From 5586b8140d96a687c6c361223b0bd7ba3f38e2bf Mon Sep 17 00:00:00 2001 From: Patti Short Date: Fri, 10 Aug 2018 09:48:03 -0700 Subject: [PATCH 01/23] validated the mdm name --- browsers/edge/includes/do-not-sync-browser-settings-include.md | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/browsers/edge/includes/do-not-sync-browser-settings-include.md b/browsers/edge/includes/do-not-sync-browser-settings-include.md index 267812b6ac..3dca4d3f86 100644 --- a/browsers/edge/includes/do-not-sync-browser-settings-include.md +++ b/browsers/edge/includes/do-not-sync-browser-settings-include.md @@ -35,8 +35,7 @@ For more details about configuring the browser syncing options, see [Sync browse #### Registry settings - **Path:** HLKM\\Software\Policies\Microsoft\Windows\SettingSync - **Value name:** DisableWebBrowserSettingSyncUserOverride -- **Value type:** REG_DWORD - +- **Value ### Related policies From d4568a76d4d30add10a44ec9538a57b595778abd Mon Sep 17 00:00:00 2001 From: Patti Short Date: Fri, 10 Aug 2018 09:49:12 -0700 Subject: [PATCH 02/23] validated the mdm name --- browsers/edge/includes/do-not-sync-browser-settings-include.md | 3 --- 1 file changed, 3 deletions(-) diff --git a/browsers/edge/includes/do-not-sync-browser-settings-include.md b/browsers/edge/includes/do-not-sync-browser-settings-include.md index 3dca4d3f86..b26b2cd7ff 100644 --- a/browsers/edge/includes/do-not-sync-browser-settings-include.md +++ b/browsers/edge/includes/do-not-sync-browser-settings-include.md @@ -16,9 +16,6 @@ For more details about configuring the browser syncing options, see [Sync browser settings options](../group-policies/sync-browser-settings-gp.md). - - - ### ADMX info and settings #### ADMX info - **GP English name:** Do not sync browser settings From 12b3da00a187a625b9483663a260600ae5ddb610 Mon Sep 17 00:00:00 2001 From: rahulkumarsingh73690 <37482171+rahulkumarsingh73690@users.noreply.github.com> Date: Tue, 14 Aug 2018 22:43:48 +0530 Subject: [PATCH 03/23] Update about some latest stuff After creator update, some latest feature is missing in this article --- windows/whats-new/whats-new-windows-10-version-1803.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/whats-new/whats-new-windows-10-version-1803.md b/windows/whats-new/whats-new-windows-10-version-1803.md index 7db90dbaca..df2abc4ea4 100644 --- a/windows/whats-new/whats-new-windows-10-version-1803.md +++ b/windows/whats-new/whats-new-windows-10-version-1803.md @@ -234,3 +234,4 @@ Support in [Windows Defender Application Guard](#windows-defender-application-gu [What's New in Windows 10](https://docs.microsoft.com/windows/whats-new/): See what’s new in other versions of Windows 10.
[What's new in Windows 10, version 1709](https://docs.microsoft.com/windows-hardware/get-started/what-s-new-in-windows): See what’s new in Windows 10 hardware.
[Windows 10 Fall Creators Update Next Generation Security](https://www.youtube.com/watch?v=JDGMNFwyUg8): YouTube video about Windows Defender ATP in Windows 10, version 1709. +[How to take a screenshot on pc without any app](https://rahulit.com/how-to-take-a-screenshot-on-a-dell-laptop/) From 733d17df8f822d6708caeb8fa9906d5b5ead80a2 Mon Sep 17 00:00:00 2001 From: hcdepro <30642956+hcdepro@users.noreply.github.com> Date: Tue, 14 Aug 2018 10:51:31 -0700 Subject: [PATCH 04/23] Updated some of the check boxes Updated boxes according to this spreadsheet: https://microsoft.sharepoint.com/:x:/r/teams/OAcc/_layouts/15/doc2.aspx?sourcedoc=%7B146d036c-9fe8-488c-9bfe-06ce09a88b25%7D&action=default --- .../inclusive-classroom-it-admin.md | 20 +++++++++---------- 1 file changed, 10 insertions(+), 10 deletions(-) diff --git a/education/get-started/inclusive-classroom-it-admin.md b/education/get-started/inclusive-classroom-it-admin.md index d5a982714e..5500fe19dc 100644 --- a/education/get-started/inclusive-classroom-it-admin.md +++ b/education/get-started/inclusive-classroom-it-admin.md @@ -26,10 +26,10 @@ You will also learn how to deploy apps using Microsoft Intune, turn on or off Ea ## Inclusive Classroom features |Reading features|Available in which apps|Office 2016 MSI|Office 2019| Office 365 ProPlus Monthly (C2R) | Office 365 ProPlus Semi Annual (C2R) | Office 365 ProPlus Annual (C2R) | |---|---|---|---|---|---|---| -| Read aloud with simultaneous highlighting | | |

X

(N/A for Word for iOS, Word Online, Outlook Web Access, or Office Lens)

|

X

|

X

(N/A for Outlook PC)

|

X

(N/A for any OneNote apps or Outlook PC)

| -| Adjustable text spacing and font size | | |

X

(N/A for Word for iOS, Word Online, Outlook Web Access, or Office Lens)

|

X

|

X

|

X

(N/A for any OneNote apps)

| +| Read aloud with simultaneous highlighting | |

X

(N/A for Word for iOS, Word Online, Outlook Web Access, or Office Lens)

|

X

(N/A for Word for iOS, Word Online, Outlook Web Access, or Office Lens)

|

X

|

X

(N/A for Outlook PC)

|

X

(N/A for any OneNote apps or Outlook PC)

| +| Adjustable text spacing and font size | |

X

(N/A for Word for iOS, Word Online, Outlook Web Access, or Office Lens)

|

X

(N/A for Word for iOS, Word Online, Outlook Web Access, or Office Lens)

|

X

|

X

|

X

(N/A for any OneNote apps)

| | Syllabification | | |

X

(N/A for Word for iOS, Word Online, Outlook Web Access)

|

X

(N/A for Word iOS)

|

X

(N/A for Word iOS)

|

X

(N/A for any OneNote apps or Word iOS)

| -| Parts of speech identification | | |

X

(N/A for Word Online, Outlook Web Access)

|

X

(N/A for any OneNote apps)

|

X

(N/A for any OneNote apps)

|

X

(N/A for any OneNote apps)

| +| Parts of speech identification | |

X

(N/A for Word Online, Outlook Web Access)

|

X

(N/A for Word Online, Outlook Web Access)

|

X

(N/A for any OneNote apps)

|

X

(N/A for any OneNote apps)

|

X

(N/A for any OneNote apps)

| | Line focus mode | | |

X

(N/A for Word Online, Outlook Web Access)

|

X

(N/A for any OneNote apps)

|

X

(N/A for any OneNote apps)

|

X

(N/A for any OneNote apps)

| | Picture Dictionary | | |

X

(N/A for Word Online, Outlook Web Access)

|

X

(N/A for any OneNote apps)

|

X

(N/A for any OneNote apps)

|

X

(N/A for any OneNote apps)

|
@@ -40,18 +40,18 @@ You will also learn how to deploy apps using Microsoft Intune, turn on or off Ea | Spelling suggestions for phonetic misspellings | | |

X

|

X

|

X

| | | Synonyms alongside spelling suggestions that can be read aloud | | |

X

|

X

|

X

| | | Grammar checks | | |

X

|

X

| | | -| Customizable writing critiques | | |

X

|

X

| | | -| Tell me what you want to do | | |

X

|

X

|

X

| | +| Customizable writing critiques | |

X

|

X

|

X

| | | +| Tell me what you want to do | |

X

|

X

|

X

|

X

| | | Editor | | |

X

|

X

| | |
| Creating accessible content features | Available in which apps|Office 2016 MSI|Office 2019| Office 365 ProPlus Monthly (C2R) | Office 365 ProPlus Semi Annual (C2R) | Office 365 ProPlus Annual (C2R) | |---|---|---|---|---|---|---| -| Accessibility Checker | | |

X

| | | | -| Accessible Templates | | |

X

| | | | -| Ability to add alt-text for images | | |

X

| | | | +| Accessibility Checker | | |

X

|

X

| | | +| Accessible Templates | | |

X

|

X

| | | +| Ability to add alt-text for images | |

X

|

X

|

X

| | | | Ability to add captions to videos | | |

X

| | | | -| Export as tagged PDF | | | | | | | +| Export as tagged PDF | | |

X

|

X

| | | | Ability to request accessible content | | | | | | |
@@ -79,4 +79,4 @@ Depending on how you plan to do billing, you can have Office 365 accounts that a 1. Sign-in to your services and subscriptions with your Microsoft account. 2. Find the subscription in the list, then select **Change how you pay**. >**Note:** If you don't see **Change how you pay**, it could be because auto-renew is not turned on. You won't be able to change how you pay if auto-renew is off because the subscription has already been paid and will end when its duration expires. -3. Choose a new way to pay from the list or select **Add a new way to pay** and follow the instructions. \ No newline at end of file +3. Choose a new way to pay from the list or select **Add a new way to pay** and follow the instructions. From b7b64ca60563f0f99c26e26117f9c62dac959394 Mon Sep 17 00:00:00 2001 From: Benjamin Howorth Date: Tue, 14 Aug 2018 18:27:38 +0000 Subject: [PATCH 05/23] Updated inclusive-classroom-it-admin.md: Updates per new spreadsheet information --- .../inclusive-classroom-it-admin.md | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/education/get-started/inclusive-classroom-it-admin.md b/education/get-started/inclusive-classroom-it-admin.md index d5a982714e..95bc6957b2 100644 --- a/education/get-started/inclusive-classroom-it-admin.md +++ b/education/get-started/inclusive-classroom-it-admin.md @@ -26,10 +26,10 @@ You will also learn how to deploy apps using Microsoft Intune, turn on or off Ea ## Inclusive Classroom features |Reading features|Available in which apps|Office 2016 MSI|Office 2019| Office 365 ProPlus Monthly (C2R) | Office 365 ProPlus Semi Annual (C2R) | Office 365 ProPlus Annual (C2R) | |---|---|---|---|---|---|---| -| Read aloud with simultaneous highlighting | | |

X

(N/A for Word for iOS, Word Online, Outlook Web Access, or Office Lens)

|

X

|

X

(N/A for Outlook PC)

|

X

(N/A for any OneNote apps or Outlook PC)

| -| Adjustable text spacing and font size | | |

X

(N/A for Word for iOS, Word Online, Outlook Web Access, or Office Lens)

|

X

|

X

|

X

(N/A for any OneNote apps)

| +| Read aloud with simultaneous highlighting | |

X

(N/A for Word for iOS, Word Online, Outlook Web Access, or Office Lens)

|

X

(N/A for Word for iOS, Word Online, Outlook Web Access, or Office Lens)

|

X

|

X

(N/A for Outlook PC)

|

X

(N/A for any OneNote apps or Outlook PC)

| +| Adjustable text spacing and font size | |

X

(N/A for Word for iOS, Word Online, Outlook Web Access, or Office Lens)

|

X

(N/A for Word for iOS, Word Online, Outlook Web Access, or Office Lens)

|

X

|

X

|

X

(N/A for any OneNote apps)

| | Syllabification | | |

X

(N/A for Word for iOS, Word Online, Outlook Web Access)

|

X

(N/A for Word iOS)

|

X

(N/A for Word iOS)

|

X

(N/A for any OneNote apps or Word iOS)

| -| Parts of speech identification | | |

X

(N/A for Word Online, Outlook Web Access)

|

X

(N/A for any OneNote apps)

|

X

(N/A for any OneNote apps)

|

X

(N/A for any OneNote apps)

| +| Parts of speech identification | |

X

(N/A for Word for iOS, Word Online, Outlook Web Access, or Office Lens)

|

X

(N/A for Word Online, Outlook Web Access)

|

X

(N/A for any OneNote apps)

|

X

(N/A for any OneNote apps)

|

X

(N/A for any OneNote apps)

| | Line focus mode | | |

X

(N/A for Word Online, Outlook Web Access)

|

X

(N/A for any OneNote apps)

|

X

(N/A for any OneNote apps)

|

X

(N/A for any OneNote apps)

| | Picture Dictionary | | |

X

(N/A for Word Online, Outlook Web Access)

|

X

(N/A for any OneNote apps)

|

X

(N/A for any OneNote apps)

|

X

(N/A for any OneNote apps)

|
@@ -40,18 +40,18 @@ You will also learn how to deploy apps using Microsoft Intune, turn on or off Ea | Spelling suggestions for phonetic misspellings | | |

X

|

X

|

X

| | | Synonyms alongside spelling suggestions that can be read aloud | | |

X

|

X

|

X

| | | Grammar checks | | |

X

|

X

| | | -| Customizable writing critiques | | |

X

|

X

| | | -| Tell me what you want to do | | |

X

|

X

|

X

| | +| Customizable writing critiques | |

X

|

X

|

X

| | | +| Tell me what you want to do | |

X

|

X

|

X

|

X

| | | Editor | | |

X

|

X

| | |
| Creating accessible content features | Available in which apps|Office 2016 MSI|Office 2019| Office 365 ProPlus Monthly (C2R) | Office 365 ProPlus Semi Annual (C2R) | Office 365 ProPlus Annual (C2R) | |---|---|---|---|---|---|---| -| Accessibility Checker | | |

X

| | | | -| Accessible Templates | | |

X

| | | | -| Ability to add alt-text for images | | |

X

| | | | +| Accessibility Checker | |

X

|

X

| | | | +| Accessible Templates | |

X

|

X

| | | | +| Ability to add alt-text for images | |

X

|

X

| | | | | Ability to add captions to videos | | |

X

| | | | -| Export as tagged PDF | | | | | | | +| Export as tagged PDF | | |

X

| | | | | Ability to request accessible content | | | | | | |
From 06e0520eba3e28b8ee211bc8d82136d8dd7203c8 Mon Sep 17 00:00:00 2001 From: Maricia Alforque Date: Tue, 14 Aug 2018 18:32:29 +0000 Subject: [PATCH 06/23] Merged PR 10605: Start/DisableContextMenu - added to Policy CSP --- .../policy-configuration-service-provider.md | 6 +- .../client-management/mdm/policy-csp-start.md | 3637 +++++++++-------- 2 files changed, 1857 insertions(+), 1786 deletions(-) diff --git a/windows/client-management/mdm/policy-configuration-service-provider.md b/windows/client-management/mdm/policy-configuration-service-provider.md index 8c2a334f81..55b100c57e 100644 --- a/windows/client-management/mdm/policy-configuration-service-provider.md +++ b/windows/client-management/mdm/policy-configuration-service-provider.md @@ -7,7 +7,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: MariciaAlforque -ms.date: 08/08/2018 +ms.date: 08/14/2018 --- # Policy CSP @@ -3034,6 +3034,9 @@ The following diagram shows the Policy configuration service provider in tree fo
Start/AllowPinnedFolderVideos
+
+ Start/DisableContextMenus +
Start/ForceStartSize
@@ -4828,6 +4831,7 @@ The following diagram shows the Policy configuration service provider in tree fo - [SmartScreen/EnableSmartScreenInShell](./policy-csp-smartscreen.md#smartscreen-enablesmartscreeninshell) - [SmartScreen/PreventOverrideForFilesInShell](./policy-csp-smartscreen.md#smartscreen-preventoverrideforfilesinshell) - [Speech/AllowSpeechModelUpdate](./policy-csp-speech.md#speech-allowspeechmodelupdate) +- [Start/DisableContextMenus](./policy-csp-start.md#start-disablecontextmenus) - [Start/HidePeopleBar](./policy-csp-start.md#start-hidepeoplebar) - [Start/HideRecentlyAddedApps](./policy-csp-start.md#start-hiderecentlyaddedapps) - [Start/StartLayout](./policy-csp-start.md#start-startlayout) diff --git a/windows/client-management/mdm/policy-csp-start.md b/windows/client-management/mdm/policy-csp-start.md index fce37d78d3..d650bc1e9a 100644 --- a/windows/client-management/mdm/policy-csp-start.md +++ b/windows/client-management/mdm/policy-csp-start.md @@ -1,1785 +1,1852 @@ ---- -title: Policy CSP - Start -description: Policy CSP - Start -ms.author: maricia -ms.topic: article -ms.prod: w10 -ms.technology: windows -author: MariciaAlforque -ms.date: 08/09/2018 ---- - -# Policy CSP - Start - - - -
- - -## Start policies - -
-
- Start/AllowPinnedFolderDocuments -
-
- Start/AllowPinnedFolderDownloads -
-
- Start/AllowPinnedFolderFileExplorer -
-
- Start/AllowPinnedFolderHomeGroup -
-
- Start/AllowPinnedFolderMusic -
-
- Start/AllowPinnedFolderNetwork -
-
- Start/AllowPinnedFolderPersonalFolder -
-
- Start/AllowPinnedFolderPictures -
-
- Start/AllowPinnedFolderSettings -
-
- Start/AllowPinnedFolderVideos -
-
- Start/ForceStartSize -
-
- Start/HideAppList -
-
- Start/HideChangeAccountSettings -
-
- Start/HideFrequentlyUsedApps -
-
- Start/HideHibernate -
-
- Start/HideLock -
-
- Start/HidePeopleBar -
-
- Start/HidePowerButton -
-
- Start/HideRecentJumplists -
-
- Start/HideRecentlyAddedApps -
-
- Start/HideRestart -
-
- Start/HideShutDown -
-
- Start/HideSignOut -
-
- Start/HideSleep -
-
- Start/HideSwitchAccount -
-
- Start/HideUserTile -
-
- Start/ImportEdgeAssets -
-
- Start/NoPinningToTaskbar -
-
- Start/StartLayout -
-
- - -
- - -**Start/AllowPinnedFolderDocuments** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. This policy controls the visibility of the Documents shortcut on the Start menu. - - - -The following list shows the supported values: - -- 0 – The shortcut is hidden and disables the setting in the Settings app. -- 1 – The shortcut is visible and disables the setting in the Settings app. -- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. - - - - -
- - -**Start/AllowPinnedFolderDownloads** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. This policy controls the visibility of the Downloads shortcut on the Start menu. - - - -The following list shows the supported values: - -- 0 – The shortcut is hidden and disables the setting in the Settings app. -- 1 – The shortcut is visible and disables the setting in the Settings app. -- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. - - - - -
- - -**Start/AllowPinnedFolderFileExplorer** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. This policy controls the visibility of the File Explorer shortcut on the Start menu. - - - -The following list shows the supported values: - -- 0 – The shortcut is hidden and disables the setting in the Settings app. -- 1 – The shortcut is visible and disables the setting in the Settings app. -- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. - - - - -
- - -**Start/AllowPinnedFolderHomeGroup** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. This policy controls the visibility of the HomeGroup shortcut on the Start menu. - - - -The following list shows the supported values: - -- 0 – The shortcut is hidden and disables the setting in the Settings app. -- 1 – The shortcut is visible and disables the setting in the Settings app. -- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. - - - - -
- - -**Start/AllowPinnedFolderMusic** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. This policy controls the visibility of the Music shortcut on the Start menu. - - - -The following list shows the supported values: - -- 0 – The shortcut is hidden and disables the setting in the Settings app. -- 1 – The shortcut is visible and disables the setting in the Settings app. -- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. - - - - -
- - -**Start/AllowPinnedFolderNetwork** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. This policy controls the visibility of the Network shortcut on the Start menu. - - - -The following list shows the supported values: - -- 0 – The shortcut is hidden and disables the setting in the Settings app. -- 1 – The shortcut is visible and disables the setting in the Settings app. -- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. - - - - -
- - -**Start/AllowPinnedFolderPersonalFolder** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. This policy controls the visibility of the PersonalFolder shortcut on the Start menu. - - - -The following list shows the supported values: - -- 0 – The shortcut is hidden and disables the setting in the Settings app. -- 1 – The shortcut is visible and disables the setting in the Settings app. -- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. - - - - -
- - -**Start/AllowPinnedFolderPictures** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. This policy controls the visibility of the Pictures shortcut on the Start menu. - - - -The following list shows the supported values: - -- 0 – The shortcut is hidden and disables the setting in the Settings app. -- 1 – The shortcut is visible and disables the setting in the Settings app. -- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. - - - - -
- - -**Start/AllowPinnedFolderSettings** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. This policy controls the visibility of the Settings shortcut on the Start menu. - - - -The following list shows the supported values: - -- 0 – The shortcut is hidden and disables the setting in the Settings app. -- 1 – The shortcut is visible and disables the setting in the Settings app. -- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. - - - - -
- - -**Start/AllowPinnedFolderVideos** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. This policy controls the visibility of the Videos shortcut on the Start menu. - - - -The following list shows the supported values: - -- 0 – The shortcut is hidden and disables the setting in the Settings app. -- 1 – The shortcut is visible and disables the setting in the Settings app. -- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. - - - - -
- - -**Start/ForceStartSize** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck markcheck markcheck markcheck markcross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. - - -Forces the start screen size. - - -If there is policy configuration conflict, the latest configuration request is applied to the device. - - - -The following list shows the supported values: - -- 0 (default) – Do not force size of Start. -- 1 – Force non-fullscreen size of Start. -- 2 - Force a fullscreen size of Start. - - - - -
- - -**Start/HideAppList** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark3check mark3check mark3check mark3cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -> [!NOTE] -> This policy requires reboot to take effect. - -Allows IT Admins to configure Start by collapsing or removing the all apps list. - -> [!Note] -> There were issues reported with the previous release of this policy and a fix was added in Windows 10, version 1709. - - -To validate on Desktop, do the following: - -- 1 - Enable policy and restart explorer.exe -- 2a - If set to '1': Verify that the all apps list is collapsed, and that the Settings toggle is not grayed out. -- 2b - If set to '2': Verify that the all apps list is collapsed, and that the Settings toggle is grayed out. -- 2c - If set to '3': Verify that there is no way of opening the all apps list from Start, and that the Settings toggle is grayed out. - - - -The following list shows the supported values: - -- 0 (default) – None. -- 1 – Hide all apps list. -- 2 - Hide all apps list, and Disable "Show app list in Start menu" in Settings app. -- 3 - Hide all apps list, remove all apps button, and Disable "Show app list in Start menu" in Settings app. - - - - -
- - -**Start/HideChangeAccountSettings** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Change account settings" from appearing in the user tile. - - - -The following list shows the supported values: - -- 0 (default) – False (do not hide). -- 1 - True (hide). - - - -To validate on Desktop, do the following: - -1. Enable policy. -2. Open Start, click on the user tile, and verify that "Change account settings" is not available. - - - - -
- - -**Start/HideFrequentlyUsedApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -> [!NOTE] -> This policy requires reboot to take effect. - -Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding most used apps. - - - -The following list shows the supported values: - -- 0 (default) – False (do not hide). -- 1 - True (hide). - - - -To validate on Desktop, do the following: - -1. Enable "Show most used apps" in the Settings app. -2. Use some apps to get them into the most used group in Start. -3. Enable policy. -4. Restart explorer.exe -5. Check that "Show most used apps" Settings toggle is grayed out. -6. Check that most used apps do not appear in Start. - - - - -
- - -**Start/HideHibernate** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Hibernate" from appearing in the Power button. - - -> [!NOTE] -> This policy can only be verified on laptops as "Hibernate" does not appear on regular PC's. - - - -The following list shows the supported values: - -- 0 (default) – False (do not hide). -- 1 - True (hide). - - - -To validate on Laptop, do the following: - -1. Enable policy. -2. Open Start, click on the Power button, and verify "Hibernate" is not available. - - - - -
- - -**Start/HideLock** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Lock" from appearing in the user tile. - - - -The following list shows the supported values: - -- 0 (default) – False (do not hide). -- 1 - True (hide). - - - -To validate on Desktop, do the following: - -1. Enable policy. -2. Open Start, click on the user tile, and verify "Lock" is not available. - - - - -
- - -**Start/HidePeopleBar** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark3check mark3check mark3check mark3cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * User - -
- - - -Added in Windows 10, version 1709. Enabling this policy removes the people icon from the taskbar as well as the corresponding settings toggle. It also prevents users from pinning people to the taskbar. - -Value type is integer. - - - -ADMX Info: -- GP English name: *Remove the People Bar from the taskbar* -- GP name: *HidePeopleBar* -- GP path: *Start Menu and Taskbar* -- GP ADMX file name: *StartMenu.admx* - - - - -
- - -**Start/HidePowerButton** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -> [!NOTE] -> This policy requires reboot to take effect. - -Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding the Power button from appearing. - - - -The following list shows the supported values: - -- 0 (default) – False (do not hide). -- 1 - True (hide). - - - -To validate on Desktop, do the following: - -1. Enable policy. -2. Open Start, and verify the power button is not available. - - - - -
- - -**Start/HideRecentJumplists** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -> [!NOTE] -> This policy requires reboot to take effect. - -Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding recently opened items in the jumplists from appearing. - - - -The following list shows the supported values: - -- 0 (default) – False (do not hide). -- 1 - True (hide). - - - -To validate on Desktop, do the following: - -1. Enable "Show recently opened items in Jump Lists on Start of the taskbar" in Settings. -2. Pin Photos to the taskbar, and open some images in the photos app. -3. Right click the pinned photos app and verify that a jumplist of recently opened items pops up. -4. Toggle "Show recently opened items in Jump Lists on Start of the taskbar" in Settings to clear jump lists. -5. Enable policy. -6. Restart explorer.exe -7. Check that Settings toggle is grayed out. -8. Repeat Step 2. -9. Right Click pinned photos app and verify that there is no jumplist of recent items. - - - - -
- - -**Start/HideRecentlyAddedApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -> [!NOTE] -> This policy requires reboot to take effect. - -Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding recently added apps. - - - -ADMX Info: -- GP English name: *Remove "Recently added" list from Start Menu* -- GP name: *HideRecentlyAddedApps* -- GP path: *Start Menu and Taskbar* -- GP ADMX file name: *StartMenu.admx* - - - -The following list shows the supported values: - -- 0 (default) – False (do not hide). -- 1 - True (hide). - - - -To validate on Desktop, do the following: - -1. Enable "Show recently added apps" in the Settings app. -2. Check if there are recently added apps in Start (if not, install some). -3. Enable policy. -4. Restart explorer.exe -5. Check that "Show recently added apps" Settings toggle is grayed out. -6. Check that recently added apps do not appear in Start. - - - - -
- - -**Start/HideRestart** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Restart" and "Update and restart" from appearing in the Power button. - - - -The following list shows the supported values: - -- 0 (default) – False (do not hide). -- 1 - True (hide). - - - -To validate on Desktop, do the following: - -1. Enable policy. -2. Open Start, click on the Power button, and verify "Restart" and "Update and restart" are not available. - - - - -
- - -**Start/HideShutDown** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Shut down" and "Update and shut down" from appearing in the Power button. - - - -The following list shows the supported values: - -- 0 (default) – False (do not hide). -- 1 - True (hide). - - - -To validate on Desktop, do the following: - -1. Enable policy. -2. Open Start, click on the Power button, and verify "Shut down" and "Update and shut down" are not available. - - - - -
- - -**Start/HideSignOut** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Sign out" from appearing in the user tile. - - - -The following list shows the supported values: - -- 0 (default) – False (do not hide). -- 1 - True (hide). - - - -To validate on Desktop, do the following: - -1. Enable policy. -2. Open Start, click on the user tile, and verify "Sign out" is not available. - - - - -
- - -**Start/HideSleep** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Sleep" from appearing in the Power button. - - - -The following list shows the supported values: - -- 0 (default) – False (do not hide). -- 1 - True (hide). - - - -To validate on Desktop, do the following: - -1. Enable policy. -2. Open Start, click on the Power button, and verify that "Sleep" is not available. - - - - -
- - -**Start/HideSwitchAccount** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Switch account" from appearing in the user tile. - - - -The following list shows the supported values: - -- 0 (default) – False (do not hide). -- 1 - True (hide). - - - -To validate on Desktop, do the following: - -1. Enable policy. -2. Open Start, click on the user tile, and verify that "Switch account" is not available. - - - - -
- - -**Start/HideUserTile** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -> [!NOTE] -> This policy requires reboot to take effect. - -Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding the user tile. - - - -The following list shows the supported values: - -- 0 (default) – False (do not hide). -- 1 - True (hide). - - - -To validate on Desktop, do the following: - -1. Enable policy. -2. Log off. -3. Log in, and verify that the user tile is gone from Start. - - - - -
- - -**Start/ImportEdgeAssets** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -> [!NOTE] -> This policy requires reboot to take effect. - -Here is additional SKU support information: - -|Release |SKU Supported | -|---------|---------| -|Windows 10, version 1607 and older |Not supported | -|Windows 10, version 1703 and later |Enterprise, Education, Business | -|Windows 10, version 1709 and later |Enterprise, Education, Business, Pro, ProEducation, S, ProWorkstation | - -Added in Windows 10, version 1703. This policy imports Edge assets (e.g. .png/.jpg files) for secondary tiles into its local app data path which allows the StartLayout policy to pin Edge secondary tiles as weblink that tie to the image asset files. - -> [!IMPORTANT] -> Please note that the import happens only when StartLayout policy is changed. So it is better to always change ImportEdgeAssets policy at the same time as StartLayout policy whenever there are Edge secondary tiles to be pinned from StartLayout policy. - -The value set for this policy is an XML string containing Edge assets. For an example XML string, see [Add image for secondary Microsoft Edge tiles](https://docs.microsoft.com/en-us/windows/configuration/start-secondary-tiles). - - - -To validate on Desktop, do the following: - -1. Set policy with an XML for Edge assets. -2. Set StartLayout policy to anything so that it would trigger the Edge assets import. -3. Sign out/in. -4. Verify that all Edge assets defined in XML show up in %LOCALAPPDATA%\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\LocalState path. - - - - -
- - -**Start/NoPinningToTaskbar** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. Allows IT Admins to configure the taskbar by disabling pinning and unpinning apps on the taskbar. - - - -The following list shows the supported values: - -- 0 (default) – False (pinning enabled). -- 1 - True (pinning disabled). - - - -To validate on Desktop, do the following: - -1. Enable policy. -2. Right click on a program pinned to taskbar. -3. Verify that "Unpin from taskbar" menu does not show. -4. Open Start and right click on one of the app list icons. -5. Verify that More->Pin to taskbar menu does not show. - - - - -
- - -**Start/StartLayout** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck markcheck markcheck markcheck markcross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * User -> * Device - -
- - - -> [!IMPORTANT] -> Added in Windows 10 version 1703: In addition to being able to set this node on a per user-basis, it can now also be set on a per-device basis. For more information, see [Policy scope](./policy-configuration-service-provider.md#policy-scope) - -Here is additional SKU support information: - -|Release |SKU Supported | -|---------|---------| -|Windows 10, version 1511 and older |Not supported | -|Windows 10, version 1607 and later |Enterprise, Education, Business | -|Windows 10, version 1709 and later |Enterprise, Education, Business, Pro, ProEducation, S, ProWorkstation | - -Allows you to override the default Start layout and prevents the user from changing it. If both user and device policies are set, the user policy will be used. Apps pinned to the taskbar can also be changed with this policy - -For further details on how to customize the Start layout, please see [Customize and export Start layout](https://docs.microsoft.com/en-us/windows/configuration/customize-and-export-start-layout) and [Configure Windows 10 taskbar](https://docs.microsoft.com/en-us/windows/configuration/configure-windows-10-taskbar). - - - -ADMX Info: -- GP English name: *Start Layout* -- GP name: *LockedStartLayout* -- GP path: *Start Menu and Taskbar* -- GP ADMX file name: *StartMenu.admx* - - - -
- -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. -- 4 - Added in Windows 10, version 1803. - - - +--- +title: Policy CSP - Start +description: Policy CSP - Start +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: MariciaAlforque +ms.date: 08/14/2018 +--- + +# Policy CSP - Start + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
+ + +## Start policies + +
+
+ Start/AllowPinnedFolderDocuments +
+
+ Start/AllowPinnedFolderDownloads +
+
+ Start/AllowPinnedFolderFileExplorer +
+
+ Start/AllowPinnedFolderHomeGroup +
+
+ Start/AllowPinnedFolderMusic +
+
+ Start/AllowPinnedFolderNetwork +
+
+ Start/AllowPinnedFolderPersonalFolder +
+
+ Start/AllowPinnedFolderPictures +
+
+ Start/AllowPinnedFolderSettings +
+
+ Start/AllowPinnedFolderVideos +
+
+ Start/DisableContextMenus +
+
+ Start/ForceStartSize +
+
+ Start/HideAppList +
+
+ Start/HideChangeAccountSettings +
+
+ Start/HideFrequentlyUsedApps +
+
+ Start/HideHibernate +
+
+ Start/HideLock +
+
+ Start/HidePeopleBar +
+
+ Start/HidePowerButton +
+
+ Start/HideRecentJumplists +
+
+ Start/HideRecentlyAddedApps +
+
+ Start/HideRestart +
+
+ Start/HideShutDown +
+
+ Start/HideSignOut +
+
+ Start/HideSleep +
+
+ Start/HideSwitchAccount +
+
+ Start/HideUserTile +
+
+ Start/ImportEdgeAssets +
+
+ Start/NoPinningToTaskbar +
+
+ Start/StartLayout +
+
+ + +
+ + +**Start/AllowPinnedFolderDocuments** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. This policy controls the visibility of the Documents shortcut on the Start menu. + + + +The following list shows the supported values: + +- 0 – The shortcut is hidden and disables the setting in the Settings app. +- 1 – The shortcut is visible and disables the setting in the Settings app. +- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. + + + + +
+ + +**Start/AllowPinnedFolderDownloads** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. This policy controls the visibility of the Downloads shortcut on the Start menu. + + + +The following list shows the supported values: + +- 0 – The shortcut is hidden and disables the setting in the Settings app. +- 1 – The shortcut is visible and disables the setting in the Settings app. +- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. + + + + +
+ + +**Start/AllowPinnedFolderFileExplorer** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. This policy controls the visibility of the File Explorer shortcut on the Start menu. + + + +The following list shows the supported values: + +- 0 – The shortcut is hidden and disables the setting in the Settings app. +- 1 – The shortcut is visible and disables the setting in the Settings app. +- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. + + + + +
+ + +**Start/AllowPinnedFolderHomeGroup** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. This policy controls the visibility of the HomeGroup shortcut on the Start menu. + + + +The following list shows the supported values: + +- 0 – The shortcut is hidden and disables the setting in the Settings app. +- 1 – The shortcut is visible and disables the setting in the Settings app. +- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. + + + + +
+ + +**Start/AllowPinnedFolderMusic** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. This policy controls the visibility of the Music shortcut on the Start menu. + + + +The following list shows the supported values: + +- 0 – The shortcut is hidden and disables the setting in the Settings app. +- 1 – The shortcut is visible and disables the setting in the Settings app. +- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. + + + + +
+ + +**Start/AllowPinnedFolderNetwork** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. This policy controls the visibility of the Network shortcut on the Start menu. + + + +The following list shows the supported values: + +- 0 – The shortcut is hidden and disables the setting in the Settings app. +- 1 – The shortcut is visible and disables the setting in the Settings app. +- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. + + + + +
+ + +**Start/AllowPinnedFolderPersonalFolder** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. This policy controls the visibility of the PersonalFolder shortcut on the Start menu. + + + +The following list shows the supported values: + +- 0 – The shortcut is hidden and disables the setting in the Settings app. +- 1 – The shortcut is visible and disables the setting in the Settings app. +- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. + + + + +
+ + +**Start/AllowPinnedFolderPictures** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. This policy controls the visibility of the Pictures shortcut on the Start menu. + + + +The following list shows the supported values: + +- 0 – The shortcut is hidden and disables the setting in the Settings app. +- 1 – The shortcut is visible and disables the setting in the Settings app. +- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. + + + + +
+ + +**Start/AllowPinnedFolderSettings** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. This policy controls the visibility of the Settings shortcut on the Start menu. + + + +The following list shows the supported values: + +- 0 – The shortcut is hidden and disables the setting in the Settings app. +- 1 – The shortcut is visible and disables the setting in the Settings app. +- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. + + + + +
+ + +**Start/AllowPinnedFolderVideos** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. This policy controls the visibility of the Videos shortcut on the Start menu. + + + +The following list shows the supported values: + +- 0 – The shortcut is hidden and disables the setting in the Settings app. +- 1 – The shortcut is visible and disables the setting in the Settings app. +- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. + + + + +
+ + +**Start/DisableContextMenus** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark4check mark4check mark4check mark4
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ + + +Enabling this policy prevents context menus from being invoked in the Start Menu. + + + +ADMX Info: +- GP English name: *Disable context menus in the Start Menu* +- GP name: *DisableContextMenusInStart* +- GP path: *Start Menu and Taskbar* +- GP ADMX file name: *StartMenu.admx* + + + + + + + + + + + + + +
+ + +**Start/ForceStartSize** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck markcheck markcheck markcheck markcross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. + + +Forces the start screen size. + + +If there is policy configuration conflict, the latest configuration request is applied to the device. + + + +The following list shows the supported values: + +- 0 (default) – Do not force size of Start. +- 1 – Force non-fullscreen size of Start. +- 2 - Force a fullscreen size of Start. + + + + +
+ + +**Start/HideAppList** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark3check mark3check mark3check mark3cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +> [!NOTE] +> This policy requires reboot to take effect. + +Allows IT Admins to configure Start by collapsing or removing the all apps list. + +> [!Note] +> There were issues reported with the previous release of this policy and a fix was added in Windows 10, version 1709. + + +To validate on Desktop, do the following: + +- 1 - Enable policy and restart explorer.exe +- 2a - If set to '1': Verify that the all apps list is collapsed, and that the Settings toggle is not grayed out. +- 2b - If set to '2': Verify that the all apps list is collapsed, and that the Settings toggle is grayed out. +- 2c - If set to '3': Verify that there is no way of opening the all apps list from Start, and that the Settings toggle is grayed out. + + + +The following list shows the supported values: + +- 0 (default) – None. +- 1 – Hide all apps list. +- 2 - Hide all apps list, and Disable "Show app list in Start menu" in Settings app. +- 3 - Hide all apps list, remove all apps button, and Disable "Show app list in Start menu" in Settings app. + + + + +
+ + +**Start/HideChangeAccountSettings** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Change account settings" from appearing in the user tile. + + + +The following list shows the supported values: + +- 0 (default) – False (do not hide). +- 1 - True (hide). + + + +To validate on Desktop, do the following: + +1. Enable policy. +2. Open Start, click on the user tile, and verify that "Change account settings" is not available. + + + + +
+ + +**Start/HideFrequentlyUsedApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +> [!NOTE] +> This policy requires reboot to take effect. + +Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding most used apps. + + + +The following list shows the supported values: + +- 0 (default) – False (do not hide). +- 1 - True (hide). + + + +To validate on Desktop, do the following: + +1. Enable "Show most used apps" in the Settings app. +2. Use some apps to get them into the most used group in Start. +3. Enable policy. +4. Restart explorer.exe +5. Check that "Show most used apps" Settings toggle is grayed out. +6. Check that most used apps do not appear in Start. + + + + +
+ + +**Start/HideHibernate** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Hibernate" from appearing in the Power button. + + +> [!NOTE] +> This policy can only be verified on laptops as "Hibernate" does not appear on regular PC's. + + + +The following list shows the supported values: + +- 0 (default) – False (do not hide). +- 1 - True (hide). + + + +To validate on Laptop, do the following: + +1. Enable policy. +2. Open Start, click on the Power button, and verify "Hibernate" is not available. + + + + +
+ + +**Start/HideLock** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Lock" from appearing in the user tile. + + + +The following list shows the supported values: + +- 0 (default) – False (do not hide). +- 1 - True (hide). + + + +To validate on Desktop, do the following: + +1. Enable policy. +2. Open Start, click on the user tile, and verify "Lock" is not available. + + + + +
+ + +**Start/HidePeopleBar** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark3check mark3check mark3check mark3cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User + +
+ + + +Added in Windows 10, version 1709. Enabling this policy removes the people icon from the taskbar as well as the corresponding settings toggle. It also prevents users from pinning people to the taskbar. + +Value type is integer. + + + +ADMX Info: +- GP English name: *Remove the People Bar from the taskbar* +- GP name: *HidePeopleBar* +- GP path: *Start Menu and Taskbar* +- GP ADMX file name: *StartMenu.admx* + + + + +
+ + +**Start/HidePowerButton** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +> [!NOTE] +> This policy requires reboot to take effect. + +Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding the Power button from appearing. + + + +The following list shows the supported values: + +- 0 (default) – False (do not hide). +- 1 - True (hide). + + + +To validate on Desktop, do the following: + +1. Enable policy. +2. Open Start, and verify the power button is not available. + + + + +
+ + +**Start/HideRecentJumplists** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +> [!NOTE] +> This policy requires reboot to take effect. + +Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding recently opened items in the jumplists from appearing. + + + +The following list shows the supported values: + +- 0 (default) – False (do not hide). +- 1 - True (hide). + + + +To validate on Desktop, do the following: + +1. Enable "Show recently opened items in Jump Lists on Start of the taskbar" in Settings. +2. Pin Photos to the taskbar, and open some images in the photos app. +3. Right click the pinned photos app and verify that a jumplist of recently opened items pops up. +4. Toggle "Show recently opened items in Jump Lists on Start of the taskbar" in Settings to clear jump lists. +5. Enable policy. +6. Restart explorer.exe +7. Check that Settings toggle is grayed out. +8. Repeat Step 2. +9. Right Click pinned photos app and verify that there is no jumplist of recent items. + + + + +
+ + +**Start/HideRecentlyAddedApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +> [!NOTE] +> This policy requires reboot to take effect. + +Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding recently added apps. + + + +ADMX Info: +- GP English name: *Remove "Recently added" list from Start Menu* +- GP name: *HideRecentlyAddedApps* +- GP path: *Start Menu and Taskbar* +- GP ADMX file name: *StartMenu.admx* + + + +The following list shows the supported values: + +- 0 (default) – False (do not hide). +- 1 - True (hide). + + + +To validate on Desktop, do the following: + +1. Enable "Show recently added apps" in the Settings app. +2. Check if there are recently added apps in Start (if not, install some). +3. Enable policy. +4. Restart explorer.exe +5. Check that "Show recently added apps" Settings toggle is grayed out. +6. Check that recently added apps do not appear in Start. + + + + +
+ + +**Start/HideRestart** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Restart" and "Update and restart" from appearing in the Power button. + + + +The following list shows the supported values: + +- 0 (default) – False (do not hide). +- 1 - True (hide). + + + +To validate on Desktop, do the following: + +1. Enable policy. +2. Open Start, click on the Power button, and verify "Restart" and "Update and restart" are not available. + + + + +
+ + +**Start/HideShutDown** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Shut down" and "Update and shut down" from appearing in the Power button. + + + +The following list shows the supported values: + +- 0 (default) – False (do not hide). +- 1 - True (hide). + + + +To validate on Desktop, do the following: + +1. Enable policy. +2. Open Start, click on the Power button, and verify "Shut down" and "Update and shut down" are not available. + + + + +
+ + +**Start/HideSignOut** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Sign out" from appearing in the user tile. + + + +The following list shows the supported values: + +- 0 (default) – False (do not hide). +- 1 - True (hide). + + + +To validate on Desktop, do the following: + +1. Enable policy. +2. Open Start, click on the user tile, and verify "Sign out" is not available. + + + + +
+ + +**Start/HideSleep** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Sleep" from appearing in the Power button. + + + +The following list shows the supported values: + +- 0 (default) – False (do not hide). +- 1 - True (hide). + + + +To validate on Desktop, do the following: + +1. Enable policy. +2. Open Start, click on the Power button, and verify that "Sleep" is not available. + + + + +
+ + +**Start/HideSwitchAccount** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Switch account" from appearing in the user tile. + + + +The following list shows the supported values: + +- 0 (default) – False (do not hide). +- 1 - True (hide). + + + +To validate on Desktop, do the following: + +1. Enable policy. +2. Open Start, click on the user tile, and verify that "Switch account" is not available. + + + + +
+ + +**Start/HideUserTile** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +> [!NOTE] +> This policy requires reboot to take effect. + +Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding the user tile. + + + +The following list shows the supported values: + +- 0 (default) – False (do not hide). +- 1 - True (hide). + + + +To validate on Desktop, do the following: + +1. Enable policy. +2. Log off. +3. Log in, and verify that the user tile is gone from Start. + + + + +
+ + +**Start/ImportEdgeAssets** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +> [!NOTE] +> This policy requires reboot to take effect. + +Here is additional SKU support information: + +|Release |SKU Supported | +|---------|---------| +|Windows 10, version 1607 and older |Not supported | +|Windows 10, version 1703 and later |Enterprise, Education, Business | +|Windows 10, version 1709 and later |Enterprise, Education, Business, Pro, ProEducation, S, ProWorkstation | + +Added in Windows 10, version 1703. This policy imports Edge assets (e.g. .png/.jpg files) for secondary tiles into its local app data path which allows the StartLayout policy to pin Edge secondary tiles as weblink that tie to the image asset files. + +> [!IMPORTANT] +> Please note that the import happens only when StartLayout policy is changed. So it is better to always change ImportEdgeAssets policy at the same time as StartLayout policy whenever there are Edge secondary tiles to be pinned from StartLayout policy. + +The value set for this policy is an XML string containing Edge assets. For an example XML string, see [Add image for secondary Microsoft Edge tiles](https://docs.microsoft.com/en-us/windows/configuration/start-secondary-tiles). + + + +To validate on Desktop, do the following: + +1. Set policy with an XML for Edge assets. +2. Set StartLayout policy to anything so that it would trigger the Edge assets import. +3. Sign out/in. +4. Verify that all Edge assets defined in XML show up in %LOCALAPPDATA%\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\LocalState path. + + + + +
+ + +**Start/NoPinningToTaskbar** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. Allows IT Admins to configure the taskbar by disabling pinning and unpinning apps on the taskbar. + + + +The following list shows the supported values: + +- 0 (default) – False (pinning enabled). +- 1 - True (pinning disabled). + + + +To validate on Desktop, do the following: + +1. Enable policy. +2. Right click on a program pinned to taskbar. +3. Verify that "Unpin from taskbar" menu does not show. +4. Open Start and right click on one of the app list icons. +5. Verify that More->Pin to taskbar menu does not show. + + + + +
+ + +**Start/StartLayout** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck markcheck markcheck markcheck markcross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ + + +> [!IMPORTANT] +> Added in Windows 10 version 1703: In addition to being able to set this node on a per user-basis, it can now also be set on a per-device basis. For more information, see [Policy scope](./policy-configuration-service-provider.md#policy-scope) + +Here is additional SKU support information: + +|Release |SKU Supported | +|---------|---------| +|Windows 10, version 1511 and older |Not supported | +|Windows 10, version 1607 and later |Enterprise, Education, Business | +|Windows 10, version 1709 and later |Enterprise, Education, Business, Pro, ProEducation, S, ProWorkstation | + +Allows you to override the default Start layout and prevents the user from changing it. If both user and device policies are set, the user policy will be used. Apps pinned to the taskbar can also be changed with this policy + +For further details on how to customize the Start layout, please see [Customize and export Start layout](https://docs.microsoft.com/en-us/windows/configuration/customize-and-export-start-layout) and [Configure Windows 10 taskbar](https://docs.microsoft.com/en-us/windows/configuration/configure-windows-10-taskbar). + + + +ADMX Info: +- GP English name: *Start Layout* +- GP name: *LockedStartLayout* +- GP path: *Start Menu and Taskbar* +- GP ADMX file name: *StartMenu.admx* + + + +
+ +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. +- 4 - Added in Windows 10, version 1803. +- 5 - Added in the next major release of Windows 10. + + + From 627f7a30a9ec17173437b8b7e6bc6bd9c90e5ef0 Mon Sep 17 00:00:00 2001 From: Maricia Alforque Date: Tue, 14 Aug 2018 18:32:43 +0000 Subject: [PATCH 07/23] Merged PR 10606: RemoteWipe CSP - added Autopilot Reset nodes --- .../provisioning-csp-remotewipe-dmandcp.png | Bin 8830 -> 15309 bytes .../client-management/mdm/remotewipe-csp.md | 25 +++- .../mdm/remotewipe-ddf-file.md | 108 +++++++++++++++--- 3 files changed, 112 insertions(+), 21 deletions(-) diff --git a/windows/client-management/mdm/images/provisioning-csp-remotewipe-dmandcp.png b/windows/client-management/mdm/images/provisioning-csp-remotewipe-dmandcp.png index 69effac5fd51e44e36fbf3330823f2c69cb0ddc8..be91906aa3e08b00a0390d3280828f4f5c388929 100644 GIT binary patch literal 15309 zcmb`uby!q=v^G45pb~@hNUBH+3|$h^A)O*Mh|=9%!T{2ZG)T9Uv@nv=-AFe`Bl+#Y z$LE~)`_6lv^IqTk2iMHrd-gBay6?5_^&?18UJ@IF1Oo&DVM|MiDT6?Fetpprha4dCLg(M!3PAW(TY<|PabxPD+Q_1X>u0wa)rC>>ULh9D5X zfwb65RcGCul-X#)j>Oz!qaNz`x{+*O#@W!P?^yzW`4eW`hZ{KNSnTv|mn}VbB(d)?-a$4_V%|eQ&M+cqhp3VYdS|I`GoW28LXC?d%*mSsFh!a+XF=_Pqne6 z*OWTB3TjR%D*gD)>m@zzhrKV_GUn&=`8>|c-vLAOu4{n-AHr9vwh$bO7n&bC)IZphR|;!yR@(%^dTW=F?%#Qih%PW>s0K>NG6{2@Y~ zTuz%k_49&9qj`>*sYk`!&F=1(>y#y4i}H-XusZIO1r!9rCG|WOj^&gZ#R`X6!fv)! z3W;aBfQ4Ph%SW6o8QFE~igDr{=chF`9xiQ|?Gm7ZK=$Zs(B1iFFN4L2`Q{U1B_FY? zt>VFPmpxkG8TJ~KSts#4UNk9d=&LV{gpeM^EWX27pjQ_@3bsG@ivwhNB3gx>N=EkeCN?UVB~kEVD3ltIM-_n#95hNqpJ0^ zQ+aJiK7s5WVr8$?vK+5KqsViJp2%dM^12yG@SqOc9lO|FUPkgWH+_f3Vo7^!^|GYZ zJGZCW04vFyPTqbtIY^A-&dLzHGE{o41B+9e%xibU_xOy*UnwZ8=Nx$IVl+>I`<_`} z%u>403!cHj#d`j0LDX#s1q2F6?NFUmX=7o4GfFo$DHK+fd|5<)scG+EXiM4RhBoVB zBk~4+n3CxDNU*IZvTz8toWn-UK(kGdNLzu}n$BJ;OJR7t&GDw2CjgIBiH%@meWH|z zh-l_DFjI&l1$(pjfukx|BZ3QMaY*FXkRI{IGEva}U1=1esu@=_8%(O=ecRxw$Br3~ zV^bH;--RfC6>iAFO_!G>O)=7;(}2qX`P+$CriSKzKj$S}hJ zM+9}QlxJsWtKfHJ*=iOfXYOuQ7JS_(^s*rKol1^bGl1jr2C4Cdd}TjIVOFT~(S~Qd z^}TKva$W)Du80xLQY#W6 z_V@iffa4GkfZsYgp2Rviii;~r@r1Pgz{`0d*<4-lZk47+3a?&q5!z4=Z8_(GQZg%S zzGVYbS;2j99*(`FuM1eXgsYPbHzUsa7D^j$7Tiuk{_z5e7tYq_+d)kCnjVg}6$S6n zSBme6pgwjITCJ=S@z{l%s7St!6kDs-#Y5vo*R62QAcYserNZ z`PxB(W9LGB)UyDCwJ|>+NLzgX00@->m!87*GsrI$n)eNE2w8W&xfj-35#8uMcK1Qfj-pZ9|=2sTY@0 zx}OYe=%v;>ueSKz+pPp(%|2uTrU|%nA;$8?esnX>H6lLTT*Wd=?HoX;)8^d^n~~bx z^OneXT^FPApr9IBnvSzGdB9_NeuEL2y1w&u4rcG)OVoy{Z^#O{?oCqa2JwySq`C76 z@bmwuX9f(5;2k)tiq0)#nFP2P5VQuy4pJ22!2&+=D9O-)j}aU&u%e*NdvIVqK*xSa zbM!v{2Z(<{fva@Se_mtc54kwqW2wa2f@)`R{xVVp-gw~;UaII9tam?NJWDLc$G4&+ zzfdbYsu4;$FPx3f>~k0gwq$8(DZb>@Y@NdvfMdHakTZ`WgWDi?N(J94*?nai-gMr& zm6RzYH-~;TTX?gucT!{XR_4am_z=KYYxjdAB(`S&gPEmrgs^i93UGO@r+FPyX0-;n z4gnZ>HnzS+>FGY2q7IBc43`H>4Ofr_n}N>Yg?Zek6?L2-T@?TU- z3XIoSc^?0!a@u~$HxhBucyUF_T{6uMINtzTCBpdzaoS{eW~QX1tyC9x(d}VBZ+=Ka zWrJ?x^|&!QkxJ5||K#Hos7-*FcBEyBH^i!Ge`fM<>0ftf?+>x${pFuWSCaP)ruzKm zDt`)Ziu@$Ea@o{n6(nuV1rEvT8vjwm@CElV;WjKr(=PN1Qb*g`( zvpx&MgeN79tmm%wVX9h=;dFN?c@U`Wk%2(b7|7bn0?!BeoJ-KFX~@W}kJFA=l_KcTNe_QqKU@k}a=38|KxeYdbD zQ@2y`*)u3VO)G3L#8$0*BL;SI>aSHKq@;MPr05`xA`$^*ZfTyWL7QfDz+vRYB3`BG zzLW`)y>HQuO}OV(|ZG{A~1 zLIm<{4I+b)y)eoJA^`I2F?OH?+?Lw&r@N(J}tbs@crGpc``AQ*EmWqLo! zE3n|L(MSy9Y?ZWME}3$rA3##!aVheE0^b6n17dZvk#QVBH`4=h!RG)B^GR(&32-O{ zUpVde{AivfQj@8~xC)X%1~#WPA2R>|g@1g50gr^Q z{#VHRKR`+YWRzj#jcV^r%5C|=^{7+e0tK{*3dd#lbhPg;PZ><(5H;3xI65j_TV0*0 zpai7@aLn2bYjFPgagfqb(pd8th$?{Y(;oo$d9X(47l7|i{-@tVnmAa`e;=%;=HXXq z0>d`GPbPr{&SFush5(_U7^_GFGz&9}SL#MBPX^c;5{e0s1GWz$umyIME#o9zX_e4;-e5+8U`^V< z4M63j1DJ&4E|>}(K3GxtMDuz^7ygxjJfQZ@LI8%<$Mqzd@tWyUM^#GNtganAhoUd^ z(=Zn2geqlB<*yI5l#qiB^s$HZ-)xJnK$~o=&$GFO@^$8CycWz#J$cXRLxQQT3?~k( z%o?`2C0>qQA1TAZ!x}8#+i(cCON~B&MX7DtMH&*RG^OhBRmJ}{r*}R`xB~q&?B%)Q zB`)Nzl#$6#GDr8lM)vXzV`dIt*>Ht`RwSacE8?&OJSoO_A2~(V2=J1X-k_7Tgx9Ip zeDm+zspCz4{F}4$ia`aKYF?+bsskj*K@qkXAZ5==g+1Is4MxmSN>dYytlTc-FToJV z9DFcI-31#l+cy#Ia^b(N#9$BcoIN8!-<120ZILwD`Z>q7z)Y+8HshjEV?g4GtDBhZ z&JzyoeZs&_Skajv)<_{hy8{n-LLg)k{W8fu%)iek^y;8A2!^%Uc%Qcq1rE9;Pe=m# z6I0d+4Tb;of4h+uu?`R=+D(nW3vqKc)zJ-eKbXuk8wV`ExE03n6uDvFh516_=Pt!~ zLr$%(yQ<94;DhQ5P!e1q9w4~`$Mr)9r{MiJ-?PZtQ{VFI34X!OU|wI}&|CV)dN*@- zu!Q3^wX|&eJ%MQA|F3KP6NIqVSj{`8Wn&FsQwX}Rr(OZ!3Sg59ENL0?LCx;yw-&lk zT9XA_&4K^1*L3*@|Jv?<|J`H^_A11)=|vswrkH4s&$&kXKkhL$3o~!#!*AQJZMyuO z;xV0-x;4$+d=BJ5Cy&Vsm{SZV%~m@HdD5MZtJBcA^wpX|o8+~qgS=LLu`*Qkxgfn7 z>B(DO*h}k8lj$>-%@AV!SvwmM@}nJSRBij%k=~NVM7TDq=~yL7VH|JB`V$T3gux;S ze+0-o;2Z3Fr@mX~L&^ z$?FS-L|2UP@IlGA7tE6ti-Kkkk!EA?n7n;VLr5K*^@Lo&<%>ETX6jdnUu_U15;a1h z121ojgvDLq$M9e!F~x#EDhIvqdmH2UOh$7ViqUHN*FRM%5D_b4 zUE`@=4szbfu2LLx=5tI^P%8zuX0DHiay^bwxs1VBV)xgR5h4>{6f$Zt_Oy1)h_YL8 zB&{uM=;@*u8vNqr8$1rh6TfX6rpXoC z)GU1WRP9+YpDwfJNUgboVz9l^k+|yklbVPPoR7(B)n|_g+l(-pW9E`{`Gj)G2yrU( zQ78So`(jP|bSYD?8$@(h4RH)ApIP`I=mdCOZo2p7?T6iP@e_*-xT4J;PrUk1{eHUC zi5e6*pBNWWVJfmUmG}t}Q&6I>5+7Xakw5BY@f4}u=d)8hbC{JwY%6|Zx8e{Wq{-1o zP4thFk7wf3aLj;)|46Qf>(6FZo*2^fj=;V?Nn_t(Inx+3%Wm0U4aKb#UFBB1G+F{yT>5hHdj!AFfbMKiu>UOTFd< z{NfV`j%#;uvh&EBc^}X`PPgxY@^Jo7Gcf?#^O8iV!Uec&J2^#U0&F)pJ$FoQz$jx6 zfToTDOY*bTs%+pk7HjPkLxx!nW1;+|wQ)4Bb8C7&=~60Du4gY+^#qWcRbqPwBe98F zHHGvMJyRjIc+I$LGUa?0&cMQuVuDP{2J3IFE$DVCVT)EBw+q<;Bpn;zm{lNvF``Gc z_sh|b3xqC5cpO9+E(WU)K9f#(MkRq~&a##EXUUSS-ZKk$+Z!+KKV3#!kI_C~$9KsnX9sGTE=G6N3DvyF#gEDs z!*E!qrJkiW`RGV@u_HVrH8w&1o*|pS zVv?CEo-IeznwjyHqyT03xis~|SyvGfrH3r&QU12B9MV=cQ<>!55V>nI2Seu23Ebvj zFp)Io{rG`sKf}5kMjo`D)3W4BfFOg$wmxWuz?+pZ|6rdwceLt_e zxEM*`GU4t#Grd#9{daKI5F0eLvrjYynY$`yotaODJIBVqsL~s-@X>{KP8$0Dpb4lD zF!7D56z3ng5|p|7`c*5gjhk3Ax#;tSL7$eM7=2QViUw^~TJmpozydz9h1-}f9Ip85 zDA5*_Wbpfpl1o^k$jT=3vKi_o5reZ)13ouDQ}dm81yNFeZ=w6T!9w9-+A}&ivo(`U z@=YGe_GceH`ZKXAJW;p(u!ND;XfE!3{0^X;{&vg!v=BIp*XmT2FJgkPilA-#lkT;< zr={5lyTIW#PAPeE&AkmphmB`HbY<_IcA!|O!pYG=!U|ZQ5zfam$>&{pO?8gNKcT6! zLQYh9r|d>=@1?u-QK;PW;14k@Dd!YO!b;50D7Iw=yg8i&xjq5M*xWfKwK=S0+-w3@ zdban?8l0E}?!yP0Z&?U+8|rC&d49otqgpSo@CuxS7zlV=i_c1p`574^`xfLETG_r4 z)6+>vE!W%06O@+_Pf?$Y*(oD_(W8}*)};re^m%^SejVGX9#Q7#lT?SxCDeQlh6;AF z@;{;fvX7PCZ|FJw>#VS39(HXoLRC&f%;GmOAs>B7-NcX9#3to&*!iZv^G=EH6*A#Y zATfX8W>7+O zn4kDm=iDcizN^EeyWE%F{eZ?EolK%9!iz$}?+ch}Q_O-GoJDYxIMcRqWZK8MzW!Y} z@Gaqjg+CSw#1@$!hKypsStAyir62Tx*RA})ROAHeqWGNnGSMhlgh&HzH}ywAq>Aei zfqElwLjIOMjx%l!14SJ|d-6A?(RbvmcM7Q(aeX8?8`-P@775a{8z@-=n zaUYow`tW5F%}@t1l=BjJpsOugu)o={+kQzx0Kcf#eN5i@K9(R19kpG&v+Rr&augGl z4GMVh4}e)XQ%Z!DLRa`&M^5DEp<&SF6)KsJ&HLn{mH5 zPKG;^_Y;8j?SR@68o=XbPt!9b zupP%ZT<*C8kq6B7e=NWX&k|f78dDIl&qR z(&CB$%J|r#;WzK)O2hMTj+FPc-Xp>|r_hDPkv>9N&=(pK6E_-_Ic+A;7rr-mZ{6C2 z?p1c*QG$E11H`dESf6P&=>^yYYXBWEB|xZY_%%1$g&B{#8OW@6l?TTGk5g+B@}4rK z-8QkyDVR23kTBN%s-NMbodCZ!${IyxRi?%1AsvVW2yH6L%6?4`ujx9k;E9kAc9mDi z%F6BveUn*dcyF34WW8SfZmBP2QY3*t2CVu~0XKWhQq1Wqy$ki2nz5ZZ?L=t~;^$#T^iftZ<(s}*cQ7cmNcamuNR&*uJ$6c^2jEG~VQul!xtUXdiSqU&zF z9F~#W&|PHAly~6~bN@@i2dc%BKu`Vv&DJbbzeM^LE`s+iwFdHh-VR79j0603E2iMl z%bt>rm6hMM#Y+80J%9@5Xgx>qS#&fz`tx)08OnP{C37dyFM_|Mj?%ju2QSz=5dL2X z4gj-Ze=!a{>7T{gyz2Sv>2A}%%<3>ugOFM!c{AMHr3n*?^f4ZTiD9Za+dC9Dz296& zNdGJ&dh)!{7^HqjMeiz1WkuUb3k#=6I7!YpZEBCrB=mgMI_Q zy|5DWxLHjz9nYS>Nz+R+&Okuby49Y)xfYj}El4j3{1T8I&u5>|tKd#Zj4q|$nSGv&QYI~)SW@RSeCp%6L;-`;SEVkhoBzXi%R z91x4Kv_y_Rgd^GC-TxX|ko0nL4ChIcWk$@a(x#eiuAwUXD2}hcNF;3j88K3rIZjEf zJF6`)3060FZr@yLl&H1kM>YKLmQarCJ&g`{ZCzBweCed-yZ6?9`etB6PLV+3^k}q z-8+>FBx%EcCr<`Z#6Mv`012@TA$L5H^51mWbM|PN?z`xZloB-)t9Ir4t;1$TA#InA z3hN9U@7?@i#kcDMU^Y7>4L+ETtO*Q4&DP2O>%fGy7FEy%zwQsIBi27zL)x5;6qDsk zSGE1Zn>PL8HWaxA^*&{sfu#_@Pygk~ES2W@*U&lBc1*5$gIeHwPXil1=M-ysyU##wat#erv%_9y} zlXF5MR0zf2H&1o&lya^z*4gvEm?uq|rm2(jW*hy(<6q@&_< zSz=L=d>imZ&L_RZWOg1Nxy1OYHVit-Uo&-ahZ&;|I~d{dh9v^L{Qj6Abq`z3W@BP`o=)fRv2?2o1394M?ZI>{MAA=KK_BPn3&cKBX0<_rnMiZ z=fh(srbKi%6!JR&di*!#UO;33s>Er4GH;Z-M+YxoTBp<|1#W4z1Hv&N8B6mb<>T*F zKtt*802Sd+rC6X0D2wy+yRG<{MH4eqaR@6bOuebGEZ$4wM)fZ7LF9dJZEgKt`;oSt z#_K2vlVzv*S1V)uLz2h&v^%L(#3T5cwV}YNgt}Z#kZ|-*sQS+Z1Y9M)ltR$O^RQV* z{o_-P0cFdj&V0K)k6-nY;S{yGJRo8ApU`eVZ6--+IO^5YjS|YjC9%IcMJ1-~(^KD_ z6c|K7#wJRE=fB;~w+Z5z2NX98g_=3ITp}4CfdY9!OfYyK3)EYjAjZ%_Fgu{}wZig=IUKkI`)W=wNM_U5Qqi&)R+SWM_I;8V97v z$P+?FA>hivXR}-C)J*F|RGMq=Vc`-A5S*t!xn+vhQ25iq(0nr`;Y4dluarR7s7i_( zHE7^2@Sf#tUDcY@M`r!JJ1&lOaJ+ghG*0d8Pl$xHY15>OHOnJIwtye7N>ia`cehQT zx8J;j8b22m-iT_jv-)0Mc-gYeB|)K1l=jGh3#Tfad#qL1zS6#O{y-%I*cjKd-4S8>6MS@=;G>lh0D zQ9Lypc%$-4ZA?M*gZXcqQXomo3UMIe9Y8fuG--jq%Ih1kJfAXm^s>nU3ZY))5a=1YgxioLkVyGdGOvi?DI7K zMUi7LgQfJVAoD%AxolW-HKFzmH&<=k37I zbCR&0t>u_t`Yw4kXJ?+RfA|2iwDQjt;d+<4nVZ)d_dRBPq`36@phLr%5-9wjfT`g7 zUHQ$E!@f9};f$G4%vvV~O?k?754)uVmd$F(=ZbtlGx{<`&oHZ;fw&*9E7|y~I~&L$X8&57 z`#C&u@7k2%{AI%lhK$xzC4RZaN`XTOm#SdKZPG!{56 zg)?8mR_ok0Q9&cXaN)q2ghl~Z!Sk0PQ^jS;rSf&Z*5>vgS{@rKr}AM6g3iCb2^`7YnMB zNdL{z!A6A&kT=;YxPrX3T3`gWz_}Kx+}x?dh1C0_bjRNXxm>U38r^m`z#v6HPGc*X zZ*Vvp@o&Dgxg36!;WKt9)L69LMtPIcJPlN>d=Z*H{{H^>ODZfoYXXmqAxGKq^A{&A zn7RG(Hph2BpU~muY(P?_A^6qN!2Ce6x%Ss+TFuImAnvC0n^Rp?g`d$&(Ucx9dfiw+ z`q;o(5b@t3larI|Yb;@+sANI{CAzvdy{SJ+upR8KhX{}Ft`e)D==Xku2{R_t9||}2 z%{A;%jiZCSQGf$M#UOwspoTx8>4Zpp55OWrue<{Y%-5Z>zE!0`$Qn>Azr1DVx| zqJvSjP=H8FzZ2OQvgC*LhzH9U4WJS4C#e5*W4<}$?ZD}d4qBR-v~|!r$f#e>zW@3I zIlrU%T!V|F<5(362|Dmo4e+;M#c2O2fnB8*k&q(V4j}3i6PjeTy$xy0s=d( zC?tP6@lkB-=EM52xR`nTs9)feY@9t^>CYhVj}|_KFHAPN)f_x}Q*EA@mgb}b0z^XO zRD|<%i`St9A3uJauC{Qy-0yJOo>-_u*6)$40JK@K2z_2rQIW)L<$2IWTdLc*2|NYX zr&zy}yuI9i2^73-pRA+-9aZEtdC79_#e}gmhLwkQyW#=y3=z@8YD?oqp8_y} zg8rf18w(Je|nLxqbQWpX{8N+C&8{o z3orM*11}GjTZC>76p#lP0OytxjZ!BYTq?{^i!gwWe4p4uR;%h^8$V;7C$8S{rYgy* z<4Q7J#t9KYEMS!NP?>33UMF_Fi+$-OckVGU)N;ku&cH8Vlu>3H3~K%@0*|b3)K!Sz zRGmJ-p>@7*P(XWW!h6da*JSihu{&tLaSCDB^)+c{2|i^4N+EK`zww2v9t~Y%*5jmo-L9vN^W&sCZtm1!w{*f4l&4JNR|HT9Wp9^WqdPhww>8Az zNhFd<@^bEhvv@S6N@Jbsf*0kylsArT7e}an5T;<@=IrAareqE=5%PstZ&WEY0*5T$ z{fM)euC7HFMnl?kKp*T(CSP+RJKRrZwUY&rFSc`3(Q57)Yj0_J9lSDJV$9k+yukhe z)4!gO@l#(XEP?uR%hL?}BJm!cz_&~1H+@%iE#he9H8U!aQhN-Z1Zwh18*xz(Uh1`Z zVH(JK+7lEA|x0|8a@Dm;Nj64nzJzr=A@Vd5-W5=d0s!Zi^}4OeNzV929QM z17saN<41g)3s3?Df#VVWy@n+cQ1&0>RAl+f7dW{jwvdJu`~ttfpu@QgB_bx~HlKj< z^KSv?`~JM~us{Qw7YmJBCjIFj2>q~02u1~JJGb~Na*P2-*#ZN2`*Ilk76yBH^$l$u zY(&#vZ{#%#G;sTl96wMa#3Vyky?cvbC{Vh;Pk6ArU!uTK2wVQZG!_OARvsW@BEef< z5x{OhH@t;(zdK-5hCk>Cf)H3k6mkD_|1I4cfh-%|k^;KFgB=7eLE&b;9AWk$25V)= z>~d=Onp_Tc-PqB2;JGjhVd*=r zZOtpLzg>%nf<;GbBO`~tXeryf6?gpJ7dQuzGh_Sbk0eq=msWuhyRUJJvfZLPo`k!h zAyF8ctbI@Dx8H>yHfUB@U~RUdS)IfNQg^rT=~~l@%55W!?Q8g2Si@5Z8?WEllo-Jo zf6j8b;~Zr>6Nq3N%~SGY84? zQgL|nBN=Hi_VJ&YrZTo`P^GC}tJoPEE(J#2SLt9&|6phrr!OGa_MG=$yYXB8zo1iA zQ2gQW$Ev01fDc6x8DMIuYQL*6rlXC2M2Dvuc~a!Ajs2h|zSA3q2&HS|z!2Pq+2>0oN&0+b7Lyc~um?+`h@Gf)%- z3KqB;+@e~GJ&{iiry8v3$f3`!sPpl@zi$nk(cv@KeeL}Js!!&8ga7CHq=1+B>_>#R z4=Q{R?|1|1D96I0(0}&6(G%_XvrlaR3aTF)r11>!*UGzO60#o<5a4VIGjeX|F`4$O058G7B@7ftN}>&wVa&Uza*k3c?YZN{n;kQg`gjn|U3W zNQxcf#rluqsD~>xBtM7#LP?ZTEs`J)aKq8}GM^}GdH3N7(nr0`AWTY4v;!K??=lOI zyNSB80;@q`gZ&S%0SD*sR-Es=WpUT(e=rd6EfI@M0uTnh9sW4YAYL(G+M)fJ55b}# zB|uWAwtNBA#v_x!X@z~O`va)PL6x)-32ZEU@nCtTbypUzNHKK}FCpqwW9j*_*PBr7 zT&iO_o)C)vXcch9R#*{hqvzZ^L;}ufk7w}O)V~qo0@QX;Fg>yEBck&^-!tih2^0Nm z(STs)sU&DC#edhYL0kW3CZ4(+r-d4Ai_uVX%xD6VriXoTwmu{_XInjvwt6ptdOOWQ z<1VjXFT=L(k&5|)fNh>{mLKa_pY8NvS%3wlTwQ-d^a*9 z_}^Mv?-cjnHq_$DBtmd1{FGvu>9Sg+Y^W*>qI8@Jmz+^1!#bW>*6{=qvn3z}yxbNG zy8n>Jc7OvemA;(Tkmj3ZoF$Ns$RB*3^1v3=XE^E%41R?g{KFWkJW<9Qjf)%%am0@E z^KZT5^V%Uj6pEiDaW-F@D3a|?8!(BRjEy2mw+u)(K&BZwV8qdyT6?8l2TiON1^g~r zbs26^&OLW7fhg6J$4_;bJ3onITai7&4ga#95xW|BVg2%aKw$v8hMN4-Dt&Jq-@kzo4qr2?7hc)x_DkV#Af!YbL{8z}HdS=4wCI>jG@L6T>nO%2;uU*Le{ zZ4ULnr&b{N|DUrrlD@*dZh|h%{(}Jj;cVo}Us|Y*&|}ZetNXY7o6`J;-vHUqUq}B2 z13({$Qh;>D>%_>5OGs$%e+^4QfP_uxbjGd(MG@mq)R5si8i8z4 zgN$!x4u`&hQwuIh8*<8zI~G@BR#GDy^J zqp_JX7-D<72uM-x-u9NYGeiuH1Mh}k*g%TacEC%FdcV6*n@$DBL3yA*zc?Nmhl<2o z@1$RP_}WXIuxxkZ45w@q$Gyd*8KR`^>9?p#$#WXrf;w(bl)D_h2VO+xt^iDW9UkI1 zkzFAG9cSo+uG{HT;QTaol~AolW^64FuI4=H26MCy6Iky}n&hBRS9pjPfNbp3c9260;`7Tp_%ez2#dd3y}Ro$gDd^FI+) z>6FNySwpU*+|aCW#dgNWUN%v(TSHb&KR7|yp8p~{$rNvg{YnkF9tj5|$270a{M;CX zwS~7D;B6(|h;@}Id>*ld(^E0Lo5%(w(QdEzPPv;$Mh!E{h(`OV?_Q=5eXT(Jz(R&$tMTM$xvIh z#k4kQy49a?=BX6yLUVF+(_B^)fxPx$bF>i1o`JLI$VmVX7on?bYc=MR2WLy+d$aZ9 z4k&=)gIWiKtPV0O;I}q5HXUK)q+I3`)fS|bPAI_P^*`fKjzrGxrk%SfqoHlJH)*td z3(XjW9LVvo<9KOb^RI5|4|R`^&BMt8PKh=dy*`kSAs_pbavRaIXiMbrEBCvcZgX$X xHNJ7dEP3W_q;w6b!86KKagtZ@9068JGlT3lYNL`2{B{{b;BVz~eS literal 8830 zcmdsdXIN8Pw{8Fx=}J`*5fzXwBE3WbrAjYSLldNl6zLEV5d{GSBO)DXq1Vts(SY<8 zdI_MkKImUS3cZ`+SdOB(hv=?YWAP|Fw zx~c&PL~#VPr%zJ?@59QG*1!jaw}F~6sHFGe3UG14>CXK-AW(T6-J$JC;F{)%x|uf! z#Q5#_MbYk&?*IZ_VbM^%W8`m*P2KP?Rts$3Zy-?P?-H{NAiqu;usK^?sdq`_D|9o} zujh1sUo_?ZX;^f+hwnZM!cL$0^a+P3E_M2`=Fv8pm(N%(^O$jJJJY(p66vCx3UFNP zR@g~N^4`ET;T7@0U?OdA5_-=@$!Wd3ZtVdT2=w;69vB32P@}`4n}YmwytlS@QQaq) zdv3!|I@=)ndzO$5(sZ#1`( zq?~L;eZ7mAI0%HIDh;hhNA3lsrE?z~{o0jDI|PATB8CD1eC zZA?qZ0lwj?$7$Q@&M(~)Q~hP-l}e`z8l@XFO)+97%hMt+v!04hrQ3Io@Ky%xZlz@& zAVQF-MOjfxJ#(hbL}Gp2JP6e9r%oD5%nkKCq;54C&LmYx@{Q)`FmYG|DR;sVS7gJu6LRn1A6#M4$#Q%#_fSrRh-R z$=(+X0!iAocXoExExy_`ihi3q?x-*(oS+z;r)WMBaX!f*=KJ{2IWfo#a*DHC^{XBV z`C&&&c#gI>V_z=X-V@xvA%S}K^&mVgAL@TNHb0-$gaLMF>Z{M|EWUG*;eLA{F#iC?& zfFW4;S`FP0v{&-inuGdvz~ z!?CT3Sp5l0z~2vtXL(7p(v0e`>O%t}Ec<=BU(RFl>}$-;VNEn!>sQ!}75XlQ+7$(? z&wYzr%%TF_hVtMb`}38MR6=uPC}Kxk(|)&aY25N(`kKKeXFI``*niB0>K z^v8Ijy%7D0o|KX+z9f9x?Jak}DZ1Lz(>^8LFue!@5gFm+nWiBAcBM0jC_a*ZwkUjw z7R?p#6OWx-i~{b4=D`V}(u}a$5oMY*eydNlxlGl`X|68x>9eOm`AjAxEiJ9|TQ4`o zNt|bKv6@Y#H%HF{f&R?6#cq93Iq$UBU0)cS3)kN1<`YnnSfT!~OhDmA^69_a;fdh`p_cjSYPp*I0tp+2Snwol` zn-!&{r6ncw3lDM7;9Qg#?Lk^;OI>+cSy@GeoftQ;Rah;NTfslWQfflxVEqRt0Iu8H zTY0W9?xurer~=^wuyAYcz?CoU2fdPNd}6oOXPR8ac!7aT@FTUjOIAmR^DA2{oe$?( zUcZytnUBKX_VLSooR6Nsi>9f zEyw&1I66Np+w`0_*L^f1ao~pyta~h5Q$7QBFNB6+ zeum-&#?;&F=g=d!7X)E0$NvJ2*SQ6RXmqPtuxf)fQ;ce9h-AaT5YM2~itDKEi^U1+ z@hQlQ$<_<-010@g^g9oTq?VH`5DM~s>tlt-4DhghdwV-+(RmK;+lu%S=(>jZM&trD z2aQ-7RIS&l(bjP{MLV6V|oj-!UMT9e22#~cxt2d;V# zP=GR8-V#f#$%mu-az{U;GDC|!YVJt!J>4?*$O)b7_Wkv3$N+%o#HF7>bPC@iWtBOdzZk-lKFb7PS#~HA zK!KKvQ$jCbhEjSYu}}i)SH#OdnxKe?>)Q`Tt+W%|KD)gqrpq3Fhqq+}LLQb#06|Al z7>Xo^1}%LbwDNeru2{ljA{C0G#v<3&7;?% zj3xEm58ejAOxZzQEnuH81i zCx5OZ-zHNnFd1)F=r_Q=iP9y~eR0wkVg}mA0j$GyluM|AFUra(@O2%01l;p!=7j`% z(^6=x2Zj>lqGLcx86F-+%581G>+0jGCG@nC$9FC~V{$kJa^smWfKHDEZDLBKMbULF zE`0#*`B45}A>QBks3mHhmaF@d;xf}G7KUJYjhDAc@om4x0Bm99?s$E9Qu5o+c6JU9 ztSR`%seA|}?yA{IOdret-tvPjj{U4ICuN<1duALdgb{i5pr+0$B&tg9te&I&>UKc2 zy^7xtYl_6vPfJrb)2_Jx=g*u*!NE^#-5)<1gVA>v6)TFux^E3rpjzg_h&v}RiML5s zImOgU*LEYu74b%B8g@I4>##K0gB7JGR+wZ*}q~diY`ynuLycNUUaI_>;)4Up>lj44xl==dkAZ{(Sy|6Gb zYuS0!Lm~N@q!iSUaiPHvlt~=EJVIFGJoQ!e5D`|zk`LBJWE0Z^SECHbZ42B-1hM&2 z>i9SQGC%1>(+_Lg_vVebKCUk?N9jQwUi|Q5BnS*%(SxSBY2e6M`E;Q>2AhbYJsc3Sl+u+ErF`36U91{4wPs=DCuB0?t^}WIobyVjECaF-JTJ73BPo%70xEe|8XUClfRwnzqK5+ z3dquVOE6-433)tik2RmWL-3EyT9mvD;m}{vLHNczw<2P)ecWgpK3dr!`Jom`K;`#Y z5KE4LBxJzxUr^|9=%criiFKK_;~6_Xh%|-=&oq!X>+9{XFG&KCrTRI(H79-_uLjwV z^o^Q>l8LcfUBaM4+mOqr_$aHi8SNv6W?!9?h#I;i@+I35!y#4|lPD1A{^*bSB>iVq z0?j{8+w0;|Z8D7pn|M`PY9~8R@y&njvHHTtTO4Y^+#D&CH|6@161PNy5?g5^cAyq} zj;8vBO46UuglC0 z5JArVs?Ex=Hn`!aColE0y~>@L?$v!(3+5Kh_xVo>O+Ox9&Dc(Iq~?&o0?W)#%ypE{Pz1a^GtzVcoqo zwB)syPmS+F3Mx2wo_hKRl!Z#A(n&t)Tb<(Mnz^|Ka~nzcvj%dXTC))bok5?jIH`rB zJCF&NfUU}Ky)t}iQ=h1HUHe4X<=`MV7@bOt&(@AYUYl$o6LKwd266GtfR2k;J<1cR2g+gkO1QM+)bXHDcve!GWG@1d~^Ae3O>89cgj;^J4 zNN_`M4H7#1X62bMyRSoRz8+Xw7qAqa$3f-qx?J;#S08zg zLR8;ZzUvaoWd8XWv*0x6SDIm3|7ZDtx8Q05G_J2@zL=;!FQ8XrUKxn*OsO0poy`%Z~eqh5z&(`i&Xzg~-jJ+uT$#WF#AXM*l` z#|eyD1?_)pIdm0p-x)cE{bLx6b71=)TOGSd_$knSznid_*yR5isFm{$lSk?-G)df6 zb*{guz4e0;ITJ3gNdgd^5l}?o4Ss85ijQ=a1q-r#CPH`MWLg#=$$6%8dE6ND_}efP zTb;^9Z}|BB=k;LhC&jB#0dky4%e!n(Dem(w4bmZe5cK)npneL?+YNrE#FEyRsZlp) znpN%?dOr>yULXU*D67;z=xehI@I(#nmciM!rBoZ^zxOd10uxWOJ{)g8ep$`Is-Tg^&im?;r0yh)d5cxMIH&6_t6eXl&dt;ZbRs zB&Mb{7Jp;SASEY~Ve-IG|56&qH#mAl+SsWtn8l@3W70xfU)EmhkB7k!!;qVFNm@aj zT<8418Nsgm8POwckf^UU>Q$y6!>G+xyGkZ<|#yM7SIaWBWYJn8Dk0trqbLP1PyBcP}#wr10=K1eD&YC%dam5%XY8`^u zzU7*zFO;ykI`mVmJL(25zXKHhnEaPc8B+pW3hc|%ePin=y2g!N|aa_ zF{a-`2U3|w)OiB_MDxcg|u>4eAa4!0lV%A9Y#H zU0pOTP5=Bi&4HTL6Mh-&pOzb_bMV`l$=YdNh;Wbmi$R0PMTBjv?aN+mHz8bfq(txR z_ISjkPxRmPmEq9wnbwlcKR(;+jo}m_S$XJ0Dj>FNYXN=FvjT|B&SE2_tRp1qUJTL&uPP{PW=Ul>> z)zA}2?1Z@;FX*`wDISY2g19-RHV!IDit8%i;Sf6Thd;tJ>SUSQ8={ssFMC;9vmSU% z6i7AP_uQ?Sb3$(EUNKBIyDBE=w|@hFcIQM6*w< z2gBEM_C2$_%hyXDCjV_7Ad#u)ImUZ?pw{!Q-buay0@YUD-#If9eN=TqDusNRT6asF zwo!B-=bNtO*yZC`Y?--Dvbd=SS!6B;;4F;)cL6y18tAQM+!yU2!v}qEuGI zRc78DtuE!abStd%dR(W*$SF4SjmD&4h6@-2@!?z`wB8dT!5c$MjFzfzFK!Pk8==#2 zYA;F^1^ZjyxI8#`UzUrDaq#xjVIf2<=f|oRTVEB@?PW7i9CZZ7HrL`8_I1U0)cNXe z?2LDIMv*WZ947nP?FdzFYNMzGL3pCawd97K^WZas0u_ub)Erjn_DHtw$ZHfC`@rD9J!Z-(t`nqj^D! zi_R|QLA2gi+XNdU6&XY;PWQZmoT-dXwkh{BA_eHOd`2h;^n(%LKTrh~aHnT$|8(Eh z)i|u8*Vkvu8Nw&)l1x8>fbV^t@83bvPP^9<tzFKF^r@*Qa64g=MyRS#N4K^!iaL$<{(uMp^BJ#l)UZY+o&n%o`a)rx^91 zFQ}O=2~)mh;0k_ARi{7Re#D-4Ov4pJcu(cM)ymYIc*dfRl^$9Pn`+TT=C1WkV}Mc? zNabz6URQFQ0oYGLT2frny@hCTCvafflbT&ldMy}RU6Gk(+?>^fzqEL}@{C}amEC$J z2GyP$zHiL29G`_aSLgMhK)7?#|8DT%6OlDoEu3}E?b7JjWgV@hVc-VUGzL&^6ybEd z3ck_XIoPf<6j$@*^Z=LKUFU^y+MhS_GK|>7mcotc7i{B)u+hCnmvFfodfLdBdXXiD z`j+AV`!r4&vGOBRzRx};=3kll|At^!$h#t#F5W1+XUD|f3IFCTKQsGy$k_NL+GA6% zWeleOO5nTZcW0r$=-PK!Y&iExg>8M-%?Q_|fNzw-fK7V+9cQ?50#}f@e^o;0{;diSCL$c1?k<(4a z#C<|GsBt@MHjF#KO8Z$C*i_ickS|0E4xQQ-OeA^l9N0bUw7m~jE_yp*rio|dr|WwF zKAGIXJR&r;Y%F0yh0{XB5TQ4lu1u^olp}mMdUaJhV(P3sEae0HE)ojxD&hVnvCU$f zK54xphK*4L@i^XK=O}mo2JGx)qYWnz*NDCnGD*IM@@!vf-YCCTZ@K}sRbk6=;fD0| zWD7Fz#kjNy$u3LE+N#tMo$?p44p4D3FBh-49v5sL!!+yB*^#;4H3iq^+p*XjR+B}DK z5`)Kiyrxv4#-E~0dSm(Z=HQ@@0HiATxEQeF!OFJ1v)T)CI@*6#iD(TCG6d1qawxyN z<}^F;4*X+^#wf*?gSM;il9-g2yzkbrrNs(fbuk(k>+7w_e{V%7m+V9CEZ&g1!qGxZ z|0;nCn*CEkVt_kpYug=cBoBB-5P5UWrhGc^`cDlqUry^BejKiTchbnu1M2=RvCV_i zF6BLurN@Q&SQ8WwrDH!StuD3cJ6n((lk0Rz=0Ea*WYUeT0R20e-1@9p(PU|RCQue7 zq~w_OL5C`RQ0uLH2rMh;z*R`>Ti@MqLR*IwwBGFgpHc&SwI-lL)5K|lF9N7Rz0SRM zXY`ooY25D4_;5NHz*5x{BQM<&IMC-GZZ;rQA*zT0BG4ovo9yVSWP7)@53owR^FEk+ zBMIy=xO7U>77Oct<{qa7&sEmO#ZEgy=#XayG&8(RTG2vJ+V!#fhL5|w)FQd=5Z>`l zSYwPm+7xp;*RHB%~v{!T@)b-2R0oh|;v0i}Vm5=R20mKot%(8^*MgC-3m^!h)8!`N$L1oaT3K>%GpD5dBNA zgdzsPs<{9O{Dpkmuf3^rTB}TYEyszlCRf^D^lu*HGL{5O8o3qUGc9|6Rw(PU9CLMG zOp$`DsXERw`6NnAA47iRgQ=t90Ft#v!b~2CELCc(G*m7!&`trH&(_2&aCR)NHwNJh zoy%0q7r$%er@0IP^*P|7)KFqc3VE0LxkJ1wBm^M2gGgpO0)#zY#y+a(mXoc;$SX!G zYPoW$b#szi(Q})gEuO1QL@J;Fo=@>hbxzaWAPz2ce%MF&m86|WObyQ1~ZJz%J{8*D< diff --git a/windows/client-management/mdm/remotewipe-csp.md b/windows/client-management/mdm/remotewipe-csp.md index 366bb79824..82818fd8da 100644 --- a/windows/client-management/mdm/remotewipe-csp.md +++ b/windows/client-management/mdm/remotewipe-csp.md @@ -7,7 +7,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: MariciaAlforque -ms.date: 03/23/2018 +ms.date: 08/13/2018 --- # RemoteWipe CSP @@ -44,7 +44,28 @@ Supported operation is Exec. **doWipePersistUserData** Added in Windows 10, version 1709. Exec on this node will perform a remote reset on the device and persist user accounts and data. The return status code shows whether the device accepted the Exec command. -  + +**AutomaticRedeployment** +Added in Windows 10, next major update. Node for the Autopilot Reset operation. + +**AutomaticRedeployment/doAutomaticRedeployment** +Added in Windows 10, next major update. Exec on this node triggers Autopilot Reset operation. This works like PC Reset, similar to other existing nodes in this RemoteWipe CSP, except that it keeps the device enrolled in Azure AD and MDM, keeps Wi-Fi profiles, and a few other settings like region, language, keyboard. + +**AutomaticRedeployment/LastError** +Added in Windows 10, next major update. Error value, if any, associated with Autopilot Reset operation (typically an HRESULT). + +**AutomaticRedeployment/Status** +Added in Windows 10, next major update. Status value indicating current state of an Autopilot Reset operation. + +Supported values: + +- 0: Never run (not started). The default state. +- 1: Complete. +- 10: Reset has been scheduled. +- 20: Reset is scheduled and waiting for a reboot. +- 30: Failed during CSP Execute ("Exec" in SyncML). +- 40: Failed: power requirements not met. +- 50: Failed: reset internals failed during reset attempt. ## Related topics diff --git a/windows/client-management/mdm/remotewipe-ddf-file.md b/windows/client-management/mdm/remotewipe-ddf-file.md index 0f0de9b725..b2adadcfd1 100644 --- a/windows/client-management/mdm/remotewipe-ddf-file.md +++ b/windows/client-management/mdm/remotewipe-ddf-file.md @@ -7,7 +7,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: MariciaAlforque -ms.date: 03/23/2018 +ms.date: 08/13/2018 --- # RemoteWipe DDF file @@ -17,7 +17,7 @@ This topic shows the OMA DM device description framework (DDF) for the **RemoteW Looking for the DDF XML files? See [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download). -The XML below is the DDF for Windows 10, version 1709. +The XML below is the DDF for Windows 10, next major version. ``` syntax @@ -43,7 +43,7 @@ The XML below is the DDF for Windows 10, version 1709. - + com.microsoft/1.1/MDM/RemoteWipe The root node for remote wipe function. @@ -131,21 +131,91 @@ The XML below is the DDF for Windows 10, version 1709. Exec on this node will perform a remote reset on the device and persist user accounts and data. The return status code shows whether the device accepted the Exec command. + + AutomaticRedeployment + + + + + + + + + + + + + + + + + + + doAutomaticRedeployment + + + + + + + + + + + + + + + + text/plain + + + + + LastError + + + + + 0 + Error value, if any, associated with Automatic Redeployment operation (typically an HRESULT). + + + + + + + + + + + text/plain + + + + + Status + + + + + 0 + Status value indicating current state of an Automatic Redeployment operation. 0: Never run (not started). The default state. 1: Complete. 10: Reset has been scheduled. 20: Reset is scheduled and waiting for a reboot. 30: Failed during CSP Execute ("Exec" in SyncML). 40: Failed: power requirements not met. 50: Failed: reset internals failed during reset attempt. + + + + + + + + + + + text/plain + + + + -``` - -## Related topics - - -[RemoteWipe configuration service provider](remotewipe-csp.md) - -  - -  - - - - - - +``` \ No newline at end of file From 812298a493a738ee8e1be81d5be8f6d40fb0825f Mon Sep 17 00:00:00 2001 From: Patti Short Date: Tue, 14 Aug 2018 13:37:55 -0700 Subject: [PATCH 08/23] fixed typo --- browsers/edge/includes/allow-adobe-flash-include.md | 2 +- browsers/edge/includes/allow-clearing-browsing-data-include.md | 2 +- browsers/edge/includes/allow-ext-telemetry-books-tab-include.md | 2 +- browsers/edge/includes/allow-extensions-include.md | 2 +- browsers/edge/includes/allow-full-screen-include.md | 2 +- browsers/edge/includes/allow-inprivate-browsing-include.md | 2 +- .../edge/includes/allow-microsoft-compatibility-list-include.md | 2 +- browsers/edge/includes/allow-prelaunch-include.md | 2 +- browsers/edge/includes/allow-printing-include.md | 2 +- browsers/edge/includes/allow-saving-history-include.md | 2 +- .../edge/includes/allow-search-engine-customization-include.md | 2 +- browsers/edge/includes/allow-shared-folder-books-include.md | 2 +- browsers/edge/includes/allow-sideloading-extensions-include.md | 2 +- .../edge/includes/allow-web-content-new-tab-page-include.md | 2 +- browsers/edge/includes/always-enable-book-library-include.md | 2 +- .../includes/configure-additional-search-engines-include.md | 2 +- .../edge/includes/configure-adobe-flash-click-to-run-include.md | 2 +- .../edge/includes/configure-allow-flash-url-list-include.md | 2 +- browsers/edge/includes/configure-autofill-include.md | 2 +- .../configure-browser-telemetry-for-m365-analytics-include.md | 2 +- browsers/edge/includes/configure-do-not-track-include.md | 2 +- .../includes/configure-edge-kiosk-reset-idle-timeout-include.md | 2 +- .../includes/configure-enterprise-mode-site-list-include.md | 2 +- browsers/edge/includes/configure-favorites-bar-include.md | 2 +- browsers/edge/includes/configure-home-button-include.md | 2 +- browsers/edge/includes/configure-inprivate-include.md | 2 +- .../includes/configure-microsoft-edge-kiosk-mode-include.md | 2 +- browsers/edge/includes/configure-open-edge-with-include.md | 2 +- browsers/edge/includes/configure-password-manager-include.md | 2 +- browsers/edge/includes/configure-pop-up-blocker-include.md | 2 +- .../configure-search-suggestions-address-bar-include.md | 2 +- .../do-not-prompt-client-cert-if-only-one-exists-include.md | 2 +- browsers/edge/includes/do-not-sync-browser-settings-include.md | 2 +- browsers/edge/includes/edge-respects-applocker-lists-include.md | 2 +- .../includes/prevent-turning-off-required-extensions-include.md | 2 +- browsers/edge/includes/provision-favorites-include.md | 2 +- browsers/edge/includes/send-all-intranet-sites-ie-include.md | 2 +- browsers/edge/includes/set-default-search-engine-include.md | 2 +- 38 files changed, 38 insertions(+), 38 deletions(-) diff --git a/browsers/edge/includes/allow-adobe-flash-include.md b/browsers/edge/includes/allow-adobe-flash-include.md index b8cdb50808..669cdf2257 100644 --- a/browsers/edge/includes/allow-adobe-flash-include.md +++ b/browsers/edge/includes/allow-adobe-flash-include.md @@ -27,7 +27,7 @@ - **Data type:** Integer #### Registry settings -- **Path:** HLKM\Software\Policies\Microsoft\MicrosoftEdge\Addons +- **Path:** HKLM\Software\Policies\Microsoft\MicrosoftEdge\Addons - **Value name:** FlashPlayerEnabled - **Value type:** REG_DWORD diff --git a/browsers/edge/includes/allow-clearing-browsing-data-include.md b/browsers/edge/includes/allow-clearing-browsing-data-include.md index 6f1432ed53..75f4096362 100644 --- a/browsers/edge/includes/allow-clearing-browsing-data-include.md +++ b/browsers/edge/includes/allow-clearing-browsing-data-include.md @@ -29,7 +29,7 @@ - **Data type:** Integer #### *Registry -- **Path:** HLKM\\Software\\Policies\\Microsoft\\MicrosoftEdge\\Privacy +- **Path:** HKLM\\Software\\Policies\\Microsoft\\MicrosoftEdge\\Privacy - **Value name:** ClearBrowsingHistoryOnExit - **Value type:** REG_DWORD diff --git a/browsers/edge/includes/allow-ext-telemetry-books-tab-include.md b/browsers/edge/includes/allow-ext-telemetry-books-tab-include.md index 96da415a28..7a815e5ff4 100644 --- a/browsers/edge/includes/allow-ext-telemetry-books-tab-include.md +++ b/browsers/edge/includes/allow-ext-telemetry-books-tab-include.md @@ -27,7 +27,7 @@ - **Data type:** Integer #### Registry settings -- **Path:** HLKM\\Software\\Policies\\Microsoft\\MicrosoftEdge\\BooksLibrary +- **Path:** HKLM\\Software\\Policies\\Microsoft\\MicrosoftEdge\\BooksLibrary - **Value name:** EnableExtendedBooksTelemetry - **Value type:** REG_DWORD diff --git a/browsers/edge/includes/allow-extensions-include.md b/browsers/edge/includes/allow-extensions-include.md index 95895b9817..d779ecdd05 100644 --- a/browsers/edge/includes/allow-extensions-include.md +++ b/browsers/edge/includes/allow-extensions-include.md @@ -27,7 +27,7 @@ - **Data type:** Integer #### Registry settings -- **Path:** HLKM\\Software\\Policies\\Microsoft\\MicrosoftEdge\\Extensions +- **Path:** HKLM\\Software\\Policies\\Microsoft\\MicrosoftEdge\\Extensions - **Value name:** ExtensionsEnabled - **Value type:** REG_DWORD diff --git a/browsers/edge/includes/allow-full-screen-include.md b/browsers/edge/includes/allow-full-screen-include.md index b7fc715298..82d4ac9996 100644 --- a/browsers/edge/includes/allow-full-screen-include.md +++ b/browsers/edge/includes/allow-full-screen-include.md @@ -29,7 +29,7 @@ - **Data type:** Integer #### Registry settings -- **Path:** HLKM\Software\Policies\Microsoft\MicrosoftEdge\Main +- **Path:** HKLM\Software\Policies\Microsoft\MicrosoftEdge\Main - **Value name:** AllowFullScreenMode - **Value type:** REG_DWORD diff --git a/browsers/edge/includes/allow-inprivate-browsing-include.md b/browsers/edge/includes/allow-inprivate-browsing-include.md index 727ded18a6..aed98d6009 100644 --- a/browsers/edge/includes/allow-inprivate-browsing-include.md +++ b/browsers/edge/includes/allow-inprivate-browsing-include.md @@ -29,7 +29,7 @@ - **Data type:** Integer #### Registry settings -- **Path:** HLKM\\Software\\Policies\\Microsoft\\MicrosoftEdge\\Main +- **Path:** HKLM\\Software\\Policies\\Microsoft\\MicrosoftEdge\\Main - **Value name:** AllowInPrivate - **Value type:** REG_DWORD diff --git a/browsers/edge/includes/allow-microsoft-compatibility-list-include.md b/browsers/edge/includes/allow-microsoft-compatibility-list-include.md index aabd2fb773..7feffa1941 100644 --- a/browsers/edge/includes/allow-microsoft-compatibility-list-include.md +++ b/browsers/edge/includes/allow-microsoft-compatibility-list-include.md @@ -27,7 +27,7 @@ - **Data type:** Integer #### Registry settings -- **Path:** HLKM\\Software\\Policies\\Microsoft\\MicrosoftEdge\\BrowserEmulation +- **Path:** HKLM\\Software\\Policies\\Microsoft\\MicrosoftEdge\\BrowserEmulation - **Value name:** MSCompatibilityMode - **Value type:** REG_DWORD diff --git a/browsers/edge/includes/allow-prelaunch-include.md b/browsers/edge/includes/allow-prelaunch-include.md index 4721684c1f..fc39431ec2 100644 --- a/browsers/edge/includes/allow-prelaunch-include.md +++ b/browsers/edge/includes/allow-prelaunch-include.md @@ -33,7 +33,7 @@ For more details about configuring the prelaunch and preload options, see [Prela - **Data type:** Integer #### Registry settings -- **Path:** HLKM\Software\Policies\Microsoft\MicrosoftEdge\ +- **Path:** HKLM\Software\Policies\Microsoft\MicrosoftEdge\ - **Value name:** AllowPrelaunch - **Value type:** REG_DWORD diff --git a/browsers/edge/includes/allow-printing-include.md b/browsers/edge/includes/allow-printing-include.md index e6bea96847..196a72daea 100644 --- a/browsers/edge/includes/allow-printing-include.md +++ b/browsers/edge/includes/allow-printing-include.md @@ -27,7 +27,7 @@ - **Data type:** Integer #### Registry settings -- **Path:** HLKM\\Software\\Policies\\Microsoft\\MicrosoftEdge\\Main +- **Path:** HKLM\\Software\\Policies\\Microsoft\\MicrosoftEdge\\Main - **Value name:** AllowPrinting - **Value type:** REG_DWORD diff --git a/browsers/edge/includes/allow-saving-history-include.md b/browsers/edge/includes/allow-saving-history-include.md index f9d38d178e..7829c1fed0 100644 --- a/browsers/edge/includes/allow-saving-history-include.md +++ b/browsers/edge/includes/allow-saving-history-include.md @@ -28,7 +28,7 @@ - **Data type:** Integer #### Registry settings -- **Path:** HLKM\\Software\\Policies\\Microsoft\\MicrosoftEdge\\Main +- **Path:** HKLM\\Software\\Policies\\Microsoft\\MicrosoftEdge\\Main - **Value name:** AllowSavingHistory - **Value type:** REG_DWORD diff --git a/browsers/edge/includes/allow-search-engine-customization-include.md b/browsers/edge/includes/allow-search-engine-customization-include.md index 70eb67b646..0ee8c5866e 100644 --- a/browsers/edge/includes/allow-search-engine-customization-include.md +++ b/browsers/edge/includes/allow-search-engine-customization-include.md @@ -32,7 +32,7 @@ For more details about configuring the search engine, see [Search engine customi #### Registry settings -- **Path:** HLKM\\Software\\Policies\\Microsoft\\MicrosoftEdge\\Protected +- **Path:** HKLM\\Software\\Policies\\Microsoft\\MicrosoftEdge\\Protected - **Value name:** AllowSearchEngineCustomization - **Value type:** REG_DWORD diff --git a/browsers/edge/includes/allow-shared-folder-books-include.md b/browsers/edge/includes/allow-shared-folder-books-include.md index 16ea570af7..777755b994 100644 --- a/browsers/edge/includes/allow-shared-folder-books-include.md +++ b/browsers/edge/includes/allow-shared-folder-books-include.md @@ -26,7 +26,7 @@ - **Data type:** Integer #### Registry settings -- **Path:** HLKM\\Software\\Policies\\Microsoft\\MicrosoftEdge\\BooksLibrary +- **Path:** HKLM\\Software\\Policies\\Microsoft\\MicrosoftEdge\\BooksLibrary - **Value name:** UseSharedFolderForBooks - **Value type:** REG_DWORD diff --git a/browsers/edge/includes/allow-sideloading-extensions-include.md b/browsers/edge/includes/allow-sideloading-extensions-include.md index 0ad2b3c542..b6ebf001c6 100644 --- a/browsers/edge/includes/allow-sideloading-extensions-include.md +++ b/browsers/edge/includes/allow-sideloading-extensions-include.md @@ -27,7 +27,7 @@ - **Data type:** Integer #### Registry settings -- **Path:** HLKM\Software\Policies\Microsoft\MicrosoftEdge\Extensions +- **Path:** HKLM\Software\Policies\Microsoft\MicrosoftEdge\Extensions - **Value name:** AllowSideloadingOfExtensions - **Value type:** REG_DWORD diff --git a/browsers/edge/includes/allow-web-content-new-tab-page-include.md b/browsers/edge/includes/allow-web-content-new-tab-page-include.md index f696d40ceb..7c6889225d 100644 --- a/browsers/edge/includes/allow-web-content-new-tab-page-include.md +++ b/browsers/edge/includes/allow-web-content-new-tab-page-include.md @@ -30,7 +30,7 @@ - **Data type:** Integer #### Registry settings -- **Path:** HLKM\\Software\\Policies\\Microsoft\\MicrosoftEdge\\ServiceUI +- **Path:** HKLM\\Software\\Policies\\Microsoft\\MicrosoftEdge\\ServiceUI - **Value name:** AllowWebContentOnNewTabPage - **Value type:** REG_DWORD diff --git a/browsers/edge/includes/always-enable-book-library-include.md b/browsers/edge/includes/always-enable-book-library-include.md index d5f292b182..62804e3f93 100644 --- a/browsers/edge/includes/always-enable-book-library-include.md +++ b/browsers/edge/includes/always-enable-book-library-include.md @@ -28,7 +28,7 @@ - **Data type:** Integer #### Registry settings -- **Path:** HLKM\\Software\\Policies\\Microsoft\\MicrosoftEdge\\Main +- **Path:** HKLM\\Software\\Policies\\Microsoft\\MicrosoftEdge\\Main - **Value name:** AlwaysEnableBooksLibrary - **Value type:** REG_DWORD diff --git a/browsers/edge/includes/configure-additional-search-engines-include.md b/browsers/edge/includes/configure-additional-search-engines-include.md index 0615a1b9a5..f77a076f2a 100644 --- a/browsers/edge/includes/configure-additional-search-engines-include.md +++ b/browsers/edge/includes/configure-additional-search-engines-include.md @@ -32,7 +32,7 @@ For more details about configuring the search engine, see [Search engine customi - **Data type:** Integer #### Registry settings -- **Path:** HLKM\\Software\\Policies\\Microsoft\\MicrosoftEdge\\OpenSearch +- **Path:** HKLM\\Software\\Policies\\Microsoft\\MicrosoftEdge\\OpenSearch - **Value name:** ConfigureAdditionalSearchEngines - **Value type:** REG_SZ diff --git a/browsers/edge/includes/configure-adobe-flash-click-to-run-include.md b/browsers/edge/includes/configure-adobe-flash-click-to-run-include.md index c1a93a7712..d7b0fa6adb 100644 --- a/browsers/edge/includes/configure-adobe-flash-click-to-run-include.md +++ b/browsers/edge/includes/configure-adobe-flash-click-to-run-include.md @@ -27,7 +27,7 @@ - **Data type:** Integer #### Registry settings -- **Path:** HLKM\\Software\\Policies\\Microsoft\\MicrosoftEdge\\Security +- **Path:** HKLM\\Software\\Policies\\Microsoft\\MicrosoftEdge\\Security - **Value name:** FlashClickToRunMode - **Value type:** REG_DWORD diff --git a/browsers/edge/includes/configure-allow-flash-url-list-include.md b/browsers/edge/includes/configure-allow-flash-url-list-include.md index 1f13125cd7..919215341c 100644 --- a/browsers/edge/includes/configure-allow-flash-url-list-include.md +++ b/browsers/edge/includes/configure-allow-flash-url-list-include.md @@ -29,7 +29,7 @@ - **Data type:** Integer #### Registry settings -- **Path:** HLKM\Software\Policies\Microsoft\MicrosoftEdge\ +- **Path:** HKLM\Software\Policies\Microsoft\MicrosoftEdge\ - **Value name:** - **Value type:** REG_DWORD diff --git a/browsers/edge/includes/configure-autofill-include.md b/browsers/edge/includes/configure-autofill-include.md index 5d4adef785..b63f604958 100644 --- a/browsers/edge/includes/configure-autofill-include.md +++ b/browsers/edge/includes/configure-autofill-include.md @@ -27,7 +27,7 @@ - **Data type:** Integer #### Registry settings -- **Path:** HLKM\\Software\\Policies\\Microsoft\\MicrosoftEdge\\Main +- **Path:** HKLM\\Software\\Policies\\Microsoft\\MicrosoftEdge\\Main - **Value name:** Use FormSuggest - **Value type:** REG_SZ diff --git a/browsers/edge/includes/configure-browser-telemetry-for-m365-analytics-include.md b/browsers/edge/includes/configure-browser-telemetry-for-m365-analytics-include.md index 755c437c3f..2b52aa4589 100644 --- a/browsers/edge/includes/configure-browser-telemetry-for-m365-analytics-include.md +++ b/browsers/edge/includes/configure-browser-telemetry-for-m365-analytics-include.md @@ -42,7 +42,7 @@ - **Data type:** Integer #### Registry settings -- **Path:** HLKM\Software\Microsoft\Windows\CurrentVersion\Policies\DataCollection +- **Path:** HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\DataCollection - **Value name:** MicrosoftEdgeDataOptIn - **Value type:** REG_DWORD diff --git a/browsers/edge/includes/configure-do-not-track-include.md b/browsers/edge/includes/configure-do-not-track-include.md index 95011f3a6b..4ead2d87a7 100644 --- a/browsers/edge/includes/configure-do-not-track-include.md +++ b/browsers/edge/includes/configure-do-not-track-include.md @@ -27,7 +27,7 @@ - **Data type:** Integer #### Registry settings -- **Path:** HLKM\\Software\\Policies\\Microsoft\\MicrosoftEdge\\Main +- **Path:** HKLM\\Software\\Policies\\Microsoft\\MicrosoftEdge\\Main - **Value name:** DoNotTrack - **Value type:** REG_DWORD diff --git a/browsers/edge/includes/configure-edge-kiosk-reset-idle-timeout-include.md b/browsers/edge/includes/configure-edge-kiosk-reset-idle-timeout-include.md index 44539d481e..a1dfe3e91c 100644 --- a/browsers/edge/includes/configure-edge-kiosk-reset-idle-timeout-include.md +++ b/browsers/edge/includes/configure-edge-kiosk-reset-idle-timeout-include.md @@ -28,7 +28,7 @@ You must set the Configure kiosk mode policy to enabled (1 - InPrivate public br - **Data type:** Integer #### Registry settings -- **Path:** HLKM\Software\Policies\Microsoft\MicrosoftEdge\KioskMode +- **Path:** HKLM\Software\Policies\Microsoft\MicrosoftEdge\KioskMode - **Value name:**ConfigureKioskResetAfterIdleTimeout - **Value type:** REG_DWORD diff --git a/browsers/edge/includes/configure-enterprise-mode-site-list-include.md b/browsers/edge/includes/configure-enterprise-mode-site-list-include.md index 6816cc3d29..6b347ce989 100644 --- a/browsers/edge/includes/configure-enterprise-mode-site-list-include.md +++ b/browsers/edge/includes/configure-enterprise-mode-site-list-include.md @@ -29,7 +29,7 @@ - **Data type:** String #### Registry settings -- **Path:** HLKM\Software\Policies\Microsoft\MicrosoftEdge\Main\EnterpriseMode +- **Path:** HKLM\Software\Policies\Microsoft\MicrosoftEdge\Main\EnterpriseMode - **Value name:** SiteList - **Value type:** REG_SZ diff --git a/browsers/edge/includes/configure-favorites-bar-include.md b/browsers/edge/includes/configure-favorites-bar-include.md index ffa1fff8c1..88c83f2538 100644 --- a/browsers/edge/includes/configure-favorites-bar-include.md +++ b/browsers/edge/includes/configure-favorites-bar-include.md @@ -30,7 +30,7 @@ - **Data type:** Integer #### Registry settings -- **Path:** HLKM\Software\Policies\Microsoft\MicrosoftEdge\Main +- **Path:** HKLM\Software\Policies\Microsoft\MicrosoftEdge\Main - **Value name:** ConfigureFavoritesBar - **Value type:** REG_DWORD diff --git a/browsers/edge/includes/configure-home-button-include.md b/browsers/edge/includes/configure-home-button-include.md index 22ecd41552..9c1c8851ac 100644 --- a/browsers/edge/includes/configure-home-button-include.md +++ b/browsers/edge/includes/configure-home-button-include.md @@ -39,7 +39,7 @@ For more details about configuring the different Home button options, see [Home - **Data type:** Integer #### Registry settings -- **Path:** HLKM\Software\Policies\Microsoft\MicrosoftEdge\Internet Settings +- **Path:** HKLM\Software\Policies\Microsoft\MicrosoftEdge\Internet Settings - **Value name:** ConfigureHomeButton - **Value type:** REG_DWORD diff --git a/browsers/edge/includes/configure-inprivate-include.md b/browsers/edge/includes/configure-inprivate-include.md index c04c0d0150..c29a818b47 100644 --- a/browsers/edge/includes/configure-inprivate-include.md +++ b/browsers/edge/includes/configure-inprivate-include.md @@ -25,7 +25,7 @@ - **Data type:** Integer #### Registry settings -- **Path:** HLKM\Software\Policies\Microsoft\MicrosoftEdge\ +- **Path:** HKLM\Software\Policies\Microsoft\MicrosoftEdge\ - **Value name:** - **Value type:** REG_DWORD diff --git a/browsers/edge/includes/configure-microsoft-edge-kiosk-mode-include.md b/browsers/edge/includes/configure-microsoft-edge-kiosk-mode-include.md index 034fd5b55e..54880f184f 100644 --- a/browsers/edge/includes/configure-microsoft-edge-kiosk-mode-include.md +++ b/browsers/edge/includes/configure-microsoft-edge-kiosk-mode-include.md @@ -32,7 +32,7 @@ For this policy to work, you must configure Microsoft Edge in assigned access; o - **Data type:** Integer #### Registry settings -- **Path:** HLKM\Software\Policies\Microsoft\MicrosoftEdge\KioskMode +- **Path:** HKLM\Software\Policies\Microsoft\MicrosoftEdge\KioskMode - **Value name:** ConfigureKioskMode - **Value type:** REG_SZ diff --git a/browsers/edge/includes/configure-open-edge-with-include.md b/browsers/edge/includes/configure-open-edge-with-include.md index 12b37c700d..70ba21e6ab 100644 --- a/browsers/edge/includes/configure-open-edge-with-include.md +++ b/browsers/edge/includes/configure-open-edge-with-include.md @@ -44,7 +44,7 @@ For more details about configuring the Start pages, see [Start pages configurati - **Data type:** Integer #### Registry settings -- **Path:** HLKM\Software\Policies\Microsoft\MicrosoftEdge\Internet Settings +- **Path:** HKLM\Software\Policies\Microsoft\MicrosoftEdge\Internet Settings - **Value name:** ConfigureOpenEdgeWith - **Value type:** REG_DWORD diff --git a/browsers/edge/includes/configure-password-manager-include.md b/browsers/edge/includes/configure-password-manager-include.md index 01ab2e2bea..4d3afb59c3 100644 --- a/browsers/edge/includes/configure-password-manager-include.md +++ b/browsers/edge/includes/configure-password-manager-include.md @@ -32,7 +32,7 @@ Verify not allowed/disabled settings: - **Data type:** Integer #### Registry settings -- **Path:** HLKM\Software\Policies\Microsoft\MicrosoftEdge\Main +- **Path:** HKLM\Software\Policies\Microsoft\MicrosoftEdge\Main - **Value name:** FormSuggest Passwords - **Value type:** REG_SZ diff --git a/browsers/edge/includes/configure-pop-up-blocker-include.md b/browsers/edge/includes/configure-pop-up-blocker-include.md index 0b63fbd96e..cb5d637204 100644 --- a/browsers/edge/includes/configure-pop-up-blocker-include.md +++ b/browsers/edge/includes/configure-pop-up-blocker-include.md @@ -27,7 +27,7 @@ - **Data type:** Integer ### Registry -- **Path:** HLKM\\Software\\Policies\\Microsoft\\MicrosoftEdge\\Main +- **Path:** HKLM\\Software\\Policies\\Microsoft\\MicrosoftEdge\\Main - **Value name:** AllowPopups - **Value type:** REG_SZ diff --git a/browsers/edge/includes/configure-search-suggestions-address-bar-include.md b/browsers/edge/includes/configure-search-suggestions-address-bar-include.md index 5ee81ccabb..eaa3667bd8 100644 --- a/browsers/edge/includes/configure-search-suggestions-address-bar-include.md +++ b/browsers/edge/includes/configure-search-suggestions-address-bar-include.md @@ -27,7 +27,7 @@ - **Data type:** Integer #### Registry settings -- **Path:** HLKM\\Software\\Policies\\Microsoft\\MicrosoftEdge\\SearchScopes +- **Path:** HKLM\\Software\\Policies\\Microsoft\\MicrosoftEdge\\SearchScopes - **Value name:** ShowSearchSuggestionsGlobal - **Value type:** REG_DWORD diff --git a/browsers/edge/includes/do-not-prompt-client-cert-if-only-one-exists-include.md b/browsers/edge/includes/do-not-prompt-client-cert-if-only-one-exists-include.md index b1fc2dd88c..3d4feeb168 100644 --- a/browsers/edge/includes/do-not-prompt-client-cert-if-only-one-exists-include.md +++ b/browsers/edge/includes/do-not-prompt-client-cert-if-only-one-exists-include.md @@ -24,7 +24,7 @@ - **Data type:** Integer #### Registry settings -- **Path:** HLKM\Software\Policies\Microsoft\MicrosoftEdge\ +- **Path:** HKLM\Software\Policies\Microsoft\MicrosoftEdge\ - **Value name:** - **Value type:** REG_DWORD diff --git a/browsers/edge/includes/do-not-sync-browser-settings-include.md b/browsers/edge/includes/do-not-sync-browser-settings-include.md index b26b2cd7ff..4d3ed0ac24 100644 --- a/browsers/edge/includes/do-not-sync-browser-settings-include.md +++ b/browsers/edge/includes/do-not-sync-browser-settings-include.md @@ -30,7 +30,7 @@ For more details about configuring the browser syncing options, see [Sync browse - **Data type:** Integer #### Registry settings -- **Path:** HLKM\\Software\Policies\Microsoft\Windows\SettingSync +- **Path:** HKLM\\Software\Policies\Microsoft\Windows\SettingSync - **Value name:** DisableWebBrowserSettingSyncUserOverride - **Value diff --git a/browsers/edge/includes/edge-respects-applocker-lists-include.md b/browsers/edge/includes/edge-respects-applocker-lists-include.md index 3f6b0aa3ce..60b8d8f5e0 100644 --- a/browsers/edge/includes/edge-respects-applocker-lists-include.md +++ b/browsers/edge/includes/edge-respects-applocker-lists-include.md @@ -15,7 +15,7 @@ |---|---| |ADMX info |
  • **GP English name:**
  • **GP name:**
  • **GP path:** Windows Components/Microsoft Edge
  • **GP ADMX file name:** MicrosoftEdge.admx
| |MDM settings |
  • **MDM name:** Browser/[]()
  • **Supported devices:** Desktop and Mobile
  • **URI full path:** ./Vendor/MSFT/Policy/Config/Browser/
  • **Data type:** Integer
| -|Registry |
  • **Path:** HLKM\Software\Policies\Microsoft\MicrosoftEdge\
  • **Value name:**
  • **Value type:** REG_DWORD
| +|Registry |
  • **Path:** HKLM\Software\Policies\Microsoft\MicrosoftEdge\
  • **Value name:**
  • **Value type:** REG_DWORD
| --- diff --git a/browsers/edge/includes/prevent-turning-off-required-extensions-include.md b/browsers/edge/includes/prevent-turning-off-required-extensions-include.md index dad8213fef..d53db6bbfa 100644 --- a/browsers/edge/includes/prevent-turning-off-required-extensions-include.md +++ b/browsers/edge/includes/prevent-turning-off-required-extensions-include.md @@ -27,7 +27,7 @@ - **Data type:** String #### Registry settings -- **Path:** HLKM\Software\Policies\Microsoft\MicrosoftEdge\Extensions +- **Path:** HKLM\Software\Policies\Microsoft\MicrosoftEdge\Extensions - **Value name:** PreventTurningOffRequiredExtensions - **Value type:** REG_SZ diff --git a/browsers/edge/includes/provision-favorites-include.md b/browsers/edge/includes/provision-favorites-include.md index 7601beff81..7d755b87f1 100644 --- a/browsers/edge/includes/provision-favorites-include.md +++ b/browsers/edge/includes/provision-favorites-include.md @@ -30,7 +30,7 @@ - **Data type:** String #### Registry settings -- **Path:** HLKM\Software\Policies\Microsoft\MicrosoftEdge\Favorites +- **Path:** HKLM\Software\Policies\Microsoft\MicrosoftEdge\Favorites - **Value name:** ConfiguredFavorites - **Value type:** REG_SZ diff --git a/browsers/edge/includes/send-all-intranet-sites-ie-include.md b/browsers/edge/includes/send-all-intranet-sites-ie-include.md index 1155d908d3..5510174af6 100644 --- a/browsers/edge/includes/send-all-intranet-sites-ie-include.md +++ b/browsers/edge/includes/send-all-intranet-sites-ie-include.md @@ -31,7 +31,7 @@ - **Data type:** Integer #### Registry settings -- **Path:** HLKM\\Software\\Policies\\Microsoft\\MicrosoftEdge\\Main +- **Path:** HKLM\\Software\\Policies\\Microsoft\\MicrosoftEdge\\Main - **Value name:** SendIntranetTraffictoInternetExplorer - **Value type:** REG_DWORD diff --git a/browsers/edge/includes/set-default-search-engine-include.md b/browsers/edge/includes/set-default-search-engine-include.md index 9f4d68c89f..b1cdbc84fb 100644 --- a/browsers/edge/includes/set-default-search-engine-include.md +++ b/browsers/edge/includes/set-default-search-engine-include.md @@ -33,7 +33,7 @@ For more details about configuring the search engine, see [Search engine customi - **Data type:** Integer #### Registry settings -- **Path:** HLKM\\Software\\Policies\\Microsoft\\MicrosoftEdge\\OpenSearch +- **Path:** HKLM\\Software\\Policies\\Microsoft\\MicrosoftEdge\\OpenSearch - **Value name:** SetDefaultSearchEngine - **Value type:** REG_SZ From 4ba299704f5b4b2d74d5d4b6a475b6e76a44cfc6 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Tue, 14 Aug 2018 15:52:12 -0700 Subject: [PATCH 09/23] added custom scan option --- .../run-scan-windows-defender-antivirus.md | 7 ++++--- .../scheduled-catch-up-scans-windows-defender-antivirus.md | 4 +++- 2 files changed, 7 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/run-scan-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/run-scan-windows-defender-antivirus.md index 4aa2447988..cfa4f029ba 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/run-scan-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/run-scan-windows-defender-antivirus.md @@ -40,16 +40,17 @@ ms.date: 07/10/2018 You can run an on-demand scan on individual endpoints. These scans will start immediately, and you can define parameters for the scan, such as the location or type. -## Quick scan versus full scan +## Quick scan versus full scan and custom scan Quick scan looks at all the locations where there could be malware registered to start with the system, such as registry keys and known Windows startup folders. -Combined with [always-on real-time protection capability](configure-real-time-protection-windows-defender-antivirus.md) - which reviews files when they are opened and closed, and whenever a user navigates to a folder - a quick scan helps provide strong coverage both for malware that starts with the system and kernel-level malware. +Combined with [always-on real-time protection capability](configure-real-time-protection-windows-defender-antivirus.md), which reviews files when they are opened and closed, and whenever a user navigates to a folder, a quick scan helps provide strong coverage both for malware that starts with the system and kernel-level malware. In most instances, this means a quick scan is adequate to find malware that wasn't picked up by real-time protection. -A full scan can be useful on endpoints that have encountered a malware threat to identify if there are any inactive components that require a more thorough clean-up, and can be ideal when running on-demand scans. +A full scan can be useful on endpoints that have encountered a malware threat to identify if there are any inactive components that require a more thorough clean-up, and can be ideal when running on-demand scans. +A custom scan allows you to specify files or folders to scan, such as a USB drive. **Use the mpcmdrum.exe command-line utility to run a scan:** diff --git a/windows/security/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus.md index 8e4b44e881..20c62b31b9 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus.md @@ -60,7 +60,7 @@ To configure the Group Policy settings described in this topic: Also see the [Manage when protection updates should be downloaded and applied](manage-protection-update-schedule-windows-defender-antivirus.md) and [Prevent or allow users to locally modify policy settings](configure-local-policy-overrides-windows-defender-antivirus.md) topics. -## Quick scan versus full scan +## Quick scan versus full scan and custom scan When you set up scheduled scans, you can set up whether the scan should be a full or quick scan. @@ -72,6 +72,8 @@ In most instances, this means a quick scan is adequate to find malware that wasn A full scan can be useful on endpoints that have encountered a malware threat to identify if there are any inactive components that require a more thorough clean-up. In this instance, you may want to use a full scan when running an [on-demand scan](run-scan-windows-defender-antivirus.md). +A custom scan allows you to specify the files and folders to scan, such as a USB drive. + ## Set up scheduled scans Scheduled scans will run at the day and time you specify. You can use Group Policy, PowerShell, and WMI to configure scheduled scans. From 8b38c885ea0d943ebf24a9dd6e36e823677b5b03 Mon Sep 17 00:00:00 2001 From: Patti Short Date: Tue, 14 Aug 2018 16:37:51 -0700 Subject: [PATCH 10/23] added link to mdm policy --- browsers/edge/new-policies.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/browsers/edge/new-policies.md b/browsers/edge/new-policies.md index 48df9f6016..f05d138710 100644 --- a/browsers/edge/new-policies.md +++ b/browsers/edge/new-policies.md @@ -46,7 +46,7 @@ We are discontinuing the **Configure Favorites** group policy. Use the **[Provis | [Configure Open Microsoft Edge With](#configure-open-microsoft-edge-with) | New | [ConfigureOpenEdgeWith](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-browser#browser-configureopenmicrosoftedgewith) | New | | [Do not sync browser settings](available-policies.md#do-not-sync-browser-settings) | -- | [Experience/DoNotSyncBrowserSettings](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-experience#experience-donotsyncbrowsersetting) | New | | [Prevent certificate error overrides](#prevent-certificate-error-overrides) | New | [PreventCertErrorOverrides](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-browser#browser-preventcerterroroverrides) | New | -| [Prevent users from turning on browser syncing](#preventusersfromturningonbrowsersyncing) | New | Experience/PreventUsersFromTurningOnBrowserSyncing | New | +| [Prevent users from turning on browser syncing](#preventusersfromturningonbrowsersyncing) | New | Experience/[PreventUsersFromTurningOnBrowserSyncing](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-experience#experience-preventusersfromturningonbrowsersyncing) | New | | [Prevent turning off required extensions](#prevent-turning-off-required-extensions) | New | [PreventTurningOffRequiredExtensions](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-experience#experience-preventusersfromturningonbrowsersyncing) | New | | [Set Home button URL](#set-home-button-url) | New | [SetHomeButtonURL](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-browser#browser-sethomebuttonurl) | New | | [Set New Tab page URL](#set-new-tab-page-url) | New | [SetNewTabPageURL](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-browser#browser-setnewtabpageurl) | New | From 07f6e85f2fc5ef524c11fb7d19b0df20d7c2123b Mon Sep 17 00:00:00 2001 From: Patti Short Date: Tue, 14 Aug 2018 16:45:28 -0700 Subject: [PATCH 11/23] removed the fixed width table md code --- .../allow-address-bar-suggestions-include.md | 10 +++++----- .../allow-clearing-browsing-data-include.md | 10 +++++----- ...browser-telemetry-for-m365-analytics-include.md | 14 +++++++------- .../includes/configure-favorites-bar-include.md | 12 ++++++------ 4 files changed, 23 insertions(+), 23 deletions(-) diff --git a/browsers/edge/includes/allow-address-bar-suggestions-include.md b/browsers/edge/includes/allow-address-bar-suggestions-include.md index 44e9bc5c02..bd15a448b8 100644 --- a/browsers/edge/includes/allow-address-bar-suggestions-include.md +++ b/browsers/edge/includes/allow-address-bar-suggestions-include.md @@ -7,11 +7,11 @@ ### Supported values ->[!div class="mx-tableFixed"] ->|Group Policy |MDM |Registry |Description |Most restricted | ->|---|:---:|:---:|---|:---:| ->|Disabled |0 |0 |Prevented/not allowed. Hide the Address bar drop-down functionality and disable the _Show search and site suggestions as I type_ toggle in Settings. |![Most restricted value](../images/check-gn.png) | ->|Enabled or not configured **(default)** |1 |1 |Allowed. Show the Address bar drop-down list and make it available. | | + +|Group Policy |MDM |Registry |Description |Most restricted | +|---|:---:|:---:|---|:---:| +|Disabled |0 |0 |Prevented/not allowed. Hide the Address bar drop-down functionality and disable the _Show search and site suggestions as I type_ toggle in Settings. |![Most restricted value](../images/check-gn.png) | +|Enabled or not configured **(default)** |1 |1 |Allowed. Show the Address bar drop-down list and make it available. | | --- ### ADMX info and settings diff --git a/browsers/edge/includes/allow-clearing-browsing-data-include.md b/browsers/edge/includes/allow-clearing-browsing-data-include.md index 75f4096362..06982d1176 100644 --- a/browsers/edge/includes/allow-clearing-browsing-data-include.md +++ b/browsers/edge/includes/allow-clearing-browsing-data-include.md @@ -6,11 +6,11 @@ ### Supported values ->[!div class="mx-tableFixed"] ->|Group Policy |MDM |Registry |Description |Most restricted | ->|---|:---:|:---:|---|:---:| ->|Disabled or not configured **(default)** |0 |0 |Prevented/not allowed. Users can configure the _Clear browsing data_ option in Settings. | | ->|Enabled |1 |1 |Allowed. Clear the browsing data upon exit automatically. |![Most restricted value](../images/check-gn.png) | + +|Group Policy |MDM |Registry |Description |Most restricted | +|---|:---:|:---:|---|:---:| +|Disabled or not configured **(default)** |0 |0 |Prevented/not allowed. Users can configure the _Clear browsing data_ option in Settings. | | +|Enabled |1 |1 |Allowed. Clear the browsing data upon exit automatically. |![Most restricted value](../images/check-gn.png) | --- diff --git a/browsers/edge/includes/configure-browser-telemetry-for-m365-analytics-include.md b/browsers/edge/includes/configure-browser-telemetry-for-m365-analytics-include.md index 2b52aa4589..3a0386c574 100644 --- a/browsers/edge/includes/configure-browser-telemetry-for-m365-analytics-include.md +++ b/browsers/edge/includes/configure-browser-telemetry-for-m365-analytics-include.md @@ -10,13 +10,13 @@ ### Supported values ->[!div class="mx-tableFixed"] ->|Group Policy |MDM |Registry |Description |Most restricted | ->|---|:---:|:---:|---|:---:| ->|Disabled or not configured
**(default)** |0 |0 |No data collected or sent |![Most restricted value](../images/check-gn.png) | ->|Enabled |1 |1 |Send intranet history only | | ->|Enabled |2 |2 |Send Internet history only | | ->|Enabled |3 |3 |Send both intranet and Internet history | | + +|Group Policy |MDM |Registry |Description |Most restricted | +|---|:---:|:---:|---|:---:| +|Disabled or not configured
**(default)** |0 |0 |No data collected or sent |![Most restricted value](../images/check-gn.png) | +|Enabled |1 |1 |Send intranet history only | | +|Enabled |2 |2 |Send Internet history only | | +|Enabled |3 |3 |Send both intranet and Internet history | | --- >>You can find this policy and the related policies in the following location of the Group Policy Editor: diff --git a/browsers/edge/includes/configure-favorites-bar-include.md b/browsers/edge/includes/configure-favorites-bar-include.md index 88c83f2538..f4f537218f 100644 --- a/browsers/edge/includes/configure-favorites-bar-include.md +++ b/browsers/edge/includes/configure-favorites-bar-include.md @@ -8,12 +8,12 @@ ### Supported values ->[!div class="mx-tableFixed"] ->|Group Policy |MDM |Registry |Description | ->|---|:---:|:---:|---| ->|Not configured **(default)** |Blank |Blank |Hide the favorites bar but show it on the Start and New tab pages. The favorites bar toggle, in Settings, is set to Off but enabled allowing users to make changes. | ->|Disabled |0 |0 |Hide the favorites bar on all pages. Also, the favorites bar toggle, in Settings, is set to Off and disabled preventing users from making changes. Microsoft Edge also hides the “show bar/hide bar” option in the context menu. | ->|Enabled |1 |1 |Show the favorites bar on all pages. Also, the favorites bar toggle, in Settings, is set to On and disabled preventing users from making changes. Microsoft Edge also hides the “show bar/hide bar” option in the context menu. | + +|Group Policy |MDM |Registry |Description | +|---|:---:|:---:|---| +|Not configured **(default)** |Blank |Blank |Hide the favorites bar but show it on the Start and New tab pages. The favorites bar toggle, in Settings, is set to Off but enabled allowing users to make changes. | +|Disabled |0 |0 |Hide the favorites bar on all pages. Also, the favorites bar toggle, in Settings, is set to Off and disabled preventing users from making changes. Microsoft Edge also hides the “show bar/hide bar” option in the context menu. | +|Enabled |1 |1 |Show the favorites bar on all pages. Also, the favorites bar toggle, in Settings, is set to On and disabled preventing users from making changes. Microsoft Edge also hides the “show bar/hide bar” option in the context menu. | --- ### ADMX info and settings From ddab3272caad4fc4f95cfdbb052fd84f8b8ea0f5 Mon Sep 17 00:00:00 2001 From: Maricia Alforque Date: Tue, 14 Aug 2018 23:46:03 +0000 Subject: [PATCH 12/23] Merged PR 10630: Removed the Delete example from the NonRemovable setting --- .../mdm/enterprisemodernappmanagement-csp.md | 17 ----------------- .../new-in-windows-mdm-enrollment-management.md | 10 +++++++++- 2 files changed, 9 insertions(+), 18 deletions(-) diff --git a/windows/client-management/mdm/enterprisemodernappmanagement-csp.md b/windows/client-management/mdm/enterprisemodernappmanagement-csp.md index 72a33dfc8b..6d9a0e4458 100644 --- a/windows/client-management/mdm/enterprisemodernappmanagement-csp.md +++ b/windows/client-management/mdm/enterprisemodernappmanagement-csp.md @@ -395,23 +395,6 @@ Add an app to the nonremovable app policy list ``` -Delete an app from the nonremovable app policy list -``` - - - - 1 - - - ./Device/Vendor/MSFT/EnterpriseModernAppManagement/AppManagement/AppStore/PackageFamilyName/NonRemovable - - - - - - -``` - Get the status for a particular app ``` diff --git a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md index 178b014d5f..9e15e7e531 100644 --- a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md +++ b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md @@ -10,7 +10,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: MariciaAlforque -ms.date: 07/27/2018 +ms.date: 08/14/2018 --- # What's new in MDM enrollment and management @@ -1469,6 +1469,10 @@ For details about Microsoft mobile device management protocols for Windows 10 s [WindowsDefenderApplicationGuard CSP](windowsdefenderapplicationguard-csp.md)

