j$k6r5#|Dg;)(+lh3M6bjE~(Z6_@LcPhT@1_g^h*A_4;3!9-F`pxn2FP^IyW1?s! zBgnE=QO#L-(K)ImqPtXs1j^%Uhd8t3@;JuwNwUG=t8iq>NSb)BdtmDvk@REHs(`lC zDFZRi;Og2=Ht;p)2Cub(AD_7C%s_QPFXx;yp69!Jl7e))B!J#bMiQV z4=y<+aFU}Mxur3yMJB8I;BajOCJP<&%2g;)pN5>J!x{jf%%ibjxA)}t!xZG`fg&_> zug2(bD%#tNn9>}5JlpwbuOUJ(mTNmRP%cAgSrN2^5-LihIb2xq_&!zMku$Fj=LPf$ zhJ%#e#vA5@y!H*&lxE7_fjXx>U6b>KS5;<()#Ut$2ocioq3I4{GNkPef>5_?a5fxY z2zNgd$QqT!*Tcp8&L65?#4>#^%vt1D5Hp7XwO4Cc8pzI;eGPsm{2CxOi;mZ)oZqjn zLzVP2Aj|F5Q9tqQ(@tV58@AS|4K;ADq+`J$(C&u$J1!k>&Ncp@<$ao4x4=2CN54TQ zZUSHXXleSqg~1&ao{>R`>YFvSTCxS}H=va61ymo-;Q116GJc;sh{Z^@)o+1`z{@ug zwImgIJJpMW4D?cS_7icX!5{E69R(w3r$(zHRRn+-rIy`gf@luk(vkAfrmk=L=EXC; zV#kl8AD3g*k8iuhT!cilWEC_Q-RHpZkYgHr?p@bp`6F-|3@fN+1y3vDV@$%;x5@Fy z)&?2@z#F$n0eR&P6_^%I28wx=k-LP@+y8;a=__XLDc&E#3#;}hnJ?G2o-(2PO2M2M z*^T6uBzfCP{E_6(F4kD`2+p-QK_)}VFNv3G*hNJBBxsN9Qzux7_(Ei(R>eixLfUU! z0XglBCRuajVtSa^JM|8=3~VBe$Rz_J(dm-wyanw3%7w^Zj6bJ%k7O0-Uf3E9MH4SR zGoCAp$J!R_{TN?EML_3#JXGz$QSS^IZ1*4+8Z2BK1j2r;0Q)rd}B_LABoGkUaoJ~m@G-2+OMb2kqx_uuAS_Rc<#XOl>CWS z5~Hqix?J3QIwS{A+Jc=$Jl{{3CYI=^*c1s=9NpY``Z*gn8F7TS!_=}dLp$>TWTZN* zRGuKgo*U&(8)$RfS!7t*WY7PtO>K4v>eIN*9E8>F$pk60+#G7I4#Ei4W0N;)A*p zkF4r4nSxxc9j~+?=bSqfq+B6>Lp*1;F+c|2+8+m2D|3>0PBQqS<0lV}NMniU%9vQ+ z*_+Lg;BAVy$-h#;{^VhaOS*>7w)1#7iO@WBUPpU;PuHfKw4VpS#G??UN0(}z$3P?z z4+HpanJKSj?|Jsb=csPF4{xz1Qh#m~t}~s+4Bcw!9vUnS+8OjDX$YwB1nK?CJ(RtI5N^?b zV-IWrL3%OS*LcFeK2sBu1$ZR`+-cVTo9q1#C;b1Xg!%GtyY{cIihk2+z@jjcgnpE6 z;57)q{r3wVm@j%xp(#3l8ytpBq3bvKgPyK35&i>f{YPotxhlb~VXK(EzenXy5(U2u z^kLt;BzUy`;4)CSUZ)L%Lh%~UKHZA2Lk$%44w-tc))vtlN~-MxVWI8SfI20@uzd;^ zx+2J;VAy`2w`4~3b+W=$j^oDAVR{wWd^^uW=H$3!l>`OsGOD{hzCoV^^SUy085VI1 zEKOm`pTm+#D()D3cE@Bg64K71rta0GpPIeedmzF1pC>C|809w;UgG<{m`~;wDeb9! zbVm||2PRH>+{Nw?WDnVRH3yVlr82II7qGw;c(;%U*Hl82ZI=Egm}ExT4g%Fuvkvaq zYng#@D@<9|NNmt0?iIH`SI|ZPe;%QNgZJ8voVcUQ!T&LpA^L}~$||wa!ec{Aoa!;s z$?zj>#$nx5YuJ!6n@79!DPN|tvkq>mI38==D0WO% zBh>9aCi%^k2E(m97j~|H^R^8St8y% z4Kfwgfw!-lXY2Ubo2}(YH1v-1y)QQNXmFQ6qRuW>jIKCLEVY4(FVX>_k8 zN;7?oXvYkOOKnX}mr30j8lJ+$vG*w*n!g~KmSvTgifghE4j95X70cp-bU<&-BrJj8 z9A?RC|1ItP+I&pfdyoA8Tv~XX`rnfl+DD5=6JpC@Q!BcPL=d|RyNeop!=*Ur)1N#w zdt*3@TMJ=Y!sIHtBYI;@^eQ10TGe=49(ewImcQ)uuQ7tZn7d6qE|YDN>!B=T9Y$Vg zeIi=tD1bnEsr4|uVPrEMYW8LQX_-^>%y^W5!u)R;3R6$(?&wByo>MXhDd`3LEknU? z@ZXuCu+cxi8Qtq-@@C@x<&)b+2Q$KR7fVdmJX+-(u&_zHKxKCq1ow0P+^9i+69!t^ zUXRqidfH(5JVlev_3K2$-p$spnAAQpQ&m!dEXpE3xPZBzyvG0RTtAi57^C|xsOt_W*A3fx{Qc$UuD4iw!t(q~FlYM( zO;XYdT?d6`KX--y=stVADPyL4WGE(~;t#>#QUA>MYr!8x5c~f|1n2($4|``B7InV= zeFf>39$*kq>5@*RQ3OF^2q~!nhVGOGNwHA68M;G|PCSaFYl{S}K-2lh6G%b)FWJ3yxbic)6U|;VYeBy1rN|iRiX9 zALemqIbLhVwEGJR`1gR*y?dL)nCe$q#`n;TJk@E1SGsu7F!oB(aejOhl~hfW`j=9B zQ`b4?i&L^bg`}nG3cN}Nk*T z9n@X4!kj?l(Nfih#ooh_VSx}t^f4Dz2D#v4WOBI5^o)Ofyc3B5q6MS}=>5w>tCNjs zdzS#uf%Yj#6A&I^V;2kBVraobMb|=|Tq!{Qc$M|9#xrByA;SpVC!y7Zqd7jYfzt&4 zyGWyTzi0fVn(m}j(z26Gb&ObY+|8XAvb(ArKdK1Vl zrZ%Qg-E_44ynCi3B)dbi$Xv)%cK}^tP;l$*5>MP<9{7^h=4+cG{o3$!LrjZ zsmd2JW|+y0F$!GW_9j(O^%`(ryb7 z4qM}r#MB9~UUV=>|sO{B49ZyKq*v5NNO{_5VO6-qi z#U`#guDx2TNQndkS&I3#?}1df&=?SaO-^Gi@N5mf>0T4wUjI2SDb(pyC_VwWnc^zw zv?N{gF2{0BPdy;4;;by(l71mhIw3_IYG-WhYSCtfPE9Kj@+y;lwT<>LQ z81zdm&!w-`5nQneWr42n8`MwQW{F5Y5b-JVi7RJ?=aWrFZv$eyA{W|kHGm5DL%uZ- z+_cjJT{Vu%q7aSgthu1T{Ojhze;+~wUM(1G>bi`>_qwpkZ0ccFL?SY$Y{mO(w*I5u z0jd=T&*Jw6ORS*nM$mb1h5r?)(nW|8+@a-)bcuO)h4SvU2$aO~f(b&k9gYyR8S=KP zR-*AC57FP-1RRBu5wF`8UU+Fh>afbLy0rACzCtb8t*Q_m-5a6m`qKvPy9ixlGD(-uJX6Q|DWnNV{)X2fma!e4Nk{Y-Lb`lXWp--rl5 ze{J~~_2$W7Z{9C{IiQIVVaEN#9QeIVBVt!*Qc+-LfAras3FD6_BESHntzXk~f7Bc| zoj3nUXmV}FwL5~gy4p8g0VuCVz|0X z$DQR48~5B`!eNvV6pWWfmIN*#1yFH3s#?~}jDHs$h%{U?x>AN3sffZK)6A#yq#F`! zcD;9wUol~pEU{MjsxF~NJw0o`@c_w}*5>H~1)=G0c%5@3hH1`=iDBiy#XkK1TXC4S(Oko#5W!KtKyKvL41yfy#s4yven z%CNEHaNp)dhpIrcs96CaX?sBjWa%K%sWbY=<^T|lU3g9i5#k#A2`IIQiYhVZ-KV;=#wfU#Y zfxoRDq}W;@5$~YhOPpq;9^MwpO=oVa9FvUTcm}{74Nm zilrM@>1(DVaG?{fg18#{Hy6>uSws;M~lhnZHd$qA6EZ$7gM*+ZTiWpi-KcSh3FtJ$%f9 zrt|CREF9_~x09R9?Q%0A45CVB75aDg6<=ICC|7bhasQ&*e(2QDSJ}8Rktt!(iE2?H z$ycjG8I_J-!e1pTiqi{P4g=?^EHQ~@AJO;4>P0K^ky;YE%6zsz_Tf%sU|+b(Wh>&?;zdsL}LT z#Zk@=!mH-evQ?ahM|T$u<7Mds^+J5yDb#L>MRr{h(bQND44Q9K!dnR-N&d6oDv-7V zG|-4m>o22>pn5?G{Py|&WNRz$J+x0ly`1;B-<}j00sNd>Gy)&@tyH^3q!K#$SG#Of zFg!#r6D0F9@%mUOzsWAeEi2UOi`35&*>a^k>Ev>{{}vvNiZ_lf5T}SLMV%>ubf)LU>T=QJ{><!XgxY?hG7(<9q6`>2@1{c)?I0!--Y?pY#PFrw&y|feqH;H{;U0 z_iB4t%KdKAWmOQZz_HL48l}oM#+Z<{fHdze=~7G<$7O2t6$>gq@KC~Qk&e=LDk%-` zRuQKT>v{ujdGAz9C*v}$ONGOcZMV2LdTd`S?4Ml?7P<2$1c3Ya?FX59-DQiM%BLhN z6aH$HHz)j3_b(}l(Tr4LNP)|5EwIpElf8d>W9TBlCX0Y~?q!QY<8cykomzk%WA$K> zdYOtx`|#^VzziK8`w=>fL6_?%10_zQkyF)+Su_%@NuxR!7i79;F_6~QZ1Y?W1^H{= zS_2L2&t8M}eeHkv?yP#CE&czsdH~q#nv9R=G=<2hbPnq9PP(<{M;ONHhQ~0*v2pJv zwh^dVkH-u~ywYy0?Te%`Qv(TsDec{}_HW5yha9OVb4}LZo=}{0Vj)~;VD}mgTNe5? zzRLp?)A!|vV#9bd8eKm)FbqcptpenOfi!f~$O{bVb#06NIp^quI4a|Ok|0Rqnj~RS z?mEPin!}2;umpFO)J>Y$suoR~5BKks34kVGp^Iu+|APacq^uIkpwqhL>?=}m6Y{;z zNiU5Q6uxVZnpX{sN1QK2u^!AuE_*#F@!ASg6fI5Hf7hDRI%C}${#{yX0 z^((ow)yh#$Pe6}h6d2g3Stj4SZPlLCmYfWi>-dnX{10Y{KV%$X#;`LT#6VFB( zyT+d95?3Ekyh25bt+FatHoNpTRr5{S8@mhfjvuDYi^#;n$GrzfwEKWA;}VAp9^!gX zu^3l*+HhB##CbAN`fpDr0{uQVFy89$B1HcRRi1Te{Gqy5MFnQjeg#^0XJG`2+LMj_ z6mR>x`3CSsf~QslV2YgeVhO%(7s^S&txu^-8I)tmjhR}&2`Zal#6uIx8#yzV0iB@f zuSy8d;g77B^@lvz<%$e_)y5`Os+?ewOfzAff z3gI=Rut0y-} z%&MCFUUO;_8Ve-noZiWHIN?Xq9+WC@^Y!_B6qAK=K;DU~M6(Fh!s<}?CaK$`sg-^b z-iIAt(r|%?<)^}*RAnvkwR5{QrnA*^4*0qldxCh774f5~dyol& z$&~Zlq1JHaS?(}?#s=h)j;cco)Fttz-tRrUjb9o5?=y!F-%&??G*+R?GN3J5Ez7&M zw3(>5HBet<8IQ=jx3jhip;2?->tjrbl+dqxL)F7yZ=vY*=EiJ4gNLw6*4Lnmx?J+r z%Kbq-;Q{$7hL#rR6-BwdYfb_r_#nzWw?~%4={N{;n6?qNb-h*~aT>a=n&wr!fi8)y z9RH*@%Ddy)k~H7ElM@C7C60q1TN+*XW7EK^>3?DxEUk?~-jYSBBZfF9hBQs{cOPWk zWSl14?|4b~_U5u0Sg)U4iCq<8kh9U*^kU6*I8fM$99NTjhr)QaeVfj0B3PFDRaKkwjVG(U;JB@49KHshD8{ zJ;NbXt!x^s`iB#~R_jiU7Z9d2>6y$_ZN5zn=6n|?onq1W^t8N5c^5ac9Cj|VrYoLD z3;{>vzpE;~ZY~z(y)RZ*bz1DJ9SkX(c1RefR_q@Fou~yJXqC>Xy%|Sjxj4;rc1sWY ziM*KO0Qt+QJ&|)&Q)a;8y8?6;dhlHXg&tNh(3W;iZXc0Ol#fqBj*yUp6&Y3A=$Y>h z163h8lX3~EuTf01$L%202@1Z7hZ1F!K@f~MFG&Ey1Qb1gL zjs(0IuPYr@wnHqcsU1&T*50~UV2+)MUqJQWy7~)$b|O5$GiiogJ_;u~%|Vx8RbB+@=){e) z5T$LnF%SRPS#c5I8_0+WZNl4fIDAJslogf6cehUpthAM3R#juy`gJ4+ZO~V+H~r{- z4jDSV1L_M7-w_8Ke~376F8S+-1K>T?z$v&th7)^jDGF~E5?Bp)NLWV~nGK!vflf32Xg3q3+PC(g>|TwTzX zCSQ`IDa1KP9Q4DQe&IjdkDL7`U--w61)z}eKgt(=bf_As--$)02o^knY$0km;3{Bt z56f8wPp`}afx^MVR)PA{tM|U-_b}ESP%E`*B*gg?6D761Qzj(_jI;@Nm6LKZywJNt zlNMBg;GsR0E|<1`jp$K!SI-jMC=0vr1D!KuB5aopnicWuJb_5y)}oqYX!3WdmJMLy zd>a_icN@wr@ZMMx|F)g>2|xgG!@O_PWM-mFxsGxYl<);M<-f}bp!p(K z8H)S5Evm`DbWnwy4z2)o1;CLw#~C<#06e7g>A*wzo+aR=BEtl$O+?79!fHnCBOoR2 z^ux#pCTsECWuyIO)n3s@L%I4=BS3Dvp-252b%8fsQCx5DB3$2Vt2C5F@C6a*GxNHP zyZO)TMD2Jmce>p&Ki-15eMqans48+$Sf8kV6gj0J9L48Gzg{*-9ojt?d6?gfiIlOC z^#mJMf!p>~X@7!Z0F8<8G#m>4 z9yF}F_s2oQzr-;3lR^T8I$Y$oOzgn*xQX>@Wlr!bl)$;{cMVaEh4Ht%MzYiFDR!7< zBWSk;HoDvph%!G8;1mKSX5Nys#ElMGMF*~^1vs^;`f07-BL>>K`cl*%%!Z6zYs<`X zev%JraPvz564L+5m>7o^cr^5?j^Q?Y>+h;Pp+l5}xtnZ?=klUbM44Hat~J%d$1{L^E0su8~q8&cO$Pb>VIW3W#AUvmr?JLWV+L5TeB!n#}hnp37iJGmu5 z{=i_v3Mcl3J{21L%EX4$>4#U^z876_5eNZu>(UboTz;tZ9>i~CkF42%EHTE^_$P8= zxXKa~02|nyB!bS!iPgf)EM4aC>x@?JuHGa3>`WT`lj~2H*;7^ofPSM(aJ*#JD;;^V`ipgenOvfu9m{M-!q&;JF4 zEtZnJO@H~z0YqQXu-iY11;5wi%

52IGqML{UzW^Uh}vWWk`ms_t39uUkDRrEzQQBlZ zL5x!BcX`82VQVrwBii9wqHk4weEZ3TExz;!YU4bf@@r@8+J=+0zt>f^!bO4&N|Sj6 zrvd2WPhf*?#s!kPIMx1t*KBMr+T$i1zbN++Z!NIy#A;hSclo#+v8q4y-65dSqoE@>2}~ zm<@m$!prZ$1>WF?4!;T+9!_*BKBeAdA}am?TiSB(-P`>%#`#D}=6<#1%vXHTk@_uk zH=x{4Jrn27HyB%gYfm-ZhTy)*2@EH6oLF$r@xcrj*A0OZksI>dO@6N{{h})lO85OY zn=%4x!YrvhQSt7EW!AxeI3Ms)i@XIHx=n_m5Bta37w>0C@OR-IuEfwsF}ZUAxJ2#P zHZ1Kc*EbJ&e!?XV=GA=fEPe_C>WY7=vp9qD7dnf@fWspE1*fsIcyzS-z-rcJ_;Nk? z-F|tGc%O!W!6#ntWcxGpAzX6mHp{?s{?`#ZY2JwE7@5BzCCUX8MWIX|eg`G8fx)fg z*I(qCu|wg=7Qz%#H|W2w|08_}>W9YP0%ij`W7o%6DBp{UG9P|Gl{Yd*at#0fkrMCl z`0ThsUuLq!`^**Z&FVpIAC&n%llv4R90OufrgrVD!4Elu6uHg6Xl-t8D=H&9iJVvo zcmv-NmRD5e=ehv2{J40z-hDl7u}I4z^85L@2)S#}P;3X<1d8rreEUuN5jwYR4=mN6G=yr}#rfK+$e7}eJ!c4i^Y*Gi zDJ@eqfLa9Qh|C|1_6HGWO1gObM-syPB_ZlCIsfYNFGJ)V=(!VYjNa-m^Vw1IYON$n zKUt<-AT_S>f+ta{vT|LB@{K*ZK4eOz7EHDaB{x{0y#S&fVv{ZD_C{WkKiH_wCqcLDODOk zA>`*FQ3x$Yzw9eQ$={`YXCRHg* z8r~>6XLWZgLeJF%P!l8;FuZ!C`I0E-=*%zNviv0Y0H5*v4tHT%6>cdYy_CpaSI1a<+!Vvt3C)&J!p z{2qDPG3of9JmYuL!T&DL2;gM^xgZ@q3OOWn55A+6bxsC!g9o2?FCn7}$#y*-0Y1Xf zSwq1sCfb0D0yh-`fD&K&bDY5t9+{BEpmL8d_GcOzth&E*P2?+6ziOpRKb&{{S6ag8 zs`sxMiB!dbNrz7VW>)aT&x-O5%Syta4hwEqjyZXv?9eFvHYF-hcDZ(JH#|iamev5e0H zr!=kwk7n>bg#f!v(B9z3>@@~>?~=QXV|+4NRtnIEpYpvP!SjP+SyW0^KxI35qK5DedYp3$R(3(+26v#L+g3HV=NY?_@}w8LodQP zMZYGh=x;rQYc&{6jNTS;FcXtSb?|E2x(N5fMUyTiM$i&aK^2Kx7MRs;B9_M*R%8P( z2DvJ0@KRE$YlP(`m#%F;p@{l{M+9JhL4qB<)g3?c5o167s4na)_5Hn*gX32r>hAIV z)(x)o{a-75}T)>ccV+XxiYHOPPufh$GEt*e#@(Tg0>5*hrdOOq9(|FSul9uh$fScGjw$-8Z#xC0(1(z zA(|bJb*L1kYNPK*Hpoyes?@j0WQtwu+D z|8W~9Kx*~L$XQD-HzxIpTQJ|h7+&bK0Tvp=wm*7tMB=Y+s53)#w8x;jHX-F-vLas* ze93k4xqf@v*wACPprfNt<|p1=R-MWExCi*sG_VgKjeQI%SE=zf&ZD~hgl~+nuc<4@7Ti=6KX)>wP z>i#M5d_Hs<8pj*NL$Ms9=&jgLMKB%~oRa`KHH-pNgWW>8zDWDj4w;ySf9K|rao=-y ziS7!OK2fmPrw}6FI83bPfoP)K_ zxsyjs$TOBMPde+o4bhaj@@_6f=PThEWr#6N_0Amsi+{+=|Bk#2)CiGGgL|G^Lg9cp zk(=pLq&tU9D3HwoZN{g*2GxnV7>JniBPGA8-WeePDjLNEHPZmY5WyYkWt_)T{zyS0ow>je9S5$m~P__}|* zyy=~Nm8sKSH`HEmb)m8T0D?<^;V%xgzf}dqs=3W+)V;0V@6XCBk zv*Ouh`H)v{GXG&c@|kgzZTFq_Mo=2*?o77rA3B?;0y}*FM1(P#+M0cti|h3I946P- z_rx4%p>n0o+a)nVmWIF$1M+~_U)VdetT0IOOQ{&HK-h;#ZQk*=l~QLCwJU7+ATHG< zR{rG2T;8q93G)cmktJQXNx`U`cGA9HuTO*iLk9whILRiI-O^0ML^qhbV_kD%uWL%p z$;pGo&?>XDtjAmzviV|B#G10-e3o~D=gGwdfgLue(Q+I7nzGs3ts8s##m&Ag7hNd6 zUzMX;12XSjI9N2p$oY>JG{v(8i@a*Qt7mGkQCk)y99A!DxRq_Dr`)1dUq~``b0N$J zTP>|lXPX^WZ67~9(}vbLA%3rQBVaD#W}-WSLULow~P8B7c6=5)P)NVy?1abq_Xg8)A)XGg~}$FJJ97+peF`88x4 z*l-nPzY@qU*N&04=_yj1B*g4ww3ZziRbWYjx4PV~)W^&b@jXow`)mpTZ3|b=cS1Z5 z(<-}MPegi;vOAKR0~MRC&H01s9>HFX-4=YlNmTKglVm91NZ4kjqz~_5y-jNM%{XD5 zj>*9fz~3onmRX?nO$y8O3{!)Go5pm zvlLrq;T*TPi+T0+D)D&XSp%+$Qll)Z{S_M%FCx0ZZ7ZMAy3JEj;3(kAic?1m!4GHf zKO;pv#&FHnkh+na^)><-H0|LxIU!Gu9^x zhBMl$k#pfQ^i{bq^ZH^N#u+Y^dgPXU@xm@!8XFMTcUPcF1o*~8&HnWoz)Gm!U#1jI z%>j!&dTqv2bgk@>V^qh?Y>iZs-W0jJnoe3|B|WL}XT%F`$7@zR?^D6l?Q&5}+D`Mr z8t?IM(lsqYh$|&Tu+tg~J4R^J)APvfp>ce8;d)Yh+>Grle84|~6Tg6P+od*4(%VjaEeZP1H5?cXA!uXsDD z?I@zWj%8`x@2g;{)lAO2knr!{{w~9^;ERCx`!D_zzfh z6QsL^vvI+TpC8YQ`@-0?8J=3vqqiag!EKo;2}-=qIGcV)8OFLVzu89Ktd-0Ex;bEc zxn*f|!odUIsI*F_%avh6_>D7}l(b+ ziX3ezZKC_)mt4J5P<7q$B&u`4(UPsUfp5f;V*$aYzRL$MVE<@NR$Ylo)m^6~epJkd zC$G(jFBh*0VQbjdI|%Bg4XN^^r;P#~O})ttb@-aCsra>U0NFn9QKS87&(FkaeBP|y`_jP)1W+s&lmJ4XZjIy5Tnmw-d(i_ zo4I$%%&{3^I}}ZaJX@_671+?+E4A~n6o?(wbSG-;kG=a`lWb2NEc>BUj6C@s9=N2K zVgBgv)sCqr(0Pg4>JPa-6^L5L%MC4HFE5FIS!o;}O>!IAq-Gk6D1FULDCPDF1sWi# zeu;_Y@Z<=+K`1d3{5q3i+G%$iDq5B;OyORJwJb2wqf*3?hvsT06_}8Qm#2D#@$4iP zp)}`NI4Cgv4^QH=Rf%=jPW(kqkH#8i@~(M{J>4K~{f(Bt{d|s3DdM%uilj~i`H*1! zr-n(F=ISdwddexYBYYVh1L2$~EXol_)+q(zFV^Tg?6Viro7Ze zusR%QW$Zs}+ZxX#Pt@*y)eNGm5MGiEYo*8UzxiaOH7p}mS^r?w;~QonY|2+Lf!)|s zFIfo1NG-*BQ9GUr+ZU)HJbrVEPg1D%i087H{V|u`B;NqT)d6Te_hJD zyF7(&Tn`@RopPZ>@uIt2{or`q$F}Ki4l{l(m?a=iS8jQa=!)m`JtibZEh(O@Q8ctLC>c4{ny%)GaV@P;O4yqYadIRn+o zs*0kztlk=Xu$@JN{AXQUoe@I>GwRkx^*e}I_`YBwI1c#U{)xk;Ube99HFSud>5#ZR z`DlT`1dmMh?YBD=`HXr}?Qk_!=LEH>GLTS^9!xlgv(w*Kj`T?lj-djDjY1C^MnG-; zlwMR&1^4+z1GT7c`-99f3%mAJt$Erv1K6{s#gUisv#kcBSI)}$)H2^M;*yvmif7PY zx&D911pg74V5k+D`~#EUJ0lLzG*mQ>hTLAjZD=y@RUnDO#&HF5gU858A^sR6&Mc(I ze#aa??TUsEfc25HltZmUE>`^NnCv~y^C)3n!gRKA~XppHAF_V8Hc z8jh+gSQs4h-dnfn%{G?jyK)NqqSRGhO5xYMcvUbyY*B@Z-J)(-T^iwjuPQ#rU0K`Bj~|LHi9h*+!uR;^H(y>eLo1Sk!@NTxgor zx5WNzEtKG&5dMGQ@2_oe1}lYt?Xqa!n_p)ajgyiY>X(f!+JT1Q7Bq`VcS*hRT$m!c zSGiv?U})gFrl@n^zhjnY%d9+&I;}8`>fXx74dEM_Y`5(}fF)(QFw+7nNhUCTZy8RXY1zf=|~9h9Xj2%NXEt+e_L- zvAl>F!NbWkZ|rd>A{SlL9M=gYAF`U&L5Js2U4pMnm^BWM^HWS8qOO-VUwR$(@y+ar z%6&eW-kmbvN7VO#QA1u>*+L6gtjr>?fvQ{8bbUK-Ma?1mS<`K_F|ZqtXm@m$^TUN0 zc6gcv-}N#W)#_q8PQ)EfVN5>Ir!IWM31AB+e5qBbqS)C+j7^+I7*m*N`U?_7Y~f6P z{=fWRfQW(j=3?!<3>)6ix{8K4A7L2KoG(=utd&XDi@ zJHAydr)fu7faM^dImJI4w+zoOPeAm?R&Ok&Vkg?G{@(Flw4$no!BF%1x!H#laCxC9 zQ50pb@(P!3vog)L67k!N*r!cs6cwammTA#gDZ%daFpu7~=X1N$=(L_Rz}8ciSv$*# zds#sXVrS)jUZJty>@osY@}jb*koA(M8eq)Y(cp4=%IHY*cjurisF7QjS|?|w6|n*@ z+RLSV6x{*?MTWp_f0Sa~w;J#Jp-<}Fu48Fw2nU3Gx9&h}VP*>JMvQJ*yg+0aQX8%R zQm7orU*xiVwHK7kWdkA6X??v_o*J9d;XpkBvryGHmFj>s)?k4|uKPLUWLR(($k$RE z@;`b}QGM{%`G#3~BIfh}Q6JVo{~uoX?MkSXEHh08)tBWe)|`T#L5y({k9d4iyrlR% z${;70%St^(I*6zw=P>@DO`2ym3EJC?2;wxe5=f{(a0#UO4(|Q zQ|BuhZyFA7K0B(iG%nCd4%z^W+xAseT#O_O=Nxfx;FNNsGBt*10DHPnl(^jVJGDLuIHMoK^*B|ZeE;4W z3gN{XVEqclzt92jHF;(mWb*hu<#uv#Si#Kl5-F%^nnoGJnWT-by3VximI5$KSBBwMxw7#k|tSY1Kq&8NY z40=Xbfx(}}NtmLzDb~wB+<4K-G+nNVN{`gpGWX|HpFX)$7_iK#q`ZkjT&P=)HNci1 znck!P(iemmoln|^6aqq&zO#l0>1fA`=zzx}w+CPP=j8t@Orncz{`y`4rht$xwdH8H zB$i};G7pIG_GH7T+=#{OIc6!VcuU_oF<{dH$n3%fo@K^iX^rMs+nYyF8-=bGvo3;# zm(4}w4~S}H3KGz42{o#%dO+*cN_MpdLZF|7cheExKVFRNT+3O8x;r+?yZg~{4X%W?Qe04+tdns6D0>yosy*R{kC0$jexb?9p&9d6M#M=*HoY4{;ob9_ z7i&ryffG1rwnzvIs08hmUf40`ptbS-D>6Y;Y^qz5x<%kogcg?HpzBNDO~gW?*Zbkt zL!Nu_k2UwG(JZTHgyIYOSG7zJta}ZqIX4SRS*h4YdLEL*4+;^9U;`TbUhYzNZ{{6* zm*;eub`U3bZp4sw0p$ud?EnQ?s5vXiJ5?l1oW5kBGW92Vc8a*Ghs>XZ?`)zp zchd`1l0{V5xyOLf&UFHWT*L3n1l7AX#>1HG9@r#&vpee_Uf1jnrAf^9Thoyw^Yhj0 zpc6X{lbENp1y^#N6a-hAFEb%E0%|s5sFNhBh@3~2oG*_S&N1xG5w$I$ne_HG($@=3dbD1ZI6a-`6g}nnWi6ecf#D02s#(b zKG&LYgR^r#RdsMpQ-4y4BGK72!y2;q(2Zlftsrw*D3O0VY9U*$gyuHJ9riA*(_0@i zy^?Vtqn8r->PJCT{)m?ZpB4o-w4ol zRw;ZxWk$-Ptoq5MQyzU}?i-mvo%sTCf=uTRZrr$d zH9P)hmnh2od0_(THkT)cnBj#Z8RL0YAZjpehZLTnh~e51bYg#TL?tH}({tM?LiwWF z#e20(74b@V!JcPZ#-a8lzu9)A$rt>rvD2Kr7S6xQ$MQQtz;I42IB5U|7C@|}Dr6|u zO)%6gBHVkHS>E=lCbHpqnKO1W-b+otWm}u!-@uS#7Yp~nc$AOyGJdyG_&pEUT@LjhvU*8e&(if<#o&GI zeM_`Ci|UVj=)IC&SQFl$VR=9=Km)@x(hDR5EyiWWMXNb?;T5tpd}wMX@<(EU-e zCbm^?XV2Y`RCUIJh|cwGOPgcN(PWyy{#l607(PC`fbad^Y6#a1oo}pG8wpBF4sCmI zB_7VwxqyLQgAw?^BbxIeb=FPwpM$GM_qSL}iO}lOUf#`WKG23C#*z z;LlgIYFO63vpWhv3}|=D_`7N>`q1mGZLdMK&?lPxTl#cU3Zg>~B@*o}xn9kRn~#<= z0roVcrnv2d#>?~3IOEnX7pO$YVospzAjm`dG!B>zc-HRvR`3om%vlv;*ObrwVqTlRB3-i@v_Mg>#|HTHR_M$bf6q@ATw#*bx^eYqR zGlZ+VaN1?$^bmWxi9LzNH)qfr{y8e`N}?jZfXki>XmRvspJA{>-G7Yt+-D&8uYHE7 z>oU2`gykre6Xtprj#z+3?9-f$(ocj#JcIQ4rTCJLxQNilf*+&9jlt^5c4glpL1@EWuS>97#D*tf1Poi93vF&{Vg)|lo6nNKc?#cTO(XhB zvTmuMf_w3!tXd4(h<6ru)*MdrLJlq~b$3Z5mw>HM!+!+jXmXwJ0>@Tib5Xb+oS z0~_LGvBZ#ob0U64*oERhS#5My6DT&V=5z$Cg`IzGEhrlTv#s0b{zxl5{S#eWD!*&n ze%Sd6x~idhD~I#|cOIA;hO+E+^}l4l13xLPt4iP!y*?_)XNh|q&d%<}5hoJ<8v)@< z>+mQ=`t?Y;A!(YsJVXR_DRq)Gp%jR8uM@yMNE?S?ieT61w$}qQLhX`}oYUvEY->_{ zl%Plgr(GzpyJ?+6_S{16ezz%paDhhG?jx)CN&ke2=+^|ZQ#Bw}?^YX^8sR>J1=!-< zT8<%lBPb-z|iYHzGyZrGeqS zIJ|NO;ViD5igwmam%I}@uP^S4D8Idb+AY7^vC-^mHxh=SD)Q+qMNklXtgsWk(>$qq z>8`M91)gI{)_vjuLg#4rGOJ@}lh38SUhJ5(o(b2H%0V`H>&wCHIeLnJZyn@|1@*gk znO@x=1n7j_45U-hePnjWvtAn6q+Gl~nb}-ed4V^Blg}rC`}cuK;5l3BuO@*=msaQb zG~-ye?p7+QX7)qOQNc08OJH-{P5F+M{S>Xq@&$?E$k=O{k!?KSaK`(LdX&MKh|D+( zKf)BcHJJaK*}G#o9jcWH?F*JoM`>2#IyF` z+Q#GGRstwy5X!6umbm52jWysbTo)n$e#YrVvtv+tS9^!MPDGO-r&!hjk|b<_4ZjkX zRS@34Ud$e#g`inJTqcsqRq`ARR?!7^5FzPBR1;O1c;0dQF#%)m;A@d{gjnivA{2@N z(`yVHQsH(XKCu>eic>{gXqv!)Q?UO=>7vpXua@oOJUe=02hSp>WXJo?Yd(&lxkmr` zkk2qj9laErmNPe^&IDNh5M3FygHTZb#9eqy?k1{;)}V2`iLa85qh8twb+P=mK^@?( z>4Q3?{#ipp?Q<4VRU9@q?+7kdrNtnz@nO>2rpkuXF;8W z=G4#g4Cv$gaIoQOO-GvhNoCS6AjL4Dy?tatj|IsfZbCn+!_6`M;y6F6#R-P~(*^u{ zx`4reS1`$zDFYfZZ`!7iUBFGQHB^DIu=zNhoLdCJ`xRw(JuAL&1r1*PIWOQPu!i=Z zp5(T|W0%j<0!G)re6WOphE}AFDrY(1SQs9r@sFrmT_wo#zD72k+XBE990o{+ckNSM z{Qj#19sm^-WG`xHa}XZEIH(f&Bu>TiE~3{Y=h!igwsgwmr=URSjvt5Ssjl=0bPs{M z!gPLu*Z%bM|4mfj?w>os-P|s49<@QTmf@x&nCv_hZHv?Xl#do`?{;fkER6kr?H^br z2>fK`L19hy?oBzgEaKVg$OGprIE`w6ecr15`t+hYw`$d$t{4 zB!KEsB-RCI(Ob~3*SUt#volG@7Ouik##@Zd1c6dUSO?QqM&I2ImM z@np@eVvx}b$G{oBa7$ZXV+JSxrx?K2lWJ5T)hADr zZ~kwu_pfHgIGFDTrr5f+t$mzr^l%P;85`*{mko+0;Z=XBh~sWNR1{F;fJn2NXqSTo z6GUz|j%23;slG%SVWI?3fzO#`m-_CVxc#y2>gK1e!m6#tLWJDIA!;Rb)~xc~)N##~ z(v)A6`w*7Zjb0JKzWR!dhvuWy0opT=l=3z~3mPqEmSs}1=jxxEd}mS zKmP2@3;f80m~HIngt{=FxOla2tW~d$unBOWFNFXH`quCYuo?4rmk|Q>c(N$;xUivr zRqz8;AgHbWf+2!zIRyI#FEeE_cL3l05d|WRZLR3ER7F1aBr>%F0E#jUPs{YdE^%A! zr051uNWPMp>izBvl-sQ%Zxffz?StFrDu5neH*=B#Q}J5#r9n9ZiMZt}oaFR|!byqbEd;bRBHE%aY_;yqFQtdt^jXEg?+r zmY?)RUUFlgkb*TnVuIr=bg*Ue@K(H+l<&fg1epz7eZNM8vf?=CDC|s}Wpvc~_UrVq z*w_2RZ?@dG@?AFHFm8RGYtHD|LS*Ntsvis&5)V#`g5Or#>eI(YD99lc9MiKz6^dE zSZU9@+ezTie)s>icI8n`UHe+w3tT}!S^l1rCIN{Fg9ri=8AF(d63UP;OM(&zyo0^>t*+Jg*1GTB_t)NQoqhKH zowI-W_V;~j=WNg_C#0r%|8@%Lw-waXH;|D{zEQAVW8E?i6}{2M=ndEyL`_fE7%Ii@ zS;;(0l=D^>^fXP$-_|0F{xG;YP!Q0vd1dW}PS{C1@p(bp-sRuJy5IHo9IGSw z3dRT*>LP158A|RLte|wL$uO(D`j`VWi-Wrr>K+s8xHUmX!bq!tj&0y1U)(Z0?aeL^fh#8HkXDB&9#3f}4^H0Uju_+E?=RO6BF)jH;NJB3zF<=_sAseAG8K{c zb6|Ya$KlABru0!3Yw&kCoKgU~;pmXrBs;2ETkveTLp2^Iy*uUed=;7+1O8)ty$I6w ztXR#;q-^+h|8wk;7R?K`_Gnz8C43*$BNhsA^)ob6GVH`+N8r)Ao!ncGGdcZFBOZy@ z#=j5wI=FqH(>b`mcMa5Ih7Iz|6*o5WY3H+8Q3qoe6|!%hHpG2vO)l}7O>L{e>q#3- zICHKc7u|N-B)-+fnimNFe&$8XBl481`y}I=-Y(I6?sq}x~ z>%i{nABPC7D6PROUww!wHD9xz5hqZ@oQ?XJFX|lK0n3mHIXwDn=8>-MYfTo_cf>T!bh?quq-=I_2Msw!nQ%|+bA)=D-=U-;gd zL;=qcFe2D&u*sYt7jYinp;ja6(mTxB;63xZ$ahbmZkG?Y)Wu@ z=8sB+4!XvTS7o@K_+r^X+TS*`x-lmwNl8IoxQL-9u&mSbBePY!N>WFeIsdJ6xGvss zO0pVcUVoKwc*lP>nw!Y}<-2Nn;P(OTF3=hRjWft=Me9mW{F+!tm&suVSr$s z4d&;7aaDg|8iw2Db<;<;@Oc9i4zb4w?<}xV#f&6m;^5%TCMmW}l}; zT7|!8gABAX$_bpuo+a{$3891l>X&3goj}2k3c2PI%q`WeM@z&p8RCV44Ha4&fBR!r z$wugzCg~MApQTlE?oll^R$IKawTI<&e(Cx9UcrCG7HOA|MACd3uK;!xVvF9h3?UlWB6v++hZ~5jJF_Qa!YrN~g}z7dz2umOJOSJaC39&5H)t zPoTe-v;RDw(7!9i4TV&_c^#b#m4&3{ILp6|d)@95teUZO*6hLRCFbLeZ-#y%O9iay z{sdXib5(|>3P8#4n$n%?jqfaW8lG68hlb}*p70xUdfA4{X+*jzV|3XxJ{R1!w5ao~ z>Y%!MMHj+4u2*wd9iOS0DpHPDFU`Pz6?tVK@bkz!%T`?<+E$$5s)hDviKkqfFKpF07 z??0{deNkC3bp1CD-cbV)dT27EOYQxhAxD#y;rBiZ$v$u6)4I(RHc#W7vDcgYw&xCi9OT#|lC4&1p|QB&l^i+9pJVLM!=N zlA(;qr7JL;*kjjAq2QHz?#?5GTL+}Y=bN{)w6dqmq^+uEF}0l~MwPgi&04)X*iFc< zmBcFy-TUZ z#)dvCqM|cvKj=#H_2jrgxEIwye5C$G@fD=Mh8vx8-NkXsH1rwF27$yqV^?=_jsT6SGR&+X z6s!N;EP14GEMO}3c}%fhNle*A_|1nU^`)sb>FGC?MK`)Rza+=%mF2gJqbB&NItcz! zlDf;*p##PNEc)VI+ZoG;Exo!dZP;|@vXlkNvZ9?%a7^Kjt@lv^G*1ED7Ujzf#7g8_ z-Ld=3cGTPcN}5UpAVh1K=FXN<*yDe)mfFHrlO{|#x_O=|f78HKqJDvgGL8-3|5DOw zx3#x9?0e2c`~vKXv0#}w?5z~t?wmn0ughs?7SD3dRed{%gfhycFBC0nIl3UzHS}LV zX-D#qr1DT|WCIhjuIQqSQ&zcNuTheqQJdRp^6`UbK7q!)2YmK;CZjPky{MI~Zy$Ny z-_3NqL^Ru?GV^P~SJRk;X0c$+8wPfR1MwmSu7Gbx*2mPzjOnxvhn)3%H`5*0er0g^|ivQZS^hlITnxfZS4`b19q8YW-VmhNJYX(cl`_>!8wL zpE+)x{f8S3{^=CZw_5B?^l-*x{PDQ0BH5qKi|5w&#>_XV6vf6C=pj5@? zdvhKuQE`Jp2S%%>GtQ~t@)S2muSVfbjVsG`?#JWs%Bu$f!}buN}kz_*S;lX@r*)1_$cqY}_6{AteRx zwz#QfKiix#ey-kAp{j9_C89LSc_X5vlu3KJ+dBj93qMg_Y#5=ec(+xX)%bB=M(Gzm zw^aV9^u~+==3Srxcug)z^d3#YE!ECRN!hXE!lW&o{qn9f=*0U7O6ZrC)p;wTLcG{0 zRo^EkO}>Kp;VMUvuDxXjg{xGloUO#vRGkoIW>$POTeUTf( zGo}sXSe`HUE-@Tex_|(u>FDD8H=IDR_l7-B2+rj3WLqvX-|${uO+?vIZ-CbeB#xHh zwaMbep7#b($t=gQ>pT9QPPjBFl%p|TnCGzu=o9#~1wUn^HbVc^HHJ)d{WejROi?(O zl4D4WN`G7G*reY&5b1__bu6XOl)-QmdCu{(4#FXxUEA${MSJ}fUH_us0DzrPJ%HQq&qG9Y z&jRS{U-``e-bxVvGhz8p00tHa%9kRN86iVo0KKw)4pIirzw_{;e2#=-@js~6G2no> z&@mEn|8V}h1C1M=>~2Fhn3x?$;XZ~`(^~R@AF7*AT%)ztR>PiS45}T&V#EDq+JbN< z*rz!{)={K6br0^2Qf#Lutb&j#I<=){scUJuoR`eaO3sU*EO^H+J&4Zt4xfW)HxP%j zi4hb@vwaI8Oz^H2>g|JBP`;JFMg8>8!+xXtesnj|qTGt}56t;q6+jG2i?QKh-3wux z9kSlzG;P)g><`w%u$WiWsdM#4iNMJb&MD^%K$)dmy|lHp;huLatp4bShZ=@}kUe;G z!O`k%&}t@a7@rTTX;`r&*}?DmWQG z8uUU1UEf-on_Y9|Atr`Xt>h$Fd@)t5xM2hC7OJFamBYzu6#vjM_w!X28ut>3ETa3D zNo*HqybR3(%{~B2;*uYR$Gf^*2u2#uS`VhmyIDR{vnHdxc(BWsZ5}U=JriSmTAPV^ zzv5~gqD}qOV*Qf3-qMjWTmAI6-kHH%F~d`F$Pb!^$D<#ybriED+Dqm8pPztxL(Mb% zl4}D%uLV;*&pQ~wPD7g3erFEL-FkK&aZFy<0W}aog?+a}sS^Vza`7zMn3}_5 zW@(-GB`2fxwwg_&hch14$^yXQAyygB#eZJrG*shamts)$0o`Npt%iar5-|COjlx9) zQoIW1e5M~8t7U>|Ka;Vl?XfDH7_l_L$wu_6-^myVC?~N!nWF04dG{8s` zhN$$s=V#tgH^I?zZD`_iRK|&}4wWqzzUsx9V}@ve88ljde@|Jj3gn0wskNHC5x@LS z0|D%(@fw;@Wk!I1z1Mb9BRaGFWTkKK9Cz2QcR5f~G^ktOm1l!~K?laxwHeM2?#o(q z9jwKDjg2tZB^$cGK-qbsO(ZzMwtZq6k{Jth^trD@r``;WyQ?WmV<^V+yeB>z1t2H5)C@x|< zs@cB$U}eQDELe4sVoc}QjspZ4b3N3ZaoD{}WfCJl5KjKBa?q{}!9 z7TrD*ckF^+3_xJ%r4Pz&n(qL1npFPV14bA30PwI_xd-OcXFsj{^ntbHIBHSQ{nOi@u_f{ z4-~gn%_T&Dvd^S*1}F|uMGQbdap~i~b#n)4E=+beP_Z@G`Jl6c+n{PGyzRkofx;1# z%Y<)*fNJr{&KWsk!EvB^E8tX0NZY^Mcrikveq*t^HDO!8CUXRU&fDMJCelF(d-!P$ zt@tfQ{LkY`lFvMh_vq7Ays99!!RMh}I8hZs=9ceDqr-iZbN(g(U!aK|oAiP5tesGJV)a~Eo^rngJZ@sBeiP%Zd&?qtx z}8?e`@^dbXuCVmwivLr-LXE#wDF7-ISf3eG^(N z>vvetuOAn}rgwLiruSf+l$G5O;Xk#a%_lL$rUh#=@$2k2EVj$|#iE^y;t8ANn*E6Z zpK{ln1L4wl6xKbni*%fwE;ZdWD{nTA+)DEStxWRuQfR+fThC|SB*)Hk?OgWZ;{Oa3 z6-n6^(^DGXOb}C*MK^xj+nXg|hZ$njJMA_xHU^%)U8zaSr`+AjF-j z|8TzllpNPaKd0-VM{@rk*^KS_ob1JR1Srof?np=smijmEgSc(294)IYt|tB$?q=*& literal 0 HcmV?d00001 From 3cc8b5970b55f327b14517d0ce85f93a75d551a1 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Fri, 8 Mar 2019 13:50:46 -0800 Subject: [PATCH 06/22] edits --- .../create-wip-policy-using-intune-azure.md | 8 +------- 1 file changed, 1 insertion(+), 7 deletions(-) diff --git a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md index b8de6355c5..f96bcfa932 100644 --- a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md +++ b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md @@ -327,8 +327,6 @@ For more info about AppLocker, see the [AppLocker](https://technet.microsoft.com ### Exempt apps from a WIP policy If your app is incompatible with WIP, but still needs to be used with enterprise data, you can exempt the app from the WIP restrictions. This means that your apps won't include auto-encryption or tagging and won't honor your network restrictions. It also means that your exempted apps might leak. -**To exempt a Store app, a Desktop app, or an AppLocker policy file from the Protected apps list** - 1. In **Client apps - App protection policies**, click **Exempt apps**. ![Exempt apps](images/exempt-apps.png) @@ -357,11 +355,7 @@ We recommend that you start with **Silent** or **Allow Overrides** while verifyi >[!NOTE] >For info about how to collect your audit log files, see [How to collect Windows Information Protection (WIP) audit event logs](collect-wip-audit-event-logs.md). -**To add your protection mode** - -1. From the **App protection policy** blade, click the name of your policy, and then click **Required settings** from the menu that appears. - - The **Required settings** blade appears. +1. From the **App protection policy** blade, click the name of your policy, and then click **Required settings**. ![Microsoft Intune, Required settings blade showing Windows Information Protection mode](images/wip-azure-required-settings-protection-mode.png) From 7b6884717909c9dfffa31f59f2aaeb03a695858f Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Fri, 8 Mar 2019 21:54:09 +0000 Subject: [PATCH 07/22] Merged PR 14725: fix typo reported by customer --- .../provisioning-packages/provisioning-apply-package.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/configuration/provisioning-packages/provisioning-apply-package.md b/windows/configuration/provisioning-packages/provisioning-apply-package.md index 5fa39fd636..7b9f542042 100644 --- a/windows/configuration/provisioning-packages/provisioning-apply-package.md +++ b/windows/configuration/provisioning-packages/provisioning-apply-package.md @@ -55,7 +55,7 @@ Provisioning packages can be applied to a device during the first-run experience ### After setup, from a USB drive, network folder, or SharePoint site -Insert the USB drive to a desktop computer, navigate to **Settings** > **Accounts** > **Access work or school** > **Add or remove a provisioning package** > **Add a package**, and select the package to install. For a provisioning package stored on a network forlder or on a SharePoint site, navigate to the provisioning package and double-click it to begin installation. +Insert the USB drive to a desktop computer, navigate to **Settings** > **Accounts** > **Access work or school** > **Add or remove a provisioning package** > **Add a package**, and select the package to install. For a provisioning package stored on a network folder or on a SharePoint site, navigate to the provisioning package and double-click it to begin installation. ![add a package option](../images/package.png) From 181ca0dc908504f7a2f57fd2627753d8f3bb4672 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Fri, 8 Mar 2019 14:56:23 -0800 Subject: [PATCH 08/22] added image --- .../create-wip-policy-using-intune-azure.md | 75 ++++++++++++------ .../images/add-protected-domains.png | Bin 0 -> 111074 bytes 2 files changed, 52 insertions(+), 23 deletions(-) create mode 100644 windows/security/information-protection/windows-information-protection/images/add-protected-domains.png diff --git a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md index f96bcfa932..cd22e4ef73 100644 --- a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md +++ b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md @@ -352,9 +352,6 @@ After you've added the apps you want to protect with WIP, you'll need to apply a We recommend that you start with **Silent** or **Allow Overrides** while verifying with a small group that you have the right apps on your protected apps list. After you're done, you can change to your final enforcement policy, **Block**. ->[!NOTE] ->For info about how to collect your audit log files, see [How to collect Windows Information Protection (WIP) audit event logs](collect-wip-audit-event-logs.md). - 1. From the **App protection policy** blade, click the name of your policy, and then click **Required settings**. ![Microsoft Intune, Required settings blade showing Windows Information Protection mode](images/wip-azure-required-settings-protection-mode.png) @@ -375,11 +372,15 @@ Starting with Windows 10, version 1703, Intune automatically determines your cor **To change your corporate identity** -1. From the **App policy** blade, click the name of your policy, and then click **Required settings**. +1. From the **App policy** blade, click the name of your policy, and then click **Required settings**. -2. If the auto-defined identity isn’t correct, you can change the info in the **Corporate identity** field. If you need to add domains, for example your email domains, you can do it in the **Advanced settings** area. +2. If the auto-defined identity isn’t correct, you can change the info in the **Corporate identity** field. - ![Microsoft Intune, Set your corporate identity for your organization](images/wip-azure-required-settings-corp-identity.png) + ![Microsoft Intune, Set your corporate identity for your organization](images/wip-azure-required-settings-corp-identity.png) + +3. To add domains, such your email domain names, click **Configure Advanced settings** > **Add network boundary** and select **Protected domains**. + + ![Add protected domains](images/add-protected-domains.png) ## Choose where apps can access enterprise data After you've added a protection mode to your apps, you'll need to decide where those apps can access enterprise data on your network. @@ -391,28 +392,56 @@ There are no default locations included with WIP, you must add each of your netw **To define where your protected apps can find and send enterprise data on you network** -1. From the **App policy** blade, click the name of your policy, and then click **Advanced settings**. +Click **App policy** > the name of your policy > **Advanced settings** > **Add network boundary**. -2. Click **Add network boundary** from the Network perimeter area. +![Microsoft Intune, Set where your apps can access enterprise data on your network](images/wip-azure-advanced-settings-network.png) - ![Microsoft Intune, Set where your apps can access enterprise data on your network](images/wip-azure-advanced-settings-network.png) +Select the type of network boundary to add from the **Boundary type** box. Type a name for your boundary into the **Name** box, add your values to the **Value** box, based on the following options, and then click **OK**. -3. Select the type of network boundary to add from the **Boundary type** box. +### Cloud resources + +Specify the cloud resources to be treated as corporate and protected by WIP. +For each cloud resource, you may also optionally specify a proxy server from your Internal proxy servers list to route traffic for this cloud resource. +Be aware that all traffic routed through your Internal proxy servers is considered enterprise. + +Separate multiple resources with the "|" delimiter. +If you don’t use proxy servers, you must also include the "," delimiter just before the "|". +For example: + +```code +URL <,proxy>|URL <,proxy> +``` + +Personal applications will be able to access a cloud resource that has a blank space or an invalid character, such as a trailing dot in the URL. + +To add a subdomain for a cloud resource, use a period (.) instead of an asterisk (*). For example, to add all subdomains within Office.com, use ".office.com" (without the quotation marks). + +In some cases, such as when an app connects directly to a cloud resource through an IP address, Windows can’t tell whether it’s attempting to connect to an enterprise cloud resource or to a personal site. +In this case, Windows blocks the connection by default. +To stop Windows from automatically blocking these connections, you can add the `/*AppCompat*/` string to the setting. +For example: + +```code +URL <,proxy>|URL <,proxy>/*AppCompat*/ +``` + +When using this string, we recommend that you also turn on [Azure Active Directory Conditional Access](https://docs.microsoft.com/azure/active-directory/active-directory-conditional-access), using the **Domain joined or marked as compliant** option, which blocks apps from accessing any enterprise cloud resources that are protected by conditional access. + +Value format with proxy: + +```code +contoso.sharepoint.com,contoso.internalproxy1.com|contoso.visualstudio.com,contoso.internalproxy2.com +``` + +Value format without proxy: + +```code +contoso.sharepoint.com|contoso.visualstudio.com +``` + +### Protected domains -4. Type a name for your boundary into the **Name** box, add your values to the **Value** box, based on the following options, and then click **OK**. - - - - - - - - - - - - diff --git a/windows/security/information-protection/windows-information-protection/images/add-protected-domains.png b/windows/security/information-protection/windows-information-protection/images/add-protected-domains.png new file mode 100644 index 0000000000000000000000000000000000000000..848ff120a27fbfdf37680c6c4fe3e6df09662832 GIT binary patch literal 111074 zcmYIv1ymeO)MbJP0t6e}-3EsM!QI{6-Q7ciySux?Ft{eTyK8V8+H6(2=*iW#Zgkr<6VGS`Q z@IyQ%DX~2i9KW2MDbt*t1p`W_w$<0x|J$VMzLAiUp7{fxyM5Z_Xp@PV7_S>TC&ps@ z*?6xfHr7JOz9GOs1qzaULm)=Ndk+o`bs_pc$&cKNjor!I+~mdh`1q{c|BC$Yk{w*1 zKYy<3h>3~WfBC<+!a!|xUf$lC?Ya5-{y3oie^s7GmzGk~*Cr+=a=)j-$${rha6+!T z@YyL75iG%CHrvqrh{ExLw8aeKGBtsyj}kx4HkKKnv}udov?B${zNrAl1+?D-IF!o; zEsfX*?(tFrkQs~YL>pEN(IQ~cBc^fu7yq_YBq?eWn)ol;V5>`B0I^BUiex*izQ7wOz=JMK$h6p@Ma~-cHqZr7@*Rt z=aODmUZjyIjKA2i9LnWdb$sbVY@I4v=;Tg)ReOLJjKo4;F=Y3xDM3RB3gD=zseydW zOi3Ad+{Du+!w6%Dvs{~FP^_>Nsd?NvMjm_P$(CmTM2gZJ*HUo=W@rDL(W<}c7XO1s zg&l?y$+Oz=YFXb_XL7!+yuZVc-XPgiBx)|dUg2JG%-IeaE8se~0DNi?9Z9L=cysz& zP>dM31S9r_X8jqA6D^J-N|l&j)U87(1|`w@6J0qenB|a`j@)LONTr*!i3zntmxUL_ zj>L!|AQey2RG6~Yba(mAg)|Ou9XRoFl_}7pnGuEDf8>rD9` zB@#->O0pXy&cN9JWEH>_yllI0a!Z#yV*1qn$_}w5$441QoHlN zO?zS&tGffeXmz+wx|-y?cpZxW+ytD;%(CLTI{~V5@`IpSlUR=#p+FaZ77itXv#3(z zO^AC2eVI1w-ObP>lkPYR)}kPr4);Ntb+4?s4#zOvyuD+@Lgxlc8kM zrC=4^Pmw1Eb>~K*nX82+XmV*5`3K(hiwIcbQD%WwpTd+pb4=0OcId?LxZCS`e`hfE z`R+8b5#s{e|94a4_}Kz^^znXMYa6RhByCQU+0Ezz<(k{2=At-ywk7j$zdd5oAM79= zO+^~He0I!mD`kqJWkgoYeOZ{9vbs3Gir;B15jMu3brP0)78I>PV|v6`M>{{NK|77e zX!kNc@{H8O15bl1ea;7x&SBLio7Q3doNE~o^=Lut zvVSw+P<~qPE`KKbSxwPP(#r9VizKZc4E8u%)9Utr{RN98to-rnv64X5BJ;(Z99NbN z;pIpRl$)nvMmEbl_f>y^NliaI@~Z|587#!5eV1q~O&>(UATrQPNfbYGb?0?L&=t?YKEe-TAi zNY}gB(y`}un*Kd-h!*pe$?)IZnhQZ*%kT`}PPoMjADV^JnlXmx>*Jr+Hox9>i7?|! zg8ib0n2|DHZMY)EXbg!;vA!qy__Q=Dn@F1mZJ?z6H8`nH%l;KuTm!-?%YmA2#1;Hnpwd=%h|MTZ7V z?S^8$cI9O8O#{w|jC2?=m%3y}yCniF5>nX*zZ%guWu$Tq)jF>Ky<4pH0Q^}p35{+< z$X9(ZHgFB45IaPT*#g1kM-SniHppY^qTdjQKxt63$aRu#II0wtmNMxy+1?yZTe9Av zzXWeW|3+dj$xZ2hV813%mbI=sD>pQ_sh73p@1lPT9D93quq)<4D%CU6j7;BZ`{LM4 z4P_*D@_nlm7D(0hNvH+(3UaL@qcpE^1Vb=_5@%5o(%7|abu6h)60WJnA~E-vLVO;M#m^Uah(N0uyHmI@s=&BAFP9<(posYr@F3hOFNmzZLQ62oEx zgPuR&%QTQxfFVt3T&^1Rh2_V9tH6M5yre0_Bxy4+LakPReR0v_WT86km2#oSKNg2A zpEO1)psY2UR9#xkIh}@ctzoYTI6{Li+2?XO4w z2JXm&vLfL!rjel^5gef9-DPb4EZq?YF;mP(sFZ zg|k}11>>l!mO8i_^b^bHWa0x-j%`Wn5DkhwEnXn>W|R zN1mzD@PsjHR-4y5r(b-Z?G+U#iKj8`S(8N7BVt-Z8egcxZB6_DF;1{p zbhRH5-$~_!IF2wZ*9e}>(^|(HjbCCCk)~x$s#U{{|HMW3wev-R zXn%dBAQUw+sW@bPFFbHH&$^CS@v)3j-}xJOM_MZd&4)rm3-8 zOz`R6ccf?#HNf0dS(pujz|KEKUMuL3HC~u*Le^~Xi~VQ(R?V>~rAvriF+du#tWG&8 zbHrQ4#fm!w=6HNwkE{u6>Tj(qDQKU)P?0WG@@q>ha}jR7ZqKeJ(e_y+m&7isloNC9 zqtGug`fn>V6e!Z+OQK@duqCqYSF-cq*>YJj&Xe>~9L8ZxJ5yF!vgGJ6LWk-73-$=K zw+UT>@eB@?%J~m$(Mxb;0j58u1;>j4iO7$21IDY^l63nA;+K~)5{1v!QDdfU_E?jX z(8&^L8Tr|F-@pgU#?(4#G5g9grVX5w%a+682(9lVWGd8gBgKb!ChoG57q9;=Y?Gx^ zG6^0Jr4DyONo(tGSLVJ-lcmxh%^fhgLKUxx$32tvmnll(+SxAsj*Bz=%7~vVOvO?v zTF$Y&rJzrd-p46@(#M)N z;YsgvEo5wyow-1qOOV9Z zPw;O&>gGT!u|hXA6e!H=mV~Q!yvzC1+$U$|jqg>AQ!~pNg}I&l_K$?U!PF}zOs+yg zbmvub=$(lM5wh(urUVhCY`NwP{F&|abDD)w)uFNhmJ(M{;1D*C*&Hj(Mrmm=2zYWc zunmhrlbMus>+W>*W9-@&34o@P47dzxHI$RCPE0|LLv&5iJ5UCBwm+?M+?5Uh{oDq{ z=Z8{PT3FpzIA)7&aHsFwDRcVvbxMb2nKe6XvkMY=s>V9v4L4kP_`q>;j5^+{e~VyK z=PY`V-8V*9Ia6pOjR8N{*1M8@7$!7ZtL)~6i=^)5@}WcvU%?lw)9KHwq?JZm7GSWE}|x6m^g=? z%h7Ajuy|XD?)7@pO}98ZT)CCk`>~V*N&SvzAa+a*2ljh(KkOpB!Yq+C4N+`4Rq52y zSHCeWl{a3!WTa(Z zj+7J^FUk+Z2o&*Mv+hh_SQRS&Qj0V`fIHCt%4RE&nNy+&7*~#M%k#@HR-!F3gDPev z<H+`kNM(>thF3qF-bVx_y4@+M)=>Zr`|psTc0YA*ozg$6rmh{#b3bHD@5 zEHRtrI~dy42V*@=Tb{-g>+(8&GKLW9$nDa^8!lsq(X3qA3`XvfJ?XAcpoUuUKlv&3 z3tEfruw%&G5OP$# z-si2ql+)R@={aI%gx&T)je!MHmFM+e8mYYugSnPmS;JSAmO8Se>?#eKRI=^a8cXU7$9NU z5KrpVUcsGr*qv)tm#q=LNBAFMPS z;uQ1aS8aL%6G0lPlhgr@9A<|#H<3&nDh}3z3t(O+X8YqW>qlWXb&g_<5z17YZeu-J zdebYVXvg??O81COHO{g)P~0YMEtL89e!b(R-WJ4OxEkjDRZHP$`;i*;L`%{qX1jOX z7Gbh%7ON`drE{z3=t|g?wDBlWs_4!2@|mUCnW@BUYONiHi@v19_);>j?|g9*Y_p9RJ8rmOvo zFDDA3;{43;m;p`pCFR=fP!-SFd?S=@Il8O2?uiK}$FbJFK4J&)-Hy;dEEX0P3 zHot9gqVt3@b4rJc4cbnH=_KM7I2dKU@syYEm`EqovK2%YzrP&cIH+%VPN>!Hb)Msr z-j6?zP$##^R&&zQI#|2e+Hk8cIqxmUhu+*C6Y#xJ4=bL=&*zyt_EjdSj&F6jc9K$V zCHU2)#9kV*QVRP0);~w?d5R4*N6M_$NcFss{NyEG$GN$JtiAtu|a}-aA-rX zOThE`q1vVP7cp^10?u4jLMqkq(1m{FmD?eNn&V*H_G4vHX}r>41(~(EYj5@t6jTu| z)~$P#bS~6#LN@Q?Oiu+dXS?T>@s`dwtnv_K6FAxzC^%5>46k}ilQy{}+#c@**hSdP zq^pWO|FL1?`_08hbRB8dMn|5NtoqVOp)Kl}0tSDCYxhliS$!Q7sBEL2e z>vw!)C7{6vryzz4@pfQMk z87X~Ytz}d_a#eNbYO6PcD((afX%aK&@v^w} zUnlpgzgiU%*tNNod)nMRrCmO`M#;3HEF zQ-`AU9M%4M0i^g)aWl{5Xw44N~+ z)G7p$B5~*@12yrAURRVJtxDI>jK!2_Tw z`gLO+F$HJBEZB>c(qIb5M~;@{LZ7|uX8CcPlw|PxlV#T&qOlIYLs|qk!;183abP)* z8@>TlX#41bhkWVXpie#bu-}ouFW#6gf-~yDXNPiXe;nfll@&W3=k}MZ^S;BM z2b->K(+(XYh#gO`l#Syv${_*vc#XFp*!dH(+RbKxK+7bRO?8+ix z`!e?PgMe4;$zSCeyxPYTt#fR^7>yFREW)F5W6`uHQx`bdh&(e1~b8^_*9r+$kEiK5S7v5&U+x8wh_pfth zwKzUIGlk0NOa@!%>2-fESecljFP+HQRN^q+j&K~=SP&{UoFoDbO4(wvetF&tiw+14 zmqE$#V^J5dI8r$tE;!O4q|$Hmv|l~eqEyAZGmYr$dalCflF#w*IO~P;V+_aEMa+pq%Fa)HFTBs;!)VN|=I6%##-z6w}i? zaCOz2>#b?c{=}wGwV+#Am*8hD`ehV;L{thOEkR$r4Mp~uvZRwDfi6aPMAi!d_UoG* zJ0X82@RW$^5YS9Be)9vblF&eqXlg+rm%r0_Z^UEM5B{9EGU5|B9H=WvIy5bQe3*K` zHcQ8?rt&3vDi!L^wMLU7%+uIXd6N(}(^Od?c}RFVX2KZjN_s)`J8e6!B+XdHo%?$5 z(`eNC8{A0BYtN5;YVw0rDb-2wFv}7etwiDa3(GrIlbY~_!zFSzJo4VRR z@0NjDK)U@=e~vr``r7=$dKzh)f`+x&gC+0$6{tIyx?87sG0FC4!^Wbrmzfke?NPPp9Y0}x(0#D-;q^~iD%Ug@SP;0 z7F7PtSm=D#LspP-vyatO4{Ce0-u!u%|LD=>=d} zO*%8qf^B}yLB^y~8D1tA-;6(FQ*sd|d8DEuS-hHstD*m1nHdDjV$?z@dF9`qD^nY#&fgc|m9$s#;(*c{0`}+Fozw?KR$Rd$X9PrFL*B9^d zt*ihMCw@|HvyIl|r4uv+~qKb8iQvmvb);(i}Y&`xC31Kipi)Xd=@^)sb@ z9U!JEhK)fK@Cby(*VBX*33C6zDx%f6HG3?hGLM;^IiSmzN^=6BI?5&R*CGy<>izSE z1a0NUE^YH}}`r+pNPxy-ERc!CUQv9CLpIMR zm?^-%UY@HPIvY7s?}NQsX|yR6kA8YBGyEGZiaR4;D(1c55c+xDVXv>QT7ia+{K0r{ zt8qD}NR`8yZp~5}gVE!LQ4Nn<(bX{6Awnx)%bpR%jvaR$k5iOMnUf!j5YhPSpnzvx zRVf(fKGxcC?QbS-l9IzzIhYNtutm-)wazEh;$&6+So3Xf9(-Ve=gDJcHaHULUfs7* zpCoe$z#6AEk%NkCbv0A436yS^czyEK@ZGEb3`=|Wuc`5vX3^5oZfYqsn#}GdI)TO7 zS!HMJw*47In&i>@`R$oW+Z6o`BG7*pxXf=9#Lo{K=?xOvYfBnY8|?JmUM&>=Y(r4% z3_H54HP-Nl-`qe3lML7@Za*k5WZtga-#Lw;`iA(K)*Vfg`>g7#%`%Y~Xz=0-OwZz% zeHeFtBkUWGPs1>p8$Wc-f`9B$zV1C{7j=<+P6~<+_eMvm9@)o@w=Br&OM==CF%S45 z{Dt{eD`1AnFhEFrnu>ReYrW$p6H$i~+w2beNd1p7=mOSJP^ioI@#B;k&ZlMtjWiM*N+Uz3{#9XYr6a)%QD08QK&i@kp4pZI~poVftRX z?@Po$s|hnn#8u^*`ObtUOy2V>eOrT)+`@k^cI4>7LP32vP-|jC(XZwBIzTfc7<5`7 zXe1f@h5ka3c%h2@xdG=L<4Yexv1L`c@|}hZq`lj@4vMVLaDwxq4R=8Fn{%9IV&;!M z4FG`C9ykU;^=26!Uxc&4)q#U=;E)A5?F_s;UUS*6r6r=haL`{MVilnC|FUa#`D)4W ze3&^?*Y@q!{M{^>#+n9=%YN5*Lvg92nAs)oA&ZA~Zty9RUKda=@J+OM3h|4L>04l? zJloX)%sqeLSPa?ysthLF!jK{lt?i!GaX4wi&uC-z!ePG zu4t*py$rl`kajLwg>F$X^lq_lk-T#hvduj0>^wEzs%2r_37gTq2KnUC03lZaPgMAb zIab}zk&&n>9!Ix_L!OAJfa%&yA7Rn4JKlt4ewYlB11*AaO`x%s9)$$SVaE`&856#ocTbT(g_NQs1fOzzCNGfd8o6N%mct>E zkX|FSm5}N$EQMhKXZvg7-YfSaEV~SK2W|v>@SY!@R%-byOBhuyM>z{0*smV~LX?Uypy9gfzrpSpR?X%2mPkIZ3v zViYRFBKEH!TpQ-Jues8oi#`>IY%tkCLUAe5?mfe~QC71$FDQ^}7h~*>r-im|IE%|+ zqj}R`r`}X*jl>pM`@21NB+cu0n+J*h)Lyz}iM9*SPoZLHUHlt*j8E2SJ-k9xJVcJJ zN?Gq_G$n|_BQt|Pf%=)OWMIkSl(vV#(Q(}DG?0k34g>c}0#p_5R(pf`5BtkkZ=}L+ z9`-xt8=6ZUjm%*1P#ll5Q^%z}AX6aGC`vwm$q!wJ>kd0W^~+|Kide~#X*6$2A%>Dj z2-dV6&~`~Xs#U3P(|8(OOJ^+cHA3`vGHVlW75FRfi~nnN!B0Pk?5sJ%@mw`F!*Ja*%lXBmf7eWslbGh*Rb(?m^syZ$@Fm4#BJxTFIy(&(gzVzb>@j>4>w%J~nq^%zc7 zcPJ)85gBPy=0w+>OzufE;Lc*;E8BeF$V{eHxo`}AoiQJ8r`Hqf;#szzZ@>J`!DiKZ zT?6q-yw|}9JtvZMrsKJmxSB)!@{^7nz{OrYoFkO8kNvcTg`n_jVJf`_3BZyJqgv^! z$9Wsp@s$((VxJof8cnxkvhI?Yd=px+*#+DaR@1gt^1?FRHP_kM#Ac{K>G#B zU%WVHzHO(J>g&pA#+88y@%d;pj9c5;DO{?=Tk6buvQ759>;5zR&NY8`3GBPBI=qAr zS|Zv|zE1wvIYL5ObX0~PL8KQPzj!rBaCX6dH|?7J^kBXG8pX_38j!+7Uw9+i1UL?h zF54%-ES}Yx;~8iV5jn!QdTllz6G&;==1j4wWcEew>tkJRw9(+@<;Cm`eM8|is0N&T zE2gQGSQFRYjqg&43b9h^H)4 zItUar8QK&)WWyb|VYC|Lxl#W;a|?B!K;GOgrnxz35Za4sPnUqK1u*fk@%BYK?BI&~G?h zR(^KWU1=mdE~n9Z3h+Tn5o{@|`MK=6pAK|<%>syNn;DM*FI!A$2~^Krd407TOg)R8 zH7vx1cl-6e-Uw+`_O98o=CMBmpL;O(7&HTxjsiSmC9St*blr$Pt?7v0*~LJum~t|0 zCU

`tH1jWV;d4Vvx_L#So0^`v0(-oA^pM#3@*_?!@kQc639HXyu=w=iQ1|D8u5p zq)?el81v<+A60g?6h5OFlhuK)OlLdaC;o;c*!X6D7JF7hZ;0SKIe9Ut5Vb$7@0Xtj zx<;9^IR{Utg!x=jQ0r9(BE(cjD?CDsS(^OOH40d(>F%9Y!POi_Tp6Ap` zX!X>1slw1M3|BVs97-DHW3($R0`h0`pNb9?+Jbq=T#l!2%&0kvJ29!$3F|5M0}GJh zdec};{yofQBJkxgn6uS|6;Iwg6kD+FXG^Ac@*?Y)xHD@G)_KTTEV6y!b2nr7k-~YB zqg}=hFB!CoV!_By=*J9)msPMuwYe)`1-rIsKK zGw48F#h?53y6-CV(=JYSswG43B7Bz^)pSAt?OOJ5t@Y=(Yv|{n3&K`6X~Yb$T~10H zvS*E4Hh;I5lAmTa zq_Zn8t$Y;FTo!=p{ep4n+&U(=<;yChT80G=F~zrH2m!Gr7QZySEQ350ZzY;DXK=9HpV{Q0r~(E z8n?qY2E)T3u6Bv~y%R&{9%De-D$(fB6b z#Fi};4wGgwDYe?oq#@E0VwoHaR?BRDFJqK4B@SP_zIu(QM~(h9p4vUE2IHGdmo?&5 z*LY`g>+m+?wVO^u45*0Bxj60nBgz%3Z~`D$W{KUV$7j^x^5W8m02-Pr_7l+W$fvX|1@9)Sl8zH3(hQyRi*71Q4Uy0iw`F)l-mnHkDXUN9WAzZP_z6Ny+ zqfVRaz{TI|?REO3Ye%c8Mz`&RH|SDE{RYpier&y`)O^+XP`=eUw~Yd|$P!406Bo3e zF{h=A>lzO8Q9Ub|z~)7j2?CjGy-sD&>G*fY=I)!e)(N$<$e`0?{Tjsq(UGG8i&wL0 z8VCq0T@AQ3T$e!3TB^|KE=%bFfr1axf1>{I@1=crDsXf6)QM9zqQ1ONX}ol<1>g|I)IaP3r}2g$X=h4vY0KD z8V7?TNrb=sQVml$xkv@gN-|5U^xM7lq3T2oACl2I$?yTGOTx7OXI5!BT0P1~$a3js zS)?wdP^*2@g0r6)5#pUyUS{Ulst6>*pk_J^lTK;4=gJsy3kexZb*4tcEI9V}(qDb$ zJ_Y@6=_86?u zvnwh~SoI=uqHr=JJqbskL%$Xgxz8x~7wyYZW&4e$)v5BgwkHfv` zStNBik+!DfBc(bK=qdr{@QKATX5@YuQxdMES`a_H(^|&F7x?`!+xt=MjFw`Vk@979 zSsGJ*rUhFo1{Sh54)7v<*5XK3jM9*=JehMJQP+W7l@H8;lfm$TEk9&Qv7LP@+PH0^ zWk0W~x!Ho|9UYSZSBb5(FiEPKm1#X$Hc}jllyp3IKn4-K#ZT#~a^Vm$p3JPo4Q*G4TyP41+WVQff6zA;^9|@=`_^SW}>W&t!|Y^e9zDg9K3`a$~EFFg}b?8u0m(oE#LD^9Gvk5Et=eGE!PcE;MeuAFDNUFX)!%vA#p zjQa?28fzlcbF)x8xD)JlDLb(qW!R+6C+VJ9#-!*nJ-tx84RrWqMY8x-IB6MdWzQj4 zlrGL-*!?iuf$B89?rlT?4G?_^lR$Z58elkx=*(CFUaI_x)8AXBMO?Ec%1#Q~EBzO` z8&zU7om6oDi&;)EraqaACkmnJP>l$(85(tXlpim_bLK4ebO{XKY3^o?2uJ#y_(E6S zg%!GuMQe5oL))qbkR#KDvcS2Ev#Z9nBL)#M?x|fG>1mjcP?Ue;iuG)%3K2p;>7S!4 z;gLDB0X5c1!Rc%c%{R<0`w2`)9K;g=gw5r{jSVJ z1k-2!UYcMt2uuiGBc##ZhMdK3ZqCyNJmLjA8+47C;UvmjRs<7Z_0zTO4p0wWsWC#f z_RrKx#Iozp?$C8&ediIeCv!LT7#yp#+C#omlJU#v)a^A8OK;^Qd&9y2nD#=$1#M4o z(`q$IW1-ZJlZS>mu^AIKL)MLygh3QtXtjnWrGUQ(#Wy~3u=PYn+z0mW zl+F2(u2=qMe?Deh1Pb*<=(_WfrZoN5h)!@sKM-XT%4Pdm$fAI|E zgh#MJN0)(2g ziGSTQ&Z6pcpKrD#hqlEeC7&N!mV1725c3s-pBgkOF`?0vvDwLb{vif2pl2U{YYG?i zG=LEfh~1TMX!XZwV-iyj9&sNM7|-|os)rHC41h;$>P5F5d^`V zImG$8P2I_(!w-ix@Kr1IhRHZf6jZ-Q^w~_?SLe*?<<4$etZ#}o+*%AKw3j8?1-TKGc<^8nc;4J;6gOaLzi)dr7^$#&|W?+?6TasMZn@g@2S zCt_=BYiLOF(dM_4xc>@4MfMvv2)ifzr=?l`vu4AZPEtF(CiAdDa+PtR_H#IU?EJq= z>09!9mqZ_|d*F~w&mvU%_LmO|{u(-Xy#3>eaAdU~$^Wg;35tb_|Nl*r_&sFvKT@5o z!b`N>MoxNeo+~razR{tyKHKPU)Yp2J%}nuG*GD;8#}nhT^9>i)y-g)2sMu-CEN&Nb zdwbw{Ky;x*Y!1I)#=S3kTGmY;_GC^mzUO;x9NJ9zC%FK&#i8eSA=%N$nT8IzA!^>& zH1C7M8Zc@@N30;p%iu>)mb9`m`ngy1zkmPcD>bfj6h!3ZC%_hy_4V~1wJ3qj<*>0+ zmzFd)-s!``!}ay`)hgBZUJZysQ3!vr9?e%`pTD!wsaJ)4S5i{yc%L=l%+zVNj}``l z!H;2yE%w!2fW_uMTA1afxvHrQ=Ujvl_Yw&s|8AMoj$n#E+!>!HB1 zDh=j?tE1z;jsQe=l!qiqimZFK4<*(|48bV`64b+FDC8qCb%gyE6^YGs#j+9e0iIn? zS8gwN20J!KKK|{u2MyL&k=;fwx9gGU5C(ZBe#hk$K8aWY-B+1hVHCLW%^x#9_zc|e z=1o>SmR`0K7M_#PJ`PE*{`(;uK0bhd!U*qp;!!wC1)|}fq2Vt4BYxHKJMSX!cXo6< zn2mZGtY$}27)OIU z{=yHPtiE>h;wkNiiY%f`zIVxFQpsiB6SkZ0|J;uue(+F$t;lM?P7>SNdqG2~c@fZT zue{PYpDt~resrmR7luQ|`_DHp5RKm(ZFT=A5c*`Xwz;u!ug0HDn908Nbl&T-$f3MJ zO{eGa4;LsooWJ+Mj~-?lwJQ7%KQ&{{%rKvtuXsYk1!lz6#h!1H!npjpb_#gQ@58pc z6|VQk+g*=l>dj(lG394FYnj8rto4O8%~+v8ZS{j(%R* zzUU8@EBW(Fueb{isy$4MPbG09c#`dlgg&u;=npUW8E^if;odEO0!v_#?}gvB(Q9JM zHGW2>bnm6LpaOa1JeINA3rUZaTvc%138%)zsx4PeR(`8a$UF?l54r(^88SeD0d${;zNW5#D0v;CA#qbXQh$)qZB}(RYplqV_ z2<^T_1PAD<-f(fEG#!vl2UZfFEHTU7oT158d7xF(EExMqQms5^|2k_v#x2%6mzm|? z5I`YNW!*dkhpkEp&Gzf8b7pX*7FsEd8p3D+Q%kI*65ZfaT%Ew?SEp;4-Ts-yyv&Ws zb9kB!iz~3%OFnP5KYX^{+P3;V*``d+HFrJ?i|HdcGMQeZt-byJWYOV6zab>wZ*=;!%4k;utaFeU^gF&AlYKk0S*)R?p!l`y3yY$-K5nwF$V+eU$E^yh*Np?SCKC`f;va+&1CIeWm zp3xLWq;yL;QH2l0!+TjUdn6u9G!ENSq?jn#pKky5^7x_7T%)ucACtY)C4t(?{_aGU zVpy!)>a-*7c};h*JB;BuEjaOfUMwDs_wk)774wDnMv}K4@a@Kb%PsMmv~7;W)IaVs zKOdyM{dolCB=rHybPM<8x?Uf3EA9ri$^7}F2krb`4&N@5f3MS2Y(>C-EfipV50&3h z&uK^V^?wff6hU|2ivn$exD0Of5zDx;ZE;?GlZjPkNZ0Veyry5VgcJ{=IuIDl&t(^! zFz!Weu^42{<`iIJRW1-TSRTC1Cm#D0%2C#yIMF(Z72q-1hpI1EF(ovbn zV`Nw}lPcTXqIG>`=1QhhL&Sh75#~ReThf)HjpLVp&jubBD$OI-xv@c z>D)+XKZ|fTbK#9}w!GS@$DnSCwN!;7dfu>cBK4G$iJ2}@!yE&c^u2KWrlQ7$>Fh>3HHEWYK@G!hD;IF|7uVS=(rS|)O6?khS=%DXXMhkt|_hrgylibsek`> zM{M2xheV~u(vj3y3Yvm;({JRC{2731eHLDA*B`SugG-h3N~$`%0gf?fX|r?B^;&dZ zvPFRD=?;vGi~E2u!v6jJ{g*=Bp_xAUe|ma*AM@^mpIP?GlnVcaT>XCjnEuu%Cstcs z4zTFeZ_YP~?GZ@&1}V>UAyfGxsZ0hafk+;!O?IuSUb>y$SX-Q&oI3;2zkxS5eJ_1) zv;?X|+bthG*kU3pP_WM(YKxnj8y=M?NVKWBS>Qu^`GF4hC$b|QYrf0NitP0GJzN;I z^!D@=6c%P@XY>8|0btVa_%Ksevk{V)Ww1rqY^efq%j@fFJ{T>xa`?lGN;1AxrU@d` z>E7&ZEcn1)Dy8z-Y!)%q)r@^WceIv1tIIDKR8?AFxNNBVdb81QDATC-A8yPlT;>nZ zS0=D%hJYQ}uh-_v?Ru#Ac(u3H>9_^eQ!1AU$A$NcaPEFH0F`U(7ZzZAP&raPC?v$$ z$xyRTBHWRehlkT@#&jf!_UPz{pP%3Bb}$A(18vAlfSMWe{0Z9aWMNP5yyyC05}(UH z%Dmv@F;4*c)NIS|Jczrcn$K+Z4)gq#4|~8%G0EoK?Y@eCyn_FccH}wJJ)6hlc&6CQ zP6AUa_S889RMhS5Z2B5y^tu8oO=A`*<)pcdyWZoDUh#mc#KSr8+URFTTcNt+uE*wSUA>>rG3E*|u3;&?ZuZIn~;yqKum7a2uWA+HXp!`WlQSxc6IZczL z^D4jlfPCcSnvan7J!Q>2(u*0Y$L&F1-I@(Il*PT`>*}ceiQq!EJuHn@^Sq;V?r9}u z-tnZ-K~9zwEek!AwNdp~rs7Z4Ax51dblxWOJEM zbDWt=F{NxUL_)U(Yqs_C9y8a%(Neq2V9dIA^GGNT(QmTZbN`cA2;c&gRy7<B~uk+=8B3Y`2FG=j&FT z9&T7YS5Y$#k6n2rGVC}%BxxGWw%@}sP*H5EWqtnQ5Gsi`Nn2Q6;3gXPM-BWq)xy1@ zJf_baj-(uZ*7q}P5gwbKTCSo8pXa3Bu6XE!s3)xn zeSrL%)PInxf;5LQw6r{$P1Bex?(Tt#61C)mueFmhxVTo{x+(%j`VqHEQLi=7Z4!ok;ZW<( zr@)SmMEe(rQKUxyG?(wqU-2PB1Ok9@;6CX@{%pyDo8h|}psGjlnO3y`?QNf#S~gDw~ow$Z6T4wf@@RRBO^+EvmO4gJBPZNm2;%6SX|R0vccTg{AVCd z(6vmvO~`gjj>bu72lY2fim$8M>x)y+rdEun%ThTLVUBKYoXn-`#fdJ;w};OO39qiM z7Di2vjAU6^S#P@L{7Zf0sPy&K!@YV!B*}lms2tE@X_#ZQ)F^Yf<>f*-S{4OjCU%~DFTomJyurGhkV(NhjzIIH=4px zJIYd%I4iaBP)lm3^4MmM)M>nDT&%Q7v9qV&z2kr2nMrawL4^u@nDKes+Ok(SNl7c) zq{kqz;r=7WJ4a`diKMZ;6w_SCzf+#3kSn1EmGRw)_8DKA5i2xzA{*_=D6>s$dXFOm z+g4{f94Fa>SEac>2iyArrbGC3?H|zU7wRmvmz?*>!~=AeBa=zSNpQ}r`)9b%eSVxV zE*F?r`XrKs#+PW!`8K*7OxVjw$uz_c49PrR_8v5rT=;2w>QY?nEfrQhw$wCz{j%IV zbs`^{cH6Bwd=x=Z#vjg~?(#eqa0=CQqZ1?j=u)h|e!qWXz<`^;0h_OGA#TFnnLT#< znt?o+@O03=(T&>x8kcJ$@R+}j=9t{@IL8mi`Pfa~6JIoVX+cp8w#nfOP5{i>*~3TO z^Z9wj`a^^AEZQoST@-Ox6g(lln-L($Bkz7e;9DLPs>w6{5u0xEBe7+=tND5eFC^3R zlWRy%ptNb`1p@Q=(i|R9yy$6L9J>A2K@YqWo4<~>;v5uc1%NZq+sDT-5&4;zP%K_;KJHD@!+#vUm(rOB zbc5Z|0`GA*gXdez@Fv%5CZTRU*8Fb3iRdAJ<8?eD%wZ4vT|-k2u+fvfVZRXUue3Uk zM@${xcHUP8eE6ZtARp;XPAueB?|OYiDI5PAUTe!UM<$MLW?L?q>u_f@Te&dy{>{NQ zH8(eoD+|r~^m_$`9--A#JIF@V`|8a<3EPKL6}?_KLl4CkE|$*n4cCj)or+clN}HCj zf0r7sM}Bm|eN;GjTK@%AzHo9TV>Pp z370*D>P4wZC$*OQ!`W#rqj;~yxN=B}d$*kD1A+V#iuMR=i^@#0mwT`W$rG-ZDuz|)Lw)p; zt7EW|$Emr)V!Mg? zt=C~TmD{qBYaIIv-US{Dc)GdY=9p}!t6;DS``=DlsE={G7(Sa!Ynj>|3@}Mck`<*s z-3+V-ok;EXgo(Gdne`mA?$S0<=?^INhr(Taal6?YAL+&UOX69m#)bC~9^x{SH?&Z7 zo#rRpT4R0X$UeNG)VjGBZ}aC1uhUhfW+chNQkBzLlCjLwma80+B8s`X=Z%eoYM7Cd zvo>#BOm^eRo3TgjqcL^q%bxz4QiXcQ zhh}g`0%1-jIk=fC*NFGw{ZnBKK8@UV?|FI6FXn6&)1cF}1iy77ghY>4h)!Lqo!4r+ zov~?Xg``&d@hy^A$OG!y5Td;rj9=W)a0b9x|-p4)t;!gP}E zh_JgqhWZ`(hg_LB77BgddhkyGk#4cv8gB3Hx>TY{Hw~ZzxOjlqeLDNY3`+b+kXD)} zYF9yex^{!jW}e(nNLqw`kAoT31M&=cKz#}b2w-4hDyH(;Ki=6(Sd8Z(3w_`|DsTjD zcqKeznIlgB1}lT*3NqUd z-k@x5{7FDnE`Jw_ZF~U8zDN>b6#l_9K>|*Y`^S`P7v#~d)Pvz7tB{nDK@9sgbiiz~ z+$!keyxQS!Oe*vNEy>qKOmUsAd4?>5K|Oe0->P{u>U|7V`+@Om(|cZR`!hZ;;4Rl# zl1Tm`Amp>#Nqs6of_(s9wq>W|w^uRn3)Lo=$Ilcc7#_?>r_fdYw%so${~5$ym4x+;qzB$#c{{77u1X3Ic^e0LvvsiY1N^4P z<&}mfjEPfoohE|A04CptC7;Xc31r_dcldk5ElYvVQ!=y}xomjyvggwWE?aLj$GcX< zTV$$?%5!9X4o)>KcGxa_*y&TTmDMm>kDmNki5)h(JQsL5$Blb3qO+ikUMFjIg@dp~ zZ}_A3lJzOd;eoHqgoWPE-Y9KfJ)~5C(!P92e>f~HO|`#vx(fGCE}40vn0MhPwbu2t zljX+~Am}_4uWl`&3b-Q6AMEZT{Or5;gu$Qg>4D`#wd#E*0(e`}id1pb~^)(G5Pls4Kvb0qixn!)IT&7r-A$oMs)FqsD+>Xeei>Xjt>;4Nf8za^SQQH|}`kgZGR5%kTJf z=@n2lPda?riaUlG!#3MSNfA{6GOR5K2~XW zXLYya;nA1pPws4~*`t8~7_)qYsJ>EE*q)wQ-CUZP>kI^kE2t9C29LGR&;MMm!>`hQ zM=ibhx{=;Q-$B{Vr>8~7E7}t_KR8rIbzi<({b+C3kh&`VO0UqdT@+?2S8L}I{b>br zmECuC$bikzph8&D-f4^#)SR+S8qc<@G z&*ZZkyZgnzu(K3`+%%7~9pF!qDwBO?cXJLO6^3=6^Q z`?Bm+MQ6oS$%*AEW+brivVF`yJAJf2(bNs&eSg~jQzJ$x%j)dH`r$HywQzhbW~@e1 zvdHGl&Nliaj?;*$J9i~sf-CJHJWDn_{QdMwz{RBv*V|UPkz%(;t*%%yGV(c{{ljg& zp@FnhTpdY1B`+^8 z06krX-?s=HJaP*O|es9g206yCq@@9#f7Jw*@g{`~nffEhF>xxX_% z76bXIUaHi@#3b<{b2t;8Obz`^QfTHCP};<-=VmKWaiY|Kuw+2*c!ryV@pS@1nb^8s z-~-yPfuW&y7$DN&c8f77Vz?4u;c>d=U-ia`R|yUmq93@=2#IDt3B2<2YSy2PS~sRG zvq4v)&mIj*YJQ?*{KQm?Ib;930xY>Je~#-tI54lqDI{&xwxpWFB_WA?gC;4hpdk4; zik+!+bFr%u+sz442v!tC4J@U(6Cx6jQ_cAx{)X@4BK30b@*9hZjy6t0K|=DA?CpW# zB}LXu$YnWHT=t9cVcdS)tJ5r~ zmI`etazaJ?LEyn>AeQl<)T_2^#`z+rUqTbe=pCL>fGxbgxe?JsB^J1$pO_+i_RgP{ zTg!eOc$|b^SG=G7aL6*yOU`RBeMO(7SA#!|O0FpQTnhC0XP&K+iq60?>TTm8a{p{k z?>qY<-XF{GnDEc`edGJ(F*7qWfNA9A;c?rW=Jcq1;6@2VgMWtmM-yK?7vJDq-QQ@l z=JEUYcFG%NAg%xBe~i(b<^R35(v2gi`M(YT{Qu(s`2Q!di*9iKBg4N)_M`uwKjz^Y z9Uhwe2Yk90>dSu34r*AHGIfUd5Q#MM*CZ08ZbTzD%p4rC=isG)jY^@T#$EYZOxwOM zmV}e`L^-OZOE}}Co{~R_^0Tli;S*z+ix}lQlnIw-EyMkc7y^#YU7iVB8mc+v6yuN4 zt4>SoWeQon*F^_BRVM`sm9wn5wng*Gy|M3R9b~*WHFI4|1ICHByNL0ah79oyT2)H5 z4pX>D7fr(G&a1zseM7HJ*p?fz(b|e-qn>X~oLQmdC?ER3XeF1PWH|k`FoH`~>|%|0 z;9zzZMgM>;(s+|CiH>@dxxY4bFR@ZcO6_Bo%E*Lnsh*eo)Gw`jrhyczn731JZ$6f# z#_4m*#Mx_5SK+YaQr^Act?g8uC79siG~i?H)MD$qFZxAo$b+P0D9kCXjH?UhJUj!| ziPr(-cKb`@a) zPhR+-mFe4Y9)uxH8#T?;nEAJ^560;pD%7vJL%+@BUdo-T@23bbEM{g+C~1_W#~fO< z3${A=OtUnFQA?gWr><3)t#O}z)m+4c&E?<3!PBJU&{zI)bSIGzdWyFa^-~Y~XsCvF zomgAA-K;@&Y=Ob`r`O)Mm`B^9Kkp-NB;OyU#x{sS)KK<*YXhl0gGlXzaa5B{lW)2t zYQu?0`HaKC;_NAOvX^P(=X>V!@(Q%V27H$vz6JiwK}A|4QJuwPC;G;p(|N!oCi{M> z)r|EAvu$v&#tQKAa6GRaH7Z!I?qjy0*SMO z$?SWCy#7zFz|3QUoK!4cb{oQg;$N0~l&}F7G~-Xv`jJO7*&ngvlOFs7zL;*3&L7}? zM)?vq`~KUgO7@1U+SG{M_78{8M)quE-5fDy`9`zywSN=i4VR_M)W!zUOKn=kW$LgZ z$sF+7UEasO6PRK;Z&Ka9jW8LnI`|`vMA>!c%l^aS~+ zZLsaYAOk<@4}@BxtEE|Jwa-8r|24m&oKbCA@{z`t*62eo$|jUa{kkLkEzJWE&tYLm^|vA+1J&?!)K1o4Ay?^vY3E-y91`e@ zYK_uXhr=YX%zBs0qL0O!ShfCH=Fst*3MN_{|NE~Vqsos{#h3v07f@(L%DFOtI{+Be z8_jPVE4OMyb3#Ul&ilk(n z7rZvkM$5F{vk>-v=q(!?8_NV(|9h+Sk2eVyG|-zI6AkhoR>#7d9WYaEamC}i4Bx6W z@?Av==Ws4on9$*$ovoyzkSYJ=G(zprVc9S-d&Mob;?<|52@N%t(qQ$!UqL!FjRn8= zZL}*SusgM){JXZE2!W3)Qz__go7h{l4du0f_at_7md8si^2uD^r^^-r+yc7SCg9k? zBGYX_%kX}Kfx*GI)Fud)sNlosX!8XWAS@i*d0M1|gTvL+*)!&ZstTlKmb}aTk=qIy2y=Z zMR{%thY7|%CNCBw{YrH^KB9$V*2=9@5GO>Zki=sCy3pSr{5m)yVyQw`yxj+8(}ox4 zZ1?wGbZqQPwtDHA)#>WsGw@gJ1J@ERZr{tn?9c?Hd+OleU`Yvs+tUwlHngONr2k&^ zY5(~=knij$CN6Hs_8A~hChb-v|HH$>$Bq6NAn$24*u0~Q>u?3~LG0$%7B(O#gXcOs z*B2UWK|X!4#w?-VU~P+gXFY~m5x)euP@DmA1T0fxkF2@dTU#C0cNe>W`I)3Zv+fAk ziJblhW~$N&HwH0(EWyPN+nX#te{z&4p9c6Hvl#y$w;$d}Le{hI2n|~4VC5!eGfv{& zN3cvXQyeZ;;Zvnvx1XP%2|(+3Y&qZOYr&xi0sjRBIbH6((d+5%7W8cpxGAMxUS3?^=SDb?X(OWmB;n)XX$E6oKmF&=)y5wHjIWafRw+&%9^5x8 z(U`4bODbPAmB$%A&o&P6hbNRJVn*X;2e=BfFfTInjzqp0z4MERQOA@`0H?MYAv z(PAtIEZHOwaALs$U4EsTdOJKa5)}cVePh^pd~9r`)e~Gs-;)!o@PKC*tk)uG zaM#Yzy{MvrR1J>fHio+FUN9gxcIf6FXF>SfM5%VSzNx87+yDA6G;T_s|B!}W_dNI^(xA>hu zpD1Q7)o7w=Hz-S4lgwQ0{Xr?|D&&M$Vy6Nfy3V+`mF3W+Qb=f?-L zRbUG_kPn*y6ATW8PRHh&zCX|eUncZz@#bYa)ApxY2ekIe{=Knd0g8 zMY#W>d+CILB9XDB0%$LGBNTES6VNG$$TO&nImIe|>wI3L6Ct+2gx4m6Od8OGw#O8{ zNQ8Dg!ke2mU=!Wl5|n^PMePj>*$r|<)sc}2iMrQ6zcBBW%1+a#ma{-WidZE6LpLmJO+#2_qo0bAODB$Nmwn8BFePp)DNN z&ZGka!I(FQdd-+B;Ji2SX1+6;HP*KLc-HoG;KwW`j@J7;;^TA{>$8w?UD_#c7-5#4LlQ3Im5%l?d|Qq z1bu%wjTO)3A4`)Y$h{pOZcYwXrJp)!?XI{yr@?9oqd&~lI61t9)bJYw6>RM2mQCr({Q}SxYq#^Xs*pT)y&Ru=mKEsnTUwjK#R6jNX1>TPvI{-P8Qe-mt} zuzm2E{E1|%dpJUY%F?HOn8fpBj*(8`eL|*FivK@Zqh5fHY%G_PkznO!P+&GS=1Aol*}| z$nU)KR)e-MxCDv|6QP-JYU&~gOo#eu_3dNPDnl0~U90~I2@c*}ZWAV4KtSU$V8gRu z4Ekcw{jO7472HG6dzjvXJA)I!3FU&1f{R>Op>;S@358zItcLFM7nDtXc^{&+^>uVi zGX%&6sRJ$R>(UIppHny*z`5{D3=Sy|SXfxQ=80IA#^Ydj-wIVqVsZ<83_~R-r;>=2 zY2AP}7?W6@m6f&Pg~LujMehXGERmY7Zhm9oLDOTwU6Hhr_-z*(7YD<Vj+hETx>`h`@y=YAf#`yC9nJN{vdyoW{Ntg@qTk6 znEn+ie?FgblCIDLFPm^75_JFyDy;JRY}@H9rl!pxTc#Jb-XikSeCsr-?Z;!(;9)l9 zuole*g+$>r?ljK=QnSutKy+(x&#DtMIButb8FzP84D{a^N@i<3D zK{(plL@457b2&0U98kJq1cRw zx5oLFZ#CzJ6Mt_1JuQa#01vY>&ie}J&WKGb~<^5X$QP7 zJeFx(-HRXQa#I%+j4pa@P{fy~`-1Gghd3*MkgEH!WO`O=`evgR`-N!HW~{$A!D>CvgXdd!ZG2q^V>;sse$Lp=vf$v&`-u5ro-Su%~)DH?N za$SJKs($?f?zPX&PS$=RX*Rw0piOV{J06K-a+%Lqjbw;YNQU*@%OkOE69$ps;USO- z84h3#?mF8Dpn`elt>r|)D0s-h)$wvCMc{gx~P+(U%v+Lkb8B z3u`7P&E|!>{+(=_F$oSe<6^6OQ%nq|0~WBfEjBqamjNWRHIz)T4P5sb_Tm9ZqN4Ii z9EHFkU-qR54dPb(hwW!jS<2D+CbR;GW1sF&t6Q~zDn_M{a>IRGd<5Q9V8d{VymZ_H z^T(PXbcb2ReO2V6d4Ec360Nme^yl0rE{d-d4%WZW_mwd*C#inQF{#iVy!mx7VHX?| z6E>Egzk8VS-Jj}9UJvkE`&Cm?2yxAKu}~FiX53RhYZCdDzY6V!{0UDKoQZ-w5ZKCZ zT7!Q#15$U_nz?kU-BQLS9qm7AD| z3tH)p4HreR%huA0w}`|RWM^k56eMK5B`#n{-(nzKBX0p8JGhMJtr5@w^?s?hB9maj zVw?(Sw&YrMe|q38@~#G595b{V;KK^2Ya;qGDr#y9p%AbmiV~d|sQB)Y0U~(WA5sWb zX>d?*t906ZwCG7&(eVoFN$xTj{4#jnii+3coM(R2vH=tv$vS{(^-a%vu)V6_nJD3~ zzMi)Olr6$L$60`wB)`%0akH1bvGm1z%I@1|#_QV$Q&Zb1A3DI=H#ra5&hnoJ3;EU! zp0}6>nzxDP4OomMx6x9?ZU*7~s#QpzANIejS|R|>@%eiztTUKu1VQ)&EF3xac=-kw z;2R975AwRKw{%>7dsDe8zWn1vw(=hC>#+8pKjx&pgYfAHKeX)hC)a1^j-8+RJC-rP z9ebL0Lq2nPetHBm#`)#t=Hm;Oxa&;d46aDPn_~Xfs1QJ`f7J>KZb()(GQe9>Bz42y zik~~xhrh>py9Bj>p1wCk2B;R>7spUmDcIwa0Bctlk@az_Ilp#`rP30xszUS!W;{Y( z*KRJQ{Ue1cvu(^Wq;5jEGDoB}*3R3@O&-XKFJYzC^YeJ&???=vc>A^mx0i5m^vKJp zxNx=8t})@${bwm_BVA^KubU|z7*C1MT#m1CY%wP3xM9w9_tHe1G>zv9I8Bsm+#@*G z#h38^#q_G2a0!2x8^!CruL+|21J_Fb@`}-)Se?Ik%JK3aUq9r6SL;#o-KGBThkyNx z(3R)(7OrGYSaA!bp`+Vb;p`jYhq&g5kdU>f98mp1^&`D@m{1%7gLtFE;a$(N9W)rg zW#r_{mzsHxJ*8fZ6sD6!U;r;tC9w+$I6=P^aejR2{E%+8@&&rXsJ&qIc?aQzEqNju ziS^D@+!J~tsSFAW64KJ}Z+R9pO0Pf~28_224Gkw9;j(}+F=xVhgO48~3zQQu zL;lWj! zcI&JMzyyIgLOiX2fX*vb1OVjBT6A0BJO;TMQ!q<}fQbYECU^8i@Z<>a?K94Ro!R@v z_|xKYDOLmqL?;B2pyXtNyG;;fXim>kNaX`#YZIHH(32U7@ULctW*)QNFCJ*kd;+%T zlRU-jmm@jy37Cvz^LJY99t=+tQAb026GfAzHwQ{JmwZx#g=B&=C-Ihkw(1kx!$-Vl z9n#%L#sYWE!Kjq~L>W)~#l~X;G9?X~x7+vIM5$s9XRGpo=|HVW)mtxMBG1GHw6l=` zv?1U=5_G@gP(1@ar;IQ#D!6R)p%)YYv3TE(&tI$(P$~e-i!}h^4L~IX{MUt$P*4CY zBelGyMQX8N!TmOv_(GHcR${r$lSB_Ex1w$OAr91HA^?~{v5e}5^j-m27pYUEaJkue ze14u_Qk?R`1t10JRSR_3euDSmW0@9jY)~~6ED}rd(8v&IPCgtUPxX$J?e^*ZII|WL z6O)~t{ckG&G)P5Fu!G|`1&KfcZ5|3S0?g<$giBz;(5VK7l1%W%YWYR>NySeeU8znp za+eNYxSwx7yX}zet4ftihy0L+M#q`1Y~|L@Kfk)< zCKY(KT0G`K@cSd~Vs;?+k)+XwrSL8HPanGiF`n)h!ZmZba!&qv654}n1xswmw<})i z^QTC-YG%Jnz$K7HXCzOW)+8h(R8`r!xitgchcKu!mDn3Blv%-SY;ZW71DaSMA&?nu zUO2CgWrb3ar@c!Tp0BNL2$P&(WC*$h-7p^*l-F&nGvdyNt;FApBR4fPv@Zhw@vY+f z_o8VFYFMSpg&8*u)Y-uO_(GkCzdTJW3%K3Imw`V3e;&$jqeYke`1;xkH@t^Yv$npz zUL^Y^4HqhMBLYY~Uek#Jz_q^U`g{ZgEOro{huLS9sDZIX%MSxkS3fS#Weera_>P)> zN`Js}WLBkpi_)>ACJ{Uf2}76O(fS0FRQ>&@ZcJLNiF{v2!2KphTrn1TyY5|X>v*I=$(E+eR zxezM^Z>$zHd)uu+Q92qMgJ?${=rO!G$Jt+o(tt|P-uMhs44}F#0L}$anczr*Od*=g zc5I76{1>*C!r$KLkvBR@mSyHSkVGCj&mtLWz${+UpVuR<4r z?aPr#0_!L3$ji^aXdt1~AKiw7zPfhw-%~!7s^hAJ+|eFq7Dxs25Bn<`f3VY{{d?p# zB88ltP6}G&7mg|KtMlQYDw0NTuwtK z;5sQQM+k}o+?{(G|BsV0o!NvDRq@-V@QpfPlt^|Z9)uuz7~)dh@Kx^E5sjG>ZG0^wu8iD&$I ze0Ug0Fw&+CDgr33^8=uQc|hZSLrg4WJVL7a%WAa)uvK8H?w$m6;ICU{tY`r4j2%^J zg@jrGL!`yCn*Hh?fVEErO5WF=kW0@k)10sgR*Vlu`Gr^9b`jcEQ-@dX)>U6ah&Qvg zB5;m8H%9FjxW6{FW=~=!el;0CyXH~)t!9{)>JqL#n@QYOShJA)p<;OnlBpJZu5!7n zh0#5Gl%@MwNRka z@7j}N*S*)epw|OLw1Se^DhM)1pt|D4)a``vSL>bKqq-^6Z<-RfCxaePggM1D6*>b$rn)N-xE2Xqri2+!v+ zu^(J#t$8KiyR|W0kuBmJ*q5+KntS&7!R~-=Xuhc!S;E>yOZ*t;^@(%zhJcH*T*cGr z)>ru47R?6z(ST<|A>c9x=L~S&W4)uN>(2(;k$nbiuC7N8Hyc6SYx=zrr)h0eLPBY- zyOYZ&WqiBBuva>u0yS?FA;7~M&(|LEo0ySeJof)p*3;8_vQ%^@(-H4z@mNh&DpX~e zNUwcFu3+sUev_*cRXn)|;*cO}%*K1WPV$;+!`oi7SBc)XPg|DE?TZ_vv%DIEiq5^i z?a?Ko{@nfov-4m?#av1w7amPE-kFBJ10p;LWv7|GewD|gi&J)X_9~1&;+uit;ea~1pKK>K$2v*;j!Xs+JZ?7?oSgS+%B31L z7#JAU8jM+F8-OhZu=4hCEycp8>L}+3n%3G^m^Zk%PWw}g z)f}v>*25{h@Q#3A0s%B8T@?uCncD9JG7n$`sT^m)MFMr=T`<5w-5!bO90#eESvzKFX4|$1Ti~UUx`4 z__YtgUJ3K`6$g8JLHm%!>D!x|-}B|#!u9lOMbM7m0yo6O5>}AOeF7Y_oCM%DmzI_| z&88%(fe`w&$pM*Y8uTE*WPs#TI}Z!G3}|}-PL+m@K#CgsSo{(B{oZtWr0k9lV4q!G zTsk@cu$Gbr1EEz7NT1_k0O$}E-3R9?PTF z6NcxTCdQsF;Ovu9$=C(IieYmwSMwSQfmg@xcc=#E_c<&|a=&{$q8&Rvq%$yAc7W4; zlvAU*;Gajyzq zX!?4qRq*0i-daUkX{Q0%FUWNVB{@S%i7$YB%!V0P5}gG_gG09iIuYh4kTdb(x(>aH zJrQA90%#a~RSN_NcX*KAJ+ZA~>gdvFCh;CfUa|OH6fI|9-s@|G6bY2Q z%f3skKVCwd*!wUMkhMTp=klm~RSqveSL4B`rT+ca_laB5Zg?iIBJ^|M&q&tKp++xm!mn5fv503KL&FMOb&y3KFP{QN!J21r3Oxbk#IRZHY z?2ecLpDdW=K9y-9Ty`45?~XLs8fp2gd2{)s0Vo-G;*-|b*XJb@z~P7J9X${BAb{%# zP}raMV*t#F3W$z~42m9*^U|d_Uf^Y651512OoNXPPYI&pz+w#}gU-9$U>o>|lAv2b zFA|-T^H$moJ`W5B6DI&jfgwqPhYspPgz>95zaBAqpgO$Dg@HkO52w}$bXqW*P8WYd zwVtc9e7+miE$}SRJmAZK{K064!NK~LO)tx(0BYj{=mpJSQtG^-;N`_TAx< zIS>cq!O)bK?g)`mXCK-g;*?jIZ~Lg5)^5+kL98inP~*J?-s!(9j?rWh&QsFjv~V+#mF zfjRP1iMsbA0-~4&4b~o7BZ-9_IT8q%d8J~&!X5-L0l5cmtRpn9p}s!j3vf+<7}X96 z?g{w$J49MOaim?9lp>Kp_dj?Yn~87?lD+k42M`rzVwgOF;ieh+D*+t=L?dx% z*~Sbwc!uo(TKg5NyNgZSJ+O^XlzMNQT`ogh>qCcr$I_~>e5-#uqos=^LP+t34_*Jw zRj);et6vzbo>nH-3|yYa;{}!rp8lH_--VG;&(NDF&$lRRa zdRh`b9TGx*lf~}d0B7m>YmfoSbNLt=yl14y&9+q9QncckPm|uV+z>y+r{d=&jpmr5 zk;S_zf?lrm8*2A9an*{U8K3543gh41^iWRRSYnGV-%BH~3FfMvtIF>?Ya4~t#ea9c z4?e_h`-?8sffFdUwvfF5LpCG?oS$BD-h_VeD~}%$-_UglMlt|?{<`mF3FnEJX)OIG z6jM}0FW0dvFj$iEzJ+|N50d_5g6?i^q*D+Z6wpy$%eVE!@V_=Yp*JvURKx#5>VT1X z-Ixi`X#L*ChMzL&=ZuYvMpA5a7*S_oKHmE_tB}u9U%b7}DFDnW9jN2$rRn>`o;d0T;0$9S4?@I3$xH3S~iAqKr zfe*yqI9vUl2668VKtnd$h^bPHb8-mys_1eCFEB|2;P{K#iEV_F2oqCg@d7P*T`wRY zK+MnD;uR6XY)Ew`{SolMU~A4NFxds7k_-n+@34D%dd^VO(7n&0%1wWg^>$fgg!sl_{fktWGgVFunl#qw}nQm8Hvr6K|FQk*)PJUYrjpTKu?%erp( z5d~M&yU1(|W9m=l_b}>CcB{4epC*j2EDtozyJC>#O)iftY>>0P7Rv7Of2XX78WjUVgeV?Tgeej zp~%@lEnIbu{sHB(c6Yg7@ApwB@YO7$d}pwJK?{h~Tgl-3LYPBo#9l)JPlI~dp41Ws zxreqF!e9A{G_&4vb(BduUSP5b%v?vA>i{L4aS)26^)+}tKfOrcZZxF;WRY=CJb(#n z#u9L7HsCh(A=j=cFpC^Qa9}s4sF+6`r}8^mOcup)%3keKO$ZFa$cG7x;()MugCfd- z$jIv`V=(mr##9H4c^T28oCU8W$V~fM92TFA-t*aUBl_SqfF7hJ&ND)Ia9RPg#=)dF3=Y^t!3SeV ze0Y8GH~H(JKLRwWp0jz@Pr(d*=o6>)jH@e)By0< z;NKbkTRo5d9)aj1jw$Uw7?Usw2@f_mVYms+rb>X(i#K6=pA>;yr(gxM)(0wmNB*Gc z2G=hVMII0D?w7*TmfZE!&8Mp!`;7jkHXp!$keVXh9!9OY`p|BDnPp!Q8yn|X5(mUQ zl4)lWRiM+~Ca+wq5D2!{MG0Uh2Ptwx6YRcVbCkAHxK$VdH_B@uRj>0I(=riSos!wD zEP>v&?GNeY2*%eGoV_9Z1h_f)ENqm57MR!Azaa!GfjrCuz4<{bVkr#vrkE1f) zKw1^MgV2KQGC%To@St3uraXT zk)m}XHNo(VNbY>=ld5k}ezmaE1Sb1-Z+CPqj0Mc=*Eme1(5bGwW0X8#`mC{96}wl&~q3*2IN=wo=M_kc59V1nVb-G0wg!Rj^k zj;9g!>%p&zM=vO3Z=wp`%APe*4s%o zPQveiQwjd84h$O2&-5#Rfsb;0A$>mXPm!n@kZ<33EX0LejS(A{EPWqS zbZ8sax9_-hd%g{5x}SjLPsn}?{8KJqB^WRYTKD>k0$vUntL}H70;X`_C6=Pd#OtMM zwT0Nf4XOjc1TaM0@zYT=b2w-snM%gb4PPB@Nw%H`%m(xnM)9a`I3pQkBN{MUv2Qfj z1UG7^#PbylpH+FiPi}Q+8hj^uHW!zmk%F2f&jI}m0w8A!3s39Dr97=yQzt+zAs`?) zy6E`iGivNNd|wyVUr+!bT*@_y3?xMJ(70Jk`-*a&45#psy&gzHkUYgZp@Pi8L+HO8 z$3ifc=NEixMp`S&7hiuqcNAm6`_(}>cI7)A|2s?2trVM>SJdz6Dn;#m!ucP^ucE(K z=7QhD{5XPNIrP8t2|y7F8T&9XKzOB=2<*#H|J78m1C&Pxi4)$w$a+NoPCcx~kY*GT z1{}o=JS~z#uI~TGshkcSkh#IZKEf3W6gh3U7m5BKI+kN3_GjiXZccN8$PM5B@l3P7 zdxzIATaKWO^Pj)`mIaA2yRemOw)xq;(qL0vdE5yYNV`EM<6jnHMM!xS(}1L?-M;%} zob^MU#Z1iRZBAeu1oki5;nI)A;F$%34G4ao*#CWbz@aG4PM^B`++M}H@xi5Pxbe^x z8K>OH?n$9Zm*2B}05DcKOj?OxZ%3U%K3H#nfulhBQ1!oGFfB3#Zi4RL`(+~QLej~J z(Ex(F8coMPP1P}%2VL3~dR)nHNVpX`?U42UVwu24ML|uy4JNA5(a{&t?Ay0*rZscm zGp^AHN7EV@SX(v#24HAQ09`s+wBWr@KK%D>fyh#mU^k?M1>a(QAOQAmUsFoKPfT7YG{b$I|_x79BoWe$R`V5tSa>(v1OH!o`k0iYfk2Ur6P ziu^7YG(ziZYbCen@FaoP@zaeXm;^=&>0J7E%qrN2uHA60>~lCc-wvDmT%V9s&Z^{H zQ7ON9j-0T>p-tBSANMY)dJZqI+`3ibQSddU!3fatLrCA zXBy9IXGGgB%a@1ab%sxV>GOZXRyvoF8!Tss?Pbr?rbh)nbJ%`jb7)cU2siuWs2p-@ z1*m@T`#t~9={47U0UWY$2vBY&mC{%8?m|19VUpQENdcx%V6mbu2N(?<4Q(V>7N^fR zDR1Z-J9J&YfsLKr#mR{XbgnYOhqR<5KAVj`KocnbWP2$SQ$Smf?7SyI$%Ikn);2Qw zRF^>o#qD9K_3M-ua%iu5W~U&r{;eQEcgjyJoHuV$6XVSSB1fA;LR{VurRUb++Nf07 zR$;Eia8h~8(DriH@Cot@GIG(ev5xoU$%RA)M|i}==W&L_u@x%)_E?NbeF&j!cQF{q z`8#SnVS-SewLZp4QqB0Ue9;N*ipO02B=65_Pje(#-)=qcY=CV5Ztn;9oFE#X@4h<} z2Sl7t#5^hRFF1r&x0HA78Ud6j*Q`?@{~_Y}XETZ%xHp86+T(AJpmUH5aCtt#0>OpT+P~j|6TILO_3wS{vgO*WvsWM1@0lC)Rt{w7Y8a;oNZB^jJb$kC z8E*+VADe(cC;(^@5|4o5d0%q+D};$0I+4D-ysQrBHc-pc>JXd=D`9tbcL9^Ulbs!3 z0}$H!`g*O)aa^b*=nE8Q*L#LOMc;U0By0Qk^Aihd|E?&6?az(%>JPtqa;igLNQgA5 zE4y9(wPSs+-ax2zG33|tdup}GMZYFK__j9rhak#xHO3#k*%7Bh3~VH8pIGM|vQb-q zbeGn3J%I8`W#1}j;J1y?o_piJtn17_B@b^-Emw8rJ>veEc2!t4HX)ynlP zkG&6NsA%2g)3aA$kFA?qiOHJv{sz_qOfEm><}Rr|o1{8$6uhSMH`UXl0#(3XMWaif zOKmI0zHwuU=J)<828@z)zbLH1oDy4C<@v7viWq-wpDrqE_3e|Yt<6=~*t2uW{IJFE zs-P=TKVNB@e_GkPq91+!{m1JJCH*e9p9}xHbv>%HbV-(*|Jr7#oY$pLT1L;a>{7Sc zf+^ahHap{>Bb}VGjF*|c7=vFQ>Le!hwKwBd6%NlHt{N(?wG)LgO22?8!)>Y~FUdx> z!(s9R4({wi=&JXuTW`nU&E#1I3&7Skn=7!1I#L=cvWMno>Ux~K@9aM~NB!W5nCj9= zmm?O62B=Q%vsX^mc|JmMe17&eSX1TgXB}^Ek29eGjr4vWy+$rf(zRuo)8Ec!PhjV; z`^+4co}E^|H~2W;hD$1zTgkd&_*r#L&3Kv8-Cf(zfu~mfI-;U~Ha^PAzf?K=xb4)Y_jWkV1r#!eUS#VqP&)U{^hCphrdtNbiLOO(V zrL%Ur0kge7zs>x3_wvr8H4PO}rsY3ri840#TE|~TB=$=j9X+-SvAO^T@@=7Nr)Yn;Naq=3YU^28r@QK1 z+lvPZvO$CnnG2I5*KhJ}yivr|n>K_6%G-Tu<_{ZN%)+Jl3>O=9ls8_&e?GBvF8 zgHjb1p96u@R-DuY&3j=lrEcqOxgn#;!Uh_v_pe1aAKLSUZYuPQ4!jG7oR^#>Wkmi9BqERM6=uG3p}WlXF6o@deje9s*i-IrnN;Dr(WGE0QfSgU0BDHHL*Z`4sBXX(YD5O5nt& zJk!oS$&-W-PZ5x>SF5Z>dMM%6;0qJ)uF?d03-% zW#quE%_CSm3|-QA2|IasiNlT-c~&L&?-;vPZFt@2FJ z{n`lqdVkj{G`1ZtrSa9Ud0zfa(<6rkUB{YMK2-P-3eYo&=lA3{B@%NAp6k5v-BN^vH}q#yETp024i(aZEbH_Rz` z>(&z`MSbdU!E5$)Z)HxquKAsnMl7B7lH0jDVP~g#^eBEFvR2gt76uy+37Bds8-o4= z(y-O(=%-&oqXJow2T42SAFLX03ToCt<_Xa3XaV&~0O_F%i^fEriA*QpyzWcb?bBl! zZdC!A1ST%>0SN#c`Hmzbe;qkDrnIiM7KBckpz0CN^KSY}pHWj)l?@T67E&H5C-jqJ z;^N?+xBpJcD~s+S^n5=7{(%D%$l%)&BZKw|Ahq~n|Eh)UePVpP`{x(FMB*ScAf$=W zNA@*^Km~y{NcQZ*zE6@~Yx11VaKsYb{*%OflN<{{{Z1W)S3(CFsQiKNM~Y%-`LDM% zR*peqtI+m3nSb;3J+UPsc;*6_d1y4j8KwlR8$?ymM^RtZ1P}>CioV~$Rq*%M%ij*# za`TU9&*|5f?7(CUdQVUcZ9Zk>fBp^Nw*xQ%>^i3a53Fsh%j#EXvd#9W-JSUJC^=lT zf`s`@bfXcEYiViGy_dI-G(u|7{X6ry{>Aq#BF*$>XnteZ0B`Eu4+pk3>lT6S^S8Hj zk>*vuuWA?ja#K1AM{8=iy1YmqIRp6Y-g;Uc9e8@omU;QYTzbUA_ck|-j4Tc1YNf5) zUfD*Q{t_z0~U{S)}|O4!5(>AbgI3CWOcpJj%gux z(F?`;$m+I3(f%(3oRRX;QgV2GJN>sz5com&KBdkJNM&fA#?asd6FEi6*xK5HtL20; zKCGtp925`J9K1Ag2I(=T0^mnd=fGdE;KyGiAis&=1XyZv65~&0t*k#nf&WF4C*&4D ziw^rO;|R9OF#`dE4d0_aK7x^VL|m1BfCv!0ESeCeHsc=!5Uw`0fYs_s50^)II;{sq zec6x9byQSX4so7z{b~3gJ)~dPxfg$OZleF>#0Rz}s^{{I(^#PMkl(z>8aRfUME|1I z?gVL`E5$RbuMfTOjpxTxeL9b(`dr#A%v?l7a z@dC}d&6Y=@Vo(cvVX>^=-73h%brqf*5R$dk!Mk$IOpa?t3*c?rSRb!rrIzKr$){3A zKT#NcF3*-Sr=mV1ryICx=Ms!MUj+I(aV5`rklmIGrP-Q*xd$(x$R|+nd3|Z%YNzi> zmL}AsHUxP5(|-zhfdB!y$*gWCmac^n{TRUPqWos~nsz8zGfD zKu%b-ErRf5t?>r$1jq^0JG&xd_CX?JRSAz|!ZMg1F2T%GYJqyQ0oE~yNl!Vp3rLlu zh`M?ZSXMEgYdzivuguVOtbqoITh=Ce?(*_ftK=N;jeC20pu9|cHe6)PIvWnE4^Ep3 zJ8d^d=(+*Zf$ze>h&}ul;3cS2z{TQ64vP)J{Gth+H|S*nNXy@&5MKsfE{;j+I%jel zo}Qu;P~qZI^-b#;iv}YisF0$F!dqiv`NSn<;-|4OD--S62#Z_+f|EByvpslwSs$#s z$f~=ksl->oR}D3Nrl@*f1^(o7=B*|dfM_t@0zjS|W%pq)+u5Dh>h=M1t|XmxK~FdJ zV+a4xI`?<<33+F22CWqM_{bC2!KCZww+gAcgUU60TtpzHVJz;G4a9nM&gzG#ZnVot@pyoY&2$dL88FV4i@#X0+)>h@sJIJf1H`R$vu8 zY2vGf91hfIbkG4c_w-eXM6W)3$%WY{Ld+0NJK$V46{G(2)TvVjaV*E~gT&D=aZsSd zZjDn<(BTf;tiqp?bnC4z$jn3Ql;(i%XBJH5IMAkO*(BlOwz2sm#x^gij*Yk}!x@el z%uS=VP@zY4vBwIRMYl$M^vfKi1MEyc9+VahAT>^a>`TSQ19jG6uR9K>C{Am1eKgid zuO!oX6Jj6ZGuede$cIAKe`KVkMfUl!7OqyJRZj!3oek_SjM`P}F{SNY-oW4jI_L(; z-X7$dZjN?(_cTOu+goP<@4A^Ed`ngfum`mCm;DI!F+DyJlv!NWK|&sO-_&w!O#g(t zDMM$T!2DmIK?2}+Q$jzRch$i51X{)Ts+Da)a~!tshb^nkedc`_pRor$6j(DH?RX7O zVHxo9-V+`AifZgzzx^vZszMxX^xT!p>gp7dT7rp&hG)MGANp=YU7<6JFSH+XtP?p<8r|MiP=|}?72e1ASZzS)SA;2sgZOiBrUW~a4qLku5OexZ zNVKrTfOA3B&9DZX<>w)|FZx!yJ`?k3z0yCSLkmi7kAFAsAL!JYcUGAg$qyq13DMS&?=y(|GuO0BG{gsYn$jG4qf$)($4l)O3{ z4s-+rFgWN^*>+0#1yI*zV#ly93om*tF(hc0#!?-eVl_m=M;K{Q5GORoXl{gy75*h| z#r`3ptt*gDl=<$V*{)-frwb7>vF0od{QUJ`_eK(w1uhlzjLG5S`h=e+%-5edd<{xdD zy!V#1vdYBaF@P%(d=as*f`g5Xjfl6h1=x~7mT8W9h1q)i@mYzoO)GD^eJ-5kHJJeu z781j0ie52!RgYy^L|RgHwom&{?A}3CKqaX?mDbP>1YngD2K#u#59%j8oUAkc*#@)( zN{#oVP$35&i}WOHD!?K0593Di@84DNw0wN#kfa|4Jt8nu0U1cZbw^%_NRLi2R7MJN zM&|?t2h$@EQylsXdWQ+I`a1+Beb$0iNw)0#RUZT$UBO$7$e6d@H$rdAld3%}mdsRc z5%wRLLc|#eD;q6zGZAnTbxzC?NOe-zFjwOZ(R`62Jrq8^g2RH05@i#CN6Dg_<**j1^)l3La?tZ>3Qr=#+m))c2*cY zny>#6S2e}HSD=|G(p0!o-@dS*zR(B)+(O(^c%^?3ct~VuH68LD(z+k(HwUh+Z)seFPR;yf`Z_xKD`vZPk3?eAQQE+ z{)?;oRoA$uPK$lv`*q)W=0r5+GwRo`x)+*>FWYAheqrDP$Y~~mqWAgIk%`T_k04dg z7O6~BrA%+x>cDv@5;qpppf9^d*I!V0#iYM)xko?dg0Qggf_`AB)g+!}BC83Sx_4!a z(G*C~%oR<1O870L?lT4SCFU}63C70~GG3nwqvjKHvQ^dtfA|F%7sctsxW_-pL=i%u z;trY{S;Ls=OI*{84U8et@uq7`Uz3nSJS}M4d{fwNLJJ1|4)LeZL4ddx z9vS2sjCzPT;Ix|9}c z;1+<0Pt$^QUV6lwXtHCjd-RVo@Zav9z;Zmv{EtlEgaa8--mZ-@9@I;A9(0Q^gH zzWj-6b+#8S&K5U#>Gh+HRzp2(C&-y?7L=QnXB8Y5kn9Sv;f54D{*U?$LzV#n%Hm>$ zZIa4GBYn6>w+Z|V?wX9tG`odHCsLPDEG8;uPNWGZ`Q@5 zueTD8il2KsB-d=9XV{qkemDN2@-`F4eWtS~97lTgdS3g|FrWo)LhG35^fQKuhn`g^ z6nJ|UK@Er|E{7Hy=ANkH?rbHAltmbEO5p^7h9=*J$it9Dp&$jy6S<`CsEbjw+&oLv z+~~F%gH}X3cy)Y};@-MEDlCx5SHR&8_FGt5mRSuwIWMnF9nad&co&9ZLeU5a6Uq7T z%gUbn+M0(8k5SkKSh9l+{AD6jI=Z^rgxFvsjvTbP(8EWyMYzNWM>A@7TxseUO6!CP z{}nvqdO;3{sNNn(JYYhRR4p+|qO}Q!06p*K-L6@l;56Ovuq?v8bji~+#`eyhBPG<& zy1PxBtLR%4M3O*$(~7R0Vyw*yr+;aPoip(suRdU`#+YCxBl{TQ8vuBS?GrrW+zq#O zoUV6)Cpgj#Pm?7aaFA8vld?QkJDN(P5OD-PkTy7y)PduK@;FTzXrn(uLl3jtUC0PA zx(c3_vF7+|!oiVal?f3`;Gj1!hD%I)7pQc!phgY2vau~NJs)I#+^saOB)6@#Jncwn z_aR&q5i(3M(Su5%V1PLeK9GX$s+Uz|`qyk=72AFNY6o$giR4w)My%qCW3E+hgba|* zwFUtmg(cN6@kf7rbSe+pI0rRYYk;&7F6HbmkTasynPv=TYp=fiNi`jZHA{l1o;D#7 zY&9x@@$2LZUnlfwAR4C+(sNTwwXg6Au{Wg09Yi9>V=~S_|Nk4Xw7Fg`nXTr(avVm9 z4<0*>4nHdIe-^Cc88&+?Q-Eb|@mrq!6;tK_-Cn6JzZo?)CbzQ2PAx*Q_Etgk$9CUi zeGvpE*Gp-I_O{n^FeohMaF|1SFh-laCLt6{%ot}fnSkjnAgz5}e zOjA=6mO)@-n%Um2+l}HPPz-e}&#IseRjSA6P&SA%x!`q-W-=Hl;}%e2&`p%A14bHD zwgPX<%gga+PBU$@7e$K-h{SQ~*=7-{3N#EGv$MxXE9@bEIX|huH2*n~&8A~$Xa$`6 zJ}in1$EoASIN8~0(hg*pLHVbrI99%zpw1z_`CJ8)0F?hFD7_(;XxnBNy^3-7lQraZ zDuF^#EJNUn7`3gPuQzpZkMifMxSUqE*FDpV7>=`NbhLpXQVLe?q4AXa`f?68+m%AwXg8$#aG7bbydStssJhkDon9Ac*bsOy zVu8$Bz}xb!vb>A3wU69$e3XCGi>xTaCiKB(8T}mF0C-;uz8YG`wkD&OlFnzi=9a0v zvqG>wXdHS_l2a)*@ffo5cO}m7)U-frzDPs7ol{PMTtk;*J3G@IEU6>5Cqlb3)X|wp zC+JGc6emNaPT+fqZhhvB7I zFOcn^k}#|0Z@4+85KLiwiB?^Xw^I8s~&#nvjc(lP}HA0_&#RwoWtSL$5KHEoOf zJA2|mu|=}w-`vh&=T%|WdC<{Kz>lT1Af3)7UE;s9y>+!MxD3#2t6K+V+BZjKd`YqL zw%|XlG6Y$qEXEdO?#(f#M>QB!O*3m>ur|&+qxRQdhM?{8bq@TeB6Dk8)F(O-D zEHN$ig2DD(KQU}cqMs#Mxv|QxCg!kYqtEE>)j9c0Y-jF9U<(af|%`XGAwQ@9g&8_ZV7(zMy z;cCu150Tj)m+AQIW&X12-Z&m>`MwjLX}zFz#is8Ntw0nrgLg#PuhfUS9y5c9<|dVX&ekX;suK@Z z!{?;7?DH!7AO`R8nFllLJk;&9BbOl$9%6cZvRus-tX@W3BK1`JkYzqsBYK%p7CkUg z!bzCzA9ZMWtV4u=uZ}O;em-TLSm}C>eUxmpvbkvw=PoF1+xLS{JZ(jDS)&$dJgO36 zf6!ZnpH6Am|3omzX+43CDP#Q9VX_qY*Km6OgQIm6+#K$t$PQ~ux_riGYF;W^uGR+V zKHci6yXIxKcU;19~F` zs^Qq6R2O=*y7CzA%`m-0EMgH^-G|PbG;FJ;_wI|$P-5qYOl!aS zg#dUS10#KhDld1m zZs{<83TOpYf?b06%~6WrEVO*-vBl$IXxpm4=WU4Iaq%)kJgr?`#?Gg&=MrY1;3zD;=jw7Jnk| z9*w7h^n($`uHN3>t}dfKG2uXODst=Ai~4%f@Ya3EN>{l;S+w7Y0 z>8?lZw)Y`gmZp%O>jTsYq>ZI<78Vu&F-WW$TfVr9knFS^f3F&pXA3t$P0n|}Gz}Xd z987aYYGvyY8mp^d%Ib2UBi$KTJJWEcd=_A(`>vQmIPcAA8R?`z?#5 z`-uj^i>D4(qz`e4cbsY)ZVkQOxqDW3aY8$nrlZ1;v1wVXB0lew(d|(!i4wZKoVFp; zO7pUcugU~B3i1cPE)lYKqIo7h2^PD2d2@9gJOk8OZMv<-?Q*_;&$b4`KDqd%H zvM{ExuD_Uq9YmD2usZ6^jwMu{PBA)7!|KMDCnIJNZDkKRa5{K~Z++QO=BY=<62>r8 zGsX(b5e)!|r9Oj(zCTa5neh1;l>=2ssE8_Ob=~rtu9--NG10I9gesOnnVI%ZY^*`9 z8=Li5JH3#D7EBJnsS?-=Y;T;^;Pr5IWrzaY5}1pJU|OkUWnnR*LUQ$!5QCao1sXd= zjETZ4IEC)&-G7@PcEsLsV=7|iM|0-lsDdIcIXD~yEdZ<9K96mj=D5PVO9y2g?bNM@ zS8Y|ISr~rs2DnAoy}|I!hiTu9$-D(m&zLOY@e8Nkcv%fIKvO zXFAvqodEDON_$BlxiI%H!N4uu+{A)(b$r5b)FCR6O@UvSvrVG6;AYiLT;ORQ2T3AN zev}NoRblQqSK96_M%C_Mfb+gjn#I?j2gNu9Q|y5SGYboBRTS?tg1<@SKVLSX&mxJ| z$x%)~G)-|+LqHewr@vu2hnLro+|s(!V}7$FR4*yk+$S+LHTH>j;Ej)w-S4(PbotZ= zUv7GM?L^{cmU!m!z)&WS*2%wxw{d3>-XiXsu9p>Wn{`wm!g#H9zNa>dhv}%Joh7d` z7w2x&53k<&*x6yY`Pww}_KY(sP4P&r(dHSWa-5!B#TCn%6DPkc;&qIB!