Added new settings in Windows 10, next major version.

+ +[TenantLockdown CSP](\tenantlockdown--csp.md) +

Added new CSP in Windows 10, next major version.

+ @@ -1754,6 +1758,10 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware +[TenantLockdown CSP](\tenantlockdown--csp.md) +

Added new CSP in Windows 10, next major version.

+ + [WindowsDefenderApplicationGuard CSP](windowsdefenderapplicationguard-csp.md)

Added new settings in Windows 10, next major version.

From 6642d669050998e70c413912701d1eff7a32eab8 Mon Sep 17 00:00:00 2001 From: Patti Short Date: Tue, 14 Aug 2018 16:52:22 -0700 Subject: [PATCH 13/23] removed redundant supported versions --- browsers/edge/group-policies/address-bar-settings-gp.md | 2 -- browsers/edge/group-policies/adobe-settings-gp.md | 1 - browsers/edge/group-policies/books-library-management-gp.md | 1 - browsers/edge/group-policies/browser-settings-management-gp.md | 1 - browsers/edge/group-policies/developer-settings-gp.md | 2 +- browsers/edge/group-policies/extensions-management-gp.md | 1 - browsers/edge/group-policies/favorites-management-gp.md | 2 -- browsers/edge/group-policies/new-tab-page-settings-gp.md | 1 - browsers/edge/group-policies/prelaunch-preload-gp.md | 2 +- browsers/edge/group-policies/security-privacy-management-gp.md | 1 - browsers/edge/group-policies/sync-browser-settings-gp.md | 2 +- browsers/edge/group-policies/telemetry-management-gp.md | 1 - 12 files changed, 3 insertions(+), 14 deletions(-) diff --git a/browsers/edge/group-policies/address-bar-settings-gp.md b/browsers/edge/group-policies/address-bar-settings-gp.md index a35d719d37..39cc4f17f8 100644 --- a/browsers/edge/group-policies/address-bar-settings-gp.md +++ b/browsers/edge/group-policies/address-bar-settings-gp.md @@ -13,8 +13,6 @@ ms.sitesec: library --- # Address bar settings ->*Supported versions: Microsoft Edge on Windows 10* - diff --git a/browsers/edge/group-policies/adobe-settings-gp.md b/browsers/edge/group-policies/adobe-settings-gp.md index a74e8c94e4..36461a27fe 100644 --- a/browsers/edge/group-policies/adobe-settings-gp.md +++ b/browsers/edge/group-policies/adobe-settings-gp.md @@ -13,7 +13,6 @@ ms.sitesec: library --- # Adobe settings ->*Supported versions: Microsoft Edge on Windows 10* diff --git a/browsers/edge/group-policies/books-library-management-gp.md b/browsers/edge/group-policies/books-library-management-gp.md index ec9dc2db97..2851dafc5b 100644 --- a/browsers/edge/group-policies/books-library-management-gp.md +++ b/browsers/edge/group-policies/books-library-management-gp.md @@ -13,7 +13,6 @@ ms.sitesec: library --- # Books Library management ->*Supported versions: Microsoft Edge on Windows 10* diff --git a/browsers/edge/group-policies/browser-settings-management-gp.md b/browsers/edge/group-policies/browser-settings-management-gp.md index 2f4f4c8de3..213c901cfb 100644 --- a/browsers/edge/group-policies/browser-settings-management-gp.md +++ b/browsers/edge/group-policies/browser-settings-management-gp.md @@ -13,7 +13,6 @@ ms.sitesec: library --- # Browser settings management ->*Supported versions: Microsoft Edge on Windows 10* diff --git a/browsers/edge/group-policies/developer-settings-gp.md b/browsers/edge/group-policies/developer-settings-gp.md index 85cfef2db5..9108424f87 100644 --- a/browsers/edge/group-policies/developer-settings-gp.md +++ b/browsers/edge/group-policies/developer-settings-gp.md @@ -13,7 +13,7 @@ ms.sitesec: library --- # Developer settings ->*Supported versions: Microsoft Edge on Windows 10* + diff --git a/browsers/edge/group-policies/extensions-management-gp.md b/browsers/edge/group-policies/extensions-management-gp.md index 2cd29cf9a3..4f12302469 100644 --- a/browsers/edge/group-policies/extensions-management-gp.md +++ b/browsers/edge/group-policies/extensions-management-gp.md @@ -13,7 +13,6 @@ ms.sitesec: library --- # Extensions management ->*Supported versions: Microsoft Edge on Windows 10* diff --git a/browsers/edge/group-policies/favorites-management-gp.md b/browsers/edge/group-policies/favorites-management-gp.md index d8b7822d94..e488c71611 100644 --- a/browsers/edge/group-policies/favorites-management-gp.md +++ b/browsers/edge/group-policies/favorites-management-gp.md @@ -13,8 +13,6 @@ ms.sitesec: library --- # Favorites management ->*Supported versions: Microsoft Edge on Windows 10* - diff --git a/browsers/edge/group-policies/new-tab-page-settings-gp.md b/browsers/edge/group-policies/new-tab-page-settings-gp.md index c9058539c8..bc6f5d500d 100644 --- a/browsers/edge/group-policies/new-tab-page-settings-gp.md +++ b/browsers/edge/group-policies/new-tab-page-settings-gp.md @@ -11,7 +11,6 @@ ms.sitesec: library # New tab page ->*Supported versions: Microsoft Edge on Windows 10* Microsoft Edge loads the default New tab page by default. You can configure Microsoft Edge to load a New tab page URL and prevent users from changing it. When you enable this policy, and you disable the Allow web content on New tab page policy, Microsoft Edge ignores any URL specified in this policy and opens about:blank. diff --git a/browsers/edge/group-policies/prelaunch-preload-gp.md b/browsers/edge/group-policies/prelaunch-preload-gp.md index 2cb49a9b01..e5558942b9 100644 --- a/browsers/edge/group-policies/prelaunch-preload-gp.md +++ b/browsers/edge/group-policies/prelaunch-preload-gp.md @@ -7,7 +7,7 @@ ms.date: 07/25/2018 --- # Prelaunch Microsoft Edge and preload tabs in the background ->*Supported versions: Microsoft Edge on Windows 10, next major update to Windows* + Microsoft Edge pre-launches as a background process during Windows startup when the system is idle waiting to be launched by the user. Pre-launching helps the performance of Microsoft Edge and minimizes the amount of time required to start up Microsoft Edge. You can also configure Microsoft Edge to prevent Microsoft Edge from pre-launching. diff --git a/browsers/edge/group-policies/security-privacy-management-gp.md b/browsers/edge/group-policies/security-privacy-management-gp.md index a53fb2df7d..2af6f28da2 100644 --- a/browsers/edge/group-policies/security-privacy-management-gp.md +++ b/browsers/edge/group-policies/security-privacy-management-gp.md @@ -7,7 +7,6 @@ ms.date: 07/27/2018 --- # Security and privacy management ->*Supported versions: Microsoft Edge on Windows 10* Microsoft Edge is designed with improved security in mind, helping to defend people from increasingly sophisticated and prevalent web-based attacks against Windows. Because Microsoft Edge is designed like a Universal Windows app, changing the browser to an app, it fundamentally changes the process model so that both the outer manager process and the different content processes all live within app container sandboxes. diff --git a/browsers/edge/group-policies/sync-browser-settings-gp.md b/browsers/edge/group-policies/sync-browser-settings-gp.md index 9ce7fd31fd..957e790520 100644 --- a/browsers/edge/group-policies/sync-browser-settings-gp.md +++ b/browsers/edge/group-policies/sync-browser-settings-gp.md @@ -7,7 +7,7 @@ ms.date: 08/06/2018 --- # Sync browser settings options ->*Supported versions: Microsoft Edge on Windows 10, next major update to Windows* + By default, the “browser” group syncs automatically between the user’s devices, letting users make changes. The “browser” group uses the Sync your Settings option in Settings to sync information like history and favorites. You can configure Microsoft Edge to prevent the “browser” group from syncing and prevent users from turning on the _Sync your Settings_ toggle in Settings. If you want syncing turned off by default but not disabled, select the _Allow users to turn “browser” syncing_ option in the Do not sync browser policy. diff --git a/browsers/edge/group-policies/telemetry-management-gp.md b/browsers/edge/group-policies/telemetry-management-gp.md index dac652e949..242ecf0298 100644 --- a/browsers/edge/group-policies/telemetry-management-gp.md +++ b/browsers/edge/group-policies/telemetry-management-gp.md @@ -7,7 +7,6 @@ ms.date: 07/29/2018 --- # Telemetry and data collection ->*Supported versions: Microsoft Edge on Windows 10, next major update to Windows* From 7c4ad6de01662599672e817a69cb5db0a31e767b Mon Sep 17 00:00:00 2001 From: Patti Short Date: Tue, 14 Aug 2018 16:54:17 -0700 Subject: [PATCH 14/23] fixed inconsistencies --- browsers/edge/new-policies.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/browsers/edge/new-policies.md b/browsers/edge/new-policies.md index f05d138710..f6063c43f7 100644 --- a/browsers/edge/new-policies.md +++ b/browsers/edge/new-policies.md @@ -46,7 +46,7 @@ We are discontinuing the **Configure Favorites** group policy. Use the **[Provis | [Configure Open Microsoft Edge With](#configure-open-microsoft-edge-with) | New | [ConfigureOpenEdgeWith](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-browser#browser-configureopenmicrosoftedgewith) | New | | [Do not sync browser settings](available-policies.md#do-not-sync-browser-settings) | -- | [Experience/DoNotSyncBrowserSettings](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-experience#experience-donotsyncbrowsersetting) | New | | [Prevent certificate error overrides](#prevent-certificate-error-overrides) | New | [PreventCertErrorOverrides](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-browser#browser-preventcerterroroverrides) | New | -| [Prevent users from turning on browser syncing](#preventusersfromturningonbrowsersyncing) | New | Experience/[PreventUsersFromTurningOnBrowserSyncing](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-experience#experience-preventusersfromturningonbrowsersyncing) | New | +| [Prevent users from turning on browser syncing](#preventusersfromturningonbrowsersyncing) | New | [Experience/PreventUsersFromTurningOnBrowserSyncing](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-experience#experience-preventusersfromturningonbrowsersyncing) | New | | [Prevent turning off required extensions](#prevent-turning-off-required-extensions) | New | [PreventTurningOffRequiredExtensions](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-experience#experience-preventusersfromturningonbrowsersyncing) | New | | [Set Home button URL](#set-home-button-url) | New | [SetHomeButtonURL](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-browser#browser-sethomebuttonurl) | New | | [Set New Tab page URL](#set-new-tab-page-url) | New | [SetNewTabPageURL](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-browser#browser-setnewtabpageurl) | New | From b6bff159830305e054dd07696498bf10524abaa0 Mon Sep 17 00:00:00 2001 From: Chris-NS <42405094+Chris-NS@users.noreply.github.com> Date: Wed, 15 Aug 2018 11:15:52 +0200 Subject: [PATCH 15/23] Minimum password age reference update The reference section is currently and incorrectly explaining the "Maximum password age" setting. I am proposing to change the reference text according to the "Minimum password age" explanation in Windows 10. --- .../security-policy-settings/minimum-password-age.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/security-policy-settings/minimum-password-age.md b/windows/security/threat-protection/security-policy-settings/minimum-password-age.md index a21530fb60..5aa52eaa25 100644 --- a/windows/security/threat-protection/security-policy-settings/minimum-password-age.md +++ b/windows/security/threat-protection/security-policy-settings/minimum-password-age.md @@ -19,7 +19,7 @@ Describes the best practices, location, values, policy management, and security ## Reference -The **Minimum password age** policy setting determines the period of time (in days) that a password can be used before the system requires the user to change it. You can set passwords to expire after a number of days between 1 and 999, or you can specify that passwords never expire by setting the number of days to 0. If [Maximum password age](maximum-password-age.md) is between 1 and 999 days, the minimum password age must be less than the maximum password age. If Maximum password age is set to 0, **Minimum password age** can be any value between 0 and 998 days. +The **Minimum password age** policy setting determines the period of time (in days) that a password must be used before the user can change it. You can set a value between 1 and 998 days, or you can allow changes immediately by setting the number of days to 0. The minimum password age must be less than the Maximum password age, unless the maximum password age is set to 0, indicating that passwords will never expire. If the maximum password age is set to 0, the minimum password age can be set to any value between 0 and 998. ### Possible values From fc7268f2327c8ea500db3087a3604fedf4b68504 Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Wed, 15 Aug 2018 17:51:41 +0000 Subject: [PATCH 16/23] Merged PR 10647: Add Kiosk Browser is single tab only --- devices/hololens/hololens-kiosk.md | 5 ++--- .../hybrid-deployment-surface-hub-device-accounts.md | 2 +- windows/configuration/guidelines-for-assigned-access-app.md | 5 ++++- 3 files changed, 7 insertions(+), 5 deletions(-) diff --git a/devices/hololens/hololens-kiosk.md b/devices/hololens/hololens-kiosk.md index 9b54f8a335..5e1218f90c 100644 --- a/devices/hololens/hololens-kiosk.md +++ b/devices/hololens/hololens-kiosk.md @@ -7,7 +7,7 @@ author: jdeckerms ms.author: jdecker ms.topic: article ms.localizationpriority: medium -ms.date: 05/22/2018 +ms.date: 08/14/2018 --- # Set up HoloLens in kiosk mode @@ -145,8 +145,7 @@ Use the following snippet in your kiosk configuration XML to enable the **Guest* ![Screenshot of the MultiAppAssignedAccessSettings field in Windows Configuration Designer](images/multiappassignedaccesssettings.png) -8. (**Optional**: If you want to apply the provisioning package after device initial setup and there is an admin user already available on the kiosk device, skip this step.) Create an admin user account in **Runtime settings** > **Accounts** > **Users**. Provide a **UserName** and **Password**, and select **UserGroup** as **Administrators**. With this account, you can view the provisioning status and logs if needed. -8. (**Optional**: If you already have a non-admin account on the kiosk device, skip this step.) Create a local standard user account in **Runtime settings** > **Accounts** > **Users**. Make sure the **UserName** is the same as the account that you specify in the configuration XML. Select **UserGroup** as **Standard Users**. + 8. On the **File** menu, select **Save.** 9. On the **Export** menu, select **Provisioning package**. 10. Change **Owner** to **IT Admin**, which will set the precedence of this provisioning package higher than provisioning packages applied to this device from other sources, and then select **Next.** diff --git a/devices/surface-hub/hybrid-deployment-surface-hub-device-accounts.md b/devices/surface-hub/hybrid-deployment-surface-hub-device-accounts.md index d72676e762..90479cad66 100644 --- a/devices/surface-hub/hybrid-deployment-surface-hub-device-accounts.md +++ b/devices/surface-hub/hybrid-deployment-surface-hub-device-accounts.md @@ -282,7 +282,7 @@ Use this procedure if you use Exchange online. 5. Add email address for your on-premises domain account. - For this procedure, you'll be using AD admin tools to add an email address for your on-preises domain account. + For this procedure, you'll be using AD admin tools to add an email address for your on-premises domain account. - In **Active Directory Users and Computers** AD tool, right-click on the folder or Organizational Unit that your Surface Hub accounts will be created in, click **New**, and **User**. - Type the display name from the previous cmdlet into the **Full name** box, and the alias into the **User logon name** box. Click **Next**. diff --git a/windows/configuration/guidelines-for-assigned-access-app.md b/windows/configuration/guidelines-for-assigned-access-app.md index 2ef8944586..a032dc458d 100644 --- a/windows/configuration/guidelines-for-assigned-access-app.md +++ b/windows/configuration/guidelines-for-assigned-access-app.md @@ -9,7 +9,7 @@ author: jdeckerms ms.localizationpriority: medium ms.author: jdecker ms.topic: article -ms.date: 08/03/2018 +ms.date: 08/15/2018 --- # Guidelines for choosing an app for assigned access (kiosk mode) @@ -45,6 +45,9 @@ Avoid selecting Windows apps that are designed to launch other apps as part of t In Windows 10, version 1803, you can install the **Kiosk Browser** app from Microsoft to use as your kiosk app. For digital signage scenarios, you can configure **Kiosk Browser** to navigate to a URL and show only that content -- no navigation buttons, no address bar, etc. For kiosk scenarios, you can configure additional settings, such as allowed and blocked URLs, navigation buttons, and end session buttons. For example, you could configure your kiosk to show the online catalog for your store, where customers can navigate between departments and items, but aren’t allowed to go to a competitor's website. +>[!NOTE] +>Kiosk Browser supports a single tab. If a website has links that open a new tab, those links will not work with Kiosk Browser. + **Kiosk Browser** must be downloaded for offline licensing using Microsoft Store For Business. You can deploy **Kiosk Browser** to devices running Windows 10, version 1803 (Pro, Business, Enterprise, and Education). From b6e909a63a9186462397a1908cd8fd53ff38478b Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 15 Aug 2018 10:55:05 -0700 Subject: [PATCH 17/23] update image --- .../images/advanced-hunting-query-example.PNG | Bin 45803 -> 49108 bytes 1 file changed, 0 insertions(+), 0 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/images/advanced-hunting-query-example.PNG b/windows/security/threat-protection/windows-defender-atp/images/advanced-hunting-query-example.PNG index dda65b5342035d2dc6afcd0f4eb51e21f7f92014..5e7e9269ea8a4edb10efa847f1aad78aa538fc87 100644 GIT binary patch literal 49108 zcmdqIbx>SQ_bv*-f z5-dV;0*geA9St4K?VQYQZ6GkK;lWSf|2$E$HF0v)cQA&~wgdgCj`+{Z%^eM`^ubjfAR4>sqQT<#f5fW# z4mRdCrVw5D`ypT%+~4-j4u-}Mcc6fi|5OvPwYE04ae}xXOY8*8VE+#;^MvyRlB4&;LCeH<%Z2jhAEEyi{5mMN%WgQ$RwB~B#UaT3^={F8 zcI6iu`adO>Ht8MezYn)L5cvMna`p4&r+>vZd0hejikl+;3zfAx{6hFg-EXJ&Fza0S zE4X0jd~X#JFU+@1c!>XYX%LVGh01>F15_Z&XiN9kcsQ5pqqh(=JtHRCn_k8xusCb^ zJ0Pv#HGDU&#*nsl2$<6~?VSbfuqH7XilPaKdDF+7`jdYrjq6~!nX|vc_p>E}+=U7A zY(gXlt{LMV-Z;4gA%l5bJP4gfA(MvOF6Z56~aD%m&TSyRwuOrjx zdUw>_n@^0+AuxTR*z zSh#-`o%Nv+h6u&G>6eH=0DLEk8OGOLc{!B5y_~6kwL2sy!TW&e8QK<2`#$t%Zqil8 zW|cgjtIb|OZ}pmE28P(2a@F(ik5(gs(&oQNkT-gZ7!~XvSb1u&Hx^EaM~%+Y$8S9i z;CJ9S6mKVz+^mqLJ+54lj`Z%|rr*^FEJ<&ehEV@5hvd6F^&#AHl{Q#I0|dhm{%Ob8 zb1+F(;fegQ8DA|nWpK-Iehz|Yqy7C`)-$ePDPv}orD%U99fy&RXw|BekIy`eDH^a6Nh0tINOHplSp4rHq<8aq8AuZ9>@9iBT>xMe7-%benI|~ zWxW&WDp)M|K$Lll(EJM!5k|IDlrYBaIE+|X8U2s#4DI#t`-MQc?-E}0TlbFfe1!@@ zJ8ll(Z$-7AbZ$SjMO5~!&+IQzPk0JsdFt@QodG1>dr1rzxf^vf{@`vMyt=h3i)@iV zpXUvb0g6QslfIkCHm+Qk&8_q~*SRiirlYE+zO#w7H&zGyow{sZKE|9XnVji|MSl;;J z+geRnpIz{se+zUy%?ZYT-~MK{_PX|r*xS*;t0=j#kA(GN&$;76yqA5JF0c7@KNrS| z2V3?fu*khWdDAOr>ItG>NE0b>Me32m7++yNPr%t~eR3WCcEMbLbfFkq|ks`Y9M>%ak6P8cXC z0FO_?_!ogjgEilwimkdTE_+HscD8*P_*2TO1H`a{by>Yn9^DSL?D6cyd0uN1DV!j0auIoPS@a>*Fug?qz zDXOZq`nG1h(hkb%Oz279cxu-m zZEX!O_R(=`(oJ=|!|piW!aV8lniIwZi(NRd{3*k zQ9t-z`)uo5Xs|g;2b8IN8iTd9%_WkgWHaNQELW2?Q6o!19#^POn;)gYNw!*NP>28- z3VLBrQ0&yx<(l;4)flh1Z5~;xUEIzSZEl4%y0Xsjr?voi*fHB1e#}2VG5c&?gx0j2 z|1+}Y%>Gfpru=H5>bHL|YgcjWiJQnGe5tl5wL_#AA1UOJmyG}r&%1n;(jG~>+`v@JGXSVZgj_hH_v#qY1^kPW&gES#DD?pZItJMSGi z%BiyfBD3_o%_`5Wg8BaCW9wMajK5!)G9vQ2BS7uOQ{CydyGG{^W!d_pJSUC_6aB2~ ze202EjU@J>PYKuh6MiNa-4%=o#m%d-t#$C9&i&NdP|x)StG^j_X8krcuAr)p)`TG( zb9*}_qKqovnv%j^RR604QU~|V9FqqQ7iBn%kLEk)SI%2V_a%j!f?^Gv0xyv2y1);f zstG&X=sbZACrtQzt~kQGdY@M^Le8cFz_ZusY(X9j;4iNO;&R>x8A^P!VmQAmTRpUF zq~Jd!o+prZBAeApxq=c+{ z3qE>wX6K&h^`s|z)!1fbEqe*Fu^>#g^DgPra&OgIpYm-a4Ux#4X?V^SAS$b>uBz>i zcBK&{9jvZnk3_3O6VW{EIu5ZWkVHxcnxEfH{@fgRyALTzzC9NEa;A@xc3zWou@}Cx zfkbpF+EgHCYt>lJ`ZNnVh*~_H`HiTotT=t@y<~6b>rbdN-U0n2bksOLd0@BhBUog| z2#rc)#md?z9O9#Ou(+-9^Pkz&;Vn*F*)c@73BS+O>lFFOME6tY;ABt}nlL|ht)nXinS?ql^v^e?FU~`+qTF7GBJ3YS9vn9h_3tlu`?_sA za&wQ7etrLveD<@>b^zxk06_4gL*drZBU};17mC0$Ou{ik9blChJo5o%It{&nlB;f^ z&^Sqyw~;@)9-Y4YL2TU?s2?@&;b{0JPah6qrBNmA?_isLeDk#Ywc4lvU3JV%q&+`0 zLVS@!X%H&*l3fUUxVikOtrzmdYS6@pczs<=V9b%DYYpB}LUTJJR*AYw9cjpw?fp@e zG~J_VvI6Z##8VknyuwH4t4T^JlT|HZcQq@ztkLtXb53y}s;Myc)#>5UN5Bd(1S+4k zNzRa%Dk8hq_|9Uton=Rz$hP+GmQ}I)w@@?(ygl{*5L}GSnqz%@M>7iSx6&rT9$x3qH zi}`>VuR)9J14A1hPnWGzrz?Zo*2NxCi1iKm-bh$B)`XsQ1-frrt>Fl>gO43$l}q8@ zwLJGs$5HYLkwO3dHMIfgif4X=K@IGDl7GtthnH zuL=@GWHVlrl$TN~|9WY=EL$~Qy*U}YpYM>2CCTCu-%aT=Z9#3x>k#dGmv#sV1{gjs zUx-qH%Dkh9h7V;Pr#h6uClN%~u(j1H{ukx^$l;GN7>pa+dLsiXliZuzR9|4B?*?nV z7(LT2i~HWd2rzkHRa7DrBk=mDo~C$z;hKBU0YY56tok;%;*_hMW+9v5q}4gu`M9=q zJt`jJb9;i4b>Y127DcGn`I}ot?4NNmU@#!?5qz?Bh1uxMJ-nEEB0}n*z(G0J3ju0B zrjdnR(~;h^i??(PvbZw>u4p!5JINpCWL>;qe*xVIjtRw-UGZrbIDE+39abq_np$oi zZqP-a2n=S^TJ0OmF1ojF3qoZ;7TfW-D}f)l=i+lCaS5uf*kU~jj5;)@>T0xmF4-b- z`8`jw!X06(MqLe2U*@P8bPR+b0(zl}H&W(@oWF}G?C(<=_5bUKduU;}Ewu(@P_@Im zCa~-E8%mPrSbtrvzL9@Tv-S@IIqT9i&=~`Xc=>CNNmV*uNEXGQc{hYYx&u+m3qSeN z@;acPzm%abrQ_y2e}R2cuDO9)h5T_`xlnuC>(htga^01_5dQca+?Dx}&gUX#9mQ29 zayhPoOsc6CyC5yI9w0C$AKRK5(Vln#3wq+bHN3^@1(3$w@)E(${HxHv4G6? zp7;Y&P}-8y+`#tASC`HPNE;`H@_A)d*JEgk5Ni8xM-4C$c)e(oq$(ipctzgs>={&D z($~W;!qzZje+>w{GVpwud)V@47_v<__HbqxBQf3bSN23EIdE;hK&t`FrMmQHRu#poQ2?vConbA%2a}N~=5FWU{1Qf5- z{*{BbuDb7HSgX(xnG?IAF2VP}ZB+$bj?RQB;APcDFUAlaDhw@!T(Y@&hVOBFYC`W`T-bXO%jfyq- zSsB5y(aUD3@o25+#Sez~Dem%ldI{$f`Cn98HUlcrTOckqm*D}HE-77Ogvs(Q#{k0( zljr(g>uYG4(1N#AIyiCt`1k^w1wkhzB``d0vzD8T!11-Pz$f=EA}SXqyZ1S#*?NcX zgSp&1f)6%_UyeX7Rr=1bwAdyJN{B={kXqOrsqT{~-HT9b>=50Y4lIn&zOoC!NG|!H zl)LZ2NN}hZ5Eb|Yle4bD8jFcj@Qjzj`8nP*S))vK(IHeDey{I4cgzdL?|W9ov-=!3 z-QI53&}tTJHUm_#tKJBv2B0oZ{DFJgH_2Q}*r<(!=7xOmuK>Z=He+_%7ut-3hlsPy z*`#8?n4v--Bax>|tLdV)#C0F>MAfw|t$K_$6rmUHwLFW$`Lbp^5n0Nc6;mrfqq}e{ zY3WJjl^OMIo*e77MsNds)+0UY7!peT8=vxN)tii`BBBaB>RB#|h+5GY^zSA;Zux>n zjFM0v{vxt{<)W_ddQkK%Ci-God3NqX(z(xX?SIjFUtv>d_k)U3T@sYF$24trz2)C% zd4><11<)$BK#i%cem|KL8+aW5_Yg^ilAYw#x=O^kD9NoIb~dVx#- z_t5(~nq@&kD&y+F$vD2;ca$Y&ziPdO)UlCt4^i~>Gu@i_LMOuKyTeKTT1t$)%%af0 z&9pGVUDgGk+mGo?C0VQEo~qRb-2DocFkj%uy4x`FA)dyzjb8X&_z&1fexttpH1n13 zor}!ht+^)Q`2R-w;{UnC$p7!(T<2)4-+weMt!@t7$X9j55$yWq+06E_ zNTRku0v1u++48KE&CX!dYWv_|u5{MpR) z^}px&$X0Gdh=GcP1Z$A$@bGX6=;4^WgN}bo8J?SQwuFntiG$(JeZ@WhxU!K>y^A7%ymLqO$8hx|mPpe^9#HtJ_Bz%<6Xe2r#UDj7}ROp74+ ziI14drMZ&hI!rC#I-KyI4m60|9$gSERb>s*Ss{bB=S3wX@ImvY)R;vQ_`&bW(}kU! z*vhOo_SucTCpToZ?*%d|=_Ak%>A$T{i%zchz~i4RblQ%TFZCog5Ad9-$=t5r4C})v z<>rmoFv#L8GQZW13~*H&H;4fX#?4z*95Wpc{IXH%INO~|lbxxRaPSFbZkwq2p6>-F z(iqb~XjjwIeN*=m3);w^@D?M~4yJ{$vV{GNbgdjAz*PHCEH2{AW!6#E6uk|PJ zf{RL2>WxmQCSwtgpVAM0ezfG9##pSLEFXAYkhQwZJW~7WTCu-OZHRn8`bM(9IKS?O zGCt9{m0I25V`g{u{bR?sQXq3%OHhERbdYlO#hGae%Y@zApsc!(%`bi3;2iP&#kjnu zWuCWJmyy5d*34J$6%}&*!9g6BrM>#@rz!?NjL!J5{*R-(QO)-moIfGqxs7gbF_LNCiJs=C@xxO0># zUxT$hh+&<)beLQ98|!EdwCCPIcHV*3+#jg5c7x@52Hc33ejMB))^=M{6d&3|d!;feMw}Rz{}Wjn}}9n>Ud1CM&g@ zc3qc>x+cMSSjjD@)$M8i0A~gG313%+1TM6pIm^2|jXlkoKVB^bJ$&*?YX-3_8{}Fb zc-(aFJ@1#CQhBY`=y>XFC?MC)6(I1+ikGFiyJ8l{nw2NFrc~~8$<1;>Ecq;J*Wt#_ zO5__d5iNTFq=K7yON(raW67eDt23Q1H(R-Q!N<^jiK`A@xOy4CG#;QVop2)a5T~5H z3*9MM9K6xm_eQchfl0T^^-&ol)-NOYXU$?q<25ra^qayhQ>f)%t`Kq$)`YZmExQQE z^zmV2lG8{Iim5BJ@u6V3hN^IwHp-Pae^iC3O|UcDYk9}?B-$b_HO%vc=i%p_XY~Dy z4)?>rw3^hPY0oPz>;7@o#xo7vF(ZU2&*Y6Xmy_Ko;hbQ#Im3%1MIv0mXtu4*bz_?) zCYF)sWPC?@PDb(uePKhp*>}*Yrnwe*6)iAu2np$Q^0E7IkeFmHMZ3XTt}$DIe4QU+ zrD1TiEMV(ZHsk90x^%K(li|ZT(T@_(bssyV9sm1kprN6Uh`qo?I?gy@EF_1^Oypr; zwdn0}aFQwny6d_O8&!I`Wc=xCY$=)K2K1jeiy!*V2C$qUD^Z6nUZ9KgZo2gWZxy)2r|H@JydK^y- zLf*p+5u)~D&8T^J=q8=+H5daaUvBb=3G$3r4@BgJ<~p7s(m(2JxSde~EgG>`eH4wp zzOJzDb!erahc@jhaXGRIbBd4M2aE=6iLN=d%8hYVn_^s8t@m%_4N||#F&8Y24%iLY zcK}iCREfuW33LP?yC|c4;dEl7FOL)Y^Z5i5oo`L%L>!ZSTw~Tb%-ehx1{wdlnR{mL zn_DaL;t}a`K38tAOET6M;$L)=ooq*mew(9DC5LBh29O-eJJ`O;|J=ScTi`I3@bMFk zPVaT%-Ghr7%gHCG{Sih|B^+HyC|7og*Y&t8SL?dwr6>Y>xt0M5eTxUr* z+Rm>7*8$0)L3H6dNDX7PM+{MS!TxhF6ThDfuwUabp){tm7UDb^+0fcS4;kyq#6ywc zzx}Dh7kgkbvTC_nu+tOFiv=WAh#x`U%pFS#OPCVU0J#J0(2j>IG@z^cgE2w$WBz!|)E{pUu@g)2vr4 z#wpG(5W-kAC&ytn`a_el+Tg1rvAVlI{m~sbZ;aT~-Q7|U904sjdtz{{%3<%i7|h}i zq-${J3;s0nvvG`)j&8#&R@;8~1bvh&8s*aiP<6=xsRfy!yV&NU=04I2MFrApvU`nl zSYU?eDTJkC6<(#S&7c1HEA@I~&_~9~y{7e^hpY1u0+h_+Z7)q?ua_~bdTTk)Y$t#Y z$~mn`R^Bw4ws2S&U~oSPG$5X3-?wx)2c_(-YQTkhwmSRvV($RD;^21v){2gX2@P5v zO4Gcz-&SM3sPJ00;{M_(Qaa(+j!8_D{di&%7}XSR)9g!jcSmqf$lKk`e^KLhMcL91 z5bCS9BQ+(wz)DhdhHYyBZW`)ntlD%Xoze?P3SD)JADd=5bN}^(lV}&muI$b}W9_z$ zAm8kaXKJ9!yu9GM&9kZR{x?Xtal&Vhl5)win2vSr0Rk*BOZAyaKu^V4hLcsUCyoS zAZ1*0LHXTVTmL!}JFs26R`w#Wzp7ncJ7U(!FdlO`#OiLM$}7>}O$*t#azblkO2FW8 z;2R7Nzry`!VW=n-V1vFRiRYYIo?__EbR^S(+B|Q7BQljSOdeTE>iH&0$=4ox-}$u) zZy!zcG@?4t=Ltb6Q_}c?`|_u>!F>46tfs@V;-(PZG!f&^$5nsT z&jJXyIA3n99o258iYaBVmNEM+cam#ZeuUaPx?Sn7#((`Arwr{0iO~N=SWo$HX?*J z{X8N3Z*XL(IPhO3YyZc9{>wD*|M|^l8m;fZ%2kb2A`oiccaKkLXQd;_-y8xY| z&F`K6MDF%EF7(Tf&y{it+p8(~ytF>{z-PbQNC3;-EMmItb|UA-Y5z~&HuH-_kKw(; z$0)--7gR>h8f|v$$5Q}k3qXvg z^Q`MjuZi*0R9y(xMGr&GI+%&&Y>AZyMxjaCN-DKmx5t(R%m z2;UvH?pGcb!&`QQFIo$w%TGt&`GDEjR!^CgAx}))L*2*Evdk8$nkv!31(jJl;k=(7 zbLYP^!1Wrm#No{kUyrXidZpX@m*C4^3i-@TWK|YiAIloO)gTh^3iV77H=j&chPgJ) zQ=7DTClZOgq%07!2+&dNw4Fg@g@z9GUpo&d1pB!7#dMr4J2{&6RF;s~PMQ-j@{MyScca5?KmW(1G^+l@jA(x@eQ#HFxb+uGo)9E}~zvF2!nl#L|FsCQ ze$&0L>bPh6UbProkQ*;Wa=4uy7ku$7rH`&&h}T35^rR(Kh*yY3A7=FwJ~WHQ@Hmz` z?(GVT9!saIJr~iov9@~R*078|d}nphr7zN!w;F{)B_iUxykwVtyZ2nMEp;)6*!E-g z>fYC= z8>J)IpTmI@I!)`ofJ1JC&|EDm!$em|>t6eg{>^xx zF2~51U5V3c(4MM;W`v_CM&*M<&0WUvrs#){PH6U7r^aJnHTrlY$}qEXCA?@#N=otz z2QZX>jg}iP-_e$9iVg@ck}4vf^uc|P<+a3Jz7NMlkNu`~Zr-%fnz8Oq-~rn}vgt+t z%xLjDzo277xo1euvKeS%yK&)VKx`#=DU5=1WRLlX&9kJdCVMfo)=v53y_Owjyo z%36l*GtNa-qGydi4dv@%Rq#0Tfiqo*D^mE;(B1OE$%v(uFLH3m+OF7!Z96guw5{3G z*kGIpP{(@1Cc-)H26S3krnF!6HwM~nju6Ri1290>UI?RSF!<%c`j7p%GmX{-Vw&x$ z4ctKq52F!?ghlI`jrZC!sq?7*f9mb4<{2wsQzd+@(MaL#EsX?=Q4`(@>` zR(RjY#Za5WrZP&uI`;H9CKyn7Mi;icewznfvssow4$ERv;cw*lhu!GcI2 z%Bw0TTtvMtU@dy2>HK;B>M?bKr`F)cNvn~!;nF9aVV?L7zxM}G+Olh1vXwz7Nt$uc z-lJIlf-zU0H1bwnzLtOn9J8wAyIxM)!b^?iFX!&pD6nh|4p-tjTAkRSkoe}xNwMPe z&`^AGfth$w3EK4bFYK!NWW+r(3)P>glUlO;IBG7CYScMs1M>K{;kkba*|-~?fSlBz z3B^5oQB;xY?A$lI`{p4-Szioa)kBX~>STewWlKDiF>L^Y)1|C!VoqlkScLKsU7xt$ zP_1#MNOYL(N zgqsdyAU2B1pM4jnW5(LQ=Ao@LI4;;VY*>79Sg_!VqH2P!=t^g7lsFKZ znrgNNkTAl+6t1df*bCZC3PH1MbprEjl(#v8U8w{9s3t-oA;Qgb2VSpcgAZQNU)T{H zc;k4=^D@{+xfIXkXQ7k4~dfDF;<*%Ct7Eyaxh^f zF;Q$1XOXcCsUKpkoP5{Wc7Bw%mgX@bDg z3uJ~`=22m&ph%*}! zZFY}kEnbIXC7$gwgzce443#=Ya3XgXTkusrUEqIxud62f*rQ}8mmOdQ!)tS0dhrN2 z?5E4p=qRbG-ne45;y>?(uDuTMJ?V#UXq!s;?0Ph5TeK?Dq~(qYwutwQjJL-F+3&S8v}z9a6!6F z%!s|e%-c+at(_DjpMSR2cZ?FnO(hH?WHh7kLxSW$J!no4p`9s{nM9J%5U;>zVi8SD zrytG)pL)0mNPj(kT54S8S|jnqt#v4S&w`v3ikgdv#_CK`awX)pZHhy=r97oiNPHHM ztv^6)vpiVRgGgMI`*A=fal8g6HP(X`GZhB+Q`)u?e<&w?^kp93A`=0*$rn_vs zfhfau$Ps=|rcab<#3I4eKqwqq|YhULV2o}R=?9xo*;0o{`pb6;ew zFLA^COjJ^sCBI0`SRfgWP#6#Qr#<&|QIRgL#AyTjfV-%NhBM9U6>8wi49oil$LrVe z26z-QqhHLmKZLKtYWaNw$GzFb$QCPpTc9BHg1j}eps4OuG+_Pokyi$E(pGdj-Cv;a zs0%7yk+YaV@}S_+$nKygX^PRJ)TNz~9lJDe^aQ#ii+^KFE+N=-1y%an+TisF4npAH zPu+A{yYGO6L-#w^fMe!QFO&3bnCoj9k;eODPpZsN9#!rD>Ztj4Lo9;Ol#w~gU)D`Z zMxn@$=&>zRC1GS`a)h;4=R5){s*$>Z>bT5G&Gl|rxJAbsddJeWk^@T}k9$}KlG!+4 zqQ{@PG}4iogPj)$KM&RpG8z0Z=qh{rlCn|dn>u*L}=+hYm|#lQmc5Mr~Wh$Q6OCVurC5&o~&~2{!%{u!m%QLRnFM@=Of!tMn6? zu(_B`T$X{4cyuzzpOk9wfy7+A?1I1+eW$$-_w_!jaJM|8f6-|(kw```8X30+kLBCw zr{tDqOhuVq>Y4bVIyKI5yTz95m>78_ym~?Y*Ow#i>4is6%LX3x;3yPXX%!((bv16N2U8pTJA%L!ZGad99m?R>f`KGMu#~d zJ+H9(Iz-r$p2B+|TB2F&tc9iSo^gU-ya+vBv&*Pe+kvVeX5Y2rX5YrU7n05~@zo`i zfo0v!qmi$p1ik~uD*&OGAys5Pd{*7 zJ?u7=mxmx&d>1AjUv9oAUR30IfAj597xeDA4Z>jsJ5{VhGGB9x2?zJ(j?>c1iOStymmx3RFh?KKhQ#8!!4po&{yI* zmV?h-m$O0o-cn_%I~$|3qlnB1>`4s_<3qi!TuyJWCht4Yc@+KZ&erc?3n%N6m>&ftj?z`&c3C|lV#YO;P8ke|44v7>WQnglzhQ|`(>(%r z%ElXb;OzCSvb(I7udb9TC&dO z!{*~n2+DPvmYZ8NdO_oNS`2jCdB{GLc?p1balIkKyAl z-UmjEX<~{4(@#ZmeQ;aqjcmash)Pm2kzJO$uu@XBY73_lvJu867SKL>LBT8rUYEHe zF_D{f;=v~6nnq1!AN4)r!~?~)Wyj{wUP_Ud36}dMO72fAIjZ-B6_u32E?M%=CoJCl zc=X;2Aie2hpS-nn*ZOIRgL;1>Cn(6_G z#5^bF(lTZ3nE=pumF?(h7;zkKD`j~etpmzTps$gpt;~uP2y9wql~Okvad=PC=W!mi z$t0|TOF78e2{`k$WC<&f$|s*ckYG!u0MvB`Du0+AUm#47+|KTK8v6;3kl`p|6OD=s zKxbinzykX|EBEU&>U{DP!l2(_EcB>rQ{7&I`R0UTMPP#?BK8%@(zI#G4M2hYlWkB; zwsG!w-ImOR-;_HYGg3_UJuUT~Nh_=lXYK)U<^rjpheCO&k0g+E-BnqS2P`@e*%%N{`^f70FK6PJIlI}%qjXG^yz214el`IW zE7+Wl)p`jK89aAIU0dAt4Y*4U2;oNfkC?~AjlmW+vNY)DtS6wevsCibIeLPUu!D;k z{fe(?cyyA~=jXgkAgB?kE7|*Ta6;PH>Q8FLtB=PZ9S?7Y4XWwn;h{GRu+_Es41Co_ z;0Yc2SaB$Uz}vX<`!M{001;z$HjaaFlycxUguxRx{3jgK?D=k7ntCFk;Y({%lvp!3 z>KtO#@F2F-Cdy2l1B35U=Mt&(r;@&-!#n|ifVQ-ChjUf zPdYMl8kyQ-Yi#P*ie5c}W0H@vd$~T3$=n>eZWn5n6Av#w z35+x#^(`N3vL)@@oPq6OPCS!fdyHo(Q+dV#xy-UArf%Tg&^dC6KXJ3KMPCA$o3$kW z_hk6%WXz2*jv!RjF|Hn{R;Sat{PiAHw$F#%dXBo=D<#s=WT%y?0avchIc?--H}TD^ zt<@pXdvL;W4)L6YVb!OcJ`dusUz`3IcW`s(S9eFth8M>u$3@;s0#%g_dU&$>Vl3yy zEFs2z|L`f@Sh9?Ld`n?`5!9IX>@f)q`t0lLWd9eN1MXZmFTCYULGuZ|CBqpua35w zT&57NuR4%$=spF%@6Q(*WJTgWfgIW7ATZ;aB z;dEoHK8jo>{>UDoFoslG(F(1-U^Kx8a`zic4)AhLcMg75U11vV72ka|jcIZu=QIlS;ES$7^s~W(#O~t*)5`Nfk|7 zNLGcwZd&pBcPD%2n%HCxyreBSA9C-d1+p&V!^b}Xm zkACSY#vZ>w)qYVf9Tj<1;t{6I=V1mG)U{mGfkS;o@%LdR73tBvFw$}km*HeUD$Kr? z+}B64AYce2BN0BzE^#4R=wlG7U2>0Cwk7u4BVv=DmPy671n(Zt)3h;xxc*%t#_IB; z{bJu80xTN}=P^WBB-D_MX) zPxa?b2?1IzsiGehS{HMo&-9M-sqB^vYtD<><13F|^V}<*&UW^{@|*9^*GIejpfp?Y zNRbHu_7P2|E8>gzSUb7;{G>@uYq#$xy{s7>Hu*p&mByCBS&6EL2=zAL-1PTz4~HOd z1l55Q{X<|Sk6X^ZMeEm98O*`&Lb4y1ev4NZZV%_cbytA3`lb*AI9CtmsBkhjVyi1x z&K&__qJ1(fQQO~VqDo7WlsAg&YFq){i~Vx-e?Cn#HTR3l#xcaVvE$ zF#mFIyCVhv-A@ufU)sUoa@pzqhhP)!6XyLsJto)6A$w!lv zf4@FwaO8}>a%+Y|tKLZ}e3W@a*}^uCuaZl~O-?_}%f$4Bj%HODEdL|;e70oPbd z(EcBCmA9Gi((bxU_!^~qeuII*t=GfFS$cDsSw>U9=?gvf{sQQEXyZPqxGQtn*?IB^ z{%AQ#_EP_OBvb3VS4<$z4adeXThf_6S0%soXU=*{$3$Hc1`oJxmfiD-&eci3oE^^+ z*r;Ie$4HM}s5mPt-|geGhFrrmWp?tK>$Q^8WP}G7D*jNYS{8Wj=_VK%Ym+&tHi3Y( zcrpeB|L2>MY;3#N+vExWM900;FZ|_{#6xT?$`}0euBd8D>j!5&Q4@xYr|(pL!Cv6Z)Zr0%!&L~0eb?+ z0uqIWv>Py|q{9=Yh*Fo zaAlepxvACJyYNuRl(c?-R`Zp!(Or%&OJt~ClUV0wYsk6dUPm(rx;x!+oAt#N+)tW& zYZH1Uu^9`}KYC6taaU<}tViTfAh9;&>^N@bi%~8Me*R`M_q#DXzlHegHyjRI9=P#fVYQ+|26a3UkD`7C{Nrlx zJ;c)~zlRY}Y_BL&lr2;oPf_HTx_%CWa)yX4N|< zdnB61gG4sNg%|&2bNFb0`0yJ}Vg?F-Ew=@d1N%lWa%DWCV>DM11q*3po}*>h;@~ovjX$C^DqL zyhr`+EuUoE_Ygx>dnDa^R(ez;)oOcSa)yZrMDRiu+|A@lu;i#CTVo=k92d}fYmS?# zA*cN${ftlRz3s&B&WV$xG{qO>gGn#5`JkfN^vO*NyUg)MTQ}qti=9NXOYTsqPgT?~ z$t&*X2B#?dT-+Ilv%bZQo#&3+>5EUuLGdT_QKnME42Mr}y{6+OlYZW_!XMuArS*?k zn+&!IhR3yRc}IFBaT$t`+rliQW{}mMtieZSK%Go32PH$JVBrU#c5p5U=&lOveQL*L z>v>!`=e9e4#N&ngmRNDH(QGoB_QDekgeB>p9d~d2S<6N!IWP&$&kCdNp@IC$llOvp2iE_RiVEX*g%~vC5^Leh*O$*E{kxb>IJDtSUPpel!!kNlbH1)z+v~g7d>Cs9-${(@4ot%dp?RqI?(<>P6jDg3FoZ zN21Cqn#6-*?N@oO^KcHRTqdF<+7b>J!Fh*PiF+Zr-ss?e#-lkbsQr$r$Z@{yC=roi zq0i`}uA+hTq+E@fp7Vw6n5^Qrl^7?7&n1rIz6p6@2;8eq(bdkPWr@vJUu0$aj?;;5YZPJ0hX#?SM-yKU?+(|2erK0^3C)~-~8idqdlujA!nG8{A;bPyF^;AdzJ!P$GV{{ix!G?wyE*NDNgnv07Lt%stn3cu&IzgwKrLZFE5tL z-UTwQ%cHdlw1G@YRL64j{X8#dF1NH<0X!!*c;60^#b5 zb*rW6`^p8>HUPK~`7FdJe1Gt6qK_q7Rv)MN?FY7MUfv8wS~@@lY6J>ZCx+Lsi;Bvv ziTEQjpKep&nQGd*dHVLR=|G0B`4U$Q;b}0ds`unAJ>vF%)VkbU7ouS$Nl7RXJ!NIo zjE{VQZ5b=xYGiJRp^fX~)*Qin$Jst*^|R^Mj$~z;kt5j3e_a}Hd7wPW>OCfV9%@(r zlw)${Kr%0v!4+96whrU-{SXYx^Dyh_*11#|iSAMlR+hDu0F+V@Ghd`R#$wzTo@wV3 z&W+&UlRmGu&iQMG_HH(E*qydd3$6@cW!mDQ_}LHCb>*mF{9w>ms|L!4U^x^bN4kc) z{-VM-vJqds15yqAJWxL-Ost}Z=3{YPzRytH~hDI&Qd9Wlt;3Fuj{TbEf zc$H>e#K(8yTsa(EwAEAoNV(>S?418FT+uZ06CL!N>+h2}aMb{K=E z#B;#R?tXhEhV2S;Fhy z<)*3EopiDcN4nKG`sH9Ro$oY88M>416VpPI4}5?FoW+o!0$kh!eUDQ(pwjRdTc9dI zfV;~Qk)V|gZ`zZ7gt6k|W=w?>p5tj^E^HEAkhKJN6G#6Q2y5r@4#Lw4#F((}iMF+e zcZeHx_4M6rUC;6h_AP&MIQskl#oAj&MHzp4-!#&qNH-z^(jXlw5>nFLFo1N|&=Mlu zjRJy5gACnW14!2}baxERbD{rppR?}uyg1KV5ATR!*1CSNzx%VldrxIxdraP*3UhRT zpwINV=(T;Mr0v$r^p+*_=eH=L?qYAu=Ei>eItETvBwIPIi(+VE%FcODXIfj7l_Y;W zy59iQYwrh@WoiOby}E?;_}#@R(nc3Ntswh>7vVmz_pd||4BQ*(VodJI(25d|JM!{H z$Fu=RE+s|j_r7iV=JUrsd}V)5Q~81fr&F2;waIc0E>#vx@&26M&|%!qX8n5nZOpC5 z_JqGtvPbICZ7iYXwDShbNoamuh(-6NcT>mLpc0d=XO}Yc5lM?X%5cl-WNb<9C3NK;9MHTt2UT5{S=5g4 z+#b2Q78id5FB1;a2-$Sbq|x}GGG@qRlPxs7=4mV3U$I1;W@E)MStr0V)b{f}2QxQw zk94rZ3%68s?N=4(^QHy#lHSiVY{hROwkVWdrK)n{yQn#11Nie--RsPaZ`KP^LJ_WP zM^9$G9zk1x2HHz~{&PlmYF+ah4)GLyUtgZ6SWn8YqM8gaq*1@ER$XV9CwSwUn#h9< z%g!?RgzEVuHGS1ka{x*UW>qq{`|{ZZj1J{q#e)j!jtjhT7J(t`({+|$*;$*nwQTf{ zN8ke#q~T(U?^drA;NIwy_a&Mo=xhq@=xT5M2`^t$Fcb1w+UwQAYOlM z`PM(*B7NnJhE4Q;#>EiUodIob|M`Xae_JmT{(AzC%72gRk(v2#lj8sUV}&hL0#nUe zmo1W+sl3ONZFxytv+| zsVj2|A1-C%JvMqO(q9pi>@rL-PyIcV6mOIWHsZ-H<&=%lz+T?Dw}1JbJ*IEoB|-Hc z2*`U}Gfqm7j5$^(9=CTP64^<)aHj9RuWyBWx&Nt$e0_WU-~)O}MWe9#x9$mDI@$E$ zy1QK#6DAo#IGj>B#7sA`LgCuCwjciLelQDXKLMEAqP-K5?@u%eHkXI23?Mw|c4{C? z)=X9$EoDvcR^?*4;Tuq@lX>b6X_w{U_(;<4;do&wjRi9G5iV;{s87^?9-m%6g$L<1 z-c&xzWw(ztNlU4ja9JL$!{N)ie6R4I1*n6iSD67s%0)|L)}2qO=*BHvm&BDU^EyU3 zBl(Kyg-ql&99&MKN8wvW&s}_z*5ZF(?vB~V^+gDJv38O};(m&*$}p6B;XN0pWVUHh zrSixbNv)H8;T$IMi(zilExCn*_w6{$QW0_@aLJv*8T1sp2Ko+XPTN=7(;ygBf66QFserGi0 zj3(naKWlXOl4LJ(wf8BS43CGWGCDV-XA@H-|0#o0==1ggoXJX5#>xsR+`B3 zrXs5-G)iOJ3S;q+BBXPJ7}?k&QUOpsiI*ls{yD!|pWXbMk`>#Y$oy~|cbG{m>h_dn0HVW#R~=TdlJnmCr;c6N<^BBxA~|4g^)rH!AuH zEaQUB#-3E_=33u~(Ak{SIuX*73>lDm{=p3-m?YN1^mXzk%(I?vT*=zC_{{s|g|~eG zzDiW^LLv43)>p^WHs0}i7S0PJ+atVdZL)yRHna?v7@}K9-n&gw>mpK&FW*d&`q0^& zH8!F;{ySpxpZXtr)IvYDkh%O^l)#F6MNAtudgsdLx7UW@{g{4{oVwT*T@2*bQG)oj z)`x7mBW;gop8Ag$LE5NG3S?67G^;3D5)Z_k(Un%IqK(|7-hthuIG-anl<_fWpSj}8 zq}o`&I&@4UJV#r9*)p>eG<#*kB2`SM6dj6=DG?|#w#}I7(Z-eE36q@V!|yS9?;(gL zTGr#ygsGG5_#=wQHR5<~7eSoyq{?$Y=+(a~mHh{vNQA!e%~OAh2*WG%=^oi|F|4&tNjq%zz!cd1Ih!=gTKR^h1-)_IJn zcdPHNNu!G^@;Dv6$gD0^3$kI6h$%ItYlIZ=H7<)w_Ac1HrcwPw10S93nt#d~;UCNw ztuEbG%4NYKs~R{9U8ZT+qSpJfVEz0;p7ptq%(&Rbuk_0(W#d5ogU83S*}JiF1;Bgf z0OypV>fZyETwn1#8RF-;KHp0>cLK@c{A;49Y!n&LM~a>6*R^j_U+=N{&sEzymG*x+ z6aE)5<9`)kdY^>z73a`tY$v{6X1@IJZ)(Md+|Gc|9o)0~K)Gb6vb*m)KNdc(h4LLr zdV5al(^rJ3dx(@Kmu0Rxk>JwKL=EdhX8K93J6D+B1zlRdm@E(9lmV`nNhaA@a1~{c zHmk5y(6yGNucT!js^MI?K-IrXh4KTXht@#%mGpFF7x?lZ$eKpEbh?9$&LK>G9kkEq zn*dj_6Q2z08S9Mz*&M!H(MSdEJb&mK%gWT7;#f--iGp0aAeYERmn@pplh2LtGkbQE zwKw%q!L$|XZFGNQv$kV@`lpI>{5yZ<=Bwgj-B_oudbII%eOEDUBo;v9W?e>_F4xqiDYM z)W<6>n-BcG*;`bZkJD8uA98V4wncyoM@P+h4O}YzL%tp}A9KN_>E5e?9Y*7>~8B!le zV0Ce%anW(oEu!n+Qr#UH)@Djo-j#8_?|ES>ebg4JCJmdv{m;GLTtAJavP%AQG6l&8 z#DCK~@<>^;oc`HDKm3h#eX`nkhTXYJO01N!{BW?1P&XZlr-e-X=F!*`Nqf5DV=6Fo z+F<)L5buSX^UC-yP@Sxbz5$*JEeX8#&ihS>9l9yT(%MVOf)^1m@O7GXI z8toPD5B%zrcW%h;*@dYtR_;T6?mb#F3>3UX_!wYM1Yu9Swi=^engikSr&ygTV31&3>K8qsD%+M25teo#(a77g~evVq}M(ZUh zJ`90cpklRI=p1pkhst^M2s@0hWX~AEc6+Q9<(gsdgdBQ_H^UB{dgbajBI62BCD~zl z9B5zimoeJF7u9~N_jmF0i}zO7e*RzXhwzYmp(HB~Q-+P*9p_ssnuD#K#=Z#g%(2V( zsh?M-7mdOsp0y$=A+uMWJwsul*|bz1_})E_Rx&(7O}IIvl8({-#n)8nRGI?qj+%oa zv+b%y6}?Skp850;LsPWJ`&3+B+&5m2_cMR+f1c~H%EkOFs=ln^wGI~3{klJcbGVPb za(fXrn%mxdqhztO+RXVNSV~~Xpl{#L$f`v8e5GXKEp^mC@?R%z9vgW{MMvjLW|@AZ zZ^N`k4yV|FZww#1pA&_*Tr$mdiZ3bBfbVKF2*R>Y2>h;<;B#hZYwxo+Bd!f#D6HMbv9&{}Y z*Ht2dgkLwcI@eJXb{$W&HpsHIB47KEDP3!5@nlUL6=Lv|{|+I^E)bwiAbR`Uc+!BNV&iFE6I~W_TSckQ zA+f0OzZeZsgHaPqg_1SB?h<_;&HjZ@;G%#eLZV|usl$GVDD)Z!JP7x*agDnCSZtBa z=_PVgp0O|)1n9LGA!-IUk@rT?O##%#O0)_l2lUx0fC8ElP3nAtB{mk$KcT!XEkYh- zO>SyTM3#4X`K%d5!@e>HBlNN`x2NM_#}sK_yVr5ip5OXGeq-Yw4v9k$VMzG*%v<-` zL$ezMW*cdKBR!-&s^`BGcjH9HJ}D`D8RgV0BXN!h%gO5e*MX-30%E!zP5vUe*6|;X zTHXt?#Y6G-eDqGL!-@7X)k7M3iN|*ioid4s&!#KEH$S=Ht4f+fM`mB^B%M%I*w_1r z_uCj3lnlc}-q23Gae3Z3P#T3C`*rdgU~ZhrL7Frr&g~MPptlnJ(QdP=v-8r!p%<>) zef>5)q?7ly{{Umlz!8)<*x_{w!A2BgQhJVL$T$;~ zYQ!@u#(f=Zgl96N6KC-B-@f~?{C^37%AA`U?YsS94yPK1m_z5grNx7_dJcry*Fdvu zMdkeQ)Q3wjOIL{RL8F_QAHH%&mb7EFZ#vVc!%QZs3%)(MUoT3fIbK66zT@{xum}*8 zWFOHEA5U$J`@N?i5v$bl@5pLn%kk9a^_Fb5iXR`8-VokjZA>(pUwfP(qK`JpZu^SA z4!r;b5pVJG<+L(TRRQgyGb~6d|I2Q*0}}pIzl{5#h7+rz@(ZXU|NTlx{NG5Gc`+c} z1Fw1L{djm$@gv~6#j99j4-O+L1V@iGipk%@`SMu~It*I^s(%>V6IjDFfg@*GIHku8 zs1QljQUcV_UV*G1DS1ORiD-0J-O(m~v?i4$A^DQCIx)~ebZkFt(+CVDOy(&k;01t+ z8@|{(-|YHN0O6-{l>ze?n4+plg;;i-i#6(@vsGN!DfSpG9Ll2L=(K4=MeDOE;@7iX zF{eFQ^g2%yX%&YAotMI3xR|q#}(Q7e9QL|w#OvJf&hs(hM$gA5W zcXw5gNwwkial@JPGt1bpsOUXp9lLkQ_fAFA|e&6HNLv37*scXf1& z+%6&IT7ZaX-C=9`p+n%Yjg?aI_#^$O4bgR}RO6vo!1H`O9@~VkcTy&5Zs>-*HY7cj zn ztA>U%O0#*V#G4BBvY-xO3?j>%5|#54Xx+RfNZl9!PsQErl&8Cj<8Yto*zM-ug0oh< z?DvNCrcN#gU2#iS8z6Pf&dvtI3nv?w;v}@k3~$S9x~3qP=hvdFP86)F@Fk&lxl`XN zD@BT05(gjg60uM7N#)}(R8r_quQ$O6qk3p7%jxIo|8B@lk;|g`@QHMPRtUo66KKx+ zo&TBX&*?2z>8`5-l$PI392K9$&sqiNt|_mhU$2C2ZRwMWzZ#;^eilmy30)Y&S!}!w zH5J>ZvCVB*9-l*f3M|5c3Yn#7x{;h#I32SM+hflC-?$$IufM-acoR=~23wUK7=aACT(ASWS&jS8w88FS3AbzrNDnMSrq|gn9D5 ziC;A4Yw675fbD8SacMuISuL$DS7`Bi=Cf7gcw4KsiUbR6$YlX}E?VvS^f`F^^ay6v!`@*Ll4|d$P(eBr6*`Z@efe#q0 z91Ke{ec$i^a&=@q8*285WZmLYUij!gBYK?TaLKBb|`0ci4+RPyTm>a*JT#kLzS+=2p+?BWR-|f#FKGmS{j4M0es8?LyqfgmOO!@jpxWRDt zG-L~QPq^qZZ=9M@(dY~Vi4D0ex-7^#xLXgp7qp8-d)F7~u7KU4a>MGO=f~RSRqpAp z#XB?%%piL+Sa3HHI#yoBJnt&w`i)rX3FMd(LR$G;S ztjf`ZYTZd$yS>W-Th!S*`b(vVafkRoh zkdsD^M8UH67DJ|fpC{}$npvR-ze?YKU8{{6bn2N}P+!#Vt}Awl*)%2 zao-*x3=6IZjESyz-#*PASoD?hu#RE@?j zS=zvU=%r5*Bj>|?g^QxcH}$9nRqK2~ z_=_!8@_vZNdb8N#zkA+~9j=rdhHgZ9LXiCC>=b!|@O1~R4zfZQ-CFPd;DMgjdBn@F zzwn_u2uuP{C%w><91hbGi_bp`2raOHBU=1p<4oiTZYDf@f=}jrDR1HLvW&SZM4Kmj zda<>Gv!uWjh7b5Gc#sO8cE2_Oh$_S9tHHIu@2htaA+|$Nbp}PgbdN!tR-$9d0_1kt*G<^H=V^1uuWB1f>Df5}|9~Uqg zju@LX)cL(DUgR=%SwAw4RxvMjKAMMS=d6uhriW1P!p{k=1dD;rC2YvH`BSoWPmt7FNGpa?I|W_gOW zG7!4=Ts_Q$$GCPxY=DR%t)-e+bTVFg^ConyxWi;<(}!0YX-OAya&a=+XH&+-5M#~X zs(xMF>w{Zty?}AzF#{cIEo3MztSn{RKUst~PeLgPjL{9{uNDK`@&Y93S)u+_-53ZTZ!Tp__>q?pnr{f9 zghw&gJs1(I@zk9;4!dr0Htev`}VrHJ(qWdNJO#RLV^b=v#Q#iu1iQ1|teBI(ZX zdCa4?&PcvKIki5ruJEJc{$}D#jhJUE9so$yDovIw-w{N~6WF(FlFs_}`lx+S%I5)= zZealg58mjHiLbMRc;Y39l76dY{3N%aP1sD6P^7;NDGx+sBqmiaYeD;dT=ku@dcv*+ z8pqwxd%HjR+;I&%7A}Om4d&-rt6ya`le-)Q=GYPx2tIOM#>PrhEM{(q?^o&h`Nj2z z?M0>dcuJEwxz`=&*zdd`XdS%F+}29IHGa0fFO)*f*DbUue%2OYcZWFmX>xTNFE?hn zE80gA?^;~7_6?(bt}x}se`hip_ayX>nhn2bL&W^}eDtkAHgq%X+N^YEKiv495X3tl z-W*RMK5!bfrI?eash4eq1_*x(#l%=TX{yrS0aUEOKS=Cr)BwAp>wis(yPaJvzpz&Rd<^HOX2Cn!qf>F7Wrzg0m)I~Dr}y=c-QA8Smz0=V zWpHoFx4c4P)0R36#I5dY_A5f-^d%VY4LRun7YcS6GH!cQ)oF;swSeuZe|fgO~7)bpe`^0xx?Zp|lV?#t^7DU>kE{lx8q zg+6;iad=|*R%X@q3VfgDF^Mmq7^IY*JKtXs$fR3Y;*fFH0@8!V{^ARvOq%0uwaRHk z8|m0m)p*%YBR8y9D`(B(H&63_nhr%_+0EPCPXU#*L{6Y|5UFGoe&6-O8p<4$T&nE3 z*z%(p9wzy?89nB+;Y7RP#Zm!Rtsh$RnWS-1?IMmy%^?>VxZ2?W+gHz`JWHqX_j#mp zZ~SL^j!=&^&kYW!R?sEsaKuDWn+KXj06M%)XVZ$UD_5`tNyZ;Ks6`l!+f^L;c~mZ! z=+bAsRo>kW#e??RR1A^Zb#bJ1RDQ(JOG?TKEqF?>|PX9gDj~j;CY$@z@9zT8};{j4r6e8v!(Q z-OgwZuzKGtOM70S)FmYKx-~mY9F(YpR#lV=Pw8(QogtWpPNp{i8CL%luNI>F=rpBgzow6#%q_R%Z44SS z`2396*lQoNeQ(B`$T^V{qVP}!ySYsyI0MZD<;^d1es_)3Al}sCp0_?cu!y5~PH|<+7OB1-{AYk_ z1JqHnRuBq#5NNGC;$;B6bVu3ZS&Z$?XYOshu}qHPD&Xa_PDv->2d}B^&s8!cZWt#= zhAiFgINhfdoL0KJqL_?C-gK$juqa`n=|t?8)|mnk{570%&HGzA1!>*ISp#(-&w@PL zg=5sZC*pk9bzNXsGX@Bk0PpL$Fj%i|(`DEi_JpxX7LUrLv)a+7qgU*c!l( z{cpcd;oMq@z^)wZ z3mTG1(0-qsomkrDUAv#mb~a1ZE#w3|Yr z<<8A;a^2tTOB)5gPzs!nX9nfJkrXWoTV^yncM8*M#KJ2YTzlo2WrIu_Bp=9xZP0Rw zsCX=@K;RIu-jOR!kNjo~)T~HD535!)FIK3@7@eJI1xbWKsZi*9JLV66n=A+k`vCMN!^}MKpSq%C|A&D8 zGN3S1p#LlNNJ{3}5PAH=euS}=z}V=2bqvXVssH}t^e33qr99*JIPCgP&7~2EZmdW* z?h9E1BUh5eKQtOV}_}Q+_BoB2xW(jRCk@*#Gz|i7Urogv0 z-CsgC;u$aB?coYktL=|M>Qn(JqVeSO=784qC0Y-KUAAa~N}6KK|ta2PVIy;{-J@zb57{E$7we0lT3?Hp0&entwhEwxXgo*(h`%%#ZiJ^A~fQDqN(wk#{!JSVh+zYr?xB9bfdibSz zgL@Wq=_WTbvJ~FQ9D6B|+iyw_l7SpJvh`ak?D1?hE-AifpQO!kZWk=bYZrcJ1EurV zAZvd3>aBxkD|;=nFXS-ks7fz71skmL1IB*{bytMUzXtPwoFXuda9Gv$@pz5|9U2iedji8*)E5nmCZV%ACW1AouTX^&8=lr8eP#;N=BKbZ+x%ks{U*Yvr8 z6|g?pZc(NV2HVim&S<<-%}IjJ0I)%*z``!B0-+%TSpf!;ZC5D_pWD?A!ojwuS`5@Z z#}Bn%fk2AFPFhSJDW#ZAR^O|uw-2VCtl!%On0||%Z(+P&EbR=6reunj(7d@JXWpuk zRBVX@>ILIgJkQ_0J%23FV@hRr0&GeM5S?;AaFQSz#K1eB=Gf=Rz5 ziCsMQLBHZA<0gBQXKbI&B+NF6}cwtYS`fDGEyi;QW+tn%0;w~@SA-UZ;9UN2m;(r^v=D~G_|UlhyKq{(I_jbx0AfnXOGCCB z-w}`dSuE4rN#4K_N`J%bm!C9MM&~nkUxwP?xySQMW}j&T`u-2D0Y;qtNc{PeN@-?# zar#w-F;hst=`fQFCVs4VRoiClI`uTx$#tf#j4pF})lOEN_9?(e{yg#m-05O^o z-ae;(8W1Fng|SmuUDgR{bi>86kn7JfAHO?FM~6nM-iSdbIu}KRwpjgq7K~Q-zW?M z+nfuiYt;NzzEkhyTlT0;X`uzE>cyVS$w?n+{Ng^aN_>1<2*aA({b~A(fBy>nH&G^E zVsmWP4z+F;nryO2tVp$0nrQ2UXRI(L$REfyrxcrJvY|6PhADRCInPJ*%dp2hwk!CHzg$gzTYDNI54ag?prXQ+RqX9t>JhFW<*tTGJUr zbi^r`w@a zA2e(p@@+glG%nPs03ffjCg$y1VKzPLyxz|6Cp_CPGy5m(H5?0OmODjwps{*XpiOdw zKS7#Emdy+|3C|A>=>fZa@X`BH#6Hw#QuuEMyx40swVTK|v+1s_&)27^32g^%vClN{ zuOvhMZzfRZyR=J{T2EVj6|)`Lgcc=Y;%SZqhvt>>_&=yjYNv?umD)K>DXR~``574s)&ca?Ml@agT20xW1 zf!vtPP;Ab?gPOSP3Er;mAneX@1q77f3{J?bld(2M-wO+4F>SZV0T*Ew*ADGu7?aMs zxpl7k!1Z%)7_BU)5*CPgaZOKRt>f*E$!p-^8ckrRjemHZMFpz?ixkz_?<`;#xYj3G zg65ZKLOc+m)7ov$cT)l`$lV?UaO)FJnEE#S9nV}=_?XXj^1PML_;NuYLG6i5YQrr7 zfSR^JkZN$UGe>jpnd*f62~tWx5C^qb`?<%GlH(>#hX1e7S{x&vXBmQW;SQe5vg=5x ziH)u;tWqL1mANUOry8^%{7dmVPwLnald8}0(;~+o4wDdInQWC2mU)lk2evqDo2|2$ z-gS3*5!OfvxKBn_UrIz^oY?1r%Vsg?BSs%942jd4e`hC%>;AeZ#2B}?%La1j?R^?` zL?6M$l>{M>G>f(#4E^Co_Q$B`9f9{k6Nlc-d;B2f1P7jH2ia>y^O*Ct6wyW+>D1p$ zpr>Ew;a@K?LNbKL@OD~oc&pBhYaKyIzi!7(^BCo`Jx5=UEQ6Q9U{G9msJp5XJKyRr z)4|}Xj5)qxv1bp7C8#GstJcepPoDkw@3>HUde4N~o(@t?_8*teuMy;6UFz>3x+1`| z@Pi0^A9#eIiE9193vOu@?ubrz-|}n3_Wg7{FP7htL4U}8IIZC^cz)!L&(=utUOCVu zlE!3YETG5q$5*t?-w3IcSeB&>CZLu_!^i8X5xXOsEmx2-Gx9p$d@7qM5|CnJso}AO z1$0VeCC6tzTJKcHSc)OV{ALRa9B<@=odTdMMPZ;Rnr~G+5~qoQnyp>Xr*&5+A)7mt zc~;%W%sEx##>K|Z&RIUBn5Xi0bwdcq$d9JC!%UJ4i)BKfE7Um(S-a=L!W9$WM?2aa ziP30Pk74*poCtu}NDZ&5FavcF89+vEhD1hyHi}F$Z}I))C=a55x?5z%YgF09*tZxd zysC6BifWycM{~c!3~fc0=ydbqcg^?<^tY&I&g{MXvFoV{@d0`Wv8bWScfDxH@OEjj zr2#bCbMpwSQHp$TKX*G$IecfY4r9}AJ&5J;Vg5`Iq{;m=5T^LWYRn2qUIOg6iJ~rT zK`A$a+(_j?JrWO`tf$+9&iCf{2UeZ<*dKl-DXBp}d{Y%B(+2a}Dd8^A`By&=``?)T zs_0P(P*LwI=imRAsDGjr`+uZ-o#_9&m;8VF0?n}jU+)^=vM_7D3N1~x;HmjdikGGC zL0KkcGN50~9mY3}s0e|qIwe~YnnXfZ5^Q=jTg4dXK548sGl^b^WUaAj+NbQ}QEWY^ z^BM(VTfe<<4!O(XJ;bZFb=8L5Yfm6>*KfBPNNcZyqeHfaYs9Q)M8-Dwrnvsb=v3+d zINO==njf5i9uxL@y2nHF>?oQ1eP$7w0IWWJjU(1cu0g1PzBvf!d3=#Y=m%@Rf#ae> z{tX`j^^&*4KFXp|p7JPaV0z%rZqdCUo$JWo&j-PBdNIbtb zjw$^rjm2(Sk@T+IIzk>4QCc<^MUvB{^u8J42_)=IsA`IC@sm{U$-qY7?}P%IBH3%= zJr%>lT}4>%2ZOrwK500AvV7eQODJVwM09dsqhg^DF|vL#@;FHAon2N)7aCsNZN&7w zO;Ov}W1a>?dLecc9snYSlDpxGTMkguJfy*jMxQxgg}|jSY-jmsDy28@x;l!v{WaTb z5^JsCvXX^Yet5POZeU14!e#!jp)?n{2;XnUJy+f;e9A)l(Q!&)p2fQ%y&BgDs-8BV zCw1GF${W)*?83vY8!tq7r&};R^J^|M#=f$erc5r;JxJ%OVLx{&`RF_D>n{w6tx5Q! zH2A9rR1b%s!%k&Vq+z+c1xH~c>>x{+sxyMp|(GTg}eFoLy(w`p>eq9E+=UZ)4fTa(Rn=2FAI0{j4)Vv((9HYT8 ztDB|~H{;z)w7;Hp2*HC%KBW*l^iiJBpp^dKJg+*mvXDF#s`Er)Kg1Q2;rmIQr;YnU zye%Iu<0ogU$3Ts8@8Y2f=d?we>ZofUELgyFIYRxuuc0H-gK{97iTBTvrANV2(Ti*7 z)8l+uNld{M$8+pdd#}npbODf(g>3w^H9=OMEN@eI3&;JbRtHNC1Km}nE78kC%QSkD zh&4ckTck5hycvT#*Iicr4+$L;*4`!`B9HObAndhA<(LUxIg_am!LgFkc-(E488;cb z)UoZ4&KDS4J(iq?fT_TX6>q86E#Fk?5V(~x{bm5Mtbc~&uI)!a3355@+dY1U8j3?R zK-Zi;R`Dfui}sw0d>KBJFI($v)44U{kYc6F(p6u-{L7@GkZ4~>uf;U5h$ryhr$XbX zUU5<9mpVpbR;~zN?ANt<+;i5<9>(=e(d~5+qJ=f$!gw3)qD9bXow-aK7jX^X9rPHS zGVh(;D|0EGUhfX!xqyn*g8$>y|0i;thz_McH(GfOqP&;M0p6F`;(Egf@a?j!d zSlaIJT#@O~G8iCyfW^VQI9gnm5fxnDx#IEQ(C*zUJT0tGL{z|Draz2G1~sTQEfc=Hn-gCjl@el}NNK{`xSlPR$=RCj>yeQN`G_Rabx|LFBOiq$92 z5%tyw8B2V4Y()NP$HI!&5X5PVA(m6B0Mc|%I1)SLv+auSRfP!_q?@O@_C!zy^CJsc*@zsA_~OeN6nU6i*P;DENj`oYKsx_;)muxPeuzjtfYN=UKj7Bo3% zCag;dz#veL9=*ooIE}RECoL8nNPa3&oqYv+Q(w3YRe%ZtE)Vnrf${m#Os_yK zQ#0OeZI9&hFgb+9n?+KXzEytYB2Rl_q{PSkTHQpO%yrc@uRo=XvCq6!Mlk$sYm(DA zNt&SUY7W~oRLjaACJA~E>CET;q;kQLrRRqFj?m-F%{;;sIAEwj2|L;9eCLtXX6;*=u#W$Qoz$?AT-Qsn#GGQC8#RF}$~bQ;%D+sG zIT(lqlfGZ=)nM@1kL(pDyZlor^%i(FvmWtn77@S0H>yfN1h(FER7U0^skFce0P^|` z+m4riVN>gyD*p%DZ~oKWOu^;nk5^MQI0`KZqYvhHvwbpvE{Y)iVM3t9%SCG*2fwe z$azf*d-D_1b_7+gz51Aub-N%xMb(S%;sFGLCR@4hVF&Bm63?vLjU!rHpBr`!bKf4? zZFdZ*HTuPIFfXjoqO!Si9zKPh&GwU0d^3?wLDGoE;CU3wW@vYLrB9&Db%{JRw5Hk+ zPNV1K*gmh%-xo=ed`S4?AxAu}R$1oyo3;r~IVZRapI;+ZOyIxRoMK!!9A;W4o|>)*03rwrXPnG>*v-S%PB?fOJxZ%&DYgna??q5;V4DC!ZPLVeS#MwH}vU>z|7)9uV?Qus}4obrwNv$|Pq4H?XOq{$+TGM1b3Qm|rEb65%XI;N8 zhcr^uvq`d3(@TV})X1&UP0IZBkO#<|chKsSL_g8%Hen0>4{4Xd!MM z*#7kc2I8@%DGmJ6Hur0)1K424e+hc*n&xC{$JzJAV=QYeRaIz7LhKCQf@u?&dM?uo z0DA;@Tw#2x>sDIwBeXNaVYkBo)yLzi@@`4}1)r7xG#A(kcRvAtLqrO@m2zONW=}h~ zXJfmBv*+}0|6h7T#hw8S;s-cxFJ@dd0wPYf1i6u{vP1jSy?z5P4#1M zit85^hj;~9?)$&d`N`_!G!5CIOzbY1TKm{Yhl&;y2>8gaB; z9Q;E15Lrc;K$&xWi}%jJvVrp)9Qd2RbAWIzv=CoJc~C9*9hwRiD3@I}-Tt9i47kSS zE!e)iaPO!OiXFL}7lAbF1ErL-C)IVlj}XTX;N_tU#U*C2wxp&#V=NwQ8J)Abup}iC zwKfd6$sBka$G%VllQFS8$DZc|Q4R`t2M_X#&YYuARuxp`$?jHTD*bt$X3({m?B@mK z)}yhHeP)DMDuet02CQfJ=)mSAPsoxS%+7CkPP$Q;+x(be^baP@6J>#vzL-9VUYt=3 zB{!X7Ael}?Eqhn(jWr3xiW&5<>rxcA4dGTx48$n+dR{CH(^3zZwTq^)2OTb`yiUKp6`HzvPRpt zBWi_`3E_P-b&P>nv;)e&3xm{zZ|VV1>q<}3SfPLj@s;c>M#avc-mQmkIuZi?m8Z1H zdqn^?Hq96_rBw37qGEOa6b2CI2^9h{g(BAouI*k5FQys-pl1zN;#cRT!1v||Piixd z{AZ+e6yPsE`56o{HHGcxZ_wgeQsn~QUSm3wF{3W7XuF6f7tTWyH+hzW#nJtq8^_T$&8HnPt;Mu*%pSOzUV zULi;Fj&oQpu#D^d@~L5vE^>XhJ-NLpM@)Varan5jocIX{nS&tzJH$6h>ckvl3e62|K5=y~uZ@VpKm@(hG_ug1Bl|NPt^i@9?{y1IjPzO3`QEqkvgm&0rVt0{2+C zs#bD9AoW<-ogERKIg3e}#OxesI=eTfHeeV&_t}2_EMCgA1!gz|bU2u!K11IEo*2vi ze1b(9S=i+?ZYL?Kmv3ukX%=Oj>$CdNnG{q@F+L^Q?*LCSKJj_z6hVgCru~qA*rrZ$ z%yPfFrXwjFhHGlySG_`dBxahYE|T5!ZsWTxM;>Z%1k+Qr?EH!J7qP6geGr-$8B767 zVosnn80He##3P-7_P62r8QbzvX8LVav}%k6kPidK&M+a2Jo!J9MmJP{d#j;b%sI?F z<~eAC)Hu~MFGDKs0#jWx6d1qo5sTNZ(!W1PlVS3Wu^1U)bRzrXzlaTC6y42iqQHq+ zYMVVKDbhMSVu~aRxzNtvPP3(wiul%fn(D!B`<-9@YS7FL_mRzso%aD!A}aLg**0L} z>S|pQ#BhGqD#6dsNqw&c*!Bg+hKMHSM+0MpxMvjV!;o23kL>b`s7-8PQVkWus`k1; z)**Ebc5xIOAtwbPzjxOay>%r2Hq}IF@9Wt6edq?7XuMLG5$7g6n8g_r`IsQ7F5Mfo zmsIZnrMa4SUqF0%N)WVAH#vkz_s7D1Z666ku@x%C4Dl3h%!29oTObgQQFj}a zL$|oQLy*I#)=^PN^VQqqZql#gEx4rM*BBWITcQ`Kou*5%6i7>YI z9&kTy`(<#A!4U3@`2P^KrWNG7!>q?pKLYZ13ho>cAl|I!eW&v}?r_5b=degbi3{Y_ zr8RDxJyC>kZzeFJ2+BN`8QGrnKdRo1f5i-C8L|9(dy}`uUq>~H`n-?AM`K^i{Muo4 z-X}m)qiWIzVuocim^jiKao&{CVrwnY*%Ty@~h7cp=j*ib) z^=_w8k{52^bn_th^WyZo2EWOm)#Q*~`}Lw_iQ*pT+*z5#aT#@j0Obv<1X&_pEL!vC zi?TutE%kxzS%)0v2~C2WKD}4rE$|`Z)OLBaPM#*WnIdM8ft*8-=t|2t{k*5Buj!Of zllg6c@(0M&Si+Q{w4NiIf#Tb@=?ATDPqVr{Nb61L%E8@?6p69FPhig=eBnJRG^SHd zjwx>G^!QBLVZ)wVfY*9k_YlI4+)xdv$De}>ma zz11t}HQmW~P~|Jh^)Q?8NadPQWyRqeS0B03IX=)ycaP8+Ur-9>9L7J$QV&ZorA?li zSNh^KR#O-;zOzu~a^B_9$JK-?^x5_PDYoQrM=!w7x<%XDY&S{fRJ@O0WMJYu4Jg%V zYpBmwhJ7i)abOww^irN7%s07mz#2zfl3||iUOR7c`&JYJ2dWwv;(jGMW$eyVMyPd< z=flE7uc&a~Y@(ESiubybBTJ3%NpfYNZZhsx_~WzF?A+36H~gy60g8O(Tq(gd{Nmq~ zWX*HQDwqmy*cylrV8KEr;TdK#3l<>6`RM}f#77%Q$7}r&Fscpph49f)DU&gZSnY@C z^a&26F9G?4{wR$P@`QfmLiBiMvInaC;Q_{#YwqTcUwAjvV(nftKB6@_Uu?4~QTs=( zd8SF(5w+KkA9T}tVLdcbr<0;X^TB_R0Lm*fA}UZ}D28sYr0c4UE6_z5`N|`jNM?Pq9UJ9AC+UlJt zqb=`xYSF&l9oT0S=FYZGRWK8^OmC|4CGFWslJrfrEj8(?oqV=cFT5&PedV#Z*>RCzP~Q93vc%|3V#ZO4ehO(!&x6Fxs(AA~KBiv$c)Luw@cin@FVTsBd(`~_j2Ij` z^!VcP+p1)~0s)wUYOVJ$q9iX=KKYSu1Lu&3$zRO!U(+AckO@Bdyyvj-)qQV@e~K@=6<$vxi>f>0_V>TWQ8H7Os8k5 z>1_q*Us)X{Cr!7U221~7mWt!)kq*M~+9!IT^)&nQzJ;xM&uJuPx?mnX^ab)XreVSd zXTGVk!7ysu1F5XubHSV4KzAAji0ea6N#?VmQVC;)*e+JgXRT)u%0ngov0WNLCn8QR zFvX6rxW+n)w9~eune#&0C#iMOiBo9e%U7vL?v;)m7#IDYn)42qnyXxi35s3As>|MX zr$E}-SfAT1t6 zl|cDBg2r&o@usdV#e;&4vV=$2_KN)KA(yqz;zaX{N&;?yJx9aG)}(76d1-SvEHK3H zM|{X3se*nKfasx`iMz`h+v4j>%Ao^(AhX^IVyes^Z%d&{+&2RgEkERuW>xa96)$3MKgU<(YQeokOjbR0fpP z>EQ4;b?lnl&07Kej<+hntPQKH-59w~b}z|p#mU$zO;2FpPrO6HspRYpyyEVS9E*W6pD=`$aIjpC<*->ls`F z2S1`T_uu5-R)-=mpRbylh{DrW2sI%lfkTw?)jPR?CgS{X%87&ZN1~+!_!bd@*cE&0 zkMN@;u_IBo1^r?wQm_M9a^w>I>t_CE=JAM^OKu(3v~N$LzK8g&3jl&axr=Uy$A|&&3bbWrr;h zdUewJj^iM9dY6hW&lsoT@mDOfelGv%_+-H=c?E`Xy+F)%)XdiO+B&GlF%G}%-KQ&n zDqifCh4uUexV4fGa&&tQnoUpwRADrWMk8MR`pVaf3TGOjum^)Gq(y$&i8XGb!A|3? z$aS2f8vaFRJKnkS2u!Il4XnL+6u$>U#Wqz|B89I0hb$4ate$ed3h(5$jb_DkXW@y| zk6C@5n1y+`oUpn31B241Q53p*Kh>DXX?)31yH(rse7>ZGd9F|JZ&W1E{Toe4n~~#J zu#3aN$(^+t&9y78*D!BC*KUQ9yhk>~FLGJpO=3m{r2{NLLNG%oYHVRcFyTkH?6J8? zZ2z@rA~G?m*JB_Op3w{tokZRe$l+j=MuqLi(o@`CrVTt_5grPJBfDT6d}>FGh{Pd$ zZ!}L>FF&A;emsWnk4|Yrq}Uc>?<4>}+^*V&g{7*h+)|&~K`#TM?gN^pz6#@g?DrY> zg=po1iVws{#217>rtC(&U7L729>DfX{UK7A7c;lQHsC#}%kYv;#jU?*O=J~x%v*^T zeNM0aB7Eikm^<2>9_703HzhfEPwx(8b;a&&mR3CIM%c4fes}3_?!%ZbTd`UO3Zh2? z(n4Q5a-(LZE=egU8U@(5NbbCsC>!|CJq9|p3N1tL%Bz102i$$G02KHB%SXITquG=Fr^m_vmx^n4gd0b_{u1_Gb$o zVe#wSX5f9 ztP;q6pWMdqq`gVSFtGUpi5C|C2f~oEbtQ(=!_&QAx+6D@hzE(F>IBeI19>J-amw$> z8}@F^+5`TRaKHAH6MVT+|Day;%?#UrZl*en+~UJUD$E`dw_f;QC!M~o!0ZBI8rVNTNp`vYYz-vHnwdHhdA-20B32VdT_ zICY}M+2sIHHgedOK^EtYFOh1|3wTzq8Z6m(?oYRySX-7^@ryM z!KF?%Yha}Oo6|$MzQG8`=^0IdqUvExVb+i!Nx@R9PW2VCw%6Qi0GR^Jf%CLvv97X* z;x}hf?HFWRWjX!~GnKKijC5Cf>>YD=J06{BT7iEsu-EPV&dmyT6I8t&2y!km*$&i) z=%piut9ugU8P*GeH1#rZ=+H>fICD054I(S_$-L;^^e(OGY_ZLB%7V}UGJ$kYhCd;^ zjMHvb1Z%YM+uKoj*RdzoZu|uT-1BpBDecbVV$+(^Hb3~2F&2^}fN5-W&lfCA%|KXr zq}i!Qvl_zpHQFsW(P?sZF4)&7vv7eL$L;-G1AY^u?5lx}oWKSx`Sb(FDUNwQ8)3z; z0qEGgLfE^l!x6A02R<-Q$@Yem^XUzv4)IYrmww6lV z2$MIA!Wu+7w+QiX#+j2S7Wao6=0qQ{MV8RH-w^;yx85GKx}QqAFr&&=mZ~9i4;qo% zOpkvXU^XHHv+?}N5W>ix^esL;2YNJY*TSusgUPFI6KLXT{iSHJ%Es14D$MT&kYO0r zUYow%)mJsW(>IvW#vF#1Z*!8aMGPl%xS&)BzrV?SI?q@<^M7yG>h<}*aIoAM(#usKEBC7guze6#D145Jg|`M(89uE&Diipvl(1BM1Q0I- zGUWnu8wYPbnTpY1ytQ#%)mP@eHhGZuBw{44)N1Qar;E%X#l2^CFTyg&HJ703IOhqS>EZ2JkcQ*tk+r8r-Q*8O8 zZ3E@IK4yjI6#&S$X=CXuI=Y<8KZ+9^ulU=Hu}*~^ybKsGRKA%@MJnZ>-6OK$G$33| zK02B&jav<(mREM~9*wEO8z~K`1YKz(Wj-dp4<;Z$c2b(%y^O6EZcFSA#fojh168;` zH&Jd|e+ky@mUo*_7kXW|w6Bfi76!a&o=69)B#gUO!XGe`K>+J8*u?#YZ>}iO))=$A z4*WPpzETBLA%?|8OSIJW0GJA`MD*WhC0p$zUOYW4?V4_e$!X1h34(BL?aYwS=r25f z@@io}IsEvXGBD!*!Pz6OmrgaRa@a+JH$4{-u%bzPU2Of7lViUpKIKe0A zJRZSWBLal$Bf9Ogn+0EtHg&Ec*~SuYtDk8V+?N)MjFp(pDG zL%;eQ-11vT@57QqKE>;YX*^rcqPTj*C)8Ec0D%WCVY!ml(fl`RF+kuk8E1$`eHq?D zi$0lh@h)d8&7AQ}?8J?%?we7Q5Sf|txp!g-?~m}@j%pA)2yH1@^2^2(a@7hfzb4ND z+8%dCiK{sl_)y*NeT`6Fz-3DNp39vQhUN&v*@{-J(C(1%DG|Gj;rr|6ynHs!Qd}Pm zSx*mkej2GtUsrX?!OQFA02*VX<4(WZSln*=B<#lNIf2-)c3G>)8Iq_g1MlO}w~_n* z&M`gC{olN!oUl_20E(pnV2_nA`?FYoCw-Lqe2Ap6fB#2SOw3c(VU;4$GT8Whao2j2l*0&7=m?CasaKSjJ2W^u)LOPG zmY6iKPM{TR;I~7))WF4by(J=4C9(?vlkgx#W!tK4qec^{8qWpe%3wkWCsYrWE>X~j zzUjt7w_ZfaM?Hh(=GA^Rj-M|#KWR!HP?hf-&c+E&fM({T&md2ChJb)oN8vM&VBIrhsRE3-}w^hp7j6hHBJ5*LG7lo z$tCa8KC$W<(&esO9(^cWLJPIoaN%c~vK;-OgReCT&Uc!Pz9`@n z$7!@;FHt4B21kZ;3ceEBb8Ngdy=Y8QImRWpeVO_FCX=f%?}lA*%Od9SYpR`8+ck&}wz9 zpl>V6miuLAj%E*eN#!a&349n-T@O+q9O$vIU!?9@(qKu72q-9XeZ?^way3OI6^y~7?CZNZ;)C7ByRwS7p z(p%QlBzNrqHCl@v-N3wDOn2?5^4K_>ja;UkPP?}8ww1wamEfI7g4sr0jYCi}d4 z7(pf^JO{g><&?GAczxdkt$r^40(UGRf_mo#NhRK*fFiz#UFq8k738so-pRQ0nrC0v zVub&a_T-k(WO5y$Ps(&;Zyk(B6S+8@B48|ysCE0Ku9`b^RE%1l?y{a9e6>Fetb(8t zU_IGxIgTuloi28Hrbx?PPwsvtb)$Yd7&JYp3}{>yt4$OdI3o_dV1-u`chYooj1CZYrHT#{;)@+^z&{^9pNxg^5<4s2J+IB+I5a&yKt9?P4qBVHsBl*+}) z*H1G^T#fftIFjY8PVS8vRVBJB_5-i z?xhCL#~JrLAk36%vYv=v6(Q6n<^77_YuiOT!!O^y_TJlQcRjzLIlNx3N5&>f1!rHD z_2XL%q>nWwnHibXnb*v@w{RWN7)$cX)s+)53e|7m`nP! zd3Ry8^bDc$k3DGOk_CR71gkz^BH`)H+p4J?nTm8hflfEL%VvyqgrMg7sotZ z4Tkp!9-3iGyhP>h-+gg7%+uh6iGAlLdaIw+j5*b5Utkzs-lI6W@tl1(XgLlQ`(gDY z*{Ypd4C(JV%UX!%vM#YoMcUl;q_ayWIF(RBDAioGFCa4F5V+%Nfiusv%aEXo;3gz4 zE|6kbhWKuF^v(&4;WbeK9~y+P%sISnRMA`dQA*F6b*J2 zOVx=#Un={tl{Vl$+ZScIki)ZK%6shkU3DC6>bjuXuNNyko@%C(KbVlz{$pu-@z;0~ z@KaqIi!jsaz9>}U5=l~NG0S-6bkhw(T>S6jv4hBn#5~qjac$(%tY^xq$w*JqG6Hqr zY<@TlJDhfBljthrL8eKI>Ng?JPaAum+td{L^sY=5K^b*4)u5&E!pPjtL$C8T5K7sn zQOMRks#q(h$`{Ej5XavX-}q8h?)>HXdD$i8B4NrD6#Cn1R!eiC|MKeVdHrozs7>SY z1y!od_15kE+t?!MOE*dX{`}rU2r^%g)WL^qYt2Mw+Z$di9*`$dp3;-*G)Sf1Jb~FG zE?gYL>h|4IHb5vb)bVdO!>H!ZGlsm8_M8Q8VbU zVLX7QDCW3Y;+^oJtz`D<(gNShW901eR%Tu#vMn;22+^D@el|tZKz zROAJk)Gy1|J#H8|QNEsR8(~ZBa_eekOLeqL0V zQQ}tC%Gh5z7r51585cF-7Ex{GP=%Q`4mew$`PjQY5O1FCEYMs2JZxxk`(>g#%uK*B z_%pZ=S8%DG-s5@0mAiqxQqe8qoKw=l!6iGxDowDtlPtuOmnu_i?g71S$FI; z_qMkJ`pMSZzP$m2*IDNJ{jI9d>Nd3OElt-BjRT ze?otYNi;+@c#88>i3nw9Mw~SEYDIXLFdc}Do?k~9XU(<9c;~K)^rz2*cMpQCDtwS; zm-VS@<|+re`r@fpheLB+&D(z~CH$*StnpEwcP-kNma)%EeJX+r_PWzk*AHNFj-&4|F-^1IT`Gl7km)eup6H^hSg1Z%LD|Yq&5PzO{uG{c%^c2vwz+(iI#kBU!_ zFg*2bH*U?;(^$p1S3PUqV~h?@g>GkYK+locd`MI6_BoDsZ}Q=ZTdd=1GYCmxT#iQ{ z`cAfBdb#SqzY(T&UnIwBR!8XR99Rk-T&EoIM%drrqQtF^^5s*uVAtfw;LQv#9#WPm zb&s!NpW7`74|__f>D4#xhH@znfS3~CJYRg!M#mVnz0Pr+PF)-IBZ764zO*QZhQ^mX zv~S&}9*p+6bnuq6TS!Cqt0J)nMbW6YZpei$j6d%Y#9LbMX>^+!_Nx3zDcB_dsbMAPig563Gf1Nc(Ir~cffMnG_ z8w-0GW2NU;EUqb29^=#f;Xj4LTR`fp8=MF(+^@LrHV?(&_HFsAM>Tfh8#%9fES;%$ zv9DZnsH7b9OvR_bnz~MIw%E)GEhW-hb#~(xZFQ;%zU1LoE~oVhGr*Z*LF70lpz@tO zN=)q6KKELfchZlpjK#mU_r1Hr=aJrJ40ZxB*tR=oXX*OG>0t+ED^OR#tey?;!EI${ zuIklK{F{^d!8$a*G_LsNA@+8Ff^TB z+R8i;N8n(hzLtFH1?#s=a8U{=2;i;BcdSWZ+J6-h{vL!WJ6pcOJ_jSULvJDvW1o9i zCm8vL8@D;3?8BIUci2djVpHkzkb`?vC~bD#oAJWD9OnMY=@M>5nor^u(h`g|-DBF? z2HWoTz}@>|#l~b|gQn@$KHTf$eNm|*sOdHJ?KSUseg|T9EnK^r#y{M07v*FAJ=-g>b}$t!h-FRiil7N#YXcbZSo0mxcM!b%k`)Kai!O zG$_kE0zF--nu~q#@qr|-IlppsSbu4Kx&S$1|PN{`#RU1VR}2BgVEx%>ET4t^gi z>f+J-T>}|vq{cKSrJ^S(oPel1m zdDh#BoXI`19!L~=g#9ieS6EOE?#ny_WzZwN1R6eVusw78+6}Zv_S7>acWddwGIf>C zo<}m;-ACEm`nkG5DyuW**Xw$Rg+XGP*Xd;Gi~-xzhV32lq}6zjV5FDssfq`K-}77n zs35loPn)X3R%yKW2kgZm1}fEL_CsMWZ2W~_2^02js=eMET)?_y5fBy;0R$>ND3); zH*iulyYJF)(9QBCn8xFkoRf)?K>KPOpQEU1zI09D&--Pf?CLLrjMRz!Ln4uH@QF6C zDD*dvq3N$$EI|HPjY#9}Nt)VK_)K59SkX?mJh}$Ad(ilz9j?DG?O>@buc7jh&I@N; z$8Z4M0e!dwfE0L;M(5Ygb{8nMVL>w!?BbOgta(qP*AJ<)o*MrNgLYa||0?Ug2&oIR z-*7I(5+|hl984U^yw1seQ2+#DlYc3b7&RF>8#VF#8hBiq#BD_;M%}zLC-)kRddYaW zd#CgGLcRV9rZt1Ow;uz~BO&%|g(@jos0Nb}6+c^=H7$gKLr|Rg#uo9yHVKdMoW=H9^k_Sm8fId`5 z-zEeg;Z}#b-R11`qyTMCI*WKDj%1ujnnjE>QT+Kj*ZK7kzfcw1b-%&rs#E6=-#a7> zcy5Omm^8>!-`*B=&g;)nv2n`{m5yNCdacjq;gZ#b7~{~A*0{>={3uzBt4n!?&k76% z&7_kd<3rZ?{4-KNP9Bzf(fYiuP^oS&jYR$`sR;)-Jm|J9dCxJW6x4QfsMJ?bA562C zwdoOmO>J5e{twQ^t(N`pjtU&fPSmc2pzTI|SADrqDLQc~_+=drX2ybl6Y#FLBS(X! z0cv?oW0G!2z`N$lzSweWTNX6kic}U45tT6ZcnT5&m}s(>=^q2{fVq&)Ky}@D`x5<+KH6U zwtL4|XEe{mWWF)J<}&gFSd69-ncngMIrRq2)(SCFG?OE0b|0R50G9`1UovDqru$fr zz~t(Nrx+i-*%QuSSU^yKiY(NqpHgj5AX0EzEa)442`e+tFu-%lqOb_Cmlbuoen)jL z#&b+-LVsG>StsNeIVX>~Mh|AS{cV1T{Bt4~$1d6(zti9ai7P+M8`BBM^$q7$w{6#L z83x{1&YbVWZsEJE~RTPDyC$hBzp zu4TJr@K{e#TC`VDpG)+{GR#jAP?Z3LSrz=r;Ev_9c`Wf?uPem0RKeWTFGv=pTrf`< z=g_^9VXl!Gp6nF>Qr$ZY=cC3530$8t`!07M0Gj_2Y2%8%W7f&Z=B>h7<#e<@Nxj77bB`IcB04fxFm8Lm$^*LcetAsCY>1pA}PHQ6IHQ z_QsCM$)VP0-NVWniDa0hTt~UjrT9PP5IcV;4K=qJpHb}zQ|!&^p4D^Q76f%G65!0V zxEuoug>q~m^RYH#$enP{NzwF%)4O!A7(5>`*pm*R=O*#tW~2bKduz+oK>g_BWXns# zGO!<9Jo+sMwu@Qw4|JP+nP+N^qgvAo;wDHM+QR4Ejv@c(0Dkc*pyP)-(i6B%!y@pS z!;fn$Su_j+B1XlVg{v84rN^ko)9)U)1dsg-dHi0f$5Yd1C%@A^DR5VRGpg)Ys=|8x zOKvh%9uTxy=I8~w=iy8l!4<7{R1;o_eK1Ml8(ZpH-{+!HJ^2R(ukldcZf=VtLFYPa zLi(WCN(Rs|eWQG~04u?X0p5L9m-fDKFY3TnuLJ!ogg_qmBS97uK}-1}Py|RC5XJ5N z!V-(8;&`Ss1%0j<=|2=S_3S>PS*D|0605#Hwx&wj`eFZkZfIOUQ#Q_)5!~V(-O=!S z@$Aefk4PRd)36HB)<==YWPjB^A@ViKOm+uS5!7M(GMmQ)-k8CDa7Y|`Mvjqtp0Lp< zWyvL8^^}**hPbI;mmzMe@Szp4!q3mf4Q@B`{s&$Gyl_*-Lu6UMZz zO2RlBdZX#<$Q(>jfR>|$pg7miy*R!PP(Evk)+J3RsD8bAFPdgug`s37%)y_S2FsuA z)jLu8(Psb%*fM9=ur$}2$&$uL&^j(;YY3LZ$4+pn)Fdpc-`P@%w0y6PBVu?sJep9{ zk+B7cCyLqlT0x&XRKdJj_qt2%56QB}aP!VbH~vw0m>q$N>kr;8rU%n>zX$n?tecwa z@oZzvqR3Hfd7OYnU)Mz&j83umtL~wLckh4nAXM-;9@SFZ*?&f)T-~?6GfjSnY?8Qx7(E=2cv1o8tuBordFQ~>peH#)M`{i2WUzZWW zNB(a`CFGM!y#0SA9!_As<4{u0DP4X@7<3RPFHQjBVEMjpo&Rql7+@~H%#8*V8kZ6| zsGbdtxqJH#N!d`U&;anp&WIm*;9305MwOa?h>Om@m>Fj`7PisFD{K}0+Ajb{HjfmR z!VQJ7(~Y*Iuae}?I5koUOVk$ryCkVXUIh()IcbTu80o*{GgAYn{b}%vN+%!v z>q|Avc^&^6@R0w38}WbSbNv5zaqm+Zo%C`fZ!S=1ouFK1$PMUESf-YcZVbd3l72EoyFbVVOe02g?$_O z-}k<~FSl;ht9nyK0e$++^i21!r+a!%_*+#u?5E^U5fBit738Hg5D<_V5fBiS(NW