#=IBuJUPo zPUq2ZJ(pg2S~{j#&=7}&6_N$EaA#vXfP7<{05h3s#$iCfKLNKUP{|`>MFjmP7$hpM zWlp6|!YeM&Tu=hG5*T&W7!bNd{qH+yK*0 z6NuF*LgE$Ee?f>n*g>R+G%px#-$U-#G_@w>sBvHAK&HHKPS*#ZGeD)EByjWyWOnJ7 z!Ve+0prR~&Q6wr5xnMi$paGDe0%}(-LgYd|+Ypnn@#_PL!D9x4DzKAy>9=4iD521~ zg99H1tWYQx5Oa64giqCrLL3?gO5#=cKBRcKMJbR&JJexW3XG5+q2Lk9L2FM~<(4E; z8ARtDSqp~lFI5N0zM?15igt>5>u6E%Ex%M6)_!LV3CwmwWX%C@-pTqri=Wt~5St2D zgl(2b!0{a%d>F1k41FoQJ@Dgtiy)V6EonpLwB(cWdo$&45~6Y-V&jMgS*P%H5;iQa z;G4n}L`GocC`Zw40G*|Fop}WL4_M{msEp3V)vd*qI2X4QgYXu*ak#n&f|YqIcmc6JMFE^mQ(hqan0 zrJ9&iXik}euM%ci5s&H2`?;(NWAFJFOtz zg<U+CP-^4k2Opc<9w$?#<-eF~*&q%7fiAtwu#$G7n~s@}EWBlyR`8 z_wz`R_Ie=a@Zj{Jkb6%+>4s)-q0p8LA0Ri4T^${IKM4K?zw~qoj8j%Z7)(UeHL&dX z;^IC=NkS;)y8{fi3X;wkROs9nIJ&F$uRD7il&bZ?IA^a7fy2%QI zY$gb0>eKH5Dv{B}P^I&xbJHUd8NfM3m5!Ok&BSRNaoKQhqpQ({0#Ea=C~kqqd_ko{ z!;;T_P5w~_(Eu8)VplN0=5OFq3bqO~NjE15d8B(0dxgeG`U#u?J`i>@QSD21h|A#f zv+&Z{!A3P!Ar3y3lSB5(jK>oiQhmpqNhE6Xo81M1)4Y2HOZdI9x1D-~0a8D$RJ=p} z{sEtvfW5rX4fu~E#Y%ecmz8F#?uYZ3m&>freNw(NhlnYx2E!J6^8|orjA=nrr;5hV9#=6ffNzyi zTquHw#)p!Dj7^SX@siQJ59Oj&EP2LmTB*$}erUMrX-3~?wL}w2t$17UucCOC7j_zA zbwpj392dOIj!OOp@?^@B(kZLocCize&$uDg){^_Wq?+o8npW7{7REfs{=+d0FXOFI zM4BHWMJ;n##a!P^zjrwo(3qausT{ysYBk$jHY0w|$UPana z(=aiD?s+FwWsm~EPKl;-H)f&qAi}VEO2Hm7sDPEZ50rDc*d4(^MkrInrw4+v*e>y{ zXyJ}QKt;PbgQ8r!b+)2q!d7QdBUo~zLW~fZ0ZqPl&la%Ff-C}9gUKW^{{?(w{!efP z#lu^JCZ7rRK0*g+wScacP7StcMI<;TS%RbhGJMX1yMw=%#hGb1T+S zCFWJsaY|~Xcr>~*0m+r7_b7jrjorq1w-bkBKFSo29>_vjNw>-7v{y4s(ySqE@_3yP zxR`ItzHMo%0>aLE@z%l@ICLjpg~SPw ze9-S?{*VhSd_RlQ^?0_uz+E@T=tk#!_0RT{UcvkNuFzC)*ewmB=`PEve79=T7PI@i z;5kxMF(glR3`y^~;^g8;9QC+S81{l#m%&zocp=_!WpY_W-ag>C^;q+V!XIg`pN zNOg!>8$q20qYD=oU2QOIZF9?nEIc?J8LHX!5g(Zt{E!5f*i&vYCfaVE8;n;dE>Sy2 zDxG`SkpVU24{66}R+$uW?CO!X^xh3#9}5Oa!Ga6rK0pKdNmoAB#NWFfgNzE+^LG=p zcGIazlySyh6U#D~D z#_v3n8D3b2>`si*Hl5&2?t%>>%Z(^yuR+8%nO!+qA4y1elFXN>lB(JvD>^!ux8s+f z1!7J{x>NMkBemZRD!AlXy=w6TI}fDbwCIyFXp?BQ3=#-NPLrg+)NIxdPH?Gib?b|_ zp$jqhr@3RcqC;OZQeVJRtWOO|(lag!bJEk(>z5QTNk%HRpb7Sa2WA)%t}m_P z9aN@erv?RrqXWk$6^TeEM2p@_tgAW!e;2zM85#{7!cLtCXTkP^R%99`KjlWBal@V5x6e#0O6=ueMD>uv}L@4 z9aHV}O4;B2l-FSO5!PW@@ydcqEK{x3I||~QLP*tSn$aR${>SGlgkq6zih(iEYjWy? z6te{6P$FE&0`5ey+hi&49{*jh&e0K$=rq0699&pBB2wP-f!lmp^$|9Ua6v|2O03@4 z{t<_*?`lp1&B7sjUrLm`Szoc7AR6R;M~~RN)fZ9jE|hV9a&oJRR&sU(S}FWR5Npwm zpDwpik$ejq&h@y#%q&z$%@8I@MJWJ!1JKGZL9&D9jzNhaASU4Qabv4SA7)5kT&+3? z3pfieZ{AUV7dZIY%mBg4dPukc09EWRMAlqoH2Ez+51yC>Is^j^=!G$T`MH&~5XA@a zg3+Ob2Dm1WqufrD50)0_g_pgP^$}=!f}qVc1E?Igu8`I3 z_!*a|7@I{)jKj9Trx!3$O;9y-Y3aRnG*Qf2PMX4hP`rMiQ`}8?48|W(H$q3eRP&Z>|1u(%P5QrAmE?y1xG$*fu;vvk23Oyq&i_(@CzlqTYoOm|8IYV=_aa|^S@2`rMwYit8&(tN%va)+TVXc}$#XvwTY4Tfv9Z zGVn)!<+6EuMr7hGQfkFJGe+-F=;j9_lVosc6DIYlad+kIb&yPw{Dz4|M-2IkRXMrX ziAw5T28xyX6k2=xNl+>UF#2(y!_nl6;?or^!TJcncBz`Fju4lI;V41Ixv{iU#Bt&{ zU?4>prJT$?q|uSw+^kz87)))tMVN)(L~3rumBbh%orB(ENMoDafZT%&cS38%X!X$zKZVKm`Z9hc#B_u0J0fkTp09kA9q#d981uSSs_GYxjFS0 zoLpOVhmo`*te#vJ#?r7#C&{D;s2ZD+#Fjxx`dMh?$BeO70hno$0~muSyG*(iOcxTR z$#>&*Y9S*H6@`I@C)v>wm+Y%2pK2s#-xS&^5aAktFn?AbEu%qE7z5^gC`$3}`Ld&4 z`nDFWr)eG8ZZm4PS)x@I`92;K`wxE=fN4*OsEUG-kPYpH5%Wsz8pZ69V(p3qtPwr) zsvDYJ3^?lVJM;bg#X|zIOsZIszUv(kDNbqy_G8iARpd6WNdF|NhA8ER7JWx^r;{S8 zeFCa0mGRWHTZk-E6DJeJdxPd%uS44nqvtOO>Ph@lX z{q1#dY`=f8q9u|(1oM8K`61VWs0$_QxX$tG3c`0dOV6li%$t5n!5DTCc20=x^_Ykp zpm?k-w7gb!w5_?{9F;#uxqUBpb8j>%{P4sjv}ZZ~H@3-jOL_XJDMvwdd1*sbFX3?a z)#|@_H_fO#a8j$=V3q*=oFSCD0#+j3myYxNG;|l%jn(cI>)`>?!beiKS_&)y*JZ*S z%GYN_b4S79B-Ilnu`Q`8BYXO`t;-isrFBHeaGC*sUx3Fw!%&rmzq>^jjhD3N$0-I> zmSTtl_Ck6%2kR3S(=ojt_aH|Fnn2JRwKq8tj#!ysg|{LPogi+8Gf(B#irm?|p(~Pn zSYb4970{6+ZdY7`E-C=pZqt*Yo6) z_|zwx+-{-O&JUYYa&fmPzY>$eA=I^X^*DoRcvdLzeT?G`SWYQ$#;g{YF$BJ z#c!q79shpeGa%P(ZEa&|zwM_~1iZWaW6ElUKJYO-{-9s@a;N=bTec~JpQF{fwBNlz z*7ebq++)@gcCyn)GxBdwI{pl&NrQlIs5%C#y5tH)$2S?$JeDj=seOZj)BCr|V}F!k zDrNYyJH|Uu?Un|X&8Ismxo}{*2UWvKzzfl1j3nD9ma^!V1r4q0ijuA3^wK1h3)+f1 z&t&m=VkNr)-ZcDcN2*D#O1jun$L=5H9VJ$L*g6^mln%3XOC1^h;%`16h@g$Bn z)yjZWJR`Ib-)c?WK4fKM|9fA$T1JnL!+WYF5~hZ>NOy>M*eWg5^0mF=P-#iKu2j~d~x5n4dudq^68x8d-l*$ zy4~ZRC|9S#TIHcvMQr*Pm3L1m9}g=>qnn02bhEu3Tc)|0qF&54%l^(}sAlzSMC@M9 zbYx58a{%+7@Rww7X7P#e@JmSAt;=Tbo{f?%IV8^i%_vc7z}beGW0|&$7WUMSVGMs1 z&IQ%)u^5G%Ex!v}=IT}NW^=ovSo_O0dt^U8U}xNA+UPLTSTRRi^`zGA8RPa~@9Xgk zk2JFU0FARc_PV1ZweGF@)a#S2zKc#jJG2N`2C)j1NI6DbNQ2)oXE!b&A_}kG78wL#Mo2}-*=Ku z_a+>yj^ckq_gh2xlFc3`Nn1ZL-s5DXzwDN^I(>Hi*{DgDny1^X_nkE_7(NA@8%W|+ z8q*9GH_L*2>$vJmZ>q~3ppSw7JqM?}3$>&`^m@$L81~ON_vf6G5uu2Qh8+SXFq^!V zad3q?)WlYn)~g%)g))y%=j|y287ljd>-B&;ZIn##)hf659c5m}eQz5nfz=usRnZ8D z7=hIDt-GVMmmy`@BuxZ(DE2?caXLDCU=)GgjtPbGy?QlfRz`np}}x;F^Jq6k!t*nt(Jdz?30q`?&WZ@_GyC;~+qSmxt#$ z&}iwo8dp6)|Kuf25EK00Gr_F&Xk_&@M_Gqg0`X$Ar;>l}yRXu#PLDbZo58a19S-xf z<&6zFP<22`j<&WoL=8Z)wE>tKhd4m&C@9FxAEVF4#r0sw4Ys}<0ipwp8Gr(s|29IL z1iOX@i3Hncr>VKpK*zTY(3c?-*@O=sW_V7?CelGD*Ph+MFQOmXw{2?Nyl!>2`VP=n zEy#nd76KJ;;RR8!l@E5KXoPHdQRZR0X~*;4%9q2Z$%uhJu$BjkNsgMg9jr;Gp`poQ zj^K_<#vy%RMV!l(D=GS++gn=-wB&*0YU~=SYS0=d>p2VxLY5t54B%8W^nAW z1>^I&x;m30%*T7Y7(;eEAOY|g8RoS3=jMJ@>q;1SYs&Po#{CaC^f-8 zq&p zsK&ump>*&sTARg)ywf|yf=80OiJ_Z4c$;LSrxrQsPsfjV_X_WCD%Hba1k4Ipp%b`e zx0lA11T=B25Q-^wMVulQ;f=WW>i;hlxfiEKJH`^g0Sp2Bds|;`!mD#a>=p=APvxqo z)u^P=z)NyaLDIyL0uDv-LX6x1KeHk6ZySEeZ{Bh@gvuG@C zn9u*h_o~xson{I7&qm=R;21yCg00*}ZWKN3ln7pzM`jW*_u*_3C0a1sbPI(p;-J?ZTL^ z@BXzUwm;^A61~I8ov|jc36+h6D6VJ}s#028_&UaZwEsO{RWuakvrg_^!n!<=0We)yilTwYl`;*BNHi_4vQ1qRO)YWOeaO<_j zE&a%QoYw^_h+$H8*PICF_T3u4o4XO@sx`d<3YX_LWj1>%Ky#Q-tm#(XpU zVZ<2s1#sG190hwD8aBB@DmEYwHLxtHhEfiqLP)m4CsGT5j?v}*{re^mc?RBOny`at z%(^2G8eb2Or|$j^2R+gqUa?A0Egexk1nPcTGO2YSOOf^|=2??aT3sXZv;Tl=qJ6** zncV;PDL;%n^g!z9sh!EsP+?&Vf;pTKjShul4@v-7FCGrL0i&e`0v|C5r}_8mi>AN7 z|Ah;m0ISu4*&Qk~_=*P0Qb!AUw1LSQ`_DqK$B(5t)_`or`A?I8CWO;W(V>-cKDMeabK&1> z`%SsIi3VSi?}N3dgSWKJB>RSp*1mAwTyL{&NGTEZN{ycRqfptjPGR6NQ086^O5Lc-!406Irkq#+MQ)BSGnW6(v6@1djY9{Q1oTN z1_?wh@fD^Ocw1ma6Q4X;gitCts9~!%$qKe8unMUAz->zHCVu+xA^fF*pawQ42nsYj zwsB)OKwbd|IwY7Y!$u4BM!z}6HP}v<4D{4CEMB{R)c+xzy|AbZR!jOEB<_{7(K@ez zWCTD1=ATWZ_E@O8*A@n;b-=)J6hy8s$c|0H>xVtx!d6&-x+IriNrRi4Bsm*sr8c8- zu)q;~GC@p#Ia%Q7aDP9u>cUA7ygxB57ExT4zbj;+@%N$d8=;Ud?QJrqXK!BJ-fS(V zIe42CjGBx}ZtAA|?AiwE23gAsuCaW^oo3r&9~=8Rqbca$*Pdf+af*s zPuU%tB|FVT+8kBv2!|E_v>SGL>c*C^R|q3Tl3O-Sq?W&N1h|Htg(Z=hupYtK&=5)X zflU-9=Rntzem5uQTy2^j7sc;YJhE3-Ru+=#%PkJ$dm$(}@i2Yfa-McbAf(XPOkPZPq`He+ ztjf42XnX-+3nQAVY>y_QP0W{M`~qdJFAt468QTTwZZ$et?Zo}MB=<4Pl}l}3;lEeG zZdO7qszGmGtb8&Y4`4PgD8ON(zka;s^ zS}}9&bJDniwL#TP1Ea#xiCqLTeFT=8JGd;CCb_!qm+&)9oyX#_z zw1EMuPA};u@!Dj{co5fy2a}XHNxXg+PipN!1}&rByKg3+FC5THoDA09?)4m>j%y$d zdBj{+E3D!isx`*+Fer`X^3acUQT~n;!JSB4ld-ObhzcxCrfm`W=Nop$7@Bw*I>w-o zkb?rI!LLfJGIN#?6N6p{801aJlDqn2#JV9s>LNs%J^@5AEG!Ie*In?K0xkxmK4eej zzde1d-11p8sEq-Shba5Lx0z6m>i~p>mmiAnBBbtu%XtF&3dtqFOZ$fW|IC|9{)Tb^ zXM7ceUs`d2%H?1=ixnQ11p)@3gkd$+Gq8PO-YF_JROv6voD>@r6{A=@qIfR8eV{h+ z=hOP^Vx(&4HJ4ghxhp2j0mjgOyHuJDLtoPac5k)w@@$4VWP78X6W~v>0u6UyZ{)82 z^kzDjc;>T#OZE566J18NhvK*Bviu|)eUC5t_6yKoX1X`rt7!T3=L?O6s+(Gg$vrXO zs@s0eGoP@^xIZhcGTr{QM$N86P4d#&SCw0d=N-udMFS@!_T8QHQzc2Z_YLiWzi&faA2k-f?Molo!kevjkV zKOKjjZqL20>pVZ}#BeTq=tY(#azMxFgDCOGo5yexK739Tt^fV^ZEtdMPjd@C^g*J?g`T=75@&uZu`8=cA(s(SX6F@e zmJf=jLyrZWG@c_gOB{O_Mh!!5Pc=JCP8Wu2n!FNz%2oSeS46z*3T;5-t%Bl}tIi5p^uj<^msVGMK>8d^Tf%$Fr~+x2U!sN(2n0Pn{m94& za$c}uJraO)7(&j?6BQAG8G=SB5R95-DIi@fCxv!r3fOoHTXlHgO~I;~wpUwIV{Bpq zn|C4@NV1OLd6eh_&Y$ElXQ>u)257J%{yYpJaj$~;J4jIf?H0@{g|^$Cq6-jeO#mKp0XX2H-6ndI)nAdl&H zUj)C-75OR0t<9qy|8liy5AmjQuePlvxDb@Sa8=4TiCoa(!pzd2EVh*BtfWcOc6`3v zztfV*FkeoL6Y@+mX-&K;e&Jn7v<>TT_N@)SJkRxteGju_N0Ip@KfN)UjKH>&uFY9u z>bztZ0d^Nh-#d5<<2}1%5gw)#v$gq}BN4GSSHFqe_nw@eWmNL(M~r!JEiZexHRKMw z4&C43n9is8Y$NA|e&Td{$3cpAl>hqobvq(X#dE|Memzd*W6#qcB6j0-2-$obP6H1) z`o~a{_F0()m&&GV#L3l(zWyj?XM@y40d37lD3l^`F0%798N~3gAiev`D7BYx@-}ZY z{qY7??E{t|1(uC^va>GD`xUin>m=7{KQ1~Kf8^2H;f>6B$tOIBJNl(*ChFBCBF-vQRTiTukVm>^H#=~SLcav@0_<^C%-F3v2%f?Y(A;%2^?`L6$I35DR zWHW1|Hnl}woE>BG~DE0Pn; zJt1gAG*>G&TUIkxrC%_3fv(t;0ZP~z72_|;l_I1Q=&Q_97GbSr6G0s5lUFr_HZK}A zy6h@9-JNRZ5&Oad9%1`7h}NpYM5p%Y!k40Y=H-sY!%S0R3f6N16}3-eDK3u?=SP>e z&dc7rzibVdBmZXNFD=*EE`2+hZ*$&`vew>ID8BVqo%PdSf9=Y5Vf(wcRA0J~)ch4o zJ3CFa3}pXehJv>K=l&MQC$C|w$wL;w*HiB{#hR3VsI!j-_d37RvE57@mM$o~OM{VE z&+lZayV9HXo$RtB@~NX;ClYSSjaC525na~^H*^C?hx@rX%S*L})?uaB;&o+}&7wKl zQ^p9zr@9k5al}0@M$*4|#rlyh?dzy>J~uMq%+??Ju0&x)ZdyjRJ;OE2oToO_(LK#$ zPC5uN7*Cgr-w?m8i%PIhW}T=KPC#&2ytHF-D0|2<`{JW`PN}2Dgr3sCdHw+Bur+p7 zyxAy)*3UX=rTu5&G*i?H&r}DS9@OVhps=a;eUTKy<}v473jLAzMA5mirCoNQ)GseI z`6WVl5H{Nq!MKmzCeLt6qF26?7AN&h5_o0D%{2CpqiIwPl?M^aI$C6yayr&3KRuD= zOH9vBFEh3G3Szy%p75bumfqB90;^oHLyPQ}tWgGiD7!bfN7`pSi2;2zgI4syb@no{y4&4 zrVOhayb_F`P>)Syx3I*;I%*}obyP1qz8;PNE{_?Lv%K_j_nS3V0rMAV@vCWo+|S;`x4WF-jnCPpYUY2K&!vxfqnyad=!( z(f0|OU(1pF!$v%%RBdf=KII^mZH`jIPG*xACHE5K$W}*Wk%$=G0|t~fZAiMD(7LaT z-+H~>>fcWX&^|9LqSQb9Y#YNAhW&rdH%eQ)gQQib!2kDAERNoKwSLqg%mt*^0Ex!D z3`EQ}mNN2TEcm?;`R`9YkgaL`YQX_uS)8$8=~I4Ajd&=M0{o2hn&v#96OI$ zOo+iCUD;<^AXheVuA26=f4>3=zs-NT9_0K~iQJr)X&JLoKrXEYQSVCh@Ky2o@A#8g zss*xK;`xOZTp_efk;4_*-?djKs+nq3wyb#@ptAbPJl|TcB5nA)YX1A>lejs}Y11)J z)8TEBR~P&KfBvC+zmo0=UjFFP>B0|ih>~=(8LJC4t6uh#z2oqz^z(hC`FTd$zB?A` zyZtAll@`~{z7||g@iMD&&JB0`d1&4nU%TMP-xhe=z-caH`>$df*NkZCx zlHNwl)Wa7&3ALu3`r^qu5nc|qDqi%J_9`*-2O}ckAl?=Ukg3sKYPP^iLw!FyR zr`iD$3Fr;Zy8xm|#UbOjbYcD<3_bD$+{gcnybLYxRzJQSBIDDLD3`Y>$hp;S;8QVh zgV!>AO9#KF*#0=$r1jV;+YMr~KRD;zip5&a-O=@5BS{?MSo@IoV$g-T*9AuapU3G} zl#)jAZP8*bg{JK3NfEd9dW)Fy!0x69Tm939a+!Tkv6$-IQkvn4^8HVaZ7ED*=1PF$ zab_I^Q~1fTfS1I0ZL~39<(2$cMk*ShPkIKz8#BfU;swKRJ|m`t-^nnjx-DK%Bnww; zx)e`!>{g;x%Fi;^V7A5I)}Jg|IcYKH5^>|=@BTd6GBPkW)iK%3nphjJQLd*qtD8UC zOyAR^bR%cj_WMUeEV)^mk`Fc`rLSxqe>r|Co~j=1(S1;nXmWu#q$wurO6l#8OdENp z2oT>_>?mmfM=n4YqnC6tkCTUB!*IHT8I8k3*=;Tgu&-P?ni>XCh)ws<4s|B}395sW z1BQ_veEBP3R_r$UheunYo=ygL*dhj>JU6gxnbH|zEgfcoiN+qIzf8W2WNFCzeoFYW z!K)*YgK$J39Pnt})JHa(3DgCK)CGtA1Rx&V zo;6@YfTSnDZCVBgp^fUkhlhis2S#ULA3+lW2}~f4dGJA6MkdW3D(tL1D{A2o=;okx zTk48eV~#0$4{m2(@Ba586&1(8SNi$;M}xqy9kR;eyQ(0Y3dHd7`#>%jUjmjy{4!SF z8F(`!((kqL`@TX6AiIznL#xd&=qr-|)i4ABe`MGGUDvuTa#=5%^TiJiuZ@jD6zGmhq!^19HFkF@N z6WxkPg8F;C--XZT8vm&Ap)Yf(wX{gnhem3yMXFND=p{+M4iAyPeRmYowoIP$Q%)&k zQ3%c(AZ`Hl0_TCHl@%34NP)r^bkPMmWmw-SEnfnb1DLmpWZ~}NAq`-HPURu(75ry} z@gD$OH?fmcmbzU;_*KpRi1L9uByC}nvOjW%*`d&ns@-$SBm^va6gVA_^D}rsd$Wo5ji>VTV_P#6W)w~{>G*eJ{Fl0|L< zsUC>OmRB@tL`0-!A6we}p1hV|3k@Y<-^f#3y1bO|iw}%#ZX9o)9)KAHhvEIdSL{o| zu|walZ4UQ07^W{Kg#ew8=Oz6P_LbWLvkHxO2f$XJlc>ufn3g(1PB?-l3p)z1i1Ya%6$;rVr zY61%cU@(YuS==leH8nLv^vR9jh>@v|a1Bys^4@(IimmdreX0eBp!LB_JVFpyO#_|_ zG|$#d{S~-X07-bHs;i~NuJ;3<2qy-M51?G&7GN%{6=+akYOcyxIfAca%nbYU3k#qH zyv_Jqf+E!M+@R=5#>{5|K?r7OJgdOionW)zb$B)0Ht)<#Tuk;fCS+9Os<*J8`g$E7%3>-t*A<6rO0 z5B@0M2OL)raAQaclNEf!2R;fd_@khJQ~F7r^`au3Aey4#@`l{=TPJ5{3lG7x!5VL) z$iN!=9rB$(>l*OW@5_Vx_Zt`~gq$oOit1Uh?Uc~(=bT1v2)HBwErOU1=C15ok2JUf zO;b2iWD+z@5zW$2oWuliRy(@%pE|v~yms5M9&+h?KKuTS2rIxr0wtDCHQv)5rW1$o z4B<)ReIP}PDJye^p{6-GYy)p7i0ZE`yK6O$jS14zUw?lOq<+>`10nC;!5}f(gM+V6 zV!(?DWL2S(e-5lCZLO_hFn%tkqQ`gQ9Pm70#;JvBy4&{PE; zDwt&s*NvQ%v=uAF5Hpw_!|Kp><@sVgNV^(?p@3Gd&;rOY*`O>n#OKp4z0&C;j5`I(>g^ibK{m2ZF| z>rztj?m)0%Vv7A{SwTTTczAeB%!xOXDNOB#Q30u$APh-@=KtZtDU(;kSb;DH*6%tH zwCQYxn5dxbi~9nvLX_M;O;A9?qVG5-%(g3+l)VFZI5iCoB<#2-uzDIBqu;o(1VY#& z2M32&m6I(kH&w%jHMO75{>#YFdo6ceFBg_O$Ikq{dI)|D*h(Nf~7f9=B`U#o`^;)q8zrhXuFgEA}7e0xAVoyA=P= zrcch*`S^wVkBO1xTriG=>Y{V0o^zhP|6z;j$-L})_>NJwc*|ZqEkJxHV zed#b7v$*Ff8($o(E0U7|s! z?H=lSS0O~s)5kRe?mMf0wWegII?T^*(bS%wo=zf!Yn&1<1Ak1gMNa;uW?EL2KUkPr zM|_TWK^7Avs?S|0+af>QJ9zw$to9b#*f^9JD*&^;pPW!OOTnh~N!h63ne^&FZ-njb z!<8GgH6N#Td=9u9zPVq?ggdVBU0_odJj9z0Y7VU=F3Q19spxq(G5+ZRZ`;fCPu2-% z8T02cY-{1&)k?I)|0+^(ysT?#5jkf09<}!*$nmn>9pobB%TP4L2pp0g{2pZ(c(%2( z7ZVnG+HqsbN{x%ZZDK;lo>DtkkM!`cshZ5L*7&#J3;Khx7_t-wFXC?>NxxOO@;Efu zLH@<*V)ho3Ye&|vEIE!`VuuF91*ap->vQr-G*qWYe`DGry$F5Gs@<>%B4JRKx?eyH zx~Ph1$HThUhq)RrIR6N`c4GIx{iOnf&%Z%c0%SDdzB@6N4D5DbjAC7e;xo7lySHUF zO98)CdadUqsT*5F^z2t?DDH3of8yZYKG8P5*$+*7>1xT3N#+YeXU0GJLfOt-wgg}9 zb@}QiMCf5ZBdIRZ94$|Otehm`aivQe8%RR-*GXc#&Obf_JL`gc>1r< zn^4cc&@!5p)KnXsbY2)tvgx%&5PfyI^^rL#BwoFcllN?PTKMrN(@K}s&WYr+A7Zox z29sAS#cN}(Wz8Z7JxAtDcMYoDw)V_Y9`v5we*dW`+yVC^%M3LpXTQ{*(rxFZ7q#U~ z>9<9_4UD>cC-7b@lISu&VEXp$8{~9;FL<0iB)W#29C=UV)nag&GZyW8d1z=%@zE~w z!oxZK;E+MpcQj+gdNpmcuy4b4oV8A}f~8SWNBQdVXs=Z<)FJ7eKIRvMc5H#lWc&g# zOr_R0?X@+`=_|_h4%O8@Msd-}`)T!xC;vOwoO}i0boM?UiKl^Uid%x?Wa^i|GO7{U zm;GOoVmnW2dnv^>O*@ZI+Nzmu_{Jm%3su#dZ`(v3*T-)I<9cE$@*dYyQg`&PMnpOf4eBR(&`H4 z+4t&nqSxILcUVHEmxvu+4}YODl9KK2UX5%z5=?5FtM+`g)8pji#LBP^FNYOvnVDn^&GFaoh^Jc-7Zcl(=b3C|HS?CkHqkO2EMf); zqDHN5^^L+?b`ogPFYbCRA$#Rr+$Wwar}2{Yo9sQdZ{_)rv^;$itlDyS{;|WR_uk(t z;3Bd8QK^N+)z64r=Ed(7{LvOf>JlWrl6(`<99Lj^fzc@Ne?kZlgXqncH;)Co`ElP; z1rkhvA|b^>U|mH!+aAhqGY!6`hQn$=n-kCi0u-G<@=bcIVHZLeb!{kGBd*T zQiiPzehY=)wt+|YOJ0Ik!}%zRJs%b3SOfuok|P^f8IjfgDk2spstz^)QWWz)7PbrT zHzsxTXKmvPfthUqtI~P;w)aqfB zW9gTi$Y%Zj&W6rDiK4fxG>q)OaR9^t`E0}y|XJ>&u zK)ZSKom*q@*bj$vD3E&hfwhIA>;AGT*aLrXwEtS#19nzdN2jqD7TD&2djAj@?*NyO zfn)9vZ+QaW{Ob7dWjNINtys(h zKO7b~^?o2@IH1`AO0&`w9#mVUTS)5#I2a@)8-YWE$t_$TnT>%UgP~ja4?})HU@YV` z(f2|4&^fo?WrL@e_5A;-?*b?5yr_&+aQnC<}rik*-H4W0_k|f3(~k$O4}39Apg)xc!c+eQ7}S zrOTMocR+MuDVTU5RPn`M5Lz*Q7V~n4xm}F2*GVdDCf*)EkSUniOJKnC*QTZ>2;D7) zFAdH})3iBIBm^Pk)HAqr@4P`cvcfp6& zAh0Mm3ZRl=X)&K;vZFa(|WzV|1xva-^jkUs5)@*D`%kDU7MAXxY% z$z<{gIIIOw=tFS(Pu6?f-1vmliD2cs7t>yNuaWv>ZwdROBWUl+OG=u&r7>ehqn1w& z4h|r;=brS#(lQu;XN-gS0R&wX4^Bb41(C*7B1je9!D>IU+U3Xw}AdN!q5jTtwg~uE(I=mU)nZlQVNI>d^FG98oQpute zPXZ(*Nyn=|rP0-k)Q-TQc^_y5qJO%-N&Z_70v!I)sb4@3U%;FE^L7>OP3bB}P#`G8 z0tjI=y4VqmO@!*m3=)122sR+tGaya-Elp4$#fS{Nq%!p1(B!SHn?EU~qkW0b=={L4 z55k??zFFKQq`TYmF-ju$U9iiC?Jq(46Q8b zQ~b757UrLr%hyJ{3w__V?seH`pqDdW3S$;;F!HknNh#ob%ZtA*aV`*NkBL&j$rp%M z%M1k@a#Ny*TNV_IY;OT~sdCvAf-x<>=(3DF!R+P$!Oi!yOD+20aREM6zu2@LQk=lx z*)=mmi$zriA>zSn$QVJkqsKm|8xK|?{RHY+caXDl*TJg=%1`w^hsYa;HKAxBwJ`0?{ZP8> zXGKtUK&)LH4x9rLIQmArCL}0WbV$W#boqR{7cM&JhT>RHN1WD$P6C();<)=(?}6y{ zaDRWI%!+KvDzWmX!T!Mk&v_Wgd{Qowv1ZZHwF4y^ip6PjhuPio>lMS|?qV!FdaV?y zpZx^Cp0$rbV23;J_hs!@k;$jD6#I}=icSk z?+5c|FLDX^7v3g6CiOJf>AJX>RxC2Zumt5P^Tr5d*dDL;qY68KLkwyBsGzFH{Nnt5 zeseQC1ikrurvJhS?WsiBQK5c+zP6gHwoibv!UsdWOPw*~W=m{a;Gu1!f(c0@FM5(# zE-w<6Fy}v^v6A||H+ZLn-^_&>u>|?&JNx_oHL|3}WKXlf3rklE?;k8Xl<=6Z%<{*B2J3 z3Op>Mnx$EJho>-neKNjLlMyj#Hs3rwLBDIib~1a7_UfkvlSfq)^TtC~FU-h6QF1K` zG6E7ZveT9}F0EsBR!;Vxqoc?Bk7oj|d{X0Cf6uhFtyoF>NwS=+1u>hL4C|OF^l55& zW8NBNad57QoFSu~(Tb-W{@}}fj2rxZ@J`mhi+X5eUf@#^LWC?Ezn(OBb|_bHiDAZc zc+Lb`>c6V0Ng4KRc)GvC-{!LIy)g1!r~I+UCp(c>XH(TD)JtDKA?$=Mes-=;6}1(F zBECQ0_BgIA){2)LP>xKA*UTrauxJ)4xVLRZwq1ANv2eJtRHoZT>*JL5Ow4??#PM1q1R%G zdunpj)jF>Bda;tS;=4-a^3Kcj&WppNssaPMbepHQQXb@HKORd+*7;DHJ(>BsTBLl8 zZIp%Go={P`FMY*sveU&@yW^YN)o0$~!2Fq4oRX}(4@12?w>m=U+~-CA^*&-KZ8F$b zx%HUynoRK0sIYW(@Y?i&7lie;$`5($P`%1L6;5Y0><89-&Q9ImJ9E@MM~njxG)`)6 z>$%GDa6LKTCE~HnId9nzkoZ>K{Ykj`Ckv56_ojkEx@oj+Mzyom%y*OezgC&$ucEUU zRgY_`GH;EUI><*owwI43ymxsuzV1h(*>$SVTR-vBng2piDQ_f;mpaqU!}b?v0l+|| z)_R=ST$&C^dKvw-fkJ$oHP4s&lPCDM#Y~4A?~|1Dn;9WHpXgILxBNPp4j@m0yW~20 z4X}0ok`)xra@AcnL=Ec1N~TpyCk)<;WzAFKT`-*D?IzvIr!CK`JQ92GU~i{AG|)1( zljBqSFiKz62g^J<#E>PgJfjNH5~jRN`DCnuU2)oF!<}zB!oK#2po<1BxFnhjH zMlnyRUH*hFJmc`9MwUA|Zg4#{WE*-S(+AopU}xcy22lEh>J#7WEGyZM*rFpOG>Dp< zJETt&YrSaKvn9NHkb}tK>(n*Z8l~3cJN>w6c$barmCazf=S6}AtsZtMmri9N8|6-A zvEwL>PoDhYL?1=0zOmtFuhd+v+7DxiR-+lbi9$(J+xjJHHfKALWCm|x^J~%B^jdd+ z(`Lt8lHfVb^I8+5tur|^a%)Oxe!7lpOlOGwImyNOZyD!2m!(|sX+S4ye5S-()tv@z zEP8nDA6Xf?t(-&AaBR=(<6^u;adkd5u72jayBK~=8*%J+yX75%RkLsLZ-{oLSI+B= z;l9H`KaI9B9f^dBS2KLL)Om77SH)jDbg7_0YHDm`B&?E4fzlfNoX_3WH8_4T=0gQv zE1P-)lO-O@EZs+DB6q7h(VXYAx>RcHAOjeD#3geV%qiIK84A)DzkA)Fq~&_a2_Hk^ zwEy`x*e3iL<|;)7Olv$N=)AB00|(&QLCB$TCSv|C76Klpe`b((3q5yNKQqeWx1#*&8g~YwQ#u9yJh3vl6by9g@YDNYQZbHOX`-$k;S|mg9GknI5sKL zu6%AE)TzMpyi`1~lrQ8kLVSXQQFEEZiIK@x?+j~aubTQ-$FxQWfRNpF% zvZebx4loLD-BJsw9Fn+w$fVHY&=JfP{h%oL-@%>yR(_yG7!oHp z@_!+cW@h4DDm$HONb5v+MGR-8*wBo-_xU}?eP8rBbfru5eEx9yB^k<&=zi_Ro>|gQ zCeO;ESF-`HvroVNO|)85`qAVNxx%aCCd)35`F-?mFWM>t+)KD$OW<8;z(%z`?07>L z_7=YGvP@1wz_?F1;+5Xe#B8LpSbSjXBjv{}6K5Lv`q^s%=~MfTdW(trng!q8dgLu_ z&9-NwzJD@_*A^U)o1?WtXTvVK$0TRh6L%J9+jPPL7W*W@eLSl)NJJ8IKalGJYzIG{ zH1?-q%+)W6c)AC)+3uTVZoWzbc-vlg1mnjWYy08|_k!&Fegx3X)k?*CPX0AWR=UA9 zqOe+L)Qs`CZvD;*yLPw#Cnvks{qx!S^{gLcx@&^#w+~8gtcmOloD&JZcINEb*RIMv z3(KP&L44j@dH4Q?rGAvdTCIk&OSuMOI`}7ZQ;e@`2umi8a8>PL(&t(ZH*a113cFyo z-W5IXJJJ<`m&2)VIkPlfy~r1@cB6%-lRo=fM>C^(3T$l^e)0c2nf)QNCjmX$-CUZ| z*wRu6&cJKV!|+?ceb-B%|Zy9UM`(U{yGd= zsdC;Xu>Y&3b�IUvi7{r^8%|n5<3$o_?L(&|BR5ji2|5B+!*->?vGT@wdct`i_%V zeM9#}MNLlPpY-yw&TU|xc^8yu&5#TJ8BXQ*v(K1q>CrSz((cN+K_*|bQ)lqP&hbx% z7)r2~yZgikVfv)XgMzIck-NhNTCQE0N9SmBe{-$RSK8?tKlS@qiv&Mf?j=uhoO~Fo zL+;&bHb(X|G0VAS#56Fml9%1Qz)QpIFwv%rQf#+UsPs$vYPj4(m~s!$O&t*b;E64M zkBWW^#w#I>?%>NaXF|T_%Q6fYfr@{g)CD+1SM4Q~*a`iQ4L94gk)@<^lgTv7uX$Y711i3$d zVqA+*)&DNFIc-zIFy@ys-krQqYFmD*$KuiM(K0QxrY}nz5gZn{C7wMp z@6ZG7lNf{~NI6G^=?88@AAt8wp|Y!5$g#1cukB7hcp4B$Ha)6i zFX15@|AU?RT$+mS>ZJ?0@{!opbvva#E8mx+y1)1$IO4R0bRAWdR9F{ZP0fU=W0hq~ zkUtejOe(Xo7WG_f%m@`m9Q57|k7>Khc<bd8s<8C`>~T`OvRA}yiLbh<81=%jpd z-?8`a^WPB@RU*fKe@LnG-L;Z9s}L8@CSk2qVzMHU^t&_+NAwxfaI`-&S^d^z&Z#F< z>7jV%@k>8>0**l&O)FkXeQKS&j-e1vg_D0$49LTW30=UyLZ(jzc!&NA)r0V~b$`c;Rz>Coh7 zP4CgM_;UO;mz+fZ&~U7Xw@QfSfHo$3OEW!%IK5+2LKz;iJP(vqc~V+}rrrEnp)vza zea+sH$_ut0SsIc%gA*(Z3-iXQlN_Ol8pDw^N_~%uhYpU8!g-lUD4qbhnzzphDsk>m znSk5{_}QMD*eD-AwJ-F|TK$iMAd((Wf1mB*BrtKTjt$gssZO3wUPM?}v-(wZr;_o3 z1rH^7o4|uY6r=7@hvNx$9rO10Of39PU+w@@w;Jm2@1LBUtd*e3EnuOOt=^beTWiab zv<3ngZE!RpuQ%Y8@`Q%Xhp!70@xx#khO8F5yx4W>Dr*~??&7QnW$?Ct?0)my_-TeJn8iS3$4w90x{ZyEkLe6Sd<3Mm{82*e zp4PKp;hne$NTzd3h@uq7J5ZK1DTzg0_E-5K&=~9m#{RA;f z)DQc)MhMr_n)C603-tTV=*{)@(4FQ1>F1(50An#itR-MF9a#0))Jlnb-7_LPq`OmGsLo0N_;XeNh$n7h7QuaQH96#+QZ|n3w?6;oiCn@B|D1 z57tTuUR||Nc$4EE^$0Qfh#dVyA9J*?$@V{5K}M1g=?4%H28k$#tNl$QM-%nVlFX97 zFDA5;u3CF~0A%!r!;$P?g#-q+fP;%}79KOex;Tn>WF93;1>l0+4}?sB?wsaF$x}dL zGWkcyJw4c(n&{||XCFr8CB1!{^MwE>07I~dc74`=ZKM5acWcs~#>+Dj&$a9s`oAesiHq0UAs)+T5U%GyJ}ATOd#;Rpwv%yD zQL7|%%>@x}SH!=o9Ws$Y@$;mz=40G@p1aq!HM=&yC`fa0HwmSTi z*@_B%Dge2?$oCHhpGPE11nkJ9Z`4==QXP-hOo(zFsDK+Ur6CdNg`7`wYX7RON-H4> zjRZ>G&#;VR*sK5y0-+GY6oB5pa_y8x5)u*^-UE(DCu%n>LXLE4z+%5WQ{VQg5$zw)Zac|Sa)W%GO_yGtHDJ3K(4tR%ebFXcOK{Bpk4s>f|5Iq!OGPVO< zcPhzOqkRDOkl}EqF5A=L8^Ae0fK&vbva<3Am>rGho0bXY5x*YWiE<7;36w^{bzcyk zC?p9GXmDEqsStF(uNmAT~WSc$P$J}P&|Y?%&%Y|rQCE^C@}7RIJ{}0xiDs( zhliQ3@a&*YrjP{HPl?xd@&~*^a?e|VyV03c zIA4R(lM^F3_mYndRIqmgM-6DHUCUfUYw~Yvms+|bM0Ov}GSx63+}!7rFU@t|$vj~$ z%da&kGQQDFS~CnWqQ)p+h%n`-SHr+jD>WcNFF_#rM$C2Rn$8YfXnazzf(5wxk@hC= zvay392QLrxuyx-PggnT3b_91mb*3fJMW^-Cn}V0VpL*zXOpF>ly7ZM%Z|04RV4w`H z5?Fsyhv@z2hd{iD;(!^5*4+m2S830FnPF@N1O&jECN(W_he5QijBN;-lk_8DzKI%m zTS5^?KLR%7(9E;bQ%MG?S>rDH;(mvF&v5<#`BgOTO9?tS@tW==!NHLc(j$QC8zUZ} ztPwrMUNspC{1&ibVuI3-ll(4PdNe9MhS)z?}oc0A`liibog$eaJ}Cu_$3bW%@tU; zcKmgMvEGs9a2;f66&b_bGC#t>Scmha=WG5++5MggdmxS;n2u8*j${{rO%oFn(~5ci z5O${pte|{#}(oIf%=MZ8IxfXEQ|x2*un7!unFGw zYf8P5mZDSIH)S3Vl0gh%3vCzGF`yAtsU)$2NHJ7mtH}ZCKUHLcjstvd1V3U@w=nVz}CL%&52_{8Guf_Iuk^hpMxPa&c6-homKH&9ahzgw?92)!rWP*D^ z%a@*+d*|L`9F=Jp(A{THh-Bb8`Wd0g9ZUp3F{deR{wP2w4hdb(^!u+Lz*3?Sd6m0SA7H-fh zV&mTcSwmC;xSC?1m}#ZeF1_{8^9%L{dlR_V=}n*A=iwo??I&0!(j^cU%_mMdW=WtNbvMYwKQ|0y*D&K!nNG|1AXqsoDRYqB{2bJbA{iNg=B!?RvVwl+#-t~6dsfEE<*ZKP6rl6iA#}wcLU#mV?6?=WPhdtS&DXPo zKd8@II<9xojW>tU!B}V;AZ_|I*s&{bPTj1uBPR`jR9N+3O^ZPwF-jzV4zY?w%kE&b z&mKY9VL=lDOb>*w8<+M!HU)Y#@>!r>({stP^hJ;^gM#W2N_bBqKi(O}%{bJ1;GFG- zlkO7=Z5|zc4Jk))RKVCYZaujO#Nv$X>dG-%PfTxDSbW_Vi7B--5_&YN@A;N0 zU4?36GL)naTRw(hNhThcX^s&AwM8)B2UzhWXMT^3Nqj$ooeLhKC<`RBI90{Fm=kPjC4FYSh-*(EWl zDlZk#q^yl--oxUEjvfSivQ!z>ZGPX~0JhamUw4%oFRaxdGLwD*pIqd5p9-YRMiiz^ z-9O1%U0!}`BItCRn1c$RC&&p@{H*F(eb5kqY^5m|<_3_92B4vywAD44L!>0gH~cb` z;8p48Ef;7|Dk?93%MdWss=}QD)UCM72DvaTGOYqCC=+q`Ea4r0LRp9eNZZh^#&6?( zl!d=e{s`wmqXndF6dAW*k+3o%`ce|jF`NB=_bGNUsar#gd@K4=9G+GYQsNuG^eYtelxz&X3&<28iaom&G6}@KDxfayusx}@s7e9 zi;Od@Hbn56NA5L!ef=UL2n(l%Eb@pu*X^P@?G0e~wF2vb8HhEYKx?DK%u)R19!6*x zg1aga_1n-sbhlaMj_<|$lX1|B1g!{KO+8J-Yz&s01N~EU$WI3vbZ3{_yN~m0FCBoB zgHZvIU&X})oqbPz{my5om_mk@1~Zk(S73B)uv_}|&{k;C9<@>BQyHc94Gs>%u4PPf zdb{&lu6eVKH1kUJC;a>LRSxcPqQ_0NNXK0SNbxZl3B>#H=&lx7=X!2jCJ!&_kZg^QVWRr z3#n8w7bIo{91T{j5^rUaU@*`iHOJzSK(c4_hqhf&eO^gB0&O`LQiSJ?RaG*IQhy(D z+)VGsefxi?G{pAYT?&-_cy*=q#E<(XSk2}~?`qiEcy49>*yiAWc(EevIzSLB8~o&# zz1{2gJCjj2k6s+uYWkgIJn6^_zyE4UE%FpwMAh{#FF?`AlELauyA|>ni-(J-M*Do| zj)UvDCw-qLEG5R(86%3VZ}Akr{=pMBE0X}pGGU*XhfL0P zQ_9!>8+s$*8KfRP>KGxTFh$X*YtHV*aj#6{oz7JJWySHG7iiym_hy8fIWma=J3op2 zn_n|x$@{8ORk!LzwWpHt%Li~hfaHBH=ErTxGamLs1o6_MUkN{8>n0aPn{xOUz?54d zsQJIz>D&?ySEDyJxk!fg4RRC@P5@dseg-MSuw}*F#x4Uzg^v;LSXLStPHna z{8{1NIqFq=tTb8OQYnCGNSE`{K5V?Ee_g00*O;g@KYT{y>fVaamjBf|<(=-W=d2rC z>>C`O7s=MS=2=J(iy<}&OOj?E?YnBE1 zY-O{!Bn`))J@ZN9uAbk>UFoUfuy9EZx}d8e$|=p=6+;)Vzu~#h+OITwzlqq{Fh9!* zxUMTjclvC=T+RNbrx7k7?-=LB+Ix+36XZy9qy$zkOnhQy5bZU{3D^r{A33tOsbK9B zmu^Yill*$RQKOewAanNi``Ji2mB8_Os%?*=`~*+RMyFr`^ZF3)Np#8RdV%zeE89Nx z`*1V=FGCl6LAmQos#aU0s7+HHOGPI({iAcZ8;Ku_jBd93LF`n({iqKmqjRr@$2}Fd zKPb%=T!+N1fg3^|iue@dm@8!8`0mfGk(4YFmP+O_zm^F7GS+=-Ce*R;XTf10! zI!&A8vxxLyCM^DAXXld9sQ|QH{j$`2WIC4F>}$pD-Q(EheZXTd(%|MTkmW7zcu348vG0nfeE%;`^IZ<|HvtjUSUU*eDNEf`wPGB@1jYpKHEQ6 z3yhDWN9u^4e_Jsis^`nzn_MsYoc44C7Do!0bdciC7r1$vD+)%6461j~7N3%%FEPPl^*9U9Nr8zuQRIY`ykH zU3yXd z`xTye60_{CMnClbNwerUI2lQXUU?>%JMfa2F7LiBSJo}FJnzfqC!v1r{3K@t^r(L- z7Bb!qN^g(-Se!3X+`O6FG}^O$us2OJUS?Yom&|bK`O>Cd$)*~Yy!`CsFX~EuvcaUu z$@C~SS*2Y=7C?1jT8^4`UzLgJwjSF}IREStRc0CqvEAOQD7M23 z|Lwg#n~UhyJ)GH@OT#eO7Uo%zTsNWpsCXlEDKKY*=sw2tG!)z7r_rXO>m zcCB6l^_zh$dtO1WZL}^tI%ld%Px1~;do_}=X$-4b(*{!ggCclTt*7kI4r9wYo7gx7 zYRskVBIEF;Ei`f7bn1IGB#2iO=&LlGFU6WiQx}}uzcBA1Xj9r+zk0r(pqx~>JoQ&N z+U%o^V0l^IaxZR0%9Oyapxt)U<0DS;{+}{VX$v4f1)*DUQ4!1#1mmH-q@bvnoR&Hi zC$_!AV%Rj2WS1r_?9DtPO78V@dhG1Kwxsun|5zUzkWp?qr5atJIGISQu0LLQeBQ+0 z5K(jAD27U?Ip=)%qeitMKO&aDzVS`jJr5?vj<)}^8gU%*+0)L(1|-zHl;G!6gJgcBycT~90RAsGqWQ9h*8uGEIzM^V z1ynG8JduS}#!o|~)CFd+=Ty~4CP47=wP zIRvWN1&JdocsELvCbA3) z22pewpmJ~c^yyPmQ=9ieXGe!ccO(&L>4`;2?E4Y-SsoMb{U7pN_T2?33L}WPPBom? z^SS?oVA!nNZ|RGKCHyIX!)8lC<@ugRuVPtjOajSQxzYEpu%7bY@m13S@xDp|ttr&~ zmgt>5b%UnV+Mc)b!B+f=qMh3zi3Pg#U-5yz|2&Epk6;@p%x9 z{Dmb&P&12wI6y$fI{Cp(O-*nP!}mpm7pvErmJ&;+#?Z$iffgs+1|AqJ!TayDApICY z!Ut_Mpatd9Wl!J;U@cF>e4q4`5_%?TYK|aXvfIzs4Z;VZmXk3DFoy2lx9k1s@DCuC zFRm^g4qmeY^@s)1UOc>c5d6Zw05&iE{K@%bS$nFB}-an}XMfj#VjX=}CvW^lMsRI{d(t zkiPT@5|M27$v?po5;*8qLk6SvriWki9yc;tk^ovz&2re7=W&Yuzk(TSopAhH*v{Gc z!^Th!3^a@Y{PkD69~VnYuY4;u9|6Yd`EG|l4bo`ArJ=Tr&IczVnRs~00SyI@gDC&s@A|JG5)gtHUcwIuS(dd= z=4U%Q6$V)&;ByDR3Jn%7Z$-DvbqGLTf3_!aqF@OF`w$E8ykij<(HVoDIzkjOAUB-X zE;9ZX2pkTInIe7SLnf{|&XFs%Vq!IVy8^2y%#&D&xYRm3JG%!Tncu1OJ#pYa`enXU z3m0f02IyaGPp})Lr^DSHtRZfFi42IILq!N2eu^r8am(|!ua#3l+Fim>A_#Wri_`#K zHR3m5Z&80^k=?C9Z%rROKR1^c?itj5d~y;O9o=cbhAS(rrg&9wfk47OOgdOI^z36j zXX9|P{GySs)BXAL`T2R_TyJl93p1%PvPcJ#5#^T4?dpt-3?;@TAKHSfmMU2U|0gf+ z#Q6p6%=hA7Aua2b=wV@Daf#HTp!zZXsPHv>H8W%A6b60bzuDxeb`?4VQHz!s4k+!q z1HXYHBzhZt`pVhr`t;KUwGdX7)Rm^!ui z*J|ds@BN{+z|K!lMj?*GD>L7$#7P&jJ*T>A6OSPvaC&L67V?BKrb?NrHP5 zB%N#@HBp(|P&tLkXo}}25jI{qZis!LCc}iXx6@jPe?H@DhGLZKnHmaLp&+5T>g+HU z^YCIqVu?siiYmzEG-rQv^cu5N5a3gSuz5ga09-O@^M5gz&hOMq+%1a0A3hzf3rT~= z<@HJqOu`msJ z));UtLzJ*;y{Noz3ozi4OS5D<2WYLc;>! zx1;x=qRIw6%ls4HkI_rRfgM-wraoWg%)^=d%`pJgiDXkr24%6U z$VY{}6;~;&xo*!KmH<0G7|ut_H&pp2DE(UU^oy&J{F}+Xn)Q;Ulw?_pAk5r!wzf|f zb=45Me9HcRr3t=-`#dE+O+7<;w+04AbtzmI2qnPt2Av>v4cAimLwbzt&r!g=5zWN z_R8z4AlgDSWH=$E`q(kKikY8=(9%rOpVGfgf(UjRYsQOqTI9TZuo8kSq!I2tquDxo zqn}43cX)IS8Tq(~%?UIyxG_}QuoyD76OhRr~85JfS108h!{mw6i;Ayl1I zah7GlJ-r}>pqIA5h$1*CA-I1-A-Fa4eR#4;6J(V3N!DWze-qh@|8S z9`MTIz}AG=*wDt^(flq5)rX+=aCBl%yxJ|gfQz6Lf*RFDPQBv5I%ZGgRKrbjiLj@N zO_A>ae6=fv@0u<bbOvQ>@|^usPP7b6b6`>xSYA&X&rKAR)nKogUq-noJyf~ zVQ;V)`3V>9%0Dx*;r_2t^^WozU7+ou4(ctTM4v+D>OdL+R0fV>TQ zY9;&b$MFWT%ax0JI zgBvzs(`XvP3>pEbJDBbWeFvZ`@h;Bcz3KMFj&!~%8K__aEl(A3d%eI95~docw8eZF z>D{HwlIR8YG6iG8Z;@z8HTM)kcdRMGQyPN1tyeI<;R$xf>Lj5PUhWgjQ0sr=K?-j) zyfzn=*H)}#jG4j{q3|r#$h+0j+)Pin!~p)um8dF!wvlBrD9zJc^Gv&{8K9ucj`Vz1 zC-|PQJ087W{d&-F?-{ZYOjmZd4CIEkUjaG8Xb0oXeiTA0#V*`ZtIx zL(7#HEuzY+1g8j>UBjHf=LY2r$eOXQC|+kFF@+n*!T!Kc&G3nT0_LkhthdabH0uN@ z5;mBW z?@$mv)*_USgRQTu#r&R=)$+6q$UewJ$o(j&#i=mODTKAtzDJk9>cq^g4E@vqWqN}M z0md8rrC?1qRgX`dtgD$35jR5T!PQAG!62upsab_JY|$&{wvVA1!jjhmBTG8P zcVH4M;3ua(4VAe%TvK;-<-`4fM~jOHf}xZ0CbWPH!!jIv#rQ++;NDe=FH055C&lof^nTmy#5g%b#HJ2@L1WO`luQ)op5-qn-`iI zDDq8N8UEdeSn{`3I^CY4$nu$Zl~6z|iTkeb!B5l^BoCB_;k8Q+v!qC67?U{kD*0A< ze9`2*_>|aWD5h&WJGkf=VYBb`IfZV7VPj#Eq1$)XGNlmK(vJf<&I|7%yoU^T^LX!( z|K2wMDI1$vV@T_wNYff%B6CL`(c3lbucjR*@rYh4JsL{jeNNO)k!)!U7spkm&OUpEg-bWK zN~p>X-?(mR*&?bf{uOb68ks0*KTG4sJEfR}K~_vAXuLpx>xA~f^scGRd<*dWjDfe@ zTqZ=2i#+%b-54Bt$6SqLa6dA>;tb2PJ7D*wjE=xnR zRsZk2Rs%@=dudvD52#?SWL=U>hXkWSj3KgahR zSWD?dx@gyJebpSNVA}Mx+v6r+j@DZ1BTJ#>;>m zTO2P<^mVNvj~hIUadJKKqyY!8mCvUirsKVp&jwiG$%{)^7d7y6J?29c-ZH|-on z$+yA|zCG~tdN?}vca?50gj&M&ZoZvojpIu>uB)3tSetJ4iAmpRqJgq)7f@Y<(K=>kB#;Pn*`J%+$u$2h1*q_gyeAUYL%iq&^&u z8}PSKh%cXX`uvOFezAXfJ1ge$1Jy3K+{w3y#LR#EXsX>Ol!tE`vWuuIl-yE@d1AIM zZL1+EIJ1WIOCRp^+xB)tQw~;|+t`JrJ_gs+TXKQa${((m~B`@dLK1urh`j(I)US_96GOZ4vkytljo zElEdffa1S+4jO#jwK{?SA;ejaghPXk*m6E!wDWy57(kId96}kzP?q*-#0m2 z``qLE0!~}}&hlJwkw>BZRkL&T;zK63IiB%aZ4j=_DS`){RIJ<70J{c1j*j#%w~R{cdHrhYZkGBb75dZ;!2?Y#5;+p>VH z@dobZ)O8{$oF&<}WkJ5S@^+55pJ)$c2slIaQ3v7iA8)dx?Wuh<3n|3FC=`*luQSqI zSh6Q8d4EA8;3bpH$wsG-`kh8QL>8Qo>JJT{{Nj|H677G~DuOLgBk|68iIZGb#onNp zNiV?rk8V72c_96kmnAutf=r%JmJ$ffquEKV{C{j|V_nke$(>im)bDO#=e7u^!&dj; zX>r)aU+yOw{Y13yh|~p;@C}kP-CF0eGMQ9w!q?OLKTdw;XjN8Q5MB zY04i(k|74@g|4z$t~c?=4bRe7KH-w=A9S#mo>J~5UexubL!(iL z<<(u(x`>oDq4b_eeNeg(kHu%loyGNH_u-8}uw zA^4A^e?Qg4@jx}GrbTVxg|s|CUy$u3(&DABqWf>ApV-*Q-0VOS@%)9vi|!WeB!#QM zqTl&-{~4fePMaOE1V}e=9nUrApXVFsdx>&?a~Doo3B7gSsLo~DVzr!Hr+$PNIyT(q z_x*RTX59Z2PVX&g8rPe7($=-gw7IUI4u>(_sQ>$-{Wt5F$?0WOfSG>QBQcu=`A6bz zrQT0n{S$s?fA_NUx*+-7I(FGl<(B~N1jZ-#+z0~Bu%%~O7_uouKpje(Y?Q?zG$n0hJo3Zpp-g*~_XIHOGGyFYFq*z5#Yo$E*N2?DB(soWnlEUYt zmmjw|e9iZ5y`PrNQM-M-pv9X&i@VCz5Ll?%vdv=_VEyOEC#HeD!&mDG4y!Ykhsk$# z-Ha;@2G#3xKlzN*zi^YtGOm&B_#$vM^;Z2iBoQqvPA#3p$Iyx2-#u@-p-Fw^b8$*l zve686dVk8BO9VH59K3w}+S-=Zz0bND?hqN7nMTIOpprfXi54_ez<>-wTypMzpS>D8 zq%ydg(BA(~p2Or?oxx2;9#`zEWCBjDv*VV%$70bAI@cU@^*UViWG488xM?1QkgfkO1J$4QpT*=_!DtE3Kf zCcRXn444T#PR6a)SL1Hlg9Ri7;&F{?M@x7f1eg7$<%!NZc_IcYCXJ3SFWCCVKHd2d zA(^T_;M?3#c{y73T0W|Eg({APgX2qgw^E6oh}~#=Pml74$;^xlbTqWco3Q>si9it~ zxD=*Q^h33Uyisil377YEy`|TJE8R-9cE+X?<2#I7MaZGlbmc_QSCpgn5(F z{jSaw3Y$hHS3?4tLtb_#Kk$cEm72KLfX@ui(Rmz)o~(q|RUOQ>92k8nHzWwH%g(-K zq+g;38tZ3XUJ*Z3rpCtZ!JP-S&Zq^@H-Juo7=xGIt@9@j{?c@B(SEi7TGE|6AaL04 zOnV~@#do7`7neyMh#Z@e={;G^^R0IKZty7Kmr(U(OO>XC=iX>Rf2?R$1O3Z>(ni}D zwiPRDY`oPvDG{T1l&G>7o0G^bO&+H&!rv?Wnf)eS?sw;N*^0`A$8KGi^TP7YjxJ-* z9iekSgA84UeH$O)Y1NahnfifLuWv>|e}15qsSvl?t9|wyy5UzYQCpXNF?wOPD}irv zEub1BaUF0COu$13S^`BN?n66AYX~#yx*O@HB)?tm^05poJS7`c)n_>I)OOTN2$-uc z@^JQz&PjM(j4|_ze8;px7d#Q|Le|dxXPy`C#%@t1=BVjcKFK#$!