%S-T;W;*N;GsW^YAE*2)g zS!vyD>@5)ZA-EXuCm6qKrnEE{btAf)47eSnVkuo)diux<5w)4jQ*Rf zZQ|l!<6wo*L9rVOr=k6Q-`&N`0^tf4bo3uKDMx#I3kNrZ>yeapI1TkT+j|=~I}3!O z(@7Qt1X=_IY039qS;s3r`bid#Fp&0(v@q*H+8iD||BR<4<4-Xp9VQXW@=spR3XcBL zc%`9da>oxYVWT=IssqTcjLNeuYAQOvlPA>aObN0`0=&TqWTs~#dU#Aj;^pGSdK$EN zf9rMQHLwivGnn&Rfr#8m1Q{3AOHqcHxX_UsVF;r%10zWbkGK3&F@KmO3=2jQTrZyk1C9kdwq zgH)MoW8zL-{gZ^H;W@3k+%*NndF>a|_G~k=T)dVhjNkUrg$6RJy7Ag4RpyWQ+oJ0k zpL&W7%!v`UtHqkfm~14EyN4ggOKp8c6vJouB+69V^FH3MhjA^Y)hx!J*Q z2wVhy4jB$jm4NLXk3}PFDq6bOfGWmuwvkNqznhDpi{$I?5oLN{&{GViYslxfmC^Q^ z_PHhUO4*_=aS`Nb8$5!zqRaZ))c?lNT|#4wv52o-3ms=e-4J+@wT|PnkW&`+CG1Zd zaMaC2W5n^T3r1RHz&OEmLuZCQ#la>$CzLG-4HY5I5Hoc zRDe4^rrjM%MIG9Kyq#a#Pzc7?-qSK^x__deZoMZI@qa-md&{R%#FuQfYmP5+rfcdw zryk!JlV7Y$$zJvi#|cdSdfnZV%lVjAlrl9e!oa3f=^+Xlq&Yoy#DPv= zIk%4i^>D~l;r@9t@F~t)_n}__v~#O2XcIx1(=qOb(L)MWG^oM7PW{;USWa$5HHRfP zcQu~65F2r{pX}u;xdkptX=;hCRpoMM2d8kOh%{MTE5Nq{xt!`js=nAjPachn?lOMy zAI)3;BoV}ga^hGlCt*ZgIAmEpW!fc4aa!}k&U}DfvIAqljv0^XyGznkn$7hWr*ae& z<*k`$NP*=WYV|#M`vz|gv#bW5+CPu|tB%G}dn5v%nt`8`9kqEJ@Q+JP4Xd2s9&r9EgEUJk9z6`)VdW#Q>bCzCnMU#B+?ocD%_Nz|dSIXUOW&rXm83vuF zKCNrz&gI{cA{BfzDIg!dw_g-lHAo$pT2tAofS@hmC{AzJFgs)D#oXfguGowEpW*qw z{IVGFaJ*RcIa<#XAOAGgVvH%bb;R|IrT~&W$8$9pdN4&LZG02Zez7Ej?!aSb>={n?Ifaa*9hBUANZJJgunwSEnBq@IWcCY$Exljb(arzckp&7H8}er11xYk>?mGl97q;r*TaVyNYMqEqws^ z+y}ZZuhN0Mun&VN6BtpAMb3flls9`vz9$}Nn0ql@!&wz1oq`g5ags`2-k=w=#K?jt zjp~WR2@6U$-s94bB7#q7hIxEY2*jSp?cd3U!kw7w*__i%X>iYV{l4w`j?Co`D-7HZ zT~m=pRwwK2E+v{wsd0B2^fuCo=Uru3)nPGS*wMxvVWK#u#dx25&yf^NP`_%DD@aJk#V7{pQ>%&ERqqSI#~B?6i{;(>W`m=Lided|R`Zi; zek56xMzj#{d232%7%DYGq0{g=d7VAb{#Sks6rvS>MArR|mmGzGUAN5;#($)>=W<{W zt1IYFvEwQC7R9D`L2I~F%dajWY4bI+xC2#Gkl!pKE1eEgf1cq6rA+3+^IRCK_VZJUQKrV+A_jhw29oK^F@Ek^sA=q1Su@+ywI}W!{sQ`q3rp* zRIdyJhO_D9uq0A|75HlX99{HjUDc?TRmh6of}wEOxjKivi_b*stLf?K`T5=M^I^)u zy{RR%A*He>1e(n*LhJY=MV8F#zb>y%eMv=o9-T-M5s}U-BnBj>DlT?Vj*Bl%x8+&7 zxR5yeJVr&#(4|5|R`Yy-r*G9|dTsVh`q$}@MOsSy_O~#ZXaz{J&`~Va@A(tPc zIgDB&Mv4Jzyf5?rI&9rM``tL9WEm}Lgv9au1%A#6i+>QMZ4LlE-+QW2DDsxbyjn-^y2*T zdnBY63v{M3aAWL!kG1J_I8`c==fXd9#s{3SIyPg}pX(17do|HJb+dMtizp~+cl`lB zwIo!eX>tbiq4JL~^n3XN=<@I5lid+wD{V%adz}kmi^ut*5B|?|3uW;qP@}gI^JF(` zoG~eIWnD|Enq>^GJzO}kcIhajo*q6nN2Eu(9uSJfFT^5mIp!%hT0LW`Dtp{}Mx)^x zF{Ow7FTC7lAHU1)P^z!8Z%6Ai>GT2sgrR$`7RaBeE*9<@ucUFsUS0%lY7}Y#ibSr1 z9-<#AEJk{XkB0y!W!`G6SDQ=WJ zUUvr|5(h?lJ1L_L~(j^W)GO&H(c-`=$|(d$EeQqlG_ zlb7?7dd%tUMV;d>D$=4`4~_~y57r5WY*Fq)Y})H<^-5b-&H&#I2dS3wG1FlgvoyDE z1VsT+t9JjQJbG7RR+QNa)YTgnR4S#d+IrU$#Nn8q!^w}t3GH|QB&W3mVYv}TL zGM_cCboEr$>85o3HYNYXzNUa}m#;q~eg-w#Ev@uDFo~e?T!ApKgj2eB)tIX-!E+%k zDs$o>&Joy1s6uRPci(G5ef!ZfyM2 z%@NGOY~?3W3Wt1NIrXyW!vPIXj8!g0a4f~Inb)Yf=Qb^*H~cn78uN7*OtV@P-qH<# z+o=F^cC{6}<%VC#YhZfL5Q;;q9WZOioin(j1epINCLn@r1L?dP|22qIJic9ABI0*K z(%>a-tA_YH8KN1War91MW$<&dt>LwgLF*NrUP%Taq z%hrW4OUU-8t33>UN9o0>;-@btIkwe}I_qRA;yu{o^c>tD-jx0w%s&50YXL7ltTAJR^5HS3siCClj<(gDy07TtjX*njC zkwtvSRWGZVML+LLRH_xPpURQ`Ljs4wNKTG#A4J18pW%-!xzyRre3IT6I`HLX364^T zZhC{2>7{i|dSicKzJ6{TD2Gb;j1U-pRFrx0Xl^ieE0=OVaMgEuzQ#mEY0!9eG+tV~COuE!+TLqrn$V0l zGnYHXWa$OHV~!lEQaUx6&4kicku%L!yKJjqj6;rnvj5=0v_W(6&U+5LaWc;-rG88W z)htzgbH;eW0`M}L%=8C`Oiz-k`1l^xjD9&X8tx@GY_6GL8P4QMtko==c?q8DmpRZm z|L)p$05#d`z7`$uV=x;-c$EIo?up}twH;%PU~0mBy$*dL<2!Tp&F}p0GFmJ}QWH)} zyd1oIS{dTn*_gq4`FHKx@cG*9;BrFRjl9z|n^6ox* z6j|a`ib*1m{K2ct`ArNJAKf$@!K*IPB|;%Z6S{F*b}%ngm$)%RoMyzT^nm29i&7^` zGK7vnOGee|!QPBww_2x;SbTtXOSe1MOk%(LI1`tb&g}a)J4y>MZe`zYkzm4$KRirl?;4fBW)4ux;HMg;Nq> zb&_=p8?SD>`@A-+Tp*#RV?W@O}m-nL|VWW&Q zGBN^DHA7=q<^3+j(9(WOMB9n-^hmGhIG70KY;0>#JJ)zUE@^k~G6d*wp z1{N*$#OiOwoPJim8IC6LW63WT)Wy*4yjGthNVo?YQ1?s$M)dgIFDV1AC^nxlgS*Z) zGLx|1!{!qQSTq1_j#z4se)Pb?)v@!KoDOxCp}Bo%x7~lB$+n06xQv$rT&#RxF4a}>P5buE zhYyUD@+@Yn3auZ1e2NfOxs*=ilN4LG>vDNSRmyri*mF;9yv!Bgje~Bs83Z9XR!*T> zIUwUoxycNbl=Bo7dqrV*Hi@mK1`JsxTkiRh8EW#;qd7Lp^v!GhOb_yVDWcu;jS1%{ zTu6Pqf*L(bFTTK6mYkf&FDq`m@s#c^rv&gmn#qPH7IX??>6;0+_dthpeh^;;@ z&hyf{q5?5_6cXlg&Ur*lH-u1$cj3nto&}Kmp<+8QganFdRZ{W$9JR&{}8ps z$FuGl&ofy~3DN#A?eh)FMaIs=;8J{bWOnC7B-Fx`AdXu{+gkI6(N#PRIR7%Z)Z0{q zvz_owM`_g!5)+yL64!kQ_H1ZW@s7@*cnnY0=LhmGvGtb&Xi zG|&2xV#QvYJIYyr3o^HTdX0EoRfW@a=Lpvw2aj)PBaTKmPi)At3=q zq!HM{b%LH&{W=H2u8QACfUAGa6$ z;sJld3$XSP3ZplQ>r5J8n@H6>ZRO>K7>EY>o#U$-rq^XpsDQ>S&rQ%}Dcj0S_q z8SESsrKGRmV1mFR9vBY%vS4>Uclu#SEcTf8Zb5jY5l8_%RNh^g#k+FxM2pGk5*0JA zA^hmgdye~hLtK&6@};YLK3&v!KS@WT3E^(#U0wfkMZa_wL$5#xYAbL${!~T7w%qq` z%+t0+brwqPS*9zuY16ELq#C<4RAx7yKYae6d;)W zFoVD{pLCc^?OCQs z(-uw=5piXEQ5?No-iszQLSnt10>M?wRtWNUJHBhgp8-O44LGN#4Rcxvw?NzhF2|Gb zfY%66E3q^Cmz&l$bTk}3-KMWTHGi`Ou0DB+yRC8KrxsYz6rPjrn0N`nicpNL4w#c` zfnK0`_rNe7~h z1qo~g5(7>ht$Ag?#11^nvDNze@CaXJsu)lkgW!jvVL2wsUW^Hc{56fXW8P?z*is^$ zX3QG8I$@A`V~Rvw@=L7D*U@aHb@HO2S`M%=^;% zta?DWK!7*AO09tR%8^x>ax&!h*f(*BdI{KSn`5=y$VDmpH|o!r@phFT0GvK2W1CvP z;0iH1R<&>-cWj5^e-V>$(?enSSi;JxxYueih<7il{#5pF%%3F)uXwUFZYhX60s|7e zOuwFS(N|=5A2#>ZStksoJl7}ezO;D!qLS8K;<=PFqVex6RfW9zztW1iro;~s|1t<6 z$^YK6>e2Kn3f>$k7+QZ~fNX=JmjgBMA(8we#1GA)(Epv!c*{d&_fy^f#lo5Y=cE6} zQ=RO^W(2t3+RIC1QLFRB|2_9HMT2G!6!s?scbjgH&!0axzB%7GF~Ise`FLh!5E}Nv z|7;oiPc_{S7=HYpy8wS=`BzyVLnQ+sOSDGHjGo>Q3yQWThVtmYWrlOa3rrXD69|JI zoN?~m%$x*!1;_j(65Aiqc^~iDYB@w*&d;=V4(XrXK9Y3Pw09}2CpW@2qAg=eHncrp_Y%;1-tIO3)JxOhAD``YG~nay zYWk}W`7KB!`d?`K-x0q&_C-`r^{%`Cih=CTx(0QNHJ=dF_Db-8RuYj7z3J4Vj=pvD z2$zL$z*;}aJ@yj{WUb$`wWL2=H->!Qidvb7*W6mKZO=6YdZD}N>h9=si5$`=&^PI{ z>jXq(v&yAc;h->W3zpT@<@_u+kbf}qd@eThhcReMQ-im$Kb(u5|RIO=oi8&ZgA2##3=t)Oq zy3odJ7X@yjtjLwWuVanxNgz#NMj?C5C4AF0Vh#P^W!KEA#^Ag`XS#Twb1)zOHSY1; zoK))f}_IGVJlUEsGAP91blc=>8R#c=a`AlzTfS2ZVL1h?~?DoUitG?5t{zbR@b zfsyI-&Cty8@aJa)^yf%Qgl`A;?76debYgwau!~?xyL-*U13JtV5B_Oh-?4{pH3+X9#RBz$>j-DJDUr zjAga#t(^_pjt%3>5jt~Af<(XQik-rEEu0$>k+);+b)invcr}#;y;4FKT75N}!?esS zO#FPS7uuEdG=W4_e6E_^YiAkA3FS6Z>|;hOA8){HMj0?@YA=lH1B|HxNlq1E#m-L6 zsHZe(3%T(QQ~QqIGM`A@>~5+4fTZVArbeEX=VW7PlQZ}r(lXvfbfA$lhn{|Nx9#r2 zs_n|dtVWpB#H5IZ4KsqwEo$(*UN)})3X5kE4vSk zd2VRSKJI&C%?~&58!}{O$K2dkt$D}76Cx`LNO>>K-F7%B9g?Si7$i}B9})aQJG?Gs z%s25=R%kC&|FO}AMnc4|BldXdQq3j6x|^rAW4|bJAY-Qg(CFiPG@JnK?kIPOw+B6X zG7AOLT9h$#-$0y8pA*wdjlak*DZuA=6U_K(G5=i1&n!`1QIVdNHRaQxvL%P2<2)UJ zj#Vb-3lrIOICc@U>n#1`2@5Mdy;b8#qEomwOEXyd@@NVXw&>mFYE!(e?AN}*W%j5C zJPSDM?I$rBX9oN-#KmAM=#Un4un(dpOu3K{9dR)l=04PHsrwr8dCJ>0uO39Q;DVc? zF*;p=_+eO@{=T-mR!RtabH*RWjPZ@6!p zX=~%|xl~~4m-zg}7HS9msV}?OC5;oU_R;$M12)MygQaC4$oE1AKUcB+=t2I05m$Cu zdSoNEG?u@BM2xrC!X0g$_;q^%iS8xH+!AU-dwpsiM6&<^(Q84uLfXA*McK5QeBA_3 zOG`aW(dEbh!WPKUjtTS}lxQzhxAM1c_$a_j;PXGkOABG9iv4-9uSgH0_Yh zL}66^@QMq>0MoxGls1^I?z_{Tv1`o7)eY#IUzZq@;5;(LqUBQz804!5>m zcPr;3)nswx&VWMNjh417s9oOds2x+7v14jh=7pRjrwu0<>GbcX<348z#7lX5Pq=>fwxHnIW>PT+Ycwf-uILPdF)###*`<yoox%JQG8Osj_$LtK~4weM@_?>aso32_&#uY zSrnZwC0{f)>w@;Xec`E2r~~ra6^YJ@{@X5kQfF;0t9$(#BfD3fBnZ=765uxpvPRZc zKpvdr`w5^4U)TJnQ{MC+>3t$VBS~l%@r|xPOS^vOQy6kW0(7LG(Ls@RBclNFVIfsG zDLSl*B5D9bfp(D8X+Vz*_!OFTnlOLds+TkL4Wz)R@?^lQxBXq&6K_Bx;D#(0Nl7v> zLH^v4QlD4!oyDABQvL5)VNM;7z>K$`0{O!3hJa!1aYsu6g*H+ok?wIK9+RLCAp)oU%X`m=+9 z3w-e}>Rr6BpC-m`M$f+F`r`~@Zc(&(ZAiX8eqt$|E=aIeiN99KD61`iRWlG3%QD5# zu`6VlDcTx+pX}1o7j)XnA=t+~Aeh)PQ4#OB-bjy`X|_PGINgo`ba@5| zxf`w7m5d3S9Yk(vwMBxMmh+EU#jJ`ZjyePiycE~5Mgxul&nFm35!cW9M!sD^za@iR z)CqgNpUZh&u`*|bxV#r!lenij!Xa#0=lX^j(_Q9AdFfEO#RCla)M2b<37D&?=<4%N zmZ;93jP_xl#D&(dc#34IC2lo4ZNYC@sq4&C#zKOZZC+p+E|Z~PPO2=G%wK4t_36)c zfo%z?8q6yxQX$rs_0&}9q7CncQ}3{{lr=O6FzAFC`}z|bibp=`bypNgeu?^2oxsx( z`xQ^(!bPRsaW@{EPeaEL6`d&Co^fwLC^eoctfLCBHr^t+?if_2-tYxsV|S#56et^G zac{?2-P%I0u(7G6bTzQS=EfhFLxgfo%&401MOi=Z(`Z%ho9T56DtCri6EJ5#bfTYy zt!i}(7D;r2Z2CR{&4-QO!+U81Y;Wrw3z}BTRG>(F??+QlNt8UUPh)WOWnS#Kt3$CaPnD_*bLLB9Q{FzXZg!{oZa6i zb@|v54?oR^Y%r~4bEcYglfvXF^9Go2XRe4A7klYRK?66I_v&F`S$T)@Mh3mG?EMay z?3D<3`(uQBcq~iXghV8%$U)@Aa|m`GT?$@r6s^(62+R{)++S4^J3dr6>Y_#qSh5KE zhuvZU*Y;O5V@nO8(hRi{@u^n~wy{t}!86rm^21JJ;I5uxfdU5`Jese$e!gMP|IMP8 z(|2Pfe!jW0bDpfIZrp0yJNcO}*;Q-nbNY*AzDj?2XYh-pIy@Q*BR6ql8 z`OAe{`AaH1Y?ao!$!yXSJpH&f?%H{lK^nN}I*>^u{nj4`z+f6hXqMt!M0t_YPw1G9 z^pK&PaxlVq9FwH(K|0i?%=k!n#35-B4d!vAGw*q-(az3rM?Nt8IgQooZrF|_keR7t zs7F?ei9HBkaun-8h~#zxSRW6}i(dTcoDm<-v1{ZRKBCSMjnVHk+@e^H{0ejG!R`{|#gz(;G`U=PFYRn1B29L! zu&Ng$w>BY-82rhqJDexaf@Kj)>g^LfF(#rYy!f>*B9q#w_&)nj9tHbSeK_rd8BZ?9 zc;V+gZ@pVkhj_zdfp)%pb>cP%qNUBJl4qx0PRrM0d)&>PVFKG3pQP=vUkPe*v$W?d zMv8!XPQ)6n34B(nPQWqyW2J#+BWu@Y!#)Z^-GzC8E@fBcukZ*N4OPUa#Z%6*p3!)7 zC764)f4&;+dFj@eNg1B79lwO@O>-jU5yk_49T`Ha zfhUZ|v*2Mit7W)jk@PuHN+6@rbJ(tBcZusq&z-OnygHN>$I?n(QB zX^oFm$g#?uG*el`3VlbWS&(k(%sq9F0n4kp%&+3m)*~RPI0_W7i7NO}B^VpRa^;yF zbyN?bJJ|iW47`jq*qY%|b_`SR-fw0N9=Y+lcw&0u;aJNVL54YECZR)0qt-$wMVH}A zhHMu56!&g%-n?vL98+}Pfjx4D^4US;02_p9fV6{j){~Gm9n`Z|YkZ>+IghURoRp5f z9Utabku@(x!Ua?F0~i-Y^3GA>am-S8qFW!)QPlDu>l-PKC`rUQ6(PkguO^O8`Kqyz znv4fiIJV+V#)8$he#HCvzB-rbj7{5(8-Z131Y|h?T3W53-eiOp{Q9t(kA<8xq)%1K(-&)Hvdr83=Ce%dZM6zp zX&o90T7124aP$T(4r!=+sZL6SQ4Jwa-50v&_y*U41cZdQdJAwJb8%tW=)j{P*|{Y* z$6HkV&CLFYWWelF=_y%{G}Dap>j_p<@dFL0v}~vi_w5FL3Ccu8I08TqgPai6KFpYv9th zzHV7Ax735)OkU6(?o*ua$BD$xmWJi^Ql8RDh6pn#4tNx3;3OAbIYn~|5s{9n3<&pY1r$UqGD8sKHmd}Y|F_9Nx#(S@<}*(vo~1At|TU@~=KU*4L6wXuuH@&*W{m6GKD=nO?PW81%;l=Gm%jZL6PoJLj{)$v{ z{vJfJvK-A_Dki7n++-B;aHn23-sI!meS9O?qo1p|`Q}|k7;PXq@C5I-lkfiFo6;V8 zZ;;rro!~{VMRE6zFTHjxY3&CibH%TD&mME;*a6%9aD1WkL559Te8=bcYgdWkAcIc2 z$PzB4uCu3{Pmb-hj113(xTqA=n$^8r2P36(2=?!y5* z9ef(c955X`fdyaD2&Mn<(IRDT?=@}a{%Qg+MDS;zoI`4xU>x}(4fctp;fD0A*Dw25 zJWT~3b@dGUcb=!rC07O6-h7L7*2{gltR#mO;O#VQF~0RHFXMpd+1xrs%9pJ%T;~zx z2;Py6@sCQzmj%so%(HpC2@86sl4}zJPYHLTtrYQn5<6X%Z9WUe_Q&?!F z5bAATji7M$&?dQWP{t{#Aa8iXrOb%pZJ_!0EOOIHp6-SN(5v-)+=W*cIMnS5o#^<& zz#Z5d!+O;gnu8{Her4qnLHiF$s!0byFa7W_F+;hhPJg6i>LgKHK=qX^O)Q1mOn8^R z?kz8TjhXY91HCc|Yx(6Dgg-un82+w|I&8lydMZPptcAflk=Uda7@hKJLiu-D zA{1>|ufJqQEs1lU4Co-BI!%$)rsbVqD}NhU9#XTKD4_qS{O~k^q&hBr7q!h|Ypr9x zyK}cDYwUY)FjnRQ7nBZQQefgz^;~K-#DoA-Atuviz)zier%iI?S9*>KO3X-$%#VJu zDP=?Jw3ZQ_<<%9j0X|N)k0U@)^X{}ETBA*{fV#n!l9VWYdN8JmWp}tslZ2I!6{(^2kDL$u z>MTDJLBGH0rjmrDEhOv)d*JuZqrVGCQMNo7cLW#JiLcO=ku5I9BtYy&+ot5l29y_EaFIpG!FqepbkxJk0P(2W{n4QH zuR9F8NI>l)8UGgfQ!D=M0}4x0deiIyT3=q?Vw{G)?+_`+ChbBUW$#@joyie_eJVQo z3ySH3Cr$MpdtnXfeHNnj_KMa1u$YX_Cq5vw%!5nIzQCFT?T9*0H<(G^vEv%t;hMhw zz9f_FwfTV)h5m!-??bYg&ye6BsLsO5T? zb9;vpSro9YNV`W1cs)Xc?(drLrxxP4w>ZX%U?%PC5hQ`k8xn$wSC z*tK!tZ~(`#6PPbJenxg)5pn;lZ)oD~-KD+c8E+~JHT45|HM5Yo;?{}mJS zA;84*l)LH1sE0{a<$SH_rB18&RmE0+Z2#!VB}HQGOraCxcsZgsfmi+Q+m7>%?xki@ zdX@JMY)s6pZ3_>wa{1?7hPUFB}*Tfu<`MQJ;_pj zzC862DN)QW8EWwMx6iY|rgifQc%(YIoBXBt`pwwOKlkoPwFnhhe^xa+w8ABhho9)< zdVcrr)13jnAA4h8GZX@^tI5BzJs5|Vb8MKZ{EFcd8W8>_#T(Tjkzr-Eynoo@BfxhCd=P-2L#x+Ymg>u)_Y?7>A3?~ z)2c*E@ACK#_y6{x=Bpzl0@pdU^=vAzox>|#z1}EDIb-WS5=rXMVo#3|vpyefm+HEo zqZdLN1|uAfxZ6XiB2GI>RL8TCLjCV^?fq8BGn@Up$c(xhk64^mC`hWB8B3CtJiR9) z#hn0RIVxjyM6R04FZx zW%*)<@GrW??8~U*;Ptt63D_-eety1H*6e8lds_v&x&As)=91^B8q)ejWL~!7nZ6@m zYvUCs7Nk88NK>%~?mue0j}SgF_#xmffRgoLY8hmE0|j}PQ&Y~Z%GhwrA$Eah;9W77 zVTrI%T)+jn(SGDvZ8Ag4l`sT0`9LOyYaD$@j z!;E@+2f?cxuMSu*@7OTUXuo(vOk!aSlGD|?P)SJNt5>^K$B~V@?R#qtDMg<$?F;xl zACMngSr%G=gNrY6Zk#A@dzTQ;!Q>sA7)#lYwbcdJ$U7`Ji_0EAn$iwzyI4y^5MCRv zIT_x7QQ>og-(A22Bysr6g3iPS-A4og_AcMgXh$3BqsBA-wy@w1X#{|zOeQu5wdm(L>08P$18`6n?J>;siq<@O zY`&qk*yt8HYcJ=MW_WiM=Q)exznxU_~qbcqY5O!=|tlZVpOlL z<=(N&YkWi&sSSfA+>Vy=4vaQnpmCIoUuL4 zE??`T6f?SBWmB8g;)bszsyFTqe5iCE#Pn6n(7RC3$lVgzzF1PgPV4ANs)VYE0<#a> zQ@hz>i^T$-Y=vz8HWK!uV|jP(fZKKNoTgoSuusy4{!6pz4%@OJx0NF?grob0#v>EQ z<^!?b2|v_XNc)a}+!?5~>B{xRNy>D3&0HSH{g-tZFf2s7n3;TDd!UAT$Cvxh}WUUB%!43*%54x}W~B(UaoTLLSrB*0FX zR?VuJeZa@tvd1J%D&uPj$69hs|LVF3tJ$@&n+?eM?bem=-8e2nOXY!oiJK)1tcB`r z)CV7vP~co-6$t1p_6C?tJ?y#!z`5Y?;+Y#P`aGwh<^Jg**(e>drhQAC_cErSq?rT` zaxeQ~v)$9p-%@8?Icu%FPxa%T(=TVu+e^p-M|@M~^~cT?zeM`%*PR})waDE49zM+) zXr$GsO}!iX@QU^b_nwW?ZFo>i8~p7xgN{%L%@1ggq{pe+Z#0M88+E3L9gW;m3pw4!sKRL4!sZJu7*eWr)+}a4o5{nv@6n0Z%f4k45)xaXYu&s@ zj-E{v5IDAVsbKIm(=y^4R;6V0U#T6T$X(uUp<3xiuyr-G0DU>p0{VGRpzTugIj&R% zNs4!m0s`*Vxxx1dc}E)~t?(NIgU2P%A;;7Tl~lC;i>pT)8F9g(B#aRiopa-FB?-I(kL3|PV99ty^ik$79ntUQt2WC#$ z>swiMrTcWMXJ;!c7KAJ(O}Lhk2aO@0sKVDa3;YzWnx&RA%2w@+Q>Ll6BJBQCMyIRHnv}|4gJK?LGJH9 zKVHsem>DxVswPA$D_2umcp=F5puAdbl|2LDhli@owTp4lv(wA)d-GR0LI!O)50oAy z?LAg$-CHUK*o9F!ON`mg6=~gVLlq+ie0r0k4Z>|JcUv2)qZ{HWo!Rg$IQy{AYrBW; zT8k)c*p6UcaQVf`c9wPn|F$~Z>^F}VfKaB6>Fin%-sjmgwBN2~H(G7C3b)*Bfy7nK z7QN%3Y5tz4$>VekZk{jOg)+L}k&T|dl2v)ASgYv0OE`q98e(t053@QO>;B#_`S3YF zQj*+SOWorwlKeEOCvx-x+6>dn+h}g-Y>ElwQOoi~`H=>KPJOEE zG(5AY>Lxj?CohkGy{X}!M6bGin3%2ld63`4YCR1Bi;Bi-xo3-Lx_=ZdTy-6?B8u5% zqOeQj)y~a9s@%JjC1Q2eT}1Me^}G?^>XXW;CB2k(!M&Xs_qT*(nt$PODHJPCEYC{B1m^5Ee!%ncS=d8 zAl+Tk-Q6JF-7x!ppZj*c%J8d&$)h#>je4b{JS_U3wAqs zypF#`$UTb7EC};TbQ~3but`~4DTS?5l}WL93^kvVVirbh1Qc&o55J>Poq82Jc~vJ4 zhjo6phqkWRd|Chd-WqS(DJ`so<?Yxi?hI(7!n^_hmX>1CZIDXQ%=L}Q4C!AmE(4Rv@lW;U9!&8aL5ithdJ&1FW9E{mQ;%tT%*XBz-Pc20)$v*v; zv?D5r4d$($P4u`3ekE)*u_e7&^|OnKiaRWa5fHLzl_KR?9e6LR zkNo(KvrA~{;KX!Me7VIaO^1@Q-V_IkP1i!e-9o>=#1ogjnn=BAj*KH=ryt|> zewS_8^HFyD`e04kS>h61I*Z)&7u9C%2TxR|Y+W+IV=?P4c%F^)`u4M>OS_9kb0p2T zt7%0M{fb)dxF? z_KDa*8;Viug6(JP2Sg#x5jJuB=DG>i>h5I2=g@V*FB>V=as0N_i}XHo&)~olT>(>f ztMLuN&G39B?R?dHR$uxyaL_m|^N6Kt>zh#5=a_L1_CAxO4_K%U5+!H0I}_+-91gs8 zTc{rVk+B97CTo~C!JbhKsG;izPk3+RxJhd>^5JG$hA(fvnL%d1llpm^`XTI$Kh65Q z9RnGTz?idHVYJ#migW)V$Lxp^FmGJDfvKa_WvOv$+4eM%iqo-OR3nb2b&iu-gYfBZ zd>?=QLFAF84(1__?@cAE!%)M|M&A_Bx^*+!RGVHva#NUGhF+S;X>$$T`~t&QCl+%= zBCGMTtJ~FEMHTaeeG)LkUnxlaW;lih-OfdInjJlaj{Bbsoz@SjJS|`9RnEVg>F{qr zBG5NaA=KYiGu^#kF=4ctM zp!BIT(BqE7t_k1Eth#adom2|f3-55(;QsTyS@n#JjOBGBXUTHKPq-EWbse2Px$c~M zt|*<)+hpcmo?l`*XaENxf48&Rk?w9L6i)f8hONjN`C>;F4`&4srFF!}48+PS(nc#3sgOGN(Mclh) zqV>rSW6ms8AK?}FhG}X(7E4%ia-0gOg3?A)mI#QkcSQc*B z$q#LbmI+`+wJ{9ihN~`K6}E!lh*-kN_S59v;R8ciwdUZ%KU*k%w+L#o|NH-8p@=$f ztXJ}5(eAhuLVv#Z4hL@q!-nqs&-g97G4lWEtI0KD$`y=(UzNe*E*taag`Ih>9V;qA zQgxFG)9-xo8=c`nnyBC@xREs!A=GO`>wtc5WZO_t2DfCH+~IBz6p&I=#bpUb>8=>> z6Wm15gHhs!BC0=rOZTwk4uS*w^Kj;gj8tZW;LCjeTs`=%YvSkZzZYk?R-x3h2?{&Mq4% zG*SoNzrfhf1=@>sNU2!DU&&Iuck%L5$}() zn9Dw`8Qh<=9aUTFQyXl(IA%4I*kctjB;Q}kzxmlH+!nD*OH4(TWo>8ImJx;_uBrJH z1%=_cKocY_jRNmSyyhibGIGe**s_#`D~XfH$2{g~IZ=)pU2G)U=`A26(#>-`dhXS+ z3Z^o3icZKyBNetn(m6m6gnxx+5W+V+;=YS1VjRwZZ|TEpY`oVV^}EVIV|>7h(A7J zuaX`_|B$<|3WF?iayi?+W_n*ZT&))Em8%Ym7E@8}RdyP~svr6!vl!1*q|+;v1Uu+II{RP-`fLjIzI5|`aZ#Cg4Nd1QqNQm+^9_&9XgJHy_v!S z_qK|y%=~k-`6yW*LE^d%%U+dvBObdS@wJP@&(^=|(^)877|id1?j}Vp*7BzIZ@T&y zuFMaED#VPe*feJZjtx?xy9PlnG z-qxX`{Q@Ed)Ube;wH#3qL2bD@+>~w)U0^_h(bxm}d70y*O-7pH=^NL4as(t>Y}J`z zxQ&$tFIEKn7EE_1!n}+q>&p|Ne2|d4yb6yqV=r-2#gVWo(Tc}s zgjwyrmY8Y6>UYTlZ$Im&odURVw9pdoPs)i8rUacT#yVvwsxSy`*rSWaH!_Y5*}Hsq z%#Cr;9U}v|UE!3$(j1F^i#Z6XeBuDaZLaNxnSH>Ytq3jHvQc@OZwP(URkhzp9)&$V63~!shjCH7LL(rifvq|eYCuZnxDvBxA#HX&o%Ld|%iXEj$hmx4;vVY~-k_`ohhweJ*S*+68A)j; zBHF41zwxPD<~bCpOzJ;`RYYCr4d#Yn@t9LQ^L+WN?hpym?D46wV`r5g_gh)R4~_t- zSw-Xx0M|Yrw)P?p7FBP~L+AD5m);peZ&P-DQawJ|?P2Mr)Z|7}egFA1SWok0XAQf! z+}u)Ykq@479;%*ujO&~8#h7O4LZn}A!pA)u;%IWnhbeax}Ry&USvu+es=+?zL zN)`_@)Ms3IE3-QZc@OCMNHqx6!Hq$@5-YJ4xQZ5b;<_PhPzu!DR!N{~?bz?m7ETSB zx0OJYYd*Wy!#!FUctT^#%wocuxT`6%a3H&^ZEJS`qc_6tAh+P^f-}o-U$R0#YYg47 zr#Sb9Pv`djJ;-nfbs48I3e2VnznU124`Ak`^A>4YrmX-q&`%vSksl1}NZtcUDLYxe zFi)zO+8I_!;^m{B>RekKCii^6jQ&mR&5c)7yNwr$D*2nnY|<%%GJCB0gOU&#elvo) zjqfg`?Dn$EO1`oMb$l}lz74%KFubFD7j!#GBhu!ZhG0$k*` zqCskD8k!%2xfr7}g!rPZcN)`*_da5?6e0*pn=DSA-KZ}Y$(yL@?ndz-GYN^{h=A_q zm{Yg5B#H{*=WMm&RlZuiT{|eOgMmzyHmt!|bhtSK?4FJ37Ie2b_nCMV+#%)8f{lWm zeFqz~Br=UPU)t97Pv9zod3rI9gFdn*_n)R&m3-3at}*qmOs{;z>POEqWn%Vmdh@I8 z^wnzygYT&nVraHKbSb%|%}p3Pv%ug@2F`kL_eqwt&HB5mvf2Qx+i1w@Y$Z^blu`)Z zV`Vm+n&O)#P`H=_yjVBfigLDT?x1E5*S3j6?1I!9(A{}V*({6g$pUkogsA~~Vw6lA8TgA^H5ZoBMot|{`#523O zU^IvLzQ_Hr@$AR5*8Gzs{msTMv0>W_2!QSJwwN3s+#rw#$51P-qoi}s*gkz>@rKYCHC|%syI>TbQKISt4ES`5t9gZOrfhdaz@lZuEo!Q!2?Sgr(KzOq zZwLyQJ(E8f0=1ebqJO?GudF2EMdGeSQ{Qol)7!GgWNIADq;B=~ui4;#jOPVX0+ZX6 z@U2!vfR^Jz7fklSMND-XjgWqsl;RACSpdTM2pclYR)Ub9zWA|fBiVf0-AZaX=_a?) zRoiuRqP@r)W+t#__|^c5aV`R7%96=K_+|rix4E*bcm;>fs`>O045W2sH7J4dcOvrp1BP1 z;ws&Ru53$#RK$3_rtM0=9mC>ktmIgylI){3aG%c{T&G>J!7XzdRW2l)_AWIu6TYy} z5*e-hR%j21J1wZs@%e_6k>I4`X{_g(u-SSq|dD^E)MQX)ZtS z>dm$sxP^(WG|cbtoR?20{o-EK^$SU$o^HzWRcH7TDMrm_1-Z92^p__t?XX?bp zSR*T%J%$-~>zj0*{S?1}7$9|3WG=|?ma2;!Vqa1434*IHal?7VOAF1Aeww-Z51mB# zUc9Z#W35jBYTD+T$R=>9WR0E-bq_TS1NzsJiyL#^JM`lq?5D4$mIsaT_@CSV=EG;w z^5t=v-+R^ClDypYYEU%mC$5}#`;wm63zX;@qZFj~t6CG9`CV;YsRA$s1z^Nx`57^d zG4Pm}B4E_PX!kg8@$PdhsFxdxO$P1b%BfUi(cSe$T^sW$)_(A3or0&H-y+AbALu>+*{Z`n0{s=R0MEwX#O{fVF7KpEsy{sdwg;Wuo9}xy4A#BJ zH_qF>>u`=%1AyDl)c3Ekeu$WqFjrkVk55DT0Wi+8?@!UlmJpzG4RzXn8NQ9{aV$2j zp4NN`BKGjCZp+aSA10?>QFI5vjPd)qS+vKtgKMD|?L3pJ_x1yGHx0~y^k1IFQtgtG z8_w)mj14==u`BxaH!SWz6*&OZ&O%v-7Rv3P))qf`%cp@L|DvQ7ZzU=t$fm5OQS*Y$ zZ4jno;O3malYpCJ){7_XN*^|k6$4AhrLMY%R9PP1wSetBn3DZ{?-XAZ-(YJ;PjQ@m zm4s{WAz*-~wKySBnwQT3X8a!PzgATDd>ad5T|t8c^r~Od`$Zvd2V#w$)(#E>Jc`na|mK&hrE=65reMH2Ug%bRO3Tr$pqAV}dw>0)0{Fiw5<@9R>VldIYB z2yp(g$I)La4XgQ#(A53gU*V`;C2)Oyglfk2VL%3|5kfKf=ZC8ZWi*U0nLFT6mnW&t z`HB5O!BKQ=kvkXNPdoo3bFSV%lRwCdCc3@-oj+H&t zaY~7I34Po;RP(5LvxMC@Z*JS628%dL?_=HNO>3?nEkNnZOG)CgZcQ-WH+@5_k-5HF z3KtroX&brjz)w?rCxh1UHK#xp#2hPjhg)5TGfY;UYjDa*C91hq&cw30$2Te6Wp4mi(V@9VyH zm=f;pI3nLO-kv!oA66ExF$Ic=Li^94be7K^n|tPaBzCfqm>;J}|4MoT8;HZt{}IbX zg9kmF>qe184t}17V1CH#Yajnfk{3KE-j>E9vu~{VQ^@mQP3@Jnwhl{G!p@xxM`F_R zwMl1xyBxGAB%#>tQk#aB87}g_+FPcWCi`g=5Pkk`K&H@>k3}D$$UzAIBhUFW|KAFC z7tOCF#}sLqcczVtcMA|q-scr0J^ha+_?1%COVq}O8MyJZ_S?6i)23{><0|J9uui=e z)7rwfM7gC?mdYr{hgGpg8QE&DoNML8Fdmy<v@$y^ z9Nc390%Qmf*t&XqCEVR%fM(S9c1LjACOFt%ShfPYXuuWY)f*mWdWTTTE4z!sw*7;~ zSW5a=KHfghua@MjFAmEcptYWVE;Srul0uW+fQ7Ku@!*9JcPKJ48lKE*t%h|3JU9lz zi9)0U$}{v!dAwWa>t~F1qwDF2)m!o+tw$c+u2`hM5v*$HlLJXSX%U9Sxydwo(U^>s?U$vfIZN!)RGo-4)!u+PR_~ppG@y zn=5PQYdModSkvNonf$jG;IBUV`+l4P9oydC-o(=KYfwwIO5g{@`NpN83 zVAD*YqnoxzO?+0tJJaI(RmLUqsFIw(a@Ly5gShxE`k&rl&xq5qO?>Q*menZSdHBvzb4pa-a9FX|=tNWCt(Q#3!evC5~lSYgt&pSXfxV%VKrD zRRP9zG>LDtlCrql(&bMLnL$J`u0eevn~Wl;t{N79MUt1F!efi_Rmg2=qiBzt#b_>y z`W1t>+B~((yz16VI#Oxf=F}FII(M8oKHlXGGXLgO{&zHaGr!BS)dFs%YvNe!5!EZn z8Dqt?4l@WKIz3~AT}|J5pWzH7arqqKylk0o#d$q0McvbTG(uYh3n4LJY3p-&Tl}=p za-U9H15Vsk3(d87(CeJ(9W1+o5o+OdW5F@ZYKOE*P*_(>qA<9*b39@O zyXb^aV6YHQc-$hG$vE3>T2JJ>3-@@GcGrq9{DeYxneNz=EC~kUe*e|l#zsu&o(lM9 zwbL>OFSi{h#G<@yD=OZz18S$=qpkF_+Xq@ei)BosB|hPQ)&cwJ`LrB9J{KDi`uBtc zdbMQN(Uf{)zok9iCNr3eDyOSD2t;l$8S*73ZTT=}cE!MmJBS3UZs3f}0|r- zqa7m-DS}^CikvpP#=(RanW|SrPq+|YhTioNsaN}ArdsIxT6&4Q(reuprUs$Cmik*o zFfGC`3(xua)3c%BsfMN|{oB=u7LmtT1i>i^m~aqb;hT)iYAipD-O-zyyPL-LJgWx! zZYLztWWM3ND#rv<`-<0|CFE@@L@L-51wvjwVZzWzKTaHnVLS~*`~Wv1N7CB1*=>>j zvhn^?*|hVDlgqiN&G74qDP8|YA@N6lLI{?$S6UG0Vhr!zBpZzher!p@DxedtB6T%R5ozCU+=?GS6u4jpR&W zv~HW3rCpQJFe4?}z$fF|jb=x4 zCTUBu0XxWt&RjQV?g+Sl2=zlMqLG~;JzI0 z-pCa-jnBW9@QE=E`O#mK^tR*v_}?8Qf9#Z^V?R1F3r~tS+WT+4Dih9b8u3x?G}}b0 zO}mPnoLq^6(moF~7b*V6qHHSyA8QjqsHSr@g8^3=6w~xR+^?yDjTm?~MDX8G-h40j zCy`vxbQ4pKeS8gkHVnLb29Qq4q+7RuydhVR=oUdb+bWm(ktSv9VDz0_ZlY_pVOL6s z6c}C0?Iiv$p%-uf^8{M-*??@7)5UzbbQg`s@#&9|ODdCJDYJtjFbrhAb{L7b?=d!B zCWYht3Z;#tzA5PV`6P&$<`Ww5Qqz+6g)J9rsjY|J3L?sfhK!qw{es|UwCB|7nU*4o3SazRO6>A&(g?Q~KWR{y4-3)nZ$ zDREH{ws&@xmzNm~OVjOo2R%mncScjZ?{>CDF0e8qzMEhjUi5iW*^jSd z8Y%=2W*r#X1bA3O#B{BPu`~=iejn){6}8bL@2?p+z>5OdP`U6eGs)Z~N-boZHdg;; z^1;A)#l3ei25iL>)8gzhh$G-51ZkR{$n1BeT1c5yqo>zbOHP7KU+8~l>;1iad!0F1 zT(A;6n1;|_X7h%u^IY}bk%!6(fQ>{98;?dFKr(_fXLc)utY_qx6P%sdJAJwp1zbby z@oP2`5IHPj5*A9xMSN7DhVHY%t)Zc@w7pI9p)}o;_YTH{m?XGl z@rhry;Tw}F&7g^7nBp5#TF4#&PANL;FpE2b;>~LlNxH9^AJcXE9wqc(cPYsZF{G%# zCj7*<` z#QgrZh||rrFffe64q2#&hQNUYJ4Mih*Nx;MY$;DA6^ME?d&Npux(txht>OOXy;2%< z2ak(}P05h<-o-zlp(=hd^=GG#t?`k<3?a!(6Q)p$+tHOW_?ZU)%_y7)F@EEH04E^_ zQOn3)jDYa5&!2eix%XtXV^DzncYoDmO^qPqV;Tr#4XM2I8mxw=9KY!1uQh*$!uCxo zOrdrBFA@URB!qL;CnASpf?dBy}sK$ePCvSM90hVQ2W!rcxp*q?o>6EH499 z?Y(2FPvN;(ZJ1c(XkUQkStLG;nfPB~FGx2HW)L1I4^ zK^}lE>2dN?BlMqJtXoaXx8aqvVjS^kd>I{S%iD&KFSYpu9H>RV+@_ErUwF#}Tu!$` z)IWSMDO5@~nPi6_aDP0%&&GcFHW~2;z&Z1#Bml&xQ8P*izAGN))p*qG zA3ML_e9rVQVWzyaY9%A&#l>g5_2pvhLr4vYfr6c7AuUhCdltt=pccX@o2Kx(=j&X5 z5%QvcdopzI2JX3U4l@<-WQv_Df}CEdsd9JJ@(}rRQa%`B;;}^jM;m^>R7AXP---q{ z)FHW??wT@LRMb8OPV(ZU*kiE@d5_HUsG0)UyS$>)c)H=AY~MBmiu)#}rb3`ECopio zah`#OMjX6P9T9_sy8WX}?NfqKOXv9F0va)CMYP&A!*q2U2DNm(HhMBrgtMO_Gacxt zIk5-rWD%ouY7+!V@n{*(I+xl?QkJ)J3y^QFkV>yQh*-zA#k)_QX93*D%<`;fWvvMJ z_i_>632?s@avdHnRS2g-ixTKfdR=@0rt=4`!86a*ET*#O%UCobV+m`SQBAAMeNB)-+DL z*ks=}&9Iin^WKij3OvlduGiw9!w=)dv=gk+w&4Vc=_8t6CCe5yu#!`8h>P0U(DNR! zeV=l5`o*e;7U*c9@1>(9cSrgbz<72i>REP$`B&!$H+at_Bq{>dkx}-0Yi9v7E%`Jp z+~B1axQF)_A81BrYEKul%Qi!%?k=f_SA}MMK-035sZ8DvGNRQ{o!IYPjo&Cz^k@mj zM&j0|K9~>+;1AfsO_kPaFEfcdqCJ{td<$rbSJ@ol1J~hG;y&ylC3oc_=`ZQ^iS&6l z?WhXZKHkvm3KGR!evziN_6-2OdUrDyhXAc7RP39U*kZAsaCzw)6O4lFyulH0xxwMu z7g}6=aVR>piyy(PkBxy?yF3>;iN&@d#-3uPa>?H(aTtxhmQ>{I-GqaLL?*!A1e_Pm zU%j*A8{`Y~YO*MZ04^8$4n{;fTIoSIG!oW~FWW=~Ld1HNw?itI8V6b!QU8FqPmKSQ zn8E$fOHfir_LU$$tq#bJUp ztyG{AEFYmy7r4MgMd6O_>3M@PvcE@n_3;lL%50reevIucnHIr83ct}YtjLLQCd3h+ zk;C>c45T>UUkC-PIdYwm%Jd}&hjicn$QZ)=VxTj~A7in5=Ifg)P4@3JJ@Ail^q{9o;MVNL?=K!jde4Zi&}15hK-$;b`f&nW+LeXNnK zT6G>cZ!FWfyvO3W)Boa|F0X+9Wk}9nJp~*gsj!z_5@10g0NX0c{^B9;aEu{CV#-XT zQ5DS2C;G#DeC;!;C4t~-oM=8F16ZrVLwivl^ZjFD(#hhx&lmJWMOxzL-jZWUJ>?FS zGAqY-JE`Oba{i*LtD!h zCT}1K)+&>7Z}*D^VN7H>&cdfzb`Pku@S>tt;bbKGkoJBqg$o@oM49pV#yI})dxidN znx0_4=A;~Kg;Pw^eD(Ov>4VDK8FQwxGVulGNXbFP{-&@4A0NXwjmp|MP zc)|q_XaWQRb%P>}P{0u?_f-e^M_*W7|53MEuI+wgQSOOKjl6BSz8a>eot>M0Ozu0y z-8Cd|k5i2i_9dwf3DI%^v9l2q2J*e9HQXv!_12GUUZ3q%iHM^q zETIdO*cOpAhF8K0SM#67ov6s>*BGo1&qfo@D?)ZetzuW|tPq+eL&lcU+0e4)jfYX3 z1b9S>J^q+|Tlh`3knrjjrr_+7PVikJCmX%AaO=KW`8nE`c{z0$lg_wsi?{#)Z_;Lp zghccn?Y_rB(0@Cn7$aEu(bM6o4SPy4I(4>25i;Y8SvMxiMj0bmq3s36Q_M0c4C(0h zL6slH-vrgJPO#Opf-qmi$lLlpW1vJMf`2;#_pm^J0G#CO9~tVTsIu%TD7L9LM!Wu2 z^PE@{=xk85u^f`{E{DzOte^@Su_rc%0Py4q((ar&OMps7u&`c7w%fWS{(@8gz_I(oT?4a&nc@0oOq~C^DE$R96i6&Bs%F zEBFJW(LEdip2E0A`!sYIyo||dSNO5`gA3l1?z(r5G*R}s1dR{KydC^shntey_3;Cl zj{WR7&)xj9G(GOoq>HXE8Lfi|TA#hJ{OkdN6OcAAolNfeX8t)SosnN0(@LAyAq`po zt=2DkF|H7tKQW^uE)yNQ%5wgfRgq{4@RIGA=q1}iMrSo?91O+vi_0K4@eKtQ0PpsuE>{JLEzPQrlqN;p}G4n?u3B=DEq5x zSRSekx|f-+-NfPXAVILOXUKrYm7}DT1}M|OC;ZBO0B8NVplOI~4+I;L$@I*!yBo-Rh-1pQPye0hNpaBgLIsErQIpsB$#NS`M-YIMe>o`of zd$v2rr!r&N`W!fm`IOjnS4;HS%`OXV2+l&vyVt-l7Z5g9_UytjvLWo2~^no3}C zaW%vxyF{$*?V~@wMy%kjg|OfQoBpMwiUKeI9=#0@)7($ne5I+=4T9vcXTu8eCXV3-zK+NI0B)py1M$;p!V#>{cu`qgv%u~P6BCJ zRDSsbAYP^7aIb1=Yg$Lke*E5ooe}pQx?kpWT*n0r#pdXjRouxhjf~#0@d?4)d{{u% zoZ#3!>V=rJwZHlC1J|JS#~!Y@sXGwM(tmYeY}|Y^O*mtTiFyxfzx?4;wH%gy`~$Vz zOz3gup64P`pC&ntCI}GnC5|saBpG_INwrxB1F`?XVsoFR(!!FK$FccBzY?UQu@oMk z;7(uU?2GH7S9@<0{*9`~I+1qor1^n@M?^%#P2=1EKzfF{)(i7IsbTCVUI5JkIusN` zZ3A~dj}hkSGEQN!>WeVed$AJMWopFe2&ma5R2!zX3DUWqyDHK(5XA*>ATU&l34apO zEJmL*9s<jRzJ_K)yhw}C|4a$RxoC>x!C zjo{(d2$PrBb!FUnaCuWs0C~O2*v%JsA@Wxbb!vag%`9rw0<0O9g zN__BjC;4!5XqmIzBW3sq2MU5Z%&=O4`U`&KBck3FNj-Fj^w>W_h_JsU>%>%;_l39| zyV~>vK)`hGDS>njNVpBqwSy*lLlRmZcp}~LKxSP6oE}Kti$?q$41V9(WIv7>B@2SM z0ToJvvd*9-n{I5iH(ts+(%?`9 zXvak_0xy|(N_j9}HT+%~Rd5z-1o+yB#RD5H-yht>ELw^Ped55t(C|5s)0^%bU_wJf z2{^4&6}yAd!A}v^ku@3U^P1FIe=CMz3^6@B7194p1oFgmEDO+j5WLigMoH>W=vOy> zIa@;1l`d#Wu0e$&qp=Z#BJB=gv@_Th`z7lr$grYK;Y_zD34Bn=7qOFPsY4BDI+T|^ zh#vLu_pzMSj7oG`_Y9y=F#QQ=rb|f|6H-dd8y!hGMR^uwA&_GCJy-JtC|VSTYU~MB z`+@-VdfJfIUZ=(Yi=S4ec7KZNjr06E!>@|*nobQyaCVC6uuN2u@&NlbRNycZ42`gBhS`3_yI+DOYYba9}6eDiMvD*5)`j{k|82()XB zjk7~ZpsoT3Xan_#9YcS~X8`pEq7+pUjt8Y&_12_F@54~}&;FboJi`RVz~M-6&>ns0A%C}s z{%y<$@N#4;rx%f;?I$%$V0d9bdMtFxBg53ff6+Gpy`e<^3uHF;f+}u6?@{IXZ^dv6 zqFE^<{1I?LYYk?+`B8=Zq$hbm@%H=i%#WPHJ*1*c&tCT9()^@_^@~;)=Nz8s0Bt0M zhfDzlkZ~yK1C75#xw;0M4FbBO=P@r%YnP-W~MX)1+A{al!X==laEyo-re3s z@=;)ejX`R@O_=l)*U>m3!b&N+izUN(9H zO~BzuQNPi#xwyExdV0h`_WktfQ|8a>N0;|b-3LXIwim* zb#s-D@a>L^>3RnY!CcOd!ZfKp)!PVg-HuAS*Q$G9o3LE~Y=^>prQ9yb0&p419EGh* zMNx-SKF@-0DV~P9k-=J5rHN~cz2UcJs_oSrQq-C-N=}oy0nly#N=g|(U6bm|gy9ZM zaGFxYWY?@j0`3W5%4e2duW3)-+w9(8B?@0>97(w+IM3ZLg{~HPdBUR`2Ocz9j3RfW zWY2!l+tqjmUFa=ypmgPoe@x_YB!w`29Fq(tdW{W-gz=5$>Sh5%+5Zh;0cuPo-J~r^ z5Sp3NzOr^86_fq#kI6yV=nx}i-^}zD6aDM)oPOS~?zAg9JLGT>C;odj%U3;sQJ||M z5xO|t2;zK~J|JFJ%E?bNNK(6j@%&pBb6R{0T z4W5cIMX((`^iH^6ZD2wOaRVl7>H6NF;bh!LSvK2-ai0}QTi`bBrytEm{le8Gd!dNf zF+=b@sLa>B^ZuGbwbF5c#LX2uvfSfinbmNAOUUVS>X%d}@#A;KVEPl!4whV}U^f!r z!-VEKD@5B+WLNQnr9Uv#W|!FW`o#EjU{%`~U^ezWf49_k}zU$yOeXXvvK6L6w((1)q}ERw+@|eV!+_o zHMKM01T26h64!YpG=dQ4w70e~{h8rs8UU}QRe0n;2`}(cXXFTL;&&UZ-cskE^=_wK zc)}*WX^CHz$Yn~bPynwLSlNOsKwOV&;ia~KIx(|dcOrf{y;Sy4@|ez52Xm_avHMD$ z2err5BS5;~qhInkVxAs?m(mpQ2Pr`TMzMW(n#b)+>!+kG?zA3GSe6`Yslc8?l#iFM z#^513R(?em8l4O2+j+&CjTUQ7HtV&-ISlu{yN@C)7TP|g&0p7kx9&YzT-h#6N#Ss# zH~=8UBsb3@Y6Cdl3_()59wTJlh77T62GdS^;{#DG)pb)$I~T!lx! z1{ZVL?;erWD^OW`wOkqB0E|*k* zAAaea>O3RGocBl3p9O6^^ZNY)G1t#t2PcsMvo}w%G2KiSIR5Gd)2suB<7Xzw`=~Teiz`lUJy)r4r+5sveK<#MpeUHCXN=tye z_-_SYsIPD1u;qq!ICFx(&;4%A2-N05VP9w_UIPu_EHcW^9W)mJbfSV{tRd~9Raqer zG9>vv`$M||m{^{nK$z$qFx2<|;cd0@cu}2UVxU$;tw<#Eo#n~Rg&XR>DkeGY9el5` zsws0|P~kGb#0b4)+{Ktc-Yh@#Hew7=bZLACrK2&?tlGLLX;I38v%$|t&Zh)G+^Vr7?O2lq$ zG-j+83m%@O`Ujr0eWx^qJ}!5;8a8WUuK1ktHw83t@$)ZKyWer+qWIwEG0Faakz{Y( zC39yv0h3?it(Cu@L7Exp39HuKy_MuF5K`B+oQqBKy(~-%b9NtSZBRX3xmwf<`6&O@ zEi5D-pyCFo!~<#v58>r6{O!7|;?Uf@w@NUaRW< zuk1Qkr)Qv;1`2u`>^IHtX0qEXK8mGaH47mI6O0C~utbVI&N=Sk~SAhrj~E+ zmnxrp%`?KVw^1+XAp7ZJ7sZwC)cX?oMgmq?*$Qi(AdO+zG7pGLIlP~-AUYfC3@&#+ z6M;mE*ZR=jM06YCRYc~Rx4*Q5q$-G|_A_s)G&xKFT~OT_CGp_}P~-HXTVra~8qi^( zNI-G{0ZO$wqM=-!%I$1DW0wBMid|#V3J{}E3~M{Z9oID{O~Q~ zTrs=5Cz-$D-VDVPuO2~g7R+PY7x)SAF~D0;-S7*BW;F$`dga1F34~+OVV`uf&II8j zt6XzO2O>t}jJTq^oo8((0bjk_wEM^UNUL&e(~bSF$*T{&I*!rjOIB6j0xv~Agw1Z( zJ-PW(g9?w1P=&iT#Fi@$G@H-agSuAJYj8+q`UO_1Zl=WPvlb#%b>e47+TfKBCr3YK z*`^3)8AJ@HaG5v!lJbaos;W&e_Y>C%0#9L@pNW6MyG4KlIzvLoD~0ME-?%%Oe^9e3 z<A(feDBkCoouG$kC{t;5#b=Spa2u_qv{$JSuuE+c?qWG6O+d)k!#Ik?i2xkY za=mh9*Or;tvw0yhMYRfK(19JCbc?;u*x;Ivm zbxC>Zeizb?hi4*=H9-p~pKa}*fK@|;uzmQpiuu9qM=)2jmBvz;y|p06OXG4y<>mD? zUV!_IZ-UHHKLLyk4PG?qzKsjZEKWJV_MU*SLw5k+_b-s5;ctQ$Wq;W_!C!ZJzyjDh z=A#_Z^zqeBZL@t#IBe6bucae;AuUEzo&<>2GvAOzW(|L$CFpI>Vb{6&K669#Nb+WW z$=I?syo~qyJ5+->Z)g}+wB!x^r(H6W_00%5MO61tgDVHy>-orMTtV{~XcATRGIn*} z0%CFq_L_ohLH(25^6HS9ZMV?pW0UV)ZtOl@gZtTWgQp>}!{m~~CUqGow*04e2{oHc zl5e0^24q>1Hv&PRnZx>@vTM+p*`im~93E(GV0N20F%m-oO^oZ~^XT);mzQvE+dB-;URX$L&_Y)5W^|;F=NSkY>tEdV4-M;_ zxZJ=#sC=xIPY0N<%8ETTORamMXQ6Q#!V{KkQdmpz^A`i^{%m&I66Oa!5F}(6&5T<8 z7(kF;+WWa5hp8dSgHMxka;+hB3NH{=HU2S2I%{tv%Sr|T?7zw2*wXJQZS8D8ZP4Oo zQ`UTJLT+m#4@YuOYy(me+wZmX=Q}h`tkQ^X&ryOqX(1AAt2LzQ)q1d2fj4 zzz(~?X8pt@!8*4AXW{4%J!m0!#77d30<;Qv0=zahJ`OX4@#(6Q%%j*pU_cKPb^4Pe zeJzbWyhBQH3;1N4gc_gX!GK1LsXN!G>7C!T9;cETdPjmWBmnp@mnDk;s0Ebf(j#p4 zj-v6K@eqKYfY?e)0Oz^GuNy$lH;?qMGQ`yR+{+IZ!Y}LJ3EIl?iBVGO{9aBJE_!?0 zn@tHO0;xp)y~fmwPrv5M>DQJKsuxYkIHO>MyuAyX8w=7$%7NYkjQ{*0`}lp1d()Sg zZ5lSMfrCSib3moi80b4f4jwFqOCc&*u{(uJIIQYcjaSi>`vvSxX@XTeUa#gRC1mVt zhB&f4w=Yn0`Z-~M2X?{2rtuzo<=B5u`0+i4=g-N%^5Fh=YO1ZU~ zT|cH!5G&ZSxg4ITbqxBP%t0#i_mw%@R?;a!V;?JIZz+=*}eeUJqP4k zPv=|4_lHf2Ee~pl9NHJC#D4@S6q<`UP7IBUNBgwIde-PPXZ97KKhNsW5lDATz$g8Q zh@d4QPz}*LnRqI>P$qJKFWC2HR>MvB%W_0>aA$=kOXIAmS6tIvQqhf1$brL@PWQIb zW@;x_jR)K^&#jd?D)H$|6dzEn;OX=S7YrTdM0o2uWmW%^H zJ~lk0h4SN+z5c7uK@COY5xujiYEEpXnY@nJjCd& z_^unDrCZ7P;2BbZF{N@upCSkWkB_?POXRhIQ*nr`gH(?`T?+D`00&dOfB~XBSR;7& z^us80YmB`?qP(%JcJq`iciq-0{?R*OFHp`)JLrUi%x-WM4T=>RzknMGU2f^;;bA4Z zXRIGFN)?x`!3Yza62P_ws=rYzYiNmnf2~F0WtME#EFhqV0rCBa;;$#h#bR?=`ksa< zC?pG?9c6R@32v4_VZ)Cr*p1IeAjRwyDv4Y(xclu{&40?S%Rl)dky>j#u>1L+DzF`V z!rp9EmAHgNYkz_5bHdY_1?!7N(EY~*;-V)bV|XQ0<7j=T55wfY{)X=2oJEf5p?!^a zU$U%UR%>bZ4RnxE)6~zb?~rKnS>)Pi*Br(dHkAry0>vYwzKKzMu}Yc$T?%795VSz! z2#}!bRnhq}ceZFI0~ZFeJw*ON2BeV~AK!4NyjS(9ogr!|w>5s-0&omz@>3rFRDwU9 z*>8{%cZ17$U@wfK$lfnFow3k(@EWWo&T9i{g30=%66q&1EEWdcn|+Jg)wX}6!MP%6 z`8v}LWOH3nQOaLl^;6~G2VuYTt2-9^KQe==Z%vI%IQWc-onOaRBgH@38O%KG2Wb!W z6;kF?#vc9+XmS;Gmijb zsb8xEI;;NPE|&1VZ6w=YHB41?+Oz3TS7r&y$k+eT)LDl`*=>J+012g~TSNgB>24$? zMM6?yq(MMIascTDl?G`Lq=u00E(vMrMuDMW7zTJZ=Q+>$ykCjK4!DH9LrjQj)~a~fGwAlWnPCAD^4|`_tP$9()#-QHZ&vyYs$F5df(2M zvR;pTVuIdPeg1pKhWKW)FLAhagFAL&kI#vV0nWh@nCK_ckEyHR8+%Yj?PL+y@)f*E z^lskF*AMgVB+i8QmB}{qv+SaOlpf@RwyKWB*C|iWMWDNOLtj?e?t2VJbGkaN4jGry zyZpHGK`|}}c#)>5H}59}K>iJinv&PH4R6j@4!fl&6U6ad#?NK(${C;2J^+Uo7-25l zpmDtK%GhKjTGzr-y|3BvhK>t4$o7E=g(bA;m z%g-NHzIK(d?5c9!luj9*E26@nXFq2N?fQmPJNgD)8jt&n{QnT!ig=+5rIvwiEY>Z3 z4LfoGMe~Pc_ioxF{s$Y{HcG^tKt%%#Af~9RtesExJ-|iNj4FeDy0`jt7BryIV6q|YZT%b*n1fpVC)KL|3btteE3Ob! zLqpV3g>CMDP9O~H3*FS~4IV)JtG%m9Z!G2JUkLFoRU-_X6p;lCuq{;^>i8B}vH(04 zI1O_9T6xYNG~NF-UYMTcLOit@a@@RWOO|N{RYnj}ux_YL^_UE6#}U_Myo4&SCg{MQ zW=)=iJ=PzzMXxxm9NAqK86##mwc?U(K-+8g6_OO6F!9Lg&G9`!uCoB)ws%&G-s{&j zZhK~$@fVD(Em-m#Ymx&X-v%SrAWr=2s8^z=6+ z$*!=ehKhA>1EzBJ3tD!LSTpUj5Y604^*E&6BgI zwQ%vSwZk8@goi|Hrq69tMv2oG9$V#CFa>Vz`6Tc`@CaxzA+_#VgKKsC-UgkHRsjY< z6pqco#5E4VWvN&dXNb;lArrEa#r?jF!f!r9^dY(WeZ69_&>9?N9Sdw_;LK6MPj|$< zJO)0Y`%R{;0yo=JE>|`a6UZx9A93IZ&k(nBU|*$ty(>kUfjB2=!$Q#*`)))h!;9Zo z7V~*DL)j#Pa!e?b#1n!Cs`CksE+&md_>8K@Bjbpoa1s|h@L!!FOsAgs!tg7JklPmn z(i+}kX19vS2!0glu&1C1!t*5qPQA9NCKdCWpBPmyd!7^EX`MVjM+qPw+mn>~9xNh# zJpKDnr46Dz38Lv`9hGN@H)H3At%=ZPJ4~s0cqEAV7j-sr8sry-ea9>RvLctU_Z;U_o#*s;#m|XX%vol7 z8FhpnxbNj=tlFWh=v~V{Ny$Yax0zv6u-i)P@yb;-*Wn+raOYyW+*I=GqkD)-RvCM5$f@|S8Jvx0vxwvT_As`Y9-5_+W@9SO@XaLUoe-c5<@qL4 z(w_WTE1NDZRyPOKu5ES-Kb(|^LGCGIT-#rNbGO>{ymbp_6)B|XTwF_#=*wv(ltB2W zNK*?IB;S60AzhuDy6|gUr=ZytmuuLtHQk=wP*gvl`g;Xt@?IHKqh-?St?cjcuI$u> zZ(fp}zNN3j8o6S!YK!Uf7O8T+SNKZ^EM?qJ66LgcLJ5U!R5MCw+Bn#B_vbxQT7+Xy z)F8HEel{^#C7cf2)p^b{#N|QZEAB%Z7OwE%F)b-K3yoiMxzkmNJoOI`+`AM}?x)@q z+7IP*Pp+Hc;@G9KAkdn z{!~-wIXN>Jav#edZm(lfj+&g$)LlLtz8;v=f8l;NmG9R~g&oC2?fY*O*gMM54~iq4~u{eEJHqAyUyB8>~hx`EYmfTw#+_EX;u5R$r&gzVp0? zUD-Qf{_S7%>iB~g$W$(LiVC_nB3;&C9+C0bk7lTVbsqLi&$!{u-#{OXODaORVhi7@H|8cdeq*Y(JF0X@}=jnVRg||rr%tXhVpGq9j|?1 z8p9*u!RlG3436`XJesJ@A@h~QYiaOdB(+2g!Qf9{o|L+Su@#UMQ(IqQ=ZRd=*7kvi zVRL%iIJM0o>5-jR;8X#D`og=atCt@STbc*{=4ht6Eujq~^x)YiiFf9Z-yy^4W#$8k z`1LwQ3!gDIWv-O8`B&<~=|&c6hyE7r$J^~2brB+^uJ5yYf9Nb|#;PxSZ(p)%Xqe*s z2Q5PXgtOxlx&!YHWB6`Er95Gy{Lv=-ow@t&hY;V-uZ?u0H@{d`*saZKZR#y`?xUWk zBuAdujmbrQzqt?f_5xv_;|FzfRR=y0Raal}u4@0M1=4Aj@^rqqgl^^p*@s}5KDXg4 z5+m6DbC@za|6w@vD|yJ+xA0+<^!Pa72V{{Du$y-Hx`iyh96 zeM#wu7(OWoEq^g?WZ_E6O7*>;sxxq82NDz%Bpo}uzD?#33Bm4y@)ZDS2bLm*WG9S3t$5-3~6&NnUu zF}EO98u|oZBO0tFrPQXRAT5$dRtIh&irJSY3p*&ULSzmrl)>9@R%?(mQ6$__Sd zAGe|Yu%{5q|74~hVhC8G=`!5_1acJsj;-?F`tBvfV3@{rfx$JD(((40Ms%dKv?-ij z{veE$Wk$=$ZW7kG&wkVDw$_UWK{0(&c{x^$`q(9v{C-1NPN63|9~GXvMFKWQV`aPXiY128GeT z=K_h;QgipdYo9o|ok4o)lu+V(W?WX_-8pF$^52Q2wxkFo@}*}?f4!ra9P*7SUp;l` zG=?k2uURIqxCm)|! zeJ&%P8I%P)!#G#h5!;517)G(zh~ zk}~?^!EjhJm|{i{a5vq`H?4M=yV>J!+Gu)Qk1s zTVbY$w#&E@5(!APyS|owl^7LCwF_7D#Q4~zdp%t#_cy95E#>bMJ$_%Ji-Vuv=JBIw zsJhZuMBmd3+Fv$|W?Ic3oE&Y(H)o>9KtZ8fu`5${ELcq7)$%*8hg0OhwK?tNNfuY9 zO@-8@Ij7;XvZ-HYy>p_FZR_V z;Y_J(u~P(<#h}ZpP3rv09=X7r!g85k)rHz8y}#=}xd!pR>TX(>gqUjiSvtL#YLRIA zXts=!4%EepGl^whmj9|V@Pu7F?6094x1~|sR;^zBslR_ng=wZ4C75-_{ZZ=eWb`H! zVT8}8Ih1(mhwQtpKzI%eSnb0UJdY!Z2eED|3p<)XAl4Eip*P~n0nNzW z3x@}(x-zI^8_F3AxYu7{SkG$>)Vo%#xn=KOeo>%d3`RD`<)=IC+fqzqht?_UI3B4D zypDjWk2W6*|3Hdl*Hs+T-{1LE zHEf3SUi)^CNz2on3HLb9!9nK@;ak|mUFA87)BMf&t?fdI%#1 zm6iHpxi=3J2q3NRDTHDRtUH-vGJ?M>**t_q&ealjP<;!phvID>%s*0f9f(!zg8vx` zKs)oC5b7${1qDUazXw8z2NhuaIpF(z{GWw_RSEH?do5EWHSzF^q(Xk5N2(Jd-a^97 zVp`7nBI4pr54g0ZDf*3;B8cVOXPv}LCm>jt$1`^!B$siL(3QUymx}>7hApas`O&70 zn62m^R3zk)zVsKgU@wr0XEH(H9HfQYbMTYB9rrS$6!RLH;B$m~i?;64Hx>F9bt@1E zspoS!8Eq<_$L7V>l8X+Yh{Kyxs#cwVty27`V{^dAPn8vv2XJ-bDS%9pKfa`}v3poD z#(2Wboa;6%aIeiu5s94M%(pKZ@?(q47a700C7t20KYb;gr315_aKa1o3e2@A{$8CeX0*LcKYPhnhP2ZEs(rk+}K4%1fMc zm$+{%BlZ4uPHf93Ji09O7h^5Lnd#@wU^^5lI@;jfCX@vMGF!66APQ&3%dMh0*=jfr zF4Km@`1RTHVP$Yc-EMW~oKNyVtkaq>vQzchIch>73R616wnS3PzuRkezEn5M^127* zvglXa2*7pXLv0eQ2NJsm)1adkFo;s6t)!qTa z=-w^8IGW>aO3UD#`S^z-vhBW3_vYp$Zlp-pur0p>7_Y!<%Wk22pKFnQ1>YMv zJip^gk8?@b6&+8N7-$U<;I3B+$YO5w7ylixesSK$nnQ3K0u(iYhc<_g!I5CY6|Oi% z%zzAi z5N*79firhQ-ks4%ET1G?WEPgUv75G=NWJXNf#)`eh7coc1Zcf$9U|7eUV;6lSyYfP z&eZbF*v37|cIk+oCOhMAzd!PuChGbcmP2r$<+9aggE=zsFra1eMz(oJmU?U3ZhUET?<3RhwB_M0t;AD&>9Z5~4~wK0Hv9(n zVsefw2qF8oxk=oR2R(DqmHy5G=x%(KY8IrM*EQbbXBwLk!J! z*1s2~u$Q?wa-4CP-_@e(DBsy?60&g5X5mnN7ksN_zVrxl>BSKXh-f5D4y&WrGnhSx z=1w$R6|mKYoGqidERQq1H{b187dg%QK)?VA0eRlkyp4mrk~MW><9aWO9T%jadXIC; zGBVaMs4+qn8ivJ^0*YhaO{<0Y_LG2(`1x)|Tgy-13HE1FXI%Ks`D<~by_2gs=5WdP zbmsTlOBg*EN2DCc^QGCu8KSnPpF3>`2L=Y4ZL;B(zq7fcBBYvzX{k0j+?@bCdjgU&ld& zo}~9;`7M&e+_K8racH8#hlP-;QKbup>yb<`_wBY>FB`E$rjcz#IeUv`?^yXCn{)V( zqW!`nG9nG+1!fUGmqrh*l!V{YFL+6j0mbo!r3GK-^_Bj(-d#=>UQtRZ<9bt_?;HPcPBUF6%Gk?fe+B)KGh1eVK=OSU?^5yAf-#OTGf7gv2505V9ZNxu(`A z_F#&p$5o8(_(H=Z?X~Jz<4B0<7mHmctMl^ByXLwZIPy9ixTF~o&B=-7rZc`7(;y(6 z_4Er0o6U~{r}p{UGc%V@paZFx1lwtaWBIE}S7y4=3X!x=&lfE8G*Ue~aBs9(QM~{J zCG+&#wdQqj6q1y;@hX~#l&pT^XjQq2A5*qOg_3j`Yt5UaeeOq(ude&z-E`vRA9dDO z^t!ABi+7lJ>P_{A20<>WARpPaYbeCyx#OPW;awAjmaS6=P)>b<4-)a06841zM>K5c zOOVE=F_8J#6I^+(G4!^9=tZ}iSO~SWlTgL`BT=!lV{dG3eqUU|%M7B7C1lue^)r#AyIQ3&`QxkSzEMhLP28>nk$w0EP zohn7JRj-=7x1o+)%9uOJGrh$uA>*pP*yd)IR%7~Up04NBlaC!Dlf;%b_)+h#Gq(gF2oFba#@tB+P zhClqbA3Bi45KKFIhT`o1zabI5SZ7L(ju2)!+HeHfKfTtBta1O}>~h@bo457fE^Ln_ zl)dzQJ}5&}lG;tZ=jO6_F1Y5elrsS-dijR^qPeE#f46@cD#Zw6@tkDI-Ctr0OQrT*u~382-*OZI(s{<;1ej8>FD$xg0QCYPIg0-E*<5gV{LD+s zWWE|KM5CyiAno|$2Ch`!VWF1AWSZ@r=4iy+@a2DcfI+WwbNgG2uz|!U7?4k&R!M0@ z7z1$5S0+nlt!-^9rXHjCC6`8gTcv?#e!;I%G-`VJoBzR2)!>RevM!5t5T?UipBIAo zwsEoj!bq3MLWPa8xsCvA<+CuHKUs6I8~Wlf`^iybS$p)hwLr?kLKQe(R?&q1I*ot>rZuh=Sj}U$arcHq%T@0h1e-o zxB;g$$GBC9Lirnv3B*6h0p2+LToN4WEIT+ts5#z(fDE8Dfw`!x3+lDd{?$RM;ymVR znDY6yNo+-+z;D8dNo}Z+Ha`fOkYmDe;9;|hi)5hzv>=#ts)u8Z#H$^|KuvP0^9>HK zeBtWBZbI8m8}&rc?2l;-ypYyV9%%;wr&U_SQzl`p2OYI~3~3@q18Z3KvpSfBL|SA@ zo&mObLxlSi)Z?b+x&cWo7E`uU;p6-&6$0(D5dQ2-Ez>4j4s#R4?}W5wpT8#|7bgcd z-!MLa{vwi@UoX6)N1~sQC&sUy=O(k4)e!;k zbhK}z_VWwiN&d5~iSZk-AAnJ02gp^kTGwqs&ex5%sHmvW%f!C$sTGF}_hym`lmQww zn1KNSqI&LY&26F|Qm#=#%PT}6LkFmNq^@?gX7s>GJ8l+Ct|+Hg&v@KkzQX$-7-41!E zO=bH@oHE1)S(+AV)4F-A5SSBy zxYjX~>+4wV?yi>%mvKZHdta7k3Pp`X@jD-GE&XvALvRBTGH-eJSWXLyrTyL0eE{a! zNKm4HWns*a->E^a=4;-mG`iT%5gI$fy))fl@@twJ(5~27IP714y%WcrHENxyE7aQ2 zLDt;dyuZIMZN0^fKAm-}gZDJhv_uI+t&ed$H;0xd~uYr9~me3-STq8>S9X%xzY0RcY1 z>G8C`$?B#I+nJC-G;p|1D04oasOJ?PsYo8`Q$#=JNc`z=3>~T1BOmN$MDd0BSE9Izd@B%ph9>lpLgUL;{*ANkq-;I;w7Y1-Iuc+=Xck+DIuYwF9CtOl$ zGZQSS%B2Q|P#ht@@R6Pp&b?EQ>4I$u(ur~)x{4+j=Y9Tr^1rvElM~~1^eXooCGM)< z4Z^T`@|#$TpaYNZR4?ewjY}N5-~vfP_(Db2my4XIIn*(fh&rKpGSPEWP*|$j9ssMN zFDV0*-#S?)3?}3g;Un|Q^Snl&6V%ok99v{m<%GS&{DI2VXIfuU?R$i*7r7^1AeE4t zUtS{^851rev;15&ECbI(2-ki{NfFR#do%c*7t7LHH))NL*IQ9p=^7Rmwtwu+?byM+ zX=yjr!pAoWczl{pl%Zj-_SAC4sfe}Khb*Z38kYWMfXk1&)2MU;yXxPLXgouP{`rs_ zV3<<>y+&yLI_Mvj_>Xilm-+yjPEf2RIMbCnmQ!sU|C^y^_(FPxIsZmH9nTBnpxO%P z{x=frmm$g?=(SMle-E?;imQUu;a@SvOgzWZ)P(V@`7H_=YEXh$f6AP@XJfs!`}E(L zVHa5h|2G><+zIwr)_-$-eP%ZGzaM4;MAJnm@Bf{7J8bQ{S%Rjf{|)EEJBOW14Gm&Y UenAdhLcrH^d3CwcXQuxD56x4Ik^lez From bf80ebe1a102beac7c8894442becbef46a8ddaf2 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 15 Aug 2018 10:56:46 -0700 Subject: [PATCH 18/23] update description of example in adv hunting --- ...ed-hunting-windows-defender-advanced-threat-protection.md | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection.md index 538e981c02..315a0b021a 100644 --- a/windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection.md @@ -10,7 +10,7 @@ ms.pagetype: security ms.author: macapara author: mjcaparas ms.localizationpriority: medium -ms.date: 06/13/2018 +ms.date: 08/15/2018 --- # Query data using Advanced hunting in Windows Defender ATP @@ -51,7 +51,8 @@ First, we define a time filter to review only records from the previous seven da We then add a filter on the _FileName_ to contain only instances of _powershell.exe_. -Afterwards, we add a filter on the _ProcessCommandLine_ +Afterwards, we add a filter on the _ProcessCommandLine_. + Finally, we project only the columns we're interested in exploring and limit the results to 100 and click **Run query**. You have the option of expanding the screen view so you can focus on your hunting query and related results. From 71d0cd2f02097751c54db9ab7d555819bcaf9420 Mon Sep 17 00:00:00 2001 From: Maricia Alforque Date: Wed, 15 Aug 2018 17:57:13 +0000 Subject: [PATCH 19/23] Merged PR 10648: Privacy/DisablePrivacyExperience - new in Policy CSP --- .../policy-configuration-service-provider.md | 4 + .../mdm/policy-csp-privacy.md | 9712 +++++++++-------- .../client-management/mdm/policy-csp-start.md | 3704 +++---- .../mdm/policy-csp-update.md | 7140 ++++++------ 4 files changed, 10291 insertions(+), 10269 deletions(-) diff --git a/windows/client-management/mdm/policy-configuration-service-provider.md b/windows/client-management/mdm/policy-configuration-service-provider.md index 55b100c57e..bd30c9c7b9 100644 --- a/windows/client-management/mdm/policy-configuration-service-provider.md +++ b/windows/client-management/mdm/policy-configuration-service-provider.md @@ -2470,6 +2470,9 @@ The following diagram shows the Policy configuration service provider in tree fo