-5FEV;5&q1F@@X!6wX33W&6`wuAeYg}uEvsK5Dh%l*Li2N!d| z)S+%^3p6iqhVVY=tL^UXoqDeyv!HjEP>G6RsX;907tuQ8e*TNavo?XWT(Hkbfo+RF zcL4;rUT|L$5o!Ez1|$(g5QzfYQNKm^5S}qaBz0?KRsl`}JVH#y?K~Ye!WlrdlIp9g z6&e9DcOroYz1=x%#_JmUUnQ3S8zKy?ewcovjFLF22p%I4t~AoVLPggAF#@j$mr0H% zS9E!0ZGL|lZN_nHi76@BZIS~U8va6XvZbZF=;7=1bRma{VgQZ)^EWV#wHer0m6rWe zH~~valp*Ew41R6EO_|pPaUJURl+|M4emMeqd;s1!UU4um$p6Vwk3!1@!F&4@kP&p^ z&x$}84wxi7wi5s=^Bz~}bG!nxUc3+AD2Vf+RTC%yY7DqiswU7rUhDe}d|_^J`J@9p zln5bLH#e)!TbzUxqF^|LKsZb$DXC^)@CI!lfNJoLj!t4(88@dClyU-h3Fbw;8XHaP zsyZNAKt6(KBf}5`q?r2WzlKtvbGbMdKf2@&Gr(3%=Vd-CTGuR&=#1QVZym4RB)tlIjH zWd?p}Ss5h1V@~3P0GzLtA<(nWrO@|?R0MET3Gg;z+w(z~9|*SP2_wS7fE4j42+HeFi55lbUZ zoP5h8f1nEMppejXbG}Jbau-qcdmByb3yv`NafJyBW+B|1la~1S`AdxI-lzA^u)VsA zX=3*n^S;_7@J1gUr}5VkCr)Ew0*a0vr{31GfjXsTa8>{Tv43(BX7qRsH)jK|^xg&S zhY%rE{2P9tYE3{rY@=X4piZTMp{KgG7Cu_xaXV&41us*kP+lhxrcW6XEH?lvrsoej z^eU5}AlMawZZ+q9*>6aOfkAT%=%^)l+aF?CODOmPVlfVWoWvcqRZwbobU?5@fiDS+ zy}!DSOoH2aW9$DnM>6FI;v*5t`9PrGK0*#4v^ws5A&gS`GZY*iuBOb$z>p8m7e0g; zh%p0|J}ApQeqn2c>T!hqer%6}g99ez1{1GpRWJG8M=sRi^deH(gkd`URaMKc?_}VG z%FIF%U@sUtz^jPXAO&UKAVrd|5UlB@m_wNecI#?z2rMI<+fPtheuZ?Cn2lTzwx&fz zPS^V8%0*^9#JGnj5lIdz*}86fz5^pBJgEp16<=6}@bsW*ikxH$w@9CZj2IqvY;5ct zq^5!KXo-P^g{7(y9jwwjdP3gd#$EM>b0jgmR=D^(SUIxAo(8{x)tI*h6F{n`0;ztzvj$ze24 z9)wHR7e^ydkHxRA3?`J(K`fg8&L_fpVgX+J((vn8UOIj#rJ>w6PXkviqp!Boq{eaKJzg zSqhISmBpW}uNyG8VPcSt5z0x3h#2JSuA&HoNfu^Z6-rq0AU4?WKIjsf8kyZ*nECxQn;^{Uk)O} z6BHag`tM1zAoigMqCHEcz~@B9X<$7aw>pwbhXJhq&Xo44g$P_1U=!Ro0o+;ash1Z4 z7M8pZ0O9%XlkC9K0+z~ev$J3!r`;`>gMw$U)``Fds-!F_*#r=6q2yoy5Ez8Fw-o{k z$>pY#WiYxSK5(cSO`bx0VPWC=K$Uy`iwPkqRax5ot3{LUpNq-r|34{eCFgf3v^0qz zJFT|ve;oZ@Zf?*ZMLhZiaPrpzkE0RNnm*htxFpD~*6scBHquNtsiW6Edhpoe-H~qK z|2ysQ86%liC!2u{%IC;HzSQJ9W2*8`t*%8Q%^o!*-Y~c1anYeFK+Wrx* z5K$?ED5WWqg)rDKPnEd34*8As?_fsUv>-X>C`;joXixOW#Qy~q zB83e-)nZvjRl(|1`)@AoEWN8u^Jri4lX;f^Pd$#*NI#mtZ%WAj9CQBzH5&Zb@m?x& zO#JVk-hKr!mtB(SP{9sKkcJZc*9KQEaIr{FrvOQcl8VY1C`11K{d;y6t=zAauLGi~ zPVnysE-C+%C5fede(vi)1Q`WnWazn0*8BGR2}=lfCpJl2fEiC(&7X%TdT3nP0?W(G zd^t`s=I>y}D{RP>sElZ zht1I^=X3iov_Jv{f!N8z{$69$gJoH6@PY)GI7s2W)2MQNcEaf!t=t3iE%f$sr`m9U zb2>=c1F9+cb4ARzdVbHgAv;UM48VWn^;RqU3}`9v_QTtou3)(?>vMG>e&!9+2W*Wo z$|@MGRyS!x+eQ9GlfYJe+V*=Gh3Cs^+{)1&Pm?uJ_C&c2S$`nh~ohSze2?fPT?qrIkI1ASbuNf1YQ ze*w{0-`X>(;l9N;*SA3G$;PO1MY{@0vwb+1APDs@Oz1$F#oX{$t(d;9(TE@{)&DT{ zANCr<{*BfUY`A|*c!f}^Bp^^0CrEpG(=v2NT!6x`fWrXQhhCG5sg{N;pZ^~(9=yMpI?cB?|d!ePeylIk@)e~`waEF7lG zvnj5n%r~!nj-u{U+ZIs#6;w;>x3*mMa>aOTQ}M}Wh-xRG@--;r1b_Qq2h6S$dB@-W zd3{#4h1>fP`{gulFKe)}sDQvTII>1dM{j_*gqVN=axPGaB|Wx5L-SAxRt_x2k1!xA zvW(-xg4-F*N39jGX4FJBtcRKMa^7nZXb}yKvs)Y*V{CWPF)(_2d*fj)BGXFeL$3A! zPYWaz%UviV9x5cZ=lr;K+u}C0i>ZM>okA(la0!0j-!bQ^;OH62;HYFE}{ZE*(tq zsW5L9kneNjBVr_m8=%1&-y)K~6*N(uVrPHxtD-2F0_mXA+hOchD1SMF&+uCYa! z=nBP8X(C3^HE4xe940xG_|b}w&VRM3W`pllf&I3nLHj*S`ZplP=nL$)1aX!F1)n+6 z@1U*M(x(h7laFQ+GD5!a$AAI~C!kZg))ZR>naq+Ta+rmcwNMowDkfVE(~)ya{Wm52g2VcH_=vJAM*i#*G&&PD) zBt!XRStc`$KX7}F5uG_w1V?-+u*#HUim`1)wIs4CD@mk@aj4~DC^WMw`vQYEaY`>Y z5_nth(0`be5>Iwu>7|TqMjbKt`zq&R!5+3=C_3OTkXVx#D-^4L0mpW64Mfu>-a2NR zdR~lOS^{W5N3yn?0-jtDLt=6=ie|WnG!GB{Avz8>F;N(?ur+CrMvy0L7JPc~>D@;< zPQ~|Q_oY(s@XUu`CzW=m?POCRLEgClb*I2oESpAHrJQ~w1{#_i7o#hzU_@GoY`g+K z)!`wc3S31ViGzfgunp9*k!-{aM2J-1J*H^B?wi&UDU5^uFoEx$z)_HgPn6fbyUB}E ziR?>-d`$I<9?46-u#g-Ixq~)w@$j<2$9+tAn;f5^E0Tx_HVFFn^oM-$YWeN7kS&fz zKgaOYj?taK6TK4cm0Z_k$^8fkN_h1UAsm>1l%h0}ARFS`u@+;igljD19(?6f;zQ$) z?dY?tKskxRw={f;c}OZw^vQFVYFi0O5_$D=qI@7Db_re@qg>Ex@VeqqVm`oj6SC>7 z`{Jcxy`_G9Hs&_S{6*C6kn%4TG(}E69~R zn^-4wG!N7Ky%Z#`6$furu?N?OJNJn|+4nXZMZ&{4-I+I|PBRblpP~K0i$zD#i9W^4 z?b5rgaEA#ytw34BNhtIQ<72qEr)#+iphW6|mpIfE8%69Xy%|wE29iaWJaVzKHwN;~ zSH5LF0uIWr1nihUxO$5;M+neyO=FPe!ZP{M5}OIXBu>nzGTg#IL}HkA&WznNuC~U) zYbS#(C0ykl{%4K1_fvvP)Kp2%?`YhPuuA&yRJV9E^MQf^bYs3HdOP<64> zI;g0q`2It*G%@<+aO;=df$mcfLgiw+}nFJ^C_vw&i9W5Kc$t7;ksi-gk(Ps ziNk$K5TCDDqKMjY1w(@3HR#{bZrp&?JJZn-WTT=F(a{R+0|PiMAsxkZErDziJ0VKp z-4MP+>uXf+^l($~BHV3mexBi09+ib3ShMZ)ks7CFW+)o*%JOPPY1nk(K11U$R)CIn z!%4*(wm#jG2{12rcA^M>4N}pDeH!n(xvY|BZxiniX8vQzL@!sWb_)4P20=aYi`Zd> z>u=w`E8dV3?+6Da6=T5J2FAn=T++taw&mR_Zxlx97UP+9iY*gf1S(?wAiNYp5=1VH z3X*HuOe-sMhI1**2$%f)9+rT4?A=tZsQ#BSDry~9$deEsP(V7AfLnVAAM0ef>1!4+ z`jXa<@fmd-d!KBRRlgy)iQe13OX!AaB?tb3B_5DE+dY9;`q&lN;&iZ)GwI?G*(WV> zA~R9WU0@IR;XH$M|Er5|P&V9altGc={TASx(Yo}dnHIS}OtSS7e5G*tDyCa_n@erp zS6S96g7j=o=OvQFLh(H&G-y-eN82RF?nF|u#~9>X?U+!YsG(AAX=&NoAfSi@fT~Nx z7X?M^<<$E2b~IMV)R=0qwG$*l$V-@nibsvz@#69Yo6B%^One&KJrt5c5F@IoN*`~F zp+6@x5~K>t-Y3)L3*t{<3&t-{2u(t!u7p{{>adWPQZ^h#EmR-orWs=M2O*cYvByge z?+v?9pH23%Bx%vj^^jsP@wPv~x8M_qdHtHY#RGYOThHiVxu?ocK~ZNY6n&<@A1fG( zQxs*ZfD(CAS#6;Tju&cCd}X9mvtoUkF!P>g>Tbbs#Q-1nIvj(c0&@D6@8t)_oTL-pBZ51 z++n2G7{fk;9I^YPK~K8IKqkg0cw5--^k_u3P@#{hHkfTv(G^7i)p~&Kt_EB>)9opG z?9JgeK10_2fP%h{zE55c<`rQvJjK9eF|;mor1xRt!Th!K6SCcB0H@fKW+b63cE-V| zu9}X|-$!wUIf22H4^8j(*b}rYSZ85hEQp=LxfCUE!#zV$@5zSJuksEhJd{Tz?AYox zH?xSer|3EW-~|%fCn_GvzNlogyHz$SIly0MemhoPWG1j-0_JnLHWWPCYNVtm@Tkbn zo)1Ju9es4s>xmdZwsP)NkU%yU=C;#JB|{41U5m4hjPz|7RTWhEjyG>@D`_V!PEV7Y zwogUwS+i}5N%JO>s3@~BX>A{v+(NMeMJ5h?kV zjgpd*idT#T#0&|eY+pd>Nm;;gsmmOwlQ)b1g+hTcu7Fe{m?iKB1-~WQgdzxZ@>Chf z2|+V0;SLRG%dqBk-h;*#ZVI`=jyGW>gcf!{WznK3zv-Y3lFZT<0g{ApECevL*^z76LBSiH)baLYj09!j zowkh|zupY!1h&v|1#R&AjsBdWZO1iYs1=|JQ_o)?d&ni1&f$(J2Nwzp!OLp)VInod zQ#^FIvgeIa3~W;&i72~3@bWG z0SfV;%157bF{mu~TJKbTv2+eu?$Gmk_Kf&`O~{WQ=EZ1SwU${H-iegQY{#h-*Q(`! z3WGZ#@;QHwJ^f>7_p62DPMd@?oj}K)Z*pP5OvBQeGx5hv4s1e`>(_fre`(}g0fj|0 zCSod5LaD*{x%IPDMC=o&2$3(aI>WIg6XE-eDlXz8qHp{$A`fIk;*WeyoA0_++O426 z$MsBb9WF1QPq&4MX5F6C{A}*Wzy50Wzuxg-zFg_AI6cJN`VRo{SO9~7mI-yXG;-u0t+3<%%H|T>i2yED-;-) zn@q7gD(}9MLC_iS85tLZE3yS+c3%Lc0go6JH?RzQMAd+azyj$q@p$@_=;a{=jjFEq z6OGbr3fP4(cGd}dKaOlPiHCNW^BoFY`?^J%z581HHQJzfdG{>pm$EH9pl4{FZkQqP z1r)J!kxLzZ$&E|7#buPS6{MagnFqTsxgS)ltgJx#bvNRxR#AY!$j(+?qoVpC{hR*V z44dPFA>Hxg5bDT;@C!77qsiV?p_8x6CvUx9EXSShYzs4~o+dn~$Y{3lJGYK$hC+}W z-4dvpnRx8I!-M#Sn1-#B4kz%oZ*{Q+EncopSuGI9a4r0z{jgLKsqGKnld0n6_{7!1 zi7j~z;r$xSm(#H{LH&*xE06kkeB!DpbMFno4=;{ce+D0gR>1G!5><9hmX;N+n%@#Q zGAdoUY&<_iXcS?7rFZNa*3(8n-QN zOj3Z-ySvSvzx!UJG0^yV{CPuOvJ@bzN?r|#3ejZ zVmt@CEv)vm`UBryrc{!s2W-!_7{AUD3~?1Z=s(NF@U;8h`X>_IZDR!c?q%isq0j+^ z2DP>lH_zs~x?#VvrH6U%Y{)(Z7dS~%tnpKRj=ihoq>#oJ)6WN+nHUs?Yq}gnU9RUx zAN`)!xg+Qou`-#H!!7CMBx&9+o}azZWaGX!TV_>pz}o3yOa5oZ?RQ7$Sd7+QuH?^| z4_06OO#+V2hOrcXx3Us>dGY>zJpPFxWcH(D+j5qxsQPF*d)#-AO+lN}$UQ;N8?5_P z^)^5v zOr>A9WGDh@+Q3@&`DsZ>$;Gb^x8k86)eX#KXS=VU&>P%P`v(V4-Q82vZbJ{->@194 z5ujSo(YIcGHy7Un3!B}$An{If)*6$Sl5iHute?EyyH`u52H_qiELXKgrxsgVV)%bI z*LFv6omDzs_wn;R@WK6a>JANm*K1#_4Vf=)&$<{r%r-ii}`i3Q@kqv#!|;Q zU8nqoXZmT*CL7b{gROg-oLAMZ)-Um`SU(;(2s$gbeOYr}W$6`Q6lI~a-0>|pd|`fX zr2F-Qu1DFX?*0Df9ha}yuk{AmH7oeE8axC`mPcRQxUg|&r?2lezsP_FD-aUx1BM}V z29PZTRl+sa1s1$e55#9KE?&c|3`XH^_0H62e}EE$h*Lx@cM+nJCzG1d_%yXe-Wd3T z{8NBk{Qs_z_dPM{2e@+ql${Vp7r6sYTPE~3a2^m$#{0sdCIDv{grQ|-z^?jG%+6Li zfSv7Rxn))Gk1qZr^|=@9Pp|b4Ha6En)wS<4C-df)Armx=9GDKtTp1>GoYwby`V75e z*EEj(>oeAOb4>g4sf@Ct9*@D>r$iP4x#cegj9U@}I1TQMmPkxD%7jfwwB$_p)MBZ&7QV%`tWy_g!pBalSQg_E>%X+LHT^++iU@y`&Ak565j--rG-t>J*a4Tols`) z=6?`NW^2Z-IIb(5?X<$wCCsCLF2bp<_q2q=BieN=v8cF~gP|yY8q33|;la1+y->T| ztSrq}$U*rzanxd%s$A-%hkOR?LyqoG(qw%PE+}t2;aloFblws*!wZN#Lcxebncw=bTQB~fcsAGgTc_`WF4IT;5$sZ z8}_<@KIL9NByk$o+98`hv0#wls)wj7IBpfgaid~mp%t;qUEDp)!lht&$VH|7kwg;?!$i-jbK_WApiP21}dV;&Ui zc3kwX3r6zA*H6qvytqS3hT>{k4sU+ zJB|62$5Pv4MfQnKZ~0>4$4DKfKHd5H_Jl*M>6CQ*mbm?=`Qx!&?Pxbk28hXAIKF>+4)#H@K}F!5Ei&EXw52-olkkIDB-5(&suvb z(|fiX8FD!edso_(w6q6trW~*5BW-%{b7Z(vZ2kP{6(JGP4W>T+D`BLi@32WD z?oD7U2Y3et7(^~_(GgrIamYB10pNrfGT=SYq8ng}0^A)&QX+L?$N)y8Lt2_GC9B8rQT2Y%-TFg5vOyE`*fz2xayVvGi{o|Ln60FxUJ)Yt& z&Xt>fzlz}I&>LlD?VrW{<>jaGI==9x3RT0+M7QSdx!&Q}{bx;nQ=M<@R}?OL{r~u? zFXHch_oC)MGKkbnYarRXo@;cDAew%8M8p;S&E;wwl(j`l1(lWcLS)VK{Pop(Y6Bvf zW2er!^}FXovw8d{Uu>P;ONoE3w=iOiX;ZV9UE|xyl`? z9XZ~nbD})f^TfE}z23X1)_6+=o|Ue%o*U|3SFHs#CF$*_)c~Q|K`Z+Gw;Cl7ahQHw zBIji@U`!45-2!GdZ$Xg;bTPiAD1e5rRz!q_l~bbEfzOc@h2TPC_YKen0b2w5wXnMj zHMRshCGZMEkSA=Dc$f2Fi85k%Kid}2_T~*UF_f$4_t>AoRS15AgbN@X?|qnri2?e& z?11Hf0C*V9qh*$L5I~;|M##a?%hXg)K-m&N_BL2_(`Nj%E-X6X#re)dj=$IEa^t6| z9%UCQjjlr|;>O=L{2iHIu=|=H_}*`pIap$V+TB>1CC3-+jS@1}UuX5#o)7ZmexMb} zJ?nKDSPGn(u#PL&2|Ig{X^`aKU_3!V2Ra2Y>%K%_==F;CbFV7>4SX(p+O@1efJb;> znFZUm^Ocs_>(_UaMZC*p=&o7ra-O#dYm}{h@TU4$W`4!I<`L-CvelCgL$sz}8LzTv zwfmlgt9!{D3mK`_q>;zwRN2q=E7V3&n^}p70|=35^4tZn!R6&;Pm$ChxWF>%ZTKjz zQB?J)u14pJlFOr6THoTm(2zN^Uw7PgV#I>%YKMIZGm$+|e)6B2fKi2+AVmg*tXhCE5qP&QR!2v~;=1oj9AA^DVC$B8 zdYL9G@V=}K>G(q&S?7#;GNlg=OzI8fEoQK>Y`|0lP=&t6mwT(v8YnE`(vqc;&)58t z+pBORO8j%h$C#TdxGD>Q^E91(Z_JILcLIUBK-UP-OPN73& zKR-RKv9YyH^LOj(knG=$Xk$rz*vxgSaP1c+!R)or)yXa(HejXbS3G_E7Wg{6_mKJ zPKh#7rX{6bXR-CH3a>aaPR~ETbdt{}j=Q0q#pmzZ6pnYkNA{@bAc3v$$?n5Xf8*}P z`V;BBi#TzV_B||re#oM+D45T)o$VuqNPsm{xmPBkbTi8tkVy5#qgiT zjdibU>a`y-Jl!-^NG|_VIxi*WojfRVUGUsR7IVHXfkD@#xAq*{!zkjNyS8Bp_0bL zWrN2{Llq|uK}wAMD$a=aH8x9OgoINoU|w9~-!*P0ZJIbk>i1g6s279RlzX=56Prhp z#GgF8Aq&*PH%D7$x4HU??5D^IkM^S@`943(<8BP;%*MCOVG+&K>B&W!GR);JYw`*a zzs|T`Hccg`%)K}iXV_-yiVx2*^m<7+w6$B_k|{=!NsQShTey)Y>90UJAI+FK@qEDV ze8KF*Ao5q~K-^v(O7(;DiMF5bfMpCYiRf9W(uSny1qyp0N1ZxXp{I6KrKg=0TPLG8!Dq`R4Pr$IYV^wUMG_um>R+flIe!+915|q{7|WHkDta^HA?S9 zE|2uilu_{$>q=N_cG*Nc#}Srs7W#DZn{7DjRQosnHdj$|+gO*dmQ&_GoFywzCcVN_ z?0hCM=_8DS&el%rZT5$W>A_Gvt|f{xrdEKR370`>isSTXmX`e0j}iV*Hzw|2xL!7fZ8+ zsibnr1q0F1BRPs0EX>9CN$?1;$JHO}W|+|a`QhoFUxKF@R@6J7?XIqFP^eNe_RA$@ z%`Q><>rLu~<{&2B34*<_-qr-uDx047VUiWZAAcsG;&UY!Ru|+m1T++qWFJd#4B@5E zo|9I%K3h*0H>SJ!$HRLi;5*~`?%Jf|z0)O^#_9 z$p1WZWcAmunTcrsJ0IxJ*F21#nRGF4;6HjH)3h1paKuB%xUpMSdiaof%l+%p4QeRfY!v-HlqM%EJzXEVNw9Tpo`d@UMxlN5f)Nz}cayL6k_WA*#A zilzScD1pmu;??mjArAo^0)kx&k6cUl>8Eb(Z2^o%uA%5&nyIPPp6E3= zcKXb$$m1F0Zimgb=^9K;q(@5!(ONWG^!aM17kmsqT3ttHDOOj9zoZbepWRP_UrKXJ z#nmh~-b(Hwe6g^g(-`VJd*r#ulN#PgY|+l1KfR7!^dkJjJDR}`XN2o&K{PT4AL5KO zmd%T!;y(Bg>(-X1JK3Qu6DYi{mXPa%+ zGy9&%7d~-1x0KX51aS_Im7kh!vb-fH$G0EGy3>@Q42Nw#1mZng!HFKeyRrLAWFN15 zs#R@n*~E#uLrZ*!K7S2t zBt$-qKo;}!z0`v>GJcz-Zz3GAf**% zn3J+0ZG#BGOnkgBa5f#2_FM4GSgFst?`T%FZ!!D$iqMM$a-+Iq}uU@%PK(p(-XYV?;k4=#wEV zIthufnc5Wuc_c)YDYltEkupE7Qx77oovk*w1)(T6Fs+-@nOro#(iYq zhWLJvN3+XZz8p5rs`9g;#q(P@T@2zW`H1zUrlpydM?xudW^QZr{cs*q*YYS`9`56) zMN%{Ou(0R^d&>H9Wpf9yn$q}2tB z-HRh5hRAmbHZBGC+zB>(B)1lWKda-u1YVxEP2R9s8u+F8#MWV$`=Nuh)&D6={+e~y zpHvS3|4n@;2wHuvN{}x7h%TR(q4rBw69|4y4W%zfuvEc}TM1Y?|2>FNj1eDnU zKs*4*Z}G>gH}>|GUhCp#n_tl$9)WwI#lumsSo$d$_#;CS`oLf&Ngp)SfVqS+BR*pf zs7+%k{$+r4BSZv*s3dkco+Dstz||%#VQoA#e@`0ZvjDD~fPB0;SpgK{EYKfCpMMUO zv$U{4uT^_=0Ln8F;Ah48@q5sFJZVHR^T3aBjH#obE64c}pGvW!Ttz`af{uri+iZ3{ zIPht@Gc*+5I;pCv3JlOdWC@7qhHzfkxN<#xiAPc|QGc-5KAk$czCxR{5P=7ICqM^- zOTnEcIBDeW?hd44^}@WIoY-&v!S6#HlfQ9wf4Rj3W8=p6)n}!VMv-BVsLo<-+Iv+& zaGUEaeNjaf$3e74tH)l?HjO3@unC@X+*?40p%SnFKaWU`7r1aBqD*}V3sp}Avw zzE{BJ39tuHDRX=K=s_^_06_acfXF@PXhcSWxzuy^SUw4WaHGZ;k)dw!)z~l^IGw6sw$8rr2zmWqFR1lxv3`_$@$dS<=p5cF6+ww18z9c1K^Na(M z$NZxfbJLeE(#-(KS_2tRsi2F19R8d~2K>Xo*8l_DQ8liLCLVKXUy3g)` z&xa50_JtR4Q5+~wBEB~)1is*(7yf}QwuLC@Ff_7czXSeeUNH1@baZ`QcoB(G@@8_b zuC4$nQa=N)JEA!5d%lTqmpX;$fkA9W!7Oim`2H5-FEzoGX$tgp5@oJTk2={Vyt7O* z5VIAsDACc=_hW|NDJUt8f-(OT!afBaXa;t5yKNx`fR~0aJe+NR!;PeV_3D)eDq9G~ zNK~$c0GLr*o0|uB4{RU<(i^e_6e^qzMC@1O)dPsP1gfE;i8_tOuAnaf=K6&JVH?kp z85{f;14NClhsozGjyZ~er=4!At2sJdHX^AR#j>rXWvHAvCUbCYGyyB>{f3?vRAVTe zWRV(>P`!Av+WW{x!K|p6y(ythM8lxBmTw%EbO~Amw2xok0sg#*MI@+ z6~XIM9-zKL8`#^~ffk(!mLeU>40A5oVGAIw$cvtF>{@|QBPZq*))1UG$8QbH@X))- zl@;=vnO)Gn4%Y~8D#!R)IB)y?>sPu*Z#-8PR0}RMDl>R`>TESkYVl4GU_lxV{>She z(iuEMQJEB+Ik@f`#|W=e(-__#pphXghUgP~{W zO6ERWFNV=kkdgEENFJhKWgqF3QhNE|L!lKhndaz+ebm{6M7-NFOk^Q3wy(-zOE|EI z1eB%l2Cw8|7@>b*=FRh`u=OIp1*!J^v?W29LK{Qn2`)_v@n}UGGFzXH*u4z?2459K z^pBg!AtJvY6e* zA&kw;;J!KmJYz~^FH(JFLZE}fZ{#aHj3{>Jj>!%muM{zq&v z*L4^;%4+3uS1=M#*VWsqPdr_0LK}tuP8+rk&;cr=XKFT;s2|zF?Kx$JSg)GeLjAdE zr5EmI3wAzm&hmNpHj)yAfv-xM`0Cge$qr6{9Kk_ja!__;S!ku zV-REnY894G!*iz0vNVTbO#nLzZw`Xjz!yQGdx0NPjYf;+2V`6B$T_pKTCs40NXr2` zqxiA2pv|(uSuX^y;Nk8bQoAmvKrAjUt`*f zf5FnglEZE@dg%+JMKy$1DplPNK+eKv2NMvkNW`Q}WF_Xd`C=Axy2WV;@wF|5 z7y8>NMj_chvcLm3cvJ>y%AY5?0x0`vDi6#NQTt0gq)Op)qNjo-@&NWn2FIOR%NbMjTsjDEnE1AUxYq6z`b zdWMxHj?U04@!td@F=2TFS5rBRGg2-HHp9ywVq?mgNOKlEYB@sCa5IW<{OaChBHJqj zQj{wMIC7K6eZLn1Gn_m?lMbbq!!sVRgVLlU+9JGz+2c|b<%!#T2AV}A>1>g8HvA;j zICrStC&iD$ShEXVO!XFgDMy_v%$f}lAQ%Yq*4BrTU5;O2zKC}9}P z*WVu-G6D~%0g^>P`vPCX0)t9PYADczqG=<+17ba-0erI*lY;X0DUic~(*mfvUJzsa z3YGw}IBK`L##+7l5EJfKK>P)wvV`DP;G+@{NZV1Xc&%PE!J2O$0QBEJlx>(Kfu!z1 z+O{7t41iA2-OsU_XbuB?YQKhh zcHOf!LI4$W_Om{&ljOQo%%sw!@D-jake0$KNs>yYNq_E5#=>%?=jzR<8}I9T9!P`9 zoy-Rd3kxdZdiVD=_t7e_E5B;-g;N^ zWjHr@6ohjb_A|>)4!tWS>gAW@=)8ZAYI`h_gT@k7Tp=QeZ<27sqpC@If4m^rR0oT` zpdaXGBF&-k!}%#J`X6^Cv2EoY@u_<9<2aDkO~z_YyYF9;%P`r}Um-t|a9g9#G8ZO> zo&|!5i5&(EF_r5EF3_!bU{O@57r@!Gff*KRfAT?x>Ds=_t1!W z`3caNmt>)l-;BT}JvIP1Q?txI5xj^z*v?>~Buf9_UEt75ogMlM?I23bVm5yTj31*` z(8$olB@``j`ehgV&1I-0s9ibpHoP763xr{L(P8aTdTC_>Ic>}+#w1P$;SpVtg=xmv zV(G2%j{9gMD1lTw?r&%ms-+p_1$cO4#!>Mdiq(qbtA>Y&?=&31TJboFS=w8RUaoj z^~uKcRW;l$&JX#8AjL=(Y@>*Z80yd>4z@F*%6<_UN{}XyL}{3EfS4d#PO&j(Pr zD@{JdgG%oZJ_Fu(a;Vvtk3;Vql3Bk#5Aw_|GQsw!ZU&Ykl;;6ZJXlb%d}h=JoY&;D z3(oLBvaI(TAmA_T&|qQ5`9Wn!c71tC%3&sASn7#WVeRW$TI6wU$u*GC_JQ8zy~H00M9Fk}bbga9e%j}8N&TxJ zITj!^E@-53ni2PtZvqtB*KP~&tY9gsD=QciBfCL~7XJSBa43YKK#KLs%eO#{k;%K;d;pE5j!ewRr{;uh|yrlSs_u3N5%A z1}aEW5@gY8oobTb0Yb#&@imes(z^hxrykg~0&`dO#!1b{eoP+pz`_K;3zeMkP$?w zGpiaLF?H~Yf8edjZ`{FAxj$WkX2r&bK5Hfao&|M zI~)U3hVM%BE(9Yq{ounSo1em~VN=Y9@JkJbeEPmv0Kr-!PxAwuwIok~hcsY|<#nEv zU}P@CC$hjfCZp%BEj$>8#Eyl~#hH{BnY}GZGXVR+?fw+xbDtjXvsFzB5GI>~O$ZFj zkflEW3-L1`qq_?AWeID<`{cJzA!BT01nvkgP-0}(H#T515Wb;7gCEo#v6KO02j*$w zTEZSUsmL%63?yAZYZd*>mX1Tj=Uixk=q?|u2M~R$Ld7s=r-v5x4kX913}`7oo^DsRlVx9MrQhLFc4w+a)82#X~u zB&wy5`!TW1_wkw)feEdQAs9o0ZA+38e1wR;y(xcDcg*}u@F9vbL_kiOh_Dr}xeo^&HdY?{3i(?4&hkx| zhm<57U3*fEcD(tFpK(JuJ;;P!maf?bJ%_Otolpdx+KBgc(Go^yg z{~kI0VZo#uWd7m8T#z%6s4Ai(2_aDSb7ZpK@tNQv6w`49ez=ImFuu&0KP1+M17 z+JKr^*e-T~2Y6%XRG4Vpi`+pNfZ%ey+~Cib4*CIhF+yg_ES~nag=Q~-u(d}D7+i#F zmm?Xn3s4soxuXu~lC}+P99PA~c0%jWhV$%5zKPsIpgl5y-p0{=x5{R5eM)@Kz8Sf8 z`C)ZGBw@@eXI`u1A%42Iq*5OWKT>nf~gPik>=k4^=m{U;V-oP<3cY7D@c3 z4st{zUQ-#sdXoB@mAedn{ zk?Nmbq5z<5u%j)WP631n;kFn66j-PnFy50YMDP*$?nI^qQV2f86vXNTeA1N`F(J7$ z=io)O{`A79W1dly_}?58cSgih1v$Yu2CaTIWjKDJ{_W3NV8R28`)}X@JvTRZhVp1c zVSvOI0t<$ved_&~uC+jAhb8VZNVzg=AbKT86fqnV6>$qnzb-TjbFIiO(eJ3t zx-W$;svIIty=K<|V~E{~jf>ci_d_0amT&R*^iBf*Ng;9=lN{j|WQ90~o4M&jyWD9jbvARC;kSZoCM2I{^S*;hF< zOV}v%o`O(hiI$Q)h%0X?TR71>c#J+~JbAh^zVPr>xsa1ym`qAY$b(0wId@PW^xxD6 zbWy|{AM{Jq6Hgw$vKtWh>&gzdP-vz;iKd0nhw2nv2@>x>mW8X3nM)Lfc~Qt>{s%ju z-mB1a4pP`-jVZ`OYEY3Yay0REz93N)w#*KZg~y9fS)`Zdu}qEwgP}3&R@q7%@b_$b zubbGdxp;}pdE&mnsC))y8h||)P;>jyPr8qH1CMnzH8n*<(ilHOX@hDY-*E=7N~g?+ zH@qAqoq-<&J0F2zn`jW_nfp$yp(YlF^miD>axT%;BN`2D-ZH`VaMoh ziOKtz&_g*l>tF+M6KQsD9ecl}7fQtbBSwFfpps*dV^FEn(%(NHFAjU7=^+9p*_hE6dOe50CO=qPIGS;kKu2A)fJ-^nRv2)WCxfeZUTL?;PLej82&zaucW7PckV;A* z=9Y^MR1FCY1)Hj%_k|T_?#x3+=iCvFR_1_g)-mhfD7Ba77tizE*v@!WNEFG2G$puJ zgF$mttbolUB-usV1Y9$k0Xlv#|B^TbfFZd8Zc;Q!ji9Ol>JAJ08frd1g3Zt1N)h*D+Wf_JLN2HTnrXeJKc+E@bFBT!fv z0#hGQ=%uI3JXCek`xt*#`cmRL!(AeNF6a6T1xx)HIbx(!ROj{{zb%w7$s)l{`y9CV zw|ewHR6+kq+vLboDAl0om2r_Y^*PFwKJ=Tz^9Q}ddv6c^RcrznIVgImK)fkP=C}aNAh4jf z@k0ZXa<$>ep2 zP7)8@BsQG_&KzH!rM2?lZ;PA!l=R%_i$tDHOi7`o=LEk{UXm+q#$Nm2_5%ctIF=m+ z=&t2TfwPMWx5%Atwa)PHa6|+ep(QXK0Nl5eqa)}^OoAq*^iU7tui}5d6@>x8C|Lyj zk;sN+|FdCs0=Bx~WD)kcV)VD=l)wcBQ&*feJUgJ%Wt$l;-ak4zN;~ix0|@-p3zX?! z2a+tV!J-6!E-2h)~G}ih5Bf76Ye)DIr$?{&VxqAGyM#9T=VdGY$QZP)m)KhDZTpkmD>+M zJf#B?2YfC`|3JN^{!Kwf@=hlWy!3OVd@AtSw*=IPg5opRuae1AfFn*%k68F?Zcc|S zP1;pF;30iC7zz$FMMcGef`UlU+RhWB&!7O;^d@jqm1f6+67&FV9#D({Rd+mN`#aD9 zda>Vdv2cE%2DlWqyo9Un)ss@aOxTv8376)V1Z&FG6o(L;&m?zy1!ez zpU~w@f&l6c`6AHPF7eJbxm6+%X%)z#UbNP7gk+clq zf{dK?N$`-pPGOwt2@FhClI0Ern}e*Cm6ehbYBBcI5o9 zp;$Ycuwb%vD^5$MxY@>+)V3okfIgJA!9C&-zprVUz1H&2n2i0qx+tFOXw3Jtn(kTa zmVUYMN`C$X(}24_g!f#Dl6RyT$dv|_3K$E*|17B9EW`#51GVnm0x+>MXPgBC6XZ8x z1-85-7>&HC^XiS@AqP<^!B4;z>;&9!3ce?q0J|wLn<(D{+89Ya>3*pSN>QIiV9WLX z{d*vCCbg8)rY{%rF{=Z{2l+RR6)Fw$EL5VC4CP#I!{dj@}xf+RE0t!|#)R7Pfi0n&bu9$?hA_*DZ>vI$_UBbWnP%=ncJEiGmIu5S`C8t%cMX91>HYqCs@vfS^S z1N5c2AC3%3y}Q^&$><2y*6xV;fDBB z(~B`Hm+0=VW_RD#sK@AZbFI!UYZYpjF>7~1l}SnPzq@g9lght(4Ka3?YET`0Rg_9n z<%i%D>mieuiHA>KwNtWtQ}f=seSfkJkJrU9bz(@zoOa7HWR0oh({fgkZ^%mE;hTt2 z2ja3QbQG1D@5+wkj*fVX>6qB(_CFScdSW~us(cx4PCZ>jste0*wl_}|$5k+1jYe^$ zrW<~nWfF>G)5s{FA^jyJ#2kxUru2YCFif14KB64UGOiNmfnrYi@uyH*NmW;q#@x!# zt=cxC_qf8IZ2rG5`8L+O)<3JX`MDmCZ2oZ)#kyn#rq0XM#%SB|5jy)cUoosI3~d8B z*2von11Xji{ylcg1M!l@Dd=#g(EDpo9$zo_fnUOE<1E=bT)cZGU9E?A8uMcbIA}CwUKD@YKKM!e82U1eP-N^Yj?h`eHH^L zu5PedjcEzhOEo9j`u+hs%Q5!c{O{QAB;BX-hWNJGKmYO@pB@@(UhdUtBKO?X{Z3>W znVmY1xmL2`Q}OZplMntkNgg3F&g<8K=^;I2z{-F*wXcLE4)FvZ^Wo)_0J^go-Go;l z5m?5%x4Hn^KhUy|E7giqg^Hhd?Sq2EJ#3k-wq%I*a6KX7_a|is8Ruhtx230!_>z(U zL)|?W;qLd;?k-2IXzkAaN5d?Jgo0K+_i6Y15rWN*CQHDn77A;w2y1>(gB$R^jmy$l z=BI}Ak>ZcB%=6}-3(*C_Yz!ZcSJ?6pHfT(pj5{~uqF%$k!y&`dY*0h`R!iu3r(%C7 znR~~&bk}fOOnpsVYd&yfEbfTnEc)JBnqP{-k+lA})N^O^2dCuTY6nIZf9vK{+@;8p z3d@m_>ez3&%u`zvDQ}MpE#p7lCN6X2-s`izTCa37Q$x&o? z1)p*?=$w5N)Fm5M{{7orsqj~vm1#EkG;wcaCswf}mEZj$zY|&=)ff9Ge9vB6_YW4$ z@>`-)QY|6=h|9fq_jgd+xFcn>`H+`PD__}OH!m}oWPuhcxDK#+J2~RNbKlRGEcip#>j1b8 zA!^4x+I9E&QZ0LwiH+oQrFB<}r5g!om`r%?4E2sP?^osQWUwh(cPC3OJTry#nLRY$ zA)QQBmauoQog}HLXg*-pbUJXCsu^$WV#T`}crJ8&35baoyw1`-`;}hy^1ES*l9rud zMMh2u?bCLAs_dc)t6}1U(50~5<;u8UvYK-4OK)RZulto-O%&YA1{5o-E~YR zL~w-d3~6mXb!_w2&gn8a`}mJiwwUhWRH_B`_|_$7kv|(GwJ2NHn1BSjvIgx}zQ}9) zw=cj9XB+vShKbFQd<$1$$NQVluh$+Un%P(D{RgH7oTP7#15ElCxo&Tu!b#>)J$Jto zlCkhzepP?ScyrWzRw8_B5YZFJ$o)R0bWpA<4td@+Y<^RDRzl&RiMeT!rAPNX4YOIS z`}|?xK2pFktMCxBM>HB=)v8PGRI{LTsqJy8u#hI#MAVm!-XJF+q$<@-jzF6#dyJT8)BlZWVSy)pEnQCS_CQKW#JT?X~PG zH|gw$R~Ni@oV3oav*u5cnBs~%xfD;;8|3e63Mgy7kk*Rh63N8LEfsm*S3B@C$3hvm z@}|s3cg4cEqXBp04a$?Jq~qAQxeTC>OPTW7{Aolsm;iu zf&0fu+LiTUd2fhKhd-2kpm?~RdZizlOP-B4ZB$|3jR4@V5)#i3&PF-uiJIN+2Ult+ z>n;$c`jNYNORwB{K%5XyKl34+RYoXEUAG+29o#R6ntmo! zVO(HC^sRvGyPqlem)cgw-l_A;q>)Ii*1KEZ*~k&E!kwrjsgch!`K;&V%VGO7kveJu z#GE=<7GC=lVJRk3vB(+@2s^cjA9)%rXgj$ORqSRW!y|5RJVY+4X2QzuiL;_7rXWHe zKNT1wfM*kES>&xyEv&p~o7q&#^_dymiKogVRh44nB6U=}Y+>Ri8_#-l7WhWCrP?d# z>ZxS#$vdsLrY?R5p1s!|LARI8QsO!8^UK4Hb>F{_WGX`9x1Xx9Sv%cC|Ii-zlRx6D zB0ayePPUiWf_cM=Ea9MvM?`SiNJ$fYqJ=M&W+hSd%bC6ZR}1=Y(nRq>yqdu#tJWc~7+j8-VSCUB8fyAng)?sxqcaez4VbtLxDkcBCJNAmoy^t75=vbevG5}D$5A5qECw{P8wqx zu(GO0=8Jdll0V5A8Ih+sFL(JrMz1WrT-VsQEyfT+7zB^9&r@L)rVA^Q3 z>gr~$;rlz0>6hM?p|`HG1tY&@UlVGcEyM=s`_y3U35jlX`|`a{xD8PR74ZmLeusA0 zXT=7r|HK-id`B)puKa%v+Poe|{qN^p^yeDd8MF^$*%A3Hhf3vop58nC`!Rl`>x6Bx zpWKAj(FV6sM2#Wtn>dpYSKT%jY_!7AQOkfd{(%AK$BYI+Qn@xyfM!{koo1z&X>u86 zs5UT7exzg)JaGzeAnuuuS^MoNs32&qo8lD&`Z5i`$Ad-SDN(xke>WNaiK;Jrqh$)F zrHh`QA~q$emh;;3U!#UR-ke6qN8&i6-W^V2yI{)RqwZqth2yk^36Qcr^74sD?(Nc& z>dm(Yb!k*t^Fgxogbfr88=JVflP^rq;-BU@U~ zcl~{8VGC1ppZfW>!1Ld&iel>Jf7=%55sh>aWhL$fyUep^{oA^&c&YlbpZvy@T!d3w zVRhIZH${kMM}UR5;*LLQQRnU0Orwa!?G)-7&TjXW3Uyd^V5OtcVS@0lw`4Z-X~lN8 zuvs)Vf4|b~++Sn29l9+7=C3MrFA8P&pY1mj{J#I1QX?hl=^q#NQ`p82W3$9+m8vU+ za?YB1Yq8@YyQonwgfa^u^r&ns8XZqk{VTea1M*uxL{w4GwJF6Z^9rZY?(Sd1>enjY zON$P435g~tMn+|4EziC8du_M|7hNS87;qy1x@1-;@wVP4KABRnTtHGj0jU)PGF$82 z{scvWJTfyYDP@&NBS}2dnkJI+Qnu`;JV%yNl=FypI8iodY zR=+n@^C4zi{p)cW7wy_vm6N11ykv+RNE{p2sx_{A_yI9A=~XW!uj8h4V|dvIP9pE{ z394E_3wx!L-&sv&yZv8htQ`YW>_6ERe6FKaWZHdL(J z>p0`?9h#2qQES9fe9x>+33WzD`qNXddK+=lYlP6I+W6W9-28h2e7?c`m8=#*B#2&fChw(b%}tT4M@}>;Eo_g{7)mEZ2@#;I{4?2E(|ej>`E@gY=e85hmOUO_2q*rKaWqP$ zqK51C`K`Fpe>{2`ExnYU;pwc9YB<;I-zT4v8U5R%V(7*foUWL#qL%9>praSkE$~J7 zSAwlY&d1XE!;v{yRo>_fDmUphKUJN6LF9AerpUy8&?C!39LA%ucL(A$d!aCDm%KeLGdI5dCQ(GkNeuA(VxW`i2W9LwSr9K|j`! zsY2#!j8lQG;;6VNrlGUsXIiNu#;im}t#S^AT^#DmEbf?a)h0c!t~>^xG%7tdUivwA zoGfK!R^-Pg-ONndVw^TX$q!ztwlA+~=}}L|ld^EQAqDJ=L|IfRORWXgZ^?+~sN+rW7sGDjvTn(eTn?66lgSxSwoDe8-a_NZnF? zxRtD-RZ>~rrlk!g(nrbAAQRtr2q`cqFxBh}(#jnX=rhLQwy<1iR{ytWukquOiHYfx z&hFLJ?t$M*ZR*rM6eZ#$A1>pJTz;d8%O@K-`|PuW=s&yDP^;S1XSLi&Pq&U-?Mz9< zPrkQRb2qMdz>dSW8XepzRccd{u)dVPOP=#I67C7-Wgi*cmZ1r4-i;KymEeB;8V$(% z2%gM;vqlL<`8G7SIQ^`NJ6dqdru*|~iH1{`@0*NL|3UcMXp^aLfE{=3MpiY8n}zYd zRv$h>m%Yl-T-D9krP7C=Y%b30uU-{$P=7OIHn{509^vxP%%FhW={ED!n|dXrcZ&by z%*&x0Zu9*qj?2<{o&@LQ|5yg6An(NMTOG9(SzmuK+Q{}*;77{V5M@-Vp+R!QyD^8c z5O29s+VeAxqxdRig=O}*F%|(7rR!_Rd!6l}bS3h@++P#wYS*WqpqKsdY;et(wS`!k z$CcIddP#qJRBsw^3*T0;dLdjpD&;y8ZPMVm9q{iJDpRZddqbO?oIim3>N|Aop{oD6ev4+9jm%tk#hvw2i@$(gu zLDOHig@r?|S+ixo$v&$$3(4>O0}?i+-pPV_r$NivrobzlhGy=}y7dcx@oS4pee2qs zJ#;b~XY-mOiz~xm?vJiRI6q|Ih*eJOcZj~Q*nlnJ7$)#{iU>db57qy% z_4qX35SdtpZ{+li@|1Vmn?}u#!*AsHVoBONHzBZNcOY0c%@pg+yT1_v-K*?`KSg?4 zf7jQ~z`sgZ4e)E%u6|tfMMA{mOEc8h8`VtyG?A&}dJB&~anJq=&qMU*^m3$viW6OU zLJdk%ro;dqEV?=5Re%a{mWIV4G0ob6Z`UVREU5Q%l=AEiw zEc-(ei$x61zgzzeC>Y(NqsY?|+WA7CAoo&Hgr->L=|bAhzj7g6{67i9d~nYW zSG<-^ag-aN_!FxyG8u%j{19@7hEUoyWN7H>*-vOwYu4&Ne!aIU95wB(kfFdL`gVj* zH#%2ytkUmUY;?)DcsAlCg_F!%dD}`WBFv>14g&#~E2Y zy6tQxvy*+R{Gr0acZSmFrTcb0ec^AAPdcCH@&hKu zhp^ATmCILD3OBXHWEQ8le`;jubMTx9Tq0gG^YKKxpbu`VTIYHylk&MRP&9}?x{L4$8;&JkfhtS*o`^ZpT zAZUh{<*uN|K@`6+YfEW$exglkq)nyg%%rs&Bz+yk{Ih-*Y3M#$5!btVI zZ!1IiTi*=vD+Db%JGhuKQZgIcFUayTo#a>)8XKB+x=W7wy~&{)I9|>JVa5qyB_S4z zxP5vG(1-%}OsgZD@=%|epEFJy6={Qg(L~>%l$LKS>@5h&_(I51AW-g>q_zcvO^+>4 zgC+yWzKBX@=KWTEFAdr7`QpL|N1T!x9%}!2W@}4=U`5J44@p-A3N~{~okE~%IK4^{ z)HYSY>g3ut?&PiBsP zZI6ar+{1aOCb@=IGvP7t4KvpN}9`WXm-tsa*4mKZ}Hx%o^MgaS<@(F!GztmL?u?nWD~xxPP-fhG4I=nFZuH}^D6p>AB~!dbLd%B zaw&PD1}? z{y4$Qe@~`|B0wgZZJ(F9iHg;8utBElVq%r7{Wc|8$-^KcqrPIyl`=|3sW8L^nLki5 zcC$Y>3}H<&H2&)=L(0Q18@C;Ml229iHHk`bW~!(aQ)S<8sjEyB4f$PZw!a>s2{}0U zMrkOo*O!s7K4~Jy*?EK?P53yXYgJU#RQnLD{W2fAx$l#dtg?3cF<;krAK9S`x2i~& ztz-X!*QoPGV&<>0b#~xC=KbAiSft3zN{_zB#f6361A(ns{cg?(ewwrNHBF;kQ9?d9 z)aSgU73oRPX!X0f0pO`Bi4BL85A?KR4{64bu2v@!SEi^kHb(z1JN z7~8xu@AK$NG{YWNez;$<>ez6nQ8;nrnhKmahIp8<~#G zcpF?UQx;%6`jKbTs6lG1KTnrZ6zg!R6l(ZQvpQPQ!s744&TE3kt?TwdqPS$2sY0lK zUl3Q$?mR?A9Y`Ttt4dBelGzo?3Mvyp0rIzm6VZ+ zeLmVN0s|10ZB#aq+mXY+r13eLs@>eRk*b<)6{q9U-#`3bc=t3fY=D%9Lq}%RIXXN> z>aDY9G}j{Yi_7_YfJyngigm-W?YQX@bMim4kzQX4#d1${WU8VR>7mj1teTw`6>v;P zgg-=g2 zxUg|{R>l3#`+(B>??uT*A9diP2L98HdsxE!#nyIrXtwydyUB6Z;O&QRP=_7DE%YJ6 zjm5*^pNM}WlUTR_V!M&jiz4ydRiYS^-ze_CCpk!c)ucJO8HP*Y!XUyP8c|1YU!5p# zE;Y;4Kc_>(K#%jWkVX?hV;}l}1F>MCR^sKXr&SGCOQUgNso{N?{yY$XPYo#@bRvUM3VMW-WY;ro*)%4o|C zj?LD6kQ`^CRe3e5=p-lYPOPXJ$V0(!8{EC5nPH{gMf_V05<<_j03%qVj89<|=@aIG z!O2f>n3RDPrRrr%RmsIiFVu9#BjNkbf?7*r_wOR*!Cs(k{;T*=x_*_l{j`muklKW7 z|NoSZ9AcZMlw-q39!&P0t!g>cxpNlw1m>8#mfOf}2Yr4$14jz(a8djZ$cqLFG@~-o zN`;IeN%E;I$n^QTXp1EK(}NE_3W~g(a}1}%CejuHo}!1xq^&<{J9#yZ!X6sko0KN! zs91MCIAL7%!^7HzgRay%f?Mn$?E`HL&YLQnT$DH&WSxC8W^awai__+FpN|$Ji78T= zI8b)Heuc_vNuLg^rgDN``PHz;Wf}$6(%~LiQ-$0s;&QIP?Rf)J&&YY&xNna$vBe(ZQ2Nz8;1nMpGdZ{Ng8NlD1Te(wqc-1q zfesHaPU8?^UrzqDMx*gx;l0fIpW6qp!f0~sHzfTw>qYvXnbET%1Bfz1&-EuS2eY@* zmgHid>%V7A;=k9P2$5;^Va>>WmWf^vJi{^1(&Af|v#=3??iB3%6FeaK{J-A}4P&6- zx>;bCTMYq7$$vi~4daQeg4#s|_1 zKw!wp>3fa40NEUX_JMMgY3N-f(BA=&dwFTeF!moQi2t$uS(yrjLW%yN3i{u9)LVQ7 zQJO$`1Xw-xQZ8_BS)Z+VlMT!HWOLS%Hh-Wwd-#X$FqYAtwbVL^kZ`T%iM4a17!|b7 zZfV9|H64}78w0^sAMtqLzdnm^GxdGw{3m+dU0RnZNwJf;Y1Ar*deDmh($ow~8n>_XB?CcCgCqyX{ zp8>R=*M1gcNPtYJ^PAs>oT;GAMfm)Ly>lX9lLO*Qm^{W>ewXE5ZX(m{n7xVUHyjL! zN+p02_IUR$bfh$`1{W8%;2YpNu)@P<4uJVBNtg(Al>YkqdV}h-uYNo^+1arTjJLbv zq(nh7WU>@8*FIet85vPgC^+V<1}JD~p}No3TB?eQl1d=qsPF)Uk^pb~Lc~dj-jVQ1 zplz8%9hdVB+jUL35hW)pM1-J2l7UGS7H_X=CTwwFGmM!?W+>+f%%0V;fD&*RC$=4* zMZATb94m+YHAzGMashMC@>uMyk(!m&X{t~beAF8PH2~TH5eLAO_7+fng9AXRExeB0 z=S@_e^xsoX^|c4UM$@26t^zlOD2VJIUf0$psPgc_d9@P-0VQAQ=x0@#P8Dz_Is>RH z$RurVZ>MoIH%}4|d;*FC0OgPr-T?nLfN_1*U^D=9%!^Dur|21syXln`f1v$g^aUyR zgoK1hNJxu=AY}z0izpeu2JXe-`P{)8+d<(>tG2KH~?34 z5SA7$N6iMb9Dqvn&rp{84g8Yvc;RnAG(4I=Ix1?r|2+bOrkc|8W+tw#9DL77DC$GyNT2ev09Yeg0Yq0tr=_K(uXJl<_yhn!IkWolpToEVMDEi44W)w|$qt*0{FOv-!tfP1VLnB z=+L{ymKO1MyXbhiMr`x8JXlE}O+IK@h9XjTWFOFcAoj}_aE-vuD`*sC(aGyuIRHIN zo|r#~D!Br_Nh#3dQ0tOZ_;R`97l|*=_W)!@4x$(BY&U_buuzIownFPUk_F(D9c^vY zfgpwqD9{jAKs-YFYrRwG4Pq#%)O}w*ZniZYze;WV+ ze8AJ+Jz$wulnSJd$3p5arYT9t?H9~qU@`&iSPsn0L2iq*l+*)=V9SM_6|5}b&pux5 z>InSzF6H;nD#Fjt4$|$2-WcC z_Ir`Svm#3c->gi8to1Zi0(#izl)+~@7t5c+)H=`q4~aU$k~lRP5A1^rS|mV9jl_yn znbeb%oUoA4^eH=l=V0yGANgW|=eOj%)P1z)-x~wzFahkKY-7dZIk*y;`(Fj4?RU_z=tELe7X6Y?g_+>z+)0h7A7;`!dwLC(S<5q_Hy%7 zB~P$%jEpD%y(`#RM)VnV%cnuYn~48iBd~D?p-z%a3Woct^{`U*bDyI~_O+cJHN3jr?=>w3D8kkxl2;neY#rT(x4-Fx{ zrx5kQBL*^`M6kzG6u4i(5mR*+=wRnl`JXJe0rlha@^2=n6XD>%!tZx~2uEsm{H59P z-f3G|L814DIZ$kYeXrmxEbTooJph>RdJWJ6NcR*5@PxszsJV>%_`ya`zY7lNa&e%S z;DuoR7Jy?6c^m+L_enQL^huroNYV+aI_9IwC3tV%0I$aSwSZ3r?-%d!0_Ivoy@KH#of|`jfOw8fbqh{ikPof6BYHgoJ~t^im0XbWq;#sv9wi4NV}-QW{%1xZHFrl-U-?7#+r3n2FA!1Mv= z7lO4DbHSd$4It68vwRich<*U9kIN_5)+lKxO4P}w$u`yKlfgOuV|4ToaMpSFN)i9ON#LVPl()lR_`nB{g)Gz}h974)UVzkoVr z3~^ktWJw5m^by8Df*Z^cE(XIS$a=`}Dpjf!DN^LrsZ)3F-lexSBLn)_zkh!;f!)HP zLx&)Op|IfxS{(g-`0yd5IgI@N`|r^lWNy)-MWJXBMnm+Ge+q>H3L72AwxL?JYV^7_ zQm{9Gj7Dv+9Bw~*_H6ot5m67cJL*9ObQX#97Iu1@_2I*Z(W4$cdYGA+B_$;x(bUuw ztBe3gTcrQ|9*uPs`b2(7nkp2My0oW}-(?i)~KOi1sFc_KO-=BM}*CneoZ%Wo3 zQ}h!*8hUv-v^d^i194)m9B{l27|$1Fc=I*u7r^P Y0ci4p+XgeF9smFU07*qoM6N<$g0l}-m;e9( literal 0 HcmV?d00001 From 437a7441ed4c10dc9db176d906135ab9e594df9f Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Fri, 8 Mar 2019 15:23:43 -0800 Subject: [PATCH 09/22] revised network boundaries table --- .../create-wip-policy-using-intune-azure.md | 132 +++++++++++------- 1 file changed, 85 insertions(+), 47 deletions(-) diff --git a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md index cd22e4ef73..a2e6104ba3 100644 --- a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md +++ b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md @@ -383,16 +383,11 @@ Starting with Windows 10, version 1703, Intune automatically determines your cor ![Add protected domains](images/add-protected-domains.png) ## Choose where apps can access enterprise data -After you've added a protection mode to your apps, you'll need to decide where those apps can access enterprise data on your network. +After you've added a protection mode to your apps, you'll need to decide where those apps can access enterprise data on your network. Every WIP policy should include policy that defines your enterprise network locations. There are no default locations included with WIP, you must add each of your network locations. This area applies to any network endpoint device that gets an IP address in your enterprise’s range and is also bound to one of your enterprise domains, including SMB shares. Local file system locations should just maintain encryption (for example, on local NTFS, FAT, ExFAT). ->[!Important] ->Every WIP policy should include policy that defines your enterprise network locations.
Classless Inter-Domain Routing (CIDR) notation isn’t supported for WIP configurations. - -**To define where your protected apps can find and send enterprise data on you network** - -Click **App policy** > the name of your policy > **Advanced settings** > **Add network boundary**. +To define the network boundaries, click **App policy** > the name of your policy > **Advanced settings** > **Add network boundary**. ![Microsoft Intune, Set where your apps can access enterprise data on your network](images/wip-azure-advanced-settings-network.png) @@ -441,52 +436,95 @@ contoso.sharepoint.com|contoso.visualstudio.com ### Protected domains +Specify the domains used for identities in your environment. +All traffic to the fully-qualified domains appearing in this list will be protected. +Separate multiple domains with the "," delimiter. -

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Boundary typeValue formatDescription
Cloud ResourcesWith proxy: contoso.sharepoint.com,contoso.internalproxy1.com|
contoso.visualstudio.com,contoso.internalproxy2.com

Without proxy: contoso.sharepoint.com|contoso.visualstudio.com
Specify the cloud resources to be treated as corporate and protected by WIP.

For each cloud resource, you may also optionally specify a proxy server from your Internal proxy servers list to route traffic for this cloud resource. Be aware that all traffic routed through your Internal proxy servers is considered enterprise.

If you have multiple resources, you must separate them using the "|" delimiter. If you don’t use proxy servers, you must also include the "," delimiter just before the "|". For example: URL <,proxy>|URL <,proxy>.

Important
In some cases, such as when an app connects directly to a cloud resource through an IP address, Windows can’t tell whether it’s attempting to connect to an enterprise cloud resource or to a personal site. In this case, Windows blocks the connection by default. To stop Windows from automatically blocking these connections, you can add the /*AppCompat*/ string to the setting. For example: URL <,proxy>|URL <,proxy>|/*AppCompat*/.

When using this string, we recommend that you also turn on [Azure Active Directory Conditional Access](https://docs.microsoft.com/azure/active-directory/active-directory-conditional-access), using the Domain joined or marked as compliant option, which blocks apps from accessing any enterprise cloud resources that are protected by conditional access.
Protected domains exchange.contoso.com,contoso.com,region.contoso.com Specify the domains used for identities in your environment. All traffic to the fully-qualified domains appearing in this list will be protected.

If you have multiple domains, you must separate them using the "," delimiter.
Protected domainsexchange.contoso.com,contoso.com,region.contoso.comSpecify the domains used for identities in your environment. All traffic to the fully-qualified domains appearing in this list will be protected.