Privacy/DisableAdvertisingId
+
+ Privacy/DisablePrivacyExperience +
Privacy/EnableActivityFeed
@@ -4703,6 +4706,7 @@ The following diagram shows the Policy configuration service provider in tree fo - [Privacy/AllowCrossDeviceClipboard](./policy-csp-privacy.md#privacy-allowcrossdeviceclipboard) - [Privacy/AllowInputPersonalization](./policy-csp-privacy.md#privacy-allowinputpersonalization) - [Privacy/DisableAdvertisingId](./policy-csp-privacy.md#privacy-disableadvertisingid) +- [Privacy/DisablePrivacyExperience](./policy-csp-privacy.md#privacy-disableprivacyexperience) - [Privacy/EnableActivityFeed](./policy-csp-privacy.md#privacy-enableactivityfeed) - [Privacy/LetAppsAccessAccountInfo](./policy-csp-privacy.md#privacy-letappsaccessaccountinfo) - [Privacy/LetAppsAccessAccountInfo_ForceAllowTheseApps](./policy-csp-privacy.md#privacy-letappsaccessaccountinfo-forceallowtheseapps) diff --git a/windows/client-management/mdm/policy-csp-privacy.md b/windows/client-management/mdm/policy-csp-privacy.md index 52ede722ea..f45615badd 100644 --- a/windows/client-management/mdm/policy-csp-privacy.md +++ b/windows/client-management/mdm/policy-csp-privacy.md @@ -1,4847 +1,4865 @@ ---- -title: Policy CSP - Privacy -description: Policy CSP - Privacy -ms.author: maricia -ms.topic: article -ms.prod: w10 -ms.technology: windows -author: MariciaAlforque -ms.date: 08/08/2018 ---- - -# Policy CSP - Privacy - -> [!WARNING] -> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. - - -
- - -## Privacy policies - -
-
- Privacy/AllowAutoAcceptPairingAndPrivacyConsentPrompts -
-
- Privacy/AllowCrossDeviceClipboard -
-
- Privacy/AllowInputPersonalization -
-
- Privacy/DisableAdvertisingId -
-
- Privacy/EnableActivityFeed -
-
- Privacy/LetAppsAccessAccountInfo -
-
- Privacy/LetAppsAccessAccountInfo_ForceAllowTheseApps -
-
- Privacy/LetAppsAccessAccountInfo_ForceDenyTheseApps -
-
- Privacy/LetAppsAccessAccountInfo_UserInControlOfTheseApps -
-
- Privacy/LetAppsAccessCalendar -
-
- Privacy/LetAppsAccessCalendar_ForceAllowTheseApps -
-
- Privacy/LetAppsAccessCalendar_ForceDenyTheseApps -
-
- Privacy/LetAppsAccessCalendar_UserInControlOfTheseApps -
-
- Privacy/LetAppsAccessCallHistory -
-
- Privacy/LetAppsAccessCallHistory_ForceAllowTheseApps -
-
- Privacy/LetAppsAccessCallHistory_ForceDenyTheseApps -
-
- Privacy/LetAppsAccessCallHistory_UserInControlOfTheseApps -
-
- Privacy/LetAppsAccessCamera -
-
- Privacy/LetAppsAccessCamera_ForceAllowTheseApps -
-
- Privacy/LetAppsAccessCamera_ForceDenyTheseApps -
-
- Privacy/LetAppsAccessCamera_UserInControlOfTheseApps -
-
- Privacy/LetAppsAccessContacts -
-
- Privacy/LetAppsAccessContacts_ForceAllowTheseApps -
-
- Privacy/LetAppsAccessContacts_ForceDenyTheseApps -
-
- Privacy/LetAppsAccessContacts_UserInControlOfTheseApps -
-
- Privacy/LetAppsAccessEmail -
-
- Privacy/LetAppsAccessEmail_ForceAllowTheseApps -
-
- Privacy/LetAppsAccessEmail_ForceDenyTheseApps -
-
- Privacy/LetAppsAccessEmail_UserInControlOfTheseApps -
-
- Privacy/LetAppsAccessGazeInput -
-
- Privacy/LetAppsAccessGazeInput_ForceAllowTheseApps -
-
- Privacy/LetAppsAccessGazeInput_ForceDenyTheseApps -
-
- Privacy/LetAppsAccessGazeInput_UserInControlOfTheseApps -
-
- Privacy/LetAppsAccessLocation -
-
- Privacy/LetAppsAccessLocation_ForceAllowTheseApps -
-
- Privacy/LetAppsAccessLocation_ForceDenyTheseApps -
-
- Privacy/LetAppsAccessLocation_UserInControlOfTheseApps -
-
- Privacy/LetAppsAccessMessaging -
-
- Privacy/LetAppsAccessMessaging_ForceAllowTheseApps -
-
- Privacy/LetAppsAccessMessaging_ForceDenyTheseApps -
-
- Privacy/LetAppsAccessMessaging_UserInControlOfTheseApps -
-
- Privacy/LetAppsAccessMicrophone -
-
- Privacy/LetAppsAccessMicrophone_ForceAllowTheseApps -
-
- Privacy/LetAppsAccessMicrophone_ForceDenyTheseApps -
-
- Privacy/LetAppsAccessMicrophone_UserInControlOfTheseApps -
-
- Privacy/LetAppsAccessMotion -
-
- Privacy/LetAppsAccessMotion_ForceAllowTheseApps -
-
- Privacy/LetAppsAccessMotion_ForceDenyTheseApps -
-
- Privacy/LetAppsAccessMotion_UserInControlOfTheseApps -
-
- Privacy/LetAppsAccessNotifications -
-
- Privacy/LetAppsAccessNotifications_ForceAllowTheseApps -
-
- Privacy/LetAppsAccessNotifications_ForceDenyTheseApps -
-
- Privacy/LetAppsAccessNotifications_UserInControlOfTheseApps -
-
- Privacy/LetAppsAccessPhone -
-
- Privacy/LetAppsAccessPhone_ForceAllowTheseApps -
-
- Privacy/LetAppsAccessPhone_ForceDenyTheseApps -
-
- Privacy/LetAppsAccessPhone_UserInControlOfTheseApps -
-
- Privacy/LetAppsAccessRadios -
-
- Privacy/LetAppsAccessRadios_ForceAllowTheseApps -
-
- Privacy/LetAppsAccessRadios_ForceDenyTheseApps -
-
- Privacy/LetAppsAccessRadios_UserInControlOfTheseApps -
-
- Privacy/LetAppsAccessTasks -
-
- Privacy/LetAppsAccessTasks_ForceAllowTheseApps -
-
- Privacy/LetAppsAccessTasks_ForceDenyTheseApps -
-
- Privacy/LetAppsAccessTasks_UserInControlOfTheseApps -
-
- Privacy/LetAppsAccessTrustedDevices -
-
- Privacy/LetAppsAccessTrustedDevices_ForceAllowTheseApps -
-
- Privacy/LetAppsAccessTrustedDevices_ForceDenyTheseApps -
-
- Privacy/LetAppsAccessTrustedDevices_UserInControlOfTheseApps -
-
- Privacy/LetAppsGetDiagnosticInfo -
-
- Privacy/LetAppsGetDiagnosticInfo_ForceAllowTheseApps -
-
- Privacy/LetAppsGetDiagnosticInfo_ForceDenyTheseApps -
-
- Privacy/LetAppsGetDiagnosticInfo_UserInControlOfTheseApps -
-
- Privacy/LetAppsRunInBackground -
-
- Privacy/LetAppsRunInBackground_ForceAllowTheseApps -
-
- Privacy/LetAppsRunInBackground_ForceDenyTheseApps -
-
- Privacy/LetAppsRunInBackground_UserInControlOfTheseApps -
-
- Privacy/LetAppsSyncWithDevices -
-
- Privacy/LetAppsSyncWithDevices_ForceAllowTheseApps -
-
- Privacy/LetAppsSyncWithDevices_ForceDenyTheseApps -
-
- Privacy/LetAppsSyncWithDevices_UserInControlOfTheseApps -
-
- Privacy/PublishUserActivities -
-
- Privacy/UploadUserActivities -
-
- - -
- - -**Privacy/AllowAutoAcceptPairingAndPrivacyConsentPrompts** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark3check mark3check mark3check mark3check mark3check mark3check mark3
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Allows or disallows the automatic acceptance of the pairing and privacy user consent dialog when launching apps. - -> [!Note] -> There were issues reported with the previous release of this policy and a fix was added in Windows 10, version 1709. - - -Most restricted value is 0. - - - -The following list shows the supported values: - -- 0 (default)– Not allowed. -- 1 – Allowed. - - - - -
- - -**Privacy/AllowCrossDeviceClipboard** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark5check mark5check mark5check mark5check mark5
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, next major version. Specifies whether clipboard items roam across devices. When this is allowed, an item copied to the clipboard is uploaded to the cloud so that other devices can access. Also, when this is allowed, a new clipboard item on the cloud is downloaded to a device so that user can paste on the device. - -Most restricted value is 0. - - - -ADMX Info: -- GP English name: *Allow Clipboard synchronization across devices* -- GP name: *AllowCrossDeviceClipboard* -- GP path: *System/OS Policies* -- GP ADMX file name: *OSPolicy.admx* - - - -The following list shows the supported values: - -0 – Not allowed. -1 (default) – Allowed. - - - - - - - - - - -
- - -**Privacy/AllowInputPersonalization** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check markcheck markcheck markcheck markcheck markcheck markcheck mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Updated in Windows 10, next major version. This policy specifies whether users on the device have the option to enable online speech recognition. When enabled, users can use their voice for dictation and to talk to Cortana and other apps that use Microsoft cloud-based speech recognition. Microsoft will use voice input to help improve our speech services. If the policy value is set to 0, online speech recognition will be disabled and users cannot enable online speech recognition via settings. If policy value is set to 1 or is not configured, control is deferred to users. - -Most restricted value is 0. - - - -ADMX Info: -- GP English name: *Allow input personalization* -- GP name: *AllowInputPersonalization* -- GP path: *Control Panel/Regional and Language Options* -- GP ADMX file name: *Globalization.admx* - - - -The following list shows the supported values: - -- 0 – Not allowed. -- 1 (default) – Choice deferred to user's preference. - - - - -
- - -**Privacy/DisableAdvertisingId** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. Enables or disables the Advertising ID. - -Most restricted value is 0. - - - -ADMX Info: -- GP English name: *Turn off the advertising ID* -- GP name: *DisableAdvertisingId* -- GP path: *System/User Profiles* -- GP ADMX file name: *UserProfiles.admx* - - - -The following list shows the supported values: - -- 0 – Disabled. -- 1 – Enabled. -- 65535 (default)- Not configured. - - - - -
- - -**Privacy/EnableActivityFeed** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark3check mark3check mark3check mark3check mark3check mark3check mark3
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1709. Allows IT Admins to allow Apps/OS to publish to the activity feed. - - - -ADMX Info: -- GP English name: *Enables Activity Feed* -- GP name: *EnableActivityFeed* -- GP path: *System/OS Policies* -- GP ADMX file name: *OSPolicy.admx* - - - -The following list shows the supported values: - -- 0 – Disabled. Apps/OS can't publish the activities and roaming is disabled. (not published to the cloud). -- 1 – (default) Enabled. Apps/OS can publish the activities and will be roamed across device graph. - - - - -
- - -**Privacy/LetAppsAccessAccountInfo** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. Specifies whether Windows apps can access account information. - - -Most restricted value is 2. - - - -ADMX Info: -- GP English name: *Let Windows apps access account information* -- GP name: *LetAppsAccessAccountInfo* -- GP element: *LetAppsAccessAccountInfo_Enum* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - -The following list shows the supported values: - -- 0 – User in control. -- 1 – Force allow. -- 2 - Force deny. - - - - -
- - -**Privacy/LetAppsAccessAccountInfo_ForceAllowTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are allowed access to account information. This setting overrides the default LetAppsAccessAccountInfo policy setting for the specified Windows apps. - - - -ADMX Info: -- GP English name: *Let Windows apps access account information* -- GP name: *LetAppsAccessAccountInfo* -- GP element: *LetAppsAccessAccountInfo_ForceAllowTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessAccountInfo_ForceDenyTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are denied access to account information. This setting overrides the default LetAppsAccessAccountInfo policy setting for the specified Windows apps. - - - -ADMX Info: -- GP English name: *Let Windows apps access account information* -- GP name: *LetAppsAccessAccountInfo* -- GP element: *LetAppsAccessAccountInfo_ForceDenyTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessAccountInfo_UserInControlOfTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. The user is able to control the account information privacy setting for the listed Windows apps. This setting overrides the default LetAppsAccessAccountInfo policy setting for the specified Windows apps. - - - -ADMX Info: -- GP English name: *Let Windows apps access account information* -- GP name: *LetAppsAccessAccountInfo* -- GP element: *LetAppsAccessAccountInfo_UserInControlOfTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessCalendar** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. Specifies whether Windows apps can access the calendar. - - -Most restricted value is 2. - - - -ADMX Info: -- GP English name: *Let Windows apps access the calendar* -- GP name: *LetAppsAccessCalendar* -- GP element: *LetAppsAccessCalendar_Enum* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - -The following list shows the supported values: - -- 0 – User in control. -- 1 – Force allow. -- 2 - Force deny. - - - - -
- - -**Privacy/LetAppsAccessCalendar_ForceAllowTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are allowed access to the calendar. This setting overrides the default LetAppsAccessCalendar policy setting for the specified Windows apps. - - - -ADMX Info: -- GP English name: *Let Windows apps access the calendar* -- GP name: *LetAppsAccessCalendar* -- GP element: *LetAppsAccessCalendar_ForceAllowTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessCalendar_ForceDenyTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are denied access to the calendar. This setting overrides the default LetAppsAccessCalendar policy setting for the specified Windows apps. - - - -ADMX Info: -- GP English name: *Let Windows apps access the calendar* -- GP name: *LetAppsAccessCalendar* -- GP element: *LetAppsAccessCalendar_ForceDenyTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessCalendar_UserInControlOfTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. The user is able to control the calendar privacy setting for the listed Windows apps. This setting overrides the default LetAppsAccessCalendar policy setting for the specified Windows apps. - - - -ADMX Info: -- GP English name: *Let Windows apps access the calendar* -- GP name: *LetAppsAccessCalendar* -- GP element: *LetAppsAccessCalendar_UserInControlOfTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessCallHistory** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. Specifies whether Windows apps can access call history. - - -Most restricted value is 2. - - - -ADMX Info: -- GP English name: *Let Windows apps access call history* -- GP name: *LetAppsAccessCallHistory* -- GP element: *LetAppsAccessCallHistory_Enum* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - -The following list shows the supported values: - -- 0 – User in control. -- 1 – Force allow. -- 2 - Force deny. - - - - -
- - -**Privacy/LetAppsAccessCallHistory_ForceAllowTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are allowed access to call history. This setting overrides the default LetAppsAccessCallHistory policy setting for the specified Windows apps. - - - -ADMX Info: -- GP English name: *Let Windows apps access call history* -- GP name: *LetAppsAccessCallHistory* -- GP element: *LetAppsAccessCallHistory_ForceAllowTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessCallHistory_ForceDenyTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are denied access to call history. This setting overrides the default LetAppsAccessCallHistory policy setting for the specified Windows apps. - - - -ADMX Info: -- GP English name: *Let Windows apps access call history* -- GP name: *LetAppsAccessCallHistory* -- GP element: *LetAppsAccessCallHistory_ForceDenyTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessCallHistory_UserInControlOfTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. The user is able to control the call history privacy setting for the listed Windows apps. This setting overrides the default LetAppsAccessCallHistory policy setting for the specified Windows apps. - - - -ADMX Info: -- GP English name: *Let Windows apps access call history* -- GP name: *LetAppsAccessCallHistory* -- GP element: *LetAppsAccessCallHistory_UserInControlOfTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessCamera** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. Specifies whether Windows apps can access the camera. - - -Most restricted value is 2. - - - -ADMX Info: -- GP English name: *Let Windows apps access the camera* -- GP name: *LetAppsAccessCamera* -- GP element: *LetAppsAccessCamera_Enum* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - -The following list shows the supported values: - -- 0 – User in control. -- 1 – Force allow. -- 2 - Force deny. - - - - -
- - -**Privacy/LetAppsAccessCamera_ForceAllowTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to the camera. This setting overrides the default LetAppsAccessCamera policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps access the camera* -- GP name: *LetAppsAccessCamera* -- GP element: *LetAppsAccessCamera_ForceAllowTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessCamera_ForceDenyTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to the camera. This setting overrides the default LetAppsAccessCamera policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps access the camera* -- GP name: *LetAppsAccessCamera* -- GP element: *LetAppsAccessCamera_ForceDenyTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessCamera_UserInControlOfTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the camera privacy setting for the listed apps. This setting overrides the default LetAppsAccessCamera policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps access the camera* -- GP name: *LetAppsAccessCamera* -- GP element: *LetAppsAccessCamera_UserInControlOfTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessContacts** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. Specifies whether Windows apps can access contacts. - - -Most restricted value is 2. - - - -ADMX Info: -- GP English name: *Let Windows apps access contacts* -- GP name: *LetAppsAccessContacts* -- GP element: *LetAppsAccessContacts_Enum* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - -The following list shows the supported values: - -- 0 – User in control. -- 1 – Force allow. -- 2 - Force deny. - - - - -
- - -**Privacy/LetAppsAccessContacts_ForceAllowTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to contacts. This setting overrides the default LetAppsAccessContacts policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps access contacts* -- GP name: *LetAppsAccessContacts* -- GP element: *LetAppsAccessContacts_ForceAllowTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessContacts_ForceDenyTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to contacts. This setting overrides the default LetAppsAccessContacts policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps access contacts* -- GP name: *LetAppsAccessContacts* -- GP element: *LetAppsAccessContacts_ForceDenyTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessContacts_UserInControlOfTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the contacts privacy setting for the listed apps. This setting overrides the default LetAppsAccessContacts policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps access contacts* -- GP name: *LetAppsAccessContacts* -- GP element: *LetAppsAccessContacts_UserInControlOfTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessEmail** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. Specifies whether Windows apps can access email. - - -Most restricted value is 2. - - - -ADMX Info: -- GP English name: *Let Windows apps access email* -- GP name: *LetAppsAccessEmail* -- GP element: *LetAppsAccessEmail_Enum* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - -The following list shows the supported values: - -- 0 – User in control. -- 1 – Force allow. -- 2 - Force deny. - - - - -
- - -**Privacy/LetAppsAccessEmail_ForceAllowTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to email. This setting overrides the default LetAppsAccessEmail policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps access email* -- GP name: *LetAppsAccessEmail* -- GP element: *LetAppsAccessEmail_ForceAllowTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessEmail_ForceDenyTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to email. This setting overrides the default LetAppsAccessEmail policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps access email* -- GP name: *LetAppsAccessEmail* -- GP element: *LetAppsAccessEmail_ForceDenyTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessEmail_UserInControlOfTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the email privacy setting for the listed apps. This setting overrides the default LetAppsAccessEmail policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps access email* -- GP name: *LetAppsAccessEmail* -- GP element: *LetAppsAccessEmail_UserInControlOfTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessGazeInput** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark5check mark5check mark5check mark5check mark5
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -This policy setting specifies whether Windows apps can access the eye tracker. - - - - - - - - - - - - - -
- - -**Privacy/LetAppsAccessGazeInput_ForceAllowTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark5check mark5check mark5check mark5check mark5
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to the eye tracker. This setting overrides the default LetAppsAccessGazeInput policy setting for the specified apps. - - - - - - - - - - - - - -
- - -**Privacy/LetAppsAccessGazeInput_ForceDenyTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark5check mark5check mark5check mark5check mark5
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to the eye tracker. This setting overrides the default LetAppsAccessGazeInput policy setting for the specified apps. - - - - - - - - - - - - - -
- - -**Privacy/LetAppsAccessGazeInput_UserInControlOfTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark5check mark5check mark5check mark5check mark5
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the eye tracker privacy setting for the listed apps. This setting overrides the default LetAppsAccessGazeInput policy setting for the specified apps. - - - - - - - - - - - - - -
- - -**Privacy/LetAppsAccessLocation** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. Specifies whether Windows apps can access location. - - -Most restricted value is 2. - - - -ADMX Info: -- GP English name: *Let Windows apps access location* -- GP name: *LetAppsAccessLocation* -- GP element: *LetAppsAccessLocation_Enum* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - -The following list shows the supported values: - -- 0 – User in control. -- 1 – Force allow. -- 2 - Force deny. - - - - -
- - -**Privacy/LetAppsAccessLocation_ForceAllowTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to location. This setting overrides the default LetAppsAccessLocation policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps access location* -- GP name: *LetAppsAccessLocation* -- GP element: *LetAppsAccessLocation_ForceAllowTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessLocation_ForceDenyTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to location. This setting overrides the default LetAppsAccessLocation policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps access location* -- GP name: *LetAppsAccessLocation* -- GP element: *LetAppsAccessLocation_ForceDenyTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessLocation_UserInControlOfTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the location privacy setting for the listed apps. This setting overrides the default LetAppsAccessLocation policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps access location* -- GP name: *LetAppsAccessLocation* -- GP element: *LetAppsAccessLocation_UserInControlOfTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessMessaging** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. Specifies whether Windows apps can read or send messages (text or MMS). - - -Most restricted value is 2. - - - -ADMX Info: -- GP English name: *Let Windows apps access messaging* -- GP name: *LetAppsAccessMessaging* -- GP element: *LetAppsAccessMessaging_Enum* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - -The following list shows the supported values: - -- 0 – User in control. -- 1 – Force allow. -- 2 - Force deny. - - - - -
- - -**Privacy/LetAppsAccessMessaging_ForceAllowTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed to read or send messages (text or MMS). This setting overrides the default LetAppsAccessMessaging policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps access messaging* -- GP name: *LetAppsAccessMessaging* -- GP element: *LetAppsAccessMessaging_ForceAllowTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessMessaging_ForceDenyTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are not allowed to read or send messages (text or MMS). This setting overrides the default LetAppsAccessMessaging policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps access messaging* -- GP name: *LetAppsAccessMessaging* -- GP element: *LetAppsAccessMessaging_ForceDenyTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessMessaging_UserInControlOfTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the messaging privacy setting for the listed apps. This setting overrides the default LetAppsAccessMessaging policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps access messaging* -- GP name: *LetAppsAccessMessaging* -- GP element: *LetAppsAccessMessaging_UserInControlOfTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessMicrophone** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. Specifies whether Windows apps can access the microphone. - - -Most restricted value is 2. - - - -ADMX Info: -- GP English name: *Let Windows apps access the microphone* -- GP name: *LetAppsAccessMicrophone* -- GP element: *LetAppsAccessMicrophone_Enum* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - -The following list shows the supported values: - -- 0 – User in control. -- 1 – Force allow. -- 2 - Force deny. - - - - -
- - -**Privacy/LetAppsAccessMicrophone_ForceAllowTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to the microphone. This setting overrides the default LetAppsAccessMicrophone policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps access the microphone* -- GP name: *LetAppsAccessMicrophone* -- GP element: *LetAppsAccessMicrophone_ForceAllowTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessMicrophone_ForceDenyTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to the microphone. This setting overrides the default LetAppsAccessMicrophone policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps access the microphone* -- GP name: *LetAppsAccessMicrophone* -- GP element: *LetAppsAccessMicrophone_ForceDenyTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessMicrophone_UserInControlOfTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the microphone privacy setting for the listed apps. This setting overrides the default LetAppsAccessMicrophone policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps access the microphone* -- GP name: *LetAppsAccessMicrophone* -- GP element: *LetAppsAccessMicrophone_UserInControlOfTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessMotion** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. Specifies whether Windows apps can access motion data. - - -Most restricted value is 2. - - - -ADMX Info: -- GP English name: *Let Windows apps access motion* -- GP name: *LetAppsAccessMotion* -- GP element: *LetAppsAccessMotion_Enum* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - -The following list shows the supported values: - -- 0 – User in control. -- 1 – Force allow. -- 2 - Force deny. - - - - -
- - -**Privacy/LetAppsAccessMotion_ForceAllowTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to motion data. This setting overrides the default LetAppsAccessMotion policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps access motion* -- GP name: *LetAppsAccessMotion* -- GP element: *LetAppsAccessMotion_ForceAllowTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessMotion_ForceDenyTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to motion data. This setting overrides the default LetAppsAccessMotion policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps access motion* -- GP name: *LetAppsAccessMotion* -- GP element: *LetAppsAccessMotion_ForceDenyTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessMotion_UserInControlOfTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the motion privacy setting for the listed apps. This setting overrides the default LetAppsAccessMotion policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps access motion* -- GP name: *LetAppsAccessMotion* -- GP element: *LetAppsAccessMotion_UserInControlOfTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessNotifications** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. Specifies whether Windows apps can access notifications. - - -Most restricted value is 2. - - - -ADMX Info: -- GP English name: *Let Windows apps access notifications* -- GP name: *LetAppsAccessNotifications* -- GP element: *LetAppsAccessNotifications_Enum* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - -The following list shows the supported values: - -- 0 – User in control. -- 1 – Force allow. -- 2 - Force deny. - - - - -
- - -**Privacy/LetAppsAccessNotifications_ForceAllowTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to notifications. This setting overrides the default LetAppsAccessNotifications policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps access notifications* -- GP name: *LetAppsAccessNotifications* -- GP element: *LetAppsAccessNotifications_ForceAllowTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessNotifications_ForceDenyTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to notifications. This setting overrides the default LetAppsAccessNotifications policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps access notifications* -- GP name: *LetAppsAccessNotifications* -- GP element: *LetAppsAccessNotifications_ForceDenyTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessNotifications_UserInControlOfTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the notifications privacy setting for the listed apps. This setting overrides the default LetAppsAccessNotifications policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps access notifications* -- GP name: *LetAppsAccessNotifications* -- GP element: *LetAppsAccessNotifications_UserInControlOfTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessPhone** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. Specifies whether Windows apps can make phone calls. - - -Most restricted value is 2. - - - -ADMX Info: -- GP English name: *Let Windows apps make phone calls* -- GP name: *LetAppsAccessPhone* -- GP element: *LetAppsAccessPhone_Enum* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - -The following list shows the supported values: - -- 0 – User in control. -- 1 – Force allow. -- 2 - Force deny. - - - - -
- - -**Privacy/LetAppsAccessPhone_ForceAllowTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed to make phone calls. This setting overrides the default LetAppsAccessPhone policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps make phone calls* -- GP name: *LetAppsAccessPhone* -- GP element: *LetAppsAccessPhone_ForceAllowTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessPhone_ForceDenyTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are not allowed to make phone calls. This setting overrides the default LetAppsAccessPhone policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps make phone calls* -- GP name: *LetAppsAccessPhone* -- GP element: *LetAppsAccessPhone_ForceDenyTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessPhone_UserInControlOfTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the phone call privacy setting for the listed apps. This setting overrides the default LetAppsAccessPhone policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps make phone calls* -- GP name: *LetAppsAccessPhone* -- GP element: *LetAppsAccessPhone_UserInControlOfTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessRadios** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. Specifies whether Windows apps have access to control radios. - - -Most restricted value is 2. - - - -ADMX Info: -- GP English name: *Let Windows apps control radios* -- GP name: *LetAppsAccessRadios* -- GP element: *LetAppsAccessRadios_Enum* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - -The following list shows the supported values: - -- 0 – User in control. -- 1 – Force allow. -- 2 - Force deny. - - - - -
- - -**Privacy/LetAppsAccessRadios_ForceAllowTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will have access to control radios. This setting overrides the default LetAppsAccessRadios policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps control radios* -- GP name: *LetAppsAccessRadios* -- GP element: *LetAppsAccessRadios_ForceAllowTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessRadios_ForceDenyTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will not have access to control radios. This setting overrides the default LetAppsAccessRadios policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps control radios* -- GP name: *LetAppsAccessRadios* -- GP element: *LetAppsAccessRadios_ForceDenyTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessRadios_UserInControlOfTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the radios privacy setting for the listed apps. This setting overrides the default LetAppsAccessRadios policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps control radios* -- GP name: *LetAppsAccessRadios* -- GP element: *LetAppsAccessRadios_UserInControlOfTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessTasks** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark2check mark2check mark2check mark2check mark2check mark2check mark2
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. Specifies whether Windows apps can access tasks. - - - -ADMX Info: -- GP English name: *Let Windows apps access Tasks* -- GP name: *LetAppsAccessTasks* -- GP element: *LetAppsAccessTasks_Enum* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessTasks_ForceAllowTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark2check mark2check mark2check mark2check mark2check mark2check mark2
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to tasks. This setting overrides the default LetAppsAccessTasks policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps access Tasks* -- GP name: *LetAppsAccessTasks* -- GP element: *LetAppsAccessTasks_ForceAllowTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessTasks_ForceDenyTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark2check mark2check mark2check mark2check mark2check mark2check mark2
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to tasks. This setting overrides the default LetAppsAccessTasks policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps access Tasks* -- GP name: *LetAppsAccessTasks* -- GP element: *LetAppsAccessTasks_ForceDenyTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessTasks_UserInControlOfTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark2check mark2check mark2check mark2check mark2check mark2check mark2
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the tasks privacy setting for the listed apps. This setting overrides the default LetAppsAccessTasks policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps access Tasks* -- GP name: *LetAppsAccessTasks* -- GP element: *LetAppsAccessTasks_UserInControlOfTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessTrustedDevices** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. Specifies whether Windows apps can access trusted devices. - - -Most restricted value is 2. - - - -ADMX Info: -- GP English name: *Let Windows apps access trusted devices* -- GP name: *LetAppsAccessTrustedDevices* -- GP element: *LetAppsAccessTrustedDevices_Enum* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - -The following list shows the supported values: - -- 0 – User in control. -- 1 – Force allow. -- 2 - Force deny. - - - - -
- - -**Privacy/LetAppsAccessTrustedDevices_ForceAllowTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will have access to trusted devices. This setting overrides the default LetAppsAccessTrustedDevices policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps access trusted devices* -- GP name: *LetAppsAccessTrustedDevices* -- GP element: *LetAppsAccessTrustedDevices_ForceAllowTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessTrustedDevices_ForceDenyTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will not have access to trusted devices. This setting overrides the default LetAppsAccessTrustedDevices policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps access trusted devices* -- GP name: *LetAppsAccessTrustedDevices* -- GP element: *LetAppsAccessTrustedDevices_ForceDenyTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsAccessTrustedDevices_UserInControlOfTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the 'trusted devices' privacy setting for the listed apps. This setting overrides the default LetAppsAccessTrustedDevices policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps access trusted devices* -- GP name: *LetAppsAccessTrustedDevices* -- GP element: *LetAppsAccessTrustedDevices_UserInControlOfTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsGetDiagnosticInfo** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark2check mark2check mark2check mark2check mark2check mark2check mark2
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. Force allow, force deny or give user control of apps that can get diagnostic information about other running apps. - - -Most restricted value is 2. - - - -ADMX Info: -- GP English name: *Let Windows apps access diagnostic information about other apps* -- GP name: *LetAppsGetDiagnosticInfo* -- GP element: *LetAppsGetDiagnosticInfo_Enum* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - -The following list shows the supported values: - -- 0 – User in control. -- 1 – Force allow. -- 2 - Force deny. - - - - -
- - -**Privacy/LetAppsGetDiagnosticInfo_ForceAllowTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark2check mark2check mark2check mark2check mark2check mark2check mark2
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will have access to diagnostic information about other running apps. This setting overrides the default LetAppsGetDiagnosticInfo policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps access diagnostic information about other apps* -- GP name: *LetAppsGetDiagnosticInfo* -- GP element: *LetAppsGetDiagnosticInfo_ForceAllowTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsGetDiagnosticInfo_ForceDenyTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark2check mark2check mark2check mark2check mark2check mark2check mark2
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will not have access to diagnostic information about other running apps. This setting overrides the default LetAppsGetDiagnosticInfo policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps access diagnostic information about other apps* -- GP name: *LetAppsGetDiagnosticInfo* -- GP element: *LetAppsGetDiagnosticInfo_ForceDenyTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsGetDiagnosticInfo_UserInControlOfTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark2check mark2check mark2check mark2check mark2check mark2check mark2
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the 'get diagnostic info' privacy setting for the listed apps. This setting overrides the default LetAppsGetDiagnosticInfo policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps access diagnostic information about other apps* -- GP name: *LetAppsGetDiagnosticInfo* -- GP element: *LetAppsGetDiagnosticInfo_UserInControlOfTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsRunInBackground** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark2check mark2check mark2check mark2check mark2check mark2check mark2
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. Specifies whether Windows apps can run in the background. - - -Most restricted value is 2. -> [!WARNING] -> Be careful when determining which apps should have their background activity disabled. Communication apps normally update tiles and notifications through background processes. Turning off background activity for these types of apps could cause text message, email, and voicemail notifications to not function. This could also cause background email syncing to not function properly. - - - -ADMX Info: -- GP English name: *Let Windows apps run in the background* -- GP name: *LetAppsRunInBackground* -- GP element: *LetAppsRunInBackground_Enum* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - -The following list shows the supported values: - -- 0 – User in control (default). -- 1 – Force allow. -- 2 - Force deny. - - - - -
- - -**Privacy/LetAppsRunInBackground_ForceAllowTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark2check mark2check mark2check mark2check mark2check mark2check mark2
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are able to run in the background. This setting overrides the default LetAppsRunInBackground policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps run in the background* -- GP name: *LetAppsRunInBackground* -- GP element: *LetAppsRunInBackground_ForceAllowTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsRunInBackground_ForceDenyTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark2check mark2check mark2check mark2check mark2check mark2check mark2
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied the ability to run in the background. This setting overrides the default LetAppsRunInBackground policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps run in the background* -- GP name: *LetAppsRunInBackground* -- GP element: *LetAppsRunInBackground_ForceDenyTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsRunInBackground_UserInControlOfTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark2check mark2check mark2check mark2check mark2check mark2check mark2
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the background apps privacy setting for the listed apps. This setting overrides the default LetAppsRunInBackground policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps run in the background* -- GP name: *LetAppsRunInBackground* -- GP element: *LetAppsRunInBackground_UserInControlOfTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsSyncWithDevices** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. Specifies whether Windows apps can sync with devices. - - -Most restricted value is 2. - - - -ADMX Info: -- GP English name: *Let Windows apps communicate with unpaired devices* -- GP name: *LetAppsSyncWithDevices* -- GP element: *LetAppsSyncWithDevices_Enum* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - -The following list shows the supported values: - -- 0 – User in control. -- 1 – Force allow. -- 2 - Force deny. - - - - -
- - -**Privacy/LetAppsSyncWithDevices_ForceAllowTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will have access to sync with devices. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps communicate with unpaired devices* -- GP name: *LetAppsSyncWithDevices* -- GP element: *LetAppsSyncWithDevices_ForceAllowTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsSyncWithDevices_ForceDenyTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will not have access to sync with devices. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps communicate with unpaired devices* -- GP name: *LetAppsSyncWithDevices* -- GP element: *LetAppsSyncWithDevices_ForceDenyTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/LetAppsSyncWithDevices_UserInControlOfTheseApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the 'sync with devices' privacy setting for the listed apps. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. - - - -ADMX Info: -- GP English name: *Let Windows apps communicate with unpaired devices* -- GP name: *LetAppsSyncWithDevices* -- GP element: *LetAppsSyncWithDevices_UserInControlOfTheseApps_List* -- GP path: *Windows Components/App Privacy* -- GP ADMX file name: *AppPrivacy.admx* - - - - -
- - -**Privacy/PublishUserActivities** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark3check mark3check mark3check mark3check mark3check mark3check mark3
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1709. Allows It Admins to enable publishing of user activities to the activity feed. - - - -ADMX Info: -- GP English name: *Allow publishing of User Activities* -- GP name: *PublishUserActivities* -- GP path: *System/OS Policies* -- GP ADMX file name: *OSPolicy.admx* - - - -The following list shows the supported values: - -- 0 – Disabled. Apps/OS can't publish the *user activities*. -- 1 – (default) Enabled. Apps/OS can publish the *user activities*. - - - - -
- - -**Privacy/UploadUserActivities** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark5check mark5check mark5check mark5check mark5
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Allows ActivityFeed to upload published 'User Activities'. - - - -ADMX Info: -- GP English name: *Allow upload of User Activities* -- GP name: *UploadUserActivities* -- GP path: *System/OS Policies* -- GP ADMX file name: *OSPolicy.admx* - - - - - - - - - - - - -
- -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. -- 4 - Added in Windows 10, version 1803. -- 5 - Added in the next major release of Windows 10. - - - - +--- +title: Policy CSP - Privacy +description: Policy CSP - Privacy +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: MariciaAlforque +ms.date: 08/14/2018 +--- + +# Policy CSP - Privacy + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
+ + +## Privacy policies + +
+
+ Privacy/AllowAutoAcceptPairingAndPrivacyConsentPrompts +
+
+ Privacy/AllowCrossDeviceClipboard +
+
+ Privacy/AllowInputPersonalization +
+
+ Privacy/DisableAdvertisingId +
+
+ Privacy/DisablePrivacyExperience +
+
+ Privacy/EnableActivityFeed +
+
+ Privacy/LetAppsAccessAccountInfo +
+
+ Privacy/LetAppsAccessAccountInfo_ForceAllowTheseApps +
+
+ Privacy/LetAppsAccessAccountInfo_ForceDenyTheseApps +
+
+ Privacy/LetAppsAccessAccountInfo_UserInControlOfTheseApps +
+
+ Privacy/LetAppsAccessCalendar +
+
+ Privacy/LetAppsAccessCalendar_ForceAllowTheseApps +
+
+ Privacy/LetAppsAccessCalendar_ForceDenyTheseApps +
+
+ Privacy/LetAppsAccessCalendar_UserInControlOfTheseApps +
+
+ Privacy/LetAppsAccessCallHistory +
+
+ Privacy/LetAppsAccessCallHistory_ForceAllowTheseApps +
+
+ Privacy/LetAppsAccessCallHistory_ForceDenyTheseApps +
+
+ Privacy/LetAppsAccessCallHistory_UserInControlOfTheseApps +
+
+ Privacy/LetAppsAccessCamera +
+
+ Privacy/LetAppsAccessCamera_ForceAllowTheseApps +
+
+ Privacy/LetAppsAccessCamera_ForceDenyTheseApps +
+
+ Privacy/LetAppsAccessCamera_UserInControlOfTheseApps +
+
+ Privacy/LetAppsAccessContacts +
+
+ Privacy/LetAppsAccessContacts_ForceAllowTheseApps +
+
+ Privacy/LetAppsAccessContacts_ForceDenyTheseApps +
+
+ Privacy/LetAppsAccessContacts_UserInControlOfTheseApps +
+
+ Privacy/LetAppsAccessEmail +
+
+ Privacy/LetAppsAccessEmail_ForceAllowTheseApps +
+
+ Privacy/LetAppsAccessEmail_ForceDenyTheseApps +
+
+ Privacy/LetAppsAccessEmail_UserInControlOfTheseApps +
+
+ Privacy/LetAppsAccessGazeInput +
+
+ Privacy/LetAppsAccessGazeInput_ForceAllowTheseApps +
+
+ Privacy/LetAppsAccessGazeInput_ForceDenyTheseApps +
+
+ Privacy/LetAppsAccessGazeInput_UserInControlOfTheseApps +
+
+ Privacy/LetAppsAccessLocation +
+
+ Privacy/LetAppsAccessLocation_ForceAllowTheseApps +
+
+ Privacy/LetAppsAccessLocation_ForceDenyTheseApps +
+
+ Privacy/LetAppsAccessLocation_UserInControlOfTheseApps +
+
+ Privacy/LetAppsAccessMessaging +
+
+ Privacy/LetAppsAccessMessaging_ForceAllowTheseApps +
+
+ Privacy/LetAppsAccessMessaging_ForceDenyTheseApps +
+
+ Privacy/LetAppsAccessMessaging_UserInControlOfTheseApps +
+
+ Privacy/LetAppsAccessMicrophone +
+
+ Privacy/LetAppsAccessMicrophone_ForceAllowTheseApps +
+
+ Privacy/LetAppsAccessMicrophone_ForceDenyTheseApps +
+
+ Privacy/LetAppsAccessMicrophone_UserInControlOfTheseApps +
+
+ Privacy/LetAppsAccessMotion +
+
+ Privacy/LetAppsAccessMotion_ForceAllowTheseApps +
+
+ Privacy/LetAppsAccessMotion_ForceDenyTheseApps +
+
+ Privacy/LetAppsAccessMotion_UserInControlOfTheseApps +
+
+ Privacy/LetAppsAccessNotifications +
+
+ Privacy/LetAppsAccessNotifications_ForceAllowTheseApps +
+
+ Privacy/LetAppsAccessNotifications_ForceDenyTheseApps +
+
+ Privacy/LetAppsAccessNotifications_UserInControlOfTheseApps +
+
+ Privacy/LetAppsAccessPhone +
+
+ Privacy/LetAppsAccessPhone_ForceAllowTheseApps +
+
+ Privacy/LetAppsAccessPhone_ForceDenyTheseApps +
+
+ Privacy/LetAppsAccessPhone_UserInControlOfTheseApps +
+
+ Privacy/LetAppsAccessRadios +
+
+ Privacy/LetAppsAccessRadios_ForceAllowTheseApps +
+
+ Privacy/LetAppsAccessRadios_ForceDenyTheseApps +
+
+ Privacy/LetAppsAccessRadios_UserInControlOfTheseApps +
+
+ Privacy/LetAppsAccessTasks +
+
+ Privacy/LetAppsAccessTasks_ForceAllowTheseApps +
+
+ Privacy/LetAppsAccessTasks_ForceDenyTheseApps +
+
+ Privacy/LetAppsAccessTasks_UserInControlOfTheseApps +
+
+ Privacy/LetAppsAccessTrustedDevices +
+
+ Privacy/LetAppsAccessTrustedDevices_ForceAllowTheseApps +
+
+ Privacy/LetAppsAccessTrustedDevices_ForceDenyTheseApps +
+
+ Privacy/LetAppsAccessTrustedDevices_UserInControlOfTheseApps +
+
+ Privacy/LetAppsGetDiagnosticInfo +
+
+ Privacy/LetAppsGetDiagnosticInfo_ForceAllowTheseApps +
+
+ Privacy/LetAppsGetDiagnosticInfo_ForceDenyTheseApps +
+
+ Privacy/LetAppsGetDiagnosticInfo_UserInControlOfTheseApps +
+
+ Privacy/LetAppsRunInBackground +
+
+ Privacy/LetAppsRunInBackground_ForceAllowTheseApps +
+
+ Privacy/LetAppsRunInBackground_ForceDenyTheseApps +
+
+ Privacy/LetAppsRunInBackground_UserInControlOfTheseApps +
+
+ Privacy/LetAppsSyncWithDevices +
+
+ Privacy/LetAppsSyncWithDevices_ForceAllowTheseApps +
+
+ Privacy/LetAppsSyncWithDevices_ForceDenyTheseApps +
+
+ Privacy/LetAppsSyncWithDevices_UserInControlOfTheseApps +
+
+ Privacy/PublishUserActivities +
+
+ Privacy/UploadUserActivities +
+
+ + +
+ + +**Privacy/AllowAutoAcceptPairingAndPrivacyConsentPrompts** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark3check mark3check mark3check mark3check mark3check mark3check mark3
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Allows or disallows the automatic acceptance of the pairing and privacy user consent dialog when launching apps. + +> [!Note] +> There were issues reported with the previous release of this policy and a fix was added in Windows 10, version 1709. + + +Most restricted value is 0. + + + +The following list shows the supported values: + +- 0 (default)– Not allowed. +- 1 – Allowed. + + + + +
+ + +**Privacy/AllowCrossDeviceClipboard** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark5check mark5check mark5check mark5check mark5
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, next major version. Specifies whether clipboard items roam across devices. When this is allowed, an item copied to the clipboard is uploaded to the cloud so that other devices can access. Also, when this is allowed, a new clipboard item on the cloud is downloaded to a device so that user can paste on the device. + +Most restricted value is 0. + + + +ADMX Info: +- GP English name: *Allow Clipboard synchronization across devices* +- GP name: *AllowCrossDeviceClipboard* +- GP path: *System/OS Policies* +- GP ADMX file name: *OSPolicy.admx* + + + +The following list shows the supported values: + +0 – Not allowed. +1 (default) – Allowed. + + + + +
+ + +**Privacy/AllowInputPersonalization** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check markcheck markcheck markcheck markcheck markcheck markcheck mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Updated in Windows 10, next major version. This policy specifies whether users on the device have the option to enable online speech recognition. When enabled, users can use their voice for dictation and to talk to Cortana and other apps that use Microsoft cloud-based speech recognition. Microsoft will use voice input to help improve our speech services. If the policy value is set to 0, online speech recognition will be disabled and users cannot enable online speech recognition via settings. If policy value is set to 1 or is not configured, control is deferred to users. + +Most restricted value is 0. + + + +ADMX Info: +- GP English name: *Allow input personalization* +- GP name: *AllowInputPersonalization* +- GP path: *Control Panel/Regional and Language Options* +- GP ADMX file name: *Globalization.admx* + + + +The following list shows the supported values: + +- 0 – Not allowed. +- 1 (default) – Choice deferred to user's preference. + + + + +
+ + +**Privacy/DisableAdvertisingId** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. Enables or disables the Advertising ID. + +Most restricted value is 0. + + + +ADMX Info: +- GP English name: *Turn off the advertising ID* +- GP name: *DisableAdvertisingId* +- GP path: *System/User Profiles* +- GP ADMX file name: *UserProfiles.admx* + + + +The following list shows the supported values: + +- 0 – Disabled. +- 1 – Enabled. +- 65535 (default)- Not configured. + + + + +
+ + +**Privacy/DisablePrivacyExperience** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark5check mark5check mark5check mark5check mark5
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ + + +Enabling this policy prevents the privacy experience from launching during user logon for new and upgraded users. + +Value type is integer. +- 0 (default) - Allow the "choose privacy settings for your device" screen for a new user during their first logon or when an existing user logs in for the first time after an upgrade. +- 1 - Do not allow the "choose privacy settings for your device" screen when a new user logs in or an existing user logs in for the first time after an upgrade. + +In some enterprise managed environments, the privacy settings may be set by policies. In these cases, you can use this policy if you do not want to show a screen that would prompt your users to change these privacy settings. + + + +ADMX Info: +- GP English name: *Don't launch privacy settings experience on user logon* +- GP name: *DisablePrivacyExperience* +- GP path: *Windows Components/OOBE* +- GP ADMX file name: *OOBE.admx* + + + + + + + + + + + + + +
+ + +**Privacy/EnableActivityFeed** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark3check mark3check mark3check mark3check mark3check mark3check mark3
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1709. Allows IT Admins to allow Apps/OS to publish to the activity feed. + + + +ADMX Info: +- GP English name: *Enables Activity Feed* +- GP name: *EnableActivityFeed* +- GP path: *System/OS Policies* +- GP ADMX file name: *OSPolicy.admx* + + + +The following list shows the supported values: + +- 0 – Disabled. Apps/OS can't publish the activities and roaming is disabled. (not published to the cloud). +- 1 – (default) Enabled. Apps/OS can publish the activities and will be roamed across device graph. + + + + +
+ + +**Privacy/LetAppsAccessAccountInfo** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. Specifies whether Windows apps can access account information. + + +Most restricted value is 2. + + + +ADMX Info: +- GP English name: *Let Windows apps access account information* +- GP name: *LetAppsAccessAccountInfo* +- GP element: *LetAppsAccessAccountInfo_Enum* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + +The following list shows the supported values: + +- 0 – User in control. +- 1 – Force allow. +- 2 - Force deny. + + + + +
+ + +**Privacy/LetAppsAccessAccountInfo_ForceAllowTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are allowed access to account information. This setting overrides the default LetAppsAccessAccountInfo policy setting for the specified Windows apps. + + + +ADMX Info: +- GP English name: *Let Windows apps access account information* +- GP name: *LetAppsAccessAccountInfo* +- GP element: *LetAppsAccessAccountInfo_ForceAllowTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessAccountInfo_ForceDenyTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are denied access to account information. This setting overrides the default LetAppsAccessAccountInfo policy setting for the specified Windows apps. + + + +ADMX Info: +- GP English name: *Let Windows apps access account information* +- GP name: *LetAppsAccessAccountInfo* +- GP element: *LetAppsAccessAccountInfo_ForceDenyTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessAccountInfo_UserInControlOfTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. The user is able to control the account information privacy setting for the listed Windows apps. This setting overrides the default LetAppsAccessAccountInfo policy setting for the specified Windows apps. + + + +ADMX Info: +- GP English name: *Let Windows apps access account information* +- GP name: *LetAppsAccessAccountInfo* +- GP element: *LetAppsAccessAccountInfo_UserInControlOfTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessCalendar** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. Specifies whether Windows apps can access the calendar. + + +Most restricted value is 2. + + + +ADMX Info: +- GP English name: *Let Windows apps access the calendar* +- GP name: *LetAppsAccessCalendar* +- GP element: *LetAppsAccessCalendar_Enum* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + +The following list shows the supported values: + +- 0 – User in control. +- 1 – Force allow. +- 2 - Force deny. + + + + +
+ + +**Privacy/LetAppsAccessCalendar_ForceAllowTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are allowed access to the calendar. This setting overrides the default LetAppsAccessCalendar policy setting for the specified Windows apps. + + + +ADMX Info: +- GP English name: *Let Windows apps access the calendar* +- GP name: *LetAppsAccessCalendar* +- GP element: *LetAppsAccessCalendar_ForceAllowTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessCalendar_ForceDenyTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are denied access to the calendar. This setting overrides the default LetAppsAccessCalendar policy setting for the specified Windows apps. + + + +ADMX Info: +- GP English name: *Let Windows apps access the calendar* +- GP name: *LetAppsAccessCalendar* +- GP element: *LetAppsAccessCalendar_ForceDenyTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessCalendar_UserInControlOfTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. The user is able to control the calendar privacy setting for the listed Windows apps. This setting overrides the default LetAppsAccessCalendar policy setting for the specified Windows apps. + + + +ADMX Info: +- GP English name: *Let Windows apps access the calendar* +- GP name: *LetAppsAccessCalendar* +- GP element: *LetAppsAccessCalendar_UserInControlOfTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessCallHistory** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. Specifies whether Windows apps can access call history. + + +Most restricted value is 2. + + + +ADMX Info: +- GP English name: *Let Windows apps access call history* +- GP name: *LetAppsAccessCallHistory* +- GP element: *LetAppsAccessCallHistory_Enum* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + +The following list shows the supported values: + +- 0 – User in control. +- 1 – Force allow. +- 2 - Force deny. + + + + +
+ + +**Privacy/LetAppsAccessCallHistory_ForceAllowTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are allowed access to call history. This setting overrides the default LetAppsAccessCallHistory policy setting for the specified Windows apps. + + + +ADMX Info: +- GP English name: *Let Windows apps access call history* +- GP name: *LetAppsAccessCallHistory* +- GP element: *LetAppsAccessCallHistory_ForceAllowTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessCallHistory_ForceDenyTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are denied access to call history. This setting overrides the default LetAppsAccessCallHistory policy setting for the specified Windows apps. + + + +ADMX Info: +- GP English name: *Let Windows apps access call history* +- GP name: *LetAppsAccessCallHistory* +- GP element: *LetAppsAccessCallHistory_ForceDenyTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessCallHistory_UserInControlOfTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. The user is able to control the call history privacy setting for the listed Windows apps. This setting overrides the default LetAppsAccessCallHistory policy setting for the specified Windows apps. + + + +ADMX Info: +- GP English name: *Let Windows apps access call history* +- GP name: *LetAppsAccessCallHistory* +- GP element: *LetAppsAccessCallHistory_UserInControlOfTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessCamera** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. Specifies whether Windows apps can access the camera. + + +Most restricted value is 2. + + + +ADMX Info: +- GP English name: *Let Windows apps access the camera* +- GP name: *LetAppsAccessCamera* +- GP element: *LetAppsAccessCamera_Enum* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + +The following list shows the supported values: + +- 0 – User in control. +- 1 – Force allow. +- 2 - Force deny. + + + + +
+ + +**Privacy/LetAppsAccessCamera_ForceAllowTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to the camera. This setting overrides the default LetAppsAccessCamera policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps access the camera* +- GP name: *LetAppsAccessCamera* +- GP element: *LetAppsAccessCamera_ForceAllowTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessCamera_ForceDenyTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to the camera. This setting overrides the default LetAppsAccessCamera policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps access the camera* +- GP name: *LetAppsAccessCamera* +- GP element: *LetAppsAccessCamera_ForceDenyTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessCamera_UserInControlOfTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the camera privacy setting for the listed apps. This setting overrides the default LetAppsAccessCamera policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps access the camera* +- GP name: *LetAppsAccessCamera* +- GP element: *LetAppsAccessCamera_UserInControlOfTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessContacts** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. Specifies whether Windows apps can access contacts. + + +Most restricted value is 2. + + + +ADMX Info: +- GP English name: *Let Windows apps access contacts* +- GP name: *LetAppsAccessContacts* +- GP element: *LetAppsAccessContacts_Enum* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + +The following list shows the supported values: + +- 0 – User in control. +- 1 – Force allow. +- 2 - Force deny. + + + + +
+ + +**Privacy/LetAppsAccessContacts_ForceAllowTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to contacts. This setting overrides the default LetAppsAccessContacts policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps access contacts* +- GP name: *LetAppsAccessContacts* +- GP element: *LetAppsAccessContacts_ForceAllowTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessContacts_ForceDenyTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to contacts. This setting overrides the default LetAppsAccessContacts policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps access contacts* +- GP name: *LetAppsAccessContacts* +- GP element: *LetAppsAccessContacts_ForceDenyTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessContacts_UserInControlOfTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the contacts privacy setting for the listed apps. This setting overrides the default LetAppsAccessContacts policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps access contacts* +- GP name: *LetAppsAccessContacts* +- GP element: *LetAppsAccessContacts_UserInControlOfTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessEmail** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. Specifies whether Windows apps can access email. + + +Most restricted value is 2. + + + +ADMX Info: +- GP English name: *Let Windows apps access email* +- GP name: *LetAppsAccessEmail* +- GP element: *LetAppsAccessEmail_Enum* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + +The following list shows the supported values: + +- 0 – User in control. +- 1 – Force allow. +- 2 - Force deny. + + + + +
+ + +**Privacy/LetAppsAccessEmail_ForceAllowTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to email. This setting overrides the default LetAppsAccessEmail policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps access email* +- GP name: *LetAppsAccessEmail* +- GP element: *LetAppsAccessEmail_ForceAllowTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessEmail_ForceDenyTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to email. This setting overrides the default LetAppsAccessEmail policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps access email* +- GP name: *LetAppsAccessEmail* +- GP element: *LetAppsAccessEmail_ForceDenyTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessEmail_UserInControlOfTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the email privacy setting for the listed apps. This setting overrides the default LetAppsAccessEmail policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps access email* +- GP name: *LetAppsAccessEmail* +- GP element: *LetAppsAccessEmail_UserInControlOfTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessGazeInput** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark5check mark5check mark5check mark5check mark5
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +This policy setting specifies whether Windows apps can access the eye tracker. + + + + +
+ + +**Privacy/LetAppsAccessGazeInput_ForceAllowTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark5check mark5check mark5check mark5check mark5
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to the eye tracker. This setting overrides the default LetAppsAccessGazeInput policy setting for the specified apps. + + + + +
+ + +**Privacy/LetAppsAccessGazeInput_ForceDenyTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark5check mark5check mark5check mark5check mark5
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to the eye tracker. This setting overrides the default LetAppsAccessGazeInput policy setting for the specified apps. + + + + +
+ + +**Privacy/LetAppsAccessGazeInput_UserInControlOfTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark5check mark5check mark5check mark5check mark5
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the eye tracker privacy setting for the listed apps. This setting overrides the default LetAppsAccessGazeInput policy setting for the specified apps. + + + + +
+ + +**Privacy/LetAppsAccessLocation** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. Specifies whether Windows apps can access location. + + +Most restricted value is 2. + + + +ADMX Info: +- GP English name: *Let Windows apps access location* +- GP name: *LetAppsAccessLocation* +- GP element: *LetAppsAccessLocation_Enum* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + +The following list shows the supported values: + +- 0 – User in control. +- 1 – Force allow. +- 2 - Force deny. + + + + +
+ + +**Privacy/LetAppsAccessLocation_ForceAllowTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to location. This setting overrides the default LetAppsAccessLocation policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps access location* +- GP name: *LetAppsAccessLocation* +- GP element: *LetAppsAccessLocation_ForceAllowTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessLocation_ForceDenyTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to location. This setting overrides the default LetAppsAccessLocation policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps access location* +- GP name: *LetAppsAccessLocation* +- GP element: *LetAppsAccessLocation_ForceDenyTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessLocation_UserInControlOfTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the location privacy setting for the listed apps. This setting overrides the default LetAppsAccessLocation policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps access location* +- GP name: *LetAppsAccessLocation* +- GP element: *LetAppsAccessLocation_UserInControlOfTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessMessaging** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. Specifies whether Windows apps can read or send messages (text or MMS). + + +Most restricted value is 2. + + + +ADMX Info: +- GP English name: *Let Windows apps access messaging* +- GP name: *LetAppsAccessMessaging* +- GP element: *LetAppsAccessMessaging_Enum* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + +The following list shows the supported values: + +- 0 – User in control. +- 1 – Force allow. +- 2 - Force deny. + + + + +
+ + +**Privacy/LetAppsAccessMessaging_ForceAllowTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed to read or send messages (text or MMS). This setting overrides the default LetAppsAccessMessaging policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps access messaging* +- GP name: *LetAppsAccessMessaging* +- GP element: *LetAppsAccessMessaging_ForceAllowTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessMessaging_ForceDenyTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are not allowed to read or send messages (text or MMS). This setting overrides the default LetAppsAccessMessaging policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps access messaging* +- GP name: *LetAppsAccessMessaging* +- GP element: *LetAppsAccessMessaging_ForceDenyTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessMessaging_UserInControlOfTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the messaging privacy setting for the listed apps. This setting overrides the default LetAppsAccessMessaging policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps access messaging* +- GP name: *LetAppsAccessMessaging* +- GP element: *LetAppsAccessMessaging_UserInControlOfTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessMicrophone** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. Specifies whether Windows apps can access the microphone. + + +Most restricted value is 2. + + + +ADMX Info: +- GP English name: *Let Windows apps access the microphone* +- GP name: *LetAppsAccessMicrophone* +- GP element: *LetAppsAccessMicrophone_Enum* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + +The following list shows the supported values: + +- 0 – User in control. +- 1 – Force allow. +- 2 - Force deny. + + + + +
+ + +**Privacy/LetAppsAccessMicrophone_ForceAllowTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to the microphone. This setting overrides the default LetAppsAccessMicrophone policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps access the microphone* +- GP name: *LetAppsAccessMicrophone* +- GP element: *LetAppsAccessMicrophone_ForceAllowTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessMicrophone_ForceDenyTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to the microphone. This setting overrides the default LetAppsAccessMicrophone policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps access the microphone* +- GP name: *LetAppsAccessMicrophone* +- GP element: *LetAppsAccessMicrophone_ForceDenyTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessMicrophone_UserInControlOfTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the microphone privacy setting for the listed apps. This setting overrides the default LetAppsAccessMicrophone policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps access the microphone* +- GP name: *LetAppsAccessMicrophone* +- GP element: *LetAppsAccessMicrophone_UserInControlOfTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessMotion** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. Specifies whether Windows apps can access motion data. + + +Most restricted value is 2. + + + +ADMX Info: +- GP English name: *Let Windows apps access motion* +- GP name: *LetAppsAccessMotion* +- GP element: *LetAppsAccessMotion_Enum* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + +The following list shows the supported values: + +- 0 – User in control. +- 1 – Force allow. +- 2 - Force deny. + + + + +
+ + +**Privacy/LetAppsAccessMotion_ForceAllowTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to motion data. This setting overrides the default LetAppsAccessMotion policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps access motion* +- GP name: *LetAppsAccessMotion* +- GP element: *LetAppsAccessMotion_ForceAllowTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessMotion_ForceDenyTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to motion data. This setting overrides the default LetAppsAccessMotion policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps access motion* +- GP name: *LetAppsAccessMotion* +- GP element: *LetAppsAccessMotion_ForceDenyTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessMotion_UserInControlOfTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the motion privacy setting for the listed apps. This setting overrides the default LetAppsAccessMotion policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps access motion* +- GP name: *LetAppsAccessMotion* +- GP element: *LetAppsAccessMotion_UserInControlOfTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessNotifications** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. Specifies whether Windows apps can access notifications. + + +Most restricted value is 2. + + + +ADMX Info: +- GP English name: *Let Windows apps access notifications* +- GP name: *LetAppsAccessNotifications* +- GP element: *LetAppsAccessNotifications_Enum* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + +The following list shows the supported values: + +- 0 – User in control. +- 1 – Force allow. +- 2 - Force deny. + + + + +
+ + +**Privacy/LetAppsAccessNotifications_ForceAllowTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to notifications. This setting overrides the default LetAppsAccessNotifications policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps access notifications* +- GP name: *LetAppsAccessNotifications* +- GP element: *LetAppsAccessNotifications_ForceAllowTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessNotifications_ForceDenyTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to notifications. This setting overrides the default LetAppsAccessNotifications policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps access notifications* +- GP name: *LetAppsAccessNotifications* +- GP element: *LetAppsAccessNotifications_ForceDenyTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessNotifications_UserInControlOfTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the notifications privacy setting for the listed apps. This setting overrides the default LetAppsAccessNotifications policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps access notifications* +- GP name: *LetAppsAccessNotifications* +- GP element: *LetAppsAccessNotifications_UserInControlOfTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessPhone** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. Specifies whether Windows apps can make phone calls. + + +Most restricted value is 2. + + + +ADMX Info: +- GP English name: *Let Windows apps make phone calls* +- GP name: *LetAppsAccessPhone* +- GP element: *LetAppsAccessPhone_Enum* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + +The following list shows the supported values: + +- 0 – User in control. +- 1 – Force allow. +- 2 - Force deny. + + + + +
+ + +**Privacy/LetAppsAccessPhone_ForceAllowTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed to make phone calls. This setting overrides the default LetAppsAccessPhone policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps make phone calls* +- GP name: *LetAppsAccessPhone* +- GP element: *LetAppsAccessPhone_ForceAllowTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessPhone_ForceDenyTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are not allowed to make phone calls. This setting overrides the default LetAppsAccessPhone policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps make phone calls* +- GP name: *LetAppsAccessPhone* +- GP element: *LetAppsAccessPhone_ForceDenyTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessPhone_UserInControlOfTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the phone call privacy setting for the listed apps. This setting overrides the default LetAppsAccessPhone policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps make phone calls* +- GP name: *LetAppsAccessPhone* +- GP element: *LetAppsAccessPhone_UserInControlOfTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessRadios** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. Specifies whether Windows apps have access to control radios. + + +Most restricted value is 2. + + + +ADMX Info: +- GP English name: *Let Windows apps control radios* +- GP name: *LetAppsAccessRadios* +- GP element: *LetAppsAccessRadios_Enum* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + +The following list shows the supported values: + +- 0 – User in control. +- 1 – Force allow. +- 2 - Force deny. + + + + +
+ + +**Privacy/LetAppsAccessRadios_ForceAllowTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will have access to control radios. This setting overrides the default LetAppsAccessRadios policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps control radios* +- GP name: *LetAppsAccessRadios* +- GP element: *LetAppsAccessRadios_ForceAllowTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessRadios_ForceDenyTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will not have access to control radios. This setting overrides the default LetAppsAccessRadios policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps control radios* +- GP name: *LetAppsAccessRadios* +- GP element: *LetAppsAccessRadios_ForceDenyTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessRadios_UserInControlOfTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the radios privacy setting for the listed apps. This setting overrides the default LetAppsAccessRadios policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps control radios* +- GP name: *LetAppsAccessRadios* +- GP element: *LetAppsAccessRadios_UserInControlOfTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessTasks** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark2check mark2check mark2check mark2check mark2check mark2check mark2
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. Specifies whether Windows apps can access tasks. + + + +ADMX Info: +- GP English name: *Let Windows apps access Tasks* +- GP name: *LetAppsAccessTasks* +- GP element: *LetAppsAccessTasks_Enum* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessTasks_ForceAllowTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark2check mark2check mark2check mark2check mark2check mark2check mark2
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to tasks. This setting overrides the default LetAppsAccessTasks policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps access Tasks* +- GP name: *LetAppsAccessTasks* +- GP element: *LetAppsAccessTasks_ForceAllowTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessTasks_ForceDenyTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark2check mark2check mark2check mark2check mark2check mark2check mark2
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to tasks. This setting overrides the default LetAppsAccessTasks policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps access Tasks* +- GP name: *LetAppsAccessTasks* +- GP element: *LetAppsAccessTasks_ForceDenyTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessTasks_UserInControlOfTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark2check mark2check mark2check mark2check mark2check mark2check mark2
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the tasks privacy setting for the listed apps. This setting overrides the default LetAppsAccessTasks policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps access Tasks* +- GP name: *LetAppsAccessTasks* +- GP element: *LetAppsAccessTasks_UserInControlOfTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessTrustedDevices** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. Specifies whether Windows apps can access trusted devices. + + +Most restricted value is 2. + + + +ADMX Info: +- GP English name: *Let Windows apps access trusted devices* +- GP name: *LetAppsAccessTrustedDevices* +- GP element: *LetAppsAccessTrustedDevices_Enum* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + +The following list shows the supported values: + +- 0 – User in control. +- 1 – Force allow. +- 2 - Force deny. + + + + +
+ + +**Privacy/LetAppsAccessTrustedDevices_ForceAllowTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will have access to trusted devices. This setting overrides the default LetAppsAccessTrustedDevices policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps access trusted devices* +- GP name: *LetAppsAccessTrustedDevices* +- GP element: *LetAppsAccessTrustedDevices_ForceAllowTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessTrustedDevices_ForceDenyTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will not have access to trusted devices. This setting overrides the default LetAppsAccessTrustedDevices policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps access trusted devices* +- GP name: *LetAppsAccessTrustedDevices* +- GP element: *LetAppsAccessTrustedDevices_ForceDenyTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsAccessTrustedDevices_UserInControlOfTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the 'trusted devices' privacy setting for the listed apps. This setting overrides the default LetAppsAccessTrustedDevices policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps access trusted devices* +- GP name: *LetAppsAccessTrustedDevices* +- GP element: *LetAppsAccessTrustedDevices_UserInControlOfTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsGetDiagnosticInfo** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark2check mark2check mark2check mark2check mark2check mark2check mark2