If you have multiple domains, you must separate them using the "," delimiter.
Network domainscorp.contoso.com,region.contoso.comSpecify the DNS suffixes used in your environment. All traffic to the fully-qualified domains appearing in this list will be protected.

If you have multiple resources, you must separate them using the "," delimiter.
Proxy serversproxy.contoso.com:80;proxy2.contoso.com:443Specify the proxy servers your devices will go through to reach your cloud resources. Using this server type indicates that the cloud resources you’re connecting to are enterprise resources.

This list shouldn’t include any servers listed in your Internal proxy servers list. Internal proxy servers must be used only for WIP-protected (enterprise) traffic.

If you have multiple resources, you must separate them using the ";" delimiter.
Internal proxy serverscontoso.internalproxy1.com;contoso.internalproxy2.comSpecify the internal proxy servers your devices will go through to reach your cloud resources. Using this server type indicates that the cloud resources you’re connecting to are enterprise resources.

This list shouldn’t include any servers listed in your Proxy servers list. Proxy servers must be used only for non-WIP-protected (non-enterprise) traffic.

If you have multiple resources, you must separate them using the ";" delimiter.
IPv4 ranges**Starting IPv4 Address:** 3.4.0.1
**Ending IPv4 Address:** 3.4.255.254
**Custom URI:** 3.4.0.1-3.4.255.254,
10.0.0.1-10.255.255.254
Starting with Windows 10, version 1703, this field is optional.

Specify the addresses for a valid IPv4 value range within your intranet. These addresses, used with your Network domain names, define your corporate network boundaries.

If you have multiple ranges, you must separate them using the "," delimiter.
IPv6 ranges**Starting IPv6 Address:** 2a01:110::
**Ending IPv6 Address:** 2a01:110:7fff:ffff:ffff:ffff:ffff:ffff
**Custom URI:** 2a01:110:7fff:ffff:ffff:ffff:ffff:ffff,
fd00::-fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff
Starting with Windows 10, version 1703, this field is optional.

Specify the addresses for a valid IPv6 value range within your intranet. These addresses, used with your Network domain names, define your corporate network boundaries.

If you have multiple ranges, you must separate them using the "," delimiter.
Neutral resourcessts.contoso.com,sts.contoso2.comSpecify your authentication redirection endpoints for your company.

These locations are considered enterprise or personal, based on the context of the connection before the redirection.

If you have multiple resources, you must separate them using the "," delimiter.
+```code +exchange.contoso.com,contoso.com,region.contoso.com +``` -5. Repeat steps 1-4 to add any additional network boundaries. +### Network domains -6. Decide if you want to Windows to look for additional network settings: +Specify the DNS suffixes used in your environment. +All traffic to the fully-qualified domains appearing in this list will be protected. +Separate multiple resources with the "," delimiter. - ![Microsoft Intune, Choose if you want Windows to search for additional proxy servers or IP ranges in your enterprise](images/wip-azure-advanced-settings-network-autodetect.png) +```code +corp.contoso.com,region.contoso.com +``` - - **Enterprise Proxy Servers list is authoritative (do not auto-detect).** Click this box if you want Windows to treat the proxy servers you specified in the network boundary definition as the complete list of proxy servers available on your network. If you clear this box, Windows will search for additional proxy servers in your immediate network. +### Proxy servers - - **Enterprise IP Ranges list is authoritative (do not auto-detect).** Click this box if you want Windows to treat the IP ranges you specified in the network boundary definition as the complete list of IP ranges available on your network. If you clear this box, Windows will search for additional IP ranges on any domain-joined devices connected to your network. +Specify the proxy servers your devices will go through to reach your cloud resources. +Using this server type indicates that the cloud resources you’re connecting to are enterprise resources. + +This list shouldn’t include any servers listed in your Internal proxy servers list. +Internal proxy servers must be used only for WIP-protected (enterprise) traffic. +Separate multiple resources with the ";" delimiter. + +```code +proxy.contoso.com:80;proxy2.contoso.com:443 +``` + +### Internal proxy servers + +Specify the internal proxy servers your devices will go through to reach your cloud resources. Using this server type indicates that the cloud resources you’re connecting to are enterprise resources. + +This list shouldn’t include any servers listed in your Proxy servers list. +Proxy servers must be used only for non-WIP-protected (non-enterprise) traffic. +Separate multiple resources with the ";" delimiter. + +```code +contoso.internalproxy1.com;contoso.internalproxy2.com +``` + +### IPv4 ranges + +Starting with Windows 10, version 1703, this field is optional. + +Specify the addresses for a valid IPv4 value range within your intranet. +These addresses, used with your Network domain names, define your corporate network boundaries. +Classless Inter-Domain Routing (CIDR) notation isn’t supported. + +Separate multiple ranges with the "," delimiter. + +**Starting IPv4 Address:** 3.4.0.1 +**Ending IPv4 Address:** 3.4.255.254 +**Custom URI:** 3.4.0.1-3.4.255.254, +
10.0.0.1-10.255.255.254 + +### IPv6 ranges + +Starting with Windows 10, version 1703, this field is optional. + +Specify the addresses for a valid IPv6 value range within your intranet. +These addresses, used with your network domain names, define your corporate network boundaries. +Classless Inter-Domain Routing (CIDR) notation isn’t supported. + +Separate multiple ranges with the "," delimiter. + +**Starting IPv6 Address:** 2a01:110:: +**Ending IPv6 Address:** 2a01:110:7fff:ffff:ffff:ffff:ffff:ffff +**Custom URI:** 2a01:110:7fff:ffff:ffff:ffff:ffff:ffff,
fd00::-fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff + +### Neutral resources + +Specify your authentication redirection endpoints for your company. +These locations are considered enterprise or personal, based on the context of the connection before the redirection. +Separate multiple resources with the "," delimiter. + +```code +sts.contoso.com,sts.contoso2.com +``` + +Decide if you want Windows to look for additional network settings: + +![Microsoft Intune, Choose if you want Windows to search for additional proxy servers or IP ranges in your enterprise](images/wip-azure-advanced-settings-network-autodetect.png) + +- **Enterprise Proxy Servers list is authoritative (do not auto-detect).** Click this box if you want Windows to treat the proxy servers you specified in the network boundary definition as the complete list of proxy servers available on your network. If you clear this box, Windows will search for additional proxy servers in your immediate network. + +- **Enterprise IP Ranges list is authoritative (do not auto-detect).** Click this box if you want Windows to treat the IP ranges you specified in the network boundary definition as the complete list of IP ranges available on your network. If you clear this box, Windows will search for additional IP ranges on any domain-joined devices connected to your network. ## Upload your Data Recovery Agent (DRA) certificate After you create and deploy your WIP policy to your employees, Windows begins to encrypt your corporate data on the employees’ local device drive. If somehow the employees’ local encryption keys get lost or revoked, the encrypted data can become unrecoverable. To help avoid this possibility, the Data Recovery Agent (DRA) certificate lets Windows use an included public key to encrypt the local data while you maintain the private key that can unencrypt the data. From d1ceb086ad31e7daf83cc1e071e64211fdda4f92 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Fri, 8 Mar 2019 15:48:16 -0800 Subject: [PATCH 10/22] edit --- .../create-wip-policy-using-intune-azure.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md index a2e6104ba3..f86dfe314a 100644 --- a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md +++ b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md @@ -520,12 +520,12 @@ sts.contoso.com,sts.contoso2.com Decide if you want Windows to look for additional network settings: +- **Enterprise Proxy Servers list is authoritative (do not auto-detect).** Turn on if you want Windows to treat the proxy servers you specified in the network boundary definition as the complete list of proxy servers available on your network. If you turn this off, Windows will search for additional proxy servers in your immediate network. + +- **Enterprise IP Ranges list is authoritative (do not auto-detect).** Turn on if you want Windows to treat the IP ranges you specified in the network boundary definition as the complete list of IP ranges available on your network. If you turn this off, Windows will search for additional IP ranges on any domain-joined devices connected to your network. + ![Microsoft Intune, Choose if you want Windows to search for additional proxy servers or IP ranges in your enterprise](images/wip-azure-advanced-settings-network-autodetect.png) -- **Enterprise Proxy Servers list is authoritative (do not auto-detect).** Click this box if you want Windows to treat the proxy servers you specified in the network boundary definition as the complete list of proxy servers available on your network. If you clear this box, Windows will search for additional proxy servers in your immediate network. - -- **Enterprise IP Ranges list is authoritative (do not auto-detect).** Click this box if you want Windows to treat the IP ranges you specified in the network boundary definition as the complete list of IP ranges available on your network. If you clear this box, Windows will search for additional IP ranges on any domain-joined devices connected to your network. - ## Upload your Data Recovery Agent (DRA) certificate After you create and deploy your WIP policy to your employees, Windows begins to encrypt your corporate data on the employees’ local device drive. If somehow the employees’ local encryption keys get lost or revoked, the encrypted data can become unrecoverable. To help avoid this possibility, the Data Recovery Agent (DRA) certificate lets Windows use an included public key to encrypt the local data while you maintain the private key that can unencrypt the data. From e0f95c3c8c0d465cc61a43cec4c5e2b8521234ad Mon Sep 17 00:00:00 2001 From: Liza Poggemeyer Date: Sat, 9 Mar 2019 02:10:43 +0000 Subject: [PATCH 11/22] Merged PR 14738: Landing pages to replace IT Pro center pages --- browsers/edge/edge-technical-demos.md | 4 ++-- browsers/edge/microsoft-edge-forrester.md | 7 ++----- browsers/edge/microsoft-edge.yml | 4 ++-- browsers/edge/web-app-compat-toolkit.md | 4 ++-- windows/hub/windows-10-landing.yml | 2 +- 5 files changed, 9 insertions(+), 12 deletions(-) diff --git a/browsers/edge/edge-technical-demos.md b/browsers/edge/edge-technical-demos.md index b401556fed..4044596777 100644 --- a/browsers/edge/edge-technical-demos.md +++ b/browsers/edge/edge-technical-demos.md @@ -1,7 +1,7 @@ --- title: Microsoft Edge training and demonstrations -ms.prod: browser-edge -layout: article +description: Get access to training and demonstrations for Microsoft Edge. +ms.prod: edge ms.topic: article ms.manager: elizapo author: lizap diff --git a/browsers/edge/microsoft-edge-forrester.md b/browsers/edge/microsoft-edge-forrester.md index af5edc25e9..46e097832b 100644 --- a/browsers/edge/microsoft-edge-forrester.md +++ b/browsers/edge/microsoft-edge-forrester.md @@ -1,15 +1,12 @@ --- -title: Microsoft Edge - Forrester Total Economic Impact +title: Forrester Total Economic Impact - Microsoft Edge description: Review the results of the Microsoft Edge study carried out by Forrester Research -ms.prod: browser-edge -layout: article +ms.prod: edge ms.topic: article -ms.manager: elizapo author: lizap ms.author: elizapo ms.localizationpriority: high --- - # Measuring the impact of Microsoft Edge - Total Economic Impact (TEI) of Microsoft Edge Forrester Research measures the return on investment (ROI) of Microsoft Edge in its latest TEI report and survey. Browse and download these free resources to learn about the impact Microsoft Edge can have in your organization, including significant cost savings in reduced browser help desk tickets and improved browser security, to increased speed, performance, and user productivity. diff --git a/browsers/edge/microsoft-edge.yml b/browsers/edge/microsoft-edge.yml index c1c094727a..1d5723ae94 100644 --- a/browsers/edge/microsoft-edge.yml +++ b/browsers/edge/microsoft-edge.yml @@ -33,7 +33,7 @@ sections: - type: markdown text: " Even if you still have legacy apps in your organization, you can default to the secure, modern experience of Microsoft Edge and provide a consistent level of compatibility with existing legacy applications.
- +

**Test your site on Microsoft Edge**
Test your site on Microsoft Edge for free instantly, with remote browser testing powered by BrowserStack. You can also use the linting tool sonarwhal to assess your site's accessibility, speed, security, and more.
Test your site on Microsoft Edge for free on BrowserStack
Use sonarwhal to improve your website.

**Improve compatibility with Enterprise Mode**
With Enterprise Mode you can use Microsoft Edge as your default browser, while ensuring apps continue working on IE11.
Use Enterprse mode to improve compatibility
Turn on Enterprise Mode and use a site list
Enterprise Site List Portal
Ultimate browser strategy on Windows 10

**Web Application Compatibility Lab Kit**
The Web Application Compatibility Lab Kit is a primer for the features and techniques used to provide web application compatibility during a typical enterprise migration to Microsoft Edge.
Find out more

**Test your site on Microsoft Edge**
Test your site on Microsoft Edge for free instantly, with remote browser testing powered by BrowserStack. You can also use the linting tool sonarwhal to assess your site's accessibility, speed, security, and more.
Test your site on Microsoft Edge for free on BrowserStack
Use sonarwhal to improve your website.

**Improve compatibility with Enterprise Mode**
With Enterprise Mode you can use Microsoft Edge as your default browser, while ensuring apps continue working on IE11.
Use Enterprse mode to improve compatibility
Turn on Enterprise Mode and use a site list
Enterprise Site List Portal
Ultimate browser strategy on Windows 10

**Web Application Compatibility Lab Kit**
The Web Application Compatibility Lab Kit is a primer for the features and techniques used to provide web application compatibility during a typical enterprise migration to Microsoft Edge.
Find out more
" - title: Security @@ -49,7 +49,7 @@ sections: - type: markdown text: " Find resources and learn about features to help you deploy Microsoft Edge in your organization to get your users up and running quickly.
- +

**Deployment**
Find resources, learn about features, and get answers to commonly asked questions to help you deploy Microsoft Edge in your organization.
Microsoft Edge deployment guide
Microsoft Edge FAQ
System requirements and language support
Group Policy and MDM settings in Microsoft Edge
Download the Web Application Compatibility Lab Kit
Microsoft Edge training and demonstrations

**End user readiness**
Help your users get started on Microsoft Edge quickly and learn about features like tab management, instant access to Office files, and more.
Quick Start: Microsoft Edge (PDF, .98 MB)
Find it faster with Microsoft Edge (PDF, 605 KB)
Use Microsoft Edge to collaborate (PDF, 468 KB)
Import bookmarks
Password management
Microsoft Edge tips and tricks (video, 20:26)

**Deployment**
Find resources, learn about features, and get answers to commonly asked questions to help you deploy Microsoft Edge in your organization.
Microsoft Edge deployment guide
Microsoft Edge FAQ
System requirements and language support
Group Policy and MDM settings in Microsoft Edge
Download the Web Application Compatibility Lab Kit
Microsoft Edge training and demonstrations

**End user readiness**
Help your users get started on Microsoft Edge quickly and learn about features like tab management, instant access to Office files, and more.
Quick Start: Microsoft Edge (PDF, .98 MB)
Find it faster with Microsoft Edge (PDF, 605 KB)
Use Microsoft Edge to collaborate (PDF, 468 KB)
Import bookmarks
Password management
Microsoft Edge tips and tricks (video, 20:26)
" - title: Stay informed diff --git a/browsers/edge/web-app-compat-toolkit.md b/browsers/edge/web-app-compat-toolkit.md index 03ce172837..f2742ca22d 100644 --- a/browsers/edge/web-app-compat-toolkit.md +++ b/browsers/edge/web-app-compat-toolkit.md @@ -1,7 +1,7 @@ --- title: Web Application Compatibility lab kit -ms.prod: browser-edge -layout: article +description: Learn how to use the web application compatibility toolkit for Microsoft Edge. +ms.prod: edge ms.topic: article ms.manager: elizapo author: lizap diff --git a/windows/hub/windows-10-landing.yml b/windows/hub/windows-10-landing.yml index 03923fa63f..9932c85367 100644 --- a/windows/hub/windows-10-landing.yml +++ b/windows/hub/windows-10-landing.yml @@ -57,7 +57,7 @@ sections: - type: markdown text: " Download recommended tools and get step-by-step guidance for in-place upgrades, dynamic provisioning, or traditional deployments.
- +

**In-place upgrade**
The simplest way to upgrade PCs that are currently running Windows 7, Windows 8, or Windows 8.1 is to do an in-place upgrade.
Upgrade to Windows 10 with Configuration Manager
Upgrade to Windows 10 with MDT

**Traditional deployment**
Some organizations may still need to opt for an image-based deployment of Windows 10.
Deploy Windows 10 with Configuration Manager
Deploy Windows 10 with MDT

**Dynamic provisioning**
With Windows 10 you can create provisioning packages that let you quickly configure a device without having to install a new image.
Provisioning packages for Windows 10
Build and apply a provisioning package
Customize Windows 10 start and the taskbar

**Other deployment scenarios**
Get guidance on how to deploy Windows 10 for students, faculty, and guest users - and how to deploy line-of-business apps.
Windows deployment for education environments
Set up a shared or guest PC with Windows 10
Sideload apps in Windows 10

**In-place upgrade**
The simplest way to upgrade PCs that are currently running Windows 7, Windows 8, or Windows 8.1 is to do an in-place upgrade.
Upgrade to Windows 10 with Configuration Manager
Upgrade to Windows 10 with MDT

**Traditional deployment**
Some organizations may still need to opt for an image-based deployment of Windows 10.
Deploy Windows 10 with Configuration Manager
Deploy Windows 10 with MDT

**Dynamic provisioning**
With Windows 10 you can create provisioning packages that let you quickly configure a device without having to install a new image.
Provisioning packages for Windows 10
Build and apply a provisioning package
Customize Windows 10 start and the taskbar

**Other deployment scenarios**
Get guidance on how to deploy Windows 10 for students, faculty, and guest users - and how to deploy line-of-business apps.
Windows deployment for education environments
Set up a shared or guest PC with Windows 10
Sideload apps in Windows 10
" - title: Management and security From 1c45b2bc13e82f18df48ad5cc1855b3ef56063be Mon Sep 17 00:00:00 2001 From: andreiztm Date: Mon, 11 Mar 2019 12:46:08 +0200 Subject: [PATCH 12/22] Add small clarification for FODs --- windows/deployment/update/fod-and-lang-packs.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/update/fod-and-lang-packs.md b/windows/deployment/update/fod-and-lang-packs.md index 471cb01382..a98bf530dd 100644 --- a/windows/deployment/update/fod-and-lang-packs.md +++ b/windows/deployment/update/fod-and-lang-packs.md @@ -15,7 +15,7 @@ ms.topic: article > Applies to: Windows 10 -As of Windows 10 version 1709, you cannot use Windows Server Update Services (WSUS) to host [Features on Demand](https://docs.microsoft.com/windows-hardware/manufacture/desktop/features-on-demand-v2--capabilities) (FOD) and language packs for Windows 10 clients locally. Instead, you can enforce a Group Policy setting that tells the clients to pull them directly from Windows Update. You can also host FOD and language packs on a network share, but starting with Windows 10 version 1809, language packs can only be installed from Windows Update. +As of Windows 10 version 1709, you cannot use Windows Server Update Services (WSUS) to host [Features on Demand](https://docs.microsoft.com/windows-hardware/manufacture/desktop/features-on-demand-v2--capabilities) (FOD) and language packs for Windows 10 clients locally. Instead, you can enforce a Group Policy setting that tells the clients to pull them directly from Windows Update. You can also host FOD and language packs on a network share, but starting with Windows 10 version 1809, language packs and FODs can only be installed from Windows Update. For Windows domain environments running WSUS or SCCM, change the **Specify settings for optional component installation and component repair** policy to enable downloading language and FOD packs from Windows Update. This setting is located in `Computer Configuration\Administrative Templates\System` in the Group Policy Editor. From ce841f4df55449c99fb7bddfe765596fac41f041 Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Mon, 11 Mar 2019 05:34:59 -0700 Subject: [PATCH 13/22] changed for consistency --- windows/deployment/update/fod-and-lang-packs.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/deployment/update/fod-and-lang-packs.md b/windows/deployment/update/fod-and-lang-packs.md index a98bf530dd..c2fcc08b95 100644 --- a/windows/deployment/update/fod-and-lang-packs.md +++ b/windows/deployment/update/fod-and-lang-packs.md @@ -15,9 +15,9 @@ ms.topic: article > Applies to: Windows 10 -As of Windows 10 version 1709, you cannot use Windows Server Update Services (WSUS) to host [Features on Demand](https://docs.microsoft.com/windows-hardware/manufacture/desktop/features-on-demand-v2--capabilities) (FOD) and language packs for Windows 10 clients locally. Instead, you can enforce a Group Policy setting that tells the clients to pull them directly from Windows Update. You can also host FOD and language packs on a network share, but starting with Windows 10 version 1809, language packs and FODs can only be installed from Windows Update. +As of Windows 10 version 1709, you cannot use Windows Server Update Services (WSUS) to host [Features on Demand](https://docs.microsoft.com/windows-hardware/manufacture/desktop/features-on-demand-v2--capabilities) (FOD) and language packs for Windows 10 clients locally. Instead, you can enforce a Group Policy setting that tells the clients to pull them directly from Windows Update. You can also host FOD and language packs on a network share, but starting with Windows 10 version 1809, FOD and language packs can only be installed from Windows Update. -For Windows domain environments running WSUS or SCCM, change the **Specify settings for optional component installation and component repair** policy to enable downloading language and FOD packs from Windows Update. This setting is located in `Computer Configuration\Administrative Templates\System` in the Group Policy Editor. +For Windows domain environments running WSUS or SCCM, change the **Specify settings for optional component installation and component repair** policy to enable downloading FOD and language packs from Windows Update. This setting is located in `Computer Configuration\Administrative Templates\System` in the Group Policy Editor. Changing this policy does not affect how other updates are distributed. They continue to come from WSUS or SCCM as you have scheduled them. From 0db3ea8076df8c4907794c84edecbce71782427a Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Mon, 11 Mar 2019 11:51:59 -0700 Subject: [PATCH 14/22] added wip redirects --- .openpublishing.redirection.json | 20 +++++++++++++++++++ .../overview-create-wip-policy.md | 5 ++--- 2 files changed, 22 insertions(+), 3 deletions(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 47d3a0ac90..7d3a0ff26f 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -6,6 +6,26 @@ "redirect_document_id": true }, { +"source_path": "windows/security/information-protection/windows-information-protection/create-wip-policy-using-mam-intune-azure.md", +"redirect_url": "/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune.md", +"redirect_url": "/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/information-protection/windows-information-protection/deploy-wip-policy-using-intune.md", +"redirect_url": "/windows/security/information-protection/windows-information-protection/deploy-wip-policy-using-intune-azure", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/information-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune.md", +"redirect_url": "/windows/security/information-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune-azure", +"redirect_document_id": true +}, +{ "source_path": "windows/security/threat-protection/windows-defender-atp/how-hardware-based-containers-help-protect-windows.md", "redirect_url": "/windows/security/threat-protection/windows-defender-system-guard/how-hardware-based-containers-help-protect-windows", "redirect_document_id": true diff --git a/windows/security/information-protection/windows-information-protection/overview-create-wip-policy.md b/windows/security/information-protection/windows-information-protection/overview-create-wip-policy.md index dd7bb4891e..3af1d9b274 100644 --- a/windows/security/information-protection/windows-information-protection/overview-create-wip-policy.md +++ b/windows/security/information-protection/windows-information-protection/overview-create-wip-policy.md @@ -13,7 +13,7 @@ manager: dansimp audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual -ms.date: 03/05/2019 +ms.date: 03/11/2019 --- # Create a Windows Information Protection (WIP) policy using Microsoft Intune @@ -27,7 +27,6 @@ Microsoft Intune helps you create and deploy your enterprise data protection (WI ## In this section |Topic |Description | |------|------------| -|[Create a Windows Information Protection (WIP) policy with MDM using the Azure portal for Microsoft Intune](create-wip-policy-using-intune-azure.md)|Details about how to use the Azure portal for Microsoft Intune to create and deploy your WIP policy with MDM (Mobile Device Management), including letting you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network. | -|[Create a Windows Information Protection (WIP) policy with MAM using the Azure portal for Microsoft Intune](create-wip-policy-using-mam-intune-azure.md)|Details about how to use the Azure portal for Microsoft Intune to create your WIP policy with MAM (Mobile Application Management), including letting you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network.| +|[Create a Windows Information Protection (WIP) policy using the Azure portal for Microsoft Intune](create-wip-policy-using-intune-azure.md)|Details about how to use the Azure portal for Microsoft Intune to create and deploy your WIP policy with MDM (Mobile Device Management), including letting you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network. | |[Create and verify an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate](create-and-verify-an-efs-dra-certificate.md) |Steps to create, verify, and perform a quick recovery using a Encrypting File System (EFS) Data Recovery Agent (DRA) certificate. | |[Determine the Enterprise Context of an app running in Windows Information Protection (WIP)](wip-app-enterprise-context.md) |Use the Task Manager to determine whether an app is considered work, personal or exempt by Windows Information Protection (WIP). | From b77fe6b2ea86ecf24ddb4ccec9253a4625bab7ab Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Mon, 11 Mar 2019 18:52:20 +0000 Subject: [PATCH 15/22] Merged PR 14745: Revert commit 68b3dccb Revert commit 68b3dccb --- windows/deployment/update/fod-and-lang-packs.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/deployment/update/fod-and-lang-packs.md b/windows/deployment/update/fod-and-lang-packs.md index c2fcc08b95..471cb01382 100644 --- a/windows/deployment/update/fod-and-lang-packs.md +++ b/windows/deployment/update/fod-and-lang-packs.md @@ -15,9 +15,9 @@ ms.topic: article > Applies to: Windows 10 -As of Windows 10 version 1709, you cannot use Windows Server Update Services (WSUS) to host [Features on Demand](https://docs.microsoft.com/windows-hardware/manufacture/desktop/features-on-demand-v2--capabilities) (FOD) and language packs for Windows 10 clients locally. Instead, you can enforce a Group Policy setting that tells the clients to pull them directly from Windows Update. You can also host FOD and language packs on a network share, but starting with Windows 10 version 1809, FOD and language packs can only be installed from Windows Update. +As of Windows 10 version 1709, you cannot use Windows Server Update Services (WSUS) to host [Features on Demand](https://docs.microsoft.com/windows-hardware/manufacture/desktop/features-on-demand-v2--capabilities) (FOD) and language packs for Windows 10 clients locally. Instead, you can enforce a Group Policy setting that tells the clients to pull them directly from Windows Update. You can also host FOD and language packs on a network share, but starting with Windows 10 version 1809, language packs can only be installed from Windows Update. -For Windows domain environments running WSUS or SCCM, change the **Specify settings for optional component installation and component repair** policy to enable downloading FOD and language packs from Windows Update. This setting is located in `Computer Configuration\Administrative Templates\System` in the Group Policy Editor. +For Windows domain environments running WSUS or SCCM, change the **Specify settings for optional component installation and component repair** policy to enable downloading language and FOD packs from Windows Update. This setting is located in `Computer Configuration\Administrative Templates\System` in the Group Policy Editor. Changing this policy does not affect how other updates are distributed. They continue to come from WSUS or SCCM as you have scheduled them. From 27256c0d8f9ae8c6b58d716ca5ebfea3cbf8488b Mon Sep 17 00:00:00 2001 From: Trudy Hakala Date: Mon, 11 Mar 2019 18:59:24 +0000 Subject: [PATCH 16/22] Merged PR 14748: invoice content updates Updates from review --- .../billing-understand-your-invoice-msfb.md | 4 ++-- store-for-business/sfb-change-history.md | 14 +++++++++----- 2 files changed, 11 insertions(+), 7 deletions(-) diff --git a/store-for-business/billing-understand-your-invoice-msfb.md b/store-for-business/billing-understand-your-invoice-msfb.md index baa42e23a6..d477d66085 100644 --- a/store-for-business/billing-understand-your-invoice-msfb.md +++ b/store-for-business/billing-understand-your-invoice-msfb.md @@ -58,7 +58,7 @@ The **Invoice Summary** is on the top of the first page and shows information ab | P.O. number |An optional purchase order number, assigned by you for tracking | | Invoice number |A unique, Microsoft-generated invoice number used for tracking purposes | | Invoice date |Date that the invoice is generated, typically five to 12 days after end of the Billing cycle. You can check your invoice date in billing profile properties.| -| Payment terms |How you pay for your Microsoft bill. *Net 30 days* means you pay by check or wire transfer within 30 days of the invoice date. | +| Payment terms |How you pay for your Microsoft bill. *Net 30 days* means you pay by following instructions on your invoice, within 30 days of the invoice date. | ### Understand the billing summary The **Billing Summary** shows the charges against the billing profile since the previous billing period, any credits that were applied, tax, and the total amount due. @@ -100,7 +100,7 @@ The total amount due for each service family is calculated by subtracting Azure | Total | The total amount due for the purchase | ### How to pay -At the bottom of the invoice, there are instructions for paying your bill. You can pay by check, wire, or online. If you pay online, you can use a credit/debit card or Azure credits, if applicable. +At the bottom of the invoice, there are instructions for paying your bill. You can pay by wire or online. If you pay online, you can use a credit or debit card, or Azure credits, if applicable. ### Publisher information If you have third-party services in your bill, the name and address of each publisher is listed at the bottom of your invoice. diff --git a/store-for-business/sfb-change-history.md b/store-for-business/sfb-change-history.md index f4429a667f..eb426098c6 100644 --- a/store-for-business/sfb-change-history.md +++ b/store-for-business/sfb-change-history.md @@ -8,16 +8,20 @@ ms.pagetype: store author: TrudyHa ms.author: TrudyHa ms.topic: conceptual -ms.date: 4/26/2018 +ms.date: 3/2/2019 ms.localizationpriority: medium --- # Change history for Microsoft Store for Business and Microsoft Store for Education -**Applies to** - -- Windows 10 -- Windows 10 Mobile +## March 2019 +| New or changed topic | Description | +| --- | --- | +| [Understand your Microsoft Customer Agreement invoice](billing-understand-your-invoice-msfb.md) | New topic | +| [Understand billing profiles](billing-profile.md) | New topic | +| [Payment methods](payment-methods.md) | New topic | +| [Update Microsoft Store for Business and Microsoft Store for Education account settings](update-microsoft-store-for-business-account-settings.md) | Update with information on billing accounts. | +| [Roles and permissions in Microsoft Store for Business and Education](roles-and-permissions-microsoft-store-for-business.md) | Add info for purchasing roles and permissions. | ## April 2018 | New or changed topic | Description | From 38c5d6cc65b599362e130d35fbfde06d1ded9d0f Mon Sep 17 00:00:00 2001 From: Liza Poggemeyer Date: Mon, 11 Mar 2019 13:00:54 -0700 Subject: [PATCH 17/22] setting default build engine --- bcs/docfx.json | 3 ++- browsers/edge/docfx.json | 3 ++- browsers/internet-explorer/docfx.json | 3 ++- devices/hololens/docfx.json | 3 ++- devices/surface-hub/docfx.json | 3 ++- devices/surface/docfx.json | 3 ++- education/docfx.json | 3 ++- gdpr/docfx.json | 3 ++- mdop/docfx.json | 3 ++- smb/docfx.json | 3 ++- store-for-business/docfx.json | 3 ++- windows/application-management/docfx.json | 3 ++- windows/client-management/docfx.json | 3 ++- windows/configuration/docfx.json | 3 ++- windows/deployment/docfx.json | 3 ++- windows/docfx.json | 3 ++- windows/hub/docfx.json | 3 ++- windows/security/docfx.json | 3 ++- windows/whats-new/docfx.json | 3 ++- 19 files changed, 38 insertions(+), 19 deletions(-) diff --git a/bcs/docfx.json b/bcs/docfx.json index 16e842d530..2fa639d038 100644 --- a/bcs/docfx.json +++ b/bcs/docfx.json @@ -40,6 +40,7 @@ }, "fileMetadata": {}, "template": [], - "dest": "bcs-vsts" + "dest": "bcs-vsts", + "markdownEngineName": "dfm" } } \ No newline at end of file diff --git a/browsers/edge/docfx.json b/browsers/edge/docfx.json index 42532b3fb2..c0761e7192 100644 --- a/browsers/edge/docfx.json +++ b/browsers/edge/docfx.json @@ -33,6 +33,7 @@ "externalReference": [ ], "template": "op.html", - "dest": "browsers/edge" + "dest": "browsers/edge", + "markdownEngineName": "dfm" } } \ No newline at end of file diff --git a/browsers/internet-explorer/docfx.json b/browsers/internet-explorer/docfx.json index 323ba3e4bd..0c42ef4158 100644 --- a/browsers/internet-explorer/docfx.json +++ b/browsers/internet-explorer/docfx.json @@ -34,6 +34,7 @@ "externalReference": [ ], "template": "op.html", - "dest": "edges/internet-explorer" + "dest": "edges/internet-explorer", + "markdownEngineName": "dfm" } } \ No newline at end of file diff --git a/devices/hololens/docfx.json b/devices/hololens/docfx.json index 7a67485a17..06af992034 100644 --- a/devices/hololens/docfx.json +++ b/devices/hololens/docfx.json @@ -48,6 +48,7 @@ "template": [ null ], - "dest": "devices/hololens" + "dest": "devices/hololens", + "markdownEngineName": "dfm" } } diff --git a/devices/surface-hub/docfx.json b/devices/surface-hub/docfx.json index 47f420a4d0..88d3dc2f7e 100644 --- a/devices/surface-hub/docfx.json +++ b/devices/surface-hub/docfx.json @@ -36,6 +36,7 @@ "externalReference": [ ], "template": "op.html", - "dest": "devices/surface-hub" + "dest": "devices/surface-hub", + "markdownEngineName": "dfm" } } \ No newline at end of file diff --git a/devices/surface/docfx.json b/devices/surface/docfx.json index 8477cac86f..9bae9c245d 100644 --- a/devices/surface/docfx.json +++ b/devices/surface/docfx.json @@ -33,6 +33,7 @@ "externalReference": [ ], "template": "op.html", - "dest": "devices/surface" + "dest": "devices/surface", + "markdownEngineName": "dfm" } } \ No newline at end of file diff --git a/education/docfx.json b/education/docfx.json index 227546b56a..87d94a2065 100644 --- a/education/docfx.json +++ b/education/docfx.json @@ -33,6 +33,7 @@ "externalReference": [ ], "template": "op.html", - "dest": "education" + "dest": "education", + "markdownEngineName": "dfm" } } diff --git a/gdpr/docfx.json b/gdpr/docfx.json index d426f781dc..2fd5e0e9f9 100644 --- a/gdpr/docfx.json +++ b/gdpr/docfx.json @@ -38,6 +38,7 @@ }, "fileMetadata": {}, "template": [], - "dest": "gdpr" + "dest": "gdpr", + "markdownEngineName": "dfm" } } \ No newline at end of file diff --git a/mdop/docfx.json b/mdop/docfx.json index 530722278f..38b354ec49 100644 --- a/mdop/docfx.json +++ b/mdop/docfx.json @@ -34,6 +34,7 @@ "externalReference": [ ], "template": "op.html", - "dest": "mdop" + "dest": "mdop", + "markdownEngineName": "dfm" } } \ No newline at end of file diff --git a/smb/docfx.json b/smb/docfx.json index 181bf75fda..56500f0150 100644 --- a/smb/docfx.json +++ b/smb/docfx.json @@ -42,6 +42,7 @@ }, "fileMetadata": {}, "template": [], - "dest": "smb" + "dest": "smb", + "markdownEngineName": "dfm" } } \ No newline at end of file diff --git a/store-for-business/docfx.json b/store-for-business/docfx.json index d739d26b28..e02715ff1f 100644 --- a/store-for-business/docfx.json +++ b/store-for-business/docfx.json @@ -49,6 +49,7 @@ }, "fileMetadata": {}, "template": [], - "dest": "store-for-business" + "dest": "store-for-business", + "markdownEngineName": "dfm" } } \ No newline at end of file diff --git a/windows/application-management/docfx.json b/windows/application-management/docfx.json index 5c20bbd8a7..8cb7d083a0 100644 --- a/windows/application-management/docfx.json +++ b/windows/application-management/docfx.json @@ -47,6 +47,7 @@ }, "fileMetadata": {}, "template": [], - "dest": "win-app-management" + "dest": "win-app-management", + "markdownEngineName": "dfm" } } \ No newline at end of file diff --git a/windows/client-management/docfx.json b/windows/client-management/docfx.json index eab3b9f62e..f68b218456 100644 --- a/windows/client-management/docfx.json +++ b/windows/client-management/docfx.json @@ -46,6 +46,7 @@ }, "fileMetadata": {}, "template": [], - "dest": "win-client-management" + "dest": "win-client-management", + "markdownEngineName": "dfm" } } \ No newline at end of file diff --git a/windows/configuration/docfx.json b/windows/configuration/docfx.json index e66228ba49..67eda5ee5a 100644 --- a/windows/configuration/docfx.json +++ b/windows/configuration/docfx.json @@ -47,6 +47,7 @@ }, "fileMetadata": {}, "template": [], - "dest": "win-configuration" + "dest": "win-configuration", + "markdownEngineName": "dfm" } } \ No newline at end of file diff --git a/windows/deployment/docfx.json b/windows/deployment/docfx.json index 0b6ae0597d..45f759e8f4 100644 --- a/windows/deployment/docfx.json +++ b/windows/deployment/docfx.json @@ -48,6 +48,7 @@ }, "fileMetadata": {}, "template": [], - "dest": "win-development" + "dest": "win-development", + "markdownEngineName": "dfm" } } \ No newline at end of file diff --git a/windows/docfx.json b/windows/docfx.json index 9ac35033eb..0e7c823b17 100644 --- a/windows/docfx.json +++ b/windows/docfx.json @@ -25,6 +25,7 @@ "externalReference": [ ], "template": "op.html", - "dest": "windows" + "dest": "windows", + "markdownEngineName": "dfm" } } diff --git a/windows/hub/docfx.json b/windows/hub/docfx.json index 8ef6442201..a44aea3b51 100644 --- a/windows/hub/docfx.json +++ b/windows/hub/docfx.json @@ -50,6 +50,7 @@ }, "fileMetadata": {}, "template": [], - "dest": "windows-hub" + "dest": "windows-hub", + "markdownEngineName": "dfm" } } \ No newline at end of file diff --git a/windows/security/docfx.json b/windows/security/docfx.json index 394ca15239..018d611769 100644 --- a/windows/security/docfx.json +++ b/windows/security/docfx.json @@ -43,6 +43,7 @@ }, "fileMetadata": {}, "template": [], - "dest": "security" + "dest": "security", + "markdownEngineName": "dfm" } } \ No newline at end of file diff --git a/windows/whats-new/docfx.json b/windows/whats-new/docfx.json index 12dd2d0312..15581c3398 100644 --- a/windows/whats-new/docfx.json +++ b/windows/whats-new/docfx.json @@ -47,6 +47,7 @@ }, "fileMetadata": {}, "template": [], - "dest": "win-whats-new" + "dest": "win-whats-new", + "markdownEngineName": "dfm" } } \ No newline at end of file From dd90444a7a16e6e137c67d9611e4574ad7fe58c3 Mon Sep 17 00:00:00 2001 From: Liza Poggemeyer Date: Mon, 11 Mar 2019 13:28:48 -0700 Subject: [PATCH 18/22] removed redirected file --- ...reate-wip-policy-using-mam-intune-azure.md | 663 ------------------ 1 file changed, 663 deletions(-) delete mode 100644 windows/security/information-protection/windows-information-protection/create-wip-policy-using-mam-intune-azure.md diff --git a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-mam-intune-azure.md b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-mam-intune-azure.md deleted file mode 100644 index 234ef89755..0000000000 --- a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-mam-intune-azure.md +++ /dev/null @@ -1,663 +0,0 @@ ---- -title: Create a Windows Information Protection (WIP) policy with MAM using the Azure portal for Microsoft Intune (Windows 10) -description: The Azure portal for Microsoft Intune helps you create and deploy your Windows Information Protection (WIP) policy, supporting mobile application management (MAM), to let you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network. -ms.prod: w10 -ms.mktglfcycl: explore -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: justinha -ms.author: justinha -manager: dansimp -audience: ITPro -ms.collection: M365-security-compliance -ms.topic: conceptual -ms.date: 03/05/2019 ---- - -# Create a Windows Information Protection (WIP) policy with MAM using the Azure portal for Microsoft Intune - -**Applies to:** - -- Windows 10, version 1703 and later -- Windows 10 Mobile, version 1703 and later (except Microsoft Azure Rights Management, which is only available on the desktop) - -By using Microsoft Intune with Mobile application management (MAM), organizations can take advantage of Azure Active Directory (Azure AD) and the app protection policy feature to keep employees from logging in with personal credentials and accessing corporate data. Additionally, MAM solutions can help your enterprise do the following for mobile apps: - -- Configure, update, and deploy mobile apps to employees -- Control what your employees can do with enterprise data, such as copying, pasting, and saving -- Keep enterprise data separate from your employee's personal data -- Remove enterprise data from employee's devices -- Report on mobile app inventory and track usage - -## Alternative steps if you already manage devices with MDM - -This topic covers creating a Windows Information Protection (WIP) policy for organizations using a mobile application management (MAM) solution to deploy your WIP policy to Intune apps without device enrollment. If you are already managing devices by using a Mobile Device Management (MDM) solution, see [Create a Windows Information Protection (WIP) with enrollment policy using the Azure portal for Microsoft Intune](create-wip-policy-using-intune-azure.md). - -If the same user and device are targeted for both MAM-only (without device enrollment) policy and MDM policy, the MDM policy (with device enrollement) will be applied to devices joined to Azure AD. For personal devices that are workplace-joined (that is, added by using **Settings** > **Email & accounts** > **Add a work or school account**), the MAM-only policy will be preferred but it's possible to upgrade the device management to MDM in **Settings**. - -Windows Home edition only supports WIP for MAM-only; upgrading to MDM policy on Home edition will revoke WIP-protected data access. - -## Prerequisites to using MAM with Windows Information Protection (WIP) -Before you can create your WIP policy with MAM, you need to [set up your MAM provider](https://docs.microsoft.com/intune-classic/deploy-use/get-ready-to-configure-app-protection-policies-for-windows-10). - -Additionally, you must have an [Azure AD Premium license](https://docs.microsoft.com/azure/active-directory/active-directory-licensing-what-is) and be running at least Windows 10, version 1703 on your device. - ->[!Important] ->WIP doesn't support multi-identity. Only one managed identity can exist at a time. - -## Add a WIP policy -After you’ve set up Intune for your organization, you must create a WIP-specific policy. - -**To add a WIP policy** -1. Open the Azure portal and click the **Intune service** from the sidebar. - - The Microsoft Intune Overview blade appears. - -2. Click **Client apps**, click **App protection policies**, and then click **Add a policy**. - - ![Microsoft Intune management console: App policy link](images/wip-azure-portal-start-mam.png) - -3. In the **Add a policy** blade, fill out the fields: - - - **Name.** Type a name (required) for your new policy. - - - **Description.** Type an optional description. - - - **Platform.** Choose **Windows 10** to create your MAM policy for desktop client devices. - - - **Enrollment state.** Choose **Without enrollment** as the enrollment state for your policy. - - ![Microsoft Intune management console: Create your new policy in the Add a policy blade](images/wip-azure-add-policy.png) - - >[!Important] - >Choosing **Without enrollment** only applies for organizations using MAM. If you're using MDM, see [Create a Windows Information Protection (WIP) policy with MDM using the Azure portal for Microsoft Intune](create-wip-policy-using-intune-azure.md). - -4. Click **Create**. - - The policy is created and appears in the table on the **Client apps - App protection policies** blade. - - >[!NOTE] - >Optionally, you can also add your apps and set your settings from the **Add a policy** blade, but for the purposes of this documentation, we recommend instead that you create the policy first, and then use the subsequent menus that become available. - -## Add apps to your Protected apps list -During the policy-creation process in Intune, you can choose the apps you want to allow, as well as deny, access to your enterprise data through WIP. Apps included in this list can protect data on behalf of the enterprise and are restricted from copying or moving enterprise data to unprotected apps. - -The steps to add your apps are based on the type of template being applied. You can add a recommended app, a store app (also known as a Universal Windows Platform (UWP) app), or a signed Windows desktop app. You can also import a list of approved apps or add exempt apps. - -In addition, you can create an app deny list related to the policy based on an **action** value. The action can be either **Allow** or **Deny**. When you specify the deny action for an app using the policy, corporate access is denied to the app. - ->[!Important] ->Enlightened apps are expected to prevent enterprise data from going to unprotected network locations and to avoid encrypting personal data. On the other hand, WIP-unaware apps might not respect the corporate network boundary, and WIP-unaware apps will encrypt all files they create or modify. This means that they could encrypt personal data and cause data loss during the revocation process.

Care must be taken to get a support statement from the software provider that their app is safe with WIP before adding it to your **Protected apps** list. If you don’t get this statement, it’s possible that you could experience app compatibility issues due to an app losing the ability to access a necessary file after revocation. - -### Add a Recommended app to your Protected apps list -For this example, we’re going to add a few recommended apps to the **Protected apps** list. - -**To add a recommended app** -1. From the **Client apps - App protection policies** blade, click the name of your policy, and then click **Protected apps** from the menu that appears. - - The **Protected apps** blade appears, showing you any apps that are already included in the list for this policy. - - ![Microsoft Intune management console: Viewing the recommended apps that you can add to your policy](images/wip-azure-allowed-apps-pane.png) - -2. From the **Protected apps** blade, click **Add apps**. - - The **Add apps** blade appears, showing you all **Recommended apps**. - - ![Microsoft Intune management console: Adding recommended apps to your policy](images/wip-azure-add-recommended-apps.png) - -3. Select each app you want to access your enterprise data, and then click **OK**. - - The **Protected apps** blade updates to show you your selected apps. - - ![Microsoft Intune management console: Protected apps blade with recommended apps](images/wip-azure-allowed-apps-with-apps.png) - -4. Click **Save** to save the **Protected apps** list to your policy. - -### Add a Store app to your Protected apps list -For this example, we’re going to add Microsoft Power BI, a Windows store app, to the **Protected apps** list. - -**To add a Store app** -1. From the **Client apps - App protection policies** blade, click the name of your policy, and then click **Protected apps** from the menu that appears. - - The **Protected apps** blade appears, showing you any apps that are already included in the list for this policy. - -2. From the **Protected apps** blade, click **Add apps**. - -3. On the **Add apps** blade, click **Store apps** from the dropdown list. - -4. Type the friendly name of the app, the publisher info, and the product name. For this example, the **Publisher** is `CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US` and the **Product name** is `Microsoft.MicrosoftPowerBIForWindows`. - -5. After you’ve entered the info into the fields, click **OK** to add the app to your **Protected apps** list, and then click **Save** to save the **Protected apps** list to your policy. - - >[!NOTE] - >To add multiple Store apps at the same time, you can click the menu **(…)** at the end of the app row, and continue to add more apps. When you’re done, click **OK**. - - ![Microsoft Intune management console: Adding Store app info](images/wip-azure-add-store-apps.png) - -#### Find the Name, Publisher, and Product name for Store apps -If you don't know the publisher or product name for your Store app, you can find them for both desktop devices and Windows 10 Mobile phones by following these steps. - -**To find the publisher and product name values for Store apps without installing them** -1. Go to the [Microsoft Store for Business](https://go.microsoft.com/fwlink/p/?LinkID=722910) website, and find your app. For example, *Microsoft Power BI*. - -2. Copy the ID value from the app URL. For example, Microsoft Power BI ID URL is https://www.microsoft.com/store/p/microsoft-power-bi/9nblgggzlxn1, and you'd copy the ID value, `9nblgggzlxn1`. - -3. In a browser, run the Microsoft Store for Business portal web API, to return a JavaScript Object Notation (JSON) file that includes the publisher and product name values. For example, run https://bspmts.mp.microsoft.com/v1/public/catalog/Retail/Products/9nblgggzlxn1/applockerdata, where `9nblgggzlxn1` is replaced with your ID value. - - The API runs and opens a text editor with the app details. - - ```json - { - "packageIdentityName": "Microsoft.MicrosoftPowerBIForWindows", - "publisherCertificateName": "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US" - } - ``` - -4. Copy the `publisherCertificateName` value into the **Publisher** box and copy the `packageIdentityName` value into the **Name** box of the **Add apps** blade. - - >[!Important] - >The JSON file might also return a windowsPhoneLegacyId value for both the **Publisher Name** and **Product Name** boxes. This means that you have an app that’s using a XAP package and that you must set the **Product Name** as windowsPhoneLegacyId, and set the **Publisher Name** as CN= followed by the windowsPhoneLegacyId.

For example:
- {
"windowsPhoneLegacyId": "ca05b3ab-f157-450c-8c49-a1f127f5e71d",
}
- -**To find the publisher and product name values for apps installed on Windows 10 mobile phones** -1. If you need to add mobile apps that aren't distributed through the Microsoft Store for Business, you must use the **Windows Device Portal** feature. - - >[!NOTE] - >Your PC and phone must be on the same wireless network. - -2. On the Windows Phone, go to **Settings**, choose **Update & security**, and then choose **For developers**. - -3. In the **For developers** screen, turn on **Developer mode**, turn on **Device Discovery**, and then turn on **Device Portal**. - -4. Copy the URL in the **Device Portal** area into your device's browser, and then accept the SSL certificate. - -5. In the **Device discovery** area, press **Pair**, and then enter the PIN into the website from the previous step. - -6. On the **Apps** tab of the website, you can see details for the running apps, including the publisher and product names. - -7. Start the app for which you're looking for the publisher and product name values. - -8. Copy the `publisherCertificateName` value and paste it into the **Publisher Name** box and the `packageIdentityName` value into the **Product Name** box of Intune. - - >[!Important] - >The JSON file might also return a windowsPhoneLegacyId value for both the **Publisher Name** and **Product Name** boxes. This means that you have an app that’s using a XAP package and that you must set the **Product Name** as windowsPhoneLegacyId, and set the **Publisher Name** as CN= followed by the windowsPhoneLegacyId.

For example:
- {
"windowsPhoneLegacyId": "ca05b3ab-f157-450c-8c49-a1f127f5e71d",
}
- -### Add a Desktop app to your Protected apps list -For this example, we’re going to add WordPad, a Desktop app, to the **Protected apps** list. - -**To add a Desktop app** -1. From the **Client apps - App protection policies** blade, click the name of your policy, and then click **Protected apps** from the menu that appears. - - The **Protected apps** blade appears, showing you any apps that are already included in the list for this policy. - -2. From the **Protected apps** blade, click **Add apps**. - -3. On the **Add apps** blade, click **Desktop apps** from the dropdown list. - - The blade changes to show boxes for you to add the following, based on the results you want returned: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
FieldManages
All fields marked as “*”All files signed by any publisher. (Not recommended)
NameA friendly name for your app. You can't use this field by itself. However, you can use it in conjunction with any of the other fields.
Publisher (required) onlyFilling out this field, gives you all files signed by the named publisher. This might be useful if your company is the publisher and signer of internal line-of-business apps.

This is a required field and must be filled out whether by itself or in conjunction with other fields.
Publisher (required) and Product name onlyIf you only fill out these fields, you’ll get all files for the specified product, signed by the named publisher.
Publisher (required), Product name, and File onlyIf you only fill out these fields, you’ll get any version of the named file or package for the specified product, signed by the named publisher.
Publisher (required), Product name, File, and Min version onlyIf you only fill out these fields, you’ll get the specified version or newer releases of the named file or package for the specified product, signed by the named publisher.

This option is recommended for enlightened apps that weren't previously enlightened.
Publisher (required), Product name, File, and Max version onlyIf you only fill out these fields, you’ll get the specified version or older releases of the named file or package for the specified product, signed by the named publisher.
All fields completedIf you fill out all fields, you’ll get the specified version of the named file or package for the specified product, signed by the named publisher.
- -4. After you’ve entered the info into the fields, click **OK** to add the app to your **Protected apps** list, and then click **Save** to save the **Protected apps** list to your policy. - - >[!Note] - >To add multiple Desktop apps at the same time, you can click the menu **(…)** at the end of the app row, and then continue to add more apps. When you’re done, click **OK**. - - ![Microsoft Intune management console: Adding Desktop app info](images/wip-azure-add-desktop-apps.png) - -#### Find the Publisher and File name for Desktop apps -If you’re unsure about what to include for the publisher, you can run this PowerShell command: - -```ps1 -Get-AppLockerFileInformation -Path "" -``` -Where `""` goes to the location of the app on the device. For example, `Get-AppLockerFileInformation -Path "C:\Program Files\Windows NT\Accessories\wordpad.exe"`. - -In this example, you'd get the following info: - -``` json -Path Publisher ----- --------- -%PROGRAMFILES%\WINDOWS NT\ACCESSORIES\WORDPAD.EXE O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US -``` -Where the text, `O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US` is the publisher name to enter into the **Publisher** box and `WORDPAD.EXE` is the text to enter into the **File** box. - -### Import a list of apps to your Protected apps list -For this example, we’re going to add an AppLocker XML file to the **Protected apps** list. You’ll use this option if you want to add multiple apps at the same time. For more info about AppLocker, see the [AppLocker](https://technet.microsoft.com/itpro/windows/keep-secure/applocker-overview) content. - -**To create a list of Protected apps using the AppLocker tool** - -1. Open the Local Security Policy snap-in (SecPol.msc). - -2. In the left blade, expand **Application Control Policies**, expand **AppLocker**, and then click **Packaged App Rules**. - - ![Local security snap-in, showing the Packaged app Rules](images/wip-applocker-secpol-1.png) - -3. Right-click in the right-hand blade, and then click **Create New Rule**. - - The **Create Packaged app Rules** wizard appears. - -4. On the **Before You Begin** page, click **Next**. - - ![Create Packaged app Rules wizard, showing the Before You Begin page](images/wip-applocker-secpol-wizard-1.png) - -5. On the **Permissions** page, make sure the **Action** is set to **Allow** and the **User or group** is set to **Everyone**, and then click **Next**. - - ![Create Packaged app Rules wizard, showing the Before You Begin page](images/wip-applocker-secpol-wizard-2.png) - -6. On the **Publisher** page, click **Select** from the **Use an installed packaged app as a reference** area. - - ![Create Packaged app Rules wizard, showing the Publisher](images/wip-applocker-secpol-wizard-3.png) - -7. In the **Select applications** box, pick the app that you want to use as the reference for your rule, and then click **OK**. For this example, we’re using Microsoft Dynamics 365. - - ![Create Packaged app Rules wizard, showing the Select applications page](images/wip-applocker-secpol-wizard-4.png) - -8. On the updated **Publisher** page, click **Create**. - - ![Create Packaged app Rules wizard, showing the Microsoft Dynamics 365 on the Publisher page](images/wip-applocker-secpol-wizard-5.png) - -9. Click **No** in the dialog box that appears, asking if you want to create the default rules. You must not create default rules for your WIP policy. - - ![Create Packaged app Rules wizard, showing the Microsoft Dynamics 365 on the Publisher page](images/wip-applocker-default-rule-warning.png) - -9. Review the Local Security Policy snap-in to make sure your rule is correct. - - ![Local security snap-in, showing the new rule](images/wip-applocker-secpol-create.png) - -10. In the left blade, right-click on **AppLocker**, and then click **Export policy**. - - The **Export policy** box opens, letting you export and save your new policy as XML. - - ![Local security snap-in, showing the Export Policy option](images/wip-applocker-secpol-export.png) - -11. In the **Export policy** box, browse to where the policy should be stored, give the policy a name, and then click **Save**. - - The policy is saved and you’ll see a message that says 1 rule was exported from the policy. - - **Example XML file**
- This is the XML file that AppLocker creates for Microsoft Dynamics 365. - - ```xml - - - - - - - - - - - - - - - - - ``` - -12. After you’ve created your XML file, you need to import it by using Microsoft Intune. - -**To import your list of Protected apps using Microsoft Intune** - -1. From the **Protected apps** area, click **Import apps**. - - The blade changes to let you add your import file. - - ![Microsoft Intune, Importing your AppLocker policy file using Intune](images/wip-azure-import-apps.png) - -2. Browse to your exported AppLocker policy file, and then click **Open**. - - The file imports and the apps are added to your **Allowed app** list. - -### Add exempt apps to your policy -If you're running into compatibility issues where your app is incompatible with WIP, but still needs to be used with enterprise data, you can exempt the app from the WIP restrictions. This means that your apps won't include auto-encryption or tagging and won't honor your network restrictions. It also means that your exempted apps might leak. - -**To exempt a Store app, a Desktop app, or an AppLocker policy file from the Protected apps list** - -1. From the **App policy** blade, click the name of your policy, and then click **Exempt apps** from the menu that appears. - - The **Exempt apps** blade appears, showing you any apps that are already included in the list for this policy. - -2. From the **Exempt apps** blade, click **Add apps**. - - Be aware that when you exempt apps, they’re allowed to bypass the WIP restrictions and access your corporate data. To allow apps, see the [Add app rules to your policy](#add-apps-to_your-allowed-apps-list) section of this topic. - -3. Fill out the rest of the app info, based on the type of app you’re adding: - - - **Recommended app.** Follow the instructions in the [Add a Recommended app to your Protected apps list](#add-a-recommended-app-to_your-allowed-apps-list) section of this topic. - - - **Store app.** Follow the instructions in the [Add a Store app to your Protected apps list](#add-a-store-app-to_your-allowed-apps-list) section of this topic. - - - **Desktop app.** Follow the instructions in the [Add a Desktop app to your Protected apps list](#add-a-desktop-app-to_your-allowed-apps-list) section of this topic. - - - **AppLocker policy file.** Follow the instructions to create your app list in the [Import a list of apps to your Protected apps list](#import-a-list-of-apps-to_your-allowed-apps-list) section of this topic, using a list of exempted apps. - -4. Click **OK**. - -## Manage your Required settings -In the **Required settings** blade you must pick your Windows Information Protection mode and you can review or change your **Corporate identity**. - -### Manage the WIP protection mode for your enterprise data -After you've added the apps you want to protect with WIP, you'll need to apply a management and protection mode. - -We recommend that you start with **Silent** or **Allow Overrides** while verifying with a small group that you have the right apps on your allowed apps list. After you're done, you can change to your final enforcement policy, **Block**. - ->[!NOTE] ->For info about how to collect your audit log files, see [How to collect Windows Information Protection (WIP) audit event logs](collect-wip-audit-event-logs.md). - -**To add your protection mode** - -1. From the **Client apps - App protection policies** blade, click the name of your policy, and then click **Required settings** from the menu that appears. - - The **Required settings** blade appears. - - ![Microsoft Intune, Required settings blade showing Windows Information Protection mode](images/wip-azure-required-settings-protection-mode.png) - - |Mode |Description | - |-----|------------| - |Block |WIP looks for inappropriate data sharing practices and stops the employee from completing the action. This can include sharing info across non-enterprise-protected apps in addition to sharing enterprise data between other people and devices outside of your enterprise.| - |Allow Overrides |WIP looks for inappropriate data sharing, warning employees if they do something deemed potentially unsafe. However, this management mode lets the employee override the policy and share the data, logging the action to your audit log. For info about how to collect your audit log files, see [How to collect Windows Information Protection (WIP) audit event logs](collect-wip-audit-event-logs.md).| - |Silent |WIP runs silently, logging inappropriate data sharing, without blocking anything that would’ve been prompted for employee interaction while in Allow Override mode. Unallowed actions, like apps inappropriately trying to access a network resource or WIP-protected data, are still stopped.| - |Off (not recommended) |WIP is turned off and doesn't help to protect or audit your data.

After you turn off WIP, an attempt is made to decrypt any WIP-tagged files on the locally attached drives. Be aware that your previous decryption and policy info isn’t automatically reapplied if you turn WIP protection back on.| - -2. Click **Save**. - -### Define your enterprise-managed corporate identity -Corporate identity, usually expressed as your primary Internet domain (for example, contoso.com), helps to identify and tag your corporate data from apps you’ve marked as protected by WIP. For example, emails using contoso.com are identified as being corporate and are restricted by your Windows Information Protection policies. - -Starting with Windows 10, version 1703, Intune automatically determines your corporate identity and adds it to the **Corporate identity** field. - -**To change your corporate identity** - -1. From the **Client apps - App protection policies** blade, click the name of your policy, and then click **Required settings** from the menu that appears. - - The **Required settings** blade appears. - -2. If the auto-defined identity isn’t correct, you can change the info in the **Corporate identity** field. If you need to add additional domains, for example your email domains, you can do it in the **Advanced settings** area. - - ![Microsoft Intune, Set your corporate identity for your organization](images/wip-azure-required-settings-corp-identity.png) - -## Manage your Advanced settings -In the **Advanced settings** blade you must specify where apps can access your corporate data, upload a Data Recovery Agent (DRA) certificate, and set several optional data protection and access settings. - -### Choose where apps can access enterprise data -After you've added a protection mode to your apps, you'll need to decide where those apps can access enterprise data on your network. - -Intune will add SharePoint sites that are discovered through the Graph API. You must add other network locations. This area applies to any network endpoint device that gets an IP address in your enterprise’s range and is also bound to one of your enterprise domains, including SMB shares. Local file system locations should just maintain encryption (for example, on local NTFS, FAT, ExFAT). - ->[!Important] ->Every WIP policy should include policy that defines your enterprise network locations.
Classless Inter-Domain Routing (CIDR) notation isn’t supported for WIP configurations. - -**To define where your allowed apps can find and send enterprise data on you network** - -1. From the **Client apps - App protection policies** blade, click the name of your policy, and then click **Advanced settings** from the menu that appears. - - The **Advanced settings** blade appears. - -2. Click **Add network boundary** from the **Network perimeter** area. - - The **Add network boundary** blade appears. - - ![Microsoft Intune, Set where your apps can access enterprise data on your network](images/wip-azure-advanced-settings-network.png) - -3. Select the type of network boundary to add from the **Boundary type** box. - -4. Type a name for your boundary into the **Name** box, add your values to the **Value** box, based on the following options, and then click **OK**. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Boundary typeValue formatDescription
Cloud ResourcesWith proxy: contoso.sharepoint.com,contoso.internalproxy1.com|
contoso.visualstudio.com,contoso.internalproxy2.com

Without proxy: contoso.sharepoint.com|contoso.visualstudio.com
Specify the cloud resources to be treated as corporate and protected by WIP.

For each cloud resource, you may also optionally specify a proxy server from your Internal proxy servers list to route traffic for this cloud resource. Be aware that all traffic routed through your Internal proxy servers is considered enterprise.

If you have multiple resources, you must separate them using the "|" delimiter. If you don’t use proxy servers, you must also include the "," delimiter just before the "|". For example: URL <,proxy>|URL <,proxy>.

Important
In some cases, such as when an app connects directly to a cloud resource through an IP address, Windows can’t tell whether it’s attempting to connect to an enterprise cloud resource or to a personal site. In this case, Windows blocks the connection by default. To stop Windows from automatically blocking these connections, you can add the /*AppCompat*/ string to the setting. For example: URL <,proxy>|URL <,proxy>|/*AppCompat*/.

When using this string, we recommend that you also turn on [Azure Active Directory Conditional Access](https://docs.microsoft.com/azure/active-directory/active-directory-conditional-access), using the Domain joined or marked as compliant option, which blocks apps from accessing any enterprise cloud resources that are protected by conditional access.
Network domain namescorp.contoso.com,region.contoso.comStarting with Windows 10, version 1703, this field is optional.

Specify the DNS suffixes used in your environment. All traffic to the fully-qualified domains appearing in this list will be protected.

If you have multiple resources, you must separate them using the "," delimiter.
Proxy serversproxy.contoso.com:80;proxy2.contoso.com:443Specify the proxy servers your devices will go through to reach your cloud resources. Using this server type indicates that the cloud resources you’re connecting to are enterprise resources.

This list shouldn’t include any servers listed in your Internal proxy servers list. Internal proxy servers must be used only for WIP-protected (enterprise) traffic.

If you have multiple resources, you must separate them using the ";" delimiter.
Internal proxy serverscontoso.internalproxy1.com;contoso.internalproxy2.comSpecify the internal proxy servers your devices will go through to reach your cloud resources. Using this server type indicates that the cloud resources you’re connecting to are enterprise resources.

This list shouldn’t include any servers listed in your Proxy servers list. Proxy servers must be used only for non-WIP-protected (non-enterprise) traffic.

If you have multiple resources, you must separate them using the ";" delimiter.
IPv4 ranges**Starting IPv4 Address:** 3.4.0.1
**Ending IPv4 Address:** 3.4.255.254
**Custom URI:** 3.4.0.1-3.4.255.254,
10.0.0.1-10.255.255.254
Starting with Windows 10, version 1703, this field is optional.

Specify the addresses for a valid IPv4 value range within your intranet. These addresses, used with your Network domain names, define your corporate network boundaries.

If you have multiple ranges, you must separate them using the "," delimiter.
IPv6 ranges**Starting IPv6 Address:** 2a01:110::
**Ending IPv6 Address:** 2a01:110:7fff:ffff:ffff:ffff:ffff:ffff
**Custom URI:** 2a01:110:7fff:ffff:ffff:ffff:ffff:ffff,
fd00::-fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff
Starting with Windows 10, version 1703, this field is optional.

Specify the addresses for a valid IPv6 value range within your intranet. These addresses, used with your Network domain names, define your corporate network boundaries.

If you have multiple ranges, you must separate them using the "," delimiter.
Neutral resourcessts.contoso.com,sts.contoso2.comSpecify your authentication redirection endpoints for your company.

These locations are considered enterprise or personal, based on the context of the connection before the redirection.

If you have multiple resources, you must separate them using the "," delimiter.
- -5. Repeat steps 1-4 to add any additional network boundaries. - -6. Decide if you want to Windows to look for additional network settings: - - ![Microsoft Intune, Choose if you want Windows to search for additional proxy servers or IP ranges in your enterprise](images/wip-azure-advanced-settings-network-autodetect.png) - - - **Enterprise Proxy Servers list is authoritative (do not auto-detect).** Click **On** for Windows to treat the proxy servers you specified in the network boundary definition as the complete list of proxy servers available on your network.Click **Off** and Windows searches for additional proxy servers in your immediate network. - - - **Enterprise IP Ranges list is authoritative (do not auto-detect).** Click **On** for Windows to treat the IP ranges you specified in the network boundary definition as the complete list of IP ranges available on your network. Click **Off** and Windows searches for additional IP ranges on any domain-joined devices connected to your network. - -### Upload your Data Recovery Agent (DRA) certificate -After you create and deploy your WIP policy to your employees, Windows begins to encrypt your corporate data on the employees’ local device drive. If somehow the employees’ local encryption keys get lost or revoked, the encrypted data can become unrecoverable. To help avoid this possibility, the Data Recovery Agent (DRA) certificate lets Windows use an included public key to encrypt the local data while you maintain the private key that can unencrypt the data. - ->[!Important] ->Using a DRA certificate isn’t mandatory. However, we strongly recommend it. For more info about how to find and export your data recovery certificate, see the [Data Recovery and Encrypting File System (EFS)](https://go.microsoft.com/fwlink/p/?LinkId=761462) topic. For more info about creating and verifying your EFS DRA certificate, see the [Create and verify an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate](create-and-verify-an-efs-dra-certificate.md) topic. - -**To upload your DRA certificate** -1. From the **Client apps - App protection policies** blade, click the name of your policy, and then click **Advanced settings** from the menu that appears. - - The **Advanced settings** blade appears. - -2. In the **Upload a Data Recovery Agent (DRA) certificate to allow recovery of encrypted data** box, click **Browse** to add a data recovery certificate for your policy. - - ![Microsoft Intune, Upload your Data Recovery Agent (DRA) certificate](images/wip-azure-advanced-settings-efsdra.png) - -### Choose your optional WIP-related settings -After you've decided where your protected apps can access enterprise data on your network, you’ll be asked to decide if you want to add any optional WIP settings. - -**To set your optional settings** - -1. From the **Client apps - App protection policies** blade, click the name of your policy, and then click **Advanced settings** from the menu that appears. - - The **Advanced settings** blade appears. - -2. Choose to set any or all optional settings: - - ![Microsoft Intune, Choose if you want to include any of the optional settings](images/wip-azure-advanced-settings-optional.png) - - - **Prevent corporate data from being accessed by apps when the device is locked. Applies only to Windows 10 Mobile.** Determines whether to encrypt enterprise data using a key that's protected by an employee's PIN code on a locked device. Apps won't be able to read corporate data when the device is locked. The options are: - - - **On (recommended).** Turns on the feature and provides the additional protection. - - - **Off** Doesn't enable this feature. - - - **Revoke encryption keys on unenroll.** Determines whether to revoke a user’s local encryption keys from a device when it’s unenrolled from Windows Information Protection. If the encryption keys are revoked, a user no longer has access to encrypted corporate data. The options are: - - - **On (recommended).** Revokes local encryption keys from a device during unenrollment. - - - **Off.** Stop local encryption keys from being revoked from a device during unenrollment. For example if you’re migrating between Mobile Device Management (MDM) solutions. - - - **Revoke access to protected data when the device enrolls to MDM.** Determines whether to revoke a user's WIP keys when a device is upgraded from MAM to a higher-security MDM solution. The options are: - - - **On.** Revokes the encryption keys from a device when it's upgraded from MAM to MDM. - - - **Off.** Encryption keys aren't removed and the user can continue to access protected files. This is the recommended setting if the MDM service uses the same WIP EnterpriseID value as the MAM service. - - - **Show the enterprise data protection icon.** Determines whether an icon appears on corporate files in the **Save As** and **File Explorer** views. The options are: - - - **On.** Allows an icon to appear on corporate files in the **Save As** and **File Explorer** views. Additionally, for unenlightened but allowed apps, the icon also appears on the app tile and with Managed text on the app name in the **Start** menu. - - - **Off (recommended).** Stops the icon from appearing on corporate files or unenlightened, but allowed apps. By default, this is turned off. - - - **Use Azure RMS for WIP.** Determines whether to use Azure Rights Management encryption with Windows Information Protection. The options are: - - - **On.** Starts using Azure Rights Management encryption with WIP. By turning this option on, you can also add a TemplateID GUID to specify who can access the Azure Rights Management protected files, and for how long. For more info about setting up Azure Rights management and using a template ID with WIP, see the [Choose to set up Azure Rights Management with WIP](#choose-to-set-up-azure-rights-management-with-wip) section of this topic. - - - **Off.** Stops using Azure Rights Management encryption with WIP. - - - **MDM discovery URL.** Lets the **Windows Settings** > **Accounts** > **Access work or school** sign-in offer an **Upgrade to MDM** link. Additionally, this lets you switch to another MDM provider, so that Microsoft Intune can manage MAM, while the new MDM provider manages the MDM devices. By default, this is specified to use Microsoft Intune. - -#### Choose to set up Azure Rights Management with WIP -WIP can integrate with Microsoft Azure Rights Management to enable secure sharing of files by using removable drives such as USB drives. For more info about Azure Rights Management, see [Microsoft Azure Rights Management](https://products.office.com/business/microsoft-azure-rights-management). To integrate Azure Rights Management with WIP, you must already have Azure Rights Management set up. - -To configure WIP to use Azure Rights Management, you must set the **AllowAzureRMSForEDP** MDM setting to **1** in Microsoft Intune. This setting tells WIP to encrypt files copied to removable drives with Azure Rights Management, so they can be shared amongst your employees on computers running at least Windows 10, version 1703. - -Optionally, if you don’t want everyone in your organization to be able to share your enterprise data, you can set the **RMSTemplateIDForEDP** MDM setting to the **TemplateID** of the Azure Rights Management template used to encrypt the data. You must make sure to mark the template with the **EditRightsData** option. - ->[!IMPORTANT] ->Curly braces -- {} -- are required around the RMS Template ID. - ->[!NOTE] ->For more info about setting the **AllowAzureRMSForEDP** and the **RMSTemplateIDForEDP** MDM settings, see the [EnterpriseDataProtection CSP](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/enterprisedataprotection-csp) topic. For more info about setting up and using a custom template, see [Configuring custom templates for the Azure Rights Management service](https://docs.microsoft.com/information-protection/deploy-use/configure-custom-templates) topic. - -### Choose whether to use and configure Windows Hello for Business -You can turn on Windows Hello for Business, letting your employees use it as a sign-in method for their devices. - -**To turn on and configure Windows Hello for Business** - -1. From the **Client apps - App protection policies** blade, click the name of your policy, and then click **Advanced settings** from the menu that appears. - - The **Advanced settings** blade appears. - -2. Choose to turn on and configure the Windows Hello for Business settings: - - ![Microsoft Intune, Choose to use Windows Hello for Business](images/wip-azure-access-options.png) - - - **Use Windows Hello for Business as a method for signing into Windows.** Turns on Windows Hello for Business. The options are: - - - **On.** Turns on Windows Hello For Business for anyone assigned to this policy. - - - **Off.** Turns off Windows Hello for Business. - - - **Set the minimum number of characters required for the PIN.** Enter a numerical value (4-127 characters) for how many characters must be used to create a valid PIN. Default is 4 characters. - - - **Configure the use of uppercase letters in the Windows Hello for Business PIN.** Lets you decide whether uppercase letters can be used in a valid PIN. The options are: - - - **Allow the use of uppercase letters in PIN.** Lets an employee use uppercase letters in a valid PIN. - - - **Require the use of at least one uppercase letter in PIN.** Requires an employee to use at least 1 uppercase letter in a valid PIN. - - - **Do not allow the use of uppercase letters in PIN.** Prevents an employee from using uppercase letters in a valid PIN. - - - **Configure the use of lowercase letters in the Windows Hello for Business PIN.** Lets you decide whether lowercase letters can be used in a valid PIN. The options are: - - - **Allow the use of lowercase letters in PIN.** Lets an employee use lowercase letters in a valid PIN. - - - **Require the use of at least one lowercase letter in PIN.** Requires an employee to use at least 1 lowercase letter in a valid PIN. - - - **Do not allow the use of lowercase letters in PIN.** Prevents an employee from using lowercase letters in a valid PIN. - - - **Configure the use of special characters in the Windows Hello for Business PIN.** Lets you decide whether special characters can be used in a valid PIN. The options are: - - - **Allow the use of special characters in PIN.** Lets an employee use special characters in a valid PIN. - - - **Require the use of at least one special character in PIN.** Requires an employee to use at least 1 special character in a valid PIN. - - - **Do not allow the use of special characters in PIN.** Prevents an employee from using special characters in a valid PIN. - - - **Specify the period of time (in days) that a PIN can be used before the system requires the user to change it.** Enter a numerical value (0-730 days) for how many days can pass before a PIN must be changed. If you enter a value of 0, the PIN never expires. - - - **Specify the number of past PINs that can be associated to a user account that can't be reused.** Enter a numerical value (0-50 days) for how many days can pass before an employee can reuse a previous PIN. If you enter a value of 0, a PINs can be reused immediately and past PINs aren't stored. - - >[!NOTE] - >PIN history is not preserved through a PIN reset. - - - **Number of authentication failures allowed before the device will be wiped.** Enter a numerical value for how many times the PIN can be incorrectly entered before wiping the device of corporate data. If you enter a value of 0, the device is never wiped, regardless of the number of incorrect PIN entries.

This setting has different behavior for mobile devices and desktops. - - - **On mobile devices.** When an employee reaches the value set here, the device is wiped of corporate data. - - - **On desktop devices.** When an employee reaches the value set here, the desktop is put into BitLocker recovery mode, instead of being wiped. You must have BitLocker installed on the device or this setting is ignored. - - - **Maximum amount of time (in minutes) allowed after the device is idle that will cause the device to become PIN or password locked.** Enter a numerical value for how many days can pass before a PIN must be changed. If you enter a value of 0, the device never becomes PIN or password locked while idle. - - >[!NOTE] - >You can set this value to be anything; however, it can't be longer than the time specified by the **Settings** app. If you exceed the maximum timeout value, this setting is ignored. - - -## Deploy your policy -After you’ve created your policy, you'll need to deploy it to your employees. MAM is deployed to users and not devices. - -**To deploy your policy** - -1. On the **Client apps - App protection policies** pane, click your newly-created policy, click **Assignments** from the menu that appears, and then click **Select groups**. - - A list of user groups, made up of all of the security groups in your Azure Active Directory, appear in the **Add user group** pane. - -2. Choose the group you want your policy to apply to, and then click **Select** to deploy the policy. - - The policy is deployed to the selected group. - - ![Microsoft Intune, Pick your user groups that should get the policy when it's deployed](images/wip-azure-add-user-groups.png) - -## Related topics - -- [Implement server-side support for mobile application management on Windows](https://docs.microsoft.com/windows/client-management/mdm/implement-server-side-mobile-application-management) - -- [Microsoft Intune - Mobile Application Management (MAM) standalone blog post](https://blogs.technet.microsoft.com/cbernier/2016/01/05/microsoft-intune-mobile-application-management-mam-standalone/) - -- [MAM-supported apps](https://www.microsoft.com/cloud-platform/microsoft-intune-apps) - -- [General guidance and best practices for Windows Information Protection (WIP)](guidance-and-best-practices-wip.md) - -- [How to collect Windows Information Protection (WIP) audit event logs](collect-wip-audit-event-logs.md) From adb1fced13cae6c92a48cd5ee21e90ab20b73db1 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Mon, 11 Mar 2019 13:48:16 -0700 Subject: [PATCH 19/22] changede link --- .../threat-protection/change-history-for-threat-protection.md | 2 +- .../device-control/control-usb-devices-using-intune.md | 2 +- windows/security/threat-protection/index.md | 2 +- .../collect-diagnostic-data-update-compliance.md | 2 +- .../command-line-arguments-windows-defender-antivirus.md | 2 +- ...uration-management-reference-windows-defender-antivirus.md | 2 +- ...onfigure-advanced-scan-types-windows-defender-antivirus.md | 2 +- ...nfigure-block-at-first-sight-windows-defender-antivirus.md | 2 +- ...e-cloud-block-timeout-period-windows-defender-antivirus.md | 2 +- ...nfigure-end-user-interaction-windows-defender-antivirus.md | 2 +- .../configure-exclusions-windows-defender-antivirus.md | 2 +- ...re-extension-file-exclusions-windows-defender-antivirus.md | 2 +- ...igure-local-policy-overrides-windows-defender-antivirus.md | 2 +- ...onfigure-network-connections-windows-defender-antivirus.md | 2 +- .../configure-notifications-windows-defender-antivirus.md | 2 +- ...ocess-opened-file-exclusions-windows-defender-antivirus.md | 2 +- ...onfigure-protection-features-windows-defender-antivirus.md | 2 +- ...nfigure-real-time-protection-windows-defender-antivirus.md | 2 +- .../configure-remediation-windows-defender-antivirus.md | 2 +- .../configure-server-exclusions-windows-defender-antivirus.md | 2 +- .../configure-windows-defender-antivirus-features.md | 2 +- ...e-run-review-remediate-scans-windows-defender-antivirus.md | 2 +- .../deploy-manage-report-windows-defender-antivirus.md | 2 +- .../deploy-windows-defender-antivirus.md | 2 +- .../deployment-vdi-windows-defender-antivirus.md | 2 +- ...ck-potentially-unwanted-apps-windows-defender-antivirus.md | 2 +- .../enable-cloud-protection-windows-defender-antivirus.md | 2 +- .../evaluate-windows-defender-antivirus.md | 2 +- .../limited-periodic-scanning-windows-defender-antivirus.md | 2 +- .../manage-event-based-updates-windows-defender-antivirus.md | 2 +- .../manage-outdated-endpoints-windows-defender-antivirus.md | 2 +- ...e-protection-update-schedule-windows-defender-antivirus.md | 2 +- .../manage-protection-updates-windows-defender-antivirus.md | 2 +- .../manage-updates-baselines-windows-defender-antivirus.md | 2 +- ...e-updates-mobile-devices-vms-windows-defender-antivirus.md | 2 +- ...prevent-end-user-interaction-windows-defender-antivirus.md | 2 +- .../report-monitor-windows-defender-antivirus.md | 2 +- .../restore-quarantined-files-windows-defender-antivirus.md | 2 +- .../review-scan-results-windows-defender-antivirus.md | 2 +- .../run-scan-windows-defender-antivirus.md | 2 +- .../scheduled-catch-up-scans-windows-defender-antivirus.md | 2 +- ...ecify-cloud-protection-level-windows-defender-antivirus.md | 2 +- .../windows-defender-antivirus/troubleshoot-reporting.md | 2 +- .../troubleshoot-windows-defender-antivirus.md | 2 +- .../use-group-policy-windows-defender-antivirus.md | 2 +- .../use-intune-config-manager-windows-defender-antivirus.md | 2 +- .../use-powershell-cmdlets-windows-defender-antivirus.md | 2 +- .../use-wmi-windows-defender-antivirus.md | 2 +- ...e-microsoft-cloud-protection-windows-defender-antivirus.md | 2 +- .../windows-defender-antivirus-compatibility.md | 2 +- .../windows-defender-antivirus-in-windows-10.md | 2 +- .../windows-defender-antivirus-on-windows-server-2016.md | 2 +- .../windows-defender-antivirus/windows-defender-offline.md | 2 +- .../windows-defender-security-center-antivirus.md | 2 +- .../configure-wd-app-guard.md | 2 +- .../windows-defender-application-guard/faq-wd-app-guard.md | 2 +- .../install-wd-app-guard.md | 2 +- .../windows-defender-application-guard/reqs-wd-app-guard.md | 2 +- .../test-scenarios-wd-app-guard.md | 2 +- .../wd-app-guard-overview.md | 2 +- ...ed-features-windows-defender-advanced-threat-protection.md | 2 +- ...t-practices-windows-defender-advanced-threat-protection.md | 2 +- ...g-reference-windows-defender-advanced-threat-protection.md | 2 +- ...lerts-queue-windows-defender-advanced-threat-protection.md | 2 +- ...tal-mapping-windows-defender-advanced-threat-protection.md | 2 +- ...rtal-access-windows-defender-advanced-threat-protection.md | 2 +- ...simulations-windows-defender-advanced-threat-protection.md | 2 +- ...permissions-windows-defender-advanced-threat-protection.md | 2 +- ...nsor-status-windows-defender-advanced-threat-protection.md | 2 +- .../community-windows-defender-advanced-threat-protection.md | 2 +- ...onal-access-windows-defender-advanced-threat-protection.md | 2 +- ...re-arcsight-windows-defender-advanced-threat-protection.md | 2 +- ...onal-access-windows-defender-advanced-threat-protection.md | 2 +- ...tifications-windows-defender-advanced-threat-protection.md | 2 +- ...ndpoints-gp-windows-defender-advanced-threat-protection.md | 2 +- ...dpoints-mdm-windows-defender-advanced-threat-protection.md | 2 +- ...non-windows-windows-defender-advanced-threat-protection.md | 2 +- ...points-sccm-windows-defender-advanced-threat-protection.md | 2 +- ...ints-script-windows-defender-advanced-threat-protection.md | 2 +- ...e-endpoints-windows-defender-advanced-threat-protection.md | 2 +- .../configure-microsoft-threat-experts.md | 2 +- ...ssp-support-windows-defender-advanced-threat-protection.md | 2 +- ...xy-internet-windows-defender-advanced-threat-protection.md | 2 +- ...r-endpoints-windows-defender-advanced-threat-protection.md | 2 +- ...figure-siem-windows-defender-advanced-threat-protection.md | 2 +- ...gure-splunk-windows-defender-advanced-threat-protection.md | 2 +- .../windows-defender-atp/custom-detection-rules.md | 2 +- ...stom-ti-api-windows-defender-advanced-threat-protection.md | 2 +- ...on-settings-windows-defender-advanced-threat-protection.md | 2 +- ...age-privacy-windows-defender-advanced-threat-protection.md | 2 +- ...mpatibility-windows-defender-advanced-threat-protection.md | 2 +- ...e-custom-ti-windows-defender-advanced-threat-protection.md | 2 +- ...ecure-score-windows-defender-advanced-threat-protection.md | 2 +- ...integration-windows-defender-advanced-threat-protection.md | 2 +- .../threat-protection/windows-defender-atp/evaluate-atp.md | 2 +- ...error-codes-windows-defender-advanced-threat-protection.md | 2 +- ...t-custom-ti-windows-defender-advanced-threat-protection.md | 2 +- ...hty-sensors-windows-defender-advanced-threat-protection.md | 2 +- ...-collection-windows-defender-advanced-threat-protection.md | 2 +- ...-collection-windows-defender-advanced-threat-protection.md | 2 +- ...-collection-windows-defender-advanced-threat-protection.md | 2 +- ...-collection-windows-defender-advanced-threat-protection.md | 2 +- .../threat-protection/windows-defender-atp/get-started.md | 2 +- .../threat-protection/windows-defender-atp/incidents-queue.md | 2 +- .../information-protection-in-windows-config.md | 2 +- .../information-protection-in-windows-overview.md | 2 +- ...gate-alerts-windows-defender-advanced-threat-protection.md | 2 +- ...gate-domain-windows-defender-advanced-threat-protection.md | 2 +- ...igate-files-windows-defender-advanced-threat-protection.md | 2 +- ...e-incidents-windows-defender-advanced-threat-protection.md | 2 +- ...estigate-ip-windows-defender-advanced-threat-protection.md | 2 +- ...te-machines-windows-defender-advanced-threat-protection.md | 2 +- ...tigate-user-windows-defender-advanced-threat-protection.md | 2 +- .../licensing-windows-defender-advanced-threat-protection.md | 2 +- ...hine-groups-windows-defender-advanced-threat-protection.md | 2 +- ...ew-overview-windows-defender-advanced-threat-protection.md | 2 +- ...nage-alerts-windows-defender-advanced-threat-protection.md | 2 +- ...locked-list-windows-defender-advanced-threat-protection.md | 2 +- ...ile-uploads-windows-defender-advanced-threat-protection.md | 2 +- ...-exclusions-windows-defender-advanced-threat-protection.md | 2 +- ...e-incidents-windows-defender-advanced-threat-protection.md | 2 +- ...ssion-rules-windows-defender-advanced-threat-protection.md | 2 +- .../threat-protection/windows-defender-atp/management-apis.md | 2 +- .../microsoft-cloud-app-security-config.md | 2 +- .../microsoft-cloud-app-security-integration.md | 2 +- .../windows-defender-atp/microsoft-threat-experts.md | 2 +- ...equirements-windows-defender-advanced-threat-protection.md | 4 ++-- ...ssp-support-windows-defender-advanced-threat-protection.md | 2 +- ...rd-machines-windows-defender-advanced-threat-protection.md | 2 +- ...d-configure-windows-defender-advanced-threat-protection.md | 2 +- ...d-downlevel-windows-defender-advanced-threat-protection.md | 2 +- .../threat-protection/windows-defender-atp/onboard.md | 2 +- .../windows-defender-atp/overview-attack-surface-reduction.md | 2 +- .../windows-defender-atp/overview-custom-detections.md | 2 +- .../overview-endpoint-detection-response.md | 2 +- .../windows-defender-atp/overview-hardware-based-isolation.md | 2 +- ...iew-hunting-windows-defender-advanced-threat-protection.md | 2 +- ...ecure-score-windows-defender-advanced-threat-protection.md | 2 +- .../threat-protection/windows-defender-atp/overview.md | 2 +- ...al-overview-windows-defender-advanced-threat-protection.md | 2 +- ...rbi-reports-windows-defender-advanced-threat-protection.md | 2 +- ...xample-code-windows-defender-advanced-threat-protection.md | 2 +- ...ences-setup-windows-defender-advanced-threat-protection.md | 2 +- ...ew-settings-windows-defender-advanced-threat-protection.md | 2 +- .../preview-windows-defender-advanced-threat-protection.md | 2 +- ...ng-rest-api-windows-defender-advanced-threat-protection.md | 2 +- ...xample-code-windows-defender-advanced-threat-protection.md | 2 +- .../rbac-windows-defender-advanced-threat-protection.md | 2 +- ...file-alerts-windows-defender-advanced-threat-protection.md | 2 +- ...hine-alerts-windows-defender-advanced-threat-protection.md | 2 +- ...nse-actions-windows-defender-advanced-threat-protection.md | 2 +- ...ection-test-windows-defender-advanced-threat-protection.md | 2 +- ...e-dashboard-windows-defender-advanced-threat-protection.md | 2 +- ...s-dashboard-windows-defender-advanced-threat-protection.md | 2 +- ...vice-status-windows-defender-advanced-threat-protection.md | 2 +- ...sponse-apis-windows-defender-advanced-threat-protection.md | 2 +- ...s-dashboard-windows-defender-advanced-threat-protection.md | 2 +- .../windows-defender-atp/threat-analytics.md | 2 +- ...or-concepts-windows-defender-advanced-threat-protection.md | 2 +- .../windows-defender-atp/threat-protection-integration.md | 2 +- ...ion-reports-windows-defender-advanced-threat-protection.md | 2 +- ...me-settings-windows-defender-advanced-threat-protection.md | 2 +- ...t-custom-ti-windows-defender-advanced-threat-protection.md | 2 +- ...or-messages-windows-defender-advanced-threat-protection.md | 2 +- ...-onboarding-windows-defender-advanced-threat-protection.md | 2 +- ...eshoot-siem-windows-defender-advanced-threat-protection.md | 2 +- ...e-custom-ti-windows-defender-advanced-threat-protection.md | 2 +- .../use-windows-defender-advanced-threat-protection.md | 2 +- .../user-roles-windows-defender-advanced-threat-protection.md | 2 +- .../windows-defender-atp/view-incidents-queue.md | 2 +- .../attack-surface-reduction-exploit-guard.md | 2 +- .../audit-windows-defender-exploit-guard.md | 2 +- .../collect-cab-files-exploit-guard-submission.md | 2 +- .../controlled-folders-exploit-guard.md | 2 +- .../customize-attack-surface-reduction.md | 2 +- .../customize-controlled-folders-exploit-guard.md | 2 +- .../customize-exploit-protection.md | 2 +- .../emet-exploit-protection-exploit-guard.md | 2 +- .../enable-controlled-folders-exploit-guard.md | 2 +- .../enable-exploit-protection.md | 2 +- .../enable-network-protection.md | 2 +- ...nable-virtualization-based-protection-of-code-integrity.md | 2 +- .../evaluate-attack-surface-reduction.md | 2 +- .../evaluate-controlled-folder-access.md | 2 +- .../evaluate-exploit-protection.md | 2 +- .../evaluate-network-protection.md | 2 +- .../event-views-exploit-guard.md | 2 +- .../exploit-protection-exploit-guard.md | 2 +- .../import-export-exploit-protection-emet-xml.md | 2 +- .../windows-defender-exploit-guard/memory-integrity.md | 2 +- .../network-protection-exploit-guard.md | 2 +- ...s-for-virtualization-based-protection-of-code-integrity.md | 2 +- .../windows-defender-exploit-guard/troubleshoot-asr.md | 2 +- .../troubleshoot-exploit-protection-mitigations.md | 2 +- .../windows-defender-exploit-guard/troubleshoot-np.md | 2 +- .../windows-defender-exploit-guard.md | 2 +- 196 files changed, 197 insertions(+), 197 deletions(-) diff --git a/windows/security/threat-protection/change-history-for-threat-protection.md b/windows/security/threat-protection/change-history-for-threat-protection.md index 6261639989..1deaa652b8 100644 --- a/windows/security/threat-protection/change-history-for-threat-protection.md +++ b/windows/security/threat-protection/change-history-for-threat-protection.md @@ -1,5 +1,5 @@ --- -title: Change history for [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +title: Change history for [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) description: This topic lists new and updated topics in the WWindows Defender ATP content set. ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md index e2554705b5..1439390f50 100644 --- a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md +++ b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md @@ -13,7 +13,7 @@ ms.date: 02/22/2019 # How to control USB devices and other removable media using Windows Defender ATP -**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Microsoft recommends [a layered approach to securing removable media](https://aka.ms/devicecontrolblog), and Windows Defender ATP provides multiple monitoring and control features to help prevent threats in unauthorized peripherals from compromising your devices: diff --git a/windows/security/threat-protection/index.md b/windows/security/threat-protection/index.md index c3218e2541..44c4ef2a2f 100644 --- a/windows/security/threat-protection/index.md +++ b/windows/security/threat-protection/index.md @@ -12,7 +12,7 @@ ms.localizationpriority: medium --- # Threat Protection -[Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) is a unified platform for preventative protection, post-breach detection, automated investigation, and response. Windows Defender ATP protects endpoints from cyber threats; detects advanced attacks and data breaches, automates security incidents and improves security posture. +[Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) is a unified platform for preventative protection, post-breach detection, automated investigation, and response. Windows Defender ATP protects endpoints from cyber threats; detects advanced attacks and data breaches, automates security incidents and improves security posture.