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. Force allow, force deny or give user control of apps that can get diagnostic information about other running apps. + + +Most restricted value is 2. + + + +ADMX Info: +- GP English name: *Let Windows apps access diagnostic information about other apps* +- GP name: *LetAppsGetDiagnosticInfo* +- GP element: *LetAppsGetDiagnosticInfo_Enum* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + +The following list shows the supported values: + +- 0 – User in control. +- 1 – Force allow. +- 2 - Force deny. + + + + +
+ + +**Privacy/LetAppsGetDiagnosticInfo_ForceAllowTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark2check mark2check mark2check mark2check mark2check mark2check mark2
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will have access to diagnostic information about other running apps. This setting overrides the default LetAppsGetDiagnosticInfo policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps access diagnostic information about other apps* +- GP name: *LetAppsGetDiagnosticInfo* +- GP element: *LetAppsGetDiagnosticInfo_ForceAllowTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsGetDiagnosticInfo_ForceDenyTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark2check mark2check mark2check mark2check mark2check mark2check mark2
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will not have access to diagnostic information about other running apps. This setting overrides the default LetAppsGetDiagnosticInfo policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps access diagnostic information about other apps* +- GP name: *LetAppsGetDiagnosticInfo* +- GP element: *LetAppsGetDiagnosticInfo_ForceDenyTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsGetDiagnosticInfo_UserInControlOfTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark2check mark2check mark2check mark2check mark2check mark2check mark2
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the 'get diagnostic info' privacy setting for the listed apps. This setting overrides the default LetAppsGetDiagnosticInfo policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps access diagnostic information about other apps* +- GP name: *LetAppsGetDiagnosticInfo* +- GP element: *LetAppsGetDiagnosticInfo_UserInControlOfTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsRunInBackground** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark2check mark2check mark2check mark2check mark2check mark2check mark2
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. Specifies whether Windows apps can run in the background. + + +Most restricted value is 2. +> [!WARNING] +> Be careful when determining which apps should have their background activity disabled. Communication apps normally update tiles and notifications through background processes. Turning off background activity for these types of apps could cause text message, email, and voicemail notifications to not function. This could also cause background email syncing to not function properly. + + + +ADMX Info: +- GP English name: *Let Windows apps run in the background* +- GP name: *LetAppsRunInBackground* +- GP element: *LetAppsRunInBackground_Enum* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + +The following list shows the supported values: + +- 0 – User in control (default). +- 1 – Force allow. +- 2 - Force deny. + + + + +
+ + +**Privacy/LetAppsRunInBackground_ForceAllowTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark2check mark2check mark2check mark2check mark2check mark2check mark2
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are able to run in the background. This setting overrides the default LetAppsRunInBackground policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps run in the background* +- GP name: *LetAppsRunInBackground* +- GP element: *LetAppsRunInBackground_ForceAllowTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsRunInBackground_ForceDenyTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark2check mark2check mark2check mark2check mark2check mark2check mark2
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied the ability to run in the background. This setting overrides the default LetAppsRunInBackground policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps run in the background* +- GP name: *LetAppsRunInBackground* +- GP element: *LetAppsRunInBackground_ForceDenyTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsRunInBackground_UserInControlOfTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark2check mark2check mark2check mark2check mark2check mark2check mark2
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the background apps privacy setting for the listed apps. This setting overrides the default LetAppsRunInBackground policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps run in the background* +- GP name: *LetAppsRunInBackground* +- GP element: *LetAppsRunInBackground_UserInControlOfTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsSyncWithDevices** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. Specifies whether Windows apps can sync with devices. + + +Most restricted value is 2. + + + +ADMX Info: +- GP English name: *Let Windows apps communicate with unpaired devices* +- GP name: *LetAppsSyncWithDevices* +- GP element: *LetAppsSyncWithDevices_Enum* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + +The following list shows the supported values: + +- 0 – User in control. +- 1 – Force allow. +- 2 - Force deny. + + + + +
+ + +**Privacy/LetAppsSyncWithDevices_ForceAllowTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will have access to sync with devices. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps communicate with unpaired devices* +- GP name: *LetAppsSyncWithDevices* +- GP element: *LetAppsSyncWithDevices_ForceAllowTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsSyncWithDevices_ForceDenyTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will not have access to sync with devices. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps communicate with unpaired devices* +- GP name: *LetAppsSyncWithDevices* +- GP element: *LetAppsSyncWithDevices_ForceDenyTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/LetAppsSyncWithDevices_UserInControlOfTheseApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark1check mark1check mark1check mark1check mark1check mark1check mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the 'sync with devices' privacy setting for the listed apps. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. + + + +ADMX Info: +- GP English name: *Let Windows apps communicate with unpaired devices* +- GP name: *LetAppsSyncWithDevices* +- GP element: *LetAppsSyncWithDevices_UserInControlOfTheseApps_List* +- GP path: *Windows Components/App Privacy* +- GP ADMX file name: *AppPrivacy.admx* + + + + +
+ + +**Privacy/PublishUserActivities** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark3check mark3check mark3check mark3check mark3check mark3check mark3
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1709. Allows It Admins to enable publishing of user activities to the activity feed. + + + +ADMX Info: +- GP English name: *Allow publishing of User Activities* +- GP name: *PublishUserActivities* +- GP path: *System/OS Policies* +- GP ADMX file name: *OSPolicy.admx* + + + +The following list shows the supported values: + +- 0 – Disabled. Apps/OS can't publish the *user activities*. +- 1 – (default) Enabled. Apps/OS can publish the *user activities*. + + + + +
+ + +**Privacy/UploadUserActivities** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
check mark5check mark5check mark5check mark5check mark5
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Allows ActivityFeed to upload published 'User Activities'. + + + +ADMX Info: +- GP English name: *Allow upload of User Activities* +- GP name: *UploadUserActivities* +- GP path: *System/OS Policies* +- GP ADMX file name: *OSPolicy.admx* + + + +
+ +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. +- 4 - Added in Windows 10, version 1803. +- 5 - Added in the next major release of Windows 10. + + + diff --git a/windows/client-management/mdm/policy-csp-start.md b/windows/client-management/mdm/policy-csp-start.md index d650bc1e9a..5c8db780af 100644 --- a/windows/client-management/mdm/policy-csp-start.md +++ b/windows/client-management/mdm/policy-csp-start.md @@ -1,1852 +1,1852 @@ ---- -title: Policy CSP - Start -description: Policy CSP - Start -ms.author: maricia -ms.topic: article -ms.prod: w10 -ms.technology: windows -author: MariciaAlforque -ms.date: 08/14/2018 ---- - -# Policy CSP - Start - -> [!WARNING] -> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. - - -
- - -## Start policies - -
-
- Start/AllowPinnedFolderDocuments -
-
- Start/AllowPinnedFolderDownloads -
-
- Start/AllowPinnedFolderFileExplorer -
-
- Start/AllowPinnedFolderHomeGroup -
-
- Start/AllowPinnedFolderMusic -
-
- Start/AllowPinnedFolderNetwork -
-
- Start/AllowPinnedFolderPersonalFolder -
-
- Start/AllowPinnedFolderPictures -
-
- Start/AllowPinnedFolderSettings -
-
- Start/AllowPinnedFolderVideos -
-
- Start/DisableContextMenus -
-
- Start/ForceStartSize -
-
- Start/HideAppList -
-
- Start/HideChangeAccountSettings -
-
- Start/HideFrequentlyUsedApps -
-
- Start/HideHibernate -
-
- Start/HideLock -
-
- Start/HidePeopleBar -
-
- Start/HidePowerButton -
-
- Start/HideRecentJumplists -
-
- Start/HideRecentlyAddedApps -
-
- Start/HideRestart -
-
- Start/HideShutDown -
-
- Start/HideSignOut -
-
- Start/HideSleep -
-
- Start/HideSwitchAccount -
-
- Start/HideUserTile -
-
- Start/ImportEdgeAssets -
-
- Start/NoPinningToTaskbar -
-
- Start/StartLayout -
-
- - -
- - -**Start/AllowPinnedFolderDocuments** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. This policy controls the visibility of the Documents shortcut on the Start menu. - - - -The following list shows the supported values: - -- 0 – The shortcut is hidden and disables the setting in the Settings app. -- 1 – The shortcut is visible and disables the setting in the Settings app. -- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. - - - - -
- - -**Start/AllowPinnedFolderDownloads** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. This policy controls the visibility of the Downloads shortcut on the Start menu. - - - -The following list shows the supported values: - -- 0 – The shortcut is hidden and disables the setting in the Settings app. -- 1 – The shortcut is visible and disables the setting in the Settings app. -- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. - - - - -
- - -**Start/AllowPinnedFolderFileExplorer** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. This policy controls the visibility of the File Explorer shortcut on the Start menu. - - - -The following list shows the supported values: - -- 0 – The shortcut is hidden and disables the setting in the Settings app. -- 1 – The shortcut is visible and disables the setting in the Settings app. -- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. - - - - -
- - -**Start/AllowPinnedFolderHomeGroup** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. This policy controls the visibility of the HomeGroup shortcut on the Start menu. - - - -The following list shows the supported values: - -- 0 – The shortcut is hidden and disables the setting in the Settings app. -- 1 – The shortcut is visible and disables the setting in the Settings app. -- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. - - - - -
- - -**Start/AllowPinnedFolderMusic** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. This policy controls the visibility of the Music shortcut on the Start menu. - - - -The following list shows the supported values: - -- 0 – The shortcut is hidden and disables the setting in the Settings app. -- 1 – The shortcut is visible and disables the setting in the Settings app. -- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. - - - - -
- - -**Start/AllowPinnedFolderNetwork** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. This policy controls the visibility of the Network shortcut on the Start menu. - - - -The following list shows the supported values: - -- 0 – The shortcut is hidden and disables the setting in the Settings app. -- 1 – The shortcut is visible and disables the setting in the Settings app. -- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. - - - - -
- - -**Start/AllowPinnedFolderPersonalFolder** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. This policy controls the visibility of the PersonalFolder shortcut on the Start menu. - - - -The following list shows the supported values: - -- 0 – The shortcut is hidden and disables the setting in the Settings app. -- 1 – The shortcut is visible and disables the setting in the Settings app. -- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. - - - - -
- - -**Start/AllowPinnedFolderPictures** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. This policy controls the visibility of the Pictures shortcut on the Start menu. - - - -The following list shows the supported values: - -- 0 – The shortcut is hidden and disables the setting in the Settings app. -- 1 – The shortcut is visible and disables the setting in the Settings app. -- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. - - - - -
- - -**Start/AllowPinnedFolderSettings** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. This policy controls the visibility of the Settings shortcut on the Start menu. - - - -The following list shows the supported values: - -- 0 – The shortcut is hidden and disables the setting in the Settings app. -- 1 – The shortcut is visible and disables the setting in the Settings app. -- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. - - - - -
- - -**Start/AllowPinnedFolderVideos** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. This policy controls the visibility of the Videos shortcut on the Start menu. - - - -The following list shows the supported values: - -- 0 – The shortcut is hidden and disables the setting in the Settings app. -- 1 – The shortcut is visible and disables the setting in the Settings app. -- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. - - - - -
- - -**Start/DisableContextMenus** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark4check mark4check mark4check mark4
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * User -> * Device - -
- - - -Enabling this policy prevents context menus from being invoked in the Start Menu. - - - -ADMX Info: -- GP English name: *Disable context menus in the Start Menu* -- GP name: *DisableContextMenusInStart* -- GP path: *Start Menu and Taskbar* -- GP ADMX file name: *StartMenu.admx* - - - - - - - - - - - - - -
- - -**Start/ForceStartSize** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck markcheck markcheck markcheck markcross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -> [!NOTE] -> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. - - -Forces the start screen size. - - -If there is policy configuration conflict, the latest configuration request is applied to the device. - - - -The following list shows the supported values: - -- 0 (default) – Do not force size of Start. -- 1 – Force non-fullscreen size of Start. -- 2 - Force a fullscreen size of Start. - - - - -
- - -**Start/HideAppList** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark3check mark3check mark3check mark3cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -> [!NOTE] -> This policy requires reboot to take effect. - -Allows IT Admins to configure Start by collapsing or removing the all apps list. - -> [!Note] -> There were issues reported with the previous release of this policy and a fix was added in Windows 10, version 1709. - - -To validate on Desktop, do the following: - -- 1 - Enable policy and restart explorer.exe -- 2a - If set to '1': Verify that the all apps list is collapsed, and that the Settings toggle is not grayed out. -- 2b - If set to '2': Verify that the all apps list is collapsed, and that the Settings toggle is grayed out. -- 2c - If set to '3': Verify that there is no way of opening the all apps list from Start, and that the Settings toggle is grayed out. - - - -The following list shows the supported values: - -- 0 (default) – None. -- 1 – Hide all apps list. -- 2 - Hide all apps list, and Disable "Show app list in Start menu" in Settings app. -- 3 - Hide all apps list, remove all apps button, and Disable "Show app list in Start menu" in Settings app. - - - - -
- - -**Start/HideChangeAccountSettings** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Change account settings" from appearing in the user tile. - - - -The following list shows the supported values: - -- 0 (default) – False (do not hide). -- 1 - True (hide). - - - -To validate on Desktop, do the following: - -1. Enable policy. -2. Open Start, click on the user tile, and verify that "Change account settings" is not available. - - - - -
- - -**Start/HideFrequentlyUsedApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -> [!NOTE] -> This policy requires reboot to take effect. - -Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding most used apps. - - - -The following list shows the supported values: - -- 0 (default) – False (do not hide). -- 1 - True (hide). - - - -To validate on Desktop, do the following: - -1. Enable "Show most used apps" in the Settings app. -2. Use some apps to get them into the most used group in Start. -3. Enable policy. -4. Restart explorer.exe -5. Check that "Show most used apps" Settings toggle is grayed out. -6. Check that most used apps do not appear in Start. - - - - -
- - -**Start/HideHibernate** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Hibernate" from appearing in the Power button. - - -> [!NOTE] -> This policy can only be verified on laptops as "Hibernate" does not appear on regular PC's. - - - -The following list shows the supported values: - -- 0 (default) – False (do not hide). -- 1 - True (hide). - - - -To validate on Laptop, do the following: - -1. Enable policy. -2. Open Start, click on the Power button, and verify "Hibernate" is not available. - - - - -
- - -**Start/HideLock** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Lock" from appearing in the user tile. - - - -The following list shows the supported values: - -- 0 (default) – False (do not hide). -- 1 - True (hide). - - - -To validate on Desktop, do the following: - -1. Enable policy. -2. Open Start, click on the user tile, and verify "Lock" is not available. - - - - -
- - -**Start/HidePeopleBar** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark3check mark3check mark3check mark3cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * User - -
- - - -Added in Windows 10, version 1709. Enabling this policy removes the people icon from the taskbar as well as the corresponding settings toggle. It also prevents users from pinning people to the taskbar. - -Value type is integer. - - - -ADMX Info: -- GP English name: *Remove the People Bar from the taskbar* -- GP name: *HidePeopleBar* -- GP path: *Start Menu and Taskbar* -- GP ADMX file name: *StartMenu.admx* - - - - -
- - -**Start/HidePowerButton** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -> [!NOTE] -> This policy requires reboot to take effect. - -Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding the Power button from appearing. - - - -The following list shows the supported values: - -- 0 (default) – False (do not hide). -- 1 - True (hide). - - - -To validate on Desktop, do the following: - -1. Enable policy. -2. Open Start, and verify the power button is not available. - - - - -
- - -**Start/HideRecentJumplists** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -> [!NOTE] -> This policy requires reboot to take effect. - -Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding recently opened items in the jumplists from appearing. - - - -The following list shows the supported values: - -- 0 (default) – False (do not hide). -- 1 - True (hide). - - - -To validate on Desktop, do the following: - -1. Enable "Show recently opened items in Jump Lists on Start of the taskbar" in Settings. -2. Pin Photos to the taskbar, and open some images in the photos app. -3. Right click the pinned photos app and verify that a jumplist of recently opened items pops up. -4. Toggle "Show recently opened items in Jump Lists on Start of the taskbar" in Settings to clear jump lists. -5. Enable policy. -6. Restart explorer.exe -7. Check that Settings toggle is grayed out. -8. Repeat Step 2. -9. Right Click pinned photos app and verify that there is no jumplist of recent items. - - - - -
- - -**Start/HideRecentlyAddedApps** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -> [!NOTE] -> This policy requires reboot to take effect. - -Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding recently added apps. - - - -ADMX Info: -- GP English name: *Remove "Recently added" list from Start Menu* -- GP name: *HideRecentlyAddedApps* -- GP path: *Start Menu and Taskbar* -- GP ADMX file name: *StartMenu.admx* - - - -The following list shows the supported values: - -- 0 (default) – False (do not hide). -- 1 - True (hide). - - - -To validate on Desktop, do the following: - -1. Enable "Show recently added apps" in the Settings app. -2. Check if there are recently added apps in Start (if not, install some). -3. Enable policy. -4. Restart explorer.exe -5. Check that "Show recently added apps" Settings toggle is grayed out. -6. Check that recently added apps do not appear in Start. - - - - -
- - -**Start/HideRestart** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Restart" and "Update and restart" from appearing in the Power button. - - - -The following list shows the supported values: - -- 0 (default) – False (do not hide). -- 1 - True (hide). - - - -To validate on Desktop, do the following: - -1. Enable policy. -2. Open Start, click on the Power button, and verify "Restart" and "Update and restart" are not available. - - - - -
- - -**Start/HideShutDown** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Shut down" and "Update and shut down" from appearing in the Power button. - - - -The following list shows the supported values: - -- 0 (default) – False (do not hide). -- 1 - True (hide). - - - -To validate on Desktop, do the following: - -1. Enable policy. -2. Open Start, click on the Power button, and verify "Shut down" and "Update and shut down" are not available. - - - - -
- - -**Start/HideSignOut** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Sign out" from appearing in the user tile. - - - -The following list shows the supported values: - -- 0 (default) – False (do not hide). -- 1 - True (hide). - - - -To validate on Desktop, do the following: - -1. Enable policy. -2. Open Start, click on the user tile, and verify "Sign out" is not available. - - - - -
- - -**Start/HideSleep** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Sleep" from appearing in the Power button. - - - -The following list shows the supported values: - -- 0 (default) – False (do not hide). -- 1 - True (hide). - - - -To validate on Desktop, do the following: - -1. Enable policy. -2. Open Start, click on the Power button, and verify that "Sleep" is not available. - - - - -
- - -**Start/HideSwitchAccount** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Switch account" from appearing in the user tile. - - - -The following list shows the supported values: - -- 0 (default) – False (do not hide). -- 1 - True (hide). - - - -To validate on Desktop, do the following: - -1. Enable policy. -2. Open Start, click on the user tile, and verify that "Switch account" is not available. - - - - -
- - -**Start/HideUserTile** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -> [!NOTE] -> This policy requires reboot to take effect. - -Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding the user tile. - - - -The following list shows the supported values: - -- 0 (default) – False (do not hide). -- 1 - True (hide). - - - -To validate on Desktop, do the following: - -1. Enable policy. -2. Log off. -3. Log in, and verify that the user tile is gone from Start. - - - - -
- - -**Start/ImportEdgeAssets** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -> [!NOTE] -> This policy requires reboot to take effect. - -Here is additional SKU support information: - -|Release |SKU Supported | -|---------|---------| -|Windows 10, version 1607 and older |Not supported | -|Windows 10, version 1703 and later |Enterprise, Education, Business | -|Windows 10, version 1709 and later |Enterprise, Education, Business, Pro, ProEducation, S, ProWorkstation | - -Added in Windows 10, version 1703. This policy imports Edge assets (e.g. .png/.jpg files) for secondary tiles into its local app data path which allows the StartLayout policy to pin Edge secondary tiles as weblink that tie to the image asset files. - -> [!IMPORTANT] -> Please note that the import happens only when StartLayout policy is changed. So it is better to always change ImportEdgeAssets policy at the same time as StartLayout policy whenever there are Edge secondary tiles to be pinned from StartLayout policy. - -The value set for this policy is an XML string containing Edge assets. For an example XML string, see [Add image for secondary Microsoft Edge tiles](https://docs.microsoft.com/en-us/windows/configuration/start-secondary-tiles). - - - -To validate on Desktop, do the following: - -1. Set policy with an XML for Edge assets. -2. Set StartLayout policy to anything so that it would trigger the Edge assets import. -3. Sign out/in. -4. Verify that all Edge assets defined in XML show up in %LOCALAPPDATA%\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\LocalState path. - - - - -
- - -**Start/NoPinningToTaskbar** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. Allows IT Admins to configure the taskbar by disabling pinning and unpinning apps on the taskbar. - - - -The following list shows the supported values: - -- 0 (default) – False (pinning enabled). -- 1 - True (pinning disabled). - - - -To validate on Desktop, do the following: - -1. Enable policy. -2. Right click on a program pinned to taskbar. -3. Verify that "Unpin from taskbar" menu does not show. -4. Open Start and right click on one of the app list icons. -5. Verify that More->Pin to taskbar menu does not show. - - - - -
- - -**Start/StartLayout** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck markcheck markcheck markcheck markcross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * User -> * Device - -
- - - -> [!IMPORTANT] -> Added in Windows 10 version 1703: In addition to being able to set this node on a per user-basis, it can now also be set on a per-device basis. For more information, see [Policy scope](./policy-configuration-service-provider.md#policy-scope) - -Here is additional SKU support information: - -|Release |SKU Supported | -|---------|---------| -|Windows 10, version 1511 and older |Not supported | -|Windows 10, version 1607 and later |Enterprise, Education, Business | -|Windows 10, version 1709 and later |Enterprise, Education, Business, Pro, ProEducation, S, ProWorkstation | - -Allows you to override the default Start layout and prevents the user from changing it. If both user and device policies are set, the user policy will be used. Apps pinned to the taskbar can also be changed with this policy - -For further details on how to customize the Start layout, please see [Customize and export Start layout](https://docs.microsoft.com/en-us/windows/configuration/customize-and-export-start-layout) and [Configure Windows 10 taskbar](https://docs.microsoft.com/en-us/windows/configuration/configure-windows-10-taskbar). - - - -ADMX Info: -- GP English name: *Start Layout* -- GP name: *LockedStartLayout* -- GP path: *Start Menu and Taskbar* -- GP ADMX file name: *StartMenu.admx* - - - -
- -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. -- 4 - Added in Windows 10, version 1803. -- 5 - Added in the next major release of Windows 10. - - - +--- +title: Policy CSP - Start +description: Policy CSP - Start +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: MariciaAlforque +ms.date: 08/14/2018 +--- + +# Policy CSP - Start + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
+ + +## Start policies + +
+
+ Start/AllowPinnedFolderDocuments +
+
+ Start/AllowPinnedFolderDownloads +
+
+ Start/AllowPinnedFolderFileExplorer +
+
+ Start/AllowPinnedFolderHomeGroup +
+
+ Start/AllowPinnedFolderMusic +
+
+ Start/AllowPinnedFolderNetwork +
+
+ Start/AllowPinnedFolderPersonalFolder +
+
+ Start/AllowPinnedFolderPictures +
+
+ Start/AllowPinnedFolderSettings +
+
+ Start/AllowPinnedFolderVideos +
+
+ Start/DisableContextMenus +
+
+ Start/ForceStartSize +
+
+ Start/HideAppList +
+
+ Start/HideChangeAccountSettings +
+
+ Start/HideFrequentlyUsedApps +
+
+ Start/HideHibernate +
+
+ Start/HideLock +
+
+ Start/HidePeopleBar +
+
+ Start/HidePowerButton +
+
+ Start/HideRecentJumplists +
+
+ Start/HideRecentlyAddedApps +
+
+ Start/HideRestart +
+
+ Start/HideShutDown +
+
+ Start/HideSignOut +
+
+ Start/HideSleep +
+
+ Start/HideSwitchAccount +
+
+ Start/HideUserTile +
+
+ Start/ImportEdgeAssets +
+
+ Start/NoPinningToTaskbar +
+
+ Start/StartLayout +
+
+ + +
+ + +**Start/AllowPinnedFolderDocuments** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. This policy controls the visibility of the Documents shortcut on the Start menu. + + + +The following list shows the supported values: + +- 0 – The shortcut is hidden and disables the setting in the Settings app. +- 1 – The shortcut is visible and disables the setting in the Settings app. +- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. + + + + +
+ + +**Start/AllowPinnedFolderDownloads** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. This policy controls the visibility of the Downloads shortcut on the Start menu. + + + +The following list shows the supported values: + +- 0 – The shortcut is hidden and disables the setting in the Settings app. +- 1 – The shortcut is visible and disables the setting in the Settings app. +- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. + + + + +
+ + +**Start/AllowPinnedFolderFileExplorer** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. This policy controls the visibility of the File Explorer shortcut on the Start menu. + + + +The following list shows the supported values: + +- 0 – The shortcut is hidden and disables the setting in the Settings app. +- 1 – The shortcut is visible and disables the setting in the Settings app. +- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. + + + + +
+ + +**Start/AllowPinnedFolderHomeGroup** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. This policy controls the visibility of the HomeGroup shortcut on the Start menu. + + + +The following list shows the supported values: + +- 0 – The shortcut is hidden and disables the setting in the Settings app. +- 1 – The shortcut is visible and disables the setting in the Settings app. +- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. + + + + +
+ + +**Start/AllowPinnedFolderMusic** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. This policy controls the visibility of the Music shortcut on the Start menu. + + + +The following list shows the supported values: + +- 0 – The shortcut is hidden and disables the setting in the Settings app. +- 1 – The shortcut is visible and disables the setting in the Settings app. +- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. + + + + +
+ + +**Start/AllowPinnedFolderNetwork** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. This policy controls the visibility of the Network shortcut on the Start menu. + + + +The following list shows the supported values: + +- 0 – The shortcut is hidden and disables the setting in the Settings app. +- 1 – The shortcut is visible and disables the setting in the Settings app. +- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. + + + + +
+ + +**Start/AllowPinnedFolderPersonalFolder** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. This policy controls the visibility of the PersonalFolder shortcut on the Start menu. + + + +The following list shows the supported values: + +- 0 – The shortcut is hidden and disables the setting in the Settings app. +- 1 – The shortcut is visible and disables the setting in the Settings app. +- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. + + + + +
+ + +**Start/AllowPinnedFolderPictures** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. This policy controls the visibility of the Pictures shortcut on the Start menu. + + + +The following list shows the supported values: + +- 0 – The shortcut is hidden and disables the setting in the Settings app. +- 1 – The shortcut is visible and disables the setting in the Settings app. +- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. + + + + +
+ + +**Start/AllowPinnedFolderSettings** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. This policy controls the visibility of the Settings shortcut on the Start menu. + + + +The following list shows the supported values: + +- 0 – The shortcut is hidden and disables the setting in the Settings app. +- 1 – The shortcut is visible and disables the setting in the Settings app. +- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. + + + + +
+ + +**Start/AllowPinnedFolderVideos** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. This policy controls the visibility of the Videos shortcut on the Start menu. + + + +The following list shows the supported values: + +- 0 – The shortcut is hidden and disables the setting in the Settings app. +- 1 – The shortcut is visible and disables the setting in the Settings app. +- 65535 (default) - There is no enforced configuration and the setting can be changed by the user. + + + + +
+ + +**Start/DisableContextMenus** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark4check mark4check mark4check mark4
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ + + +Enabling this policy prevents context menus from being invoked in the Start Menu. + + + +ADMX Info: +- GP English name: *Disable context menus in the Start Menu* +- GP name: *DisableContextMenusInStart* +- GP path: *Start Menu and Taskbar* +- GP ADMX file name: *StartMenu.admx* + + + + + + + + + + + + + +
+ + +**Start/ForceStartSize** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck markcheck markcheck markcheck markcross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +> [!NOTE] +> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. + + +Forces the start screen size. + + +If there is policy configuration conflict, the latest configuration request is applied to the device. + + + +The following list shows the supported values: + +- 0 (default) – Do not force size of Start. +- 1 – Force non-fullscreen size of Start. +- 2 - Force a fullscreen size of Start. + + + + +
+ + +**Start/HideAppList** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark3check mark3check mark3check mark3cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +> [!NOTE] +> This policy requires reboot to take effect. + +Allows IT Admins to configure Start by collapsing or removing the all apps list. + +> [!Note] +> There were issues reported with the previous release of this policy and a fix was added in Windows 10, version 1709. + + +To validate on Desktop, do the following: + +- 1 - Enable policy and restart explorer.exe +- 2a - If set to '1': Verify that the all apps list is collapsed, and that the Settings toggle is not grayed out. +- 2b - If set to '2': Verify that the all apps list is collapsed, and that the Settings toggle is grayed out. +- 2c - If set to '3': Verify that there is no way of opening the all apps list from Start, and that the Settings toggle is grayed out. + + + +The following list shows the supported values: + +- 0 (default) – None. +- 1 – Hide all apps list. +- 2 - Hide all apps list, and Disable "Show app list in Start menu" in Settings app. +- 3 - Hide all apps list, remove all apps button, and Disable "Show app list in Start menu" in Settings app. + + + + +
+ + +**Start/HideChangeAccountSettings** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Change account settings" from appearing in the user tile. + + + +The following list shows the supported values: + +- 0 (default) – False (do not hide). +- 1 - True (hide). + + + +To validate on Desktop, do the following: + +1. Enable policy. +2. Open Start, click on the user tile, and verify that "Change account settings" is not available. + + + + +
+ + +**Start/HideFrequentlyUsedApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +> [!NOTE] +> This policy requires reboot to take effect. + +Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding most used apps. + + + +The following list shows the supported values: + +- 0 (default) – False (do not hide). +- 1 - True (hide). + + + +To validate on Desktop, do the following: + +1. Enable "Show most used apps" in the Settings app. +2. Use some apps to get them into the most used group in Start. +3. Enable policy. +4. Restart explorer.exe +5. Check that "Show most used apps" Settings toggle is grayed out. +6. Check that most used apps do not appear in Start. + + + + +
+ + +**Start/HideHibernate** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Hibernate" from appearing in the Power button. + + +> [!NOTE] +> This policy can only be verified on laptops as "Hibernate" does not appear on regular PC's. + + + +The following list shows the supported values: + +- 0 (default) – False (do not hide). +- 1 - True (hide). + + + +To validate on Laptop, do the following: + +1. Enable policy. +2. Open Start, click on the Power button, and verify "Hibernate" is not available. + + + + +
+ + +**Start/HideLock** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Lock" from appearing in the user tile. + + + +The following list shows the supported values: + +- 0 (default) – False (do not hide). +- 1 - True (hide). + + + +To validate on Desktop, do the following: + +1. Enable policy. +2. Open Start, click on the user tile, and verify "Lock" is not available. + + + + +
+ + +**Start/HidePeopleBar** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark3check mark3check mark3check mark3cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User + +
+ + + +Added in Windows 10, version 1709. Enabling this policy removes the people icon from the taskbar as well as the corresponding settings toggle. It also prevents users from pinning people to the taskbar. + +Value type is integer. + + + +ADMX Info: +- GP English name: *Remove the People Bar from the taskbar* +- GP name: *HidePeopleBar* +- GP path: *Start Menu and Taskbar* +- GP ADMX file name: *StartMenu.admx* + + + + +
+ + +**Start/HidePowerButton** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +> [!NOTE] +> This policy requires reboot to take effect. + +Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding the Power button from appearing. + + + +The following list shows the supported values: + +- 0 (default) – False (do not hide). +- 1 - True (hide). + + + +To validate on Desktop, do the following: + +1. Enable policy. +2. Open Start, and verify the power button is not available. + + + + +
+ + +**Start/HideRecentJumplists** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +> [!NOTE] +> This policy requires reboot to take effect. + +Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding recently opened items in the jumplists from appearing. + + + +The following list shows the supported values: + +- 0 (default) – False (do not hide). +- 1 - True (hide). + + + +To validate on Desktop, do the following: + +1. Enable "Show recently opened items in Jump Lists on Start of the taskbar" in Settings. +2. Pin Photos to the taskbar, and open some images in the photos app. +3. Right click the pinned photos app and verify that a jumplist of recently opened items pops up. +4. Toggle "Show recently opened items in Jump Lists on Start of the taskbar" in Settings to clear jump lists. +5. Enable policy. +6. Restart explorer.exe +7. Check that Settings toggle is grayed out. +8. Repeat Step 2. +9. Right Click pinned photos app and verify that there is no jumplist of recent items. + + + + +
+ + +**Start/HideRecentlyAddedApps** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +> [!NOTE] +> This policy requires reboot to take effect. + +Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding recently added apps. + + + +ADMX Info: +- GP English name: *Remove "Recently added" list from Start Menu* +- GP name: *HideRecentlyAddedApps* +- GP path: *Start Menu and Taskbar* +- GP ADMX file name: *StartMenu.admx* + + + +The following list shows the supported values: + +- 0 (default) – False (do not hide). +- 1 - True (hide). + + + +To validate on Desktop, do the following: + +1. Enable "Show recently added apps" in the Settings app. +2. Check if there are recently added apps in Start (if not, install some). +3. Enable policy. +4. Restart explorer.exe +5. Check that "Show recently added apps" Settings toggle is grayed out. +6. Check that recently added apps do not appear in Start. + + + + +
+ + +**Start/HideRestart** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Restart" and "Update and restart" from appearing in the Power button. + + + +The following list shows the supported values: + +- 0 (default) – False (do not hide). +- 1 - True (hide). + + + +To validate on Desktop, do the following: + +1. Enable policy. +2. Open Start, click on the Power button, and verify "Restart" and "Update and restart" are not available. + + + + +
+ + +**Start/HideShutDown** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Shut down" and "Update and shut down" from appearing in the Power button. + + + +The following list shows the supported values: + +- 0 (default) – False (do not hide). +- 1 - True (hide). + + + +To validate on Desktop, do the following: + +1. Enable policy. +2. Open Start, click on the Power button, and verify "Shut down" and "Update and shut down" are not available. + + + + +
+ + +**Start/HideSignOut** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Sign out" from appearing in the user tile. + + + +The following list shows the supported values: + +- 0 (default) – False (do not hide). +- 1 - True (hide). + + + +To validate on Desktop, do the following: + +1. Enable policy. +2. Open Start, click on the user tile, and verify "Sign out" is not available. + + + + +
+ + +**Start/HideSleep** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Sleep" from appearing in the Power button. + + + +The following list shows the supported values: + +- 0 (default) – False (do not hide). +- 1 - True (hide). + + + +To validate on Desktop, do the following: + +1. Enable policy. +2. Open Start, click on the Power button, and verify that "Sleep" is not available. + + + + +
+ + +**Start/HideSwitchAccount** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Switch account" from appearing in the user tile. + + + +The following list shows the supported values: + +- 0 (default) – False (do not hide). +- 1 - True (hide). + + + +To validate on Desktop, do the following: + +1. Enable policy. +2. Open Start, click on the user tile, and verify that "Switch account" is not available. + + + + +
+ + +**Start/HideUserTile** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +> [!NOTE] +> This policy requires reboot to take effect. + +Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding the user tile. + + + +The following list shows the supported values: + +- 0 (default) – False (do not hide). +- 1 - True (hide). + + + +To validate on Desktop, do the following: + +1. Enable policy. +2. Log off. +3. Log in, and verify that the user tile is gone from Start. + + + + +
+ + +**Start/ImportEdgeAssets** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +> [!NOTE] +> This policy requires reboot to take effect. + +Here is additional SKU support information: + +|Release |SKU Supported | +|---------|---------| +|Windows 10, version 1607 and older |Not supported | +|Windows 10, version 1703 and later |Enterprise, Education, Business | +|Windows 10, version 1709 and later |Enterprise, Education, Business, Pro, ProEducation, S, ProWorkstation | + +Added in Windows 10, version 1703. This policy imports Edge assets (e.g. .png/.jpg files) for secondary tiles into its local app data path which allows the StartLayout policy to pin Edge secondary tiles as weblink that tie to the image asset files. + +> [!IMPORTANT] +> Please note that the import happens only when StartLayout policy is changed. So it is better to always change ImportEdgeAssets policy at the same time as StartLayout policy whenever there are Edge secondary tiles to be pinned from StartLayout policy. + +The value set for this policy is an XML string containing Edge assets. For an example XML string, see [Add image for secondary Microsoft Edge tiles](https://docs.microsoft.com/en-us/windows/configuration/start-secondary-tiles). + + + +To validate on Desktop, do the following: + +1. Set policy with an XML for Edge assets. +2. Set StartLayout policy to anything so that it would trigger the Edge assets import. +3. Sign out/in. +4. Verify that all Edge assets defined in XML show up in %LOCALAPPDATA%\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\LocalState path. + + + + +
+ + +**Start/NoPinningToTaskbar** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. Allows IT Admins to configure the taskbar by disabling pinning and unpinning apps on the taskbar. + + + +The following list shows the supported values: + +- 0 (default) – False (pinning enabled). +- 1 - True (pinning disabled). + + + +To validate on Desktop, do the following: + +1. Enable policy. +2. Right click on a program pinned to taskbar. +3. Verify that "Unpin from taskbar" menu does not show. +4. Open Start and right click on one of the app list icons. +5. Verify that More->Pin to taskbar menu does not show. + + + + +
+ + +**Start/StartLayout** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck markcheck markcheck markcheck markcross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ + + +> [!IMPORTANT] +> Added in Windows 10 version 1703: In addition to being able to set this node on a per user-basis, it can now also be set on a per-device basis. For more information, see [Policy scope](./policy-configuration-service-provider.md#policy-scope) + +Here is additional SKU support information: + +|Release |SKU Supported | +|---------|---------| +|Windows 10, version 1511 and older |Not supported | +|Windows 10, version 1607 and later |Enterprise, Education, Business | +|Windows 10, version 1709 and later |Enterprise, Education, Business, Pro, ProEducation, S, ProWorkstation | + +Allows you to override the default Start layout and prevents the user from changing it. If both user and device policies are set, the user policy will be used. Apps pinned to the taskbar can also be changed with this policy + +For further details on how to customize the Start layout, please see [Customize and export Start layout](https://docs.microsoft.com/en-us/windows/configuration/customize-and-export-start-layout) and [Configure Windows 10 taskbar](https://docs.microsoft.com/en-us/windows/configuration/configure-windows-10-taskbar). + + + +ADMX Info: +- GP English name: *Start Layout* +- GP name: *LockedStartLayout* +- GP path: *Start Menu and Taskbar* +- GP ADMX file name: *StartMenu.admx* + + + +
+ +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. +- 4 - Added in Windows 10, version 1803. +- 5 - Added in the next major release of Windows 10. + + + diff --git a/windows/client-management/mdm/policy-csp-update.md b/windows/client-management/mdm/policy-csp-update.md index 99145cc967..df68eeee47 100644 --- a/windows/client-management/mdm/policy-csp-update.md +++ b/windows/client-management/mdm/policy-csp-update.md @@ -1,3570 +1,3570 @@ ---- -title: Policy CSP - Update -description: Policy CSP - Update -ms.author: maricia -ms.topic: article -ms.prod: w10 -ms.technology: windows -author: MariciaAlforque -ms.date: 08/10/2018 ---- - -# Policy CSP - Update - -> [!WARNING] -> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. - - -
- - -## Update policies - -
-
- Update/ActiveHoursEnd -
-
- Update/ActiveHoursMaxRange -
-
- Update/ActiveHoursStart -
-
- Update/AllowAutoUpdate -
-
- Update/AllowAutoWindowsUpdateDownloadOverMeteredNetwork -
-
- Update/AllowMUUpdateService -
-
- Update/AllowNonMicrosoftSignedUpdate -
-
- Update/AllowUpdateService -
-
- Update/AutoRestartDeadlinePeriodInDays -
-
- Update/AutoRestartDeadlinePeriodInDaysForFeatureUpdates -
-
- Update/AutoRestartNotificationSchedule -
-
- Update/AutoRestartRequiredNotificationDismissal -
-
- Update/BranchReadinessLevel -
-
- Update/ConfigureFeatureUpdateUninstallPeriod -
-
- Update/DeferFeatureUpdatesPeriodInDays -
-
- Update/DeferQualityUpdatesPeriodInDays -
-
- Update/DeferUpdatePeriod -
-
- Update/DeferUpgradePeriod -
-
- Update/DetectionFrequency -
-
- Update/DisableDualScan -
-
- Update/EngagedRestartDeadline -
-
- Update/EngagedRestartDeadlineForFeatureUpdates -
-
- Update/EngagedRestartSnoozeSchedule -
-
- Update/EngagedRestartSnoozeScheduleForFeatureUpdates -
-
- Update/EngagedRestartTransitionSchedule -
-
- Update/EngagedRestartTransitionScheduleForFeatureUpdates -
-
- Update/ExcludeWUDriversInQualityUpdate -
-
- Update/FillEmptyContentUrls -
-
- Update/IgnoreMOAppDownloadLimit -
-
- Update/IgnoreMOUpdateDownloadLimit -
-
- Update/ManagePreviewBuilds -
-
- Update/PauseDeferrals -
-
- Update/PauseFeatureUpdates -
-
- Update/PauseFeatureUpdatesStartTime -
-
- Update/PauseQualityUpdates -
-
- Update/PauseQualityUpdatesStartTime -
-
- Update/PhoneUpdateRestrictions -
-
- Update/RequireDeferUpgrade -
-
- Update/RequireUpdateApproval -
-
- Update/ScheduleImminentRestartWarning -
-
- Update/ScheduleRestartWarning -
-
- Update/ScheduledInstallDay -
-
- Update/ScheduledInstallEveryWeek -
-
- Update/ScheduledInstallFirstWeek -
-
- Update/ScheduledInstallFourthWeek -
-
- Update/ScheduledInstallSecondWeek -
-
- Update/ScheduledInstallThirdWeek -
-
- Update/ScheduledInstallTime -
-
- Update/SetAutoRestartNotificationDisable -
-
- Update/SetDisablePauseUXAccess -
-
- Update/SetDisableUXWUAccess -
-
- Update/SetEDURestart -
-
- Update/UpdateNotificationLevel -
-
- Update/UpdateServiceUrl -
-
- Update/UpdateServiceUrlAlternate -
-
- - -
- - -**Update/ActiveHoursEnd** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark1check mark1check mark1check mark1cross markcheck mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. Allows the IT admin (when used with **Update/ActiveHoursStart**) to manage a range of active hours where update reboots are not scheduled. This value sets the end time. There is a 12 hour maximum from start time. - -> [!NOTE] -> The default maximum difference from start time has been increased to 18 in Windows 10, version 1703. In this version of Windows 10, the maximum range of active hours can now be configured. See **Update/ActiveHoursMaxRange** below for more information. - -Supported values are 0-23, where 0 is 12 AM, 1 is 1 AM, etc. - -The default is 17 (5 PM). - - - -ADMX Info: -- GP English name: *Turn off auto-restart for updates during active hours* -- GP name: *ActiveHours* -- GP element: *ActiveHoursEndTime* -- GP path: *Windows Components/Windows Update* -- GP ADMX file name: *WindowsUpdate.admx* - - - - -
- - -**Update/ActiveHoursMaxRange** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. Allows the IT admin to specify the max active hours range. This value sets max number of active hours from start time. - -Supported values are 8-18. - -The default value is 18 (hours). - - - -ADMX Info: -- GP English name: *Specify active hours range for auto-restarts* -- GP name: *ActiveHoursMaxRange* -- GP element: *ActiveHoursMaxRange* -- GP path: *Windows Components/Windows Update* -- GP ADMX file name: *WindowsUpdate.admx* - - - - -
- - -**Update/ActiveHoursStart** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark1check mark1check mark1check mark1cross markcheck mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. Allows the IT admin (when used with **Update/ActiveHoursEnd**) to manage a range of hours where update reboots are not scheduled. This value sets the start time. There is a 12 hour maximum from end time. - -> [!NOTE] -> The default maximum difference from end time has been increased to 18 in Windows 10, version 1703. In this version of Windows 10, the maximum range of active hours can now be configured. See **Update/ActiveHoursMaxRange** above for more information. - -Supported values are 0-23, where 0 is 12 AM, 1 is 1 AM, etc. - -The default value is 8 (8 AM). - - - -ADMX Info: -- GP English name: *Turn off auto-restart for updates during active hours* -- GP name: *ActiveHours* -- GP element: *ActiveHoursStartTime* -- GP path: *Windows Components/Windows Update* -- GP ADMX file name: *WindowsUpdate.admx* - - - - -
- - -**Update/AllowAutoUpdate** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck markcheck markcheck markcheck markcross markcheck mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Enables the IT admin to manage automatic update behavior to scan, download, and install updates. - -Supported operations are Get and Replace. - - -> [!IMPORTANT] -> This option should be used only for systems under regulatory compliance, as you will not get security updates as well. -  - -If the policy is not configured, end-users get the default behavior (Auto install and restart). - - - -ADMX Info: -- GP English name: *Configure Automatic Updates* -- GP name: *AutoUpdateCfg* -- GP element: *AutoUpdateMode* -- GP path: *Windows Components/Windows Update* -- GP ADMX file name: *WindowsUpdate.admx* - - - -The following list shows the supported values: - -- 0 – Notify the user before downloading the update. This policy is used by the enterprise who wants to enable the end-users to manage data usage. With this option users are notified when there are updates that apply to the device and are ready for download. Users can download and install the updates from the Windows Update control panel. -- 1 – Auto install the update and then notify the user to schedule a device restart. Updates are downloaded automatically on non-metered networks and installed during "Automatic Maintenance" when the device is not in use and is not running on battery power. If automatic maintenance is unable to install updates for two days, Windows Update will install updates immediately. If the installation requires a restart, the end-user is prompted to schedule the restart time. The end-user has up to seven days to schedule the restart and after that, a restart of the device is forced. Enabling the end-user to control the start time reduces the risk of accidental data loss caused by applications that do not shutdown properly on restart. -- 2 (default) – Auto install and restart. Updates are downloaded automatically on non-metered networks and installed during "Automatic Maintenance" when the device is not in use and is not running on battery power. If automatic maintenance is unable to install updates for two days, Windows Update will install updates right away. If a restart is required, then the device is automatically restarted when the device is not actively being used. This is the default behavior for unmanaged devices. Devices are updated quickly, but it increases the risk of accidental data loss caused by an application that does not shutdown properly on restart. -- 3 – Auto install and restart at a specified time. The IT specifies the installation day and time. If no day and time are specified, the default is 3 AM daily. Automatic installation happens at this time and device restart happens after a 15-minute countdown. If the user is logged in when Windows is ready to restart, the user can interrupt the 15-minute countdown to delay the restart. -- 4 – Auto install and restart without end-user control. Updates are downloaded automatically on non-metered networks and installed during "Automatic Maintenance" when the device is not in use and is not running on battery power. If automatic maintenance is unable to install updates for two days, Windows Update will install updates right away. If a restart is required, then the device is automatically restarted when the device is not actively being used. This setting option also sets the end-user control panel to read-only. -- 5 – Turn off automatic updates. - - - - -
- - -**Update/AllowAutoWindowsUpdateDownloadOverMeteredNetwork** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark3check mark3check mark3check mark3cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1709. Option to download updates automatically over metered connections (off by default). Value type is integer. - -A significant number of devices primarily use cellular data and do not have Wi-Fi access, which leads to a lower number of devices getting updates. Since a large number of devices have large data plans or unlimited data, this policy can unblock devices from getting updates. - -This policy is accessible through the Update setting in the user interface or Group Policy. - - - -ADMX Info: -- GP English name: *Allow updates to be downloaded automatically over metered connections* -- GP name: *AllowAutoWindowsUpdateDownloadOverMeteredNetwork* -- GP path: *Windows Components/Windows Update* -- GP ADMX file name: *WindowsUpdate.admx* - - - -The following list shows the supported values: - -- 0 (default) - Not allowed -- 1 - Allowed - - - - -
- - -**Update/AllowMUUpdateService** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark1check mark1check mark1check mark1cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. Allows the IT admin to manage whether to scan for app updates from Microsoft Update. - - - -ADMX Info: -- GP English name: *Configure Automatic Updates* -- GP name: *AutoUpdateCfg* -- GP element: *AllowMUUpdateServiceId* -- GP path: *Windows Components/Windows Update* -- GP ADMX file name: *WindowsUpdate.admx* - - - -The following list shows the supported values: - -- 0 – Not allowed or not configured. -- 1 – Allowed. Accepts updates received through Microsoft Update. - - - - -
- - -**Update/AllowNonMicrosoftSignedUpdate** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck markcheck markcheck markcheck markcross markcheck mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Allows the IT admin to manage whether Automatic Updates accepts updates signed by entities other than Microsoft when the update is found at the UpdateServiceUrl location. This policy supports using WSUS for 3rd party software and patch distribution. - -Supported operations are Get and Replace. - -This policy is specific to desktop and local publishing via WSUS for 3rd party updates (binaries and updates not hosted on Microsoft Update) and allows IT to manage whether Automatic Updates accepts updates signed by entities other than Microsoft when the update is found on an intranet Microsoft update service location. - - - -The following list shows the supported values: - -- 0 – Not allowed or not configured. Updates from an intranet Microsoft update service location must be signed by Microsoft. -- 1 – Allowed. Accepts updates received through an intranet Microsoft update service location, if they are signed by a certificate found in the "Trusted Publishers" certificate store of the local computer. - - - - -
- - -**Update/AllowUpdateService** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck markcheck markcheck markcheck markcross markcheck mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Specifies whether the device could use Microsoft Update, Windows Server Update Services (WSUS), or Microsoft Store. - -Even when Windows Update is configured to receive updates from an intranet update service, it will periodically retrieve information from the public Windows Update service to enable future connections to Windows Update, and other services like Microsoft Update or the Microsoft Store - -Enabling this policy will disable that functionality, and may cause connection to public services such as the Microsoft Store to stop working. - -> [!NOTE] -> This policy applies only when the desktop or device is configured to connect to an intranet update service using the "Specify intranet Microsoft update service location" policy. - - - -ADMX Info: -- GP English name: *Specify intranet Microsoft update service location* -- GP name: *CorpWuURL* -- GP path: *Windows Components/Windows Update* -- GP ADMX file name: *WindowsUpdate.admx* - - - -The following list shows the supported values: - -- 0 – Update service is not allowed. -- 1 (default) – Update service is allowed. - - - - -
- - -**Update/AutoRestartDeadlinePeriodInDays** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -For Quality Updates, this policy specifies the deadline in days before automatically executing a scheduled restart outside of active hours. The deadline can be set between 2 and 30 days from the time the restart is scheduled. - -Value type is integer. Default is 7 days. - -Supported values range: 2-30. - -Note that the PC must restart for certain updates to take effect. - -If you enable this policy, a restart will automatically occur the specified number of days after the restart was scheduled. - -If you disable or do not configure this policy, the PC will restart according to the default schedule. - -If any of the following two policies are enabled, this policy has no effect: -1. No auto-restart with logged on users for scheduled automatic updates installations. -2. Always automatically restart at scheduled time. - - - -ADMX Info: -- GP English name: *Specify deadline before auto-restart for update installation* -- GP name: *AutoRestartDeadline* -- GP element: *AutoRestartDeadline* -- GP path: *Windows Components/Windows Update* -- GP ADMX file name: *WindowsUpdate.admx* - - - - -
- - -**Update/AutoRestartDeadlinePeriodInDaysForFeatureUpdates** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark5check mark5check mark5check mark5
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -For Feature Updates, this policy specifies the deadline in days before automatically executing a scheduled restart outside of active hours. The deadline can be set between 2 and 30 days from the time the restart is scheduled. - -Value type is integer. Default is 7 days. - -Supported values range: 2-30. - -Note that the PC must restart for certain updates to take effect. - -If you enable this policy, a restart will automatically occur the specified number of days after the restart was scheduled. - -If you disable or do not configure this policy, the PC will restart according to the default schedule. - -If any of the following two policies are enabled, this policy has no effect: -1. No auto-restart with logged on users for scheduled automatic updates installations. -2. Always automatically restart at scheduled time. - - - -ADMX Info: -- GP English name: *Specify deadline before auto-restart for update installation* -- GP name: *AutoRestartDeadline* -- GP element: *AutoRestartDeadlineForFeatureUpdates* -- GP path: *Windows Components/Windows Update* -- GP ADMX file name: *WindowsUpdate.admx* - - - - -
- - -**Update/AutoRestartNotificationSchedule** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. Allows the IT Admin to specify the period for auto-restart reminder notifications. - -The default value is 15 (minutes). - - - -ADMX Info: -- GP English name: *Configure auto-restart reminder notifications for updates* -- GP name: *AutoRestartNotificationConfig* -- GP element: *AutoRestartNotificationSchd* -- GP path: *Windows Components/Windows Update* -- GP ADMX file name: *WindowsUpdate.admx* - - - -Supported values are 15, 30, 60, 120, and 240 (minutes). - - - - -
- - -**Update/AutoRestartRequiredNotificationDismissal** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. Allows the IT Admin to specify the method by which the auto-restart required notification is dismissed. - - - -ADMX Info: -- GP English name: *Configure auto-restart required notification for updates* -- GP name: *AutoRestartRequiredNotificationDismissal* -- GP element: *AutoRestartRequiredNotificationDismissal* -- GP path: *Windows Components/Windows Update* -- GP ADMX file name: *WindowsUpdate.admx* - - - -The following list shows the supported values: - -- 1 (default) – Auto Dismissal. -- 2 – User Dismissal. - - - - -
- - -**Update/BranchReadinessLevel** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark1check mark1check mark1check mark1cross markcheck mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. Allows the IT admin to set which branch a device receives their updates from. - - - -ADMX Info: -- GP English name: *Select when Preview Builds and Feature Updates are received* -- GP name: *DeferFeatureUpdates* -- GP element: *BranchReadinessLevelId* -- GP path: *Windows Components/Windows Update/Windows Update for Business* -- GP ADMX file name: *WindowsUpdate.admx* - - - -The following list shows the supported values: - -- 2 {0x2} - Windows Insider build - Fast (added in Windows 10, version 1709) -- 4 {0x4} - Windows Insider build - Slow (added in Windows 10, version 1709) -- 8 {0x8} - Release Windows Insider build (added in Windows 10, version 1709) -- 16 {0x10} - (default) Semi-annual Channel (Targeted). Device gets all applicable feature updates from Semi-annual Channel (Targeted). -- 32 {0x20} - Semi-annual Channel. Device gets feature updates from Semi-annual Channel. - - - - -
- - -**Update/ConfigureFeatureUpdateUninstallPeriod** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark4check mark4check mark4check mark4cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1803. Enable IT admin to configure feature update uninstall period. Values range 2 - 60 days. Default is 10 days. - - - - -
- - -**Update/DeferFeatureUpdatesPeriodInDays** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark1check mark1check mark1check mark1cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Since this policy is not blocked, you will not get a failure message when you use it to configure a Windows 10 Mobile device. However, the policy will not take effect. - -Added in Windows 10, version 1607. Defers Feature Updates for the specified number of days. - -Supported values are 0-365 days. - -> [!IMPORTANT] -> The default maximum number of days to defer an update has been increased from 180 (Windows 10, version 1607) to 365 in Windows 10, version 1703. - - - -ADMX Info: -- GP English name: *Select when Preview Builds and Feature Updates are received* -- GP name: *DeferFeatureUpdates* -- GP element: *DeferFeatureUpdatesPeriodId* -- GP path: *Windows Components/Windows Update/Windows Update for Business* -- GP ADMX file name: *WindowsUpdate.admx* - - - - -
- - -**Update/DeferQualityUpdatesPeriodInDays** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark1check mark1check mark1check mark1cross markcheck mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. Defers Quality Updates for the specified number of days. - -Supported values are 0-30. - - - -ADMX Info: -- GP English name: *Select when Quality Updates are received* -- GP name: *DeferQualityUpdates* -- GP element: *DeferQualityUpdatesPeriodId* -- GP path: *Windows Components/Windows Update/Windows Update for Business* -- GP ADMX file name: *WindowsUpdate.admx* - - - - -
- - -**Update/DeferUpdatePeriod** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck markcheck markcheck markcheck markcross markcheck mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -> [!NOTE] -> Don't use this policy in Windows 10, version 1607 devices, instead use the new policies listed in [Changes in Windows 10, version 1607 for update management](device-update-management.md#windows10version1607forupdatemanagement). You can continue to use DeferUpdatePeriod for Windows 10, version 1511 devices. - - -Allows IT Admins to specify update delays for up to 4 weeks. - -Supported values are 0-4, which refers to the number of weeks to defer updates. - -In Windows 10 Mobile Enterprise version 1511 devices set to automatic updates, for DeferUpdatePeriod to work, you must set the following: - -- Update/RequireDeferUpgrade must be set to 1 -- System/AllowTelemetry must be set to 1 or higher - -If the "Specify intranet Microsoft update service location" policy is enabled, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. - -If the Allow Telemetry policy is enabled and the Options value is set to 0, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. - -OS upgrade: -- Maximum deferral: 8 months -- Deferral increment: 1 month -- Update type/notes: - - Upgrade - 3689BDC8-B205-4AF4-8D4A-A63924C5E9D5 - -Update: -- Maximum deferral: 1 month -- Deferral increment: 1 week -- Update type/notes: - If a machine has Microsoft Update enabled, any Microsoft Updates in these categories will also observe Defer / Pause logic. - - Security Update - 0FA1201D-4330-4FA8-8AE9-B877473B6441 - - Critical Update - E6CF1350-C01B-414D-A61F-263D14D133B4 - - Update Rollup - 28BC880E-0592-4CBF-8F95-C79B17911D5F - - Service Pack - 68C5B0A3-D1A6-4553-AE49-01D3A7827828 - - Tools - B4832BD8-E735-4761-8DAF-37F882276DAB - - Feature Pack - B54E7D24-7ADD-428F-8B75-90A396FA584F - - Update - CD5FFD1E-E932-4E3A-BF74-18BF0B1BBD83 - - Driver - EBFC1FC5-71A4-4F7B-9ACA-3B9A503104A0 - -Other/cannot defer: -- Maximum deferral: No deferral -- Deferral increment: No deferral -- Update type/notes: - Any update category not specifically enumerated above falls into this category. - - Definition Update - E0789628-CE08-4437-BE74-2495B842F43B - - - - - -ADMX Info: -- GP name: *DeferUpgrade* -- GP element: *DeferUpdatePeriodId* -- GP ADMX file name: *WindowsUpdate.admx* - - - - -
- - -**Update/DeferUpgradePeriod** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck markcheck markcheck markcheck markcross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -> [!NOTE] -> Since this policy is not blocked, you will not get a failure message when you use it to configure a Windows 10 Mobile device. However, the policy will not take effect. -> -> Don't use this policy in Windows 10, version 1607 devices, instead use the new policies listed in [Changes in Windows 10, version 1607 for update management](device-update-management.md#windows10version1607forupdatemanagement). You can continue to use DeferUpgradePeriod for Windows 10, version 1511 devices. - - -Allows IT Admins to specify additional upgrade delays for up to 8 months. - -Supported values are 0-8, which refers to the number of months to defer upgrades. - -If the "Specify intranet Microsoft update service location" policy is enabled, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. - -If the "Allow Telemetry" policy is enabled and the Options value is set to 0, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. - - - -ADMX Info: -- GP name: *DeferUpgrade* -- GP element: *DeferUpgradePeriodId* -- GP ADMX file name: *WindowsUpdate.admx* - - - - -
- - -**Update/DetectionFrequency** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. Specifies the scan frequency from every 1 - 22 hours. Default is 22 hours. - - - -ADMX Info: -- GP English name: *Automatic Updates detection frequency* -- GP name: *DetectionFrequency_Title* -- GP element: *DetectionFrequency_Hour2* -- GP path: *Windows Components/Windows Update* -- GP ADMX file name: *WindowsUpdate.admx* - - - - -
- - -**Update/DisableDualScan** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark3check mark3check mark3check mark3cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1709, but was added to 1607 and 1703 service releases. Do not allow update deferral policies to cause scans against Windows Update. If this policy is not enabled, then configuring deferral policies will result in the client unexpectedly scanning Windows update. With the policy enabled, those scans are prevented, and users can configure deferral policies as much as they like. - -For more information about dual scan, see [Demystifying "Dual Scan"](https://blogs.technet.microsoft.com/wsus/2017/05/05/demystifying-dual-scan/) and [Improving Dual Scan on 1607](https://blogs.technet.microsoft.com/wsus/2017/08/04/improving-dual-scan-on-1607/). - -This is the same as the Group Policy in Windows Components > Window Update "Do not allow update deferral policies to cause scans against Windows Update." - -Value type is integer. Supported operations are Add, Get, Replace, and Delete. - - - -ADMX Info: -- GP English name: *Do not allow update deferral policies to cause scans against Windows Update* -- GP name: *DisableDualScan* -- GP path: *Windows Components/Windows Update* -- GP ADMX file name: *WindowsUpdate.admx* - - - -The following list shows the supported values: - -- 0 - allow scan against Windows Update -- 1 - do not allow update deferral policies to cause scans against Windows Update - - - - -
- - -**Update/EngagedRestartDeadline** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -For Quality Updates, this policy specifies the deadline in days before automatically scheduling and executing a pending restart outside of active hours. The deadline can be set between 2 and 30 days from the time the restart becomes pending. If configured, the pending restart will transition from Auto-restart to Engaged restart (pending user schedule) to automatically executed, within the specified period. - -Value type is integer. Default is 14. - -Supported value range: 2 - 30. - -If no deadline is specified or deadline is set to 0, the restart will not be automatically executed and will remain Engaged restart (e.g. pending user scheduling). - -If you disable or do not configure this policy, the default behaviors will be used. - -If any of the following policies are configured, this policy has no effect: -1. No auto-restart with logged on users for scheduled automatic updates installations -2. Always automatically restart at scheduled time -3. Specify deadline before auto-restart for update installation - - - -ADMX Info: -- GP English name: *Specify Engaged restart transition and notification schedule for updates* -- GP name: *EngagedRestartTransitionSchedule* -- GP element: *EngagedRestartDeadline* -- GP path: *Windows Components/Windows Update* -- GP ADMX file name: *WindowsUpdate.admx* - - - - -
- - -**Update/EngagedRestartDeadlineForFeatureUpdates** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark5check mark5check mark5check mark5
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -For Feature Updates, this policy specifies the deadline in days before automatically scheduling and executing a pending restart outside of active hours. The deadline can be set between 2 and 30 days from the time the restart becomes pending. If configured, the pending restart will transition from Auto-restart to Engaged restart (pending user schedule) to automatically executed, within the specified period. - -Value type is integer. Default is 14. - -Supported value range: 2 - 30. - -If no deadline is specified or deadline is set to 0, the restart will not be automatically executed and will remain Engaged restart (e.g. pending user scheduling). - -If you disable or do not configure this policy, the default behaviors will be used. - -If any of the following policies are configured, this policy has no effect: -1. No auto-restart with logged on users for scheduled automatic updates installations -2. Always automatically restart at scheduled time -3. Specify deadline before auto-restart for update installation - - - -ADMX Info: -- GP English name: *Specify Engaged restart transition and notification schedule for updates* -- GP name: *EngagedRestartTransitionSchedule* -- GP element: *EngagedRestartDeadlineForFeatureUpdates* -- GP path: *Windows Components/Windows Update* -- GP ADMX file name: *WindowsUpdate.admx* - - - - -
- - -**Update/EngagedRestartSnoozeSchedule** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -For Quality Updates, this policy specifies the number of days a user can snooze Engaged restart reminder notifications. The snooze period can be set between 1 and 3 days. - -Value type is integer. Default is 3 days. - -Supported value range: 1 - 3. - -If you disable or do not configure this policy, the default behaviors will be used. - -If any of the following policies are configured, this policy has no effect: -1. No auto-restart with logged on users for scheduled automatic updates installations -2. Always automatically restart at scheduled time -3. Specify deadline before auto-restart for update installation - - - -ADMX Info: -- GP English name: *Specify Engaged restart transition and notification schedule for updates* -- GP name: *EngagedRestartTransitionSchedule* -- GP element: *EngagedRestartSnoozeSchedule* -- GP path: *Windows Components/Windows Update* -- GP ADMX file name: *WindowsUpdate.admx* - - - - -
- - -**Update/EngagedRestartSnoozeScheduleForFeatureUpdates** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark5check mark5check mark5check mark5
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -For Feature Updates, this policy specifies the number of days a user can snooze Engaged restart reminder notifications. The snooze period can be set between 1 and 3 days. - -Value type is integer. Default is 3 days. - -Supported value range: 1 - 3. - -If you disable or do not configure this policy, the default behaviors will be used. - -If any of the following policies are configured, this policy has no effect: -1. No auto-restart with logged on users for scheduled automatic updates installations -2. Always automatically restart at scheduled time -3. Specify deadline before auto-restart for update installation - - - -ADMX Info: -- GP English name: *Specify Engaged restart transition and notification schedule for updates* -- GP name: *EngagedRestartTransitionSchedule* -- GP element: *EngagedRestartSnoozeScheduleForFeatureUpdates* -- GP path: *Windows Components/Windows Update* -- GP ADMX file name: *WindowsUpdate.admx* - - - - -
- - -**Update/EngagedRestartTransitionSchedule** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -For Quality Updates, this policy specifies the timing before transitioning from Auto restarts scheduled_outside of active hours to Engaged restart, which requires the user to schedule. The period can be set between 2 and 30 days from the time the restart becomes pending. - -Value type is integer. - -Supported value range: 0 - 30. - -If you disable or do not configure this policy, the default behaviors will be used. - -If any of the following policies are configured, this policy has no effect: -1. No auto-restart with logged on users for scheduled automatic updates installations -2. Always automatically restart at scheduled time -3. Specify deadline before auto-restart for update installation - - - -ADMX Info: -- GP English name: *Specify Engaged restart transition and notification schedule for updates* -- GP name: *EngagedRestartTransitionSchedule* -- GP element: *EngagedRestartTransitionSchedule* -- GP path: *Windows Components/Windows Update* -- GP ADMX file name: *WindowsUpdate.admx* - - - - -
- - -**Update/EngagedRestartTransitionScheduleForFeatureUpdates** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark5check mark5check mark5check mark5
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -For Feature Updates, this policy specifies the timing before transitioning from Auto restarts scheduled_outside of active hours to Engaged restart, which requires the user to schedule. The period can be set between 2 and 30 days from the time the restart becomes pending. - -Value type is integer. - -Supported value range: 0 - 30. - -If you disable or do not configure this policy, the default behaviors will be used. - -If any of the following policies are configured, this policy has no effect: -1. No auto-restart with logged on users for scheduled automatic updates installations -2. Always automatically restart at scheduled time -3. Specify deadline before auto-restart for update installation - - - -ADMX Info: -- GP English name: *Specify Engaged restart transition and notification schedule for updates* -- GP name: *EngagedRestartTransitionSchedule* -- GP element: *EngagedRestartTransitionScheduleForFeatureUpdates* -- GP path: *Windows Components/Windows Update* -- GP ADMX file name: *WindowsUpdate.admx* - - - - -
- - -**Update/ExcludeWUDriversInQualityUpdate** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark1check mark1check mark1check mark1cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -> [!NOTE] -> Since this policy is not blocked, you will not get a failure message when you use it to configure a Windows 10 Mobile device. However, the policy will not take effect. - -Added in Windows 10, version 1607. Allows IT Admins to exclude Windows Update (WU) drivers during updates. - - - -ADMX Info: -- GP English name: *Do not include drivers with Windows Updates* -- GP name: *ExcludeWUDriversInQualityUpdate* -- GP path: *Windows Components/Windows Update* -- GP ADMX file name: *WindowsUpdate.admx* - - - -The following list shows the supported values: - -- 0 (default) – Allow Windows Update drivers. -- 1 – Exclude Windows Update drivers. - - - - -