Windows Defender ATP

diff --git a/windows/security/threat-protection/windows-defender-antivirus/collect-diagnostic-data-update-compliance.md b/windows/security/threat-protection/windows-defender-antivirus/collect-diagnostic-data-update-compliance.md index 06978674b3..61bd6e91de 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/collect-diagnostic-data-update-compliance.md +++ b/windows/security/threat-protection/windows-defender-antivirus/collect-diagnostic-data-update-compliance.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) This topic describes how to collect diagnostic data that can be used by Microsoft support and engineering teams to help troubleshoot issues you may encounter when using the Windows Defender AV Assessment section in the Update Compliance add-in. diff --git a/windows/security/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md index 52f53a81bb..2d08b48bfe 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 12/10/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can perform various Windows Defender Antivirus functions with the dedicated command-line tool mpcmdrun.exe. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus.md index 2af6cfcbc3..b2246f6bc2 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can manage and configure Windows Defender Antivirus with the following tools: diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus.md index b916b9c91e..5714563915 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus.md @@ -19,7 +19,7 @@ ms.date: 10/25/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) **Use Microsoft Intune to configure scanning options** diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md index 8f34c26265..b5d15d6b55 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Block at first sight is a feature of next gen protection that provides a way to detect and block new malware within seconds. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-cloud-block-timeout-period-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-cloud-block-timeout-period-windows-defender-antivirus.md index e78a18862c..d7ffbcbafd 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-cloud-block-timeout-period-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-cloud-block-timeout-period-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) When Windows Defender Antivirus finds a suspicious file, it can prevent the file from running while it queries the [Windows Defender Antivirus cloud service](utilize-microsoft-cloud-protection-windows-defender-antivirus.md). diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-end-user-interaction-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-end-user-interaction-windows-defender-antivirus.md index f467dac2b6..d72265f76a 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-end-user-interaction-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-end-user-interaction-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can configure how users of the endpoints on your network can interact with Windows Defender Antivirus. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-exclusions-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-exclusions-windows-defender-antivirus.md index ca5c66c4f2..430acbec64 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-exclusions-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-exclusions-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can exclude certain files, folders, processes, and process-opened files from Windows Defender Antivirus scans. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md index a9db1100c9..78351fac00 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 12/10/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can exclude certain files from Windows Defender Antivirus scans by modifying exclusion lists. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-local-policy-overrides-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-local-policy-overrides-windows-defender-antivirus.md index 833abbcaff..9feb4b7840 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-local-policy-overrides-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-local-policy-overrides-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) By default, Windows Defender Antivirus settings that are deployed via a Group Policy Object to the endpoints in your network will prevent users from locally changing the settings. You can change this in some instances. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus.md index 0cb2288b2e..71db8e1517 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 10/08/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) To ensure Windows Defender Antivirus cloud-delivered protection works properly, you need to configure your network to allow connections between your endpoints and certain Microsoft servers. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus.md index 8a98cffbc7..9874e1fe22 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) In Windows 10, application notifications about malware detection and remediation are more robust, consistent, and concise. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md index 40785cfdec..15f82314e7 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 12/10/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can exclude files that have been opened by specific processes from Windows Defender Antivirus scans. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-protection-features-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-protection-features-windows-defender-antivirus.md index acb2c79bcf..de47e8d1a8 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-protection-features-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-protection-features-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Defender Antivirus uses several methods to provide threat protection: diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md index e063f1fda5..84cef362eb 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 11/13/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Always-on protection consists of real-time protection, behavior monitoring, and heuristics to identify malware based on known suspicious and malicious activities. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-remediation-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-remediation-windows-defender-antivirus.md index 35159b5198..d09e59a96a 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-remediation-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-remediation-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) When Windows Defender Antivirus runs a scan, it will attempt to remediate or remove threats that it finds. You can configure how Windows Defender Antivirus should react to certain threats, whether it should create a restore point before remediating, and when it should remove remediated threats. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus.md index b46dab8b82..4afd9a96e5 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus.md @@ -17,7 +17,7 @@ ms.author: v-anbic **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Defender Antivirus on Windows Server 2016 computers automatically enrolls you in certain exclusions, as defined by your specified server role. See [the end of this topic](#list-of-automatic-exclusions) for a list of these exclusions. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features.md b/windows/security/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features.md index 1451728ecf..862b5513c4 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can configure Windows Defender Antivirus with a number of tools, including: diff --git a/windows/security/threat-protection/windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus.md index ae4eee36d6..b719577c49 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can use Group Policy, PowerShell, and Windows Management Instrumentation (WMI) to configure Windows Defender Antivirus scans. diff --git a/windows/security/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus.md index d142dad965..b2bfc0807f 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can deploy, manage, and report on Windows Defender Antivirus in a number of ways. diff --git a/windows/security/threat-protection/windows-defender-antivirus/deploy-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/deploy-windows-defender-antivirus.md index 59b048bfda..df219115d7 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/deploy-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/deploy-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Depending on the management tool you are using, you may need to specifically enable or configure Windows Defender Antivirus protection. diff --git a/windows/security/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus.md index 06b879559b..1bf3ab9c2f 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) In addition to standard on-premises or hardware configurations, you can also use Windows Defender Antivirus in a remote desktop (RDS) or virtual desktop infrastructure (VDI) environment. diff --git a/windows/security/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md index 475e161a65..37859694d9 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 10/02/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) The potentially unwanted application (PUA) protection feature in Windows Defender Antivirus can identify and block PUAs from downloading and installing on endpoints in your network. diff --git a/windows/security/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus.md index 5d2d921020..8a846cc675 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >[!NOTE] >The Windows Defender Antivirus cloud service is a mechanism for delivering updated protection to your network and endpoints. Although it is called a cloud service, it is not simply protection for files stored in the cloud; rather, it uses distributed resources and machine learning to deliver protection to your endpoints at a rate that is far faster than traditional Security intelligence updates. diff --git a/windows/security/threat-protection/windows-defender-antivirus/evaluate-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/evaluate-windows-defender-antivirus.md index e40b93abd1..c937715d4a 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/evaluate-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/evaluate-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Use this guide to determine how well Windows Defender Antivirus protects you from viruses, malware, and potentially unwanted applications. diff --git a/windows/security/threat-protection/windows-defender-antivirus/limited-periodic-scanning-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/limited-periodic-scanning-windows-defender-antivirus.md index 923a59f0ba..93ef8703d6 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/limited-periodic-scanning-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/limited-periodic-scanning-windows-defender-antivirus.md @@ -20,7 +20,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Limited periodic scanning is a special type of threat detection and remediation that can be enabled when you have installed another antivirus product on a Windows 10 device. diff --git a/windows/security/threat-protection/windows-defender-antivirus/manage-event-based-updates-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/manage-event-based-updates-windows-defender-antivirus.md index 6b53608726..4e04685c61 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/manage-event-based-updates-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/manage-event-based-updates-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Defender Antivirus allows you to determine if updates should (or should not) occur after certain events, such as at startup or after receiving specific reports from the cloud-delivered protection service. diff --git a/windows/security/threat-protection/windows-defender-antivirus/manage-outdated-endpoints-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/manage-outdated-endpoints-windows-defender-antivirus.md index b79024274c..9a77e63d64 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/manage-outdated-endpoints-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/manage-outdated-endpoints-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Defender Antivirus lets you define how long an endpoint can avoid an update or how many scans it can miss before it is required to update and scan itself. This is especially useful in environments where devices are not often connected to a corporate or external network, or devices that are not used on a daily basis. diff --git a/windows/security/threat-protection/windows-defender-antivirus/manage-protection-update-schedule-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/manage-protection-update-schedule-windows-defender-antivirus.md index bb3a6e46d7..4f8774109a 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/manage-protection-update-schedule-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/manage-protection-update-schedule-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Defender Antivirus lets you determine when it should look for and download updates. diff --git a/windows/security/threat-protection/windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus.md index 9f27cec145..f05c21e0b5 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus.md index c43a3b2399..99e2c737d9 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) There are two types of updates related to keeping Windows Defender Antivirus up to date: 1. Protection updates diff --git a/windows/security/threat-protection/windows-defender-antivirus/manage-updates-mobile-devices-vms-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/manage-updates-mobile-devices-vms-windows-defender-antivirus.md index b62b1c4182..93a9e45f84 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/manage-updates-mobile-devices-vms-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/manage-updates-mobile-devices-vms-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Mobile devices and VMs may require additional configuration to ensure performance is not impacted by updates. diff --git a/windows/security/threat-protection/windows-defender-antivirus/prevent-end-user-interaction-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/prevent-end-user-interaction-windows-defender-antivirus.md index 880d56c9e3..a156c5b1dd 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/prevent-end-user-interaction-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/prevent-end-user-interaction-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can use Group Policy to prevent users on endpoints from seeing the Windows Defender Antivirus interface. You can also prevent them from pausing scans. diff --git a/windows/security/threat-protection/windows-defender-antivirus/report-monitor-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/report-monitor-windows-defender-antivirus.md index efa0d8b522..6e22b89713 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/report-monitor-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/report-monitor-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) There are a number of ways you can review protection status and alerts, depending on the management tool you are using for Windows Defender Antivirus. diff --git a/windows/security/threat-protection/windows-defender-antivirus/restore-quarantined-files-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/restore-quarantined-files-windows-defender-antivirus.md index 10d6f5bedc..1718727ee2 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/restore-quarantined-files-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/restore-quarantined-files-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 11/16/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) If Windows Defender Antivirus is configured to detect and remediate threats on your device, Windows Defender Antivirus quarantines suspicious files. If you are certain these files do not present a threat, you can restore them. diff --git a/windows/security/threat-protection/windows-defender-antivirus/review-scan-results-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/review-scan-results-windows-defender-antivirus.md index c75f970b7b..ae3a67efe6 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/review-scan-results-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/review-scan-results-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) After an Windows Defender Antivirus scan completes, whether it is an [on-demand](run-scan-windows-defender-antivirus.md) or [scheduled scan](scheduled-catch-up-scans-windows-defender-antivirus.md), the results are recorded and you can view the results. diff --git a/windows/security/threat-protection/windows-defender-antivirus/run-scan-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/run-scan-windows-defender-antivirus.md index 7f0a6d6037..15a9be7d17 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/run-scan-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/run-scan-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can run an on-demand scan on individual endpoints. These scans will start immediately, and you can define parameters for the scan, such as the location or type. diff --git a/windows/security/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus.md index 74b72c9ab1..b22dc34733 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 12/10/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) > [!NOTE] > By default, Windows Defender Antivirus checks for an update 15 minutes before the time of any scheduled scans. You can [Manage the schedule for when protection updates should be downloaded and applied](manage-protection-update-schedule-windows-defender-antivirus.md) to override this default. diff --git a/windows/security/threat-protection/windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus.md index 9a2b331fae..089226de14 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can specify the level of cloud-protection offered by Windows Defender Antivirus with Group Policy and System Center Configuration Manager. diff --git a/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-reporting.md b/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-reporting.md index d1ae21771c..85b5650e9c 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-reporting.md +++ b/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-reporting.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) When you use [Windows Analytics Update Compliance to obtain reporting into the protection status of machines or endpoints](/windows/deployment/update/update-compliance-using#wdav-assessment) in your network that are using Windows Defender Antivirus, you may encounter problems or issues. diff --git a/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus.md index d23df5b8f1..0bdced17c6 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/11/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) If you encounter a problem with Windows Defender Antivirus, you can search the tables in this topic to find a matching issue and potential solution. diff --git a/windows/security/threat-protection/windows-defender-antivirus/use-group-policy-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/use-group-policy-windows-defender-antivirus.md index f1a344b3d2..dcb8f76069 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/use-group-policy-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/use-group-policy-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can use [Group Policy](https://msdn.microsoft.com/library/ee663280(v=vs.85).aspx) to configure and manage Windows Defender Antivirus on your endpoints. diff --git a/windows/security/threat-protection/windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus.md index 89cf104935..566898708b 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) If you are using System Center Configuration Manager or Microsoft Intune to manage the endpoints on your network, you can also use them to manage Windows Defender Antivirus scans. diff --git a/windows/security/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md index 73fca55e16..8e45003982 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can use PowerShell to perform various functions in Windows Defender. Similar to the command prompt or command line, PowerShell is a task-based command-line shell and scripting language designed especially for system administration, and you can read more about it at the [PowerShell hub on MSDN](https://msdn.microsoft.com/powershell/mt173057.aspx). diff --git a/windows/security/threat-protection/windows-defender-antivirus/use-wmi-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/use-wmi-windows-defender-antivirus.md index 0ae7bc9771..c4f3239b0c 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/use-wmi-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/use-wmi-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Management Instrumentation (WMI) is a scripting interface that allows you to retrieve, modify, and update settings. diff --git a/windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus.md index 0d0f8bbae9..59ec895413 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Microsoft next-gen technologies in Windows Defender Antivirus provide near-instant, automated protection against new and emerging threats. To dynamically identify new threats, these technologies work with large sets of interconnected data in the Microsoft Intelligent Security Graph and powerful artificial intelligence (AI) systems driven by advanced machine learning models. diff --git a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md index c58bf2bb8a..449d118890 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md +++ b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Defender Antivirus is automatically enabled and installed on endpoints and devices that are running Windows 10. diff --git a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md index 7e7820edbb..de41958e5e 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md +++ b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Defender Antivirus is a built-in antimalware solution that provides next generation protection for desktops, portable computers, and servers. diff --git a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md index 2434b61627..f38d0b3823 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md +++ b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Defender Antivirus is available on Windows Server 2016. In some instances it is referred to as Endpoint Protection - however, the protection engine is the same. diff --git a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-offline.md b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-offline.md index 9c669d0de5..e860e58f69 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-offline.md +++ b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-offline.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Defender Offline is an antimalware scanning tool that lets you boot and run a scan from a trusted environment. The scan runs from outside the normal Windows kernel so it can target malware that attempts to bypass the Windows shell, such as viruses and rootkits that infect or overwrite the master boot record (MBR). diff --git a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus.md index 6a03421f8d..4b78bafccb 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) In Windows 10, version 1703 and later, the Windows Defender app is part of the Windows Security. diff --git a/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md index 3579ace8b1..80dbb5a03b 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md @@ -13,7 +13,7 @@ ms.date: 10/17/2017 # Configure Windows Defender Application Guard policy settings -**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Defender Application Guard (Application Guard) works with Group Policy to help you manage your organization's computer settings. By using Group Policy, you can configure a setting once, and then copy it onto many computers. For example, you can set up multiple security settings in a GPO, which is linked to a domain, and then apply all those settings to every computer in the domain. diff --git a/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md index 0c72267505..0fe3b780be 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md @@ -13,7 +13,7 @@ ms.date: 11/07/2017 # Frequently asked questions - Windows Defender Application Guard -**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Answering frequently asked questions about Windows Defender Application Guard (Application Guard) features, integration with the Windows operating system, and general configuration. diff --git a/windows/security/threat-protection/windows-defender-application-guard/install-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/install-wd-app-guard.md index 0d185ae9bd..2ee928baee 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/install-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/install-wd-app-guard.md @@ -14,7 +14,7 @@ ms.date: 02/19/2019 # Prepare to install Windows Defender Application Guard **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ## Review system requirements diff --git a/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md index 72eb82edac..2f08cd9670 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md @@ -13,7 +13,7 @@ ms.date: 11/09/2017 # System requirements for Windows Defender Application Guard -**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) The threat landscape is continually evolving. While hackers are busy developing new techniques to breach enterprise networks by compromising workstations, phishing schemes remain one of the top ways to lure employees into social engineering attacks. Windows Defender Application Guard is designed to help prevent old, and newly emerging attacks, to help keep employees productive. diff --git a/windows/security/threat-protection/windows-defender-application-guard/test-scenarios-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/test-scenarios-wd-app-guard.md index 798a74c87b..8f6c1b0a34 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/test-scenarios-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/test-scenarios-wd-app-guard.md @@ -14,7 +14,7 @@ ms.date: 01/16/2019 # Application Guard testing scenarios -**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) We've come up with a list of scenarios that you can use to test hardware-based isolation in your organization. diff --git a/windows/security/threat-protection/windows-defender-application-guard/wd-app-guard-overview.md b/windows/security/threat-protection/windows-defender-application-guard/wd-app-guard-overview.md index 16fa6c33df..b38bfa09f5 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/wd-app-guard-overview.md +++ b/windows/security/threat-protection/windows-defender-application-guard/wd-app-guard-overview.md @@ -13,7 +13,7 @@ ms.date: 11/27/2018 # Windows Defender Application Guard overview -**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Defender Application Guard (Application Guard) is designed to help prevent old and newly emerging attacks to help keep employees productive. Using our unique hardware isolation approach, our goal is to destroy the playbook that attackers use by making current attack methods obsolete. diff --git a/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md index c87fd3c401..938b358427 100644 --- a/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 11/16/2018 # Configure advanced features in Windows Defender ATP **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedfeats-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/advanced-hunting-best-practices-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/advanced-hunting-best-practices-windows-defender-advanced-threat-protection.md index 3589cf3196..6c0c82d32d 100644 --- a/windows/security/threat-protection/windows-defender-atp/advanced-hunting-best-practices-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/advanced-hunting-best-practices-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 04/24/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/advanced-hunting-reference-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/advanced-hunting-reference-windows-defender-advanced-threat-protection.md index 3fbf85c93e..467af897d1 100644 --- a/windows/security/threat-protection/windows-defender-atp/advanced-hunting-reference-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/advanced-hunting-reference-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 06/01/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md index d0a2edbc27..fb04442da2 100644 --- a/windows/security/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 04/24/2018 # View and organize the Windows Defender Advanced Threat Protection Alerts queue **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md index edd3eab3fe..1cec1b5053 100644 --- a/windows/security/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 10/16/2017 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection.md index e6775508c0..bc87a4503f 100644 --- a/windows/security/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 11/28/2018 **Applies to:** - Azure Active Directory - Office 365 -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-assignaccess-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/attack-simulations-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/attack-simulations-windows-defender-advanced-threat-protection.md index 76ba536762..a86ee0b027 100644 --- a/windows/security/threat-protection/windows-defender-atp/attack-simulations-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/attack-simulations-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 11/20/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/basic-permissions-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/basic-permissions-windows-defender-advanced-threat-protection.md index 6317c4b3cb..d9fa05ab08 100644 --- a/windows/security/threat-protection/windows-defender-atp/basic-permissions-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/basic-permissions-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.topic: article **Applies to:** - Azure Active Directory -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-basicaccess-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection.md index 3571e067fc..007cfbede6 100644 --- a/windows/security/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 04/24/2018 # Check sensor health state in Windows Defender ATP **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/community-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/community-windows-defender-advanced-threat-protection.md index bbe7653865..35ed4d4458 100644 --- a/windows/security/threat-protection/windows-defender-atp/community-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/community-windows-defender-advanced-threat-protection.md @@ -22,7 +22,7 @@ ms.date: 04/24/2018 # Access the Windows Defender ATP Community Center **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md index 0db8c85384..d3dff32b11 100644 --- a/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md @@ -20,7 +20,7 @@ ms.topic: article # Enable conditional access to better protect users, devices, and data **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection.md index f6ac3a4c36..989ebec483 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 12/20/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-conditional-access-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-conditional-access-windows-defender-advanced-threat-protection.md index b57e79e61b..cd442ff5d6 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-conditional-access-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-conditional-access-windows-defender-advanced-threat-protection.md @@ -20,7 +20,7 @@ ms.date: 09/03/2018 # Configure conditional access in Windows Defender ATP **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) This section guides you through all the steps you need to take to properly implement conditional access. diff --git a/windows/security/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md index d926b28800..878472814f 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 10/08/2018 # Configure alert notifications in Windows Defender ATP **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-emailconfig-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection.md index ad6b565b7e..de59ce12b7 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection.md @@ -24,7 +24,7 @@ ms.date: 04/24/2018 - Group Policy -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md index 7eb6e5ace0..57ba954930 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 12/06/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configureendpointsmdm-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md index 541f53e85e..de556b2903 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md @@ -22,7 +22,7 @@ ms.topic: article - macOS - Linux -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-nonwindows-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md index 4136a69a74..c378ca8d9d 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 12/11/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) - System Center 2012 Configuration Manager or later versions diff --git a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection.md index 14a13f7b3a..fee63e07dd 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection.md @@ -22,7 +22,7 @@ ms.topic: article **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection.md index 89b42c84ff..dc4a53e6ea 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 07/12/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md b/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md index dca722db26..f518883f9b 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md @@ -21,7 +21,7 @@ ms.date: 02/28/2019 # Configure and manage Microsoft Threat Experts capabilities **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [!include[Prerelease�information](prerelease.md)] diff --git a/windows/security/threat-protection/windows-defender-atp/configure-mssp-support-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-mssp-support-windows-defender-advanced-threat-protection.md index 785c598a10..738c8f0548 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-mssp-support-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-mssp-support-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 09/03/2018 # Configure managed security service provider integration **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-mssp-support-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md index 786987cff0..64a8b911a7 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.topic: article # Configure machine proxy and Internet connectivity settings **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md index 93dc8a9bec..4b98079963 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md @@ -25,7 +25,7 @@ ms.date: 12/14/2018 - Windows Server 2016 - Windows Server, version 1803 - Windows Server, 2019 -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [!include[Prerelease information](prerelease.md)] diff --git a/windows/security/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection.md index b59c733f97..04c596750a 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 10/16/2017 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configuresiem-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection.md index ba8f81a9ba..baf0a25a95 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 10/16/2017 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/custom-detection-rules.md b/windows/security/threat-protection/windows-defender-atp/custom-detection-rules.md index 3938e9b3f5..632b9691c5 100644 --- a/windows/security/threat-protection/windows-defender-atp/custom-detection-rules.md +++ b/windows/security/threat-protection/windows-defender-atp/custom-detection-rules.md @@ -21,7 +21,7 @@ ms.date: 10/29/2018 # Create custom detections rules **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) 1. In the navigation pane, select **Advanced hunting**. diff --git a/windows/security/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md index 14a91c2829..bc9982d2ae 100644 --- a/windows/security/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 04/24/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/data-retention-settings-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/data-retention-settings-windows-defender-advanced-threat-protection.md index 911625d579..8a393d5b81 100644 --- a/windows/security/threat-protection/windows-defender-atp/data-retention-settings-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/data-retention-settings-windows-defender-advanced-threat-protection.md @@ -22,7 +22,7 @@ ms.date: 04/24/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md index 92e081ea4a..32a1c3afe9 100644 --- a/windows/security/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 09/07/2018 # Windows Defender ATP data storage and privacy **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md index 61c31958f3..5050e3dcb1 100644 --- a/windows/security/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md @@ -24,7 +24,7 @@ ms.date: 04/24/2018 - Windows Defender -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md index aca29a67c7..49545c0428 100644 --- a/windows/security/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 04/24/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/enable-secure-score-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/enable-secure-score-windows-defender-advanced-threat-protection.md index 73b494e5e7..c4590d0678 100644 --- a/windows/security/threat-protection/windows-defender-atp/enable-secure-score-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/enable-secure-score-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 04/24/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md index c8e00fbc8f..b3d89ea8d0 100644 --- a/windows/security/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 12/10/2018 # Enable SIEM integration in Windows Defender ATP **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-enablesiem-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/evaluate-atp.md b/windows/security/threat-protection/windows-defender-atp/evaluate-atp.md index 1311f7c265..6dd9971ceb 100644 --- a/windows/security/threat-protection/windows-defender-atp/evaluate-atp.md +++ b/windows/security/threat-protection/windows-defender-atp/evaluate-atp.md @@ -19,7 +19,7 @@ ms.date: 08/10/2018 --- # Evaluate Windows Defender ATP -[Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) is a unified platform for preventative protection, post-breach detection, automated investigation, and response. +[Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) is a unified platform for preventative protection, post-breach detection, automated investigation, and response. You can evaluate Windows Defender Advanced Threat Protection in your organization by [starting your free trial](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp). diff --git a/windows/security/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection.md index af1f166fa2..f49caf3929 100644 --- a/windows/security/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection.md @@ -25,7 +25,7 @@ ms.date: 05/21/2018 - Event Viewer -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md index c41d6d1439..3e8ba14f02 100644 --- a/windows/security/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 11/09/2017 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md index c1c26a4658..3a5158d272 100644 --- a/windows/security/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 10/23/2017 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/get-cvekbmap-collection-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-cvekbmap-collection-windows-defender-advanced-threat-protection.md index 304062eb4b..4251da56b9 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-cvekbmap-collection-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-cvekbmap-collection-windows-defender-advanced-threat-protection.md @@ -22,7 +22,7 @@ ms.date: 10/07/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Retrieves a map of CVE's to KB's and CVE details. diff --git a/windows/security/threat-protection/windows-defender-atp/get-kbinfo-collection-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-kbinfo-collection-windows-defender-advanced-threat-protection.md index f44abf8b92..1752cd4d91 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-kbinfo-collection-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-kbinfo-collection-windows-defender-advanced-threat-protection.md @@ -22,7 +22,7 @@ ms.date: 10/07/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Retrieves a collection of KB's and KB details. diff --git a/windows/security/threat-protection/windows-defender-atp/get-machinegroups-collection-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-machinegroups-collection-windows-defender-advanced-threat-protection.md index acd0502c87..412c1bd762 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-machinegroups-collection-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-machinegroups-collection-windows-defender-advanced-threat-protection.md @@ -22,7 +22,7 @@ ms.date: 10/07/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Retrieves a collection of RBAC machine groups. diff --git a/windows/security/threat-protection/windows-defender-atp/get-machinesecuritystates-collection-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-machinesecuritystates-collection-windows-defender-advanced-threat-protection.md index f118c229d5..0de146e30c 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-machinesecuritystates-collection-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-machinesecuritystates-collection-windows-defender-advanced-threat-protection.md @@ -22,7 +22,7 @@ ms.date: 10/07/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Retrieves a collection of machines security states. diff --git a/windows/security/threat-protection/windows-defender-atp/get-started.md b/windows/security/threat-protection/windows-defender-atp/get-started.md index 22b8e3e7ee..6086863cb6 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-started.md +++ b/windows/security/threat-protection/windows-defender-atp/get-started.md @@ -21,7 +21,7 @@ ms.date: 11/20/2018 # Get started with Windows Defender Advanced Threat Protection **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >[!TIP] >- Learn about the latest enhancements in Windows Defender ATP: [What's new in Windows Defender ATP](https://cloudblogs.microsoft.com/microsoftsecure/2018/11/15/whats-new-in-windows-defender-atp/). diff --git a/windows/security/threat-protection/windows-defender-atp/incidents-queue.md b/windows/security/threat-protection/windows-defender-atp/incidents-queue.md index c8959b8a9b..1a769c409b 100644 --- a/windows/security/threat-protection/windows-defender-atp/incidents-queue.md +++ b/windows/security/threat-protection/windows-defender-atp/incidents-queue.md @@ -19,7 +19,7 @@ ms.topic: conceptual # Incidents in Windows Defender ATP **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) When a cybersecurity threat is emerging, or a potential attacker is deploying its tactics, techniques/tools, and procedures (TTPs) on the network, Windows Defender ATP will quickly trigger alerts and launch matching automatic investigations. diff --git a/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-config.md b/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-config.md index 7ca743699d..9eedb8b8f5 100644 --- a/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-config.md +++ b/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-config.md @@ -19,7 +19,7 @@ ms.date: 12/05/2018 # Configure information protection in Windows **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [!include[Prerelease information](prerelease.md)] diff --git a/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-overview.md b/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-overview.md index fc95457fbb..976dfff7e4 100644 --- a/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-overview.md +++ b/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-overview.md @@ -19,7 +19,7 @@ ms.date: 12/05/2018 # Information protection in Windows overview **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [!include[Prerelease information](prerelease.md)] diff --git a/windows/security/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md index caeb9391f8..1c60dae5b7 100644 --- a/windows/security/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md @@ -22,7 +22,7 @@ ms.date: 04/24/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection.md index 8da3f67372..010408840d 100644 --- a/windows/security/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection.md @@ -22,7 +22,7 @@ ms.date: 04/24/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection.md index d9ae8a7faf..cf4b455f24 100644 --- a/windows/security/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection.md @@ -22,7 +22,7 @@ ms.date: 04/24/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/investigate-incidents-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/investigate-incidents-windows-defender-advanced-threat-protection.md index 4bf073aca3..47c0edb764 100644 --- a/windows/security/threat-protection/windows-defender-atp/investigate-incidents-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/investigate-incidents-windows-defender-advanced-threat-protection.md @@ -20,7 +20,7 @@ ms.topic: article # Investigate incidents in Windows Defender ATP **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Investigate incidents that affect your network, understand what they mean, and collate evidence to resolve them. diff --git a/windows/security/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection.md index b197fed832..cf77b8afb9 100644 --- a/windows/security/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection.md @@ -22,7 +22,7 @@ ms.date: 04/24/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md index 838654bcf3..2b9d2d90f5 100644 --- a/windows/security/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 09/18/2018 # Investigate machines in the Windows Defender ATP Machines list **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-investigatemachines-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection.md index b47a079791..4260159191 100644 --- a/windows/security/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 04/24/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/licensing-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/licensing-windows-defender-advanced-threat-protection.md index 21e8be6036..c1e9c27b9c 100644 --- a/windows/security/threat-protection/windows-defender-atp/licensing-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/licensing-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.topic: article **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/machine-groups-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/machine-groups-windows-defender-advanced-threat-protection.md index 577b8b2663..653407fdf7 100644 --- a/windows/security/threat-protection/windows-defender-atp/machine-groups-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/machine-groups-windows-defender-advanced-threat-protection.md @@ -24,7 +24,7 @@ ms.date: 05/08/2018 - Azure Active Directory - Office 365 -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection.md index bf990d1101..c94234e9e1 100644 --- a/windows/security/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-machinesview-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md index 660e1f0cd1..56f599b483 100644 --- a/windows/security/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 09/03/2018 # Manage Windows Defender Advanced Threat Protection alerts **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-managealerts-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md index 94a7712aed..47c3f41079 100644 --- a/windows/security/threat-protection/windows-defender-atp/manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 06/14/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/manage-automation-file-uploads-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/manage-automation-file-uploads-windows-defender-advanced-threat-protection.md index b3d4ebdb7c..84706f7a5a 100644 --- a/windows/security/threat-protection/windows-defender-atp/manage-automation-file-uploads-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/manage-automation-file-uploads-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 04/24/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/manage-automation-folder-exclusions-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/manage-automation-folder-exclusions-windows-defender-advanced-threat-protection.md index f559363b7a..23133475a4 100644 --- a/windows/security/threat-protection/windows-defender-atp/manage-automation-folder-exclusions-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/manage-automation-folder-exclusions-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 04/24/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/manage-incidents-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/manage-incidents-windows-defender-advanced-threat-protection.md index 649d06d0fa..8b8fa19749 100644 --- a/windows/security/threat-protection/windows-defender-atp/manage-incidents-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/manage-incidents-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 010/08/2018 # Manage Windows Defender ATP incidents **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Managing incidents is an important part of every cybersecurity operation. You can manage incidents by selecting an incident from the **Incidents queue** or the **Incidents management pane**. You can assign incidents to yourself, change the status, classify, rename, or comment on them to keep track of their progress. diff --git a/windows/security/threat-protection/windows-defender-atp/manage-suppression-rules-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/manage-suppression-rules-windows-defender-advanced-threat-protection.md index 0ff8691e5c..1ec412b1f3 100644 --- a/windows/security/threat-protection/windows-defender-atp/manage-suppression-rules-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/manage-suppression-rules-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 04/24/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/management-apis.md b/windows/security/threat-protection/windows-defender-atp/management-apis.md index 8a0deb4397..f28e7a6997 100644 --- a/windows/security/threat-protection/windows-defender-atp/management-apis.md +++ b/windows/security/threat-protection/windows-defender-atp/management-apis.md @@ -21,7 +21,7 @@ ms.date: 09/03/2018 # Overview of management and APIs **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-mgt-apis-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-config.md b/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-config.md index 0c182b091a..52627d87be 100644 --- a/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-config.md +++ b/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-config.md @@ -21,7 +21,7 @@ ms.date: 10/19/2018 # Configure Microsoft Cloud App Security in Windows **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [!include[Prerelease�information](prerelease.md)] diff --git a/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-integration.md b/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-integration.md index 75ad85f97d..6c2400b885 100644 --- a/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-integration.md +++ b/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-integration.md @@ -20,7 +20,7 @@ ms.date: 10/18/2018 # Microsoft Cloud App Security in Windows overview **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [!include[Prerelease�information](prerelease.md)] diff --git a/windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts.md b/windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts.md index 3e66a55ad7..380af8ef33 100644 --- a/windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts.md +++ b/windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts.md @@ -20,7 +20,7 @@ ms.date: 02/28/2019 # Microsoft Threat Experts **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [!include[Prerelease�information](prerelease.md)] diff --git a/windows/security/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection.md index 02bcbfb594..27b07e63d4 100644 --- a/windows/security/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 11/20/2018 # Minimum requirements for Windows Defender ATP **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) There are some minimum requirements for onboarding machines to the service. @@ -41,7 +41,7 @@ Windows Defender Advanced Threat Protection requires one of the following Micros For more information on the array of features in Windows 10 editions, see [Compare Windows 10 editions](https://www.microsoft.com/en-us/windowsforbusiness/compare). -For a detailed comparison table of Windows 10 commercial edition comparison, see the [comparison PDF](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf). +For a detailed comparison table of Windows 10 commercial edition comparison, see the [comparison PDF](https://go.microsoft.com/fwlink/p/?linkid=2069559). diff --git a/windows/security/threat-protection/windows-defender-atp/mssp-support-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/mssp-support-windows-defender-advanced-threat-protection.md index 1940bd5a74..dfd40d8852 100644 --- a/windows/security/threat-protection/windows-defender-atp/mssp-support-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/mssp-support-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 10/29/2018 # Managed security service provider support **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-mssp-support-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/offboard-machines-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/offboard-machines-windows-defender-advanced-threat-protection.md index 9e1a9a8972..273bfed16c 100644 --- a/windows/security/threat-protection/windows-defender-atp/offboard-machines-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/offboard-machines-windows-defender-advanced-threat-protection.md @@ -25,7 +25,7 @@ ms.date: 04/24/2018 - Linux - Windows Server 2012 R2 - Windows Server 2016 -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md index bc7c30d8a2..a33cae087b 100644 --- a/windows/security/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 11/19/2018 # Onboard machines to the Windows Defender ATP service **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You need to turn on the sensor to give visibility within Windows Defender ATP. diff --git a/windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection.md index 0bccc2871e..0cb3ee7552 100644 --- a/windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection.md @@ -25,7 +25,7 @@ ms.topic: article - Windows 7 SP1 Pro - Windows 8.1 Pro - Windows 8.1 Enterprise -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-downlevel-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/onboard.md b/windows/security/threat-protection/windows-defender-atp/onboard.md index 6a260ac891..319d254a8e 100644 --- a/windows/security/threat-protection/windows-defender-atp/onboard.md +++ b/windows/security/threat-protection/windows-defender-atp/onboard.md @@ -21,7 +21,7 @@ ms.date: 09/03/2018 # Configure and manage Windows Defender ATP capabilities **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Configure and manage all the Windows Defender ATP capabilities to get the best security protection for your organization. diff --git a/windows/security/threat-protection/windows-defender-atp/overview-attack-surface-reduction.md b/windows/security/threat-protection/windows-defender-atp/overview-attack-surface-reduction.md index c23a4512ad..c2617a285e 100644 --- a/windows/security/threat-protection/windows-defender-atp/overview-attack-surface-reduction.md +++ b/windows/security/threat-protection/windows-defender-atp/overview-attack-surface-reduction.md @@ -21,7 +21,7 @@ ms.date: 02/21/2019 # Overview of attack surface reduction **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Attack surface reduction capabilities in Windows Defender ATP helps protect the devices and applications in your organization from new and emerging threats. diff --git a/windows/security/threat-protection/windows-defender-atp/overview-custom-detections.md b/windows/security/threat-protection/windows-defender-atp/overview-custom-detections.md index a9c37011dc..13268d34ad 100644 --- a/windows/security/threat-protection/windows-defender-atp/overview-custom-detections.md +++ b/windows/security/threat-protection/windows-defender-atp/overview-custom-detections.md @@ -21,7 +21,7 @@ ms.date: 10/29/2018 # Custom detections overview **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Alerts in Windows Defender ATP are surfaced through the system based on signals gathered from endpoints. With custom detections, you can create custom queries to monitor events for any kind of behavior such as suspicious or emerging threats. diff --git a/windows/security/threat-protection/windows-defender-atp/overview-endpoint-detection-response.md b/windows/security/threat-protection/windows-defender-atp/overview-endpoint-detection-response.md index a282188a74..1fb9eea8e2 100644 --- a/windows/security/threat-protection/windows-defender-atp/overview-endpoint-detection-response.md +++ b/windows/security/threat-protection/windows-defender-atp/overview-endpoint-detection-response.md @@ -22,7 +22,7 @@ ms.date: 09/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Defender ATP endpoint detection and response capabilities provide advanced attack detections that are near real-time and actionable. Security analysts can prioritize alerts effectively, gain visibility into the full scope of a breach, and take response actions to remediate threats. diff --git a/windows/security/threat-protection/windows-defender-atp/overview-hardware-based-isolation.md b/windows/security/threat-protection/windows-defender-atp/overview-hardware-based-isolation.md index 6bf35eb789..b86fea8fb4 100644 --- a/windows/security/threat-protection/windows-defender-atp/overview-hardware-based-isolation.md +++ b/windows/security/threat-protection/windows-defender-atp/overview-hardware-based-isolation.md @@ -18,7 +18,7 @@ ms.date: 09/07/2018 # Hardware-based isolation in Windows 10 -**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Hardware-based isolation helps protect system integrity in Windows 10 and is integrated with Windows Defender ATP. diff --git a/windows/security/threat-protection/windows-defender-atp/overview-hunting-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/overview-hunting-windows-defender-advanced-threat-protection.md index f23f20f711..8d95c6f102 100644 --- a/windows/security/threat-protection/windows-defender-atp/overview-hunting-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/overview-hunting-windows-defender-advanced-threat-protection.md @@ -20,7 +20,7 @@ ms.date: 09/12/2018 # Overview of advanced hunting **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Advanced hunting allows you to hunt for possible threats across your organization using a powerful search and query tool. You can also create custom detection rules based on the queries you created and surface alerts in Windows Defender Security Center. diff --git a/windows/security/threat-protection/windows-defender-atp/overview-secure-score-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/overview-secure-score-windows-defender-advanced-threat-protection.md index e6b0df0de0..33671e8778 100644 --- a/windows/security/threat-protection/windows-defender-atp/overview-secure-score-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/overview-secure-score-windows-defender-advanced-threat-protection.md @@ -20,7 +20,7 @@ ms.date: 09/03/2018 # Overview of Secure score in Windows Defender Security Center **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) The Secure score dashboard expands your visibility into the overall security posture of your organization. From this dashboard, you'll be able to quickly assess the security posture of your organization, see machines that require attention, as well as recommendations for actions to further reduce the attack surface in your organization - all in one place. From there you can take action based on the recommended configuration baselines. diff --git a/windows/security/threat-protection/windows-defender-atp/overview.md b/windows/security/threat-protection/windows-defender-atp/overview.md index 90ad7887df..f9989d69f7 100644 --- a/windows/security/threat-protection/windows-defender-atp/overview.md +++ b/windows/security/threat-protection/windows-defender-atp/overview.md @@ -21,7 +21,7 @@ ms.date: 11/20/2018 # Overview of Windows Defender ATP capabilities **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Understand the concepts behind the capabilities in Windows Defender ATP so you take full advantage of the complete threat protection platform. diff --git a/windows/security/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection.md index b32528daaa..05d103da75 100644 --- a/windows/security/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 04/24/2018 # Windows Defender Advanced Threat Protection portal overview **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md index 6c737bf2c1..faa5965b72 100644 --- a/windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 11/26/2018 # Create and build Power BI reports using Windows Defender ATP data **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [!include[Prerelease information](prerelease.md)] diff --git a/windows/security/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md index 406846d961..4a47170925 100644 --- a/windows/security/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 04/24/2018 # PowerShell code examples for the custom threat intelligence API **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection.md index 980babf64a..91b8900c14 100644 --- a/windows/security/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection.md @@ -20,7 +20,7 @@ ms.date: 04/24/2018 # Configure Windows Defender Security Center settings **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-prefsettings-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection.md index 7095ae73d1..66f745bb56 100644 --- a/windows/security/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection.md @@ -20,7 +20,7 @@ ms.date: 04/24/2018 # Turn on the preview experience in Windows Defender ATP **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md index b20c0b27fa..934fbed168 100644 --- a/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md @@ -20,7 +20,7 @@ ms.topic: conceptual # Windows Defender ATP preview features **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md index e33cf0d910..a29f67c9e1 100644 --- a/windows/security/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md @@ -20,7 +20,7 @@ ms.topic: article # Pull Windows Defender ATP alerts using REST API **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md index 01a648cb4f..f4b63ae583 100644 --- a/windows/security/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 04/24/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/rbac-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/rbac-windows-defender-advanced-threat-protection.md index f2c279e739..8446e86a04 100644 --- a/windows/security/threat-protection/windows-defender-atp/rbac-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/rbac-windows-defender-advanced-threat-protection.md @@ -22,7 +22,7 @@ ms.date: 05/08/2018 **Applies to:** - Azure Active Directory - Office 365 -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-rbac-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md index 8f7a09142a..5334c052ed 100644 --- a/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 04/24/2018 # Take response actions on a file **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md index c82e80bdbd..37e946eb11 100644 --- a/windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 11/28/2018 # Take response actions on a machine **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-respondmachine-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection.md index 0c62d93571..6e0c39fbf7 100644 --- a/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 11/12/2017 # Take response actions in Windows Defender ATP **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/run-detection-test-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/run-detection-test-windows-defender-advanced-threat-protection.md index ec866e736e..b5d51b9cf4 100644 --- a/windows/security/threat-protection/windows-defender-atp/run-detection-test-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/run-detection-test-windows-defender-advanced-threat-protection.md @@ -26,7 +26,7 @@ ms.date: 09/07/2018 - Windows Server 2016 - Windows Server, version 1803 - Windows Server, 2019 -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Run the following PowerShell script on a newly onboarded machine to verify that it is properly reporting to the Windows Defender ATP service. diff --git a/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection.md index 2a6ed6838b..d501a0d824 100644 --- a/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection.md @@ -19,7 +19,7 @@ ms.date: 10/26/2018 # Configure the security controls in Secure score **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Each security control lists recommendations that you can take to increase the security posture of your organization. diff --git a/windows/security/threat-protection/windows-defender-atp/security-operations-dashboard-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/security-operations-dashboard-windows-defender-advanced-threat-protection.md index 7c773ae71b..1c071364b8 100644 --- a/windows/security/threat-protection/windows-defender-atp/security-operations-dashboard-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/security-operations-dashboard-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 09/04/2018 # Windows Defender Security Center Security operations dashboard **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-secopsdashboard-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection.md index 9189cf364e..a0ace19060 100644 --- a/windows/security/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 04/24/2018 # Check the Windows Defender Advanced Threat Protection service health **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/supported-response-apis-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/supported-response-apis-windows-defender-advanced-threat-protection.md index bc06fcaf60..14621034da 100644 --- a/windows/security/threat-protection/windows-defender-atp/supported-response-apis-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/supported-response-apis-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 12/01/2017 # Supported Windows Defender ATP query APIs **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-supported-response-apis-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/threat-analytics-dashboard-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/threat-analytics-dashboard-windows-defender-advanced-threat-protection.md index bbcdcee3cf..225465fee0 100644 --- a/windows/security/threat-protection/windows-defender-atp/threat-analytics-dashboard-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/threat-analytics-dashboard-windows-defender-advanced-threat-protection.md @@ -20,7 +20,7 @@ ms.date: 09/03/2018 # Threat analytics for Spectre and Meltdown **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) The **Threat analytics** dashboard provides insight on how emerging threats affect your organization. It provides information that's specific for your organization. diff --git a/windows/security/threat-protection/windows-defender-atp/threat-analytics.md b/windows/security/threat-protection/windows-defender-atp/threat-analytics.md index a4669b615e..9a145edebb 100644 --- a/windows/security/threat-protection/windows-defender-atp/threat-analytics.md +++ b/windows/security/threat-protection/windows-defender-atp/threat-analytics.md @@ -20,7 +20,7 @@ ms.date: 10/29/2018 # Threat analytics **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Cyberthreats are emerging more frequently and prevalently. It is critical for organizations to be able to quickly assess their security posture, including impact, and organizational resilience in the context of specific emerging threats. diff --git a/windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md index c5f352e0ed..005f30d3e8 100644 --- a/windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md @@ -20,7 +20,7 @@ ms.topic: conceptual # Understand threat intelligence concepts **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/threat-protection-integration.md b/windows/security/threat-protection/windows-defender-atp/threat-protection-integration.md index 0791b9b679..026ac5e02d 100644 --- a/windows/security/threat-protection/windows-defender-atp/threat-protection-integration.md +++ b/windows/security/threat-protection/windows-defender-atp/threat-protection-integration.md @@ -22,7 +22,7 @@ ms.date: 12/03/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Defender ATP is part of the Microsoft Threat Protection solution that helps implement end-to-end security across possible attack surfaces in the modern workplace. diff --git a/windows/security/threat-protection/windows-defender-atp/threat-protection-reports-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/threat-protection-reports-windows-defender-advanced-threat-protection.md index 6c4e812aaa..d6abe5f327 100644 --- a/windows/security/threat-protection/windows-defender-atp/threat-protection-reports-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/threat-protection-reports-windows-defender-advanced-threat-protection.md @@ -20,7 +20,7 @@ ms.topic: article # Threat protection report in Windows Defender ATP **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [!include[Prerelease information](prerelease.md)] diff --git a/windows/security/threat-protection/windows-defender-atp/time-settings-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/time-settings-windows-defender-advanced-threat-protection.md index 9fb06adc92..0a8c046f35 100644 --- a/windows/security/threat-protection/windows-defender-atp/time-settings-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/time-settings-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 02/13/2018 # Windows Defender Security Center time zone settings **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md index 89c8c201fd..500048787b 100644 --- a/windows/security/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 06/25/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md index 1c8f25ea55..3f520e22f4 100644 --- a/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md @@ -23,7 +23,7 @@ ms.date: 08/01/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-troublshootonboarding-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md index 82e4b1c6f7..18107685ed 100644 --- a/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 09/07/2018 # Troubleshoot Windows Defender Advanced Threat Protection onboarding issues **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) - Windows Server 2012 R2 - Windows Server 2016 diff --git a/windows/security/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection.md index e652ed98c1..a3097cd460 100644 --- a/windows/security/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 11/08/2018 # Troubleshoot SIEM tool integration issues **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md index ad0f8cbfec..a5bf6b10dc 100644 --- a/windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 04/24/2018 # Use the threat intelligence API to create custom alerts **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) diff --git a/windows/security/threat-protection/windows-defender-atp/use-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/use-windows-defender-advanced-threat-protection.md index ac8f1799c4..07291b3a48 100644 --- a/windows/security/threat-protection/windows-defender-atp/use-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/use-windows-defender-advanced-threat-protection.md @@ -22,7 +22,7 @@ ms.date: 03/12/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-usewdatp-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/user-roles-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/user-roles-windows-defender-advanced-threat-protection.md index 89ee51ebff..ab60042a21 100644 --- a/windows/security/threat-protection/windows-defender-atp/user-roles-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/user-roles-windows-defender-advanced-threat-protection.md @@ -20,7 +20,7 @@ ms.topic: article # Create and manage roles for role-based access control **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-roles-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/view-incidents-queue.md b/windows/security/threat-protection/windows-defender-atp/view-incidents-queue.md index e4a0548379..5f6903dad8 100644 --- a/windows/security/threat-protection/windows-defender-atp/view-incidents-queue.md +++ b/windows/security/threat-protection/windows-defender-atp/view-incidents-queue.md @@ -20,7 +20,7 @@ ms.date: 10/08/2018 # View and organize the Windows Defender Advanced Threat Protection Incidents queue **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) The **Incidents queue** shows a collection of incidents that were flagged from machines in your network. It helps you sort through incidents to prioritize and create an informed cybersecurity response decision. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md index 9e37c6fe7d..653d7f2a5e 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md @@ -17,7 +17,7 @@ ms.author: v-anbic **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Attack surface reduction rules help prevent behaviors malware often uses to infect computers with malicious code. You can set attack surface reduction rules for computers running Windows 10, version 1709 or later, Windows Server 2016 1803 or later, or Windows Server 2019. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard.md index a17ef04dd9..13222c4b4d 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard.md @@ -19,7 +19,7 @@ ms.date: 09/18/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can enable attack surface reduction rules, exploit protection, network protection, and controlled folder access in audit mode. This lets you see a record of what *would* have happened if you had enabled the feature. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/collect-cab-files-exploit-guard-submission.md b/windows/security/threat-protection/windows-defender-exploit-guard/collect-cab-files-exploit-guard-submission.md index 9448ed601f..2906976656 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/collect-cab-files-exploit-guard-submission.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/collect-cab-files-exploit-guard-submission.md @@ -18,7 +18,7 @@ ms.date: 08/08/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) This topic describes how to collect diagnostic data that can be used by Microsoft support and engineering teams to help troubleshoot issues you may encounter when using attack surface reduction rules, network protection, exploit protection, and controlled folder access. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md index 68bff70bd4..77098d4c10 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md @@ -18,7 +18,7 @@ ms.date: 11/29/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Controlled folder access helps you protect valuable data from malicious apps and threats, such as ransomware. Controlled folder access is supported on Windows Server 2019 as well as Windows 10 clients. Controlled folder access works best with [Windows Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md), which gives you detailed reporting into controlled folder access events and blocks as part of the usual [alert investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md). diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md b/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md index 2b00cbb179..b772be4c4c 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md @@ -18,7 +18,7 @@ ms.date: 12/19/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Attack surface reduction rules help prevent actions and apps that are typically used by exploit-seeking malware to infect machines. Attack surface reduction rules are supported on Windows Server 2019 as well as Windows 10 clients. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md index 314c5610e2..05037553e3 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md @@ -17,7 +17,7 @@ ms.author: v-anbic **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Controlled folder access helps you protect valuable data from malicious apps and threats, such as ransomware. Controlled folder access is supported on Windows Server 2019 as well as Windows 10 clients. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md b/windows/security/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md index 2ad55e0a66..ce3d7cb53f 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md @@ -18,7 +18,7 @@ ms.date: 11/16/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Exploit protection automatically applies a number of exploit mitigation techniques on both the operating system processes and on individual apps. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md index 3b65d090e5..843e0e7f4c 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md @@ -18,7 +18,7 @@ ms.date: 08/08/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >[!IMPORTANT] >If you are currently using EMET, you should be aware that [EMET reached end of life on July 31, 2018](https://blogs.technet.microsoft.com/srd/2016/11/03/beyond-emet/). You should consider replacing EMET with exploit protection in Windows Defender ATP. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md index e78c2f8644..8d9f86a947 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md @@ -17,7 +17,7 @@ ms.author: v-anbic **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [Controlled folder access](controlled-folders-exploit-guard.md) helps you protect valuable data from malicious apps and threats, such as ransomware. It is part of [Windows Defender Exploit Guard](windows-defender-exploit-guard.md). Controlled folder access is supported on Windows Server 2019 as well as Windows 10 clients. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-exploit-protection.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-exploit-protection.md index 69d9054c81..2349416c84 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-exploit-protection.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-exploit-protection.md @@ -18,7 +18,7 @@ ms.date: 02/14/2019 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [Exploit protection](exploit-protection-exploit-guard.md) helps protect against malware that uses exploits to infect devices and spread. It consists of a number of mitigations that can be applied to either the operating system or individual apps. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md index ee0f20632d..d07a56a851 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md @@ -18,7 +18,7 @@ ms.date: 02/14/2019 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [Network protection](network-protection-exploit-guard.md) helps to prevent employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity.md index 7328140fee..eba904da4b 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity.md @@ -17,7 +17,7 @@ ms.date: 11/15/2018 **Applies to** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) This topic covers different ways to enable Hypervisor-protected code integrity (HVCI) on Windows 10. Some applications, including device drivers, may be incompatible with HVCI. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction.md b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction.md index 290fbdaae4..5e3d8457aa 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction.md @@ -18,7 +18,7 @@ ms.date: 11/16/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Attack surface reduction rules help prevent actions and apps that are typically used by exploit-seeking malware to infect machines. Attack surface reduction rules are supported on Windows Server 2019 as well as Windows 10 clients. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access.md b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access.md index 3357f3a4fc..a34952ae85 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access.md @@ -18,7 +18,7 @@ ms.date: 11/16/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) [Controlled folder access](controlled-folders-exploit-guard.md) is a feature that helps protect your documents and files from modification by suspicious or malicious apps. Controlled folder access is supported on Windows Server 2019 as well as Windows 10 clients. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection.md b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection.md index ec8690b50d..f1870b1c48 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection.md @@ -18,7 +18,7 @@ ms.date: 11/16/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Exploit protection applies helps protect devices from malware that use exploits to spread and infect. It consists of a number of mitigations that can be applied at either the operating system level, or at the individual app level. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md index 9c5516c1de..d0db5aa5a4 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md @@ -18,7 +18,7 @@ ms.date: 11/16/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Network protection helps prevent employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md index fc9d4153fb..7f7c825798 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md @@ -19,7 +19,7 @@ ms.date: 08/08/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) You can review attack surface reduction events in Event Viewer. This is useful so you can monitor what rules or settings are working, and determine if any settings are too "noisy" or impacting your day to day workflow. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md index e84b78a8a0..41018cb2ea 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md @@ -18,7 +18,7 @@ ms.date: 11/29/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Exploit protection automatically applies a number of exploit mitigation techniques on both the operating system processes and on individual apps. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml.md b/windows/security/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml.md index 99eb36540f..1be2ff6cb2 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml.md @@ -18,7 +18,7 @@ ms.date: 04/30/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Exploit protection applies helps protect devices from malware that use exploits to spread and infect. It consists of a number of mitigations that can be applied at either the operating system level, or at the individual app level. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/memory-integrity.md b/windows/security/threat-protection/windows-defender-exploit-guard/memory-integrity.md index 11ff56a123..aed6d58094 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/memory-integrity.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/memory-integrity.md @@ -18,7 +18,7 @@ ms.date: 08/09/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Memory integrity is a powerful system mitigation that leverages hardware virtualization and the Windows Hyper-V hypervisor to protect Windows kernel-mode processes against the injection and execution of malicious or unverified code. Code integrity validation is performed in a secure environment that is resistant to attack from malicious software, and page permissions for kernel mode are set and maintained by the Hyper-V hypervisor. Memory integrity helps block many types of malware from running on computers that run Windows 10 and Windows Server 2016. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md index 78f14e5a59..08ee562873 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md @@ -18,7 +18,7 @@ ms.date: 02/14/2019 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Network protection helps reduce the attack surface of your devices from Internet-based events. It prevents employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md b/windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md index c803573a3f..514a74a4ea 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md @@ -17,7 +17,7 @@ ms.date: 10/20/2017 **Applies to** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Computers must meet certain hardware, firmware, and software requirements in order to take adavantage of all of the virtualization-based security (VBS) features in [Windows Defender Device Guard](../device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md). Computers lacking these requirements can still be protected by Windows Defender Application Control (WDAC) policies—the difference is that those computers will not be as hardened against certain threats. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md b/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md index 46df2bf21d..524e3cc666 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md @@ -17,7 +17,7 @@ ms.author: v-anbic **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) When you use [attack surface reduction rules](attack-surface-reduction-exploit-guard.md) you may encounter issues, such as: diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md b/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md index ede76cf20a..7820eac52f 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md @@ -18,7 +18,7 @@ ms.date: 08/09/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) When you create a set of exploit protection mitigations (known as a configuration), you might find that the configuration export and import process does not remove all unwanted mitigations. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np.md b/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np.md index b091e01721..f7a384b615 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np.md @@ -18,7 +18,7 @@ ms.date: 08/09/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) - IT administrators diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md index bdf4311dfe..74f7688832 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md @@ -18,7 +18,7 @@ ms.date: 08/09/2018 **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) Windows Defender Exploit Guard (Windows Defender EG) is a new set of host intrusion prevention capabilities for Windows 10, allowing you to manage and reduce the attack surface of apps used by your employees. From 68fc5cb5e04915b6805fc34f08d3cb9e010fefe4 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Mon, 11 Mar 2019 22:18:53 +0000 Subject: [PATCH 20/22] Updated data-storage-privacy-windows-defender-advanced-threat-protection.md --- ...rivacy-windows-defender-advanced-threat-protection.md | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md index 32a1c3afe9..67780a3f78 100644 --- a/windows/security/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md @@ -15,13 +15,12 @@ manager: dansimp audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual -ms.date: 09/07/2018 --- # Windows Defender ATP data storage and privacy **Applies to:** -- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) @@ -55,7 +54,7 @@ In all scenarios, data is encrypted using 256-bit [AES encyption](https://en.wik ## Do I have the flexibility to select where to store my data? -When onboarding the service for the first time, you can choose to store your data in Microsoft Azure datacenters in the European Union, the United Kingdom, or the United States. Once configured, you cannot change the location where your data is stored. This provides a convenient way to minimize compliance risk by actively selecting the geographic locations where your data will reside. Customer data in pseudonymized form may also be stored in the central storage and processing systems in the United States. +When onboarding the service for the first time, you can choose to store your data in Microsoft Azure datacenters in the European Union, the United Kingdom, or the United States, or dedicated Azure Government data centers (soon to be in preview). Once configured, you cannot change the location where your data is stored. This provides a convenient way to minimize compliance risk by actively selecting the geographic locations where your data will reside. Customer data in pseudonymized form may also be stored in the central storage and processing systems in the United States. ## Is my data isolated from other customer data? Yes, your data is isolated through access authentication and logical segregation based on customer identifier. Each customer can only access data collected from its own organization and generic data that Microsoft provides. @@ -70,6 +69,9 @@ Microsoft developers and administrators have, by design, been given sufficient p Additionally, Microsoft conducts background verification checks of certain operations personnel, and limits access to applications, systems, and network infrastructure in proportion to the level of background verification. Operations personnel follow a formal process when they are required to access a customer’s account or related information in the performance of their duties. +Access to data for services deployed in Microsoft Azure Government data centers is only granted to operating personnel who have been screened and approved to handle data that is subject to certain government regulations and requirements, such as FedRAMP, NIST 800.171 (DIB), ITAR, IRS 1075, DoD L4, and CJIS. + + ## Is data shared with other customers? No. Customer data is isolated from other customers and is not shared. However, insights on the data resulting from Microsoft processing, and which don’t contain any customer specific data, might be shared with other customers. Each customer can only access data collected from its own organization and generic data that Microsoft provides. @@ -84,6 +86,7 @@ Your data will be kept and will be available to you while the licence is under g ## Can Microsoft help us maintain regulatory compliance? Microsoft provides customers with detailed information about Microsoft's security and compliance programs, including audit reports and compliance packages, to help customers assess Windows Defender ATP services against their own legal and regulatory requirements. Windows Defender ATP is ISO 27001 certified and has a roadmap for obtaining national, regional and industry-specific certifications. +Windows Defender ATP for Government (soon to be in preview) is currently undergoing audit for achieving FedRAMP High accreditation as well as Provisional Authorization (PA) at Impact Levels 4 and 5. By providing customers with compliant, independently-verified services, Microsoft makes it easier for customers to achieve compliance for the infrastructure and applications they run. From c591c8ffeabf32fc31203225f3fc3786c9e27447 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Mon, 11 Mar 2019 15:31:10 -0700 Subject: [PATCH 21/22] made second pointer false --- .openpublishing.redirection.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 7d3a0ff26f..8f3ea8a965 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -13,7 +13,7 @@ { "source_path": "windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune.md", "redirect_url": "/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure", -"redirect_document_id": true +"redirect_document_id": false }, { "source_path": "windows/security/information-protection/windows-information-protection/deploy-wip-policy-using-intune.md", From b20d4a57fbbee92b700467e3d638b01a9c302066 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Mon, 11 Mar 2019 22:31:50 +0000 Subject: [PATCH 22/22] Merged PR 14761: Update TOC Remove Win mobile legacy link, promote arch poster link --- windows/deployment/TOC.md | 7 ++----- 1 file changed, 2 insertions(+), 5 deletions(-) diff --git a/windows/deployment/TOC.md b/windows/deployment/TOC.md index 13cf82c872..ae6dfa473a 100644 --- a/windows/deployment/TOC.md +++ b/windows/deployment/TOC.md @@ -1,4 +1,5 @@ # [Deploy and update Windows 10](https://docs.microsoft.com/windows/deployment) +## [Architectural planning posters for Windows 10](windows-10-architecture-posters.md) ## [Deploy Windows 10 with Microsoft 365](deploy-m365.md) ## [What's new in Windows 10 deployment](deploy-whats-new.md) ## [Windows 10 deployment scenarios](windows-10-deployment-scenarios.md) @@ -278,8 +279,4 @@ #### [Get started with Device Health](update/device-health-get-started.md) #### [Using Device Health](update/device-health-using.md) ### [Enrolling devices in Windows Analytics](update/windows-analytics-get-started.md) -### [Troubleshooting Windows Analytics and FAQ](update/windows-analytics-FAQ-troubleshooting.md) - -## [Upgrade a Windows Phone 8.1 to Windows 10 Mobile with Mobile Device Management](upgrade/upgrade-windows-phone-8-1-to-10.md) - -## [Architectural planning posters for Windows 10](windows-10-architecture-posters.md) \ No newline at end of file +### [Troubleshooting Windows Analytics and FAQ](update/windows-analytics-FAQ-troubleshooting.md) \ No newline at end of file