- - -**Update/FillEmptyContentUrls** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in the April service release of Windows 10, version 1607. Allows Windows Update Agent to determine the download URL when it is missing from the metadata. This scenario will occur when intranet update service stores the metadata files but the download contents are stored in the ISV file cache (specified as the alternate download URL). - -> [!NOTE] -> This setting should only be used in combination with an alternate download URL and configured to use ISV file cache. This setting is used when the intranet update service does not provide download URLs in the update metadata for files which are available on the alternate download server. - - - -ADMX Info: -- GP English name: *Specify intranet Microsoft update service location* -- GP name: *CorpWuURL* -- GP element: *CorpWUFillEmptyContentUrls* -- GP path: *Windows Components/Windows Update* -- GP ADMX file name: *WindowsUpdate.admx* - - - -The following list shows the supported values: - -- 0 (default) – Disabled. -- 1 – Enabled. - - - - -
- - -**Update/IgnoreMOAppDownloadLimit** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. Specifies whether to ignore the MO download limit (allow unlimited downloading) over a cellular network for apps and their updates. If lower-level limits (for example, mobile caps) are required, those limits are controlled by external policies. - -> [!WARNING] -> Setting this policy might cause devices to incur costs from MO operators. - - - -The following list shows the supported values: - -- 0 (default) – Do not ignore MO download limit for apps and their updates. -- 1 – Ignore MO download limit (allow unlimited downloading) for apps and their updates. - - - -To validate this policy: - -1. Enable the policy ensure the device is on a cellular network. -2. Run the scheduled task on your device to check for app updates in the background. For example, on a mobile device, run the following commands in TShell: - - `regd delete HKEY_USERS\S-1-5-21-2702878673-795188819-444038987-2781\software\microsoft\windows\currentversion\windowsupdate /v LastAutoAppUpdateSearchSuccessTime /f` - - - `exec-device schtasks.exe -arguments ""/run /tn """"\Microsoft\Windows\WindowsUpdate\Automatic App Update"""" /I""` - -3. Verify that any downloads that are above the download size limit will complete without being paused. - - - - -
- - -**Update/IgnoreMOUpdateDownloadLimit** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. Specifies whether to ignore the MO download limit (allow unlimited downloading) over a cellular network for OS updates. If lower-level limits (for example, mobile caps) are required, those limits are controlled by external policies. - -> [!WARNING] -> Setting this policy might cause devices to incur costs from MO operators. - - - - `exec-device schtasks.exe -arguments ""/run /tn """"\Microsoft\Windows\WindowsUpdate\AUScheduledInstall"""" /I""` - -3. Verify that any downloads that are above the download size limit will complete without being paused. - - - -The following list shows the supported values: - -- 0 (default) – Do not ignore MO download limit for OS updates. -- 1 – Ignore MO download limit (allow unlimited downloading) for OS updates. - - - -To validate this policy: - -1. Enable the policy and ensure the device is on a cellular network. -2. Run the scheduled task on phone to check for OS updates in the background. For example, on a mobile device, run the following commands in TShell: - - - - -
- - -**Update/ManagePreviewBuilds** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark3check mark3check mark3check mark3cross markcheck mark2
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1709. Used to manage Windows 10 Insider Preview builds. Value type is integer. - - - -ADMX Info: -- GP English name: *Manage preview builds* -- GP name: *ManagePreviewBuilds* -- GP element: *ManagePreviewBuildsId* -- GP path: *Windows Components/Windows Update/Windows Update for Business* -- GP ADMX file name: *WindowsUpdate.admx* - - - -The following list shows the supported values: - -- 0 - Disable Preview builds -- 1 - Disable Preview builds once the next release is public -- 2 - Enable Preview builds - - - - -
- - -**Update/PauseDeferrals** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck markcheck markcheck markcheck markcross markcheck mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -> [!NOTE] -> Don't use this policy in Windows 10, version 1607 devices, instead use the new policies listed in [Changes in Windows 10, version 1607 for update management](device-update-management.md#windows10version1607forupdatemanagement). You can continue to use PauseDeferrals for Windows 10, version 1511 devices. - - -Allows IT Admins to pause updates and upgrades for up to 5 weeks. Paused deferrals will be reset after 5 weeks. - - -If the "Specify intranet Microsoft update service location" policy is enabled, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. - -If the "Allow Telemetry" policy is enabled and the Options value is set to 0, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. - - - -ADMX Info: -- GP name: *DeferUpgrade* -- GP element: *PauseDeferralsId* -- GP ADMX file name: *WindowsUpdate.admx* - - - -The following list shows the supported values: - -- 0 (default) – Deferrals are not paused. -- 1 – Deferrals are paused. - - - - -
- - -**Update/PauseFeatureUpdates** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark1check mark1check mark1check mark1cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Since this policy is not blocked, you will not get a failure message when you use it to configure a Windows 10 Mobile device. However, the policy will not take effect. - - -Added in Windows 10, version 1607. Allows IT Admins to pause Feature Updates for up to 60 days. - - - -ADMX Info: -- GP English name: *Select when Preview Builds and Feature Updates are received* -- GP name: *DeferFeatureUpdates* -- GP element: *PauseFeatureUpdatesId* -- GP path: *Windows Components/Windows Update/Windows Update for Business* -- GP ADMX file name: *WindowsUpdate.admx* - - - -The following list shows the supported values: - -- 0 (default) – Feature Updates are not paused. -- 1 – Feature Updates are paused for 60 days or until value set to back to 0, whichever is sooner. - - - - -
- - -**Update/PauseFeatureUpdatesStartTime** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. Specifies the date and time when the IT admin wants to start pausing the Feature Updates. - -Value type is string. Supported operations are Add, Get, Delete, and Replace. - - - -ADMX Info: -- GP English name: *Select when Preview Builds and Feature Updates are received* -- GP name: *DeferFeatureUpdates* -- GP element: *PauseFeatureUpdatesStartId* -- GP path: *Windows Components/Windows Update/Windows Update for Business* -- GP ADMX file name: *WindowsUpdate.admx* - - - - -
- - -**Update/PauseQualityUpdates** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark1check mark1check mark1check mark1cross markcheck mark1
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1607. Allows IT Admins to pause Quality Updates. - - - -ADMX Info: -- GP English name: *Select when Quality Updates are received* -- GP name: *DeferQualityUpdates* -- GP element: *PauseQualityUpdatesId* -- GP path: *Windows Components/Windows Update/Windows Update for Business* -- GP ADMX file name: *WindowsUpdate.admx* - - - -The following list shows the supported values: - -- 0 (default) – Quality Updates are not paused. -- 1 – Quality Updates are paused for 35 days or until value set back to 0, whichever is sooner. - - - - -
- - -**Update/PauseQualityUpdatesStartTime** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. Specifies the date and time when the IT admin wants to start pausing the Quality Updates. - -Value type is string. Supported operations are Add, Get, Delete, and Replace. - - - -ADMX Info: -- GP English name: *Select when Quality Updates are received* -- GP name: *DeferQualityUpdates* -- GP element: *PauseQualityUpdatesStartId* -- GP path: *Windows Components/Windows Update/Windows Update for Business* -- GP ADMX file name: *WindowsUpdate.admx* - - - - -
- - -**Update/PhoneUpdateRestrictions** - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -This policy is deprecated. Use [Update/RequireUpdateApproval](#update-requireupdateapproval) instead. - - - - -
- - -**Update/RequireDeferUpgrade** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck markcheck markcheck markcheck markcross markcheck mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -> [!NOTE] -> Don't use this policy in Windows 10, version 1607 devices, instead use the new policies listed in [Changes in Windows 10, version 1607 for update management](device-update-management.md#windows10version1607forupdatemanagement). You can continue to use RequireDeferUpgrade for Windows 10, version 1511 devices. - - -Allows the IT admin to set a device to Semi-Annual Channel train. - - - -ADMX Info: -- GP name: *DeferUpgrade* -- GP element: *DeferUpgradePeriodId* -- GP ADMX file name: *WindowsUpdate.admx* - - - -The following list shows the supported values: - -- 0 (default) – User gets upgrades from Semi-Annual Channel (Targeted). -- 1 – User gets upgrades from Semi-Annual Channel. - - - - -
- - -**Update/RequireUpdateApproval** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck markcheck markcheck markcheck markcross markcheck mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -> [!NOTE] -> If you previously used the **Update/PhoneUpdateRestrictions** policy in previous versions of Windows, it has been deprecated. Please use this policy instead. - - -Allows the IT admin to restrict the updates that are installed on a device to only those on an update approval list. It enables IT to accept the End User License Agreement (EULA) associated with the approved update on behalf of the end-user. EULAs are approved once an update is approved. - -Supported operations are Get and Replace. - - - -The following list shows the supported values: - -- 0 – Not configured. The device installs all applicable updates. -- 1 – The device only installs updates that are both applicable and on the Approved Updates list. Set this policy to 1 if IT wants to control the deployment of updates on devices, such as when testing is required prior to deployment. - - - - -
- - -**Update/ScheduleImminentRestartWarning** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. Allows the IT Admin to specify the period for auto-restart imminent warning notifications. - -The default value is 15 (minutes). - - - -ADMX Info: -- GP English name: *Configure auto-restart warning notifications schedule for updates* -- GP name: *RestartWarnRemind* -- GP element: *RestartWarn* -- GP path: *Windows Components/Windows Update* -- GP ADMX file name: *WindowsUpdate.admx* - - - -Supported values are 15, 30, or 60 (minutes). - - - - -
- - -**Update/ScheduleRestartWarning** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -> [!NOTE] -> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise - - -Added in Windows 10, version 1703. Allows the IT Admin to specify the period for auto-restart warning reminder notifications. - -The default value is 4 (hours). - - - -ADMX Info: -- GP English name: *Configure auto-restart warning notifications schedule for updates* -- GP name: *RestartWarnRemind* -- GP element: *RestartWarnRemind* -- GP path: *Windows Components/Windows Update* -- GP ADMX file name: *WindowsUpdate.admx* - - - -Supported values are 2, 4, 8, 12, or 24 (hours). - - - - -
- - -**Update/ScheduledInstallDay** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck markcheck markcheck markcheck markcross markcheck mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Enables the IT admin to schedule the day of the update installation. - -The data type is a integer. - -Supported operations are Add, Delete, Get, and Replace. - - - -ADMX Info: -- GP English name: *Configure Automatic Updates* -- GP name: *AutoUpdateCfg* -- GP element: *AutoUpdateSchDay* -- GP path: *Windows Components/Windows Update* -- GP ADMX file name: *WindowsUpdate.admx* - - - -The following list shows the supported values: - -- 0 (default) – Every day -- 1 – Sunday -- 2 – Monday -- 3 – Tuesday -- 4 – Wednesday -- 5 – Thursday -- 6 – Friday -- 7 – Saturday - - - - -
- - -**Update/ScheduledInstallEveryWeek** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark3check mark3check mark3check mark3check mark3cross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1709. Enables the IT admin to schedule the update installation on the every week. Value type is integer. Supported values: -
    -
  • 0 - no update in the schedule
  • -
  • 1 - update is scheduled every week
  • -
- - - -ADMX Info: -- GP English name: *Configure Automatic Updates* -- GP name: *AutoUpdateCfg* -- GP element: *AutoUpdateSchEveryWeek* -- GP path: *Windows Components/Windows Update* -- GP ADMX file name: *WindowsUpdate.admx* - - - - -
- - -**Update/ScheduledInstallFirstWeek** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark3check mark3check mark3check mark3check mark3cross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1709. Enables the IT admin to schedule the update installation on the first week of the month. Value type is integer. Supported values: -
    -
  • 0 - no update in the schedule
  • -
  • 1 - update is scheduled every first week of the month
  • -
- - - -ADMX Info: -- GP English name: *Configure Automatic Updates* -- GP name: *AutoUpdateCfg* -- GP element: *AutoUpdateSchFirstWeek* -- GP path: *Windows Components/Windows Update* -- GP ADMX file name: *WindowsUpdate.admx* - - - - -
- - -**Update/ScheduledInstallFourthWeek** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark3check mark3check mark3check mark3check mark3cross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1709. Enables the IT admin to schedule the update installation on the fourth week of the month. Value type is integer. Supported values: -
    -
  • 0 - no update in the schedule
  • -
  • 1 - update is scheduled every fourth week of the month
  • -
- - - -ADMX Info: -- GP English name: *Configure Automatic Updates* -- GP name: *AutoUpdateCfg* -- GP element: *ScheduledInstallFourthWeek* -- GP path: *Windows Components/Windows Update* -- GP ADMX file name: *WindowsUpdate.admx* - - - - -
- - -**Update/ScheduledInstallSecondWeek** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark3check mark3check mark3check mark3check mark3cross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1709. Enables the IT admin to schedule the update installation on the second week of the month. Value type is integer. Supported values: -
    -
  • 0 - no update in the schedule
  • -
  • 1 - update is scheduled every second week of the month
  • -
- - - -ADMX Info: -- GP English name: *Configure Automatic Updates* -- GP name: *AutoUpdateCfg* -- GP element: *ScheduledInstallSecondWeek* -- GP path: *Windows Components/Windows Update* -- GP ADMX file name: *WindowsUpdate.admx* - - - - -
- - -**Update/ScheduledInstallThirdWeek** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark3check mark3check mark3check mark3check mark3cross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1709. Enables the IT admin to schedule the update installation on the third week of the month. Value type is integer. Supported values: -
    -
  • 0 - no update in the schedule
  • -
  • 1 - update is scheduled every third week of the month
  • -
- - - -ADMX Info: -- GP English name: *Configure Automatic Updates* -- GP name: *AutoUpdateCfg* -- GP element: *ScheduledInstallThirdWeek* -- GP path: *Windows Components/Windows Update* -- GP ADMX file name: *WindowsUpdate.admx* - - - - -
- - -**Update/ScheduledInstallTime** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck markcheck markcheck markcheck markcross markcheck mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -> [!NOTE] -> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise - - -Enables the IT admin to schedule the time of the update installation. - -The data type is a integer. - -Supported operations are Add, Delete, Get, and Replace. - -Supported values are 0-23, where 0 = 12 AM and 23 = 11 PM. - -The default value is 3. - - - -ADMX Info: -- GP English name: *Configure Automatic Updates* -- GP name: *AutoUpdateCfg* -- GP element: *AutoUpdateSchTime* -- GP path: *Windows Components/Windows Update* -- GP ADMX file name: *WindowsUpdate.admx* - - - - -
- - -**Update/SetAutoRestartNotificationDisable** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. Allows the IT Admin to disable auto-restart notifications for update installations. - - - -ADMX Info: -- GP English name: *Turn off auto-restart notifications for update installations* -- GP name: *AutoRestartNotificationDisable* -- GP element: *AutoRestartNotificationSchd* -- GP path: *Windows Components/Windows Update* -- GP ADMX file name: *WindowsUpdate.admx* - - - -The following list shows the supported values: - -- 0 (default) – Enabled -- 1 – Disabled - - - - -
- - -**Update/SetDisablePauseUXAccess** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark5check mark5check mark5check mark5
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -This policy allows the IT admin to disable the "Pause Updates" feature. When this policy is enabled, the user cannot access the "Pause updates" feature. - -Value type is integer. Default is 0. Supported values 0, 1. - - - -ADMX Info: -- GP name: *SetDisablePauseUXAccess* -- GP ADMX file name: *WindowsUpdate.admx* - - - - -
- - -**Update/SetDisableUXWUAccess** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark5check mark5check mark5check mark5
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -This policy allows the IT admin to remove access to scan Windows Update. When this policy is enabled, the user cannot access the Windows Update scan, download, and install features. - -Value type is integer. Default is 0. Supported values 0, 1. - - - -ADMX Info: -- GP name: *SetDisableUXWUAccess* -- GP ADMX file name: *WindowsUpdate.admx* - - - - -
- - -**Update/SetEDURestart** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in Windows 10, version 1703. For devices in a cart, this policy skips all restart checks to ensure that the reboot will happen at ScheduledInstallTime. - - - -ADMX Info: -- GP English name: *Update Power Policy for Cart Restarts* -- GP name: *SetEDURestart* -- GP path: *Windows Components/Windows Update* -- GP ADMX file name: *WindowsUpdate.admx* - - - -The following list shows the supported values: - -- 0 - not configured -- 1 - configured - - - - -
- - -**Update/UpdateNotificationLevel** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark5check mark5check mark5check mark5
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Display options for update notifications. This policy allows you to define what Windows Update notifications users see. This policy doesn’t control how and when updates are downloaded and installed. - -Options: - -- 0 (default) – Use the default Windows Update notifications -- 1 – Turn off all notifications, excluding restart warnings -- 2 – Turn off all notifications, including restart warnings - -> [!Important] -> If you choose not to get update notifications and also define other Group policies so that devices aren’t automatically getting updates, neither you nor device users will be aware of critical security, quality, or feature updates, and your devices may be at risk. - - - -ADMX Info: -- GP English name: *Display options for update notifications* -- GP name: *UpdateNotificationLevel* -- GP path: *Windows Components/Windows Update* -- GP ADMX file name: *WindowsUpdate.admx* - - - - - - - - - - - - - -
- - -**Update/UpdateServiceUrl** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck markcheck markcheck markcheck markcross markcheck mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -> [!Important] -> Starting in Windows 10, version 1703 this policy is not supported in Windows 10 Mobile Enteprise and IoT Mobile. - -Allows the device to check for updates from a WSUS server instead of Microsoft Update. This is useful for on-premises MDMs that need to update devices that cannot connect to the Internet. - -Supported operations are Get and Replace. - - - -ADMX Info: -- GP English name: *Specify intranet Microsoft update service location* -- GP name: *CorpWuURL* -- GP element: *CorpWUURL_Name* -- GP path: *Windows Components/Windows Update* -- GP ADMX file name: *WindowsUpdate.admx* - - - -The following list shows the supported values: - -- Not configured. The device checks for updates from Microsoft Update. -- Set to a URL, such as `http://abcd-srv:8530`. The device checks for updates from the WSUS server at the specified URL. - - - -Example - -``` syntax - - $CmdID$ - - - chr - text/plain - - - ./Vendor/MSFT/Policy/Config/Update/UpdateServiceUrl - - http://abcd-srv:8530 - - -``` - - - - -
- - -**Update/UpdateServiceUrlAlternate** - - - - - - - - - - - - - - - - - - - - - -
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark1check mark1check mark1check mark1cross markcross mark
- - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -Added in the January service release of Windows 10, version 1607. Specifies an alternate intranet server to host updates from Microsoft Update. You can then use this update service to automatically update computers on your network. - -This setting lets you specify a server on your network to function as an internal update service. The Automatic Updates client will search this service for updates that apply to the computers on your network. - -To use this setting, you must set two server name values: the server from which the Automatic Updates client detects and downloads updates, and the server to which updated workstations upload statistics. You can set both values to be the same server. An optional server name value can be specified to configure Windows Update agent, and download updates from an alternate download server instead of WSUS Server. - -Value type is string and the default value is an empty string, "". If the setting is not configured, and if Automatic Updates is not disabled by policy or user preference, the Automatic Updates client connects directly to the Windows Update site on the Internet. - -> [!Note] -> If the "Configure Automatic Updates" Group Policy is disabled, then this policy has no effect. -> If the "Alternate Download Server" Group Policy is not set, it will use the WSUS server by default to download updates. -> This policy is not supported on Windows RT. Setting this policy will not have any effect on Windows RT PCs. - - - -ADMX Info: -- GP English name: *Specify intranet Microsoft update service location* -- GP name: *CorpWuURL* -- GP element: *CorpWUContentHost_Name* -- GP path: *Windows Components/Windows Update* -- GP ADMX file name: *WindowsUpdate.admx* - - - -
- -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. -- 4 - Added in Windows 10, version 1803. -- 5 - Added in the next major release of Windows 10. - - +--- +title: Policy CSP - Update +description: Policy CSP - Update +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: MariciaAlforque +ms.date: 08/10/2018 +--- + +# Policy CSP - Update + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
+ + +## Update policies + +
+
+ Update/ActiveHoursEnd +
+
+ Update/ActiveHoursMaxRange +
+
+ Update/ActiveHoursStart +
+
+ Update/AllowAutoUpdate +
+
+ Update/AllowAutoWindowsUpdateDownloadOverMeteredNetwork +
+
+ Update/AllowMUUpdateService +
+
+ Update/AllowNonMicrosoftSignedUpdate +
+
+ Update/AllowUpdateService +
+
+ Update/AutoRestartDeadlinePeriodInDays +
+
+ Update/AutoRestartDeadlinePeriodInDaysForFeatureUpdates +
+
+ Update/AutoRestartNotificationSchedule +
+
+ Update/AutoRestartRequiredNotificationDismissal +
+
+ Update/BranchReadinessLevel +
+
+ Update/ConfigureFeatureUpdateUninstallPeriod +
+
+ Update/DeferFeatureUpdatesPeriodInDays +
+
+ Update/DeferQualityUpdatesPeriodInDays +
+
+ Update/DeferUpdatePeriod +
+
+ Update/DeferUpgradePeriod +
+
+ Update/DetectionFrequency +
+
+ Update/DisableDualScan +
+
+ Update/EngagedRestartDeadline +
+
+ Update/EngagedRestartDeadlineForFeatureUpdates +
+
+ Update/EngagedRestartSnoozeSchedule +
+
+ Update/EngagedRestartSnoozeScheduleForFeatureUpdates +
+
+ Update/EngagedRestartTransitionSchedule +
+
+ Update/EngagedRestartTransitionScheduleForFeatureUpdates +
+
+ Update/ExcludeWUDriversInQualityUpdate +
+
+ Update/FillEmptyContentUrls +
+
+ Update/IgnoreMOAppDownloadLimit +
+
+ Update/IgnoreMOUpdateDownloadLimit +
+
+ Update/ManagePreviewBuilds +
+
+ Update/PauseDeferrals +
+
+ Update/PauseFeatureUpdates +
+
+ Update/PauseFeatureUpdatesStartTime +
+
+ Update/PauseQualityUpdates +
+
+ Update/PauseQualityUpdatesStartTime +
+
+ Update/PhoneUpdateRestrictions +
+
+ Update/RequireDeferUpgrade +
+
+ Update/RequireUpdateApproval +
+
+ Update/ScheduleImminentRestartWarning +
+
+ Update/ScheduleRestartWarning +
+
+ Update/ScheduledInstallDay +
+
+ Update/ScheduledInstallEveryWeek +
+
+ Update/ScheduledInstallFirstWeek +
+
+ Update/ScheduledInstallFourthWeek +
+
+ Update/ScheduledInstallSecondWeek +
+
+ Update/ScheduledInstallThirdWeek +
+
+ Update/ScheduledInstallTime +
+
+ Update/SetAutoRestartNotificationDisable +
+
+ Update/SetDisablePauseUXAccess +
+
+ Update/SetDisableUXWUAccess +
+
+ Update/SetEDURestart +
+
+ Update/UpdateNotificationLevel +
+
+ Update/UpdateServiceUrl +
+
+ Update/UpdateServiceUrlAlternate +
+
+ + +
+ + +**Update/ActiveHoursEnd** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark1check mark1check mark1check mark1cross markcheck mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. Allows the IT admin (when used with **Update/ActiveHoursStart**) to manage a range of active hours where update reboots are not scheduled. This value sets the end time. There is a 12 hour maximum from start time. + +> [!NOTE] +> The default maximum difference from start time has been increased to 18 in Windows 10, version 1703. In this version of Windows 10, the maximum range of active hours can now be configured. See **Update/ActiveHoursMaxRange** below for more information. + +Supported values are 0-23, where 0 is 12 AM, 1 is 1 AM, etc. + +The default is 17 (5 PM). + + + +ADMX Info: +- GP English name: *Turn off auto-restart for updates during active hours* +- GP name: *ActiveHours* +- GP element: *ActiveHoursEndTime* +- GP path: *Windows Components/Windows Update* +- GP ADMX file name: *WindowsUpdate.admx* + + + + +
+ + +**Update/ActiveHoursMaxRange** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. Allows the IT admin to specify the max active hours range. This value sets max number of active hours from start time. + +Supported values are 8-18. + +The default value is 18 (hours). + + + +ADMX Info: +- GP English name: *Specify active hours range for auto-restarts* +- GP name: *ActiveHoursMaxRange* +- GP element: *ActiveHoursMaxRange* +- GP path: *Windows Components/Windows Update* +- GP ADMX file name: *WindowsUpdate.admx* + + + + +
+ + +**Update/ActiveHoursStart** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark1check mark1check mark1check mark1cross markcheck mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. Allows the IT admin (when used with **Update/ActiveHoursEnd**) to manage a range of hours where update reboots are not scheduled. This value sets the start time. There is a 12 hour maximum from end time. + +> [!NOTE] +> The default maximum difference from end time has been increased to 18 in Windows 10, version 1703. In this version of Windows 10, the maximum range of active hours can now be configured. See **Update/ActiveHoursMaxRange** above for more information. + +Supported values are 0-23, where 0 is 12 AM, 1 is 1 AM, etc. + +The default value is 8 (8 AM). + + + +ADMX Info: +- GP English name: *Turn off auto-restart for updates during active hours* +- GP name: *ActiveHours* +- GP element: *ActiveHoursStartTime* +- GP path: *Windows Components/Windows Update* +- GP ADMX file name: *WindowsUpdate.admx* + + + + +
+ + +**Update/AllowAutoUpdate** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck markcheck markcheck markcheck markcross markcheck mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Enables the IT admin to manage automatic update behavior to scan, download, and install updates. + +Supported operations are Get and Replace. + + +> [!IMPORTANT] +> This option should be used only for systems under regulatory compliance, as you will not get security updates as well. +  + +If the policy is not configured, end-users get the default behavior (Auto install and restart). + + + +ADMX Info: +- GP English name: *Configure Automatic Updates* +- GP name: *AutoUpdateCfg* +- GP element: *AutoUpdateMode* +- GP path: *Windows Components/Windows Update* +- GP ADMX file name: *WindowsUpdate.admx* + + + +The following list shows the supported values: + +- 0 – Notify the user before downloading the update. This policy is used by the enterprise who wants to enable the end-users to manage data usage. With this option users are notified when there are updates that apply to the device and are ready for download. Users can download and install the updates from the Windows Update control panel. +- 1 – Auto install the update and then notify the user to schedule a device restart. Updates are downloaded automatically on non-metered networks and installed during "Automatic Maintenance" when the device is not in use and is not running on battery power. If automatic maintenance is unable to install updates for two days, Windows Update will install updates immediately. If the installation requires a restart, the end-user is prompted to schedule the restart time. The end-user has up to seven days to schedule the restart and after that, a restart of the device is forced. Enabling the end-user to control the start time reduces the risk of accidental data loss caused by applications that do not shutdown properly on restart. +- 2 (default) – Auto install and restart. Updates are downloaded automatically on non-metered networks and installed during "Automatic Maintenance" when the device is not in use and is not running on battery power. If automatic maintenance is unable to install updates for two days, Windows Update will install updates right away. If a restart is required, then the device is automatically restarted when the device is not actively being used. This is the default behavior for unmanaged devices. Devices are updated quickly, but it increases the risk of accidental data loss caused by an application that does not shutdown properly on restart. +- 3 – Auto install and restart at a specified time. The IT specifies the installation day and time. If no day and time are specified, the default is 3 AM daily. Automatic installation happens at this time and device restart happens after a 15-minute countdown. If the user is logged in when Windows is ready to restart, the user can interrupt the 15-minute countdown to delay the restart. +- 4 – Auto install and restart without end-user control. Updates are downloaded automatically on non-metered networks and installed during "Automatic Maintenance" when the device is not in use and is not running on battery power. If automatic maintenance is unable to install updates for two days, Windows Update will install updates right away. If a restart is required, then the device is automatically restarted when the device is not actively being used. This setting option also sets the end-user control panel to read-only. +- 5 – Turn off automatic updates. + + + + +
+ + +**Update/AllowAutoWindowsUpdateDownloadOverMeteredNetwork** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark3check mark3check mark3check mark3cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1709. Option to download updates automatically over metered connections (off by default). Value type is integer. + +A significant number of devices primarily use cellular data and do not have Wi-Fi access, which leads to a lower number of devices getting updates. Since a large number of devices have large data plans or unlimited data, this policy can unblock devices from getting updates. + +This policy is accessible through the Update setting in the user interface or Group Policy. + + + +ADMX Info: +- GP English name: *Allow updates to be downloaded automatically over metered connections* +- GP name: *AllowAutoWindowsUpdateDownloadOverMeteredNetwork* +- GP path: *Windows Components/Windows Update* +- GP ADMX file name: *WindowsUpdate.admx* + + + +The following list shows the supported values: + +- 0 (default) - Not allowed +- 1 - Allowed + + + + +
+ + +**Update/AllowMUUpdateService** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark1check mark1check mark1check mark1cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. Allows the IT admin to manage whether to scan for app updates from Microsoft Update. + + + +ADMX Info: +- GP English name: *Configure Automatic Updates* +- GP name: *AutoUpdateCfg* +- GP element: *AllowMUUpdateServiceId* +- GP path: *Windows Components/Windows Update* +- GP ADMX file name: *WindowsUpdate.admx* + + + +The following list shows the supported values: + +- 0 – Not allowed or not configured. +- 1 – Allowed. Accepts updates received through Microsoft Update. + + + + +
+ + +**Update/AllowNonMicrosoftSignedUpdate** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck markcheck markcheck markcheck markcross markcheck mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Allows the IT admin to manage whether Automatic Updates accepts updates signed by entities other than Microsoft when the update is found at the UpdateServiceUrl location. This policy supports using WSUS for 3rd party software and patch distribution. + +Supported operations are Get and Replace. + +This policy is specific to desktop and local publishing via WSUS for 3rd party updates (binaries and updates not hosted on Microsoft Update) and allows IT to manage whether Automatic Updates accepts updates signed by entities other than Microsoft when the update is found on an intranet Microsoft update service location. + + + +The following list shows the supported values: + +- 0 – Not allowed or not configured. Updates from an intranet Microsoft update service location must be signed by Microsoft. +- 1 – Allowed. Accepts updates received through an intranet Microsoft update service location, if they are signed by a certificate found in the "Trusted Publishers" certificate store of the local computer. + + + + +
+ + +**Update/AllowUpdateService** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck markcheck markcheck markcheck markcross markcheck mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Specifies whether the device could use Microsoft Update, Windows Server Update Services (WSUS), or Microsoft Store. + +Even when Windows Update is configured to receive updates from an intranet update service, it will periodically retrieve information from the public Windows Update service to enable future connections to Windows Update, and other services like Microsoft Update or the Microsoft Store + +Enabling this policy will disable that functionality, and may cause connection to public services such as the Microsoft Store to stop working. + +> [!NOTE] +> This policy applies only when the desktop or device is configured to connect to an intranet update service using the "Specify intranet Microsoft update service location" policy. + + + +ADMX Info: +- GP English name: *Specify intranet Microsoft update service location* +- GP name: *CorpWuURL* +- GP path: *Windows Components/Windows Update* +- GP ADMX file name: *WindowsUpdate.admx* + + + +The following list shows the supported values: + +- 0 – Update service is not allowed. +- 1 (default) – Update service is allowed. + + + + +
+ + +**Update/AutoRestartDeadlinePeriodInDays** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +For Quality Updates, this policy specifies the deadline in days before automatically executing a scheduled restart outside of active hours. The deadline can be set between 2 and 30 days from the time the restart is scheduled. + +Value type is integer. Default is 7 days. + +Supported values range: 2-30. + +Note that the PC must restart for certain updates to take effect. + +If you enable this policy, a restart will automatically occur the specified number of days after the restart was scheduled. + +If you disable or do not configure this policy, the PC will restart according to the default schedule. + +If any of the following two policies are enabled, this policy has no effect: +1. No auto-restart with logged on users for scheduled automatic updates installations. +2. Always automatically restart at scheduled time. + + + +ADMX Info: +- GP English name: *Specify deadline before auto-restart for update installation* +- GP name: *AutoRestartDeadline* +- GP element: *AutoRestartDeadline* +- GP path: *Windows Components/Windows Update* +- GP ADMX file name: *WindowsUpdate.admx* + + + + +
+ + +**Update/AutoRestartDeadlinePeriodInDaysForFeatureUpdates** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark5check mark5check mark5check mark5
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +For Feature Updates, this policy specifies the deadline in days before automatically executing a scheduled restart outside of active hours. The deadline can be set between 2 and 30 days from the time the restart is scheduled. + +Value type is integer. Default is 7 days. + +Supported values range: 2-30. + +Note that the PC must restart for certain updates to take effect. + +If you enable this policy, a restart will automatically occur the specified number of days after the restart was scheduled. + +If you disable or do not configure this policy, the PC will restart according to the default schedule. + +If any of the following two policies are enabled, this policy has no effect: +1. No auto-restart with logged on users for scheduled automatic updates installations. +2. Always automatically restart at scheduled time. + + + +ADMX Info: +- GP English name: *Specify deadline before auto-restart for update installation* +- GP name: *AutoRestartDeadline* +- GP element: *AutoRestartDeadlineForFeatureUpdates* +- GP path: *Windows Components/Windows Update* +- GP ADMX file name: *WindowsUpdate.admx* + + + + +
+ + +**Update/AutoRestartNotificationSchedule** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. Allows the IT Admin to specify the period for auto-restart reminder notifications. + +The default value is 15 (minutes). + + + +ADMX Info: +- GP English name: *Configure auto-restart reminder notifications for updates* +- GP name: *AutoRestartNotificationConfig* +- GP element: *AutoRestartNotificationSchd* +- GP path: *Windows Components/Windows Update* +- GP ADMX file name: *WindowsUpdate.admx* + + + +Supported values are 15, 30, 60, 120, and 240 (minutes). + + + + +
+ + +**Update/AutoRestartRequiredNotificationDismissal** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. Allows the IT Admin to specify the method by which the auto-restart required notification is dismissed. + + + +ADMX Info: +- GP English name: *Configure auto-restart required notification for updates* +- GP name: *AutoRestartRequiredNotificationDismissal* +- GP element: *AutoRestartRequiredNotificationDismissal* +- GP path: *Windows Components/Windows Update* +- GP ADMX file name: *WindowsUpdate.admx* + + + +The following list shows the supported values: + +- 1 (default) – Auto Dismissal. +- 2 – User Dismissal. + + + + +
+ + +**Update/BranchReadinessLevel** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark1check mark1check mark1check mark1cross markcheck mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. Allows the IT admin to set which branch a device receives their updates from. + + + +ADMX Info: +- GP English name: *Select when Preview Builds and Feature Updates are received* +- GP name: *DeferFeatureUpdates* +- GP element: *BranchReadinessLevelId* +- GP path: *Windows Components/Windows Update/Windows Update for Business* +- GP ADMX file name: *WindowsUpdate.admx* + + + +The following list shows the supported values: + +- 2 {0x2} - Windows Insider build - Fast (added in Windows 10, version 1709) +- 4 {0x4} - Windows Insider build - Slow (added in Windows 10, version 1709) +- 8 {0x8} - Release Windows Insider build (added in Windows 10, version 1709) +- 16 {0x10} - (default) Semi-annual Channel (Targeted). Device gets all applicable feature updates from Semi-annual Channel (Targeted). +- 32 {0x20} - Semi-annual Channel. Device gets feature updates from Semi-annual Channel. + + + + +
+ + +**Update/ConfigureFeatureUpdateUninstallPeriod** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark4check mark4check mark4check mark4cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1803. Enable IT admin to configure feature update uninstall period. Values range 2 - 60 days. Default is 10 days. + + + + +
+ + +**Update/DeferFeatureUpdatesPeriodInDays** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark1check mark1check mark1check mark1cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Since this policy is not blocked, you will not get a failure message when you use it to configure a Windows 10 Mobile device. However, the policy will not take effect. + +Added in Windows 10, version 1607. Defers Feature Updates for the specified number of days. + +Supported values are 0-365 days. + +> [!IMPORTANT] +> The default maximum number of days to defer an update has been increased from 180 (Windows 10, version 1607) to 365 in Windows 10, version 1703. + + + +ADMX Info: +- GP English name: *Select when Preview Builds and Feature Updates are received* +- GP name: *DeferFeatureUpdates* +- GP element: *DeferFeatureUpdatesPeriodId* +- GP path: *Windows Components/Windows Update/Windows Update for Business* +- GP ADMX file name: *WindowsUpdate.admx* + + + + +
+ + +**Update/DeferQualityUpdatesPeriodInDays** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark1check mark1check mark1check mark1cross markcheck mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. Defers Quality Updates for the specified number of days. + +Supported values are 0-30. + + + +ADMX Info: +- GP English name: *Select when Quality Updates are received* +- GP name: *DeferQualityUpdates* +- GP element: *DeferQualityUpdatesPeriodId* +- GP path: *Windows Components/Windows Update/Windows Update for Business* +- GP ADMX file name: *WindowsUpdate.admx* + + + + +
+ + +**Update/DeferUpdatePeriod** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck markcheck markcheck markcheck markcross markcheck mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +> [!NOTE] +> Don't use this policy in Windows 10, version 1607 devices, instead use the new policies listed in [Changes in Windows 10, version 1607 for update management](device-update-management.md#windows10version1607forupdatemanagement). You can continue to use DeferUpdatePeriod for Windows 10, version 1511 devices. + + +Allows IT Admins to specify update delays for up to 4 weeks. + +Supported values are 0-4, which refers to the number of weeks to defer updates. + +In Windows 10 Mobile Enterprise version 1511 devices set to automatic updates, for DeferUpdatePeriod to work, you must set the following: + +- Update/RequireDeferUpgrade must be set to 1 +- System/AllowTelemetry must be set to 1 or higher + +If the "Specify intranet Microsoft update service location" policy is enabled, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. + +If the Allow Telemetry policy is enabled and the Options value is set to 0, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. + +OS upgrade: +- Maximum deferral: 8 months +- Deferral increment: 1 month +- Update type/notes: + - Upgrade - 3689BDC8-B205-4AF4-8D4A-A63924C5E9D5 + +Update: +- Maximum deferral: 1 month +- Deferral increment: 1 week +- Update type/notes: + If a machine has Microsoft Update enabled, any Microsoft Updates in these categories will also observe Defer / Pause logic. + - Security Update - 0FA1201D-4330-4FA8-8AE9-B877473B6441 + - Critical Update - E6CF1350-C01B-414D-A61F-263D14D133B4 + - Update Rollup - 28BC880E-0592-4CBF-8F95-C79B17911D5F + - Service Pack - 68C5B0A3-D1A6-4553-AE49-01D3A7827828 + - Tools - B4832BD8-E735-4761-8DAF-37F882276DAB + - Feature Pack - B54E7D24-7ADD-428F-8B75-90A396FA584F + - Update - CD5FFD1E-E932-4E3A-BF74-18BF0B1BBD83 + - Driver - EBFC1FC5-71A4-4F7B-9ACA-3B9A503104A0 + +Other/cannot defer: +- Maximum deferral: No deferral +- Deferral increment: No deferral +- Update type/notes: + Any update category not specifically enumerated above falls into this category. + - Definition Update - E0789628-CE08-4437-BE74-2495B842F43B + + + + + +ADMX Info: +- GP name: *DeferUpgrade* +- GP element: *DeferUpdatePeriodId* +- GP ADMX file name: *WindowsUpdate.admx* + + + + +
+ + +**Update/DeferUpgradePeriod** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck markcheck markcheck markcheck markcross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +> [!NOTE] +> Since this policy is not blocked, you will not get a failure message when you use it to configure a Windows 10 Mobile device. However, the policy will not take effect. +> +> Don't use this policy in Windows 10, version 1607 devices, instead use the new policies listed in [Changes in Windows 10, version 1607 for update management](device-update-management.md#windows10version1607forupdatemanagement). You can continue to use DeferUpgradePeriod for Windows 10, version 1511 devices. + + +Allows IT Admins to specify additional upgrade delays for up to 8 months. + +Supported values are 0-8, which refers to the number of months to defer upgrades. + +If the "Specify intranet Microsoft update service location" policy is enabled, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. + +If the "Allow Telemetry" policy is enabled and the Options value is set to 0, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. + + + +ADMX Info: +- GP name: *DeferUpgrade* +- GP element: *DeferUpgradePeriodId* +- GP ADMX file name: *WindowsUpdate.admx* + + + + +
+ + +**Update/DetectionFrequency** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. Specifies the scan frequency from every 1 - 22 hours. Default is 22 hours. + + + +ADMX Info: +- GP English name: *Automatic Updates detection frequency* +- GP name: *DetectionFrequency_Title* +- GP element: *DetectionFrequency_Hour2* +- GP path: *Windows Components/Windows Update* +- GP ADMX file name: *WindowsUpdate.admx* + + + + +
+ + +**Update/DisableDualScan** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark3check mark3check mark3check mark3cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1709, but was added to 1607 and 1703 service releases. Do not allow update deferral policies to cause scans against Windows Update. If this policy is not enabled, then configuring deferral policies will result in the client unexpectedly scanning Windows update. With the policy enabled, those scans are prevented, and users can configure deferral policies as much as they like. + +For more information about dual scan, see [Demystifying "Dual Scan"](https://blogs.technet.microsoft.com/wsus/2017/05/05/demystifying-dual-scan/) and [Improving Dual Scan on 1607](https://blogs.technet.microsoft.com/wsus/2017/08/04/improving-dual-scan-on-1607/). + +This is the same as the Group Policy in Windows Components > Window Update "Do not allow update deferral policies to cause scans against Windows Update." + +Value type is integer. Supported operations are Add, Get, Replace, and Delete. + + + +ADMX Info: +- GP English name: *Do not allow update deferral policies to cause scans against Windows Update* +- GP name: *DisableDualScan* +- GP path: *Windows Components/Windows Update* +- GP ADMX file name: *WindowsUpdate.admx* + + + +The following list shows the supported values: + +- 0 - allow scan against Windows Update +- 1 - do not allow update deferral policies to cause scans against Windows Update + + + + +
+ + +**Update/EngagedRestartDeadline** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +For Quality Updates, this policy specifies the deadline in days before automatically scheduling and executing a pending restart outside of active hours. The deadline can be set between 2 and 30 days from the time the restart becomes pending. If configured, the pending restart will transition from Auto-restart to Engaged restart (pending user schedule) to automatically executed, within the specified period. + +Value type is integer. Default is 14. + +Supported value range: 2 - 30. + +If no deadline is specified or deadline is set to 0, the restart will not be automatically executed and will remain Engaged restart (e.g. pending user scheduling). + +If you disable or do not configure this policy, the default behaviors will be used. + +If any of the following policies are configured, this policy has no effect: +1. No auto-restart with logged on users for scheduled automatic updates installations +2. Always automatically restart at scheduled time +3. Specify deadline before auto-restart for update installation + + + +ADMX Info: +- GP English name: *Specify Engaged restart transition and notification schedule for updates* +- GP name: *EngagedRestartTransitionSchedule* +- GP element: *EngagedRestartDeadline* +- GP path: *Windows Components/Windows Update* +- GP ADMX file name: *WindowsUpdate.admx* + + + + +
+ + +**Update/EngagedRestartDeadlineForFeatureUpdates** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark5check mark5check mark5check mark5
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +For Feature Updates, this policy specifies the deadline in days before automatically scheduling and executing a pending restart outside of active hours. The deadline can be set between 2 and 30 days from the time the restart becomes pending. If configured, the pending restart will transition from Auto-restart to Engaged restart (pending user schedule) to automatically executed, within the specified period. + +Value type is integer. Default is 14. + +Supported value range: 2 - 30. + +If no deadline is specified or deadline is set to 0, the restart will not be automatically executed and will remain Engaged restart (e.g. pending user scheduling). + +If you disable or do not configure this policy, the default behaviors will be used. + +If any of the following policies are configured, this policy has no effect: +1. No auto-restart with logged on users for scheduled automatic updates installations +2. Always automatically restart at scheduled time +3. Specify deadline before auto-restart for update installation + + + +ADMX Info: +- GP English name: *Specify Engaged restart transition and notification schedule for updates* +- GP name: *EngagedRestartTransitionSchedule* +- GP element: *EngagedRestartDeadlineForFeatureUpdates* +- GP path: *Windows Components/Windows Update* +- GP ADMX file name: *WindowsUpdate.admx* + + + + +
+ + +**Update/EngagedRestartSnoozeSchedule** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +For Quality Updates, this policy specifies the number of days a user can snooze Engaged restart reminder notifications. The snooze period can be set between 1 and 3 days. + +Value type is integer. Default is 3 days. + +Supported value range: 1 - 3. + +If you disable or do not configure this policy, the default behaviors will be used. + +If any of the following policies are configured, this policy has no effect: +1. No auto-restart with logged on users for scheduled automatic updates installations +2. Always automatically restart at scheduled time +3. Specify deadline before auto-restart for update installation + + + +ADMX Info: +- GP English name: *Specify Engaged restart transition and notification schedule for updates* +- GP name: *EngagedRestartTransitionSchedule* +- GP element: *EngagedRestartSnoozeSchedule* +- GP path: *Windows Components/Windows Update* +- GP ADMX file name: *WindowsUpdate.admx* + + + + +
+ + +**Update/EngagedRestartSnoozeScheduleForFeatureUpdates** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark5check mark5check mark5check mark5
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +For Feature Updates, this policy specifies the number of days a user can snooze Engaged restart reminder notifications. The snooze period can be set between 1 and 3 days. + +Value type is integer. Default is 3 days. + +Supported value range: 1 - 3. + +If you disable or do not configure this policy, the default behaviors will be used. + +If any of the following policies are configured, this policy has no effect: +1. No auto-restart with logged on users for scheduled automatic updates installations +2. Always automatically restart at scheduled time +3. Specify deadline before auto-restart for update installation + + + +ADMX Info: +- GP English name: *Specify Engaged restart transition and notification schedule for updates* +- GP name: *EngagedRestartTransitionSchedule* +- GP element: *EngagedRestartSnoozeScheduleForFeatureUpdates* +- GP path: *Windows Components/Windows Update* +- GP ADMX file name: *WindowsUpdate.admx* + + + + +
+ + +**Update/EngagedRestartTransitionSchedule** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +For Quality Updates, this policy specifies the timing before transitioning from Auto restarts scheduled_outside of active hours to Engaged restart, which requires the user to schedule. The period can be set between 2 and 30 days from the time the restart becomes pending. + +Value type is integer. + +Supported value range: 0 - 30. + +If you disable or do not configure this policy, the default behaviors will be used. + +If any of the following policies are configured, this policy has no effect: +1. No auto-restart with logged on users for scheduled automatic updates installations +2. Always automatically restart at scheduled time +3. Specify deadline before auto-restart for update installation + + + +ADMX Info: +- GP English name: *Specify Engaged restart transition and notification schedule for updates* +- GP name: *EngagedRestartTransitionSchedule* +- GP element: *EngagedRestartTransitionSchedule* +- GP path: *Windows Components/Windows Update* +- GP ADMX file name: *WindowsUpdate.admx* + + + + +
+ + +**Update/EngagedRestartTransitionScheduleForFeatureUpdates** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark5check mark5check mark5check mark5
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +For Feature Updates, this policy specifies the timing before transitioning from Auto restarts scheduled_outside of active hours to Engaged restart, which requires the user to schedule. The period can be set between 2 and 30 days from the time the restart becomes pending. + +Value type is integer. + +Supported value range: 0 - 30. + +If you disable or do not configure this policy, the default behaviors will be used. + +If any of the following policies are configured, this policy has no effect: +1. No auto-restart with logged on users for scheduled automatic updates installations +2. Always automatically restart at scheduled time +3. Specify deadline before auto-restart for update installation + + + +ADMX Info: +- GP English name: *Specify Engaged restart transition and notification schedule for updates* +- GP name: *EngagedRestartTransitionSchedule* +- GP element: *EngagedRestartTransitionScheduleForFeatureUpdates* +- GP path: *Windows Components/Windows Update* +- GP ADMX file name: *WindowsUpdate.admx* + + + + +
+ + +**Update/ExcludeWUDriversInQualityUpdate** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark1check mark1check mark1check mark1cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +> [!NOTE] +> Since this policy is not blocked, you will not get a failure message when you use it to configure a Windows 10 Mobile device. However, the policy will not take effect. + +Added in Windows 10, version 1607. Allows IT Admins to exclude Windows Update (WU) drivers during updates. + + + +ADMX Info: +- GP English name: *Do not include drivers with Windows Updates* +- GP name: *ExcludeWUDriversInQualityUpdate* +- GP path: *Windows Components/Windows Update* +- GP ADMX file name: *WindowsUpdate.admx* + + + +The following list shows the supported values: + +- 0 (default) – Allow Windows Update drivers. +- 1 – Exclude Windows Update drivers. + + + + +
+ + +**Update/FillEmptyContentUrls** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in the April service release of Windows 10, version 1607. Allows Windows Update Agent to determine the download URL when it is missing from the metadata. This scenario will occur when intranet update service stores the metadata files but the download contents are stored in the ISV file cache (specified as the alternate download URL). + +> [!NOTE] +> This setting should only be used in combination with an alternate download URL and configured to use ISV file cache. This setting is used when the intranet update service does not provide download URLs in the update metadata for files which are available on the alternate download server. + + + +ADMX Info: +- GP English name: *Specify intranet Microsoft update service location* +- GP name: *CorpWuURL* +- GP element: *CorpWUFillEmptyContentUrls* +- GP path: *Windows Components/Windows Update* +- GP ADMX file name: *WindowsUpdate.admx* + + + +The following list shows the supported values: + +- 0 (default) – Disabled. +- 1 – Enabled. + + + + +
+ + +**Update/IgnoreMOAppDownloadLimit** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. Specifies whether to ignore the MO download limit (allow unlimited downloading) over a cellular network for apps and their updates. If lower-level limits (for example, mobile caps) are required, those limits are controlled by external policies. + +> [!WARNING] +> Setting this policy might cause devices to incur costs from MO operators. + + + +The following list shows the supported values: + +- 0 (default) – Do not ignore MO download limit for apps and their updates. +- 1 – Ignore MO download limit (allow unlimited downloading) for apps and their updates. + + + +To validate this policy: + +1. Enable the policy ensure the device is on a cellular network. +2. Run the scheduled task on your device to check for app updates in the background. For example, on a mobile device, run the following commands in TShell: + - `regd delete HKEY_USERS\S-1-5-21-2702878673-795188819-444038987-2781\software\microsoft\windows\currentversion\windowsupdate /v LastAutoAppUpdateSearchSuccessTime /f` + + - `exec-device schtasks.exe -arguments ""/run /tn """"\Microsoft\Windows\WindowsUpdate\Automatic App Update"""" /I""` + +3. Verify that any downloads that are above the download size limit will complete without being paused. + + + + +
+ + +**Update/IgnoreMOUpdateDownloadLimit** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. Specifies whether to ignore the MO download limit (allow unlimited downloading) over a cellular network for OS updates. If lower-level limits (for example, mobile caps) are required, those limits are controlled by external policies. + +> [!WARNING] +> Setting this policy might cause devices to incur costs from MO operators. + + + - `exec-device schtasks.exe -arguments ""/run /tn """"\Microsoft\Windows\WindowsUpdate\AUScheduledInstall"""" /I""` + +3. Verify that any downloads that are above the download size limit will complete without being paused. + + + +The following list shows the supported values: + +- 0 (default) – Do not ignore MO download limit for OS updates. +- 1 – Ignore MO download limit (allow unlimited downloading) for OS updates. + + + +To validate this policy: + +1. Enable the policy and ensure the device is on a cellular network. +2. Run the scheduled task on phone to check for OS updates in the background. For example, on a mobile device, run the following commands in TShell: + + + + +
+ + +**Update/ManagePreviewBuilds** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark3check mark3check mark3check mark3cross markcheck mark2
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1709. Used to manage Windows 10 Insider Preview builds. Value type is integer. + + + +ADMX Info: +- GP English name: *Manage preview builds* +- GP name: *ManagePreviewBuilds* +- GP element: *ManagePreviewBuildsId* +- GP path: *Windows Components/Windows Update/Windows Update for Business* +- GP ADMX file name: *WindowsUpdate.admx* + + + +The following list shows the supported values: + +- 0 - Disable Preview builds +- 1 - Disable Preview builds once the next release is public +- 2 - Enable Preview builds + + + + +
+ + +**Update/PauseDeferrals** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck markcheck markcheck markcheck markcross markcheck mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +> [!NOTE] +> Don't use this policy in Windows 10, version 1607 devices, instead use the new policies listed in [Changes in Windows 10, version 1607 for update management](device-update-management.md#windows10version1607forupdatemanagement). You can continue to use PauseDeferrals for Windows 10, version 1511 devices. + + +Allows IT Admins to pause updates and upgrades for up to 5 weeks. Paused deferrals will be reset after 5 weeks. + + +If the "Specify intranet Microsoft update service location" policy is enabled, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. + +If the "Allow Telemetry" policy is enabled and the Options value is set to 0, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. + + + +ADMX Info: +- GP name: *DeferUpgrade* +- GP element: *PauseDeferralsId* +- GP ADMX file name: *WindowsUpdate.admx* + + + +The following list shows the supported values: + +- 0 (default) – Deferrals are not paused. +- 1 – Deferrals are paused. + + + + +
+ + +**Update/PauseFeatureUpdates** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark1check mark1check mark1check mark1cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Since this policy is not blocked, you will not get a failure message when you use it to configure a Windows 10 Mobile device. However, the policy will not take effect. + + +Added in Windows 10, version 1607. Allows IT Admins to pause Feature Updates for up to 60 days. + + + +ADMX Info: +- GP English name: *Select when Preview Builds and Feature Updates are received* +- GP name: *DeferFeatureUpdates* +- GP element: *PauseFeatureUpdatesId* +- GP path: *Windows Components/Windows Update/Windows Update for Business* +- GP ADMX file name: *WindowsUpdate.admx* + + + +The following list shows the supported values: + +- 0 (default) – Feature Updates are not paused. +- 1 – Feature Updates are paused for 60 days or until value set to back to 0, whichever is sooner. + + + + +
+ + +**Update/PauseFeatureUpdatesStartTime** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. Specifies the date and time when the IT admin wants to start pausing the Feature Updates. + +Value type is string. Supported operations are Add, Get, Delete, and Replace. + + + +ADMX Info: +- GP English name: *Select when Preview Builds and Feature Updates are received* +- GP name: *DeferFeatureUpdates* +- GP element: *PauseFeatureUpdatesStartId* +- GP path: *Windows Components/Windows Update/Windows Update for Business* +- GP ADMX file name: *WindowsUpdate.admx* + + + + +
+ + +**Update/PauseQualityUpdates** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark1check mark1check mark1check mark1cross markcheck mark1
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1607. Allows IT Admins to pause Quality Updates. + + + +ADMX Info: +- GP English name: *Select when Quality Updates are received* +- GP name: *DeferQualityUpdates* +- GP element: *PauseQualityUpdatesId* +- GP path: *Windows Components/Windows Update/Windows Update for Business* +- GP ADMX file name: *WindowsUpdate.admx* + + + +The following list shows the supported values: + +- 0 (default) – Quality Updates are not paused. +- 1 – Quality Updates are paused for 35 days or until value set back to 0, whichever is sooner. + + + + +
+ + +**Update/PauseQualityUpdatesStartTime** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. Specifies the date and time when the IT admin wants to start pausing the Quality Updates. + +Value type is string. Supported operations are Add, Get, Delete, and Replace. + + + +ADMX Info: +- GP English name: *Select when Quality Updates are received* +- GP name: *DeferQualityUpdates* +- GP element: *PauseQualityUpdatesStartId* +- GP path: *Windows Components/Windows Update/Windows Update for Business* +- GP ADMX file name: *WindowsUpdate.admx* + + + + +
+ + +**Update/PhoneUpdateRestrictions** + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +This policy is deprecated. Use [Update/RequireUpdateApproval](#update-requireupdateapproval) instead. + + + + +
+ + +**Update/RequireDeferUpgrade** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck markcheck markcheck markcheck markcross markcheck mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +> [!NOTE] +> Don't use this policy in Windows 10, version 1607 devices, instead use the new policies listed in [Changes in Windows 10, version 1607 for update management](device-update-management.md#windows10version1607forupdatemanagement). You can continue to use RequireDeferUpgrade for Windows 10, version 1511 devices. + + +Allows the IT admin to set a device to Semi-Annual Channel train. + + + +ADMX Info: +- GP name: *DeferUpgrade* +- GP element: *DeferUpgradePeriodId* +- GP ADMX file name: *WindowsUpdate.admx* + + + +The following list shows the supported values: + +- 0 (default) – User gets upgrades from Semi-Annual Channel (Targeted). +- 1 – User gets upgrades from Semi-Annual Channel. + + + + +
+ + +**Update/RequireUpdateApproval** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck markcheck markcheck markcheck markcross markcheck mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +> [!NOTE] +> If you previously used the **Update/PhoneUpdateRestrictions** policy in previous versions of Windows, it has been deprecated. Please use this policy instead. + + +Allows the IT admin to restrict the updates that are installed on a device to only those on an update approval list. It enables IT to accept the End User License Agreement (EULA) associated with the approved update on behalf of the end-user. EULAs are approved once an update is approved. + +Supported operations are Get and Replace. + + + +The following list shows the supported values: + +- 0 – Not configured. The device installs all applicable updates. +- 1 – The device only installs updates that are both applicable and on the Approved Updates list. Set this policy to 1 if IT wants to control the deployment of updates on devices, such as when testing is required prior to deployment. + + + + +
+ + +**Update/ScheduleImminentRestartWarning** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. Allows the IT Admin to specify the period for auto-restart imminent warning notifications. + +The default value is 15 (minutes). + + + +ADMX Info: +- GP English name: *Configure auto-restart warning notifications schedule for updates* +- GP name: *RestartWarnRemind* +- GP element: *RestartWarn* +- GP path: *Windows Components/Windows Update* +- GP ADMX file name: *WindowsUpdate.admx* + + + +Supported values are 15, 30, or 60 (minutes). + + + + +
+ + +**Update/ScheduleRestartWarning** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +> [!NOTE] +> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise + + +Added in Windows 10, version 1703. Allows the IT Admin to specify the period for auto-restart warning reminder notifications. + +The default value is 4 (hours). + + + +ADMX Info: +- GP English name: *Configure auto-restart warning notifications schedule for updates* +- GP name: *RestartWarnRemind* +- GP element: *RestartWarnRemind* +- GP path: *Windows Components/Windows Update* +- GP ADMX file name: *WindowsUpdate.admx* + + + +Supported values are 2, 4, 8, 12, or 24 (hours). + + + + +
+ + +**Update/ScheduledInstallDay** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck markcheck markcheck markcheck markcross markcheck mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Enables the IT admin to schedule the day of the update installation. + +The data type is a integer. + +Supported operations are Add, Delete, Get, and Replace. + + + +ADMX Info: +- GP English name: *Configure Automatic Updates* +- GP name: *AutoUpdateCfg* +- GP element: *AutoUpdateSchDay* +- GP path: *Windows Components/Windows Update* +- GP ADMX file name: *WindowsUpdate.admx* + + + +The following list shows the supported values: + +- 0 (default) – Every day +- 1 – Sunday +- 2 – Monday +- 3 – Tuesday +- 4 – Wednesday +- 5 – Thursday +- 6 – Friday +- 7 – Saturday + + + + +
+ + +**Update/ScheduledInstallEveryWeek** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark3check mark3check mark3check mark3check mark3cross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1709. Enables the IT admin to schedule the update installation on the every week. Value type is integer. Supported values: +
    +
  • 0 - no update in the schedule
  • +
  • 1 - update is scheduled every week
  • +
+ + + +ADMX Info: +- GP English name: *Configure Automatic Updates* +- GP name: *AutoUpdateCfg* +- GP element: *AutoUpdateSchEveryWeek* +- GP path: *Windows Components/Windows Update* +- GP ADMX file name: *WindowsUpdate.admx* + + + + +
+ + +**Update/ScheduledInstallFirstWeek** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark3check mark3check mark3check mark3check mark3cross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1709. Enables the IT admin to schedule the update installation on the first week of the month. Value type is integer. Supported values: +
    +
  • 0 - no update in the schedule
  • +
  • 1 - update is scheduled every first week of the month
  • +
+ + + +ADMX Info: +- GP English name: *Configure Automatic Updates* +- GP name: *AutoUpdateCfg* +- GP element: *AutoUpdateSchFirstWeek* +- GP path: *Windows Components/Windows Update* +- GP ADMX file name: *WindowsUpdate.admx* + + + + +
+ + +**Update/ScheduledInstallFourthWeek** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark3check mark3check mark3check mark3check mark3cross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1709. Enables the IT admin to schedule the update installation on the fourth week of the month. Value type is integer. Supported values: +
    +
  • 0 - no update in the schedule
  • +
  • 1 - update is scheduled every fourth week of the month
  • +
+ + + +ADMX Info: +- GP English name: *Configure Automatic Updates* +- GP name: *AutoUpdateCfg* +- GP element: *ScheduledInstallFourthWeek* +- GP path: *Windows Components/Windows Update* +- GP ADMX file name: *WindowsUpdate.admx* + + + + +
+ + +**Update/ScheduledInstallSecondWeek** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark3check mark3check mark3check mark3check mark3cross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1709. Enables the IT admin to schedule the update installation on the second week of the month. Value type is integer. Supported values: +
    +
  • 0 - no update in the schedule
  • +
  • 1 - update is scheduled every second week of the month
  • +
+ + + +ADMX Info: +- GP English name: *Configure Automatic Updates* +- GP name: *AutoUpdateCfg* +- GP element: *ScheduledInstallSecondWeek* +- GP path: *Windows Components/Windows Update* +- GP ADMX file name: *WindowsUpdate.admx* + + + + +
+ + +**Update/ScheduledInstallThirdWeek** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark3check mark3check mark3check mark3check mark3cross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1709. Enables the IT admin to schedule the update installation on the third week of the month. Value type is integer. Supported values: +
    +
  • 0 - no update in the schedule
  • +
  • 1 - update is scheduled every third week of the month
  • +
+ + + +ADMX Info: +- GP English name: *Configure Automatic Updates* +- GP name: *AutoUpdateCfg* +- GP element: *ScheduledInstallThirdWeek* +- GP path: *Windows Components/Windows Update* +- GP ADMX file name: *WindowsUpdate.admx* + + + + +
+ + +**Update/ScheduledInstallTime** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck markcheck markcheck markcheck markcross markcheck mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +> [!NOTE] +> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise + + +Enables the IT admin to schedule the time of the update installation. + +The data type is a integer. + +Supported operations are Add, Delete, Get, and Replace. + +Supported values are 0-23, where 0 = 12 AM and 23 = 11 PM. + +The default value is 3. + + + +ADMX Info: +- GP English name: *Configure Automatic Updates* +- GP name: *AutoUpdateCfg* +- GP element: *AutoUpdateSchTime* +- GP path: *Windows Components/Windows Update* +- GP ADMX file name: *WindowsUpdate.admx* + + + + +
+ + +**Update/SetAutoRestartNotificationDisable** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. Allows the IT Admin to disable auto-restart notifications for update installations. + + + +ADMX Info: +- GP English name: *Turn off auto-restart notifications for update installations* +- GP name: *AutoRestartNotificationDisable* +- GP element: *AutoRestartNotificationSchd* +- GP path: *Windows Components/Windows Update* +- GP ADMX file name: *WindowsUpdate.admx* + + + +The following list shows the supported values: + +- 0 (default) – Enabled +- 1 – Disabled + + + + +
+ + +**Update/SetDisablePauseUXAccess** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark5check mark5check mark5check mark5
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +This policy allows the IT admin to disable the "Pause Updates" feature. When this policy is enabled, the user cannot access the "Pause updates" feature. + +Value type is integer. Default is 0. Supported values 0, 1. + + + +ADMX Info: +- GP name: *SetDisablePauseUXAccess* +- GP ADMX file name: *WindowsUpdate.admx* + + + + +
+ + +**Update/SetDisableUXWUAccess** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark5check mark5check mark5check mark5
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +This policy allows the IT admin to remove access to scan Windows Update. When this policy is enabled, the user cannot access the Windows Update scan, download, and install features. + +Value type is integer. Default is 0. Supported values 0, 1. + + + +ADMX Info: +- GP name: *SetDisableUXWUAccess* +- GP ADMX file name: *WindowsUpdate.admx* + + + + +
+ + +**Update/SetEDURestart** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark2check mark2check mark2check mark2cross markcheck mark2
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in Windows 10, version 1703. For devices in a cart, this policy skips all restart checks to ensure that the reboot will happen at ScheduledInstallTime. + + + +ADMX Info: +- GP English name: *Update Power Policy for Cart Restarts* +- GP name: *SetEDURestart* +- GP path: *Windows Components/Windows Update* +- GP ADMX file name: *WindowsUpdate.admx* + + + +The following list shows the supported values: + +- 0 - not configured +- 1 - configured + + + + +
+ + +**Update/UpdateNotificationLevel** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark5check mark5check mark5check mark5
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Display options for update notifications. This policy allows you to define what Windows Update notifications users see. This policy doesn’t control how and when updates are downloaded and installed. + +Options: + +- 0 (default) – Use the default Windows Update notifications +- 1 – Turn off all notifications, excluding restart warnings +- 2 – Turn off all notifications, including restart warnings + +> [!Important] +> If you choose not to get update notifications and also define other Group policies so that devices aren’t automatically getting updates, neither you nor device users will be aware of critical security, quality, or feature updates, and your devices may be at risk. + + + +ADMX Info: +- GP English name: *Display options for update notifications* +- GP name: *UpdateNotificationLevel* +- GP path: *Windows Components/Windows Update* +- GP ADMX file name: *WindowsUpdate.admx* + + + + + + + + + + + + + +
+ + +**Update/UpdateServiceUrl** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck markcheck markcheck markcheck markcross markcheck mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +> [!Important] +> Starting in Windows 10, version 1703 this policy is not supported in Windows 10 Mobile Enteprise and IoT Mobile. + +Allows the device to check for updates from a WSUS server instead of Microsoft Update. This is useful for on-premises MDMs that need to update devices that cannot connect to the Internet. + +Supported operations are Get and Replace. + + + +ADMX Info: +- GP English name: *Specify intranet Microsoft update service location* +- GP name: *CorpWuURL* +- GP element: *CorpWUURL_Name* +- GP path: *Windows Components/Windows Update* +- GP ADMX file name: *WindowsUpdate.admx* + + + +The following list shows the supported values: + +- Not configured. The device checks for updates from Microsoft Update. +- Set to a URL, such as `http://abcd-srv:8530`. The device checks for updates from the WSUS server at the specified URL. + + + +Example + +``` syntax + + $CmdID$ + + + chr + text/plain + + + ./Vendor/MSFT/Policy/Config/Update/UpdateServiceUrl + + http://abcd-srv:8530 + + +``` + + + + +
+ + +**Update/UpdateServiceUrlAlternate** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark1check mark1check mark1check mark1cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Added in the January service release of Windows 10, version 1607. Specifies an alternate intranet server to host updates from Microsoft Update. You can then use this update service to automatically update computers on your network. + +This setting lets you specify a server on your network to function as an internal update service. The Automatic Updates client will search this service for updates that apply to the computers on your network. + +To use this setting, you must set two server name values: the server from which the Automatic Updates client detects and downloads updates, and the server to which updated workstations upload statistics. You can set both values to be the same server. An optional server name value can be specified to configure Windows Update agent, and download updates from an alternate download server instead of WSUS Server. + +Value type is string and the default value is an empty string, "". If the setting is not configured, and if Automatic Updates is not disabled by policy or user preference, the Automatic Updates client connects directly to the Windows Update site on the Internet. + +> [!Note] +> If the "Configure Automatic Updates" Group Policy is disabled, then this policy has no effect. +> If the "Alternate Download Server" Group Policy is not set, it will use the WSUS server by default to download updates. +> This policy is not supported on Windows RT. Setting this policy will not have any effect on Windows RT PCs. + + + +ADMX Info: +- GP English name: *Specify intranet Microsoft update service location* +- GP name: *CorpWuURL* +- GP element: *CorpWUContentHost_Name* +- GP path: *Windows Components/Windows Update* +- GP ADMX file name: *WindowsUpdate.admx* + + + +
+ +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. +- 4 - Added in Windows 10, version 1803. +- 5 - Added in the next major release of Windows 10. + + From 0e96cb12956a00769f673ab068ca7c0f991916a2 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 15 Aug 2018 11:02:39 -0700 Subject: [PATCH 20/23] update imate --- .../images/advanced-hunting-query-example.PNG | Bin 49108 -> 54210 bytes 1 file changed, 0 insertions(+), 0 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/images/advanced-hunting-query-example.PNG b/windows/security/threat-protection/windows-defender-atp/images/advanced-hunting-query-example.PNG index 5e7e9269ea8a4edb10efa847f1aad78aa538fc87..d7e7d092eb2659a59e97a1ae0293ffad7f0d7254 100644 GIT binary patch literal 54210 zcmeFYWl&sO)HVnqxCIF=!QI`1yM+XIC&Aqb?(QDk-GesPxCVE3*G9UBdvo6(GgVXd zeKSAi&+MwMuJfFA*4DH4TF+W1Tt!J56^Q@|3JMBURz~6r6x4fCC@APg1h_ZEb0wDi z?GMpjM#~8b3V;5eA2iR1e{P=o<$A_jwmb6EmngNZ`r;h>6?T*qGTmL*0+1biZM6|A>9Ha<(>uDm|Z} zfr9!3B`YEN)jjKU&COYF&i~@-qD`^WO{;lt-LwrCg?TZ}7$y%(o86QhQJg-}lmwB3 z?k1t9@qjWBIw6j?5eo2=%rKA*?}1)tpxOGPeDiNptiVKVNiby?*!)n*4>U?+(4PcODe>w|FJNpI;t7k^e2wMVF!yf6F_$t-$|;-zW9L|EC<0HW>XsSxl9f(KY|bgW}^u_>LQM zHmPG%+ioM_X`}nmwX(_F6eQP92#G+sf|PQ1sF_BP-qco3v$?SM4Ha6Gl*4TO5By{t z!e22F|JE_IhnaQ>sI-{;o$9gk`XwreP1kEmAzW~C>M;L z8rbenp_QrWHl?id=M0xf_)(B}*LI^v`fhkE-D~fF)|=Iec6fhILtS;1Wc;)U-SPP) zXmpM4-!8=eL>Q_^cKb%{xVL{lOXuk5~xeB%;5#T{P$Sb1n^UE`* z+v79s4yDU3%Kqf2X>UKiuE)1Qs*9q(!&AimILgdVK)0AK*~t=h#UVZ8{p)8$zIYP$ zS2ioxkzYJC*TXx-Wp!!S8EE8R^cJJKEQ0zAC$@8HV)OI*M8(AZP@Nb2r;6i{gH-zj zEy1N0he0rz@5atp$@5+F{+IhClKkQtmYYDB%M*m!;r67IPhaI-6#^>I~tKM|)O|eGYP8Qmr`;Q(`&`>t))2iH5G`<9GG- z=wFtmVkYeZj5bli&H4+q#z=63`_^xMm=SIk(GX!SonXbCLWc+M^lgZi@o-CeDA&o8iYB=6U{bXWk=(tnb zK`~<@e+j>TN_4tQ@06u7e|!g~FJ$eb)JU3wxe_q|BuLtOTxtec*Nvc$o!z=J(l%^Z zaR`>;F#Tgntt>;)QNw1dgWvA9_vOo45b&+JeHhqE%dJNWxmi+&e1x_Ij4YX_`AFIV zf{#ovefA%6IJ2yr4%o+zc!4d?2a~lf**{yjbF12K%50B&EL=NDFq8Xt`5N%BNPX}9 zeOdT2=i}67#I`#a+P=RaJkib-HAVPj@+9h97_MgRjS)LN*>Vb$B=FgSQva7 zvNB8;KAkSmYIa9cHA3T69n4Y8T-?APNMd0$(;hnNdR!y6)_I@~W+Kz=w8WtJQgAs( zYJO53_?4?M_cwDMTbV*SS7iJZ*+EB_x(*kgR|8%3_nxym6XU*f6f%!nY;z@2S&2C# z;nj{rcFc6)3s35j>;}2Nuj37S>6SRKix@j;VMk8C|FKb(7mC4>^9D$hsHP=$e=g3L z$(7I_=M<&hS!LSY62ZfBz9nNOq))VH0|!T4j5u+p!}k(gk)CAQXN%`7B;WJS8c%Wj zR13lnJ8!>=$brvSbMX_Z=XUODU7+S_WI}szLpX>^RPVL^g^6hW1`Wl%b|z zQvshj9%F=OnDJ=iD!l6Q^LamZaLdv7@@oDMUI;3@aLl=9WOt=@-`26KLQlPdHwjCz zP@3XOgQnv`=W1N~^79~9=dPVs?gGy@Hem<6S$HJU6J=)q^*#`qRw9U(OKE` zL9Pzhsm(z|e3T!O^~X73vKod?ASV4frCy{joN`nD08QTQ{z(~fK?ie|$YOnzi4PVI=z*=g(c zmPqGGK;*#TU@{T3y4qTNVfuL-#6DA4p? zv8F~*?vaF_qXL&p79{tM`r+Gc*dyN`+F|lmWVt#bN#bag8%|jmC+aaDmC`7o!eUD<)b?e04tal@|+%(Rb} zM85!H7ToWb+~~gBvpV-O;wVm<{;A~+V2Ug*7jwKnGu{Z%@Zc5-zrS?f_Q`97^JCEd zcUJ=u5q6MC-Pzug(gCni1`9FNWcayK>alVKlgs)RZsxa;9Gg=eUoXKV42MPDC-mwy z8;WX|tT-F@X6O3+@s}h8!(;djTHbSv>Qyfk7sQMJ^Oid_+}=<&n=f!W4_&~z8S&G~ z_83V-pQb%(zZ21Nf>+A%jIk-BtCICAFUH;(3&)dF!d5Fl;rd3ta{6$Vs_e`C5$=+P z%g-i(k#ttZ<0vY0xcg7Mb&yYYqF0Q+Av&wB<3S{^W2W~VD438J>>3+dDz`o zN8<}vyaAo{&9-lurOi|gkIn6EXT^N|xmV%iTCG7bPjLLo(R{C*`*yo`8a!W&iX2~s z9_$b9X1$os()eHLtFw5cM12Hrr>z}L-i;*@rLsJiXV13gV)-|JR@92ejn4bA zbHE#^!)5&a&EwK(Zov1$?@dpw)d4G*Y=sW$J|6E`*|(^vt+5odEHIpaM@S8q&4 zpS4~pkPE_EQ^BG-95t!{$B%GrJ8%nP3&>Anx8aWm;7)(+iy74b?)$h%MC*+3khTU7 z3yG(eIi)3&OsX+#82T*T{;6p6N!csTldyk*ysSk3wGI8)!Fg0gB*^U zyj6Qt*k_E#?N$3Q)+~&9<2e%M=G1*&l@kbx_<%D5pER!t6q4V;QJDk1N8ioK8tKJL5Z^K|4PjSHE2axC;SNhIyullCt=3z_3 z!$6x_ctes|_Na?_eTZ$<_rc~LS+?2z277=?Ru06Y!Pj*5AXWaolvV_XmLr^p2KYs^bHxN@;^9(q|m!+J|lC)Joo#?RdK8|4aXK^?x zqQxP+7c2l zLll$4b>G07lCA8Zg=Hiz#qKaus;~B0*Jz7U6210g0fy2@Ql7*jZc4 zBDS4YdK0;BLTjlY)VG%rPuPwSi0sqZ8(Prr=FnR2f4Rkx)^dpyFySP)xZaqY4Ql!z zkV9CLChOcyr58oak$fu?IQWEl-AMyKb$2?#_hwBb-lor{@!9@T1{lutYehvn++)1c zLqP7{0K^?3m>cL4_H_AQZ)xaY?h|8sZ7JWEG5@}%_f!hT^SykxT;5ScJlXgh zQcm_ZbdpPiRvpG5e3%`n5dw781zQ^5F9aNz6IbqHnUejxngKjSd;;E|!Wb-yZot(< zBS><*+J69-4nq4R?hJhPkDs`*^Aw0gLal}m_@zm!n5r7NcxKOCcU;}RxHjUCt~Vi4 zS={yX-Vz3tpwMvFK}tU0F$cDWsi0I~7(@n}O?M{!ihkXj%R>P3PR)!TWB0XDOYd>Qw zUVHq6;6IUSX1q*+&&@`l(S3$5(b|iMT0eV!GviTblikjd23AQh@5kiqG10;d6bnOk zP&vQavVq!uX7RexyV_}xW_46xe63lo#n_Lc;Y85((bx9$M%wo`J|JYh1_c8BdhJmHsM_13(&p%dz|bKk-k~Um5{oa5 zNh$H&5Il2d{+;R!*^Noh!@^TT?ohdMtJ11n%QHlR?Kw8&pzAJoZYR#jxHZsUv45qQn33jLczOnFh<3;g96O9or2@eoo6N=p4Svm zkYCng^aD>t&9u^DK9Og|KtE$z^MutBJ}wJbu{6HJ7S?>!1E9F^KDSA?^IC7#F0rl= zH{PZ-8O}9MPaAz;rw+ONb7RG#!omCR2EKc9ZW4-491R>^_ri`H4emU`JAr6VT|D_& zs30(Fu%0g$VDA!bj~J`Zhpx=oun(=FF%Tk zV*BYTH|oTzdqCl^j9pFOW+~Ayl1DVE9#NK{0_MGg zI@{4U&+Q_94}kRaDr(dmcJ4q>gdsMYTaQ{Om+egXgGxrzyYWF@9j_wqXIXo0135Ar zjyiJ|{KvO?mLP@ET}oRfbtr`K2c1ZVr>%Ybuk)L{v5ECiC@?!jiO#~z2OxdJov0Jz zpL;D^QLdW=o6sBMoaLM%AECbVV9I!j;aW6?b4b^D(hNZo?tlU|g z&?Sh*E1t}h-^TA_YG}xC@zWaqAs~mKm^p;X!?ZWTXA)kwQoBUNn~kO`>Ke1(B{R{y z>JKc%6{2r3!qZ#mW%t2#Erm_lh{oXduSi+%8G>%EK8!WeN)u*TkGTo^$%vfE#S7gp z>33m^M;YoopgG@m?|PewSL||SqX&oUW24AQ{4AoXH>?t93fD^y=2iLTEoaHYR1jxxa%T{@*n1TOf)IY0GIBI_VtN}HEV zDRD4ETM*S3p|huEZ%3E6m-uny#EQ=WTZXi@wS541weMOBZ_p)LVH9WH64)2pj_ED@ z)Y%|ZC9Krg7$|hxATosJvhDm?d<}8AqJ!0Z(=UtaO!1HNlS7E_eofTBypgUk>4_EY zd3mQbOLZS^($HyHokR{033{QQ0Y4iPl?k|*t|6Luuq!Z4DIG&j-7jw=N!K2OsvEnZ zH6_Z$fR9sNvuyXlwwL74J+lC|ENiw(`lAvuOm@n z#!laryN1(Y^L006`a5qeYVGaLHWe$M8SOMPk2DhUlEEI|1KFBx;$Zv-d*e}5yl~v*PnSXZwz}y~N9D&p^{_3(U z?cqcgO6Z;Xt9$;)3?JIIOr&|ZFFY0zpy!q*-b97sj_Ywk$1rjbv=TC2{2wz4w*VyY zPd;CjloS^r6E9}xc3t#PET|QjNlT5FD(#bB>gvq0v=#xOQP3zDZr57!GaxVBgQdSd z=tQRaTy&3im7`_Bpd}F%7Al$VhtcvMM?4w=p_|X?frLU?AS^XRk%m6FO-@!67y}E6 zb6<1rEZX(4knChlrIk&=ibnJT9CKDz%lBtgeAb%niS!Rp!Aw{UULC{)Y{?A3LPMv8 zI*(WL2xSz`T}~@O*QolK7!tK-HBCVyMnp1Uq)-)*b04IoK+5qx z^@4Y0-tV)%q>cy`6a6($y@wl}a43V}L*u{e#oJf!g}2Y?rws^b=?c&0c&vgsJKv&9kpeq*^m40}F%WcnoIxeV$ zj3x>`tczyR$p&S=gtU=P^ixVr;>owR#Jrpl(v~_Ta$8XsBw{^1N-axG{fX~~7qI02 z9euabQ2PBl&`#UX!^);|=P-u{)HlLKbQglL&-t#|?I(s%s7_61#@1H$uFVUwpZB@l zE@@R!+gkL-LEpi{%(`Phc`xI-R#Q$E#Tu~9IL&jGOF_Y2CAHn(0`h{SRrHOs*)?m~ zeP(4|LeY#&XTv?i4>B%y&*^&m8|Uf!TyoOdeJbxxNZ>gEazmWTgYEV7`F9Lh&1Mc@AFpO&Lf2s zyV;OCCd=mNTG-;S0zQtSs6I?+^I3_HCsI5!;ilos9FM)UI7LlI;y_MIZUOHPh8FucK<8Aa6Ks6_Yksa-2 zSFD77cBwB7w$jeh`!g{G>*i<>nv1JmV*zGDgn8}4uGD^T=WLS z6RU+>OckC4&$}CNE*MURHkv{Bwmc>NO})XG3-CAV2&(3MGs zNOmCjaMQ(n>!(L9J$8_@a&q{1!jEQAwO5v4Eft;HQ~JoN&=6lA@D2?}9V@FY$uEtd zw-|lCZqg3uK{o03@n435FEkQ`^msAeFD?R3#9?+YE+ySlRCNuMdX^nBU$dXW!dixsfz5E$&6Tb^$*sDx*M- zg|jxPI9hCC=N@|M=B;U-OQAV-L%^$Tm|g-GW8pR^xsUpARh37v^xKTV>mJvE_6LWD zFLGb)76KZL(IJtojx#F0xEBdtZ!O5}GCFD6`*I8JeivIctsyZ`OSpE)p;atgo@9Va z-kihd+O$|IG<(kZaEJjkBQluS>;kjWyr-&P8#)8y+oNP}Dp+8?KIX&2XrwR3;J4C% z6KkgL{b-n>Sv=fEUkf#RiUdEgPwuflE{IJqn$bjB|6mUb@0t>C6R?Fu<b;O?fg5K z&I*4iDP`s-D_rtx*@J@pz*P6Lo`G-j)y7{PvGa`bT2J8&w_V(3=I6x#DLfuNXX@ph zq6*sX9P(09`sXo`|C}O27E!(M@so@&4Mh6a0*+rR9OGL1O&F0Zn-J-CHnj z>l3A52u4FHtJ6Hu{@55LSu2EQ@ZX~=OqcO39G$BLM<&kEYHkVVR9(L9?!=&Q!Dv@zZKp6g-@jcUF;=4|t$jO4k-Xg+(Bj%uvnPc03hZ+Op{}kSS8?(QK z@)x%7-}=I2KL4-A%@I3H2LC4);O*i6yBPZayGs6l#S;Guc?$n~W4z_a>f^p@+W{V3 z`)^gm_c*;TH#U%GGMl5Ze0c1!-$X*9;-*S(RnhpB@$!e&O=z^muRA%4MPz^n7f$c| z{B|?1IzOP;l@#aaxTu6T{jh3o;eROsLnVq(y`ipXcADciES-b%0iFT*nD&heDhsA; z*T>JGqi*4$*2^1&Ph(2-*G{GOC?+GV*v#gSCpHWeJS{PgY>D_J7ad^)o`2?ahruv= z{fc9znqM!0<&hKA-^(jxPilqrg#t?(_Mt8+J(GFneS5$&o`S{x9F!Ss4XO5{#0I&Rc9o_zN z;Dd8JKuJPA>%JcNo{DLObmJKCK zQ#|HAsGf}_Dftp~3wv54KuI8poiuV)wmzeEYXAiTI-f^gXJbp#4nS1X9S=ND&HqZB z0?Tdj!DuT_$W|#bCPj+>MTxw(&jHT5F7EFJ_P%!$b*Iu%y}JuvisfJheS&h8w_V0k zVeDx8oVvNIK47CeIeO*1e}@~73j*B*89xbkwL4f4@rcm-nC(sv87t7Li5GrGemTs& zD1695B#kc80ln7bm?@hPhIA);9#Hz;Cg#S)JyR-o+zK<12-pd}`niiR=A3jvNCjC* znmaBHUW{y*NkSthn$^FUuZ^O2c?lF01eA$9Y4|>}wBvL6(34fc5}Z`RYsYZwbtR1x=sp6~O?!O#zGdyqg~g8Aj1oloE%mI?GFck=ZF2P77k zo460b)d-nzczf&2-J1E-N4G%!d{Me`O+6@{J2~^>mA*kuT)F!o!gPkoU>n)%!SQk2 zyV-hdFDFVy9sFqE(P>W$c^UDuw|O8Tk=B1!?z%fA+4sIO04-_kLy^STz7i@6cP0>< zRcRJWuBH_Uz6>pBWyC{`3xMVdAjA7lWQ_X4>3u9h^40M&8QsKgGn^z(!#k^-#V7aH zbda!I-&biOA`lehZZ+YP@u@$dZTHUf}I3D8vBSI4J7$T9*8zm^w9a=L{luxgT= z_Jq)#e53>wi!vW~F8s!^rX5~ZH1;o({j8~W-IVJD&ZN2=POKA562b)=a`wsfpK5?w z8y;L6ui!6V#&%AHRFoV0Mq7*AZhkc+8$hbFDlQ)3Qxqb|tgPSD#GLLHbefH|o{;Uw zDi-qj5kqcPHf~Ix5PU&<9=z7R+7Ye|Law|bFW}fVa-pn=49t+w?vW9V7N@;b5_51V z_LmTvDd$~1@GAt24g_wD^%>}V?r6zEWr6t9_+9CI$$es*4LH$!{xkVF2ajXmerdF? z99C4u89K+(DJJPdi}t*i3!bvCO)G~(N5nTtW2I`0#dJ`>7f8?q`W}}@T5%R{+SnA= z)qPZsWny?a=O!Q|v^u$jR%w2PC3zm^_%kqhuny0Gz+IvBaGm*bZ86^Jdw0PY#eQ^Z zSv556zu&$8K{clzr=nsC! zWnL9=H}sZ+Y>7d`i?zqqLPx3}(J2~=4sXM`PuM`bWC!?|d&c&aZ=>B0n)zoLmVN5Q z!Ic}g{r0&>p#fVq2Fud0B0exHT@B%)Vm!r_;D@qdQLOQD)KTH0(ei4dofL=7h)Py7 zwUk2EXi}M;JT!l(;&x{D3zx$*hTgy+jY<>92Arg!)Jd98ghMR#?j}_i`0+@u3XUe) zaK1mj!+K?O$f_Ydodhv!GuuKv{v;dV2bt|N9fUGv<;%~=^7BY`@xUp_cfFi{GTwjL zxp3dTN7Or0%p87SkWeGiiB$u+w&Pt|+#WoE(NJLp_*7Xziv{ZO)*YT&7r+vtg~F7~ zPM`2qg^b6{9`&CiLEj+MbYBv{o@00)ScvR*Iq2zpi}_BwDZp}WdIk^6*g=C(GTwWD zLS?c9*|IRm6@Nb^*yjJ>3duRm5=vTUi=M6~;O@*tr6_4|pZ+KT`|>wSE^NqZ9=c(Du^FwIPTw2qX9->Z1aWi)8kDWj0o(S_RUWG|DgAvz}ag_wIGIm%rEaSRRi{ z1snqA2jP5g0&Aeb)vrh|<6oZx@H8~U6c1F(qv}=#I^Fcj!s~)Ud0DGQNrfdOcpdl| zwO5v{oWu3IiF8wZP=Ot3{3Oatm@h*;S@ddf8-#H5bT(%>Ln479r&;S)oYmjwS!%;3ap2&$hB>)e!Q--{o&}zG z5dIg|kqX2Wrc^NYu8eHrBURbW89w|3ML3%xG{pJKWb%Y)m|@TeX7qNOEDF)7#^|V@ zQgFR`t8)Cj=VQuPm<*xwQ!Oj2HQa0Uc5Nu@PV>dppDfspy6;S+HhRNu+;%&eA|PDb zti>j)d?P$OsR!Dn(@!UR2G@3e!!$O_&V!~(hTi3Y9Xzp@T^q;Wf$!eZmB!bBMQkY6 zYlMu(KaU52F`A9|%F zpBL-eLbMhr@0h1N(wMY7IG6LaSgqhh!C3B!ShLq#SG>HSN95RrShEbh?nUdx+S>Mf zJPs2Q*%aKw>S)Ru#0X>eeN7ZMd}_Vi=xHY;Nfo3>Tdkg4um^{hWLwZ5Q?(zl7NG4D zyeHX33h}>IKJ(%yVID)?mi30TI}!Z>KS8eGT<;yvkX!fPW^tp?#ke(-qF*0BgoHM# z>=6vk$>ZLE-Xp)@q%4U_XHGvn|FqIxw1&$QH+R@@Gk2J*(s`VKiM@Q%s?n(i-N5b5W;Xn%Q;cEg03QXSjU026ZLTa4q(<2PWwu}B-!qASBb1gFFO zG?ZJDKMWsViWDwPgg)Dt(ue0PXl1HR^xmGE;kqw6{7Tyy7beOLlGZO|-kiv^NW2pv zt$RZ6rlfxSvFbQS+3R0Cqr2|2MYlddPeHb$Z`*E;HzlPKhU}(>-=Hi%ww+V!HPZ^mbb}#lmjv{aw+0oGqWyKYRd`k zTd3RXOr zP`|xNS)i=Eg89}psQ2~VLe6t`(^{RgEReJ&(T|ru5_hmaEch8*qp^oT3 z_f?qqv}Mh8MH!l%g9AQ~A6J}xzmAo{|0%%w8cCj4+c9XygsU+$db2sSYt-jv2GNyY zCYv*|4uHCQx-_eY$KALF4^iV;tYhF+~K5 zyCFE>RMC3bCoVrg9D6~a?YPVCCi#R0!af6?^%|EBEB8C}1;fi*#DCw(6W0hEK z=s8Gft|VLJ3em5BI8am3l#q2{2*)~LWpUyKR9jLjWr}@uVrzdePc(22+ApXFQ*4hDPegPs^lmTQ)+}8_8xxabN73xdL5|fMJVtob!HHC%9HX9iK z<6CO6g@1Q8*BhjB4u$LDaXX1Zm2S_B z>}r9aiGcUU;%BMt0)HFi2#qc59pm!Ec(36Sr#CHIdXm`ru4K)`xWym%V3k?%U%Qb= zg@KrT#NKX3>VmV6m-ujDD-`w0hx(55EEnYcEZ7UG0@?^c(?I(hdkDuE9pIJd(V!0Ij z*E#wBh{R%UQEXFyObh1-S^&IlpQcH=nvO7UW#4AR^aG!;Ei4n2;@3fGR%S82!IIqA zj+PU5USO}2zjRC{<^%_i)Hae#_wH<|uRPZ%cZN?_sxWmD%|#fs5@aQAvW|H2e2;+& zTy4N;3FCV=yY_NV1Z*;KxC~tLzBF36kfp#}yxhBmy8kL6vAcTQ^6jQcPnf$|%USya zk!h{{SK7&S9Qnt+^DJ+2@6$_w+B6^)JTthf3V1Q}XcP-mZgS<`#q&M@+q;(pCopWg zTaG~uAZNCkw`U)u^x5g#J3UIJc@IC)=fd6K4AyR!$E~wu*xpwP1NtgdpvZE6ki@=a z_agkjkrur}?CO}Ctm2`vAN?uKbrrb4kIya;enH)Lj9#I6b|kQig@MubRZd;Qen2#G zES`Bi9TSjc$s+L3bTz)p&F*_(*0+#|=g=lVcVOoNyY)Qz^4vSv4H^B=b;VZxy0`@c z74OO}u;zWoGZ#hJ_#r>ACC7FX_fE*b>3Ylrkzf-pjbRm<8vzNG-1t`-`yZ%GQEy&c z-W{^k@4-&*K{Vx#`{clFPl4XA3PX5c9q+N^rw8B>Eb6JI^+YVjH>XLNsgB;oc3OYmI0y%hYPq&u;J0Uw;fv=D^|k1{DrB?W61~>Bmkx>E zw&t0}gfJ0SFsn+xz2Z*}wHaP$nvA)*{iL|O?FJ}DN^+F#vp+Pii$iOwZTA9oga=$@Gyjw#t_L<_pB3 z=}MMFM^EN?cmrz^Y+}EY7+d%I(lopu84UCHg6`%8JcNxA|8sQmUKRVm^tEg=FEm_M zu)RCr3aCv-lhr7{A=HLP7q6h;pWsFhYB!E-qc|mEtP^%^3gq2d3Sl6Ncm^|vqj%v9 z&aH8fbv<1pqP3t*Buxz?2c~OWlsKwNPo8mD zhj&)_ea>{x4Ogp-Yq;Kv=PI1CeA3N@Z1WYT<>sUeU;?<3bqj-lBeJBiQ@;mI)i z^{)W<_@1S=P6}P~)}Vad{fs4Us|ASo$e>xbjWgJIzF9}Zlf!&DvQx>7VsRc(&E67a zWd<}+uCIg8OG@lw*-8^eg*o50*NAJEM`OpzUQwMTd+SnNe06k*8BU^$@8Da-OX7#O z*cWG^5f4K+N9j=r%emIC*;Nh~T1eu#$uww81go&~0A2iMwFyT!8n5SGsxf`4MMa7p zzQlSU2jbUFJC%1iHMz}yiAUTz?O>`uIp}j4TQWST>sRuPM}N@U+8uc3b)iKRdXm-< zF?m0eP{^6^y8jK!YUL{@6MzPfDHM=@S_rzyil`LcgG>_{_FY=t+7K@X+ImPwc4n{ zCapr3)N!ACjCtn`9lhTd@f^>y3!RxQ3DWCICR)b?^QPka2?~xkGoCDVLpsA0e%qDL zoj+U=dgMrkL&j>dI^bEHmuB%7>Yq1ES=L@pj~9mhSYi|I?~itrS~d#ya}Ip2pC0&Y zNJhU;xOYEr3EaGRf(ZpZbT4iuI*hcsExctVgRY<4XtJ)1;eqwBJF)~LhuFW$Ggb-U zDT)WNM6o2bs#>K`jWjt0K@iugvAsh#5gg%{K9X4@Tz0D=ek2C8+W25bQwrt%`2=3K zfwFWoWYP)K6$*jHdnCq}CV!7zq*hvgARy7WhoPp7CLZ7$-{=GK*?G z6lP@M)*AQVNo6oFXmYU9tq*j21!wlfm!w3iY{(wXt@-5PH@7r2<*4}#3v8OL2j>_- z?VVTd9QDCqTi(LlBUf-b(8c-|Wl59x1#!^?2IpKHm;p4@Yx9AhtQ6P3kYr^INA+`= z-leJMw!5OPULGE8lKp^-tv)QTF<-+Hyt1~ezXj|emit+LC}sWR@xprnHm*L@w>L!o*G70ICQ3Fn!SUF@ItY zNWUZJW45drqQTvh3vp-9mtn(s$KeN@Ufm|7Rz_XVUzofJ3P!&&aAs7NWf}pd-ye-4 zKINaHfsDSqQjh2KeU-VlfBA3d? zX1=&$?-I}bkdc)JFRls=E-CyPvR?3+t%7B@HV=1PdwtAr#y^|m-wEyjnWcBRRlY#a zQcbOr3A+p>^eR7&xuqJyqc)0bHRu!^V^?8p4wlW`OWkF|6SXRq3mAmGXYk)W|>z zyVx{0!s$|nWA9wY`(ByB)ymw~unTkI!aD^l39U>rMU&mLv7vA_J*JBh$>W1HzG6pP z^W=(Tw&ckh8LfPtl3~!qw#RCdEl1`8AYT(Ytf1R`ZGQt0izB-!ir|3yoYmw9hTr&2 zm$(hRl;db)Aw}#G`5Bp25HvC_2$9)^aNr8B4oY(zm+IhWY&1pKSwoRCUP4`-ZB@Pi zKAxW+{D%J}YpejI<%4{Lloy#~#clwfqFY`S{MILL4<>ux{fN>>R#hPR`2EGt4qG{< zz1KilI_+XCwZqMvSKj%gdk3s4n0Dyen?efcUggN*iSZ@Lu+XJO|8BMgN5U9*klA>Y zd$V4La-N>G3oep`Yw@w;bz8%;XeR8Iyn6_tf_RP#l$TXhm`JK3SLiXTU!1ckAPW&Q z{jwyueW`*UD*i>AIlu8^l1aykFH3Qnvx&^ulORW^Bp{%V=`fVytAx9wuQb=(EGA3W z%wh!sm(F?VuK*nFJLRQ=5CSeaEm!&-?O$A`k(e95v<5BDohyI6T%dN;3w=Qf!EvXx z2sSx{CmDQwG#5vL(|Af(E{1a}zw<8lHOimgyK; zJyHBI-lsltYB_pC)TUefE=>_M6A^T8V(%S#klU(*CuTl#myk3qrt!* zesN5COht|2xU_>w1V^|h;1LQ$atCARzGm_Pc~ zz46_C)e*`8{y=LGInFV8ji8mxY-uJ;)$h+RoDR3vXvxdB_*z+lrG+6$io-^`!L~8S zPW;?{{loEm3UoiVlWEW$!S^F75kqPHqaRnW!Js;0xKN7&8<4Wm=zH* z1hVQcsg|B+PT(C~IOSBuL&!0+_Yij~a_W&ZE=$Q#vbvJ__$O>0+MW0SMrLQy=$vg_ zBVQ$7Y>x3u?T>7iP^=Du^5>Js58~IH_uj0aC-SP$F4L1Tr~)9W3E(!~+wN=g!qun$ z$pv^(kLTXpP2cd98JerXo7YG@y4qyyf7G}g0|Nps;jpj z{obEHj%swUc~FLi^vh%{H~@uY3w^UdmC8D*aAiM=08JSoc0crr$Jh46g)r+6zN&0~ z&zn>I3?S99%vR4s(_Ru^khNSp>@{0`*JcExMSZ<1m_p+DGUepXRjoHj2P?F116!iP zS>>M{>P4FiQ^llG*VwJBE3LAr37s=nO!DEWM_e?kF{(n9yG={TS+eTK9|uWCMbuI2 z`l_kx7Lrzq5y0d;lan+CEa4mpT;q(Gf%3DSj(ZciwKUE z0F<4f1L~#SDa%|Kl%tX!KjUy5=O|mU4kKHLL|-16qj|ggSK|M6NfPSKDp0OJv%Z8O z(JG5HXMAGTg4a>y|Dr%<@et}vY7@Y2mNQP8ZEC8-X4a!>_|;O{gR+e{S{(87hcft} z_as3dHW1!cP*vy%GqSRV>D2~Jv0<{R=Ng?|yNb8x{ktr|uu+$(4$gS+EL0Sy>u_Ku zkTszp-l8i+5>>EJVfaG z*>xu=CL34>0ALI}gK(sR@E(=&M`NFHl&P?Y@Oc8f2Jf!d4Sp7+y4%Ykkq6K@;rjt` zA6cZ*y?0zzlM`PYP)crX7eQ~+6}Y*G|h(B|+(%Laq zY6Qp=`Df}2fdFNaYaXXDGMG=$Pbeio0NL`?*cH&Lvy#fJTIATQ^uJ&u$|-nsDQr$m(S_m+mnE~DT4;JL zwDKB1>^yw(uksNf)b=F*qqzH1_ZF16aMO~rxKU^L3PixR@+Yy03g^FTE!}aJz;Y1r z{7tTY@r$nZ`sprJ6^!hixpxzC)1WmI##;t16kUGmJ(8G@vBpur@Odbtp@c%zp`|7B;nr}-iAq01aBoJJKI|+o~8YH+o zG!BisOM*MW-Q6KT6WrZtv~kyl>3s6uS~Kgn)|*-LPt$bWs=8fus?Of~oVx84TtzCP z=ph|RP5X6KP0XD~lY(rt4Z#4hjQQtzC#4ZF1$_^& zgdHX!P`=UA)6x>;kyUe+C;Z-suBjI}O7GNiXwGxo;NIdc)<@*hc}=af1A{#;A+bj@ zcYK-gV@iR#of&+2C*bF{9sK7OmgyIts~p9Q5Ta1>4R9gKF_ZPn<5TZQomN&oTzH5I z2$#Q!9)N;h(UY?m6%(VAy2O&ZR`nXw!H1q_KKDUpO7HZ9<{Z{PX6L=uolw{`l!aeP*^p#!42^G5 zYwYum+uDMp3O#aVK9 z#?RYFk!bSF;2*mOMWt!oMVO5n4nhNrUf%e9@6={T-W(X0)i;*G%mPp&7 z(S^)2CacZ0{apx-8`dXnFu(Bj^WiHyAE{YiWC~jf*kQJ;{WYz4VWFX*A4Z|14;>6% zplerm^VxQHvNIo0Tow3Ba;!cG`D$tImSA*Fa$w(jS>lvEB^H z!hRta9h=%9JBjBwlG6JjdXjs0a9W1U7=sbv#W>y7i?72g0}xeBKnTL?VI%fsCGln;^TknVL+MQQGg5&!Bp z{4x!c?{as8_*Ir%*>~7Cbu>Joir?*MpukY-#R6&W zO(K!q0@dx@z_V!cmd@DWiO%|onscf%(sKqN`;jjenWiVoD_Wo1zU~3x8wVtGrPu(Q z@qmEdh$Zh(6_1C*bn9azF+tkh-j<|8I2B%jHCb+h*Y7WBAG2D|_7}#VxBs}Ft)m2S zpRRfsLT|n`cf>VoVg0U(B@E6 z9Z0SIfG)Hd>@U;ySSTYq=sy{TNb2T`_mZ+h8aQr%^n7mT#$mY}1K1gliMn`<@D8R0 zu#Kj5@r&86PtXF^C)U@pE*t{4b8T2Xff*-q>x$EFdKHPymCvqBz@k5WmVuzl@ConV z3}&BoE^h?sz@ojHev_w>ynWg2*l&a{+R8I|4^oYmO)nh?6m6a#CP7Fi^hTYWOt1j(a#!;_`l>F50TGwY!LKj1(G;&1tRinMtqtIF4fwx>Jf8l-4Y>H^dcym?itPN^XTDoPM&jD;EtWY|9JYcN?;+JX= zTMr+Q-oLKj{nUHnfLmF{KNz2ojTbypiot;BlR&?urcAC@4V;iRIjF32_)zMbfIU~( zh62_8|K z?(g^Bv8yzl?BY0Keew)ItEGP2shrmA9USBkY_=g~nd82yWip-q+=)UC^ngEf$sQ3t zzn0E?erarj=Cls4jPJSE{=2io30rw(YJ+q=<|KVLY9KfGw`g3h+j=JI;{of~X-0`` zM+btQ&TY73(#AnV5})f6qe%lQe3R$<%bPnmFWFzWJG={$JuF2UDVgIvipFSo3;`fv z9=ATJ)Yxc6gF|$7@j7=B7y`}6sTS+4Kgc`RlwF~PtpJT?hnJMib=^%84iAw_#6U%I zje{Nb^tGLLyz)uHfQCct*BDK_O(Q{8u6g!2gGBw@4b9rtRKH+nOEB8bsh8>;qS`VB ziCoh#kGt zY(;Be!%{9QR*C#J@b)E%sex>XfDn^raR)!gWF9~Gs`U^%Glsw_v?((UxOJC(DgF*B zd~oTgu-o;L;?3vokO`xZ>c>@5>b>ugo#}@6OG*0LGy;?qO^6g)FK0KIp7i9;D=X8% zWL={iZRlNmrlc)Dv`w%1p^iCzusy-~ReO7`zLX9EqG9+)*P0(Qr7n|V@H5WEWLZ=% z>Uac=RjW2h@qV`yK*5xC4W0;*n`=j+L$q}W9LE&Mo}a8x*<8?`FKk~GOXt4Z3*NvS@kQ2=Msy=(_%rePbNx80^MpleOHIR~%#rn$uMst+GS>;Zc zF2v$!@Gf4Dm<21s{;F$F$UgU8tW+IBiAy*no}E5SmF?G>aO)ip#|KldJA`56n-kI! zPau7%qoqZvQYcS;X!r_yXBZ%opR+H$d>1~X9KT7`i{(0g;gRS`#_ayR>2QhWG!rZU zWgX|TykH5m)7CAZLWwYE-Js782xAmY9bttBA zX!d7+OxVSN=V~!Fl)9n!x^8a+u`FuJ)0CbJ(tV62uPE^Y4%IvFRY_J|U?rbkvHy;h zJAwWE@h*Wco$~NQ=v#WDD%3ZBivE;`TBRXT{`=3XA8I(B{}jA>E3PSZ`th%e{=8Vc z?}i!0KZSV-|Kmy_R>RZ9D#)#`{_YRfR5#mE(m`dXH`~yEwHIm?fBFBrx7 z>Q4>H-oFyp)a6ENiMOmzuR8--&Gdl_D<@ZUZC}gTlSGnAyy!K(O4@V`8H`YDdpK9t zq&Q|iYOH|Lp3q}|U1(4jukGHA@2-3&y%V4q>9BOTcW76xq@Ad|*mpqJmAQ9EyC1$4 zaeY(qxfq(o_{RX8q-9RCZ`>F|5_+?jVe{gQu%oC4iJIq6c;{#+kyX&oR_k}1f(~Wb5UpbM!tGD}KqAn_#<4FX*PO`u$mYVF zW{Tk=)jQ)vfr>qY_<*8q0&n=2bz$p4JcJ`NBsaE}<0})rV9!S|H@cgoLqB$#q6(k- z?4-xVH`}J*w$J*gpsMATF^PiXC+L_ypzZZnoV2#=ey2+#l0p|U1D{*_$+hq zYP57sL52LXgXr0!N|>uhn??+Z0gBU8A%_eVCdjRo^L%m_8|Fv)rQ&NyPP>9@XY(LO z@pya2`MIPJsf9mH#pu^H?J98fhW{&s=KMxNPwi$%N!fMUnXuDlS>n_q?`TPha=izC zyVX=sLdt1Ievc@5Ft!Uwky>%2PMjIBe!>vZ5$!hIzfje7M}}5u)bn(iT^N!bohEo2 zN8eiPJv=9M60FU{+8VX=ibAX&W2FD`2nT$_K6~>9<7Q|g#-gZn3?X z(Lv0j<8QfY&5-JtkN%q!0UEm&x0k2S&3{%bQAtHAJnc$3#iJ3S_|YgOz}+~^3Hxfp z($WlQCrnwfJ`$U@X=b%Qo&Pzx^`J$MrH8}NW^hutja0WcguwVrxgJ#aL=Wt)LwiVW z`_0I=5-q}!^)4Q!i&qFj-Z24+0?e!o!W&|;`R#-k1F2N3zJInVy0vrOntB|@M;I&X zbD8KdEdNnknVL?63GALuuHSM_K-Y(R*M@N*;YK$@g3dv@$Kt4eRIUn`T*2c3zG)1z zHD#ON7|>*CM}yCO(g5WV40e-+PHWyqD+=!A@DV?PRRl#wlFm*edy<661w=O24e z54p~dG3x0j@S=homA71ISYS1GI2G;w#!qz=uumZ&@5nW&QCGr{6yRJJ_qm>)5=PQuZpsky)yD>AiKe?gTm23NX{xt-tG02sNH>Pq5_W z8_@0-Vcm!5aVd%^(-NOALNCLP^xBNpy@8CVSrc*!=ROsGt-Oj->f3cwnM(XGu=A#3 z!}}e%P~xhI@LXBap03f!Gqv0EPzR3UX!bL;wpD@x(oN(2tiZ%fmcnnODh6v3B&?~| z4}LSeAE45jpj*!}!X*p%?E={ z3c9a`R-Jt0H|95=9j#4~p&JVvt%ZEM??RY*B6?<}z7`5K*ufb@pObLTqAls?`e7v{ zh89D>P`7aI5PgB_)ZoEva|$MD5mOfa50ysR+eu=8^OCk{`^#!INX=B1TS z9o=3j=EoVJ<((mpL);bejnn^dcPAo%Vj_;&q&^lbh1J13PPJ zEPj4d#wLwr7K4*$zH|8@msaUg>Y1SzYguwf9G z%tJF6%4;U@ww4V1O;OyNhLdLAPS*G#U}zw9nUMaf6~1s$k=blSR&vjSjbrsbA-E>r zh)VZxzW%Gok&jHyTx@duL1CrBP(R;Gn7xN3oS%VWA}Shx?NhmZ`{Z4abv?B%wDc;a zYTL#R2SPt5f^G1IP0({a?$?ATtH;kaEYGWNAdJqC0Hd7^F4nt*jw+Acwi> z!#9}eef4i5kNW;#y7wq`s)>`4RKg`aRi5Hx6AM5Frp z+t~vyu&e^rL$8BalIG3O*~?C4+YV)kqnC#kGw7s^8-;HEh=9cu?q3QX2WtHNtldvt z2-i8xh8REocCi~Fk5;547Owm~ zcgBn-e9mYMUq_fRbS@9RyflGiHTADM33z)cw0g}j&0Y~mKmD_N$8uhJ?rqM$70E(= z78ZNR=IAnaC{UnTxY2KdR_kRE1KeeIjx%&jG%{aYDr6d_EOcp+H^*D9^z~Qd^WA)w z?i@E&M1C{HL(M_XDe|MltlWiLs5u39>a3Hw>OO^|z)lcn4RYot2N5~c)w!`M2%*GR| zh}3P*IQFJ4<;{j<$W4)Ra?cn7i4kJ>!E*+7lrtAYf>4+f;UDy0sV{Gqn^pp$20QTc zv6(O?=4Lx19nh@;AG^F$#~`CBhI!|gQtABDPu_nl*~;F8-<&&xQqx^|zm{U95ah^L zk%HbfGa*^b@V0>;ets52PIbjg z<59t1&aM5$s(Oc;I0n#m^3i_|2WIQ$C4C$&%zi2N=+w7Dp}OZ)7em}8%ni9=a|ST) z>sc4pV>Rfs#sRKh6{f-TNy1!;hr%(DuSr=XQ7*+J9dvfiy<=`?=3S9k!6U7}aQ3o) z-hB;2vW9fEZP$xd@V+4w?sS7p8w*fG(?84gXri?ml*aN8FOjPKi4IO2^_r> zs+`07mv{Awl1w7X2fwsDTypv^;)T}ncID!~NuIh0itrz@_g9^F<jO!~|6EC0;WYbzC zpMEaDXVzGi8bDaOH_r`9Rc_erf*LiteUEcmks|T~QK-!8rLzG`lD98n5O#P3#Hpw5OVrxb2p!9txS6=!G}i zQ+X(WqS-A82=96$_%Q}M{F#-%#wn}`0`fGsxCwbWRf{vC@3z@%0l51Eq%A@(otAXS zN{2e>ncr9g9T!C_is$^3O31+X0i||;zL2PG_IK#3CE6xw_fWQkZjGl?3bdWeg!Lzj z1E)JU$_h!7OSL%M{R{EgN*k&|lFE)pz8MtcnB_j~9rYnR2AMLWt%CVjnFMtag*_q* z=fbZaZKmBLy`uk}!O-{6?vM%vK1cSrgZ`+a=a#mawspj%^Ov7SoGDpkn2T1f53Gf? zHNjIl{(UoHx!(>(*8+2EXUBP+3C-3a)A=q$Esw4A4bzkR=HWGMuserdG9n@91nZ(6 zZ+;L2TA|aw&^&=Z*%vkX87INqg^XEa@+n*q2KPEE}poVgz} zvlyZP^*mxfM_%W zj^Xo(g0;b25P)%jt;jCG^)uoqWWBX@=LJZ+yvZ6R}*%QX`l$ziBL|VHp|K zVp|?5Pq5epVDJSFhbW#Jp=_&(M0M{4)QsrEF?1Ulm!iH1N|%P0EO{*pkM&=cCS!D( z9bpvm=$XkE{W#EkW)>qMvYuD0?#GXK_c^=sFs1;;v8$qqiKrh@l^pGQX{C~n1*a`hkg4!FJ@6Y`@1}{`NHk@8pwBn*S|&!Y_A4d zZ(e2Gp2b5v(5E*!n5^X=U@$p`U=jM=tVHyou5F9-Mv1;VP@k=*^@l`fRM7n@6?=@* zYw0Rjd>FaKonpD0?+>hk-T09D@7|Rg zXlByiVz0i}Lw$+lM34PJm-6x7T!5W3xVj3cpD#(#I0D}1JB_P$yx7&gPv=#TN$Fo6 z7)=pFr$5(1e(&RY<(>p#Z>r`9<9+_dU@`h)emWC*6+PU)$9%c+4+T9N0a?IOP!(F#nOBB)^A*b%FDbkc#*d+c=& z5pIN#_f!)ZblW%zk%XsdVf@v$jGP6v6nXCN@bhw%!hXCy;opA^6YND+nbLEQU*cvL zZg)@kQUK$HPxM5>c~sxVG62F-i6%Q=PD$C7&TZfp=NE?vfeZh!mTcfX74)IW*c`e6 zXt8sK@fCE<4MDrUuOKvnTK)}n8-7gfY?iTj7c5!Ss@i>KWVID7GTq;L5k1Q;YI+7G zl$T0NedB3N@jrvOW7NJ}%jtmXVwEw0&I6sXQ-bSx%{QT57JP1&XInzHC24N`bnMr1 zfXyn%+AX$pIa}v`&U9QMY0tm+FD{rkr|ZECcRDVH`8nl1n{OZX-$kL_ro@K`uk7W3 z(5pG*b=9MUAyA6jIpG$zN*pMvfGY>rM< zpklAhdZc(U4naaH{MAH&%P9#BNY}AOiTxZgq*?30eKSRVF;Gi_P%~n{nnk z#%UkV;3TWy82FR!Z2f9&iOC!d;v*g$`=CN~xdIul<0C$;MHMw^A`i3oK zRaG3>89Vju;6k+I*&mQ;xLrRQvW$ADq!}>gxs57quC^`<;pw7XV`?TVs|hD{o*q}IL@Aa_pS)%fX(>Zi)Yo@0Zkq^nXLibilLYOa@lEcJ>+On$ z@qABvWK2$>G$xt*U95HX)XQvz1O=s2E-=?kJ6-KRAZ@ex|u`lWJOW z2K35Yt#yk>fZsj^fk0TD_-LqpU(J)nxn)u7EmQux6biKN>B#!|ccbh5Q^^XBwTPu_ z0i{rT6OWE^Y2vn-t$6p}rBe;!V$5gA)j*=Ta7|5O>9TOb0WFQ-_i)~5^l~#D=wb=XC=hl<2MQx?$!QjSw`{r0a z-z>=c&Nau`?Syof1X-;-$(O{MPOl`f-y=}|(M_5I2jU=tS6}zg zv;QBI$8qJ}HMB8mtoH7or7bpA1-~>YqSHU0M^M!x2d8`MNb#s8+y)LVlW(&4XjuBY z1|cTIU4ojC784ZTGaKB&ob~DfXRzGF+CCtz{MI_g@y+~5_IJUucplgHSJNJJ^n>cr zANAoRN}OQ(;rTavPCcodj@h%(9KCKR;B36q@+QPtWaDaAuJ-CNyweyO-U(;C)_*e{ zk9wRkZ0FslUhZ3Q)7#v69f*KebT#gV#43ISUHASKum;h$cpdG$T331*_>TwCj+#0+=?WuGDTj4FxB0iF&*zNp@yGVr}ifjy}8cc*6^yg@P_7oScg5RQX=jp3Dw4J>^5amjO|FW%)&|I{2WMj_^R4H# zHlZo3Y9g%c1bZMH0~1bGvqpk;>+2%WwQsh(&@e|&i5izN+arbnt+y!8`J-oR-WLQ$ zclbUi1vapJ-=1?&HUnJ;<7{s>C@*}J#hjcR%HQ6Mcj zc?+;=Mgi5ICfGSOUbe!0(pJ&+fnNC$*(ryXY8>b_<2}9AyXrbU!4ubb^K#c4qWnVw z_eWAmABE(3Inh5pmmTY+ZI{&B3W*qK@CiBNI%`A?Q0M0C^kL0#qVz^whlym@k5Mtb z8~6C7GXKj$kDyrhcR&6K;`L%tTM+)!j=>w)+q~F3oqyRB*1MzsIUf$SifBwtPj_k? zRQ{_z8p<&aQ{QnnOAyvOseP{*Q&{|Oam}7p7|l?A zPQNF*XqcmB_o6E*wBO`sk@t!OE=@o)OB_m^yR>bEG^7BhH}0?BxkPTr z^I5kjySz(}>$r=%eJDRj(TX`E693l!8Cr+Za=w4_u`${JANHw;4D%9lq{fNSjy3pE zZ?$~bF%JX^%P@HHD#I0fE*lr%F1T~ALcg|sAKI@?&k?B$yYldrb6zFl)T2@3LDG>J zkm`q(5*ea1^Q2GK)!GlM0KgNqd?WpuoKxq`QL;GJg<$lh5bD|=S+NqO`y}O0G44jw zta=SNN-G|Wzwd6P`$cQZV#n(hYwlS~A)m4lxc9-ecvq&)N@~k_@AJx7V4&Vm!pd~k z7<xWv{6*#&j1Rh-z;#(z|U8e(G>?W6y=#CU-woyR$ z&9u2SK?%bSdja;&%uil+h7hA+f%%w3TMbd8pP$Xe;S|O0?p<7%wZ0g6MJXeDSe~8; zelECZGI+X;f?8Lkp zbvcsNyPw&-yqK*m6Foi8TRjZwxDu|AaeJ^Q8Eol_uX!537W)VSLtist=&p}H3b7%x z3E}77F?!d1{R8ss(x5VMY?_!AA{xaj~ ztqoHQ9yHTahHkLnSw~yUyXzF?hqpq)H|-?y{Tp*jI#>CihW1-HJtzx{f|smoZb?>V z=6Q6x2f}5YBa*&?KvGKAUaHkLwg*z}L9;!Bwr6fIRgtr>0n0b3Lk9zIm)aROj_DG73#oR})jb8fX``YO%a}vwouB(o!Co@>pHLGictMp}HxB)(w)Mba%sZT|_ zUn7~Cr`R=x`YVIP0*@?~Xy+_&a5^Qs8cGE1$qbGg@_hRmXE(Z|ZeW&ckgz*HAx3dA zN@ID@Rm&$5^?d8oS%`IlRUrG6a-0f%L^cPhO2Oa92?Th2*J6AVxZ<%{YGF^UL z^1sVBmDTzL1S>48zwii5AXO3Qf{ZJFSjN-RrC$3H(ho)~4QM%+(5C3D<_UpmXDp4q zYDuz4i=zd{^>|u?RdqM*A)y`-n5DV&4$^~%?mI5#K6^guPqyi|GQpM4#7T)kElLuH zEJTOdMB%fft%i`pVuQIFg{FzqyzQ^^=OCb&z3_a()TMa$av%F7E-F-TXTN|Y`YiKj zVP-ML)%Mh2!O5p`@8F7bP(|GiElW1-N8gQ`uhljp6lXW)(RDX)3!*~1OK+wuTCmGf zJ{Ne9?;aTN+BJKz{>)R?c4u>XLLX9ZIivZ~x==cuK~>1Bu7_D$xdImmn>S8*?f!wg z1Z`{Bv|UMYvsg8-SJM1CDaN_btWy`dJ|KRQ*lRU>tQf2>>O`CSL8st7vT{9Q66wV( z?OTk|(~_DsS;_G!Tr!=Xsq7}`TI$)Oq*pM8YJO_eB%XAXYDr}MJg}9>%KVnGd(!a) z0IqFCc_C+Ioz8n!JN_J0MY|R@f$$^PrU4r3|Pta|Ch4p((&5;?~Fwi5%We* zso+ExHDqwz!pn0SlQp6HCM_OVfY@22R#@y8vJa_Skvsjy%p|h{$1{qk{t5|(nX9fX zfG|rDzBlVtp$l@_rh-JEo95YsVB> ztrJ=O0gME(USBG)?)gVN)ah9GSjZT#1%h*Mcry;u5eZ~87H~^mG~B)cXzD#5q;D?Q z=zZ{n+V41%?aqdyXgjIr1gcDvb{_U8&t=PI?GEoOe;|Fh?semLKg4Az)zL{vgIa^W zXb9&;O%#XgjkYghAryRPIR^Ct>=A!(L|`p;f9 z#3fYQh3v|zXgLwK?{D+884DbMyDAXj!FoD;>m{+dJ4x8ai#C@EB=7G*#Dq2zz}&W& zUdX|&!$NsRNNqCEPAHc)5VFi8;;?SOcEI+{p#8fc61MGRMn9o^`s-^775`>;oAg<| zh~a+G)>*l)F-gaQ^)`BAdnk+by`E2u!*h$LXV}4~_0-u1LiA0Uu(&DL5|K!KRD{j< zJN-OSyS4+M|Dg$y)hASP<0-ogGKvj(SofSZrL!^UP?u$a_ zYC1_kxL>d%>NV7X~X%J_HbufbkxnHy)%lso->QPGUE~q!( z*f01hRSD+avoS&z^<#P%WQ5h9@F6e zZCLP@D8=T$JYBCCjiC4;Q-|5P2#}n$Q!T8`2;p1fNSaW|ojICT#3~2#UJSP@6bKVg z{mv^`aoY38DmaO_()!n( zT4Za66x6%^^I!B>)HN69s~i4La*+5wzJbeROlHqGyF8KER>NF7?7RTI)Bd>kdK{*0pFRv$UDk$k ze!f#Xy*m@!FrE4tO_8^HdV!ME^D;vv^J|vC8EtaL7@P2VsnGh;R1cf`-b$`;{y^sE zw>~*%@$OWn;r&FNo*-Iqux)MaK}u@}4Amx98x@`_eL&QqSBROVM>ho1AcLwEn##C_ zjqrb(l7er{scH|_a3)4g7#_Wj#)v@BRBP zu*u7=T1B4c#co^OTicslv-&Zaw(p=-^yFUvc^+>mV+5d$`-oHq^9SshpPK8)!qNmyF$R`RbXH1z4rjaf0+Wo-fa{}?^L&u3f^smSp{8B;@SVme8 z64~wU-0l&u{S66BBcN^wXJR~cTkAK6@mF@STh+{Km@2Qly8QVafY_nJ{`40vs8!yz z`aXQjceeE-P{_>xg}x>QXJX-IeTF7huY}G|#<01toY{ac`{h5vJw=?W3b5ngZBbUo zLu|Fqt6)ZEmY{=vi=r^J9hY?#Y(!rCpkA4%5=- zRS-=^s#~ z1HG;}q0jedtnbJ~rKPdIFX`M+owN(y9`heq+S23{eSP57El~t`${W8bTAO?KUIXs{ zKT?#gy^k-6Rqo28e%gR@(YbKWiQ=ZiM_MQ*A+u1==GoVv_JBTpIr_QS=F&9FU+bZ! zkEDjddmtKDIR7okm~@QgimCBm2c7Dg?neB#B|KPH$2iIge&qu;RjjZHg+lp#ILJvS}$z7(&a z(ES-ne|D*OG`MY?JrZMP@1Og)n54McoWR_T8J~%|h5vHt@OX1E?|d%HED;~B)Q`18YeHFLBuJV}T6M;Kn-2dPNr!hCsn{0(1gEOraoPAG&iK|M=IJ*NDL zPog#gxBJeDi0cY(HxqJli!hj`$}~`LmFH{IFnPu0ga)y2Y9#*hY`fIQ7r*?cz3x#R z?Zb;wikXY!s6A&>-mws@wa4G!Z@symtYSKw_1M=&nXX^5w*)M zO1kTkbJ>-mGw{mAzCunQCa!RLfi-uodDaL*LJ`>rn0s(1dEg`n5XKUW7+=bmyj;1l z&6`;3oYs2V+eN$xxE~w{5EE|F^8)wX2qZLWE@$aGUFg>L|B@jdOyl4T=F#ol3|#3- z|B#&fz-t0%Q*>$D;hC7aq3-#9I0y{lzM_ls_l>IzDIJ7kKo8opa2BJRz%q*JmW6ZE7-7Oo~W29a7 zMr&nv?RPA9CB3<6T`~>lR}xxQDen2zwO1`56+$zQ-ZxnJt<{SOyq&^_WRNL=)fxD~ z97;qkAI-+l>IdhxeS1_a;N8HYO2bvlNzknGO0u_syny7r4Js^Fs4eW-L0Ejwj|*{5 zMC)PCgrRYPIwR`2oF~1A_~R?W03WMe$0CXmK#L+oLqx+sr1JA({hQ4jQRb}U5xAhM zv5AML4$WeB40@3lZZ1MR@)^DR zg_gV@T4PsyRkjkNmdc_5Tre%c-0emD8;OThZ}&Ty9WiHoXRx4$xou zQsEbW+DwxMw%gae0qD`Ahd1e*2TA_8Oz;1M_6ESkmmh^vNJ%>u8=dg_Eb8k1pt5im z7OX=P%qI+)QBT{l67J&(dqBbTE{h+c!kJKCwbVU@Z+J1OkE_ng7t^OYCNpD*xwqCt z6G(I(?6MeyHBiMfzJkUVQF_Kts{G+PuSudvh~iO6B{ncr0jP{N>s=5Q#`#KSfKBFI z`xXi9?im&Vy~(dP3)7)i$sR$IORA#=Zz~vL|31h7lTu&8-ik9w!CL-DqJMEyvE#zPQio~{hvIWkiv7=KW(}sqZXuehgu`UsFp&Gy37m)JJeNI=fa$ay zbyF8?cNrgvyRK2)M9mTfi^HhSr5U*dOnRATS9+MJ)LK|uue+OYY0Cs9PfbY*$+ucw zllc5CN4|r%IJmPD8;wa87P{o%<0rbkucxn$>3Vgt?#Nh$^8U15gZZIAFXGFJK>BR1~>rm>Ih1a>KX!vTZ4 z;6e;t;+W}q*^fW%dd|&0KmIL#hH6kB8T#^Jmi56RTyv63%UV||g5IRgE9mn9S^Ru< zU3{VWBxJDYF)TO4x~4zthScnw87<!d7jwjMHCpz;NKKkUQ@zgoF(pV{h_JQ}YQm^=sV6Kf2&6D+?6?RUo` zv67NNHONcDh%MPzDYZLm0DY>OcQSTX7bQ!IkU~v4y@C9}@-&`0cop{upeBo|E=lK`r~|b;uSacLYvFe8H#Bq1h11Y z>x!wtVjJ4o7W9k2S@6=-OBEl2jxiJ&YUUo!m~7;L#7{W|Hp!F1F#0&pZjS@oDg9Mi zd9m5K#8Eus=aT=mrH;B6l)@*oQFr4>@RYVgF^_kxUwj3d)S(Y$$nwG%t(9G4_R7~#I^`y_% zrIjF4OdHc;KGZ4`IR#TD_B@!~N(bznH_d0|Fs~iVvxRg8R$wYal_zfWsHT{2&#r|T zP;?)A)BWvVY6L9S+olQSj9ps}?1A)yUyqbtQP>j#ObkRDy-P8ZvagQ&Rqo&2jc7t5 zD91Jx;rg`uM=-1mkyXIUl}t;AZx&;{6^L24c#8YGf<@dSsiu|wgiaucSQUgn`LNz# z!KG0WsDJaHTJEc2!+P^m-c_SpwM?#2F#$0HV|ss30pj5{{atmU=kC>!<=UfE`fxDfN=#>?}XMV<%&tB|+x zFbPesvV0eYkdzAuXCJ2BGvIJPT?w)(f0z6#@DM62DRyeW6!-cHETqxA;plS?AL@bX zC!bIFt93@n{Ue+aS(UC0)7szsz4W*-%5F*1O(SgqWvcviHwxq|3-Etd)KcaH+BN9h zL1)Sb@9Qn*4HD6XS5v1eZnd*%7g=T@Bqt1|0j5VB9&drS76ACaL(F?r_@gttW!@w+ ziOqk!#**ecGd?;YTx;iS{XihFKG1$rbohdHw7n0xq2C!@RUj>KsjHFe)>voF@mE6| zd~5r6L8!FT5aR{Gk4md;0nEK?OaYmp@^N7AsqvZ`p>zlgxcGHu5GWqZOX##riCbIk zV-V=Wa~~1qPXCxWGcAffL}zOBW9@6^b6$bJYD4|0_VN3LsHl1fd}1PE1`%X@?bSYo zOs(CMj<$D?;Laa`k%sNQSuy+*j6MCH_D7=Mg0aWF@M7&{6~KMlUwoQm^DpVR;I81q z(@!09ZmG@i3^dIjz^(Lblo`V{o%RIL*rP-w!ttxo{8e(iSDDXe9oB! zi=L9O8VO%|Nn#mH1Rk3HCNeRK%6vqfV*JBUn*7cy`yO5TnDcO zKjnz`8Vy~3qL3kW7>HL8`h1c(IBw>#*gQlf4uNS8FI^5|pQr~hFJ*?9+%`0+I_Lock zcKIlz-`RUQnw+qkga`5u?QnewpVE<^6ERPk-j?FpYJQ(*s443LXJ=v$z~D9ec2#{g zVCW{P;|B$r=pO0iy{LGe@Tn!H-?qI!`wHcF2 za#*+*W{!Aldn1HCq2$C@zQ_B@mu{{j4lbwZ-{wGaYg28G=e~CBL;PHv3py`Q91Hc^ zss9c}(9(e!7l8^nEWZ&w4bJ2d`FC;6csu~?(ULEy?C)T!$5AGc z_WMfC_MpbIzt5C+HM^kuOW->b#D;iRw(A%+FDg32R#PSS;4Pf=YyYu?+ft#UsdK|I z#dyHp*Y!UMm^X@+biQeZSAhIKX>znqDu?HNlzAVNn2&C&V=FUoRxJr=IrQ@!{R|#o znM6kV9ieV$o0A|K{;c<?0$K<0=%&73BU#$l8jxd(oARbwkzy51W%YiyXE-Fc*A z+s-AmQSh(dlN-o=O+_ie=gm8?_Mwsxtm8;~rLqv;2#-O#?gtP4U(CICR8wEOEexU} zN)-{1CPk3mYXVVGdQp(x3BC8;K|txf6A=*U(us8Gy-M#0p@&W=fxFS)d(QifamIJ< z8ROnDZvIhpldP=0*IIMVXFkt!yhCp%ghLST_5lS0&Mru?zaSe@3*nah{+g@Yei*Rol^7T!`+d;aFPGwG6x zn#py{y+i>%36aTxTaX+Uu}#|IFs)sbqQXw^R~6JLZrtQ#SAIf7dJo$~8_!n4)$yF$ z?y)1wbeAq~@^AbEo{gN8$M)5cgSLDU0(=*V6s|s9?>FRkp~Rk4`7|jzrRQ{2N7EzJ zvsnfLMkjM`IzMtAo=meRLcc-xOM{b-xLKNUG+FyO;W~)0v|~EzbW|D^0%`^N|<&# zDN#&p!$A)#Z?wxlRfy>(`0o6x-BnJ(Bd@>L62%lK{nPgJ_3HwQfx9$!v9I}NRQ~n9 z_meAH{&pAxiqDEX2U?WSh&OGULB+{}#JZJQ;r%bgdo8UUlAX{rBu2c8&K#YkDDOWY7;V}ink!`B8yj6o> z3*?+}wg3L)P(ukyhVhyjnn7|pE?^HY|$2^B9&MW z9Ni|(F9gE^KXC|Jt}tJv2x1*kPRr{*F65`UC7PY1lzpUaiLLwTSj^&3bkLH@wW)&S zbV@h&$HDIR$hrmcwMN$;<|Rj8d(XrF)T-WQq45&BCKXFn?^`Z>wx^FT?V3xYo3#3= zAxxn(Z2b9at%}}C1tvQ}NJr?gv8iau_&4FP1v#znJ5LqzYSd){c^g_A!(;Hdy3fbG z>n!Ztsj?q4GDkILVqCApxz=WEX+?5QYX;UhR%l#%h-9bjYmO*?N+7k(eqLPSA+iG8 z0c$L+X(=J@?v_WO##!q;2y_Oq2>wWE%~$ML6it8PIM?`qw0Io(GV?&8w4uIU#AVpt zFgcO~arm>B(;}cZ?+SDn$zI$X`^3Je7v>v(vk=s5=wftDpf&r*_sXCjg7TS9mgQ)= z^OXg?6Av5%S9g4-%}EBVlda=ac1;;>p2b*|v&B|P7|&88b?|j^3UX<0X(e3MOOp5L z?oVKQhR?xo)>W* z7#_q*;}`nDz?0<-%bk}5L0UQ~QEZ^32yp(EI<9rr>E^U%RG$ZYa zVMaw31vn)h2hkN_bFRAkyZl+Pp@y=%JojAXeN&2(+EYG+!!5!;+kmoihA<6d2RR}v z<&3&sP*;C@5@&5DK5n0scBAF-y?de$G8yX4BE(R%&d-g(wwMHVmEkye50|z{cDO*> z8J>>VG4DmJv+lsKB_ca$uN==~sROF-UnPHLl7?xtxFH-Fz%OM^Iwe2U(f_gM6F%7H+`1rBcericbN+f-lBzFV42*Z1uK6DWbFF~g&A znuG9j+01$2s~8N)xp0{uaG`s&J$u{haEd1%qtaq5s6zXN2 z_3=%>(ODYUE1sL{%y2^RYP1IK>3yEzJd4g?Bm?Wa%um>#0-XYapuZ(fF&Q@n7MXcM zT35Zb4kCAx8*Mo7$IDQVa%ZdED*>CkaG&|Izq$@ zFTrdnl7|Y^%^J+T% zxB+FBIJ22EkqddY-`6c_A+S%Wkh3y3D$O<%V4A$?dKXhDxhg5fR!@D}mgg0({2k*Id>@Qa ziRx?9=5i=%&UhA1bZflMI)?^2o^{KAE?h$i z|Di!={hhe@8Wi~C9j<_c9i6aK+to=-7WidC{-=>?YAnlXX}CFYMUNSM6uWhYSD%zF zmc;oxvdhGy>?{3U!z}T{O5D$Lv5D{OFBX0yONFBu@U%Y@`O4C)#&ds+C>J-Wpx)Xl)3DOL z`aAADSfWuYOfM$|q>a-DR9BqWUqTo%D+b>YDI{+Yljuikn{~bB3ExTTvs#hUl&&nk z#9_)~KKcwZ+SYPse3(Hi`Sjzn#mBDuc1ufaFFyUk`&IN-&|Av`K3mDpd$#n2F&XvY zS;iMnV#M7o_1Rw^h$w}6b9b?{8==JgI$Ph+=rpfat2QJXdJDG$ue)b1*qy`il{{@p zeMaah`d+;L>N9nmCg>9}UE#Y}5BD*Io)If3D3XSy4md1@@VZ?n-9Q8Q*Y^ekA|!3K(AuCUavNdkoxz9!T|4;sZ~@ zF*dD>+B}Hkwui(9K_nrElOQf4cz)pRkHeW7yIOli!XdBB{H~t1 zO^+IP{7!}@eA>P3a%eFGO;KAB_KJ~a^y!Oif3v1QzQY}x zxGIy$#lxqsa68raLWNX@XkWZ&?vlE)^(55Ue-@+@B>B1N%R*d*_GE14R&#o?z2Zr1 zz3(8$eIqipjDU41Qft)D~~?pt`z{rhLLd21>zT z{LE;W#@y6q7=Kd$?UY3 zU~Q;y=aeZdyqmN$Ea6mLsB&jmb&Gp^lpMD6L|(kI|4O)BaD{y-c{$_Q@o;j5qn=}8 zd)(5Ow1JgkV@E{a*G9(5$_OcgfD(U9DbPFp%CcLU)|e1+bH0m}_IFH~3Qqxy`Z^rA?c_Lrvrx zu&46aFSL4`PyzKZXQcB?*3FRDv6z6PqIA551L=63X|N08?)&7q_1OlCRRPy=;iKUG zpu{r-w`-SK=Y_(yA$LRiv^tk2x8M%)i)${d=2WpB|yw+ew+I?dGsUnqCjR$)UP3wKCP z-3UQxuS5I%o4koPmXE#^PZ?|G5etRVK-#zp_ud5ax|)vE{a;%p2%+ zNMR=%d2co9@YmKyzIzZCFR7>KcfH>YnjJW1?1kthq9Tm4%iND*wBu|@ za3}W+t=p>>7iW0GVhpCk8?t%u;sxC{9c~8?(aQ1ri{N1I- zsTJq5OB)hsVLg{N+!%b?k6O zHWTxeOS#(6rhC!^)h}MGYwR&By|FxMA;=eJUU7fm=9g_OXBK_WwA3tQ$^bc=1`5p? zF@L~*gG~7F_hF++M}(Csd!4sMrO*5BcYt8@OE?D>^I6#Ty4$kLQR+%`lv@<(r5ON2 zO9b)Iy%=v$Mn_XFhdL9-SiR`brCvP_3Rx^v zQ6S#Gy`gwIj)I{ZXlHKnvDXq}v~aYbQ(Ej5%<9#a4CdqOlgezMSZ} zReO0MXl;%Ib2{s977wVKFkOIDBM7u@rY*>eV|>wHeh}E5&EwS;J6DZO#BG?BuIwU( zB5~|O%8xB>kg>vHw~r;9ytb=bYJF{4pDOH{9;DQ)?i(F8ch=hrttrQ~H7hP6AJ zo?TE|`gNRX-t599k5%M~#coLXtn9UcPoxJ%BrYc2Bq#&Z3?n!)nt2aZw94F}w7Szt z1LrwYF^r0OEPKbJql8Q`8}d{dtB{IBdk%xUB0w@Yc4$cZ^NLqcRu1{)J&;Sv)T~X% zdCQCsX^DE~xq_z6c=HV{h)`!T$@RDQHFbh?I-WlT4?z-BL5Chr&SfZ4t?)=EQh-w^ zc}gZt#Ry1Hs58~xHalTQj5R_I?bkA1a%^LzR!`p|z@UMNJO~6$)j8xfG>>!(mR!QB z;;r>RxEo&wlQ^e?ju$9b_^KK?9$#LCm<)Z6yi>S1nK^3b60OWiA#6PJvTPXJ1fxS$ zkKV5Al+@NC+*yKRn`W8EG-Yz6OSkj!Y>I>WTO->KDfA*=BDS4he=B$NcB(K?BW=*C z{_YBcBj37j2;P8E9#<7k6xTWC3b9RMNir;(8bj0T1ijVb`#f?ginb0D8q|D3*Amri)1g!sffyFhUh)vplCV}=evkmbZ^8?bcdvf${-l21 zEyNSg^o>X5o#qUb5G=)_vt*`aBk3`~GySb})B9khcskNINp9ew-q$G!v+(hLIek-^zo=u3dXy2ZAY zlQ7Jmu^UQ5X8P~nrQT_d3*WcfWs85|CkX;G0JY$!E85lE<^#a1{+XToaZjz%a(EO> z0Ve~%jvo$AA->&X>O1;)pG%U1&xnq^<3!e^+McnPVOsSnC~owT$B-h=NimrC<3Kch z^lh&VKdssJ)(;^S7|g1I@0&DNfyG!IGce@s_wlQ9qCdTa{_;WNuGRh4D~{NU0h6_$ z=JM@1q*c498O%1zeP!Ys)vR#$?WkvD+pD)aifI9`j(2j*)8ZgjLrov?+lsTBhp|k~ z39yvzTC#P|*b7FwFOzQI2-c~OIVC=TZ1=zz%K>s-^Hs{p*3i~zsJaV}wa9f)sCmZH zm1k*IkI(gCZ-A;dx1dPlykxNw@6D25%iX+9BN4@WA}Ajaa|nNie*BID(us)L|LVSv;)tt; zP!*CbeP{K(e;v16N!T0t!1S<86Z<6efv2NufHCl+?1FJiI+*8L<(xyr#rm_0ooO}x zR^8NhORS{qh};G4)*rqw?iHi8U1H%Hik&a5>1`t}f}wI4ZDbl;22hzn{?+*F>z{WB4b|TIH@&)GxmW<`3{~*!nDKN&Ao*sq zQKF0ZFZFDh|In`US^it`yFjERec!nw;mESm8Mf(#H%J+XEfRJ__vA@1Ih0P~`;9f`$fM2A$J2|P?kX8%yWy3)R+k#{7;Tfu}4mAB|nKu-!D_!-k z&f0QoR<_)hU3;+vWmBS>B@Wt)TRbj&c1~zbpT0-9P4hI~o%h9H*4%BAGR+FwAzm34 zpfp#N%VMrNGFxEb(6W6W;+Vo{v#G1*HDx(2B31+bhoukza`v~Tgj_(q$W>+szV;aE zwjhU2cdX&oz?-#bC$;k>XN{7{y7i+UW)ZI{`RnAioNi(7L&MeeT*g-{B2vZC{groS z@RyxD!gBe9MnT)XWE&W9MYeM_0PCCJwlIi2Sl`0ggNV6@%)lF0QD2Jr-9UnA$EA6^ zKgdg;iRP-i?+bhy*(}K8wXx2g75JVT5!6c=ZS%jYZO6bzY`t|;+a&1aTT?ZorDwQC zg?N~86P=4%Pj<|)Pb#A*=hDJg1vCXLcJp$M51;&QHQb`C*=@GM_0~waX$h8*7e#YZ@c9m@J$)DQ-e0F~rlLD#!B#RsjzFWD`X!k%ew`n#QX@0HPW$(N^beXN!MI=mhy< zlxiw##kNsb-+dd~HVtc?fHi@qHO1W+qht5vFcgm0;WB)wfmh+dR`@&-} z?K0Ll5j*zQ6GdoYCzIWto z4p@?jx)$QkieQQpX+^a)k-Znyat~{TdOxhg;2Ukg3Yu(R{_%3aIDiJ*&2#552irob z^ptvaeUfql?u*})*`mkKfCcZEH_FW2I$LwI(eY5T2Fwt{;Z-))dULJ`#5b zr5~4nU5-ia=^j4;=mMpx!t!mzIgmLm0}~?im89xxE`0y+gm%!JFfpTmE0fu-faJr=?_tm_ z$E0q1AZTO~?Z`?orS3;Ids+AG##~?MW11mT?YaK1byz%QDSrzO)Q! zY)AMvLQkMwHqB(T-y5X%=)b3xjoGZYSK_JFW)392n@K>uT4fg_X!Cg!PYAF3jxECz ziMxtZAg2;PenNJeAXY|AXgYBwCbJ@3U~@~TYtpL!J-O==ULYh^J~!0$hZ(YhGm(mF z>C5PYo#K-1(9asC;g5u>nkarOF6$Eu?nq-(H1-9Epe}|mpHlb<2{=93Z0x{GaZOcs z`4Xl$ZexIyusXy8v@d+rNsc37PT>9AgHiyKjy<_dZY$tadNBLG3gkyd4AvDoUQnNT z4sD3i^oWRIOlJI;}fq#MB7A%Gz1YE{|38~2VfKU%va8pmNmZ?PXb-2lNZmAnIUQd!lJZFGDq6zSmB=QY^yNbe9_ zKlA2kyL#IPRx5G`n~Vj6@jL(Wm`n&9if&yJ{+18JAZYP{8ol~Yn+a|-`{2aXiDZdU zAZL3Ij{Wmrukubgrg=%Ys%bFp;SKp#W}cj+%6SAcskanf`p?xr+0GV?(_E${!{K>I z&EgDT`zMu^Fqo8YG^`Rdq4=)a~M?zt^t-QSC$hGX7ITPZGGuyl| zP1ewC2C!Bmsw?lfejB0^{INdC{~DQ?v906Y{H^ueMqqpMi>oZXCwol&w5M!cEG#Y- zbEvW^yiWK({39o0QF0cNg5IpIJTc66)mg#@xw-cxw8o4PHR~R67n1<{JSMAv`TItd z`9kaboOPO;Oj*5INAsD15mY6}YF+WxwH}?+Oe#y>_x%%T;(`6QdVima7l7`kSWD}b zGU{$xQU7`6{EsC3|Ix)NOenjn+nxALy#|N&RwyqO7vAeP=FYzs%SER{2VANOo=#hc zb^yMG3Y~28(CR5j9sp>bQ7YG0_*~Iku!U9su!Cz?>`@5=l#*hq4nXDAh_Acy+dA-% zZQ&DzxIlcot~{pErt^>D9Yg*WfWv3RloU@89>|O$4M!%+akrbel8~6@zNilWWejVM zQV0FAB4K0CEyCgPCqHo@G4IcXd~p=5B)s=5Wh;MuDE!4g^D8-XRV?*Tlv7&JJI)0a z@ma!l!r%P;_hgaBMLnl~0th)jSg5^(AXh}hyScNPFrU0kt)w4kGbkLstE}3gEGm@r z-ubVG-l5e*3U2pK2nc)X$v-28Y;IMk7f%tclRry%l8ev;?cKjmB@-i)%Z3<{)96Gb zB0R;SiU4QQUw9wd=eL=oqkS!$sIJRl&*}G3@$4H5sIa{DL1{19=8gm0&Rr*w^@KyD zfkQKUYH5)pY2Rb>0`z~?SW?^9a$LRAJLhuFTkVZM5Z5&a5T@2rg2UF(M1H53LtdY7Da(mKw z7qd_@H7(`*M=^KJYMkqz61foFg{Fk=dlY!Lt`l>|W2Ch z11JoVZu~oaTy@MRK0-@Zmy#Ophu~zL4u@mWc@0I+BHFZvOWKe|a$C0`eP02727VLr zDlT*P^z3mdnRzUmR%5N}r!6to)dQ|P;~}NjPhTp=s=I~mFkh@k8?NpT&@>m0k0mmc zg%o4PGnAbm_Kp#pQ9%5O8fOG%PVf5>_LZ4Wzi5J{P1!7^O<+2NdXOXOEc~$Yoo{rE zoiP^Sz5?kEcW6#I!ejGo4;$N#C!r;_UX#Xd$YiU8yGP}#HUd<)&4Ne(?dI|^b_Mbj zduJj0g(Ax#nuUQp5QZvWXf+DocBjnvjbZ^{MH7ndZ&a(ecJL&2TLi;tIL3#-E(9=K z1)WWf-nrSxZp>F4k0)O4G}M)^BAv99KzD^}RtIN|64@<9dOy&t;qd&~VESGr(44(( zy1$@AMkAvrbY`kvTf1DBg7g1%r0h7Kb-Ng8He*q;Lth2H7V>-p>cjU$%+J1LNKnu+ zYeD$OWZQ>cr#I$=d@c@vFs@6Fn5uHkpHbo{Mynm-i-sN=>OJ&ri+#AHzOd-E^S-G5 z`)mvmrUzgo*)O!h=v3Opxk`?nx*M-fy-xl;qW+%fddP1=$)dDSBP^bigXg78;M;n| z4ymC`QrEPH%J=>&Xq}k0viy+@MSnI*E`z2<(KE|Z+>*Ak2Is&1B%Zi~P0fDo8AQ|J z(T6m+ci9}Bee0LJsfD2iqxw+$7sgtz%_i1bw8&$mN1W4o??RP75Ex&B&hVIgZhc(& zC-|D;ts-5gK7t}~Ebj(sRIIVGtv;+RH8tROQGFvB?00uNV*rCsA35gcHGc32n*UzI z9Sxkt${`0%*I+SCHj;Jnx}WNbfQTNGxpYN%!)7F(Oj#<;E~ljroE;IHc;XDV zcrJLD-NiwMnNB0FnZFRYQI=;_J58(Ml{@mGJUcesoc3_WT&!EV;qQ0xEZ{{1_PcjL zQkxt0OlH7@hcCkj$XdjjUdBXDhxg1#*SM~0c~O%It1b>a?6`-iwb$wuu9403UpYKZ zUPw#Kf9`qz#@sr}pMNK3w(_Hfab-+rq5!Y-XA6tEWWMOPXrw=&CNmTY97o(`zF8aLUyT;RdmcC|vGqM=>&pm*sgiCWl)1lGxspIUi2Umy>)6z#dg7!Cv z*61T%!CiGi6g3qPWwW~T(bXqRePqz3BEVk~w8sDir=RlJ{+pI7=$<$9j(Xjl5`y!y zTAF3WsrpH&IKesXe!6$$C%d0=ux}WSzh8+n#u`{P8JSR+j>vqmUR4wlmIop}4A6yw z<%IJ`1m_P1Rh06P!2C!>yV8hDZ{4GFyfCJG3BOfXSi2u^1AUVx_11OMI&}CruCMwZ zuGs@3YZF<}SLaD_^Ef%7Kh9I0Fu>wSwu)Lh@*=oym3(mR&)?6AnEQs^ES2>g?^m!o zmP+zBn}S%M|HfUJ6!C+U5_m*C{w%W~q{30q5XzUa8Wi?1B zUPLOIY$s*4@y=kX0XkqRt%aQ24qZdQag%JCD%=jt9ufNtnDyd}irfUns zdslyw2+ZRorHBCZJ&f!2h3R=>##ZeGMBpu`cGSKmj191Oe(6ybcJ0Fe^Z@n^kdD<7 z(sjGXw-fIs`W++Ob$rmvnTJ8`{yXMYSf7HVr`?_+A3u7fXj|*Gk;2rCwgA~X)A=C^ z2%24e&yk6XWy-(VXsar8Fah{v=q*U0(C6~(M$LZxRe}CL{kv;c zdoSbUZ~S4vOPlKE$3GVVfiC?2)-myG%(luMz)Ha#DR!Lg6ZNsrs(-$Vq)|Ai0cuBx z7HOzJjx`5DpL=;zc$s5w-|u%Z<_V?=v)hfp>8ukhTkktHPfd8Dflj5bsUOU(H;xo( zJbs82igFyW^GVnt8=_SZ-1>UU7c}k-U?<;PKIw<~)>Qt<7Ck`wIDy z;?&YWbwRl!xbINEMOksA-1$C9{<*u252DcnWa;bZd#7e*aM<^W{&MAU19Rm5t~EP4oduz@Sxi5_arV z(DM8PT0Bi89kwlb)^8%sORk$FUmHD^WB%h0!S$|;&K3OGmM5HxOCx)*G2*K)zw&Uz zKNQ;fz}!YV*3@#skDb4nFW^aU1KUL@azuStCSj>K$?Y`DzGU!>-~e5j&RpFGj?QZp zzMMRy^e*(?rIf9jafMUdRp61k*v>E=9YVcI?jYrY$QBT%7oH32F8i7lc1^z|^I`i5 z522&Xh+5c?mJ|N|8dP}QYnIkx3vO*^-kFo{pTx%fS$}VHRWRf8`*Yi1_Y$>g!^4nc z+jA|>{ataa`Uh%?*v?{?@+3qt8t;7emM(D=bbh4p_aBE-(+slHp#Angw!5W``UiX1 z=$w-VcR=(j?QtAkFU9Zq2)asuwVij*I9xNC8z=jKiOjr;PQ{+KqKfSxZG?ELq>{+O z=RqBMuD6solXad|`@pJ3g|7-=h(tfV1pdaMpY8sbV&26xyKotiH_!4-DC*#i)&Ws8 zTOozH*(rnR=muCI@b-cb!lhX-{?+t`twnGnP%K%v2k@wANFOp_kx6iB`%#D{K5czY z6HXzH%QS$sitB@VCz|d~Y2%KM&lGXmNEoEIBanIR!h7j-&*xO0-uM;<jR-FUl=J&EXR&31UO+0+#Mt~hQrEs z`x^vQ*`k!Kxvav!y%5;i%Z!iZJ=g|lH-MahQQ{I`{eX{xjEjXe6``kalt&)vFC6^ooLObQd2ZG+G2wT^pPZ&8+K$`_K~ zJP&cQ_E8bs_D>#zok3un3f}i z;&S+mbU~ZzWCa-&joDxXxJUZIbEY@espceS)iDTgska$3?8S_b0X?m|%a)z`;onQPLcJ(+o8URs z+R+nhpPSvMxLB~3z*u%wTXY32mU5%s&6dCTxjqK5Ygb>B#hHA_|4G*@P*7rVp|5;_ zDyYe-HxVMB-w4y4fIIT;eP7eRI&Q%Q^G(*o;VW#HTb;^+*m~p1-GoFt;98kW8AmHH zT|+YcEy%L2n1ObRoaYt;EYoGh=jRhQyNdO`xFXR*21}R&@BZ7MY+GYB_(2B-&BC}z z;zC=3U?kbHAUE)~gNA)W#H( z#$n&|fyPN{QtIf6w%3CZUq6UvbJ0SIz$_GbI3Vbwqf7Ca%WGCx(J$^mu(>MmMClSYvU7F+nYy$8H3bZdbW)scSLs38M$ee$!`$`A;qV*v)sE+R;Akz(9(b z2y-UuFVoV0E<5RqWAnsdygJU6Lu0IX@q`3{@O)OV#FE6Wc&%%be7oLkneNS#!O*>N zZ09W69_I`b4dW)lf{rtGF|Of`*S{xy6G*^=v@-*yHiKva6X}IOLxej-680f&&gp(8x0&YX{2q`eof+@7HYy_q!#IRF3n9!`|j0&rbIJ2QU~&$c$1uS z5I|gFWoO&)#t%;C1xGdepx@Iw0~g$a!=So}xm#DMNrRa_9S)hGre4MJlW^WWt{7`Q z#JO!lTiv*W)j#G6oO3gRRg>qKj)Iql2bR zalq*K&=&_C7gI>>(tRDa)ziiwpRVT>OX3$U2;it8$=SDyHD;(XNXvD9br#z5Ma)9M z?4jEf7O{5y>REkL7|H&)tk)$q8;W!beo0H(FMKx~`kgZS&@(nK!l5y&dZED3+UipE z(PieXzy-TYc`y{mM`hX8BIdAuePOmnce%7uy&8#Xzy@w0eR3+&)W z#!ijueA&tr%1# zUjD6rzMIO&I-OOof!(p{Y`OXNgUs?vY_MMQa$$|>HMIO#^)XkAsc+FPt;R3#UR26C zJ1Pk|;x=elB1^h^=_lLUFq?iBr3@TqtBh`(zD)3C$`;C}iWHi?5d)elEH&Psae+oe z-RzzUYTFHxpzpO-qg6toi;h}$_ig?dkU`as?B=B!eQR;E~#Z$Hxj ze!P38DX4>qYQea!Wu744{qwV#ZhIhza_O>apeLqyHk$Zimz`ugImtd#(Ati7-zw9? z2HoiW?Oa?o-yonj<(R$Y=^+Tw$d1-hUPhuT<;k*rd92l2BHg8%PHkpObE6akS5h%B z9=?%&{qjBcY0bC&56Bsjo)aWy+_mbyrI`C*#KpDA;7SLn4HT2+K$^K_SxJNQIhb$Y zxO8ok&xsly7Jg|W#^;m&(!z>$kdZ3-$lkq6QUuUQEo$s&jCLIYnmmgAoy6SI0 z)K#kcnjWC%IZw;k&^iqWffBt;bXxkM)_an;^v(+O&6diNdOpX&$jyBP3Fky(j~DSc zvJLqD%!}tWDh_qB!^DX4Zu{93m8!VBN4j|O_~M7&0jBq!7Te2@w>l&iOL0&heeV_p zug-SLX3>M+fpM>t)}-@YIeJE&!3KS$uips-%job;`czeW&B{?;!g(=ZU7PBy2mlMAeqV2BKq_|PbRvt0oX^>--n_&NzZhT^d1tk+NiLRmXJ)l2xvs=T z?Hz8_hds!dK5}%&EvYw^7M7N+85Uhw9heC3J{#!;auav+R>SSvxzIXYu3%-DU3sX( zz+rJs`Qiov*>6?JmyKh|N=;0>$DVo(?;}55&LbM=B|mO8Ir|SLFOG;041N!|_Vs@_ zGBB%cdd9)uNI3BIcf?EiG_+^0+GC~GTB4ku3qjUGH;S5y^QOgh2%b@rJ?r<#qU{dUAVQPcxMu;wv?wGc50-^7BuwJpuEvGGIPF4kHCjFzOZ!740{P zQo3EAWM;RQUo#1#KF<#Y-F>aU@zgr7?+9mubv5s@#`^- z107D&D=asI`=F{4i1*Ee{;ux%9XNleW3wkwi;|R`n+GU?qX|cpUC9_GL{CEsuP<%J zMYVkZA$)qbR?l-JQ%!92`1{@b8$!U!zp*4529M-k>G_hYY=9?(t96SAzF?ev_)d9S zfo2?M)5iR=8ChfjOIc_#M8K`%`_W!Y{-NA0mch^XI|Mpk=D(Cd z&*v%Ix_xH%v`KSqX6^>w8~>ED(NfvJxu#eghO|{xHMh3HVN1mQhg;CWziefL z=w3D@O`V_TQonIOf69cdAO#irT6tNA`6`O$>QopSkA?9L8qm!T;jl(`Hl~DB+NR>Nj3@YD${{#!IkR0`?WY~0VA7-TnV`=@ zz%K`wRf>nZlN@CTfIK;|%jsHnvNgLtoEgH6rOrq$`{|emdXX8vhRc;{TQoheTL2cE zWfh3?z6-1(c5nQT5BaR^4$T1r+v7t>bqcFJaEj`stL-s44q9s?)9L9-|JY$l1bQwX znRf6sVoOk0u39V%AgtqB$itTw-h_Y@--tYGPHj{f?(PleiMy4zfR;E; zK9ab}T(ygBGS-dab#kLr4|nZn*~~Zn^+X6rdNw%3C)~}we&M+CNSweoLSuv)-0?dm zH(V0~`l`Fk17(hPIp$^C{}M-zd(twZjsAv}|+fYFS7P46P6noY%xiF`%SP)8CTQeBsS) zG3y-}JWP+j=eYi(0gvenmr-;OIXGKAA|mHL48S9>d8y>6tqr1!9ckKx+z{v?m$AuI z%$?`|or!d4RfBcQ<9u7xkxca&HK8fkvAPDE6IUDGFi!9wD3TUgT_-AJ3iD+F#WF0| zT>vDtwqooZM*DQ_y6M|Z_e|?3icDavwf#?}ch9O8^Jg^nj=CQbd>&i4xJhCPZI5ls z3>|U&7EqJSaUl9!Q+E^TO}jCpYNDh#TMIilm>SI;bjeU)PCl~TG5boTgm(-!5eFh~-dOpH;_PXe!9;q|%2mZ1L z_-;K!dRjc!Iv?|3Rz`X41CXu06a{Q4v(_KX#X0eIpDV3VhHM;`uq-K0V{fiYpF_TqN|ko;ZRm*$RLxFVTWG1x1= z5e^IzqAcfEfFTO8r@P{U<=b_O%c^f5ck2|AC8`$#ImUzy*Pw zlGaB=AiXw!ugqN>7!VzuvOvu!$6tBMBz=SfsDEWndgEjQUP{jYty=Z(>E-`+vApQN z;(bd{CLu_|!5Kp%c`4xZa^>Am|M_R9+K{vygY#tQ%DT^6KU)4Wy7hBLqg@OAdZygD z7Yytu4Y4XD*3RSX7vBY|&V+wgHvN^;`l^}l&Ed}TKNlBYEX-ixDd!uC0L9lVM(k5LjNcqvM?|Yc{g2u@! z3NOcseOr^1>X9wL-ZRONF?C~?^Nrhn_%1W_nLp7@imoAzv?6wti3CyG#-;QvDITYs zBMS^C51m@=4*IxYB7WT&Eb;`oUtAIlZd5U`fP0KXjUvVWe&iV5%sn9CKgPmPhcV70 zRzYJ*;+9kpldK+dTg>>fI_JDbRH3t@Ny@mH2W)&Sb|a_b@4b-Xc69yO?K_XxRCnw8 z@on&)ty=iR&EIWK)_mU+giw?tuWhg?8+)n!P?os(C}8UMKHRp-*PagSoG=7`tX^^u z4Jq}-_OZ0f%1XgVK9rbkA9A7h*8gp`F*jp`8(f_ym8+Bk7~}?o2m?N2pX*lMe)5G- z_UB3FdveJbz%#8#OQp^w>2QRe9U+gpiTfz-bxI69n+|3Lzxuu)7qw2n^U&q?(^&3l z-{ovbMrv&M{&#nbkP#&2Rp_(h?B7JVm>wPB&UEg|P`}sVSvwN$beEKWO>*bD;n3UE zMfu!np?qy-Y8bEntdShUHJiPxZ$kC3Abv=7Jt@HH+^!Lcrbfb$UWut+mE%rml0Ib3gOx)EQo%Um($})V>)u!$p@p19Xf-a?t9vfk5oN%m94K;4N(wn zTcD3rBIpPz0)EMp!garv?x2^VSu{s6ED0}+8A)YBm*qX4`>0xwGCgpWXEIw%bSxCalDGp?)>Sx$J%;vQmI3#qd#3BIVSKNWbKGf+Q^`StZ zN<9OgE5~if_N(q|+NHc@*8(6)C#cN1Tt69NeXIW$-U;Y!JWPPQSJTVQLBgl6g9`HZ z<4SZLA*j8<{ud9gV2-$67&fQPOEg9c=Q}1s=|RqQ-JBNj3s((2W9&!rmkjqz8HGYe zo+vDCpfb7d)9s0hfPw6(JOn}L=$Ty~kHcrLeFZ5$b~hrA$D#hGOeECD(Nir^I3t~5 z!?4j1=Uei;TtpY+e8~CXfWZ~HU&*xo$l;|jpWuIXPxGqPQl6guR_UumchP~NC3}7D zdH%w0oSM2Ngy20^w-uoB%Gr2oU`I~ewb*^FzB=_BQM)_T6(z9eN@6L`i`O#9aJi>- zxWk1X-n~b(e3N@JV+XIs?0D{1wtf5FQ8?9Yq|Ta$pRXi&_AR9%8#|&fe^wI(mJR=_ z_xESsoMAY*J-u7q{9+@#GSF_VDn!5OxW^X=S$ziNQX077f~%PyP;O<~GE`&!M6&!) z>k;W^#IL8`J5w%f@C+cGe0qeT&)O~ED2n9%E8!DsABhxiaT9MmpMN$lv46LYD}7+y z;9dP7;D&{oYqpxm>Ctxb$STF^==st6CkZw5cR`!=)*FVM1U221o-XVZ%jJxYZy`Q+ zsQ=zKBYdSj18TtM!Q+}3Dx}Q)_g`PHg%*NPdy_B74?%s9Eb)A1MeRQ!F2IbgymmGB z&$;#5NLTqkLM#RUBVW12X3aF%HvlTWB3GNVY^mG*&~j?s9zRN_tG<5Nlc{hsPgnZy z5kQpE^z{+o^thA^7Srq+p)gohHr;sM+1XsTrm)$9`}#6w>4RRDz4UJNKV$#Bsp>P` zeny=B!->~2Rc(2o?uBUKco7}%P}Y@d;twX2+2!S!&tG|Q%45c+o-L%XWJ0a43$kx@E+6t?4D|0?b>@r~u~KNWyxW%oB!|8;~< z6an7)0bZ{@T(FRB>%Ts1BEH}z`Qn;jg*a@VW$&N5F%JE#*EXaZPM`X=?1S;6u)_9B zG~S@s?K`gS+WG&lZ9M$mXj83U+u&v&8vTHg(Mo_-v4QCWbPRzX~7YZivRq7dut&tg8>hV;ibRJPb_ei zd>FEF)5XINf*BY*I{6tG7#zH6fFwiEBW55uK}a4*Hca^e5?XSE9Y`vu+JQKl9~pt9 n$6Q(C&!6~!tOvn%V5L`B6V68MUT9}H9i+SQ_bv*-f z5-dV;0*geA9St4K?VQYQZ6GkK;lWSf|2$E$HF0v)cQA&~wgdgCj`+{Z%^eM`^ubjfAR4>sqQT<#f5fW# z4mRdCrVw5D`ypT%+~4-j4u-}Mcc6fi|5OvPwYE04ae}xXOY8*8VE+#;^MvyRlB4&;LCeH<%Z2jhAEEyi{5mMN%WgQ$RwB~B#UaT3^={F8 zcI6iu`adO>Ht8MezYn)L5cvMna`p4&r+>vZd0hejikl+;3zfAx{6hFg-EXJ&Fza0S zE4X0jd~X#JFU+@1c!>XYX%LVGh01>F15_Z&XiN9kcsQ5pqqh(=JtHRCn_k8xusCb^ zJ0Pv#HGDU&#*nsl2$<6~?VSbfuqH7XilPaKdDF+7`jdYrjq6~!nX|vc_p>E}+=U7A zY(gXlt{LMV-Z;4gA%l5bJP4gfA(MvOF6Z56~aD%m&TSyRwuOrjx zdUw>_n@^0+AuxTR*z zSh#-`o%Nv+h6u&G>6eH=0DLEk8OGOLc{!B5y_~6kwL2sy!TW&e8QK<2`#$t%Zqil8 zW|cgjtIb|OZ}pmE28P(2a@F(ik5(gs(&oQNkT-gZ7!~XvSb1u&Hx^EaM~%+Y$8S9i z;CJ9S6mKVz+^mqLJ+54lj`Z%|rr*^FEJ<&ehEV@5hvd6F^&#AHl{Q#I0|dhm{%Ob8 zb1+F(;fegQ8DA|nWpK-Iehz|Yqy7C`)-$ePDPv}orD%U99fy&RXw|BekIy`eDH^a6Nh0tINOHplSp4rHq<8aq8AuZ9>@9iBT>xMe7-%benI|~ zWxW&WDp)M|K$Lll(EJM!5k|IDlrYBaIE+|X8U2s#4DI#t`-MQc?-E}0TlbFfe1!@@ zJ8ll(Z$-7AbZ$SjMO5~!&+IQzPk0JsdFt@QodG1>dr1rzxf^vf{@`vMyt=h3i)@iV zpXUvb0g6QslfIkCHm+Qk&8_q~*SRiirlYE+zO#w7H&zGyow{sZKE|9XnVji|MSl;;J z+geRnpIz{se+zUy%?ZYT-~MK{_PX|r*xS*;t0=j#kA(GN&$;76yqA5JF0c7@KNrS| z2V3?fu*khWdDAOr>ItG>NE0b>Me32m7++yNPr%t~eR3WCcEMbLbfFkq|ks`Y9M>%ak6P8cXC z0FO_?_!ogjgEilwimkdTE_+HscD8*P_*2TO1H`a{by>Yn9^DSL?D6cyd0uN1DV!j0auIoPS@a>*Fug?qz zDXOZq`nG1h(hkb%Oz279cxu-m zZEX!O_R(=`(oJ=|!|piW!aV8lniIwZi(NRd{3*k zQ9t-z`)uo5Xs|g;2b8IN8iTd9%_WkgWHaNQELW2?Q6o!19#^POn;)gYNw!*NP>28- z3VLBrQ0&yx<(l;4)flh1Z5~;xUEIzSZEl4%y0Xsjr?voi*fHB1e#}2VG5c&?gx0j2 z|1+}Y%>Gfpru=H5>bHL|YgcjWiJQnGe5tl5wL_#AA1UOJmyG}r&%1n;(jG~>+`v@JGXSVZgj_hH_v#qY1^kPW&gES#DD?pZItJMSGi z%BiyfBD3_o%_`5Wg8BaCW9wMajK5!)G9vQ2BS7uOQ{CydyGG{^W!d_pJSUC_6aB2~ ze202EjU@J>PYKuh6MiNa-4%=o#m%d-t#$C9&i&NdP|x)StG^j_X8krcuAr)p)`TG( zb9*}_qKqovnv%j^RR604QU~|V9FqqQ7iBn%kLEk)SI%2V_a%j!f?^Gv0xyv2y1);f zstG&X=sbZACrtQzt~kQGdY@M^Le8cFz_ZusY(X9j;4iNO;&R>x8A^P!VmQAmTRpUF zq~Jd!o+prZBAeApxq=c+{ z3qE>wX6K&h^`s|z)!1fbEqe*Fu^>#g^DgPra&OgIpYm-a4Ux#4X?V^SAS$b>uBz>i zcBK&{9jvZnk3_3O6VW{EIu5ZWkVHxcnxEfH{@fgRyALTzzC9NEa;A@xc3zWou@}Cx zfkbpF+EgHCYt>lJ`ZNnVh*~_H`HiTotT=t@y<~6b>rbdN-U0n2bksOLd0@BhBUog| z2#rc)#md?z9O9#Ou(+-9^Pkz&;Vn*F*)c@73BS+O>lFFOME6tY;ABt}nlL|ht)nXinS?ql^v^e?FU~`+qTF7GBJ3YS9vn9h_3tlu`?_sA za&wQ7etrLveD<@>b^zxk06_4gL*drZBU};17mC0$Ou{ik9blChJo5o%It{&nlB;f^ z&^Sqyw~;@)9-Y4YL2TU?s2?@&;b{0JPah6qrBNmA?_isLeDk#Ywc4lvU3JV%q&+`0 zLVS@!X%H&*l3fUUxVikOtrzmdYS6@pczs<=V9b%DYYpB}LUTJJR*AYw9cjpw?fp@e zG~J_VvI6Z##8VknyuwH4t4T^JlT|HZcQq@ztkLtXb53y}s;Myc)#>5UN5Bd(1S+4k zNzRa%Dk8hq_|9Uton=Rz$hP+GmQ}I)w@@?(ygl{*5L}GSnqz%@M>7iSx6&rT9$x3qH zi}`>VuR)9J14A1hPnWGzrz?Zo*2NxCi1iKm-bh$B)`XsQ1-frrt>Fl>gO43$l}q8@ zwLJGs$5HYLkwO3dHMIfgif4X=K@IGDl7GtthnH zuL=@GWHVlrl$TN~|9WY=EL$~Qy*U}YpYM>2CCTCu-%aT=Z9#3x>k#dGmv#sV1{gjs zUx-qH%Dkh9h7V;Pr#h6uClN%~u(j1H{ukx^$l;GN7>pa+dLsiXliZuzR9|4B?*?nV z7(LT2i~HWd2rzkHRa7DrBk=mDo~C$z;hKBU0YY56tok;%;*_hMW+9v5q}4gu`M9=q zJt`jJb9;i4b>Y127DcGn`I}ot?4NNmU@#!?5qz?Bh1uxMJ-nEEB0}n*z(G0J3ju0B zrjdnR(~;h^i??(PvbZw>u4p!5JINpCWL>;qe*xVIjtRw-UGZrbIDE+39abq_np$oi zZqP-a2n=S^TJ0OmF1ojF3qoZ;7TfW-D}f)l=i+lCaS5uf*kU~jj5;)@>T0xmF4-b- z`8`jw!X06(MqLe2U*@P8bPR+b0(zl}H&W(@oWF}G?C(<=_5bUKduU;}Ewu(@P_@Im zCa~-E8%mPrSbtrvzL9@Tv-S@IIqT9i&=~`Xc=>CNNmV*uNEXGQc{hYYx&u+m3qSeN z@;acPzm%abrQ_y2e}R2cuDO9)h5T_`xlnuC>(htga^01_5dQca+?Dx}&gUX#9mQ29 zayhPoOsc6CyC5yI9w0C$AKRK5(Vln#3wq+bHN3^@1(3$w@)E(${HxHv4G6? zp7;Y&P}-8y+`#tASC`HPNE;`H@_A)d*JEgk5Ni8xM-4C$c)e(oq$(ipctzgs>={&D z($~W;!qzZje+>w{GVpwud)V@47_v<__HbqxBQf3bSN23EIdE;hK&t`FrMmQHRu#poQ2?vConbA%2a}N~=5FWU{1Qf5- z{*{BbuDb7HSgX(xnG?IAF2VP}ZB+$bj?RQB;APcDFUAlaDhw@!T(Y@&hVOBFYC`W`T-bXO%jfyq- zSsB5y(aUD3@o25+#Sez~Dem%ldI{$f`Cn98HUlcrTOckqm*D}HE-77Ogvs(Q#{k0( zljr(g>uYG4(1N#AIyiCt`1k^w1wkhzB``d0vzD8T!11-Pz$f=EA}SXqyZ1S#*?NcX zgSp&1f)6%_UyeX7Rr=1bwAdyJN{B={kXqOrsqT{~-HT9b>=50Y4lIn&zOoC!NG|!H zl)LZ2NN}hZ5Eb|Yle4bD8jFcj@Qjzj`8nP*S))vK(IHeDey{I4cgzdL?|W9ov-=!3 z-QI53&}tTJHUm_#tKJBv2B0oZ{DFJgH_2Q}*r<(!=7xOmuK>Z=He+_%7ut-3hlsPy z*`#8?n4v--Bax>|tLdV)#C0F>MAfw|t$K_$6rmUHwLFW$`Lbp^5n0Nc6;mrfqq}e{ zY3WJjl^OMIo*e77MsNds)+0UY7!peT8=vxN)tii`BBBaB>RB#|h+5GY^zSA;Zux>n zjFM0v{vxt{<)W_ddQkK%Ci-God3NqX(z(xX?SIjFUtv>d_k)U3T@sYF$24trz2)C% zd4><11<)$BK#i%cem|KL8+aW5_Yg^ilAYw#x=O^kD9NoIb~dVx#- z_t5(~nq@&kD&y+F$vD2;ca$Y&ziPdO)UlCt4^i~>Gu@i_LMOuKyTeKTT1t$)%%af0 z&9pGVUDgGk+mGo?C0VQEo~qRb-2DocFkj%uy4x`FA)dyzjb8X&_z&1fexttpH1n13 zor}!ht+^)Q`2R-w;{UnC$p7!(T<2)4-+weMt!@t7$X9j55$yWq+06E_ zNTRku0v1u++48KE&CX!dYWv_|u5{MpR) z^}px&$X0Gdh=GcP1Z$A$@bGX6=;4^WgN}bo8J?SQwuFntiG$(JeZ@WhxU!K>y^A7%ymLqO$8hx|mPpe^9#HtJ_Bz%<6Xe2r#UDj7}ROp74+ ziI14drMZ&hI!rC#I-KyI4m60|9$gSERb>s*Ss{bB=S3wX@ImvY)R;vQ_`&bW(}kU! z*vhOo_SucTCpToZ?*%d|=_Ak%>A$T{i%zchz~i4RblQ%TFZCog5Ad9-$=t5r4C})v z<>rmoFv#L8GQZW13~*H&H;4fX#?4z*95Wpc{IXH%INO~|lbxxRaPSFbZkwq2p6>-F z(iqb~XjjwIeN*=m3);w^@D?M~4yJ{$vV{GNbgdjAz*PHCEH2{AW!6#E6uk|PJ zf{RL2>WxmQCSwtgpVAM0ezfG9##pSLEFXAYkhQwZJW~7WTCu-OZHRn8`bM(9IKS?O zGCt9{m0I25V`g{u{bR?sQXq3%OHhERbdYlO#hGae%Y@zApsc!(%`bi3;2iP&#kjnu zWuCWJmyy5d*34J$6%}&*!9g6BrM>#@rz!?NjL!J5{*R-(QO)-moIfGqxs7gbF_LNCiJs=C@xxO0># zUxT$hh+&<)beLQ98|!EdwCCPIcHV*3+#jg5c7x@52Hc33ejMB))^=M{6d&3|d!;feMw}Rz{}Wjn}}9n>Ud1CM&g@ zc3qc>x+cMSSjjD@)$M8i0A~gG313%+1TM6pIm^2|jXlkoKVB^bJ$&*?YX-3_8{}Fb zc-(aFJ@1#CQhBY`=y>XFC?MC)6(I1+ikGFiyJ8l{nw2NFrc~~8$<1;>Ecq;J*Wt#_ zO5__d5iNTFq=K7yON(raW67eDt23Q1H(R-Q!N<^jiK`A@xOy4CG#;QVop2)a5T~5H z3*9MM9K6xm_eQchfl0T^^-&ol)-NOYXU$?q<25ra^qayhQ>f)%t`Kq$)`YZmExQQE z^zmV2lG8{Iim5BJ@u6V3hN^IwHp-Pae^iC3O|UcDYk9}?B-$b_HO%vc=i%p_XY~Dy z4)?>rw3^hPY0oPz>;7@o#xo7vF(ZU2&*Y6Xmy_Ko;hbQ#Im3%1MIv0mXtu4*bz_?) zCYF)sWPC?@PDb(uePKhp*>}*Yrnwe*6)iAu2np$Q^0E7IkeFmHMZ3XTt}$DIe4QU+ zrD1TiEMV(ZHsk90x^%K(li|ZT(T@_(bssyV9sm1kprN6Uh`qo?I?gy@EF_1^Oypr; zwdn0}aFQwny6d_O8&!I`Wc=xCY$=)K2K1jeiy!*V2C$qUD^Z6nUZ9KgZo2gWZxy)2r|H@JydK^y- zLf*p+5u)~D&8T^J=q8=+H5daaUvBb=3G$3r4@BgJ<~p7s(m(2JxSde~EgG>`eH4wp zzOJzDb!erahc@jhaXGRIbBd4M2aE=6iLN=d%8hYVn_^s8t@m%_4N||#F&8Y24%iLY zcK}iCREfuW33LP?yC|c4;dEl7FOL)Y^Z5i5oo`L%L>!ZSTw~Tb%-ehx1{wdlnR{mL zn_DaL;t}a`K38tAOET6M;$L)=ooq*mew(9DC5LBh29O-eJJ`O;|J=ScTi`I3@bMFk zPVaT%-Ghr7%gHCG{Sih|B^+HyC|7og*Y&t8SL?dwr6>Y>xt0M5eTxUr* z+Rm>7*8$0)L3H6dNDX7PM+{MS!TxhF6ThDfuwUabp){tm7UDb^+0fcS4;kyq#6ywc zzx}Dh7kgkbvTC_nu+tOFiv=WAh#x`U%pFS#OPCVU0J#J0(2j>IG@z^cgE2w$WBz!|)E{pUu@g)2vr4 z#wpG(5W-kAC&ytn`a_el+Tg1rvAVlI{m~sbZ;aT~-Q7|U904sjdtz{{%3<%i7|h}i zq-${J3;s0nvvG`)j&8#&R@;8~1bvh&8s*aiP<6=xsRfy!yV&NU=04I2MFrApvU`nl zSYU?eDTJkC6<(#S&7c1HEA@I~&_~9~y{7e^hpY1u0+h_+Z7)q?ua_~bdTTk)Y$t#Y z$~mn`R^Bw4ws2S&U~oSPG$5X3-?wx)2c_(-YQTkhwmSRvV($RD;^21v){2gX2@P5v zO4Gcz-&SM3sPJ00;{M_(Qaa(+j!8_D{di&%7}XSR)9g!jcSmqf$lKk`e^KLhMcL91 z5bCS9BQ+(wz)DhdhHYyBZW`)ntlD%Xoze?P3SD)JADd=5bN}^(lV}&muI$b}W9_z$ zAm8kaXKJ9!yu9GM&9kZR{x?Xtal&Vhl5)win2vSr0Rk*BOZAyaKu^V4hLcsUCyoS zAZ1*0LHXTVTmL!}JFs26R`w#Wzp7ncJ7U(!FdlO`#OiLM$}7>}O$*t#azblkO2FW8 z;2R7Nzry`!VW=n-V1vFRiRYYIo?__EbR^S(+B|Q7BQljSOdeTE>iH&0$=4ox-}$u) zZy!zcG@?4t=Ltb6Q_}c?`|_u>!F>46tfs@V;-(PZG!f&^$5nsT z&jJXyIA3n99o258iYaBVmNEM+cam#ZeuUaPx?Sn7#((`Arwr{0iO~N=SWo$HX?*J z{X8N3Z*XL(IPhO3YyZc9{>wD*|M|^l8m;fZ%2kb2A`oiccaKkLXQd;_-y8xY| z&F`K6MDF%EF7(Tf&y{it+p8(~ytF>{z-PbQNC3;-EMmItb|UA-Y5z~&HuH-_kKw(; z$0)--7gR>h8f|v$$5Q}k3qXvg z^Q`MjuZi*0R9y(xMGr&GI+%&&Y>AZyMxjaCN-DKmx5t(R%m z2;UvH?pGcb!&`QQFIo$w%TGt&`GDEjR!^CgAx}))L*2*Evdk8$nkv!31(jJl;k=(7 zbLYP^!1Wrm#No{kUyrXidZpX@m*C4^3i-@TWK|YiAIloO)gTh^3iV77H=j&chPgJ) zQ=7DTClZOgq%07!2+&dNw4Fg@g@z9GUpo&d1pB!7#dMr4J2{&6RF;s~PMQ-j@{MyScca5?KmW(1G^+l@jA(x@eQ#HFxb+uGo)9E}~zvF2!nl#L|FsCQ ze$&0L>bPh6UbProkQ*;Wa=4uy7ku$7rH`&&h}T35^rR(Kh*yY3A7=FwJ~WHQ@Hmz` z?(GVT9!saIJr~iov9@~R*078|d}nphr7zN!w;F{)B_iUxykwVtyZ2nMEp;)6*!E-g z>fYC= z8>J)IpTmI@I!)`ofJ1JC&|EDm!$em|>t6eg{>^xx zF2~51U5V3c(4MM;W`v_CM&*M<&0WUvrs#){PH6U7r^aJnHTrlY$}qEXCA?@#N=otz z2QZX>jg}iP-_e$9iVg@ck}4vf^uc|P<+a3Jz7NMlkNu`~Zr-%fnz8Oq-~rn}vgt+t z%xLjDzo277xo1euvKeS%yK&)VKx`#=DU5=1WRLlX&9kJdCVMfo)=v53y_Owjyo z%36l*GtNa-qGydi4dv@%Rq#0Tfiqo*D^mE;(B1OE$%v(uFLH3m+OF7!Z96guw5{3G z*kGIpP{(@1Cc-)H26S3krnF!6HwM~nju6Ri1290>UI?RSF!<%c`j7p%GmX{-Vw&x$ z4ctKq52F!?ghlI`jrZC!sq?7*f9mb4<{2wsQzd+@(MaL#EsX?=Q4`(@>` zR(RjY#Za5WrZP&uI`;H9CKyn7Mi;icewznfvssow4$ERv;cw*lhu!GcI2 z%Bw0TTtvMtU@dy2>HK;B>M?bKr`F)cNvn~!;nF9aVV?L7zxM}G+Olh1vXwz7Nt$uc z-lJIlf-zU0H1bwnzLtOn9J8wAyIxM)!b^?iFX!&pD6nh|4p-tjTAkRSkoe}xNwMPe z&`^AGfth$w3EK4bFYK!NWW+r(3)P>glUlO;IBG7CYScMs1M>K{;kkba*|-~?fSlBz z3B^5oQB;xY?A$lI`{p4-Szioa)kBX~>STewWlKDiF>L^Y)1|C!VoqlkScLKsU7xt$ zP_1#MNOYL(N zgqsdyAU2B1pM4jnW5(LQ=Ao@LI4;;VY*>79Sg_!VqH2P!=t^g7lsFKZ znrgNNkTAl+6t1df*bCZC3PH1MbprEjl(#v8U8w{9s3t-oA;Qgb2VSpcgAZQNU)T{H zc;k4=^D@{+xfIXkXQ7k4~dfDF;<*%Ct7Eyaxh^f zF;Q$1XOXcCsUKpkoP5{Wc7Bw%mgX@bDg z3uJ~`=22m&ph%*}! zZFY}kEnbIXC7$gwgzce443#=Ya3XgXTkusrUEqIxud62f*rQ}8mmOdQ!)tS0dhrN2 z?5E4p=qRbG-ne45;y>?(uDuTMJ?V#UXq!s;?0Ph5TeK?Dq~(qYwutwQjJL-F+3&S8v}z9a6!6F z%!s|e%-c+at(_DjpMSR2cZ?FnO(hH?WHh7kLxSW$J!no4p`9s{nM9J%5U;>zVi8SD zrytG)pL)0mNPj(kT54S8S|jnqt#v4S&w`v3ikgdv#_CK`awX)pZHhy=r97oiNPHHM ztv^6)vpiVRgGgMI`*A=fal8g6HP(X`GZhB+Q`)u?e<&w?^kp93A`=0*$rn_vs zfhfau$Ps=|rcab<#3I4eKqwqq|YhULV2o}R=?9xo*;0o{`pb6;ew zFLA^COjJ^sCBI0`SRfgWP#6#Qr#<&|QIRgL#AyTjfV-%NhBM9U6>8wi49oil$LrVe z26z-QqhHLmKZLKtYWaNw$GzFb$QCPpTc9BHg1j}eps4OuG+_Pokyi$E(pGdj-Cv;a zs0%7yk+YaV@}S_+$nKygX^PRJ)TNz~9lJDe^aQ#ii+^KFE+N=-1y%an+TisF4npAH zPu+A{yYGO6L-#w^fMe!QFO&3bnCoj9k;eODPpZsN9#!rD>Ztj4Lo9;Ol#w~gU)D`Z zMxn@$=&>zRC1GS`a)h;4=R5){s*$>Z>bT5G&Gl|rxJAbsddJeWk^@T}k9$}KlG!+4 zqQ{@PG}4iogPj)$KM&RpG8z0Z=qh{rlCn|dn>u*L}=+hYm|#lQmc5Mr~Wh$Q6OCVurC5&o~&~2{!%{u!m%QLRnFM@=Of!tMn6? zu(_B`T$X{4cyuzzpOk9wfy7+A?1I1+eW$$-_w_!jaJM|8f6-|(kw```8X30+kLBCw zr{tDqOhuVq>Y4bVIyKI5yTz95m>78_ym~?Y*Ow#i>4is6%LX3x;3yPXX%!((bv16N2U8pTJA%L!ZGad99m?R>f`KGMu#~d zJ+H9(Iz-r$p2B+|TB2F&tc9iSo^gU-ya+vBv&*Pe+kvVeX5Y2rX5YrU7n05~@zo`i zfo0v!qmi$p1ik~uD*&OGAys5Pd{*7 zJ?u7=mxmx&d>1AjUv9oAUR30IfAj597xeDA4Z>jsJ5{VhGGB9x2?zJ(j?>c1iOStymmx3RFh?KKhQ#8!!4po&{yI* zmV?h-m$O0o-cn_%I~$|3qlnB1>`4s_<3qi!TuyJWCht4Yc@+KZ&erc?3n%N6m>&ftj?z`&c3C|lV#YO;P8ke|44v7>WQnglzhQ|`(>(%r z%ElXb;OzCSvb(I7udb9TC&dO z!{*~n2+DPvmYZ8NdO_oNS`2jCdB{GLc?p1balIkKyAl z-UmjEX<~{4(@#ZmeQ;aqjcmash)Pm2kzJO$uu@XBY73_lvJu867SKL>LBT8rUYEHe zF_D{f;=v~6nnq1!AN4)r!~?~)Wyj{wUP_Ud36}dMO72fAIjZ-B6_u32E?M%=CoJCl zc=X;2Aie2hpS-nn*ZOIRgL;1>Cn(6_G z#5^bF(lTZ3nE=pumF?(h7;zkKD`j~etpmzTps$gpt;~uP2y9wql~Okvad=PC=W!mi z$t0|TOF78e2{`k$WC<&f$|s*ckYG!u0MvB`Du0+AUm#47+|KTK8v6;3kl`p|6OD=s zKxbinzykX|EBEU&>U{DP!l2(_EcB>rQ{7&I`R0UTMPP#?BK8%@(zI#G4M2hYlWkB; zwsG!w-ImOR-;_HYGg3_UJuUT~Nh_=lXYK)U<^rjpheCO&k0g+E-BnqS2P`@e*%%N{`^f70FK6PJIlI}%qjXG^yz214el`IW zE7+Wl)p`jK89aAIU0dAt4Y*4U2;oNfkC?~AjlmW+vNY)DtS6wevsCibIeLPUu!D;k z{fe(?cyyA~=jXgkAgB?kE7|*Ta6;PH>Q8FLtB=PZ9S?7Y4XWwn;h{GRu+_Es41Co_ z;0Yc2SaB$Uz}vX<`!M{001;z$HjaaFlycxUguxRx{3jgK?D=k7ntCFk;Y({%lvp!3 z>KtO#@F2F-Cdy2l1B35U=Mt&(r;@&-!#n|ifVQ-ChjUf zPdYMl8kyQ-Yi#P*ie5c}W0H@vd$~T3$=n>eZWn5n6Av#w z35+x#^(`N3vL)@@oPq6OPCS!fdyHo(Q+dV#xy-UArf%Tg&^dC6KXJ3KMPCA$o3$kW z_hk6%WXz2*jv!RjF|Hn{R;Sat{PiAHw$F#%dXBo=D<#s=WT%y?0avchIc?--H}TD^ zt<@pXdvL;W4)L6YVb!OcJ`dusUz`3IcW`s(S9eFth8M>u$3@;s0#%g_dU&$>Vl3yy zEFs2z|L`f@Sh9?Ld`n?`5!9IX>@f)q`t0lLWd9eN1MXZmFTCYULGuZ|CBqpua35w zT&57NuR4%$=spF%@6Q(*WJTgWfgIW7ATZ;aB z;dEoHK8jo>{>UDoFoslG(F(1-U^Kx8a`zic4)AhLcMg75U11vV72ka|jcIZu=QIlS;ES$7^s~W(#O~t*)5`Nfk|7 zNLGcwZd&pBcPD%2n%HCxyreBSA9C-d1+p&V!^b}Xm zkACSY#vZ>w)qYVf9Tj<1;t{6I=V1mG)U{mGfkS;o@%LdR73tBvFw$}km*HeUD$Kr? z+}B64AYce2BN0BzE^#4R=wlG7U2>0Cwk7u4BVv=DmPy671n(Zt)3h;xxc*%t#_IB; z{bJu80xTN}=P^WBB-D_MX) zPxa?b2?1IzsiGehS{HMo&-9M-sqB^vYtD<><13F|^V}<*&UW^{@|*9^*GIejpfp?Y zNRbHu_7P2|E8>gzSUb7;{G>@uYq#$xy{s7>Hu*p&mByCBS&6EL2=zAL-1PTz4~HOd z1l55Q{X<|Sk6X^ZMeEm98O*`&Lb4y1ev4NZZV%_cbytA3`lb*AI9CtmsBkhjVyi1x z&K&__qJ1(fQQO~VqDo7WlsAg&YFq){i~Vx-e?Cn#HTR3l#xcaVvE$ zF#mFIyCVhv-A@ufU)sUoa@pzqhhP)!6XyLsJto)6A$w!lv zf4@FwaO8}>a%+Y|tKLZ}e3W@a*}^uCuaZl~O-?_}%f$4Bj%HODEdL|;e70oPbd z(EcBCmA9Gi((bxU_!^~qeuII*t=GfFS$cDsSw>U9=?gvf{sQQEXyZPqxGQtn*?IB^ z{%AQ#_EP_OBvb3VS4<$z4adeXThf_6S0%soXU=*{$3$Hc1`oJxmfiD-&eci3oE^^+ z*r;Ie$4HM}s5mPt-|geGhFrrmWp?tK>$Q^8WP}G7D*jNYS{8Wj=_VK%Ym+&tHi3Y( zcrpeB|L2>MY;3#N+vExWM900;FZ|_{#6xT?$`}0euBd8D>j!5&Q4@xYr|(pL!Cv6Z)Zr0%!&L~0eb?+ z0uqIWv>Py|q{9=Yh*Fo zaAlepxvACJyYNuRl(c?-R`Zp!(Or%&OJt~ClUV0wYsk6dUPm(rx;x!+oAt#N+)tW& zYZH1Uu^9`}KYC6taaU<}tViTfAh9;&>^N@bi%~8Me*R`M_q#DXzlHegHyjRI9=P#fVYQ+|26a3UkD`7C{Nrlx zJ;c)~zlRY}Y_BL&lr2;oPf_HTx_%CWa)yX4N|< zdnB61gG4sNg%|&2bNFb0`0yJ}Vg?F-Ew=@d1N%lWa%DWCV>DM11q*3po}*>h;@~ovjX$C^DqL zyhr`+EuUoE_Ygx>dnDa^R(ez;)oOcSa)yZrMDRiu+|A@lu;i#CTVo=k92d}fYmS?# zA*cN${ftlRz3s&B&WV$xG{qO>gGn#5`JkfN^vO*NyUg)MTQ}qti=9NXOYTsqPgT?~ z$t&*X2B#?dT-+Ilv%bZQo#&3+>5EUuLGdT_QKnME42Mr}y{6+OlYZW_!XMuArS*?k zn+&!IhR3yRc}IFBaT$t`+rliQW{}mMtieZSK%Go32PH$JVBrU#c5p5U=&lOveQL*L z>v>!`=e9e4#N&ngmRNDH(QGoB_QDekgeB>p9d~d2S<6N!IWP&$&kCdNp@IC$llOvp2iE_RiVEX*g%~vC5^Leh*O$*E{kxb>IJDtSUPpel!!kNlbH1)z+v~g7d>Cs9-${(@4ot%dp?RqI?(<>P6jDg3FoZ zN21Cqn#6-*?N@oO^KcHRTqdF<+7b>J!Fh*PiF+Zr-ss?e#-lkbsQr$r$Z@{yC=roi zq0i`}uA+hTq+E@fp7Vw6n5^Qrl^7?7&n1rIz6p6@2;8eq(bdkPWr@vJUu0$aj?;;5YZPJ0hX#?SM-yKU?+(|2erK0^3C)~-~8idqdlujA!nG8{A;bPyF^;AdzJ!P$GV{{ix!G?wyE*NDNgnv07Lt%stn3cu&IzgwKrLZFE5tL z-UTwQ%cHdlw1G@YRL64j{X8#dF1NH<0X!!*c;60^#b5 zb*rW6`^p8>HUPK~`7FdJe1Gt6qK_q7Rv)MN?FY7MUfv8wS~@@lY6J>ZCx+Lsi;Bvv ziTEQjpKep&nQGd*dHVLR=|G0B`4U$Q;b}0ds`unAJ>vF%)VkbU7ouS$Nl7RXJ!NIo zjE{VQZ5b=xYGiJRp^fX~)*Qin$Jst*^|R^Mj$~z;kt5j3e_a}Hd7wPW>OCfV9%@(r zlw)${Kr%0v!4+96whrU-{SXYx^Dyh_*11#|iSAMlR+hDu0F+V@Ghd`R#$wzTo@wV3 z&W+&UlRmGu&iQMG_HH(E*qydd3$6@cW!mDQ_}LHCb>*mF{9w>ms|L!4U^x^bN4kc) z{-VM-vJqds15yqAJWxL-Ost}Z=3{YPzRytH~hDI&Qd9Wlt;3Fuj{TbEf zc$H>e#K(8yTsa(EwAEAoNV(>S?418FT+uZ06CL!N>+h2}aMb{K=E z#B;#R?tXhEhV2S;Fhy z<)*3EopiDcN4nKG`sH9Ro$oY88M>416VpPI4}5?FoW+o!0$kh!eUDQ(pwjRdTc9dI zfV;~Qk)V|gZ`zZ7gt6k|W=w?>p5tj^E^HEAkhKJN6G#6Q2y5r@4#Lw4#F((}iMF+e zcZeHx_4M6rUC;6h_AP&MIQskl#oAj&MHzp4-!#&qNH-z^(jXlw5>nFLFo1N|&=Mlu zjRJy5gACnW14!2}baxERbD{rppR?}uyg1KV5ATR!*1CSNzx%VldrxIxdraP*3UhRT zpwINV=(T;Mr0v$r^p+*_=eH=L?qYAu=Ei>eItETvBwIPIi(+VE%FcODXIfj7l_Y;W zy59iQYwrh@WoiOby}E?;_}#@R(nc3Ntswh>7vVmz_pd||4BQ*(VodJI(25d|JM!{H z$Fu=RE+s|j_r7iV=JUrsd}V)5Q~81fr&F2;waIc0E>#vx@&26M&|%!qX8n5nZOpC5 z_JqGtvPbICZ7iYXwDShbNoamuh(-6NcT>mLpc0d=XO}Yc5lM?X%5cl-WNb<9C3NK;9MHTt2UT5{S=5g4 z+#b2Q78id5FB1;a2-$Sbq|x}GGG@qRlPxs7=4mV3U$I1;W@E)MStr0V)b{f}2QxQw zk94rZ3%68s?N=4(^QHy#lHSiVY{hROwkVWdrK)n{yQn#11Nie--RsPaZ`KP^LJ_WP zM^9$G9zk1x2HHz~{&PlmYF+ah4)GLyUtgZ6SWn8YqM8gaq*1@ER$XV9CwSwUn#h9< z%g!?RgzEVuHGS1ka{x*UW>qq{`|{ZZj1J{q#e)j!jtjhT7J(t`({+|$*;$*nwQTf{ zN8ke#q~T(U?^drA;NIwy_a&Mo=xhq@=xT5M2`^t$Fcb1w+UwQAYOlM z`PM(*B7NnJhE4Q;#>EiUodIob|M`Xae_JmT{(AzC%72gRk(v2#lj8sUV}&hL0#nUe zmo1W+sl3ONZFxytv+| zsVj2|A1-C%JvMqO(q9pi>@rL-PyIcV6mOIWHsZ-H<&=%lz+T?Dw}1JbJ*IEoB|-Hc z2*`U}Gfqm7j5$^(9=CTP64^<)aHj9RuWyBWx&Nt$e0_WU-~)O}MWe9#x9$mDI@$E$ zy1QK#6DAo#IGj>B#7sA`LgCuCwjciLelQDXKLMEAqP-K5?@u%eHkXI23?Mw|c4{C? z)=X9$EoDvcR^?*4;Tuq@lX>b6X_w{U_(;<4;do&wjRi9G5iV;{s87^?9-m%6g$L<1 z-c&xzWw(ztNlU4ja9JL$!{N)ie6R4I1*n6iSD67s%0)|L)}2qO=*BHvm&BDU^EyU3 zBl(Kyg-ql&99&MKN8wvW&s}_z*5ZF(?vB~V^+gDJv38O};(m&*$}p6B;XN0pWVUHh zrSixbNv)H8;T$IMi(zilExCn*_w6{$QW0_@aLJv*8T1sp2Ko+XPTN=7(;ygBf66QFserGi0 zj3(naKWlXOl4LJ(wf8BS43CGWGCDV-XA@H-|0#o0==1ggoXJX5#>xsR+`B3 zrXs5-G)iOJ3S;q+BBXPJ7}?k&QUOpsiI*ls{yD!|pWXbMk`>#Y$oy~|cbG{m>h_dn0HVW#R~=TdlJnmCr;c6N<^BBxA~|4g^)rH!AuH zEaQUB#-3E_=33u~(Ak{SIuX*73>lDm{=p3-m?YN1^mXzk%(I?vT*=zC_{{s|g|~eG zzDiW^LLv43)>p^WHs0}i7S0PJ+atVdZL)yRHna?v7@}K9-n&gw>mpK&FW*d&`q0^& zH8!F;{ySpxpZXtr)IvYDkh%O^l)#F6MNAtudgsdLx7UW@{g{4{oVwT*T@2*bQG)oj z)`x7mBW;gop8Ag$LE5NG3S?67G^;3D5)Z_k(Un%IqK(|7-hthuIG-anl<_fWpSj}8 zq}o`&I&@4UJV#r9*)p>eG<#*kB2`SM6dj6=DG?|#w#}I7(Z-eE36q@V!|yS9?;(gL zTGr#ygsGG5_#=wQHR5<~7eSoyq{?$Y=+(a~mHh{vNQA!e%~OAh2*WG%=^oi|F|4&tNjq%zz!cd1Ih!=gTKR^h1-)_IJn zcdPHNNu!G^@;Dv6$gD0^3$kI6h$%ItYlIZ=H7<)w_Ac1HrcwPw10S93nt#d~;UCNw ztuEbG%4NYKs~R{9U8ZT+qSpJfVEz0;p7ptq%(&Rbuk_0(W#d5ogU83S*}JiF1;Bgf z0OypV>fZyETwn1#8RF-;KHp0>cLK@c{A;49Y!n&LM~a>6*R^j_U+=N{&sEzymG*x+ z6aE)5<9`)kdY^>z73a`tY$v{6X1@IJZ)(Md+|Gc|9o)0~K)Gb6vb*m)KNdc(h4LLr zdV5al(^rJ3dx(@Kmu0Rxk>JwKL=EdhX8K93J6D+B1zlRdm@E(9lmV`nNhaA@a1~{c zHmk5y(6yGNucT!js^MI?K-IrXh4KTXht@#%mGpFF7x?lZ$eKpEbh?9$&LK>G9kkEq zn*dj_6Q2z08S9Mz*&M!H(MSdEJb&mK%gWT7;#f--iGp0aAeYERmn@pplh2LtGkbQE zwKw%q!L$|XZFGNQv$kV@`lpI>{5yZ<=Bwgj-B_oudbII%eOEDUBo;v9W?e>_F4xqiDYM z)W<6>n-BcG*;`bZkJD8uA98V4wncyoM@P+h4O}YzL%tp}A9KN_>E5e?9Y*7>~8B!le zV0Ce%anW(oEu!n+Qr#UH)@Djo-j#8_?|ES>ebg4JCJmdv{m;GLTtAJavP%AQG6l&8 z#DCK~@<>^;oc`HDKm3h#eX`nkhTXYJO01N!{BW?1P&XZlr-e-X=F!*`Nqf5DV=6Fo z+F<)L5buSX^UC-yP@Sxbz5$*JEeX8#&ihS>9l9yT(%MVOf)^1m@O7GXI z8toPD5B%zrcW%h;*@dYtR_;T6?mb#F3>3UX_!wYM1Yu9Swi=^engikSr&ygTV31&3>K8qsD%+M25teo#(a77g~evVq}M(ZUh zJ`90cpklRI=p1pkhst^M2s@0hWX~AEc6+Q9<(gsdgdBQ_H^UB{dgbajBI62BCD~zl z9B5zimoeJF7u9~N_jmF0i}zO7e*RzXhwzYmp(HB~Q-+P*9p_ssnuD#K#=Z#g%(2V( zsh?M-7mdOsp0y$=A+uMWJwsul*|bz1_})E_Rx&(7O}IIvl8({-#n)8nRGI?qj+%oa zv+b%y6}?Skp850;LsPWJ`&3+B+&5m2_cMR+f1c~H%EkOFs=ln^wGI~3{klJcbGVPb za(fXrn%mxdqhztO+RXVNSV~~Xpl{#L$f`v8e5GXKEp^mC@?R%z9vgW{MMvjLW|@AZ zZ^N`k4yV|FZww#1pA&_*Tr$mdiZ3bBfbVKF2*R>Y2>h;<;B#hZYwxo+Bd!f#D6HMbv9&{}Y z*Ht2dgkLwcI@eJXb{$W&HpsHIB47KEDP3!5@nlUL6=Lv|{|+I^E)bwiAbR`Uc+!BNV&iFE6I~W_TSckQ zA+f0OzZeZsgHaPqg_1SB?h<_;&HjZ@;G%#eLZV|usl$GVDD)Z!JP7x*agDnCSZtBa z=_PVgp0O|)1n9LGA!-IUk@rT?O##%#O0)_l2lUx0fC8ElP3nAtB{mk$KcT!XEkYh- zO>SyTM3#4X`K%d5!@e>HBlNN`x2NM_#}sK_yVr5ip5OXGeq-Yw4v9k$VMzG*%v<-` zL$ezMW*cdKBR!-&s^`BGcjH9HJ}D`D8RgV0BXN!h%gO5e*MX-30%E!zP5vUe*6|;X zTHXt?#Y6G-eDqGL!-@7X)k7M3iN|*ioid4s&!#KEH$S=Ht4f+fM`mB^B%M%I*w_1r z_uCj3lnlc}-q23Gae3Z3P#T3C`*rdgU~ZhrL7Frr&g~MPptlnJ(QdP=v-8r!p%<>) zef>5)q?7ly{{Umlz!8)<*x_{w!A2BgQhJVL$T$;~ zYQ!@u#(f=Zgl96N6KC-B-@f~?{C^37%AA`U?YsS94yPK1m_z5grNx7_dJcry*Fdvu zMdkeQ)Q3wjOIL{RL8F_QAHH%&mb7EFZ#vVc!%QZs3%)(MUoT3fIbK66zT@{xum}*8 zWFOHEA5U$J`@N?i5v$bl@5pLn%kk9a^_Fb5iXR`8-VokjZA>(pUwfP(qK`JpZu^SA z4!r;b5pVJG<+L(TRRQgyGb~6d|I2Q*0}}pIzl{5#h7+rz@(ZXU|NTlx{NG5Gc`+c} z1Fw1L{djm$@gv~6#j99j4-O+L1V@iGipk%@`SMu~It*I^s(%>V6IjDFfg@*GIHku8 zs1QljQUcV_UV*G1DS1ORiD-0J-O(m~v?i4$A^DQCIx)~ebZkFt(+CVDOy(&k;01t+ z8@|{(-|YHN0O6-{l>ze?n4+plg;;i-i#6(@vsGN!DfSpG9Ll2L=(K4=MeDOE;@7iX zF{eFQ^g2%yX%&YAotMI3xR|q#}(Q7e9QL|w#OvJf&hs(hM$gA5W zcXw5gNwwkial@JPGt1bpsOUXp9lLkQ_fAFA|e&6HNLv37*scXf1& z+%6&IT7ZaX-C=9`p+n%Yjg?aI_#^$O4bgR}RO6vo!1H`O9@~VkcTy&5Zs>-*HY7cj zn ztA>U%O0#*V#G4BBvY-xO3?j>%5|#54Xx+RfNZl9!PsQErl&8Cj<8Yto*zM-ug0oh< z?DvNCrcN#gU2#iS8z6Pf&dvtI3nv?w;v}@k3~$S9x~3qP=hvdFP86)F@Fk&lxl`XN zD@BT05(gjg60uM7N#)}(R8r_quQ$O6qk3p7%jxIo|8B@lk;|g`@QHMPRtUo66KKx+ zo&TBX&*?2z>8`5-l$PI392K9$&sqiNt|_mhU$2C2ZRwMWzZ#;^eilmy30)Y&S!}!w zH5J>ZvCVB*9-l*f3M|5c3Yn#7x{;h#I32SM+hflC-?$$IufM-acoR=~23wUK7=aACT(ASWS&jS8w88FS3AbzrNDnMSrq|gn9D5 ziC;A4Yw675fbD8SacMuISuL$DS7`Bi=Cf7gcw4KsiUbR6$YlX}E?VvS^f`F^^ay6v!`@*Ll4|d$P(eBr6*`Z@efe#q0 z91Ke{ec$i^a&=@q8*285WZmLYUij!gBYK?TaLKBb|`0ci4+RPyTm>a*JT#kLzS+=2p+?BWR-|f#FKGmS{j4M0es8?LyqfgmOO!@jpxWRDt zG-L~QPq^qZZ=9M@(dY~Vi4D0ex-7^#xLXgp7qp8-d)F7~u7KU4a>MGO=f~RSRqpAp z#XB?%%piL+Sa3HHI#yoBJnt&w`i)rX3FMd(LR$G;S ztjf`ZYTZd$yS>W-Th!S*`b(vVafkRoh zkdsD^M8UH67DJ|fpC{}$npvR-ze?YKU8{{6bn2N}P+!#Vt}Awl*)%2 zao-*x3=6IZjESyz-#*PASoD?hu#RE@?j zS=zvU=%r5*Bj>|?g^QxcH}$9nRqK2~ z_=_!8@_vZNdb8N#zkA+~9j=rdhHgZ9LXiCC>=b!|@O1~R4zfZQ-CFPd;DMgjdBn@F zzwn_u2uuP{C%w><91hbGi_bp`2raOHBU=1p<4oiTZYDf@f=}jrDR1HLvW&SZM4Kmj zda<>Gv!uWjh7b5Gc#sO8cE2_Oh$_S9tHHIu@2htaA+|$Nbp}PgbdN!tR-$9d0_1kt*G<^H=V^1uuWB1f>Df5}|9~Uqg zju@LX)cL(DUgR=%SwAw4RxvMjKAMMS=d6uhriW1P!p{k=1dD;rC2YvH`BSoWPmt7FNGpa?I|W_gOW zG7!4=Ts_Q$$GCPxY=DR%t)-e+bTVFg^ConyxWi;<(}!0YX-OAya&a=+XH&+-5M#~X zs(xMF>w{Zty?}AzF#{cIEo3MztSn{RKUst~PeLgPjL{9{uNDK`@&Y93S)u+_-53ZTZ!Tp__>q?pnr{f9 zghw&gJs1(I@zk9;4!dr0Htev`}VrHJ(qWdNJO#RLV^b=v#Q#iu1iQ1|teBI(ZX zdCa4?&PcvKIki5ruJEJc{$}D#jhJUE9so$yDovIw-w{N~6WF(FlFs_}`lx+S%I5)= zZealg58mjHiLbMRc;Y39l76dY{3N%aP1sD6P^7;NDGx+sBqmiaYeD;dT=ku@dcv*+ z8pqwxd%HjR+;I&%7A}Om4d&-rt6ya`le-)Q=GYPx2tIOM#>PrhEM{(q?^o&h`Nj2z z?M0>dcuJEwxz`=&*zdd`XdS%F+}29IHGa0fFO)*f*DbUue%2OYcZWFmX>xTNFE?hn zE80gA?^;~7_6?(bt}x}se`hip_ayX>nhn2bL&W^}eDtkAHgq%X+N^YEKiv495X3tl z-W*RMK5!bfrI?eash4eq1_*x(#l%=TX{yrS0aUEOKS=Cr)BwAp>wis(yPaJvzpz&Rd<^HOX2Cn!qf>F7Wrzg0m)I~Dr}y=c-QA8Smz0=V zWpHoFx4c4P)0R36#I5dY_A5f-^d%VY4LRun7YcS6GH!cQ)oF;swSeuZe|fgO~7)bpe`^0xx?Zp|lV?#t^7DU>kE{lx8q zg+6;iad=|*R%X@q3VfgDF^Mmq7^IY*JKtXs$fR3Y;*fFH0@8!V{^ARvOq%0uwaRHk z8|m0m)p*%YBR8y9D`(B(H&63_nhr%_+0EPCPXU#*L{6Y|5UFGoe&6-O8p<4$T&nE3 z*z%(p9wzy?89nB+;Y7RP#Zm!Rtsh$RnWS-1?IMmy%^?>VxZ2?W+gHz`JWHqX_j#mp zZ~SL^j!=&^&kYW!R?sEsaKuDWn+KXj06M%)XVZ$UD_5`tNyZ;Ks6`l!+f^L;c~mZ! z=+bAsRo>kW#e??RR1A^Zb#bJ1RDQ(JOG?TKEqF?>|PX9gDj~j;CY$@z@9zT8};{j4r6e8v!(Q z-OgwZuzKGtOM70S)FmYKx-~mY9F(YpR#lV=Pw8(QogtWpPNp{i8CL%luNI>F=rpBgzow6#%q_R%Z44SS z`2396*lQoNeQ(B`$T^V{qVP}!ySYsyI0MZD<;^d1es_)3Al}sCp0_?cu!y5~PH|<+7OB1-{AYk_ z1JqHnRuBq#5NNGC;$;B6bVu3ZS&Z$?XYOshu}qHPD&Xa_PDv->2d}B^&s8!cZWt#= zhAiFgINhfdoL0KJqL_?C-gK$juqa`n=|t?8)|mnk{570%&HGzA1!>*ISp#(-&w@PL zg=5sZC*pk9bzNXsGX@Bk0PpL$Fj%i|(`DEi_JpxX7LUrLv)a+7qgU*c!l( z{cpcd;oMq@z^)wZ z3mTG1(0-qsomkrDUAv#mb~a1ZE#w3|Yr z<<8A;a^2tTOB)5gPzs!nX9nfJkrXWoTV^yncM8*M#KJ2YTzlo2WrIu_Bp=9xZP0Rw zsCX=@K;RIu-jOR!kNjo~)T~HD535!)FIK3@7@eJI1xbWKsZi*9JLV66n=A+k`vCMN!^}MKpSq%C|A&D8 zGN3S1p#LlNNJ{3}5PAH=euS}=z}V=2bqvXVssH}t^e33qr99*JIPCgP&7~2EZmdW* z?h9E1BUh5eKQtOV}_}Q+_BoB2xW(jRCk@*#Gz|i7Urogv0 z-CsgC;u$aB?coYktL=|M>Qn(JqVeSO=784qC0Y-KUAAa~N}6KK|ta2PVIy;{-J@zb57{E$7we0lT3?Hp0&entwhEwxXgo*(h`%%#ZiJ^A~fQDqN(wk#{!JSVh+zYr?xB9bfdibSz zgL@Wq=_WTbvJ~FQ9D6B|+iyw_l7SpJvh`ak?D1?hE-AifpQO!kZWk=bYZrcJ1EurV zAZvd3>aBxkD|;=nFXS-ks7fz71skmL1IB*{bytMUzXtPwoFXuda9Gv$@pz5|9U2iedji8*)E5nmCZV%ACW1AouTX^&8=lr8eP#;N=BKbZ+x%ks{U*Yvr8 z6|g?pZc(NV2HVim&S<<-%}IjJ0I)%*z``!B0-+%TSpf!;ZC5D_pWD?A!ojwuS`5@Z z#}Bn%fk2AFPFhSJDW#ZAR^O|uw-2VCtl!%On0||%Z(+P&EbR=6reunj(7d@JXWpuk zRBVX@>ILIgJkQ_0J%23FV@hRr0&GeM5S?;AaFQSz#K1eB=Gf=Rz5 ziCsMQLBHZA<0gBQXKbI&B+NF6}cwtYS`fDGEyi;QW+tn%0;w~@SA-UZ;9UN2m;(r^v=D~G_|UlhyKq{(I_jbx0AfnXOGCCB z-w}`dSuE4rN#4K_N`J%bm!C9MM&~nkUxwP?xySQMW}j&T`u-2D0Y;qtNc{PeN@-?# zar#w-F;hst=`fQFCVs4VRoiClI`uTx$#tf#j4pF})lOEN_9?(e{yg#m-05O^o z-ae;(8W1Fng|SmuUDgR{bi>86kn7JfAHO?FM~6nM-iSdbIu}KRwpjgq7K~Q-zW?M z+nfuiYt;NzzEkhyTlT0;X`uzE>cyVS$w?n+{Ng^aN_>1<2*aA({b~A(fBy>nH&G^E zVsmWP4z+F;nryO2tVp$0nrQ2UXRI(L$REfyrxcrJvY|6PhADRCInPJ*%dp2hwk!CHzg$gzTYDNI54ag?prXQ+RqX9t>JhFW<*tTGJUr zbi^r`w@a zA2e(p@@+glG%nPs03ffjCg$y1VKzPLyxz|6Cp_CPGy5m(H5?0OmODjwps{*XpiOdw zKS7#Emdy+|3C|A>=>fZa@X`BH#6Hw#QuuEMyx40swVTK|v+1s_&)27^32g^%vClN{ zuOvhMZzfRZyR=J{T2EVj6|)`Lgcc=Y;%SZqhvt>>_&=yjYNv?umD)K>DXR~``574s)&ca?Ml@agT20xW1 zf!vtPP;Ab?gPOSP3Er;mAneX@1q77f3{J?bld(2M-wO+4F>SZV0T*Ew*ADGu7?aMs zxpl7k!1Z%)7_BU)5*CPgaZOKRt>f*E$!p-^8ckrRjemHZMFpz?ixkz_?<`;#xYj3G zg65ZKLOc+m)7ov$cT)l`$lV?UaO)FJnEE#S9nV}=_?XXj^1PML_;NuYLG6i5YQrr7 zfSR^JkZN$UGe>jpnd*f62~tWx5C^qb`?<%GlH(>#hX1e7S{x&vXBmQW;SQe5vg=5x ziH)u;tWqL1mANUOry8^%{7dmVPwLnald8}0(;~+o4wDdInQWC2mU)lk2evqDo2|2$ z-gS3*5!OfvxKBn_UrIz^oY?1r%Vsg?BSs%942jd4e`hC%>;AeZ#2B}?%La1j?R^?` zL?6M$l>{M>G>f(#4E^Co_Q$B`9f9{k6Nlc-d;B2f1P7jH2ia>y^O*Ct6wyW+>D1p$ zpr>Ew;a@K?LNbKL@OD~oc&pBhYaKyIzi!7(^BCo`Jx5=UEQ6Q9U{G9msJp5XJKyRr z)4|}Xj5)qxv1bp7C8#GstJcepPoDkw@3>HUde4N~o(@t?_8*teuMy;6UFz>3x+1`| z@Pi0^A9#eIiE9193vOu@?ubrz-|}n3_Wg7{FP7htL4U}8IIZC^cz)!L&(=utUOCVu zlE!3YETG5q$5*t?-w3IcSeB&>CZLu_!^i8X5xXOsEmx2-Gx9p$d@7qM5|CnJso}AO z1$0VeCC6tzTJKcHSc)OV{ALRa9B<@=odTdMMPZ;Rnr~G+5~qoQnyp>Xr*&5+A)7mt zc~;%W%sEx##>K|Z&RIUBn5Xi0bwdcq$d9JC!%UJ4i)BKfE7Um(S-a=L!W9$WM?2aa ziP30Pk74*poCtu}NDZ&5FavcF89+vEhD1hyHi}F$Z}I))C=a55x?5z%YgF09*tZxd zysC6BifWycM{~c!3~fc0=ydbqcg^?<^tY&I&g{MXvFoV{@d0`Wv8bWScfDxH@OEjj zr2#bCbMpwSQHp$TKX*G$IecfY4r9}AJ&5J;Vg5`Iq{;m=5T^LWYRn2qUIOg6iJ~rT zK`A$a+(_j?JrWO`tf$+9&iCf{2UeZ<*dKl-DXBp}d{Y%B(+2a}Dd8^A`By&=``?)T zs_0P(P*LwI=imRAsDGjr`+uZ-o#_9&m;8VF0?n}jU+)^=vM_7D3N1~x;HmjdikGGC zL0KkcGN50~9mY3}s0e|qIwe~YnnXfZ5^Q=jTg4dXK548sGl^b^WUaAj+NbQ}QEWY^ z^BM(VTfe<<4!O(XJ;bZFb=8L5Yfm6>*KfBPNNcZyqeHfaYs9Q)M8-Dwrnvsb=v3+d zINO==njf5i9uxL@y2nHF>?oQ1eP$7w0IWWJjU(1cu0g1PzBvf!d3=#Y=m%@Rf#ae> z{tX`j^^&*4KFXp|p7JPaV0z%rZqdCUo$JWo&j-PBdNIbtb zjw$^rjm2(Sk@T+IIzk>4QCc<^MUvB{^u8J42_)=IsA`IC@sm{U$-qY7?}P%IBH3%= zJr%>lT}4>%2ZOrwK500AvV7eQODJVwM09dsqhg^DF|vL#@;FHAon2N)7aCsNZN&7w zO;Ov}W1a>?dLecc9snYSlDpxGTMkguJfy*jMxQxgg}|jSY-jmsDy28@x;l!v{WaTb z5^JsCvXX^Yet5POZeU14!e#!jp)?n{2;XnUJy+f;e9A)l(Q!&)p2fQ%y&BgDs-8BV zCw1GF${W)*?83vY8!tq7r&};R^J^|M#=f$erc5r;JxJ%OVLx{&`RF_D>n{w6tx5Q! zH2A9rR1b%s!%k&Vq+z+c1xH~c>>x{+sxyMp|(GTg}eFoLy(w`p>eq9E+=UZ)4fTa(Rn=2FAI0{j4)Vv((9HYT8 ztDB|~H{;z)w7;Hp2*HC%KBW*l^iiJBpp^dKJg+*mvXDF#s`Er)Kg1Q2;rmIQr;YnU zye%Iu<0ogU$3Ts8@8Y2f=d?we>ZofUELgyFIYRxuuc0H-gK{97iTBTvrANV2(Ti*7 z)8l+uNld{M$8+pdd#}npbODf(g>3w^H9=OMEN@eI3&;JbRtHNC1Km}nE78kC%QSkD zh&4ckTck5hycvT#*Iicr4+$L;*4`!`B9HObAndhA<(LUxIg_am!LgFkc-(E488;cb z)UoZ4&KDS4J(iq?fT_TX6>q86E#Fk?5V(~x{bm5Mtbc~&uI)!a3355@+dY1U8j3?R zK-Zi;R`Dfui}sw0d>KBJFI($v)44U{kYc6F(p6u-{L7@GkZ4~>uf;U5h$ryhr$XbX zUU5<9mpVpbR;~zN?ANt<+;i5<9>(=e(d~5+qJ=f$!gw3)qD9bXow-aK7jX^X9rPHS zGVh(;D|0EGUhfX!xqyn*g8$>y|0i;thz_McH(GfOqP&;M0p6F`;(Egf@a?j!d zSlaIJT#@O~G8iCyfW^VQI9gnm5fxnDx#IEQ(C*zUJT0tGL{z|Draz2G1~sTQEfc=Hn-gCjl@el}NNK{`xSlPR$=RCj>yeQN`G_Rabx|LFBOiq$92 z5%tyw8B2V4Y()NP$HI!&5X5PVA(m6B0Mc|%I1)SLv+auSRfP!_q?@O@_C!zy^CJsc*@zsA_~OeN6nU6i*P;DENj`oYKsx_;)muxPeuzjtfYN=UKj7Bo3% zCag;dz#veL9=*ooIE}RECoL8nNPa3&oqYv+Q(w3YRe%ZtE)Vnrf${m#Os_yK zQ#0OeZI9&hFgb+9n?+KXzEytYB2Rl_q{PSkTHQpO%yrc@uRo=XvCq6!Mlk$sYm(DA zNt&SUY7W~oRLjaACJA~E>CET;q;kQLrRRqFj?m-F%{;;sIAEwj2|L;9eCLtXX6;*=u#W$Qoz$?AT-Qsn#GGQC8#RF}$~bQ;%D+sG zIT(lqlfGZ=)nM@1kL(pDyZlor^%i(FvmWtn77@S0H>yfN1h(FER7U0^skFce0P^|` z+m4riVN>gyD*p%DZ~oKWOu^;nk5^MQI0`KZqYvhHvwbpvE{Y)iVM3t9%SCG*2fwe z$azf*d-D_1b_7+gz51Aub-N%xMb(S%;sFGLCR@4hVF&Bm63?vLjU!rHpBr`!bKf4? zZFdZ*HTuPIFfXjoqO!Si9zKPh&GwU0d^3?wLDGoE;CU3wW@vYLrB9&Db%{JRw5Hk+ zPNV1K*gmh%-xo=ed`S4?AxAu}R$1oyo3;r~IVZRapI;+ZOyIxRoMK!!9A;W4o|>)*03rwrXPnG>*v-S%PB?fOJxZ%&DYgna??q5;V4DC!ZPLVeS#MwH}vU>z|7)9uV?Qus}4obrwNv$|Pq4H?XOq{$+TGM1b3Qm|rEb65%XI;N8 zhcr^uvq`d3(@TV})X1&UP0IZBkO#<|chKsSL_g8%Hen0>4{4Xd!MM z*#7kc2I8@%DGmJ6Hur0)1K424e+hc*n&xC{$JzJAV=QYeRaIz7LhKCQf@u?&dM?uo z0DA;@Tw#2x>sDIwBeXNaVYkBo)yLzi@@`4}1)r7xG#A(kcRvAtLqrO@m2zONW=}h~ zXJfmBv*+}0|6h7T#hw8S;s-cxFJ@dd0wPYf1i6u{vP1jSy?z5P4#1M zit85^hj;~9?)$&d`N`_!G!5CIOzbY1TKm{Yhl&;y2>8gaB; z9Q;E15Lrc;K$&xWi}%jJvVrp)9Qd2RbAWIzv=CoJc~C9*9hwRiD3@I}-Tt9i47kSS zE!e)iaPO!OiXFL}7lAbF1ErL-C)IVlj}XTX;N_tU#U*C2wxp&#V=NwQ8J)Abup}iC zwKfd6$sBka$G%VllQFS8$DZc|Q4R`t2M_X#&YYuARuxp`$?jHTD*bt$X3({m?B@mK z)}yhHeP)DMDuet02CQfJ=)mSAPsoxS%+7CkPP$Q;+x(be^baP@6J>#vzL-9VUYt=3 zB{!X7Ael}?Eqhn(jWr3xiW&5<>rxcA4dGTx48$n+dR{CH(^3zZwTq^)2OTb`yiUKp6`HzvPRpt zBWi_`3E_P-b&P>nv;)e&3xm{zZ|VV1>q<}3SfPLj@s;c>M#avc-mQmkIuZi?m8Z1H zdqn^?Hq96_rBw37qGEOa6b2CI2^9h{g(BAouI*k5FQys-pl1zN;#cRT!1v||Piixd z{AZ+e6yPsE`56o{HHGcxZ_wgeQsn~QUSm3wF{3W7XuF6f7tTWyH+hzW#nJtq8^_T$&8HnPt;Mu*%pSOzUV zULi;Fj&oQpu#D^d@~L5vE^>XhJ-NLpM@)Varan5jocIX{nS&tzJH$6h>ckvl3e62|K5=y~uZ@VpKm@(hG_ug1Bl|NPt^i@9?{y1IjPzO3`QEqkvgm&0rVt0{2+C zs#bD9AoW<-ogERKIg3e}#OxesI=eTfHeeV&_t}2_EMCgA1!gz|bU2u!K11IEo*2vi ze1b(9S=i+?ZYL?Kmv3ukX%=Oj>$CdNnG{q@F+L^Q?*LCSKJj_z6hVgCru~qA*rrZ$ z%yPfFrXwjFhHGlySG_`dBxahYE|T5!ZsWTxM;>Z%1k+Qr?EH!J7qP6geGr-$8B767 zVosnn80He##3P-7_P62r8QbzvX8LVav}%k6kPidK&M+a2Jo!J9MmJP{d#j;b%sI?F z<~eAC)Hu~MFGDKs0#jWx6d1qo5sTNZ(!W1PlVS3Wu^1U)bRzrXzlaTC6y42iqQHq+ zYMVVKDbhMSVu~aRxzNtvPP3(wiul%fn(D!B`<-9@YS7FL_mRzso%aD!A}aLg**0L} z>S|pQ#BhGqD#6dsNqw&c*!Bg+hKMHSM+0MpxMvjV!;o23kL>b`s7-8PQVkWus`k1; z)**Ebc5xIOAtwbPzjxOay>%r2Hq}IF@9Wt6edq?7XuMLG5$7g6n8g_r`IsQ7F5Mfo zmsIZnrMa4SUqF0%N)WVAH#vkz_s7D1Z666ku@x%C4Dl3h%!29oTObgQQFj}a zL$|oQLy*I#)=^PN^VQqqZql#gEx4rM*BBWITcQ`Kou*5%6i7>YI z9&kTy`(<#A!4U3@`2P^KrWNG7!>q?pKLYZ13ho>cAl|I!eW&v}?r_5b=degbi3{Y_ zr8RDxJyC>kZzeFJ2+BN`8QGrnKdRo1f5i-C8L|9(dy}`uUq>~H`n-?AM`K^i{Muo4 z-X}m)qiWIzVuocim^jiKao&{CVrwnY*%Ty@~h7cp=j*ib) z^=_w8k{52^bn_th^WyZo2EWOm)#Q*~`}Lw_iQ*pT+*z5#aT#@j0Obv<1X&_pEL!vC zi?TutE%kxzS%)0v2~C2WKD}4rE$|`Z)OLBaPM#*WnIdM8ft*8-=t|2t{k*5Buj!Of zllg6c@(0M&Si+Q{w4NiIf#Tb@=?ATDPqVr{Nb61L%E8@?6p69FPhig=eBnJRG^SHd zjwx>G^!QBLVZ)wVfY*9k_YlI4+)xdv$De}>ma zz11t}HQmW~P~|Jh^)Q?8NadPQWyRqeS0B03IX=)ycaP8+Ur-9>9L7J$QV&ZorA?li zSNh^KR#O-;zOzu~a^B_9$JK-?^x5_PDYoQrM=!w7x<%XDY&S{fRJ@O0WMJYu4Jg%V zYpBmwhJ7i)abOww^irN7%s07mz#2zfl3||iUOR7c`&JYJ2dWwv;(jGMW$eyVMyPd< z=flE7uc&a~Y@(ESiubybBTJ3%NpfYNZZhsx_~WzF?A+36H~gy60g8O(Tq(gd{Nmq~ zWX*HQDwqmy*cylrV8KEr;TdK#3l<>6`RM}f#77%Q$7}r&Fscpph49f)DU&gZSnY@C z^a&26F9G?4{wR$P@`QfmLiBiMvInaC;Q_{#YwqTcUwAjvV(nftKB6@_Uu?4~QTs=( zd8SF(5w+KkA9T}tVLdcbr<0;X^TB_R0Lm*fA}UZ}D28sYr0c4UE6_z5`N|`jNM?Pq9UJ9AC+UlJt zqb=`xYSF&l9oT0S=FYZGRWK8^OmC|4CGFWslJrfrEj8(?oqV=cFT5&PedV#Z*>RCzP~Q93vc%|3V#ZO4ehO(!&x6Fxs(AA~KBiv$c)Luw@cin@FVTsBd(`~_j2Ij` z^!VcP+p1)~0s)wUYOVJ$q9iX=KKYSu1Lu&3$zRO!U(+AckO@Bdyyvj-)qQV@e~K@=6<$vxi>f>0_V>TWQ8H7Os8k5 z>1_q*Us)X{Cr!7U221~7mWt!)kq*M~+9!IT^)&nQzJ;xM&uJuPx?mnX^ab)XreVSd zXTGVk!7ysu1F5XubHSV4KzAAji0ea6N#?VmQVC;)*e+JgXRT)u%0ngov0WNLCn8QR zFvX6rxW+n)w9~eune#&0C#iMOiBo9e%U7vL?v;)m7#IDYn)42qnyXxi35s3As>|MX zr$E}-SfAT1t6 zl|cDBg2r&o@usdV#e;&4vV=$2_KN)KA(yqz;zaX{N&;?yJx9aG)}(76d1-SvEHK3H zM|{X3se*nKfasx`iMz`h+v4j>%Ao^(AhX^IVyes^Z%d&{+&2RgEkERuW>xa96)$3MKgU<(YQeokOjbR0fpP z>EQ4;b?lnl&07Kej<+hntPQKH-59w~b}z|p#mU$zO;2FpPrO6HspRYpyyEVS9E*W6pD=`$aIjpC<*->ls`F z2S1`T_uu5-R)-=mpRbylh{DrW2sI%lfkTw?)jPR?CgS{X%87&ZN1~+!_!bd@*cE&0 zkMN@;u_IBo1^r?wQm_M9a^w>I>t_CE=JAM^OKu(3v~N$LzK8g&3jl&axr=Uy$A|&&3bbWrr;h zdUewJj^iM9dY6hW&lsoT@mDOfelGv%_+-H=c?E`Xy+F)%)XdiO+B&GlF%G}%-KQ&n zDqifCh4uUexV4fGa&&tQnoUpwRADrWMk8MR`pVaf3TGOjum^)Gq(y$&i8XGb!A|3? z$aS2f8vaFRJKnkS2u!Il4XnL+6u$>U#Wqz|B89I0hb$4ate$ed3h(5$jb_DkXW@y| zk6C@5n1y+`oUpn31B241Q53p*Kh>DXX?)31yH(rse7>ZGd9F|JZ&W1E{Toe4n~~#J zu#3aN$(^+t&9y78*D!BC*KUQ9yhk>~FLGJpO=3m{r2{NLLNG%oYHVRcFyTkH?6J8? zZ2z@rA~G?m*JB_Op3w{tokZRe$l+j=MuqLi(o@`CrVTt_5grPJBfDT6d}>FGh{Pd$ zZ!}L>FF&A;emsWnk4|Yrq}Uc>?<4>}+^*V&g{7*h+)|&~K`#TM?gN^pz6#@g?DrY> zg=po1iVws{#217>rtC(&U7L729>DfX{UK7A7c;lQHsC#}%kYv;#jU?*O=J~x%v*^T zeNM0aB7Eikm^<2>9_703HzhfEPwx(8b;a&&mR3CIM%c4fes}3_?!%ZbTd`UO3Zh2? z(n4Q5a-(LZE=egU8U@(5NbbCsC>!|CJq9|p3N1tL%Bz102i$$G02KHB%SXITquG=Fr^m_vmx^n4gd0b_{u1_Gb$o zVe#wSX5f9 ztP;q6pWMdqq`gVSFtGUpi5C|C2f~oEbtQ(=!_&QAx+6D@hzE(F>IBeI19>J-amw$> z8}@F^+5`TRaKHAH6MVT+|Day;%?#UrZl*en+~UJUD$E`dw_f;QC!M~o!0ZBI8rVNTNp`vYYz-vHnwdHhdA-20B32VdT_ zICY}M+2sIHHgedOK^EtYFOh1|3wTzq8Z6m(?oYRySX-7^@ryM z!KF?%Yha}Oo6|$MzQG8`=^0IdqUvExVb+i!Nx@R9PW2VCw%6Qi0GR^Jf%CLvv97X* z;x}hf?HFWRWjX!~GnKKijC5Cf>>YD=J06{BT7iEsu-EPV&dmyT6I8t&2y!km*$&i) z=%piut9ugU8P*GeH1#rZ=+H>fICD054I(S_$-L;^^e(OGY_ZLB%7V}UGJ$kYhCd;^ zjMHvb1Z%YM+uKoj*RdzoZu|uT-1BpBDecbVV$+(^Hb3~2F&2^}fN5-W&lfCA%|KXr zq}i!Qvl_zpHQFsW(P?sZF4)&7vv7eL$L;-G1AY^u?5lx}oWKSx`Sb(FDUNwQ8)3z; z0qEGgLfE^l!x6A02R<-Q$@Yem^XUzv4)IYrmww6lV z2$MIA!Wu+7w+QiX#+j2S7Wao6=0qQ{MV8RH-w^;yx85GKx}QqAFr&&=mZ~9i4;qo% zOpkvXU^XHHv+?}N5W>ix^esL;2YNJY*TSusgUPFI6KLXT{iSHJ%Es14D$MT&kYO0r zUYow%)mJsW(>IvW#vF#1Z*!8aMGPl%xS&)BzrV?SI?q@<^M7yG>h<}*aIoAM(#usKEBC7guze6#D145Jg|`M(89uE&Diipvl(1BM1Q0I- zGUWnu8wYPbnTpY1ytQ#%)mP@eHhGZuBw{44)N1Qar;E%X#l2^CFTyg&HJ703IOhqS>EZ2JkcQ*tk+r8r-Q*8O8 zZ3E@IK4yjI6#&S$X=CXuI=Y<8KZ+9^ulU=Hu}*~^ybKsGRKA%@MJnZ>-6OK$G$33| zK02B&jav<(mREM~9*wEO8z~K`1YKz(Wj-dp4<;Z$c2b(%y^O6EZcFSA#fojh168;` zH&Jd|e+ky@mUo*_7kXW|w6Bfi76!a&o=69)B#gUO!XGe`K>+J8*u?#YZ>}iO))=$A z4*WPpzETBLA%?|8OSIJW0GJA`MD*WhC0p$zUOYW4?V4_e$!X1h34(BL?aYwS=r25f z@@io}IsEvXGBD!*!Pz6OmrgaRa@a+JH$4{-u%bzPU2Of7lViUpKIKe0A zJRZSWBLal$Bf9Ogn+0EtHg&Ec*~SuYtDk8V+?N)MjFp(pDG zL%;eQ-11vT@57QqKE>;YX*^rcqPTj*C)8Ec0D%WCVY!ml(fl`RF+kuk8E1$`eHq?D zi$0lh@h)d8&7AQ}?8J?%?we7Q5Sf|txp!g-?~m}@j%pA)2yH1@^2^2(a@7hfzb4ND z+8%dCiK{sl_)y*NeT`6Fz-3DNp39vQhUN&v*@{-J(C(1%DG|Gj;rr|6ynHs!Qd}Pm zSx*mkej2GtUsrX?!OQFA02*VX<4(WZSln*=B<#lNIf2-)c3G>)8Iq_g1MlO}w~_n* z&M`gC{olN!oUl_20E(pnV2_nA`?FYoCw-Lqe2Ap6fB#2SOw3c(VU;4$GT8Whao2j2l*0&7=m?CasaKSjJ2W^u)LOPG zmY6iKPM{TR;I~7))WF4by(J=4C9(?vlkgx#W!tK4qec^{8qWpe%3wkWCsYrWE>X~j zzUjt7w_ZfaM?Hh(=GA^Rj-M|#KWR!HP?hf-&c+E&fM({T&md2ChJb)oN8vM&VBIrhsRE3-}w^hp7j6hHBJ5*LG7lo z$tCa8KC$W<(&esO9(^cWLJPIoaN%c~vK;-OgReCT&Uc!Pz9`@n z$7!@;FHt4B21kZ;3ceEBb8Ngdy=Y8QImRWpeVO_FCX=f%?}lA*%Od9SYpR`8+ck&}wz9 zpl>V6miuLAj%E*eN#!a&349n-T@O+q9O$vIU!?9@(qKu72q-9XeZ?^way3OI6^y~7?CZNZ;)C7ByRwS7p z(p%QlBzNrqHCl@v-N3wDOn2?5^4K_>ja;UkPP?}8ww1wamEfI7g4sr0jYCi}d4 z7(pf^JO{g><&?GAczxdkt$r^40(UGRf_mo#NhRK*fFiz#UFq8k738so-pRQ0nrC0v zVub&a_T-k(WO5y$Ps(&;Zyk(B6S+8@B48|ysCE0Ku9`b^RE%1l?y{a9e6>Fetb(8t zU_IGxIgTuloi28Hrbx?PPwsvtb)$Yd7&JYp3}{>yt4$OdI3o_dV1-u`chYooj1CZYrHT#{;)@+^z&{^9pNxg^5<4s2J+IB+I5a&yKt9?P4qBVHsBl*+}) z*H1G^T#fftIFjY8PVS8vRVBJB_5-i z?xhCL#~JrLAk36%vYv=v6(Q6n<^77_YuiOT!!O^y_TJlQcRjzLIlNx3N5&>f1!rHD z_2XL%q>nWwnHibXnb*v@w{RWN7)$cX)s+)53e|7m`nP! zd3Ry8^bDc$k3DGOk_CR71gkz^BH`)H+p4J?nTm8hflfEL%VvyqgrMg7sotZ z4Tkp!9-3iGyhP>h-+gg7%+uh6iGAlLdaIw+j5*b5Utkzs-lI6W@tl1(XgLlQ`(gDY z*{Ypd4C(JV%UX!%vM#YoMcUl;q_ayWIF(RBDAioGFCa4F5V+%Nfiusv%aEXo;3gz4 zE|6kbhWKuF^v(&4;WbeK9~y+P%sISnRMA`dQA*F6b*J2 zOVx=#Un={tl{Vl$+ZScIki)ZK%6shkU3DC6>bjuXuNNyko@%C(KbVlz{$pu-@z;0~ z@KaqIi!jsaz9>}U5=l~NG0S-6bkhw(T>S6jv4hBn#5~qjac$(%tY^xq$w*JqG6Hqr zY<@TlJDhfBljthrL8eKI>Ng?JPaAum+td{L^sY=5K^b*4)u5&E!pPjtL$C8T5K7sn zQOMRks#q(h$`{Ej5XavX-}q8h?)>HXdD$i8B4NrD6#Cn1R!eiC|MKeVdHrozs7>SY z1y!od_15kE+t?!MOE*dX{`}rU2r^%g)WL^qYt2Mw+Z$di9*`$dp3;-*G)Sf1Jb~FG zE?gYL>h|4IHb5vb)bVdO!>H!ZGlsm8_M8Q8VbU zVLX7QDCW3Y;+^oJtz`D<(gNShW901eR%Tu#vMn;22+^D@el|tZKz zROAJk)Gy1|J#H8|QNEsR8(~ZBa_eekOLeqL0V zQQ}tC%Gh5z7r51585cF-7Ex{GP=%Q`4mew$`PjQY5O1FCEYMs2JZxxk`(>g#%uK*B z_%pZ=S8%DG-s5@0mAiqxQqe8qoKw=l!6iGxDowDtlPtuOmnu_i?g71S$FI; z_qMkJ`pMSZzP$m2*IDNJ{jI9d>Nd3OElt-BjRT ze?otYNi;+@c#88>i3nw9Mw~SEYDIXLFdc}Do?k~9XU(<9c;~K)^rz2*cMpQCDtwS; zm-VS@<|+re`r@fpheLB+&D(z~CH$*StnpEwcP-kNma)%EeJX+r_PWzk*AHNFj-&4|F-^1IT`Gl7km)eup6H^hSg1Z%LD|Yq&5PzO{uG{c%^c2vwz+(iI#kBU!_ zFg*2bH*U?;(^$p1S3PUqV~h?@g>GkYK+locd`MI6_BoDsZ}Q=ZTdd=1GYCmxT#iQ{ z`cAfBdb#SqzY(T&UnIwBR!8XR99Rk-T&EoIM%drrqQtF^^5s*uVAtfw;LQv#9#WPm zb&s!NpW7`74|__f>D4#xhH@znfS3~CJYRg!M#mVnz0Pr+PF)-IBZ764zO*QZhQ^mX zv~S&}9*p+6bnuq6TS!Cqt0J)nMbW6YZpei$j6d%Y#9LbMX>^+!_Nx3zDcB_dsbMAPig563Gf1Nc(Ir~cffMnG_ z8w-0GW2NU;EUqb29^=#f;Xj4LTR`fp8=MF(+^@LrHV?(&_HFsAM>Tfh8#%9fES;%$ zv9DZnsH7b9OvR_bnz~MIw%E)GEhW-hb#~(xZFQ;%zU1LoE~oVhGr*Z*LF70lpz@tO zN=)q6KKELfchZlpjK#mU_r1Hr=aJrJ40ZxB*tR=oXX*OG>0t+ED^OR#tey?;!EI${ zuIklK{F{^d!8$a*G_LsNA@+8Ff^TB z+R8i;N8n(hzLtFH1?#s=a8U{=2;i;BcdSWZ+J6-h{vL!WJ6pcOJ_jSULvJDvW1o9i zCm8vL8@D;3?8BIUci2djVpHkzkb`?vC~bD#oAJWD9OnMY=@M>5nor^u(h`g|-DBF? z2HWoTz}@>|#l~b|gQn@$KHTf$eNm|*sOdHJ?KSUseg|T9EnK^r#y{M07v*FAJ=-g>b}$t!h-FRiil7N#YXcbZSo0mxcM!b%k`)Kai!O zG$_kE0zF--nu~q#@qr|-IlppsSbu4Kx&S$1|PN{`#RU1VR}2BgVEx%>ET4t^gi z>f+J-T>}|vq{cKSrJ^S(oPel1m zdDh#BoXI`19!L~=g#9ieS6EOE?#ny_WzZwN1R6eVusw78+6}Zv_S7>acWddwGIf>C zo<}m;-ACEm`nkG5DyuW**Xw$Rg+XGP*Xd;Gi~-xzhV32lq}6zjV5FDssfq`K-}77n zs35loPn)X3R%yKW2kgZm1}fEL_CsMWZ2W~_2^02js=eMET)?_y5fBy;0R$>ND3); zH*iulyYJF)(9QBCn8xFkoRf)?K>KPOpQEU1zI09D&--Pf?CLLrjMRz!Ln4uH@QF6C zDD*dvq3N$$EI|HPjY#9}Nt)VK_)K59SkX?mJh}$Ad(ilz9j?DG?O>@buc7jh&I@N; z$8Z4M0e!dwfE0L;M(5Ygb{8nMVL>w!?BbOgta(qP*AJ<)o*MrNgLYa||0?Ug2&oIR z-*7I(5+|hl984U^yw1seQ2+#DlYc3b7&RF>8#VF#8hBiq#BD_;M%}zLC-)kRddYaW zd#CgGLcRV9rZt1Ow;uz~BO&%|g(@jos0Nb}6+c^=H7$gKLr|Rg#uo9yHVKdMoW=H9^k_Sm8fId`5 z-zEeg;Z}#b-R11`qyTMCI*WKDj%1ujnnjE>QT+Kj*ZK7kzfcw1b-%&rs#E6=-#a7> zcy5Omm^8>!-`*B=&g;)nv2n`{m5yNCdacjq;gZ#b7~{~A*0{>={3uzBt4n!?&k76% z&7_kd<3rZ?{4-KNP9Bzf(fYiuP^oS&jYR$`sR;)-Jm|J9dCxJW6x4QfsMJ?bA562C zwdoOmO>J5e{twQ^t(N`pjtU&fPSmc2pzTI|SADrqDLQc~_+=drX2ybl6Y#FLBS(X! z0cv?oW0G!2z`N$lzSweWTNX6kic}U45tT6ZcnT5&m}s(>=^q2{fVq&)Ky}@D`x5<+KH6U zwtL4|XEe{mWWF)J<}&gFSd69-ncngMIrRq2)(SCFG?OE0b|0R50G9`1UovDqru$fr zz~t(Nrx+i-*%QuSSU^yKiY(NqpHgj5AX0EzEa)442`e+tFu-%lqOb_Cmlbuoen)jL z#&b+-LVsG>StsNeIVX>~Mh|AS{cV1T{Bt4~$1d6(zti9ai7P+M8`BBM^$q7$w{6#L z83x{1&YbVWZsEJE~RTPDyC$hBzp zu4TJr@K{e#TC`VDpG)+{GR#jAP?Z3LSrz=r;Ev_9c`Wf?uPem0RKeWTFGv=pTrf`< z=g_^9VXl!Gp6nF>Qr$ZY=cC3530$8t`!07M0Gj_2Y2%8%W7f&Z=B>h7<#e<@Nxj77bB`IcB04fxFm8Lm$^*LcetAsCY>1pA}PHQ6IHQ z_QsCM$)VP0-NVWniDa0hTt~UjrT9PP5IcV;4K=qJpHb}zQ|!&^p4D^Q76f%G65!0V zxEuoug>q~m^RYH#$enP{NzwF%)4O!A7(5>`*pm*R=O*#tW~2bKduz+oK>g_BWXns# zGO!<9Jo+sMwu@Qw4|JP+nP+N^qgvAo;wDHM+QR4Ejv@c(0Dkc*pyP)-(i6B%!y@pS z!;fn$Su_j+B1XlVg{v84rN^ko)9)U)1dsg-dHi0f$5Yd1C%@A^DR5VRGpg)Ys=|8x zOKvh%9uTxy=I8~w=iy8l!4<7{R1;o_eK1Ml8(ZpH-{+!HJ^2R(ukldcZf=VtLFYPa zLi(WCN(Rs|eWQG~04u?X0p5L9m-fDKFY3TnuLJ!ogg_qmBS97uK}-1}Py|RC5XJ5N z!V-(8;&`Ss1%0j<=|2=S_3S>PS*D|0605#Hwx&wj`eFZkZfIOUQ#Q_)5!~V(-O=!S z@$Aefk4PRd)36HB)<==YWPjB^A@ViKOm+uS5!7M(GMmQ)-k8CDa7Y|`Mvjqtp0Lp< zWyvL8^^}**hPbI;mmzMe@Szp4!q3mf4Q@B`{s&$Gyl_*-Lu6UMZz zO2RlBdZX#<$Q(>jfR>|$pg7miy*R!PP(Evk)+J3RsD8bAFPdgug`s37%)y_S2FsuA z)jLu8(Psb%*fM9=ur$}2$&$uL&^j(;YY3LZ$4+pn)Fdpc-`P@%w0y6PBVu?sJep9{ zk+B7cCyLqlT0x&XRKdJj_qt2%56QB}aP!VbH~vw0m>q$N>kr;8rU%n>zX$n?tecwa z@oZzvqR3Hfd7OYnU)Mz&j83umtL~wLckh4nAXM-;9@SFZ*?&f)T-~?6GfjSnY?8Qx7(E=2cv1o8tuBordFQ~>peH#)M`{i2WUzZWW zNB(a`CFGM!y#0SA9!_As<4{u0DP4X@7<3RPFHQjBVEMjpo&Rql7+@~H%#8*V8kZ6| zsGbdtxqJH#N!d`U&;anp&WIm*;9305MwOa?h>Om@m>Fj`7PisFD{K}0+Ajb{HjfmR z!VQJ7(~Y*Iuae}?I5koUOVk$ryCkVXUIh()IcbTu80o*{GgAYn{b}%vN+%!v z>q|Avc^&^6@R0w38}WbSbNv5zaqm+ Date: Wed, 15 Aug 2018 18:29:43 +0000 Subject: [PATCH 21/23] Merged PR 10652: Removed Browser/ForceEnabledExtensions --- ...ew-in-windows-mdm-enrollment-management.md | 2 - .../policy-configuration-service-provider.md | 4 -- .../mdm/policy-csp-browser.md | 63 ------------------- 3 files changed, 69 deletions(-) diff --git a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md index 9e15e7e531..6d7fd56dc1 100644 --- a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md +++ b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md @@ -1394,7 +1394,6 @@ For details about Microsoft mobile device management protocols for Windows 10 s
  • Browser/ConfigureKioskResetAfterIdleTimeout
  • Browser/ConfigureOpenMicrosoftEdgeWith
  • Browser/ConfigureTelemetryForMicrosoft365Analytics
  • -
  • Browser/ForceEnabledExtensions
  • Browser/PreventCertErrorOverrides
  • Browser/SetHomeButtonURL
  • Browser/SetNewTabPageURL
  • @@ -1786,7 +1785,6 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware
  • Browser/ConfigureKioskResetAfterIdleTimeout
  • Browser/ConfigureOpenMicrosoftEdgeWith
  • Browser/ConfigureTelemetryForMicrosoft365Analytics
  • -
  • Browser/ForceEnabledExtensions
  • Browser/PreventCertErrorOverrides
  • Browser/SetHomeButtonURL
  • Browser/SetNewTabPageURL
  • diff --git a/windows/client-management/mdm/policy-configuration-service-provider.md b/windows/client-management/mdm/policy-configuration-service-provider.md index bd30c9c7b9..f8c256c163 100644 --- a/windows/client-management/mdm/policy-configuration-service-provider.md +++ b/windows/client-management/mdm/policy-configuration-service-provider.md @@ -561,9 +561,6 @@ The following diagram shows the Policy configuration service provider in tree fo
    Browser/FirstRunURL
    -
    - Browser/ForceEnabledExtensions -
    Browser/HomePages
    @@ -4209,7 +4206,6 @@ The following diagram shows the Policy configuration service provider in tree fo - [Browser/DisableLockdownOfStartPages](./policy-csp-browser.md#browser-disablelockdownofstartpages) - [Browser/EnableExtendedBooksTelemetry](./policy-csp-browser.md#browser-enableextendedbookstelemetry) - [Browser/EnterpriseModeSiteList](./policy-csp-browser.md#browser-enterprisemodesitelist) -- [Browser/ForceEnabledExtensions](./policy-csp-browser.md#browser-forceenabledextensions) - [Browser/HomePages](./policy-csp-browser.md#browser-homepages) - [Browser/LockdownFavorites](./policy-csp-browser.md#browser-lockdownfavorites) - [Browser/PreventAccessToAboutFlagsInMicrosoftEdge](./policy-csp-browser.md#browser-preventaccesstoaboutflagsinmicrosoftedge) diff --git a/windows/client-management/mdm/policy-csp-browser.md b/windows/client-management/mdm/policy-csp-browser.md index 49d713d18e..e025ffe2fc 100644 --- a/windows/client-management/mdm/policy-csp-browser.md +++ b/windows/client-management/mdm/policy-csp-browser.md @@ -135,9 +135,6 @@ ms.date: 08/08/2018
    Browser/FirstRunURL
    -
    - Browser/ForceEnabledExtensions -
    Browser/HomePages
    @@ -2717,66 +2714,6 @@ Data type = String
    - -**Browser/ForceEnabledExtensions** - - - - - - - - - - - - - - - - - - - - - -
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark5check mark5check mark5check mark5
    - - - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * User -> * Device - -
    - - - -This setting lets you decide which extensions should be always enabled. - - - -ADMX Info: -- GP name: *ForceEnabledExtensions* -- GP element: *ForceEnabledExtensions_List* -- GP ADMX file name: *MicrosoftEdge.admx* - - - - - - - - - - - - - -
    - **Browser/HomePages** From a8078ac9ff5ec10b4aeb564d2e0ada8bccf76fc6 Mon Sep 17 00:00:00 2001 From: Maricia Alforque Date: Wed, 15 Aug 2018 19:02:38 +0000 Subject: [PATCH 22/23] Merged PR 10655: WindowsLicensing CSP - added supported values to SMode/Status setting --- .../mdm/new-in-windows-mdm-enrollment-management.md | 4 ++-- windows/client-management/mdm/windowslicensing-csp.md | 9 ++++++++- 2 files changed, 10 insertions(+), 3 deletions(-) diff --git a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md index 6d7fd56dc1..4e9a8c5b10 100644 --- a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md +++ b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md @@ -1411,7 +1411,7 @@ For details about Microsoft mobile device management protocols for Windows 10 s
  • DeviceInstallation/PreventInstallationOfDevicesNotDescribedByOtherPolicySettings
  • DmaGuard/DeviceEnumerationPolicy
  • Experience/AllowClipboardHistory
  • -
  • Experience/DoNotSyncBrowserSetting
  • +
  • Experience/DoNotSyncBrowserSettings
  • Experience/PreventUsersFromTurningOnBrowserSyncing
  • Privacy/AllowCrossDeviceClipboard
  • Privacy/UploadUserActivities
  • @@ -1789,7 +1789,7 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware
  • Browser/SetHomeButtonURL
  • Browser/SetNewTabPageURL
  • Browser/UnlockHomeButton
  • -
  • Experience/DoNotSyncBrowserSetting
  • +
  • Experience/DoNotSyncBrowserSettings
  • Experience/PreventUsersFromTurningOnBrowserSyncing
  • Privacy/AllowCrossDeviceClipboard
  • Privacy/UploadUserActivities
  • diff --git a/windows/client-management/mdm/windowslicensing-csp.md b/windows/client-management/mdm/windowslicensing-csp.md index 1e61634c31..5957967b3e 100644 --- a/windows/client-management/mdm/windowslicensing-csp.md +++ b/windows/client-management/mdm/windowslicensing-csp.md @@ -7,7 +7,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: MariciaAlforque -ms.date: 07/25/2018 +ms.date: 08/15/2018 --- # WindowsLicensing CSP @@ -182,6 +182,13 @@ Added in Windows 10, next major version. Returns the status of the latest Switch Value type is integer. Supported operation is Get. +Values: +- Request fails with error code 404 - no SwitchFromSMode request has been made. +- 0 - The device successfully switched out of S mode +- 1 - The device is processing the request to switch out of S mode +- 3 - The device was already switched out of S mode +- 4 - The device failed to switch out of S mode + ## SyncML examples From fc42dc6004aed74ea636914ae684615d8bdd716e Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Wed, 15 Aug 2018 17:15:50 -0700 Subject: [PATCH 23/23] fixed en-us --- windows/security/index.yml | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/security/index.yml b/windows/security/index.yml index 03d6db5682..019ee50e72 100644 --- a/windows/security/index.yml +++ b/windows/security/index.yml @@ -85,10 +85,10 @@ sections: Prevent, detect, investigate, and respond to advanced threats. The following capabilities are available across multiple products that make up the Windows Defender ATP platform.
     
    - - - - + + + +
    Attack surface reductionNext generation protectionEndpoint detection and responseAuto investigation and remediationSecurity posture
    [Hardware based isolation](https://docs.microsoft.com/en-us/windows/security/hardware-protection/how-hardware-based-containers-help-protect-windows)

    [Application control](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control)

    [Exploit protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard)

    [Network protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard)

    [Controlled folder access](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard)

    [Network firewall](https://docs.microsoft.com/en-us/windows/security/identity-protection/windows-firewall/windows-firewall-with-advanced-security)

    [Attack surface reduction controls](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard)
    [Antivirus](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10)

    [Machine learning](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus)

    [Automated sandbox service](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus)
    [Alerts queue](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection)

    [Historical endpoint data](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection#machine-timeline)

    [Realtime and historical threat hunting](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection)

    [API and SIEM integration](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection)

    [Response orchestration](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection)

    [Forensic collection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection#collect-investigation-package-from-machines)

    [Threat intelligence](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection)

    [Advanced detonation and analysis service](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection#deep-analysis)
    [Automated investigation and remediation](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection)

    [Threat remediation](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection#how-threats-are-remediated)

    [Manage automated investigations](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection#manage-automated-investigations)

    [Analyze automated investigation](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection#analyze-automated-investigations)
    [Hardware based isolation](https://docs.microsoft.com/windows/security/hardware-protection/how-hardware-based-containers-help-protect-windows)

    [Application control](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control)

    [Exploit protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard)

    [Network protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard)

    [Controlled folder access](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard)

    [Network firewall](https://docs.microsoft.com/windows/security/identity-protection/windows-firewall/windows-firewall-with-advanced-security)

    [Attack surface reduction controls](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard)
    [Antivirus](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10)

    [Machine learning](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus)

    [Automated sandbox service](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus)
    [Alerts queue](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection)

    [Historical endpoint data](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection#machine-timeline)

    [Realtime and historical threat hunting](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection)

    [API and SIEM integration](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection)

    [Response orchestration](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection)

    [Forensic collection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection#collect-investigation-package-from-machines)

    [Threat intelligence](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection)

    [Advanced detonation and analysis service](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection#deep-analysis)
    [Automated investigation and remediation](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection)

    [Threat remediation](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection#how-threats-are-remediated)

    [Manage automated investigations](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection#manage-automated-investigations)

    [Analyze automated investigation](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection#analyze-automated-investigations)
    [Asset inventory](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection)

    [Operating system baseline compliance](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection)

    [Recommended improvement actions](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection)

    [Secure score](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection)

    [Threat analytics](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/threat-analytics-dashboard-windows-defender-advanced-threat-protection)

    [Reporting and trends](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection)
    " \ No newline at end of file